Abstract: Method for estimating position information of base stations as well as terminals for three dimensional centralized real-time spectrum management to achieve high spectral efficiency. In one aspect of the invention, the method comprises i) understanding the position information of plurality of base stations, wherein the plurality of terminals and the base stations form a wireless network, ii) determining, at the central controller, position of a terminal via plurality of communication wirelessly between the base stations and a terminal and between the base station and the central controller, iii) applying network wide real time knowledge at the central controller to electronically steerable antennas to use a resource in a different direction then where it is used by other base stations to achieve frequency reuse of one.
Abstract: An improved decoding process as applied to MPEG AAC decoders of the type that use codebooks, reduces redundant traversing steps while finding the location of a specific binary stream codeword in the codebook. To this end, the codebooks are divided into a plurality of node-tables, each table corresponding to a node. From the number of bits âkâ in a given node-table, the decimal value of the first âkâ bits in a binary stream to be decoded is ascertained and compared with the decimal value of the maximum code word in the given node-table. The comparison is used for the identification of the location of the codeword in the node-tables to assist in decoding without unnecessary traversing of all the nodes in the codebook.
Abstract: A method (and algorithm) for detection of 802.11a and 802.11b frames in an 802.11 transmission, calculates DCC (delayed copy correlation) and LCC (local copy correlation) magnitudes and compares their normalized values with threshold values. When a signal is detected, (i.e., AGC locks) the algorithm checks for a valid 802.11a frame, and it exploits the DCC properties of the received symbols. Because of the repetitions of short preambles in received symbols, the DCC is high when the short preamble symbols are present. Further, 802.11b detection may be based on Barker correlation properties simultaneously. A counter array is maintained for each position in a Barker window, and is incremented if the normalized LCC of the incoming sequence with the Barker code exceeds a threshold. An 802.11b packet is declared if the maximum value of the counter array exceeds a predetermined number in a specified number of Barker windows.
Abstract: A negative pressure ink supply system includes (1) a primary ink cartridges, (2) a secondary ink cartridges, which are connected by means of an ink tubes with the negative pressure ink cartridge assemblies provided between the secondary ink cartridges and the jet head. The ink, pumped from the primary ink cartridge, is put into the secondary ink cartridge, wherein it is supplied to the negative pressure ink cartridge and then in turn from the negative pressure ink cartridge to the jet head. The liquid level in the secondary cartridge is lower than the jet head surface and adjustable. The negative pressure ink supply system is suitable for image-printing equipment by supplying liquid ink, such as large format machines, portrait machines, plotters, etc.
Type:
Grant
Filed:
October 26, 2006
Date of Patent:
June 8, 2010
Assignee:
Zhejiang Gongzheng Technology Development Co., Ltd.
Abstract: A micro-cavity measuring equipment based on double optical fiber coupling includes a sight and transmitter, a controller, and a length measuring device. The equipment detects small changes in the position of an object with respect to a probe from a moment when the sight and transmitter starts working to another moment when the sight and transmitter stops working. The controller has a program to automatically control the whole measuring process. The measuring equipment is characterized in that the sight and transmitter consists of a laser unit, a data collecting and processing unit, and a double optical fiber coupling unit with its ends of incident and effluent optical fibers fixed on a coupler.
Abstract: A non-iterative and computationally efficient bit allocation technique for perceptual audio coders employing uniform quantization schemes. This is achieved by computing a target MNR for all critical bands in a frame using a target bit rate and associated SMRs. Associated SNRs are then computed for the critical bands using the computed target MNR and the associated SMRs. Bits are then allocated to the critical bands based on the computed associated SNRs.
Abstract: A method for achieving bit rate controlled encoding, e.g., constant bit rate, uses a bit rate control model based on bits allocated per macroblock and based on error in estimating bits consumed in an encoding process in a macroblock. The method computes bits consumed per macroblock as a function of the formed bit rate control model, and allocates bits for the macroblock. To this end, a quadratic (second order) equation is used for the model, which equation might default into a first order equation requiring fewer computations, in the event that no second order solutions exist. In one form, the bit rate control model computes the bit rate to satisfy video buffer verifier (VBV) compliance in accordance with MPEG requirements. The bit rate control model makes allowances for the type of macroblock, i.e., inter, intra or bidirectional, and provides for any frame-skips.
Abstract: A multifunctional tape printer of tape measure, is provided with a main frame (1), a small number (for foot) roller (3) with the perimeter of 3 feet or/and a small number (for meter) roller (5) with the perimeter of 1 meter mounted on the main frame (1), pinch rollers and rubber brush on the rollers as well as ink supply device and tape conveying devices, which constitute the main body of the tape printer, the tape printer being featured by that an additional functional component of a large number (foot) roller (4) or/and large number (meter) roller (6) are mounted on the main frame (1) for matching with the small number (for foot) roller (3) with the perimeter of 3 feet or/and the small number (for meter) roller (5) with the perimeter of 1 meter, the large number roller(s) is/are kept at the same linear velocity to that of the small number roller(s), moreover, the large number roller and small number roller, through the proportioning of mechanical transmission rotating speed, achieve that when a small number
Abstract: A method of enhancing security in network management for SNMPv2c packet traffic over internet between a (sending) manager location and an (receiving) agent location uses a pluggable security application function. The manager location has a manager side security application (MSA) and may include one or more managers. The agent location has an agent side security application (ASA) and may include one or more agents. Upon a SNMP request from a manager to the MSA, the request is encrypted, appended with authentication digest and sent to a registered agent in ASA. The MSA receives a secured response packet back from the ASA, which after authentication decrypts and forwards it to the intended manager. Thus, an existing protocol implementation is maintained, while reducing additional network overhead. The method obviates the use of IPSec tunnels and migration to SNMPv3.
Abstract: A technique and method provide virtual N-way video conferencing to participants having IP stations/videophones, which have limited processing capacity, by auto-selecting a limited subset of the participants for video display and restricting the rest of the participants to voice-only mode which requires reduced processing capability. The method uses a virtual n-way conferencing module (VNCM) to provide the video conferencing, and an auto caller select module (ACSM) for causing selective video display. Some of the participants might have VoIP terminals instead of IP videophones. The invention includes a technique, e.g., by using a video transmission control module (VTCM) for reducing the bandwidth requirement of IP videophones by signaling the participants in voice-only mode not to transmit the video information in bandwidth-constrained situations.
Abstract: The invention pertains to a method and system that uses similar functionalities of different components within a software application when executing the application and application components. In one embodiment, predefined structures are created for a component type, where each component type has a similar functionality when executed. Parameter information is received at a client and linked with the predefined to provide a script specific predefined structure. The component is executed by executing the script specific predefined structure. After a user exits the component, the script specific predefined structure is automatically deleted.
Abstract: A method for configuration of an Auxiliary Processing Unit (APU) of multiprocessor system is presented. The multiprocessor system has at least a Main Processing Unit (MPU) coupled to the APU via a communication link. The APU has at least a first memory and a second memory. The method includes a plurality of steps. At step the first memory is divided into an application sector, a boot sector and a common sector. At another step interrupts of the APU except interrupt/s that is/are being received via the communication link are disabled. At a further step interrupt vector/s pertaining to the communication link is/are mapped to the boot sector of the first memory. At another step a configuration code is received selectively into the application sector of the first memory and into the second memory. At a further step the interrupt/s that is/are being received via the communication link are disabled. At a further step the common sector of the first memory is updated from the second memory.
Abstract: A method of designing a IEEE 802.11n modem starting from a IEEE 802.11a/g modem using a programmable FFT (Fast Fourier Transform) based on a half length FFT core, modifies data in a reception chain implemented in a IEEE 802.11n standard application. The method uses a N/2 FFT which is validated, along with a wrapper; and, extends and applies the validated N/2 FFT, (e.g., 64 FFT) to a N FFT (e.g., 128 FFT) by splitting the N FFT into two smaller first and second FFTs. The first FFT is applied to selected data samples (e.g., even samples) from the N FFT and the second FFT is applied to remaining data samples (e.g., odd samples) from the N FFT to complete data-handling, wherein the extending step is based on Danielson-Lanczos formula using a reduced number of Cordics. The method is also suitable for IFFT computations in IEEE 802.11n MIMO OFDM modem designs.
Abstract: A technique for signal distortion compensation using a filter that can support a higher delay spread distortion without substantially increasing hardware complexity. In one example embodiment, an adaptive receiver design compensates for signal distortions with the use of non-uniform tap delay filters. The non-uniform tap delay filters are used to output an adaptively channel matched signal for decoding.
Abstract: A method and device for synchronization and rate control of media data comprising adaptively computing an offset time using the reference time of a server, a local time of a client, and an associated time for presentation of the data, stamping the offset time on the media data, receiving the offset time stamped media data into a first buffer, processing the offset time stamped media data, computing an altered offset time, including the altered offset time with the processed media data, storing the processed media data in a second buffer, and selectively supplying the processed media data to a presentation sink unit according to the altered offset time, the server reference time, and the associated time of the media data.