Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

82results about How to "Guaranteed to receive correctly" patented technology

A method and device for enhancing random access

The invention provides a method to randomly access reinforced data, which comprises the following steps. Upstream pilot frequency codes transmitted by a terminal are detected and received; and information is fed back to the terminal. Reinforced data access request is transmitted by a receiving terminal; after that upstream reinforced data are allowed to be transmitted by the terminal is determined, configuration information, such as the information about physical resources and power, is transmitted to the terminal; the upstream reinforced data are received. The invention also provides a device to randomly access reinforced data. The device is detected by a processing unit, and receives upstream pilot frequency code sequence transmitted by a terminal. Reinforced data access request and reinforced data transmitted by the terminal are received. An information transmitting unit transmits feedback information to the terminal. When that the terminal is allowed to transmit reinforced data is determined, configuration information, such as the information about physical resources and power and so on, is transmitted to the terminal. A decoding processing unit decodes the reinforced data access request, and determines whether the terminal is allowed to transmit the reinforced data. The invention can ensure that the information of random access request of reinforced data can be received by a base station correctly; and the collision probability of E-RUCCH or PRACH of different terminals is reduced.
Owner:CHINA ACAD OF TELECOMM TECH

Reliable transmission method for named data network data fragments based on byte numbers

The invention relates to a reliable transmission method for named data network data fragments based on byte numbers, and belongs to the technical field of computer network data transmission. The method comprises the following steps: a publisher numbers each item of data content according to bytes; a requester sends an inquiry interest packet and compares the maximum transmission unit MTU record minimum values of the forwarding nodes; the publisher replies the response data packet to inform the byte length, the starting byte number and the maximum transmission unit, wherein the request interestpacket sent by the requester comprises the name and byte number range of the data content to be acquired; the publisher encapsulates the data content of the corresponding byte into a content data packet and replies the content data packet to the requester; the requester waits for receiving the content data packet and prepares to retransmit the request interest packet; the requester receives and verifies the content data packet, and determines to retransmit the request interest packet or continuously request the subsequent content data packet according to the verification result; and the requester correctly receives the complete data content and then finishes data transmission. According to the method, reliable data transmission and link congestion avoidance are realized.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Processing method and terminal device for avoiding WLAN beacon

The invention discloses a processing method and a terminal device for avoiding a WLAN (wireless local area network) beacon, which are used for solving the problem of interference between a WLAN beacon signal and a signal of a first type sub-device when the frequency interval between the working frequencies used by the first type sub-device and a WLAN sub-device is very small in the terminal device simultaneously supporting a first type technology (LTE (long term evolution) and / or UMTS (universal mobile telecommunications system) technology) and the WLAN technology. In the processing method of the invention, after the first type sub-device obtains a beacon processing timing sequence information of the WLAN sub-device, a base station configures the beacon processing time for the first type sub-device or the first type sub-device sets the beacon processing time by itself, and the first type sub-device stops transmitting and / or receiving data within the beacon processing time. The processing method and the terminal device can effectively ensure the correct receiving of the WLAN beacon in the terminal device supporting both the LTE technology and the WLAN technology, or guarantee that the first type sub-device cannot be affected when transmitting the WLAN beacon, thereby ensuring the communication quality of the LTE and the WLAN.
Owner:ZTE CORP

Power control method of physical channel mapped by high speed descending sharing channel

The present invention discloses a method for controlling the power of the physical channel mapped by the high-speed descending sharing channel, and the method comprises the following steps: (a) informing the maximum emitting power of the physical channel mapped by the high-speed descending sharing channel by the wireless network controller, and the maximum emitting power is the deviation value between the emitting power which is needed when the subscriber facility correctly receives the data with the high-speed descending sharing channel at the edge of the subdistrict and the emitting power of the common pilot channel; (b) when the wireless network controller transmits the data which needs to be transmitted to the subscriber facility to the base station, carrying the emitting power level used in transmitting the data in the data frame of the high-speed descending sharing channel; and (c) when the base station transmits data to the subscriber facility, confirming the emitting power which is actually used by the physical channel according to the pre-obtained maximum emitting power, the emitting power level and the emitting power of the common pilot channel, and transmitting signaling and/or data to the subscriber terminal.
Owner:ZTE CORP

SDAP (Service Discovery Application Profile) layer remapping method based on SDAP PDU (Protocol Data Unit) length

The invention relates to an SDAP (Service Discovery Application Profile) layer remapping method based on the SDAP PDU (Protocol Data Unit) length, which belongs to the technical field of communicationand solves a problem that uplink data cannot be ensured to be correctly received by a receiving terminal in the prior art. The method is applied to the network side, and comprises the steps that network-side RRC (Radio Resource Control) sends RRC reconfiguration signaling to terminal-side RRC so as to enable the terminal side to perform reconfiguration according to the RRC reconfiguration signaling and generates reconfiguration completion signaling; the network-side RRC receives the reconfiguration completion signaling fed back by the terminal-side RRC, wherein the content of the reconfiguration completion signaling at least includes an SDAP PDU length field and a time point StartPoint at which the RRC reconfiguration signaling is successfully received in an air interface; and the network-side RRC starts the remapping and transmits an SDAP PDU to the terminal-side RRC so as to enable the terminal side to confirm whether the correct SDAP PDU is received or not according to the time point StartPoint and the stored SDAP PDU length field. According to the method, the terminal-side RRC can be ensured to correctly receive the SDAP PDU, high-reliability transmitting and receiving of remapping information are realized, the development cost is reduced, and the perfection of the remapping process is ensured at the same time.
Owner:36TH RES INST OF CETC

Restricted group target associated door formation method

ActiveCN106291532AAssociation ability unchangedGuarantee ConfirmationRadio wave reradiation/reflectionRadarEngineering
The invention provides a restricted group target associated door formation method comprising the following steps that S1. a geometric area of the group target scale is acquired; S2. the geometric center of the group target is solved; and S3. a restricted group target associated door threshold value is determined. The restricted group target associated door threshold value is the same with a group target associated door threshold value so that group target member determination can be guaranteed; and the restricted group target associated door threshold value is far greater than a group target tracking door so that correct receiving of equivalent measurement can be guaranteed. According to the restricted group target associated door method, double thresholds of the conventional associated door and the tracking door are changed into the single threshold so that the efficiency can be enhanced, the computational burden can be reduced and realization of the project is facilitated. The restricted tracking door is suitable for target tracking of narrowband radar and broadband radar and also applied to target tracking of visible light, infrared and multispectral sensors; single targets, multiple targets, dense multiple targets and sparse multiple targets can be tracked; and the method is suitable for group target tracking of the physical domain and also suitable for generalized group target tracking.
Owner:耿文东
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products