Method for inhibiting random access code false alarm

A technology of random access and random access preamble, applied in the field of communications, can solve problems such as the chance of users losing access, reduce the probability of multi-user normal access, and reduce the probability of multi-user detection, and achieve the effect of suppressing false alarms

Active Publication Date: 2013-09-18
POTEVIO INFORMATION TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in a multi-user scenario, if the location where a user causes a false alarm happens to be the location where another user normally accesses, the user that should have been detected will lose the opportunity to access, reducing the detection probability of multiple users.
[0017] In summary, the existing false alarm suppression technology has the problem of reducing the normal access probability of multiple users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for inhibiting random access code false alarm
  • Method for inhibiting random access code false alarm
  • Method for inhibiting random access code false alarm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] In the case of a high SNR, there are N detection windows corresponding to the root parameter u of the current random access code (detection window indexes are 1, 2, 3..., N). First, all detection windows are pre-detected to obtain the user's decision flag (flag=1 indicates that the peak value has been detected; flag=0 indicates that the peak value has not been detected).

[0071] A user appears in the Kth detection window, and its pre-detection flag flag K = 1, the Kth detection window may be a real user, or it may be caused by the energy leakage of its adjacent detection windows.

[0072] The peak value (or other detection amount) of the Kth user is Maxvalue K , record its corrected peak value (or other detection amount) as Maxvalue_r K , Maxvalue_r K is the Maxvalue K It is obtained after deducting the possible adjacent window energy leakage in .

[0073] The transmitter transmits a random access preamble, and measures the peak value of each detection window. Af...

example 2

[0087] Both Example 2 and Embodiment 1 are applicable to the case of high signal-to-noise ratio. In the second embodiment, there are at least 3 adjacent windows, that is, N≥4. Because in specific cases, when the suppression factors include G1 and G2, the amount of calculation is too large. In order to avoid a large number of calculations, only considering the influence G2 between adjacent windows can set G2=0. The determination method of G1 is the same as that in the first embodiment. Of course, under the condition that the calculation amount is not considered and the accuracy is ensured, it is the best to adopt the solution in the first embodiment.

Embodiment 3

[0089] In the environment of frequency offset (residual frequency offset and Doppler frequency shift), the detection window corresponding to the root parameter u is detected to obtain the user's decision flag flag. if flag K =1, the peak position is Maxindex K . Max index k ±(d u , 2d u ......nd u ) may cause false alarms in other detection windows. But as n increases, the leaked energy will become smaller and smaller. Therefore, when using single-window detection, the main consideration is the distance from the main peak ±d u The influence of the energy leakage at the position on other detection windows can be used to obtain the Flasealarm_index set of locations where flag=1 may cause false alarms for all users. If need to consider ±2d u ,3d u ......nd u Flasealarm_index can be expanded for the energy leakage at the position.

[0090] If the three-window combined detection is used, the user's judgment flag flag is obtained. When using three-window combined detectio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for inhibiting random access code false alarm. The method comprises the following steps: measuring a peak value corresponding to the random access code in a target detection window; deducting non-target detection window leakage energy from the peak value to obtain a correction peak value corresponding to the random access code; according to the correction peak value and an absolute threshold, judging whether a user appearing in the target detection window is false alarm; if so, marking in the target detection window. After the embodiment of the invention is applied, the false alarm is effectively inhibited under the condition that the multi-user normal access probability is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, to a method for suppressing false alarms of random access codes. Background technique [0002] For cellular wireless mobile communication systems, random access channels are used for multi-user access and initial synchronization of uplink time. The training sequence in the random access channel is called a random access code. In some systems, a cyclically shifted sequence with a cyclic prefix is ​​used as the random access code. For example, the ZC sequence is used in the LTE system, and the linear convolution is converted into a circular convolution through a cyclic prefix, so that it is convenient to implement a frequency domain correlation algorithm during reception. [0003] In the design of receivers using random access codes, the problem of false alarms caused by energy leakage of correlation peaks is often faced. attached figure 1 is the basic funct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W24/00H04W74/08
Inventor 刘建明陶雄强李祥珍邢益海闫淑辉胡炜徐宏祝锋邓晓晖张运会冯绍鹏于小红王永明金奕丹
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products