Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

216 results about "Signomial" patented technology

A signomial is an algebraic function of one or more independent variables. It is perhaps most easily thought of as an algebraic extension of multivariable polynomials—an extension that permits exponents to be arbitrary real numbers (rather than just non-negative integers) while requiring the independent variables to be strictly positive (so that division by zero and other inappropriate algebraic operations are not encountered).

Algebraic soft decoding of reed-solomon codes

InactiveUS6634007B1Maximizes the expected scoreMaximizing the expected scoreOther decoding techniquesAlgebraic geometric codesDecoding methodsRound complexity
An algorithmic soft-decision decoding method for Reed-Solomon codes proceeds as follows. Given the reliability matrix Pi showing the probability that a code symbol of a particular value was transmitted at each position, computing a multiplicity matrix M which determines the interpolation points and their multiplicities. Given this multiplicity matrix M, soft interpolation is performed to find the non-trivial polynomial Q<HIL><PDAT>M</SB><PDAT>(X,Y) of the lowest (weighted) degree whose zeros and their multiplicities are as specified by the matrix M. Given this non-trivial polynomial Q<HIL><PDAT>M</SB><PDAT>(X,Y), all factors of Q<HIL><PDAT>M</SB><PDAT>(X,Y) of type Y-f(X) are found, where f(X) is a polynomial in X whose degree is less than the dimension k of the Reed-Solomon code. Given these polynomials f(X), a codeword is reconstructed from each of them, and the most likely of these codewords selected as the output of the algorithm. The algorithmic method is algebraic, operates in polynomial time, and significantly outperforms conventional hard-decision decoding, generalized minimum distance decoding, and Guruswami-Sudan decoding of Reed-Solomon codes. By varying the total number of interpolation points recorded in the multiplicity matrix M, the complexity of decoding can be adjusted in real time to any feasible level of performance. The algorithmic method extends to algebraic soft-decision decoding of Bose-Chaudhuri-Hocquenghem codes and algebraic-geometry codes.</PTEXT>
Owner:MIND FUSION LLC

Method and apparatus using coordinate interleaving to increase diversity in a MIMO system

A method to increase diversity in MIMO fading channels interleaves coordinates of complex symbol(s) in a transmission frame after encoding and modulating. Specifically, an input signal is encoded and modulated into a codeword, jointly across at least two pipes, said pipes having space, time, frequency, or other nature, wherein the codeword spans a frame and is defined as at least one complex symbol whose complex values are all those to be transmitted during all channel uses covered by the frame. Each of the complex symbols have a first and second coordinate. After modulating, which may be combined with encoding in a signal space encoder, the coordinates are interleaved. In modulation, the complex symbols (typically two dimensional) may arise as elements of a multidimensional (typically greater than two dimensions) signal constellation, in which case those multidimensional constellation coordinates are the ones that are interleaved in the frame. The frame carrying the interleaved coordinates is transmitted by the first and at least second antennas, possible opposed sub-frames of the overall frame being transmitted separately by opposed antennas. A coset selector is used in some embodiments to maximize a minimum Hamming distance, and/or a minimum Euclidean distance, between coordinates within a coset to control diversity and/or coding gain. In some embodiments, the operation of the encoder and modulator is such as to maximize a minimum coordinate-wise Hamming distance, and/or a minimum Euclidean distance, between allowable codewords, and/or to provide additional structure for the allowable codewords. A method, transmitter, system, and mobile station are described.
Owner:NOKIA CORP

Distribution matching for probabilistic constellation shaping with an arbitrary input/output alphabet

Consistent with the present disclosure, an encoder circuit is provided at a transmit side of an optical fiber link that maps an input sequence of bits of fixed length k a sequence of symbols of a codeword of length n, such that the symbols of the codeword define a predetermined transmission probability distribution. Preferably, each symbol of the codeword is generated during a corresponding clock cycle, such that after n clock cycles, a complete codeword corresponding to the input bit sequence is output. On a receive end of the link, a decoder is provided that outputs the k-bit sequence every n clock cycles. Accordingly, buffers need not be provided at the output of the encoder and the input of the decoder, such that processing of the input sequence, codewords, and output sequence may be achieved efficiently without large buffers and complicated circuitry. Moreover, the input sequence, with any binary alphabet may be matched to a desired output distribution with any arbitrary alphabet. Accordingly, probabilistic constellation shaping may be achieved over constellations of arbitrary size. In addition, relatively long codewords, may be encoded and decoded with the apparatus and method disclosed herein. Accordingly, for a fixed SNR a higher SE (more bits per symbol) can be achieved. Alternatively, for a fixed SE, a lower SNR may be sufficient. Moreover, the resulting SE may be finely tailored to a particular optical link SNR to provide data transmission rates that are higher than the low order modulation formats that would otherwise be employed for optical signals carried by such links.
Owner:INFINERA CORP

Data aided frequency synchronisation in cellular mobile equipments

Some improvements to the conventional algorithms for data aided frequency synchronisation in cellular systems are introduced in a new method executable by the user equipments of various standards, i.e. 3GPP CDMA-TDMA, FDD mode at 3.84 Mcps, TDD mode at 3.84 Mcps, TDD mode at 1.28 Mcps; CWTS TD-SCDMA; GSM/DCS/GPRS. The method begins to obtain the suboptimal frequency errors Deltafi using a well known formula which calculates the argument of the autocorrelation over a subset of the baseband samples of the detected training sequence. The errors Deltafi are stored into a shift register L-position long and averaged to obtain an estimated frequency error Deltafi used for recursively correcting the reference frequency of the local oscillator, as: fi=fi-1+KDeltafi where K (0<=K<=1) is a weighting factor. Contrarily to the simple averaged error of the prior art, a sign criterion is used by which the average is performed on the only terms having the most recurrent algebraic sign among the stored terms Deltafi. The content of the shift register is corrected after each non-null frequency correction by subtracting K.Deltafi to all the stored terms Deltafi. Besides the frequency is corrected upon the following optional conditions, each other independents: The number of terms Deltafi having equal algebraic sign is greater than a constant alpha lower than L. The standard deviation sigma of the averaged terms Deltafi is lower than beta.sigmaold, being sigmaold the sigma of the last non-null frequency correction, and beta a constant >=1. After a minimum number gamma of iterations between two non-null frequency corrections are spent, being gamma a constant comprised between 1 and L. According to another variant the iterations of the recursive update are subdivided into an initial group with a higher K value for achieving fast convergence and a subsequent group with a lower K for achieving the required accuracy (FIG. 13).
Owner:SIEMENS INFORMATION & COMM NEWTWORKS INC

Octet iterator template interface for protocol transfer syntax coding services

A method is disclosed that allows the concise implementation of one protocol encoding/decoding device for syntax conversion between an abstract data syntax and a transfer syntax presented in an open-ended variety of input/output/storage mediums, including, but not limited to random-access memory, disk files, communications sockets, buffer lists, and other static or dynamically-extensible storage structures. The abstract syntax is described using the Abstract Syntax Notation One standard and presented in a higher-level object-oriented programming language such as C++. The transfer syntax is specified by standardized encoding rules and results in a stream of octets (unsigned 8-bit characters) suitable for communication transport using the Open Systems Interconnection (OSI) protocol model. The result of encoding (which is also the input for decoding) is called a protocol data unit (PDU). For different applications, it may be useful to present the PDU using various input/output or storage mediums such as listed above. The disclosed method employs a template function parameterized on an octet output iterator interface to provide an ASN.1 encoding mechanism, and a corresponding template function parameterized on an octet input iterator interface to provide an ASN.1 decoding mechanism, both independent of the medium in which the PDU is presented.
Owner:OLIVER CHRISTOPHER

Iterative rake receiver and corresponding reception process

A CDMA radiocommunication signals receiver for receiving signals obtained from spectrum symbols spread using pseudo-random sequences and having been propagated along a number of paths. The receiver includes a filter configured to restore L unspread signals for each symbol, corresponding to L different paths, a calculating circuit configured to calculate L estimates of the L different paths, and a demodulator configured to process each of the L unspread signals using the corresponding L estimates to obtain L path contributions. Also included is an adder configured to form a sum of the L path contributions and for outputting an estimate of a received symbol, and a decision circuit configured to make a decision about a value of the received symbol based on a value of the estimate of the received symbol output by the adder. Further, the receiver processes blocks of N symbols, each block having data symbols and control symbols, each symbol being identified by a rank k that it occupies in the block, where k varies from 0 to N-1. Also, for each path identified by an index l, where l varies from 0 to L-1, and for each block, the receiver considers a vector Cl with N components that characterizes the path during the block, and the receiver defines a vector base BK, vectors of the vector base BK being N eigenvectors of the matrix E [ClCl<.T>], each vector Cl being decomposed in the vector base, where decomposition coefficients denoted GlK form independent random Gaussian variables. In addition, coefficients GlK, define a vector Gl with N components for each path l, and the calculating circuit estimates each vector Gl, using an iterative process based on EM estimation-maximization algorithm based on a maximum a posteriori probability criterion.
Owner:FRANCE TELECOM SA

Elliptic polynomial cryptography with multi y-coordinates embedding

Given a set of elliptic points that satisfy an elliptic polynomial equation defined over a finite field, F, which requires N-bits to represent its elements, a new method of cryptographic encryption and decryption is presented which uses more than one quadratic variable that are termed y-coordinates to obtain an elliptic polynomial equation with multi y-coordinates instead of one y-coordinate. The additional y-coordinates are used to embed extra message data bits. A ny-fold increase in the number of embedded message data bits in a single elliptic point can be achieved with the improved method when using ny additional y-coordinates. The reason is that the number of points that satisfy an elliptic polynomial equation defined over F(p) and which can be used in the corresponding cryptosystem is increased by a factor of (#F)ny, where # denotes the size of a field. The use of the additional y-coordinates can be used to reduce computational complexity. Alternatively, this can be used to increase security by making the bit positions where data bits are embedded known only to the sender and receiver. Also, it can be used as a countermeasure by randomizing the bit positions where data bits are embedded.
Owner:KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS

Code static detection method

The invention discloses a code static detection method, particularly relates to an LLVM IR (low level virtual machine intermediate representation) based symbol execution algorithm in the technical field of utilization of initial values of variable symbols of given programs, and solves the problems of single supported language and incapability of better processing pointers and aliases for a static detection method in the prior art and the problems in detecting potential program bugs and the like. The method comprises the steps of: (1) obtaining a source code, and preprocessing and converting the source code into an LLVM assembly program; (2) simulating interpretive execution of the LLVM assembly program obtained by conversion by applying the symbol execution algorithm, and recording the symbol value of each variable in different paths and the constraint conditions of each path; and (3) according to the recorded symbol value of each variable in different paths and constraint conditions of each path, calling an SMT (satisfiability modulo theories) solver Z3 to check whether the symbol value of the variable meets the path constraint and the bug constraint, and judging whether the program has potential bugs. The method is applied to array bound overflow, division by zero and null pointer dereference.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products