Patent classifications
H04W64/003
Locating external interference in a wireless network
A method for locating a source of interference external to a wireless telecommunications network includes establishing a grid of pixels that represents an area associated with a plurality of cellular antennas, assigning an elevation value to each pixel in the grid, determining a vertical gain for each of the plurality of cellular antennas, and determining respective probability values for pixels in the grid using the elevation values and the vertical gain, each of the respective probability values representing a probability that the source of interference external to the wireless telecommunications network is located at an associated pixel.
Location-based control for conferencing systems
A system controller for use in a videoconferencing system having multiple videoconferencing rooms each including a videoconferencing codec, includes a communication interface in communication with a videoconferencing codec located in the same videoconferencing room as the system controller, a memory configured to store information about the videoconferencing room in which the system controller is located, and a processor configured to execute computer-executable instructions stored in the memory to receive one or more commands transmitted by a mobile computing device in response to determining whether a videoconferencing room in which the system controller is located is within a defined proximity of the mobile computing device. The processor is configured to control, via the communication interface, the videoconferencing codec located in the same videoconferencing room as the system controller, according to the one or more commands to establish or control a videoconference in the same videoconferencing room.
Method and apparatus for adaptive location determination
Locations for mobile computers may be adaptively determined in a system which includes a server, a set of mobile computers, and an administrator computer. In such a system, the set of mobile computers may each be programmed with instructions operable to, when executed, transmit multiple forms of location information to the server. Additionally, the server may be programmed with a set of location determination routines and these routines may be used in determining a location for each of the mobile computers from the set of mobile computers. These locations may then be used to populate an interface of the administrator computer with icons at positions corresponding to the mobile computers' locations.
SYSTEMS, DEVICES, AND METHODS FOR PROTECTING V2X COMMUNICATIONS FROM NEAR-BAND INTERFERENCE
The disclosure relates to systems, methods, and devices for protecting Vehicle-to-Everything (V2X) communications (also known as intelligent transport systems (ITS) communications) from spurious emissions of nearby wireless devices operating in near-band or adjacent frequency bands. The system detects radio signals of a nearby ITS communication device, determines its radio communication parameters, and determines an interference condition based on whether the wireless device may interfere with the ITS communication device. The system also requests a change, based on the interference condition, in the radio subsystem communication parameters of the wireless device. The system also determines a geographic location of the wireless device, and, based on whether the requested change complies with a regulatory requirement of the determined geographic location, implements the requested change.
USING PHYSICAL AND LOGICAL MODELING OF NETWORK INVENTORY RESOURCES FOR DISCOVERY, ASSIGNMENT AND ACTIVATION
The technologies described herein are generally directed to modeling network systems. For example, a method described herein can include receiving request data representative of a planning request for a network equipment project applicable to network equipment that is part of a network. Further, based on the request data and a logical inventory model of resources, the method can include identifying a logical process model for the network equipment project, corresponding to characteristics of service equipment applicable to the network equipment project. The method further includes transforming the logical process model into a physical process model that references the service equipment applicable to the network equipment project, and based on the request data and the physical process model, facilitating, for the network equipment project, the service equipment.
METHOD AND SYSTEM FOR CONTROLLING TRAFFIC IN PRIVATE NETWORK BASED ON MOBILE COMMUNICATION NETWORK
A private network system based on a mobile communication network, includes: a packet data processing system of a mobile communication core network to which a user terminal is attached; a traffic management device configured to retain an attachment policy that is set in advance; and a packet analysis device, configured to receive a packet that requests network attachment from the packet data processing system, extract attachment information of the user terminal from the packet, and compare the attachment information with the attachment policy of the traffic management device to control intranet or Internet attachment. The attachment policy includes at least one of a whitelist defining a target whose traffic is allowed or a blacklist defining a target whose traffic is blocked, and the packet data processing system is included in a private network system that is not controlled by a control policy device of the mobile communication core network.
Frequency planning for a communication system
A method for frequency planning of a proposed microwave system is provided. The method includes receiving data regarding the proposed microwave system. The method further retrieves site-specific interference data from a database for a region around the proposed microwave system. The method also presents a graphical representation of frequency availability based on the received data and the retrieved data. When a user input is received, the method provides additional details on potential interference levels.
Automated and dynamic location identification and geofencing based on GPS data
Aspects of the present disclosure relate to identifying points of interest by generating and storing virtual geofence information that is captured around a physical structure based in part on global positioning system (GPS) data from a plurality of devices that is then processed to identify GPS trajectory and kernel density estimation. Specifically, the techniques include receiving, at the network-based control computer, GPS data from a plurality of devices and grouping the GPS data from the plurality of devices to generate GPS trajectory information for each group of the plurality of devices. Based on the GPS trajectory information, the network-based control computer may calculate kernel density estimation and determine an isoline on a virtual map for the each group of the plurality of devices. By overlaying the isoline data on a geographic coordinate information of a physical structure, the network-based control computer may generate a virtual geofence around the physical structure and store, in a memory, geofence information for the facility.
SYSTEMS AND METHODS FOR DRONE SWARM WIRELESS COMMUNICATION
A method for improving wireless communication for a drone swarm, the method comprising, at a computing system, receiving, from a plurality of drones of a drone swarm, data comprising radio frequency signal characteristics detected by the plurality of drones; generating a model of a radio frequency environment for the drone swarm based on the data received from the plurality of drones; and controlling at least one wireless communication system to improve wireless communication for the drone swarm based on the model of the radio frequency environment.
Multifactorial optimization system and method
A method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent; providing a synthetic economic value to a first set of agents at the a high level of the hierarchy; allocating portions of the synthetic economic value by the first set of agents to a second set of agents at respectively different hierarchal rank than the first set of agents; and conducting an auction amongst agents using the synthetic economic value as the currency. A method for allocation among agents, comprising assigning a wealth generation function for generating future wealth to each of a plurality of agents, communicating subjective market information between agents, and transferring wealth generated by the secure wealth generation function between agents in consideration of a market transaction. The method may further comprise the step of transferring at least a portion of the wealth generation function between agents.