Patent classifications
H04L1/0045
SIDELINK INTERFERENCE MONITORING FOR FULL-DUPLEX AND HALF-DUPLEX OPERATION
Methods, systems, and devices for wireless communications are described. Generally, the described techniques at a user equipment (UE) provide for efficiently falling back to a half-duplex mode from a full-duplex mode when a level of interference is high. In particular, the UE may measure the level of interference at the UE (e.g., caused at least partially by self-interference between transmissions and receptions at the UE), and the UE may fall back to a half-duplex mode if the level of interference is above a threshold. In one example, the UE may transmit channel state information (CSI) reference signals (CSI-RSs) on resources allocated for interference measurements, and the UE may perform measurements on the CSI-RSs to identify a level of interference. In another example, the UE ay transmit a data packet on resources allocated for interference measurements, and the UE may decode the data packet to identify a level of interference.
Controller Area Network Termination Scheme
A Controller Area Network (CAN) system, method, and circuit are provided with a dual mode bus line termination circuit connected between signal lines of a serial bus and optimized for both differential and single-ended communication modes over the serial bus, where the dual mode bus line termination circuit includes first and second resistance termination paths connected in parallel between first and second bus wires of the serial bus to provide an odd mode termination impedance (R.sub.ODD) that matches an impedance of the serial bus when operating in the differential communication mode, and to also provide an even mode termination impedance (R.sub.EVEN) that matches an impedance of the serial bus when operating in the single-ended communication mode.
Real-time soft combining, CRC validation, and MIC validation of decrypted packets
The apparatus receives a first PDU and a first CRC that is based on the first PDU. The first PDU is encrypted based on a first nonce. The apparatus decrypts the first PDU to obtain a first payload and a first cipher stream. The apparatus soft combines the decrypted first payload with a decrypted set of payloads. The set of payloads have been encrypted based on at least one nonce different than the first nonce. The apparatus generates a second CRC based on the soft combined decrypted payloads and based on the first cipher stream. The apparatus determines whether the generated second CRC for the soft combined decrypted payloads passes a CRC check against the first CRC.
Hybrid automatic repeat request feedback for outer loop adaptation for 5G or other next generation network
Intelligent hybrid automatic repeat request (HARQ) feedback can better support link adaption. Thus, in addition to the traditional HARQ feedback, which is to relay acknowledgement (ACK) and negative acknowledgement (NAK) data based on a decoding result, a new state for the HARQ feedback can be represented as “ACK+”. Consequently, ACK+ can be used to indicate to the network that a modulation and coding scheme (MCS) of a current data packet is too conservative, and the user equipment (UE) is capable of supporting a more aggressive MCS.
Techniques for bi-direction preemption indication transmissions
Aspects described herein relate to bi-direction preemption indication transmissions. In one example, a node such as an integrated access and backhaul (IAB) node may determine that a set of one or more resources are preempted for use for both an uplink transmission and a downlink transmission, and transmit, to a user equipment (UE), the bi-direction preemption indication indicating that the set of one or more resources are preempted for use for both of the uplink transmission and the downlink transmission. In another example, a UE may receive a bi-direction preemption indication indicating that a set of one or more resources are preempted for use for both an uplink transmission and a downlink transmission, and perform rate matching for both of the uplink transmission and downlink transmission based on the set of one or more resources indicated by the bi-direction preemption indication.
Using error detection bits for cryptographic integrity and authentication
In some examples, a method includes receiving a plaintext message including plaintext data and error detection bits. The method also includes encrypting the plaintext message based on a feedback algorithm to generate an encrypted message including a set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication. The set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication can replace the error detection bits in whole or in part. A receiver can confirm the cryptographic integrity and the cryptographic authentication of the encrypted message by decrypting the set of encrypted bits.
Systems and methods for encoding digital communications
The disclosed systems and methods for encoding, by a polar encoder, K message bits into an encoded message bits sequence C(M) using polar codes, where K and M are integer values and M is greater than or equal to K; rearranging, by an interleaver, the encoded message bits sequence C(M) to rearranged encoded message bits sequence C′(M) such that a C(i)th bit and a
th bit of the encoded message bits sequence C(M) are arranged together, where i is an integer value that varies between 1 to
mapping, by a bits-to-symbol mapper, the rearranged encoded message bits sequence C(M) to N non-binary symbols, where N is an integer value; and processing, by a transmitter symbol processor, the N non-binary symbols to transmit the processed non-binary symbols towards a receiver.
Wireless devices and systems including examples of mixing coefficient data specific to a processing mode selection
Examples described herein include systems and methods which include wireless devices and systems with examples of mixing input data with coefficient data specific to a processing mode selection. For example, a computing system with processing units may mix the input data for a transmission in a radio frequency (RF) wireless domain with the coefficient data to generate output data that is representative of the transmission being processed according to a specific processing mode selection. The processing mode selection may include a single processing mode, a multi-processing mode, or a full processing mode. The processing mode selection may be associated with an aspect of a wireless protocol. Examples of systems and methods described herein may facilitate the processing of data for 5G wireless communications in a power-efficient and time-efficient manner.
Advanced packet-based sample audio concealment
In a reliable multi-cast, a concealment scheme may be applied to recover or conceal lost or otherwise corrupted packets of audio information for one channel based on the audio information of other channels in the reliable multi-cast. The concealment scheme may employ correction factors for channels derived from the channel relationships.
Apparatus and method for in multiple access in wireless communication
A multiple access method, a multiple access transmitter, and a multiple access receiver includes performing, by a transmitter, channel coding on a bit sequence to determine a coded sequence. The method also includes interleaving and/or scrambling the coded sequence, and performing multidimensional constellation modulation on the interleaved and/or scrambled sequence; performing grid mapping on the modulated symbol sequence to determine a mapped sequence, and transmitting the mapped sequence. The method also includes receiving, by a receiver, mixed signals from multiple transmitters, the mixed signals are obtained by performing, by each of the multiple transmitters, interleaving and/or scrambling, multidimensional constellation modulation and grid mapping on data. The method further includes decoding, by the receiver, mixed information according to interleaver information and/or scrambler information, multidimensional constellation information and grid mapping pattern information corresponding to each transmitter to obtain data corresponding to each transmitter.