Patent classifications
H04L2101/654
Method for estimating the time-varying energy balance of a collection of energy sinks, harvesters, and storage devices
An embodiment of the invention includes a non-transitory computer-readable medium storing instructions that, when executed by a computer, cause the computer to carry out a method for scheduling at least one activity to achieve a time-varying energy balance of a power system. A mission plan for a mission is received. The mission plan includes at least one activity and at least one route. Each route of the at least one route includes at least one time and at least one location. A plurality of power load identifications is received for at least one time-varying power load for use in the mission plan. A plurality of energy storage device identifications is received for at least one energy storage device. Based on the plurality of power load identifications, a power requirement required to complete the mission plan is determined using the at least one power load. Based at least in part on the mission plan and the plurality of energy storage device identifications, an available power for the mission is determined. The at least one activity along the at least one route is scheduled based on the power requirement and the available energy.
Method and apparatus for assigning mobile subscriber identification information to multiple devices according to location
Aspects of the subject disclosure may include, for example, a system that manages utilization of mobile subscriber identity information including enabling use of such information by different communication devices. The use of the same mobile subscriber identity information by multiple devices can be based on locations. Other embodiments are disclosed.
NETWORK VERIFICATION OF WEARABLE DEVICES
The present disclosure provides a solution to this problem by enabling the communications network to verify the relationship of the first UE and the second UE based on stored pairing information that is used to verify that the first UE is allowed to make a connection to the communications network. The apparatus transmits a pairing request from a first UE to a second UE. In an aspect, the pairing request is intended for a communication network. Further, the apparatus receives a pairing acknowledgement. In an aspect, the pairing acknowledgement verifies the pairing of the first UE and the second UE. In addition, the apparatus connects to the communication network via the second UE once the first UE pairs with the second UE.
METHOD FOR PC5 LINK ESTABLISHMENT, DEVICE, AND SYSTEM
A method for PC5 link establishment, a device, and a system are provided. The method includes: sending, by first UE, a direct communication request message, where the direct communication request message carries an identifier of the first UE, and is used to request establishment of a PC5 link; and receiving, by the first UE, a direct communication accept message sent by second UE, where the direct communication accept message carries an identifier of the second UE, and is used to accept the establishment of the PC5 link with the first UE.
Multiple device and multiple line connected home and home monitoring
Systems, devices, and techniques for multiple device and multiple line enabled computing devices and computing appliances are described herein. A device number can be assigned to a computing device and can be unique to the computing device. A plurality of alias numbers can be provided to the computing device and enabled for use by the computing device. Alias numbers can be enabled on multiple computing appliances, such that a user can transfer voice or video calls between devices using the alias numbers. Further, monitoring components in a home environment, for example, can be associated with one or more alias number so that security alerts can be provided to the various computing devices and computing appliances associated with the alias numbers.
Network Node and Method in a Wireless Telecommunications Network
A method performed by a network node for managing transmission of one or more CRS subframes. The network node identifies if a cell is actively serving a set of UEs. When the cell is actively serving a set of UEs, which set of UEs is configured for DRX the network node sends CRS over the first bandwidth in one or more CRS subframes which are transmitted in the cell during an onDuration interval of the DRX pattern and/or in one or more CRS subframes where system information is sent and/or in one or more CRS subframes where downlink, DL, data is sent. The network node sends CRS over a second bandwidth, in CRS subframes which are not transmitted in the cell during the onDuration interval of the DRX and/or in the one or more CRS subframes except CRS subframes where system information is sent and/or in the one or more CRS subframes except CRS subframes where DL data is sent, which second bandwidth is reduced in relation to the first bandwidth.
METHOD AND APPARATUS FOR TRACKING IDLE DEVICES
A method and apparatus can be configured to notify that the apparatus has changed a network node upon which the apparatus is camped on. The apparatus changes from camping on a first network node to camping on a second network node. The apparatus is in idle mode while camping on the first and the second network node. The first network node and the second network node both belong to a first network. The notifying is performed when the apparatus maintains a session to a third network node of a second network. The notifying is not performed when the apparatus is not maintaining a session to the third network node of the second network.
SYSTEM AND METHOD FOR DE-ANONYMIZING ACTIONS AND MESSAGES ON NETWORKS
A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
Making International Mobile Subscriber Identity Available at Base Station
The subject matter described herein generally relates to making an international mobile subscriber identity (IMSI) available at a base station, such as an evolved node (eNodeB) base station, within a cellular network, for example, a long term evolution communications system. The base station can receive data in response to a data request. The received data can include a header including an international mobile subscriber identifier. The base station can generate a first data for use in performing at least one communication function based on the received international mobile subscriber identifier. The base station can transmit the first data to at least one server communicatively coupled to the base station. Related apparatuses, systems, techniques and articles are also described.
FAULT MONITORING BY ASSESSING SPATIAL DISTRIBUTION OF QUERIES IN A UTILITY SUPPLY NETWORK
A monitoring tool receiving a plurality of queries about the performance of a network, each query being a query about the performance of the network in a respective location. The tool groups queries that exhibit a predetermined spatial relationship with respect to one another. The locations of the queries in the group define a zone. If the number exceeds a threshold, then the zone warrants inspection and/or queries about network performance in the zone can be met with an indication that there appears to be a fault affecting the zone.
Alternatively, the tool compares a plurality of stored areas, each area corresponding to a different time period and delimited by a boundary formed around the locations to which a plurality of network performance queries, in the respective time period, relate.