会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 45. 发明申请
    • METHOD FOR SWITCHING SYSTEM STATE AND PORTABLE TERMINAL
    • 用于切换系统状态和便携式终端的方法
    • US20120260084A1
    • 2012-10-11
    • US13515778
    • 2010-12-13
    • Bin LiHao ChenQian Zhao
    • Bin LiHao ChenQian Zhao
    • G06F9/06
    • G06F9/4418G06F1/32G06F1/3287G06F9/441G06F9/461G06F11/2028G06F11/2038G06F11/2097H04W48/16H04W52/028H04W88/06Y02D10/44Y02D70/00
    • A method for switching system state and a portable terminal. The method is applied to a portable terminal comprising a first system and a second system. The second system has a second control module provided therein. The method comprises: obtaining, by the second system, state information of the first system through the second control module when at least one of the first system and the second system is in an inactive state; receiving, by the second control module, a system state switching event; switching, by the second control module, the second system to a state corresponding to the state information of the first system based on the state information of the first system. According to the embodiments of the present invention, when the system state is to be switched, it is not necessary that both systems are in the active state. Rather, the state information can be transmitted between the systems in the inactive state by using a control module provided in one or both of the systems, and the power consumption of the portable terminal can be reduced.
    • 一种用于切换系统状态和便携式终端的方法。 该方法应用于包括第一系统和第二系统的便携式终端。 第二系统具有设置在其中的第二控制模块。 该方法包括:当第一系统和第二系统中的至少一个处于非活动状态时,由第二系统获得通过第二控制模块的第一系统的状态信息; 由所述第二控制模块接收系统状态切换事件; 基于第一系统的状态信息,由第二控制模块将第二系统切换到与第一系统的状态信息对应的状态。 根据本发明的实施例,当要切换系统状态时,两个系统都不必处于活动状态。 相反,可以通过使用在一个或两个系统中提供的控制模块来在处于非活动状态的系统之间传送状态信息,并且可以减少便携式终端的功耗。
    • 46. 发明申请
    • METHOD AND DEVICE FOR PRE-CODING, AND METHOD AND DEVICE FOR DECODING
    • 用于预编码的方法和装置,以及用于解码的方法和装置
    • US20120250780A1
    • 2012-10-04
    • US13525641
    • 2012-06-18
    • Hui SHENBin LiYi Luo
    • Hui SHENBin LiYi Luo
    • H04L25/49H04B15/00
    • H04B7/0413H04B7/0465H04L25/03343
    • The present invention relates to the field of wireless communications technologies, and discloses a method and device for pre-coding and a method and device for decoding. The present invention implements an interference alignment method with excellent performance, can effectively increase the capacity of a multi-user interference system and reduce the mutual interference among users, The method for pre-coding includes: calculating a pre-coding matrix for each transmitting end according to a sum of mean square errors of data vectors to be transmitted by each transmitting ends; and using the pre-coding matrix to pre-code the data to be transmitted by each transmitting end. The present invention has broad application prospects, for example, can be used in LTE and LTE-Advanced CoMP technology.
    • 本发明涉及无线通信技术领域,并且公开了一种用于预编码的方法和装置以及用于解码的方法和装置。 本发明实现了具有优异性能的干扰对准方法,可以有效提高多用户干扰系统的容量,减少用户间的相互干扰。预编码方法包括:为每个发送端计算预编码矩阵 根据每个发送端发送的数据向量的均方误差之和; 并且使用预编码矩阵对由每个发送端发送的数据进行预编码。 本发明具有广泛的应用前景,例如可用于LTE和LTE-Advanced CoMP技术。
    • 48. 发明授权
    • Steganalysis of suspect media
    • 嫌疑媒体的分析
    • US08281138B2
    • 2012-10-02
    • US12422677
    • 2009-04-13
    • Yun-Qing ShiBin Li
    • Yun-Qing ShiBin Li
    • H04L9/32
    • G06T1/0028G06T2201/0051G06T2201/0052G06T2201/0061G06T2201/0201
    • Techniques described herein are generally related to steganalysis of suspect media. Steganalysis techniques may include receiving instances of suspect media as input for steganalytic processing. A first set of quantized blocks of data elements may be identified within the media, with this first set of blocks being eligible to be embedded with steganographic data. A second set of quantized blocks of data elements may be identified within the media, with this second set of blocks being ineligible to be embedded with steganographic data. The steganalysis techniques may requantize the first and second blocks. In turn, these techniques may compare statistics resulting from requantizing the first block with statistics resulting from requantizing the second block. The steganalysis techniques may then assess whether the first block of data elements is embedded with steganographic features based on how the statistics of the second blocks compare with the statistics of the first blocks.
    • 本文描述的技术通常涉及可疑介质的隐写分析。 隐匿分析技术可以包括接收可疑媒体的实例作为隐写处理的输入。 可以在媒体内识别数据元素的第一组量化块,其中该第一组块有资格嵌入隐写数据。 可以在媒体内识别第二组数据元素的量化块,其中第二组块不符合隐写数据​​的嵌入。 隐写分析技术可以重新调整第一和第二块。 反过来,这些技术可以将从重新量化第一个块得到的统计数据与由再量化第二个块产生的统计数据进行比较。 隐写分析技术可以基于第二块的统计数据如何与第一块的统计量进行比较来评估第一块数据元素是否嵌入隐写特征。