Embodiments of the present invention relate, in general, to signal transmission shaping, and more particularly to shaping a transmission to efficiently use available radio frequency (RF) spectrum, or to obscure a signal based on environmental perception.
The number and sophistication of RF transmissions continue to evolve and increase. As a result, efficiently transmitting RF signals in a crowded RF environment has become increasingly difficult, further, ensuring the security of RF transmissions remains an ongoing effort. As more and more transmitters, e.g., cell phones, internet of things (IOT) devices, etc., saturate the RF environment, the task of transmitting complex wide-band or frequency hopping signals without encountering interference becomes increasingly difficult. Similarly, as the volume of sensitive information that is wirelessly transmitted grows, efforts to eavesdrop, monitor, appropriate, and impede such transmissions have also grown. Traditional security measures such as encryption have struggled to keep pace because methods to circumvent traditional security have also evolved.
Because the RF environment has grown increasingly crowded and complex, the benefits of achieving comprehensive awareness of that environment have increased. With a snapshot of the RF environment, including detection and characterization of the signals in the environment, unused frequencies within the environment can be mapped and used to improve signal transmission either by transmitting in these unused parts of the spectrum, or by maximizing reception quality through exploitation of all available spectrum in an environment. Such modeling the RF environment can also allow the shaping of RF transmissions to blend into the RF environment. While the idea of using camouflage is not new, its use to hide RF transmissions presents many challenges, given the sophistication of techniques to detect and monitor even the weakest of transmissions. A need therefore exists to accomplish comprehensive RF environment modeling to allow the efficient use of available spectrum in some applications, and in other applications to improve the security of RF transmissions by shaping it to blend into its perceived RF environment. These and other deficiencies of the prior art are addressed by one or more embodiments of the present invention.
Additional advantages and novel features of this invention shall be set forth in part in the description that follows, and in part will become apparent to those skilled in the art upon examination of the following specification or may be learned by the practice of the invention. The advantages of the invention may be realized and attained by means of the instrumentalities, combinations, compositions, and methods particularly pointed out in the disclosure.
Features and objects of the present invention and the manner of attaining them will become more apparent, and the invention itself will be best understood, by reference to the following description of one or more embodiments taken in conjunction with the accompanying drawings and figures imbedded in the text below and attached following this description.
The Figures depict embodiments of the present invention for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the invention described herein.
“Artificial Intelligence” (AI) means a branch of computer science concerned with building smart machines capable of performing tasks that typically require human intelligence. AI is an interdisciplinary science with multiple approaches that allow machines to learn from experience, adjust to new inputs and perform human-like tasks. Using these technologies, computers can be trained to accomplish specific tasks by processing large amounts of data and recognizing patterns in the data.
“Intelligent Agent” or “Agent” means a program that can make decisions or perform a service based on its environment, experiences, and user input. It is an autonomous entity which acts, directing its activity towards achieving goals, upon an environment using observation through sensors and consequent actuators.
“Protocol” means an official set of procedures for what actions an Intelligent Agent is to take in a certain situation. A protocol generally describes a plan or the documents that spell out such a plan or an agreement of how to proceed.
“Size, Weight, Power, and Cost” or “SWaP-C” means the hardware footprint of a piece of equipment or system. Swap-C refers to the optimization of the four hardware factors as weighed against the capabilities of the equipment or system.
“RF Spectrum” or “Radio Spectrum” means the part of the electromagnetic spectrum with frequencies from 30 hertz to 300 GHz. Electromagnetic waves in this frequency range, called radio waves, are widely used in modern technology, particularly in telecommunications.
“RF Environment” means all of the transmissions in the RF spectrum propagating through a given geographic area.
“Bandwidth” means a range of frequencies within a given band, in particular those frequencies used for transmitting a signal.
“Software-defined radio” or “SDR” means a radio communication system implemented through software installed on a general or special purpose computer rather than through traditional hardware components, e.g., mixers, filters, amplifiers, modulators, signal detectors. A typical SDR may comprise a personal computer with a sound card linked to an RF front end. The computer's processor handles substantial portions of the signal processing, as opposed to the dedicated circuitry used in traditional radios. SDR systems are highly flexible as to radio protocols, and may accommodate a number of different and changing protocols in real time, e.g., cell phone services. SDRs can transmit using wideband, spread spectrum, and frequency hopping techniques to minimize interference within an RF environment. Further, a number of SDRs may be linked together into mesh networks reducing power requirements, size and interference caused by individual nodes in the network.
“Wide-Band Transcorder” or “WBT” means an SDR platform designed to record and replay any signal within the RF spectrum with a minimal SWaP-C footprint. The platform can be used for real-time or delayed analysis and manipulation of any signal captured in a particular RF environment. An exemplary device is capable of recording up to 100 MHz of RF spectrum at frequencies between 100 kHz and 18 GHz.
“Gradient descent” means an algorithm designed to perform an iterative first-order optimization process to find a local minimum of a function. The algorithm finds the path of steepest descent (shortest path down) by repeatedly moving in the opposite direction from the function's gradient at the current point.
The disclosed invention uses artificial intelligence algorithms for detecting and classifying radiofrequency transmissions to model and simulate an RF environment. AI/ML algorithms further assist in determining optimal modulation, bandwidth and center frequency placement of a transmit signal to either fully and efficiently exploit unused spectrum in the RF environment, or to camouflage the signal to evade detection, and therefore interception while providing enough fidelity to the receiver to remain detectable. Such signal shaping is done while maintaining small SWaP-C footprint for system component hardware.
The disclosed invention will now be described in detail with reference to several embodiments thereof as illustrated in the accompanying Figures. In the following description, specific details are set forth in order to provide a thorough understanding of embodiments of the disclosed invention. It will be apparent, however, to one skilled in the art that embodiments may be practiced without some or all of these specific details. In other instances, well known process steps and/or structures have not been described in detail in order to not unnecessarily obscure the invention. The features and advantages of embodiments may be better understood with reference to the drawings and discussions that follow.
It should be apparent to those skilled in the art that the described embodiments of the present invention provided herein are illustrative only and not limiting, having been presented by way of example only. All features disclosed in this description may be replaced by alternative features serving the same or similar purpose, unless expressly stated otherwise. Therefore, numerous other embodiments of the modifications thereof are contemplated as falling within the scope of the disclosed invention as defined herein and equivalents thereto. Hence, use of absolute and/or sequential terms, such as, for example, “always,” “will,” “will not,” “shall,” “shall not,” “must,” “must not,” “first,” “initially,” “next,” “subsequently,” “before,” “after,” “lastly,” and “finally,” are not meant to limit the scope of the present invention as the embodiments disclosed herein are merely exemplary.
It will be also understood that when an element is referred to as being “on,” “attached” to, “connected” to, “coupled” with, “contacting”, “mounted” etc., another element, it can be directly on, attached to, connected to, coupled with or contacting the other element or intervening elements may also be present. In contrast, when an element is referred to as being, for example, “directly on,” “directly attached” to, “directly connected” to, “directly coupled” with or “directly contacting” another element, there are no intervening elements present. It will also be appreciated by those of skill in the art that references to a structure or feature that is disposed “adjacent” another feature may have portions that overlap or underlie the adjacent feature.
Spatially relative terms, such as “under,” “below,” “lower,” “over,” “upper” and the like, may be used to describe one element or feature's relationship to another element(s) or feature(s) as illustrated in the figures. Such spatially relative terms are intended to encompass different orientations of a device in use or operation in addition to the orientation depicted in the figures. For example, if a device in the figures is inverted, elements described as “under” or “beneath” other elements or features would then be oriented “over” the other elements or features. Thus, the exemplary term “under” can encompass both an orientation of “over” and “under”. The device may be otherwise oriented (rotated 90 degrees or at other orientations) and the spatially relative descriptors used herein interpreted accordingly. Similarly, the terms “upwardly,” “downwardly,” “vertical,” “horizontal” and the like are used herein for the purpose of explanation only unless specifically indicated otherwise.
Included in the description are flowcharts depicting examples of the methodology which may be used for AI-guided processes. Each block and combinations of block depicted in the flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be loaded onto a computer, a special purpose hardware-based computer system, or other programmable apparatus to produce a machine such that the executed instructions create means for implementing the functions specified in the flowchart block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function so that the instructions produce an article of manufacture that implements the function specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed so that the executed instructions provide steps for implementing the functions specified in the flowchart block or blocks.
Unless specifically stated otherwise, discussions herein using words such as “processing,” “computing,” “calculating,” “determining,” “presenting,” “displaying,” or the like may refer to actions or processes of a machine (e.g., a computer) that manipulates or transforms data represented as physical (e.g., electronic, magnetic, or optical) quantities within one or more memories (e.g., volatile memory, non-volatile memory, or a combination thereof), registers, or other machine components that receive, store, transmit, or display information.
One having skill in the art will recognize that portions of the disclosed invention may be implemented on a specialized computer system, e.g., a wide band transcorder (WBT), or a general-purpose computer system, such as a personal computer (PC), a server, a laptop computer, a notebook computer, or a handheld or pocket computer.
The CPU 101 comprises a suitable processor for implementing the present invention. The CPU 101 communicates with other components of the system via a bi-directional system bus 112, and any necessary input/output (I/O) controller 113 circuitry and other “glue” logic. The bus, which includes address lines for addressing system memory, provides data transfer between and among the various components. RAM 102 serves as the working memory for the CPU 101. ROM 103 contains the basic I/O system code (BIOS), which is a set of low-level routines in ROM that application programs and the operating systems can use to interact with the hardware, including reading characters from the keyboard, outputting characters to printers 114, etc.
Mass storage devices 108, 109 provide persistent storage on fixed and removable media, such as magnetic, optical, or magnetic-optical storage systems, flash memory, or any other available mass storage technology. The mass storage may be shared on a network, or it may be a dedicated mass storage. As shown in
In operation, program logic (including that which implements methodology of the present invention described below) is loaded from the removable storage 108 or fixed storage 109 into the main (RAM) memory 102, for execution by the CPU 101. During operation of the program logic, the system 100 accepts user input from a keyboard and pointing device 115, as well as speech-based input from a voice recognition system (not shown). The user interface 105 permits selection of application programs, entry of keyboard-based input or data, and selection and manipulation of individual data objects displayed on the screen or display device 107. Likewise, the pointing device 115, such as a mouse, track ball, pen device, or a digit in the case of a touch screen, permits selection and manipulation of objects on the display device. In this manner, these input devices support manual user input for any process running on the system.
The computer system 100 displays text and/or graphic images and other data on the display device 107. The video adapter 106, which is interposed between the display 107 and the system bus, drives the display device 107. The video adapter 106, which includes video memory accessible to the CPU 101, provides circuitry that converts pixel data stored in the video memory to a raster signal suitable for use by a display monitor. A hard copy of the displayed information, or other information within the system 100, may be obtained from the printer 114, or other output device.
The system itself communicates with other devices (e.g., other WBTs or computers) via the NIC 111 connected to a network (e.g., Ethernet network, Bluetooth wireless network, etc.). The system 100 may also communicate with local occasionally connected devices (e.g., serial cable-linked devices) via the COMM interface 110, which may include a RS-232 serial port, a Universal Serial Bus (USB) interface, or the like. Devices that will be commonly connected locally to the interface 110 include WBTs, laptop computers, handheld computers, digital cameras, etc.
The system may be implemented through various wireless networks and their associated communication devices. Such networks may include WBTs, mainframe computers, or servers, such as a gateway computer or application server which may have access to a database. A gateway computer serves as a point of entry into each network and may be coupled to another network by means of a communications link. The gateway may also be directly or indirectly coupled to one or more devices using a communications link, or may be coupled to a storage device such as a data repository or database.
Certain functions of the disclosed invention are carried out by a system of intelligent agents that continually optimizes resources to progressively refine detection and characterization of radiofrequency signals in a given environment. The AI/ML systems used for signal detection and classification herein develop a data repository of an RF environment by extracting features from collected observations on the environment. Then the systems allow a suite of hierarchically organized intelligent agents to access the data repository to perform signal detection and classification. The signal classification system initially separates emitters from each other based on the characteristics of individually detected pulses, and then classifies the emitter groups using measured characteristics of each collection of pulses. These AI systems reduce the data burden and training time required to make fieldable, effective, and highly accurate signal detection capabilities, especially for traditionally difficult-to-capture protocols such as certain frequency agile communications. Using these systems, small SWaP-C footprint equipment can successfully detect and classify a new communications protocol in a matter of minutes.
With reference to
With reference to
As agents produce additional data in response to a need identified by a superior agent, the output is placed in a common data repository 325. Each agent monitors the data repository for material sufficient for it to complete its assigned question. Upon an inferior agent adding new material to the database the superior agent recognizes the inclusion and works on its assigned task. Ultimately, the hierarchal structure provides sufficient information within the database for generation of a responsive output to the original query 310.
Specifically as applied to RF signal detection and classification, agents automatically detect signals, extract them, put them into a database and then accesses that database to provide relevant and actionable information. The agents rapidly assemble the pieces needed to provide relevant decision support information, e.g., is a signal detected, where and when was the signal detected, what class of signal is it, and in some cases, what vehicles are associated with that signal. Sensors, e.g., antennas, gather data that may otherwise resemble noise. Indeed, some frequency agile systems are designed to resemble noise by “hopping” among frequencies at a rate exceeding 80,000 hops per second. In such a system, spectrum accumulation and statistical fingerprint analysis models, are used to provide frequency estimates of RF signals. Such models, or predetermined protocols, establish what data is needed to determine if, for example, a UAV is present in the environment, and respond to such an inquiry.
The AI/ML systems used herein perform RF signal detection and classification primarily through two algorithms: Density Based Spatial Clustering of Applications with Noise (“DBSCAN”), and Convex Hull. See
The second such algorithm, known as Convex Hull, determines the minimum number of points in a cluster that can form a closed bounding region around all of the points in that cluster. A convex hull can be found algorithmically for a cluster of any number of dimensions. Convex hulls represent cluster boundaries, serving as a decision surface for establishing class membership. By calculating the convex hull boundary for a cluster, the system no longer requires all of the interior points associated with the cluster, which reduces the amount of memory required for storage and reduces the number of calculations needed to locate a new point inside or outside a cluster's boundary.
In operation, the AI/ML system receives data containing one or more features over a sliding window of time. This time window is large enough to allow a sufficient number of data elements or detections to allow the formation of meaningful clusters. The number of features passed into the system determines the number of dimensions in the feature space.
The system then tests each feature or data point against the convex hulls it has constructed from the data. If a point lies inside of a convex hull, the point is deemed a member of the class that the convex hull represents. The system can determine a confidence value for the point by examining the distance between the point and the convex hull surface, as well as the distance between the point and the center point of the cluster. Both distance measurements figure into the confidence value, since one convex hull can envelope another convex hull.
If a point lies outside of all convex hulls, it is stored in a sliding window of unclassified points. The unclassified points are then run though a DBSCAN clustering process to determine if there are any dense regions of points sufficient to create one or more new clusters. These clusters of unclassified points represent new classes (potential signals) that are added the model of the RF environment. Once a new cluster is established, i.e., shows persistence by including a minimum quantity of points during a given timespan, the system generates a convex hull out of the cluster's surface, and the new convex hull is assigned a name, either by the system, an auto generated unique designator, or by a human user.
Once a new class is established, the representative convex hull is added to the model of the RF environment, and is communicated to other intelligent agents through a Transfer Learning process. Transfer learning allows two or more agents to exchange classes and improved models among themselves. Transfer learning between models and agents is as simple as appending the new convex hull in one model to the set of convex hulls in another model.
While in some cases the system may require the generation of new information to answer an inquiry, in other cases the sensor-collected data is sufficient to answer the inquiry, but is not stored in a form usable by the system. Thus, when a query is issued, “Is a frequency agile UAV operating in a certain region of interest”, it must be parsed into resolvable and actionable sub-questions. The AI/ML system parses the question into actionable sub-questions using such protocols as “Within the detected data, are there groupings of time correlated signals”. To answer the query, an agent may need to examine pulse lengths, modulation, signal bandwidth, pulse power, etc., and analyze the data to identify a geospatial location of the signals. A response from each of a plurality of sub-questions leads to a resolution of the original query.
For example, with reference to
Because of the tertiary agents' activities, the database now includes pulse start times 537 which the secondary agent 580 can use to generate time correlation-based signal groupings 535. These groupings are generated and placed in the database 525. After the inferior agents complete their tasks, the primary classification agent 570 now has the data (time correlation-based signal groups 535), required to return to the deconstruction agent a response to the subquery, “Have frequency agile signals been detected”. This response combined with other information can be combined to output a response to the initial query, “Is a frequency agile UAV operating in a certain region of interest?”
The AI/ML systems for detection and classification of radiofrequency signals in a given RF environment provide the foundation for the disclosed system for shaping RF signals for transmission by adjusting modulation, bandwidth, center frequency placement, and the stable, pulsed or frequency agile profile of a transmit signal. Such signal shaping can inform the construction of signals that are shaped to exploit “white space” or open spectrum in the RF environment, or signals that are optimized for evading detection in the RF environment. In either case, signals are also optimized for transmission by low SWaP-C equipment. Low SWaP-C equipment may be characterized, for example, by a SDR that measures approximately 3 inches (″)×10″×15″ in outer dimensions, weighs around 15 pounds, and consumes less than 100 watts of power.
Meanwhile, the system runs AI/ML detection 631 and classification 633 processes on the RF environment, and runs separate AI/ML detection 635 and classification 637 processes on the signal mixed into the simulation. The detected/classified signals from the RF environment and the detected/classified signals from the simulation are then compared 642 to determine the extent to which the simulation containing the signal can be distinguished from the original RF environment. This process effectively attempts to deceive the detection and classification algorithms into missing the transmission signal. As a result of this comparison, the signal is assigned a detectability score.
The receivability score and detectability score are then fed into an AI/ML reinforcement learning process 644 which evaluates the relative receivability and detectability scores of the signal and compares the relative scores to any prior iterations. Depending on the user settings 652 specifying weights to be given receivability versus detectability, the signal is refined 622, mixed back into the simulation 624 and the scoring process is repeated. To lower detectability, the transmission signal will be adjusted using gradient descent methods to more effectively blend into the RF environment. After an optimal signal is constructed, e.g., a subsequent iteration (i+1) is no longer significantly different from the previous iteration (i) according to system settings, it may then be transmitted 654 into the RF environment where it can be received 656. In some embodiments, the RF environment is periodically re-sampled 610 and the simulation is updated to reflect changes in the RF environment over time.
The weight settings applied to the detectability score and the receivability score allow the disclosed system to provide a broad range of capabilities for signal shaping. By prioritizing receivability, the system can train itself to optimize transmission signals for maximum receivability. The transmitted signals resulting from the system may, for example, efficiently fill all open RF spectrum in the RF environment, thereby maximizing data flow per unit time, and minimizing interference from other RF transmissions in the area. Such settings would allow the system to coordinate high data rate transmissions in busy urban environments. Power requirements for such transmissions, the number of transmitters available in the RF environment, and the amount of data required to be transmitted are additional factors the system may consider when shaping the transmission signal. For example, power constraints may cause the system to reduce white space saturation and sacrifice absolute receivability to better use available equipment resources. In other cases, system transmitters in a particular environment may transmit on a limited spectrum, so only a portion of open RF spectrum can be used.
By prioritizing detectability, the system can train itself to shape transmission signals to be difficult to detect, yet still capable of being received by select receivers. For example, low detectability signals may be shaped to resemble noise artifacts sampled in the RF environment. Unlike the prior use case, where there is not a threshold concern with detectability, i.e., the signal may be very easily detected, here a minimum amount receivability is required. The system's receivability score accounts for the transmission signal's ability to be received when mixed into the simulated RF environment. Such scoring can account for the effects of a crowded signal environment with high potential interference. However, other practical considerations, such as the number of available receivers in an RF environment, weather conditions, or geographic factors, etc., may need to be accounted for by a user, for example by raising the receivability settings over the minimum to provide a buffer.
For such applications where signal security and detection avoidance are considerations, the disclosed system has great flexibility in adjusting between receivability and low detection. Depending on the detection capabilities of adversarial actors in the RF environment, the sensitivity of the planned communications, the urgency with which the communications must be delivered, receiver capabilities, etc., the system can produce signals that are tailored to the needs of the situation. For example, if likely adversaries in an environment have poor detection capabilities, a system user may apply moderate weight to both detectability and receivability. On the other hand, if the user needed to send an especially sensitive message in the same environment, the system could be instructed to temporarily lower detectability at the expense of receivability.
In some embodiments, the system uses its AI/ML detection and classification capabilities to generate transmit signal parameters that will evade detection, in a similar manner to how “deepfakes” are generated for images. In the context of digital video footage, deepfake technology seeks to modify or generate footage of a person saying words they have not actually spoken such that the manipulated footage is indistinguishable from genuine unaltered footage. Deepfake technology uses two basic techniques to accomplish this goal. One is the use of an encoder and a decoder. The encoder is a universal program that translates an image of any person into a lower dimensional space which includes details about their basic facial and body posture characteristics. The decoder is a ML program that generates a model for a specific target by learning from available footage of the target speaking. The model is then used to generate new speaking sequences, and this is overlaid onto the basic facial and body features developed by the encoder. A second technique, known as a generative adversarial network (GAN), leverages another AI/ML process to improve the manipulated footage produced by the encoder/decoder process. Output from the encoder/decoder is passed to a discriminator program, which attempts to determine whether the output is real or fake. As the discriminator identifies weaknesses in the manipulated footage, this information is fed to the decoder. The decoder and discriminator continue to learn from the process, and evolve improving capabilities to generate and detect manipulated footage. As a result, convincing manipulated footage can be generated.
The disclosed signal shaping system functions similarly, but as applied to radiofrequency signals. The role of the encoder is fulfilled by the DPSCAN and convex hull algorithms, which encode detected artifacts from the RF environment. The decoder role is embodied by the signal generator function, which creates a transmission signal which is overlaid onto the simulation. Then the system uses GAN architecture to improve the created signal. The system encodes/decodes the signal and simulation, and then compares it to the original RF environment to determine differences between the two. The system then iteratively improves the transmission signal until the specified detectability and receivability scores are achieved.
In an embodiment of the disclosed system, noise obfuscation is added to the signal generation process. During the detection and classification processes, elements of the RF environment that cannot be grouped into signals are classified as unassigned, or noise. In addition to generating a transmission signal designed to blend into the RF environment, in this embodiment the signal generator adds signals to the transmission resembling such detected noise. The added noise signals obscure the original transmission signal so that it resembles other random signals in a particular RF environment. As with other embodiments herein, the system scores the transmission signal with noise obfuscation for receivability to ensure that the signal retains fidelity. Further, the AI/ML processes refine and improve the transmission signal with added noise to optimize low detectability with receivability. In a related embodiment, a receiver is informed of the signal generation process, allowing the receiver to ignore the noise obfuscation signals and extract the original transmission signal. In such embodiments, noise obfuscation can be used more freely since noise levels that would normally impair receivability can be counteracted in the receiver itself
In an embodiment, the disclosed system adds a deep buffering capability to AI/ML assisted RF environment sampling and signal generation to further lower signal detectability. Such deep buffering capability creates a technological sophistication threshold, or minimum level of computational power needed to send and receive (or intercept) messages. By using a network of SDRs as receivers, deep buffering can be accomplished with a low Swap-C footprint.
With reference to
With reference to
The frequency shaping system described above with respect to
Such capability greatly increases the computing requirements required to intercept and extract such messages, since large amounts of information has to be buffered, the key has to be located, and the message extracted on short time scales. Further, deep buffering allows the system more flexibility to craft complex transmission signal patterns, e.g., non-linear transmission 720, add noise obfuscation 730, and generally lower the receivability scores since the receiver can compensate with information about the transmitted signal. As a result, the system can generate transmission signals with a very low detectability score, and thus a very low probability of interception. Use of low SWaP-C equipment, such as WBTs, allows the use of such techniques in a dismounted or dispersed network format, or mounted in a permanent or semi-permanent facility. Such systems are scalable to accommodate lower power hardware, or can scale up to increase the technological threshold required to intercept the transmissions. Finally, WBTs allow the assemblage of these systems using various communications protocols, to include Sensor Open System Architecture (SOSA), and C4ISR/EW Modular Open Suite of Standards (CMOSS).
Some portions of this specification are presented in terms of algorithms or symbolic representations of operations on data stored as bits or binary digital signals within a machine memory (e.g., a computer memory). These algorithms or symbolic representations are examples of techniques used by those of ordinary skill in the data processing arts to convey the substance of their work to others skilled in the art. As used herein, an “algorithm” is a self-consistent sequence of operations or similar processing leading to a desired result. In this context, algorithms and operations involve the manipulation of information elements. Typically, but not necessarily, such elements may take the form of electrical, magnetic, or optical signals capable of being stored, accessed, transferred, combined, compared, or otherwise manipulated by a machine. It is convenient at times, principally for reasons of common usage, to refer to such signals using words such as “data,” “content,” “bits,” “values,” “elements,” “symbols,” “characters,” “terms,” “numbers,” “numerals,” “words,” “materials,” etc. These specific words, however, are merely convenient labels and are to be associated with appropriate information elements.
Unless specifically stated otherwise, discussions herein using words such as “processing,” “computing,” “calculating,” “determining,” “presenting,” “displaying,” or the like may refer to actions or processes of a machine (e.g., a computer) that manipulates or transforms data represented as physical (e.g., electronic, magnetic, or optical) quantities within one or more memories (e.g., volatile memory, non-volatile memory, or a combination thereof), registers, or other machine components that receive, store, transmit, or display information.
Upon reading this disclosure, those of skill in the art will appreciate still additional alternative structural and functional designs for a system and a process for RF transmission shaping through the disclosed principles herein. Thus, while particular embodiments and applications have been illustrated and described, it is to be understood that the disclosed embodiments are not limited to the precise construction and components disclosed herein. Various modifications, changes and variations, which will be apparent to those skilled in the art, may be made in the arrangement, operation and details of the method and apparatus disclosed herein without departing from the spirit and scope of the invention.
It will also be understood by those familiar with the art, that the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Likewise, the particular naming and division of the modules, managers, functions, systems, engines, layers, features, attributes, methodologies, and other aspects are not mandatory or significant, and the mechanisms that implement the invention or its features may have different names, divisions, and/or formats. Furthermore, as will be apparent to one of ordinary skill in the relevant art, the modules, managers, functions, systems, engines, layers, features, attributes, methodologies, and other aspects of the invention can be implemented as software, hardware, firmware, or any combination of the three. Of course, wherever a component of the present invention is implemented as software, the component can be implemented as a script, as a standalone program, as part of a larger program, as a plurality of separate scripts and/or programs, as a statically or dynamically linked library, as a kernel loadable module, as a device driver, and/or in every and any other way known now or in the future to those of skill in the art of computer programming. Additionally, the present invention is in no way limited to implementation in any specific programming language, or for any specific operating system or environment.
While there have been described above the principles of the present invention in conjunction with linked wide band transcorders, it is to be clearly understood that the foregoing description is made only by way of example and not as a limitation to the scope of the invention. Particularly, it is recognized that the teachings of the foregoing disclosure will suggest other modifications to those persons skilled in the relevant art. Such modifications may involve other features that are already known per se and which may be used instead of or in addition to features already described herein. Although claims have been formulated in this application to particular combinations of features, it should be understood that the scope of the disclosure herein also includes any novel feature or any novel combination of features disclosed either explicitly or implicitly or any generalization or modification thereof which would be apparent to persons skilled in the relevant art, whether or not such relates to the same invention as presently claimed in any claim and whether or not it mitigates any or all of the same technical problems as confronted by the present invention. The Applicant hereby reserves the right to formulate new claims to such features and/or combinations of such features during the prosecution of the present application or of any further application derived therefrom.
While this invention has been described in terms of several embodiments, there are alterations, modifications, permutations, and substitute equivalents, which fall within the scope of this invention. Although subsection titles have been provided to aid in the description of the invention, these titles are merely illustrative and are not intended to limit the scope of the present invention. In addition, where claim limitations have been identified, for example, by a numeral or letter, they are not intended to imply any specific sequence.
It should also be noted that there are many alternative ways of implementing the methods and apparatuses of the present invention. It is therefore intended that the following appended claims be interpreted as including all such alterations, modifications, permutations, and substitute equivalents as fall within the true spirit and scope of the present invention.
This has been a description of the disclosed invention along with a preferred method of practicing the invention, however the invention itself should only be defined by the appended claims.
This application claims priority to U.S. Provisional Application No. 63/011,782, filed Apr. 17, 2020, and has specification that builds upon PCT/US20/46808, filed Aug. 18, 2020, and PCT/US20/55370, filed Oct. 13, 2020, the disclosures of which are hereby incorporated herein by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
63011782 | Apr 2020 | US |