This application is based on and claims priority under 35 U.S.C. § 119 to Korean Patent Application No. 10-2019-0053955, filed on May 8, 2019, in the Korean Intellectual Property Office, the disclosure of which is herein incorporated by reference in its entirety.
The present disclosure relates to detection and control of remote interference due to an atmospheric ducting phenomenon.
To meet the demand for wireless data traffic having increased since deployment of 4G communication systems, efforts have been made to develop an improved 5G or pre-5G communication system. Therefore, the 5G or pre-5G communication system is also called a “Beyond 4G Network” or a “Post LTE System”. The 5G communication system is considered to be implemented in higher frequency (mmWave) bands, e.g., 60 GHz bands, so as to accomplish higher data rates. To decrease propagation loss of the radio waves and increase the transmission distance, the beamforming, massive multiple-input multiple-output (MIMO), full dimensional MIMO (FD-MIMO), array antenna, an analog beam forming, large scale antenna techniques are discussed in 5G communication systems. In addition, in 5G communication systems, development for system network improvement is under way based on advanced small cells, cloud radio access networks (RANs), ultra-dense networks, device-to-device (D2D) communication, wireless backhaul, moving network, cooperative communication, coordinated multi-points (CoMP), reception-end interference cancellation and the like. In the 5G system, hybrid FSK and QAM modulation (FQAM) and sliding window superposition coding (SWSC) as an advanced coding modulation (ACM), and filter bank multi carrier (FBMC), non-orthogonal multiple access (NOMA), and sparse code multiple access (SCMA) as an advanced access technology have also been developed.
The Internet, which is a human-centered connectivity network where humans generate and consume information, is now evolving to the Internet of things (IoT) where distributed entities, such as things, exchange and process information without human intervention. The Internet of everything (IoE), which is a combination of the IoT technology and the big data processing technology through connection with a cloud server, has emerged. As technology elements, such as “sensing technology”, “wired/wireless communication and network infrastructure”, “service interface technology”, and “security technology” have been demanded for IoT implementation, a sensor network, a machine-to-machine (M2M) communication, machine type communication (MTC), and so forth have been recently researched.
Even if a synchronized time division communication technique between a plurality of base stations is implemented by an operator, under specific local conditions or weather conditions, for example, when the air density is low, as in a high-altitude region, a phenomenon in which a downlink signal of one base station acts as interference on an uplink signal with respect to a remote base station may occur. This phenomenon is referred to as an atmospheric ducting phenomenon, and when such interference occurs, how to control the corresponding interference may be a problem.
The above information is presented as background information only to assist with an understanding of the disclosure. No determination has been made, and no assertion is made, as to whether any of the above might be applicable as prior art with regard to the disclosure.
Certain embodiments according to this disclosure is to provide signaling and an interface for measuring and detecting interference due to an atmospheric ducting phenomenon, which affects an uplink of a base station.
In addition, certain embodiments according to this disclosure is to provide a method and apparatus for detecting interference and applying a control action to a cell operation.
In accordance with the above, a method of a first base station, according to various embodiments, for controlling interference due to atmospheric ducting in a wireless communication system may include receiving a sequence from at least one second base station, identifying the at least one second base station corresponding to the sequence; estimating a channel for the at least one identified second base station, based on the sequence, and controlling a beam in a direction corresponding to the at least one identified second base station, based on a result of the channel estimation.
In addition, a first base station, according to various embodiments, for controlling interference due to atmospheric ducting in a wireless communication system may include a transceiver and a controller which controls the transceiver to receive a sequence from at least one second base station, identifies the at least one second base station corresponding to the sequence, estimates a channel for the at least one identified second base station, based on the sequence, and controls a beam in a direction corresponding to the at least one identified second base station, based on a result of the channel estimation.
According to various embodiments, another base station, which causes interference with an uplink signal with respect to one base station, can be accurately identified, and thus the remote interference (interference due to an atmospheric ducting phenomenon) can be more effectively controlled.
Before undertaking the DETAILED DESCRIPTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, firmware or software, or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely.
Moreover, various functions described below can be implemented or supported by one or more computer programs, each of which is formed from computer readable program code and embodied in a computer readable medium. The terms “application” and “program” refer to one or more computer programs, software components, sets of instructions, procedures, functions, objects, classes, instances, related data, or a portion thereof adapted for implementation in a suitable computer readable program code. The phrase “computer readable program code” includes any type of computer code, including source code, object code, and executable code. The phrase “computer readable medium” includes any type of medium capable of being accessed by a computer, such as read only memory (ROM), random access memory (RAM), a hard disk drive, a compact disc (CD), a digital video disc (DVD), or any other type of memory. A “non-transitory” computer readable medium excludes wired, wireless, optical, or other communication links that transport transitory electrical or other signals. A non-transitory computer readable medium includes media where data can be permanently stored and media where data can be stored and later overwritten, such as a rewritable optical disc or an erasable memory device.
Definitions for certain words and phrases are provided throughout this patent document, those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.
For a more complete understanding of the disclosure and its advantages, reference is now made to the following description taken in conjunction with the accompanying drawings, in which like reference numerals represent like parts:
and
In describing the disclosure, a detailed description of known functions or configurations incorporated herein will be omitted when it may make the subject matter of the disclosure unnecessarily unclear. The terms which will be described below are terms defined in consideration of the functions in the disclosure, and may be different according to users, intentions of the users, or customs. Therefore, the definitions of the terms should be made based on the contents throughout the specification.
Further, in describing embodiments of the disclosure, based on determinations by those skilled in the art, the main idea of the disclosure may be applied to other communication systems having similar technical backgrounds and channel types through some modifications without significantly departing from the scope of the disclosure.
The advantages and features of the disclosure and ways to achieve them will be apparent by making reference to embodiments as described below in detail in conjunction with the accompanying drawings. However, the disclosure is not limited to the embodiments set forth below, but may be implemented in various different forms. The following embodiments are provided only to completely disclose the disclosure and inform those skilled in the art of the scope of the disclosure, and the disclosure is defined only by the scope of the appended claims. Throughout the specification, the same or like reference numerals designate the same or like elements.
Here, it will be understood that each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations, can be implemented by computer program instructions. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart block or blocks.
These computer program instructions may also be stored in a computer usable or computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer usable or computer-readable memory produce an article of manufacture including instruction means that implement the function specified in the flowchart block or blocks.
The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
Further, each block of the flowchart illustrations may represent a module, segment, or portion of code, which includes one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
As used herein, the “unit” refers to a software element or a hardware element, such as a Field Programmable Gate Array (FPGA) or an Application Specific Integrated Circuit (ASIC), which performs a predetermined function. However, the “unit” does not always have a meaning limited to software or hardware. The “unit” may be constructed either to be stored in an addressable storage medium or to execute one or more processors.
Therefore, the “unit” includes, for example, software elements, object-oriented software elements, class elements or task elements, processes, functions, properties, procedures, sub-routines, segments of a program code, drivers, firmware, micro-codes, circuits, data, database, data structures, tables, arrays, and parameters. The elements and functions provided by the “unit” may be either combined into a smaller number of elements, or a “unit”, or divided into a larger number of elements, or a “unit”. Moreover, the elements and “units” or may be implemented to reproduce one or more CPUs within a device or a security multimedia card.
Hereinafter, referring to drawings attached to the specification, a method, according to various embodiments of this disclosure, for detecting and determining whether cell performance deteriorates will be described in detail.
Referring to
For example, when a signal corresponding to one radio frame of the interfering base station 110 is the same as the signal 1a illustrated in
Therefore, the first subframe and the second subframe of the signal 1a may interfere with the third subframe of the signal 1b, and the sixth subframe and the seventh subframe of the signal 1a may interfere with the eighth subframe of the signal 1b.
In an existing LTE system, there is no signal for detecting such remote interference due to the atmospheric ducting phenomenon. That is, in the event of remote interference, it may be necessary to identify which downlink subframe interferes with an uplink subframe and control a transmitting/receiving operation of a corresponding base station, but since there is no signal for detecting such interference, control of a transmitting/receiving operation of a corresponding base station is not smoothly performed. Accordingly, the disclosure provides a method for detecting remote interference caused by an atmospheric ducting phenomenon and then providing a framework applicable to cell operation, thus enabling effective control, by operators, of remote interference.
Hereinafter, referring to the attached drawings, a method, according to various embodiments of this disclosure, for detecting and controlling interference due to an atmospheric ducting phenomenon will be described in more detail. For convenience of description, terms such as “remote interference” and “interference due to an atmospheric ducting phenomenon” are used interchangeably herein.
In order to solve problems arising from the absence of separate signal for detecting the remote interference and the identification of an interfering base station, which causes interference, for control of an interference situation is not performed, in certain embodiments according to this disclosure, remote interference is detected by means of a specific sequence capable of identifying individual base stations.
Referring to the non-limiting example of
The first base station may be an interfering base station which causes the remote interference, or may be a victim base station which is affected by the remote interference. On the other hand, the at least one second base station may be an interfering base station which causes the remote interference, or may be a victim base station which is affected by the remote interference.
According to certain embodiments of this disclosure, a sequence capable of identifying each base station may be used as a signal for detecting the remote interference. As an example, sequences that one or more second base stations transmit may be generated based on cell identifications (IDs) of the second base stations, which enable identification of each of the second base stations. In addition, as an example, each of the second base stations may be identified based on an ID of a sequence transmitted for each of the second base stations. A method, according to various embodiments of this disclosure, of generating and transmitting a sequence for remote interference detection will be more further described with reference to
The first base station according to various embodiments of this disclosure may identify each of the second base stations by means of the received sequence (operation S220).
Sequences transmitted from the second base stations are transmitted in a downlink (DL) waveform of the second base stations, and thus a detector for detecting a cell ID from a sequence in the first base station should follow a downlink receiver structure. For example, in a detector of the first base station, a 7.5 kHz shift function required for an uplink (UL) receiver structure may be omitted, and the detector should receive a sequence in an OFDM waveform, rather than a discrete Fourier transform-spread-orthogonal frequency division multiplexing (DFT-s-OFDM) waveform. In this non-limiting example, since, in the case of new radio (NR), UL and DL waveforms are the same as each other as a cyclic-prefix-based OFDM (CP OFDM), a detector of the first base station may employ a receiver structure of a base station of UL as it is.
In addition, the first base station according to various embodiments of this disclosure may estimate a channel for each of the second base stations by using the received sequences (operation S230).
The first base station according to various embodiments of this disclosure may perform an operation of controlling beams in directions corresponding to the identified second base stations, based on a result of the channel estimation (operation S240).
For example, the first base station according to various embodiments of this disclosure may identify the direction and location of the remote interference relative to the first base station through a channel estimation result relating to a sequence transmitted from each of the second base stations.
The first base station according to various embodiments of this disclosure may analyze the remote interference by using not only the channel estimation result but also information on the second base stations, which have been identified based on the sequences of the second base stations. For example, if information on positions, directions, and distances of the second base stations relative to the first base station is stored in advance in the first base station or is acquired from a central management server, the first base station may identify a remote interference situation by using both the corresponding information and the channel estimation result.
As described above, when the remote interference situation is identified, control of a beam in a direction corresponding to a relevant second base station may be performed. The beam control operation may vary depending on whether the first base station is an interfering base station or a victim base station. This will be described later with reference to
Hereinafter, descriptions of operations overlapping those described in connection with
Referring to the non-limiting example of
For example, a first base station may receive sequences from one or more second base stations which may be causing the remote interference, and may identify each of the second base stations that transmitted the sequences, based on the received sequences. By way of non-limiting example, the first base station may store information on second base stations which correspond to respective cell IDs, or may acquire the information from a central management sever, and may thus identify the second base stations by using the information.
In various embodiments, the first base station may estimate a channel for each of the second base stations by using the received sequences (operation S303).
According to a result of the channel estimation, the first base station according to various embodiments of this disclosure may identify the position and direction of, and distance to, the second base station which causes the remote interference on an uplink signal of the first base station (operation S304).
For example, the first base station according to various embodiments of this disclosure may identify which second base station causes the remote interference among the identified second base stations, based on a result of the channel estimation. More specifically, the first base station according to various embodiments of this disclosure may identify a channel state in a direction corresponding to each of the identified second base stations. According to the channel state corresponding to each of the identified second base stations, the direction of and the distance to the second base station, which causes the remote interference, relative to the first base station may be identified.
As described above, when the second base station that is causing the remote interference is identified, the first base station according to various embodiments of this disclosure may perform a nulling operation with respect to a reception beam (operation S305).
More specifically, the first base station according to various embodiments of this disclosure may control, based on the identified result, beam shapes of reception beams such that a beam is not received in the direction corresponding to the second base station which causes the remote interference. As a non-limiting example of a representative reception beamforming algorithm for performing the nulling operation, a zero-forcing algorithm may be employed.
Referring to the illustrative example of
A first base station according to various embodiments of this disclosure may receive sequences transmitted from one or more second base stations (operation S501), and may identify each of the second base stations, based on cell IDs detected from the sequences (operation S502).
For example, a first base station is a base station that may be causing the remote interference, may receive sequences from one or more second base stations affected by the remote interference, and may identify each of the second base stations that transmitted the sequences, based on the received sequences. As an illustrative example, the first base station may store information on second base stations which correspond to respective cell IDs, or may acquire the information from a central management sever, and may thus identify the second base stations by using the information.
In addition, the first base station according to various embodiments of this disclosure may estimate a channel for each of the second base stations by using the received sequences (operation S503).
According to a result of the channel estimation, the first base station according to various embodiments of this disclosure may identify the position and direction of, and distance to, a second base station which is affected by the remote interference of a downlink signal of the first base station (operation S504).
As a non-limiting example, the first base station according to various embodiments of this disclosure may identify which second base station is affected by the remote interference from the first base station among the identified second base stations, based on a result of the channel estimation. More specifically, the first base station according to various embodiments of this disclosure may identify a channel state in a direction corresponding to each of the identified second base stations. According to the channel state corresponding to each of the identified second base stations, the direction of and the distance to a second base station, which is affected by the remote interference, relative to the first base station may be identified.
As described above, when the second base station that is affected by the remote interference is identified, the first base station according to various embodiments of this disclosure may perform at least one operation among a nulling operation with respect to a transmission beam and an on/off operation of a transmission beam in a specific time period (operation S505).
The first base station according to various embodiments of this disclosure may control, based on the identified result, beam shapes of transmission beams such that a beam is not transmitted in a direction corresponding to the second base station that is affected by the remote interference. As an illustrative example of a representative transmission beamforming algorithm for performing the nulling operation, similar to a reception beamforming algorithm, a zero-forcing algorithm may be employed.
Referring to the illustrative example of
Referring to the non-limiting example of
In the examples described above, the operations of nulling and turning on/off a transmission beam are disclosed as an independent operation. However, embodiments according to this disclosure are not limited thereto, and in some embodiments, these two operations may be performed together. For example, the first base station may operate to turn off a transmission beam in a specific time period, and, in a time period other than the specific time period, may operate according to a method of nulling a transmission beam in a direction corresponding to the second base station affected by the remote interference.
As described above, according to various embodiments of this disclosure, in remote interference detection and interference control operations, because a sequence generated from a cell ID of a base station is used, base stations related to the interference may be identified, and the interference situation that each of the base stations causes may be more accurately identified through channel estimation. For example, a more effective interference control operation can be performed because, beyond simply identifying an average interference result of base stations related to the interference, the positions, distances, and directions of the base stations related to the interference may be accurately identified for each of the base stations.
Hereinafter, a method for generating a sequence used for remote interference detection and a method for transmitting the sequence according to various embodiments of this disclosure will be described.
The remote interference due to an atmospheric ducting phenomenon described in the disclosure indicates the case where one base station is affected by a downlink signal of another base station, which is remotely located, and the effect may vary depending on the distance between an interfering base station and a victim base station, and thus a sequence which is capable of covering various distances, namely, is robust against a delay spread, is required to be transmitted. In addition, the distance between an interfering base station and a victim base station is approximately tens to hundreds of kilometers, and thus, in order to cover the entire distance, a sequence having a characteristic of a long cyclic prefix (CP) should be transmitted.
In an existing LTE framework, the length of a CP is set forth as a standard, and in certain embodiments according to this disclosure, a method for designing a sequence having a long CP which is nonstandard is provided. The sequence according to certain embodiments of this disclosure follows a method for connecting symbols, which correspond to respective sequences, by using a cyclic shift characteristic.
In general, in order to remove interference due to multiple paths between symbols, a cyclic prefix may be obtained by copying a portion of the rear end of a symbol corresponding to a signal and inserting the copied portion in front of the symbol. In the illustrative example of
The sequence according to various embodiments of this disclosure may connect symbols which respectively correspond to two sequences to thus generate a sequence for remote interference detection. For example, after the inverse fast Fourier transform (IFFT) is performed, the second symbol, among symbols corresponding to two sequences, is cyclic-shifted by T1 before a cyclic prefix is attached, whereby two OFDM symbols corresponding to the two sequences may be connected to each other.
More specifically, referring to the explanatory example of
Therefore, even if a delay spread increases, a base station receiving the corresponding sequence can detect a part that is not affected by the interference even when the base station tries to decode any part of a connected symbol.
A sequence according to various embodiments of this disclosure may connect many symbols in order to strengthen resistance to a delay spread.
Referring to the non-limiting example of
Referring to the non-limiting example of
As the number of connected symbols increases, it may be identified that the length of a cyclic postfix (which corresponds to a portion of the front end of a symbol corresponding to one sequence, that is, a second part in the description of the drawings above) which is inserted to the last symbol increases.
As described in the drawings above, according to certain embodiments of this disclosure, even if a delay spread occurs, sequences are connected to form a sequence having a long CP, and a base station having received a sequence from another base station far therefrom can thus detect a part which is not affected by interference even when the base station tries to decode any part of symbols corresponding to the connected sequences.
Referring to
Referring to
For example, as illustrated in the example of
For example, even within the same TTI, symbols of type A #1 and type A #2 such as illustrated in the non-limiting example of
In addition, it is possible that symbols of type N #1, type N #2, type N #4, type N #5, type N #7, type N #8, type N #9, type N #11, and type N #12, which are described in
Meanwhile, in
Meanwhile, because a sequence according to various embodiments of this disclosure is also mapped to the frequency region of 6 RBs including the center frequency and is then transmitted, an embodiment for further strengthening the remote interference control operation may be also considered. In addition, as an example, a sequence having a predetermined length may be mapped to a subcarrier of any successive frequency, regardless of the position on the frequency region.
Although not illustrated in
Hereinafter, in a DL framework, symbols in which sequences can be transmitted according to each type of a CP and each type of a subframe will be described. In the illustrative examples of
Referring to the illustrative example of
For example, as illustrated in
As an illustrative example, symbols corresponding to two sequences may be connected to each other and mapped to the 2nd and 3rd symbols, and symbols corresponding to three sequences may be connected to each other and mapped to the 5th, 6th, and 12th symbols.
Referring to the non-limiting example of
Referring to the non-limiting example of
Referring to the non-limiting example of
For example, as illustrated in the example of
Referring to the non-limiting example of
Referring to the non-limiting example of
Referring to the non-limiting example of
The drawings described above illustrate only embodiments in which a sequence according to various embodiments of this disclosure is not transmitted in a section in which a synchronization signal for downlink synchronization is received, namely in the section corresponding to a bandwidth of approximately 6 RBs including the center frequency. However, the disclosure is not limited thereto, and a sequence may also be mapped to a corresponding frequency region, and may then be transmitted.
Referring to the non-limiting example of
The transceiver 1710 of the base station of the disclosure may perform wireless communication with at least one external entity. For example, the transceiver 1710 of the disclosure may transmit a wireless signal to or receive the same from an external device, or may transmit a sequence for remote interference detection according to various embodiments of this disclosure to or receive the same from an external device.
The controller 1720 according to various embodiments of this disclosure may control the overall operation of the base station according to various embodiments of this disclosure. For example, the controller 1720 may control the transceiver 1710 to transmit a sequence for remote interference detection to another base station, or may receive the sequence from another base station. In addition, when the transceiver 1710 receives a sequence from another base station, the controller 1720 according to various embodiments of this disclosure may identify the other base station by using a cell ID detected in the corresponding sequence. In addition, upon estimating a channel by using the corresponding sequence, the controller 1720 may control the transceiver 1710 to control a transmission beam or a reception beam corresponding to a direction related to the remote interference, based on a result of the channel estimation.
The storage unit 1730 according to various embodiments of this disclosure stores data such as configuration information, an application, and a basic program for the operation of the base station. As an example, the storage unit 1730 according to various embodiments of this disclosure may store information on a cell ID corresponding to each base station, information on the position of each base station, and the like, and, when the base station is an interfering base station, may store information on the time during which a corresponding base station does not operate.
Operations of detecting and controlling remote interference according to various embodiments of this disclosure may be performed at each base station, but may be performed through a separate central server, namely a remote interference management (RIM) server.
Referring to the non-limiting example of
For example, the RIM server 1803 may control the first base station 1801 to transmit a sequence, and may control the second base station 1802 to receive the sequence. In addition, the RIM server 1803 may perform control such that the second base station 1802 detects the sequence and reports a channel estimation result. Accordingly, the RIM server 1803 according to various embodiments of this disclosure may identify that the first base station 1801 is an interfering base station and the second base station 1802 is a victim base station.
Based on the identified result, the RIM server 1803 may transmit a command for controlling a beamforming operation of at least one of the first base station 1801 and the second base station 1802. For example, the RIM server 1803 may transmit, to the first base station 1801, a command for performing control such that a transmission beam in a direction corresponding to the second base station 1802 is nullified, or such that the corresponding transmission beam is not transmitted. In addition, the RIM server 1803 may transmit, to the second base station 1802, a command for performing control such that a reception beam in a direction corresponding to the first base station 1801 is nullified.
The embodiments are not limited thereto. For example, an operation of controlling beamforming may be performed using an on/off operation of each of the first base station and the second base station. The first base station or the second base station may perform control such that a beam corresponding to the direction in which the interference occurs is turned on or turned off in a specific time period. In addition, for example, the operation of controlling beamforming according to various embodiments of this disclosure may also be performed based on configuration information (for example, TDD configuration and the like) of each base station. The first base station according to various embodiments of this disclosure may transmit TDD configuration information including information for performing configuration such that a beam corresponding to the direction in which the interference occurs is not transmitted in a specific time period.
According to various embodiments of this disclosure, since control using a central server is performed, rather than simply considering an interference operation only between some base stations, data according to the operation of all relevant base stations can be collected, and the collected data can be applied to situations pertaining to all of the base stations, whereby the more suitable control is possible.
Those skilled in the art will appreciate that various modifications and changes may be made without departing from the essential spirit and scope of the disclosure. Therefore, the embodiments disclosed herein should be considered not from limitative viewpoints but from illustrative viewpoints. The scope of the disclosure should be determined not by the above description but by the appended claims, and all differences equivalent to the claims shall be construed as falling within the scope of the disclosure.
Although exemplary embodiments of the disclosure have been described and shown in the specification and the drawings by using particular terms, they have been used in a general sense merely to easily explain the technical contents of the disclosure and help understanding of the disclosure, and are not intended to limit the scope of the disclosure. It will be apparent to those skilled in the art that, in addition to the embodiments disclosed herein, other variants may be achieved on the basis of the technical idea of the disclosure.
Although the present disclosure has been described with various embodiments, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2019-0053955 | May 2019 | KR | national |
Number | Name | Date | Kind |
---|---|---|---|
6304760 | Thomson et al. | Oct 2001 | B1 |
9571205 | Suarez et al. | Feb 2017 | B1 |
9831901 | Kpodzo et al. | Nov 2017 | B2 |
10034181 | Somashekar | Jul 2018 | B1 |
20130272189 | Lee et al. | Oct 2013 | A1 |
20140086089 | Huang | Mar 2014 | A1 |
20150230259 | Park et al. | Aug 2015 | A1 |
20180139628 | Choi et al. | May 2018 | A1 |
20190342057 | Rico Alvarino | Nov 2019 | A1 |
20200106589 | Xu | Apr 2020 | A1 |
Entry |
---|
International Search Report of the International Searching Authority in connection with International Application No. PCT/KR2020/006044 dated Aug. 24, 2020, 3 pages. |
Number | Date | Country | |
---|---|---|---|
20200358537 A1 | Nov 2020 | US |