This disclosure relates to multiple-input multiple-output (MIMO) systems, and more specifically, to receivers implemented in MIMO systems.
The background description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventors, to the extent it is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure.
In wireless communication systems, multiple-input and multiple-output (MIMO) refers to an use of multiple antennas at both a transmitter and a receiver to improve communication performance. MIMO technology has attracted attention in wireless communications, because MIMO offers significant increase in data throughput and link range without additional bandwidth or increased transmit power. MIMO achieves this by, for example, spreading the same total transmit power over the antennas to achieve an array gain that improves the spectral efficiency (e.g., more bits per second per hertz of bandwidth) or to achieve a diversity gain that improves a link reliability (e.g., reduced fading). Because of these properties, MIMO is an important part of various modern wireless communication systems.
In accordance with an embodiment, there is provided a method comprising receiving, at a receiver, a desired signal and an interfering signal, wherein the interfering signal was transmitted with a modulation unknown to the receiver; identifying a likely modulation corresponding to the modulation with which the interfering signal was transmitted; and decoding the desired signal using a modulation dependent multiple-input multiple output (MIMO) detection, wherein the modulation dependent MIMO detection is based at least in part on the identified likely modulation corresponding to the modulation with which the interfering signal was transmitted, wherein the modulation dependent MIMO detection includes maximum likelihood (ML) detection.
There is also provided, in accordance with an embodiment, a system comprising one or more antennas configured to receive a desired signal and an interfering signal, wherein the interfering signal was transmitted with a modulation unknown to the system; and a data processing unit coupled to the one or more antennas, wherein the data processing unit is configured to (i) identify a likely modulation or the likelihood of a modulation corresponding to the modulation with which the interfering signal was transmitted, and (ii) decode the desired signal using a modulation dependent detection, wherein the modulation dependent detection is based at least in part on the identified likely modulation or the identified likelihood of the modulation corresponding to the modulation with which the interfering signal was transmitted, wherein the modulation dependent detection includes maximum likelihood (ML) detection.
Embodiments of the present disclosure will be readily understood by the following detailed description in conjunction with the accompanying drawings. To facilitate this description, like reference numerals designate like elements.
Described herein are example systems, components, and methods that may be used in conjunction with MIMO (multiple-input/multiple-output) and/or MU-MIMO (multi-user MIMO) techniques. The following description merely provides examples and is in no way intended to limit the disclosure, its application, or uses.
A MIMO receiver (also referred to herein more generally as a “receiver”) typically receives a signal that carries a plurality of effective data signals, only some of which is intended for the receiver. The effective data signal intended for the receiver, referred to herein as the desired signal, may be decoded using a corresponding channel transfer matrix, also referred to as a channel matrix. Other effective data signals, referred to as interfering signals, are associated with different channel matrices. In some cases, the channel matrices of interfering signals may be known or may be estimated.
The effective signals described above may be transmitted using different modulations. Available modulations may include, for example, various implementations of quadrature amplitude modulation (QAM), quadrature phase shift keying (QPSK), and others. In some situations, the modulations used by interfering signals may not be known to a receiver. This may be the case, for example, when interfering signals are the result of multi-user MIMO or co-channel interference.
This disclosure is directed to mitigating interference in an MIMO environment in which a receiver is able to identify presence of interfering signals and their corresponding channel matrices, but in which the modulations of the interfering signals are not known to the receiver.
Base station BS1 communicates with the mobile device U1 by way of an effective signal, which is defined or characterized by a channel matrix h1,1. BS1 also communicates with the mobile device U2 by way of effective signal defined or characterized by a channel matrix h2,2. The signal being transmitted to U2 may interfere with the signal being transmitted to U1. This intra-cell interfering signal travels along an effective channel characterized by a channel matrix h1,2 to U1.
Because many modern wireless communication systems have adjacent cells transmitting in the same frequency bands, mobile devices are also subject to inter-cell interference. The base station BS2 exchanges signals with the mobile device U3 by way of an effective channel characterized by the channel matrix h3,3. This signal also interferes with the signal being transmitted by BS1 to U1.
The following discussion focuses on operations performed at a receiver that receives multiple signals, each of which is characterized by a different channel matrix hi, where the suffix i is an index corresponding to an individual signal and channel matrix. Thus, if a receiver receives two effective signals x1 and x2, those effective signals may be characterized by channel matrices h1 and h2, respectively. While the following discussion focuses on the two data streams, the teachings of this disclosure applies to systems that can handle a larger number of data streams.
One embodiment of a wireless signal processing unit 102 is shown in
The signal processing unit 102 from
The general characteristics of MIMO transmission, assuming a number of users K, may be characterized as follows:
r: NR×1 received vector
effective MIMO channel, where H=[H1 . . . HK]
transmitted vector
x1: transmitted signal for the desired user of modulation M(1)
xk: transmitted signal for the interferer of modulation M(k), k=2 . . . K
n: white noise at receiver, such that E(nnH)=σ2I
NR: number of receiver antennas
NT,k: number of transmit antennas (number of spatial streams) of each user
i: a transmission instance out of total L transmissions, such as an index of subcarriers.
For ease of explanation, the following discussion will assume two rank-1 users, resulting in the following simplification of Equation 1:
r(i)=H(i)x(i)+n(i)=h1(i)x1(i)+h2(i)x2(i)+n(i)1≦i≦L Equation 2
The channel or channel matrix associated with the desired signal x1 is represented as h1. The channel or channel matrix associated with the interfering signal x2 is represented as h2.
It is assumed in the following discussion that the existence of the interfering signal is known, and that the channel matrix h2 of the interfering channel has been obtained from advanced channel estimation techniques. For example, the channel matrix h2 may be calculated as the orthogonal RS sequence of transmission mode 8 of the “Long Term Evolution” (LTE) Rel. 9 specification.
It is further assumed that the modulation M(2) of the interfering signal x2 is chosen from a finite set ψ of possible modulations, and that the composition of this set is known by the receiver. For example, if the receiver knows the wireless system from which the interference comes from, the receiver may also know a set of all possible modulations for the interference. However, the particular modulation M(2) being used by the interfering signal x2 is not known at the receiver.
The interfering effective signal may be associated with a co-scheduled MU-MIMO channel, or may be associated with a co-channel in a neighboring system (e.g., a neighboring cell for a cellular system, or a nearby access point for a WiFi system).
Generally, an MMSE receiver can be applied to detect a received signal x1, without knowledge of the modulation of an interfering signal x2, as follows:
{tilde over (x)}1=[HH(HHH+σ2I)−1](1,:)r=h1H(HHH+σ2I)−1r{circumflex over (x)}1=Q({tilde over (x)}1;M(1)) Equation 3
The MMSE receiver of Equation 3 works regardless of the modulation used in the interfering signal, and is a conventional solution for interference mitigation. In Equation 3, Q(.;M) is a slicer based on the modulation M, as an example for decision. In some embodiments, a hard slicer is replaced by a soft decision (e.g., a bit-wise log-likelihood-ratio, or LLR) calculator taking the MMSE receiver output {tilde over (x)}1 as input.
In cases where the modulation M(2) of an interfering signal is known, a modulation-dependent receiver may outperform a modulation independent receiver such as the MMSE receiver, in which the interference is treated as Gaussian noise. For example, ML detection as an example of modulation-dependent receiver can be applied as follows:
Equation 4 shows an example of hard decision using ML cretirion. A soft decision (such as bit-wise LLR) can also be used in some embodiments following ML cretirion. Other examples of modulation dependent receiver include decision-feedback equalizer, interference cancellation, and/or the like. In some of the embodiments discussed herein later, ML detection is used as an example.
However, the modulation M(2) of the interfering effective signal x2 is often unknown. Described below are various methods, techniques, and enhancements for performing ML detection even in situations where the modulation M(2) of the interfering signal is unknown.
An action 202 comprises receiving the desired signal x1 and the interfering signal x2. The signals may be generated by different transmitters or base stations, and/or from different antennas of a single transmitter or base station. The modulation of the interfering signal x2 is unknown to the receiver.
An action 204 comprises identifying a likely modulation of the interfering signal x2. This may be performed in a number of different ways, as will be described below. In certain embodiments, the action 204 may comprise estimating, calculating, or otherwise determining a modulation {circumflex over (M)}(2) that is assumed to be used by the interfering channel h2.
The action 204 may be generally characterized by the following equation:
{circumflex over (M)}(2)=ƒ(h1,h2,r,M(1),σ2) Equation 5
An action 206 comprises applying maximum likelihood (ML) detection, based at least in part on the assumed modulation {circumflex over (M)}(2), in order to obtain the desired signal x1. An example of ML detection to determine a hard estimate of x1 is generally characterized by the following equation:
where Ω is the set of possible or available modulations that may have been used by the desired signal and the interfering signal. A bit-wise soft decision can also be determined in some embodiments in a similar fashion with the assumed modulation {circumflex over (M)}(2). In the following discussion and as an example, hard decision is used without excluding the application of the techniques to soft decision.
The actions 204 and 206 may in some cases be combined, using calculations that jointly determine both the desired signal x1 and the assumed modulation {circumflex over (M)}(2) as follows:
{{circumflex over (x)}1,{circumflex over (M)}(2)}=G(h1,h2,r,M(1),σ2) Equation 7
The calculations of Equations 5, 6, and 7 are implemented to minimize a cost function over all possible modulations:
Joint ML Sequence and Modulation Detection
An example of applying Equation 7 is that the actions 204 and 206 may be performed jointly, by evaluating the a-posteriori probabilities of the different available modulations of the set ψ in combination with the decoded desired signal x1. Evaluation of a-posteriori probabilities may be performed in several different ways, as indicated along the right side of
Log-MAP
A method referred to herein as “Log-MAP” may be used to maximize the a-posteriori probability of the desired signal x1 and the assumed modulation {circumflex over (M)}(2) of the interfering signal x2, given the signal r, as follows:
Where L is the number of signals in the sequence.
Eq. 9 may be implemented, in an embodiment, as follows:
Equation 10 assumes that any residual noise is Gaussian, and that each of the available modulations has an equal a-priori probability of being used by the interfering channel. Equation 10 finds the a-posteriori probabilities of all possible modulations, and then selects the modulation having the highest a-posteriori probability.
In some situations, certain modulations are more likely to be used than others. In these situations, Eq. 9 may be implemented as follows, to account for the differing a-priori probabilities of each modulation:
In the following discussion and as an example, the equal a-priori probabilities of each modulation is used without excluding the scenarios of unequal a-priori probabilities of each modulation.
Sum-Max-Log-MAP
The Log-MAP method of maximizing the a-posteriori probability of the desired signal x1 and the modulation {circumflex over (M)}(2) of the interfering channel may be refined using a method referred to herein as “Sum-Max-Log-MAP”. Specifically, equations 10 and 11 can be implemented in a less complex fashion by approximating the sum of the a-posteriori probabilities, where a core part of Equations 10 and 11 is replaced by a simplification. In particular, the term
of Equations 10 and 11 may be replaced by the following expression:
The Approximation Leads to Little Performance Loss, for Example, when Signal to Noise Ratio (SNR) is Relatively High.
For example, when the probability of each M2 is equal, the desired signal x1 and the modulations {circumflex over (M)}(2) of the interfering signal x2 are then obtained by comparing the average minimum distance per modulation with an offset:
Mean-Max-Log-MAP
Alternatively, for example, when the SNR is relatively low, Equations 10 and 11 can be implemented using a method referred to herein as “Mean-Max-Log-MAP”, which comprises approximating the mean probability by the maximum probability. Specifically, the term
of Equations 10 and 11 is replaced by the following expression:
For example, when the probability of each M2 is equal, the desired signal x1 and modulation {circumflex over (M)}(2) of the interfering signal are then obtained as follows:
Max-Log-MAP-Scale
In cases where it is difficult or impractical to make a decision regarding SNR, the Equations 10 and/or 11 may be implemented as follows, independently of SNR values:
In Equation 16, the term
1+α(H,M(1),M(2),σ)/M(2)
is a scaling factor that is used to scale the subsequent exponential term of Equation 16. The scaling factor can be approximated and stored as a lookup table to lessen the complexity of calculating Equation 16. The desired signal x1 and the modulation {circumflex over (M)}(2) of the interfering channel x2 may be calculated in this scenario as follows:
Log-MAP-Best-K
As yet another example, a balance between accuracy and complexity may be obtained when calculating Equations 10 and 11 using a method referred to herein as “log-MAP-Best-K”, which comprises computing only the largest K terms in the sum of conditional probabilities, as follows:
The depth of this calculation may be dependent on one or more factors including modulation, SNR, and/or the like, and may be adjusted in the real-time.
Sequential Modulation and Sequence Detection
In certain embodiments, the assumed modulation M(2) may be initially determined, and may then be used as the basis for decoding the desired signal x1. This is referred to herein as sequential modulation and sequence detection. The assumed modulation M(2) may be calculated or estimated in various ways, as indicated on the left side of
The techniques for joint ML sequence and modulation detection mentioned above can also be implemented in the fashion of sequential modulation and sequence detection discussed hereafter. For example, the modulation of M2 can be detected by maximizing the a-posteriori probability of the desired signal x1 and the assumed modulation {circumflex over (M)}(2) of the interfering signal x2, given the signal r, as follows:
And then the determined M2 is used for a ML detection of the desired sequence. That is,
The equations [9] to [18] can be similarly implemented in the sequential fashion. Additionally, some specific examples for sequential modulation and sequence detection are discussed as follows.
Fixed Modulation
As an example of sequentially determining M(2) and x1, the action 204 may be performed by arbitrarily or randomly assuming a modulation {circumflex over (M)}(2) of the interfering signal. In this case, {circumflex over (M)}(2)=K, where K is an arbitrarily assumed modulation belonging to the known set ψ of available modulations. The desired signal x1 may be calculated in the action 206 by performing ML detection based on this assumption of a fixed modulation for the interfering signal, as follows:
As another example of sequentially determining M(2) and x1, the action 204 may be performed by assuming the superposition of all possible modulations of the interfering signal. Thus, assuming that the known set ψ of modulations comprises, for example, QPSK, QAM16, and QAM64 modulations, the action 206 of calculating the desired signal x1 can be calculated by performing ML detection as follows:
Linear Receiver with Modulation Detection
Sequential determination of M(2) and x1 may also be performed by implementing a linear receiver for the interfering signal x2, to detect the modulation {circumflex over (M)}(2) of x2. The action 204 may be performed by a linear receiver using MMSE, zero-forcing (ZF), maximal ratio combining (MRC), and/or other types of linear detection schemes. In an embodiment, an MMSE receiver may implemented as follows:
Based on Equation 22, a modulation detector may be implemented to determine an assumed modulation {circumflex over (M)}(2) of the interfering signal x2 as follows:
The optimization function J(.) can be derived from the counterpart equations [9] to [18]. The analogy between the optimization functions is that h1 and x1 equal to 0, and h2 equal to 1, also r equal to {tilde over (x)}2. In other word, the relationship between the transmitted and received signals in Equation [1] and [2] is reduced to a single user case, where the received signals are the output of the linear receiver {tilde over (x)}2 and the transmitted signal x2 travels through an AWGN channel in absence of x1. By applying the principle of modulation detection, or a-posteriori probability determination in Equation [9] to [18] for the new input-output relationship, the modulation of x2 may be determined accordingly. For example, the log-MAP style function is as follows:
The technique of sum-max-log-MAP, mean-max-log-MAP, max-log-MAP-scale, log-MAP-best-K can be applied similarly.
After determining the assumed modulation of the interfering signal in this manner, the desired signal x1 may be calculated in the action 206 by using ML detection as follows:
LLR-Based Modulation Detection
The modulation of the interfering signal may also be determined or estimated in the action 204 based on a soft decision or log-likelihood ratio (LLR) of each bit at the output of a receiver, as follows:
Instead of examining the probability of each symbol in a transmitted sequence, this technique evaluates the probability of each coded bit:
For example, the following metric can represent the probability of a correctly decoded bit sequence:
Alternatively, an approximate and simpler solution is as follows:
Joint Decoding and Modulation Detection
In cases where signals x comprise coded symbols, modulation detection and decoding can be performed jointly or concurrently to determine the most probable modulation {circumflex over (M)}(2) of the interfering signal x2. For example, multiple ML detection may be performed in parallel or in sequence, based on all possible M(2) modulations. The resulting outputs may then be fed to channel decoders to produce decoded sequences. Assuming that the symbols of the sequences have error encoding, such as cyclical redundancy check (CRC) encoding, the decoded sequences may be examined to determine whether they exhibit errors. The output sequence exhibiting the lowest error rate or the highest accuracy may then be selected, and the modulation M resulting in that output sequence may be assumed to be the modulation M(2) of the interfering signal.
When CRC is not available, other approaches may be used to select the output sequence that is most likely to be correctly decoded. For example, the mean of the absolute information bit LLR may be used to determine whether an output stream has been correctly decoded.
After determining M(2) in this manner, ML detection may be applied in the action 206 to determine the desired signal x1 based on the determined modulation M(2) of the interfering signal.
Hard Decision Distribution Metric
In an embodiment, the constellation distribution of hard decisions in an MMSE receiver, applied to the interfering channel x2, may be evaluated to determine the likely validity of the previously described decisions regarding M(2). For example, the hard decisions regarding the interfering channel x2 may be evaluated to determine whether they exhibit expected constellation distributions for the assumed modulation {circumflex over (M)}(2).
For example, a hard slicer may be applied at the output of a linear receiver such as an MMSE receiver, as follows:
{tilde over (x)}2=Q(αh2H(HHH+σ2I)−1r;M(2)) Equation 29
A typical transmitted signal uniformly occupies the constellation. If the hard deicision at the output of hard slicer shows a non-uniform distribution in the assumed constellation, the likelyhood of this assumed modulation, P(M(2)), may decrease, or this assumption may become invalid.
For example, for M(2)>4, the numbers of hard decisions in different subsets of the constellation of the assumed modulation {circumflex over (M)}(2) are calculated, and these numbers are compared to expected distributions within the assumed modulation {circumflex over (M)}(2). As an example, the constellation of the assumed modulation {circumflex over (M)}(2) may be partitioned into two subsets, and the following ratio may be calculated:
In Equation 30, subset 1 (Ω1) includes constellation points of the assumed modulation {circumflex over (M)}(2) that are relatively likely if the assumed modulation is actually used by the interfering signal x2. Subset 2 (Ω2) includes the points that relatively likely if the estimated modulation {circumflex over (M)}(2) is not used by the interfering signal x2.
The ratio of Equation 30 can be compared to a threshold to determine whether the observed distribution is incorrectly biased relative to the expected distribution of the assumed modulation {circumflex over (M)}(2) as follows:
ρ(M
The decision based on Equation 30A may be used to qualify or refine decisions regarding {circumflex over (M)}(2) made using the Joint ML Sequence and Modulation Detection or sequential modulation and sequence detection schemes discussed above.
Subsampled Sequences
In the various techniques and methods described above, the interfering channel x2 may be subsampled in order to reduce the number of calculations involved in any given technique. For example, r may be sampled once in every 100 symbols over a received sequence of 10000 symbols, in situations in which the modulation is anticipated to remain constant over at least 10000 symbols.
More particularly, the subsampling may be performed as follows:
In addition to applying to log-MAP in Equation 31, subsampling can be applied to the technique of sum-max-log-MAP, mean-max-log-MAP, max-log-MAP-scale, log-MAP-bests-K similarly. Subsampling can be also be applied in combination with other techniques such as hard decision distribution metric discussed above, and adaptive ML/MMSE hereafter.
Adaptive ML/MMSE
In certain embodiments, the ML detection schemes described above may be used when they produce reliable or accurate results, and MMSE may be used in other situations, where noise dominates or the modulation detection is deemed to be unreliable. Various measures or metrics may be used to determine whether the ML modulation detection is or is likely to be reliable and/or accurate. For example, signal-to-noise ratio (SNR) and/or SINR (signal-to-interference/noise ratio) of the interfering channel x2 may be used as indicators of detection reliability.
As another example, the hard decision matrix metric described above, or any other observed quality metric, may be used in determining the actual accuracy or reliability of modulation detection. More specifically, the ratio of the minimum and maximum metrics may be evaluated and compared to a threshold to indicate the likely reliability of modulation detection, as follows:
Interference Cancellation without Modulation Knowledge
Typically, interference cancellation requires knowledge of the modulation of the interfering signal as well as coding information for the interfering signal. However, the following technique can be used in situations in which the modulation information of the interfering signal is not known at the receiver.
As an example of this process, assuming that coding information for the interfering signal x2 is not available, a linear MMSE receiver may be applied to equalize the MIMO channel as follows:
{tilde over (x)}2=αh2H(HHH+σ2I)−1r=x2+z Equation 33
Based on Equation 31, the probability of each available modulation may be calculated as follows:
It is to be noted that the Sum-Max-Log-MAP, as described above, is used in Equation 34 to approximate probabilities. Other described methods, such as Log-MAP, Max-Log-MAP-Scale, and so forth can also be applied here.
It is to also be noted that
The soft estimation for each hypothesized modulation may then be calculated as follows:
Again, the different kinds of Log-MAP techniques described above can be applied to Equation 35 to lower computational complexities of determining the probability of every possible modulated symbol in each modulation.
The soft estimation is then calculated over all possible modulations, as follows:
{circumflex over (x)}2(i)=E[x2(i)|r]=ΣM
Based on the soft estimation of Equation 36, the interference may be canceled from the interfering signal x2, and the desired signal x1 may be decoded as follows:
{tilde over (r)}(i)=r(i)−h2{circumflex over (x)}2(i){circumflex over (x)}1(i) Equation 37
Both
A combination of hard and soft modulation detection is possible, where the modulation of the interfering signal is determined, and then a soft expectation of the interfering signals is cancelled from the received signal. This can be interpreted as another example of modulation dependent MIMO detection.
Another combination of soft and hard modulation detection is to find a hard estimate of modulated symbols in each modulation, and determine the expected interfering signals as the sum of each modulated symbols weighted by the probability of the modulation. This can be interpreted as the Sum-Max-Log-MAP technique for determining the probability of each modulated symbol given the modulation.
The discussion above assumes two rank-1 users for ease of description. However, the described techniques are not limited to the number of users or the ranks of the users. Rather, the described techniques can be extended to arbitrary numbers of users with arbitrary ranks, where the effective channels are available but the modulations of the channels are unknown at the receiver. For example, ML sequence and modulation detection with Sum-Max-Log-Map techniques may be performed with respect to multiple users in accordance with the following:
In the case of more than 1 interfering signals, the detection of the modulation for each signal can be done jointly by solving equation 38, for example if Sum-Max-Log-MAP technique is applied. Alternatively (or additionally), the modulation of each signal can be successively detected, treating all the signals with modulations undetected as noise. Another alternative is to detect the modulation of each signal in parallel, treating all the rest signals with modulations as noise. Furthermore, the joint and successive/parallel modulation detection for more than 1 interfering signals can be applied at the same time, for example, by grouping interfering signals, and applying the joint or successive/parallel principle to each group, and then applying the joint or successive/parallel principle within each group.
The discussion above also assume the existence of the interfering signals has been identified. Alternatively, the existence of the interfering signals can be included in the modulation detection by assigning the non-existence of the interfering signals as a special modulation and included in the set of modulations ψ. If the modulation of “non-existence” has been identified as the most likely one, the receiver may deem that the interfering signals are not present.
Note that the description above incorporates use of the phrases “in an embodiment,” or “in various embodiments,” or the like, which may each refer to one or more of the same or different embodiments. Furthermore, the terms “comprising,” “including,” “having,” and the like, as used with respect to embodiments of the present disclosure, are synonymous.
As used herein, the terms “logic,” “component,” and “module” may refer to, be part of, or include an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and/or memory (shared, dedicated, or group) that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality. The logic and functionality described herein may be implemented by any such components.
In accordance with various embodiments, an article of manufacture may be provided that includes a storage medium having instructions stored thereon that, if executed, result in the operations described above. In an embodiment, the storage medium comprises some type of non-transitory memory (not shown). In accordance with various embodiments, the article of manufacture may be a computer-readable medium such as, for example, software or firmware.
Various operations may have been described as multiple discrete actions or operations in turn, in a manner that is most helpful in understanding the claimed subject matter. However, the order of description should not be construed as to imply that these operations are necessarily order dependent. In particular, these operations may not be performed in the order of presentation. Operations described may be performed in a different order than the described embodiment. Various additional operations may be performed and/or described operations may be omitted in additional embodiments.
Although certain embodiments have been illustrated and described herein, a wide variety of alternate and/or equivalent embodiments or implementations calculated to achieve the same purposes may be substituted for the embodiments illustrated and described without departing from the scope of the present disclosure. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that embodiments in accordance with the present disclosure be limited only by the claims and the equivalents thereof.
This disclosure is a continuation of and claims priority to U.S. patent application Ser. No. 13/659,709, filed Oct. 24, 2012, now U.S. Pat. No. 8,787,483, issued Jul. 22, 2014, which claims priority to U.S. Provisional Patent Application No. 61/551,339, filed Oct. 25, 2011, which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
20090016465 | Ramesh | Jan 2009 | A1 |
20090279442 | Rave | Nov 2009 | A1 |
20100118921 | Abdelmonem et al. | May 2010 | A1 |
20110038328 | Wang et al. | Feb 2011 | A1 |
20120082197 | Jonsson et al. | Apr 2012 | A1 |
20130028305 | Gollakota et al. | Jan 2013 | A1 |
20130286867 | Davydov et al. | Oct 2013 | A1 |
20130301757 | Dao et al. | Nov 2013 | A1 |
20140079107 | Abdelmonem et al. | Mar 2014 | A1 |
20140160949 | Clausen et al. | Jun 2014 | A1 |
Number | Date | Country | |
---|---|---|---|
61551339 | Oct 2011 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13659709 | Oct 2012 | US |
Child | 14331557 | US |