The various embodiments of the present invention relate generally to signal detection in symbol-based transmissions system and more particularly to systems and methods for multi-stage signal detection and iterative detection based on an low-complexity optimality test that determines which symbols have been decoded correctly and which need additional processing.
The complexity reduction of well-performing Multiple Input Multiple Output (MIMO) detection schemes has drawn considerable interest recently. Even though sophisticated integrated circuits may be available today for the most complex schemes, including Maximum Likelihood (ML, using sphere decoding), the actual throughput and integration costs of these detectors is out of the scope of projected applications of MIMO systems. Low complexity heuristic methods using techniques derived from equalization provide a simple alternative to algorithmic schemes. However, their poor performance makes them unsuited for most practical applications. Typically, the proportion of wrongly decoded symbols (even in the case of zero-forcing ‘ZF’ or means square error ‘MSE’) represent only a fraction of the transmitted data. Thus, gains in accuracy are derived at the expense of significant losses in performance and increased system complexity.
Multi-carrier transmission over a frequency selective channel implies large differences between the Signal to Noise Ratios (SNR) on the transmitted tones. For independently detected tones, the best performance in terms of average bit error rate (BER) is obtained when conditions are equally good on all sub-carriers, as proved by Jensen's inequality. In the case of precoded Orthogonal Frequency Division Multiplexing (OFDM), independent per dimension minimum square error (MSE) and joint-maximum-likelihood (ML) detections are not equivalent, as tones are no longer independent. Jensen's bound, which is reached by MSE detection, can then be outperformed. However, the computational complexity of joint-ML detection makes it unrealistic in practical systems.
Thus, there is a need for a symbol detection scheme that ameliorates some or all of the above-noted deficiencies. Various embodiment of the invention accomplish this through a dual or multistage detection scheme where a heuristic detector (or more generally a low-complexity scheme) processes the received symbols, and only a fraction of the data are reprocessed by an algorithmic detection scheme (or more generally, a high-complexity and/or high performance scheme). To implement this detection scheme, we derive a low-complexity optimality test that determines or identifies, after initial detection, which symbols need further processing. The complexity gain of such a system may be measured by the ratio of data that need reprocessing, while its quality is driven by performance loss (if any) compared to what is obtained when running the algorithmic scheme exclusively. The complexity of such a test may preferably be kept to a minimum, so as not to cancel the gain from fewer computational runs. As noted above, typically, the proportion of wrongly decoded symbols represent only a fraction of the transmitted data. Therefore, using a more complex scheme only on these few mis-detected symbols would reduce the global complexity massively. Various embodiments may subject the results of the iterative detection to an optimality test. If the syndrome is less than zero, the detection results may be considered good enough and output. Otherwise, in various embodiments, if the syndrome is greater than zero, the received symbol may be reprocessed based on a more efficient detection scheme, such as, for example, one based on sphere decoding. In various embodiments, the results of the second detection may be subject to another optimality test.
Various embodiments utilize iterative detection of precoded OFDM based on optimality evaluation over the complex field that allows approximation of the joint-ML detection using iterative detection, outperforming Jensen's MSE bound typically by several dB, without a need for feedback to the transmitter as a first low-complexity detection scheme. Various embodiments subject the results of the iterative detection to an optimality test. If the syndrome is less than zero, the iterative detection results may be considered good enough and output. Otherwise, in various embodiments, the received symbol is modified accordingly to the syndrome.
Thus, at least one embodiment of the invention may provide a multistage system for signal detection comprising a first relatively low complexity decoding unit configured to decode received symbols, a optimality test unit configured to test the output of the first decoding unit, and a second relatively high complexity decoding unit configured to reprocess those received symbols that fail a condition of the optimality test unit.
At least one additional embodiment of the invention may provide a method of decoding incoming signals comprising decoding a received signal containing at least one symbol with a first decoder, performing an optimality test on the output of the first decoder, and for those symbols passing the optimality test, outputting the symbols, otherwise, sending the symbols to a second decoder
Another embodiment of the invention may provide A multistage symbol decoding transceiver comprising a first decoder unit performing a first decoding scheme, an optimality testing unit configured to test the output of the first decoder unit to determine if (1) a current symbol has been correctly decoded, or (2) if the current symbol requires additional processing to be correctly decoded, and a second decoder unit performing a second decoding scheme on those symbols determined to require additional processing.
These and other embodiments and advantages of the present invention will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, illustrating by way of example the principles of the invention.
The following description is intended to convey a thorough understanding of the embodiments described by providing a number of specific embodiments and details involving systems and methods for multistage signal detection in multiple input multiple output (MIMO) transmission systems. However, it should be appreciated, however, that the present invention is not limited to these specific embodiments and details, which are exemplary only. It is further understood that one possessing ordinary skill in the art, in light of known systems and methods, would appreciate the use of the invention for its intended purposes and benefits in any number of alternative embodiments, depending upon specific design and other needs.
Consider the general form of a MIMO system with a complex-valued lattice generating matrix Hc of size Nr×Nt, wherein Nr represents the number of receiver sensors (e.g., antennae, copper lines, etc.) and Nt represents the number of transmit points (e.g., antennae, copper lines, etc.). For a given transmitted symbol vector Sc with components drawn from a two dimensional constellation, the N×1 received vector may be Yc=HcSc+Wc, where Wc is the complex-valued noise with covariance matrix Rc. This complex-valued system may be represented as a real-valued system such as Y=HS+W, with:
This real-valued representation may include the physical channel, the desired space time code, and possibly an additional precoder, without loss of generality. For a detailed discussion of construct H refer to “Space-Time Block Coding for Wireless Communications,” E. Larsson, Cambridge Press, 2003.
The detection problem faced by the receiver is to find the estimate Ŝ of the transmitted vector minimizing the log-likelihood metric, that is
where R is the real-valued covariance matrix of W. When the noise is white, the metric to minimize reduces to ∥Y−HS∥2, and the sphere decoding algorithm provides a maximum likelihood estimate at a substantial cost in terms of complexity. Other commonly used methods that do not perform as well as ML include Nulling and Canceling (N&C), and many other known algorithms along with low performance Minimum Square Error (MSE) or even Zero Forcing (ZF) detections.
Note the log-likelihood metric obtained from a received vector Y and a constellation vector S:
LY(S)=(Y−HS)TR−1(Y−HS) (6)
By definition, the necessary and sufficient condition for a detected vector S0 to be the ML decision for a received vector Y is that no other constellation vector produces a smaller likelihood metric (6): LY(S)≧LY(S0)∀S. Equivalently, S0 is the ML decision if there does not exist any non-zero variation Δ from S0 that reduces (6) to: LY(S0+Δ)>LY(S0)∀Δ≠0. A necessary condition can be deduced from the previous inequality when considering only a subset of all the possible variations Δ. An optimality test may be constructed based on this necessary condition when considering only the first and second-order variations on Δ. The assumption supporting this restriction is that when a low quality detector does not output the ML symbol, there is usually at least one better symbol that differs from it only by one or two elements. For illustration purposes, and not by way of limitation, the following description is presented in the context of Quadrature Amplitude Modulation (QAM).
Consider the tentative symbol S0, and a first-order variation Δn=[0 . . . δ . . . 0]T where the subscript n indicates that δ, the only non-zero element of Δn, is located at the nth line. If the assumption is made that H is pseudo-invertible with pseudo-inverse {hacek over (H)}−1, the log-likelihood metric of S0+Δn can be shown as
LY(S0+Δn)=LY(S0)+ΔnTRHΔn+2(S0−{hacek over (H)}−1Y)TRHΔn (7)
where RH=HTR−1H. When the noise is white, this matrix is proportional to the Gramm matrix HTH. If we further note {tilde over (S)}={hacek over (H)}−1 Y the zero forcing estimate obtained from Y, we obtain:
L(S0+Δn)=L(S0)+ΔnTRHΔn+2(S0−{tilde over (S)})TRHΔn (8)
where the subscript Y is dropped for simplicity. The variation Δn is then of interest if the sum of the last two terms of (8) is negative. Using the fact that only one element of Δn is non zero, and rewriting A=(S0−{tilde over (S)})T, the perturbation reduces the metric when
The range of possibilities for δ depends on the size of the constellation. When QAM constellations are used, where the spacing between adjacent symbols in each dimension is normalized to d, this test may be replaced by the sufficient condition
where the size of the constellation does not appear anymore. We define as a “syndrome” the vector
Vector Γ, with 0<Γ(n)≦1 is discussed in greater detail below. The symbol {circle around (X)} denotes the element-wise product. Γ may be considered as a margin coefficient in the test. Getting an all-negative syndrome does not guarantee that S0 is the ML estimate, but not getting an all-negative syndrome (when Γ(n)=1∀ n) guarantees that S0 is not the ML estimate, and hence this symbol will be reprocessed by a second, more effective, detection scheme.
Assuming that {tilde over (S)} is already available, most of the complexity of this test comes from computing A, which may be obtained from a matrix-vector multiplication. The number of operations required to perform this computation may be comparable to what is needed when an equalizing system is used to obtain {tilde over (S)}. Hence, compared to basic ZF or MSE detection, the computational cost may be doubled. The overhead computation involved in the initialization of the algorithm is that of extracting the diagonal of RH. Considering only the first order variation, with Γ(n)=1∀n somewhat improves the performance of the system but does not guarantee a close to full-ML performance. Being able to recover only this simple type of errors may not be sufficient to extract all the diversity from the received signal. It may be desirable to seek higher-dimensional tests that will improve the performance, but not increase the complexity.
Thus, in various embodiments, by adaptively choosing vector Γ, the syndrome test (9) may be used to also detect any possible second-order improvement. We define the second order perturbation Δnp=[0 . . . Δn . . . 0 . . . δp . . . 0]T where n and p are the indexes of the two non-zero components. Reusing the notations introduced in section 3.1, we obtain:
There is no possible second-order improvement if ∀n; ∀p≠n, and ∀δn; δp in the considered constellation
δn2RH(n;n)+δp2RH(p;p)+2δnA(n)+2δpA(p)+2 δnδpRH(n;p)>0 (11)
Suppose that for simplicity we want to check (11) using only the test (9), with some ad-hoc value of vector Γ. For given values of Γ(n) and Γ(p), the test can detect
Γ(n)δn2RH(n,n)+2δnA(n)>0
Γ(p)δp2RH(p,p)+2δpA(p)>0 (12)
Without loss of generality, we define Γm=max{Γ(n), Γ(p)}. Using some of the properties of RH, it may be shown that (12) implies that
δn2RH(n,n)+δp2RH(p,p)+2δnA(n)+2δpA(p)>(1−Γm)(δn2RH(n,n)+δp2RH(p,p) (13)
Hence the sufficient condition on Γm for (9) to detect both first and second-order improving variations, obtained by comparing (11) and (13):
(1−Γm)(δn2RH(n,n)+δp2RH(p,p)>−2δnδpRH(n,p) (14)
This condition must be satisfied for all n; p≠n, and for all possible δn and δp. Expand δn=ad and δp=bd. Again, d is the spacing between the constellation points in one dimension, and a and b are drawn from a continuous subset of the integer field, with a maximum range depending on the size of the constellation. For example, if 64-QAM are used, |α|≦8, and so is |b|. The normalized spacing d can be simplified, and the sufficient condition on Γm becomes
with the assumption that the diagonal elements of RH are non-zero (which is certain for any actual system). From the definition of Γm, this condition may apply, without further modification, to Γn and Γp. Although it is not straightforward to find the largest possible value of Γ(m) ensuring that (15) is verified for all a and b in a discrete set, we can determine Γm by bounding (15) with a and b in the real field, which is a stronger constrain. Considering the right-hand term of the equation, its extremums are obtained when nulling the derivatives, which leads to only one extremum condition (the extremum is not unique):
This condition leads to the maximums of the considered function. The limit on a and b that was discussed before does not appear anymore. Plugging the ratio in (15), we obtain the sufficient condition on Γ(n) for the detection of all the possible first and second-order improvements using (9):
Because Γ(n) must be selected as large as possible, to ensure that as few vectors as possible fail the test, to reduce the computational load. Searching for Γ(n) for all n requires only one run through the matrix RH:
In data mode, this test is no more complex than the one-dimensional test. However, its initialization may take more computation as the computation of the margin coefficients from vector Γ comes at an extra cost. This extra step does not jeopardize the global complexity. A sample distribution of the margin coefficients is presented in the discussion of
In the definition of vector A=(S0−{tilde over (S)})TRH, the zero-forcing equalized vector {tilde over (S)} was used. However, in various embodiments, it may be replaced, for example, by the MSE equalized vector almost without loss. The motivation for this substitution is that typically, the equalized vector will be used to obtain S0 by slicing. Hence, knowing that MSE offers somewhat better performance than ZF, this replacement may improve the global performance of the system. Also, the first scheme and the reprocessing scheme can be matched for efficiency. For example, using nulling and canceling as the re-processing scheme may lead to MSE as a first scheme, as MSE equalization is actually the first step of the N&C algorithm. Conversely, sphere decoding uses a ZF equalized vector. So a ZF equalizer may be a better choice as the first scheme. However, there is no restriction to the use of an algorithmic scheme even as first scheme. As is discussed in greater detail below in the context of
Discussion will now proceed in the context of an exemplary systems and methods for performing the above described multi-stage detection scheme. Based on the above-developed optimality test, a multistage detection scheme may be applied to an MIMO system.
As discussed briefly above, in lieu of either MSE or ZF detection, various embodiments may use other low complexity schemes to perform first stage decoding with the optimality test being performed on the result of the considered scheme.
Recent work on multicarrier systems has produced several tools that improve the average BER/SNR performance when sub-channel conditions present large differences between tones, due to selective fading and/or colored noise. The average BER performance of the system is, considering the BER=ƒ(SNR) function for the considered constellation, represented by equation (19) as follows:
When the tones' SNRs are in the region ∩ convexity of function ƒ, Jensen's inequality proves that in the case of independently demodulated tones the BER can be represented by equation (20) as follows:
with equality when all SNRs are equal. The exact boundary of the ∩ convexity region depends on the constellation and can be found analytically or numerically. Adaptive power distribution, and the use of ‘minimum BER’ precoders, have been shown to significantly improve performance. Both schemes allow one to obtain equal conditions (SNR) on each subchannel, hence reaching the lower bound on BER when tones are detected independently. Power allocation requires feedback to the transmitter, which is not always practical or even feasible. Power allocation also dramatically modifies the spectrum of the transmitted signal which, may produce issues such as, for example, in terms of power regulation. In contrast, blind precoders do not require feedback and can be conditioned to keep the spectrum unmodified but their joint-ML detection is prohibitively expensive, thus, restricting the solution to sub-optimal MSE detection. Various embodiment of the invention provide a low complexity pseudo-joint-ML algorithm based on the Bernoulli-Gaussian deconvolution approach that does not require any feedback channel and that outperforms MSE detection. In various embodiments, MSE detection is outperformed by more than two dB such as, for example, in the case of heavy multipaths channels.
OFDM systems (as well as discrete multi-tone (DMT)) can be viewed at the receiver as N parallel unitary sub-channels, each with its own channel characteristics, such as, noise, SNR, etc. The system may be modeled by the block diagram shown in
Jensen's inequality guarantees that performance is optimal for independently demodulated tones when all the tones present the same SNR, or, equivalently, the same noise power. However, this result is only true if all sub-channels show SNRs that are in the region of ∩ convexity of the BER v. SNR function for the constellation. The linear precoder M (square complex-valued matrix of size N) and the preceding outputs X′ obtained from a data vector X (at point α on FIG. #) are defined by equation (21) as follows:
X′=MX (21)
It is assumed that the precoding matrix M is invertible in order to be able to recover the data. The vector of received signals Y is then defined at point bin FIG. # as in equation (22) as follows:
Y=X′+W (22)
with W being the vector of noise samples. Hence:
The precoding is inverted at the reception and the received data vector is obtained:
{tilde over (X)}=M−1Y=X+M−1W (24)
Precoders that guarantee that the received noise correlation matrix has a constant diagonal include normalized Hadamard matrices (when they exit) along with discrete Fourier transform (DFT) and inverse DFT (IDFT) matrices (which, are defined for all N). Because precoders are well known in the art, a detailed discussion has been intentionally omitted. For an exemplary discussion refer to “Minimum BER block precoders for zero-forcing equalization,” Y Ding, IEEE Transactions on Signal Processing, 2003, hereby incorporated by reference. However, it must be appreciated that in all cases, the precoder is fixed, does not depend upon the channel conditions and is known at the receiver. It can also be easily confirmed that these three types of precoders do not modify the spectrum of the transmitted signal. It should also be noted that these three types of matrices are unitary, and hence that M−1=M\. For ease of explanation, the DFT matrix has been used as the default precoder.
The noise covariance matrix at the reception is obtained from equation (24) as follows:
RM=E└(M−1W)(M−1W)†┘=M†RM (25)
As is evident from expression (25), RM is not diagonal. Hence, the MSE decision, dimension by dimension, on the received symbols is not optimal, even though it reaches Jensen's bound. Its defect is that it doesn't take advantage of the diversity introduced by the precoder. The maximum likelihood decision {circumflex over (X)} is the one among the constellation symbol vectors that minimize expression (26):
This is obtained by straightforward derivation of the log likelihood function assuming complex circular noise. We can point out here that RM and RM−1 can be fully built from the measured SNRs on each tone (it should be appreciated that these can be obtained at no overhead costs while computing the FEQ coefficients) and the knowledge of M. Thus, equation (27) provides:
RM−1=M†R−1M (27)
There is no need to measure cross correlations which, is a very expensive operation in terms of time and computational resources. A brute force solution is not realistic, as the number of possibilities is PN where P is the number of symbols in the constellation. Restricting the discussion to the case of quadrature amplitude modulation (QAM), if in each dimension of the received vector {tilde over (X)} we limit tests to the 4 symbols surrounding the soft received point {tilde over (X)}(n), the number of tests drops down to 4N. However, this is still challenging and not feasible in practical systems.
Considering the case of one-dimensional perturbation, equation (26) develops into the likelihood metric for a detected vector {circumflex over (X)}0
Lm({circumflex over (X)}0)={tilde over (X)}†RM−1{tilde over (X)}−2Re└{circumflex over (X)}0†RM−1{tilde over (X)}┘+{circumflex over (X)}0†RM−1{circumflex over (X)}0 (28)
Where Re stands for “real part.” To test a one-dimensional perturbation on {circumflex over (X)}0 note that:
Where the subscript n means that x=xRe+jxim is the nth component of Δn. Then, by replacing {circumflex over (X)}0 by {circumflex over (X)}1={circumflex over (X)}0+Δn let
Lm({circumflex over (X)}1)=Lm({tilde over (X)}0)+2Re└({circumflex over (X)}0−{tilde over (X)})†RM−1Δn┘+Δn†RM−1Δn (30)
The perturbation Δn hence reduces the likelihood metric if
2Re[({circumflex over (X)}0−{tilde over (X)})†RM−1Δn]+Δn†RM−1Δn<0 (31)
Knowing that the perturbation Δn only has one non-zero component, we obtain
In the case of a regularly spaced constellation, such as standard normalized QAM, xre and xim∈{0; ±2}. FIG. # provides an example of this.
other term of expression (31) is:
2Re[({circumflex over (X)}0−{tilde over (X)})†RM−1Δn]=2Re[xA(n)]=2(xreAre(n)−ximAim(n)) (35)
The modification Δn is then of interest only if
2(xreAre(n)−ximAim(n))+(xre2+xim2)α<0 (36)
Notice that the modification of the real part only (x=±2) and imagine part only (x=±2j) can be led independently while producing the same result as extensive testing of all cases, when the target is not only to get a negative metric but the most negative one. Thus expression (18) splits into the following two expressions:
Moreover, if the search is limited to the nearest four points in each dimension (that is, for n=1 . . . N) as previously mentioned, to stay in the neighboring QPSK, it is only necessary to test one real perturbation (x=2 or x=−2) and one imaginary perturbation per dimension. This can be compared to a block decoding using a CHASE algorithm such as disclosed in “Limited-trial CHASE decoding,” G. Arico, IEEE Transactions on Information Theory, 49(11): 2972–2975, 2003, hereby incorporated by reference in its entirety. It is evident from expressions (18) and (19) that the improvement can be tested independently on each dimension, thus removing the need for joint processing.
As discussed herein, various embodiments of the invention provide systems and methods for pseudo-maximum likelihood detection of complex valued signals based on simplified B-G algorithms. For the purposes of example, Gray mapping and ±1 bit labeling has been assumed. Referring now to
In the exemplary detection algorithm discussed herein, the initial detected vector is set to {circumflex over (X)}0=MSE[{tilde over (X)}]. That is, in each dimension, the closest symbol must be determined. This basic symbol detection scheme reaches Jensen's bound. If the constellations used are large than QPSK, only the QPSK surrounding {tilde over (X)} are considered, such as, as shown in FIG. #. It should be noted that bre(n) and bim(n) respectively are the bit coded on the real and imaginary parts of the neighboring QPSK, n∈{1, . . . , N}. FIG. # illustrates this procedure, in the case of a 16-QAM.
The conditions on the permutation of bre(n) and bim(n) are, once A is computed, obtained directly from expression (37) by inspection of the possible cases. If bd(n)=1 (with d=re or d=im), the only reasonable perturbation of the d-part of this dimension is xd=−2. conversely, if bd(n)=−1, xd=2 is the only perturbation that allows us to stay in the considered QPSK:
where the index n differentiates the N dimensions of the detected vector. This expression is based on the assumption that constellation points are spaced as in
In various embodiments, the algorithm discussed above can be run iteratively after updating A using the following expression:
where D is the set of the perturbations that reduces the likelihood costs function. However, the additional gain is typically low compared to the benefit of the first iteration, as the algorithm converges quickly.
As one example, the method was tested over one of the wireless channels prototyped by the IEEE group for Ultra Wide Band (UWB) systems (802.15.3a) as discussed in IEEE 802.15 Working Group for WPANs, Channel subcommittee final report 2003, hereby incorporated by reference in its entirety.
Referring now to
We present the results obtained by simulation using the proposed scheme, when the initial detector is an MSE equalizer/slicer, and the reprocessing scheme in a sphere decoder. We used a 4-transmit, 3-receive antennas, 64-QAM system with white noise and a precoded space time code of time-spread two with four symbols per block, as detailed in (19).
A general system was specifically chosen and specificity was avoided, such as, orthogonal space time code, unitary precoder, and so forth. In a test case, performance simulations were run on 100 complex, i.i.d. Gaussian channels with unitary variance.
A false alarm occurs when a symbol is reprocessed while the initial detection provided the ML estimate (or more generally, the same estimate that the second scheme will output). Because a one dimensional test is being used to perform a two-dimensional check, the ratio of false alarms may be relatively important. Ideally, in order to minimize the overall computational load, only the wrongly detected symbols are reprocessed. It was observed that the probability of false alarm can be reduced, specifically at high SNR, by determining which symbol vectors are close enough to their hard estimate that they cannot be wrongly detected. If we note R0 the smallest possible distance between two adjacent lattice point, the estimate S0 is guaranteed to be the ML estimate, in the case of white noise, if
This distance is defined in the transformed lattice space, and is obtained at some cost in terms of complexity. However, reusing vector A gives a close approximation
with equality in the restrictive case of zero forcing equalization. The cost of this test is that of a vector-vector product (point product). R0 is obtained in one run of the sphere decoder. This procedure does not impair the overall performance of the scheme (error rate), but reduces the ratio of reprocessed vectors. For low SNR, the probability of false alarm remains significant (about fifty percent). However, for high SNR, false alarm almost never occur. The ratio of reprocessed symbols, which drives the overall complexity of the system, shrinks relatively fast, and for typical error rate, the gain is of several order of magnitude. For example, for an uncoded target BER of 10−6, which correspond to a SNR of 16 dB, the sphere decoder is used on the average on less than one symbol every one hundred.
The distribution of the elements of vector Γ for this example is shown in
Referring now to
In typical MIMO-OFDM system, each separate tone faces an independent detection problem. However, the system discussed above in the context of
A low complexity optimality test for identifying badly detected data vectors in MIMO transmission was presented. Using this test as part of an adaptive, multi-stage detection system was shown to reduce significantly the overall complexity of the receiver, without compromising the performance. Nearly any detection scheme can be used with this test, and can benefit from the reduction of the number of calls to the complex algorithm. Finally, it should be appreciated that the same test can be used at each stage of a signal detection system involving more than two schemes, in which case successive stages process fewer and fewer symbols.
The embodiments of the present inventions are not to be limited in scope by the specific embodiments described herein. For example, although many of the embodiments disclosed herein have been described with reference to systems ad methods for multi-stage symbol detection in MIMO transmission, the principles herein are equally applicable to other aspects of signal detection. Indeed, various modifications of the embodiments of the present inventions, in addition to those described herein, will be apparent to those of ordinary skill in the art from the foregoing description and accompanying drawings. Thus, such modifications are intended to fall within the scope of the following appended claims. Further, although some of the embodiments of the present invention have been described herein in the context of a particular implementation in a particular environment for a particular purpose, those of ordinary skill in the art will recognize that its usefulness is not limited thereto and that the embodiments of the present inventions can be beneficially implemented in any number of environments for any number of purposes. Accordingly, the claims set forth below should be construed in view of the full breath and spirit of the embodiments of the present inventions as disclosed herein.
Number | Name | Date | Kind |
---|---|---|---|
5457704 | Hoeher et al. | Oct 1995 | A |
6470474 | Fredrickson et al. | Oct 2002 | B1 |
6580930 | Fulghum et al. | Jun 2003 | B1 |
6751771 | Chuang et al. | Jun 2004 | B2 |
6757337 | Zhuang et al. | Jun 2004 | B2 |
6981201 | Reggiani et al. | Dec 2005 | B2 |
6986098 | Poeppelman et al. | Jan 2006 | B2 |
7089483 | McEwen et al. | Aug 2006 | B2 |
7155660 | Burd | Dec 2006 | B1 |
Number | Date | Country | |
---|---|---|---|
20060059410 A1 | Mar 2006 | US |
Number | Date | Country | |
---|---|---|---|
60654077 | Feb 2005 | US | |
60609002 | Sep 2004 | US |