Method and apparatus for correcting multi-input multi-output beamforming pattern in wireless communication system

    公开(公告)号:US12132537B2

    公开(公告)日:2024-10-29

    申请号:US17756551

    申请日:2020-11-18

    CPC classification number: H04B7/0456 H04W16/28 H04W24/02

    Abstract: According to a method of an embodiment of the present disclosure, a method for correcting a beamforming pattern of a base station by an analysis server of a base station management network may comprise the steps of: when network management information is received from a first base station, identifying whether or not the network management information indicates the occurrence of a failure in an antenna element of the first base station; when the network management information indicates the occurrence of the failure in the antenna element of the first base station, analyzing an effect of a beamforming pattern of the first base station and analyzing a change in a cell coverage; on the basis of the result of the analysis, determining a first beamforming pattern for compensating for the failure in the antenna element; and transmitting, to the first base station, information about the first beamforming pattern by including the information in management control information.

    Terminal and application synchronization method thereof

    公开(公告)号:US10003617B2

    公开(公告)日:2018-06-19

    申请号:US14208498

    申请日:2014-03-13

    CPC classification number: H04L65/1066 H04L67/1095

    Abstract: An application synchronization method for use in a terminal is provided. The application synchronization method includes acquiring an alarm registration request of a first repetitive synchronization operation, acquiring a next execution time of a second repetitive synchronization operation associated with a same application as an application of the first repetitive synchronization operation, adjusting, if a difference between an alarm time of the alarm registration request of the first repetitive synchronization operation and the next execution time of the second repetitive synchronization operation is less than or equal to a threshold value, the alarm time of the alarm registration request of the first repetitive synchronization operation according to the next execution time of the second repetitive synchronization operation, and registering the adjusted alarm time.

    Root cause analysis and automation using machine learning

    公开(公告)号:US11496353B2

    公开(公告)日:2022-11-08

    申请号:US15929951

    申请日:2020-05-29

    Abstract: A method for discovering and diagnosing network anomalies. The method includes receiving key performance indicator (KPI) data and alarm data. The method includes extracting features based on samples obtained by discretizing the KPI data and the alarm data. The method includes generating a set of rules based on the features. The method includes identifying a sample as a normal sample or an anomaly sample. In response to identifying the sample as the anomaly sample, the method includes identifying a first rule that corresponds to the sample, wherein the first rule indicates symptoms and root causes of an anomaly included in the sample. The method further includes applying the root causes to derive a root cause explanation of the anomaly and performing a corrective action to resolve the anomaly based on the first rule.

    Terminal and application synchronization method therefor

    公开(公告)号:US10075409B2

    公开(公告)日:2018-09-11

    申请号:US14304288

    申请日:2014-06-13

    CPC classification number: H04L51/38

    Abstract: A method and apparatus for application synchronization are provided. The method for application synchronization in a terminal includes receiving a first alarm registration request, determining whether a data transmission and reception action of an application corresponding to the first alarm registration request is detected within a preset time after a trigger time of the first alarm registration request, and estimating, when a data transmission and reception action of the application corresponding to the first alarm registration request is detected within the preset time after the trigger time of the first alarm registration request, the period of a repetitive synchronization activity associated with the first alarm registration request, and adjusting the execution time of the repetitive synchronization activity according to the period estimation result.

    Method for controlling contents and electronic device thereof

    公开(公告)号:US09973505B2

    公开(公告)日:2018-05-15

    申请号:US14995918

    申请日:2016-01-14

    CPC classification number: H04L63/10 H04L63/101 H04L63/102

    Abstract: The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the above technologies, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method for controlling contents and an electronic device thereof are provided. An operation method of an electronic device includes the operations of setting an access authority for one or more contents, if there is a request for an access of at least one application to the contents, resetting the access authority for the contents, and controlling the access by the application to the contents in accordance with the reset access authority of the application for the contents.

    ROOT CAUSE ANALYSIS AND AUTOMATION USING MACHINE LEARNING

    公开(公告)号:US20200382361A1

    公开(公告)日:2020-12-03

    申请号:US15929951

    申请日:2020-05-29

    Abstract: A method for discovering and diagnosing network anomalies. The method includes receiving key performance indicator (KPI) data and alarm data. The method includes extracting features based on samples obtained by discretizing the KPI data and the alarm data. The method includes generating a set of rules based on the features. The method includes identifying a sample as a normal sample or an anomaly sample. In response to identifying the sample as the anomaly sample, the method includes identifying a first rule that corresponds to the sample, wherein the first rule indicates symptoms and root causes of an anomaly included in the sample. The method further includes applying the root causes to derive a root cause explanation of the anomaly and performing a corrective action to resolve the anomaly based on the first rule.

Patent Agency Ranking