CN103313274B - A kind of method suppressing random access code false-alarm - Google Patents

A kind of method suppressing random access code false-alarm Download PDF

Info

Publication number
CN103313274B
CN103313274B CN201210065567.8A CN201210065567A CN103313274B CN 103313274 B CN103313274 B CN 103313274B CN 201210065567 A CN201210065567 A CN 201210065567A CN 103313274 B CN103313274 B CN 103313274B
Authority
CN
China
Prior art keywords
detection window
peak value
random access
target detection
window
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210065567.8A
Other languages
Chinese (zh)
Other versions
CN103313274A (en
Inventor
刘建明
陶雄强
李祥珍
邢益海
闫淑辉
胡炜
徐宏
祝锋
邓晓晖
张运会
冯绍鹏
于小红
王永明
金奕丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Potevio Information Technology Co Ltd
Original Assignee
Potevio Institute of Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Potevio Institute of Technology Co Ltd filed Critical Potevio Institute of Technology Co Ltd
Priority to CN201210065567.8A priority Critical patent/CN103313274B/en
Publication of CN103313274A publication Critical patent/CN103313274A/en
Application granted granted Critical
Publication of CN103313274B publication Critical patent/CN103313274B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Alarm Systems (AREA)

Abstract

A kind of method suppressing random access code false-alarm, the method includes: measure the peak value that in target detection window, random access code is corresponding;Described peak value deduction non-targeted detection window is revealed energy and is obtained the correction peak value that random access code is corresponding;Judge whether the user that described target detection window occurs is false-alarm according to described correction peak value and absolute thresholding, if false-alarm, then labelling in described target detection window.After the application embodiment of the present invention, in the case of ensureing the normal access probability of multi-user, effectively suppress false-alarm.

Description

A kind of method suppressing random access code false-alarm
Technical field
The present invention relates to communication technical field, more particularly, to a kind of side suppressing random access code false-alarm Method.
Background technology
For cellular wireless mobile communication system, RACH be used for carrying out multiple access and up time Between initial synchronisation.Training sequence in RACH is referred to as random access code.In some systems, Use the cyclically shifted sequences with Cyclic Prefix as random access code.Such as, use in LTE system ZC sequence, by Cyclic Prefix, is converted into linear convolution cyclic convolution, thus conveniently uses when receiving The realization of frequency domain related algorithm.
In the receiver utilizing random access code designs, often face the false-alarm that relevant peaks energy leakage brings Problem.Accompanying drawing 1 is receiver basic function module, including local sequence generating module 101, receives signal Pretreatment module 102, correlation module 103 and detection and timing estimation module 104.
Receive signal pre-processing module 102 go receptions signal to be transformed into after Cyclic Prefix (CP) frequency domain and The local sequence of local sequence generating module 101 output carries out complex conjugate dot product.Will in correlation module 103 Result carries out anti-Fourier change and is transformed into time domain, can obtain corresponding time domain correlation.Then detection with Timing estimation module 104 finds peak-peak M, estimating noise power σ in each detection window2, and and peak Value detection relative threshold γ compares.Can be peak-peak or other detection limit according to real system M.
There are two kinds of detection threshold at present: relative threshold and absolute thresholding.
Relative threshold: the correlation peak/noise power of signal;At given false-alarm mesh when γ is not send signal The relative threshold determined under mark.
Definitely thresholding: size δ of estimating noise power2, by δ2It is multiplied with relative threshold γ and can obtain definitely Thresholding γa
If M/ is σ2More than γ, then explanation is successfully accessed, on the contrary failure.
In LTE system, use ZC sequence as random access code.Receive signal and be transformed into frequency domain and this Ground sequence carries out complex conjugate dot product, obtains as NZCThe sequence of point.NZCIt is the length of frequency domain ZC sequence, one As be prime number, need zero padding to arrive NIFFTPoint carries out anti-Fourier's change, NIFFTThe integral number power of generally 2. Then to correlation modulus square, the waveform after modulus square as seen from Figure 2.
In the environment of noise power is stable, γaIt is held essentially constant.Along with the increase of signal to noise ratio, signal Performance number increases, and in accompanying drawing 2, the secondary lobe spilling of signal can be increasing, can spill into adjacent detection window. If the peak value of adjacent detection window is more than γa, false-alarm can be caused when detection, not have in the most current detection window There is user to send, but have been detected by user.False-alarm is mainly by nearer several of distance objective detection window Adjacent detection window energy leakage causes, it is therefore desirable to suppress the false-alarm that these adjacent detection windows cause.
Additionally, in the environment of frequency deviation (residual frequency departure and Doppler frequency shift), the position can fixed at distance peak value Put generation submaximum value.It is d in this fixing position defined in LTE systemu, it and currently used root Relating to parameters.Along with the increase of frequency deviation, distance main peak ± du, ± 2du, ± 3duEtc. submaximum value increasing.
If using single window detection scheme, at distance main peak ± du, ± 2duEtc. submaximum value can enter other inspection Survey in the range of window.If peak value exceedes thresholding, illustrate to detect another one user, so can cause void Alert.
If using three window Merge Scenarioses, by positive and negative submaximum value (distance main peak value ± du) merge with main peak Detection.Apart from main window ± 2du, ± 3duEtc. submaximum value possibly be present at the main detection window of another one user Or in duplicate detection window.When the detection window comprising these positions detects, if peak value exceedes door Limit, illustrates to detect another one user, so can cause false-alarm.
Use some technology that false-alarm is suppressed at present.
For example, it is contemplated that to the Energy Leaking of relevant peaks, in a certain distance of peak value periphery detected not Detect.Although avoiding false-alarm to a certain extent.But when multiple access, may can't detect away from User close to from so that user close together is shielded, causes the decline of detection performance.
For another example, after receiving terminal random access code carries out time-domain correlated detection, when certain user being detected, Frequency bias properties according to ZC sequence finds the position of the false-alarm caused by this user.When detecting other window, These positions can be avoided to reach to suppress the purpose of false-alarm.But under the scene of multi-user, some is used If family causes the position that exactly another one user normally accesses, position of false-alarm, can make to detect To user lose the chance of access, reduce the detection probability of multi-user.
To sum up, existing suppression false-alarm technology exists the problem reducing the normal access probability of multi-user.
Summary of the invention
The embodiment of the present invention proposes a kind of method suppressing random access code false-alarm, is ensureing that multi-user is normal In the case of access probability, effectively suppress false-alarm.
The technical scheme of the embodiment of the present invention is as follows:
A kind of method suppressing random access code false-alarm, the method includes:
Measure the peak value that in target detection window, random access code is corresponding;
Described peak value deduction non-targeted detection window is revealed energy and is obtained the correction peak value that random access code is corresponding;
Judge whether the user that described target detection window occurs is empty according to described correction peak value and absolute thresholding Alert, if false-alarm, then labelling in described target detection window.
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: to all of Detection window carries out pre-detection, determines target detection window in the detection window detect peak value.
Described in the detection window detect peak value, determine that target detection window includes:
When high s/n ratio, described peak value is more than absolute thresholding, and distance detects that the detection window of peak value is nearer In K detection window, at least the peak value of a detection window is more than absolute thresholding, it is determined that the inspection of peak value detected Surveying window is target detection window, and K is less than or equal to 4.
Described in the detection window detect peak value, determine that target detection window includes:
In the case of there is frequency displacement, described peak value is more than absolute thresholding, determines each peak value being detected Detection window is target detection window.
It is to be had detected that in the non-targeted detection window of user by least one that described non-targeted detection window reveals energy The peak value that random access code is corresponding detects the product of inhibitive factor corresponding to window and determines with described non-targeted.
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out Penetrate a random access lead code, measure the peak value that each detection window occurs;
At high s/n ratio and when at most having 2 adjacent windows that user occurs, described inhibitive factor include the first suppression because of Son and the second inhibitive factor;
First inhibitive factor is equal to AK-1With AKRatio, AK-1It it is target detection window previous detection window label For the energy of K-1 detection window, AKIt it is the peak value of target detection window;
Second inhibitive factor is equal to AK-2With AKRatio, AK-2It is that window is previous is numbered K-2 in K-1 detection Detection window peak value;
K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window The factor;
K-2 detection window is numbered corresponding second suppression of detection window of K+2 with K+1 detection window later detection window The factor.
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out Penetrate random access lead code, measure the peak value of each detection window;
At high s/n ratio and time at least user occur in 3 adjacent windows, described inhibitive factor include the first suppression because of Son and the second inhibitive factor;
First inhibitive factor is equal to AK-1With AKRatio, AK-1It it is target detection window previous detection window label For the peak value of K-1 detection window, AKIt it is the peak value of target detection window;
Second inhibitive factor is equal to zero;
K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window The factor;
K-2 detection window is numbered corresponding second suppression of detection window of K+2 with K+1 detection window later detection window The factor.
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out Penetrate random access lead code, measure the peak value of each detection window;
At high s/n ratio and time at least user occur in 3 adjacent windows, described inhibitive factor include the first suppression because of Son and the second inhibitive factor;
First inhibitive factor is equal to AK-1With AKRatio, AK-1It it is target detection window previous detection window label For the energy of K-1 detection window, AKIt it is the peak value of target detection window;
Second inhibitive factor is equal to AK-2With AKRatio, AK-2It is that window is previous is numbered K-2 in K-1 detection Detection window peak value;
K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window The factor;
K-2 detection window is numbered corresponding second suppression of detection window of K+2 with K+1 detection window later detection window The factor.
Farther include between the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out Penetrate random access lead code, measure the peak value of each detection window;
In the case of there is frequency displacement, described inhibitive factor includes at least one sequence inhibitive factor;
The described sequence factor is equal to AK+dWith AKRatio, AK+dBe distance objective detection window be the detection of d The peak value of window, AKIt it is the peak value of target detection window.
Described judge that whether user that described target detection window occurs is according to described correction peak value and absolute thresholding False-alarm includes:
Described correction peak value is less than absolute thresholding, and the user that the most described target detection window occurs is false-alarm;
Otherwise, it determines the user that described target detection window occurs is not false-alarm.
From technique scheme it can be seen that in embodiments of the present invention, target detection window is first measured The peak value that middle random access code is corresponding;The most described peak value deduction non-targeted detection window reveal energy obtain with The correction peak value that machine access code is corresponding;Described target detection is judged according to described correction peak value and absolute thresholding Whether the user that window detects is false-alarm, if described target detection window is false-alarm, then in described target detection Labelling in window.Owing to may determine that whether target detection window is false-alarm according to correction peak value and absolute thresholding, False-alarm is effectively suppressed in the case of ensure that the normal access probability of multi-user.
Accompanying drawing explanation
Fig. 1 is the structural representation of receiver basic function module;
Fig. 2 is the waveform diagram after modulus square;
Fig. 3 is the method flow schematic diagram of embodiment of the present invention suppression random access code false-alarm.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention express clearer, below in conjunction with attached The present invention is further described in more detail for figure and specific embodiment.
In embodiments of the present invention, whether at high s/n ratio still in the case of frequency deviation, detain in peak value Unless the energy that target detection window is revealed is obtained with revising peak value, judge that target is examined further according to revising peak value Whether the user surveying window appearance is false-alarm.In the case of so ensure that the access probability of normal multi-user, Effectively suppress false-alarm.
See the method flow schematic diagram that accompanying drawing 3 is suppression random access code false-alarm and specifically include following steps:
The peak value that in step 301, measurement target detection window, random access code is corresponding.
First, all of detection window is carried out pre-detection, i.e. detect the peak value in each detection window or other inspection Measure, such as energy etc..Target detection window is determined in the detection window detect peak value.Wherein, this peak value More than absolute thresholding.When high s/n ratio, distance detects that detection K of window of peak value detects in window at least There is the peak value of a detection window more than absolute thresholding, it is determined that detection window peak value being detected is target detection window. In LTE system, general K is less than or equal to 4 based on experience value.Certainly discounting for the problem of amount of calculation, In order to ensure the degree of accuracy calculated, then the value of K is the bigger the better.In the case of there is frequency displacement, here Determine include peak value be more than thresholding each detection window be target detection window.
Afterwards, peak value the record that in target detection window, random access code is corresponding is measured.
Step 302, described peak value deduction non-targeted detection window is revealed energy and is obtained corresponding the repairing of random access code Positive peak;
Due to the energy likely having non-targeted detection window to reveal in target detection window, it is therefore desirable to revise step 301 peak values measured.The energy that the peak value deduction non-targeted detection window that random access code is corresponding is revealed is the most random The correction peak value that access code is corresponding.Wherein, non-targeted detection window reveals energy is to be had detected that by least one In the non-targeted detection window of user peak value corresponding to random access code and this non-targeted detect suppression corresponding to window because of The product of son determines.
Step 303, judge, according to described correction peak value and definitely thresholding, the user that described target detection window occurs Whether it is false-alarm, if false-alarm, then labelling in described target detection window.
If the correction peak value that step 302 obtains is less than absolute thresholding, it is determined that target detection window is false-alarm, This target detection window is marked;Otherwise, it determines be not false-alarm.
Technical scheme is described in detail below in conjunction with specific embodiment.
Embodiment one
In the case of high s/n ratio, the detection window corresponding to root parameter u of current random access code has N number of (detection window index is 1,2,3......, N).First all of detection window is carried out pre-detection, used (flag=1 represents and has been detected by peak value for the judgement mark flag at family;Flag=0 represent be not detected by peak value).
There is user in k-th detection window, its pre-detection mark flagK=1, k-th detection window is probably very Positive user, it is also possible to owing to the leakage of its adjacent detection window energy causes.
The size of the peak value (or other detection limit) of k-th user is MaxvalueK, it is revised Peak value (or other detection limit) size is designated as Maxvalue_rK, Maxvalue_rKIt is by MaxvalueKIn Obtain after possible adjacent window energy leakage part deduction.
Transmitting terminal launches a random access lead code, measures the peak value of each detection window.Pass through at receiving terminal After process, the index of target detection window is K, and the size of its peak value (or other detection limit) is AK.Due to User is different with the distance of base station, and the energy causing being leaked to adjacent detection window can slightly difference.Distance base station Nearer user, the energy being leaked to K-1 detection window is relatively leaked to the energy of K+1 detection window relatively greatly, lets out Dew is A to the peak value of K-1 detection windowK-1, then the first inhibitive factor G1=AK-1/AK.It is leaked to K-2 The energy that the energy of detection window is leaked to K+2 detection window relatively is relatively big, is leaked to the peak value of K-2 detection window For AK-2, then the second inhibitive factor G2=AK-2/AK
When high s/n ratio and during N >=1, N is the number of detection window, described inhibitive factor include G1 and G2.K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window The factor;The detection window corresponding second that K-2 detection window is numbered K+2 with K+1 detection window later detection window presses down The factor processed.
N=4, be up to three adjacent windows preliminary examinations measure user, then:
Maxvalue_rK=MaxvalueK-Maxvalue K+1*G1*flag K+1
-Maxvalue K-1*G1*flag K-1
-Maxvalue K+2*G2*flag K+2
N=3, be up to two adjacent windows preliminary examinations measure user, then:
Maxvalue_rK=MaxvalueK-Maxvalue K+1*G1*flag K+1
-Maxvalue K-1*G1*flag K-1
N=2, be up to one adjacent windows preliminary examination measures user, then:
Maxvalue_rK=MaxvalueK-Maxvalue K+1*G1*flag K+1
Wherein flag value is 0 or 1, is that 1 expression this detection window in pre-judgement user occurs, is 0 expression User does not occur.Consider adjacent windows possible influence each other after, carry out conclusive judgement: if Maxvalue_rK< γα, it is determined that flagK=0 is false-alarm;Otherwise, the pre-court verdict before maintaining.
flag K=1.
Embodiment two
In the case of example two and embodiment one are suitable for high s/n ratio.In embodiment two, at least 3 Individual adjacent window, i.e. N >=4.Due in the embodied case, when inhibitive factor includes G1 and G2, amount of calculation The biggest.In order to avoid substantial amounts of calculating, take into consideration only affecting G2 and can make G2=0 between adjacent windows.G1 Determination method identical with embodiment one.Certainly amount of calculation is not being considered, it is ensured that in the case of precision, adopt Optimal by the scheme in embodiment one.
Embodiment three
In the environment of frequency deviation (residual frequency departure and Doppler frequency shift), the detection window that root parameter u is corresponding is entered Row detection, obtains the judgement mark flag of user.If flagK=1, peak is MaxindexK。 Maxindexk±(du, 2du.......ndu) other all may be caused to detect window false-alarm.But it is as the increase of n, lets out The energy of leakage can be more and more less.Therefore distance main peak value ± d is mainly considered when using single window detectionuThe energy at place Leaking the impact on other detection window, all users that can obtain flag=1 may cause the position collection of false-alarm Close Flasealarm_index.If needing consideration ± 2du, 3du.......nduPosition on energy leakage, can be right Flasealarm_index expands.
If using three windows to merge detection, obtain the judgement mark flag of user.Detection is merged using three windows Time mainly consider distance main peak value ± 2duThe impact on other detection window of the energy leakage at place, can obtain flagK All users of=1 may cause location sets Flasealarm_index of false-alarm.If needing to consider ±3du.......nduPosition on energy leakage, Flasealarm_index can be expanded.
The flag of certain userK=1, first determine whether in Flasealarm_index the false alarm position of other user is whether Enter target detection window.If it does, the number of record false alarm position and the peak value of correspondence thereof, would leak into The energy of target detection window removes;If it does not exist, then terminate.Wherein, in Flasealarm_index The position being likely to occur including false-alarm, the physical location of target detection window is also known, it can be determined that whether Enter target detection window.
The size of the peak value (or other detection limit) of k-th user is Maxvaluek, by its revised peak Value (or other detection limit) size is designated as Maxvalue_rk.M position is had to enter into the model of target detection window Enclose, then
Maxvalue _ r K = Maxvalue K - Σ m = 1 M ( Maxvalue m * G m )
GmFor there is the sequence inhibitive factor under offset frequency situation.In the community of LTE low-speed mode, Yong Huyi Dynamic meeting causes Doppler frequency shift, and produced frequency deviation is more stable.Only have a user at transmitting terminal to launch Random access lead code, at receiving terminal after processing, the index of target detection window is K, its peak value (or Other detection limit) size be AK, position is MaxindexK.Under a certain fixing frequency deviation, distance MaxindexKPositive duPosition on the size of peak value (or other detection limit) be , then In like manner can be with computed range MaxindexKOther integral multiple duSequence inhibitive factor on position.Sequence suppression because of Son can do suitable adjustment according to the translational speed of actual channel scenario and user.
After the impact considering frequency deviation, carry out conclusive judgement: if Maxvalue_rK< γα, it is determined that flag K=0 is false-alarm;Otherwise, pre-judgement structure flag before maintainingK=1.
The above, only presently preferred embodiments of the present invention, it is not intended to limit the protection of the present invention Scope.All within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, Should be included within the scope of the present invention.

Claims (6)

1. the method suppressing random access code false-alarm, it is characterised in that the method includes:
Measure the peak value that in target detection window, random access code is corresponding;
Described peak value deduction non-targeted detection window is revealed energy and is obtained the correction peak value that random access code is corresponding;
Judge whether the user that described target detection window occurs is empty according to described correction peak value and absolute thresholding Alert, if false-alarm, then labelling in described target detection window;
It is to be had detected that in the non-targeted detection window of user by least one that described non-targeted detection window reveals energy The peak value that random access code is corresponding detects the product of inhibitive factor corresponding to window and determines with described non-targeted;
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out Penetrate a random access lead code, measure the peak value that each detection window occurs;
At high s/n ratio and when at most having 2 adjacent windows that user occurs, described inhibitive factor include the first suppression because of Son and the second inhibitive factor;
First inhibitive factor is equal to AK-1With AKRatio, AK-1It it is target detection window previous detection window label For the peak value of K-1 detection window, AKIt it is the peak value of target detection window;
Second inhibitive factor is equal to AK-2With AKRatio, AK-2It is that window is previous is numbered K-2 in K-1 detection Detection window peak value;
K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window The factor;
K-2 detection window is numbered corresponding second suppression of detection window of K+2 with K+1 detection window later detection window The factor;
Or,
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out Penetrate random access lead code, measure the peak value of each detection window;
At high s/n ratio and time at least user occur in 3 adjacent windows, described inhibitive factor include the first suppression because of Son and the second inhibitive factor;
First inhibitive factor is equal to AK-1With AKRatio, AK-1It it is target detection window previous detection window label For the peak value of K-1 detection window, AKIt it is the peak value of target detection window;
Second inhibitive factor is equal to zero;
K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window The factor;
K-2 detection window is numbered corresponding second suppression of detection window of K+2 with K+1 detection window later detection window The factor;
Or,
Farther include before the peak value that in described measurement target detection window, random access code is corresponding: transmitting terminal is sent out Penetrate random access lead code, measure the peak value of each detection window;
At high s/n ratio and time at least user occur in 3 adjacent windows, described inhibitive factor include the first suppression because of Son and the second inhibitive factor;
First inhibitive factor is equal to AK-1With AKRatio, AK-1It it is target detection window previous detection window label For the peak value of K-1 detection window, AKIt it is the peak value of target detection window;
Second inhibitive factor is equal to AK-2With AKRatio, AK-2It is that window is previous is numbered K-2 in K-1 detection Detection window peak value;
K-1 detection window is numbered corresponding first suppression of detection window of K+1 with target detection window later detection window The factor;
K-2 detection window is numbered corresponding second suppression of detection window of K+2 with K+1 detection window later detection window The factor.
The method suppressing random access code false-alarm the most according to claim 1, it is characterised in that described survey Farther include before the peak value that in amount target detection window, random access code is corresponding: all of detection window is carried out Pre-detection, determines target detection window in the detection window detect peak value.
The most according to claim 2 suppress random access code false-alarm method, it is characterised in that described Detect in the detection window of peak value and determine that target detection window includes:
When high s/n ratio, described peak value is more than absolute thresholding, and distance detects that the detection window of peak value is nearer In K detection window, at least the peak value of a detection window is more than absolute thresholding, it is determined that the inspection of peak value detected Surveying window is target detection window, and K is less than or equal to 4.
The most according to claim 2 suppress random access code false-alarm method, it is characterised in that described Detect in the detection window of peak value and determine that target detection window includes:
In the case of there is frequency displacement, described peak value is more than absolute thresholding, determines each peak value being detected Detection window is target detection window.
The method suppressing random access code false-alarm the most according to claim 1, it is characterised in that described survey Farther include before the peak value that in amount target detection window, random access code is corresponding: transmitting terminal launches Stochastic accessing Lead code, measures the peak value of each detection window;
In the case of there is frequency displacement, described inhibitive factor includes at least one sequence inhibitive factor;
Described sequence inhibitive factor is equal to AK+dWith AKRatio, AK+dBe distance objective detection window be d The peak value of detection window, AKIt it is the peak value of target detection window.
The method suppressing random access code false-alarm the most according to claim 1, it is characterised in that described Judge whether the user that described target detection window occurs is that false-alarm includes according to described correction peak value and absolute thresholding:
Described correction peak value is less than absolute thresholding, and the user that the most described target detection window occurs is false-alarm;
Otherwise, it determines the user that described target detection window occurs is not false-alarm.
CN201210065567.8A 2012-03-13 2012-03-13 A kind of method suppressing random access code false-alarm Expired - Fee Related CN103313274B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210065567.8A CN103313274B (en) 2012-03-13 2012-03-13 A kind of method suppressing random access code false-alarm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210065567.8A CN103313274B (en) 2012-03-13 2012-03-13 A kind of method suppressing random access code false-alarm

Publications (2)

Publication Number Publication Date
CN103313274A CN103313274A (en) 2013-09-18
CN103313274B true CN103313274B (en) 2016-12-14

Family

ID=49137950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210065567.8A Expired - Fee Related CN103313274B (en) 2012-03-13 2012-03-13 A kind of method suppressing random access code false-alarm

Country Status (1)

Country Link
CN (1) CN103313274B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106454934B (en) * 2016-11-22 2019-07-09 武汉虹信通信技术有限责任公司 A kind of false-alarm signal detecting method and base station

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101248593A (en) * 2005-12-05 2008-08-20 中兴通讯股份有限公司 Method for accidental access detecting collision reprocessing for improving user access rate
CN101295999A (en) * 2008-06-27 2008-10-29 中兴通讯股份有限公司 Detection method for accidental precursor access
CN101944929A (en) * 2009-07-06 2011-01-12 中兴通讯股份有限公司 Detection method and device based on random access process

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101248593A (en) * 2005-12-05 2008-08-20 中兴通讯股份有限公司 Method for accidental access detecting collision reprocessing for improving user access rate
CN101295999A (en) * 2008-06-27 2008-10-29 中兴通讯股份有限公司 Detection method for accidental precursor access
CN101944929A (en) * 2009-07-06 2011-01-12 中兴通讯股份有限公司 Detection method and device based on random access process

Also Published As

Publication number Publication date
CN103313274A (en) 2013-09-18

Similar Documents

Publication Publication Date Title
CN101295999B (en) Detection method for accidental precursor access
US8781467B2 (en) Technique for cell signature determination
CN1134924C (en) Adaptive acoqisition system for CDMA and spread spectrum systems compensating for frequency offset and noise
EP3104657B1 (en) Method, device and system for detecting random access signal in interference environment
CN104022996B (en) Channel estimation-based timing synchronization method for orthogonal frequency division multiplexing (OFDM) system
CN104535275B (en) Underwater gas leakage amount detection method and device based on bubble acoustics
CN108683482B (en) Method and device for estimating timing position
CN102523185B (en) Preamble sequence detection method and device
CN102111180A (en) Method and device for estimating signal interference and noise ratio
CN101489238A (en) Time difference measuring method, system and apparatus
CN103313274B (en) A kind of method suppressing random access code false-alarm
CN110289926B (en) Spectrum sensing method based on symmetric peak values of cyclic autocorrelation function of modulation signal
CN107592183A (en) A kind of multiuser signal detection method and device applied to non-orthogonal multiple system
CN107018530B (en) Interference source positioning method and device
Subekti et al. Spectrum sensing for cognitive radio using deep autoencoder neural network and SVM
CN110351825A (en) NPRACH signal detecting method, device, NPRACH receiver and storage medium
CN106332266A (en) Data processing method and related devices
CN105099966A (en) PRACH detection method and apparatus
CN109040947A (en) Position the method, apparatus and computer readable storage medium of remote interference source
CN105306097B (en) A kind of detection method of accidental access signal, device and system
CN106454934A (en) False alarm signal detection method and base station
CN103687046B (en) Detection method and apparatus of random access preamble sequence
CN104219775B (en) A kind of method for improving Stochastic accessing detection robustness
CN104135774A (en) Method and device of anti-frequency-offset detection of random access preamble
CN108235445A (en) A kind of method and apparatus that characteristic sequence is detected in wireless communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100080 Beijing, Haidian, North Street, No. two, No. 6, No.

Patentee after: POTEVIO INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 100080 Beijing, Haidian, North Street, No. two, No. 6, No.

Patentee before: PETEVIO INSTITUTE OF TECHNOLOGY Co.,Ltd.

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Method for inhibiting random access code false alarm

Effective date of registration: 20171012

Granted publication date: 20161214

Pledgee: Bank of Beijing Limited by Share Ltd. Century City Branch

Pledgor: POTEVIO INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: 2017990000948

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20180112

Granted publication date: 20161214

Pledgee: Bank of Beijing Limited by Share Ltd. Century City Branch

Pledgor: POTEVIO INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: 2017990000948

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Method for inhibiting random access code false alarm

Effective date of registration: 20180117

Granted publication date: 20161214

Pledgee: Bank of Beijing Limited by Share Ltd. Century City Branch

Pledgor: POTEVIO INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: 2018990000033

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20181017

Granted publication date: 20161214

Pledgee: Bank of Beijing Limited by Share Ltd. Century City Branch

Pledgor: POTEVIO INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: 2018990000033

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Method for inhibiting random access code false alarm

Effective date of registration: 20181026

Granted publication date: 20161214

Pledgee: Bank of Beijing Limited by Share Ltd. Century City Branch

Pledgor: POTEVIO INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: 2018990000975

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20200708

Granted publication date: 20161214

Pledgee: Bank of Beijing Limited by Share Ltd. Century City Branch

Pledgor: POTEVIO INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: 2018990000975

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method of suppressing random access code false alarm

Effective date of registration: 20200730

Granted publication date: 20161214

Pledgee: Bank of Beijing Limited by Share Ltd. Century City Branch

Pledgor: POTEVIO INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: Y2020980004562

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20210715

Granted publication date: 20161214

Pledgee: Bank of Beijing Limited by Share Ltd. Century City Branch

Pledgor: POTEVIO INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: Y2020980004562

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161214

CF01 Termination of patent right due to non-payment of annual fee