Patent application number | Description | Published |
20120243487 | METHOD AND APPARATUS FOR DATA TRANSMISSIONS IN A WIRELESS NETWORK - A method and apparatus for data transmissions in a wireless network are disclosed. A first device may send a first frame to a second device including information regarding a number of pending data frames to be transmitted from the first device to the second device. The first device receives an acknowledgement frame including a number of approved data frames for transmission from the first device to the second device. The first device then may send a plurality of data frames without performing the contention-based channel access procedure in response to the acknowledgement frame. The first device may send a first frame to a second device for requesting data frames that are pending at the second device. The first device receives an acknowledgement frame including a number of pending and approved data frames. The first device may receive a plurality of data frames in response to the acknowledgement frame. | 09-27-2012 |
20130103842 | METHODS, SYSTEMS AND APPARATUSES FOR APPLICATION SERVICE LAYER (ASL) INTER-NETWORKING - Systems and/or methods for providing internetworking among application services layers (ASLs) of different network technologies may be provided. For example, a tunnel anchor point (TAP) may be established. The TAP may be configured to enable communication between a local application in the network and a remote application in a different network. At the TAP, an ASL tunnel may be created to the local application in the network to facilitate the communication. Additionally, a message from the local application may be received where at least a portion of the message may be configured to be provided to a remote ASL and the remote application in the different network to which the local application wishes to communicate. At least the portion of the message may be provided to the remote ASL and the remote application in the different network. | 04-25-2013 |
20130155948 | SYSTEM AND METHOD FOR SHARING A COMMON PDP CONTEXT - Disclosed herein are methods and devices for sharing a packet data protocol (PDP) context among a plurality of devices. For example, a method or sharing a PDP context among a plurality of devices may include a wireless transmit/receive unit (WTRU) sending a request to establish or modify a PDP context. The request to establish or modify the PDP context may include an indication that the WTRU is a member of shared context group. The method may also include the WTRU receiving a response indicating that the request to establish or modify the PDP context was accepted. The method may also include the WTRU acting as a gateway for at least one other device in the shared context group. The request to establish or modify the PDP context may be an attach request. The indication that the WTRU is a member of shared context group may be a group identifier (ID). | 06-20-2013 |
20130170351 | MANAGING DATA MOBILITY POLICIES - Systems, methods, and instrumentalities are disclosed to communicate traffic flow information to a network. A user equipment (UE) may detect a traffic flow (e.g., using one or more of the traffic detection implementations described herein). A 5-tuple associated with the traffic flow may be unknown by the network. The UE may issue an alert to the network. The alert may indicate to the network that the traffic flow has been detected. The UE may determine the 5-tuple associated with the traffic flow. The UE may report the 5-tuple to the network. The report may be in response to one or more of: a request received from the network requesting traffic flow information; or, a determination that a first policy condition has been met. | 07-04-2013 |
20130188515 | METHOD AND APPARATUS FOR SUPPORTING MACHINE-TO-MACHINE COMMUNICATIONS - Method and apparatus for supporting machine-to-machine (M2M) communications in a hierarchical network architecture including an M2M gateway are disclosed. An M2M entity, (such as M2M device, M2M gateway, or M2M network entity), may perform a service capability discovery procedure to discover an M2M service capability entity that may provide an M2M service capability, and register with the discovered M2M service capability entity. The address or identity of the service capability entity may be pre-configured or obtained from the dispatcher server. The M2M entity may indicate a support M2M service identifier and receive an identity or address of the M2M service capability entity mapping the service identifier. The gateway may advertise M2M service identifiers supported by the gateway so that the M2M device may access the gateway if there is a match. The address of M2M service capability entities may be obtained from the core network. | 07-25-2013 |
20130203394 | METHOD AND APPARATUS TO SUPPORT M2M CONTENT AND CONTEXT BASED SERVICES - Devices, computer readable media, and methods for supporting services at an application service layer (ASL) are disclosed. The ASL may be a machine-to-machine (M2M) services capability layer (SCL). Content functions may interpret the data to generate a semantic description of the data. Semantic information associated with data may be stored. Context aware functions may process the semantic description of the data to generate lower level contextual cues. Context aware reasoning functions may process the lower level contextual cues to deduce higher level context. An application or a second ASL may use the contextual cues and the situational context to trigger an action. The ASL may create a trigger condition based on a received message. The ASL may invoke a function based on detecting a trigger condition. The ASL may perform a command based on a received command. The ASL may use a objective function and feedback to control a device. | 08-08-2013 |
20130203412 | IDENTIFIERS AND TRIGGERS FOR CAPILLARY DEVICES - Methods and apparatuses for capillary network device registration implemented in a wireless transmit/receive unit (WTRU) are disclosed. Registration or bootstrap messages may be received by a capillary network device where the WTRU acts as a gateway for communication between the capillary device and a network such as a 3GPP network. A capillary network device identifier (CNDID) is sent to the capillary device. A packet data protocol (PDP) context or PDN connection may be established with the network and the CNDID may be sent to a machine type communications (MTC) server. The WTRU may create the registration message, establish a connection with the network, and forward the registration message to the MTC server. Methods and apparatuses implemented in a network are also disclosed for identifying, addressing, and triggering the capillary devices from the MTC server. The trigger message may include fields for group communication, reducing signaling, and enabling charging. | 08-08-2013 |
20130279373 | METHOD AND APPARATUS FOR PROVIDING AN INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM TRIGGERING SERVICE - A method and apparatus are described for providing triggering services over multiple access networks. A triggering service server (TSS) architecture includes a triggering identity function (TIF) which maintains a database of device and application identifier mappings across multiple access networks, triggering capabilities and triggering preferences. The TSS also includes a triggering decision function (TDF) that uses information from the TIF and determines how triggers should be performed towards a device and/or an application hosted on a particular device. The TSS also includes triggering gateways (T-GWs) that perform triggering in different domains. A “not-registered-triggerable” state may be used to indicate whether an entity, such as a device, application or user can receive triggers although it is not registered in a specific access network. Methods and apparatus are also described for implementing various unassisted triggering and assisted triggering procedures using wireless transmit/receive units (WTRUs), application servers (ASs) and service capability servers (SCSs). | 10-24-2013 |
20140029434 | CONFIGURABLE ARCHITECTURE WITH A CONVERGED COORDINATOR - Methods and apparatus for a configurable architecture with a converged coordinator are described. The converged coordinator may have multiple radio transceivers or interfaces. The converged coordinator may communicate with a plurality of clusters or Personal Area Networks (PANs). The converged coordinator may include a protocol stack with a Convergence Layer and a Converged Medium Access Control (MAC) layer. The converged coordinator may perform channel switching to allow devices to switch from one channel to another (or from one PAN to another). The method may include active channel switching, passive channel switching, and group-based channel switching, as well as two-step active channel switching and one-step active channel switching. The converged coordinator may perform channel switching due to increased congestion or traffic in a particular cluster or PAN. The method may include new messages and fields within messages for use in channel switching. | 01-30-2014 |
20140067902 | METHOD AND APPARATUS FOR USING MULTIPLE UNIVERSAL RESOURCE IDENTIFIERS IN M2M COMMUNICATIONS - A method and apparatus may use multiple URIs (MU) in a single request message for machine-to-machine (M2M) communication networks. Multiple single URI (SU)-type request messages may be received from an application client (e.g. a constrained application protocol (CoAP)/hypertext transfer protocol (HTTP) client) at a (CoAP/HTTP) intermediary node. The multiple SU-type request messages may be aggregated into a single MU-type request message at the intermediary node, and the single MU-type request message may be transmitted to a (CoAP/HTTP) server. A multiple value (MV)-type response message may be received from the (CoAP/HTTP) server. The MV-type response message may be deaggregated into multiple single value (SV)-type response messages. The multiple SV-type response messages may be transmitted to the (CoAP/HTTP) client. | 03-06-2014 |
20140089478 | METHOD AND APPARATUS FOR ACCESSING SERVICES AFFILIATED WITH A DISCOVERED SERVICE PROVIDER - A method and apparatus are described for accessing services affiliated with a service provider. A first discovery procedure may be performed to discover at least one service provider, and a bootstrap procedure may be performed with the at least one discovered service provider. A second discovery procedure may then be performed to determine available service capability layers (SCLs) supported by the at least one discovered service provider. The first discovery procedure may include transmitting a service provider discovery request including information for querying a record database to determine matching service provider discovery records, and receiving a service provider discovery response including a service discovery function record list that matches queries in the service provider discovery request. At least one service provider from the service discovery function record list may be selected to bootstrap with. Various versions of the second discovery procedure are described. | 03-27-2014 |
20140126581 | SYSTEMS, METHODS AND APPARATUS FOR MANAGING MACHINE-TO-MACHINE (M2M) ENTITIES - Systems, methods and apparatus for managing machine-to-machine (M2M) entities are disclosed. Included herein is a method that may include implementing one or more management layers for managing M2M entities in an M2M environment. The method may also include using a plurality of management layers to manage a M2M area network, wherein the M2M area network may include one or more M2M end devices. The M2M end devices may include, for example, an M2M gateway and/or an M2M device. The management layers may include any of an application management layer, service management layer, network management layer and a device management layer. The management layers may provide any of configuration management, fault management, and performance management of the M2M entities. | 05-08-2014 |
20140344269 | Semantic Naming Model - Semantics may be embedded in the name of sensory data. In an embodiment, an identification of sensory data is created based on attributes that include at least one of time, location, or type. | 11-20-2014 |
20140351312 | LIGHTWEIGHT IOT INFORMATION MODEL - A lightweight and extensible information model for machine-to-machine systems is disclosed. A service layer information management architecture uses three categories of atomic objects, subjects, actions, and descriptions. Information for use within the model is built using the atomic information objects. Application programming interfaces are used to perform operations and information processing by different nodes. Common service functions are used in the model as instances of a generic common service information model. | 11-27-2014 |
20140359035 | DATA AGGREGATION - Data aggregation in an internet of things (IoT) system refers generally to collecting data such that the data can be processed in a useful manner. Existing approaches to data aggregation in IoT systems, such as a system including a network of sensors for example, often focus on network logical topology and data transmission scheduling and routing schemes. Embodiments disclosed herein include systems that can aggregate data at an application-protocol layer. | 12-04-2014 |
20140359131 | LOAD BALANCING IN THE INTERNET OF THINGS - Disclosed herein are a variety of devices, methods, and systems for load balancing in the internet of things. Devices and other entities can be grouped together in a load balancing group and traffic for such devices balanced according to load balancing criteria. Groups may be discovered, created, manipulated, and deleted by various entities. | 12-04-2014 |
20140372774 | Context And Power Control Information Management For Proximity Services - Management of context and power control information enables different power control schemes for point-to-point or point-to-multipoint based on proximity services or applications. Context information may be defined as situation data about a service or application that is used to help define a power control scheme to be implemented. Power control information may be defined as control or status data for power control, which can be used for reporting or controlling the transmitting power of a peer in a P2P network. Context and power control information may be managed across multiple layers such as the application layer, service layer, media access control layer, or physical layer. Context and power control information is updated and exchanged between or among peers for context-related power control in proximity services. | 12-18-2014 |
20140372775 | Context And Power Control Information Management For Proximity Services - Management of context and power control information enables different power control schemes for point-to-point or point-to-multipoint based on proximity services or applications. Context information may be defined as situation data about a service or application that is used to help define a power control scheme to be implemented. Power control information may be defined as control or status data for power control, which can be used for reporting or controlling the transmitting power of a peer in a P2P network. Context and power control information may be managed across multiple layers such as the application layer, service layer, media access control layer, or physical layer. Context and power control information is updated and exchanged between or among peers for context-related power control in proximity services. | 12-18-2014 |
20140376521 | Cross-Layer And Cross-Application Acknowledgment For Data Transmission - Systems and methods may integrate acknowledgments, such as application-level acknowledgments and medium access control layer acknowledgments. In an embodiment of a cross-layer acknowledgment method, a medium access control layer acknowledgment and application-layer acknowledgment may be integrated as a single medium access control layer acknowledgment. In an embodiment of a cross-application acknowledgment method, an application-layer acknowledgment for a first application and application-layer acknowledgment for a second application may be integrated into a single medium access control layer frame. | 12-25-2014 |
20140379804 | CONTEXT MANAGEMENT - Systems, methods, and apparatus embodiments are described herein for context information management at the medium access control layer. In one embodiment, a system comprises a plurality of peers which communicate via peer-to-peer communications. In the system, context information may be exchanged at the MAC layer. Examples of context information include, without limitation, location information, mobility information, device capability, user information, an application category, multi-hop information, a channel condition, application information, association identifiers, and device information. Each of the plurality of peers may include a context manager that resides on each peer device. For example, a first context manager that resides on a first peer of the plurality of peers may exchange context information with a second context manager that resides on a second peer of the plurality of peers. In another example embodiment, the first peer, and in particular the first context manager that resides on the first peer, can retrieve the context information from a layer that is different than the MAC layer. | 12-25-2014 |
20150016359 | PEER-TO-PEER COMMUNICATIONS ENHANCEMENTS - An enhanced general superframe structure for peer-to-peer communications in proximity is disclosed, which may be implemented in connection with a variety of different channel access techniques. Additionally, methods are disclosed for enabling multiple P2PNWs in proximity operating under different control schemes, including virtually centralized control, distributed control, and hybrid control, to co-exist. A hyperframe structure is also disclosed, which may comprise two or more superframes, each superframe corresponding to a different one of the corresponding P2PNW control schemes. | 01-15-2015 |
20150019717 | CONTEXT-AWARE PROXIMITY SERVICES - Disclosed herein are a variety of systems, operations, MAC primitives, and procedures for context-aware Peer-to-Peer communications and multi-application Peer-to-Peer communications. An example system for a context-aware Peer-to-Peer communications system may include a physical and Medium Access Control (PHY/MAC) layer and an upper layer above the PHY/MAC layer. The PHY/MAC layer may include at least one of a discovery function, an association function, a data transceiving function, a channel management function, a general scan function, a synchronization function, a power control function, or management and reporting function. The upper layer may be one of a service layer or an application layer. | 01-15-2015 |
20150029854 | SERVICE LAYER SOUTHBOUND INTERFACE AND QUALITY OF SERVICE - Existing resource reservation techniques are inefficient for M2M communications. In an example embodiment described herein, a system comprises a service layer server that resides on a service layer and a control plane node that resides on an access network, wherein the service layer server communicates with the control plane node via a control plane interface. The control plane interface can be used to configure quality of service (QoS) policies (rules) that are based on an object that is being addressed. In this context, for example, an object may be a memory location or value. For example, the service layer may configure one or more QoS rules for the access network based on the object by sending a QoS provisioning message that includes one or more parameters to the control plane node. The control plane node may determine the object that is identified in the one or more QoS rules, and the QoS rules may be distributed to one or more routers that may be used to access the object. The access network may apply the one or more QoS rules in accordance with the parameters. | 01-29-2015 |
20150031335 | Service Layer Device Location Management and Privacy Control - A machine to machine (M2M) service layer can facilitate acquiring and providing location information for use by M2M devices. The service layer can also ensure that privacy controls are maintained and enforced for location information. A device can report its location and its privacy preferences to a service layer device. Other devices can receive this location information subject to qualifying to receive it based on the privacy preferences. Devices in an area may advertise services with the service layer acting as a filter and relay point ensuring that such advertisements satisfy the privacy policies of the devices involved. | 01-29-2015 |
20150055557 | METHOD AND APPARATUS FOR SUPPORTING MACHINE-TO-MACHINE CACHING AT A SERVICE CAPABILITY LAYER - A method and apparatus for supporting machine-to-machine (M2M) caching at a service capability layer are disclosed. A service capability layer of an M2M entity provides functions that are shared by the M2M applications and expose functionalities to the M2M applications through a set of open interfaces. The service capability layer may be configured to cache resources in a resource structure of the service capability layer. The service capability layer caching can provide complete cached resource discovery, and provide more intelligent and robust security mechanism to authenticate the clients, and subscription to the cached resource becomes flexible and feasible. M2M service may be virtualized in a cloud. An M2M cache manager may maintain a record of resources cached in a plurality of M2M servers and coordinate the M2M servers in caching the resources. The M2M cache manager may provide mapping between a virtualized cached resource and a real cached resource. | 02-26-2015 |
20150055640 | METHOD AND APPARATUS FOR SUPPORTING MACHINE-TO-MACHINE COMMUNICATIONS - A method and apparatus for distributed services and data in a machine-to-machine (M2M) communication network are disclosed. A network server, an M2M gateway, and M2M devices include an M2M service capability layer for supporting M2M service capabilities, respectively. Reference points may be defined for interactions between network service capability layers, between gateway service capability layers, between a gateway service capability layer and a device service capability layer of an M2M device, between M2M device applications, and/or between a network, gateway, or device service capability layer and an M2M application. The network server may be split into a control server and a data server at a service capability layer to provide service capabilities for control functions and service capabilities for data functions, respectively. The data server may be configured to interact with another data server to push or pull data or resources either directly or indirectly via the control server. | 02-26-2015 |
20150071178 | METHOD AND APPARATUS FOR DATA TRANSMISSIONS IN A WIRELESS NETWORK - A method and apparatus for data transmissions in a wireless network are disclosed. A first device may send a first frame to a second device including information regarding a number of pending data frames to be transmitted from the first device to the second device. The first device receives an acknowledgement frame including a number of approved data frames for transmission from the first device to the second device. The first device then may send a plurality of data frames without performing the contention-based channel access procedure in response to the acknowledgement frame. The first device may send a first frame to a second device for requesting data frames that are pending at the second device. The first device receives an acknowledgement frame including a number of pending and approved data frames. The first device may receive a plurality of data frames in response to the acknowledgement frame. | 03-12-2015 |
20150088979 | Enhanced M2M Content Management Based On Interest - Methods, devices, and systems are disclosed for an M2M Interest Function. An M2M Interest Function may receive requests from users to publish the users' personal interests in particular data identify relationships and patterns in the data. Associated data may then be stored in a single best location for such data based on various criteria rather than on separate M2M Gateways or M2M Servers. This location may be provided to users interested in such data. Relationship and association data may be provided to M2M gateways. | 03-26-2015 |
20150117316 | DATA ROUTING IN HYBRID WIRELESS COMMUNICATION NETWORKS - Data is routed in a mesh network of devices that can communicate wirelessly through a plurality of technologies. One or more of such devices receive broadcast message(s) from a destination device intended to receive the data, and generate a first radio link quality metric (RLQM) value based on the broadcast message(s). A source device originates and delivers a quantum of data with an embedded first RLQM value. A set of intermediate devices relays the quantum of data if a forwarding criterion is fulfilled; the forwarding criterion is based in part on the first RLQM value and a second RLQM value generated by an intermediate device in the set of intermediate devices based on the broadcast message(s). The intermediate device exploits an optical interface to transmit the quantum of data. The destination device broadcasts an acknowledgement signal in response to receiving intended data. | 04-30-2015 |
20150127733 | CONTEXT-AWARE PEER-TO-PEER COMMUNICATION - Methods and systems are disclosed for determining context information for one or more peers to be used in a peer discovery and/or peer association process(es) and/or to otherwise facilitate P2P proximity communications. For example, a method for determining peer context information may include receiving a context-aware identifier (CAID). The CAID may include one or more items of context information associated with the peer in addition to an indication of an identity of the peer. A first portion of the CAID may be decoded to determine a first item of context information associated with the peer. The first portion of the CAID may be decodable without having to process a payload portion of the message. It may be determined whether to continue processing one or more of the CAID or the message based on the first item of context information. The CAID may be used in discovery and/or association procedure(s). | 05-07-2015 |
20150195671 | SERVICE-BASED DISCOVERY IN NETWORKS - Systems, methods, and instrumentalities may implement service-based discovery in a network, such as a 3GPP or 3GPP2 network. A Discovery Server may be used to query and find services offered by the network or by entities that interface with the network. Situational context information or policy information, or both, may be communicated to the discovery server so that the Discovery Server can provide context-aware and policy-based discovery services. The Discovery Server may be used to control which of the entities that interface with the network can discover one another. The Discovery Server may support queries based on, for example, the type of MTC entity, the type of services hosted on the entity, the availability times of the entity, types of protocols supported, levels of Quality of Service (QoS) supported, and MTC-IWF services. | 07-09-2015 |
20150263833 | Multi-Hop Peer-To-Peer Communications - Frame structures may be designed and channels may be allocated in a manner to support multi-hop for fully distributed and infrastructure-less peer-to-peer communications in proximity. Frame structures may have a dedicated multi-hop period near the end of a superframe. | 09-17-2015 |
20150263880 | CROSS-LAYER CONTEXT MANAGEMENT - In peer-to-peer (P2P) communications, it has been recognized herein that various context information needs to be exchanged between peer devices (PDs) or between different layers/protocols within a peer device (PD). Various embodiments described herein address how to design effective management functions, services, and primitives for context management across and/or within different protocol layers to enable context-aware peer-to-peer communications in proximity. This disclosure proposes multiple embodiments for cross-layer context management in context-aware peer-to-peer communication in proximity. For example, embodiments described herein provide context management to efficiently enable context-aware P2P communications, such as, for example, social networks. | 09-17-2015 |
20150264134 | ENHANCED DISTRIBUTED RESOURCE DIRECTORY - In accordance with an example embodiment, an enhanced distributed resource directory provides resource lookup capabilities without need to know a uniform resource identifier of the resource. For example, a resource directory node may receive a message payload from an endpoint. The message payload includes a registration request or a resource lookup request. The resource directory node may determine keys associated with the message payload. The keys may comprise parameters and values associated with the parameters. Upon determining the keys, the keys may be applied to a hash function to generate mapping information that has identities of peer resource directories. Based on the mapping information, the resource directory may transmit the message payload to peer resource directories. The resource directory may receive responses from the peer resource directories such that an appropriate response may be provided to the requesting endpoint. | 09-17-2015 |
20150264659 | IDENTIFIERS AND TRIGGERS FOR CAPILLARY DEVICES - Methods and apparatuses for capillary network device registration implemented in a wireless transmit/receive unit (WTRU) are disclosed. Registration or bootstrap messages may be received by a capillary network device where the WTRU acts as a gateway for communication between the capillary device and a network such as a 3GPP network. A capillary network device identifier (CNDID) is sent to the capillary device. A packet data protocol (PDP) context or PDN connection may be established with the network and the CNDID may be sent to a machine type communications (MTC) server. The WTRU may create the registration message, establish a connection with the network, and forward the registration message to the MTC server. Methods and apparatuses implemented in a network are also disclosed for identifying, addressing, and triggering the capillary devices from the MTC server. The trigger message may include fields for group communication, reducing signaling, and enabling charging. | 09-17-2015 |
Patent application number | Description | Published |
20140086469 | MRI RECONSTRUCTION WITH INCOHERENT SAMPLING AND REDUNDANT HAAR WAVELETS - A method of image reconstruction for a magnetic resonance imaging (MRI) system having a plurality of coils includes obtaining k-space scan data captured by the MRI system, the k-space scan data being representative of an undersampled region over time, determining a respective coil sensitivity profile for the region for each coil of the plurality of coils, and iteratively reconstructing dynamic images for the region from the k-space scan data via an optimization of a minimization problem. The minimization problem is based on the determined coil sensitivity profiles and redundant Haar wavelet transforms of the dynamic images. | 03-27-2014 |
20140088899 | EIGEN-VECTOR APPROACH FOR COIL SENSITIVITY MAPS ESTIMATION - A method for estimating a coil sensitivity map for a magnetic resonance (MR) image includes providing a matrix A of sliding blocks of a 3D image of coil calibration data, calculating a left singular matrix V | 03-27-2014 |
20140097845 | Dynamic Image Reconstruction with Tight Frame Learning - A computer-implemented method for learning a tight frame includes acquiring undersampled k-space data over a time period using an interleaved process. An average of the undersampled k-space data is determined and a reference image is generated based on the average of the undersampled k-space data. Next, a tight frame operator is determined based on the reference image. Then, a reconstructed image data is generated from the undersampled k-space data via a sparse reconstruction which utilizes the tight frame operator. | 04-10-2014 |
20140126796 | MRI RECONSTRUCTION WITH MOTION-DEPENDENT REGULARIZATION - A method of image reconstruction for a magnetic resonance imaging (MRI) system includes obtaining k-space scan data captured by the MRI system, the k-space scan data being representative of an undersampled region over time, iteratively reconstructing preliminary dynamic images for the undersampled region from the k-space scan data via optimization of a first instance of a minimization problem, the minimization problem including a regularization term weighted by a weighting parameter array, generating a motion determination indicative of an extent to which each location of the undersampled region exhibits motion over time based on the preliminary dynamic images, and iteratively reconstructing motion-compensated dynamic images for the region from the k-space scan data via optimization of a second instance of the minimization problem, the second instance having the weighting parameter array altered as a function of the motion determination. | 05-08-2014 |
20140133724 | MULTI-STAGE MAGNETIC RESONANCE RECONSTRUCTION FOR PARALLEL IMAGING APPLICATIONS - A computer-implemented method for reconstruction of a magnetic resonance image includes acquiring a first incomplete k-space data set comprising a plurality of first k-space lines spaced according to an acceleration factor and one or more calibration lines. A parallel imaging reconstruction technique is applied to the first incomplete k-space data to determine a plurality of second k-space lines not included in the first incomplete k-space data set, thereby yielding a second incomplete k-space data set. Then, the parallel imaging reconstruction technique is applied to the second incomplete k-space data to determine a plurality of third k-space lines not included in the second incomplete k-space data, thereby yielding a complete k-space data set. | 05-15-2014 |
20150054505 | REFERENCE OVERSAMPLING IN SENSE-TYPE MAGNETIC RESONANCE RECONSTRUCTION - Magnetic resonance imaging uses regularized SENSE reconstruction for a reduced field of view, but minimizes folding artifacts. A reference scan is oversampled relative to the reduced field of view. The oversampling provides coil sensitivity information for a region greater than the reduced field of view. The reconstruction of the object for the reduced field of view using the coil sensitivities for the larger region may have fewer folding artifacts. | 02-26-2015 |
20150063687 | ROBUST SUBSPACE RECOVERY VIA DUAL SPARSITY PURSUIT - A computer-implemented method of detecting a foreground data in an image sequence using a dual sparse model framework includes creating an image matrix based on a continuous image sequence and initializing three matrices: a background matrix, a foreground matrix, and a coefficient matrix. Next, a subspace recovery process is performed over multiple iterations. This process includes updating the background matrix based on the image matrix and the foreground matrix; minimizing an L−1 norm of the coefficient matrix using a first linearized soft-thresholding process; and minimizing an L−1 norm of the foreground matrix using a second linearized soft-thresholding process. Then, background images and foreground images are generated based on the background and foreground matrices, respectively. | 03-05-2015 |
20150086131 | SINGLE-IMAGE SUPER RESOLUTION AND DENOISING USING MULTIPLE WAVELET DOMAIN SPARSITY - A computer-implemented method of enhancing images includes receiving one or more observed images, identifying wavelet bases, and determining a downsampling operator. A noise variance value is estimated and used to select a tuning parameter. A blurring kernel is estimated based on one or more system calibration parameter and used to determine a low-pass blurring filter operator. A cost function is created which generates one or more denoised super-resolution images based on the observed images and the plurality of wavelet bases. The cost function may include, for example, a sparsity inducing norm applied to the plurality of wavelet bases (with the tuning parameter applied to the sparsity inducing norm) and a constraint requiring the one or more denoised super-resolution images to be equal to a result of applying the low-pass blurring filter operator and the downsampling operator to the one or more denoised super-resolution images. The one or more denoised super-resolution images are generated by minimizing this cost function. | 03-26-2015 |
20150108978 | SAMPLING STRATEGIES FOR SPARSE MAGNETIC RESONANCE IMAGE RECONSTRUCTION - A computer-implemented method of selecting a Magnetic Resonance Imaging (MRI) sampling strategy includes selecting a base variable-density sampling pattern and determining a scan time associated with the base variable-density sampling pattern. A modified variable-density sampling pattern is created by modifying one or more parameters of the base variable-density sampling pattern to maximize a sampled k-space area without increasing the scan time. Next, a scan is performed on an object of interest using the modified variable-density sampling pattern to obtain a sparse MRI dataset. Then a sparse reconstruction process is applied to the sparse MRI dataset to yield an image of the object of interest. | 04-23-2015 |