WO2023246079A1 - Prach peak detection method, base station, communication system, and medium - Google Patents

Prach peak detection method, base station, communication system, and medium Download PDF

Info

Publication number
WO2023246079A1
WO2023246079A1 PCT/CN2023/070569 CN2023070569W WO2023246079A1 WO 2023246079 A1 WO2023246079 A1 WO 2023246079A1 CN 2023070569 W CN2023070569 W CN 2023070569W WO 2023246079 A1 WO2023246079 A1 WO 2023246079A1
Authority
WO
WIPO (PCT)
Prior art keywords
frequency domain
power spectrum
noise
threshold
noise threshold
Prior art date
Application number
PCT/CN2023/070569
Other languages
French (fr)
Chinese (zh)
Inventor
燕磊
李微
陈颖颖
陈煜飞
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2023246079A1 publication Critical patent/WO2023246079A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present disclosure relates to the field of communication technology, and in particular, to a PRACH peak detection method, a base station, a communication system and a medium.
  • the traditional random access peak detection algorithm usually uses the threshold judgment method. However, when the relevant peak energy leaks, it will affect other normal signals with small energy. If only the conventional threshold judgment method is used, it will Cause misjudgments, "false alarms" and "missed detections". For example, when multiple terminal devices initiate access on the same time slot, multiple terminal devices will use random access generated by the same or adjacent physical root sequences. Enter the preamble sequence. At this time, the autocorrelation peak of each ZC (Zadoff-chu) sequence in the time domain will leak to other sequences. Considering that the power of the terminal equipment is inconsistent, there is a gap in the peak energy of the receiving end, and the peak energy of some terminal equipment leaks. This will lead to an increase in the noise threshold. Using conventional noise estimation methods will cause "false alarms” or "missed detections” on peak signals near the noise threshold, ultimately affecting the success rate of terminal device access.
  • the main purpose of the embodiments of the present disclosure is to provide a PRACH peak detection method, base station, communication system and medium, aiming to improve the success rate of terminals accessing the base station through the physical random access channel.
  • Embodiments of the present disclosure provide a PRACH peak detection method, which is applied to a base station.
  • the method includes:
  • the second power sequence calculates the average noise power
  • a target peak detection threshold is set according to the average noise power and the false alarm threshold information, and peak detection is performed on the frequency domain power spectrum according to the target peak detection threshold.
  • Embodiments of the present disclosure also provide a base station, which includes a processor, a memory, a computer program stored on the memory and executable by the processor, and a computer program configured to implement communication between the processor and the memory.
  • a data bus is connected to the communication, and when the computer program is executed by the processor, the peak detection method of PRACH according to any embodiment of the present disclosure is implemented.
  • An embodiment of the present disclosure also provides a wireless communication system, which at least includes the aforementioned base station.
  • Embodiments of the present disclosure also provide a storage medium for computer-readable storage.
  • the storage medium stores one or more programs.
  • the one or more programs can be executed by one or more processors to implement the following: The steps of any PRACH peak detection method provided in any embodiment of this disclosure.
  • Figure 1 is a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure
  • Figure 2 is a schematic flow chart of a PRACH peak detection method provided by an embodiment of the present disclosure
  • Figure 3 is a schematic structural block diagram of a base station provided by an embodiment of the present disclosure.
  • PRACH Physical layer random access
  • PRACH Physical layer random access
  • the terminal device can establish correct communication with the base station.
  • the terminal device sends messages to the base station through the PRACH channel.
  • PRACH signal After receiving the PRACH signal, the base station determines whether the PRACH signal has preamble sequence information, and determines the location of the terminal device based on the index of the preamble sequence information.
  • PRACH transmits the ZC sequence, which has strong autocorrelation.
  • embodiments of the present disclosure provide a PRACH peak detection method, a base station, a communication system and a medium.
  • the PRACH peak detection method is applied to the base station, aiming to improve the success of terminals accessing the base station through physical random access channels. Rate.
  • FIG. 1 is a schematic diagram of an application scenario of the PRACH peak detection method provided by the present disclosure.
  • the wireless communication system 100 includes a base station 10 and a terminal device 20.
  • the terminal device 20 enters the coverage of the base station 10 for the first time or wants to establish a communication connection with the base station 20, it receives a broadcast notification issued by the base station 10.
  • the terminal device 20 sends a PRACH signal to the base station 10 in response to the broadcast notification of the base station 10 .
  • the base station 10 receives the PRACH signal sent by the terminal device 20 through the antenna provided on the base station 10, and preprocesses the received PRACH signal to obtain corresponding frequency domain data, and stores it in a preset storage area.
  • the base station 10 obtains the corresponding frequency domain data from the preset storage area according to the preset data processing logic, and correlates the frequency domain data with the local ZC sequence of the base station 10 to obtain the frequency domain power spectrum, also called the energy map PDP, and then obtains the frequency domain power spectrum according to the frequency Perform two noise estimates on the domain power spectrum, and set the noise confidence threshold to filter the leakage of relevant peak energy, eliminate image interference, achieve accurate noise power calculation, determine the final peak detection threshold, and search for relevant peaks to determine whether there is a random access request.
  • the frequency domain power spectrum also called the energy map PDP
  • the terminal device detects the random preamble sequence information sent by the terminal device, that is, the preamble ID (Identity document, identity identification number) of the terminal device and the time offset TA to determine the uplink, thereby reducing "false alarms” and "missed detections” ”, improving the success rate of terminal equipment 20 accessing base station 10.
  • the preamble ID Identity document, identity identification number
  • Figure 2 is a step flow chart of a PRACH peak detection method provided by the present disclosure.
  • the peak detection method of PRACH includes steps S1 to S6.
  • Step S1 Obtain the received PRACH signal, and generate a frequency domain power spectrum based on the PRACH signal.
  • the PRACH signal since the sampling rate of the PRACH signal is different from that of the system, after receiving the PRACH signal, the PRACH signal needs to be preprocessed to obtain the relevant frequency domain power spectrum, also called the energy map. , and then determine whether there is a relevant peak based on the frequency domain power spectrum.
  • the relevant frequency domain power spectrum also called the energy map.
  • generating a frequency domain power spectrum according to the PRACH signal includes:
  • the frequency domain power spectrum is generated according to the PRACH frequency domain data and a preset frequency domain sequence.
  • CP Cyclic Prefix
  • OFDM Orthogonal Frequency Division Multiplexing, orthogonal frequency division multiplexing technology
  • Step S2 Obtain the network management configuration data of the base station, set a first noise threshold according to the network management configuration data and the frequency domain power spectrum, and set a second noise according to the first noise threshold and the network management configuration data. Threshold.
  • the network management configuration data is pre-configured data.
  • the pre-configuration data can be set through experimental simulation or experience.
  • the network management configuration data and related spectrum data in the frequency domain power spectrum are used to set the first noise threshold to initially Filter out part of the data in the frequency domain power spectrum, then set the second noise threshold based on the first noise threshold and network management configuration data, and use the second noise threshold to perform a more accurate filtering of the spectrum data in the frequency domain power spectrum, so as to Obtain more accurate spectrum data from the frequency domain power spectrum.
  • setting the first noise threshold according to the network management configuration data and the frequency domain power spectrum includes:
  • the first noise threshold is set according to the power maximum value and the first noise threshold factor.
  • the first noise threshold factor ⁇ is a preset value.
  • the first noise threshold factor is an empirical value through simulation or testing. After FFT transformation to the frequency domain, the PRACH frequency domain data corresponding to the PRACH signal is obtained as z(n), The maximum power value filtered out from the frequency domain power spectrum is max ⁇ z(n) ⁇ , then the first noise threshold is ⁇ max ⁇ z(n) ⁇ .
  • setting the second noise threshold according to the first noise threshold and the network management configuration data includes:
  • the second noise threshold factor and the false alarm threshold information are both preset values.
  • the second noise threshold factor and the false alarm threshold information are both empirical values through simulation or testing. After determining that the first noise threshold is ⁇ max After ⁇ z(n) ⁇ , the first power sequence n 1 (n) satisfies the following conditions:
  • the first temporary noise Nosie tmp1 satisfies the following conditions:
  • L 1 is the length of n 1 (n), and ⁇ is the first noise threshold factor.
  • the second noise threshold is ⁇ FaTh ⁇ Nosie tmp1 , where FaTh is the false alarm threshold and ⁇ is the second noise threshold factor.
  • Step S3 Filter out a second power sequence that is less than or equal to the second noise threshold from the frequency domain power spectrum, and calculate a second temporary noise based on the second power sequence.
  • filtering out a second power sequence that is less than or equal to the second noise threshold from the frequency domain power spectrum includes:
  • the first frequency domain power spectrum after filtering out frequency data greater than ⁇ max ⁇ z(n) ⁇ is recorded as z 1 (n), then the second power sequence n 2 (n) satisfies, n 2 (n) ⁇ z 1 (n)
  • the second temporary noise Nosie tmp2 When calculating the second temporary noise Nosie tmp2 based on the second power sequence n 2 (n), the second temporary noise Nosie tmp2 satisfies:
  • L 2 is the length of n 2 (n)
  • FaTh is the false alarm threshold
  • is the second noise threshold factor.
  • Step S4 Filter out the second frequency domain power spectrum that is greater than the second noise threshold from the frequency domain power spectrum, and obtain the difference between the second frequency domain power spectrum and the second temporary noise. .
  • Step S5 Determine whether the difference meets the preset noise confidence threshold, and use the power value in the frequency domain power spectrum that does not meet the noise confidence threshold as the third power sequence, and according to the third power sequence and the second power sequence to calculate the average noise power.
  • take the difference between each element in the second frequency domain power spectrum z 2 (n) and the second temporary noise Nosie tmp2 and obtain the difference between each element in the second frequency domain power spectrum z 2 (n) and the second temporary noise Nosie tmp2
  • the power value is taken as the third power sequence n 3 (n), and the third power sequence n 3 (n) is included in the average noise power calculation.
  • the third power sequence n 3 (n) satisfies, n 3 (n) ⁇ z 2 (n)
  • Step S6 Set a target peak detection threshold according to the average noise power and the false alarm threshold information, and perform peak detection on the frequency domain power spectrum according to the target peak detection threshold.
  • PeakThreshold NoiseMean ⁇ FaTh.
  • the target peak detection threshold PeakThreshold obtain the fourth power sequence in the frequency domain power spectrum z(n) that is greater than the target peak detection threshold PeakThreshold, and obtain the random preamble sequence information corresponding to each element in the fourth power sequence, so that the random preamble can be obtained
  • the preamble ID corresponding to the terminal device is obtained from the sequence information and the time offset TA of the uplink is determined, thereby ensuring the access success rate between the terminal device and the base station.
  • FIG. 3 is a schematic structural block diagram of a base station provided by an embodiment of the present disclosure.
  • the base station 10 includes a processor 101 and a memory 102.
  • the processor 101 and the memory 102 are connected through a bus 103, which is, for example, an I2C (Inter-integrated Circuit) bus.
  • I2C Inter-integrated Circuit
  • the processor 101 is used to provide computing and control capabilities to support the operation of the entire base station 10 .
  • the processor 101 can be a central processing unit (Central Processing Unit, CPU).
  • the processor 101 can also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC). ), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general processor 101 may be a microprocessor or the processor may be any conventional processor.
  • the memory 102 may be a Flash chip, a read-only memory (ROM, Read-Only Memory) disk, an optical disk, a U disk or a mobile hard disk, etc.
  • ROM Read-Only Memory
  • the memory 102 may be a Flash chip, a read-only memory (ROM, Read-Only Memory) disk, an optical disk, a U disk or a mobile hard disk, etc.
  • the processor 101 is used to run a computer program stored in the memory 102, and implement the following steps when executing the computer program:
  • the second power sequence calculates the average noise power
  • a target peak detection threshold is set according to the average noise power and the false alarm threshold information, and peak detection is performed on the frequency domain power spectrum according to the target peak detection threshold.
  • the processor 101 when the processor 101 sets the first noise threshold according to the network management configuration data and the frequency domain power spectrum, it includes:
  • the first noise threshold is set according to the power maximum value and the first noise threshold factor.
  • the processor 101 when the processor 101 sets the second noise threshold according to the first noise threshold and the network management configuration data, the processor 101 includes:
  • the process includes:
  • the process when the processor 101 filters out the second frequency domain power spectrum that is greater than the second noise threshold from the frequency domain power spectrum, the process includes:
  • a second frequency domain power spectrum that is greater than the second noise threshold is screened out from the first frequency domain power spectrum of the frequency domain power spectrum.
  • the processor 101 when the processor 101 performs peak detection on the frequency domain power spectrum according to the target peak detection threshold, it includes:
  • the processor 101 when the processor 101 generates the frequency domain power spectrum according to the PRACH signal, it includes:
  • the frequency domain power spectrum is generated according to the PRACH frequency domain data and a preset frequency domain sequence.
  • Embodiments of the present disclosure also provide a storage medium for computer-readable storage.
  • the storage medium stores one or more programs.
  • the one or more programs can be executed by one or more processors to implement the following: The steps of any PRACH peak detection method provided in the embodiments of this disclosure.
  • the storage medium may be an internal storage unit of the base station described in the previous embodiment, such as a hard disk or memory of the base station.
  • the storage medium may also be an external storage device of the base station, such as a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (SD) card, or a flash memory card equipped on the base station. (Flash Card) etc.
  • Such software may be distributed on computer-readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media).
  • computer storage media includes volatile and nonvolatile media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. removable, removable and non-removable media.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disk (DVD) or other optical disk storage, magnetic cassettes, tapes, disk storage or other magnetic storage devices, or may Any other medium used to store the desired information and that can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments of the present disclosure provide a PRACH peak detection method, a base station, a communication system, and a medium. The detection method is applied to the base station and comprises: acquiring and receiving a PRACH signal and generating a frequency domain power spectrum; acquiring network management configuration data of the base station, setting a first noise threshold, and setting a second noise threshold according to the first noise threshold; screening a second power sequence from the frequency domain power spectrum, and calculating second temporary noise according to the second power sequence; screening a second frequency domain power spectrum from the frequency domain power spectrum, and acquiring a difference between the second frequency domain power spectrum and the second temporary noise; determining whether the difference meets a preset noise confidence threshold, taking a power value which does not meet the noise confidence threshold in the frequency domain power spectrum as a third power sequence, and calculating average noise power; and setting a target peak detection threshold according to the average noise power and false alarm threshold information, and performing peak detection on the frequency domain power spectrum according to the target peak detection threshold.

Description

PRACH的峰值检测方法、基站、通信系统及介质PRACH peak detection method, base station, communication system and medium
相关申请的交叉引用Cross-references to related applications
本公开要求享有2022年06月22日提交的名称为“PRACH的峰值检测方法、基站、通信系统及介质”的中国专利申请CN202210711565.5的优先权,其全部内容通过引用并入本公开中。This disclosure claims priority to Chinese patent application CN202210711565.5 titled "Peak detection method, base station, communication system and medium for PRACH" submitted on June 22, 2022, the entire content of which is incorporated into this disclosure by reference.
技术领域Technical field
本公开涉及通信技术领域,尤其涉及一种PRACH的峰值检测方法、基站、通信系统及介质。The present disclosure relates to the field of communication technology, and in particular, to a PRACH peak detection method, a base station, a communication system and a medium.
背景技术Background technique
随着移动通信技术的发展,现有的许多应用对无线连接、上行同步要求较高,包括智能家居、远程医疗等各类任务。作为建立无线连接的关键步骤,物理随机接入信道(Physical Random Access Channel,PRACH)备受关注。针对随机接入信道中的接入前导峰值检测算法一直是无线通信中的热点问题。对峰值检测算法的研究主要包括检测门限的设置以及提高不同场景下检测算法的有效性。With the development of mobile communication technology, many existing applications have high requirements for wireless connections and uplink synchronization, including smart homes, telemedicine and other tasks. As a key step in establishing wireless connections, the Physical Random Access Channel (PRACH) has attracted much attention. The access preamble peak detection algorithm in random access channels has always been a hot issue in wireless communications. Research on peak detection algorithms mainly includes setting detection thresholds and improving the effectiveness of detection algorithms in different scenarios.
在PRACH峰值检测中,传统的随机接入峰值检测算法通常采用阈值判断方法,然而,当在相关峰能量泄露的情况下,会影响其他能量小的正常信号,仅采用常规阈值判断的方法,会造成误判,产生“虚警”和“漏检”,如,当多个终端设备在同一时隙上发起接入时,多个终端设备会使用同一个或相邻物理根序列生成的随机接入前导序列,此时在时域上每个ZC(Zadoff-chu)序列自相关的峰值会泄露到其他序列上去,考虑到终端设备功率不一致,收端的峰值能量存在差距,部分终端设备的峰值泄露会导致噪声门限抬高,采用常规噪声估计方法会使处在噪声门限附近的峰值信号会出现“虚警”或“漏检”现象,最终影响终端设备接入的成功率。In PRACH peak detection, the traditional random access peak detection algorithm usually uses the threshold judgment method. However, when the relevant peak energy leaks, it will affect other normal signals with small energy. If only the conventional threshold judgment method is used, it will Cause misjudgments, "false alarms" and "missed detections". For example, when multiple terminal devices initiate access on the same time slot, multiple terminal devices will use random access generated by the same or adjacent physical root sequences. Enter the preamble sequence. At this time, the autocorrelation peak of each ZC (Zadoff-chu) sequence in the time domain will leak to other sequences. Considering that the power of the terminal equipment is inconsistent, there is a gap in the peak energy of the receiving end, and the peak energy of some terminal equipment leaks. This will lead to an increase in the noise threshold. Using conventional noise estimation methods will cause "false alarms" or "missed detections" on peak signals near the noise threshold, ultimately affecting the success rate of terminal device access.
发明内容Contents of the invention
本公开实施例的主要目的在于提供一种PRACH的峰值检测方法、基站、通信系统及介质,旨在提升终端通过物理随机接入信道接入基站的成功率。The main purpose of the embodiments of the present disclosure is to provide a PRACH peak detection method, base station, communication system and medium, aiming to improve the success rate of terminals accessing the base station through the physical random access channel.
本公开实施例提供一种PRACH的峰值检测方法,应用于基站,所述方法包括:Embodiments of the present disclosure provide a PRACH peak detection method, which is applied to a base station. The method includes:
获取接收到PRACH信号,并根据所述PRACH信号生成频域功率谱;Obtain the received PRACH signal and generate a frequency domain power spectrum according to the PRACH signal;
获取所述基站的网管配置数据,并根据所述网管配置数据和所述频域功率谱设置第一噪声门限,及根据所述第一噪声门限和所述网管配置数据设置第二噪声门限;Obtain the network management configuration data of the base station, set a first noise threshold according to the network management configuration data and the frequency domain power spectrum, and set a second noise threshold according to the first noise threshold and the network management configuration data;
从所述频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列,并根据所述第二功率序列计算第二临时噪声;Filter out a second power sequence that is less than or equal to the second noise threshold from the frequency domain power spectrum, and calculate a second temporary noise based on the second power sequence;
从所述频域功率谱中筛选出大于所述第二噪声门限的第二频域功率谱,并获取所述第二频域功率谱和所述第二临时噪声之间的差值;Filter out a second frequency domain power spectrum that is greater than the second noise threshold from the frequency domain power spectrum, and obtain the difference between the second frequency domain power spectrum and the second temporary noise;
判断所述差值是否满足预设的噪声置信门限,并将所述频域功率谱中不满足所述噪声置信门限的功率值作为第三功率序列,及根据所述第三功率序列和所述第二功率序列计算平均噪声功率;Determine whether the difference meets a preset noise confidence threshold, and use the power value in the frequency domain power spectrum that does not meet the noise confidence threshold as a third power sequence, and according to the third power sequence and the The second power sequence calculates the average noise power;
根据所述平均噪声功率和所述虚警门限信息设置目标峰值检测门限,并根据所述目标峰值检测门限对所述频域功率谱进行峰值检测。A target peak detection threshold is set according to the average noise power and the false alarm threshold information, and peak detection is performed on the frequency domain power spectrum according to the target peak detection threshold.
本公开实施例还提供一种基站,所述基站包括处理器、存储器、存储在所述存储器上并可被所述处理器执行的计算机程序以及用于实现所述处理器和所述存储器之间的连接通信的数据总线,其中所述计算机程序被所述处理器执行时,实现本公开任一实施方式所述的PRACH的峰值检测方法。Embodiments of the present disclosure also provide a base station, which includes a processor, a memory, a computer program stored on the memory and executable by the processor, and a computer program configured to implement communication between the processor and the memory. A data bus is connected to the communication, and when the computer program is executed by the processor, the peak detection method of PRACH according to any embodiment of the present disclosure is implemented.
本公开实施例还提供一种无线通信系统,所述无线通信系统至少包括如前述的基站。An embodiment of the present disclosure also provides a wireless communication system, which at least includes the aforementioned base station.
本公开实施例还提供一种存储介质,用于计算机可读存储,所述存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现如本公开说明书任一实施方式提供的任一项PRACH的峰值检测方法的步骤。Embodiments of the present disclosure also provide a storage medium for computer-readable storage. The storage medium stores one or more programs. The one or more programs can be executed by one or more processors to implement the following: The steps of any PRACH peak detection method provided in any embodiment of this disclosure.
附图说明Description of the drawings
为了更清楚地说明本公开实施例技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings needed to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are some embodiments of the present disclosure, which are of great significance to this field. Ordinary technicians can also obtain other drawings based on these drawings without exerting creative work.
图1是本公开实施例提供的一种无线通信系统的结构示意图;Figure 1 is a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure;
图2为本公开实施例提供的一种PRACH的峰值检测方法的流程示意图;Figure 2 is a schematic flow chart of a PRACH peak detection method provided by an embodiment of the present disclosure;
图3为本公开实施例提供的一种基站的结构示意框图。Figure 3 is a schematic structural block diagram of a base station provided by an embodiment of the present disclosure.
具体实施方式Detailed ways
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments are part of the embodiments of the present disclosure, rather than all of the embodiments. Based on the embodiments in this disclosure, all other embodiments obtained by those of ordinary skill in the art without creative efforts fall within the scope of protection of this disclosure.
附图中所示的流程图仅是示例说明,不是必须包括所有的内容和操作/步骤,也不是必须按所描述的顺序执行。例如,有的操作/步骤还可以分解、组合或部分合并,因此实际执行的顺序有可能根据实际情况改变。The flowcharts shown in the accompanying drawings are only examples and do not necessarily include all contents and operations/steps, nor are they necessarily performed in the order described. For example, some operations/steps can also be decomposed, combined or partially merged, so the actual order of execution may change according to actual conditions.
在此本公开说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本公开。如在本公开说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。The terminology used in this disclosure is for the purpose of describing particular embodiments only and is not intended to limit the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms unless the context clearly dictates otherwise.
在5G通信中,PRACH(物理层随机接入)是5G重要的通信流程,具体地,在5G通信中,通过PRACH,终端设备才能与基站建立正确的通信,终端设备通过PRACH信道,向基站发送PRACH信号。基站收到PRACH信号后,判断PRACH信号是否有前导序列信息,并且根据前导序列信息的索引,来判断终端设备的位置。5G通信中,PRACH发射的是ZC序列,具有较强的自相关性。In 5G communication, PRACH (physical layer random access) is an important communication process of 5G. Specifically, in 5G communication, through PRACH, the terminal device can establish correct communication with the base station. The terminal device sends messages to the base station through the PRACH channel. PRACH signal. After receiving the PRACH signal, the base station determines whether the PRACH signal has preamble sequence information, and determines the location of the terminal device based on the index of the preamble sequence information. In 5G communications, PRACH transmits the ZC sequence, which has strong autocorrelation.
常用算法是通过相关峰来判断是否发有前导序列信息,通过循环移位的ZC序列来达到区分不同用户的目的。因此,相关峰的判断在PRACH接收端处理流程中显得至关重要。常用的算法是设置一个合适的阈值,如果峰值大于阈值,则判断为有前导序列信息。但是峰值判断是一个非常严苛的过程,阈值设置的不合理或者不完善,会导致误判。当环境中噪声比较高的时候,噪声信号与本地序列相关后也会产生一些较大的相关信号,如果判决的方法比较单一,就会造成误判形成虚警。如,当多个终端设备在同一时隙上发起接入时,多个终端设备会使用同一个或相邻物理根序列生成的随机接入前导序列,此时在时域上每个ZC(Zadoff-chu)序列自相关的峰值会泄露到其他序列上去,考虑到终端设备功率不一致,收端的峰值能量存在差距,部分终端设备的峰值泄露会导致噪声门限抬高,采用常规噪声估计方法会使处在噪声门限附近的峰值信号会出现“虚警”或“漏检”现象,最终影响终端设备接入的成功率。Commonly used algorithms use correlation peaks to determine whether preamble sequence information is sent, and use cyclically shifted ZC sequences to achieve the purpose of distinguishing different users. Therefore, the judgment of correlation peaks is crucial in the PRACH receiving end processing flow. A commonly used algorithm is to set an appropriate threshold. If the peak value is greater than the threshold, it is judged that there is leader sequence information. However, peak judgment is a very rigorous process, and unreasonable or imperfect threshold settings can lead to misjudgments. When the noise in the environment is relatively high, the correlation between the noise signal and the local sequence will also produce some larger correlation signals. If the judgment method is relatively single, it will cause misjudgment and false alarms. For example, when multiple terminal devices initiate access on the same time slot, multiple terminal devices will use random access preamble sequences generated by the same or adjacent physical root sequences. At this time, each ZC (Zadoff -chu) The peak value of sequence autocorrelation will leak to other sequences. Considering that the power of terminal equipment is inconsistent and there is a gap in the peak energy of the receiving end, the peak leakage of some terminal equipment will cause the noise threshold to be raised. The use of conventional noise estimation methods will cause the processing Peak signals near the noise threshold will cause "false alarms" or "missed detections", which ultimately affects the success rate of terminal device access.
基于此,本公开实施例提供了一种PRACH的峰值检测方法、基站、通信系统及介质,其中,PRACH的峰值检测方法应用于基站,旨在提升终端通过物理随机接入信道接入基站的成功率。Based on this, embodiments of the present disclosure provide a PRACH peak detection method, a base station, a communication system and a medium. The PRACH peak detection method is applied to the base station, aiming to improve the success of terminals accessing the base station through physical random access channels. Rate.
下面结合附图,对本公开的一些实施例作详细说明。在不冲突的情况下,下述的实施例及实施例中的特征可以相互组合。Some embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings. The following embodiments and features in the embodiments may be combined with each other without conflict.
请参阅图1,图1为本公开所提供的PRACH的峰值检测方法的应用场景示意图。Please refer to FIG. 1 , which is a schematic diagram of an application scenario of the PRACH peak detection method provided by the present disclosure.
如图1所示,无线通信系统100包括基站10及终端设备20,终端设备20在首次进入基站10的覆盖范围内或欲与基站20建立通信连接时,接收到基站10下发的广播通知,终端设备20响应基站10的广播通知向基站10发送PRACH信号。基站10通过设置于基站10的天线接收终端设备20所发送的PRACH信号,并将接收到的PRACH信号进行预处理,得到对应的频域数据,并存储于预设存储区。基站10按照预设的数据处理逻辑从预设存储区内获取对应的频域数据,并将频域数据与基站10本地ZC序列进行相关得到频域功率谱,也称能量图PDP,然后根据频域功率谱进行两次噪声估计,并设置噪声置信门限过滤相关峰能量的泄露,消除镜像干扰,实现精准的噪声功率计算,确定最终峰值检测门限,并搜索相关峰值来判断是否存在随机接入请求,检测出终端设备发送的随机前导序列信息,即,终端设备的前导ID(Identity document,身份标识号)和确定上行链路的时间偏移量TA,进而减少了“虚警”和“漏检”,提高了终端设备20接入基站10的成功率。As shown in Figure 1, the wireless communication system 100 includes a base station 10 and a terminal device 20. When the terminal device 20 enters the coverage of the base station 10 for the first time or wants to establish a communication connection with the base station 20, it receives a broadcast notification issued by the base station 10. The terminal device 20 sends a PRACH signal to the base station 10 in response to the broadcast notification of the base station 10 . The base station 10 receives the PRACH signal sent by the terminal device 20 through the antenna provided on the base station 10, and preprocesses the received PRACH signal to obtain corresponding frequency domain data, and stores it in a preset storage area. The base station 10 obtains the corresponding frequency domain data from the preset storage area according to the preset data processing logic, and correlates the frequency domain data with the local ZC sequence of the base station 10 to obtain the frequency domain power spectrum, also called the energy map PDP, and then obtains the frequency domain power spectrum according to the frequency Perform two noise estimates on the domain power spectrum, and set the noise confidence threshold to filter the leakage of relevant peak energy, eliminate image interference, achieve accurate noise power calculation, determine the final peak detection threshold, and search for relevant peaks to determine whether there is a random access request. , detect the random preamble sequence information sent by the terminal device, that is, the preamble ID (Identity document, identity identification number) of the terminal device and the time offset TA to determine the uplink, thereby reducing "false alarms" and "missed detections" ”, improving the success rate of terminal equipment 20 accessing base station 10.
请参阅图2,图2是本公开提供的一种PRACH的峰值检测方法的步骤流程图。Please refer to Figure 2. Figure 2 is a step flow chart of a PRACH peak detection method provided by the present disclosure.
如图2所示,PRACH的峰值检测方法包括步骤S1至步骤S6。As shown in Figure 2, the peak detection method of PRACH includes steps S1 to S6.
步骤S1:获取接收到PRACH信号,并根据所述PRACH信号生成频域功率谱。Step S1: Obtain the received PRACH signal, and generate a frequency domain power spectrum based on the PRACH signal.
示例性地,在5G无线通信系统中,由于PRACH信号与系统的采样率不一样,所以当接收到PRACH信号后,需要对PRACH信号进行预处理,得到相关的频域功率谱,也称能量图,然后根据频域功率谱,来判断是否有相关峰值。For example, in the 5G wireless communication system, since the sampling rate of the PRACH signal is different from that of the system, after receiving the PRACH signal, the PRACH signal needs to be preprocessed to obtain the relevant frequency domain power spectrum, also called the energy map. , and then determine whether there is a relevant peak based on the frequency domain power spectrum.
在一些实施方式中,所述根据所述PRACH信号生成频域功率谱,包括:In some embodiments, generating a frequency domain power spectrum according to the PRACH signal includes:
对接收到的PRACH信号预处理,得到时域的PRACH信号;Preprocess the received PRACH signal to obtain the PRACH signal in the time domain;
将所述时域的PRACH信号进行FFT变换到频域,得到PRACH信号对应的PRACH频域数据;Perform FFT transformation of the PRACH signal in the time domain to the frequency domain to obtain PRACH frequency domain data corresponding to the PRACH signal;
根据所述PRACH频域数据和预设的频域序列生成所述频域功率谱。The frequency domain power spectrum is generated according to the PRACH frequency domain data and a preset frequency domain sequence.
示例性地,在通信中的CP(Cyclic Prefix,循环前缀)是OFDM(Orthogonal Frequency Division Multiplexing,正交频分复用技术)中为了对抗多径延迟信号的干扰,而提出的解决方案,CP的具体实施方法是把OFDM符号中时长为Tc的最后一部分,复制到前一个保护带开始的时间来传送。引入CP后,多径时延信号与直达信号实现能量正交,多径时延信号带来的本符号内的同频干扰就被消除了,终端设备在发送PRACH信号时,通常引入CP,基站 在接收到PRACH信号时,需要进行去CP处理然后进行采样处理,得到时域的PRACH信号,然后将得到的时域的PRACH信号进行FFT(Fast Fourier Transformation,快速傅里叶变换)变换到频域,得到PRACH信号对应的PRACH频域数据,并对PRACH频域数据和基站本地预设的频域序列做积,得到频域功率谱。For example, CP (Cyclic Prefix) in communications is a solution proposed in OFDM (Orthogonal Frequency Division Multiplexing, orthogonal frequency division multiplexing technology) to combat the interference of multipath delayed signals. CP's The specific implementation method is to copy the last part of the OFDM symbol with a duration of Tc to the start time of the previous guard band for transmission. After the introduction of CP, the energy of the multipath delay signal and the direct signal are orthogonal, and the co-channel interference within the symbol caused by the multipath delay signal is eliminated. When the terminal equipment transmits the PRACH signal, the base station usually introduces the CP. When receiving the PRACH signal, it is necessary to perform CP processing and then sampling processing to obtain the PRACH signal in the time domain, and then perform FFT (Fast Fourier Transformation, Fast Fourier Transform) on the obtained PRACH signal in the time domain to the frequency domain. , obtain the PRACH frequency domain data corresponding to the PRACH signal, and multiply the PRACH frequency domain data with the frequency domain sequence preset locally by the base station to obtain the frequency domain power spectrum.
步骤S2:获取所述基站的网管配置数据,并根据所述网管配置数据和所述频域功率谱设置第一噪声门限,及根据所述第一噪声门限和所述网管配置数据设置第二噪声门限。Step S2: Obtain the network management configuration data of the base station, set a first noise threshold according to the network management configuration data and the frequency domain power spectrum, and set a second noise according to the first noise threshold and the network management configuration data. Threshold.
示例性地,网管配置数据为预先配置数据,预先配置数据可以通过实验仿真或者根据经验设定,利用网管配置数据和频域功率谱内的相关频谱数据进行第一噪声门限的设定,以初步滤除频域功率谱中的部分数据,然后根据第一噪声门限和网管配置数据设置第二噪声门限,利用第二噪声门限对频域功率谱中的频谱数据进行一次较为精准的滤除,以从频域功率谱中获取较为精准的频谱数据。Exemplarily, the network management configuration data is pre-configured data. The pre-configuration data can be set through experimental simulation or experience. The network management configuration data and related spectrum data in the frequency domain power spectrum are used to set the first noise threshold to initially Filter out part of the data in the frequency domain power spectrum, then set the second noise threshold based on the first noise threshold and network management configuration data, and use the second noise threshold to perform a more accurate filtering of the spectrum data in the frequency domain power spectrum, so as to Obtain more accurate spectrum data from the frequency domain power spectrum.
在一些实施方式中,所述根据所述网管配置数据和所述频域功率谱设置第一噪声门限,包括:In some implementations, setting the first noise threshold according to the network management configuration data and the frequency domain power spectrum includes:
根据所述网管配置数据获取第一噪声门限因子,并从所述频域功率谱中获取功率最大值;Obtain the first noise threshold factor according to the network management configuration data, and obtain the power maximum value from the frequency domain power spectrum;
根据所述功率最大值和所述第一噪声门限因子设置所述第一噪声门限。The first noise threshold is set according to the power maximum value and the first noise threshold factor.
例如,第一噪声门限因子α为预设值,如,第一噪声门限因子为通过仿真或者测试的经验值,经过FFT变换到频域得到PRACH信号对应的PRACH频域数据为z(n),从频域功率谱中筛选出的功率最大值为max{z(n)},则,第一噪声门限为αmax{z(n)}。For example, the first noise threshold factor α is a preset value. For example, the first noise threshold factor is an empirical value through simulation or testing. After FFT transformation to the frequency domain, the PRACH frequency domain data corresponding to the PRACH signal is obtained as z(n), The maximum power value filtered out from the frequency domain power spectrum is max{z(n)}, then the first noise threshold is αmax{z(n)}.
在一些实施方式中,所述根据所述第一噪声门限和所述网管配置数据设置第二噪声门限,包括:In some implementations, setting the second noise threshold according to the first noise threshold and the network management configuration data includes:
根据所述第一噪声门限从所述频率功率谱中筛选出小于所述第一噪声门限的第一功率序列,并根据所述第一功率序列计算第一临时噪声;Screen out a first power sequence smaller than the first noise threshold from the frequency power spectrum according to the first noise threshold, and calculate a first temporary noise according to the first power sequence;
根据所述网管配置数据获取第二噪声门限因子及虚警门限信息,并根据所述第一临时噪声、所述第二噪声门限因子及所述虚警门限信息设置所述第二噪声门限。Obtain a second noise threshold factor and false alarm threshold information according to the network management configuration data, and set the second noise threshold according to the first temporary noise, the second noise threshold factor and the false alarm threshold information.
示例性地,第二噪声门限因子及虚警门限信息均为预设值,如,第二噪声门限因子及虚警门限信息均为通过仿真或者测试的经验值,在确定第一噪声门限为αmax{z(n)}后,第一功率序列n 1(n)满足以下条件: Exemplarily, the second noise threshold factor and the false alarm threshold information are both preset values. For example, the second noise threshold factor and the false alarm threshold information are both empirical values through simulation or testing. After determining that the first noise threshold is αmax After {z(n)}, the first power sequence n 1 (n) satisfies the following conditions:
n 1(n)∈{z(n)|z(n)<αmax{z(n)}} n 1 (n)∈{z(n)|z(n)<αmax{z(n)}}
则,根据所述第一功率序列n 1(n)计算第一临时噪声Nosie tmp1时,第一临时噪声Nosie tmp1满 足以下条件: Then, when calculating the first temporary noise Nosie tmp1 according to the first power sequence n 1 (n), the first temporary noise Nosie tmp1 satisfies the following conditions:
Figure PCTCN2023070569-appb-000001
Figure PCTCN2023070569-appb-000001
其中,L 1是n 1(n)的长度,α是第一噪声门限因子。 Among them, L 1 is the length of n 1 (n), and α is the first noise threshold factor.
则,第二噪声门限为βFaTh×Nosie tmp1,其中,FaTh是虚警门限,β是第二噪声门限因子。 Then, the second noise threshold is βFaTh×Nosie tmp1 , where FaTh is the false alarm threshold and β is the second noise threshold factor.
步骤S3:从所述频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列,并根据所述第二功率序列计算第二临时噪声。Step S3: Filter out a second power sequence that is less than or equal to the second noise threshold from the frequency domain power spectrum, and calculate a second temporary noise based on the second power sequence.
在一些实施方式中,所述从所述频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列,包括:In some embodiments, filtering out a second power sequence that is less than or equal to the second noise threshold from the frequency domain power spectrum includes:
筛除所述频域功率谱中大于所述第一噪声门限的功率值,得到第一频域功率谱;Filtering out power values greater than the first noise threshold in the frequency domain power spectrum to obtain a first frequency domain power spectrum;
从所述第一频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列。Screen out a second power sequence that is less than or equal to the second noise threshold from the first frequency domain power spectrum.
例如,筛除掉大于αmax{z(n)}的频率数据后的第一频域功率谱记为z 1(n),则,第二功率序列n 2(n)满足,n 2(n)∈{z 1(n)|z 1(n)≤βFaTh×Nosie tmp1}。 For example, the first frequency domain power spectrum after filtering out frequency data greater than αmax{z(n)} is recorded as z 1 (n), then the second power sequence n 2 (n) satisfies, n 2 (n) ∈{z 1 (n)|z 1 (n)≤βFaTh×Nosie tmp1 }.
根据第二功率序列n 2(n)计算第二临时噪声Nosie tmp2时,第二临时噪声Nosie tmp2满足: When calculating the second temporary noise Nosie tmp2 based on the second power sequence n 2 (n), the second temporary noise Nosie tmp2 satisfies:
Figure PCTCN2023070569-appb-000002
Figure PCTCN2023070569-appb-000002
其中,L 2是n 2(n)的长度,FaTh是虚警门限,β是第二噪声门限因子。 Among them, L 2 is the length of n 2 (n), FaTh is the false alarm threshold, and β is the second noise threshold factor.
步骤S4:从所述频域功率谱中筛选出大于所述第二噪声门限的第二频域功率谱,并获取所述第二频域功率谱和所述第二临时噪声之间的差值。Step S4: Filter out the second frequency domain power spectrum that is greater than the second noise threshold from the frequency domain power spectrum, and obtain the difference between the second frequency domain power spectrum and the second temporary noise. .
步骤S5:判断所述差值是否满足预设的噪声置信门限,并将所述频域功率谱中不满足所述噪声置信门限的功率值作为第三功率序列,及根据所述第三功率序列和所述第二功率序列计算平均噪声功率。Step S5: Determine whether the difference meets the preset noise confidence threshold, and use the power value in the frequency domain power spectrum that does not meet the noise confidence threshold as the third power sequence, and according to the third power sequence and the second power sequence to calculate the average noise power.
例如,从频域功率谱z(n)的第一频域功率谱z 1(n)中筛选出大于第二噪声门限βFaTh×Nosie tmp1的第二频域功率谱z 2(n),此时,取第二频域功率谱z 2(n)中的各元素与第二临时噪声Nosie tmp2作差,得到第二频域功率谱z 2(n)中的各元素与第二临时噪声Nosie tmp2对应的各个差值,并将各个差值与预设的噪声置信门限γ对比,若该差值小于等于噪声置信门限γ, 该差值在第二频域功率谱z 2(n)中所对应的功率值作为第三功率序列n 3(n),并将第三功率序列n 3(n)纳入平均噪声功率计算。 For example, filter out the second frequency domain power spectrum z 2 (n) that is greater than the second noise threshold βFaTh×Nosie tmp1 from the first frequency domain power spectrum z 1 (n) of the frequency domain power spectrum z(n). At this time , take the difference between each element in the second frequency domain power spectrum z 2 (n) and the second temporary noise Nosie tmp2 , and obtain the difference between each element in the second frequency domain power spectrum z 2 (n) and the second temporary noise Nosie tmp2 Each corresponding difference value, and compare each difference value with the preset noise confidence threshold γ, if the difference value is less than or equal to the noise confidence threshold γ, the difference value corresponds to the second frequency domain power spectrum z 2 (n) The power value is taken as the third power sequence n 3 (n), and the third power sequence n 3 (n) is included in the average noise power calculation.
即,第三功率序列n 3(n)满足,n 3(n)∈{z 2(n)|z 2(n)-Nosie tmp2≤γ}; That is, the third power sequence n 3 (n) satisfies, n 3 (n)∈{z 2 (n)|z 2 (n)-Nosie tmp2 ≤γ};
平均噪声功率NoiseMean满足,
Figure PCTCN2023070569-appb-000003
The average noise power NoiseMean satisfies,
Figure PCTCN2023070569-appb-000003
步骤S6:根据所述平均噪声功率和所述虚警门限信息设置目标峰值检测门限,并根据所述目标峰值检测门限对所述频域功率谱进行峰值检测。Step S6: Set a target peak detection threshold according to the average noise power and the false alarm threshold information, and perform peak detection on the frequency domain power spectrum according to the target peak detection threshold.
例如,在确定平均噪声功率NoiseMean后,设定目标峰值检测门限PeakThreshold为:PeakThreshold=NoiseMean×FaTh。根据目标峰值检测门限PeakThreshold获取频域功率谱z(n)中大于目标峰值检测门限PeakThreshold的第四功率序列,并获取第四功率序列中各个元素所对应的随机前导序列信息,从而可以从随机前导序列信息中获取终端设备对应的前导ID和确定上行链路的时间偏移量TA,进而确保终端设备与基站的接入成功率。For example, after determining the average noise power NoiseMean, set the target peak detection threshold PeakThreshold as: PeakThreshold=NoiseMean×FaTh. According to the target peak detection threshold PeakThreshold, obtain the fourth power sequence in the frequency domain power spectrum z(n) that is greater than the target peak detection threshold PeakThreshold, and obtain the random preamble sequence information corresponding to each element in the fourth power sequence, so that the random preamble can be obtained The preamble ID corresponding to the terminal device is obtained from the sequence information and the time offset TA of the uplink is determined, thereby ensuring the access success rate between the terminal device and the base station.
请参阅图3,图3为本公开实施例提供的一种基站的结构示意性框图。Please refer to FIG. 3 , which is a schematic structural block diagram of a base station provided by an embodiment of the present disclosure.
如图3所示,基站10包括处理器101和存储器102,处理器101和存储器102通过总线103连接,该总线比如为I2C(Inter-integrated Circuit)总线。As shown in Figure 3, the base station 10 includes a processor 101 and a memory 102. The processor 101 and the memory 102 are connected through a bus 103, which is, for example, an I2C (Inter-integrated Circuit) bus.
具体地,处理器101用于提供计算和控制能力,支撑整个基站10的运行。处理器101可以是中央处理单元(Central Processing Unit,CPU),该处理器101还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。其中,通用处理器101可以是微处理器或者该处理器也可以是任何常规的处理器等。Specifically, the processor 101 is used to provide computing and control capabilities to support the operation of the entire base station 10 . The processor 101 can be a central processing unit (Central Processing Unit, CPU). The processor 101 can also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC). ), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general processor 101 may be a microprocessor or the processor may be any conventional processor.
具体地,存储器102可以是Flash芯片、只读存储器(ROM,Read-Only Memory)磁盘、光盘、U盘或移动硬盘等。Specifically, the memory 102 may be a Flash chip, a read-only memory (ROM, Read-Only Memory) disk, an optical disk, a U disk or a mobile hard disk, etc.
其中,所述处理器101用于运行存储在存储器102中的计算机程序,并在执行所述计算机程序时实现如下步骤:Wherein, the processor 101 is used to run a computer program stored in the memory 102, and implement the following steps when executing the computer program:
获取接收到PRACH信号,并根据所述PRACH信号生成频域功率谱;Obtain the received PRACH signal and generate a frequency domain power spectrum according to the PRACH signal;
获取所述基站的网管配置数据,并根据所述网管配置数据和所述频域功率谱设置第一噪声门限,及根据所述第一噪声门限和所述网管配置数据设置第二噪声门限;Obtain the network management configuration data of the base station, set a first noise threshold according to the network management configuration data and the frequency domain power spectrum, and set a second noise threshold according to the first noise threshold and the network management configuration data;
从所述频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列,并根据所述 第二功率序列计算第二临时噪声;Filter out a second power sequence that is less than or equal to the second noise threshold from the frequency domain power spectrum, and calculate a second temporary noise based on the second power sequence;
从所述频域功率谱中筛选出大于所述第二噪声门限的第二频域功率谱,并获取所述第二频域功率谱和所述第二临时噪声之间的差值;Filter out a second frequency domain power spectrum that is greater than the second noise threshold from the frequency domain power spectrum, and obtain the difference between the second frequency domain power spectrum and the second temporary noise;
判断所述差值是否满足预设的噪声置信门限,并将所述频域功率谱中不满足所述噪声置信门限的功率值作为第三功率序列,及根据所述第三功率序列和所述第二功率序列计算平均噪声功率;Determine whether the difference meets a preset noise confidence threshold, and use the power value in the frequency domain power spectrum that does not meet the noise confidence threshold as a third power sequence, and according to the third power sequence and the The second power sequence calculates the average noise power;
根据所述平均噪声功率和所述虚警门限信息设置目标峰值检测门限,并根据所述目标峰值检测门限对所述频域功率谱进行峰值检测。A target peak detection threshold is set according to the average noise power and the false alarm threshold information, and peak detection is performed on the frequency domain power spectrum according to the target peak detection threshold.
在一些实施方式中,所述处理器101在根据所述网管配置数据和所述频域功率谱设置第一噪声门限时,包括:In some implementations, when the processor 101 sets the first noise threshold according to the network management configuration data and the frequency domain power spectrum, it includes:
根据所述网管配置数据获取第一噪声门限因子,并从所述频域功率谱中获取功率最大值;Obtain the first noise threshold factor according to the network management configuration data, and obtain the power maximum value from the frequency domain power spectrum;
根据所述功率最大值和所述第一噪声门限因子设置所述第一噪声门限。The first noise threshold is set according to the power maximum value and the first noise threshold factor.
在一些实施方式中,所述处理器101在根据所述第一噪声门限和所述网管配置数据设置第二噪声门限时,包括:In some implementations, when the processor 101 sets the second noise threshold according to the first noise threshold and the network management configuration data, the processor 101 includes:
根据所述第一噪声门限从所述频率功率谱中筛选出小于所述第一噪声门限的第一功率序列,并根据所述第一功率序列计算第一临时噪声;Screen out a first power sequence smaller than the first noise threshold from the frequency power spectrum according to the first noise threshold, and calculate a first temporary noise according to the first power sequence;
根据所述网管配置数据获取第二噪声门限因子及虚警门限信息,并根据所述第一临时噪声、所述第二噪声门限因子及所述虚警门限信息设置所述第二噪声门限。在一些实施方式中,所述处理器101从所述频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列时,包括:Obtain a second noise threshold factor and false alarm threshold information according to the network management configuration data, and set the second noise threshold according to the first temporary noise, the second noise threshold factor and the false alarm threshold information. In some embodiments, when the processor 101 filters out the second power sequence that is less than or equal to the second noise threshold from the frequency domain power spectrum, the process includes:
筛除所述频域功率谱中大于所述第一噪声门限的功率值,得到第一频域功率谱;Filtering out power values greater than the first noise threshold in the frequency domain power spectrum to obtain a first frequency domain power spectrum;
从所述第一频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列。Screen out a second power sequence that is less than or equal to the second noise threshold from the first frequency domain power spectrum.
在一些实施方式中,所述处理器101从所述频域功率谱中筛选出大于所述第二噪声门限的第二频域功率谱时,包括:In some embodiments, when the processor 101 filters out the second frequency domain power spectrum that is greater than the second noise threshold from the frequency domain power spectrum, the process includes:
从所述频域功率谱的所述第一频域功率谱中筛选出大于所述第二噪声门限的第二频域功率谱。A second frequency domain power spectrum that is greater than the second noise threshold is screened out from the first frequency domain power spectrum of the frequency domain power spectrum.
在一些实施方式中,所述处理器101根据所述目标峰值检测门限对所述频域功率谱进行峰值检测时,包括:In some embodiments, when the processor 101 performs peak detection on the frequency domain power spectrum according to the target peak detection threshold, it includes:
根据所述目标峰值检测门限获取所述频域功率谱中大于所述目标峰值检测门限的第四功率序列,并获取所述第四功率序列中各个元素所对应的前导序列信息。Obtain a fourth power sequence in the frequency domain power spectrum that is greater than the target peak detection threshold according to the target peak detection threshold, and obtain preamble sequence information corresponding to each element in the fourth power sequence.
在一些实施方式中,所述处理器101根据所述PRACH信号生成频域功率谱时,包括:In some embodiments, when the processor 101 generates the frequency domain power spectrum according to the PRACH signal, it includes:
对接收到的PRACH信号预处理,得到时域的PRACH信号;Preprocess the received PRACH signal to obtain the PRACH signal in the time domain;
将所述时域的PRACH信号进行FFT变换到频域,得到PRACH信号对应的PRACH频域数据;Perform FFT transformation of the PRACH signal in the time domain to the frequency domain to obtain PRACH frequency domain data corresponding to the PRACH signal;
根据所述PRACH频域数据和预设的频域序列生成所述频域功率谱。The frequency domain power spectrum is generated according to the PRACH frequency domain data and a preset frequency domain sequence.
需要说明的是,所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的基站的具体工作过程,可以参考前述通信方法实施例中的对应过程,在此不再赘述。It should be noted that those skilled in the art can clearly understand that for the convenience and simplicity of description, the specific working process of the base station described above can be referred to the corresponding process in the aforementioned communication method embodiment, and will not be described again here.
本公开实施例还提供一种存储介质,用于计算机可读存储,所述存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现如本公开实施例说明书提供的任一项PRACH的峰值检测方法的步骤。Embodiments of the present disclosure also provide a storage medium for computer-readable storage. The storage medium stores one or more programs. The one or more programs can be executed by one or more processors to implement the following: The steps of any PRACH peak detection method provided in the embodiments of this disclosure.
其中,所述存储介质可以是前述实施例所述的基站的内部存储单元,例如所述基站的硬盘或内存。所述存储介质也可以是所述基站的外部存储设备,例如所述基站上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。The storage medium may be an internal storage unit of the base station described in the previous embodiment, such as a hard disk or memory of the base station. The storage medium may also be an external storage device of the base station, such as a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (SD) card, or a flash memory card equipped on the base station. (Flash Card) etc.
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施例中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。Those of ordinary skill in the art can understand that all or some steps, systems, and functional modules/units in the devices disclosed above can be implemented as software, firmware, hardware, and appropriate combinations thereof. In hardware embodiments, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be composed of several physical components. Components execute cooperatively. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, a digital signal processor, or a microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit . Such software may be distributed on computer-readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). As is known to those of ordinary skill in the art, the term computer storage media includes volatile and nonvolatile media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. removable, removable and non-removable media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disk (DVD) or other optical disk storage, magnetic cassettes, tapes, disk storage or other magnetic storage devices, or may Any other medium used to store the desired information and that can be accessed by a computer. Additionally, it is known to those of ordinary skill in the art that communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .
应当理解,在本公开说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的 项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。It will be understood that the term "and/or" as used in this disclosure and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items. It should be noted that, as used herein, the terms "include", "comprising" or any other variation thereof are intended to cover a non-exclusive inclusion, such that a process, method, article or system that includes a list of elements not only includes those elements, but It also includes other elements not expressly listed or that are inherent to the process, method, article or system. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of other identical elements in the process, method, article, or system that includes that element.
上述本公开实施例序号仅仅为了描述,不代表实施例的优劣。以上所述,仅为本公开的具体实施例,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以权利要求的保护范围为准。The above serial numbers of the embodiments of the present disclosure are only for description and do not represent the advantages and disadvantages of the embodiments. The above are only specific embodiments of the present disclosure, but the protection scope of the present disclosure is not limited thereto. Any person familiar with the technical field can easily think of various equivalent methods within the technical scope disclosed in the present disclosure. Modifications or substitutions, these modifications or substitutions should be covered by the protection scope of this disclosure. Therefore, the protection scope of the present disclosure should be subject to the protection scope of the claims.

Claims (10)

  1. 一种PRACH的峰值检测方法,应用于基站,所述方法包括:A PRACH peak detection method, applied to base stations, the method includes:
    获取接收到PRACH信号,并根据所述PRACH信号生成频域功率谱;Obtain the received PRACH signal and generate a frequency domain power spectrum according to the PRACH signal;
    获取所述基站的网管配置数据,并根据所述网管配置数据和所述频域功率谱设置第一噪声门限,及根据所述第一噪声门限和所述网管配置数据设置第二噪声门限;Obtain the network management configuration data of the base station, set a first noise threshold according to the network management configuration data and the frequency domain power spectrum, and set a second noise threshold according to the first noise threshold and the network management configuration data;
    从所述频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列,并根据所述第二功率序列计算第二临时噪声;Filter out a second power sequence that is less than or equal to the second noise threshold from the frequency domain power spectrum, and calculate a second temporary noise based on the second power sequence;
    从所述频域功率谱中筛选出大于所述第二噪声门限的第二频域功率谱,并获取所述第二频域功率谱和所述第二临时噪声之间的差值;Filter out a second frequency domain power spectrum that is greater than the second noise threshold from the frequency domain power spectrum, and obtain the difference between the second frequency domain power spectrum and the second temporary noise;
    判断所述差值是否满足预设的噪声置信门限,并将所述频域功率谱中不满足所述噪声置信门限的功率值作为第三功率序列,及根据所述第三功率序列和所述第二功率序列计算平均噪声功率;Determine whether the difference meets a preset noise confidence threshold, and use the power value in the frequency domain power spectrum that does not meet the noise confidence threshold as a third power sequence, and according to the third power sequence and the The second power sequence calculates the average noise power;
    根据所述平均噪声功率和所述虚警门限信息设置目标峰值检测门限,并根据所述目标峰值检测门限对所述频域功率谱进行峰值检测。A target peak detection threshold is set according to the average noise power and the false alarm threshold information, and peak detection is performed on the frequency domain power spectrum according to the target peak detection threshold.
  2. 根据权利要求1所述的检测方法,其中,所述根据所述网管配置数据和所述频域功率谱设置第一噪声门限,包括:The detection method according to claim 1, wherein said setting the first noise threshold according to the network management configuration data and the frequency domain power spectrum includes:
    根据所述网管配置数据获取第一噪声门限因子,并从所述频域功率谱中获取功率最大值;Obtain the first noise threshold factor according to the network management configuration data, and obtain the power maximum value from the frequency domain power spectrum;
    根据所述功率最大值和所述第一噪声门限因子设置所述第一噪声门限。The first noise threshold is set according to the power maximum value and the first noise threshold factor.
  3. 根据权利要求2所述的检测方法,其中,所述根据所述第一噪声门限和所述网管配置数据设置第二噪声门限,包括:The detection method according to claim 2, wherein setting the second noise threshold according to the first noise threshold and the network management configuration data includes:
    根据所述第一噪声门限从所述频率功率谱中筛选出小于所述第一噪声门限的第一功率序列,并根据所述第一功率序列计算第一临时噪声;Screen out a first power sequence smaller than the first noise threshold from the frequency power spectrum according to the first noise threshold, and calculate a first temporary noise according to the first power sequence;
    根据所述网管配置数据获取第二噪声门限因子及虚警门限信息,并根据所述第一临时噪声、所述第二噪声门限因子及所述虚警门限信息设置所述第二噪声门限。Obtain a second noise threshold factor and false alarm threshold information according to the network management configuration data, and set the second noise threshold according to the first temporary noise, the second noise threshold factor and the false alarm threshold information.
  4. 根据权利要求3所述的检测方法,其中,所述从所述频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列,包括:The detection method according to claim 3, wherein filtering out the second power sequence that is less than or equal to the second noise threshold from the frequency domain power spectrum includes:
    筛除所述频域功率谱中大于所述第一噪声门限的功率值,得到第一频域功率谱;Filtering out power values greater than the first noise threshold in the frequency domain power spectrum to obtain a first frequency domain power spectrum;
    从所述第一频域功率谱中筛选出小于或等于所述第二噪声门限的第二功率序列。Screen out a second power sequence that is less than or equal to the second noise threshold from the first frequency domain power spectrum.
  5. 根据权利要求4所述的检测方法,其中,所述从所述频域功率谱中筛选出大于所述第 二噪声门限的第二频域功率谱,包括:The detection method according to claim 4, wherein filtering out the second frequency domain power spectrum that is greater than the second noise threshold from the frequency domain power spectrum includes:
    从所述频域功率谱的所述第一频域功率谱中筛选出大于所述第二噪声门限的第二频域功率谱。A second frequency domain power spectrum that is greater than the second noise threshold is screened out from the first frequency domain power spectrum of the frequency domain power spectrum.
  6. 根据权利要求5所述的检测方法,其中,所述根据所述目标峰值检测门限对所述频域功率谱进行峰值检测,包括:The detection method according to claim 5, wherein performing peak detection on the frequency domain power spectrum according to the target peak detection threshold includes:
    根据所述目标峰值检测门限获取所述频域功率谱中大于所述目标峰值检测门限的第四功率序列,并获取所述第四功率序列中各个元素所对应的前导序列信息。Obtain a fourth power sequence in the frequency domain power spectrum that is greater than the target peak detection threshold according to the target peak detection threshold, and obtain preamble sequence information corresponding to each element in the fourth power sequence.
  7. 根据权利要求1-6任一项所述的检测方法,其中,所述根据所述PRACH信号生成频域功率谱,包括:The detection method according to any one of claims 1 to 6, wherein generating a frequency domain power spectrum according to the PRACH signal includes:
    对接收到的PRACH信号预处理,得到时域的PRACH信号;Preprocess the received PRACH signal to obtain the PRACH signal in the time domain;
    将所述时域的PRACH信号进行FFT变换到频域,得到PRACH信号对应的PRACH频域数据;Perform FFT transformation of the PRACH signal in the time domain to the frequency domain to obtain PRACH frequency domain data corresponding to the PRACH signal;
    根据所述PRACH频域数据和预设的频域序列生成所述频域功率谱。The frequency domain power spectrum is generated according to the PRACH frequency domain data and a preset frequency domain sequence.
  8. 一种基站,所述基站包括处理器、存储器、存储在所述存储器上并可被所述处理器执行的计算机程序以及用于实现所述处理器和所述存储器之间的连接通信的数据总线,其中所述计算机程序被所述处理器执行时,实现权利要求1-7任一项所述的PRACH的峰值检测方法的步骤。A base station, the base station including a processor, a memory, a computer program stored on the memory and executable by the processor, and a data bus for realizing connection communication between the processor and the memory , wherein when the computer program is executed by the processor, the steps of the PRACH peak detection method according to any one of claims 1 to 7 are implemented.
  9. 一种无线通信系统,所述无线通信系统至少包括如权利要求8所述的基站。A wireless communication system, the wireless communication system at least includes the base station according to claim 8.
  10. 一种存储介质,用于计算机可读存储,所述存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现权利要求1至7中任一项所述的PRACH的峰值检测的步骤。A storage medium for computer-readable storage, the storage medium stores one or more programs, the one or more programs can be executed by one or more processors to implement any of claims 1 to 7 A step of peak detection of PRACH.
PCT/CN2023/070569 2022-06-22 2023-01-05 Prach peak detection method, base station, communication system, and medium WO2023246079A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210711565.5A CN117320178A (en) 2022-06-22 2022-06-22 Peak detection method, base station, communication system and medium for PRACH
CN202210711565.5 2022-06-22

Publications (1)

Publication Number Publication Date
WO2023246079A1 true WO2023246079A1 (en) 2023-12-28

Family

ID=89241261

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/070569 WO2023246079A1 (en) 2022-06-22 2023-01-05 Prach peak detection method, base station, communication system, and medium

Country Status (2)

Country Link
CN (1) CN117320178A (en)
WO (1) WO2023246079A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103108338A (en) * 2011-11-14 2013-05-15 京信通信系统(中国)有限公司 Detection method, device and base station for random access signal
US20150215968A1 (en) * 2014-01-27 2015-07-30 Texas Instruments Incorporated Random access channel false alarm control
WO2020053900A1 (en) * 2018-09-16 2020-03-19 Indian Institute Of Technology Hyderabad Method and system for detecting physical random access channel (prach) transmission from multiple user equipment's
CN110933703A (en) * 2019-12-27 2020-03-27 京信通信系统(中国)有限公司 User detection method, device, equipment and storage medium
CN113038514A (en) * 2021-03-24 2021-06-25 中国科学院计算技术研究所 Self-adaptive method of 5G PRACH peak detection algorithm
CN114285527A (en) * 2021-12-29 2022-04-05 四川天邑康和通信股份有限公司 PRACH false peak removing threshold detection method applied to 5G base station

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103108338A (en) * 2011-11-14 2013-05-15 京信通信系统(中国)有限公司 Detection method, device and base station for random access signal
US20150215968A1 (en) * 2014-01-27 2015-07-30 Texas Instruments Incorporated Random access channel false alarm control
WO2020053900A1 (en) * 2018-09-16 2020-03-19 Indian Institute Of Technology Hyderabad Method and system for detecting physical random access channel (prach) transmission from multiple user equipment's
CN110933703A (en) * 2019-12-27 2020-03-27 京信通信系统(中国)有限公司 User detection method, device, equipment and storage medium
CN113038514A (en) * 2021-03-24 2021-06-25 中国科学院计算技术研究所 Self-adaptive method of 5G PRACH peak detection algorithm
CN114285527A (en) * 2021-12-29 2022-04-05 四川天邑康和通信股份有限公司 PRACH false peak removing threshold detection method applied to 5G base station

Also Published As

Publication number Publication date
CN117320178A (en) 2023-12-29

Similar Documents

Publication Publication Date Title
US8059765B2 (en) Method and apparatus to detect random access channel preamble
US9717100B2 (en) Detecting physical random access channel preambles in a long term evolution communication system
US8576810B2 (en) Method and apparatus for detecting secondary synchronization signal
US8681750B2 (en) Apparatus, methods, and computer program products providing limited use of Zadoff-Chu sequences in pilot or preamble signals
WO2017191522A1 (en) Preamble detection and time-of-arrival estimation for a single- tone frequency hopping random access preamble
JP5612224B2 (en) Primary synchronization signal detection method and apparatus
CN108307408B (en) Detection method, device and base station for recognizing false detection caused by interference
WO2018196092A1 (en) Random access method and device
WO2020019619A1 (en) Positioning reference signal generation method and device, base station, and readable storage medium
WO2021022458A1 (en) Search space configuration method and apparatus, random access method and apparatus, and storage medium
WO2020024381A1 (en) Positioning reference signal generation method and apparatus, communication system, and storage medium
WO2020053900A1 (en) Method and system for detecting physical random access channel (prach) transmission from multiple user equipment&#39;s
WO2023246079A1 (en) Prach peak detection method, base station, communication system, and medium
WO2021249476A1 (en) Srs resource indication method, srs resource determination method, and related device
WO2015074210A1 (en) Initial search method and apparatus for user equipment and cell thereof
US10448432B1 (en) Frequency domain PRACH filter for PRACH signal recovery
WO2018113569A1 (en) Method and device for detecting signature sequence in wireless communication system
WO2014082284A1 (en) Method and apparatus for demodulating physical random access channel signal
CN114630438A (en) Prach detection method in NR5G
WO2019179268A1 (en) Method, device and system for transmitting reference signal
CN111602458B (en) Method and apparatus for NPRACH detection
WO2020029772A1 (en) Method for indicating and acquiring position of synchronization signal block, base station, terminal and medium
WO2018035771A1 (en) Method and device for detecting idle frequency band
WO2021169716A1 (en) Scanning method, terminal and storage medium
US20220394780A1 (en) Random access preamble detection for propagation delay

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23825739

Country of ref document: EP

Kind code of ref document: A1