Example embodiments relate generally to a method and a system for localization of a mobile device using a wireless communication network, especially in scenarios where the mobile device has an extremely low transmission and/or reception power.
Global Positioning System (GPS) is a popular approach to localizing a mobile terminal device. However, in an indoor environment, a satellite signal may be significantly shadowed, which may cause global navigation satellite systems (GNSS), such as a global positioning system (GPS), to be ineffective in locating a mobile device indoors. An indoor wireless local area network (WLAN) may also be used to localize a mobile device indoors, though a precision of a WLAN is not always certain, and an availability of a WLAN cannot be relied upon especially in the event of a disaster scenario.
Mobile devices with low transmission and/or reception power may also be particularly difficult to localize a mobile terminal device using GPS, WLAN, or other localization schemes. Furthermore, noise and interference from other mobile devices can degrade a signal-to-interference and noise-ratio (SINR), which may limit signal processing techniques, making indoor localization a further challenge. Other technologies, such as radio frequency identification (RFID), ultra-wideband (UWB) and/or wireless sensor networks (WSN), all require dedicated infrastructure with significant resources and costs for use in localization of mobile devices.
At least one example embodiments relates to a method of localization of a mobile device using a non-orthogonal multiple access (NOMA) scheme involving at least two base stations.
In an embodiment, the method includes sending, by at least one first processor of the mobile device, a positioning request to the at least two base stations; receiving, by the at least one first processor, base station coordinate information and direction of arrival (DoA) information from the at least two base stations; computing, by the at least one first processor, distance information based on the base station coordinate information, the distance information representing one or more physical distances between the at least two base stations; and determining, by the at least one first processor, a location of the mobile device based on the DoA information and the distance information.
In an embodiment, the mobile device is located in an indoor location.
In an embodiment, the method is performed without the support of a global navigation satellite system (GNSS), and without the support of a wireless local area network (WLAN).
In an embodiment, the method is performed using uncoordinated base stations.
At least another example embodiment relates to a network node in communication with at least two base stations that have adopted a non-orthogonal multiple access (NOMA) scheme.
In an embodiment, the network node includes a memory storing computer-readable instructions; and at least one processor configured to execute the computer-readable instructions such that the at least one processor is configured to, send a positioning request to at least two base stations, receive base station coordination information and direction of arrival (DoA) information from the at least two base stations, compute distance information based on the base station coordinate information, the distance information representing one or more physical distances between the at least two base stations, and determine a location of the mobile device based on the DoA information and the distance information.
In an embodiment, the mobile device is located in an indoor location.
In an embodiment, the mobile device is located in an indoor location.
In an embodiment, the location of the mobile device is determined without the support of a global navigation satellite system (GNSS), and without the support of a wireless local area network (WLAN).
In an embodiment, the location of the mobile device is determined using uncoordinated base stations.
At least another example embodiment relates to a non-transitory computer readable medium in which computer program code is stored, the computer program code causing at least one first processor of a mobile device to perform instructions.
In an embodiment, the instructions include sending a positioning request to the at least two base stations, the at least two base stations implementing a non-orthogonal multiple access (NOMA) scheme; receiving base station coordinate information and direction of arrival (DoA) information from the at least two base stations; computing distance information based on the base station coordinate information, the distance information representing one or more physical distances between the at least two base stations; and determining a location of the mobile device based on the DoA information and the distance information.
At least another example embodiment relates to a computer program code configured to perform a method when executed by the at least one first processor.
In an embodiment, the method includes sending a positioning request to the at least two base stations, the at least two base stations implementing a non-orthogonal multiple access (NOMA) scheme; receiving base station coordinate information and direction of arrival (DoA) information from the at least two base stations; computing distance information based on the base station coordinate information, the distance information representing one or more physical distances between the at least two base stations; and determining a location of the mobile device based on the DoA information and the distance information.
In an embodiment, the computer program code is stored on a computer readable storage medium.
The above and other features and advantages of example embodiments will become more apparent by describing in detail, example embodiments with reference to the attached drawings. The accompanying drawings are intended to depict example embodiments and should not be interpreted to limit the intended scope of the claims. The accompanying drawings are not to be considered as drawn to scale unless explicitly noted.
While example embodiments are capable of various modifications and alternative forms, embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit example embodiments to the particular forms disclosed, but on the contrary, example embodiments are to cover all modifications, equivalents, and alternatives falling within the scope of the claims. Like numbers refer to like elements throughout the description of the figures.
Before discussing example embodiments in more detail, it is noted that some example embodiments are described as processes or methods depicted as flowcharts. Although the flowcharts describe the operations as sequential processes, many of the operations may be performed in parallel, concurrently or simultaneously. In addition, the order of operations may be re-arranged. The processes may be terminated when their operations are completed, but may also have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, subprograms, etc.
Methods discussed below, some of which are illustrated by the flow charts, may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine or computer readable medium such as a storage medium, such as a non-transitory storage medium. A processor(s) may perform the necessary tasks.
Specific structural and functional details disclosed herein are merely representative for purposes of describing example embodiments. This invention may, however, be embodied in many alternate forms and should not be construed as limited to only the embodiments set forth herein.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
It will be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being “directly connected” or “directly coupled” to another element, there are no intervening elements present. Other words used to describe the relationship between elements should be interpreted in a like fashion (e.g., “between” versus “directly between,” “adjacent” versus “directly adjacent,” etc.).
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a,” “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” “comprising,” “includes” and/or “including,” when used herein, specify the presence of stated features, integers, steps, operations, elements and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components and/or groups thereof.
It should also be noted that in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may in fact be executed concurrently or may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which example embodiments belong. It will be further understood that terms, e.g., those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Portions of the example embodiments and corresponding detailed description are presented in terms of software, or algorithms and symbolic representations of operation on data bits within a computer memory. These descriptions and representations are the ones by which those of ordinary skill in the art effectively convey the substance of their work to others of ordinary skill in the art. An algorithm, as the term is used here, and as it is used generally, is conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of optical, electrical, or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
In the following description, illustrative embodiments will be described with reference to acts and symbolic representations of operations (e.g., in the form of flowcharts) that may be implemented as program modules or functional processes include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types and may be implemented using existing hardware at existing network elements. Such existing hardware may include one or more Central Processing Units (CPUs), digital signal processors (DSPs), application-specific-integrated-circuits, field programmable gate arrays (FPGAs) computers or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, or as is apparent from the discussion, terms such as “processing” or “computing” or “calculating” or “determining” of “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical, electronic quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Note also that the software implemented aspects of the example embodiments are typically encoded on some form of program storage medium or implemented over some type of transmission medium. The program storage medium may be any non-transitory storage medium such as magnetic, optical, or flash memory, etc. Similarly, the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium known to the art. The example embodiments not limited by these aspects of any given implementation.
General Methodology:
Example embodiments relate to localization of a mobile terminal device, especially in cases where the mobile terminal device may be located indoors, and the mobile terminal device may have an extremely low transmission and or reception power. The receive signal component from a single BS may suffer from an additive noise as strong as 500% to 600% of its own RX power, and may additionally suffer from an interference component up to 500% of its own RX power. The localization scheme may be used to locate the mobile device without assistance from a global navigation satellite system (GNSS), such as a global positioning system (GPS), and without the assistance of an indoor wireless local area network (WLAN), in order to locate the mobile device. In particular, existing cellular networks, utilizing base stations equipped with massive antenna arrays with high sensitivity, may be used to precisely estimate a location of the mobile terminal device.
In example embodiments, the mobile terminal may exploit Interleave Division Multiple Access (IDMA), as defined by Ping, Li, Liu, Lihai, Wu, Keying, Leung, W. K., “Interleave-Division Multiple Access,” IEEE Trans. Wireless Communi., Vol. 5, No. 4, P. 938-347, April 2006, where the mobile terminal may be a candidate for a Non-Orthogonal Multiple Access (NOMA) scheme (especially within a 5G network scheme), where the IDMA is well-known for providing robust performance for asynchronous communications. Link level simulations have demonstrated precision in localization even at low Signal-to-Noise Ratio (SNR) conditions.
In example embodiments, the system architecture (shown in
It should be understood that, conventional orthogonal multiple access (MA) schemes (e.g. CDMA, TDMA, and FDMA) are not preferred for localization, as these schemes require precise scheduling to fulfill the localization requirements, due to a need for synchronous communications with these schemes. Without the scheduling, a performance of conventional MA schemes for purposes of localization cannot be guaranteed. With low transmission (TX) and reception (RX) power, a precise scheduling also cannot be expected. Therefore, in the instant example embodiments, the signaling overhead may be significantly reduced. For instance, a FEC coding may be unnecessary. A spreading may instead be replaced by repetition. Thus, there is no need to exchange such information between TX and RX. Additionally, using the adopted NOMA scheme, such as IDMA, the example embodiments may support asynchronous communications. The quality of data detection may not be influenced by an individual signal's time of arrival. These aspects therefore provide a robustness offered by NOMA for purposes of localization.
Signal Model:
In an embodiment, synchronization between a user equipment (UE) and base station (BS) is necessary especially for preamble transmission. The preamble patterns may be selected from an orthogonal basis, e.g. Walsh-Hadamard matrix, Discrete Fourier Transform (DFT) matrix. Once a code from the orthogonal basis is selected by BS k (from within a plurality of base stations), the code may be mapped to a time-frequency resource in the preamble zone. The permutation mapping rule is a priori known by the BS k and the mobile device. The preamble may be utilized by the UE to detect the activity from BS k. Furthermore, a successfully detected preamble may embrace control information, such as Modulation and Coding Scheme (MCS) or interleaving pattern, in one-to-one correspondence. The BS k may select its interleaving pattern sporadically. The collision probability Pc, that at least two BSs select the same interleaving pattern unfortunately, can be computed as follows.
Where N may denote a number of candidates for the preamble patterns, and K may denote a number of BSs sending localization response to the mobile device. In order to suppress the collision probability Pc, each BS may select M preamble patterns independently in another time-frequency allocation in a preamble zone. The same data signal will be independently interleaved and superimposed in a same time-frequency allocation in data zone. For instance, with M=2 preamble patterns per BS, the collision probability will be reduced to 1.26% and 0.33%, by exploiting a preamble set with 128 candidates and 256 candidates, respectively.
Regarding a detection for non-orthogonal superposition of K users (i.e., K UEs) data signal, for a K-layer IDMA system, the system equation may be given as follows:
Where hk may denote a wireless channel between k-th BS and the UE, and z may denote an Additive White Gaussian Noise (AWGN) with noise power spectral density N0=2σ2. A Wide-Sense Stationary Uncorrelated Scattering (WSSUS) channel may be adopted to model a channel response, where the channel modeling may be performed as disclosed in Hoeher, P., “A Statistical Discrete-Time Model for the WSSUS Multipath Channel,” IEEE Trans. Veh. Technol., Vol. 41, No. 4, p. 461-468, November 1992. The model for the channel response at a discrete time instant n between BS k and the UE may be determined as follows.
Where L denotes a number of propagation paths, φj(k) may stand for a uniformly distributed phase, and fD,j(k) may be a random variable given by Jake's power spectral density. A corresponding auto-correlation function may be determined as follows.
R
n=0(2πTsfDn) (Eq. 4)
Where the 0(⋅) may denote a Bessel function of order zero, Ts may denote a symbol duration, fD may be a maximal Doppler shift and TsfD may characterize a speed of channel variation, and thus may be denoted as normalized fading rate. Further, the channel coefficients hk may obey independent and identically distributed (i.i.d.) complex Gaussian distributions (i.e., hk˜(0, 1)).
Channel Estimation:
For downlink synchronous communications, discrete pilots may be considered, especially for indoor mobile devices with generally low mobility. Nevertheless, due to potentially different Time of Arrival (ToA) in indoor environment, the synchronous communications may usually not be realized. Thus, discrete pilots may be contaminated by data signal or other unwanted interference. Superimposed pilots may be capable of combating against the asynchronous effect. A superimposed pilot based channel estimation may be demonstrated for NOMA in respective single carrier and multicarrier systems, as described in the following documents: Chen, Yejian, Wild, T., Schaich, F., “Trellis-Based Channel Estimation For Asynchronous IDMA With Superimposed Pilots,” in Proc. of IEEE/CIC Int. Conf. Commun. (ICCC'14), pp. 539-543, October 2014, and Chen, Yejian, “Two-Dimensional Pilot Design for Non-Orthogonal Multiple Access in Multicarrier System,” in Proc. of IEEE Globecom Workshops (GC Wkshps), December 2016.
Interleaving-Based Multiple Access:
Interleave Division Multiple Access (IDMA) is an example of a solution, among the interleaving-based multiple access schemes, which may be relied upon in the instant example embodiments. IDMA may exploit both narrow sense code and wide sense codes (e.g. repetition code or spreading code), which may be implemented jointly with layer-specific interleaving. A significant benefit of IDMA, is an Elementary Signal Estimator (ESE), which may establish a statistics-based soft Parallel Interference Cancellation (PIC) processing chain, iteratively. Being supported by central limit theorem, a superposition of multiple signal layers may make the Gaussian Approximation (GA), such like ESE, operate more effectively, even if the number of the layers increases. Extrinsic information delivered by ESE may be determined, as follows.
Where p(y[n]) may denote a conditional Probability Density Function (PDF) for receive signal y estimated and improved through iteration. A channel decoder may be conditionally excluded from the iteration, in order to reduce computational requirements. Hence, the extrinsic information produced by a despreader will be feedback to ESE, and may be determined as follows.
Where G may denote a spreading or repetition length, ñ may stand for an index n after de-interleaving, and s[g(ñ)] may represent a spreading or repetition pattern with respect to the g-th chip relating to symbol ñ. By involving a channel decoder to the iteration loop, the channel decoder may help speed up the iteration to approach the convergence, as a trade-off between the complexity and performance.
Coordinate Computation:
A location of a mobile device may be determined by the DoA and coordinates of at least two BSs. As shown in
With t1=tan(θDoA,1), t2=tan(θDoA,2), and t1≠t2
This provides an additional opportunity to select the result in a statistical manner, or simply average the observations, which may be determined, as follows.
Where i≠j and ti≠tj.
Still referring to
The memory 200 may include a localization routine (LR) 210 (which may be saved in the ROM 200a), where the LR 210 may include algorithms and instructions that may cause the processor 230 to perform localization, such as the localization method steps described in relation to the method of
In an embodiment, the BSs 20a/20b are not required to estimate a distance to the UE 10, nor do the BSs 20a/20b need to communicate cooperatively with each other, in any way. Instead, each BS 20a/20b may encode its own coordinate (longitude/latitude; “base station coordinate information”) and the Direction of Arrival (DoA) information (described below) within a 80-bit sequence message, which may be sent to the UE 10 (in step S302, described below). In this uplink localization request stage, the asynchronous communications between the UE 10 and the BSs 20a/20b may not influence any precision of a direction of arrival (DoA) estimation. In a downlink positioning stage, the BSs 20a/20b may deliver the control information and data packet in a synchronous mode. Nevertheless, the BSs 20a/20b communication signals may still be asynchronous, and usually may be low-power at the mobile device.
In step S302 of
The information exchange of steps S300 and S302, between the UE 10 and BSs 20a/20b, may be considered an exchange that may effectively create a Downlink Non-Orthogonal Multiple Access (NOMA) system 30, where the system 30 may require the mobile UE 10 to decode the superposition signals (i.e., DoA information) from both BSs 20a/20b. Based on the received DoA information, in step S304, the processor 230 of the UE 10 may then compute distance information 14 (which may be denoted as ‘d’), between both BSs 20a/20b (θ1 and θ2, as shown in
In step S306 of
In order to avoid the need for additional control information, a Forward Error Correction (FEC) coding may not be utilized. Furthermore, spreading may be replaced by the repetition. Meaning, all the BSs 20 may use a same repetition pattern. A superimposed pilot may be deployed, for two purposes, namely channel estimation and user-specific interleaving pattern recognition
Although depicted and described herein with respect to embodiments in which, for example, programs and logic are stored within the data storage and the memory is communicatively connected to the processor, it should be appreciated that such information may be stored in any other suitable manner (e.g., using any suitable number of memories, storages or databases); using any suitable arrangement of memories, storages or databases communicatively connected to any suitable arrangement of devices; storing information in any suitable combination of memory(s), storage(s) or internal or external database(s); or using any suitable number of accessible external memories, storages or databases. As such, the term data storage referred to herein is meant to encompass all suitable combinations of memory(s), storage(s), and database(s).
The description and drawings merely illustrate the principles of the example embodiments. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within its spirit and scope. Furthermore, all examples recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the invention and the concepts contributed by the inventor(s) to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass equivalents thereof.
The functions of the various elements shown in the example embodiments, including any functional blocks labeled as “processors,” may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared. Moreover, explicit use of the term “processor” or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, network processor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), and non-volatile storage. Other hardware, conventional or custom, may also be included.
Example embodiments having thus been described, it will be obvious that the same may be varied in many ways. Such variations are not to be regarded as a departure from the intended spirit and scope of example embodiments, and all such modifications as would be obvious to one skilled in the art are intended to be included within the scope of the following claims.