The present disclosure is related to the technical field of Ultra-Wideband (UWB). In particular, the present disclosure is related to a method for operating a UWB communication unit as a radar device, in particular to a method for operating a UWB communication unit as a radar device to detect breathing of multiple human targets.
Ultra-wideband is a technology that uses a high signal bandwidth, in particular for transmitting digital data over a wide spectrum of frequency bands with very low power. For example, ultra-wide band technology may use the frequency spectrum of 3.1 to 10.6 GHz and may feature a high-frequency bandwidth of more than 500 MHz and very short pulse signals, resulting in high data rates. The UWB technology enables a high data throughput for communication devices and a high precision for the localization of devices.
An objective is to provide an improved method for operating a UWB communication device.
This objective may be met by the subject matter according to the independent claims. Advantageous embodiments are described by dependent claims.
According to a first aspect there is provided a method for operating a UWB communication unit, comprising the steps:
In this way by means of the proposed method a breathing direction and breathing signals of human targets can be detected. The proposed method is able to detect a single living target (e.g. person, animal), wherein human targets are identified and can be resolved from ghost reflections from static objects. Advantageously, the proposed method can be implemented on-chip for a usage in a UWB-enabled communication device.
According to a further aspect there is provided a computer implemented method to carry out the proposed method.
According to a further aspect there is provided a UWB communication unit, comprising means to perform the proposed computer implemented method.
According to a further aspect there is provided an electronic device comprising a proposed UWB communication unit.
According to an embodiment, in step b) the removing of the data concerning the coupled path is done in the time domain. In this way, the coupled part with a strong DC component is removed in order to detect real targets.
According to a further embodiment in step b) a deletion of data concerning static targets are removed in the time domain by taking the channel impulse responses, CIR, and by subtracting one reference from the channel impulse responses, CIRs and to compensate the drift. Thus slow changings of the coupled path over time can be considered. In this way, it is still possible to determine a range doppler map. By removing the zero bin, the first CIR is taken as a reference CIR.
According to a further embodiment, every first channel impulse response, CIR, is taken as a reference and is subtracted from every following next defined number of channel impulse responses, CIR. In this way, e.g. a first CIR is subtracted from the following 99 CIRs, or the first CIR is subtracted from the next 10 CIRs, etc. In this way a detection of moving targets is supported, because only changes within a defined number of CIRs are then captured. As a consequence, clutter removal and drift compensation is done in this way.
According to a further embodiment, in step c) the detection of target peaks is done by computing a range doppler map out of clutter removed channel impulse responses, CIR and a mean doppler profile, wherein clutter removed channel impulse responses, CIRs, are averaged within one window. A CIR matrix is formed by taking a window that comprises a certain number of CIRs and placing each CIR measurement in one row. In order to get a mean CIR and a range doppler map a computation of FFT is done across each column. Then a peak search finding can be carried out in the mean Doppler profile and an initial list of targets from this doppler map is created.
According to a further embodiment, in step c) data concerning target peaks in clutter removed CIRs are determined by using an RF filter with specific equalizer coefficients.
According to a further embodiment in step d) the pruning of peaks in the peak list comprises the steps:
According to a further embodiment, in step d) data concerning targets which are changing a place, are removed. A windows based analysis shows only those peaks, that show one particular tap. This peak is likely a stationary human target, which the method is interested to detect. Hence, a confidence value for such a target is increased, this is done on a window per window basis.
According to a further embodiment, a confidence value is assigned to a target, where a peak with a converging specified confidence level is defined as a human target. In this way, a final list of targets is created, with targets with a specified level of confidence (e.g. 90%).
According to a further embodiment, in step e) a locking of human targets is performed, wherein a final list of targets as targets is determined which consistently existed over a defined number of windows. In this way, targets are found which are always present, where those targets are “locked”. If at some point of time, anything is moving close to this target, such target is not lost. In this way, a locked target is specified as a target, which is intended to be kept. This forms a basis of targets, for which a breathing rate is intended to be determined.
According to a further embodiment in step f) a breathing pattern of a human target is determined. This represents a use case, where a breathing pattern of a human target can be recorded over a specific time.
According to a further embodiment in a case, that a breathing signal is not consistently detectable, a frequency component is determined, that is closest to the last detected breathing frequency. In this way, a tracking of a breathing of a human target can be carried out even during small motions of the human target.
The aspects defined above and further aspects of the present disclosure are apparent from the examples of embodiment to be described hereinafter which are explained with reference to the examples of embodiment. The disclosure will be described in more detail hereinafter with reference to examples of embodiment but to which the disclosure is not limited.
The illustrations in the drawings are schematical. It is noted that in different figures, similar or identical elements or features are provided with the same reference signs or with reference signs which are different from the corresponding reference signs only within the first digit. In order to avoid unnecessary repetitions, elements or features which have already been elucidated with respect to a previously described embodiment are not elucidated again at a later position of the description.
Further, spatially relative terms, such as “front” and “back”, “above” and “below”, “left” and “right”, et cetera are used to describe an element's relationship to another element(s) as illustrated in the figures. Thus, the spatially relative terms may apply to orientations in use which differ from the orientation depicted in the figures. Obviously all such spatially relative terms refer to the orientation shown in the figures only for ease of de-scription and are not necessarily limiting as an apparatus according to an embodiment of the invention can assume orientations different than those illustrated in the figures when in use.
Before, referring to the drawings, exemplary embodiments will be described in further detail, some basic considerations will be summarized based on which exemplary embodiments of the invention have been developed. It should be noted that the term “comprising” does not exclude other elements or steps and “a” or “an” does not exclude a plurality. Also elements described in association with different embodiments may be combined. It should also be noted that reference signs in the claims should not be construed as limiting the scope of the claims.
In the context of the present disclosure, amongst others, the following abbreviations are used:
{ }
The proposed method can be used to detect human targets and to extract their breathing pattern. The proposed method can use an UWB impulse radio based modem that is based on the IEEE 802.15.4/4z HRP standard, and which is used as a radar device to achieve detection of a human targets and measure the breathing rate and pattern of those targets. Additional applications include human presence detection, proximity detection, fall detection and collision warning, all of these for human targets in indoor environments. The proposed method overcomes some practical challenges, which is outlined in more detail hereinafter.
Since a UWB modem with 500 MHz bandwidth can be used as radar, the pulses that are transmitted have main lobe duration shorter than 2 ns. It can therefore be problematic to turn off the RF part of the receiver only during that 2 ns interval and turn it on immediately. However, when we the receiver is not turned off, since the transmit and receive antennas are co-located on the same device, there can be significant transmit power that couples to the receiver.
In addition, the pulse spread is not only affecting the coupled path, but also the reflected signal, and results in difficulties with resolving two nearby reflections. For example, there can be a clear peak due to a target at a defined tap, but if there is a second target at another tap, it is masked by the pulse spread caused due to RF filtering (not shown).
In an environment where there are lot of static objects such as e.g. chairs, tables, sofas, walls, cupboards etc., the changes due to movement of a target not only shows up in just the tap corresponding to the location of the target, but also at other tap locations due to the reflections from static objects bouncing off the human target before reaching the receiver of a UWB communication unit (not shown).
The proposed method is able to detect the right human target amongst all those multipath reflections, which means having a way of differentiating the changes due to the target from the changes due to reflections that bounce off the target.
Changes in the environment can be due to human targets walking around or when the human targets are stationary but breathing, which causes movement of the chest and this movement can be detected and the periodicity of this movement estimated as breathing rate. When there is other movements in addition to breathing, the reflections due to the other movements are much stronger than the reflections from breathing and it is then impossible to detect the signal due to breathing movement.
The proposed method is able to differentiate stationary human targets from moving human targets. A moving human target in the context of the present disclosure means a human target which moves from one place to another place. One way of doing that is by looking at the doppler frequencies wherein moving human targets usually generate much higher doppler frequencies compared to the stationary targets. But the signal reflection due to the moving target also spreads across multiple taps and contaminates/interferes with the signal at the tap corresponding to the stationary targets.
The time varying CIR can be modelled by the equation below, wherein hs(τ, t) is the coupled path which also drifts over time, and wherein a second term is the signal from different reflections in the environment with corresponding amplitude and doppler variations over time.
In a first step of the proposed method the coupled path hs(τ, t) is removed (“clutter removal”) in order to be able to see reflected signals, which are otherwise not detectable due to relatively high magnitude of the coupled path hs(τ, t).
The coupled path hs(r, t) can e.g. be removed in the doppler domain, using the range doppler map. However, this requires high precision FFT (Fast Fourier Transform) to accommodate the dynamic range needed to represent both the coupled path and the relative much weaker target reflections. It can be seen from the range doppler map plots of
However, the magnitude of the DC bin, as can be seen in
Therefore, the proposed method removes the coupled path hs(τ, t) in the delay domain (time domain), by assuming the coupled path to be static. If the measured CIR is taken at one time instance t o as the reference, the clutter removed CIRs can then be written as follows:
h
ref(τ)=h(τ,t0)
{hacek over (h)}(τ,t)=h(τ,t)−href(τ)
One recognizes that in this way the coupled path hs is removed which is acceptable as long as hs does not vary significantly over a time duration of interest for the breathing detection use case.
It can be seen from measurements that the coupled path hs drifts slowly over time, and given long enough time, the drift accumulates and changes the coupled path significantly and this change would then be again stronger than the changes due to target movement. One way to compensate for the drift is to model the drift and to remove the drift from the measured CIR.
However, since one window (a set of CIRs) is processed at a time to compute the range doppler map, the window will have NFFT CIRs, this long term drift can be avoided by periodically updating the reference CIR href(τ). The reference CIR can then be expressed as:
h
ref(τ,m)=h(τ,t0+mTupd), m=0,1,2, . . .
The period of update Tupd can either be every doppler processing window which is NFFTTRFRI, or can independently be chosen depending on the rate of drift and the nature of environment (relatively static or lots of movement, etc.) the UWB radar operates in.
Static object detection is not possible due to the non-deterministic coupled path which changes from device to device and based on TX and RX analog gains. To get to static object detection, a switch to a low PRF radar mode is done, where there is sufficient gap between pulses so that the RF has enough time to turn on after being turned off during the transmit pulse duration. But this also introduces a blind spot where the receiver cannot detect target reflections during the time it is turned off. With the pulse spread due to RF filters, the duration for which we need to keep RF turned off is also larger, thereby limiting the usability of this mode for close distance static object detection. In the context of the present disclosure, it is focused only on doppler radar where changes due to target movement in the environment are detected.
Since the RF filters spread the pulse across several taps, a filter is designed to reverse the impact of RF filters, to “sharpen” the target peak seen in the clutter removed CIR.
After the clutter removal as explained above has been completed, a finding of target peaks is performed. This peak search can be limited to one dimension by computing a mean CIR profile {hacek over (h)}mean(τ) by averaging the magnitude of all clutter removed CIRs within a window, or a mean doppler profile vmean(τ) where the range doppler map over the doppler dimension is averaged. Mathematically, these operations can be written as follows:
It can be beneficial to use the mean doppler profile since the doppler profile can be limited to the frequencies of interest by simply selecting only those frequency bins for averaging. But generating a target list based on the mean CIR profile can also be helpful to reduce the computational complexity. First the list of interested taps can be get from the mean CIR profile, and then FFT is only computed for those interested taps to get the range doppler map rather than computing FFT for all taps. This approach is elaborated in the present disclosure where ways to implement the proposed method inside an electronic chip are explained, either in DSP-firmware, or hardware.
Once a one dimensional CIR or doppler profile is determined, peak finding algorithms to get a list of target peaks can be performed. To this end, either linear peak search or use algorithms with adaptive thresholding, such as CFAR (Constant False Alarm Rate) can be performed.
In the proposed method, the linear peak search with several control parameters is performed to decide which peaks are declared as true peaks and which peaks can be ignored. These control parameters include the height of the peak (prominence) and the distance from previous peak (separation). If the input to peak detection is denoted as γ(τ), the following steps describe the peak detection algorithm. The notation ⇔ in the following algorithm refers to “if and only if”.
{γmin−,τmin−}=γ(τ):γ(τ−1)>γ(τ)<γ(τ+1),τ∈[1,τmin−]
{γmax,τmax}=γ(τ):γ(τ−1)<γ(τ)>γ(τ+1),τ∈[τmin−,τmax]
{γmin+,τmin+}=γ(τ):γ(τ−1)>γ(τ)<γ(τ+1),τ∈[τmax,τmin+]
Check if current maxima is a desired maxima (peak prominence and distance from previous maxima). If yes, add it to the list of peaks:
γprom=(γmax−max{γmin−,γmin+l })
Δτp=τmax−
=τmax⇔γprom<Γprommin,Δτp>dpeakmin
{γmin−,τmin−}={γmin+,τmin+}
{γmax,τmax}=γ(τ):γ(τ−1)<γ(τ)>γ(τ+1),τ∈[τmin−,τmax]
An example result of the above mentioned peak detection algorithm is shown in
A first metric in order to prune the target list is to compute the SNR for each of those peaks. The noise power is computed on all taps that are not in the neighborhood of the taps where a peak is found, as shown in
A second metric, used in the proposed method, is to compute a correlation coefficient between each peak and all the subsequent peaks. If the correlation coefficient is close to 1, this means that the signal at these tap locations are highly correlated and therefore likely coming from nearby reflections bouncing off the same human target that is responsible for the current peak.
For two vectors x and y, the correlation coefficient can be computed as:
If N peaks are found at locations τi such that τi<τi+1 (meaning the peaks are ordered as per the location), then for the ith peak, the correlation coefficient between vectors h(τi,t) and h(τj, t) were j>i and τi, τj are the list of peak locations which are computed. Afterwards all peaks at τj for those values of j are determined where the correlation coefficient with ρ(i,j) is close to 1.
In the further course, proposed method moves from the ith peak to the next available peak in the list, wherein this process is repeated. This step can be summarized in the following way:
The proposed method implements an adaptive way of building a confidence metric on the list of peaks to separate stationary targets from other movements in the environment. It is operated here based on the fact that if there are stationary targets, then the peak location corresponding to those targets will most likely not change over multiple windows. The proposed method uses this fact to increase or decrease the confidence value which is available on each peak location depending on a finding of a peak in that location in the current window. This procedure can be described as follows:
Reinforce confidence on the identified peaks τp and reduce confidence on missed peaks τm={τp}c, the notation { } refers to a set of values and { }c refers to the complement of the set. This effectively picks out all stable peaks that persist over multiple windows, and those are the peaks which the method wants for estimating stationary targets
ρ(τp)=min{1,ρ(τp)+ρ↑}
ρ(τm)=max{0,ρ(τm)+ρ↓}
The proposed method then performs a peak search on the confidence metric ρ(τ), sorts the peaks based on their magnitude and picks the first M peaks, if M is a maximum number of targets, which are intended to be detected.
Since real environments are often changing, it is possible that stationary targets that were identified consistently in the previous windows do not show up in a few windows due to excessive movements in the environment, contaminating the taps where stationary peaks are present. Rather than immediately reducing the confidence of those tap locations, the proposed method follows the strategy of target lock acquisition that is common in “acquire and track” radar systems. If a peak (based on confidence metric) at a specific location is seen for last Nacq windows, then a lock is declared for that peak location.
On the other hand, if a locked target is not seen in the selected peaks, a “forget timer” is started and the target lock on that peak is removed once the forget timer reaches Ndrop. In this way, the method converges to a point, where a peak has a good confidence as to be regarded as a “real target” in form of a human person. In this way, a final list of human targets is determined, where a breathing rate is to be determined at the human targets of the final list.
Once the target location is known, the CIR tap value across slow time are collected and a corresponding spectrum is computed via FFT. If there is clean breathing of a human person, then the breathing frequency can be easily extracted from the spectrum. This is shown in
For breathing coupled with other minor movements of a human target (e.g. a human target typing on a keyboard, moving his hand, etc.), the spectrum shows multiple frequency components that are in the breathing range. This is shown in
To find which of those frequency components to latch on to, the proposed method acquires a lock on the breathing frequency when the breathing is clean, then tracks that breathing frequency by picking a frequency peak that is closest to the locked frequency. If there is no frequency lock and multiple frequency components are found, the algorithm picks the lowest frequency peak, since that is likely the breathing frequency.
The time diagram of
In contrast thereto,
Perform a leakage cancellation in step 300, wherein a coupling/clutter removal is performed.
Collect NFFT CIRs at Fs Hz (RFRI=1/Fs). Max. doppler is Fs/2 Hz and doppler resolution is Fs/NFFT.
Compute doppler matrix (NFFT×Ntaps) in step 301 and compute a one dimensional mean doppler profile from the two dimensional doppler matrix in step 302.
Find all the peaks in the doppler matrix in step 303 with a 1D peak search based on the mean doppler magnitude across doppler bins of interest.
Prune peaks of a peak list in step 304 using one or more of the following pruning strategies: low SNR pruning, correlation based pruning, pathloss profile pruning, common peaks with mean CIR.
Adaptively reinforce the confidence values on the selected peaks in steps 305, 306. The proposed method aims to detect stable peaks and adaptively updates a confidence metric across multiple windows which converges in stable peaks.
In step 307 M peaks are selected, that have the best confidence metric (largest confidence values).
In step 308 a query is performed, whether a peak has been existent for a specified duration. In other words, it is checked, whether selected peaks are seen in last Nacq windows.
Acquire target lock on selected peaks in step 309, otherwise the target lock is removed in step 310, depending on the result of the query of step 308.
Drop a locked peak from the tracking list only if it is not seen in last Ndrop windows in step 310.
The following computations are done in step 311: Compute the bpm (breathing per minute) mean and standard deviation for the locked targets. Furthermore, a breathing and a heart rate on target locked peaks are computed. Buffer Nbpm samples of the CIR tap across slow time, wherein a BPM resolution is
Compute FFT and find the frequency between 0.15 and 1 Hz that has max. magnitude or max prominence. Compute a quality metric for this peak.
Lock target bpm if the standard deviation is less than a specified threshold in step 312.
If the quality is lower than a threshold, pick a peak that is closest to the locked target bpm frequency.
Perform a target tracking of human targets in step 313.
Moreover a processing can be done across windows (specific to breathing detection):
A breathing detection can be done in the following steps:
Furthermore, target locations and breathing rates can be sent to a higher layer for further filtering and tracking.
For an efficient mapping of the proposed method to firmware or hardware, a careful utilization of electronic memories 1, 9, 11 and 19 should be considered for the processing. For example, a Matlab™ or host implementation can, for each window, store the raw CIRs, clutter removed CIRs, and the range doppler map, that is approximately three times the memory required for storing CIRs.
Breathing rate estimation requires the raw CIR target tap to be buffered for ten to twenty seconds. If there is no memory constraint, the raw CIR for all taps can be stored for second second duration, but this is impractical to do in a firmware or hardware implementation. Several other intermediate buffers that are used needs to be managed carefully as well. To map method to DSP or hardware:
The proposed method can be implemented at least partially as a software, which can be stored in a computer readable memory or at least partially as a firmware or at least partially as a hardware (e.g. UWB communication unit 100). The chip does mainly the distance measurements (Time-of-Flight measurements), wherein a host configures details which of the diverse UWB sessions should act as the primary session.
Hereinbefore, spatially relative terms, such as “front” and “back”, “above” and “below”, “left” and “right”, et cetera are used to describe an element's relationship to another element(s) as illustrated in the figures. Thus, the spatially relative terms may apply to orientations in use which differ from the orientation depicted in the figures. Obviously all such spatially relative terms refer to the orientation shown in the figures only for ease of de-scription and are not necessarily limiting as an apparatus according to an embodiment can assume orientations different than those illustrated in the figures when in use.
Additionally unless expressly stated to the contrary, the terms “first”, “second”, “third”, etc. are intended to distinguish the particular nouns that modify (e.g. session, device, element, unit, condition, node, module, activity, session, step, operation, etc.). Unless expressly stated to the contrary, the use of these terms is not intended to indicate any type of order, rank, importance, temporal sequence, or hierarchy of the modified noun. For example, “first X” and “second X” are intended to designate two “X” elements that are not necessarily limited by any order, rank, importance, temporal sequence, or hierarchy of the two elements. Furthermore, as referred to herein, “at least one of ” and “one or more of” can be represented using the “(s)” nomenclature (e.g. one or more element(s)).
Moreover, it should be noted that the term “comprising” does not exclude other elements or steps and “a” or “an” does not exclude a plurality. Also elements described in association with different embodiments may be combined. It should also be noted that reference signs in the claims should not be construed as limiting the scope of the claims. The systems and methods described herein may at least partially be embodied by a computer program or a plurality of computer programs, which may exist in a variety of forms both active and inactive in a single computer system or across multiple computer systems. For example, they may exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats for performing some of the steps. Any of the above may be embodied on a computer readable medium, which may include storage devices and signals, in compressed or uncompressed form.
As used herein, the term “computer” refers to any electronic device comprising a processor, such as a general-purpose central processing unit (CPU), a specific-purpose processor or a microcontroller. A computer is capable of receiving data (an input), of performing a sequence of predetermined operations thereupon, and of producing thereby a result in the form of information or signals (an output). Depending on the context, the term “computer” will mean either a processor in particular or more generally a processor in association with an assemblage of interrelated elements contained within a single case or housing.
The term “processor” or “processing unit” refers to a data processing circuit that may be a microprocessor, a co-processor, a microcontroller, a microcomputer, a central processing unit, a field programmable gate array (FPGA), a programmable logic circuit, or any circuit that manipulates signals (analog or digital) based on operational instructions that are stored in a memory. The term “memory” refers to a storage circuit or multiple storage circuits such as read-only memory, random access memory, volatile memory, non-volatile memory, static memory, dynamic memory, Flash memory, cache memory, or any circuit that stores digital information.
As used herein, a “computer-readable medium” or “storage medium” may be any means that can contain, store, communicate, propagate, or transport a computer program for use by or in connection with the instruction execution system, apparatus, or device. The computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples (non-exhaustive list) of the computer-readable medium may include the following: an electrical connection having one or more wires, a portable computer diskette, a random-access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CDROM), a digital versatile disc (DVD), a Blu-ray disc (BD), and a memory card.
It is noted that the embodiments above have been described with reference to different subject-matters. In particular, some embodiments may have been described with reference to method-type claims whereas other embodiments may have been described with reference to apparatus-type claims. However, a person skilled in the art will gather from the above that, unless otherwise indicated, in addition to any combination of features belonging to one type of subject-matter also any combination of features relating to different subject-matters, in particular a combination of features of the method-type claims and features of the apparatus-type claims, is considered to be disclosed with this document. Furthermore, it is noted that the drawings are schematic. In different drawings, similar or identical elements are provided with the same reference signs. Furthermore, it is noted that in an effort to provide a concise description of the illustrative embodiments, implementation details which fall into the customary practice of the skilled person may not have been described. It should be appreciated that in the development of any such implementation, as in any engineering or design project, numerous implementation-specific decisions must be made in order to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another. Moreover, it should be appreciated that such a development effort might be complex and time consuming, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill.
It has to be noted that embodiments have been described with reference to different subject matters. In particular, some embodiments have been described with reference to method type claims whereas other embodiments have been described with reference to apparatus type claims. However, a person skilled in the art will gather from the above and the following description that, unless other notified, in addition to any combination of features belonging to one type of subject matter also any combination between features relating to different subject matters, in particular between features of the method type claims and features of the apparatus type claims is considered as to be disclosed with this application.
Number | Date | Country | Kind |
---|---|---|---|
22205220.1 | Nov 2022 | EP | regional |