Systems that detect the presence of a particular signal can be confused by the presence of interfering signals that are not of the modulation type that the system is attempting to detect. There are many types of interfering signals that could confuse a system. These can include wide-band interference such as thermal noise or spread-spectrum signals from cordless phones or wireless network devices. Other examples of interfering signals can include narrow-band signals such as harmonics of a digital clock source in a receiver, or hand-held radios.
One example of a system that commonly requires the ability to detect the presence of a particular signal of interest includes an intercept receiver. Intercept receivers provide an indication to a user that a signal of interest is present. It is important that the intercept receiver is not confused by signals that are not of interest because that would lead to false positives.
A method for distinguishing a signal of interest from one or more interference signals in a received analog signal comprises receiving an analog signal at a radio front end, and transmitting the received analog signal to an analog-to-digital converter to sample data in the received analog signal and output a digital signal. A sub-channel fast Fourier transform (FFT) is performed on the digital signal, and sub-channel FFT bin magnitudes are averaged over a set period of time to determine a shape of the received signal. The shape of the received signal is compared to one or more signal reference patterns by computing a metric for the shape of the received signal, and computing a metric for the one or more signal reference patterns. The computed metrics are then compared to a predetermined threshold value to determine the presence, or lack thereof, of a signal of interest in the received signal.
Understanding that the drawings depict only exemplary embodiments and are not therefore to be considered limiting in scope, the exemplary embodiments will be described with additional specificity and detail through the use of the accompanying drawings, in which:
In the following detailed description, reference is made to the accompanying drawings in which is shown by way of example specific illustrative embodiments. It is to be understood that other embodiments may be utilized and that mechanical and electrical changes may be made. The following detailed description is, therefore, not to be taken in a limiting sense.
Methods and systems are disclosed for distinguishing a signal of interest from interference signals such that a particular signal can be detected in the presence of interfering signals that are not of the same modulation type. The present approach utilizes a pattern matching algorithm that can detect the presence of a signal of a particular modulation type within a predefined channel defined by a center frequency and bandwidth. The predefined channel has a sufficient bandwidth such that by comparison, a continuous wave (CW) signal would occupy only a small portion of the defined bandwidth over the time of a measurement period.
The signal of interest is expected to be present for a substantial amount of time such that the collection of samples can be taken and broken up into a series of data blocks. A Fast Fourier Transform (FFT) of sufficient resolution can be performed to provide multiple FFT bins per channel for each data block. This can be performed by using an M-Point FFT, where M is a variable representing the number of data points that provide sufficient resolution to provide multiple FFT bins per channel for a data block.
Due to the expected modulation scheme and the sequence of data that the modulated signal represents, the spectral content will change significantly from block to block. However, by averaging the FFT bin magnitudes over time, the spectral content will exhibit a set of patterns that can be characterized. By training the present system to recognize “typical” patterns that would suggest the presence of a signal of interest, the system can ignore signals such as CW, wide-band noise, and the like.
The present approach can also be optimized for detection of constant envelope signals, such as minimum-shift keying (MSK) type signals. In this case, a running average of signal level can be calculated based on the levels of the FFT bin outputs. If a given sample is above the running average by a set amount, this can be flagged by the system as a corrupted time period. The FFT data associated with the channel for that period of time is then not used in the subsequent pattern estimation because it would potentially result in an invalid pattern, giving a false negative indication of signal presence.
In an alternative approach, the number of rejected samples is counted. If the number of rejected samples reaches a certain amount, the pattern matching algorithm of the present approach is not performed. Optionally, this count can be used to assign a confidence factor to the estimation of presence of signal.
Alternatively, the channel rejection can be applied to the signal that has been filtered down to one channel before the FFT occurs. Then, a smaller FFT is performed across that single channel to provide the higher resolution bins. Optionally, the filtering down to a single channel can occur in the analog domain before digitization (sampling).
As another option, the magnitude for the individual channel can be computed by summing the magnitudes of each of the bins within the channel. This can then be used in a subsequent pulsed-interference detection approach, which is described further hereafter.
The front end 110 can be a typical radio frequency (RF) receiver that converts a signal from an RF frequency to a lower frequency and bandwidth suitable for ADC 114 to sample the data. When the FFT is performed on the sampled data, each bin of the FFT provides In-phase (I) and Quadrature-phase (Q) values, which are used to compute the magnitude of the bin. The bin magnitude can be considered to be either I2+Q2 or the square root of (I2+Q2). The FFT size is chosen such that there are multiple FFT bins to cover the entire bandwidth of the signal of interest. This can be done by using an M-Point FFT. The chosen number of bins used to cover the channel bandwidth depends on a number of factors including, but not limited to, processing resources, digital storage requirements, and pattern-matching performance for the given signal modulation. A typical value may be seven bins to cover the span of the channel, in which case an 8-point FFT would typically be used and the system would process the seven bins most useful in representing the signal.
The number of signal reference patterns that are used for comparison depends on the variations that are found in valid signals. The reference patterns can be collected experimentally by observing all or a significant selection of possible transmitted signals of interest. For example, a set of five (5) patterns that are representative of typical signals can be used. One pattern is considered a set of values equal in quantity to the number of FFT bins required to cover the bandwidth of the signal of interest.
The pattern values are normalized, and any set of input values are also normalized to be able to compare those values to those of the patterns. After normalization, the shape of the received signal is then compared to one or more (or all) of the reference patterns to see which reference pattern is the best match to the shape of the received signal. The comparison process is discussed in further detail hereafter with respect to
Initially, an analog signal is received at a wideband analog front end 310, which transmits the received signal to an ADC 314 to sample data in the signal. A FFT (or filtering) is performed on the sampled data to channelize the signal at 318. A sub-channel FFT is then performed on the signal at 322. The FFT bin magnitudes are then averaged over a designated period of time at 326. The shape of the received signal is then compared to one or more reference patterns at 330, to determine which reference pattern is the best match to the shape of the received signal. Again, this comparison process is discussed in further detail hereafter with respect to
A determination is then made at 620 whether more patterns are available for comparison. If more patterns are available, the next pattern is selected at 612 and the foregoing process is repeated until a metric has been computed for each reference pattern. When there are no more reference patterns, the computed metrics are compared to threshold values at 622 and a confidence factor is assigned to the quality of the match between the signal and the reference patterns. Depending on the choice of metric computation, a good match might be suggested by a metric value above a threshold or below a threshold. A determination is then made at 624 whether a computed metric has passed the threshold requirement. If passed, an indication is made at 626 that a signal of interest is present within the output signal of blocks 122, 226, 326 and 430. If the threshold requirement is not passed, an indication is made at 628 that the signal of interest is not present within the output signal. Additionally, this yes/no decision can have an associated confidence value to indicate the certainty of the decision.
The present methods may be susceptible to certain types of non-Gaussian noise (i.e., colored noise, not white noise). One type of interference is pulsed interference, which can have a negative effect. In severe cases, this type of interference will present itself as a large increase in signal level in the channel of interest over a span of time that is short relative to the entire duration of the filtering/decision period. One method of reducing the effects of pulsed interference is to place a pulsed-interference rejection filter in the signal receive chain of the system. For example, this filter can be applied at the front of a processing section to detect when a large increase in signal level is present for only a short period of time. Optionally, a similar desirable response can be realized by implementing the filtering scheme described in U.S. Pat. No. 7,714,774, entitled FALSE LOCK FILTER FOR PULSED RADAR ALTIMETERS, the disclosure of which is incorporated by reference herein.
A computer or processor used in the present system and method can be implemented using software, firmware, hardware, or any appropriate combination thereof, as known to one of skill in the art. These may be supplemented by, or incorporated in, specially-designed application-specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs). The computer or processor can also include or function with software programs, firmware, or other computer readable instructions for carrying out various process tasks, calculations, and control functions used in the present method and system.
The present methods can be implemented by computer executable instructions, such as program modules or components, which are executed by at least one processor. Generally, program modules include routines, programs, objects, data components, data structures, algorithms, and the like, which perform particular tasks or implement particular abstract data types.
Instructions for carrying out the various process tasks, calculations, and generation of other data used in the operation of the methods described herein can be implemented in software, firmware, or other computer readable instructions. These instructions are typically stored on any appropriate computer program product that includes a computer readable medium used for storage of computer readable instructions or data structures. Such a computer readable medium can be any available media that can be accessed by a general purpose or special purpose computer or processor, or any programmable logic device.
Suitable computer readable storage media may include, for example, non-volatile memory devices including semiconductor memory devices such as EPROM, EEPROM, or flash memory devices; magnetic disks such as internal hard disks or removable disks; magneto-optical disks; CDs, DVDs, Blu-ray discs, or other optical storage disks; nonvolatile ROM, RAM, and other like media; or any other media that can be used to carry or store desired program code in the form of computer executable instructions or data structures.
Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement, which is calculated to achieve the same purpose, may be substituted for the specific embodiments shown. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is therefore indicated by the following claims rather than by the foregoing description. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Number | Name | Date | Kind |
---|---|---|---|
4106018 | Chihak et al. | Aug 1978 | A |
4739518 | Bickley et al. | Apr 1988 | A |
5387917 | Hager | Feb 1995 | A |
5475869 | Gomi et al. | Dec 1995 | A |
6407697 | Hager et al. | Jun 2002 | B1 |
6654471 | Varga | Nov 2003 | B1 |
6847689 | Vuorinen et al. | Jan 2005 | B1 |
6903685 | Arndt et al. | Jun 2005 | B1 |
7171161 | Miller | Jan 2007 | B2 |
7187321 | Watanabe et al. | Mar 2007 | B2 |
7714774 | Winstead | May 2010 | B2 |
20040130482 | Lin et al. | Jul 2004 | A1 |
20070030931 | Arambepola | Feb 2007 | A1 |
20090221256 | Sahinoglu et al. | Sep 2009 | A1 |
20090310712 | Nakatani | Dec 2009 | A1 |
Number | Date | Country |
---|---|---|
3105140 | Sep 1982 | DE |
1144109 | Mar 1969 | GB |
Number | Date | Country | |
---|---|---|---|
20120300822 A1 | Nov 2012 | US |