This invention relates to crowd counting and more particularly to methods and systems for device independent wireless crowd counting.
Robust crowd counting is an important yet challenging task. It is of great interest in a number of potential applications, such as guided tour, crowd control, marketing research and analysis, security, etc. Crowd behaviors, however, are often unpredictable. Thus, crowd counting may face various challenges, including, but are not limited to, reliable observation collection, object occlusions, and real-time processing requirement. Traditional approaches that tackle these issues are mainly classified into two categories: video based recognition and non-image based localization.
Video based recognition has been widely deployed in many public places. However, these methods have inherent drawbacks. First, cameras can only work in a line-of-sight pattern, leading many blind areas to the monitoring. Second, the environmental contribution of smoke or lacking of light will severely degrade the visual quality of cameras. Third, objects overlapping further deteriorates the performance. Furthermore, the use of cameras poses privacy concerns. Non-image based solutions typically leverage radio devices to locate objects, such as RFID tags, mobile phones, sensor nodes, etc. These device-based approaches require people to carry certain devices for surveillance, which significantly constrains the usage scope. For a public area with mass people, distributing the device to each person is impractical and costly, and may not be doable under emergent events.
Some device-free approaches have been proposed recently. Most approaches employ received signal strength (RSS) fingerprints for localization, which can be easily obtained for most off-the-shelf wireless devices. However, site survey is time consuming, labor-intensive, and easily affected by environmental dynamics. To avoid site survey, the model based localization approaches use RSS as an indication of signal propagating distance to locate objects. Unfortunately, attenuation models perform poorly due to multipath propagation in complex indoor environments. Exploiting physical layer information for localization and counting in multipath environments has attracted much attention recently but which usually requires specialized equipment (e.g., USRP).
Accordingly, it would be beneficial to provide a solution that overcomes the above drawbacks and provides a device-Free Crowd Counting (FCC) methodology. It would be further beneficial for the solution to not impact network capacity/performance.
Other aspects and features of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of specific embodiments of the invention in conjunction with the accompanying figures.
It is an object of the present invention to mitigate limitations within the prior art relating to crowd counting and provide methods and systems for device independent wireless crowd counting.
In accordance with an embodiment of the invention there is provided a method comprising:
In accordance with an embodiment of the invention there is provided a system comprising;
In accordance with an embodiment of the invention there is provided a method comprising:
Other aspects and features of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of specific embodiments of the invention in conjunction with the accompanying figures.
Embodiments of the present invention will now be described, by way of example only, with reference to the attached Figures, wherein:
The present invention is directed to crowd counting and more particularly to methods and systems for device independent wireless crowd counting.
The ensuing description provides exemplary embodiment(s) only, and is not intended to limit the scope, applicability or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiment(s) will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It being understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope as set forth in the appended claims.
A “portable electronic device” (PED) as used herein and throughout this disclosure, refers to a wireless device used for communications and other applications that requires a battery or other independent form of energy for power. This includes devices, but is not limited to, such as a cellular telephone, smartphone, personal digital assistant (PDA), portable computer, pager, portable multimedia player, portable gaming console, laptop computer, tablet computer, and an electronic reader.
A “fixed electronic device” (FED) as used herein and throughout this disclosure, refers to a wireless and/or wired device used for communications and other applications that requires connection to a fixed interface to obtain power. This includes, but is not limited to, a laptop computer, a personal computer, a computer server, a kiosk, a gaming console, a digital set-top box, an analog set-top box, an Internet enabled appliance, an Internet enabled television, and a multimedia player.
An “application” (commonly referred to as an “app”) as used herein may refer to, but is not limited to, a “software application”, an element of a “software suite”, a computer program designed to allow an individual to perform an activity, a computer program designed to allow an electronic device to perform an activity, and a computer program designed to communicate with local and/or remote electronic devices. An application thus differs from an operating system (which runs a computer), a utility (which performs maintenance or general-purpose chores), and a programming tools (with which computer programs are created). Generally, within the following description with respect to embodiments of the invention an application is generally presented in respect of software permanently and/or temporarily installed upon a PED and/or FED.
A “social network” or “social networking service” as used herein may refer to, but is not limited to, a platform to build social networks or social relations among people who may, for example, share interests, activities, backgrounds, or real-life connections. This includes, but is not limited to, social networks such as U.S. based services such as Facebook, Google+, Tumblr and Twitter; as well as Nexopia, Badoo, Bebo, VKontakte, Delphi, Hi5, Hyves, iWiW, Nasza-Klasa, Soup, Glocals, Skyrock, The Sphere, StudiVZ, Tagged, Tuenti, XING, Orkut, Mxit, Cyworld, Mixi, renren, weibo and Wretch.
“Social media” or “social media services” as used herein may refer to, but is not limited to, a means of interaction among people in which they create, share, and/or exchange information and ideas in virtual communities and networks. This includes, but is not limited to, social media services relating to magazines, Internet forums, weblogs, social blogs, microblogging, wikis, social networks, podcasts, photographs or pictures, video, rating and social bookmarking as well as those exploiting blogging, picture-sharing, video logs, wall-posting, music-sharing, crowdsourcing and voice over IP, to name a few. Social media services may be classified, for example, as collaborative projects (for example, Wikipedia); blogs and microblogs (for example, Twitter™); content communities (for example, YouTube and DailyMotion); social networking sites (for example, Facebook™); virtual game-worlds (e.g., World of Warcraft™); and virtual social worlds (e.g. Second Life™)
An “enterprise” as used herein may refer to, but is not limited to, a provider of a service and/or a product to a user, customer, or consumer. This includes, but is not limited to, a retail outlet, a store, a market, an online marketplace, a manufacturer, an online retailer, a charity, a utility, and a service provider. Such enterprises may be directly owned and controlled by a company or may be owned and operated by a franchisee under the direction and management of a franchiser.
A “service provider” as used herein may refer to, but is not limited to, a third party provider of a service and/or a product to an enterprise and/or individual and/or group of individuals and/or a device comprising a microprocessor. This includes, but is not limited to, a retail outlet, a store, a market, an online marketplace, a manufacturer, an online retailer, a utility, an own brand provider, and a service provider wherein the service and/or product is at least one of marketed, sold, offered, and distributed by the enterprise solely or in addition to the service provider.
A ‘third party’ or “third party provider” as used herein may refer to, but is not limited to, a so-called “arm's length” provider of a service and/or a product to an enterprise and/or individual and/or group of individuals and/or a device comprising a microprocessor wherein the consumer and/or customer engages the third party but the actual service and/or product that they are interested in and/or purchase and/or receive is provided through an enterprise and/or service provider.
1: Exemplary Environment and Device Configuration
Referring to
Within the cell associated with first AP 110A the first group of users 100A may employ a variety of PEDs including for example, laptop computer 155, portable gaming console 135, tablet computer 140, smartphone 150, cellular telephone 145 as well as portable multimedia player 130. Within the cell associated with second AP 110B are the second group of users 100B which may employ a variety of FEDs including for example gaming console 125, personal computer 115 and wireless/Internet enabled television 120 as well as cable modem 105. First and second cellular APs 195A and 195B respectively provide, for example, cellular GSM (Global System for Mobile Communications) telephony services as well as 3G and 4G evolved services with enhanced data transport support. Second cellular AP 195B provides coverage in the exemplary embodiment to first and second user groups 100A and 100B. Alternatively the first and second user groups 100A and 100B may be geographically disparate and access the network 100 through multiple APs, not shown for clarity, distributed geographically by the network operator or operators. First cellular AP 195A as show provides coverage to first user group 100A and environment 170, which comprises second user group 100B as well as first user group 100A. Accordingly, the first and second user groups 100A and 100B may according to their particular communications interfaces communicate to the network 100 through one or more wireless communications standards such as, for example, IEEE 802.11, IEEE 802.15, IEEE 802.16, IEEE 802.20, UMTS, GSM 850, GSM 900, GSM 1800, GSM 1900, GPRS, ITU-R 5.138, ITU-R 5.150, ITU-R 5.280, and IMT-1000. It would be evident to one skilled in the art that many portable and fixed electronic devices may support multiple wireless protocols simultaneously, such that for example a user may employ GSM services such as telephony and SMS and Wi-Fi/WiMAX data transmission, VOIP and Internet access. Accordingly, portable electronic devices within first user group 100A may form associations either through standards such as IEEE 802.15 and Bluetooth as well in an ad-hoc manner.
Also connected to the network 100 are Social Networks (SOCNETS) 165, first and second wireless provider resources 170A and 170B respectively, e.g. Verizon™ and AT&T™, an authority 170C, e.g. New York Police Department™, service provider 170D, e.g. Yellow Cabs and first to second location entities 175A to 175C respectively, e.g. John F Kennedy (JFK) airport transit, JFK Airport Authority, and US Citizenship & Immigration, as well as first and second servers 190A and 190B together with others, not shown for clarity. First and second servers 190A and 190B may host according to embodiments of the inventions multiple services associated with a provider of rating systems and rating applications/platforms (FCCSAPs); a provider of a SOCNET or Social Media (SOME) exploiting FCCSAP features; a provider of a SOCNET and/or SOME not exploiting FCCSAP features; a provider of services to PEDS and/or FEDS; a provider of one or more aspects of wired and/or wireless communications; an Enterprise 160 exploiting FCCSAP features; license databases; content databases; schedule databases; safety libraries; service provider databases; websites; and software applications for download to or access by FEDs and/or PEDs exploiting and/or hosting FCCSAP features etc. First and second primary content servers 190A and 190B may also host for example other Internet services such as a search engine, financial services, third party applications and other Internet based services.
Accordingly, a user may exploit a PED and/or FED within an Enterprise 160, for example, and access one of the first or second primary content servers 190A and 190B respectively to perform an operation such as accessing/downloading FCC data, managing/adjusting aspects of an enterprise based upon FCC data, post FCC data to a SOCNET/SOME. They may alternatively access an application which provides FCCSAP features according to embodiments of the invention; execute an application already installed providing FCCSAP features; execute a web based application providing FCC SAP features; or access content. Similarly, a user may undertake such actions or others exploiting embodiments of the invention via a PED or FED within first and second user groups 100A and 100B respectively via one of first and second cellular APs 195A and 195B respectively and first Wi-Fi nodes 110A.
Now referring to
The electronic device 204 includes one or more processors 210 and a memory 212 coupled to processor(s) 210. AP 206 also includes one or more processors 211 and a memory 213 coupled to processor(s) 210. A non-exhaustive list of examples for any of processors 210 and 211 includes a central processing unit (CPU), a digital signal processor (DSP), a reduced instruction set computer (RISC), a complex instruction set computer (CISC) and the like. Furthermore, any of processors 210 and 211 may be part of application specific integrated circuits (ASICs) or may be a part of application specific standard products (ASSPs). A non-exhaustive list of examples for memories 212 and 213 includes any combination of the following semiconductor devices such as registers, latches, ROM, EEPROM, flash memory devices, non-volatile random access memory devices (NVRAM), SDRAM, DRAM, double data rate (DDR) memory devices, SRAM, universal serial bus (USB) removable memory, and the like.
Electronic device 204 may include a display, visual output element 220, for example an LCD display, coupled to any of processors 210. Electronic device 204 may also include a keyboard 215 which may for example be a physical keyboard or touchscreen allowing the user to enter content or select functions within one of more applications 222. The one or more applications 222 that are typically stored in memory 212 and are executable by any combination of processors 210. Electronic device 204 may also include GPS 262 which provides geographical location information to processor 210.
Electronic device 204 includes a protocol stack 224 and AP 206 includes a communication stack 225. Within system 200 protocol stack 224 is shown as IEEE 802.11 protocol stack but alternatively may exploit other protocol stacks such as an Internet Engineering Task Force (IETF) multimedia protocol stack for example. Likewise, AP stack 225 exploits a protocol stack but is not expanded for clarity. Elements of protocol stack 224 and AP stack 225 may be implemented in any combination of software, firmware and/or hardware. Protocol stack 224 includes an IEEE 802.11-compatible PHY module 226 that is coupled to one or more Front-End Tx/Rx & Antenna 228, an IEEE 802.11-compatible MAC module 230 coupled to an IEEE 802.2-compatible LLC module 232. Protocol stack 224 includes a network layer IP module 234, a transport layer User Datagram Protocol (UDP) module 236 and a transport layer Transmission Control Protocol (TCP) module 238.
Protocol stack 224 also includes a session layer Real Time Transport Protocol (RTP) module 240, a Session Announcement Protocol (SAP) module 242, a Session Initiation Protocol (SIP) module 244 and a Real Time Streaming Protocol (RTSP) module 246. Protocol stack 224 includes a presentation layer media negotiation module 248, a call control module 250, one or more audio codecs 252 and one or more video codecs 254. Applications 222 may be able to create maintain and/or terminate communication sessions with any of devices 207 by way of AP 206. Typically, applications 222 may activate any of the SAP, SIP, RTSP, media negotiation and call control modules for that purpose. Typically, information may propagate from the SAP, SIP, RTSP, media negotiation and call control modules to PHY module 226 through TCP module 238, IP module 234, LLC module 232 and MAC module 230.
It would be apparent to one skilled in the art that elements of the electronic device 204 may also be implemented within the AP 206 including but not limited to one or more elements of the protocol stack 224, including for example an IEEE 802.11-compatible PHY module, an IEEE 802.11-compatible MAC module, and an IEEE 802.2-compatible LLC module 232. The AP 206 may additionally include a network layer IP module, a transport layer User Datagram Protocol (UDP) module and a transport layer Transmission Control Protocol (TCP) module as well as a session layer Real Time Transport Protocol (RTP) module, a Session Announcement Protocol (SAP) module, a Session Initiation Protocol (SIP) module and a Real Time Streaming Protocol (RTSP) module, media negotiation module, and a call control module. Portable and fixed electronic devices represented by electronic device 204 may include one or more additional wireless or wired interfaces in addition to the depicted IEEE 802.11 interface which may be selected from the group comprising IEEE 802.15, IEEE 802.16, IEEE 802.20, UMTS, GSM 850, GSM 900, GSM 1800, GSM 1900, GPRS, ITU-R 5.138, ITU-R 5.150, ITU-R 5.280, IMT-1000, DSL, Dial-Up, DOCSIS, Ethernet, G.hn, ISDN, MoCA, PON, and Power line communication (PLC).
Accordingly, electronic device 204 may in essence be a stripped down smartphone 150, for example, or a dedicated FCC node. Some electronic devices 204 may be receivers only, others transmitter only, and others transceivers. Some electronic devices 204 will support wireless communications on a first wireless standard and FCC activities upon a second wireless standard. In other embodiments of the invention the FCC functionality may be integrated to an access point 206 or network device 207 according to the environment, cost, performance requirements etc. As described and depicted below in respect of embodiments of the invention within an area to be monitored and device-Free Crowd Counting to be performed will have a plurality of wireless devices deployed.
Considering
2: Theoretical Analysis and Observation
In radio communications, the emitted electromagnetic waves often do not reach the receiving antenna directly due to the blocking of obstacles in the line-of-sight path. In fact, the received waves are a superposition of waves coming from all directions due to reflection, diffraction, and scattering caused by furniture, people, and other obstacles. This effect is known as multipath propagation.
After extensive measurements of the envelope of the received signal in urban and suburban areas, i.e., in regions where the line-of-sight component is often blocked by obstacles, the Rayleigh process was suggested as suitable stochastic model process. In rural regions, however, the line-of-sight component is often a part of the received signal, so that the Rice process is the more suitable for these channels.
Rician fading is a stochastic model for radio propagation anomaly caused by partial cancellation of a radio signal by itself when the signal arrives at the receiver by several different paths (hence exhibiting multipath interference), and at least one of the paths is changing (lengthening or shortening). Rician fading occurs when one of the paths, typically a line of sight signal, is much stronger than the others. In Rician fading, the amplitude gain is characterized by a Rician distribution. The Rice factor, K, is defined as the ratio of the specular power to scattered power. When K=0 the channel exhibits Rayleigh fading, and when K=∞0 the channel does not exhibit any fading at all.
In the current widely used Orthogonal Frequency Division Multiplexing (OFDM) systems, which are depicted in
In a narrowband fiat-fading channel, the OFDM system in the frequency domain is modeled by Equation (2) where Y and X represent the receive and transmit vectors respectively and H and N are the channel matrix CSI and noise vector respectively. Therefore, the estimated value of H can be expressed by Equation (3). Accordingly, the CSI is sensitive to the change of the environment. If someone moves between two communication parts, the CSI will have undergone changes.
According to experiments performed by the inventors they employed Intel™ 5300 WiFi wireless net card and Linux 802.11n CSI Tool kit to obtain 30 pairs of amplitude and phase CSI values of each packet within an experimental network. A series of experiments were conducted to establish the relationship between CSI measurements and the number of moving people. Accordingly, a pair of laptops were positioned 5 meters away from each other. One laptop continued to send packets to the other whilst people walked around in the active area. Accordingly, as depicted in
Based upon these measurements
Accordingly, the CSI between Rx and Tx can be estimated by Equation (4). Applying a variance operator to the two sides of Equation (4) yields Equation (5). Accordingly, σn2 decreases as the number of Tx1i increases, which is caused through intercepting mutually. The blocking inhibits the effect of a virtual antenna and the range of Yi is reduced. Accordingly, the probability of blocking, S(n), can be calculated using Equation (6) where m is the number of Yi that the area can contain, Kn is the number of choices that there is blocking when the number of Yi is n . S(1)=0. S(n) increases exponentially with Yi. The σn2 will convex reduce with the S(n) growth until S(n)=1. In other words, D(Ĥ) will convex increase with a growing number of moving people.
Now referring to
3. Methodology
Accordingly, it would be evident that the inventive approach provides a device-Free Crowd Counting methodology. Within the ensuing description the details of a FCC system architecture according to an embodiment of the invention are presented together with details of the system modules.
3.1: System Design
Referring to
During an offline phase, during which the system studies the CSI values when no or a few of people are walking inside the area of interest, in order to construct what the inventors refer to as a “training profile” for each for each stream. The profiles of all streams are constructed concurrently, for example, during this offline phase which may be relatively brief. Subsequently, a monitoring phase is established wherein the system collects readings from the monitoring points and decides for how many people there is activity within the area. It also updates the stored training profile so that it can adapt to environmental changes. Finally, a decision refinement procedure is applied to further enhance the accuracy.
Within an initial prototype system for the basic FCC system, the inventors employed 4 laptop computers, each with an Intel 5300 Network Interface Card (NIC) representing a common NIC supporting IEEE 802.11a/b/g and IEEE 802.11Draft-N1 wireless protocols in both the 2.4 GHz and 5.0 GHz spectrum region. One laptop continues to broadcast beacon messages, and the other three laptops work as receivers to measure the CSI values of the channel fadings.
3.2: CSI Profile Construction
The training phase and monitoring phase both contain a common component to learn the behavior of the signal readings in the monitoring area. This feature for system operation should be resistant to possible environmental changes that may affect the stored data. In addition, the selected feature should also be sensitive to the human motion to enhance the detection accuracy.
As mentioned above, moving people can influence the transmission channel, change the signal paths and cause CSI variation. The more people moving in the area, the more signal transmission paths will be changed. Referring to
The inventors established that when the number of points are expanded beyond a certain size then they overlap with their neighboring points. This overlapped area varies inversely to the intensity of CSI variation. Accordingly, the inventors proposed a metric known as the Percentage of non-zero Elements in the dilated CSI Matrix (PEM), to indicate variation of CSI profiling. An exemplary algorithm for generating as shown in Algorithm 1 below. It is generally divided into 3 steps:
(1) transform the CSI amplitude values into two-dimensional matrix;
(2) dilate the matrix; and
(3) count the non-zero elements.
Within Algorithm 1 CD is the barriered CSI results, S is the number of sub-carriers, P is the number of packets, CU and CL are the maximum and minimum value of CSI measurements, MC the number of rows of matrix, D which is the dilatation coefficient.
First, each element in the MC×P matrix M0 is initialized to “0”. The CSI reading CD[i][j] is converted into integers k by
and then the elements in row k and column j in M0 is set to “1”. There is a “1” in each column, and the rest are “0”s. Obviously, the variance of the row numbers of non-zero elements between adjacent columns becomes larger, when the CSI readings take dramatic turns.
Secondly, the elements around “1” are set to “1”s, which is called matrix dilation. After dilation, the CSI matrix M0 is transformed into dilated CSI matrix M. There is less overlap of dilated elements when the CSI reading are changing more sharply. That is, significant change of CSI usually comes along with more “1”s.
Finally, the percentage P[i] (which is the PEM of ith subcarrier) of non-zero elements in the dilated CSI matrix of each subcarrier can be calculated. The larger the overlap areas of dilated points are, the low percentage of non-zero elements in the dilated CSI matrix. So we can employ P[i] to indicate the number of moving people within the area being characterised. Now referring to
Based on this monotonous relation, we can gather a CSI fingerprint to determine the function between PEM and people count when a few people walk in the area, and then estimate numbers when there are more moving people.
3.3: CSI Profile Fitting
The purpose of a CSI Profile Construction Module is to construct a normal profile and capture the CST characteristics. These characteristics can then be used by other modules to count crowd. As shown in
3.4: Crowd Counting
According to Grey Theory, a smaller |a| is better for forecasting and accordingly the inventors have decomposed the crowd estimation into two steps:
Step 1: Each receiver, Rx, generates its own developing coefficient ai, and grey action quantity bi and calculates its estimating number, {circumflex over (n)}i, as given by Equation (13).
Step 2: The system obtains the final estimation through weighted average algorithm if there are N Rx devices, such as by using Equation (14).
3.5 Scalability
Since each receiver can only estimate the number of moving people within a certain range, the scalability of FCC should be considered to work well in large scale scenes. Intuitively, more devices can be deployed as the grid to cover the larger monitoring regions. However, this can lead to a new problem in that there may be mutual interference between two neighboring grids. Therefore, it is necessary to eliminate distractions.
For narrow-band systems, these reflections will not be resolvable by the receiver when the bandwidth is less than the coherence bandwidth of the channel. Fortunately, the bandwidth of 802.11n waveforms is 20 MHz (with channel banding, the bandwidth could be 40 MHz), which provides the capability of the receiver to resolve the different reflections in the channel. We propose a multipath mitigation mechanism that can distinguish the line of sight (LOS) signal or the most closed N-LOS from other reflections in the expectation of eliminating distractions from a distant.
The commonly used profile of multipath channel in the time domain is described as follows. In practice, OFDM technologies are efficiently implemented using a combination of fast Fourier Transform (FFT) and inverse fast Fourier Transform (IFFT) blocks. The 30 groups of CSI represent the channel response in frequency domain, which is about one group per two subcarriers. With IFFT processing of the CSI, we can obtain the channel response in the time domain, i.e., h(t). Due to the bandwidth limitation, we may not be able to distinguish each signal path, but multiple signal clusters. Therefore, we keep the first part of h(t) which includes the LOS and a few of NLOS signal paths, and filter out the residual clusters using a truncation window. The first part time duration is determined by setting the truncation threshold α as shown in Algorithm 2 wherein Cr means the raw CSI measurement of ith subcarriers and jth packet.
In doing so, we expect to mitigate the estimation error introduced by the mutual interference between two neighboring grids. After the time domain signal processing, we re-obtain the CSI using FFT.
The inventors conducted a set of experiments to evaluate the impact of truncation threshold α in all three cases shown in
4. Experiment Results
The methodology and algorithms described in Section 3 above in respect of embodiments of the invention are described below in respect of experimental scenarios and metrics for performance evaluation. The initial real world experiments to demonstrate the performance and robustness of FCC in different scenarios are depicted by first to fourth images 1110 to 1140 respectively in
4.1: Overall Performance
Referring to
Referring to
4.2: Impact of Dilatation Coefficient
Since PEM is calculated based upon the dilated CSI matrix M, then the impact of the dilatation coefficient should be evaluated.
4.3: Performance of Verhulst Model
A series of experiments were made to evaluate the performance of the Verhulst Model with different numbers of characteristic data sequences. These estimation results are presented in
4.4: Impact of Communication Distance
The inventors also evaluated the impact of the distance between Tx and Rx with respect to the accuracy of the FCC system according to embodiments of the invention. The system was evaluated to estimate the number of people walking between a pair of laptops with different distances between the pair of laptops. Due to space limitation, the communication distance between two laptops could only be increased from an initial 2 meters (approximately 6 feet 6 inches) to 8 meters (approximately 26 feet). The estimation error with different communication distances is plotted in
4.5: Impact of Distribution
The inventors also considered how crowd distribution impacted the estimation numbers obtained with an embodiment of the invention. There were four cases valuated:
Referring to
4.6 Impact of Moving Speed
In actual deployed environment, different people will have different walking speeds, as will the same individual in different environments or under different circumstances within the same environment, e.g. hurrying to catch a train in a station versus walking on the platform ahead of the train's scheduled arrival or departure time. Accordingly, the inventors considered whether the speed of movement influences estimation accuracy. Now referring to
For low speed motion and high speed motion, the training phase and monitoring phase have the same CSI feature. For the hybrid motion, different people have different moving speeds, and the resulting relationship between PEM and the number of moving people is unstable, which will affect the estimation accuracy.
4.7 Scalability in Large Area
Since each receiver can only estimate the number of moving people within a certain range, the scalability of FCC should be considered to work well in large scale scenes. In order to evaluate the scalability of FCC, the inventors implemented a trial system comprising 5 laptops in a hallway, 1 laptop in each corner and 1 laptop in the center as a Tx. Referring to
4.8: Resolution of Crowd Counting
Now referring to
4.9: Comparison with Existing Approaches
Within the prior art there are a couple of reported methods of device-free crown counting. Of these, “sequential counting, parallel localizing” (SCPL) is one of the most recent device-free techniques to count and localize multiple subjects in indoor n. Accordingly, the inventors performed some additional experiments to compare the performance of FCC according to an embodiment of the invention against the prior art SCPL. Within these experiments 5 devices were deployed on the both sides of a room with an area of 40 m2. Each device is both a transmitter and receiver. Referring to
The errors are caused by temporally overlapping trajectories and the environmental disturbance. For SCPL, about 45% results are accurate. This arises as the SCPL technique is a link-based scheme, which requires more intensive devices to provide adequate links. For FCC, the estimated results are relative stable. The number of estimated moving people has jitter with a range of approximately ±0.4 within the FCC methodology according to an embodiment of the invention. CSI is information which represents the state of a communication link from the transmit source to the receiver source without requiring any intervening device or limitations arising from the devices carried by the user. It is more sensitive to the diversity of transmission channel than RSS, which makes it more suitable than RSS at counting moving people.
5. Related Work
Recently, the indoor localization and counting problems have attracted much attention. The solutions can be classified into two categories by whether an object needs to carried or not, leading to device-based and device-free methodologies.
5.1 Device-based Approach
Within device-based approaches these utilize device carried by users to locate or count objects. Some systems calculate position relying on coupled RF and ultrasonic signals. Radio frequency identification (RFID) based localization has gained a lot of intention over recent years due to the potential of exploiting low cost RFID tags for inventory management etc. Received signal strength (RSS) based approaches can be categorized into Radio Propagation Model based or Fingerprint based. Recently, Channel State Information (CSI) was used for localization.
However, with the sharply increasing scale of mobile computing, using built-in sensors and modules of smart phones for locating, tracing or counting becomes a wider trend. For example, data collection exploiting Bluetooth environment data has been used for estimating crowd density. Smartphone inertial sensors can also be used for localization. However, such device-based approaches are exactly that, a count of the number of devices. As such the techniques are more suitable for object localization than crowd counting. In many crowd counting scenarios, it is hard to require each person has a device with them. If a person takes more devices or does not carry a device, it will import estimated errors in these techniques.
5.2 Device-Free Approach
Device-free approaches have gained much more attention recently as they do not require targets to equip themselves with devices. The most intuitive device-free solutions exploit machine vision technology but such vision-based crowd density estimations have a considerable overhead of computing and can only work in a line-of-sight pattern. Moreover, because of privacy protection and some other reasons, more focus is now made on non-vision-based approaches. Most of them are built on radio frequency techniques and can be broadly categorized into Location-based scheme and Link-based scheme.
Location-based Scheme: This kind of scheme divides locating procedure into two phases: training phase and operating phase, such as discussed above in respect to embodiments of the invention. Some approaches have sought to formulate the localization problem into a probabilistic classification problem in order to mitigate the error caused by the multipath effect in a cluttered indoor environment in order to locate a single individual. Others have sought to establish relationships between radar charts and crowd movement patterns without significant progress. Such schemes require site surveys over areas of interest to build a fingerprint database with significant manual cost and effort in addition to the resulting inflexibility in respect of environment dynamics. For crowd counting the training costs are too heavy for large scale scenarios and it is hard to obtain the ground truth when the number of people is large.
Link-based Scheme: This kind of scheme exploits that within a communication system, N nodes can construct N(N−1)/2 links. If objects are active nearby Link Li,j then the RSS of Node i and Node j would change obviously. But if an object moves far away from any link, the performance decreases sharply. Obviously, this kind of scheme is more sensitive when the obstacle moves near by the links. Users must deploy exorbitantly intensive nodes to provide adequate links, which causes high cost. If a cell coexists with multiple objects or many objects co-exist in the testing area, the proposed sequential counting algorithm may not effectively estimate the number of people. Utilizing fine-grained physical layer information in localization and counting draws increasing attentions recently.
In contrast the embodiments of the invention exploit CSI measurements on a series of channels between a Tx and one or more Rx. Beneficially, the methodology does not require the individual being counted to have a wireless electronic device at all. Similarly, as the FCC is performed by wireless transmit/receive devices independent of the presence of electronic devices, e.g. PEDs/FEDs associated with the individuals being counted then the wireless system does not need to necessarily conform to a standard or protocol of the electronic devices, e.g. PEDs/FEDs. Accordingly, the FCC system can exploit wireless spectrum not associated with the PEDs/FEDs such that the existing wireless infrastructure capacity for the users being counted is not impacted.
Accordingly, referring back to
Within the embodiment of the invention described above in respect of
Specific details are given in the above description to provide a thorough understanding of the embodiments. However, it is understood that the embodiments may be practiced without these specific details. For example, circuits may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
Implementation of the techniques, blocks, steps and means described above may be done in various ways. For example, these techniques, blocks, steps and means may be implemented in hardware, software, or a combination thereof. For a hardware implementation, the processing units may be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described above and/or a combination thereof.
Also, it is noted that the embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged. A process is terminated when its operations are completed, but could have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
Furthermore, embodiments may be implemented by hardware, software, scripting languages, firmware, middleware, microcode, hardware description languages and/or any combination thereof. When implemented in software, firmware, middleware, scripting language and/or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine readable medium, such as a storage medium. A code segment or machine-executable instruction may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a script, a class, or any combination of instructions, data structures and/or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters and/or memory content. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
For a firmware and/or software implementation, the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. Any machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein. For example, software codes may be stored in a memory. Memory may be implemented within the processor or external to the processor and may vary in implementation where the memory is employed in storing software codes for subsequent execution to that when the memory is employed in executing the software codes. As used herein the term “memory” refers to any type of long term, short term, volatile, nonvolatile, or other storage medium and is not to be limited to any particular type of memory or number of memories, or type of media upon which memory is stored.
Moreover, as disclosed herein, the term “storage medium” may represent one or more devices for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information. The term “machine-readable medium” includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels and/or various other mediums capable of storing, containing or carrying instruction(s) and/or data.
The methodologies described herein are, in one or more embodiments, performable by a machine which includes one or more processors that accept code segments containing instructions. For any of the methods described herein, when the instructions are executed by the machine, the machine performs the method. Any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine are included. Thus, a typical machine may be exemplified by a typical processing system that includes one or more processors. Each processor may include one or more of a CPU, a graphics-processing unit, and a programmable DSP unit. The processing system further may include a memory subsystem including main RAM and/or a static RAM, and/or ROM. A bus subsystem may be included for communicating between the components. If the processing system requires a display, such a display may be included, e.g., a liquid crystal display (LCD). If manual data entry is required, the processing system also includes an input device such as one or more of an alphanumeric input unit such as a keyboard, a pointing control device such as a mouse, and so forth.
The memory includes machine-readable code segments (e.g. software or software code) including instructions for performing, when executed by the processing system, one of more of the methods described herein. The software may reside entirely in the memory, or may also reside, completely or at least partially, within the RAM and/or within the processor during execution thereof by the computer system. Thus, the memory and the processor also constitute a system comprising machine-readable code.
In alternative embodiments, the machine operates as a standalone device or may be connected, e.g., networked to other machines, in a networked deployment, the machine may operate in the capacity of a server or a client machine in server-client network environment, or as a peer machine in a peer-to-peer or distributed network environment. The machine may be, for example, a computer, a server, a cluster of servers, a cluster of computers, a web appliance, a distributed computing environment, a cloud computing environment, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. The term “machine” may also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
The foregoing disclosure of the exemplary embodiments of the present invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many variations and modifications of the embodiments described herein will be apparent to one of ordinary skill in the art in light of the above disclosure. The scope of the invention is to be defined only by the claims appended hereto, and by their equivalents.
Further, in describing representative embodiments of the present invention, the specification may have presented the method and/or process of the present invention as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. As one of ordinary skill in the art would appreciate, other sequences of steps may be possible. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. In addition, the claims directed to the method and/or process of the present invention should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the present invention.
This patent application claims the benefit of priority from U.S. Provisional Patent Application 62/152,230 filed Apr. 24, 2015 entitled “Methods and Systems for Wireless Crowd Counting”, the entire contents of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 62152230 | Apr 2015 | US |
Child | 15133847 | US |