This disclosure relates to object identification, and more particularly to object identification within a complex environment.
Objects partially or fully obscured within an environment can be detected by a variety of methods, often while leaving the surrounding environment in tact. This can be an advantageous approach over more invasive methods when damage may be done to the environment surrounding the object of interest, or when it may be hazardous to remove portions of the environment.
Various imaging techniques are used in medicine to determine structural features within the body without subjecting the patient to an invasive surgical procedure. As an example, magnetic resonance imaging (MRI) and X-ray imaging can be used to study tissue and bone structures respectively. Diagnostic sonography or “ultrasound” can image muscles, tendons, and internal organs, and is a common modality for fetal monitoring in prenatal care. Radar based microwave imaging techniques are being investigated for diagnosing breast cancer that is at an early stage.
Some imaging techniques rely on computer software or hardware to transform image object data into a recognizable form. For example, in radar based microwave imaging systems, software is often used to transform raw electromagnetic field data received from an array of antennas into an image that resembles a biological structure of interest.
From the foregoing discussion, it should be apparent that a need exists for a system and methods for identifying an object within a complex environment. More particularly, a need exists for a method for finding a tumor within breast tissue.
A system for identifying an object within a complex environment is presented. In one embodiment, the system includes an energy source, a receiver, and a computing system. In such an embodiment, the energy source may irradiate an environment with electromagnetic energy. The receiver may receive reflections of the electromagnetic energy from an object within the environment and generate a response signal associated with the received reflections. In one embodiment, the computing system may be configured to execute predetermined instructions. For example, the instructions may include receiving the response signal corresponding to the reflections of the energy source, extracting a feature of the object within the environment from the response signal reflected by the object, estimating a location of the object within the environment from the object response, comparing the feature of the object with a feature associated with an object of interest, classifying the object in response to a physical location of the object and the comparison of the feature of the object with the feature of the object of interest, reconstructing an object estimation in response to the classification, and generating an image of the object in response to a determination that the object is classified as an object of interest.
A tangible computer program product comprising computer readable instructions that, when executed by a computer, cause the computer to perform certain operations is also presented. In one embodiment, the operations may include extracting a feature of an object response from a signal reflected by an object embedded within an environment, estimating a location of the object within the environment from the object response, comparing the feature of the object response with a feature associated with an object response of interest, classifying the object in response to a physical location of the object and the comparison of the feature of the object with the feature of the object of interest, reconstructing an object estimation in response to the classification; and generating an image of the object in response to a determination that the object is classified as an object of interest.
A method is also presented for identifying an object within a complex environment. The method in the disclosed embodiments substantially includes the steps necessary to carry out the functions presented above with respect to the operation of the described system and computer readable medium. In one embodiment, the method includes extracting a feature of an object response from a signal reflected by an object embedded within an environment, estimating a location of the object within the environment from the object response, comparing the feature of the object response with a feature associated with an object response of interest, classifying the object in response to a physical location of the object and the comparison of the feature of the object with the feature of the object of interest, reconstructing an object, estimation in response to the classification; and generating an image of the object in response to a determination that the object is classified as an object of interest.
In a further embodiment, the extracting the features of the object response may include receiving a time-domain energy reflection signal from within the environment, dividing the time-domain energy reflection signal into one or more windows comprising time-domain data, and comparing the time-domain data in the one or more windows with known object responses from a database of object responses. Receiving the time-domain energy reflection signal from within the environment may include directing an energy source into the environment and receiving a reflection from the object within the environment with one or more receiving antennas.
In one embodiment, extracting the feature of the object response may include modeling the object response with a piecewise parametric function of time and estimating parameters using a statistical signal processing estimation technique.
In a further embodiment, classifying the object may include comparing the time domain data with object responses recorded at one or more additional sensors to identify similar responses. In an alternative embodiment, classifying may include comparing an object response received by one or more receivers with a reference response, the receivers defining an n×m array, identifying an object response most similar to the reference response, selecting a set of one or more initialization points associated with the object, response that is most similar to the reference response, estimating a location of a source of the object response, predicting a time-of-arrival of the object response received by an unclassified receiver according to the location of the source of the object response, comparing the predicted time-of-arrival of the object response with an actual time-of-arrival of the response acquired by the unclassified receiver, and determining that the object response received by the unclassified receiver is associated with the source of the object response according to a determination that the time-of-arrival of the response received is substantially the same as the predicted time-of-arrival of the response, and the response received by the receiver is similar to a reference response.
In one embodiment, transforming the one or more feature vectors may include substituting elements of the object response into a response model comprising a time-independent scaling factor, an object reference response, a time delay between an actual object response and a reference signal, and a damping factor.
In a further embodiment, the method may include identifying non-target signals corresponding to clutter, and removing the non-target signals from the total signal.
Additionally, identifying non-target signals corresponding to clutter may include transforming an object estimate and signal data into the frequency domain, providing a parameter space from which to extract relevant features from the signals, and removing a clutter estimate from the total signal. In a further embodiment, transforming an object estimate and signal data into the frequency domain may include identifying poles corresponding to clutter. Identifying poles corresponding to clutter may include using the TLS-Prony method.
In a further embodiment, object is a tumor and the environment is breast tissue in proximity to the tumor.
Alternatively, the method may include irradiating body tissue with electromagnetic, energy, capturing reflections of the electromagnetic energy at a plurality of receivers, generating a plurality of signals, each signal associated with the reflections captured by one of the plurality of receivers, performing a tumor response estimation that extracts information related to a tumor response from the plurality of signals, performing a tumor classification to identify and localize a source of a tumor response and determine that the tumor response is associated with a tumor, reconstructing the tumor response according to an object estimation reconstruction, removing signals that do not correspond to reflections from the tumor, and creating an image of the tumor, the image being substantially devoid of image artifacts.
In one embodiment, the energy is broad-band or ultra-wideband microwave energy. In a further embodiment, irradiating the body tissue with electromagnetic energy and the capturing reflections of the electromagnetic energy at a receiver is accomplished by an antenna that can both emit and receive microwave energy. Additionally, imaging the object within the body tissue may include processing signals from a tissue sensing adaptive radar apparatus.
The term “coupled” is defined as connected, although not necessarily directly, and not necessarily mechanically.
The terms “a” and “an” are defined as one or more unless this disclosure explicitly requires otherwise.
The term “substantially” and its variations are defined as being largely but not necessarily wholly what is specified as understood by one of ordinary skill in the art, and in one non-limiting embodiment “substantially” refers to ranges within 10%, preferably within 5%, more preferably within 1%, and most preferably within 0.5% of what is specified.
The terms “comprise” (and any form of comprise, such as “comprises” and “comprising”), “have” (and any form of have, such as “has” and “having”), “include” (and any form of include, such as “includes” and “including”) and “contain” (and any form of contain, such as “contains” and “containing”) are open-ended linking verbs. As a result, a method or device that “comprises,” “has,” “includes” or “contains” one or more steps or elements possesses those one or more steps or elements, but is not limited to possessing only those one or more elements. Likewise, a step of a method or an element of a device that “comprises,” “has,” “includes” or “contains” one or more features possesses those one or more features, but is not limited to possessing only those one or more features. Furthermore, a device or structure that is configured in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
Other features and associated advantages will become apparent with reference to the following detailed description of specific embodiments in connection with the accompanying drawings.
In general, objects can be imaged or resolved from a surrounding environment by exposing the environment to an energy source, such as a directed electromagnetic or ultrasonic wave, and capturing reflections of the energy at a receiver from objects within the environment. The energy source and the receiver can be coupled to electronic equipment that can determine features of the object, if present, such as the depth of the object from a surface, the size, density, shape, location, and other characteristics of the object. In some cases, processes are used to transform raw data, such as the intensity of backscattered energy from an object, into an image of the object that resembles the true characteristics of the object. In some embodiments, energy is microwave energy. In some embodiments, the electromagnetic wave is broad-band or ultra-wideband microwave energy, for example, microwave energy in the range of 2 to 13.5 GHz.
The method can be executed on a computing system. Non-limiting examples of computing systems include personal computers, computer networks, supercomputers, and workstations. In an alternative embodiment, the method may be executed by an embedded microcontroller or FPGA, or other dedicated hardware components. The computing system may be directly interfaced with other hardware and software systems, i.e., other computer systems, and instruments that allow the collection of imaging data. In some embodiments the computing system may be coupled to imaging hardware that may include, for example, an energy source that transmits energy into an environment, and a receiver or antenna system that can receive backscattered energy from objects within the environment. In some embodiments, the energy source and the antenna system are the same, meaning that one device both transmits energy into the environment and receives backscattered signals from objects within the environment. In other embodiments, the energy source and the antenna system are decoupled. In some embodiments, multiple energy sources and multiple antenna systems can be used to interrogate one environment. In some embodiments, an energy source/antenna system can be moved around an environment of interest so as to produce a synthetic array of antennas that captures a region of the environment.
In some embodiments, the method is stored on a computer readable medium comprising computer readable instructions that, when executed by the computing device, cause the computer to perform the various method steps. Non-limiting examples of computer readable media include hard disk drives, computer memory, e.g. random-access-memory (RAM) or read-only-memory (ROM), and universal-serial-bus (USB) drives. The computer readable medium allows storage of instructions, including instructions to carry out the method, so that a computer processor may execute the method and return a tangible result. In some embodiments, a tangible result includes the formation of an image file from raw image data after it has been processed through the method. In similar embodiments, a tangible result includes displaying a computer-rendered image of an object based on the output of the method on a viewscreen, such as a computer monitor.
In certain embodiments, a computer system that performs operations of the method is decoupled from the instruments or other hardware that collects the raw image data. In other words, one system can perform the operations related to collecting raw image data, and another system can perform the operations relating to calculating an output.
The method presented in
Steps 110 and 120 combine to permit the detection of a response in a signal. Since an object is characterized by its response, detection of the response leads to the identification and localization of an object of interest. In Step 110, feature information related to the response associated with the object of interest, is extracted. This includes how closely the information present in the signal matches the information present in the object response. The feature information that the method is capable of extracting from the signal depends on the object response used. To increase the flexibility of the method, a database of object responses may be used. This capability generalizes the applications of the method. For example, in one embodiment, a set of object responses associated with different land mines may be used to acquire land mine information from the signal. In another embodiment where tumor detection is of interest, a set of object responses related to tumors having different geometrical and electrical properties may be used to acquire a variety of tumor response information from a signal.
Step 120 is a classification method that is applied to the feature information extracted from Step 110. The method first identifies and localizes the physical source of the signal. Next, the feature information is examined to determine if it originated from an object of interest. The decision is based on how closely the feature information matches the object response information. Knowing both the physical location of the source of the signal, and how closely the signal information matches the object response information allows the classification method to identify and localize an object of interest. This approach permits the method to be applied to a variety of situations where the physical location of an object is unknown, but needs to be determined. A list of possible embodiments include, but are in no way limited to, locating tumors embedded in breast tissue, locating buried land-mines, finding underground electrical and natural gas utilities, identifying the location of mineral deposits, detecting explosives in luggage, and identifying buried human remains.
Step 130 is applied to the output of Step 120 so that signals identified to be associated with an object of interest may be reconstructed to form a three dimensional image.
An optional Step 140 is included in the flow diagram 100, so indicated by the dashed line. This optional Step 140 permits an improvement of the estimate of the object response. As a broad overview of this Step 140, components of a signal which may have been identified as clutter, i.e., signals that are not indicative of an object of interest are further processed. Processing of the clutter may include identification and classification of the clutter. This additional knowledge may, in turn, be used to extract more detailed information about the object of interest.
Details of the method steps described in
Extracting Object Features—Step 110
An object signal may be pre-conditioned to remove known sources of noise and signals corresponding to objects of non-interest. The pre-conditioned signal may be modeled as,
x(n)=t(n)+c(n)+w(n), n=0, . . . , N−1 (1)
where x(n) represents the pre-conditioned signal, t(n) represents the contributions from the object, c(n) represents clutter contributions, w(n) represents additive white Gaussian noise, and N is the duration of the received signal. A time domain parametric function can be used to estimate the object contributions in (1) as,
where A is a time independent scaling factor, tα(n) is an object reference response, td is the time delay between the actual object response and the reference signal, and γ is a damping factor. A set of reference signatures can be generated using finite difference time domain (FDTD) simulations of nr selected object models. Acquisition of the set of nr reference responses is described below. The nr responses can be assembled into an indexed set given by tα(n)ε{tα: αε∀, ∀={1, 2, . . . , nr}}. The set of reference signatures characterizes the response of an object over a fixed range of geometrical and electrical properties with the removal of all unwanted contributions arising from the scattering mechanisms within the surrounding environment. In some cases, differences exist between the early and late time object response. The piecewise function given by Equation (2) can therefore be introduced to accurately model the temporal object response.
In some implementations of the method, a library of object responses can be used to create reference sets. For example, known ranges of electrical properties of certain objects may be incorporated into the refined object response reference signature set. Furthermore, in a practical system, an object response set may be obtained using information from other imaging modalities. For example, the shapes and sizes of objects such as tumors, e.g., tumors within breast tissue, may be estimated from x-ray mammograms or magnetic resonance images. These data may be used in simulations to obtain the tumor response reference signals.
A computer process can accurately estimate the value of each parameter in Equation (2). These parameters are represented in vector form as θ=[A γ td α]T. The range of values that each parameter can assume can be physically constrained by the system, i.e., the electrical and geometrical properties of the model being used and the characteristics of the signal receiving system. This observation implies that the true value of a parameter is chosen from an assumed fixed interval.
The maximum value that A can assume is the ratio of the maximum value of the signal to the maximum value of the reference signature. The damping of the reference signal can depend on the permittivity contrast between the object used to acquire the reference signal and the surrounding environment. Likewise, the damping of the object response for each test may depend on the permittivity contrast between the object and the surrounding environment. If the contrast is the same for both the reference object and the object under consideration, then the damping factor will be the same. As the permittivity contrast decreases, then the damping factor increases.
The time delay parameter (td) is the time delay between the maximum of the actual object response and the reference signal. The maximum value of the object reference usually occurs at the transition between the early and late time response. Hence, M, the maximum value of the time delay, is the duration of the entire signal. N−1, minus the duration of the late time response of the reference signal. The index, α, indicates which of the nr reference responses is selected. In some implementations of the method, the range of values for each parameter is based on a model that incorporates a variety of realistic target geometries and properties. In some models, the feasible ranges of values for the damping factor (γ) and time delay (td) may be modified as required.
A Bayesian estimation technique can provide one mechanism to incorporate the prior knowledge about each parameter into the estimator. Each parameter, θm, m=1, 2, 3, 4, can be modeled as a stochastic variable with its own probability density function (pdf), p(θm), having finite support and a non-zero real valued variance σθm2. Initially the estimation of the continuous parameters (A and γ) can be considered by assuming that each discrete parameter (td and α) is constant. In particular, each continuous parameter can be modeled as a random variable with a uniform pdf given by,
where am and bm are the boundary points of the range of values identified for each parameter. By assumption, the noise, w(n), is derived from a zero mean, white Gaussian process with a variance of σ2. Hence, the prior conditional probability p(x|θ) also follows a Gaussian distribution with mean t(n)+c(n) and variance σ2 and is given by,
An optimal approach to estimate θ is finding the maximum of the posterior pdf. For example, a maximum a posteriori, probability (MAP) approach, which chooses the value of θ to maximize the posterior pdf or,
Applying Bayes Rule to the posterior pdf followed by the application of the gradient operator may be used to yield the result.
∇θ[ln p(x|θ)]θ={circumflex over (θ)}
Computing the logarithm of (4) leads to,
After simplification, (7) becomes,
where K is a constant independent of θ, and Et is the energy of the object response. Equations (6) and (8) imply that maximizing the posterior pdf is equivalent to maximizing the cross-correlation function. The cross-correlation function may be normalized resulting in the following cost function.
where Et and Exc are the energies of the object and difference signals, respectively.
To complete the analysis, the assumption that the discrete parameters are constant can be relaxed. By assumption, the value of each discrete variable is derived from a fixed set of elements (tdεTd={0, 1, . . . , M−1}, M<N, αε∀), and may assume the value of any element in the respective set with equal probability. Hence, each discrete random variable follows a discrete uniform pdf. Each discrete variable can be incorporated into the search space over which the cost function is maximized. This yields a MAP which takes the following final form,
The computation of (10) requires the maximization of a cost function over a multidimensional search space in Furthermore, it is observed that the cost function is non-convex, leading to multiple local maxima. Since the goal is to find the maximum value over the entire search space, a numerical grid search technique is used. The range of each parameter or variable defines the search space in Starting with the first element of the base reference set (i.e. tα=1(n)), the technique iteratively selects a reference signature. For each reference signature selected, the technique then extracts the parameters from the search space that maximize the cost function. The index of the reference signature along with the associated set of parameters extracted is used to compute the value of the MAP. A mesh size is used that balances the requirement of achieving satisfactory estimates of the parameters (in terms of precision) without using an excessive amount of computational resources.
Windowed Estimates
The computation of x(n)−c(n) in (9) can require full knowledge of the clutter, which is not possible in most circumstances. This problem can be overcome with an iterative process that uses a short duration temporal window. It can be assumed that the object response is contained within the window, while the clutter is outside of the window. The MAP given by (10) is then applied to the signal contained within the window to evaluate estimates of the function parameters. The temporal window then incrementally slides across the signal, x(n), while the MAP evaluates function parameter estimates at each iteration.
The process is shown in
The duration of the window is defined as, W=tstop−tstart, where tstop is the end of the window which corresponds to the end of the reference signal. The end of the reference signal is selected so that the energy has attained a low level (e.g., < 10%).
The maximum value of the cost function describes how closely the estimate matches the signal contained within the window. Therefore, the result is augmented to the vector of parameter estimates to form a five-dimensional estimation vector {circumflex over (f)}k=[Âk {circumflex over (γ)}k {circumflex over (t)}d
Object Response Classification—Step 120
In the object response classification method for step 120 signals may be recorded at an n×m array of receivers, e.g., antennas, with individual elements denoted as (i, j). This section describes one method for classifying the object responses. Another procedure is described in the Alternative Object Response Classification section. The Bayesian estimator can summarize the feature information contained in each signal and compress the data into a lower dimensional space. The feature information acquired for receiver (i, j) is, in turn, stored in a feature space, defined as,
=span{{circumflex over (f)}i,j1,{circumflex over (f)}i,j2, . . . , {circumflex over (f)}i,jL}, (11)
where {circumflex over (f)}i,jk is the feature vector associated with the kth temporal window, and L is the maximum number of temporal windows used to extract the response information.
A goal is to determine which one (if any) of the L feature vectors contained in the space is associated with an object response. The following two step procedure is used, in some implementations, to achieve this goal: (1) initialization points are identified, and (2) starting with the initialization points, all feature vectors are classified. The procedure uses the time delay ({circumflex over (t)}d
Finding a Set of Initialization Points
A set of initialization points can be selected by choosing the feature vector with the highest peak cost function value amongst all of the receivers interior to the n×m synthetic array (i.e. receivers along the boundary of the array are not considered). The feature vector found using this criterion is identified as {circumflex over (f)}u,vini with an associated time delay, {circumflex over (t)}d
Next, a determination is made as to whether any of the other receivers contained in the 3×3 window surrounding receivers (u, v) contain contradictory information using a two step procedure:
{circumflex over (f)}i,jtest=fi,jmax when {circumflex over (ρ)}i,jmax=max{{circumflex over (ρ)}i,jk} for k=1, . . . , L, (12)
A decision is applied to {circumflex over (f)}i,jtest in Equation (13) to determine if it has a time delay sufficiently close to {circumflex over (t)}d
In this embodiment, the time of arrival interval expands to accommodate the longer distance the object response travels with increased distance of the receiver under consideration from receiver (u, v). By considering the region scanned by the receivers, the maximum time delays for the 3 possible receiver configurations are calculated. In another embodiment, a technique used to predict the time-of-arrival of a tumor response may be used to determine the time delay. This technique is described in more detail in the Object Response Classification—Alternate Method Section.
After acquiring a set of initialization vectors, a check is made to ensure that each vector is non-zero (i.e. {circumflex over (f)}i,jini≠0, for i=1, 2, 3, j=1, 2, 3). If this criterion is met, then {circumflex over (f)}i,j={circumflex over (f)}i,jini for i=1, 2, 3, j=1, 2, 3. Thus, all object response estimates within the spatial window are identified and stored in the set {{circumflex over (f)}i,j}.
Conversely, the occurrence of {circumflex over (f)}i,j=0 is an indication that the initialization procedure has failed. In response, the feature space for each interior receiver is re-examined, and the feature vector with the next highest peak cost function value is selected. The entire procedure is repeated until a set of initialization points has been found. If the procedure fails to find a set of initialization points, then it is inferred that the information contained in the signals does not support the presence of an object response.
Classifying All Feature Vectors
To classify the feature vectors, the feature information is examined to determine if it originated from an object of interest. Deciding when a feature vector is related to an object response is determined by how close the feature information matches the object response information. Before classifying the feature vectors, all receivers in the n×m array are grouped column-wise. In one embodiment, the time delays associated with the classified feature vector set, {{circumflex over (f)}i,j}, in the initialization window are used to compute the average time delay for the column using,
where N is the number of classified feature vectors in the column. The average object response time delay for each column can be used by the decision rules for the classification procedure.
The following three step procedure can be used to classify the feature vectors in each column,
{circumflex over (f)}i,jtest={circumflex over (f)}i,jmin when {circumflex over (t)}d
for k=1, . . . , L, (15)
In another embodiment of the method, the time delay of a candidate signal may be compared with an average time delay computed using a sub-set of the initialization window or previously classified antennas. For example, the closest 3 or 5 antennas to the candidate may be used to calculate the time delay. This technique is described in more detail in the Object Response Classification—Alternate Method Section.
The outcome of the classification process is a feature vector estimate, {circumflex over (f)}i,j, associated with each receiver location (i, j) such that {circumflex over (f)}i,j=0 indicates that no object response was found, and {circumflex over (f)}i,j≠0 indicates that an object response was found.
To accommodate the detection of multiple objects, the classification procedure can be executed in an iterative fashion. In particular, for the next iteration, the receiver array can be searched for the next largest peak cost function value. The initialization process is then repeated. If each vector is non-zero (i.e. {circumflex over (f)}i,jini≠0, for i=1, 2, 3, j=1, 2, 3), then the initialization vectors are examined to determine if they have already been classified. If the vectors have already been classified, then the initialization process is repeated for the next highest peak cost function value. Otherwise, the classification process is repeated. The classification process is terminated once all of the initialization vectors are 0.
Object Response Classification—Alternate Method for Step 120
The object response classification process for step 120 described in the previous section is suited for simple cases where the tumor is observed at a collection of antennas and clutter is not as significant. A major challenge for this method is to detect a tumor response that is obscured by a significant amount of clutter (or signals arising from scattering mechanisms other than the tumor). The challenge arises primarily due to the difficulty in discriminating between a tumor response and the response due to a non-tumor scattering mechanism. This ambiguity may lead to false identification of the tumor response. This may result in the deterioration of the focusing performance. Variations in the breast shape and breast tissue property distribution add to the challenge of the problem. Moreover, in many realistic cases, the tumor response is observed at a limited number of antennas due to the presence of high permittivity glandular tissue. This results in a decrease in information available to localize the scatter source. These factors collectively contribute to the motivation behind the development of the alternative classification process for Step 120 described in this section. In one embodiment, step 120 may incorporate a time-of-arrival (TOA) predictor.
The TOA process is a tool that aids in distinguishing tumor responses from clutter. The key idea behind the technique is that it provides a means for finding the region of the breast that is the source of the tumor response. The technique uses 3D information observed at neighboring antennas, and may include triangulation methods similar to those used in global and sonar positioning systems. Candidate tumor responses are evaluated by comparing the TOA of the response with the predicted TOA. If reasonable agreement does not exist, then the candidate response is unlikely to originate from the same location as the tumor. For practical implementation, the TOA process assumes tumor responses are observed at only a few antennas. In addition, the TOA process integrates a priori information in an attempt to improve robustness. Specifically, information from a 3D breast surface estimate is included. Finally, the process operates iteratively, updating location estimates as tumor responses are confirmed at neighboring antennas.
Data are acquired by illuminating the breast with an ultra-wideband pulse and then recording the backscattered fields using the same antenna. The antenna is moved along a circular path enclosing the breast to form a row of antenna positions. The process is repeated at various distances between the nipple and chest wall, creating columns of data. This scan forms a synthetic array as shown in
The time-of-arrival (TOA) process assumes that a tumor response has been detected at several antenna locations using the method described in the Finding a Set of Initialization Points section. However, instead of initializing the classification process with a 3×3 window containing 9 antenna elements, a cross shaped window containing just 5 elements is used. This cluster of antennas is referred to as the initialization window and is shown in
A process used to estimate the tumor location is presented in the Tumor Location Estimation section. Next, incorporation of the breast surface location is proposed in the Refined Estimated Tumor Position section. Prediction of the TOA for a response at a neighboring antenna is outlined in the Predicted Tumor Response Time-Of-Arrival section. Collectively, these processes may be used as an alternative method for Step 120 for classifying the object response described in the previous section.
Tumor Location Estimation
To demonstrate the theory used to develop the tumor location estimation process for Step 120, we consider two antennas. The measurement geometry of the system is shown in
r
1
=∥u−a
1∥=√{square root over ((x−x1)2+(y−y1)2+(z−z1)2)}{square root over ((x−x1)2+(y−y1)2+(z−z1)2)}{square root over ((x−x1)2+(y−y1)2+(z−z1)2)} (17)
so that
r
1
2=(x−x1)2+(y−y1)2+(z−z1)2. (18)
On the other hand, the distance may also be represented by
r
1
=b
1
+s
1
+o
i (19)
where b1 is the distance from the tumor to the inside surface of the skin, s1 is the thickness of the skin, and o1 is the distance from the outside surface of the skin to the antenna. Likewise, for antenna 2 (where a2=(x2, y2, z2))
r
2
2=(x−x2)2+(y−y2)2+(z−z2)2 (20)
and
r
2
=b
2
+s
2
+o
2
=r
1
+Δb
2
+Δs
2
+Δo
2 (21)
where Δb2, Δs2, and Δo2 are the differences in distances between the first and second antennas for the breast tissue, the skin thickness, and the distance from the outside surface of the skin to the antenna, respectively. For this study we assume that the difference in skin thickness is negligible so that Δs2≈0. Using (21), we may also compute
Substituting (18) into (22), and equating the result to (20) yields the following equation after simplification
Expressions for b2 and o2 are developed using the tumor response TOA. The difference in the TOA estimate of the tumor response received by antennas 1 (TOA1) and 2 (TOA2) is given by
t
12=TOA2−TOA1. (24)
Alternatively, (24) may be expressed as,
t
12
=t
b
+t
s
+t
oil (25)
where tb, ts, and toil are the time differences due to the different propagation path lengths through the breast tissue, the skin, and the oil respectively. We note that the times (t12,tb,ts,toil) are related to round trip distances. The assumption that Δs2=0 implies that ts≈0, so that (25) may be re-written as
t
b
=t
12
−t
oil. (26)
The distance from each antenna to the surface of the breast may be used to estimate
where νoil=c/√{square root over (εoil)}, c is the speed of light, and εoil is the known relative permittivity of the immersion liquid. Substituting (27) into (26) leads to
where νb=c/√{square root over (εb)}, and εb is the assumed relative permittivity of the breast tissue. Finally, substituting (28) into (23) results in a linear equation with four unknowns (i.e. x, y, z, and r1).
The preceding argument may be extended to the nth antenna to generalize (23) with
Hence, for n antennas (where n≧4), (29) is used to form a system of n linear equations expressed in matrix form as
which may be written more compactly as
Aθ=b. (31)
Hence,
θ=(ATA)−1ATb (32)
provided that A is not singular. We observe that (32) has an exact solution when n=4. Otherwise, the over-determined system of equations may be used to find an analytic solution ({circumflex over (θ)}=({circumflex over (x)}, ŷ, {circumflex over (z)}, {circumflex over (r)}1)) approximated in a least squares sense.
In one embodiment, singularities may be avoided and the robustness of the process may be improved by decreasing the condition number of A. Singularities may arise when multiple antennas provide redundant information. For example, two antennas that are equidistant from the tumor may have equivalent differences in TOAs (TOAs). Likewise, A is ill-conditioned if multiple antennas have similar TOAs. One strategy that may be implemented to improve the robustness of the solution is to sort the antennas in ascending order according to their associated TOAs. When constructing (30), the antenna with the smallest TOA (i.e. closest to the tumor) is selected as antenna 1, while the antenna with the largest TOA (i.e. furthest from the tumor) is selected as the nth antenna. Moreover, before (32) is computed, the condition number for A is checked. A large condition number suggests the occurrence of multiple antennas with similar TOAs. Antennas providing redundant information may then be removed from the array before constructing (30).
Refined Estimated Tumor Position
The estimation of o1 and o2 with single reflected signals does not consider the position of the tumor. Instead, each measurement represents the closest point on the breast surface to the respective antenna. This may lead to errors in the estimation of the antenna-to-tumor propagation path length. In order to improve the accuracy of the measurement, information from the 3D breast surface is incorporated into the process. This surface information may be estimated from the microwave signals with various estimation processes, or measured with an alternative technique using lasers. Referring to
p=a
1
−tν (33)
where t is a scalar such that tε[0, 1], and ν is the direction vector of the line. We observe that t=0 corresponds to the position on the line at the antenna, while t=1 represents the position on the line at the estimated tumor location. For antenna 1, the position on the line at the breast surface is determined by starting at the antenna (i.e. t=0), and then moving along the line using (33) by increasing t until the point of intersection with the surface of the breast is reached. This value, p is used to update the antenna-to-breast surface distance using
o
1
=∥a
1
−p∥. (34)
However, an estimate of the tumor position must be available in order to construct (34). To remedy this problem, the process computes an initial estimate of the tumor location using the antenna-to-breast surface distance data computed with single reflected signals. The initial estimate, û0, is used by (33)-(34) to refine the difference in antenna-to-breast surface distance information (i.e. oi)). The refined information is, in turn, incorporated into (30) to improve the precision of the tumor position estimate. These steps are repeated iteratively to refine the estimation. A flow diagram of the process is shown in
Predicted Tumor Response Time-of-Arrival
Once an estimate of the tumor response is obtained, additional antennas may then be used to evaluate (32). We consider the unclassified ith antenna that borders the k×m classified array where k is the number of antennas in the row that have been classified and m is the number of antennas in the column that have been classified such that k×m≧5. The estimated tumor position and the TOA from a classified antenna are used to determine if the ith antenna has received a tumor response. The change in TOA between antenna 1 and antenna i is obtained by re-arranging the result when (28) is substituted into (21) and is given by
where the estimated tumor position û=({circumflex over (x)},ŷ,{circumflex over (z)}) is substituted into (17) so that ri=√{square root over (({circumflex over (x)}−xi)2+(ŷ−yi)2+({circumflex over (z)}−zi)2)}). When dealing with discrete-time data, the quantity computed in (35) may be converted to a discrete value (i.e. number of time-samples) using
where └•┘ extracts the integer part of (35), and Δt is the sample interval time. Finally, the predicted TOA of the tumor response received by the ith antenna is computed by re-arranging (24) to yield
TOAi=TOA1−ΔTOA1i. (37)
A close match between TOA; and the TOA estimated from the response received at the ith antenna infers that the antenna has received a tumor response. To provide additional support to determine if the response is associated with a tumor, the peak cost function value is also examined. This allows the information contained in the response received to be evaluated. Recall that the peak value of the cost function ({circumflex over (ρ)}i,jk) described in the Extracting Object Features—Step 110 section provides a measure of the match between information contained in the signal and a tumor response model. That is, a high cost function value indicates that the response received has a high level of target response information. This signal information, combined with the TOA information, leads to the classification of the feature vector.
Reconstruction of Object Estimate—Step 130
At the termination of Step 120, the set of receiver feature vectors associated with an object response is identified. Next, the elements (i.e., A, γ, td, and α) of each object classified feature vector are substituted into Equation (2), where A is a time independent scaling factor, tα(n) is an object reference response, td is the time delay between the actual object response and the reference signal, and γ is a damping factor. This results in a set of reconstructed estimates of the object response, i.e., one reconstructed object response estimate for each object classified feature vector. The set of reconstructed object response estimates is input to an image focusing process. In essence, the reconstruction of the object estimate transforms the feature vectors into a format necessary for the image focusing that can be used to create an image, allowing a clutter reduction process to interface with the image focusing process.
Improved Estimate of Object Response—Step 140
Optional Step 140 may be used to refine the object response estimate. In this step 140, the object estimate and signal data are transformed to the frequency domain. Thus, step 140 provides a new parameter space from which to extract relevant features from the signals. In particular, poles corresponding to clutter are identified. Effective modeling of the clutter provides a means of identifying and segregating the clutter from the object response. This, in turn, allows the clutter estimate to be removed from the total signal data. The resulting residual data set is a refinement of the original object estimate.
The object estimate computed by the feature extraction/object classification processes for each signal are incorporated into a frequency domain object model. Hence, this instance of the object model presented represents an enhancement of the object model discussed above.
Pre-conditioning processes are first applied to the signal measurements to remove the early time scattered fields, which contain the receiver response and any reflections from surfaces that may be present at the interface between the receiver and the environment. The resulting data are then transformed to the frequency domain. Thus,
X(ω)=T(ω)+C(ω)+W(ω) (38)
where T(ω), C(ω), and W(ω) are the Fourier transforms of the object response t(t), the clutter c(t) and the noise w(t) identified in Equation (1). An iterative signal-processing technique (or object response enhancement process) may then be applied to the data.
One objective of the process is to identify and remove the clutter contributions in (38). The process models the frequency domain response of the clutter contributions in the signals as a summation of complex poles (or modes) based on a singularity expansion method (SEM) given by
where P is the number of poles needed to model the clutter, Am is strength of the mth pole, αm is the damping factor of the mth pole, and tm is the time delay of the mth pole.
The feature vector, {circumflex over (f)}i,j, that was classified as associated with an object response estimate in step 120 of
The time-domain object response estimate {circumflex over (t)}(n) is transformed to the frequency domain to form the data set {circumflex over (T)}r(ω). This signal is embedded in a parametric function used to model the frequency domain object response and given by,
T(ω)=Are−ω(γ
where Ar is a frequency independent parameter that accommodates amplitude variations between the object estimate {circumflex over (T)}r(ω) and the actual object response, γr is a damping factor that takes into account the frequency-dependent losses clue to the propagation of the signal through the environment, such as tissues, and tr is the time delay that accounts for the differences in location of the actual object response and estimate. Equation (41) can be interpreted as being a refinement, of the initial object response derived from the classification process. More importantly, the object estimate {circumflex over (T)}r(ω) provides a starting estimate of T(ω).
If {circumflex over (f)}i,j=0, then this implies that the pattern classification process did not detect an object response in the pre-conditioned signal. The object response estimate enhancement process responds by setting the object response estimate {circumflex over (T)}(ω)=0, and is then applied to the next pre-conditioned signal in the array.
Substituting the clutter model (39) and the object model (41) into Equation (38) leads to
One goal of the object response estimate enhancement process is to solve for the unknown parameters in Equation (42). Since Equation (42) is non-linear, an iterative approach is used to find a solution to this estimation problem. Specifically, the method iteratively identifies and extracts the complex poles from the signal data that are associated with the clutter. During each iteration, the extracted poles are used to construct an estimate of the clutter. The estimate of the clutter is then removed from the signal data, resulting in a residue data set. The object response model given by (41) is fitted to the residue data in order to form an updated estimate the model parameters (Ar, tr, γr), which is used by the next iteration. Thus, using this approach, all parameters in Equation (42) may be approximated.
The process that is used to achieve this goal is shown in
Q(ω)=X(ω)−{circumflex over (T)}(ω), (43)
where {circumflex over (T)}(ω) is an estimate of the object response from the previous iteration. That is, {circumflex over (T)}r(ω) and the parameter estimates, (Ar, tr, γr), from the previous iteration are used to compute {circumflex over (T)}(ω). For the first iteration {circumflex over (T)}(ω)=0, since the model parameters of (41) has not yet been computed. The resulting data are modeled as a summation of complex poles given by,
where M is the number of complex poles needed to model Q(ω), Ak is the strength of the kth pole, αk is the damping factor of the kth pole, and tk is the time delay of the kth pole.
Two challenges in computing Q(ω) are determining the unknown parameters, and finding the number of modes, M. The unknown parameters of Equation (44) are solved using a separation of parameters approach known as the total least squares (TLS) Prony method. The TLS-Prony method adapted for this application is described in more detail in the Description of the Total Least Squares—Prony Method section.
A challenge for this problem is estimating the number of modes, M, contained in the signal. When damped signals are considered, information theoretic techniques, and Bayesian MMSE estimators are typically unsuccessful in estimating this parameter. However, due to the mathematical similarity between this problem and the blind channel estimation problem encountered by communication systems, a subspace method may be successful in estimating this parameter. The subspace method adapted for this application is described in more detail in the Estimating the Number of Signal Modes in a Waveform using a Subspace Decomposition Technique section.
The TLS-Prony method applied to (44) extracts the M poles from Q(ω) forming the set of triples {(Âk, {circumflex over (α)}k, {circumflex over (t)}k)}k=0M−1. To permit the separation of the clutter poles from signal (object) poles, a temporal window is defined as,
W=t
stop
−t
start, (45)
where tstart is fixed at; 0 (i.e. tstart=0), and tstop is incrementally increased. This increases the duration of the window with each successive iteration of the process. It is assumed that the poles contained within the temporal window are associated with clutter. The application of the temporal window to this set of extracted poles forms a set of clutter poles given by {(Âm,{circumflex over (α)}m,{circumflex over (t)}m)}=m=t
(Âk,{circumflex over (α)}k,{circumflex over (t)}k)ε{(Âm,{circumflex over (α)}m,{circumflex over (t)}m)}m=t
This set of clutter poles is used to construct an estimate of the clutter,
where Âk, {circumflex over (α)}k, and {circumflex over (t)}k are the estimates of the parameters associated with the kth pole within the selected temporal window.
The first few high energy poles are typically associated with any interface response. That is, the error in the interface response estimation technique leads to incomplete removal of the interface response during the pre-conditioning step of the signal. Hence, for the first iteration, the duration of the temporal window is short, so that the first few high energy clutter poles associated with the interface response are extracted.
The residue data, R(ω), are then obtained by subtracting the current clutter estimate from the pre-conditioned signal data,
R(ω)=X(ω)−Ĉ(ω). (48)
The object model given by (41) is then fitted to the residue in a least squares sense by,
Finally, the estimates, {circumflex over (θ)}LS=[Âr {circumflex over (γ)}r {circumflex over (t)}r]T are substituted into (41) to construct an estimate of the object response {circumflex over (T)}(ω). This completes one iteration of the process.
For the next iteration, the updated object response estimate {circumflex over (T)}(ω) is substituted back into (43) to obtain a new data set Q(ω). With each successive iteration of the process, the temporal window expands to increase the number of clutter poles extracted using (46). The increase in the number of clutter poles identified leads to progressively more accurate estimates of the clutter. More accurate clutter estimates, in turn, lead to more accurate object response estimates from (49).
If the process is successful, it terminates with the majority of the clutter poles identified and separated from the other signal poles. This results in an accurate estimate of the clutter. Identification of the clutter contributions allows for the removal of the clutter estimate from the signal data. Once the clutter has been removed, the remaining data (or residual data R(ω)) are dominated by the object response. The residual data from several receiver locations are then focused by an image processing method to produce an image that implies the possible presence and location of the object in 3-dimensions.
In one embodiment, the technique described above can be adapted from a process developed for a ground-penetrating radar (GPR) application used in the detection of shallow (surface or near surface) buried ordnance. The shallow mine problem implies that the location of the buried target (or mine) is assumed to be within a very limited range near the ground-surface interface. As a consequence, the range in values that tr in (41) can assume is contained within a narrow temporal range, which is unrealistic for some applications. To complicate matters, (41) are non-convex so that (49) does not have a closed form solution. Since (49) has multiple local minima, the frequency domain object estimate {circumflex over (T)}r(ω) derived from the pattern classification procedure serves the valuable purpose of providing an initial estimate of the unknown model parameters. It is assumed that {circumflex over (T)}r(ω) is close to (i.e. in the neighborhood of) T(ω). Therefore, for the first iteration of the process, the estimates are initially assumed to be {circumflex over (θ)}LS=[Âr=1 {circumflex over (γ)}r=0 {circumflex over (t)}r=0]T. From this starting point, the basic idea is that the estimates should, in principle, converge to their true values when the process has terminated.
A second modification to the process is related to the initial duration of the temporal window used to extract the clutter poles. Since it is assumed that {circumflex over (T)}r(ω) is in the neighborhood of {circumflex over (T)}(ω), then the temporal location of the object response within the signal is approximately known. Hence, this a priori information is used to adjust the duration of the temporal window for the first iteration of the program.
The process zeros the parameters (which is equivalent to zeroing the signal) if it is unable to estimate the model parameters. The process assumes that estimated values outside the permissible range imply that the information contained in the signal does not support the existence of a object response. Therefore, the object response enhancement process serves to validate the estimates provided by the feature extraction/classification process.
Application of the Process to Radar-Based Imaging Methods
In one embodiment of the signal processing method, image data from a microwave-based imaging system can be processed to remove clutter from the image. Specifically, the microwave-based imaging system can include a tissue sensing adaptive radar (TSAR) system. X-ray mammography is presently the leading imaging method used for breast cancer screening. The limitations of this technique have generated interest in complementary imaging modalities. Several microwave imaging techniques for breast cancer detection have recently been developed, including techniques based on variations in the dielectric properties of tissues.
Previously, the dielectric property contrast between healthy and diseased tissues was thought to be as high as 5:1. However, recent studies reporting large-scale measurements of excised breast tissues show variations in the properties of normal tissues that appear to be related to the proportion of adipose content. In particular, the distribution and proportion of adipose content of healthy breast tissue can impact the performance of microwave imaging, as the composition of the breast may range from fatty (high adipose content) to extremely dense (low adipose content), resulting in a variety of imaging challenges. A method capable of dealing with the complexity of both the tissue properties and breast tissue composition may be advantageous. Radar-based microwave imaging methods such as TSAR can detect the presence of significant backscattered energy arising from tissues with high dielectric properties (e.g. fibroglandular tissue and tumors).
Radar-based methods may use an antenna to illuminate the breast with low power, ultra-wideband pulses of microwave energy. The scattered fields are received at the same antenna, or by an array of antennas. Each received signal contains both early and late-time scattered field contributions. The antenna reverberations and reflections from the skin-breast interface (the skin response) are contained in the early-time scattered fields. The late-time fields contain backscatter from possible lesions (the tumor response) and clutter. In this context, clutter is defined as signals arising from scattering mechanisms other than the tumor. Effective suppression of the clutter is required in order for the radar based methods to successfully detect and localize small tumors.
TSAR can use an approach to reducing early time artifacts. Namely, an adaptive filter combined with other statistical signal processing methods can be used to remove an estimate of the skin response from each signal as part of the pre-processing.
In one embodiment of the signal processing method, a very simple image focusing process is used. To maintain this simplicity, clutter suppression in the pre-processed signals may be required in order to detect and localize small tumors. Methods can be used to estimate the tumor response in the pre-processed signals, and the 3-D information collected at an array of antennas may be used to classify and identify responses, thereby improving discrimination between clutter and tumor responses. The process may also be incorporated with a process that models both tumor and clutter in order to further enhance clutter suppression.
To test the processes, they may be applied to data generated with FDTD simulations and experimental data from phantoms. In both cases, the TSAR, signals may be pre-conditioned by removing the antenna, reverberations and the estimated skin response using, for example, a Woody-RLS skin-subtraction process.
When collecting data, reflections are recorded as a suitable antenna is scanned around the object of interest that contains the target (e.g. the breast containing the tumor). For
example, this may be a resistively loaded dipole, a TEM horn, Vivaldi, or other ultra-wideband antenna. For initial testing of processes, a resistively loaded dipole antenna may be scanned to 50 locations (5×10 antenna array) encircling a cylindrical breast model shown in
First, for the single target case, a spherical target ranging in diameter from 3 to 6-mm was embedded in the heterogeneous breast tissue of a 6.8-cm diameter cylindrical breast model with 2-mm thick skin. The electrical properties of the target (εr=50, σ=4 S/m) were the same in all simulations. In one embodiment, breast tissue was characterized using three broad categories depending on the proportion of adipose tissue. For example, it may be assumed that the breast tissue was predominantly fat (i.e. 85-100% adipose tissue). Hence, the heterogeneity of the breast tissue was simulated using 4-mm cubes which have random variations of up to +/−10% in the electrical properties of fatty breast tissue values (εr=8.6-9.4, σ=0.36-0.44 S/m). The electrical properties of the breast model and the immersion liquid were constant over the frequency band used for the simulations.
Three different reference sets were created to test the detection of targets in the presence of variations between the targets and references. Reference set Ref1 contained four reference responses derived from four different diameter spheres (6, 5, 4, and 3-mm) with the same electrical properties as the target. Reference set Ref2 contained a single reference response derived from a sphere with a diameter of 4-mm and the same electrical properties as the target. Reference set Ref3 contained a single reference response derived from a sphere with a diameter of 4-mm and εr=55, σ=5.5 S/m.
Second, reference set Ref3 was used to locate two spherical targets located at different 3-D locations within the cylindrical breast model. The first target had a 4-mm diameter target with εr=60, σ=5.0 S/m, while the second target had a 5-mm diameter with εr=50, σ=4.0 S/m. The targets were separated by 30 mm. Breast tissue heterogeneity was simulated using the same method described for case 1.
An experimental system is described in detail in J. M. Sill and E. C Fear, “Tissue Sensing Adaptive Radar for Breast Cancer Detection and Experimental Investigation of Simple Tumor Models,” IEEE Trans. Microwave Theory Tech., vol. 53, pp. 3312-3319, Nov. 2005, which is incorporated in its entirety herein by reference. The system consists of a Plexiglas tank, immersion liquid, ground plane, antenna, and a breast phantom. The antenna, used to illuminate the breast model was a resistively loaded Wu-King monopole. The monopole antenna was secured in a fixed position on the ground plane that was mounted on top of the tank. The antenna's fixed position in the ground plane does not permit scanning of the antenna around the model. However, the breast model may rotate, permitting a simple scan of the model. This case was included to test the process with simple experimental data, rather than explore the detection capabilities in a variety of scenarios.
Windowed Estimates Algorithm—Step 110
To demonstrate the windowed estimates process, TSAR, data are obtained using a simple cylindrical model. The model is illuminated and reflections are recorded as the antenna is scanned to 10 locations in each of 5 rows. Spherical tumors with diameters ranging from 3 to 6-mm are inserted into the cylindrical breast model. A simulation is also performed without a tumor present. In one embodiment, the data are pre-processed
to remove the early time scattered fields. The sampling interval of the signal is 0.48 ps. The actual tumor responses are calculated by subtracting the tumor-free response from each response computed with a tumor present. Since the signal is down-sampled, N is 256. For this example, the number of signals, nr, in the reference set is 1.
a) shows how the process segments the pre-processed signal received at a selected antenna into multiple overlapping temporal windows, for example, described in D. J. Kurrant, E. C. Fear, and D. T. Westwick, “Tumor Estimation in Tissue Sensing Adaptive Radar (TSAR) Signals,” in IEEE Proc. CCECE, pp. 860-863, 2007, which is incorporated herein by reference in its entirety. The MAP given by Equation (10) is applied to each window. Thus, for each window, the MAP iteratively selects a reference signal and evaluates values of the model parameters that maximize the cost function using the line search method described in the Extracting Object Features—Step 110 section. The tumor-to-clutter (TCR) ratio within the window varies. In some cases the signal is predominately clutter (leading to a very low TCR), while in other cases the signal contained in the window is dominated by the tumor response. For the windows formed in this example, the TCR ranges
from −2.08 dB to −17.29 dB. Examples of estimation vectors computed for each temporal window are shown in Table 1.
It is observed that the feature vector associated with the fourth window contains the highest peak cost function value, indicating that the tumor estimate closely matches the signal contained in the fourth window. This, in turn, implies that the estimated tumor response can be constructed using the tumor response model given by (2) with the function parameter estimates from the fourth feature vector. This tumor estimate may be superimposed onto the actual tumor response in
Next, the impact of the reference set on the results are investigated. Signals collected from breast models containing tumors of different sizes are processed with the windowed estimates method and the reference sets described above. The performance of the feature extraction process and the classification process for the simulated data may be evaluated by inspecting the peak value of the cost function (ρmax), the cross-correlation between the actual target response and the target estimate (rti), and the distance error between the actual target response and the location of the estimated target. The peak cost function is a measure of how closely the estimate matches the signal contained in the sliding temporal window. The results for simulated data are summarized in Table 2. The average peak cost function value and the average cross-correlation coefficient were approximately the same for all tumor sizes examined. The accuracy of the target estimates in terms of the cross-correlation coefficient and the distance error was not significantly different for the three reference sets used. Table 2 also demonstrates that the distance error for each of the targets was small and was not influenced significantly by the reference set used. Therefore, the process is robust to variations between the target and reference. The 4-mm target in the multiple target case had ρmax=0.87, rti=0.84, and distance error=−0.25 mm, while the 5-mm target had ρmax=0.86, rti=0.89, and distance error=0.04 mm. The results are comparable with the single target case, indicating that the process is capable of detecting multiple scattering objects.
The number of responses out of a total of 50 signals detected is indicated in Table 3. As expected, regardless of the reference set used, the number of signals detected was lowest when detecting the 3-mm target and progressively improved as the size of the tumor increased. Typically, received signals from the 3-mm tumor had the lowest tumor-to-clutter ratio, leading to a fewer number of tumor responses detected. The focusing process used the tumor response estimates from several antennas. Hence, a goal was not to detect the presence of the tumor response with a single antenna. Instead, since the focusing process constructs an image from data at several antennas, it was more important that accurate estimation of the tumor response be provided for those signals where the tumor was detected. The number of tumor responses detected was lower when using Ref3 compared to Ref1. For some of the signals, the use of Ref3 lead to a peak cost function value, ρmax, below the threshold used by the decision rules. This, in turn, resulted in a decreased number of tumor responses detected.
For the multiple targets, the target responses were detected by 76% of the antennas (48% of the 5-mm target response are detected and 28% of the 4-mm target responses are
detected) which was lower than the proportion of responses detected for the single target case. This was primarily due to the interaction between the two tumor responses that occurred in many of the signals received.
To further investigate the impact of the process, images were formulated by synthetically focusing the resulting tumor response estimates. The resulting reconstructed image was not perfectly round since the process did not interpolate the information between the antennas. The images were evaluated quantitatively with the signal-to-clutter ratio given by,
SCRI=10 log10(PT/PC), (50)
where PT and PC denote the magnitude of the maximum pixel intensities corresponding to the tumor and clutter, respectively. The maximum clutter pixel intensity corresponds to the maximum pixel value outside of the area containing the imaged tumor. Pixel intensity corresponds to energy. The tumor location error is a second measure used to evaluate the performance of the process. It is the difference between the three-dimensional location where the backscattered energy has the greatest intensity and the center of the target.
First, single target simulated data results are shown. Images of a plane orthogonal to the cylinder axis are shown for a 3-mm tumor.
is cut through the cylinder perpendicular to the axis. The 10 cross marks located away from the surface of the breast model represent antenna locations. The scale shows the energy level of the response. The diameter of the breast model is 6.8 cm, the center of the model is (70,70,42)-mm, and the tumor is located at (70,65,42)-mm. The image is normalized to the peak value in the data set (Max=0.0864).
For all three reference sets used, the localization error was 0-mm for the 4 to 6-mm targets, and 1-mm for the 3-mm target. Without the use of the tumor estimation technique, the tumor localization error was 1-mm for the 6-mm target and O-mm for the 4 to 5-mm targets. It is observed that the four member reference set provides superior performance in terms of the degree of clutter reduction over the two single member reference sets. However, all three reference sets provide the same degree of precision in terms of localization. Table 4 indicates that the SCRI is lower for reference set Ref3. It is suggested that the less damped late-time response of the reference signal used by Ref3 leads to the introduction of an artefact in the image. Table 4 suggests that the artefact is more pronounced for the 6-mm target.
For multiple targets, detection and localization of the target is demonstrated in
This example presents an iterative signal-processing method used for GPR applications that has been adapted for clutter suppression in TSAR signals. The process iteratively identifies the clutter contributions in a TSAR signal. Successful identification of clutter allows for the segregation and removal of clutter from the TSAR data. The resulting residue data are dominated by the tumor response where it is transformed back to the time domain. The TSAR, focusing process uses the residue data from several antennas.
The performance of the tumor response enhancement process has been evaluated and results obtained with and without this process compared. The significant increase in both measures of TCR, (both peak-to-peak TCRpρ and energy TCRE) of the TSAR signals alter the application of the tumor response enhancement process indicates the high degree of clutter reduction achieved.
An example is provided to demonstrate the process of optional step 140.
For even later iterations, the temporal window expands further to include additional clutter poles, as shown in
If the process is successful, then all clutter poles will be identified and separated from the other signal poles at the termination of the program.
The performance of the clutter reduction processes is investigated by applying the processes to data generated with FDTD simulations of a cylindrical model containing spherical tumors with diameters ranging from 3 to 6-mm, as described in the Methodology and Cylindrical Models used for acquiring numerical data section. A pre-processing step removes the antenna reverberations and the Woody-RLS skin-subtraction methods is used to remove the skin response. The clutter reduction processes including the feature extraction process, the classification process, the tumor response reconstruction process, and the tumor response enhancement process are sequentially applied to the pre-processed TSAR signals.
The performance of the clutter reduction process is evaluated using a single-signal analysis and the following performance measures.
The performance measures for tumors from 3 to 6-mm diameter are shown in Table 6. High average cross-correlation coefficient values are maintained regardless of the tumor size. This implies that the information contained in the output signal closely matches the information contained in the tumor response. That is, the process is able to detect and recover the tumor response information contained in the TSAR signals.
Secondly, the low average distance error is maintained over the range of tumor sizes tested. Collectively the results imply that the process is able to detect and recover the tumor responses in the TSAR signals with minimal distortion of the signals or loss of information, even as the tumor becomes progressively smaller. Lastly, a slight decrease in the number of signals recovered compared to the feature extraction/classification process is observed. Recall that the tumor response enhancement process is applied to the tumor response estimates evaluated by the feature extraction/classification process.
The ability of the process to suppress clutter is demonstrated by the results in Table 6(b). Gains are observed for both the peak-to-peak tumor-to-clutter ratio and the energy tumor-to-clutter ratio for all tumor sizes. Larger gains are observed for the smaller tumor sizes. The clutter present in the signal after the application of the clutter reduction processes is primarily due to: (1) the distance error between the actual tumor response and the tumor response estimate, and (2) the inaccuracy in the scaling factor of the tumor response model.
The process is applied to data generated from the four breast models described in the Methodology and Realistic Models used for acquiring numerical data section. The results are based on D. J. Kurrant and E. C. Fear, “An Improved Technique to Predict the Time-of-Arrival of a Tumor Response in Radar-based Breast Imaging,” IEEE Trans. Biomed. Eng. (to appear), vol. 56, April 2009, which is incorporated herein by reference in its entirety. Two versions of the process are applied to the data: (1) a version that only uses the breast surface data from a single point (discrete surface version), and (2) a version that uses the 3D breast surface estimation data and the refined tumor position estimate process (3D breast surface version). The process is applied to error-free data generated from the simple breast model in the Baseline Performance of the Process section to establish the process's baseline performance. The impact that the skin surface estimation and the presence of glandular tissues have on the performance of the process are explored using the simple glandular breast model and the bimodal breast model in the Effect of Clutter on the Predicted TOA section. Finally, the process is tested on data from the most realistic model in the Realistic Breast Model section.
Baseline Performance of the Process
The process is applied to reflections generated with the simple breast model to isolate the effect, that errors have on the predicted TOA of a tumor response. Moreover, the tissue homogeneity ensures that the tumor responses are not corrupted by clutter originating from glandular tissues. The process uses the known permittivity and also assumes perfect knowledge of the skin location at each antenna, by using the numerical model to determine the actual skin location.
Next, with the 3×3 array of antennas classified as described above, the antennas adjacent to the array are considered (Step 3). This scenario is shown in
of a tumor response for a simple breast model.
Effect of Clutter on the Predicted TOA
In a realistic setting, the breast has variability in the tissue properties and distribution. To evaluate the performance of the process in this scenario, the process is first applied to data generated with the simple glandular model. Since the breast tissue permittivity is not known a-priori, an average background value of εb=9 is assumed. The difference between the assumed average breast tissue permittivity and the actual average permittivity is −0.98 (i.e. E{εb}=−0.98) which may lead to biased data. The permittivity data may also be perturbed due to the presence of glandular tissue.
The skin location data are estimated using the TSAR deconvolution and breast surface estimation processes. The skin location data may therefore be biased and have random perturbations. The error in the antenna-to-breast surface distance, δΔo, is computed as
δΔo=Δoact−Δoest (57)
where Δoact is the actual antenna-to-breast surface distance computed using the numerical
model, and Δoest is the antenna-to-breast surface distance estimated using deconvolution data or 3D breast surface estimation data. The Δo errors computed for the antennas in Steps 2 and 3 are summarized in Tables 9 (a) and (b), respectively. The average error for Δo suggests that the 3D breast surface version of the process computes the antenna-to-breast surface distance more accurately compared to the discrete surface version. The result is expected since the 3D breast surface version considers the angle of incidence of the propagation path, whereas the discrete surface data version only determines the shortest distance from the antenna to the breast surface (regardless of the propagation path).
Finally, clutter-contaminated tumor responses and errors in skin location lead to
small variations of the estimated TOA data. The error in the TOA is computed as
δTOA=TOAact−TOAest (58)
where TOAact is the TOA of the actual tumor response acquired using a method, and TOAest is the TOA of the estimated tumor response. The errors in the TOA for the two scenarios (Steps 2 and 3) are summarized in Table 9 (a) and (b), demonstrating similar errors for both cases.
The predicted TOAs of the bordering antennas for the two scenarios (antennas in steps 2 and 3) are processed as described in the Baseline Performance of the Process section. The order in which the antennas are processed is shown in Tables 7 and 8. The TOA errors that occur when using the discrete surface version and the 3D breast surface version of the process for each antenna are shown in the third and forth column of each Table, respectively.
Both versions of the process provide comparable performance for the small array used in Step 2. The presence of clutter in the signals leads to an increase in the TOA error for both versions of the process when compared to the simple case. As indicated above, the 3D breast surface version of the process provides superior performance over the discrete surface version for computing Δo. Hence, the results suggest that the perturbation
of the TOA data of the antenna array has a more significant influence on the performance of the process for small arrays.
Conversely, for the larger array in Step 3, improvement in the estimation of the Δo and the Δb components of the propagation path lengths leads to an overall reduction in the TOA errors. Consequently, the performance of the 3D breast surface version provides superior performance over the discrete surface version, for the larger array. As expected, compared to the 5-element array, increased information provided by the larger array leads to a significant reduction in the TOA errors for both versions of the process.
The least squares estimation method may fail when outliers are present in the data. This scenario may occur if there is an antenna that has detected a response with a TOA that is significantly different from the other antennas in the array. However, this situation is prevented from occurring when the process is applied to the data; a comparison of estimated and predicted arrival times ensures that only those antennas which have detected an object in the same area of the breast are selected to construct (30). For example, Tables 7 and 8 suggest that the predicted TOA does not deviate significantly from the TOA of the actual response (as calculated using the description provided in the Methodology and Realistic Models used for acquiring numerical data section for antennas a4 and a8 in Step 3. However, the clutter contributions dominate these two signals. A comparison between the predicted TOA and the feature information extracted at these two antennas does not support the inference of a tumor response. The predicted TOA of the tumor response for a4 using (37) may be 1392.5 ps and the TOA of the response extracted by the feature extraction process may be 1427.52 ps so that the difference between the two values is 138.72 ps. The classification process may reject the response received by the antenna since this large deviation implies that the source of the response is about 7 mm from the predicted location (i.e. the response originates from a scattering mechanism associated with clutter). Likewise, the response received by as is also rejected since it originates more than 8 mm (or 165.6 ps) from the predicted source of the response. This may provide a powerful mechanism for discriminating between clutter and a tumor response.
Next, the 3D breast surface version of the may be applied to data generated with the bimodal breast model. In this case, the difference between the assumed average breast tissue permittivity and the actual average permittivity is −1.25 (i.e. E{εb}=−1.25). The skin location error (δΔo) and TOA input data error (δTOA) for Steps 2 and 3 are shown in the first two columns of Table 11 and are computed using (57) and (58), respectively. The predicted TOA of the bordering antennas may be processed. The TOA errors that occur when using the 3D breast surface version of the process for each antenna in Steps 2 and 3 are summarized in the third column of Table 10 (a) and (b), respectively. The average error after Step 3 translates to less than 1 mm in tissue with relative permittivity of 9. The results demonstrate that the process is robust as the model becomes increasingly more complex, even with only 5 elements.
Realistic Breast Model
Finally, the performance of the may be evaluated using data generated with the realistic breast model that includes dispersive tissues with properties based on measurement studies and a realistic tumor. As with the simple breast model and the bimodal breast model, an average relative permittivity is assumed for the breast tissue. The difference between the assumed (εb=9.0) and actual (εb=23.88) average relative permittivity is −14.88 at 3.6
Only the 3D breast surface version of the process is applied. Starting with a five-element array to estimate the tumor position, the process may predict the target response TOA for the adjacent antennas as described in the Baseline Performance of the Process section and the Effect of Clutter on the Predicted TOA section. The initial iteration uses skin location data acquired by a peak-detection process. After the initialization, the process uses a 3D surface map constructed from the MR scans. The results are summarized in Table 11 and are comparable to the other cases examined. This demonstrates that the process is robust to a significant variation in the breast tissue properties and a complex tumor shape. It is also noted that fewer antennas are used during the breast scan when compared to the previously examined breast models, leading to a coarser scan pattern. The tumor response is also evident at fewer antennas due to the presence of high permittivity glandular tissues. These factors collectively lead to a decrease in the information available to localize the scatter source when compared to previous cases. This motivates the need for a process capable of accurately predicting the time-of-arrival of tumor responses in a complex scenario. The results presented in Table 11 demonstrate the robustness of the TOA process.
Description of the Total Least Squares—Prony Method
Consider the case where a pre-conditioned frequency domain TSAR signal is parameterized using a summation of complex damped sinusoids given by,
where {xn}n=0N−1 are the signal samples, M is the number of complex sinusoids needed to model x(n), ak is the amplitude of the kth sinusoid, αk is the damping factor of the kth sinusoid, tk is the time delay of the kth sinusoid.
The complex damped exponential term for each k, k=1, . . . , K is denoted by the complex pole zk,
z
k
=e
−(α
+jt
). (60)
Substituting (60) into (59) leads to,
In this context, {zk}=k=1M are referred to as the signal modes, and {ak}k=0M are the associated modal strengths, and together form M pairs (ak, zk).
Equation (61) can be re-written in a more compact matrix form as,
The columns of H are the signal modes, and vector Θ contains the associated modal strengths. We observe that H is a Cauchy-Vandermonde matrix, and we assume that the columns are linearly independent (i.e. H has full rank). This assumption implies that there are no repeated modes (i.e. the modes are distinct). Estimating the modes and associated modal strengths in Equation (62) is a non-linear estimation problem since the signal model is non-linear in the signal modes. This section describes the separability of parameters estimation technique used to estimate the non-linear and linear parameters of (62). The method takes a two step approach: (1) The non-linear parameters (i.e. the signal modes of H) are estimated using the TLS-Prony method (2) The estimates of the modes Ĥ are substituted into (62) in order to estimate the linear parameters (i.e. the modal strengths ak) via ordinary least squares (OLS) solution.
First, the TLS-Prony method is described. In the Linear Difference Equation Background Section, a review of linear difference equation theory is provided. This is helpful, since the signal model given by Equation (59) is a solution to a homogeneous linear difference equation. The linear difference equation theory may be used to formulate a strategy for estimating the non-linear parameters of Equation (59). The Singular Value Decomposition (SVD) may be used in association with the TLS-Prony method. The mathematical concept is reviewed in the Singular Value Decomposition and the Frobenius Norm Section along with certain applications (namely, the Eckart-Young-Mirsky matrix Approximation Theorem). The TLS-Prony problem is formally introduced and summarized in the Total Least Square Problem Section. Finally, the OLS technique used to estimate the signal model's linear parameters is described in the Solve for Signal Model's Linear Parameters Section.
Linear Difference Equation Background
In one embodiment, estimates of the non-linear parameters for the signal model given by Equation (59) may be solved. For example, provided the signal modes are distinct, then (61) is the solution to an Mth-order set of homogeneous linear difference equations given by
The relationship between the homogeneous linear difference equation given by (64) and its solution given by (61) is provided by the following three Theorems.
Theorem 1 The homogeneous linear difference equation given by (64) has solutions of the form
xn=zn (65)
where zε, z≠0, and satisfies
Equation (66) is a polynomial that has M solutions in the complex field, and is called the characteristic polynomial. Furthermore, it is said to be the characteristic equation of the homogeneous linear difference equation given by (64).
Theorem 2 If the roots z1, z2, . . . , zM of the characteristic polynomial C(z) given by (66) are distinct, then z1n, z2n, . . . , zMn are linearly independent solutions of the homogeneous linear difference equation (64).
Theorem 3 The space S of solutions of (64) is a vector space of dimension M.
From Theorem 3, it follows that if the roots of the characteristic polynomial C(z) are distinct, then any solution of the homogeneous linear difference equation (64) can be expressed in the form,
We can use (67) to form the homogeneous system of N−M linear difference equations as follows,
In linear prediction theory, (69) is interpreted as a system of linear prediction (LP) equations, which can be written as an overdetermined set of linear equations,
where A is the LP data matrix using the data in the forward direction, c is the LP vector, and b is the observation vector.
Hence, Theorems 1-3 may be used to formulate a strategy for estimating the non-linear parameters given in Equation (61). This strategy may be summarized as follows,
Singular Value Decomposition and the Frobenius Norm
The Singular Value Decomposition (SVD) is an important and practical theoretical tool that is used by the TLS method. It is also used by the Subspace Decomposition technique described in the Estimating the Number of Signal Modes in a Waveform using a Subspace Decomposition Technique section for finding the number of modes contained in a TSAR signal.
Theorem 4 If Bε then there exist orthonormal matrices U=[u1, . . . , um]ε and V=[v1, . . . , vn]ε such that
U
H
BV=Σ=diag(σ1, . . . , σp), σ1≧ . . . ≧σp≧0 (72)
The σi are the singular values of B and their set is called the singular value spectrum. The vectors vi and ui are the ith left singular vector and the ith right singular vector, respectively.
The SVD may reveal a great deal about the structure of a matrix. If the SVD of B is given by Theorem 4, then it may be convenient, to separate the matrices in the SVD into two parts, corresponding to the zero singular values and the non-zero singular values. Define r by,
σ1≧ . . . ≧σr≧σr+1= . . . =σp=0 (73)
then,
rank(B)=r (Rank of B). (74)
N(B)=span(vr+1, . . . , vn) (Null space of B). (75)
Furthermore, the SVD expansion may be given by
Equation (76), also called the dyadic decomposition, decomposes the matrix B of rank r in a sum of r matrices of rank one.
The SVD may also be used to characterize the Frobenius norm and the l2 norm,
Filially, the SVD may be used be used to approximate one matrix with another with lower rank. This is provided by Theorem 5.
Theorem 5 (Eckart-Young-Mirsky Matrix Approximation Theorem) Let the SVD of Bε be given by B=Σi==1rσiuiviH, where r=rank(B). If k<r and Bk=Σi=1kσiuiviH, then
∥B−Bk∥2=σk+1, (79)
and Bk is the nearest matrix of rank k to B (in the l2-norm):
and, Bk is the nearest matrix of rank, k to B (in the Frobenius-norm):
Theorem 5 demonstrates how the SVD of a matrix can be used to determine how near (in either the l2-norm or the Frobenius-norm) the matrix is to a matrix of lower rank. Furthermore, the SVD can also be used to find the nearest matrix of a given lower rank. That is, a matrix having singular values σk+1, . . . , σr that are much smaller than the singular values σ1, . . . , ok is by Theorem 5, close to a matrix having only k non-zero singular values. Even though the rank of the matrix might be greater than k, since the matrix is close to a matrix of rank k, its effective rank is only k.
Total Least Square Problem
Recall that the signal model given by Equation (61) is the solution for a system of LP equations given by Equation (69). The system of LP equations may be used to form an LP data matrix given by Equation (71). For example, the SVD may be used to find a lower rank approximation of the LP data matrix A in Equation (71) in order to mitigate the effect of noise in A. Moreover, they may suggest using a prediction order which is much higher than the number of modes M present in the signal. In another embodiment increasing the filter length to L such that M≦L≦N−M may decrease the sensitivity of the estimated parameters to noise and reduce the numerical ill conditioning. In particular, the extraneous zeros introduced may protect the signal zeros against the noise-perturbation effect. Consequently, the system of LP equations may be modified to incorporate the higher prediction order:
The system of equations can be written as an overdetermined set of N−L LP equations,
where A is the LP data matrix using the data in the forward direction, c is the LP vector, b is the observation vector, and L is the prediction order satisfying M≦L≦N−M.
Both the LP data matrix A and the observation vector b may be assumed to be in error. That is, the idea behind the TLS method is to consider perturbations of both b and A so that,
(A+ΔA)c=b+Δb (86)
which can be re-arranged to form the homogeneous equation,
The TLS solution to the homogeneous equation given by (88) can be formulated as seeking a solution vector c such that,
(b+Δb)εrange(A+ΔA), (90)
and the norm of the perturbations may be minimized.
In order for the homogeneous equation given by Equation (88) to have a solution, the augmented vector [cT, −1]T may lie in the null space of (B+ΔB). In order for the solution to be trivial, the perturbation ΔB may be such that B+ΔB is rank deficient. The SVD and Theorem 5 are used to find the TLS solution.
The SVD of the augmented LP data matrix B results in Equations (72) and (76). If the measurements are noiseless and the data fits the model, then the model is given by (67). Therefore, B has a rank M and only the first M singular values in (72) are non-zero, and the remaining singular values are zero. That is,
σM+1=σM+2= . . . =σL+1=0. (91)
In practice, this is not the case since the LP data matrix B is contaminated by noise. This means that B is full ranked. Theorem 5 tells us that although B is full ranked, it will be ‘close’ to a matrix B′ of lower rank M. Hence, we have
σM+1≈σM+2≈ . . . ≈σL+1≈0. (92)
However, the correct number of signal modes, M, may not be known a priori, and may be estimated. The subspace decomposition technique that is used to achieve this estimation is described in the Estimating the Number of Signal Modes in a Waveform using a Subspace Decomposition Technique section.
Define the column partition of the unitary matrix V derived from the SVD of B as,
{tilde over (V)}=[v
M+1
,v
M+2
, . . . , v
L+1], (93)
and construct, the subspace Sc from the column vectors of {tilde over (V)}.
S
c=range({tilde over (V)})=span(vM+1,vM+2, . . . , vL+1), (94)
which is, by Equation (75), the null space of B. This means that the solution αεSc. The solution is not unique, so we can derive any vector from the null space Sc. However, it is possible to single out a unique solution in the sense of a minimum norm. In one embodiment, the solution to the minimum norm TLS problem may be solved using {tilde over (V)} and computing an orthonormal Householder matrix Q such that,
If γ≠0, then the TLS solution is,
The TLS approximation and corresponding TLS correction matrix are given by,
By the properties of the Householder matrix, the vector [yT, γ]T is the vector in the ranged ({tilde over (V)}) such that the last column of {tilde over (V)}Q is maximized, subject to the constraint that the last column of Q is normalized to a unit vector (i.e. ∥qL-M∥2=1). Thus ĉ=−y/α is the minimum-norm TLS solution.
The TLS computations used to solve TLS problem in which a non-unique solution does not exist (due to the presence of the singularities that are approximately repetitive) may be summarized as follows. In the case of non-uniqueness, the minimum norm TLS solution is computed.
Given an N−L×L+1 data matrix B and an L+1×1 observation vector b.
σ12≧σ22 . . . ≧σM−12>r(M)≧σM+12≧σL+12, (98)
Solve for Signal Model's Linear Parameters
The TLS solution c represents the coefficients of the prediction-error filter polynomial (i.e. characteristic equation) given by Equation (83). The L distinct zeros, {{circumflex over (z)}i} are obtained by polynomial root finding techniques. By Theorem 2, the linearly independent solutions of (64) are z1n, z2n, . . . , zLn. Hence, invoking Theorem 3 allows us to construct the Cauchy-Vandermonde matrix where the columns of the matrix are the signal modes.
Knowing the estimates of the signal modes, Equation (62) may be used to find the modal strengths. In particular, the modal strengths are found as the least squares solution given by,
{circumflex over (Θ)}=(ĤHĤ)−1ĤHx. (100)
Of the L modes used to form H, there are M signal modes, and L−M extraneous modes associated with noise. An energy criterion is used to ensure that only the M modes with the highest energies are kept.
Estimating the Number of Signal Modes in a Waveform Using a Subspace Decomposition Technique
Consider the case where a pre-conditioned frequency domain TSAR signal is parameterized using a summation of complex damped sinusoids given by,
where {xn}n=0N−1 are the signal samples, M is the number of complex sinusoids needed to model x(n), ak is the amplitude of the kth sinusoid, αk is the damping factor of the kth sinusoid, tk is the time delay of the kth sinusoid.
The complex damped exponential term for each k, k=1, . . . , K is denoted by the complex pole zk,
z
k
=e
−(α
+jt
). (102)
Substituting (102) into (101) leads to,
In this context, {zk}k=1M are referred to as the signal modes, and {ak}k=0M may be the associated modal strengths, and together form M pairs (ak, zk).
The number of signal modes, M, may be unknown and require estimation. The Description of the Total Least Squares—Prony Method section describes how a linear predictor (LP) equation of order L, where M≦L<N−M, is used to construct an overdetermined set of L−M linear equations, and is written compactly in matrix form as,
Ac≈b, (104)
where A is the LP data matrix using the data in the forward direction, c is the LP vector, and b is the observation vector.
The TLS-Prony method described in the Description of the Total Least Squares—Prony Method section that is used to estimate values for the linear prediction coefficients, constructs an augmented LP data matrix using (104),
B=[A;b], (105)
where Bε A Singular Value Decomposition (SVD) of B leads to,
B=UΣVH. (106)
The SVD of B is related to an estimate of the correlation matrix of B as follows,
where we have ignored the scaling factor 1/(N−L). Here A is a diagonal matrix made up of the L+1 eigenvalues of the estimated correlation matrix, which means that the k-th singular value of B, σk, is the square root of the k-th eigenvalue, λk, of {circumflex over (R)} (or equivalently λk=σk2). Furthermore, the columns of V are the eigenvectors of {circumflex over (R)}.
Equation (110) can be interpreted as the eigendecomposition of {circumflex over (R)}. Ideally {circumflex over (R)}=R, so that the M largest eigenvalues are associated with the M signal modes, and the remaining eigenvalues have equal value and are associated with the noise. That is,
σ1≧σ2≧ . . . ≧σM>σM+1= . . . =σL+1=0 (111)
Hence, this interpretation allows partitioning of the correlation matrix into two separate subspaces: (1) a signal subspace, S, spanned by the M signal eigenvectors, and (2) a noise subspace, W, spanned by the L+1−M noise eigenvectors. Unfortunately, due to the finite number of samples used to compute {circumflex over (R)}, {circumflex over (R)}≠R, which means that the noise eigenvalues are no longer all equal to 0. This leads to difficulties when distinguishing between the signal and noise subspaces.
The aim of the subspace decomposition technique is to approximate the dimension of the subspace spanned by the columns of an estimate of the signal eigenvectors, denoted by Ŝ. An accurate estimate of the dimension implies the approximate number of signal modes contained in the waveform, x(n). The goal is achieved by ensuring that the estimated subspace Ŝ is ‘close’ to the actual signal subspace S. A measure of how close the two subspaces are from one another is implied by examining how sensitive the estimated signal subspace Ŝ is to a small perturbation. In particular, the smallest size the perturbation may have is defined by the lower bound
∥ΔS∥2≧σM, (112)
where ΔS is a perturbation matrix such that,
Ŝ=S+ΔS. (113)
This measure leads to the following observations:
which is interpreted as being an upper bound on the distance between two subspaces, and is used to estimate the rank M of the actual signal subspace S. The rank determinator is applied to all L+1 eigenvalues of {circumflex over (R)}. The order estimate {circumflex over (M)} which minimizes r(M) is,
The rank determinator value r(M)<< 1 implies that there is a gap between σM−1 and σM. This, in turn, implies that Ŝ is insensitive to a perturbation of size σM2. This means that Ŝ is close to S, and the decomposition into signal and noise spaces Ŝ and Ŵ are stable and well-conditioned. Conversely, a rank determinator value of r(M)≈1 implies that a well defined separation between the signal and noise does not exist, leading to a decomposition into signal and noise subspaces that is unstable and ill-conditioned. In other words, Ŝ and S are unlikely to be close to each other.
Methodology and Cylindrical Models Used for Acquiring Numerical Data
The backscatter simulation data for this study are computed using the finite-difference time-domain (FDTD) method and a simple cylindrical breast model. A simple breast model is used for generating the simulated data, for this study in order to evaluate the feasibility clutter of the reduction approach proposed. The model is a 6.8-cm-diameter cylinder surrounded by a 2-mm uniformly thick layer of skin, as shown in
The relative permittivity contrast between malignant and normal breast tissue is approximately 5:1, and the conductively contrast between the malignant and normal breast tissue is approximately 10:1. To simulate clutter, 4-mm cubes with random variations in the electrical properties of up to +/−10% are used. The 10% variation in permittivity and conductivity of the breast tissue is used in order to model the expected range in presence of both fat and fibroglandular tissue. The electrical properties of the breast model and the immersion liquid are constant over the frequency band used for the simulations. That is, material dispersion is not incorporated into the model. Tumors with varying sizes are placed in the heterogeneous breast tissue.
A single Wu-King dipole antenna is modeled. It is positioned 2 cm from the surface
of the model, and is parallel to the cylindrical axis. The Wu-King resistive loading profile is designed to operate in oil at 4 GHz to provide the necessary ultra-wide band performance, fidelity, and low end reflections. Unfortunately, the performance is achieved at the cost of poor efficiency and directivity. The breast model and the antenna are both placed in an immersion liquid in order to reduce the electrical property contrast between the interior and exterior of the breast.
With the breast model present, FDTD is used to simulate the operation of the antenna. The simulations collectively represent an antenna scanned around the model. Graded mesh are used to increase the resolution close to the antenna (0.25 mm) and in regions of the breast model near the antenna. Dielectric averaging is used at the boundaries of all interfaces (i.e. boundary between two materials with different electrical properties).
The antenna is moved in a circular path around the breast to 10 different positions, forming a row. As shown in
A Woody-RLS skin subtraction process is used to estimate the skin response. This is then subtracted from the signal, so that the resulting signal is referred to as the skin subtracted signal. The clutter reduction process studied for this project is applied to the pre-conditioned TSAR signal which has the antenna reverberations and estimate of the skin response removed. A typical skin subtracted signal is shown in
Methodology and Realistic Models Used for Acquiring Numerical Data
To test the process, data are generated with 3D realistic breast models. The interior of the first model may be identified and filled with non-dispersive homogeneous fatty tissue having εr=9, σ=0.4 S/m. A 2-mm layer of skin with εr=36, σ=4 S/m is placed around the model. A 6-mm diameter spherical tumor with εr=50, σ=4 S/m, is added. We call this the simple, breast, model.
The interior of the second model is the same as the first except that glandular tissue may be included by using a simple threshold technique that assigns εr=16, σ=1 S/m to those pixel intensities of the MR image that exceed a pre-selected threshold. We call this the simple glandular model.
The third model is constructed by setting the fatty tissue at a constant value of εr=9, σ=0.4 S/m. The glandular tissue is selected by setting a threshold range and properties may be mapped using a linear function to the histogram of the MR pixel intensities. The electromagnetic properties of the tissue range from εrε[15.2, 27.5] and a σε[1.7, 3.0] S/m. A 2-mm thick skin layer and a 6-mm spherical tumor are then added to form what we call the bimodal breast model.
The fourth model includes dispersive tissues with properties based on recent measurement studies and a realistic tumor. The model may be generated from MR scans of a patient diagnosed with cancer. The breast model may be created with a segmentation and image processing tool (e.g. ISeg, SPEAG, Zurich, Switzerland), and is based on images collected prior to injection of a contrast agent used routinely in MR, breast imaging. First, a consistent skin layer is added to the breast model. Next, the breast interior is segmented into 19 tissues using a k-means filter. The pixel intensities are then mapped to electrical properties by first assigning ranges of pixel intensities to each of three sample tissue groups defined. These groups summarize properties of 0-30% adipose, 31-84% adipose, and 85-100% adipose tissues. Within each group, pixel intensities may be linearly mapped to the 25-75% range of values. The tumor may be extracted from images acquired after a contrast agent is administered to the patient, and inserted into the numerical breast model at the appropriate location. Although the tumor may be several centimetres in dimension, it may not be detected clinically with mammography. Coronal and sagittal cross sections of the breast model are shown in
To illuminate the breast models with an ultra-wideband pulse, simulations may be performed with the finite difference time domain method. One antenna may be present in each simulation and excited with a differentiated Gaussian waveform having a center frequency of 4.0 GHz and a full width half maximum bandwidth of 1.3-7.6 GHz. The antenna may be scanned to a set of locations around the breast, and simulations are performed at each location. Therefore, the coordinates of all antennas in the synthetic array are known. Breast models 1-3 may be illuminated with a resistively loaded Wu-King dipole. A synthetic antenna array may be constructed by recording reflections as the antenna is moved to 245 different positions around the breast. This represents a complete scan of the breast; typically 32 antenna positions are simulated for each row encircling the breast and rows are separated by 1 cm. A balanced antipodal Vivaldi antenna (BAVA) may be used to illuminate breast model 4. A synthetic antenna array may be constructed by recording reflections as the BAVA antenna may be moved to 128 different positions around the breast. The antenna may be scanned to 16 antenna locations per row with rows separated by 1 cm, corresponding to a partial scan of the breast.
For each antenna location, a simulation may also be performed without a tumor present. The actual tumor responses may be calculated by subtracting the tumor-free reflection from each reflection computed with the tumor present. The actual tumor response may be used to evaluate the performance of the process by allowing us to compute the deviation between the actual tumor response TOA (TOAactual) and the predicted TOA for the ith antenna (TOAi) given by
TOAE=TOAactual−TOAi. (116)
The signal received by each antenna may be processed using the TSAR processes. First, the location and thickness of the skin (relative to the antenna) may be estimated. For breast models 1-3, the signals may be pre-conditioned to remove the antenna reverberations and an estimate of the skin response. The set of signals may then be processed with the feature extraction process to estimate candidate tumor responses. For breast model 4, tumor responses may be extracted as described above.
The computer system 1900 also may include Random Access Memory (RAM) 1908, which may be SRAM, DRAM, SDRAM, or the like. The computer system 1900 may utilize RAM 1908 to store the various data structures used by a software application configured to identify an object within a complex environment. The computer system 1900 may also include Read Only Memory (ROM) 1906 which may be PROM, EPROM, EEPROM, or the like. The ROM may store configuration information for booting the computer system 1900. The RAM 1908 and the ROM 1906 hold user and system data.
The computer system 1900 may also include an input/output (I/O) adapter 1910, a communications adapter 1914, a user interface adapter 1916, and a display adapter 1922. The I/O adapter 1910 and/or user the interface adapter 1916 may, in certain embodiments, enable a user to interact with the computer system 1900 in order to input application settings. In a further embodiment, the display adapter 1922 may display a graphical user interface associated with a software application or display an image of the object.
The I/O adapter 1910 may connect to one or more storage devices 1912, such as one or more of a hard drive, a Compact Disk (CD) drive, a floppy disk drive, a tape drive, to the computer system 1900. In a further embodiment, the I/O adapter 1910 may connect to one or more antennas 1926. Further embodiments of an antenna 1926 are described above with relation to
The present embodiments are not limited to the architecture of system 1900. Rather the computer system 1900 is provided as an example of one type of computing device that may be adapted to perform the functions of computing systems. For example, any suitable processor-based device may be utilized including without limitation, including personal data assistants (PDAs), computer game consoles, and multi-processor servers. Moreover, the present embodiments may be implemented on application specific integrated circuits (ASIC) or very large scale integrated (VLSI) circuits. In fact, persons of ordinary skill in the art may utilize any number of suitable structures capable of executing logical operations according to the described embodiments.
A number of embodiments have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the concepts presented herein. For example, the processes and variations thereof can be used in any imaging or object-locating method where signals are reflected from an object in imaging or locating an object. Non-limiting examples of such methods include ground penetrating radar and seismic processing. The processes presented herein and variations thereof are applicable in fields such as medical imaging and acoustics, as examples. In other aspects, the concepts provided herein may be beneficial in locating buried land-mines (e.g. detecting the location and characteristics of hidden ordinance), finding underground electrical and natural gas utilities, identifying the location of mineral deposits, detecting explosives in luggage (i.e. security), and identifying buried corpses. Accordingly, other embodiments are within the scope of the claims.
This application claims priority to U.S. Provisional Application No. 61/038,022 filed Mar. 19, 2008, the entire disclosure of which is specifically incorporated herein by reference without disclaimer.
Number | Date | Country | |
---|---|---|---|
Parent | 61038022 | Mar 2008 | US |
Child | 12407671 | US |