Next Article in Journal
Multi-User Identification-Based Eye-Tracking Algorithm Using Position Estimation
Previous Article in Journal
A Measurement Method for Large Parts Combining with Feature Compression Extraction and Directed Edge-Point Criterion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Statistical Modeling of Indirect Paths for UWB Sensors in an Indoor Environment

1
Siemens Healthcare Ltd., Pohang-si 37668, Korea
2
School of Computer Science & Electrical Engineering, Handong Global University, Pohang-si 37554, Korea
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(1), 43; https://doi.org/10.3390/s17010043
Submission received: 4 October 2016 / Revised: 3 December 2016 / Accepted: 22 December 2016 / Published: 27 December 2016
(This article belongs to the Section Physical Sensors)

Abstract

:
In this paper, we present a statistical model of an indirect path generated in an ultra-wideband (UWB) human tracking scenario. When performing moving target detection, an indirect path signal can generate ghost targets that may cause a false alarm. For this purpose, we performed radar measurements in an indoor environment and established a statistical model of an indirect path based on the measurement data. The proposed model takes the form of a modified Saleh–Valenzuela model, which is used in a UWB channel model. An application example of the proposed model for mitigating false alarms is also presented.

1. Introduction

Recently, accurate passive localization has become a very important technology for the purposes of security, intrusion detection, and robot tracking, to name a few. When a radar sensor is used, a method to detect a moving target by sensing a change in the received signals has been widely used. In particular, ultra-wideband (UWB) radars are more advantageous than the existing Doppler radars since they can accurately detect even tiny movements of a target. However, in an indoor environment, a variety of problems may be caused because of a dense multipath. Bartoletti et al. [1,2] showed that the localization accuracy can be improved by appropriate allocation of resources and selection of observations in an indoor environment with multipath, clutter, and line-of-sight blockage. A blind zone, an area where the target cannot be detected, can cause various problems. Sobhani et al. [3] proposed a modified particle filter to resolve the tracking issues caused by blind zones.
An indirect reflection that includes the target and other objects in the reflection path can cause a ghost problem [4,5,6]. Figure 1 illustrates this phenomenon. In this figure, path number 1 (direct path) contains the range information of the target. Path number 2 receives static background signals that can be removed via the moving target indication (MTI). Path number 3, namely the indirect path, contains multiple reflections from a human body and the background objects. The indirect path signals survive the MTI process and thus generate ghost targets. The deterministic method has been suggested for detecting an indirect path. For example, Shen and Molisch [4] adopted a deterministic approach, using measurement parameters such as the time of arrival (ToA), direction of departure, and direction of arrival. If a statistical model of the indirect path is available, it will be possible to employ a stochastic approach based on the model. However, no statistical model of the indirect path has yet been proposed, although a study on propagation characterization for UWB sensors exists. In this study, we performed statistical modeling of the indirect path that occurs under an indoor human tracking condition. To achieve this, a comprehensive measurement campaign was performed in an indoor environment, and a cluster model was established based on the measured data. This model can be applied to reject ghost targets that are generated by an indirect path.
The rest of this paper is organized as follows: In Section 2, the measurement campaign to collect the radar scan data is described. In Section 3, the indirect path model that is established based on these data is introduced. Section 4 introduces an indirect path model application example of false alarm mitigation for one-dimensional (1D) two-target tracking.

2. Measurement Campaign

Radar measurements were conducted for the statistical modeling of an indirect path that occurred during moving target detection in indoor environments. More specifically, we modeled the arrival time and the strength of the indirect path. These parameters can vary depending on factors such as the geometric shape and the reflection coefficient of a target. In this study, we assume that the target is a human. Experiments were conducted in buildings inside Handong University, and 2293 scans were obtained. Table 1 summarizes the environment in which the measurements were taken. The radar used in the experiment is the PulsOn 400 monostatic radar kit manufactured by Time Domain, Inc. (Huntsville, AL, USA); it has two omni-directional dipole antennas attached with a passband of 3.1–5.3 GHz. A radar was installed at a height of 0.8 m, and the radar scans were collected when one person walked around the radar. Five scans were obtained per second, and the sampling time was 61 ps. We attempted to remove as many sources of non-stationary clutter, such as running fans and swaying curtains other than moving targets, as possible.
Signals without moving targets were also measured and used as reference for the MTI. The template waveforms of the radar signals can be approximated by [5]:
s ( τ ) = A exp ( a τ 2 ) sin ( b τ ) ,
where a = 5.55 × 10 18 , b = 26.15 × 10 9 , and A denotes a constant.
Let r τ ; t be the received signal with τ being the propagation delay (fast time) and t being the measurement time (slow time). Without loss of generality, r ref τ = r ( τ ; 0 ) is selected as the reference signal for stationary clutter removal, and the difference signal r dif ( τ ; t ) is defined as:
r dif τ ; t = r τ ; t r ref τ .
Slow fluctuation of the power level with respect to time t at the obtained signal r dif τ ; t was observed, and high-pass filtering was done to remove it. The resulting signal is given by
z τ ; t = r dif τ ; t g HP ( t ξ ) d ξ ,
where g HP ( t ) denotes the impulse response of the high-pass filter. Signal z τ ; t includes the indirect path signal components as well as a direct path signal. Figure 2 shows the radargrams of measurement sets 6 and 7. Signal components that arrived the earliest in each scan observed in the figure represent the trajectory of the distance between the radar and the moving human. We can observe other signal components that arrived later than the abovementioned signal components; these are the indirect path signal components.

3. Indirect Path Model

First, an impulse response was obtained by applying the CLEAN algorithm [7] to signal z τ ; t given by Equation (3). The iteration process was supposed to stop when either of the following conditions was met:
  • Captured energy is greater than 90% of the total energy.
  • Path strength is less than four times the noise standard deviation.
Figure 3a,b shows signal z τ ; t obtained from the 170th scan of measurement set 7 and the magnitude of its impulse response, respectively. Interestingly, we can observe that the signal components are clustered as in the UWB channel model. More than two clusters are observed, which indicates that there are clusters generated by indirect reflections, assuming that only one cluster is generated by a direct reflection. In this study, we use a cluster model with the following impulse response:
h τ ; t = l = 0 L ( t ) k = 0 K ( t ) α k , l ( t ) δ D τ T l ( t ) τ k , l ( t ) ; t ,
where δ D ( · ) denotes the Dirac delta function. The parameter T l ( t ) represents the delay of the l th cluster, τ k , l ( t ) indicates the delay of the ray relative to the cluster arrival time, and τ 0 , l ( t ) = 0 for all l. The parameter α k , l ( t ) denotes the path strength. The subscript { k , l } indicates that the quantities depend on the l th cluster and the k th ray; these parameters are dependent on the measurement time t. Assuming that the direct path signal always arrives earlier than the indirect path signals, T 0 ( t ) is the arrival time of a cluster generated by a direct reflection and T l ( t ) with l > 0 is the arrival time of a cluster generated by an indirect reflection.
To identify a cluster from the impulse response, we first carried out a sliding correlation between the squared version of the impulse response and a 3-ns-wide rectangular window. Figure 3c illustrates this example. Although visual inspection is widely used for cluster identification, this has the disadvantage of a strong dependence on human intuition. Instead, we applied additional low-pass filtering to signals obtained through a sliding correlation (see Figure 3d) and performed clustering by finding a location where the slope of the tangent of the low-pass filter output exceeded the threshold, 1.

3.1. Path Arrivals

Ray and cluster arrivals are modeled as Poisson processes in the modified Saleh–Valenzuela (S–V) model widely used as the UWB channel model. In this study, exponential fit was applied to the inter-arrival time of rays as in the modified S–V model. Figure 4a shows the distribution of the inter-arrival time of the rays and its exponential fit. The ray arrival rate, namely λ, was obtained to be 1.1521 by measuring the mean inter-ray arrival time.
In contrast to ray arrival, the inter-arrival time of clusters, namely δ, is closer to the following gamma model than the exponential model:
f δ δ = δ K 1 e δ / θ θ K Γ ( K ) .
Figure 4b shows the distribution of inter-arrival time of the clusters and its gamma fit with K = 8.4476 and θ = 1.5510 . To examine the goodness of fitness, a chi-squared test was performed. The resulting χ 2 value was 6.36, which was less than the critical value, 7.81, corresponding to a 5% significance level and three degrees of freedom.

3.2. Path Strengths

As in the modified S–V model [8], the path strength is assumed to follow log-normal fading, with its mean energy decreasing exponentially with excess delay, as follows:
E α k , l 2 e T l / Γ e τ k , l / γ ,
where Γ and γ denote the cluster and ray decay factors, respectively. The process to find an optimal value of model parameters γ and Γ from the measured data is similar to the approach described in [9]. First, the ray decay factor γ is obtained according to the least squared error criterion:
γ = arg min γ min β l ( m ) m l k 20 log 10 α k , l ( m ) β l ( m ) + 10 τ k , l ( m ) τ 0 , l ( m ) γ ln 10 2 ,
where m refers to an index of the used radar scan. Parameter β l ( m ) accounts for the energy of the l th cluster of the m th radar scan in the decibel scale, which is chosen to minimize the squared error for a given value of γ . Once the value of γ is determined, an optimal value of the l th cluster energy can be obtained as:
ν l ( m ) = arg min ν k 20 log 10 α k , l ( m ) ν + 10 τ k , l ( m ) τ 0 , l ( m ) γ ln 10 2 .
Now, the optimal value of Γ can be found by:
Γ = arg min Γ min ϕ ( m ) m l ν l ( m ) ϕ ( m ) + 10 T l ( m ) T 0 ( m ) Γ ln 10 2 ,
where the cluster energies of the m th signal are scaled by the constant ϕ ( m ) such that the squared error is minimized. Figure 5 shows the scatter plots of the ray and cluster energies. The values of the fading parameters are listed in Table 2.

4. Application of the Indirect Path Model to Two-Target Tracking

4.1. Test Scenario

This section presents an application example that applies the indirect path model introduced in Section 3 to 1D two-target tracking in an indoor environment. For this purpose, another set of radar measurements independent of the measurement data introduced in Section 2 was conducted. One monostatic radar was installed in an indoor environment, and two people moved along a straight line near the radar. Measurements were conducted for three test scenarios: Figure 6a shows the movement path of the two targets. The targets moved with different timings along the same path in all three scenarios. Figure 6b–d shows the radargrams of each scenario.
The figures in Figure 7 are the scatter plots of the cluster arrivals obtained using the CLEAN algorithm and cluster identification. As shown in these figures, in most scans, more clusters than the number of targets were detected, which was attributed to indirect reflections. Among the ToAs of the detected clusters, the ToAs of the clusters generated by a direct reflection at each target contain the range information. Our task here is to reduce a false alarm rate by screening out clusters that are likely to have been generated by an indirect reflection among the many detected clusters. This task is performed on the basis of the cluster unit by assuming that the first arriving ray inside each cluster contains the range information of the target. This algorithm is applied on a single-scan basis. It is a type of screening process of observations detected in a single scan, which is conducted independently of the detection results of the other scans. Thus, it is carried out independently of other tracking tasks such as track association and prediction. This is to show that the proposed screening algorithm can achieve false alarm mitigation independently from most of the ghost rejection algorithm applied to the data association phase. Therefore, if tracking tasks such as track association and prediction are performed after the screening, it is expected to further enhance the performance.

4.2. Screening Algorithm

With ToAs and strengths of clusters obtained by applying the CLEAN algorithm and the clustering algorithm to the m th scan, the following observation matrix can be built:
R ( m ) = T ̲ ( m ) , ν ̲ ( m ) = T 0 ( m ) , ν 0 ( m ) T 1 ( m ) , ν 1 ( m ) T L m 1 ( m ) , ν L m 1 ( m ) ,
where column vectors T ̲ ( m ) and ν ̲ ( m ) refer to the vectors of the arrival time and the strength of the detected clusters, respectively. Here, we assume T 0 ( m ) < T 1 ( m ) < < T L m 1 ( m ) . Parameter L m refers to the number of clusters, and ν l ( m ) , which is an estimated strength of ( l + 1 ) th cluster, is determined by Equation (8). The first observation vector T 0 ( m ) , ν 0 ( m ) is assumed to be generated by a direct reflection at a target closer to the radar. For the sake of convenience, a target that is closer to the radar is indexed 0 and the other target is indexed 1. Note that this index is a value assigned only within a single scan. Which target is closer to the radar depends on the movements of targets; therefore, an index of the same target can also differ according to m. Let us also define an L m -dimensional vector μ ̲ ( m ) , which represents a particular association between targets and observations inside the m th scan, as:
μ ̲ ( m ) = μ 0 ( m ) , μ 1 ( m ) , , μ L m 1 ( m ) .
Here, an all-zero vector or an all-one vector is not considered to be a candidate of μ ̲ ( m ) . Then, the number of possible vectors μ ̲ ( m ) is 2 L m 1 2 . The first “0” and the first “1” in the elements of vector μ ̲ ( m ) represent the direct reflections at target 0 and target 1, respectively, and the other elements indicate the indirect reflections. Since μ 0 ( m ) = 0 is satisfied for all m, our task is to determine the position of the first non-zero element in the vector μ ̲ ( m ) , i.e., to find the first observation vector associated to target 1 from the matrix R ( m ) .
Let H j ( m ) denote the hypothesis that the first non-zero element of μ ̲ ( m ) is μ j ( m ) . Then, we can define the following likelihood function to evaluate each hypothesis:
L H j ( m ) R ( m ) = max μ ̲ ( m ) A j ( m ) f T ν ̲ μ ̲ T ̲ ( m ) , ν ̲ ( m ) μ ̲ ( m ) , 0 j L m 1 ,
where set A j ( m ) is a set of vector μ ̲ ( m ) s that satisfy H j ( m ) , in other words,
A j ( m ) = μ ̲ ( m ) arg min l μ l ( m ) 0 = j .
In Equation (12), the likelihood function is defined as the maximum of the conditional density with respect to all vectors μ ̲ ( m ) that belong to set A j ( m ) because the distribution of μ ̲ ( m ) is unknown. For the conditional density shown in Equation (12), all parameters are independent and every observation vector is partitioned by μ ̲ ( m ) ; therefore, they can be easily evaluated. For more details, refer to the Appendix A.
The hypotheses H j ( m ) j = 0 L m 1 are all mutually exclusive and exhaustive. In contrast to the hypothesis testing approach in which only one hypothesis is accepted, we are more interested in selecting a set of hypotheses that are decently probable. This is to utilize the selected candidates of the direct reflection for further tracking tasks such as track association and filtering. We choose H j ( m ) if and only if L H j ( m ) R ( m ) is greater than the threshold θ L . Here, in order to define the probability of false alarm P FA and the probability of detection P D , we defined the discrete cells of the measurement time for the sake of convenience. The size of the time cell is 1.95 ns of the time resolution, and P FA and P D are defined as follows:
P FA = number of false detections number of time cells 2 , P D = number of true detections number of actual targets .
Figure 8 shows a comparison of the receiver operating characteristic (RoC) curves obtained by applying the algorithm proposed in this paper and the path loss compensation method proposed in [10,11] in the three considered scenarios. In the figures, the results obtained via the former method shows a smaller P FA for the given P D value than those obtained via the latter method. For example, in Scenario 3, when P D = 0.81 , the value of P FA is 0.025 if the former method is used, and 0.045 if the latter method is used, which are noticeably different values.

4.3. Test Results

We conducted 1D tracking in the three aforementioned scenarios by applying the ghost rejection algorithm proposed in the previous section. Figure 9 illustrates the measurement scenario introduced in Section 4.1. Parameter d m refers to the distance from the radar to the target in the m th scan, x m indicates the range of the target, and y m denotes the distance to the straight line path along which the target moved. The multi-target tracking algorithm followed the conventional approach described in [12]. An extended Kalman filter with the following state model was used for the filtering and prediction process:
x ̲ m + 1 = F x ̲ m + w ̲ m ,
where
x ̲ m = x m x ˙ m x ¨ m y m t ,
F = 1 T s 1 2 T s 2 0 0 1 T s 0 0 0 1 0 0 0 0 1 .
The scan interval T s is 0.2 s, and the system noise w ̲ m is a mean-zero Gaussian vector with the covariance matrixL:
K w = 0 0 0 0 0 0.1 0 0 0 0 0.5 0 0 0 0 0.01 .
The measurement model is given by:
d m = x m 2 + y m 2 + ϵ m ,
where the measurement noise ϵ m is also Gaussian with a zero mean and a variance of 0.65. The widely used nearest neighbor method was employed for gating, and the gating threshold was chosen to be 0.87. The initial state is x ̲ 0 = x 0 x ˙ 0 x ¨ 0 y 0 t = 13 0.2 0.01 0.5 t . Figure 10 and Figure 11 show the result of the tracking algorithm applied to three scenarios. In these figures, it is not easy to perfectly distinguish between true tracks and ghost tracks. However, the ghost tracks can be roughly identified by comparing them with the trajectory of the actual distance of the target shown in Figure 7, and it can be seen that the number of ghost tracks noticeably decreased when the ghost rejection algorithm was applied. For example, in Scenario 3, the number of ghost tracks decreased from eleven to two.

5. Conclusions

In this study, an indirect path that can occur in an indoor radar signal propagation was modeled statistically. We chose a widely used cluster model and modeled the ToA and the strength of the indirect path. Statistical modeling of an indirect path by a comprehensive measurement campaign is a unique contribution of this work. Applying the proposed model in 1D two-target tracking indicated that the number of ghost tracks is reduced effectively. This result is achieved by screening the candidate target obtained in the detection stage. If this is combined with the existing ghost rejection algorithm applied during the data association stage, we expect that additional performance enhancement will be possible.

Acknowledgments

This research was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (NRF-2012R1A1A2041260) and in part by a Sabbatical Leave Grant at Handong Global University (HGU-2015). We would like to express our sincere gratitude to Woo-Lim Hong, Hong-Eun Park, Ho-Seop Kim, Hak Joon Kim, and Sung Jun Lee for their assistance in taking the measurements discussed in this paper.

Author Contributions

M. Lee performed the experiments, data analysis, statistical modeling and algorithm testing; and J.-Y. Lee contributed to statistical modeling and co-wrote the paper with M. Lee.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

Appendix A

In this section, the conditional density f T ν ̲ μ ̲ T ̲ ( m ) , ν ̲ ( m ) μ ̲ ( m ) shown in Equation (12) is evaluated. First, the L m row vectors of the observation matrix R ( m ) are partitioned into two groups: one associated with target 0, and the other associated with target 1. Let the observation matrix created by the target q q = 0 , 1 be R q ( m ) . Then,
R q ( m ) = T ̲ q ( m ) , ν ̲ q ( m ) = T n , q ( m ) , ν n , q ( m ) L m , q × 2 , 0 n L m , q 1 ,
where T n , q ( m ) , ν n , q ( m ) T l ( m ) , ν l ( m ) μ l ( m ) = q and T 0 , q ( m ) < T 1 , q ( m ) < < T L m , q 1 , q ( m ) . By calibrating the observation matrix, we define R ˜ q ( m ) as:
R ˜ q ( m ) = T ̲ ˜ q ( m ) , ν ̲ ˜ q ( m ) = T ˜ n , q ( m ) , ν ˜ n , q ( m ) L m , q × 2 , 0 n L m , q 1 ,
where T ˜ n , q ( m ) = T n , q ( m ) T 0 , q ( m ) and ν ˜ n , q ( m ) = ν n , q ( m ) ϕ q ( m ) . That is, the ToA of each cluster is calibrated to become T 0 , q ( m ) = 0 , and the cluster energy is scaled by the parameter ϕ q ( m ) selected to have the minimum squared error. Here, the parameter ϕ q ( m ) can be defined as:
ϕ q ( m ) = arg min ϕ n = 0 L m , q ν n , q ( m ) ϕ + 10 T ˜ n , q ( m ) Γ ln 10 2 .
Since parameters T ˜ n , q ( m ) , ν ˜ n , q ( m ) n = 0 L m , q 1 are all independent, the following condition is satisfied:
f T ν ̲ μ ̲ T ̲ ( m ) , ν ̲ ( m ) μ ̲ ( m ) = f T ˜ ν ˜ ̲ μ ̲ ˜ T ̲ ˜ ( m ) , ν ̲ ˜ ( m ) μ ̲ ˜ ( m )      = q = 0 1 n = 1 L m , q f δ T ˜ n , q ( m ) T ˜ n 1 , q ( m ) · f ν ˜ T ˜ ν ˜ n , q ( m ) T ˜ n , q ( m ) ,
where the marginal density f δ δ is given by Equation (5), and the conditional density of ν ˜ is given by:
f ν ˜ T ˜ ν ˜ T ˜ = 1 2 π σ cluster exp ν ˜ + 10 T ˜ Γ ln 10 2 2 σ cluster 2 .

References

  1. Bartoletti, S.; Conti, A.; Giorgetti, A.; Win, M.Z. Sensor Radar Networks for Indoor Tracking. IEEE Wirel. Commun. Lett. 2014, 3, 157–160. [Google Scholar]
  2. Bartoletti, S.; Giorgetti, A.; Win, M.Z.; Conti, A. Blind Selection of Representative Observations for Sensor Radar Networks. IEEE Transa. Veh. Technol. 2015, 64, 1388–1400. [Google Scholar] [CrossRef]
  3. Sobhani, B.; Paolini, E.; Giorgetti, A.; Mazzotti, M.; Chiani, M. Target Tracking for UWB Multistatic Radar Sensor Networks. IEEE J. Sel. Top. Signal Process. 2014, 8, 125–136. [Google Scholar] [CrossRef]
  4. Shen, J.; Molisch, A.F. Indirect Path Detection Based on Wireless Propagation Measurements. IEEE Trans. Wirel. Commun. 2012, 11, 4482–4493. [Google Scholar] [CrossRef]
  5. Kim, C.; Lee, J.Y. ToA-based multi-target localization and respiration detection using UWB radars. EURASIP J. Wirel. Commun. Netw. 2014, 2014. [Google Scholar] [CrossRef]
  6. Smith, G.E.; Mobasseri, B.G. Analysis and Exploitation of Multipath Ghosts in Radar Target Image Classification. IEEE Trans. Image Process. 2014, 23, 1581–1592. [Google Scholar] [CrossRef] [PubMed]
  7. Cramer, J.M.; Scholtz, R.A.; Win, M.Z. Evaluation of an Ultra-Wideband Propagation Channel. IEEE Trans. Antennas Propag. 2002, 50, 561–570. [Google Scholar] [CrossRef]
  8. Molisch, A.F.; Cassioli, D.; Chong, C.C.; Emami, S.; Fort, A.; Kannan, B.; Karedal, J.; Kunisch, J.; Schantz, H.G.; Siwiak, K.; et al. A Comprehensive Standardized Model for Ultrawideband Propagation Channels. IEEE J. Sel. Areas Commun. 2006, 54, 3151–3166. [Google Scholar] [CrossRef]
  9. Lee, J.Y. UWB Channel Modeling in Roadway and Indoor Parking Environments. IEEE Trans. Veh. Technol. 2010, 59, 3171–3180. [Google Scholar] [CrossRef]
  10. Rovnakova, J.; Kocur, D. Weak signal enhancement in radar signal processing. In Proceedings of the 20th International Conference, Radioelektronika (RADIOELEKTRONIKA), Brno, Czech Republic, 19–21 April 2010; pp. 1–4.
  11. Kim, J.; Baek, I.; Cho, S. Compensation of recieved signal attenuation by distance using UWB radar. In Proceedings of the 2012 Winter Conference of Korea Information and Communications Society, Pyeongchang, Korea, 8–10 February 2012; pp. 282–283.
  12. Blackman, S.S. Multiple hypothesis tracking for multiple target tracking. IEEE Aerosp. Electron. Syst. Mag. 2004, 19, 5–18. [Google Scholar] [CrossRef]
Figure 1. Different reflection scenarios caused by a moving human.
Figure 1. Different reflection scenarios caused by a moving human.
Sensors 17 00043 g001
Figure 2. Radargrams of measurement sets (a) 6 and (b) 7.
Figure 2. Radargrams of measurement sets (a) 6 and (b) 7.
Sensors 17 00043 g002aSensors 17 00043 g002b
Figure 3. Deconvolution and cluster identification for the 170th scan of measurement set 7. (a) z τ ; t ; (b) magnitude of the impulse response; (c) output of a sliding correlator; and (d) output of a low-pass filter.
Figure 3. Deconvolution and cluster identification for the 170th scan of measurement set 7. (a) z τ ; t ; (b) magnitude of the impulse response; (c) output of a sliding correlator; and (d) output of a low-pass filter.
Sensors 17 00043 g003
Figure 4. Distributions of the (a) ray and (b) cluster inter-arrival times.
Figure 4. Distributions of the (a) ray and (b) cluster inter-arrival times.
Sensors 17 00043 g004
Figure 5. Scatter plots of the (a) ray and (b) cluster energies.
Figure 5. Scatter plots of the (a) ray and (b) cluster energies.
Sensors 17 00043 g005
Figure 6. (a) Floor plan of the building where the experiments were conducted; (b) radargrams of Scenario 1. One target approached the radar and then moved away while the other repeated motions approaching the radar from a distance and returned back; (c) radargrams of Scenario 2. One target approached the radar and returned, and the other moved along the same path with a certain constant delay; and (d) radargrams of Scenario 3. Both targets approached the radar with some gap between them and moved away from the radar simultaneously.
Figure 6. (a) Floor plan of the building where the experiments were conducted; (b) radargrams of Scenario 1. One target approached the radar and then moved away while the other repeated motions approaching the radar from a distance and returned back; (c) radargrams of Scenario 2. One target approached the radar and returned, and the other moved along the same path with a certain constant delay; and (d) radargrams of Scenario 3. Both targets approached the radar with some gap between them and moved away from the radar simultaneously.
Sensors 17 00043 g006
Figure 7. Scatter plots of clusters without ghost rejection for each scenario. (a) Scenario 1; (b) Scenario 2; and (c) Scenario 3.
Figure 7. Scatter plots of clusters without ghost rejection for each scenario. (a) Scenario 1; (b) Scenario 2; and (c) Scenario 3.
Sensors 17 00043 g007aSensors 17 00043 g007b
Figure 8. Receiver operating characteristic (RoC) curves for each scenario. (a) Scenario 1; (b) Scenario 2; and (c) Scenario 3.
Figure 8. Receiver operating characteristic (RoC) curves for each scenario. (a) Scenario 1; (b) Scenario 2; and (c) Scenario 3.
Sensors 17 00043 g008aSensors 17 00043 g008b
Figure 9. Test scenario.
Figure 9. Test scenario.
Sensors 17 00043 g009
Figure 10. Tracking results for each scenario without ghost rejection. Separate tracks are indicated by different colors. (a) Scenario 1; (b) Scenario 2; and (c) Scenario 3.
Figure 10. Tracking results for each scenario without ghost rejection. Separate tracks are indicated by different colors. (a) Scenario 1; (b) Scenario 2; and (c) Scenario 3.
Sensors 17 00043 g010
Figure 11. Tracking results for each scenario with ghost rejection. Separate tracks are indicated by different colors. (a) Scenario 1; (b) Scenario 2; and (c) Scenario 3.
Figure 11. Tracking results for each scenario with ghost rejection. Separate tracks are indicated by different colors. (a) Scenario 1; (b) Scenario 2; and (c) Scenario 3.
Sensors 17 00043 g011
Table 1. Measurement environments. Measurements were taken in the lobbies, hallways, and lecture rooms of the university buildings.
Table 1. Measurement environments. Measurements were taken in the lobbies, hallways, and lecture rooms of the university buildings.
Measurement SetLocationNumber of Scans
1lecture room, 3rd floor, Main Library187
2lecture room, 3rd floor, Main Library178
3#313, 3rd floor, Newton Hall287
4lobby, 4th floor, Newton Hall238
5lobby, 4th floor, Newton Hall275
6lobby, 3rd floor, All Nations Hall166
7lobby, 3rd floor, All Nations Hall227
8hallway, 3rd floor, Nehemiah Hall125
9hallway, 3rd floor, Nehemiah Hall111
10hallway, 1st floor, Nehemiah Hall108
11hallway, 1st floor, Nehemiah Hall80
12lobby, 1st floor, Nehemiah Hall143
13lobby, 1st floor, Nehemiah Hall168
total2293
Table 2. Fading parameters for the cluster model. The inter-arrival times of rays and clusters are modeled using exponential and gamma densities, respectively. The path strength follows lognormal fading.
Table 2. Fading parameters for the cluster model. The inter-arrival times of rays and clusters are modeled using exponential and gamma densities, respectively. The path strength follows lognormal fading.
ParametersSymbolValue
cluster arrivalK8.4476
θ1.5510
ray arrival rate (1/ns)λ1.1521
cluster decay time constant (ns)Γ33.1268
ray decay time constant (ns)γ12.9967
standard deviation of cluster fading σ cluster 1.6605
standard deviation of ray fading σ ray 3.9038

Share and Cite

MDPI and ACS Style

Lee, M.; Lee, J.-Y. Statistical Modeling of Indirect Paths for UWB Sensors in an Indoor Environment. Sensors 2017, 17, 43. https://doi.org/10.3390/s17010043

AMA Style

Lee M, Lee J-Y. Statistical Modeling of Indirect Paths for UWB Sensors in an Indoor Environment. Sensors. 2017; 17(1):43. https://doi.org/10.3390/s17010043

Chicago/Turabian Style

Lee, Moona, and Joon-Yong Lee. 2017. "Statistical Modeling of Indirect Paths for UWB Sensors in an Indoor Environment" Sensors 17, no. 1: 43. https://doi.org/10.3390/s17010043

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop