ENHANCED CLUTTER COMPONENT DETERMINATION
20250247160 ยท 2025-07-31
Inventors
- Marcus Roland HENNINGER (Stuttgart, DE)
- Silvio Mandelli (Stuttgart, DE)
- Artjom GRUDNITSKY (Stuttgart, DE)
Cpc classification
H04B17/382
ELECTRICITY
International classification
Abstract
Solutions enabling updating clutter components that can be used in clutter removal when joint communication and sensing, for example, are disclosed. To update clutter components by second clutter components, sets of measurement results of sensing of an environment of which clutter components have been determined are obtained. Then, per a set, multi-dimensional representations of echo signals received as measurement results of the set are transformed at least partly into one-dimensional echo signals. The second clutter components are determined based at least on corresponding one-dimensional echo signals and a clutter matrix representation that comprises elements obtained from previously determined clutter components of the environment.
Claims
1. An apparatus comprising at least one processor and at least one memory storing instructions that, when executed by the at least one processor, cause the apparatus to at least: obtain sets of measurement results of sensing of an environment of which clutter components have been determined; transform, per a set, multi-dimensional representations of echo signals received as measurement results of the set at least partly into one-dimensional echo signals; and determine second clutter components based at least on corresponding one-dimensional echo signals and a clutter matrix representation that comprises elements obtained from previously determined clutter components of the environment.
2. The apparatus of claim 1, wherein the elements in the clutter matrix representation are results of a multiplication of the previously determined clutter components of the environment with their singular values.
3. The apparatus of claim 1, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to: update the previously determined clutter components of the environment to comprise the second clutter components.
4. The apparatus of claim 1, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to determine the second clutter components by stacking the one-dimensional echo signals of the sets to form a sensing matrix; stacking the sensing matrix with the clutter matrix representation to form a clutter matrix; and determining the second clutter components based on the clutter matrix.
5. The apparatus of claim 4, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to multiply, prior to stacking the sensing matrix with the clutter matrix representation, the sensing matrix with a scaling factor; and use a result of the multiplication in the stacking.
6. The apparatus of claim 4, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to: determine, prior to stacking, a first smoothing value whose value is at most one and not less than zero and a second smoothing value whose value is at most one and not less than zero, wherein when one of the smoothing values is zero, the other one is one; multiply the sensing matrix with the first smoothing value and the clutter matrix representation with the second smoothing value; and use results of the multiplication in the stacking.
7. The apparatus of claim 4, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to perform a singular value decomposition to the clutter matrix to obtain singular values of the clutter matrix.
8. The apparatus of claim 7, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to determine the second clutter components by: determining a decision threshold based on the singular values of the clutter matrix; and determining that at least an element whose value exceeds the decision threshold is a second clutter component.
9. The apparatus of claim 8, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to: determine an upper bound for the singular values of the clutter matrix to be the decision threshold.
10. The apparatus of claim 8, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to: multiply an upper bound for the singular values of the clutter matrix by a predetermined threshold factor; and determine a result of the multiplication to be the decision threshold.
11. The apparatus of claim 1, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to: determine the second clutter components periodically and/or when an event indicating a request for the second clutter components is detected.
12. The apparatus of claim 1, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to: perform clutter removal by removing, per a one-dimensional echo signal, a projection of the one-dimensional echo signal over the second clutter components.
13. The apparatus of claim 1, wherein the at least one processor and the at least one memory storing instructions, when executed by the at least one processor, further cause the apparatus at least to: determine, using at least the second clutter components, at least one clutter calibration matrix; determine one-dimensional clutter contributing signals based on the one-dimensional echo signals, by applying, per a one-dimensional echo signal, a projection of one of the at least one clutter calibration matrix to obtain a corresponding one-dimensional clutter contributing signal; and remove clutter from the multi-dimensional representations of echo signals using the one-dimensional clutter contributing signals.
14. A method for an apparatus, the method comprising at least: obtaining sets of measurement results of sensing of an environment of which clutter components have been determined; transforming, per a set, multi-dimensional representations of echo signals received as measurement results of the set at least partly into one-dimensional echo signals; and determining second clutter components based at least on corresponding one-dimensional echo signals and a clutter matrix representation that comprises elements obtained from previously determined clutter components of the environment.
15. A computer readable medium comprising instructions which, when executed by an apparatus, cause the apparatus to perform at least: obtaining sets of measurement results of sensing of an environment of which clutter components have been determined; transforming, per a set, multi-dimensional representations of echo signals received as measurement results of the set at least partly into one-dimensional echo signals; and determining second clutter components based at least on corresponding one-dimensional echo signals and a clutter matrix representation that comprises elements obtained from previously determined clutter components of the environment.
16. The computer readable medium of claim 15, wherein the computer readable medium is a non-transitory computer readable medium.
17. (canceled)
Description
BRIEF DESCRIPTION OF DRAWINGS
[0021] Embodiments are described below, by way of example only, with reference to the accompanying drawings, in which
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
DETAILED DESCRIPTION OF SOME EMBODIMENTS
[0029] The following embodiments are only presented as examples. Although the specification may refer to an, one, or some embodiment(s) and/or example(s) in several locations, this does not necessarily mean that each such reference is to the same embodiment(s) or example(s), or that a particular feature only applies to a single embodiment and/or single example. Single features of different embodiments and/or examples may also be combined to provide other embodiments and/or examples. Furthermore, words comprising and including should be understood as not limiting the described embodiments to consist of only those features that have been mentioned and such embodiments may contain also features/structures that have not been specifically mentioned. Further, although terms including ordinal numbers, such as first, second, etc., may be used for describing various elements, the elements are not restricted by the terms. The terms are used merely for the purpose of distinguishing an element from other elements. For example, second clutter components could be termed clutter components or newest clutter components, or the most recently determined clutter components, or first clutter components, and correspondingly previously determined clutter components could be termed first clutter components or second clutter components, or earlier determined clutter components, etc. without departing from the scope of the present disclosure.
[0030] 5G-Advanced, and beyond future wireless networks aim to support a large variety of services, use cases and industrial verticals, for example unmanned mobility with fully autonomous connected vehicles, other vehicle-to-everything (V2X) services, or smart environment, e.g. smart industry, smart power grid, or smart city, just to name few examples. To provide variety of services with different requirements, such as enhanced mobile broadband, ultra-reliable low latency communication, massive machine type communication, wireless networks are envisaged to adopt network slicing, flexible decentralized and/or distributed computing systems and ubiquitous computing, with local spectrum licensing, spectrum sharing, infrastructure sharing, and intelligent automated management underpinned by mobile edge computing, artificial intelligence, for example machine learning, based tools, cloudification and blockchain technologies. For example, in the network slicing multiple independent and dedicated network slice instances may be created within the same infrastructure to run services that have different requirements on latency, reliability, throughput and mobility. In addition to the above listed features, 6G (sixth generation) networks are expected to adopt short-packet communication, for example. Key features of 6G will include intelligent connected management and control functions, programmability, integrated sensing and communication, reduction of energy footprint, trustworthy infrastructure, scalability and affordability.
[0031] Various techniques described herein may also be applied to a cyber-physical system (CPS) (a system of collaborating computational elements controlling physical entities). CPS may enable the implementation and exploitation of massive amounts of interconnected ICT devices (sensors, actuators, processors microcontrollers, etc.) embedded in physical objects at different locations. Mobile cyber physical systems, in which the physical system in question has inherent mobility, are a subcategory of cyber-physical systems. Examples of mobile physical systems include mobile robotics and electronics transported by humans or animals.
[0032] It is envisaged that artificial intelligence, AI/machine learning, ML, based models will be used to improve performance of at least some air-interface functions, providing an AI/ML-enabled radio interface, for example.
[0033]
[0034] In the non-limiting example of
[0035] A device component 101 may be any electrical device or apparatus connectable to an access network, and configurable to be in a wireless connection on one or more communication channels with an access network component 102. The physical link from the device component 101 to the access network component 102 towards a core network component 103 is called an uplink or a reverse link and the physical link to the device component is called a downlink or a forward link. By way of example rather than limitation, the device component 101 may be referred to as a served apparatus, a downlink apparatus, a mobile apparatus, a terminal device, a communication device, a user equipment (UE), a subscriber station (SS), a portable subscriber station, a mobile station (MS), or an access terminal (AT). A non-limiting list of examples of the device component 101, or what the device component 101 may comprise or be comprised in, includes a smart phone, a multimedia device, a drone, a vehicle, a vehicle-mounted wireless terminal device, an Internet of things device, an industrial Internet of things device, a mobile robot, a sensor, on-person device, like wearable device, just to mention a few non-limiting examples. The device component may also be part of a group of device components seen as one device component, i.e. one mobile apparatus, by the wireless network.
[0036] The radio access network domain may be a 5G-Advanced access network, an open radio access network, a cloud radio access network, a legacy cellular radio access network, a non-terrestrial network, or a non-cellular access network, for example a wireless local area network, comprising entities implementing radio sensing. In other words, the radio access network domain may use any radio interface technology that enables sensing according to embodiments and examples described herein. To provide the wireless access, the radio access network comprises access network components 102, such as access network apparatuses, or access devices, which may provide one or more cells. There are a wide variety of access devices. A non-limiting list of examples of the access network component 102, or what the access network component 102 may comprise or be comprised in, includes different types of base stations, such as eNBs, gNBs, split gNBs, transmission-reception points, network-controlled repeaters, donor nodes in integrated access and backhaul (IAB), fixed IAB nodes, mobile IAB nodes mounted on vehicles, nodes operationally coupled to one or more remote radio heads, base stations comprising radio parts, etc. The access devices provide wireless connections for communication by transmitting and receiving radio signals via antenna units that may comprise a plurality of antennas or antenna elements, for example for multiple-input, multiple-output (MIMO) technology. The access nodes may be configured to transmit radio signals over beams, and for beam management to perform beam sweeping. The beam sweeping is a technique to transmit beams in different directions in a burst. For sensing purposes, radio signals for sensing may be transmitted in a similar manner.
[0037] The core network components 103 form one or more core networks. A core network may be based on a non-standalone core network, for example an LTE-based network, or a standalone access network, for example a 5G core network. However, it should be appreciated that the core network, and the core network components 103, may use any technology that enables network services to be delivered between devices and data networks.
[0038] The data network, or the data network domain 104, may be any network, like the Internet, an intranet, a wide area network, etc. Different remote monitoring and/or data collection services for different use cases may be reached via the data network and the data network components 104.
[0039] Further, it should be noted that some of the components may be multi-domain components. For example, a device component 101 may also provide services to other device components, i.e. operate also as an access network component 102, for example be a relay node, or a mobile IAB node, or a mobile termination part in an IAB node.
[0040] The highly simplified example of the sensing arrangement comprises an environment 110 in which sensing according to embodiments and examples may be performed. The environment 110 may be any environment, for example a room or a corridor but it may be also an outdoor environment. In the illustrated example, the sensing arrangement comprises a receiver (RX) 111 and a transmitter (TX) 112 that are co-located. However, it should be appreciated that the sensing arrangement may as well be a bi-static arrangement, in which the receiver and the transmitter are not co-located or multi-static arrangements with at least one transmitter 112 and multiple receivers 111, which all, or some of them, may be configured to perform the below described processes. The transmitter and the receiver may be different entities, e.g. different nodes in a radio access network, or different antenna panels in one entity, the antenna panels not sharing a local oscillator, which may cause phase incoherencies between them.
[0041] When, during a sensing occurrence, the transmitter 112 transmits one or more sensing signals, depicted by solid line arrows in
[0042] It may be that a target of interest is a quasi/semi-static target, or there is a change in objects of no interest in the environment. A quasi/semi-static sensing target (target of interest) is an entity/object that exhibits the same properties (e.g., same range, no movement, i.e. speed=0) over a long time. Such a target may be less relevant for new sensing measurements. Hence echo signals from such a target may be considered as interference to the sensing signal and should be removed as if they were clutter.
[0043]
[0044] Herein two similar quantities are used for describing clutter, the quantities being a signal space and a clutter subspace. The signal space is an N-dimensional space where a signal, e.g. an echo signal or the sensing signal, may be expressed as an one-dimensional vector. The clutter subspace is a collection of one or more vectors in the signal space, describing estimated directions/dimensions of the clutter. A clutter matrix representation is a representation that contains information about the clutter subspace and the relevance/scaling of each single vector contained within. In other words, the clutter matrix representation contains elements obtained from previously determined clutter components, as will be described in more detail below. The clutter matrix representation may be given by a product of the clutter subspace with a diagonal matrix containing corresponding singular values. The clutter matrix representation may be expressed as a single matrix or an equivalent multiplication of multiple matrices. The latter may be a technically relevant implementation, since storing multiple matrices may be easier, or result in operations that are simpler to execute at clutter removal runtime computations.
[0045] The processes depicted in
[0046] Referring to
[0047] Then, per a set, multi-dimensional (M-D) representations of echo signals received as measurement results of the set are transformed (block 202) at least partly into one-dimensional echo signals. In other words, the measurement results of sensing, or a subset of measurement results in the set, are vectorized by collapsing all dimensions into one-dimension. For example, a two-dimensional time-frequency representation of an echo signal, for example, a following OFDM echo signal with N subcarriers and M symbols (radio frames with N subcarriers and M symbols)
[0048] may be transformed into the following one-dimensional row vector of length Q=NM:
[h.sub.1,1 . . . h.sub.1,M . . . h.sub.N,1 . . . h.sub.N,M]
[0049] In other words, a set (acquisition) of multi-dimensional (M-D) representations of an echo signal is transformed to a vectorized acquisition with Q=NM samples.
[0050] When K sets are obtained, the above described vectorizing (block 202) is performed K times, resulting in K one-dimensional row vectors (vectorized acquisitions).
[0051] It should be appreciated that the one-dimensional vector may also be a column vector. However, herein, for the clarity of the description, the examples use the row vector. Applying the principles disclosed to column vectors is a straightforward task for one skilled in the art.
[0052] When multi-dimensional (M-D) representations of echo signals of the sets have been transformed into K one-dimensional echo signals (row vectors), second clutter components are determined (block 203) based at least on corresponding one-dimensional echo signals (K one-dimensional row vectors) and a clutter matrix representation. The clutter matrix representation comprises elements obtained from previously determined clutter components of the environment. Hence, the history information of the clutter will be tracked by piggybacking the history information to be part of the newest, i.e. second, clutter components. The previously determined clutter components may be the most recently determined clutter components, i.e. determined during the preceding time the process of
[0053] The elements in the clutter matrix representation may be the previously determined clutter components, or the elements may be results of a multiplication of the previously determined clutter components of the environment with their singular values. The singular values may have been determined using a singular value decomposition, SVD, when the previously determined clutter components of the environment were determined.
[0054] The second clutter components are preferably meaningful clutter components. Hence, the determining in block 203 may include selecting the second clutter components based on one or more rules. For example, as described in the Finnish patent application number 20237037, a model estimation technique, for example minimum description length (MDL), may be used to select (determine) the second clutter components, which may be L vectors associated with the L strongest clutter components. Further examples of rules that may be used in block 203 to determine meaningful clutter components are illustrated below with
[0055] Referring to
[0056] For example, during nominal sensing operations it is monitored (block 301), whether the previously determined clutter components are to be updated, i.e. whether the second clutter components are to be determined. The second clutter components may be determined periodically and/or aperiodically, i.e. when an event indicating a request for the second clutter components is detected. The periodical updates take place at fixed intervals, for example every hour, every day, etc. An event may take place when a system operator (human) triggers an update based on an assessment of the sensing environment, e.g., in case significant changes are observed that necessitate an update, or if the environment is known to only contain clutter components, making it suitable for an update. Further, a degradation in sensing key performance indicators or an analysis of the temporal behavior of the channel may provide hints about whether the environment has changed or whether the environment is empty. In both cases, a clutter update may be useful, and hence triggered, either by the system operator, or automatically by the system, for example by a system monitoring at least one of the key performance indicators or performing said analysis.
[0057] When the previously determined clutter components are to be updated (block 301: yes), sets of measurement results of sensing of the environment of which clutter components have been determined, are obtained (block 302) in a similar way as described above with block 201, not repeated in vain herein.
[0058] Then, per a set, multi-dimensional representations of echo signals received as measurement results of the set are transformed (block 303) at least partly into one-dimensional echo signals, in a similar way as described above with block 202, not repeated in vain herein.
[0059] In the example of
[0060] Stacking K such vectorized acquisitions with Q=NM samples, for example radio frames with N subcarriers and M symbols, yields the K x Q sensing matrix S, which is illustrated below. Each row corresponds to a vectorized acquisition, i.e. to a one-dimensional echo signal.
[0061] In the example of
[0062] In the example of
[0063] The first smoothing value determines how much weight is given to the new measurements forming the sensing matrix S.sub.t and the second smoothing value how much weight is given to the previous clutter components, depicted by a clutter subspace .sub.t-1. In the below examples, the first smoothing value is assumed to be a value for a smoothing factor a.sub.t, 0a.sub.t1, and the second smoothing value is assumed to be a value which is an exponential value of the value of the factor a.sub.t, e.g. {square root over (1-a.sub.t.sup.2)}. The higher the value of a.sub.t, the more weight is given to the new measurements, i.e., the less is smoothed. Clearly, if a.sub.t=1, C.sub.t corresponds to {square root over (K.sub.tQ)}.sup.1 S.sub.t, whereas with a.sub.t=0 the new measurements are not considered at all, i.e., C.sub.t=(.sub.t-1{circumflex over ()}.sub.t-1).sup.T.
[0064] For aperiodic updates, a value of the smoothing factor at may also be determined based on the time between clutter updates; for example, using equation (1):
[0065] wherein T.sub.t is the elapsed time since the previous update at update index t-1 and the current update index t, is a time constant of an exponential moving average (a hyperparameter). Thus, the more time elapses between updates, the more weight is given to the sensing matrix (new measurements) S.sub.t.
[0066] It should be appreciated that smoothing the sensing matrix and/or smoothing the clutter matrix representation may be omitted in some implementations.
[0067] Then the sensing matrix (scaled and smoothed, or scaled, or smoothed, or none of the options) is stacked (block 308) with the clutter matrix representation to form a clutter matrix.
[0068] For example, the current sensing matrix S.sub.t may be stacked (merged) with the clutter subspace from the previous iteration .sub.f-1, allowing to update the clutter components in a computationally efficient manner. A smoothed clutter matrix at update index t may be defined as
[0069] which merges the current sensing matrix S.sub.t with the (smoothed) clutter subspace of the previous iteration .sub.t-1 via exponential smoothing with factor a.sub.t.
[0070] In the example (2) the clutter components from the previous iteration are multiplied by their singular values {circumflex over ()}.sub.t-1, which can be regarded as a measure of how strong (here in the sense of how much energy they scatter back) the corresponding clutter components are. In principle, this scales the subspaces in .sub.t-1, which are unit vectors, to their relevance/significance in previous measurements, allowing direct stacking (merging) with S.sub.t in a unique matrix. The resulting (smoothed) clutter matrix C.sub.t is of dimension (K.sub.t+L.sub.t-1)Q, where L.sub.t-1 is the number of clutter components in .sub.t-1 from the previous update. Typically, only a few clutter components are relevant, allowing C.sub.t to be handled with low complexity.
[0071] It should be appreciated that multiplying with the left singular vectors U.sub.t-1 is not required and hence not performed. It would entail unnecessary computational overhead, since the relevance of each measurement contributing to the generation of the subspace is of no interest to the example of
[0072] In the example illustrated by means of equation (1), it can be seen that in the initial step t=0, there is obviously no previous clutter components (clutter subspace) to resort to such that the first clutter matrix corresponds to the scaled measurements as C.sub.0={square root over (K.sub.tQ)}.sup.1 S.sub.0 The first clutter matrix, or more precisely S.sub.0, correspond to the clutter matrices described in the publication CRAP: Clutter Removal with Acquisitions Under Phase Noise and in the Finnish patent application number 20237037.
[0073] Then the second clutter components are determined based on the clutter matrix. In other words, meaningful clutter components should be extracted from C.sub.t. Extracting/determining the meaningful clutter components facilitates to keep the computational complexity in check, and enables to avoid as much as possible that sensing targets, i.e. targets of interest, that might have been present during one or more sensing occurrences, and hence in one or more corresponding sets (acquisition) of measurement results of the sensing, thereby being added to the sensing matrix, are added to the second clutter components.
[0074] In the example of
[0075] Then a decision threshold is determined (block 310) based on the singular values of the clutter matrix. For example, an upper bound for the singular values of the clutter matrix may be determined to be the decision threshold, for example using a first threshold implementation or a second threshold implementation, that will be described in more detail below, using eigenvalues as an example how to calculate singular value thresholds.
[0076] The first threshold implementation uses a Constant False Alarm Rate (CFAR) approach based on hypothesis testing. Here, the goal is to derive a threshold .sub.sv based on a probability of false alarm P.sub.FA above which the singular values in .sub.t are not considered to be generated by noise. All right singular vectors (rows of V.sub.t.sup.H) corresponding to those singular values are then deemed meaningful/actual clutter components and form the new clutter subspace .sub.t.
[0077] To that end, in the first threshold implementation, the problem is framed as a binary decision whether an eigenvalue x is due to a signal contribution, i.e. a reflection caused by a clutter component, or only due to noise. The eigenvalues are used here, as the distribution of the eigenvalues of the matrix
is Known to approximately follow the Marchenko-Pastur (MP) distribution, if the entries of the sensing matrix S.sub.t are standard complex Gaussian random variables with variance corresponding to the noise power .sub.N.sup.2. This knowledge can be leveraged for the threshold derivation. The singular value threshold can then be computed by taking the square root of the eigenvalue threshold, as the singular values of the sensing matrix S.sub.t are equivalent to the square roots of the eigenvalues of Y.sub.t.
[0078] The solution for this signal detection problem can be obtained by applying the Neyman-Pearson criterion to the likelihood-ratio test
[0079] wherein H.sub.0 is the null hypothesis, i.e., the eigenvalue is due to noise, and H.sub.1 is the alternative hypothesis, i.e., the eigenvalue is due to a signal contribution, i.e. clutter contribution. Moreover, is the decision threshold (an eigenvalue threshold), which is chosen to maximize the probability of detecting the signal for a desired P.sub.FA based on the likelihood function of the null hypothesis f.sub.x (x|H.sub.0).
[0080] To derive this threshold, the probability of a single eigenvalue exceeding n can be written as
[0081] wherein f.sub.x (x|H.sub.0) and F.sub.x (|H.sub.0) represent Probability Density Function (PDF) and Cumulative Distribution Function (CDF) of the random variable X assuming the null hypothesis.
[0082] The probability of false alarm P.sub.FA, i.e., that none of the K eigenvalues exceeds , is
[0083] which can be re-arranged as follows:
[0084] Solving for the threshold n requires F.sub.x (|H.sub.0), i.e., the CDF of X under the assumption that only noise is present. In this case, the current measurement matrix S.sub.t, which is stacked with the clutter components of the previous iteration, is a K.sub.t Q matrix, whose entries are standard complex Gaussian random variables with variance corresponding to the noise power .sub.N.sup.2. As mentioned earlier, the distribution of the eigenvalues of the matrix
is known to approximately follow the MP distribution, whose PDF and CDF can be expressed analytically. Thus, F.sub.x (|H.sub.0) is the CDF of the MP distribution, which can be plugged into equation (7) and yields to a following equation (8):
[0085] wherein: [0086] =K.sub.t/Q, i.e., the ratio between the number of rows and the number of columns, which corresponds to the number of sets (acquisitions) and the number of samples per a set (acquisition), respectively, [0087] a=.sub.N.sup.2(1{square root over ()}).sup.2 is a lower bound for the eigenvalues, [0088] b=ok (1+{square root over ()}).sup.2 is an upper bound for the eigenvalues.
[0089] In equation (8), all quantities except and .sub.N.sup.2 are known, and the latter can be roughly determined with measurements, leaving the threshold as the only left unknown.
[0090] However, solving equation (8) for corresponds to finding the inverse CDF of the MP distribution F.sub.x.sup.1 (|H.sub.0), for which no analytical solution exists. As a workaround, one can determine F.sub.x (|H.sub.0) for a range of values between a and b to construct a lookup table, and then choose that that is closest to
[0091] It is important to note that this lookup table does not require a-priori knowledge of the noise power and can e.g., be constructed with unit noise power .sub.N.sup.2=1. The actual estimated (e.g., measured) noise power {circumflex over ()}.sub.N.sup.2 is then merely a scaling factor.
[0092] The final threshold for the singular values at update index t (dropped from the threshold for better readability) is computed by taking the square root of the eigenvalue threshold as
[0093] the equation (9) including multiplication by {square root over (K.sub.t)}.sup.1 as well as multiplication by the smoothing factor a.sub.t discussed above with block 306, in addition to scaling with the estimated noise power {circumflex over ()}.sub.N.sup.2.
[0094] Still, as the equation (8) depends on =K.sub.t/Q, different lookup tables may be pre-computed in case of varying numbers of acquisitions K.sub.t.
[0095] Moreover, it should be noted that the MP PDF and CDF show some deviations w.r.t. the true (empirical) eigenvalue distribution at the tails. This also impacts the threshold derivation for P.sub.FA.fwdarw.0, making it imprecise. However, it still serves as a good guess for when eigenvalues become significant with reasonable confidence.
[0096] In the second threshold implementation, the decision threshold may be simply determined based on the upper bound of the eigenvalues, i.e., as =b. This approach does not give control about P.sub.FA, but provides a simple way to compute a decision threshold above which eigenvalues can be considered significantly higher than noise, since it does not require sampling the CDF of the MP distribution as in the first threshold implementation. In the second threshold implementation, the final threshold .sub.sv for the singular values may then also obtained with equation (9).
[0097] In numerical trials, with K=50 and Q=NM=15841120=1774080, it has been found that the decision threshold =b corresponds to a false alarm rate of P.sub.FA0.03. It should be noted that this also upper bounds the false alarm probability for which the decision threshold with the first threshold implementation can be determined.
[0098] It must be noted, however, that in practice several effects occur that impact the accuracy of the decision threshold. For example, contributions to the smoothed clutter matrix C.sub.t can typically not be perfectly separated into signal (clutter) and noise components due to leakages causing signal contributions (clutter contributions) to be spread over multiple singular values. Moreover, the noise power .sub.N.sup.2 can be subject to fluctuations and is generally hard to measure precisely.
[0099] To account for those uncertainties, in an implementation an upper bound for the singular values of the clutter matrix is multiplied by a predetermined threshold factor, and a result of the multiplication is determined to be the decision threshold. In other words, the initial .sub.sv determined is multiplied by an additional scaling factor S. This has the further advantage that clutter components that are not present anymore will be removed from the clutter components (second clutter components) more quickly by falling under the threshold earlier.
[0100] When the decision threshold, denoted in
[0101] When all elements have been processed (block 311: yes), the second clutter components have been determined, and the previously determined clutter components of the environment may be updated (block 315) correspondingly to comprise the second clutter components, or elements based on the second clutter components. For example, the previously determined clutter components of the environment may be replaced by the second clutter components. In other words, in an implementation, the right singular vectors in V.sub.t.sup.H corresponding to the singular values exceeding the respective decision threshold .sub.sv form a new clutter subspace .sub.t, which comprises L.sub.t clutter components. For example, a new clutter matrix representation may be a matrix .sub.t{circumflex over ()}.sub.t that is stored for the next iteration (next update).
[0102] When the previously determined clutter components have been updated (block 315) using the second clutter components, the process returns to block 301 to monitor whether updating the clutter components is triggered.
[0103] The event that triggers the update may impact how the parameter values, for example values for the smoothing parameter a.sub.t, the time K.sub.t between acquisitions within a single sensing matrix S.sub.t, and the number of sets (acquisitions) K.sub.t, are selected/determined.
[0104] For example, in case of a high a-priori confidence that the clutter components have changed significantly, it is beneficial to select for the smoothing factor a.sub.t a high value to capture those effects by giving much weight to the new measurements. In similar fashion, an a-priori assessment of the likelihood of the scenario being target-free during the sensing could influence to the value of the smoothing factor a.sub.t. For example, in case of high confidence, a value for the smoothing factor a.sub.t can also be selected to be high. On the other hand, if the confidence is low, less weight should also be given to the measurements by lowering the value of the smoothing factor a.sub.t to reduce the probability of wrongly identifying a target of interest as a clutter component.
[0105] Similar reasoning applies also for K.sub.t, which can be selected to be small if the empty scenario confidence is high. On the other hand, K.sub.t should be increased if the presence of a target of interest cannot be precluded a-priori. A higher K.sub.t typically allows to better decorrelate contributions of a (typically moving) target, making it less likely that such a target causes a strong singular value that will erroneously be added to the clutter components.
[0106] In environments with high noise/interference, the number of sets (acquisitions) K.sub.t should be selected to be high to still allow isolating the clutter components reliably. This parameter value must be selected carefully, however, as a higher value of K.sub.t comes along with a complexity increase due to the singular value decomposition.
[0107] The example procedure of
[0108] The creation of the clutter matrix C.sub.t is performed by stacking (merging) the previous clutter subspace .sub.t-1 (previous clutter components) with new sensing measurements S.sub.t, e.g., with exponential smoothing; scaling the previous clutter subspace .sub.t-1 (the singular vectors) according to their significance in the previous measurements by multiplying with their singular values {circumflex over ()}.sub.t-1, which allows direct merging with S.sub.t, with proper weighting applied to the sensing measurements to preserve desired properties. This approach avoids the necessity of storing and processing all previous measurements at each update, which would be computationally infeasible.
[0109] The extraction of the most meaningful clutter components from the previously created clutter matrix C.sub.t, which span the new clutter subspace .sub.t is achieved by keeping only the meaningful clutter components by examining their singular values and comparing them to a determined decision threshold above which clutter components can be considered significant. Isolating and keeping only the significant components has the advantage that it allows storing only the updated clutter subspace .sub.t (comprising only few clutter components) scaled by their singular values {circumflex over ()}.sub.t, which can be stored as a single matrix and enables a computationally efficient solution.
[0110] Any of the above described processes can be applied to any radar-like sensing operation based on multi-dimensional matrices/tensors, enabling their use for a wide range of applications, including gNB/TRPs and UEs performing sensing operations in cellular/unlicensed systems. However, any of the processes can be implemented in other radar products, where acquiring and tracking clutter components is of interest.
[0111] The updated clutter components, for example the second clutter components, are used in clutter removal during sensing.
[0112] In the example illustrated in
[0113] In the example illustrated in
[0114] The blocks and related functions described above by means of
[0115] The blocks, related functions, and information acquisitions described above by means of
[0116]
[0117] According to an embodiment, there is provided an apparatus comprising at least means for obtaining sets of measurement results of sensing of an environment of which clutter components have been determined; means for transforming, per a set, multi-dimensional representations of echo signals received as measurement results of the set at least partly into one-dimensional echo signals; and means for determining second clutter components based at least on corresponding one-dimensional echo signals and a clutter matrix representation that comprises elements obtained from previously determined clutter components of the environment
[0118] The apparatus 601 may comprise one or more communication control circuitry 620, such as at least one processor, and at least one memory 630, including one or more algorithms 631, such as a computer program code (software) wherein the at least one memory and the computer program code (software) are configured, with the at least one processor, to cause the apparatus to carry out any one of the exemplified functionalities of a corresponding apparatus, described above with any of
[0119] Referring to
[0120] Referring to
[0121] Referring to
[0122] In an embodiment, as shown in
[0123] Similar to
[0124] In embodiments, the CU 720 may generate a virtual network through which the CU 720 communicates with the DU 722. In general, virtual networking may involve a process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Network virtualization may involve platform virtualization, often combined with resource virtualization. Network virtualization may be categorized as external virtual networking which combines many networks, or parts of networks, into the server computer or the host computer (e.g. to the CU). External network virtualization is targeted to optimized network sharing. Another category is internal virtual networking which provides network-like functionality to the software containers on a single system. Virtual networking may also be used for testing the terminal device.
[0125] In embodiments, the virtual network may provide flexible distribution of operations between the DU and the CU. In practice, any digital signal processing task may be performed in either the DU or the CU and the boundary where the responsibility is shifted between the DU and the CU may be selected according to implementation.
[0126] According to an embodiment, there is a system that comprises at least one or more apparatuses configured to transmit sensing signals, for example for obtaining sensing results to update clutter components, and/or for sensing purposes, one or more apparatuses that are configured to remove clutter, and one or more apparatuses configured to update the clutter components.
[0127] As used in this application, the term circuitry may refer to one or more or all of the following: (a) hardware-only circuit implementations, such as implementations in only analog and/or digital circuitry, and (b) combinations of hardware circuits and software (and/or firmware), such as (as applicable): (i) a combination of analog and/or digital hardware circuit(s) with software/firmware and (ii) any portions of hardware processor(s) with software, including digital signal processor(s), software, and memory(ies) that work together to cause an apparatus, such as a terminal device or an access node, to perform various functions, and (c) hardware circuit(s) and processor(s), such as a microprocessor(s) or a portion of a microprocessor(s), that requires software (e.g. firmware) for operation, but the software may not be present when it is not needed for operation. This definition of circuitry applies to all uses of this term in this application, including any claims. As a further example, as used in this application, the term circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or a portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware. The term circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit for an access node or a terminal device or other computing or network device.
[0128] In an embodiment, at least some of the processes described in connection with
[0129] Embodiments and examples as described may also be carried out in the form of a computer process defined by a computer program or portions thereof. Embodiments of the functionalities described in connection with
[0130] Even though the embodiments have been described above with reference to examples according to the accompanying drawings, it is clear that the embodiments are not restricted thereto but can be modified in several ways within the scope of the appended claims. Therefore, all words and expressions should be interpreted broadly and they are intended to illustrate, not to restrict, the embodiment. It will be obvious to a person skilled in the art that, as technology advances, the inventive concept can be implemented in various ways within the scope of independent claims. Further, it is clear to a person skilled in the art that the described embodiments may, but are not required to, be combined with other embodiments in various ways within the scope of independent claims.