METHOD FOR GEOLOCATING INTERFERENCE SOURCE IN COMMUNICATION-BASED TRANSPORT SYSTEM
20230141700 · 2023-05-11
Assignee
Inventors
Cpc classification
B61L2027/204
PERFORMING OPERATIONS; TRANSPORTING
B61L15/0081
PERFORMING OPERATIONS; TRANSPORTING
B61L25/025
PERFORMING OPERATIONS; TRANSPORTING
B61L15/0072
PERFORMING OPERATIONS; TRANSPORTING
G01S5/0249
PHYSICS
B61L15/0027
PERFORMING OPERATIONS; TRANSPORTING
B61L27/20
PERFORMING OPERATIONS; TRANSPORTING
H04B1/1027
ELECTRICITY
International classification
B61L25/02
PERFORMING OPERATIONS; TRANSPORTING
B61L27/20
PERFORMING OPERATIONS; TRANSPORTING
Abstract
A method for geolocating an interference source in a communication-based transport system, wherein the communication-based transport system comprises: —a plurality of interference sources, distributed in a space and respectively emitting signal, —a vehicle, moving along a known trajectory, receiving the signal from the interference sources, and measuring the signal strength of the signal of only one interference source at a time instance; the method comprising: —separating the interference sources by clustering the signal strength of the signal with a clustering method; —estimating the locations of the interference sources in the space based on the separated interference sources.
Claims
1. A method for geolocating an interference source in a communication-based transport system, wherein the communication-based transport system comprises: a plurality of interference sources, distributed in a space and respectively emitting signal, a vehicle, moving along a known trajectory, receiving the signal from the interference sources, and measuring the signal strength of the signal of only one interference source at a time instance; the method comprising: separating the interference sources by clustering the signal strength of the signal with a clustering method; estimating the locations of the interference sources in the space based on the separated interference sources.
2. The method according to claim 1, wherein the communication-based transport system is a communications-based train control system, and the vehicle is a train.
3. The method according to claim 1, wherein the known trajectory comprises known position, velocity and direction of the at least one vehicle.
4. The method according to claim 1, wherein at any time instance, only one interference source emits the signal, so as to avoid collision between the interference sources.
5. The method according to claim 1, wherein the interference sources emit signal using CSMA/CA or CSMA/CD protocols.
6. The method according to claim 1, wherein the interference sources are randomly activated.
7. The method according to claim 1, wherein separating the interference sources and estimating the location of the interference sources are iteratively applied.
8. The method according to claim 7, wherein separating the interference sources uses K-mean clustering method, and estimating the location of the interference sources uses maximum-likelihood estimation.
9. The method according to claim 1, wherein separating the interference sources and estimating the location of the interference sources are sequentially applied.
10. The method according to claim 9, wherein separating the interference sources uses joint Bayesian clustering method, and estimating the location of the interference sources uses Maximum-A-Posteriori (MAP) estimation.
11. The method according to claim 10, wherein separating the interference sources is progressively applied from a previous known knowledge of an interference source.
12. The method according to claim 11, wherein the method further comprising: geometrically dividing the measurements of the signal strength into successive clusters; estimating the locations of the interference sources in one cluster; exploiting the estimated locations of the interference sources in the cluster as the prior knowledge to another cluster in the successive clusters; and filtering significant interference sources from a neighbour to another.
13. The method according to claim 11, wherein the vehicle has a plurality of travels along the known trajectory, and the method further comprises: estimating the locations of the interference sources in one travel; exploiting the estimated locations of the interference sources in the travel as the prior knowledge to other travels.
14. A communication-based transport system for geolocating an interference source, wherein the communication-based transport system comprises: a plurality of interference sources, distributed in a space and respectively emitting signal, a vehicle, moving along a known trajectory and having a radio module, which is capable of receiving the signal from the interference sources and measuring the signal strength of the signal of only one interference source at a time instance; a controller, configured to: separate the interference sources by clustering the measured signal strength of the signal with clustering method; estimate the location of the interference sources in the space by the separated interference sources.
15. A non-transitory computer readable medium storing a computer program comprising program code to be executed by a processor, the program code being adapted to performance of a method as claimed in claim 1 when executed by the processor.
Description
BRIEF DESCRIPTION OF DRAWINGS
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
DESCRIPTION OF EMBODIMENTS
[0044]
[0045] In the system, the train TA has a radio that can receive and measure signal, for example emitted by the interference signals during its moving at a rate R times per second. The path loss in dB is a+b.Math.log d, where d is the receiver and transmitter (Tx−Rx) distance, a and b denote the path loss coefficients. In addition, shadowing between two different positions, such as positions T1 and T2, correlates with a coefficient as: p_0 e{circumflex over ( )}(−(|Δx|)/d_c), where d_c and ρ_0 denote the shadowing coefficients and Δx is the train position difference.
[0046] The interference sources S1, S2 and S3 are in different locations, randomly interfering the train's radio. In the present invention, from one measurement to another, the interference sources are randomly activated. As an example, CSMA/CA is used in the present invention, and it is performed among interference sources close to each other, and therefore a non-contention condition is satisfied.
[0047] In this case, in this embodiment, the measurement belongs to only one source at one moment. However, the interference sources may randomly switch one to another which makes the observation a mixed signal. In addition, the interference appearance is also random due to the data traffic model. Therefore, the present invention solves the geolocation problem by two main steps as follows:
[0048] Source separation: Since an observation can randomly belong to one of interference sources, one needs to identify interference source to which measurements belong.
[0049] Position estimation: Once the observations are separated, the interference sources' positions could be estimated and thus geolocalized.
[0050] These two steps are jointly dependent, the solution of one affects the other.
[0051]
[0052] In the context of the present invention, the following parameters are also defined:
[0053] The train's radio measures the interference power as Z=[Z.sub.1, . . . , Z.sub.n, . . . , Z.sub.N] [0054] Defining a latent variable V=[V.sub.1, . . . , V.sub.n, . . . , V.sub.N] that indicates which interference source is transmitting at each instant. This is not essential, but it is convenient for proceed with the method to be discussed following paragraphs. [0055] Discretizing the space of θ as ℑ. In the present invention, a discrete set of positions is used to numerically implement the method according to the invention. [0056] Defining the position-measurement dependence for all θ in ℑ
Z.sub.n=μ.sub.n+w.sub.n,
where μ.sub.n is obtained from T.sub.n and θ thanks to a predefined function, such as μ.sub.n=a+b log ∥T.sub.n−θ∥; and where w.sub.n is an observation noise (due to shadowing in the propagation channel). [0057] Optionally defining the measurements' correlation of an interference source
[0059] As mentioned, the present invention involves two main steps, i.e. Source separation and Position estimation. As an example, two exemplary mathematical approaches are proposed as follows: [0060] Iterative method: This approach operates iteratively to implement the two steps in the following manners: [0061] Source separation: K-mean clustering method is applied. V is calculated by minimizing the distance from measurements to means. [0062] Position estimation: by having the classifying vector V, the interferers' position θ can be obtained by maximum-likelihood estimation. [0063] Sequential method: by using the Bayesian inference, the source separation is progressively solved by one measurement after another. Then the Maximum-A-Posteriori (MAP) estimation is employed to have the interference source's position.
[0064] These two approaches will be further discussed in the following paragraphs. Before that, a model to implement the two main steps is established as follows:
[0065] Non-overlapping condition: in the embodiment, it is supposed that there is not the collision between interference sources. That means at a time moment, only one interference source emits signal. This condition can be satisfied by using CSMA/CA protocol or CSMA/CD for example. [0066] Known train trajectory: at any moment, the train knows its position as well as its velocity and direction. [0067] A local coordinate system is applied as the one shown in
d.sub.n;k.sup.2=∥T.sub.n−θ.sub.k∥.sup.2 (1) [0069] Interference received power on the train if the interference source k is active at time n
Z.sub.n=a+b log d.sub.n;k+w.sub.n;k, (2) [0070] where a and b are two coefficients of path-loss model and w.sub.n;k denotes the shadow fading on the train with respect to interferer k, at time n. [0071] The shadow fading follows the multivariate Gaussian distribution with the correlation between two train positions T.sub.n and T.sub.m is expressed as
θ=[θ.sub.1, . . . ,θ.sub.k, . . . ,θ.sub.K]. (4) [0075] On the train, the radio module measures the power level of interference from time instant 1 to N, the observation vector can be written as
Z=[Z.sub.1, . . . ,Z.sub.n, . . . ,Z.sub.N]. (5) [0076] In the present invention, it is not known which one among K interferers is active at any time instant. In this sense, the observation is mixed among sources. Considering non-overlapping condition, it is assumed that at a time instant there is only one source is emitting. In other words, when the train measures a signal, this signal belongs to only one interferer. This is to avoid a more complex case where multiple interference sources emit signal at the same time and when the train measures, it measures the combination of these signals. [0077] the following latent variable is introduced, so as to indicate which source is activated at time n.
V=[V.sub.1, . . . ,V.sub.n, . . . ,V.sub.N],
[0078] Based on this model, the two approaches, i.e. iterative method and sequential method, are now discussed. [0079] Iterative method: K-mean clustering+Maximum likelihood position estimation
[0080] In order to separate the interference sources, K-mean clustering algorithm is applied as a simple and efficient method. Since the path-loss model is available, the received power from the source k when the train is at T.sub.n, is centered at μ.sub.n;k=a+b log d.sub.n;k. K-mean algorithm aims to minimize the distance between the observation and the mean point, which is expressed as
[0081] The K-mean clustering algorithm can be described by the pseudo code shown in
[0083] In the sequential method, at time instant n, one need to identify which source is emitting based on the result of n−1 previous estimation. Due to this end, the Bayesian approach is expressed as
[0084] Without any knowledge on the prior P (V.sub.n|V.sub.1:n-1, Z.sub.1:n-1) Z.sub.1:n-1) of time instant n, we assume it follows a uniform distribution. The likelihood P(Z.sub.n|Z.sub.1:n-1, Z.sub.1:n-1, V.sub.n) is computed for each possibility of V.sub.n as follows
[0085] This expression is resulted by saying that once one knows at instant n the k.sup.th source is interfering, the likelihood of observation Z.sub.n depends only on the previous observations that are assigned to k.sup.th source. As seen in the shadowing model, Z.sub.1:n;k is a multivariate Gaussian random variable, therefore the conditional probability P(Z.sub.n;k|Z.sub.1:n-1;k; θ.sub.k) is a Gaussian with mean and variable are expressed as
[0089] Clustering decision is expressed as:
[0090] Posterior at time instance n is calculated as:
[0091] This posterior acts like the prior for the next instant n+1, and the very first prior P(θ.sub.k|Z.sub.0;k) is supposed to be uniform.
[0092] In the last observation, sources' position are estimated by the maximum a posteriori (MAP) estimator as
[0093] On the bases of this algorithm, the following two solutions can be numerically implemented: [0094] Solution 1
[0095] To numerically implement the aforementioned algorithm, the θ's space is discretized.
[0096] The first solution is to process all N observations at once. In this situation, the discretization needs to be fine for obtaining a good precision. Therefore, high computational complexity and memory are required.
[0097] In particular, this first solution can be described by the pseudo code shown in
[0099] Alternatively, when using the sequential approach, data do not need to be processed at once. Indeed it is possible to split data into smaller samples, loosen the discretization then enhance the precision progressively with the sequential clustering. This method is more adaptive for the algorithm in the subsection a) in the sense that it maintains a good precision while guaranteeing a low complexity. Thus, in terms of scalability, partitioning data is more suitable if further we want to take more observations into account.
[0100] This second solution can be described by the pseudo code shown in
[0101] Furthermore, these approaches in the sequential method enable the possibility to take into account a prior knowledge on interference sources' position from other train travels or from a database, as shown in
[0106] Therefore, instead of collecting all measurements of all positions for several train travels and process them as a whole, it is preferable to find an implementation that allows to update frequently the estimation of the interference sources' position.
[0107] It aims to make use the estimation of interference sources of a cluster. This estimation is correlated from one cluster to the next, thus, the result of the estimation for one cluster C11 can be useful for the next cluster C12, and so on in one travel, as illustrated in
[0108] In a word, in the abovementioned exemplary communications-based train control system, the radio on the train observes the channel and measures the power level of interference from interference sources at each position while the train is traveling along a known trajectory, wherein the interference strength depends on the train-interferer distance, and thus the moving train allows geometrically sampling the signal strength of interferences, hence allows estimating the position of interference sources.
[0109] In this regard, the present invention may estimate the spatial characteristic of interference sources in a communication-based transport system based only on the power measurement of the radio hardware in the system, so as to geolocalize the interference sources, without adding any complication to the current radio hardware in the system.
[0110] Moreover, it is known to those skilled in the art, the aforementioned exemplary solutions according to the present invention can be implemented in many ways, such as program instructions for execution by a processor, as software modules, microcode, as computer program product on computer readable media, as logic circuits, as application specific integrated circuits, as firmware, etc. The embodiments of the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
[0111] Furthermore, the embodiments of the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer, processing device, or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be electronic, magnetic, optical, or a semiconductor system (or apparatus or device). Examples of a computer-readable medium include, but are not limited to, a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a RAM, a read-only memory (ROM), a rigid magnetic disk, an optical disk, etc. Current examples of optical disks include compact disk-read-only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
[0112] The embodiments described hereinabove are illustrations of this invention. Various modifications can be made to them without leaving the scope of the invention which stems from the annexed claims.