WO2017155634A1 - Procédés, dispositifs, serveurs, appareil et systèmes destinés à des applications d'internet des objets sans fil - Google Patents

Procédés, dispositifs, serveurs, appareil et systèmes destinés à des applications d'internet des objets sans fil Download PDF

Info

Publication number
WO2017155634A1
WO2017155634A1 PCT/US2017/015909 US2017015909W WO2017155634A1 WO 2017155634 A1 WO2017155634 A1 WO 2017155634A1 US 2017015909 W US2017015909 W US 2017015909W WO 2017155634 A1 WO2017155634 A1 WO 2017155634A1
Authority
WO
WIPO (PCT)
Prior art keywords
csi
time reversal
wireless
client
channel
Prior art date
Application number
PCT/US2017/015909
Other languages
English (en)
Inventor
Oscar Chi-Lim AU
Masato MARUMO
Beibei Wang
Hung-Quoc Duc LAI
K. J. Ray LIU
Chen Chen
Qinyi XU
Yi Han
Zhung-Han WU
Feng Zhang
Zoltan Safar
Jeng-Feng Lee
Thomas Nelson BUTTERMORE, Jr.
Original Assignee
Origin Wireless, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/US2016/066015 external-priority patent/WO2017100706A1/fr
Application filed by Origin Wireless, Inc. filed Critical Origin Wireless, Inc.
Publication of WO2017155634A1 publication Critical patent/WO2017155634A1/fr
Priority to US15/861,422 priority Critical patent/US11025475B2/en
Priority to US15/873,806 priority patent/US10270642B2/en
Priority to US16/101,444 priority patent/US10291460B2/en
Priority to US16/125,748 priority patent/US10833912B2/en
Priority to US16/127,151 priority patent/US11012285B2/en
Priority to US16/127,092 priority patent/US10476730B2/en
Priority to US16/200,608 priority patent/US10735298B2/en
Priority to US16/200,616 priority patent/US10495725B2/en
Priority to US16/203,299 priority patent/US10374863B2/en
Priority to US16/203,317 priority patent/US10397039B2/en
Priority to US16/446,589 priority patent/US10742475B2/en
Priority to US16/667,757 priority patent/US20200064444A1/en
Priority to US16/667,648 priority patent/US11035940B2/en
Priority to US16/790,610 priority patent/US11928894B2/en
Priority to US16/790,627 priority patent/US11397258B2/en
Priority to US16/798,343 priority patent/US11340345B2/en
Priority to US16/798,337 priority patent/US10845463B2/en
Priority to US16/871,000 priority patent/US11500056B2/en
Priority to US16/871,006 priority patent/US11408978B2/en
Priority to US16/870,996 priority patent/US10866302B2/en
Priority to US16/871,004 priority patent/US20200302187A1/en
Priority to US16/909,913 priority patent/US20200322868A1/en
Priority to US16/909,940 priority patent/US11391830B2/en
Priority to US16/945,827 priority patent/US11444710B2/en
Priority to US16/945,837 priority patent/US11439344B2/en
Priority to US17/019,270 priority patent/US20200406860A1/en
Priority to US17/019,273 priority patent/US20200405223A1/en
Priority to US17/019,271 priority patent/US20200408875A1/en
Priority to US17/537,432 priority patent/US20220096003A1/en
Priority to US17/539,058 priority patent/US20220091231A1/en
Priority to US17/540,156 priority patent/US20220091225A1/en
Priority to US17/838,231 priority patent/US20220303167A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/20Monitoring; Testing of receivers
    • H04B17/21Monitoring; Testing of receivers for calibration; for correcting measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/20Monitoring; Testing of receivers
    • H04B17/24Monitoring; Testing of receivers with feedback of measurements to the transmitter
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0048Allocation of pilot signals, i.e. of signals known to the receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving

Definitions

  • TECHNICAL FIELD [0002]
  • the present teaching generally relates to wireless Internet of Things. More specifically, the present teaching relates to computation, storage, application, and processing of channel state information based on time reversal techniques.
  • Smart objects can be connected to the Internet and communicate with each other, either using wired or wireless connections, to form an“Internet of Things.”
  • the smart objects can include, for example, phones, personal desktop l t mputers, tablet computers, refrigerators, and many other items.
  • the objects may be able to determine what users like, want, and/or need, and act accordingly, potentially improving the quality of people’s lives.
  • the term“Internet of Things” was firstly proposed by Kevin Ashton in his presentation at Procter & Gamble in 1999. During the presentation, Ashton envisioned the potential of Internet of Things by stating“The Internet of Things has the potential to change the world, just as the Internet did.
  • a wireless communication technology suitable for low power, low data rate applications is ZigBee. Mainly based on IEEE 802.15.4, ZigBee can operate in the 868 MHz, 915 MHz and 2.4 GHz bands with respective data rates of 20 kb/s, 40 kb/s and 250 kb/s.
  • a similar technology is Z-Wave, whose main purpose is to enable short message transmission from a control node to multiple nodes.
  • the maximum speed of Z-Wave is 200 kb/s working at 2.4 GHz band.
  • An advantage of ZigBee and Z- Wave is the low price. Both of these technologies are designed for low-power applications in battery-operated devices.
  • ZigBee includes a sleep mode mechanism to reduce power consumption.
  • the complexity of hardware is low: 32-128 kbytes of memory is enough to implement the system including the higher layers.
  • the disadvantage of ZigBee and Z-Wave is their low data rate.
  • the 2.4 GHz frequency band is crowded with interfering devices, e.g., microwave ovens, Wi-Fi equipment, and cordless phones.
  • Bluetooth based on IEEE 802.15.1
  • Wi-Fi is a wireless technology for exchanging data over short distances. Compared with ZigBee and Z-Wave, the data rate can be increased to Megabit per second (Mbps).
  • Wi-Fi based on IEEE 802.11, allows an electronic device to exchange data or connect to the Internet wirelessly.
  • the speed of Wi-Fi can be up to several Gigabit per second (Gbps) according to IEEE 802.11ac with the help of multiple-in-multiple-out (MIMO) technology and high order modulation.
  • Gbps gigabit per second
  • MIMO multiple-in-multiple-out
  • time reversal machine (TRM) technology recognizes hidden values of multi-paths and seeks to capture and exploit the inherent structures of the multi-paths to achieve high communication capacity, low power consumption, good battery life, collision-free multiple access, low cost terminal devices, heterogeneous terminal devices, indoor positioning and tracking, life detection, scalability, privacy and security, etc.
  • a high sampling frequency may be used to capture the useful details of the multi-paths.
  • TRM system Some examples that may be achieved by the TRM system include: Indoor positioning/tracking: The TRM system exploits the details of the multi-paths so that each TRM device can determine the current location of the individual receiver; Life detection: The TRM system exploits the changes of the details of the multi-paths and allows TRM devices to detect movements of living things in the environment, e.g., breathing of humans in the environment; and Event monitoring/Security system: The TRM system exploits the changes of the details of the multi-paths and allows TRM devices to detect movement/state change of objects in the
  • the broadband wireless channels used by the time reversal communication may be a set of wireless channels (e.g., Wi-Fi channels with 20 or 40 MHz bandwidth, Zigbee, BlueTooth, Z- Wave), mobile communication channels (e.g., 3G/ 4G/ 5G/ 6G, WiMax), etc. Multiple antennas may be used in the transmitter and receiver. Multiple narrow-band channels may be combined to achieve a large effective bandwidth.
  • the present teaching generally relates to wireless Internet of Things. More specifically, the present teaching relates to computation, storage, application, and processing of channel state information based on time reversal techniques.
  • a time reversal client comprises a processor, a memory communicatively coupled with the processor, and a set of instructions, when executed by the processor based on the memory, that cause the time reversal client to perform the following steps: communicatively coupling with a time reversal server through a network, obtaining a set of channel state information (CSI), wherein the set of CSI is captured when at least one probing signal is sent from the wireless transmitter to the wireless receiver through a wireless multipath channel associated with a space, and causing the set of CSI to be sent to the time reversal server through the network.
  • CSI channel state information
  • a method implemented on a time reversal client that comprises a processor, a memory, and a set of instructions is disclosed. The method comprises:
  • time reversal client communicatively coupling the time reversal client with a time reversal server through a network using the processor and the memory through the set of instructions executed by the processor using the memory
  • the time reversal client comprises at least one of: a wireless transmitter and a wireless receiver; obtaining a set of CSI, wherein the set of CSI is captured when at least one probing signal is sent from the wireless transmitter to the wireless receiver through a wireless multipath channel associated with a space; and causing the set of CSI to be sent to the time reversal server through the network.
  • a time reversal server is disclosed.
  • the time reversal server comprises a processor, a memory communicatively coupled with the processor, and a set of instructions, when executed by the processor based on the memory, that cause the time reversal client to perform the following steps: communicatively coupling with a time reversal client through a network, wherein the time reversal client to comprise at least one of a wireless transmitter and a wireless receiver, wherein the time reversal client to obtain a set of CSI, wherein the set of CSI is captured when at least one probing signal is sent from the wireless transmitter to the wireless receiver through a wireless multipath channel associated with a space, and receiving the set of CSI from the time reversal client through the network.
  • a time reversal parameter generation module comprises a processor, a memory communicatively coupled with the processor, and a set of instructions, when executed by the processor based on the memory, that cause the time reversal parameter generation module to perform the following steps.
  • a request is received for at least one time reversal parameter (TRP) from an authorized time reversal application module.
  • TRP time reversal parameter
  • a particular TRP of the at least one TRP is based on at least one of: a set of test channel state information (CSI) and a set of reference CSI.
  • the set of test CSI is captured when at least one first probing signal is sent through a first wireless multipath channel from a first wireless transmitter to a first wireless receiver.
  • the set of reference CSI is captured when at least one second probing signal is sent through a second wireless multipath channel from a second wireless transmitter to a second wireless receiver. At least one of the set of test CSI and the set of reference CSI is obtained.
  • the set of reference CSI is obtained from at least one of: a CSI storage module and the authorized time reversal application module.
  • the CSI storage module is configured to: store the set of reference CSI in a CSI-storage format in a non-volatile storage system comprising at least one of: a cloud storage module, a networked storage, and a connected storage module, and provide the set of reference CSI in a CSI-transmission format to at least one of: the time reversal parameter generation module and the authorized time reversal application module.
  • the particular TRP is determined based on at least one of: the set of test CSI and the set of reference CSI.
  • the particular TRP is provided to the authorized time reversal application module in response to the request.
  • a method implemented on a time reversal parameter generation module that comprises a processor, a memory, and a set of instructions is disclosed.
  • a request is received for at least one time reversal parameter (TRP) from an authorized time reversal application module.
  • TRP time reversal parameter
  • a particular TRP of the at least one TRP is based on at least one of: a set of test channel state information (CSI) and a set of reference CSI.
  • the set of test CSI is captured when at least one first probing signal is sent through a first wireless multipath channel from a first wireless transmitter to a first wireless receiver.
  • the set of reference CSI is captured when at least one second probing signal is sent through a second wireless multipath channel from a second wireless transmitter to a second wireless receiver.
  • At least one of the set of test CSI and the set of reference CSI is obtained.
  • the set of reference CSI is obtained from at least one of: a CSI storage module and the authorized time reversal application module.
  • the CSI storage module is configured to: store the set of reference CSI in a CSI-storage format in a non-volatile storage system comprising at least one of: a cloud storage module, a networked storage, and a connected storage module, and provide the set of reference CSI in a CSI-transmission format to at least one of: the time reversal parameter generation module and the authorized time reversal application module.
  • the particular TRP is computed based on at least one of: the set of test CSI and the set of reference CSI.
  • the particular TRP is based on at least one of: a time reversal resonating strength (TRRS), a cross- correlation, an inner product of two vectors, a similarity score and a distance score, of two particular CSI from at least one of: the set of test CSI and the set of reference CSI.
  • TRRS time reversal resonating strength
  • the particular TRP is sent to the authorized time reversal application module in response to the request.
  • a method implemented on a time reversal parameter generation module that comprises a processor, a memory, and a set of instructions is disclosed. At least one of a set of test CSI and a set of reference CSI is obtained, using the processor and the memory of the time reversal parameter generation module.
  • the set of test CSI is captured when at least one first probing signal is sent through a first wireless multipath channel from a first wireless transmitter to a first wireless receiver.
  • the set of reference CSI is captured when at least one second probing signal is sent through a second wireless multipath channel from a second wireless transmitter to a second wireless receiver.
  • At least one time reversal parameter (TRP) is generated based on the at least one of: the set of test CSI and the set of reference CSI.
  • the at least one TRP is provided to another module for further processing.
  • a channel state information storage module is disclosed.
  • the channel state information storage module comprises a processor, a memory communicatively coupled with the processor, and a set of instructions, when executed by the processor based on the memory, that cause the channel state information storage module to perform the following steps.
  • a set of reference channel state information (CSI) is obtained.
  • the set of reference CSI is captured when at least one probing signal is sent through a wireless multipath channel between a wireless transmitter and a wireless receiver.
  • the set of reference CSI is stored in a CSI-storage format in a non-volatile storage system comprising at least one of: a cloud storage module, a networked storage module, and a connected storage module.
  • a retrieval request is received for the set of reference CSI.
  • the set of reference CSI is provided in a CSI-transmission format, in response to the request for CSI processing by at least one of: an authorized time reversal parameter generation module for generating at least one time reversal parameter (TRP), an authorized time reversal application module for passing to the authorized time reversal parameter generation module for generating the at least one TRP, and another module.
  • an authorized time reversal parameter generation module for generating at least one time reversal parameter (TRP)
  • an authorized time reversal application module for passing to the authorized time reversal parameter generation module for generating the at least one TRP
  • another module a method implemented on a channel state information storage module that comprises a processor, a memory, and a set of instructions is disclosed.
  • a set of reference channel state information (CSI) is obtained using the processor and the memory of the channel state information storage module.
  • the set of reference CSI is captured when at least one probing signal is sent through a wireless multipath channel between a wireless transmitter and a wireless receiver.
  • the set of reference CSI is stored in a CSI-storage format in a non-volatile storage system comprising at least one of: a cloud storage module, a networked storage module, and a connected storage module.
  • a retrieval request is received for the set of reference CSI.
  • the set of reference CSI is provided in a CSI-transmission format, in response to the request for CSI processing by at least one of: an authorized time reversal parameter generation module for generating at least one time reversal parameter (TRP), an authorized time reversal application module for passing to the authorized time reversal parameter generation module for generating the at least one TRP, and another module.
  • a channel state information storage module comprises a processor, a memory communicatively coupled with the processor, and a set of instructions, when executed by the processor based on the memory, that cause the channel state information storage module to perform the following steps.
  • a set of reference channel state information (CSI) is obtained.
  • the set of reference CSI is captured when at least one probing signal is sent through a wireless multipath channel between a wireless transmitter and a wireless receiver.
  • Each of the set of reference CSI comprises at least one of: a channel impulse response, a channel frequency response, and another channel state data of the wireless multipath channel between the wireless transmitter and the wireless receiver, and a physical layer channel information.
  • Each of the at least one probing signal comprises at least one of: an impulse signal, a pseudo-random sequence, and another probing signal.
  • the set of reference CSI is stored in a CSI-storage format in a non-volatile storage system comprising at least one of: a cloud storage module, a networked storage module, and a connected storage module. A retrieval request is received for the set of reference CSI.
  • the set of reference CSI is provided in a CSI-transmission format, in response to the request for CSI processing by at least one of: an authorized time reversal parameter generation module for generating at least one time reversal parameter (TRP), an authorized time reversal application module for passing to the authorized time reversal parameter generation module for generating the at least one TRP, and another module.
  • TRP time reversal parameter
  • an authorized time reversal application module for passing to the authorized time reversal parameter generation module for generating the at least one TRP
  • another module a time reversal application module.
  • the time reversal application module comprises a processor, a memory communicatively coupled with the processor, and a set of instructions, when executed by the processor based on the memory, that cause the time reversal application module to perform the following steps.
  • a particular TRP is based on at least one of: a set of test channel state information (CSI) identified by a first identification information, and a set of reference CSI identified by a second identification information.
  • the set of test CSI is captured when at least one first probing signal is sent through a first wireless multipath channel from a first wireless transmitter to a first wireless receiver.
  • the set of reference CSI is captured when at least one second probing signal is sent through a second wireless multipath channel from a second wireless transmitter to a second wireless receiver.
  • At least one request for the at least one TRP is sent to at least one TRP generation module communicatively coupled with the time reversal application module.
  • the at least one TRP is received in a TRP format from the at least one TRP generation module. At least a part of the task is caused to be performed based on the at least one TRP received in the TRP format.
  • a method implemented on a time reversal application module that comprises a processor, a memory, and a set of instructions is disclosed. It is determined that a task is to be performed based on at least one time reversal parameter (TRP), using the processor and the memory of the time reversal application module with the set of instructions.
  • TRP time reversal parameter
  • a particular TRP is based on at least one of: a set of test channel state information (CSI) identified by a first identification information, and a set of reference CSI identified by a second identification information.
  • CSI test channel state information
  • the set of test CSI is captured when at least one first probing signal is sent through a first wireless multipath channel from a first wireless transmitter to a first wireless receiver.
  • the set of reference CSI is captured when at least one second probing signal is sent through a second wireless multipath channel from a second wireless transmitter to a second wireless receiver.
  • At least one request for the at least one TRP is sent to at least one TRP generation module
  • a method implemented on a time reversal application module that comprises a processor, a memory, and a set of instructions is disclosed. It is determined that a task is to be performed based on at least one time reversal parameter (TRP), using the processor and the memory of the time reversal application module with the set of instructions.
  • TRP time reversal parameter
  • a particular TRP is based on at least one of: a set of test channel state information (CSI) identified by a first identification information, and a set of reference CSI identified by a second identification information.
  • the set of test CSI is captured when at least one first probing signal is sent through a first wireless multipath channel from a first wireless transmitter to a first wireless receiver.
  • the set of reference CSI is captured when at least one second probing signal is sent through a second wireless multipath channel from a second wireless transmitter to a second wireless receiver.
  • a particular test CSI comprises at least one of: a first channel impulse response, a first channel frequency response, and another first channel state data of the first wireless multipath channel between the first wireless transmitter and the first wireless receiver.
  • a particular reference CSI comprises at least one of: a second channel impulse response, a second channel frequency response, and another second channel state data of the second wireless multipath channel between the second wireless transmitter and the second wireless receiver.
  • the particular TRP is based on at least one of: a time reversal resonating strength (TRRS), a cross-correlation, an inner product, a similarity score and a distance score of the particular test CSI and the particular reference CSI.
  • TRRS time reversal resonating strength
  • At least one request for the at least one TRP is sent to at least one TRP generation module communicatively coupled with the time reversal application module.
  • the at least one TRP is received in a TRP format from the at least one TRP generation module.
  • a software product in accord with this concept, includes at least one machine- readable non-transitory medium and information carried by the medium.
  • the information carried by the medium may be executable program code data, parameters in association with the executable program code, and/or information related to a user, a request, content, or information related to a social group, etc.
  • FIG.1 shows an exemplary diagram of a time-reversal system for the Internet of Things, according to an embodiment of the present teaching
  • FIG.2 shows an exemplary diagram showing the time reversal signal processing principle, according to an embodiment of the present teaching
  • FIG.3 shows an exemplary graph showing the temporal focusing effect of time- reversal signals, according to an embodiment of the present teaching
  • FIG.4 shows an exemplary graph showing the spatial focusing effect of time-reversal signals, according to an embodiment of the present teaching
  • FIG.5 shows an exemplary graph showing the spatial focusing effect of time-reversal signals in an office environment, according to an embodiment of the present teaching
  • FIG.6 shows an exemplary diagram showing the time reversal monitoring system based on the TRM using statistics-modelling-based approach Part I, according to an embodiment of the present teaching
  • FIG.7 shows an exemplary diagram showing the time reversal
  • the present disclosure generally relates to systems, methods, medium, devices, servers, and other implementations directed to computation, storage, application, and processing of channel state information (CSI) based on time reversal techniques.
  • the CSI may come from a wireless multipath channel in a rich scattering environment.
  • Each path of the multipath channel may be treated as a widely distributed virtual antenna such that the multipath channel can provide a high- resolution spatial-temporal resonance, i.e., the focusing effect.
  • the system disclosed in the present teaching may comprise a time reversal parameter generation module, a channel state information storage module, and/or a time- reversal application module.
  • Each of the three modules may include a processor, a memory communicatively coupled with the processor, and a set of instructions, when executed by the processor based on the memory, that cause the module to perform some steps.
  • the time reversal parameter generation module can obtain a set of test CSI and a set of reference CSI.
  • the set of test CSI may be captured when a first probing signal is sent through a first wireless multipath channel from a first wireless transmitter to a first wireless receiver.
  • the set of reference CSI is captured when a second probing signal is sent through a second wireless multipath channel from a second wireless transmitter to a second wireless receiver.
  • the first probing signal may comprise at least one of: a first impulse signal, a first pseudo-random sequence and another first probing signal.
  • the second probing signal may comprise at least one of: a second impulse signal, a second pseudo-random sequence, and another second probing signal.
  • the first wireless multipath channel and the second wireless multipath channel may be at least one of: a Wi-Fi channel, a Wi-Fi-like channel, an LTE channel, an LTE-like channel, a WiMax channel, a WiMax-like channel, and another wireless multipath channel.
  • the first wireless transmitter and the first wireless receiver are included in a time reversal client.
  • the time reversal client may be communicatively coupled with a time reversal server through a network.
  • the time reversal client may cause a set of CSI, e.g. the set of test CSI, and/or an identification data to be sent to the time reversal server through the network.
  • the network may be at least one of: internet, an internet-protocol network, and another multiple access network.
  • the wireless transmitter and the wireless receiver may be associated with the physical layer of at least one of: a wireless PAN, IEEE 802.15.1 (Bluetooth), a wireless LAN, IEEE 802.11 (Wi-Fi), a wireless MAN, IEEE 802.16 (WiMax), WiBro, HiperMAN, mobile WAN, GSM, GPRS, EDGE, HSCSD, iDEN, D-AMPS, IS-95, PDC, CSD, PHS, WiDEN, CDMA2000, UMTS, 3GSM, CDMA, TDMA, FDMA, W-CDMA, HSDPA, W-CDMA, FOMA, 1xEV-DO, IS-856, TD- SCDMA, GAN, UMA, HSUPA, LTE, 2.5G, 3G, 3.5G, 3.9G, 4G, 5G, 6G, 7G and beyond, another wireless system and another mobile system.
  • the time reversal client may be associated with at least one of: a user and a user client, by an identification server through the time reversal server using an identification data of the time reversal client.
  • At least one of the first wireless multipath channel and the second wireless multipath channel may be associated with a space.
  • the time reversal client may perform or help to perform at least one of the following: guarding the space, classifying an event associated with the space, classifying a security event associated with the space to be secured, identifying a periodic activity associated with the space, computing an analytics associated with the space, and computing a breathing analytics associated with a living object in the space.
  • a user device or user module may request the time reversal server to perform a task based on a TRP which is based on at least one of: the set of CSI and another set of CSI.
  • the user device may send a user identification data to the time reversal server.
  • the user device may be associated with at least one of: the time reversal client, the wireless transmitter, the wireless receiver, the wireless multipath channel, the space and the set of CSI, by an identification server associated with the time reversal server through the user identification data from the user device and an identification data from the time reversal client.
  • the identification server may comprise a processor, a memory
  • a set of instructions to be executed by the processor using the memory to: receive a first identification data of a time reversal (TR) client through a TR server, wherein the TR client to comprise at least one of: a wireless transmitter and a wireless receiver, wherein the TR client is connected to the TR server through a network, wherein a set of CSI is captured when at least one probing signal is sent from the wireless transmitter to the wireless receiver through a wireless multipath channel associated with a space, receive a second identification data of a user module through the TR server, wherein the user module to request the TR server to perform a task based on a time reversal parameter (TRP) which is based on at least one of: the set of CSI and another set of CSI, and associate the user module with the TR client based on the first identification data and the second identification data.
  • TRP time reversal parameter
  • the present teaching also discloses a method of an identification server for performing the above steps, and a TR system comprising the TR server, the TR client, and the identification server.
  • the TR client may send the first identification data to the TR server through a first network.
  • the user module may send the second identification data to the TR server through a second network. At least one of the first network and the second network is the Internet.
  • At least one of the first identification data and the second identification data comprise at least one of: an alpha- numeric name, a number, a code, an internet protocol (IP) address, a MAC address, a hardware address, a port number, a globally unique ID (GUID), a universally unique ID (UUID), a user name, a user ID, a postal address, a physical address, a telephone number, a social network ID, an email address, a web address, a list of ID of private network devices, a list of WiFi router names, a software name, a software ID, a software version, an ID of the wireless transmitter, and an ID of the wireless receiver.
  • IP internet protocol
  • GUID globally unique ID
  • UUID universally unique ID
  • At least one probing signal comprises at least one of: an impulse signal, a pseudo-random sequence, and another probing signal.
  • Digital data may be communicated between the wireless transmitter and the wireless receiver using the set of CSI.
  • the digital data may be in a waveform to be designed for at least one of: wireless power transfer, wireless communication, wireless event detection, and wireless channel analysis, associated with the wireless transmitter and the wireless receiver.
  • the waveform may be designed to maximize and/or improve the power transfer efficiency.
  • the waveform may be designed to improve user QoS, such as improving sum rate, worst-case user rate, BER etc.
  • a conjugated waveform may be designed for calculating the TRP, and thus improving the
  • power may be wirelessly transferred between the wireless transmitter and the wireless receiver using the set of CSI to perform wireless charging.
  • Each of the first wireless transmitter, the first wireless receiver, the second wireless transmitter and the second wireless receiver may have at least one antenna.
  • Each of the set of test CSI may be captured when one of the at least one first probing signal is sent through the first wireless multipath channel from one of at least one antenna of the first wireless transmitter to one of at least one antenna of the first wireless receiver.
  • Each of the set of reference CSI may be captured when one of the at least one second probing signal is sent through the second wireless multipath channel from one of at least one antenna of the second wireless transmitter to one of at least one antenna of the second wireless receiver.
  • the system may determine a particular time reversal parameter (TRP) based on the set of test CSI and/or the set of reference CSI.
  • TRP time reversal parameter
  • the TRP may be utilized in various use cases.
  • the TRP may be determined based on a time reversal resonance strength (TRRS) which can characterize a similarity between two CSIs.
  • TRRS time reversal resonance strength
  • a manager of an animal zoo can put a Wi-Fi device, served as a Bot, on an animal in cage, e.g. a monkey, a tiger, or a bird, and utilize the disclosed system to determine a location of the animal in the cage and/or determine whether the animal is outside the cage.
  • the disclosed system can use another Wi-Fi device, served as Origin here, to obtain reference CSIs from the Bot for all possible locations the Bot can be in the cage and store these reference CSIs associated with corresponding locations in the cage. Then during the positioning process, the system can detect the test CSI of the Bot at any time, determine a similarity, e.g. based on TRRS, between the test CSI and each of the stored reference CSIs, and select the stored reference CSI that is closest to the test CSI, e.g. when their TRRS is the largest among all TRRS calculated based on the test CSI and the stored reference CSIs.
  • a similarity e.g. based on TRRS
  • the system can estimate that the Bot as well as the animal is located at the location in the cage corresponding to the selected reference CSI at this time. In another case, when the largest TRRS does not exceed the pre-determined threshold, the system can estimate that the Bot as well as the animal is outside the cage at this time. This may give an alert that the animal has escaped from the cage.
  • similar localizations as above can be applied for locating an object in a predetermined range based on the TRP determined based on a degree of similarity between test CSI and reference CSI.
  • the particular TRP may be calculated based on at least one of: a TRRS, a cross-correlation, an inner product of two vectors, a similarity score, a distance score, a phase correction, a timing correction, a timing compensation, and a phase offset compensation, of two particular CSI from at least one of: the set of test CSI and the set of reference CSI.
  • the particular TRP may be calculated based on an inner- product of two vectors corresponding to two particular CSI each of which comes from at least one of: the set of test CSI and the set of reference CSI.
  • multiple intermediate TRPs may be combined to provide a final TRP.
  • Each of the multiple intermediate TRPs may be based on two particular CSIs associated with small bandwidth, while the final TRP may be associated with a larger bandwidth.
  • the determination of the particular TRP comprises preprocessing two particular CSI each of which comes from at least one of: the set of test CSI and the set of reference CSI, before the computation of the particular TRP based on the two particular preprocessed CSI.
  • the determination of at least one TRP may comprise: transforming two particular CSI from at least one of: the set of test CSI and the set of reference CSI, and using the two particular transformed CSI in the determination of the at least one TRP.
  • This determination may be based on at least one of: a transformation, a frequency-domain folding, a frequency-domain phase offset cleaning, a time-domain operation and another operation, to correct at least one of: a carrier frequency offset (CFO), a sampling frequency offset (SFO), a carrier phase offset (CPO), a sampling phase offset (SPO), an initial phase offset (IPO), a symbol timing offset (STO), and another problem, in the two particular CSI before the computation of the particular TRP.
  • CFO carrier frequency offset
  • SFO sampling frequency offset
  • CPO carrier phase offset
  • SPO sampling phase offset
  • IP initial phase offset
  • STO symbol timing offset
  • the frequency-domain folding of a CSI may comprise creating at least one new CSI feature each by combining a respective pair of frequency-domain components of the CSI with related phases such that the at least one new CSI feature is free from at least one of: CFO, SFO, CPO, SPO, IPO, and STO.
  • the frequency-domain phase offset cleaning of a CSI may comprises: estimating at least one of a frequency-domain linear phase component of the CSI and a frequency- domain initial phase component of the CSI, and subtracting the at least one of: estimated frequency-domain linear phase component and estimated frequency-domain initial phase component, from the frequency-domain components of the CSI such that the frequency-domain components of the CSI are free from at least one of: CFO, SFO, CPO, SPO, IPO, and STO.
  • the set of reference CSI may be obtained from a CSI storage module and/or an authorized time reversal application module.
  • the CSI storage module may store the set of reference CSI in a CSI-storage format in a non-volatile storage system, e.g.
  • the set of reference CSI may be stored with a set of second auxiliary data associated with the set of reference CSI.
  • the set of reference CSI may be stored based on antenna information of the wireless transmitter and wireless receiver.
  • the CSI storage module may also receive a retrieval request for the set of reference CSI and provide the set of reference CSI in a CSI-transmission format to a time reversal parameter generation module for generating TRP, to an authorized time reversal application module for performing a task based on TRP, and/or to another module for CSI processing, through at least one interface that is made available to at least one of: an authorized time reversal parameter generation module, an authorized time reversal application module, and another module.
  • the CSI processing may comprise:
  • analyzing the set of reference CSI provided in the CSI-transmission format determining at least one value based on at least one of: a temporal behavior of the set of reference CSI, a periodic behavior of the set of reference CSI, a cyclo-stationary behavior of the set of reference CSI, a variational behavior of a similarity score between temporally adjacent CSI, a spatial behavior of the set of reference CSI, and a focusing-ball behavior of a similarity score between spatially adjacent CSI.
  • an analytics server may comprise a processor, a memory communicatively coupled with the processor, and a set of instructions to be executed by the processor using the memory to: obtain through a time reversal (TR) server a set of channel state information (CSI) stored in a CSI storage module, wherein the CSI storage module obtained the set of CSI from a TR client through the TR server and a network, wherein the TR client to comprise at least one of: a wireless transmitter and a wireless receiver associated with a space, wherein the set of CSI is captured when at least one probing signal is sent from the wireless transmitter to the wireless receiver through a wireless multipath channel associated with the space, analyze the set of CSI, compute a set of analytics based on the set of CSI, and store the set of analytics.
  • TR time reversal
  • CSI channel state information
  • the set of CSI may be associated with a user or the space.
  • the time reversal client is associated with at least one of: a user and a user client, by an identification server through the time reversal server using an identification data of the time reversal client.
  • the present teaching also discloses a method of an analytics server for performing the above steps, and a TR system comprising the CSI storage module, and the analytics server.
  • a user device may request the time reversal server to perform a task based on a time reversal parameter (TRP) which is based on at least one of: the set of CSI and another set of CSI.
  • TRP time reversal parameter
  • the user device may send a user identification data to the time reversal server.
  • the user device is associated with at least one of: the time reversal client, the wireless transmitter, the wireless receiver, the wireless multipath channel, the space and the set of CSI, by an identification server associated with the time reversal server through the user identification data from the user device and an identification data from the time reversal client.
  • a big data server may comprise a processor, a memory communicatively coupled with the processor, and a set of instructions to be executed by the processor using the memory to: receive a query associated with a target from a third party server, determine through an association server that at least one of: the target and the query, are associated with at least one of: a set of analytics and a set of channel state information (CSI) associated with the set of analytics, wherein the set of analytics to be computed by an analytics server based on the set of channel state information (CSI) stored in a CSI storage module, wherein the CSI storage module obtained the set of CSI from a TR client through a TR server and a network, wherein the TR client to comprise at least one of: a wireless transmitter and a wireless receiver associated with a space, wherein the set of CSI is captured when at least one probing signal is sent from the wireless transmitter to the wireless receiver through a wireless multipath channel associated with the space, obtain at least one of: the set of analytics and the set of
  • the present teaching also discloses a method of a big data server for performing the above steps, and a TR system comprising the third party server, and the big data server.
  • the CSI-transmission format may be different from or the same as the CSI-storage format.
  • the set of reference CSI may be processed and represented using a first method in the CSI-storage format to achieve at least one of: reduced storage size, high security, privacy, ease of access, low computational complexity, fast search, low power, ease of management, low hardware requirement, low software requirement, another big data advantage and another storage advantage.
  • the set of reference CSI may be processed and represented using a second method in the CSI-transmission format to achieve at least one of: reduced transmission bandwidth, streaming, low latency, low delay, low computational complexity, high security, low hardware requirement, low power, ease of management, yet another big data advantage, another network advantage and another transmission advantage.
  • a set of auxiliary information associated with the set of reference CSI may be stored and/or provided together with the set of reference CSI.
  • the auxiliary information may include some other sensor output, e.g. gyro, GPS output, etc.
  • a particular CSI among the CSI obtained or stored may comprise at least one temporal component each with respective time information.
  • the at least one temporal component of the particular CSI may be stored in a time-reversed order in the CSI-storage format, and the at least one temporal component of the particular CSI may be provided in a time- reversed order in the CSI-transmission format.
  • the set of reference CSI may be partitioned into at least one subset. Each respective one of the at least one subset of reference CSI may be processed and represented in a respective way in at least one of: the CSI-storage format and the CSI-transmission format.
  • each reference CSI comprises N components partitioned into M groups, where M is not greater than N.
  • M is not greater than N.
  • Each of the M groups of CSI components may be processed and represented in a respective way in the CSI-storage format.
  • the request for at least one TRP may be received through the at least one interface.
  • the at least one TRP can be provided to the authorized time reversal application module through the at least one interface.
  • the time reversal parameter generation module may partitioning the set of test CSI into N first subsets of test CSI, wherein N is an integer greater than 1, partitioning the set of reference CSI into N second subsets of reference CSI, determining N partial TRP, wherein each partial TRP is determined based on at least one of: a first subset of test CSI and a second subset of reference CSI, and computing the particular TRP as an aggregate of the N partial TRP.
  • each of the set of test CSI may comprise at least one of: at least one of: a first channel impulse response, a first channel frequency response, and another first channel state data of the first wireless multipath channel between the first wireless transmitter and the first wireless receiver; each of the set of reference CSI may comprise at least one of: a second channel impulse response, a second channel frequency response, and another second channel state data of the second wireless multipath channel between the second wireless transmitter and the second wireless receiver; each of the at least one probing signal may comprise at least one of: an impulse signal, a pseudo-random sequence, and another probing signal.
  • the time reversal application module may determine that a task is to be performed based on at least one TRP of which a particular TRP may be determined based on at least one of: the set of test CSI identified by a first identification information, and the set of reference CSI identified by a second identification information.
  • the time reversal application module may send at least one request for the at least one TRP to at least one TRP generation module communicatively coupled with the time reversal application module, and receive the at least one TRP in a TRP format from the at least one TRP generation module. Based on the at least one TRP received in the TRP format, the time reversal application module may cause at least a part of the task to be performed.
  • the time reversal application module and/or the TRP generation module may use at least one of the first identification information of the set of test CSI and the second identification information of the set of reference CSI to access at least one of: the set of test CSI and the set of reference CSI.
  • the time reversal application module may analyze at least one of: the set of test CSI, the set of reference CSI and the at least one TRP in the time domain and/or the frequency domain. In one example, the time reversal application module may compute at least one periodic behavior analytic based on a periodic pattern of a parameter associated with at least one of: the set of test CSI, the set of reference CSI and the at least one TRP.
  • the time reversal application module may compute at least one spatial analytic based on at least one of: a spatial behavior of the at least one TRP, map information, a previous location, and another spatial information.
  • the time reversal application module may compute at least one navigational analytic based on at least one of: a previous location, a spatial behavior of the at least one TRP relative to the previous location, a navigation correction, a map information, and another spatial information.
  • the time reversal application module may perform at least one of event detection, object motion detection, and human activity detection based on a comparison of the set of test CSI with the set of reference CSI through the at least one TRP.
  • the time reversal application module may perform at least one human activity analysis based on an analysis of at least one of: the set of test CSI, the set of reference CSI, and the at least one TRP.
  • the time reversal application module may perform at least one of: tracking of mechanic cyclo-periodic action, event detection regarding a space to be monitored, and security event detection regarding a space to be guarded, based on a comparison of the set of test CSI with the set of reference CSI through the at least one TRP.
  • the time reversal application module may perform at least one of: fall-down detection, periodic motion monitoring, breathing monitoring, and human counting based on breathing monitoring, based on a temporal analysis of the set of test CSI with the set of reference CSI through the at least one TRP.
  • the time reversal application module may perform at least one of: wireless power transfer, waveform selection, and human identification based on at least one of: the set of test CSI, the set of reference CSI, and the at least one TRP.
  • the time reversal application module may provide a set of data associated with the task to another module for further processing and/or storage.
  • the set of data may be provided in a particular format.
  • the particular TRP is further based on at least one of: another set of test CSI and another set of reference CSI.
  • the another set of test CSI is captured when a third probing signal is sent through a third wireless multipath channel from a third wireless transmitter to a third wireless receiver.
  • the another set of reference CSI is captured when a fourth probing signal is sent through a fourth wireless multipath channel from a fourth wireless transmitter to a fourth wireless receiver.
  • the first wireless transmitter may be the third wireless transmitter
  • the first wireless receiver may be the third wireless receiver
  • the second wireless transmitter may be the fourth wireless transmitter
  • the second wireless receiver may be the fourth wireless receiver.
  • the first identification information of the set of test CSI comprises at least one identification associated with at least one of: the first wireless transmitter, the first wireless receiver, a first time stamp associated with the set of test CSI, a first time range associated with the set of test CSI, a first household associated with the set of test CSI, a first venue associated with the set of test CSI, a first physical address associated with the set of test CSI, a first internet protocol (IP) address associated with the set of test CSI, a first MAC address associated with the set of test CSI, a first hardware address associated with the set of test CSI, a first communication address associated with the set of test CSI, a first storage address associated with the set of test CSI, a first memory address associated with the set of test CSI, a first storage module associated with the set of test CSI, a first network address associated with the set of test CSI, a first pointer to a look-up table entry associated with the set of test CSI, a first uniform resource locator
  • the second identification information of the set of reference CSI comprises at least one identification associated with at least one of: the second wireless transmitter, the second wireless receiver, a second time stamp associated with the set of reference CSI, a second time range associated with the set of reference CSI, a second household associated with the set of reference CSI, a second venue associated with the set of reference CSI, a second physical address associated with the set of reference CSI, a second internet protocol (IP) address associated with the set of reference CSI, a second MAC address associated with the set of reference CSI, a second hardware address associated with the set of reference CSI, a second communication address associated with the set of reference CSI, a second storage address associated with the set of reference CSI, a second memory address associated with the set of reference CSI, a second storage module associated with the set of reference CSI, a second network address associated with the set of reference CSI, a second pointer to a look-up table entry associated with the set of reference CSI, a second uniform resource locator
  • the set of test CSI is partitioned into N subsets based on at least one of: at least one first sampling period, at least one first frequency band, at least one first carrier frequency, at least one first transmitting antenna of the first wireless transmitter, at least one first receiving antenna of the first wireless receiver, at least one first transmitting phase of the first wireless transmitter, at least one first receiving phase of the first wireless receiver, at least one first transmitting antenna orientation of the first wireless transmitter, at least one first receiving antenna orientation of the first wireless receiver, at least one first transmitting antenna position of the first wireless transmitter, and at least one first receiving antenna position of the first wireless receiver.
  • the set of reference CSI may be partitioned into N subsets based on at least one of: at least one second sampling period, at least one second frequency band, at least one second carrier frequency, at least one second transmitting antenna of the second wireless transmitter, at least one second receiving antenna of the second wireless receiver, at least one second transmitting phase of the second wireless transmitter, at least one second receiving phase of the second wireless receiver, at least one second transmitting antenna orientation of the second wireless transmitter, at least one second receiving antenna orientation of the second wireless receiver, at least one second transmitting antenna position of the second wireless transmitter, and at least one second receiving antenna position of the second wireless receiver.
  • N may be greater than 1.
  • One particular TRP may be determined by: computing N partial TR values based on at least one of: the N subsets of test CSI and the N subsets of reference CSI, and computing the particular TRP as a weighted function of the N partial TR values.
  • the weighted function is at least one of: a weighted arithmetic mean, a weighted mode, a weighted median, a weighted geometric mean, a weighted harmonic mean, a weighted generalized mean, a weighted root mean square, another weighted function and a robust weighted function.
  • FIG.40 illustrates exemplary relationships among various modules or components disclosed in the present teaching, according to an embodiment of the present teaching.
  • the OW engine 4003 may call the TRP generation module 4002 to compute time reversal parameter (TRP), e.g. TRRS, and perform various
  • the OW engine 4003 may be a software, an app and/or a driver.
  • the OW engine 4003 may be a hardware (e.g. containing a chip, an ASIC, an FPGA, a DSP, a microcontroller, a CPU, and/or a GPU, etc.) with matching software/app/driver.
  • the OW engine 4003 may be the TR server 4022.
  • the OW engine 4003 may also be the TR application module 4006.
  • the OW engine 4003 may also be the TR client 4020.
  • the OW engine 4003 may be updated by connecting to the TR server 4022 and downloading updated
  • the TRP generation module 4002 may need one or more CSI which may be reference CSI stored in the CSI storage module 4010 and/or test CSI freshly captured by the TR client 4020, which may serve as an origin working in conjunction with at least one bot (e.g. Bot14032 and/or Bot24034) here.
  • the TR Client 4020 may be a bot and at least one of Bot14032 and Bot24034 may be an origin.
  • the TRP generation module 4002 may request and fetch CSI directly from CSI storage module 4010 and/or TR Client 4020, or obtain the CSI through the OW Engine 4003.
  • the TRP generation module 4002 may be a software, an app and/or a driver.
  • the TRP generation module 4002 may be part of the OW engine 4003.
  • the TR application module 4006 in this example can call the OW Engine 4003 (either directly or via the TR server 4022) to perform part or all of a task 4016.
  • the TR application module 4006 may be a driver, an app and/or a software.
  • the TR application module 4006 may be a hardware (e.g.
  • the TR application module 4006 may be the user module 4024.
  • the TR application module 4006 may provide the user interface.
  • the TR application module 4006 may be the TR server 4022.
  • the TR application module 4006 may be the TR client 4020.
  • the TR application module 4006 may also be a server interacting with the user module 4024, and the TR server 4022.
  • the user module 4024 may be a software, an app, a smart phone, a computer, a computing device, a wired device, a wireless device, and/or a smart device that may have a driver, an APP and/or a software (e.g. TR application module 4006) installed. It may also be a hardware that can run software or call a web service related to the TR application module 4006. Associated with the user module 4024, there may be one or more user, with associated user information and/or user profile (e.g. name, address, phone number, email address, phone book, contact list, family info, household information (info), work info, school info, preference, history, habit, etc) which may be part of the ID info associated with the user module 4024.
  • user information and/or user profile e.g. name, address, phone number, email address, phone book, contact list, family info, household information (info), work info, school info, preference, history, habit, etc
  • Associated with the user module 4024 there may be associated information related to its network, its IP address, its MAC address, its physical address, its hardware address, other device address/name (in the same network, or in the vicinity), SIM ID, series number, phone number, etc, which may also be part of the ID info associated with the user module 4024.
  • the user module 4024 may send the ID info to the TR server 4022. Either the user module 4024 and/or TR application module 4006 may be sandboxed.
  • the ID server 4028 may be configured for associating (1) the CSI data and/or associated analytics from the analytics server 4018, (2) auxiliary information, (3) a user of the user module 4024 with associated user information and/or user profile, (4) the TR client 4020, (5) the Bot14032 and/or the Bot24034, (5) the space between the TR client 4020 and Bot14032 (or Bot2 4034), and/or (6) another user associated with the space.
  • the ID server 4028 may be configured for associating (1) the CSI data and/or associated analytics from the analytics server 4018, (2) auxiliary information, (3) a user of the user module 4024 with associated user information and/or user profile, (4) the TR client 4020, (5) the Bot14032 and/or the Bot24034, (5) the space between the TR client 4020 and Bot14032 (or Bot2 4034), and/or (6) another user associated with the space.
  • the ID server 4028 may be configured for associating (1) the CSI data and/or associated analytics from the analytics server 4018, (2) auxiliary
  • the input to the ID server 4028 may include CSI, time stamp, identification (ID) information (info) of TR client 4020, ID info of Bot14032, ID info of Bot24034, ID info of the user of the user module 4024, ID info of the space, event history, IP address, physical address, MAC address, hardware address, other device address/name, SIM ID, series number, information associated with the network (including the internet 4040, the WiFi 4038 and LTE 4036) associated with the TR client 4020, information associated with another network associated with the user module 4024 and/or the application module 4006, information associated with the sponsor 4026, auxiliary information, etc.
  • ID identification
  • info information of TR client 4020
  • ID info of Bot14032 ID info of Bot24034
  • ID info of the user of the user module 4024 ID info of the space
  • event history IP address
  • physical address physical address
  • MAC address hardware address
  • SIM ID series number
  • information associated with the network including the internet 4040, the WiFi 4038 and LTE 4036
  • the ID server 4028 may be in the cloud or in some data center. It may be located close to the TR server 4022.
  • the ID server 4028 may be a software, an app and/or a driver. It may be a hardware (e.g. containing a chip, an ASIC, an FPGA, a DSP, a microcontroller, a CPU, and/or a GPU, etc.) with matching software/app/driver.
  • the ID server 4028 may be the TR server 4022.
  • the ID server 4028 may be the TR client 4020.
  • the TR client 4020 may be a wireless device with connection to the TR server 4022 (e.g. through internet 4040, WiFi 4038 and/or LTE 4036).
  • the WiFi 4038 may include bluetooth, other Bluetooth-like system, WiFi, other WiFi-like system, and other wireless system.
  • the LTE 4036 may include all cellular networks such as 2G, 2.5G, 3G, 3.5G, 3.75G, 4G, 5G, WiMax, etc and other cellular systems.
  • the TR client 4020 is associated with one or more bot (e.g. Bot14032 and/or Bot2 4034), which together are associated with a space.
  • the space may be a house, an office, a warehouse, a man-made structure, a natural landscape, a garage, an indoor environment, a concert hall, an airport terminal, a shopping mall, a building, a sports facility, an enclosed space, a cave, a duct, a vent, a piping system, a cavity, a valley, a parking lot, a wood, a forest, a rock/land formation, an outdoor environment/area with barriers such as trees, walls, structures to generate multipaths.
  • there may be one or more users, with associated user information and/or user profile (e.g.
  • TR client 4020 there may be associated information related to its network (e.g. the internet 4040, WiFi 4038 and LTE 4036), its IP address, its MAC address, its physical address, its hardware address, other device address/name (in the same network, or in the vicinity), SIM ID, series number, phone number, etc.
  • the TR client 4020 may be sandboxed.
  • the TR client 4020 may send an identification information to the TR server 4022. Between the TR client 4020 and Bot1 4032 and Bot24034, the role of being time reversal origin and bot may be inter-changed and/or co- exist.
  • the TR client 4020 may be origin with Bot14032 and Bot24034 as bot.
  • the TR client 4020 may also function as bot while at least one of Bot14032 and Bot24034 function as origin, perhaps even simultaneously (i.e. the TR client 4020 functions both as origin and as bot simultaneously).
  • the analytics server 4018 may deal with (e.g. define, update definition, compute, analyze, mine, fuse, manage, communicate, store) analytics related to the entire and/or part of the history of time-reversal parameters, e.g. time reversal resonating strength, and any analytics that can be derived from the CSIs such as similarity score, distance measure of two CSIs using statistical approach, machine learning, or deep learning, and that can be used for analyzing user behavior.
  • the analytics may be related to/based on the task 4016, the TR application module 4006, the user module 4024, a user associated with the user module 4024, the TR client 4020, the Bot1 4032, the Bot24034, the associated wireless multipath channel, the associated space, the associated networks (including internet 4040, WiFi 4038, LTE 4036), auxiliary information, another associated user (e.g. a user associated with the space, or the TR client 4020, Bot14032, Bot24034) and/or the sponsor 4026.
  • Some analytics may combine TRP with auxiliary information (e.g.
  • the analytics server 4018 may analyze them individually and/or jointly.
  • the analytics server 4018 may be in the cloud or in some data center. It may be located close to the CSI storage module 4010, the non-volative storage 4013, and/or the TR server 4022.
  • the analytics server 4018 may be a software, an app and/or a driver. It may be a hardware (e.g.
  • the analytics server 4018 may be the CSI storage module 4010.
  • the analytics server 4018 may be the TR server 4022.
  • the analytics server 4018 may be the TR client 4020.
  • the big data server 4030 may interact with the sponsor 4026, receiving enquiries from the sponsor 4026 and providing answers based on the analytics computed by the analytics server 4018.
  • the enquiries may be related to the user module 4024 and one (or more) first user associated with the user module 4024.
  • the enquiries may also be related to the space associated with the TR client 4020, Bot14032 and Bot24034.
  • the enquiries may also be related to one or more second users associated with the space.
  • the one or more first user associated with the user module 4024 may be associated with the one or more second user associated with the space through the ID server 4028.
  • the sponsor 4026 may be a potential buyer of data from the big data server 4030, the analytics server 4018, and/or the CSI storage module 4010.
  • the first user associated with the user module 4024 may be browsing a webpage (e.g. a Google search page, or a page hosted by Google server, or any page that support advertisement) with an advertisement (ad) spot.
  • the sponsor 4026 may be a company and/or an ad server seeking to post an ad on the ad spot of the webpage.
  • the sponsor may want to know if the background of the first user matches its intended audience.
  • the sponsor 4026 may send the enquiry to the big data server 4030 by passing an ID info of the first user to the big data server 4030.
  • the ID server 4028 may associate the first user to a second user associated with the TR client 4020, based on the ID info of the first user and some ID info of the second user.
  • the big data server 4030 may then proceed to analyze the behavior of the second user based on the analytics computed by the analytics server 4018 and any further analytics computed using CSI stored in the CSI storage module 4010.
  • the big data server 4030 sends the answers to the enquiries to the sponsor 4026. There may be a charge associated with the enquiry and the answer.
  • the first user of the user module 4024 may be a customer of the sponsor 4026.
  • the user module 4024 may be his mobile phone running a TR application module 4006 which is a map app.
  • the Bot14032 may be installed in his mobile phone.
  • the TR client 4020 is a device installed in the shopping mall.
  • the first user may want to know some information from the sponsor 4026 about the space associated with the TR client 4020 (e.g. the current location of the first user in a shopping mall).
  • the sponsor 4026 may send the enquiry to the big data server 4030 (and command Bot14032 to start sending channel probing signals) together with some ID info of the TR client 4020 (e.g.
  • the big data server 4030 may break down the enquiry into commands to the TR server 4022 and the analytics server 4018 such that the TR client 4020 would capture some instantaneous CSI, pass to the TR server 4022 via internet 4040, WiFi 4038 and/or LTE 4036, and onto the OW engine 4003 (e.g. a location/tracking engine).
  • the OW engine may send the instantaneous CSI to the TRP generation module 4002 which then computes some TRP based on the instantaneous CSI and some CSI stored in the CSI storage module 4010. In some situations, the OW engine 4003 may perform some computation (e.g.
  • the location/tracking engine may determine location of Bot14032 based on the TRP computed by the TRP generation module 4002, and/or some auxiliary information from some sensor) and produce a result (e.g. location of Bot14032 represented in some mapping coordinate) to the TR server 4022 and onward to the big data server 4030.
  • the big data server 4030 would then send the result to the sponsor 4026, at a fee.
  • the sponsor 4026 may process the result and pass to the first user’s user module 4024 (e.g. the user module 4024 may draw the location of the first user on a map app and send another request to the sponsor for the new location of Bot1 4032.
  • the analytics server 4018 may need to perform some analysis, based on past CSI stored in the CSI storage module, some past analytics, and/or the instantaneous CSI.
  • the analytics server 4018 would pass the result to the big data server 4030.
  • the big data server 4030 may process the result and send to the sponsor 4026.
  • the big data server 4030 may combine the results from the OW engine 4003 and the analytics server 4018, process the combined results and send to the sponsor 4026.
  • the analytic server 4018 may analyze the location of the first user and find that the first user always stops at a computer game store in the shopping mall.
  • the analytic server 4018 may also observe that the first user goes to the men’s rest room. Combining with other observations, the analytics server 4018 may know that the first user goes to a particular high school during weekdays. Thus, the analytics server 4018 may conclude that the first user may be a teenage male who loves to play computer games. This information may be useful to the sponsor 4026 who would be willing to pay for this and related data.
  • the computer game store may be particularly interested in identifying the first user and other similar game lovers and may be willing to pay a significantly higher ad fee to play targeted advertisement of the latest game to the such game lovers. [00117]
  • the TR application module 4006 may send a request to the TR server 4022 directly without going through the sponsor 4026 and the big data server 4030.
  • the TR client 4020 may capture the instantaneous CSI, and pass to TR server via internet 4040, WiFi 4038 and/or LTE 4036, and onto OW engine 4003.
  • the OW engine 4003 may request the TRP generation module 4002 to compute some TRP based on the instantaneous CSI and/or some stored CSI in the CSI storage module 4010. Based on the TRP, the OW engine 4003 may perform some computation to obtain the instantaneous location of Bot14032 and may send the result to the TR application module 4006 through the TR server 4022.
  • Another example is baby breathing monitoring. A mother may buy a pair of TR client 4020 and Bot14032 and place them outside a baby room to monitor the breathing of her baby.
  • TR application module 4006 The mother may use an app (a TR application module 4006) on her mobile phone (user module 4024) to pair up with the TR client 4020 via the TR server 4022. She may use the app (TR application module 4006) to activate the baby monitor (TR client 4020 and Bot14032).
  • TR client 4020 may capture a series of instantaneous CSI and pass to TR server via internet 4040, WiFi 4038 and/or LTE 4036, and onto the OW engine 4003 (a breathing engine).
  • the OW engine 4003 may command the TRP generation module 4002 to compute a series of TRP from the series of instantaneous CSI.
  • the OW engine 4003 may analyze the series of TRP to compute the instantaneous breathing rate of the baby.
  • the OW engine 4003 may send the instantaneous breathing rate to the app (TR application module 4006) of the mother’s mobile phone (user module 4024).
  • the app may draw the instantaneous breathing rate in a moving diagram containing the baby’s breathing pattern in the past 5 minutes in a GUI for easy visualization for the mother.
  • the mother With the press of a button in the app, the mother may view the baby’s breathing pattern in the last 24 hours. From the plot, she may detect that the baby’s breathing is unusual and may suspect that the baby may be developing a stuffy nose condition and may need to see a doctor.
  • the baby monitor may be used to monitor the breathing of a senior citizen in a retirement community without intruding into the living space of the senior citizen.
  • FIG.11 shows an exemplary embodiment of a wireless system 1100 comprising two transceivers 1106 and 1108.
  • transceiver A 1108, comprising an antenna, launches a wireless signal 1104 that propagates through a wireless channel 1110 and arrives at transceiver B 1106, comprising an antenna, as a multipath wireless signal 1102.
  • at least one antenna may launch at least one wireless signal into a channel and at least one antenna may receive a signal from the wireless channel.
  • the transmitting and receiving antennas may be placed apart from each other, and in some embodiments, they may be co-located.
  • a device, computer, mobile device, access point and the like may comprise more than one antenna and the antennas may be operated as either or both transmit and receive antennas.
  • the at least one antenna may be a single antenna that may be used to both launch wireless signals into a channel and to receive multipath signals from the channel.
  • antennas may transmit and receive signals in different time slots, in different frequency bands, in different directions, and/or in different polarizations or they may transmit and receive signals at the same or similar times, in the same or similar frequency bands, in the same or similar directions and/or in the same or similar polarizations.
  • antennas and/or devices comprising antennas may adjust the timing, carrier frequency, direction and/or polarization of signal transmissions and signal receptions.
  • Antennas in exemplary embodiments may be any type of electrical device that converts electric power or electric signals into radio waves, microwaves, microwave signals, or radio signals, and vice versa.
  • the at least one antenna may be configured as a directional antenna or an omni-directional antenna.
  • the at least one antenna may be some type of monopole antenna, dipole antenna, quadrapole antenna and the like.
  • the at least one antenna may be some type of loop antenna and/or may be formed from a length of wire.
  • the at least one antenna may be a patch antenna, a parabolic antenna, a horn antenna, a Yagi antenna, a folded dipole antenna, a multi-band antenna, a shortwave antenna, a microwave antenna, a coaxial antenna, a metamaterial antenna, a satellite antenna, a dielectric resonator antenna, a fractal antenna, a helical antenna, an isotropic radiator, a J-pole antenna, a slot antenna, a microstrip antenna, a conformal antenna, a dish antenna, a television antenna, a radio antenna, a random wire antenna, a sector antenna, a cellular antenna, a smart antenna, an umbrella antenna and the like.
  • the at least one antenna may also be part of an antenna array such as a linear array antenna, a phased array antenna, a reflective array antenna, a directional array antenna, and the like.
  • the at least one antenna may be a narrowband antenna or a broadband antenna, a high gain antenna or a low gain antenna, an adjustable or tunable antenna or a fixed antenna. Any type of antenna may be configured for use in the systems, methods and techniques described herein.
  • the radiation pattern associated with an exemplary antenna may be tunable and may be tuned to improve the performance of the exemplary systems, methods and techniques described herein.
  • electrical signals may be applied to one or more antennas for wireless transmission and may be received from one or more antennas for processing.
  • wireless signals may be radio waves or microwaves. In embodiments, wireless signals may have carrier frequencies anywhere in the range from kilohertz to terahertz.
  • antennas may comprise at least one of a filter, amplifier, switch, monitor port, impedance matching network, and the like.
  • electrical signals may be generated using analog and/or digital circuitry and may be used to drive at least one antenna. In embodiments, electrical signals received from at least one antenna may be processed using analog and/or digital circuitry. In exemplary embodiments of the inventions disclosed herein, electrical signals may be sampled, digitized, stored, compared, correlated, time reversed, amplified, attenuated, adjusted, compensated, integrated, processed and the like.
  • the signal launched by a transmit antenna for the purpose of probing characteristics of the channel may sometimes be referred to as a probe signal or a channel probe signal or a channel probe waveform.
  • FIG.11 shows a representation of a wireless signal 1104 being transmitted from a first device 1108 to a second device 1106 through a wideband wireless channel 1110.
  • the channel probe signal 1104 may arrive at the second device 1106 as what we may also refer to as a received probe waveform 1102.
  • the waveform 1102 is referred to as channel impulse response (CIR), which reflects the channel state information (CSI) in time domain.
  • CIR channel impulse response
  • CSI channel state information
  • “channel state information” (CSI) refers to channel properties of a communication link. It describes how a signal propagates from the transmitter to the receiver.
  • the channel state information can be obtained using channel estimation based on the received channel sounding or probing signal.
  • the channel state information in the time domain often referred to as the channel impulse response (CIR)
  • CIR channel impulse response
  • the channel state information in frequency domain often referred to as the channel frequency response (CFR)
  • CFR channel frequency response
  • This received probe waveform 1102 may be received and processed by a receiver comprising at least one antenna and a set of receiver electronics.
  • probe and received signals may be analog signals that are converted to digital signals (and may be digital signals that are converted to analog signals) and may be processed and/or generated using digital signal processors (DSPs), field programmable gate arrays (FPGAs), Advanced RISC Machine (ARM) processors, microprocessors, computers, application specific integrated circuits (ASICs) and the like.
  • DSPs digital signal processors
  • FPGAs field programmable gate arrays
  • ARM Advanced RISC Machine
  • microprocessors computers
  • ASICs application specific integrated circuits
  • the received probe waveform may be predicted by convolving the channel probe signal with the channel impulse response, if the channel impulse response is known.
  • the channel impulse response or estimated channel response may be an approximation or an estimate of the actual channel impulse response.
  • the estimated channel response may be truncated to a certain channel length that is deemed to be an“accurate- enough” estimate of the channel or that is chosen to preferentially probe certain characteristics of the channel.
  • the estimated channel response may be derived from a discretized approximation of a received probe waveform with the time and amplitude resolution of the discretized signal determined to be“accurate enough” for a particular application.
  • the estimated channel response may be a filtered version of the actual channel response and may be an accurate- enough estimate of the channel. The determination of what is“accurate-enough” may depend on the application, the hardware components used in the wireless devices, the processing power of the devices, the allowed power consumption of the devices, the desired accuracy of the system performance, and the like.
  • the received probe waveform may be an accurate enough estimate of the channel impulse response and little additional processing other than reception, discretization and storage of the received probe waveform may be necessary to obtain the estimated channel response.
  • a receiver may need to perform additional processing on the received probe waveform in order to determine the estimated channel response.
  • a receiver may detect and discretize a received probe waveform. Analog-to-digital (A/D) converters may be used to perform the discretization.
  • a deconvolution process may use the discretized received probe waveform and a representation of the channel probe signal to yield the estimated channel response.
  • other mathematical functions may be used to yield estimated channel responses.
  • Channel impulse responses may also be referred to in this document as channel responses (CRs), CR signals, CIR signals, channel probe signal responses, and estimated channel responses.
  • Channel responses may be measured and/or computed and/or may be generated by a combination of measurement and computation.
  • channel responses and received probe waveforms may be chosen to increase or decrease the accuracy of the estimate of the channel response of a wideband channel.
  • a channel probe signal may be a pulse or an impulse.
  • the channel probe signal may be a series of pulses with regular, arbitrary or non-regular patterns.
  • the channel probe signal may be a waveform. Waveforms may be substantially square waveforms, raised cosine waveforms, Gaussian waveforms, Lorentzian waveforms, or waveforms with shapes that have been designed to probe the channel in some optimal or desired way.
  • channel probe waveforms may be frequency chirped or may have frequency spectra that are tailored to probe the channel in some optimal or desired way. Probe waveforms may be multiple waveforms with different center frequencies and bandwidths.
  • Probe waveforms may be amplitude modulated, phase modulated, frequency modulated, pulse position modulated, polarization modulated, or modulated in any combination of amplitude, phase, frequency, pulse position and polarization.
  • the waveform may have a temporal width that is substantially equal to a bit duration of a data stream that may be intended to be exchanged over the associated communication channel.
  • the waveform may have a temporal width that is substantially half, substantially one quarter, substantially one tenth, substantially one hundredth, or less than a bit duration of a data stream intended to be exchanged over the associated communication channel.
  • the probe signal/waveform may be a data pattern and may be a repeating data pattern.
  • the probe signal may include packet and/or framing information, synchronization and/or clock recovery information, stream capture information, device ID and network and link layer operating information.
  • the probe signal may have a frequency spectrum that has been tailored for the operating environment and/or the electronic components in the transmitters and/or receivers of the systems.
  • the probe signal may be an estimate of the channel impulse response or may be an altered version of the estimate of the channel impulse response.
  • the probe signal may be a time-reversed version of the estimated channel response.
  • the probe signal may be designed to compensate for and/or to accentuate signal distortions imposed by certain electronic components in the transmitters and/or receivers and/or imposed by certain environmental factors.
  • One exemplary type of a channel probing signal is a periodic pulse sequence.
  • the received probe waveform may be a noisy version of the periodic channel pulse response.
  • a time-averaging scheme can be used to suppress the noise and extract the channel response.
  • a time-averaging scheme may not provide a reliable measure of the channel response.
  • a longer sequence of pulses can be used to suppress the noise.
  • a short pseudo- random sequence of pulses can be used as the channel probing signal.
  • the received probe waveform can be the convolution of the pseudo-random sequence with the channel response.
  • the pseudo-random sequence used as the probing signal may be known by a receiver.
  • a wireless device may transmit a first wireless signal with a center frequency of f 1 GHz.
  • the first wireless signal may be a channel probe signal, a pulse signal, a frame signal, a pseudorandom noise (PN) sequence, a preamble signal, and the like.
  • the bandwidth of the wireless signal may be approximately 10 MHz, 20 MHz, 40 MHz, 60 MHz, 125 MHz, 250 MHz, 500 MHz, 1 GHz and the like.
  • a wireless device may send a second wireless signal with a center frequency of f 2 GHz.
  • the second wireless signal may be a channel probe signal, a pulse signal, a frame signal, a PN sequence, a preamble signal, and the like.
  • the bandwidth of the wireless signal may be approximately 10 MHz, 20 MHz, 40 MHz, 60 MHz, 125 MHz, 250 MHz, 500 MHz, 1 GHz and the like.
  • the frequency spectrum of the first wireless signal and the second wireless signal may include overlapping frequencies. In some embodiments, there may be no overlapping frequencies between the two wireless signals. In some embodiments, the frequency spectra of the different wireless signals may be separated by so-called guard-bands or guard-band frequencies.
  • the channel response for the channel probed using the first wireless signal (for example at frequency f 1 ) may be represented as H ij (f 1 ).
  • the channel response for the channel probed using the second wireless signal may be represented as H ij (f 2 ).
  • more than two probe frequency signals may be used to probe the channel.
  • the more than two probe frequency signals may have some overlapping frequencies or they may have no overlapping frequencies.
  • a wireless device may use channel tuning and/or frequency hopping to tune to different wireless signal carrier frequencies to probe a wireless channel.
  • a wireless device may tune to different channels within a specified frequency band to probe the wireless channel. For example, a wireless device may first tune to one channel within the Wi-Fi, (IEEE 802.11) signaling bandwidth and then to another channel within the wireless band.
  • the frequency tuning may be from one channel to the next in a sequential fashion, but it may also hop from one channel to another in a random fashion anywhere within the Wi-Fi band.
  • the different channels may have different channel bandwidths.
  • any wireless protocol may be used to generate probe signals and/or to analyze channel information in the received signal.
  • multiple channel probe signals may be used to probe a channel.
  • the same probe signal may be sent multiple times and the received probe waveforms may be averaged and/or compared.
  • a probe signal may be sent twice, 5 times, 10 times, 30 times, 50 times, 100 times, 500 times or 1000 times.
  • a probe signal may be sent once or may be sent any number of times between 2 and 1000 times.
  • a probe signal may be sent more than 1000 times. For example, in some monitoring and security applications, probe signals may be sent continuously. For example, probe signals at 1 probe signal per second, 10 probe signals per second, 100 probe signals per second, and the like may be sent continuously to monitor and probe a space. The rate at which probe signals are continually sent may be determined by the speed at which changes to an environment should be detected. [00135] In embodiments, only some of the received probe waveforms may be used for further processing. For example, some received probe waveforms and/or the estimated channel responses may be discarded or trimmed.
  • the discarded and/or trimmed waveforms and or responses may be sufficiently different from other received waveforms and/or estimated responses that they may be deemed as outliers and not accurate-enough representations of the channel.
  • different probe signals may be sent at different times and/or in response to feedback from the receiver.
  • a probe signal at the transmitter may be tuned to improve the received probe waveforms, the estimated channel responses and/or the similarity of the received probe waveforms and/or the estimated channel responses.
  • a transmitter may send at least two different probe signals and a receiver may estimate channel responses based on either one, some or all of the at least two different received probe waveforms.
  • probe signals may be versions of previously measured and/or calculated channel responses and/or time reversed versions of the measured and/or calculated channel responses.
  • similarity or matching or correlation of waveforms, signatures and/or responses may be determined using virtual time reversal processing techniques, time-reversal resonating strengths, pattern recognition and/or matching, linear and/or nonlinear support vector machines and/or support vector networks, machine learning, data mining, classification, statistical classification, tagging, kernel tricks (e.g., kernel methods that apply kernel functions) and the like.
  • processing a received probe waveform may include amplifying or attenuating any portion of the received signal.
  • a channel may be probed once or a channel may be probed more than once.
  • multiple received probe waveforms may be measured, processed, recorded and the like.
  • some channel responses may be averaged with others.
  • some channel responses may be discarded or not recorded.
  • some channel responses may be measured under different environmental conditions and stored. Such stored response signals may be used as reference signals to indicate the environmental conditions associated with the original measurements.
  • a newly measured channel response may be compared to a number of previously stored channel responses to determine which previously stored channel response most closely matches the newly measured channel response. Then, the environmental parameters of the most closely correlated or most closely matched previously stored channel response may be associated with the newly measured channel response.
  • environmental conditions may include, but may not be limited to, temperature, location or placement of objects, location or placement of people, pose of objects, pose of people, location and/or pose of access points, terminal devices, position and/or pose of sensors, position and/or pose of signal reflectors, position and/or pose of signal scatterers, position and/or pose of signal attenuators, and the like.
  • the estimated channel response may be considered an environment-specific waveform and/or signature because it represents the channel response between two devices in a certain environment or between a device and the objects and/or structures in a venue or in a certain environment.
  • Time-Reversal Wireless System of the TRM a technology called Time Reversal Machine (TRM) that performs broadband multi-path signaling (with broadband signals transmitted and received in multipath-rich broadband wireless channels) is used as an enabling technology to support communication (especially indoor communication) and Internet-of-things (IoT) applications.
  • TRM Time Reversal Machine
  • IoT Internet-of-things
  • a time-reversal wireless communication system 100 includes time-reversal base stations (e.g., 102a to 102c, collectively referenced as 102) that communication with many things, objects, or devices, such as laptop computers 104, smart phones 106, tablet computers 108, air conditioners 110, coffee makers 112, rice cookers 114, refrigerators 116, televisions 118, cars 120, cameras 122, lighting devices 124, audio systems 126, and clothes 128.
  • the clothes 128 may have embedded sensors that can communicate with base stations.
  • a big challenge of indoor communication and indoor IoT applications is the presence of many multi-paths with similar path lengths.
  • Time Reversal Machine recognizes hidden values of multi-paths and seeks to capture and exploit the inherent structures of the multi-paths to achieve high communication capacity, low power consumption, good battery life, collision-free multiple access, low cost terminal devices, heterogeneous terminal devices, indoor positioning, life detection, scalability, privacy and security, etc.
  • a high sampling frequency may be used to capture the useful details of the multi-paths.
  • High communication capacity The TRM system supports spatial division multiple access supporting high throughput for each TRM device (e.g. IoT devices, smart phones, smart devices).
  • the TRM system achieves high signal-to-noise ratio due to its inherent nature to fully harvest energy from the surrounding environment by exploiting the multi-path propagation to recollect all the signal energy that could be collected as the ideal RAKE receiver.
  • the achievable rate can be very high when the bandwidth is sufficiently wide.
  • Good battery life: Many TRM devices e.g. IoT devices, smart phones, smart devices
  • the TRM devices may need to be designed to have low power consumption and use wireless communication techniques that have low
  • the TRM system uses physics instead of electronics to perform channel equalization and thus supports low power consumption and low computational complexity.
  • the TRM system has a potential of over an order of magnitude of power consumption reduction and interference alleviation, which means that the TRM system can provide better battery life and support multiple concurrent active users.
  • Collision-free multiple access The TRM system allows many active TRM devices to connect to the Internet and transmit/receive data concurrently without collision with other TRM devices.
  • the TRM system uses low-interference wireless technologies to reduce the interference among and within things.
  • Low cost terminal devices The TRM system is designed so that most of the processing for signal communication is performed at the base station, thus allowing the terminal TRM devices (e.g.
  • the terminal TRM devices only need to perform simple processing and thus can use low cost processors. In some examples, by using an asymmetric TRM architecture, only a simple one-tap detection is needed.
  • Heterogeneous terminal devices The TRM system can support a high level of heterogeneity among the TRM devices connected to the Internet. For example, TRM devices that have different functionality, technology, and application fields can communicate with one another.
  • the wireless technology used by TRM system can support heterogeneous terminal devices with different quality-of-service (QoS) options, such as bit rate, adjustment of waveform and back-off factor.
  • QoS quality-of-service
  • Conventional technologies e.g., ZigBee, Z-Wave,
  • Bluetooth, and Wi-Fi may not simultaneously support a high level of heterogeneity among terminal devices and support a wide range of density of terminal devices.
  • Secure communication The TRM system provides added security by the spatial division multiple access. Only the intended TRM device at a particular location can receive the intended information. The unique location-specific signature in the TRM system can provide additional physical-layer security and thus can enhance the privacy and security of customers.
  • Indoor positioning The TRM exploits the details of the multi-paths so that each TRM device can determine the current location of the individual receiver.
  • Life detection The TRM system exploits the changes of the details of the multi-paths and allows TRM devices to detect living things in the environment.
  • Scalability The system supports a wide range of density of TRM devices (e.g.
  • the TRM system allows each TRM device (e.g. IoT device, smart device, smart phone) to have a unique identification, and ensures privacy and the security of the customers.
  • the broadband wireless channels may be a set of wireless channels (e.g. Wi-Fi channels with 20 or 40 MHz bandwidth, Zigbee, BlueTooth, Z-Wave, etc.), mobile communication channels (e.g.3G/ 4G/ 5G/ 6G, WiMax, etc.), etc.
  • Multiple antennas may be used in the transmitter and receiver. Multiple narrow-band channels may be combined to achieve a large effective bandwidth.
  • a time-reversal wireless system 100 of the Time Reversal Machine (TRM), as shown in FIG.1, includes time-reversal base stations (e.g., 102a to 102c, collectively referenced as 102) that communicate with many TRM devices (e.g. things, objects, or devices) such as laptop computers 104, smart phones 106, tablet computers 108, air conditioners 110, coffee makers 112, rice cookers 114, refrigerators 116, televisions 118, cars 120, cameras 122, lighting devices 124, audio systems 126, and clothes 128.
  • TRM devices e.g. things, objects, or devices
  • Each TRM device may perform different functions using the TRM.
  • Each TRM device may communicate with a base station to transmit and/or receive information, obtain TRM-based indoor and/or outdoor positioning information, perform surveillance, detect living things, perform health-related monitoring, etc.
  • the clothes 128 may have embedded temperature, motion, heart-beat, and/or other health-care sensors that can communicate with the base stations 102 using the TRM.
  • Basic Principles of Time Reversal of the TRM system [00142] The time-reversal signal processing of the TRM system is a technology to focus the power of broadband signal waves in both time and space domains.
  • the time-reversal technology of the TRM system uses receivers with high sampling frequency to digitize and record the broadband signal waves, applies digital signal processing (including time reversal) to the recorded digital waveforms and transmits the processed signal back in reverse timing (first in last out).
  • the energy of the time-reversal broadband signal waves from transmitters is refocused at the intended location with very high spatial resolution.
  • the time-reversal technology of the TRM system takes advantage of multi-path propagation and requires less complicated channel processing and equalization.
  • the time-reversal technology can achieve focusing that is far beyond the diffraction limit, i.e., half wavelength.
  • a time-reversal system can be used in an environment having structures or objects that may cause one or more reflections of wireless signals.
  • a venue 1202 may have a first room 1204 and a second room 1206.
  • a first device 1208 in the first room 1204 transmits a signal to a second device 1210 in the second room 1206, the signal can propagate in several directions and reach the second device 1210 by traveling through several propagation paths, e.g., 1212, 1214, and 1216.
  • the signal traveling through multiple propagation paths is referred to as a multipath signal. As the signal travels through the propagation paths, the signal may become distorted.
  • a first antenna 1308 transmits a signal to a second antenna 1310 in a room 1306, the signal can propagate in several directions and reach the second antenna 1310 by traveling through several propagation paths, e.g., 1322, 1324, and1326.
  • the first antenna 1308 and the second antenna can be co-located on the same device.
  • FIG.2 is a diagram illustrating an example of time reversal transmission between a broadband transceiver A 130 (of a TRM device A1) and a broadband transceiver B 132 (of a TRM device B1) through a channel 134 with broad effective bandwidth.
  • transceiver A 130 wants to transmit information to transceiver B 132
  • transceiver B 132 first sends an impulse-like pilot signal that propagates through a scattering and multi-path-rich broadband environment (channel 134) and the resulting waveforms are received and recorded by transceiver A 130. This is called the channel probing phase.
  • the pilot signal is sometimes referred to as a“training sequence.”
  • Transceiver A 130 then time-reverses (and conjugates, if the signal is complex valued) the received waveform and transmits it back through the same channel to transceiver B. This is called the time- reversal-transmission phase.
  • the time reversal communication system There are two assumptions for the time reversal communication system to function properly.
  • Channel reciprocity The impulse responses of the forward link channel and the backward link channel are assumed to be identical.
  • Channel stationarity The channel impulse responses are assumed to be stationary for at least one probing-and-transmitting cycle.
  • the impulse response of the forward link channel and that of the backward link channel is as high as
  • the multi-path channel of an office environment does not change significantly over
  • the re-emitted time-reversal waves can retrace the re-emitted time-reversal waves
  • time-reversal essentially leverages the multi-path channel as a matched filter
  • channel probing is performed when a
  • transceiver or access point (AP) 590 communicates with a terminal device 592.
  • AP access point
  • the terminal device 592 upsamples an impulse signal 594 by - using an upsampling
  • RRC root-raise-cosine
  • oversampling can be one of the steps in the data transmission phase, to estimate the channel
  • a can be chosen by the user. For example, a can be chosen to be equal to 4, but can also be other values.
  • the root-raised-cosine filter can perform pulse shaping to limit the bandwidth. In a
  • the filtered signal is converted to an analog baseband signal by a digital-to-analog converter (DAC) 600.
  • the baseband signal is modulated to a high carrier frequency by a voltage- controlled oscillator (VCO) 602, then put through a bandpass filter 604 and amplified by a power amplifier 606 to produce a radio frequency (RF) signal.
  • VCO voltage- controlled oscillator
  • the RF signal is broadcasted by an antenna 608.
  • the broadcast signal passes through a multipath channel 610 having a profile , in which noise 6 ⁇ is added to the signal.
  • the broadcast signal is captured by an antenna 612 at the access point 590.
  • the captured signal is amplified by a low-noise amplifier (LNA) 614, filtered by a bandpass filter 616, and converted to the analog baseband signal using a voltage-controlled oscillator 618.
  • ADC analog-to-digital converter
  • the digital signal is filtered by a root-raised-cosine filter ../ 0,12 622 and downsampled by a factor - by a downsampling unit 624. Because an impulse signal was transmitted by the terminal device 592, the downsampled signal is treated as a channel estimate 7 8 626.
  • the root-raised-cosine filter 598 is a digital filter, and the root-raised-cosine filter 622 is an analog filter, they both have the same bandwidth.
  • the bandpass filter 604 defines the frequency band used by the terminal device 592. Thus, if the terminal device 592 includes a bandpass filter 604 having a passband from frequency f1 to frequency f2, we say that the terminal device 592 uses or is associated with the frequency band f1 to f2. In the example of FIG.14, the passband of the bandpass filter 604 in the terminal device 592 is the same as the passband of the bandpass filter 616 in the access point 590.
  • FIG.17 shows an exemplary diagram showing an exemplary channel probing procedure based on TRM, according to an embodiment of the present teaching.
  • channel probing is performed when a first TRM device 1700 (serving as Origin in the channel probing) communicates with a second TRM device 1716 (serving as Bot in the channel probing).
  • the Origin 1700 in this example includes a transceiver 1702 which can transmit a broadband pilot signal 1728 through a multipath rich broadband channel 1704 to the Bot 1716.
  • the broadband pilot signal 1728 may be referred to as a ping signal, a training signal or a training sequence.
  • the Origin 1700 may produce the broadband pilot signal 1728 by a series of operations, including but not limited to, upsampling, RRC filtering, digital-to-analog conversion, signal modulation by a VCO, bandpass filtering and power amplification.
  • the broadband pilot signal 1728 can be broadcasted by the transceiver 1702 and pass through the multipath rich broadband channel 1704.
  • the multipath rich broadband channel 1704 in this example includes N multipaths 1706A, 1706B, 1706C. Each of the multipaths is associated with a corresponding delay 1708A, 1708B, or 1708C.
  • the total channel response of the multipath rich broadband channel 1704 can be represented by summing 1710 the channel responses of the N multipaths 1706A, 1706B, 1706C and a noise 1712.
  • the multipath rich broadband channel 1704 has an effective bandwidth 1714, which can be a combination of multiple narrow bands from base station channels when multiple antennas are utilized at the Origin 1700 and/or at the Bot 1716.
  • the signal transmitted by the Origin 1700 and through the multipath rich broadband channel 1704 may be referred to as broadband pilot signal with multipath 1730, which can be captured by the Bot 1716 via a transceiver 1718 included in the Bot 1716.
  • the Bot 1716 in this example includes the transceiver 1718, a processor 1724, memory 1726, an A/D converter/sampler 1720.
  • the Bot 1716 may perform a series of operations on the captured broadband pilot signal with multipath 1730, e.g. using the processor 1724 and the memory 1726.
  • the operations may include signal amplification by an LNA, filtering by a bandpass filter, and signal conversion to an analog baseband signal using a VCO.
  • the baseband signal can be sampled by the A/D converter/sampler 1720 according to a sampling frequency 1722 to produce a digital signal.
  • FIG.18A shows an exemplary diagram showing an exemplary data transmission procedure based on TRM, according to an embodiment of the present teaching.
  • the Origin 1700 can transmit a pilot signal to the Bot 1716.
  • the Bot 1716 can estimate and record the channel response and store a time-reversed and conjugated version of the channel response for the transmission phase.
  • the Bot 1716 may include a conversion module and a time reversal mirror comprising a plurality of TRMs. With the TRMs, the Bot 1716 can record and time-reverse (and conjugate if complex-valued) a received waveform, which will be used to modulate the time-reversed waveform with an input signal by convolving them together in the following transmission phase.
  • the transmission phase is initiated.
  • the Bot 1716 may transmit a broadband data stream 1806, through the multipath rich broadband channel 1704 to the Origin 1700.
  • the broadband data stream 1806 has been up-sampled at the A/D converter/sampler 1720 of the Bot 1716, according to a sampling frequency 1722.
  • the data transmitted by the Bot 1716 and through the multipath rich broadband channel 1704 may be referred to as broadband data stream with multipath 1808, which can be captured by the Origin 1700 via the transceiver 1702 included in the Origin 1700.
  • the Origin 1700 in this example includes the transceiver 1702, a processor 1802, memory 1804, and an A/D converter/sampler 1800.
  • the Origin 1700 may perform a gain adjustment to recover the data and down- sample the data using the A/D converter/sampler 1800, according to the same sampling frequency 1722 to obtain the transmitted data.
  • FIG.18B shows an exemplary diagram showing an exemplary downlink data transmission procedure based on TRM in a multi-user system, according to an embodiment of the present teaching.
  • the N users may receive statistically independent messages ⁇ A ' ["],A B ["],... ,A C ["] ⁇ from the BS, via wireless channels 1856.
  • the base station 1852 may include a conversion module and the time reversal mirror comprising plural TRMs.
  • each of ⁇ A ' ["],A B ["],... ,A C ["] ⁇ represents a sequence of information symbols that are independent complex random variables.
  • the rate back-off factor D is introduced as the ratio of the sampling rate to the baud rate, by performing up-sampling and down-sampling with a factor D at the rate conversion module of the BS and the rate conversion module at the receivers.
  • FIG.18C shows an exemplary diagram showing an exemplary uplink data
  • N users can transmit their own data to the base station concurrently.
  • Each user has its own information source which is independent of others.
  • the information bits are first encoded by the channel coding block.
  • the coded symbols ⁇ A ! ["] ⁇ are upsampled by the rate back-off factor D for rate matching at the rate matching module.
  • the scaling factors ⁇ E ! ⁇ are used to implement the power control at the power control module. After multiplying with scaling factor, the sequence of E ! ⁇ A [F]
  • the base station Upon receiving the mixed signal, the base station passes this mixed signal through an information extraction module that includes a filter bank of the calculated signature waveforms ! , each of which performs the convolution between its input signal and the corresponding user’s signature waveform. Such a convolution using the signature waveform extracts the useful signal component and suppresses the signals of other users.
  • the rate matching is performed by down-sampling (with the same factor D) the filter bank’s output signal at the rate matching module to recover the original symbol of each user. Based on ⁇ D !
  • the TRM systems are deployed by installing one set of at least one TRM transceivers (serving as TRM device A1) and another set of at least one TRM transceivers (serving as TRM device B1).
  • the TRM systems are deployed by leveraging on existing LTE, Wi-Fi and/or other wireless infrastructures.
  • TRM device A1 sending out periodic“ping” signals (pilot signals, or training signals).
  • TRM device B1 serving as TRM device B1 which may/may not have accounts/access rights to the LTE/Wi-Fi/other wireless infrastructure base stations.
  • TRM device B1 A common feature of these LTE/Wi-Fi/other wireless infrastructure base stations is that they periodically broadcast“ping” signals which can be received by all devices including our TRM transceivers.
  • Our TRM transceivers treat each“ping” signal as a pilot signal and capture the“ping” signal using a high sampling frequency. [00167] An example is shown in FIG.19.
  • A“ping” signal from an LTE base station is sent to a terminal device in a facility which is a local multipath-rich environment (e.g. a house, an office, a building, a car, a parking lot, a tunnel, etc.). While the path from the LTE base station to the immediate outside of the local environment may not be rich in multipath, the local environment be multipath rich due to many reflective surfaces, refractive features, diffusion features, etc. The multipath-rich environment is sufficient for the temporal and spatial focusing effect of the TRM to work. [00168] Another example is shown in FIG.20. An LTE base station 2005 may be far from the building 2001 (e.g.
  • small cell base stations e.g. pico cell and/or femto cell
  • femto cell base stations e.g.2002, 2003, 2004
  • all the small cell base stations may be wirelessly connected to the LTE base station.
  • the small cell base stations are designed to be a TRM device, at least part of the time. Periodically, the LTE base station would send broadband“ping” signal.
  • the small cell base stations would receive and sample the broadband“ping” signal (with all the multipath effects) with high sampling frequency, and derive the useful channel impulse response (CIR)/channel state information (CSI) from the received broadband“ping” signal. Then the small cell base stations can use the CIR/CSI to implement any TR-enabled applications such as time reversal monitoring (security/surveillance system), time reversal breathing/vital sign monitoring (life-detection, breathing rate detection/ estimation).
  • the small cell base stations 2002, 2003, 2004 in FIG.20 may not be wirelessly connected to the LTE base station 2005, as the LTE base station 2005 may be too far. Instead, the small cell base stations 2002, 2003 and 2004 may be connected to broadband.
  • periodically one of the small cell base station may serve as TRM device A1 and send out“ping” signals.
  • the other small cell base stations e.g.2003, 2004
  • the other small cell base stations can use the CIR/CSI to implement any TR-enabled applications such as time reversal monitoring (security/surveillance system), time reversal breathing/vital sign monitoring (life-detection, breathing rate detection/ estimation).
  • the small cell base station that sends out the“ping” signal may change over time (e.g.
  • the small cell base stations in FIG.21 may take turn to send out“ping” signals (serving as TRM device A1), which are received by a TRM device (e.g. mobile phone, serving as TRM device B1).
  • TRM device e.g. mobile phone
  • the TRM device (e.g. mobile phone) in FIG.21 may serve as TRM device B1 and receive and sample the broadband“ping” signal (with all the multipath effects) with high sampling frequency, and derive the useful CIR/CSI from the received broadband“ping” signal.
  • the other small cell base stations can use the CIR/CSI to implement any TR-enabled applications such as time reversal monitoring (security/surveillance system), time reversal breathing/vital sign monitoring (life-detection, breathing rate detection/ estimation).
  • the mobile phone in FIG.21 may not be TRM-ready. Instead, a TRM-ready coin-size gadget is inserted into the mobile phone and a matching application/driver is installed in the mobile phone making it TRM-ready.
  • the coin-size TRM-read gadget serves as the TRM device B1 and receive and sample the broadband“ping” signal (with all the multipath effects) with high sampling frequency, and derive the useful CIR/CSI from the received broadband“ping” signal. It
  • the LTE/Wi-Fi/other wireless infrastructure base station channels may be broadband channels. If the LTE/Wi-Fi/other wireless infrastructure base station channels are somewhat narrow band (with a bandwidth less than broadband), multiple narrow bands may be combined together to achieve an effectively broadband channel with a wide effective bandwidth. Multiple antenna may be exploited to enable such combination of narrow channels.
  • a 4x2 (or 2T4R) configuration with the base station having 4 antennas and our TRM transceiver having 2 antennas.
  • One narrow band channel exists between each pair of base station antenna and our TRM transceiver antenna.
  • the 4x2 configuration there are 8 narrow band channels which when combined can provide an effective bandwidth 8 times wider than the narrow band channel. If each narrow band channel is 20 MHz, the 4x2 configuration can give a 160MHz effective channel bandwidth.
  • a 2x2 (or 2T2R) configuration as may happen in a LTE femto cell, four narrow bands of 20MHz can be combined to give a wide-band channel with an effective bandwidth of 80MHz.
  • IoT devices there may only be a single antenna.
  • our TRM transceivers may re-emit time reversal signals to communicate/connect with the LTE/Wi-Fi/other wireless infrastructure base stations, if the LTE/Wi-Fi/other wireless infrastructure base stations are prepared to receive the time reversal signals.
  • the temporal focusing and/or spatial focusing properties (both explained below) of the TRM enables our TRM transceivers to communicate with the LTE/Wi-Fi/other wireless infrastructure base stations with less computation, less energy consumption, lower cost, longer battery life and higher data rate/throughput.
  • our TRM transceivers may not re-emit time-reversal signals as the LTE/Wi-Fi/other wireless infrastructure base stations may/may not be prepared to receive the time-reversal signals.
  • time reversal monitoring security/surveillance system
  • time reversal breathing/vital sign monitoring life-detection, breathing rate detection/ estimation
  • received“ping” signals from which, CSI, CIR, as explained below, can be obtained.
  • the LTE/Wi-Fi/other wireless infrastructure base stations may be numerous as they may be infrastructure level facilities.
  • the base stations can provide good coverage of“ping” signal within a metropolitan area making the TRM functionalities applicable through the coverage area (e.g. the entire city including subways, the entire country, the entire continent).
  • the base stations may already be numerous for one LTE carrier such as Verizon, and they are even more numerous when all LTE carriers (e.g. AT&T, T-Mobile, Sprint, etc.) are considered.
  • the LTE base stations may be especially dense in places with high people density such as shopping malls, government agencies, airport, shipping terminals, sport
  • pico cells and femto cells may be employed with very dense base stations.
  • the LTE base stations may be dense in densely populated cities (such as New York City, London, Paris, San Francisco, Hong Kong, Beijing, Shanghai, Tokyo, Seoul, etc.) and densely populated countries (such as Japan, China, Korea, Singapore, India, other Asian countries and other countries/territories).
  • densely populated cities such as New York City, London, Paris, San Francisco, Hong Kong, Beijing, Shanghai, Tokyo, Seoul, etc.
  • densely populated countries such as Japan, China, Korea, Singapore, India, other Asian countries and other countries/territories.
  • city-wide Wi-Fi hot spots are widely available in many government agency, airports, train stations, piers, terminals, subways, sports
  • TRM devices need to do is to receive them, sample them at high enough sampling frequency, derive the useful CIR (channel impulse response, as explained below) and/or the useful CSI (channel state information, as explained below) and analyze them for our need/use.
  • CIR channel impulse response
  • CSI channel state information
  • the environment serves as a natural matched- filter only for the intended transceiver B 132 but not other transceivers at other locations.
  • the temporal focusing effect of the specific re-emitted time-reversal waveform can be observed only at the location of the transceiver B 132 (of the TRM device B1).
  • a graph 140 shows the signal strength detected at transceiver B 132 (of TRM device B1) over a period of time after transceiver A 132 (of TRM device A1) transmits a time-reversal signal. At a particular time, the signal power exhibits a strong peak 142 at the transceiver B 132. As the time-reversal signal is sent [00179]
  • a graph 150 shows the spatial distribution of signal strength detected at a region in the vicinity of the transceiver B 132 at the time when the peak signal occurs at the location of transceiver B 132. The signal power concentrates spatially only at the location of the transceiver B 132.
  • the graphs 140 and 150 show that the re-emitted time-reversal waveform generates a resonant effect at a particular location at a particular time, demonstrating the spatial and temporal focusing effects of the time-reversal signal of the TRM system.
  • Experimental results in both acoustic/ultrasound domain and radio frequency (RF) domain have verified the temporal focusing and spatial focusing effects of the time reversal transmission, as predicted by theory.
  • the temporal focusing effect concentrates a large portion of the useful signal energy of each symbol within a short time interval, which effectively suppresses the inter-symbol interference (ISI) for high speed broadband
  • the spatial focusing effect allows the signal energy to be harvested at the intended location and reduces leakage to other locations, leading to a reduced transmit power requirement and lower co-channel interference to other locations.
  • the benefits and unique advantages of time-reversal based wireless systems due to the temporal and spatial focusing effects can be applied to implement the Internet of Things.
  • the spatial and temporal effect can also be used to achieve wireless power transfer to any TRM devices (e.g. IoT devices, smart phone, and/or smart devices) within the multi-path environment.
  • Many TRM devices may run on batteries which have limited capacity. When the batteries run out, the TRM devices cannot operate. Thus the batteries need to be charged. But connecting the TRM devices by wire to power supply (e.g. household AC power supply or a portable power bank) tends to be tedious. Users may forget to charge. Users may find it
  • the TRM device A1 (wherever it is) can communicate a pilot signal to TRM device B1 which may be a base station at a fixed location connected AC power, or a portable power bank with ample power. Based on the captured channel impulse response, the TRM device B1 can re-emit time-reversal signal waveforms repeatedly such that the power of the time-reversal signal waveforms focuses at the TRM device A1, which then stores the wirelessly transmitted power in its battery.
  • FIG.5 An example of a TRM system in an indoor environment is shown in FIG.5.
  • the layout of an office unit with a rectangular shape is shown in FIG.5.
  • a channel probing table is constructed and placed in the center open area of the office unit.
  • TR-TX One TRM device called TR-TX (serving as TRM device A1) is placed on the movable platform of the channel probing table while another TRM device called TR-RX (serving as TRM device B1) is placed at a location in the office unit with the line-of-sight being blocked by at least one wall.
  • TR-TX sends a broadband pilot signal to the TR-RX which samples (with high sampling frequency), captures, records, and processes (including time reversal) the received broadband pilot signal.
  • the TR-RX re-emits the time-reversal broadband signal which goes through the multi-paths in the environment such that all the multi-path signals arrive coherently at a particular time at the TR-TX.
  • the movable platform is moved around a vicinity of the original location of TR-TX to capture the spatial distribution of signal energy around the intended location.
  • the energy is distributed in a small“focusing ball” in the close vicinity of the intended location.
  • the energy distribution inside the focusing ball is stationary and location-independent.
  • the bandwidth of the time reversal wireless system is large enough, the focusing behavior for each location in the typical rich-scattering environment exhibits less randomness and become deterministic-like.
  • the location-independent characteristic can be utilized for positioning/tracking.
  • TRRS time reversal resonating strength
  • CIR channel impulse response
  • CSI channel state information
  • TRRS decay function is statistically stationary in space and become deterministic-like. Therefore, the reduction of the TRRS between CSIs measured in adjacent locations can be mapped to the moving distance of a TR transmitter or receiver during the channel probing time interval.
  • An averaging window can be applied to further average out the fluctuations of the TRRS decay function.
  • a tracking system Utilizing the TRRS-based speed estimation, a tracking system can be built. The tracking system first receives a wireless signal from the object to be tracked (carrying the TRM device A1), then estimates a first distance of a movement of the object (carrying the TRM device A1) based on information derived from the received wireless signal, and obtain the location of the object based on a combination of the estimated first distance and the estimated direction.
  • the direction of the movement of the object can be estimated by obtaining an angular velocity based on an output signal provided by a gyroscope and integrating the angular velocity over time.
  • the direction of the movement of the object can also be estimated from an output signal provided by a magnetometer.
  • the tracking system first estimates an initial position of the object (carrying the TRM device A1) prior to the movement, determines a moving trajectory based on the estimated first distance and the estimated direction of the movement, and determines a new estimated position of the object by adding the moving trajectory to the estimated initial position.
  • the first distance can be estimated by first estimating an average decay of TRRS within a time window based on the information derived from the received wireless signal, comparing the average decay with a reference TRRS decay function, and estimating the first distance based on a mapping of the decay and distances.
  • the object (carrying the TRM device A1 of the TR tracking system) to be tracked can be a human, an animal, a car, a truck, a bus, a ship, a train, and etc.
  • the object can move in an office, a store, a factory, a hotel, a museum, a house, a room, a building, a classroom, a warehouse, a storage facility, a parking lot, a walled facility, a garden, a forest, a valley, a river-valley, a terrain, a coastal area, a maze, an alley, a path, a road, a track, a canal, a trajectory, a sewage system, a fire-exit path, a subway system, a tunnel system, a cavern, an underground structure, a volcano, a mine, a mining facility, a floating structure, a submerged/semi- submerged structure in river/sea, a ruin/destruction/catastrophic site with debris, an obstacle path, a mapped area, an air space with some surrounding natural/artificial reflecting surfaces on earth and/or in outer space, a piping system, a machine/device, a structure
  • the place where the object is moving in can be one-floor, multi-floor, with or without constructions underground.
  • the TR tracking system when the TR tracking system is used to track an object (carrying a TRM device A1) inside/outside/near/above/below a building, the shape of the building can be round, square, rectangular, triangle, irregular-shaped, etc.
  • the construction material used in the building may be concrete, cement, glass, metal, wood, paper, fabric, sand, a kind of stone, plastic, rubber, soil, rock, plants, tree trunk/bark/root/leaves, creature tissues, and/or other material natural/synthetic/artificial/man-made in solid/liquid/gas/plasma state.
  • the structures inside the building may include ceilings, floors, walls, partitions, carpets, windows, drapes, shelves, table, chairs, human, mesh/net/network, pipes, ducts, holes, gaps, alleys, paths, walkway, hallway, lobby, toilets, rooms, doors, windows, openings, lifts, escalators, fixtures, furniture, aquarium,
  • the trajectory of the object can be displayed/visualized/ rendered on a surface, a screen, a projected screen, a computer screen, a virtual reality unit and/or an augmented reality unit with/without the coordination/collaboration/interaction/input of at least one auxiliary system (e.g.
  • map system navigation system, transportation system, healthcare system, security system, surveillance system, communication system, information system, internet/cloud system, gaming system, tracking system, positioning system, localization system, entertainment system, manufacturing system, office automation system, personal assistance system, advertising system, e- Commerce system, government system, law enforcement system, defense system, educational system, searching system, disaster relief system, etc.), played out from an audio device, described in text (e.g. text messages, emails, twitter, Facebook, social network), and/or other means of user interface etc.
  • text e.g. text messages, emails, twitter, Facebook, social network
  • TR technique of the TRM system treats each path of the multipath channel in a rich scattering environment as a widely distributed virtual antenna and provides a high-resolution spatial-temporal resonance, i.e., the focusing effect.
  • the spatial-temporal resonance uniquely determined by multipath propagation environment, includes all the information during RF signal transmission and compresses it into a scaler metric. When there is an event happening or a change in the propagation environment, the involved multipath signal varies correspondingly. As a consequence, the spatial-temporal resonance also changes.
  • the TR based monitoring system adopts TR technology to fully utilize all the multipath information in a rich-scattering (multi-path rich) indoor and/or outdoor environment, and treats the unique spatial-temporal (broadband, with large effective bandwidth) resonances as features.
  • the TR spatial-temporal resonances naturally combine and compress the unique (broadband, with large effective bandwidth) multipath profile into a scaler.
  • the broadband TR monitoring system with a high sampling frequency. Therefore, by utilizing such a unique environment-specific multipath CSI (of the TRM), the TR monitoring system is able to detect an event by matching the multipath CSI to an event happening in the wide- band environment.
  • the estimated CSI (in the TRM) is corrupted with common phase distortion and linear phase distortion.
  • the broadband monitoring system eliminates the phase offset residuals in the estimated CSI by receiving a wireless signal from a device, estimating the linear phase offset in the estimated CSI due to the SFO and the STO, estimating the common phase offset in the estimated CSI due to CFO, and obtaining a clean CSI at the receiver without referring to any reference CSI.
  • the linear phase distortion coefficient can be estimated based on the element-wise product of the raw CSI and a shifted version of it.
  • the common phase offset can be estimated based on the angle of the average on the complex-valued CSI on each subcarrier of the wireless signal.
  • the TRRS can be calculated using an inner product operation. Since the estimated CSI collected at the same location or state is the real CSI corrupted by noise, it can be shown that the term,“1– TRRS between the CSI coming from the same location/state” follows a lognormal distribution, and the scale parameter and the location parameter of the lognormal distribution can be estimated with the knowledge of the noise variance.
  • a real-time TR statistics-based monitoring system can be built, as shown in FIGS.6 and 7, comprising processors for: receiving wireless signals from commodity Wi-Fi-like devices (or LTE-like devices or other wireless broadband devices) to estimate the CSI; in the training phase, training a statistical based classifier with the knowledge of indoor events and the corresponding CSI; in the testing phase, estimating which indoor event is happening in the course of the Wi-Fi transmission (or LTE transmission or the transmission of the other wireless broadband devices); applying a sliding window combined with a majority vote to fuse the decisions of each testing CSI samples over time domain; and detecting human motion by tracking the variance on TRRS within each sliding window on TRRS samples.
  • processors for: receiving wireless signals from commodity Wi-Fi-like devices (or LTE-like devices or other wireless broadband devices) to estimate the CSI; in the training phase, training a statistical based classifier with the knowledge of indoor events and the corresponding CSI; in the testing phase, estimating which indoor event is happening in the course of the Wi-Fi transmission (or L
  • a processor for learning a statistics-based classifier comprising: cleaning and compensating the phase offset in the raw CSI; extracting a representative CSI for each link for each indoor event; calculating intra-class per-link TRRSs for each indoor event between the representative and other training CSI samples; estimating the parameters of the TRRS distribution assuming lognormal distribution based on the samples of intra-class 1-TRRS for each link; and building a training database with pairs of lognormal distribution parameters and CSI representatives for each link and each indoor event.
  • phase offset compensation “phase offset cleaning”, “phase offset calibration” and“phase offset sanitization” will be used interchangeably.
  • a processor for estimating which event is happening comprising: cleaning and compensating the phase offset in the raw CSI; given a hypothesis of each specific indoor event, calculating intra-class per-link TRRSs for the indoor event between the representative and the clean tested CSI; given a hypothesis of each specific indoor event, calculating the parameter of the cumulative distribution function (CDF) of“1-TRRS” of the tested CSI assuming lognormal distribution; given a hypothesis of each specific indoor event, obtaining the metric from the tested CSI by taking the product of CDF values for all links; and making the decision based on the metric value of different event hypothesis as: firstly, checking the metric values for the normal states: if it is below a first threshold, the estimated indoor event is the one with the smallest metric value; otherwise, checking the
  • the system comprising at least one processor for: receiving wireless signals to estimate the CSI; in the training phase, extracting features from labeled CSI samples in the training database and learning a classifier based on the features; in the testing phase, estimating which indoor event is happening in the course of the wireless signal transmission; sliding window combined with majority vote is applied to fuse the decisions of each testing CSI samples over time domain; and detecting human motion by tracking the variance on TRRS within each sliding window on TRRS samples (based on procedures in FIG.9).
  • the step of extracting features and learning a classifier comprises: cleaning and compensating the phase offset in the raw CSI; training a principle component analysis (PCA) for dimension reduction on the clean CSI for all indoor events; extracting features as the first 200 major components in the raw CSI after going through a PCA; and learning a linear support vector machine (SVM) with the feature vectors from the trained PCA as the input and with the knowledge of labels for each sample.
  • PCA principle component analysis
  • SVM linear support vector machine
  • the step of estimating which indoor event is happening comprises: cleaning and compensating the phase offset in the raw CSI; extracting features from the learned PCA; and obtaining a predicted label for the extracted feature by using the learned linear SVM.
  • the TR monitoring system (based on the TRM) can monitor the state of a door opening/closed, a window opening/closed, etc.
  • the TR monitoring system can detect motion of a human, motion of an animal, motion of a vehicle, etc.
  • the monitoring system may be adaptive such that the training of the system may be adaptive. The adaptive training of the system may be on-going (e.g.
  • the environment to be monitored by the TR monitoring system can be an office, a store, a factory, a hotel, a museum, a house, a room, a building, a classroom, a warehouse, a storage facility, a parking lot, a walled facility, a garden, a forest, a valley, a river- valley, a terrain, a coastal area, a maze, an alley, a path, a road, a track, a canal, a trajectory, a sewage system, a fire-exit path, a subway system, a tunnel system, a cavern, an underground structure, a volcano, a mine, a mining facility, a floating structure, a submerged/semi-submerged structure in river/sea, a ruin/destruction/catastrophic site with debris, an obstacle path, a mapped area, an air space with some surrounding
  • the object of the TR monitoring system can be one-floor, multi-floor, with or without constructions underground.
  • the shape of the object of the TR monitoring system can be round, square, rectangular, triangle, irregular-shaped, etc.
  • the transmitter and/or receiver can be at fixed locations or mobile.
  • the system when a special event or motion is detected by the TR monitoring system, the system can give alarm signals via audio, video, sms, email, etc.
  • CSI (of the TRM system) is a fine-grained information that portraits the propagation path of electromagnetic waves. It is temporally stationary in a static environment. Human activities introduce dynamics into the CSIs.
  • the TR monitoring system (based on TRM) in the previous section can monitor large-scale state change, e.g., a window or door open/close, and human/animal motion. Actually, small scale human activities such as human breathing can also be monitored, which will be detailed in the following TR breathing and vital signs monitoring system (based on TRM).
  • CSI In an environment without dynamics, CSI is highly stationary. Human breathing introduces dynamics into CSIs, since the electromagnetic wave reflected from the human chest varies periodically due to exhalation and inhalation. Consequently, the CSI amplitudes and phases undergo periodic changes which are encapsulated into the CSIs.
  • the architecture of the TR breathing monitoring system (based on TRM) is shown in FIG.10. Assume there is a total of G transmitting-receiving links in a multi-antenna wireless system, for example, a Wi-Fi-like and/or a LTE-like system. CSIs captured on link H are calibrated to mitigate the impact of the residual synchronization errors. The calibrated CSIs are further processed by breathing feature extraction.
  • the TRRS is calculated between the CSIs collected from a series of time instances.
  • the breathing rate in the steering vector can be estimated by Root-MUSIC.
  • the breathing feature extraction generates two sets: O P and Q P .
  • the Q P is a set containing the breathing rate estimation on link H, while the O P is a set containing a number of empty sets meaning no reasonable breathing rate is estimated.
  • a life-detecting apparatus comprises at least one broadband radio transmitter (e.g. transceiver in TRM device A1 or B1) for transmitting radio signals over a first period of time; at least one broadband radio receiver (e.g.
  • transceiver in TRM device B1 or A1) for receiving radio signals over a second period of time; and at least one processor for processing the radio signals received over the second period of time to estimate a time series of channel state information for a wideband channel between the at least one broadband radio transmitter and the at least one broadband radio receiver; determine resonating strength amongst the time series of channel state information; and analyze the determined resonating strengths to obtain presence of periodic fluctuations that indicate breathing (and/or other instantaneously periodic activities of a living being, a natural/artificial phenomenon, a robot, or a machine).
  • the processor can determine the breathing rate of at least a person and the at least one person can be static, moving, performing exercises, etc.
  • the processor can determine the breathing rates of at least one animal, and the at least one animal can be static, moving, etc.
  • a robot an example may be a robot performing repetitive movement in an assembly line.
  • a machine an example may be a windmill move at a certain pace under a certain wind speed, or objects moving at a steady pace on a conveyor belt, etc.
  • a natural phenomenon an example may be tree branches swaying at a steady pace under a certain wind condition.
  • FIG.15 illustrates system architecture of a cloud system for providing web-based services to its customers and storing and leveraging the data obtained while serving customers of Origin Wireless (OW) and/or any other company or entity.
  • OW Origin Wireless
  • FIG.15 illustrates system architecture of a cloud system for providing web-based services to its customers and storing and leveraging the data obtained while serving customers of Origin Wireless (OW) and/or any other company or entity.
  • the system will be referred to as OW cloud system, while it can be understood that it may be utilized to serve customers of any company or entity.
  • the OW cloud system has two main components: the primary web services 1515 and the secondary web services 1535.
  • the primary web services 1515 may include a portal which enables clients to access/use the company’s traditional (e.g. non-data- related) services. Examples of the services may include location determination,
  • Clients 1550 or equipment installed on clients’ premises can be connected to a service point of the primary web services 1515, and send relevant status information to the primary server of the primary web services 1515.
  • This information may include, but not limited to, IP address, time stamp, RSSI, or CSI.
  • the primary web server may use this information to provide a requested service to the client, e.g. determining the client’s location in a shopping mall.
  • the primary server can save the received information in a suitable format in the operational database 1510, making it available to a knowledge extraction processor 1520.
  • This processor 1520 can use data mining and machine learning techniques to extract useful information/intelligence from the recorded data in the operational database 1510.
  • the extracted intelligence could be that in a certain shopping mall, people tend to visit H&M first and then go to the GAP store.
  • the extracted information is then stored in a knowledge database 1530.
  • the secondary web services 1535 may provide this information to the company’s other clients, included in the clients 1550. These clients are, typically, but not necessarily, a different set of customers, and can access the company’s secondary services that provide access to the knowledge and the intelligence extracted from the stored operational data.
  • the knowledge and intelligence can also be extracted in real time (on the fly) if required.
  • the stored operational data may serve as a basis for the knowledge extraction process.
  • data in the operational database may include client location and the associated time stamp; and extracted intelligence may be based on that in a certain shopping mall, people tend to visit H&M first and then go to the GAP store afterwards.
  • data in the operational database may include human activity (e.g.
  • FIG.16 shows an exemplary system including a TRM platform, according to an embodiment of the present teaching.
  • the system includes CSI generators 1610, traditional application inputs 1620, a TRM platform 1630, an OW cloud 1640, and applications 1650.
  • the CSI generators 1610 in this example may generate CSI in different scenarios.
  • the CSI generator may access a Wi-Fi chip, an LTE chip, a 5G chip and/or other chip to fetch the CSI.
  • the CSI may comprise a channel impulse response, a channel frequency response, another channel state data, and/or a physical layer channel information.
  • the CSI may be a reference CSI captured when a probing signal is sent through a wireless multipath channel during a training phase; or may be a test CSI captured when another probing signal is sent through the wireless multipath channel during a testing phase.
  • the testing phase may be a positioning phase for localization, or a phase for testing different TRP.
  • the TRP may be an inner-product of two vectors corresponding to test CSI and the reference CSI.
  • the TRP may be: a TRRS, a cross-correlation, an inner product of two vectors, a similarity score or a distance score of two particular CSI.
  • the CSI generators 1610 may send the generated CSI to the TRM platform 1630 for calculating the particular TRP, and other data used for various applications.
  • the traditional application inputs 1620 in this example may collect inputs for various applications, e.g.
  • the traditional application inputs 1620 may exchange data with the CSI generators 1610.
  • the traditional application inputs 1620 may also send the collected inputs to the TRM platform 1630 for calculating TRP used for various applications.
  • the TRM platform 1630 in this example may obtain generated CSI (e.g. test CSI) from the CSI generators 1610 and collected inputs from the traditional application inputs 1620.
  • the TRM platform 1630 may obtain some stored CSI (e.g. reference CSI) from a CSI storage in the cloud (e.g. OW cloud 1640).
  • the OW cloud 1640 has an architecture as shown in FIG.15.
  • the TRM platform 1630 can comprise a TRP generation module configured for generating one or more TRPs based on the generated CSI, the reference CSI, and/or the collected inputs. For example, the TRM platform 1630 may calculate a TRRS based on two particular CSI sent by the CSI generators 1610. The TRM platform 1630 may also compute a TRRS based on a CSI from the CSI generator 1610 and a stored CSI from the CSI storage.
  • the TRM platform 1630 may obtain GPS data from the traditional application inputs 1620 and use the GPS data to verify localization of a user in a TRRS localization application, or to obtain location of a user in a security application based on some TRP.
  • the TRM platform 1630 can also obtain application data from the applications 1650.
  • the application data including user information, can be sent from the Applications to the TRM platform 1630, which returns positioning information, breathing rate information, event indicators, etc. to the applications 1650.
  • OW cloud Origin Wireless Cloud
  • the TRM platform 1630 may be embedded in a user device that can communicate with the OW cloud 1640, such that a server (not shown) can collect all data involved in the various applications from all users via the OW cloud 1640.
  • the server may use the collected data in various ways, e.g. process the data and determine a method for better implementation of an application based on the data, find an optimal, efficient, and/or effective function for calculating particular TRP in future applications, provide the data to a third party for further processing, etc.
  • the TRM platform 1630 in a local user device may be able to calculate basic functions based on generated CSI, and can send a request for advanced functions of generated CSI to the server via the OW cloud 1640, such that the data can be collected by the server via premium services provided by the server.
  • the data may be collected during different phases of an application, e.g. a training phase and/or a positioning phase of a localization application.
  • the TRM platform 1630 may be a common platform that is coupled with the OW cloud 1640 and is shared by all users, such that each user can communicate with the TRM platform 1630 for calculating TRPs for various applications.
  • the TRM platform 1630 may automatically store the data related to the calculation either at the TRM platform 1630 or into the OW cloud 1640.
  • the applications 1650 in this example may comprise a time reversal application module and can also communicate with the OW cloud 1640 to obtain big data collected during previous TRP calculations and/or application executions.
  • the applications 1650 may obtain the calculation results from the TRM platform 1630 and generate a non-transitory machine readable medium that comprises an API (application programming interface) and/or SDK (software development kit) for executing a particular application, e.g. tracking, breathing, guarding, etc..
  • the medium can be provided or sold to a third party for further implementation.
  • the applications 1650 can provide a general API for wireless tracking to a third party that wants to produce a tracking system based on the general API.
  • the tracking system may be generated based on specific parameters and/or additional functions added to the general API.
  • the additional functions may include generating and sending warning signals based on tracking results, when the tracking system is used for tracking an animal or a kid in a predetermined range; displaying different information according to a user’s location to a virtual reality or augmented reality device worn by the user, when the tracking system is used for tracking a user who is playing in a big resort like Disneyland or Sea World, etc.
  • the applications 1650 may provide a general SDK to a third party that wants to produce a breathing detection device based on the general SDK.
  • the breathing detection device may execute functions of the general SDK and/or additional functions based on specific implementations of the breathing detection device.
  • the basic functions of the general SDK may include testing a breathing rate of a user using the device, while the additional functions may include generating an alert to the user and/or sending an urgent help signal to a potential helper, like a hospital, a medical professional person, a volunteer nearby, a relative of the user, or one or more persons selected from a predetermined list.
  • the applications 1650 may provide a general SDK (or API) to a third party that wants to produce a home security device based on the general SDK.
  • the home security device may execute functions of the general SDK and/or additional functions based on specific implementations of the home security device.
  • the basic functions of the general SDK may include detecting an event, e.g. door open, that can indicate a potential security issue; while the additional functions may include triggering an alarm and/or sending a message to a potential helper, like a police station, a volunteer nearby, a relative of the user, or one or more persons selected from a predetermined list.
  • the applications 1650 in FIG.16 may send application requests to the TRM platform 1630 for calculating different TRP according to different application requests.
  • the applications 1650 may obtain the calculation results from the TRM platform 1630 and generate corresponding application data.
  • the application data may be sent back to the TRM platform 1630 for further calculation and/or used for generating the general SDK/API.
  • the data generated or collected by the applications 1650 may also be stored at the OW cloud 1640. As discussed above, a server connected to the OW cloud 1640 may use these data to do some optimization, training, inference, and/or recommendation.
  • the server may determine a time period in a day when most security issues can happen based on security application data from different users; determine a type of animals or an age range of kids that may trigger most warning signals based on location tracking; determine a type of patients who may have most frequent breathing issues based on detected breathing rates, etc.
  • the server may then generate a trained function to implement these determined features into corresponding applications to further take into consideration of particular users or customized implementations.
  • the server may also generate inference and/or recommendation to the applications 1650 and/or to the third party based on the above features determined based on big data collected from the users.
  • the system disclosed in the FIG.16 may all be implemented at a server side.
  • one or more components in the system may be implemented in a user device.
  • the CSI generators 1610, the traditional application inputs 1620, and/or the TRM platform 1630 may be embedded in a user device produced by a third party based on a general SDK/API.
  • the applications 1650 in FIG.16 may represent a specialized SDK/API generated by the third party and embedded in the user device.
  • the user device can calculate some TRPs and execute corresponding applications locally at the user side, and can upload data generated during the calculation and execution to the server via the OW cloud 1640.
  • FIG.22 illustrates an exemplary structure of a system provided based on TRM, according to an embodiment of the present teaching.
  • the structure includes service and TRM platform provided in a package 2210, APPs 2221, 2222, 2223, 2224, 2225 provided by application partners, and users 2230.
  • the package 2210 may be provided according to a system disclosed in the present teaching. For example, the system can collect big data and raw data for various calculations of TRP based on the TRM platform, and provide a general SDK/API in a single or bundled service.
  • the package may also include application specific data that are related to a specific service or application, e.g. user identification information for a security application, user average moving speed for a real-time tracking application, etc.
  • the package may also include processed data based on the TRM calculation.
  • the package may be provided to one or more application partners for development and operation.
  • the system can provide the package 2210 to a third party for generating one or more of the APPs: smart security APP 2221, precision positioning APP 2222, vital sign monitoring APP 2223, real-time tracking APP 2224, and wireless charging APP 2225, via one or more interfaces.
  • a third party for generating one or more of the APPs: smart security APP 2221, precision positioning APP 2222, vital sign monitoring APP 2223, real-time tracking APP 2224, and wireless charging APP 2225, via one or more interfaces.
  • each of these APPs may be generated based on a general SDK or API.
  • the smart security APP 2221 may be generated based on a security SDK provided by the system by adding a smart analysis and alerting system; the precision positioning APP 2222 may be generated based on a positioning SDK provided by the system by adding a function for improving positioning precision, the vital sign monitoring APP 2223 may be generated based on a monitoring SDK provided by the system by adding a function of analyzing vital signals stored in a database, the real-time tracking APP 2224 may be generated based on a tracking SDK provided by the system by adding a local CPU and storage with specific algorithm to track locations in a real-time scenario, and the wireless charging APP 2225 may be generated based on a power transmission SDK provided by the system by adding a battery charging function that can operate in a wireless environment.
  • FIG.23 illustrates an exemplary data network of a system provided based on TRM, according to an embodiment of the present teaching. As shown in FIG.23, the data network includes an infra-level system integrator 2310, one or more users 2320, and an app-level system integrator 2330.
  • the infra-level system integrator 2310 in this example includes a TRM engine 2312 and a common interface 2314.
  • the TRM engine 2312 may comprise a TRP generation module that can generate a particular TRP, e.g. TRRS, a CSI storage module that can store CSI in a particular format, and/or a time reversal application module that can generate a general SDK or API for further development and operation by a third party.
  • the TRM engine 2312 may generate and send SDK/APIs for different applications to the common interface 2314, which can forward each SDK/API to a corresponding individual interface, e.g. one of the individual interfaces 2331, 2332, 2333, according to different applications.
  • the TRM engine 2312 may comprise a system disclosed in the present teaching, based on time reversal techniques.
  • the TRM engine 2312 may obtain data processed based on some raw data in a data lake.
  • the raw data may come from the users 2320, when they are using the applications.
  • the app-level system integrator 2330 in this example may include some individual interfaces 2331, 2332, 2333, and different application providers 2335, 2336, 2337.
  • Each of the application providers 2335, 2336, 2337 may correspond to a specific application or service, e.g. smart tracking, precision positioning, etc.
  • the application provider may obtain a general SDK/API through a corresponding individual interface, generate the specific application based on the general SDK/API, and provide the specific application to the users 2320.
  • one or more of the application providers may share IP with the OW who provides the TRM engine 2312.
  • data may be generated and collected by the application providers, who can in turn send the collected data to a server, e.g. the TRM engine 2312 that is connected to all of the application providers.
  • the data generated during the use of the applications may be directly collected by the TRM engine 2312, e.g.
  • FIG.24 illustrates an exemplary structure of data sets provided based on TRM, according to an embodiment of the present teaching.
  • data generated and collected during application executions may include aggregating data and mining data 2410, location data 2420, and raw data and modeling data 2430.
  • the aggregating data and mining data 2410 may further include service output data and marketing data for processing data of a relatively large time division and calculating values in a batch process.
  • the location data 2420 may further include outdoor location information, indoor location information, and event log data for big data processing and data storage system.
  • the raw data and modeling data 2430 may further include device raw data and modeling data for real time data processing and storage, and correction and pooling for each device.
  • GPS Global Positioning System
  • LOS line of sight
  • IPSs indoor positioning systems
  • RSSI received signal strength indicator
  • TOA time of arrival
  • the fingerprints In an indoor environment, there naturally exists some location-specific information, known as the fingerprints. Examples include the magnetic field, RSSI, and the channel state information (CSI). All these fingerprints can be exploited for indoor localization. Specifically, in the fingerprint-based IPS, the location-specific fingerprints may be collected and stored in a database in the mapping phase. Then, in the localization phase, the location of the device can be determined by comparing the device fingerprint with those in the database. The physical phenomenon of time -reversal focusing effect can provide a high-resolution fingerprint for indoor localization.
  • the fingerprints include the magnetic field, RSSI, and the channel state information (CSI). All these fingerprints can be exploited for indoor localization.
  • the location-specific fingerprints may be collected and stored in a database in the mapping phase. Then, in the localization phase, the location of the device can be determined by comparing the device fingerprint with those in the database.
  • the physical phenomenon of time -reversal focusing effect can provide a high-resolution fingerprint for indoor local
  • TRRS time-reversal resonating strength
  • two channel sounders are placed in an NLOS setting, where one of them is placed on a customized experiment structure with 5 mm resolution.
  • the TRRS can be calculated as
  • h ) and h ' are the two fingerprints
  • K is the total number of usable subcarriers
  • H ) [k] and H ' [k] are the CSIs on subcarrier k
  • is the modified cross-correlation between h ) and h ' with synchronization error compensated
  • b ) ,b ' are the channel energies of h ) and h ' , respectively.
  • an additional phase rotation of e &ca] is employed to counteract the phase distortions incurred by the synchronization errors in the calculation of ⁇ , where d can be estimated and compensated using Algorithm 1 to be shown later.
  • Equ. (1) above implies that TRRS ranges from 0 to 1. More specifically, a larger TRRS can indicate a higher similarity between two fingerprints and thus a higher similarity between the two associated locations. [00248] The corresponding TRRS between the target location and nearby locations are illustrated in FIGS.26-28 under different bandwidth settings.
  • the present teaching aims at achieving an increasing effective bandwidth via the exploitation of diversities, including the frequency and space diversity.
  • the frequency diversity can be achieved based on usage of different Wi-Fi channels. Additionally, frequency diversity can also include the diversity introduced by the subcarriers in an OFDM system. The large amount of subcarriers (114 subcarriers in case of 40MHz bandwidth using 802.11n) may lead to a very stable performance.
  • the present teaching discloses a method for calculating the TRRS when combining different diversities, by compensating the hardware imperfection that is inevitable in wireless communication systems.
  • TRRS can be considered as a metric that quantifies the differences between two CSIs.
  • the two CSIs can be originated from two different physical locations, but could also be originated from two virtual (logic) locations/states.
  • the TRRS with diversities can help the localization and tracking.
  • the TRRS with diversities can help the breathing monitoring, human recognition, and the guard/security system.
  • the present teaching discloses a localization/tracking system that is able to localize/track in an environment with LOS or without LOS.
  • the disclosed system is an indoor positioning system.
  • the disclosed system in the present teaching can work in both LOS and NLOS scenarios. To achieve the same performance under both the LOS and NLOS, different system parameters can be used with certain thresholds. In addition, the disclosed system can utilize techniques such as LOS path removal to further enhance its localization performance in a strong LOS scenario.
  • Two different diversities exist in current Wi-Fi system i.e., frequency diversity and spatial diversity. According to IEEE 802.11n, 35 Wi-Fi channels are dedicated to Wi-Fi transmission in 2.4GHz and 5GHz frequency bands with a maximum bandwidth of 40 MHz.
  • Wi-Fi channels leads to frequency diversity in that, they provide opportunities for Wi- Fi devices to perform frequency hopping when experiencing deep fading or severe interference.
  • spatial diversity can be exploited on multiple-input-multiple-out (MIMO) Wi-Fi devices, which is a mature technique that greatly boosts the spectral efficiency.
  • MIMO has not only become an essential component of IEEE 802.11n/ac but also been ubiquitously deployed on numerous commercial Wi-Fi devices.
  • both types of diversity can be harvested to provide fingerprint with much finer granularity and thus lead to less ambiguity in comparison with the fingerprint measured with a bandwidth of only 40 MHz.
  • FIG.29 shows the general principle of creating a large effective bandwidth by exploiting the frequency and spatial diversities either independently or jointly. Since Wi-Fi devices can work on multiple Wi-Fi channels, one can exploit the frequency diversity by performing frequency hopping to obtain CSIs on different Wi-Fi channels. As demonstrated in FIG.29(a), CSIs on four different Wi-Fi channels are concatenated together to formulate a fingerprint of a large effective bandwidth (a fingerprint comparable with one associated with a large bandwidth). Despite the fact that the frequency diversity can be exploited on a single-antenna Wi-Fi device, it is time-consuming to perform frequency hopping. For time efficiency, spatial diversity can be exploited on multi-antenna Wi-Fi devices.
  • FIG. 29(c) shows an example of utilizing both the frequency and spatial diversities, where CSIs on two Wi-Fi channels and from two receiving antennas are combined into the fingerprint.
  • the spatial diversity is determined by the number of antenna links, while the frequency diversity is dependent on the number of available Wi-Fi channels. Denote the maximum spatial diversity by S, the maximum frequency diversity by F, and the bandwidth for each Wi-Fi channel by W , the effective bandwidth is calculated as S x F x W.
  • Algorithm 1 shown below elaborates on the calculation of As shown in
  • steps 4 - 9 are used to calculate the channel energies on the virtual link (s, f), while steps 10-14 are targeted to compute the modified cross-correlation of two fingerprints on the virtual link (s, f).
  • the channel energies and modified cross-correlation on each virtual link are
  • mapping phase the CSIs are collected from L locations-of-interest using Wi-Fi devices with S antenna links and across F Wi-Fi channels, ' denoted by In the localization
  • h' is obtained at a testing location, which may either be one of the L locations-of-interest or an unmapped location in the mapping phase. Then, the pairwise is calculated for all location-of-interest. Finally, the location is determined based on
  • is a threshold introduced to balance off the true positive rate and false positive rate in location determination.
  • is a threshold introduced to balance off the true positive rate and false positive rate in location determination.
  • the proposed system contains two Wi-Fi devices, each equipped with three omni-directional antennas.
  • One Wi-Fi device called Origin
  • the Origin estimates CSI from the other Wi-Fi device, named as Bot.
  • the Origin estimates the location of the Bot.
  • FIG. 31 shows one Wi-Fi device used in the proposed IPS.
  • the experiments are conducted in a typical office of a multi-story building.
  • the indoor space is filled with a large number of reflectors, e.g., chairs, desks, shelves, sofas, walls, and ceilings.
  • the CSIs of 50 candidate locations are measured, with 20 measurements for each location.
  • the CSIs at each location are partitioned into a training set and a testing set, with 10 CSIs for each.
  • the TRRS matrix is calculated using the CSIs collected at the 50 candidate locations.
  • Each element of the matrix represents the TRRS between the CSIs at the training location and the testing location.
  • the diagonal elements of matrix indicate the similarity between CSIs at the same location, while the off-diagonal elements stand for the similarity between CSIs of different locations.
  • FIG. 30 illustrates the TRRS matrices under effective bandwidths of 10, 40, 120, and 360 MHz.
  • the diagonal elements of the matrices are close to 1, signifying high similarities among CSIs of the same locations.
  • the off- diagonal elements they become smaller with an increasing effective bandwidth.
  • the effective bandwidth is small, e.g., 10 MHz, some off-diagonal elements are even larger than the diagonal elements, giving rise to localization errors. In other words, it is very likely to localize the Bot to incorrect positions when the effective bandwidth is small.
  • the gap between diagonal and off-diagonal elements enlarges, which provides a clear watershed between the correct and incorrect locations and leads to an enhanced system
  • FIG.32 shows the cumulative density functions of the diagonal and off-diagonal elements in TRRS matrices under a variety of effective bandwidths.
  • the gap between the diagonal and off-diagonal elements increases with the effective bandwidth, indicating a better distinction between different locations.
  • a perfect localization can be achieved with an appropriate threshold, i.e., 100% true positive rate and 0% false positive rate. The true positive rate and the false positive rate can quantify the possibilities of detection and false alarm, respectively.
  • the true positive rate defines the possibility that the device is localized at the correct location
  • the false positive rate defines the possibility that the device is localized at an incorrect location. For instance, if one places a device at location A, and the localization system correctly identifies the location as A, then it is a detection that contributes to a true positive rate. On the other hand, if one places a device at location A, but the localization system localizes the device at location B, then it becomes a false alarm to location B, which contributes to a false positive rate. In practice, we perform extensive experiments to evaluate how many times the device is correctly localized as well as incorrectly localized to calculate the true positive rate and the false positive rate numerically.
  • the true positive rate and the false positive rate quantify the possibilities of detection and false alarm respectively.
  • Their physical meaning in the localization system is: the true positive rate defines the possibility that the device is localized at the correct location, and the false positive rate defines the possibility that the device is localized to an incorrect location. For instance, if we place the device at location A, and the localization system correctly identifies the location as A, then it is a detection. On the other hand, if we place a device at location A, but the localization system localizes the device at location B, then it becomes a false alarm to location B. In practice, we perform extensive experiments to evaluate how many times the device is correctly localized as well as incorrectly localized to calculate the true positive rate and the false positive rate numerically.
  • FIG.33 demonstrates the receiver operating characteristic curve with human activities. For a fixed false positive rate 0.15%, the true positive rate increases from 94.17% with 40 MHz effective bandwidth to 99.11% with 120 MHz effective bandwidth.
  • FIG.34 depicts the receiver operating characteristic curve with large object movement.
  • the true positive rate increases from 75% with 40 MHz effective bandwidth to 76.38%, 87.12%, and 95% with 120, 240, and 360 MHz effective bandwidths, respectively.
  • This can be justified by that with a large effective bandwidth the environment dynamics only affect very limited information in the fingerprint while leaving the majority intact.
  • a large effective bandwidth enhances the robustness of the proposed IPS against environment dynamics.
  • Wi-Fi access points are the Wi-Fi devices that host a network and provide wireless connectivity to other Wi-Fi-compliant devices.
  • An example of Wi-Fi access points is the wireless routers used in homes and offices.
  • CSMA/CA carrier sense multiple access with collision avoidance
  • these Wi-Fi access points would not transmit signals whenever they sense that the IPS is operating to obtain CSIs, which guarantees that the captured CSIs are free from interference. Therefore, the proposed localization system could avoid the interference from other Wi-Fi devices, and it would not introduce interference to other Wi-Fi devices.
  • the TRRS for a large effective bandwidth can be used in applications such as positioning, tracking, guard system, and breathing monitoring.
  • a manager of an animal zoo can put a Wi-Fi device, served as a Bot, on an animal in cage, e.g.
  • the disclosed system can use another Wi-Fi device, served as Origin here, to obtain CSIs from the Bot for all possible locations the Bot can be in the cage and store these CSIs associated with corresponding locations in the cage. Then during the positioning process, the system can detect the CSI of the Bot at any time, determine a similarity, e.g. based on TRRS, between the detected CSI and each of the stored CSIs, and select the stored CSI that is closest to the detected CSI, e.g.
  • the system can estimate that the Bot as well as the animal is located at the location in the cage corresponding to the selected CSI at this time. In another case, when the largest TRRS does not exceed the pre-determined threshold, the system can estimate that the Bot as well as the animal is outside the cage at this time. This may give an alert that the animal has escaped from the cage.
  • the wireless positioning system can be utilized in a Safari park to determine a location of a wild animal in the park, or utilized in a Sea World to determine a location of a fish or a shark, and/or whether it has escaped from a restricted area.
  • spatial and frequency diversity can be exploited to improve accuracy of the positioning here. Because the animal can move to any unexpected area where LOS is weak or not available, the disclosed system can provide accurate positioning under this NLOS scenario by increasing effective bandwidth with exploited diversities.
  • the disclosed system in the present teaching may support wireless tracking in a crowded public place.
  • a mother of a kid can obtain a pair of Origin and Bot, e.g. each of them is in form of a wristband.
  • the mother can track the kid in the state fair area. This may be achieved when the disclosed system continuously monitoring the change of CSI from the Bot to the Origin, and determine whether there is a big change of the CSI, e.g. based on a similarity metric like TRRS between the current CSI and a latest CSI.
  • the Origin may inform the mother, with light and/or sound, that maybe the kid is moving or being moved to an unexpected direction.
  • the TRRS can be utilized to determine a moving speed of the Bot relative to the Origin.
  • the Origin can inform the mother, with light and/or sound, if the kid is moving or being moved in a higher than desired speed. This timely notice can help the mother to keep the kid within her control in a crowded area.
  • CSI is based on a Wi-Fi network
  • the disclosed system can also work when the CSI is extracted from devices of various other protocols, such as
  • the present teaching discloses a time-reversal method for indoor localization that achieves centimeter accuracy with a single-pair of off-the-shelf Wi-Fi devices that can be easily purchased in the market.
  • the high accuracy for localization is maintained under strong NLOS scenarios.
  • Extensive experiment results in a typical office environment show that the centimeter accuracy as well as robustness against dynamics can be simultaneously achieved with a large effective bandwidth.
  • the global GPS can achieve 3 - 15 meter of accuracy by mapping the world into latitude and longitude coordinates.
  • the presented "indoor GPS" can achieve 1 - 2 cm accuracy when an indoor environment is fingerprinted and mapped.
  • the next step for calculation is to combine the (normalized) resonating strength of each link to form a general feature.
  • the following describes four methods for combining the time reversal resonating strength..
  • D is the total numb er of antenna links.
  • D is the total numb er of antenna links.
  • the ENERGY WEIGHTED COMBINATION of TRRS between channel T U and T V is
  • the ENERGY WEIGHTED COMBINATION combines different links according to the product of channel gain b ), ⁇ b ', ⁇ A link with a better quality (i.e., a higher channel gain) will be put on more weight than others.
  • the ENERGY WEIGHTED COMBINATION combines different links according to the product of channel gain b ), ⁇ b ', ⁇ A link with a better quality (i.e., a higher channel gain) will be put on more weight than others.
  • the ENERGY WEIGHTED COMBINATION combines different links according to the product of channel gain b ), ⁇ b ', ⁇ A link with a better quality (i.e., a higher channel gain) will be put on more weight than others.
  • the ENERGY WEIGHTED COMBINATION combines different links according to the product of channel gain b ), ⁇ b ', ⁇ A link with a better quality (i.e., a higher channel gain) will be put on more weight than others.
  • antenna link 1, 4, 7 represent the antenna links between transmitting antenna 1, transmitting antenna 2, and transmitting antenna 3 to the same receiving antenna 1, respectively.
  • ( 4 ⁇ 1,4,7 ⁇ .
  • the channel state information may be affected by (i) initial phase distortion caused by carrier frequency offset (CFO) 5 and common phase offset (CPE) 6, and (ii) linear phase distortion caused by symbol timing offset (STO) 7 and sampling frequency offset (SFO) 8. [00290]
  • CFO carrier frequency offset
  • CPE common phase offset
  • STO symbol timing offset
  • SFO sampling frequency offset
  • channel state information fingerprint such as channel state information fingerprint type I.
  • H 4,4 [k] represents the channel state information fingerprint received at receiving antenna 1 from transmitting antenna 1
  • H /,4 [k] represents the channel state information fingerprint received at receiving antenna 1 from transmitting antenna 2, respectively.
  • Z[,H,z and Z4,H,z are the fingerprint energies calculated by and r espectively.
  • model-based appproaches such as modeling the CSI fingerprint as jointly Gaussian distributed random complex vectors and calculate the distance in the probability space instead of calculating the resonating strength.
  • FIG.36 illustrates the ratio of time in calculating a TRRS matrix between using the “max” search based approach and a CSI fingerprint method (type I), where the x-axis denotes the number of CSIs involved in the TRRS matrix calculation, and Nser denotes the number of searches in the“max” operation based approach.. It is seen that time complexity is greatly reduced by using the CSI fingerprint method, and the improvement increases with the problem size.
  • One benefit of using CSI fingerprint is that, we can use the
  • Linear phase offset cleaning First, let us take a look at the linear phase offset a. In some examples, one way to eliminate a is to have a linear fitting over the phase components along all subcarriers and then extract the slope as the estimated linear phase offset. Even though it is correct during analysis, the linear fitting method may not in actual implementation due to the noisy unwrapping.
  • Linear phase calibration with unwrapping The raw channel state information phases are concentrated [ ⁇ p,p], which are referred to as wrapped phase q ⁇ . In order to linear fit the channel state information phase along all the subcarriers, we need first to unwrap the phase on e ach subcarrier as
  • the error may be introduced with an amplitude at least because of the false-trigger
  • FIG.37 An example of linear fitting method on CSIs from the same location (state) is shown in FIG.37.
  • the left figure shows the phase of the wrapped raw CSI on each subcarrier, where the two curves represent CSI collected in two realizations of channel probing. After removing the phase wrapping, there phase becomes more contnous as is observed in the middle figure. Since the two curves show CISs collected from the same channel probing, they should be roughly on top of each other. However, due to the phase distortion, they are not.
  • the right figure shows the phase after a linear fitting based phase offset method and it is seen that the unwrapping operation introduces errors. [00311] From experiments, we also observe that when in power, i.e., the signal-
  • Equ. (26) the superscript ⁇ denotes the conjugate operation, ⁇ is an integer representing the distance of shifting on and the initial phase or common phase offset is naturally canceled out in
  • Equation (28) As shown in Equ. (28), besides the true linear phase offset ⁇ , we have a residual term and is approximately fixed for each location as
  • phase on each subcarrier is independent and uncorrelated, is quite small and can be
  • phase calibration and the initial phase calibration can be implemented in parallel, and both of them are array-operation which is fast and efficient.
  • the phase calibration method described above calibrates and compensates the phase for each channel state information without the requirement of a reference channel state information, which is needed for previous prior art channel state information alignment algorithms. From experimental results, the CSIs after calibration are all consistent and aligned well when they come from the same location/state.
  • the remaining channel state information can be viewed as the ground-truth channel state information which has no phase distortion. As a consequence, there no longer needs the FFT- based method to calculate the resonating strength.
  • the obtained CSIs keep the ground-truth phase information that may be used to estimate AoAs or ToFs.
  • the simple inner product method is used to calculate the resonating strength of the calibrated CSIs. Now the resonating strength preserves its physical meaning as that it is the electromagnetic wave response to the indoor environment through which it propagates during transmission.
  • FIG.39 The example of the proposed phase offset sanitization method, including linear phase offset and initial phase offset is shown in FIG.39.
  • the right figure in FIG.39 shows that the two curves on almost on top of each other, indicating the linear phase offset and initial phase offset are both compensated. The divergence in the last figure is due to the unwrapping and will not affect the resonating strength calculation.
  • the linear phase calibration and the initial phase calibration can be implemented in parallel, and both of them are array-operation which is fast and efficient.
  • the proposed phase calibration method calibrates and compensates the phase for each CSI without the requirement of a reference CSI, which is needed for previous all CSI alignment algorithms.
  • the CSIs after the proposed calibration are all consistent and aligned well when they come from the same location/state.
  • the remaining CSI n ⁇ r can be viewed as the ground-truth CSI which has no phase distortion.
  • the FFT-based method to calculate the resonating strength.
  • the obtained CSIs keep the ground-truth phase information that might be used to estimate AoAs or ToFs.
  • simple inner product method is used to calculate the resonating strength of the calibrated CSIs. Now the resonating strength preserves its physical meaning as that it is the EM wave responds to the indoor environment through which it propagates during transmission.
  • Equation (1) the time reversal resonating strength in Equ. (1) for each link in a multiple-input, multiple-output (MIMO) system, can be calculated as:
  • is the vector of Gaussian noise, and is a complex normal distribution
  • Equ. (36) a pproximation is equal to the variance
  • Equ. (44) [00331]
  • ⁇ 3 is defined as
  • suppos is a sequence of
  • the ⁇ parameter defined as when belong to the same multipath profile, is a random variable under the lo -normal distribution with the location parameter
  • TR machine as disclosed in the present teaching may be utilized in various applications, which may include healthcare applications, virtual reality (VR) applications, gaming services, indoor and outdoor security services, military applications, smart home applications, smart city applications, etc.
  • the TRM may be coupled with devices including: wearable devices (e.g. shoe, wallet, hat, belt, vest, backpack, carrying case/holder (e.g. for phone/gaming device/ media player/glasses/objects), children-clothing, senior-citizen-things, wearable in clothing, etc.);
  • household electronics e.g. TV, DVD/Blu-Ray, gaming device, tablet, notebook, smart phone, baby monitor, security camera, clock, fan, ceiling fan, air-conditioner, heater, vent, Wi-Fi router, computer, printer, mouse, mouse pad, computer monitor, Hi-Fi system, speaker, etc.
  • household items e.g. vase, light fixtures, light bulb, switches, wall sockets, books, stationaries, household decoration, slipper, floor mat, etc.
  • building material e.g. tiles, dry wall, door, window, wall paper, garage door, door handle, wall power socket, hand rail).
  • TR can be used with any standardized or non-standardized wireless communication system.
  • TR can be used with Wi-Fi (IEEE 802.11 family of standards).
  • TR may be used with any standardized or non-standardized wireless communication system that uses RF EM waves to propagate information from a sender to a receiver. Examples include: GSM, WCDMA, IS-95, CDMA2000, LTE, LTE-A on the cellular side, and Bluetooth and ZigBee on the short-range/unlicensed side.
  • TR may also be used with any wireless systems and standards to be developed in the future, e.g. MulteFire, 5G systems.
  • TR systems without using RF-based EM wave forms.
  • TR systems which are not based on RF EM waves to send information from source to destination.
  • the principles of TR can be applied to any systems that emit and receive any other type of analog wave forms as well, e.g. acoustic waves, ultrasound, infrared.
  • TR devices bots and origin(s)
  • acoustic waves or ultrasound or infrared
  • These devices could be placed into the walls, or into the floors of a building and use ultrasound (or ultrasound or infrared) waves for communication.
  • the devices would emit and receive acoustic waves (or ultrasound or infrared), and estimate the acoustic (or ultrasound or infrared) channel.
  • acoustic waves or ultrasound or infrared
  • estimate the acoustic (or ultrasound or infrared) channel e.g. monitoring and surveillance.
  • EM waves e.g.
  • the antenna, power supply and/or system of the TRM may be fire-proof, heat- resistant, water-resistant, shock-resistant or housed in a fire-proof, heat-resistant, water-resistant, shock-resistant enclosure.
  • the fire-proof, heat-resistant, water-resistant, shock-resistant may be used to house other devices to provide emergency service (e.g. emergency lighting, emergency communication system, emergency beacon, emergency medical kit).
  • the TRM may perform TR-based data communication (e.g. uplink, downlink, or both) while transferring power wirelessly.
  • TR-based data communication e.g. uplink, downlink, or both
  • There may be chips designed to perform/control TR-based operations e.g.
  • a TRM may be combined with a surveillance camera in a healthcare application.
  • the system for healthcare application may include the TRM, a camera, a microphone, and/or a video recorder.
  • a camera may be used in healthcare application to perform line-of-sight (LOS) video-based surveillance, infra-red surveillance, heat imaging, live streaming, intrusion detection, estimate 3D shape, features, color and dimension of room/objects/human, estimate weather/lighting/terrain/street/household natural/artificial structures of environment, objection detection/identification, video recording, motion analysis (e.g. gait analysis, gesture analysis, emotion analysis, skin tone analysis, age analysis, facial expression analysis, health analysis, human activity detection, using computer vision), crowd analysis, tracking, patient analysis, iris analysis, tele-medicine, remote operation, sleeping monitoring/analysis, advertisement targeting, fire detection, conversation
  • LOS line-of-sight
  • a microphone may be used in healthcare application to perform NLOS audio surveillance, baby/old folk monitoring, television viewing habit monitoring, advertisement targeting, sleeping monitoring/analysis, conversation monitoring, keyword spotting/detection, speech detection/recognition, and NLOS sound event detection.
  • the microphone with audible/non-audible sound source (speaker) placed intentionally placed next to microphone, may be used to perform echo location. The echo pattern may be compared or matched with the CIR of TRM. Time of flight analysis may be performed.
  • TRM may be used in healthcare application to perform NLOS TR-based surveillance, live streaming, intrusion detection, object detection/identification, TR-based recording, motion analysis (e.g. periodic motion detection, breathing detection, fall down detection, etc.), crowd analysis (e.g. estimate the number of living people present), sleeping monitoring/analysis, tracking, provide wireless power transfer to the surveillance camera in the healthcare application, provide wireless power to charger for rechargeable batteries.
  • TRM with bot intentionally placed next to origin, may be used to perform echo location (like what bats, dolphins, whales do).
  • the video information from the camera may be used to help TRM to map (calibrate) the room, help/calibrate/confirm periodic motion detection/estimation, event detection, gesture/gait, intrusion detection, breathing detection, count number of people, fall down detection, sleeping monitoring, tracking.
  • the sound information may be used to perform NLOS surveillance, intrusion detection, object estimation/identification, help/calibrate/confirm periodic motion
  • the TRM can be combined with children-clothing for healthcare applications of children.
  • the TRM sensor attached to the children-clothing sends RF signals to the Wi-Fi router at home to facilitate health monitoring for the children or infants at home, including but not limited to breathing monitoring and heartbeat monitoring and stress monitoring.
  • the Wi-Fi router sends the received signal to a remote server such as the cloud for analysis.
  • the TRM sensor(s) may be used for idling detection. Two TRM sensors in proximity of each other may detect the presence of each other and report to the origin.
  • the TRM can be combined with clothes for lie detector.
  • the TRM sensor is attached to the clothes and the person under investigation is required to wear the clothes.
  • the sensor emits RF signals to the Wi-Fi router to perform real-time monitoring on the health status of the person to detect abrupt changes in the patterns of breathing, heartbeat, or other health status.
  • the breathing information from the TRM sensor can be used to study sleeping patterns, work patterns, attention patterns, stress patterns, emotional patterns, etc. In some other embodiments, the breathing information may be used to perform lie detection and emotion detection, as breathing rate tends to be elevated when a person lies and/or undergo emotional swing.
  • the TRM devices (bots and/or origins) in clothing worn by children, old folks and/or pets may be used for tracking children, old folks, and/or pets. TRM can be combined with clothes for health monitoring of seniors.
  • the TRM sensor is attached to the
  • the TRM can be combined with children-clothing for vital sign detection of kids in a car to prevent incidents where kids are forgot in the car.
  • the TRM sensor is attached to the children-clothing/accessories/toys (or pet clothing/accessories), a car/vehicle/vessel/facility, a museum, a cinema, a mall, a store, a shop, etc.
  • the sensor When the car/vehicle/vessel/facility is parked and kept stationary for some time, the sensor starts transmitting RF signals to nearby access points which could forward the information to a remote server or cloud for analysis or process locally for vital sign detection.
  • the remote server or cloud could notify parents (or car owner, owner of facility, or police) on the presence of children left in their car.
  • the vital signs may belong to children left in car/vehicle/vessel/facility, old folks aging at home, intruders/thieves, etc.
  • the vital signs may belong to people sleeping in a room (e.g. in a motel/hotel). The amount of people in the room can be estimated.
  • the emotional/stress/ sleeping state may be estimated from the vital sign.
  • the TRM can be combined with clothes for crowd estimation. Here, all people are needed to wear the specialized clothes for vital sign detection. It can detect the number of people worn the clothes in a specific area. A more useful case is passive people counting.
  • the TRM device, some camera and some microphone may be combined to estimate the amount of people in the crowd.
  • the crowd emotional state may be estimated based on the average rate of breathing.
  • the sensor is attached to the clothes worn by multiple people-of-interest.
  • the sensor can emit RF signals which are collected by one or several access points for analysis. The access points could forward the information to a remote server or a cloud system for analysis or processing locally.
  • the number of vital signs can be detected from the collected RF signals.
  • a TRM may be combined with a security camera for continuous standalone monitoring.
  • the security camera with network access and/or power supply and/or speaker can be used in environment LOS security monitoring, suspicious people reporting, perimeter security, theft prevention, and theft deterring.
  • the TRM together with the camera, network access and/or power supply, can be used in environment security monitoring in both LOS and NLOS conditions, blind spot monitoring, providing second opinion on security, reducing false alarm.
  • the TRM can also be used in the NLOS security applications such as perimeter security, privacy preserving security applications.
  • the TRM can be combined with baby’s
  • the TRM can also be used for breathing detection such as baby breathing night monitoring, incubator monitoring, obstructive sleep apnea.
  • the breathing detection from the TRM may be recorded (e.g. stored in the cloud) and analyzed medically by doctors/personnel, or by medical analysis software to analyze the health, well-being, some symptoms (e.g. stuffy nose), emotion (e.g. crying, laugh, happy, sad, stress) of the baby.
  • the software may be used by some machine learning algorithm and expert system.
  • the breathing detection may be combined with interactive baby gaming/educational system to provide feedback to the game as to the response (e.g. surprise, happy, sad, boring, or excited) of the baby to the game.
  • the TRM can be combined with automatic floor sweeping machine for complete mapping of the floor.
  • the TRM together with the automatic floor sweeping machine and/or memory and/or processor can be used for precise mapping of the floor, for efficiently use the traverse the whole floor.
  • the TRM may be used to help the automatic floor sweeping machine to avoid obstacles, or forbidden area.
  • Building material e.g. tiles, dry wall, door, window, wall paper, garage door, door handle, wall power socket, hand rail
  • Building material e.g. tiles, together with metals, may be used in indoor monitoring applications to create specific reflection and propagation patterns for wireless signals so that it helps the TRM with the processor and memory, to focus on and capture indoor target events.
  • doors like garage doors, and windows, together with the TRM, the processor and the memory may be used in indoor monitoring applications to perform building management, entrance management, smart home, auto-lock system.
  • Walls and garage doors, together with the TRM and the processor may be used in auto-parking applications to perform distance estimation and angle estimation for vehicles parking inside and/ or outside garages, and to detect if any cars park at any specific or not allowed areas.
  • Door handles, together with the TRM, the memory and the processor may be used in home security applications to perform human identification, gesture control, indoor surveillance monitoring, and entry control.
  • Wall power socket, together with the TRM and the processor may be used in home security system to perform indoor monitoring, to monitor live (especially pets such as dogs and cats) conditions and to track the energy usage at home.
  • the TRM may be used in applications to detect existence of human being in a building and/or in a typical area, e.g., to detect the availability of the restrooms or fitting rooms.
  • the TRM may be used in home surveillance applications to perform entry monitoring of doors or windows, to monitor the status of doors and windows, e.g., to secure a vacation house, and to work as wireless punch-card machines that records that who, at what time, opens a door enters the office.
  • the TRM may be used in human identification applications to identify individuals using wireless signals, to confirm individual identities with the assistance of cameras and microphones.
  • the TRM can be used in living monitoring applications to perform pet monitoring where one can track if pets open a door or get out from the area where they supposed to be, to perform infant monitoring to make sure if they get out from the cradles or baby beds or check if they fall asleep or wake up.
  • the TRM may also be used in activity monitoring applications to perform monitoring over patient walking practice and recovery in physical therapy centers, to perform senior citizen monitoring to track their breathing rate and monitor if they fall down, to perform safe monitoring in gyms that it can check and report if anyone falls from treadmills.
  • the CSI can be used to identify the meeting room/the house/the office/the space, and/or the user in the space.
  • the TRM together with wearables such as children’s shoe, hat, belt, backpack, children-clothing, and senior-citizen-things, can be used in tracking/monitoring children/senior citizen. They can also work with each other in ad-hoc security systems to provide
  • the TRM may be powered by rechargeable battery connected to solar panel to be charged.
  • the wearable sensors are used as a TR device, one can use an indoor tracking system for real-time
  • a TRM can be used in a gaming device for 3 dimensional tracking.
  • a gaming device including the TRM with processor and memory and/or display may be used in 3 dimensional tracking in games to perform LOS video based tracking information, movement detection, posture recognition, movement identification, virtual reality interaction, speed estimation.
  • the TRM, together with the game console controller and the processor and memory and/or display, may be used in 3 dimensional tracking in games to perform real time tracking, interaction with avatar in games, posture scoring, poster detection, movement detection, movement identification.
  • the TRM together with the game console controller, the infrared camera, can be used in 3 dimensional tracking in games to perform precise positioning with depth information for games to remove occlusion, to render user with augmented reality, to separate users at different depth, to track user motion, to track user hand/leg/head/body motion.
  • the TRM can also be used to determine the speed and location of the user in 3 dimension space in the gaming applications for determining the user’s augmented location information into avatar interaction.
  • a TRM can be combined with a VR device (e.g. a VR helmet) to provide a more realistic experience with moving.
  • the TRM may enhance the VR experience of a user by providing indoor tracking, by providing customized gaming environment that matched the real/actual space of the household, by giving children training to avoid dangerous space such as kitchen, by realizing the AR without projecting light into eyes, for haunted house experience.
  • the TRM together with cameras and microphones, may be used in motion sensing games to perform wireless gait and gesture recognitions and to interact with computers or other players in VR games.
  • a TRM together with inertial measurement units, processors, memory and display, may be used in military training to perform as tracking devices, especially in indoor and/or scatter-rich environment.
  • TR devices can be tracked simultaneously and the location information of allies can be shared among them in complex indoor environment in which scenario GPS would fail. It also can be used to monitor the breathing of the soldier and/or other nearly people (even enemies) or animals (e.g. dogs).
  • multiple bots may be dropped by aerial vehicles (e.g. drones) or shot from gun to an area beyond the area to be monitored.
  • aerial vehicles e.g. drones
  • a soldier operating an origin serving as a mobile base station
  • Sensitivity may be adjustable so that minor disturbance from small animals (e.g. mouse) or from wind may be filtered out.
  • Multiple bots may be operating at the same time. Some bots may function as origins with respect to other bots so that a bigger area can be monitored. The bots can be retrieved/re-used later when being safe. Wireless power transfer may be used to provide remote power to the bots so that the bots may function indefinitely.
  • the bots may be packaged in camouflage packaging.
  • the bots may also function as an ad-hoc network so that a TR-based battle-field communication system can be set up quickly. [00365]
  • the bots may interact with multiple origins so that collaborative processing/data fusion can be performed for improved performance.
  • the TRM can be combined with bulletproof vest for military applications.
  • the TRM sensor attached on the bulletproof vest/headset/helmet emits RF signals to the base station at the command center on the battlefield (or crime scene or disaster sites) to facilitate remote health monitoring for the soldiers (or law enforcement officers or fire/rescue worker) on the battlefield (or crime scene or disaster sites), including but not limited to, breathing monitoring and heartbeat monitoring.
  • Multiple TRM sensors can be attached to the chest and back of the soldier (or law enforcement officer or fire/rescue worker) simultaneously to mitigate the effect of other objects nearby to enhance the remote health monitoring.
  • a TRM may be combined with household electronics (air-conditioner, heater, vent, Wi-Fi router, computer, printer, mouse, mouse pad, computer monitor, Hi-Fi system, speaker, etc.), e.g. an air-conditioner (heater, vent), together with processor and sensor, RF module and/or memory, may be used in smart home application to perform automatic temperature control, remote temperature control, learning personal preference, live monitoring, conserve energy when you are away, lights up the information on display when you walking nearby.
  • household electronics air-conditioner, heater, vent, Wi-Fi router, computer, printer, mouse, mouse pad, computer monitor, Hi-Fi system, speaker, etc.
  • processor and sensor RF module and/or memory
  • the TRM can be used in smart home application to perform automatic control, remote control, energy saving when users you are away, lights up the information on display when users request, learning personal preference.
  • TR technology all household electronics (air-conditioner, heater, vent, Wi-Fi routers, computers, printers, mouse, monitors, Hi-Fi systems, speakers, washing machines, refrigerators, microwave ovens, TVs, phones, fireplace) can be connected simultaneously and wirelessly within the smart control of the TRM, which may be based on an advanced algorithm like machining learning to provide better experience for customers.
  • Furniture such as table, chair, sofa, tiles, window, door, fireplace, wardrobe, handle, locks, wall decoration, suitcase, sheet rock, wall material, ceiling material, floor material, wall paper, vinyl siding, hardwood floor, stucco, shingles, bricks, clock, concrete molding, plastic molding, sink, photo/photo frame, window blind, power socket, cable, fabric, leather, refrigerator, shelves, racks, book shelves, accessories, home appliance (e.g. fan, microwave oven, toaster, TV, light fixture, light bulbs, pans, cookers, air purifier, heater, container, etc.), and other indoor/outdoor fixtures, etc., may be used in wireless power transfer to act as scatterers when painted with materials having a large electromagnetic reflection coefficient, or the surfaces patterned (e.g.
  • Wi-Fi routers together with processor, memory, and RF module, can be connected either through wires or wirelessly to the backbone network in order to handle multiple devices streaming, downloading, uploading and sharing at the same time. With the processor and RF module, one/several Wi-Fi routers can cooperate together to provide the entire coverage for a large house, e.g., of the 3000-4500 square feet.
  • a mobile device e.g., smart phone, tablet, computer
  • smart programs can assist the Wi-Fi routers to avoid Wi-Fi congestion, smart handover between multiple Wi-Fi routers, and Wi-Fi router location optimization.
  • Wi-Fi routers can be remotely controlled through an app on a smartphone.
  • the TRMs together with processor and memory, can achieve more advanced service besides the current capability of Wi-Fi routers.
  • the TRMs may further reduce the interference between each other with the beamforming, provide another physical-layer security, and more secured access/authorization control.
  • users can specify which device to support with a customer-defined QoS.
  • a digital pen together with digital plate/screen/paper, software application, and developer tools, can record the drawing/writing with the digital pen on the digital
  • TR devices may be integrated into electric devices such as light bulbs, electric sockets, and power distributors.
  • the TR devices As the TR devices become smaller and smaller, they would eventually become IoT devices, such that one could combine the TR devices (bots and/or origins) with any electric appliance, device or home/office power distribution system or light source (e.g. microwave ovens, toasters, light bulbs, electric sockets, power distributors, etc.).
  • the TR devices would be powered by the electric power the appliance or electric device receives.
  • the TR functionality (monitoring, tracking etc.) would be implemented as an embedded mini-device in the appliance or electric device.
  • a TR device could be integrated into a light bulb: a light bulb may contain a TR device, receive power from the electric power the light bulb receives, and could function and a bot or origin, sending and receiving TR-related RF signals through its air interface/antenna and could be a part of a home security monitoring system.
  • the TRM device may keep track of the time when the light is on and when it is off to monitor the habits of the user (at home/outside home). After the light is off for a period of time, the sensitivity of TRM may be increased. When the light is turned on or off (by a thief) and when the system is armed, the TRM may trigger alarm sound.
  • the TRM may control the light to signal the security status to the house owner (e.g.
  • the TRM may modulate the light (at a frequency invisible to human eye) to transmit data to another light-sensitive device.
  • a book shelf or a floor tile could contain special thin wires or metal/aluminum foil such that after installation, the item would reflect EM waves better, thus creating richer multi-path components in the effective channel impulse responses. This could improve the performance of TR-based
  • conductive material in other building materials such as dry wall, door, window, wall paper, garage door, wall power socket, hand rail to create more RF propagation paths.
  • the surface of the home/office furniture and/or flooring and/or any surface may be engineered/designed to have special shapes (e.g. with special micro structures designed with respect to the wavelength of carrier frequency) that would create many multi-path reflections, refraction, diffraction and other changes in EM propagation directions.
  • the TRM may be used in indoor emergency rescue operation by providing non-line-of-sight TR-based indoor navigation, especially in harsh environment conditions, such as dense smoke in a fire, limited space due to collapses in an earthquake, when line-of-sight-based tracking method is suitable.
  • the TRM can be combined with devices like iRobot for more precise programming of route etc.
  • the TRM can be combined with iRobot (self-guided cleaning device) to provide efficient automatic cleaning of the house.
  • the TRM may enhance the user experience by providing precise location and better programming of route, by reducing the total time for cleaning, by improving the positioning for the routing algorithm and eliminating the location ambiguity using the channel information.
  • the iRobot may avoid the room. With indoor position, the iRobot may be used to transport things (e.g. drink, food, snack, stationary, printed matter, mobile phone, iPad, etc.) within a home.
  • the iRobot may also be used to transport one or more people (e.g. a baby, a child, a patient) and/or object (e.g.
  • a TRM may be used to help municipal services or in smart city related applications.
  • the TRM may be capable of forming an ad-hoc network in emergency situations (e.g. earthquake); establish communication through the ad-hoc network to the internet and/or emergency service such as police, ambulance, etc.; and be used for navigation inside water pipes, oil pipes, air ducts, maintenance pathways, man-holes, sewage systems, rain-water systems, coal mine, oil rigs, mining facilities, forests, caves, maze, maze-like facility, maze-like environment, etc.
  • the TRM can be combined with a drone to improve the smart city service.
  • the TRM together with small size autonomous/manned aircraft and/or communication protocol and/or delivery logistic system, may enhance the user experience in both indoor and outdoor delivery by enhancing the precision of the delivery, by better routing the delivery route via better precision positioning, and by better safety and property loss via better positioning.
  • the TRM can be combined with a drone to help the drone to fly/navigate indoor or around town accurately. While cars running on roads with traffic light, traffic rules and so on, drones can fly around a town at different 3D roads (e.g. a road at a height of 100 ft, another road above it at 200 ft, etc.). The TRM can guide the drone precisely along the road without hitting each other.
  • the road at 100 ft may have two lanes, one going in one direction and the other lane in the other, with traffic direction similar to the car traffic below.
  • the road at 100 ft may have 8 lanes, with 4 lanes in one direction and 4 lanes in the opposite direction. Some lanes may be for fast moving drones. There may be speed limits for the drones, perhaps for each lane. Drones may need to stop at traffic lights and may have right-turn lanes. Drones may be able to turn right on red.
  • the drone may be flown by machine, by robot, or by human.
  • There may be emergency drones like to emergency vehicles such as police cars, fire engines, ambulance, etc.
  • Air space indoor may be partitioned such that special“lane” or“lanes” may be defined/reserved for drones to fly.
  • The“lane” may be at floor level, close to ceiling, or at any height. The height may be different at different locations.
  • the flying lane for drones may be defined in underground tunnels, underground facilities, sewage systems, and mines (coal mine, gold mine, etc.).
  • Small flying lanes may be defined for small drones to fly in small cavities (e.g. air passage way in human body, animal body, etc.). Flying lanes may be defined in forests/woods while avoiding the trees therein.
  • the TRM together with other sensors for direction estimation, can be used in guiding a camera, perhaps mounted on a drone/vehicle/vessel, to follow a predetermined path for shooting a video, guiding a robot to move along a predetermined path for inventory management in a warehouse, manufacturing in a factory/plant, guiding a driver to park in a garage.
  • the TRM can be combined with other sensors to provide better hospital
  • the TRM combined with sensors and/or camera and/or processor and/or memory, may be used in hospitals, rehabilitation center, fitness center, physical therapy clinics for movement tracking, movement identification, posture training, exercise training, posture monitoring, rehabilitation assistance, and movement range expansion.
  • the TRM can be combined with navigation monitor for maintenance/navigation and underground tracking.
  • the TRM combined with sensors and/or map and/or image processing algorithm, may enhance the safety for maintenance works by providing better location estimation in the dark or in near darkness (e.g. caves, underground structure, sewage system, air conditioning system, lighting system, water pipes, oil pipes, fuel lines, coal mines, indoor space out of electricity/light, space craft), by providing navigation routes on the map, by providing easy navigation infrastructure setup, by providing location estimation without GPS.
  • the TRM together with backpack, luggage, etc., maybe with some other sensors such as gyroscope for direction estimation, can be used in tracking/guiding travelers inside a metro station, railway station, subway station, parking lot, airport, and other public transportation, or guiding students/visitors/people inside a college/university/park/city/housing estate/museum/amusement park/concert hall/arena/gym/stadium/shopping mall/warehouse/logistic hub/parking lot.
  • the TRM together with brochure, pin, glasses, pen, bag, backpack, purse, speaker, bracelet, shoe, socks, and maybe with some other sensors for direction estimation, can be used in guiding visitor in exhibitions, museums, entertainment center, and hospitals.
  • the TRM can be used for detecting suspicious objects/person in law enforcement operations, in military operations, in crowd control, in security check in airport, railway station, exhibition, museum and other facilities.
  • the TRM together with processor and memory, can be mounted in an object such as train, bus, ship, stadium, shopping mall, convention center to count the number of people inside the object, to detect suspicious objects/persons, to detect people movement, to monitor people on board.
  • the TRM may be used for counterfeit money detection.
  • Counterfeit technology may include embedding some material (e.g. thin metal) which may affect the EM wave propagation patterns.
  • the TRM may be used with Point-of-Sale devices to detect/verify merchandise being purchased.
  • the TRMs may be embedded in ornaments to provide TR-based processing/service while providing ornamental value.
  • the TRMs may be used to provide communication, detect human/animals, detect and estimate depth/measure distance of hollow holes, caves, tubes, pipes.
  • There may be downloadable software for installation onto smart devices (e.g. smart phone, tablet, and notebook) for providing TR-based processing/service.
  • smart devices e.g. smart phone, tablet, and notebook
  • the TRM may be used in cars to monitor tire pressure, do intrusion detection, detect baby/pet left in car, etc.
  • the TRM may also be used in trucks/containers/freight vehicle to monitor the cargo area/bay.
  • the TRM may be used in containers to detect how full it is in a device, e.g.
  • TRMs may be used as thickness gauge (e.g. to measure thickness of metal sheets, metal walls).
  • Other Exemplary Applications may include: video- conferencing/communication, navigation, industry manufacturing, vehicle/asset/person/pet monitoring/controlling, agriculture automation, energy consumption, building management, embedded mobile, M2M & wireless sensor network, everyday things, telemedicine, etc.
  • the TRM together with a table (or a flat surface, or any surface, or an imaginary surface) and the measurement of the channel impulse responses (CIR) on the table’s surface and a monitor, may be used as a white board.
  • CIR channel impulse responses
  • the location of a TR device can be estimated when it is put on the table since the CIRs for the same location is similar in a static environment.
  • the trace of the device can be determined when the device is moving on the table which can be shown on a monitor.
  • the trace may be projected onto another surface (e.g. a flat surface, a curved surface, a 3D model of an object, etc.).
  • Gesture recognition, handwriting recognition, character/alphabet/letter recognition, cartoon figure/sketch/shape recognition, and object recognition may be applied to the trace.
  • the trace may be combined with other inputs (e.g. clicking, roller, roller ball, haptic) to provide shading, coloring, and/or labeling.
  • a cloud server can be used to collect the signals from TR devices for analysis, including but not limited to vital sign detection and monitoring.
  • Cloud computing can be used to analyze the collected signals on the cloud server to significantly boost the efficiency of vital sign detection and monitoring.
  • the TRM can also be combined with motor and molding elements for 3D printing.
  • the TRM, with motor and/or molding machine and/or pliable material ejector and/or processer and/or memory, may be used to provide precise movement of the structure (e.g. print head).
  • the TRM together with a notebook or a smart phone (an app in smart phone), can be used to monitor activities in a home, small business, plant, garage, etc.
  • the notebook/smart phone/smart device may form an ad-hoc network of TR-based communication network, security system, and/or health monitoring system.
  • the TRM may also be utilized in any device built with a specific purpose, e.g. a disco ball with many reflective surface, a spherical or aspherical surface to reflect EM waves, a spherical/aspherical/elliptical surface to focus EM waves, a hollow chamber to trap incoming EM waves and to channel/redirect/repurpose/amplify them to emit in some selected directions or all directions, etc.
  • CSI Storage and Transmission [00386] Channel state information (CSI) is the physical layer channel information which may have significant size and need compression.
  • each component of a CSI may be high (e.g.8 bit/sample, 12 bit/sample, 16 bit/sample, 24 bit/sample).
  • the proposed TR systems/devices may have multiple antennas on both transmitter and receiver sides (e.g.3x6 with 3 antennas for transmitter and 6 antennas for receivers, or 2x12, or 4x6, or 2x2, etc.), many pair-wise CSI may need to be captured and stored.
  • the proposed time reversal system may compress the CSI in two kinds of
  • Lossy compression may include some irreversible steps (such as quantization of some quantities (e.g. components of CSI) and/or some many-to-one mappings, etc.), while lossless compression may use reversible steps (e.g.
  • mappings may be different for different components.
  • the mappings used may be encoded and
  • mappings may be negotiable (e.g. between a source and a destination, perhaps based on available resources and/or what are being supported).
  • One kind of nonlinear mapping may be changed to another kind of nonlinear mapping using one or more transcoding steps.
  • the time sequence of CSIs (or the linear/nonlinear mapped version of the CSIs) may have a lot of redundancy in time domain. For example, the CSI at consecutive time instances may have high correlation in a relatively static environment. Even for a dynamic environment, some components (e.g.
  • multipath components in time domain, channel response components in some subcarriers in frequency domain, etc.) of temporally adjacent CSIs may be at least moderately correlated, especially when the changes are due to some changes of the environment (e.g. a fan rotating, a door opening, a person moving around, etc) instead of the wireless transmitter/receiver.
  • a time sequence of CSI may be cyclo-stationary such that correlation may be high periodically.
  • spatially adjacent CSIs may have high spatial correlation when the sampling grid is dense (e.g. high correlation within a focusing ball of 1.5 cm diameter).
  • the CSIs can be compressed (e.g. by using various off-the-shelf
  • CSI channel state information
  • L is the number of taps of the channel state information.
  • components of CSI may contain temporal, frequency, and/or other information.
  • h[1], h[2], h[L], etc. may be 8-bit (or 12-bit, 16-bit, 20 bit, or 24-bit, etc) digital samples of the received probing signal.
  • the sampling rate may be 125 MHz (or 20MHz, 40MHz, 60MHz, 80MHz, 100MHz, 150MHz, 200MHz, 300MHz, 500MHz, 1GHz, etc.).
  • Each entry in the CSI vecto is in general complex valued, and thus can be represented by
  • Re(x) represents the real part of x and Im(x) represents the imaginary part of x. Or, alternatively, it may be represented as magnitude-plus-phase, or other representation. [00392] Consider a possible time sequence of covering time index
  • each column h H has a form as shown in (52) and is a 2L*1 vector.
  • the matrix of H can be viewed as a“pseudo image of CSIs”, and has a size of 2L*T.
  • Each column h H is the CSI of one time instant and each row represents the time series of a particular component of the CSIs.
  • the proposed time reversal system may exploit the time redundancy along each row and compress the“pseudo image of CSIs” using an image compression method (e.g., using Tiny PNG, JPEG lossless, zip, JBIG and other lossless tools), video compression method (e.g. ISO/IEC MPEG-1/2/4/7/21, ITU- T H.261/2/3/4/5, etc), audio compression method (e.g. DPCM, MP3, AAC, etc.), speech compression method (e.g.
  • image compression method e.g., using Tiny PNG, JPEG lossless, zip, JBIG and other lossless tools
  • video compression method e.g. ISO/IEC MPEG-1/2/4/7/21, ITU- T H.261/2/3/4/5, etc
  • audio compression method e.g. DPCM, MP3, AAC, etc.
  • speech compression method e.g.
  • PCM PCM, DPCM, DM, ADPCM, LPC, CELP, AMR, VMR-WB, G.722, G.722.1, G.723.1, G.726, G.728, G.729, SMV, FNBDT, model-based coding, etc) and text compression method (e.g. ZIP, LZ, DEFLATE, LZW, PKZIP, GZIP, PNG, 7Z, LZMA, Huffman coding, Arithmetic coding, dictionary coding, etc.).
  • text compression method e.g. ZIP, LZ, DEFLATE, LZW, PKZIP, GZIP, PNG, 7Z, LZMA, Huffman coding, Arithmetic coding, dictionary coding, etc.
  • the pseudo image of CSIs may be traversed in horizontal zigzag, vertical zigzag, diagonal zigzag, antidiagonal zigzag, or other scanning patterns to convert it into a 1-dimensional structure.
  • the ith row (row i) of H can be predicted unidirectionally using past rows (row i-1, row i-2, etc) or future rows (row i+1, row i+2, etc), or bi-directionally using both past rows and future rows.
  • the prediction may be first order or higher order prediction.
  • the prediction may be linear or nonlinear. Different prediction (past, future, bidirectional) may be used for different rows.
  • Component-wise prediction may be used.
  • Each component hij may be predicted by one or more nearby components (e.g. h Hz may be predicted by
  • i L may represents
  • each link e.g., 9 pseudo images of CSIs can be constructed for a 3 by 3 antennas system.
  • Each pseudo image may be compressed independently as described above, or may be combined in some order to form a pseudo video. Interframe correlation in the pseudo video may be exploited using video coding methods.
  • each component of a CSI may have more than 8 bits (i.e. more bits than the number of bits in a pixel of an image, e.g. if a CSI component value is large and the range of the CSI value is large, higher bit precision may be used).
  • each CSI component may have 16 bit precision such that the highest 8 bits may go to a first image and the lowest 8 bits may go to a second image.
  • the multiple images may have different amount of redundancy (e.g. the highest-8-bit image may have higher correlation than the lowest-8-bit image).
  • Another possibility is to find the first image as an approximation of the highest-8-bits image to increase/maximize correlation (for easy
  • each CSI may be decomposed into multiple signals (e.g. multiple frequency subbands whose bandwidths may be equal and/or unequal, smooth sub-signal + edge sub-signal + texture sub-signal, binary tree/quad- tree decomposition, wavelet decomposition, etc) which when combined may yield the CSI.
  • Each decomposed signal may be compressed independently and/or jointly. [00395] Note that phase distortions may corrupt the CSIs (e.g. CFO, STO, etc).
  • the CSI maybe pre-processed to compensate for the phase distortion, noise and other artifacts/problems.
  • the taps in CSI time domain representation may be aligned such that correlation can be increased to improve compression efficiency, using symbol timing methods described in U.S. patent application 15/284,496, titled “TIME REVERSAL COMMUNICATION SYSTEMS,” filed on October 3, 2016.
  • the phase distortion in CSI frequency domain representation may be compensated using the methods described in PCT application PCT/US2016/066015, titled“METHOD, APPARATUS, AND SYSTEMS FOR WIRELESS EVENT DETECTION AND MONITORING,” filed on December 9, 2016.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne l'Internet des objets sans fil. Dans un exemple, l'invention concerne un client d'inversion de temps. Le client d'inversion de temps comprend un processeur, une mémoire couplée en communication au processeur, et un ensemble d'instructions qui, lorsqu'elles sont exécutées par le processeur sur la base de la mémoire, amènent le client d'inversion de temps à effectuer les étapes suivantes : couplage en communication avec un serveur d'inversion de temps par l'intermédiaire d'un réseau, obtention d'un ensemble d'informations d'état de canal (CSI), l'ensemble de CSI étant capturé lorsqu'au moins un signal de sondage est envoyé d'un émetteur sans fil à un récepteur sans fil par l'intermédiaire d'un canal à trajets multiples sans fil associé à un espace, et envoi de l'ensemble de CSI au serveur d'inversion de temps par l'intermédiaire du réseau.
PCT/US2017/015909 2008-09-23 2017-01-31 Procédés, dispositifs, serveurs, appareil et systèmes destinés à des applications d'internet des objets sans fil WO2017155634A1 (fr)

Priority Applications (32)

Application Number Priority Date Filing Date Title
US15/861,422 US11025475B2 (en) 2012-12-05 2018-01-03 Method, apparatus, server, and systems of time-reversal technology
US15/873,806 US10270642B2 (en) 2012-12-05 2018-01-17 Method, apparatus, and system for object tracking and navigation
US16/101,444 US10291460B2 (en) 2012-12-05 2018-08-11 Method, apparatus, and system for wireless motion monitoring
US16/125,748 US10833912B2 (en) 2012-12-05 2018-09-09 Methods, devices, servers, apparatus, and systems for wireless internet of things applications
US16/127,151 US11012285B2 (en) 2012-12-05 2018-09-10 Methods, apparatus, servers, and systems for vital signs detection and monitoring
US16/127,092 US10476730B2 (en) 2008-09-23 2018-09-10 Methods, apparatus, servers, and systems for human identification based on human radio biometric information
US16/200,616 US10495725B2 (en) 2012-12-05 2018-11-26 Method, apparatus, server and system for real-time vital sign detection and monitoring
US16/200,608 US10735298B2 (en) 2012-12-05 2018-11-26 Method, apparatus, server and system for vital sign detection and monitoring
US16/203,317 US10397039B2 (en) 2012-12-05 2018-11-28 Apparatus, systems and methods for fall-down detection based on a wireless signal
US16/203,299 US10374863B2 (en) 2012-12-05 2018-11-28 Apparatus, systems and methods for event recognition based on a wireless signal
US16/446,589 US10742475B2 (en) 2012-12-05 2019-06-19 Method, apparatus, and system for object tracking sensing using broadcasting
US16/667,757 US20200064444A1 (en) 2015-07-17 2019-10-29 Method, apparatus, and system for human identification based on human radio biometric information
US16/667,648 US11035940B2 (en) 2015-07-17 2019-10-29 Method, apparatus, and system for wireless proximity and presence monitoring
US16/790,610 US11928894B2 (en) 2012-09-18 2020-02-13 Method, apparatus, and system for wireless gait recognition
US16/790,627 US11397258B2 (en) 2015-07-17 2020-02-13 Method, apparatus, and system for outdoor target tracking
US16/798,343 US11340345B2 (en) 2015-07-17 2020-02-22 Method, apparatus, and system for wireless object tracking
US16/798,337 US10845463B2 (en) 2015-07-17 2020-02-22 Method, apparatus, and system for wireless object scanning
US16/871,000 US11500056B2 (en) 2015-07-17 2020-05-10 Method, apparatus, and system for wireless tracking with graph-based particle filtering
US16/871,004 US20200302187A1 (en) 2015-07-17 2020-05-10 Method, apparatus, and system for people counting and recognition based on rhythmic motion monitoring
US16/871,006 US11408978B2 (en) 2015-07-17 2020-05-10 Method, apparatus, and system for vital signs monitoring using high frequency wireless signals
US16/870,996 US10866302B2 (en) 2015-07-17 2020-05-10 Method, apparatus, and system for wireless inertial measurement
US16/909,913 US20200322868A1 (en) 2015-07-17 2020-06-23 Method, apparatus, and system for improving topology of wireless sensing systems
US16/909,940 US11391830B2 (en) 2014-07-30 2020-06-23 Method, apparatus, and system for qualified wireless sensing
US16/945,827 US11444710B2 (en) 2015-07-17 2020-08-01 Method, apparatus, and system for processing and presenting life log based on a wireless signal
US16/945,837 US11439344B2 (en) 2015-07-17 2020-08-01 Method, apparatus, and system for wireless sleep monitoring
US17/019,271 US20200408875A1 (en) 2015-07-17 2020-09-13 Method, apparatus, and system for positioning and powering a wireless monitoring system
US17/019,270 US20200406860A1 (en) 2015-07-17 2020-09-13 Method, apparatus, and system for vehicle wireless monitoring
US17/019,273 US20200405223A1 (en) 2015-07-17 2020-09-13 Method, apparatus, and system for automatic and adaptive wireless monitoring and tracking
US17/537,432 US20220096003A1 (en) 2015-07-17 2021-11-29 Method, apparatus, and system for automatic and adaptive wireless monitoring and tracking
US17/539,058 US20220091231A1 (en) 2015-07-17 2021-11-30 Method, apparatus, and system for human identification based on human radio biometric information
US17/540,156 US20220091225A1 (en) 2015-07-17 2021-12-01 Method, apparatus, and system for positioning and powering a wireless monitoring system
US17/838,231 US20220303167A1 (en) 2012-12-05 2022-06-12 Method, apparatus, and system for identifying and qualifying devices for wireless sensing

Applications Claiming Priority (22)

Application Number Priority Date Filing Date Title
US201662307172P 2016-03-11 2016-03-11
US201662307081P 2016-03-11 2016-03-11
US62/307,172 2016-03-11
US62/307,081 2016-03-11
US201662316850P 2016-04-01 2016-04-01
US62/316,850 2016-04-01
US201662322575P 2016-04-14 2016-04-14
US62/322,575 2016-04-14
US201662331278P 2016-05-03 2016-05-03
US62/331,278 2016-05-03
US201662334110P 2016-05-10 2016-05-10
US62/334,110 2016-05-10
US201662383235P 2016-09-02 2016-09-02
US62/383,235 2016-09-02
US201662384060P 2016-09-06 2016-09-06
US62/384,060 2016-09-06
US201662409796P 2016-10-18 2016-10-18
US62/409,796 2016-10-18
US201662411504P 2016-10-21 2016-10-21
US62/411,504 2016-10-21
USPCT/US2016/066015 2016-12-09
PCT/US2016/066015 WO2017100706A1 (fr) 2015-12-09 2016-12-09 Procédé, appareil et systèmes de détection et de surveillance sans fil d'événements

Related Parent Applications (13)

Application Number Title Priority Date Filing Date
PCT/US2015/041037 Continuation-In-Part WO2016011433A2 (fr) 2008-09-23 2015-07-17 Systèmes de positionnement sans fil
US15/326,112 Continuation-In-Part US20170212210A1 (en) 2012-12-05 2015-07-17 Wireless positioning systems
PCT/US2016/066015 Continuation-In-Part WO2017100706A1 (fr) 2008-09-23 2016-12-09 Procédé, appareil et systèmes de détection et de surveillance sans fil d'événements
US16/060,710 Continuation-In-Part US10380881B2 (en) 2015-12-09 2016-12-09 Method, apparatus, and systems for wireless event detection and monitoring
US15/861,422 Continuation-In-Part US11025475B2 (en) 2008-09-23 2018-01-03 Method, apparatus, server, and systems of time-reversal technology
US16/101,444 Continuation-In-Part US10291460B2 (en) 2008-09-23 2018-08-11 Method, apparatus, and system for wireless motion monitoring
US16/125,748 Continuation-In-Part US10833912B2 (en) 2012-09-18 2018-09-09 Methods, devices, servers, apparatus, and systems for wireless internet of things applications
US16/127,151 Continuation-In-Part US11012285B2 (en) 2012-09-18 2018-09-10 Methods, apparatus, servers, and systems for vital signs detection and monitoring
US16/127,092 Continuation-In-Part US10476730B2 (en) 2008-09-23 2018-09-10 Methods, apparatus, servers, and systems for human identification based on human radio biometric information
US16/200,616 Continuation-In-Part US10495725B2 (en) 2012-09-18 2018-11-26 Method, apparatus, server and system for real-time vital sign detection and monitoring
US16/200,608 Continuation-In-Part US10735298B2 (en) 2012-09-18 2018-11-26 Method, apparatus, server and system for vital sign detection and monitoring
US16/203,299 Continuation-In-Part US10374863B2 (en) 2012-09-18 2018-11-28 Apparatus, systems and methods for event recognition based on a wireless signal
US16/446,589 Continuation-In-Part US10742475B2 (en) 2012-09-18 2019-06-19 Method, apparatus, and system for object tracking sensing using broadcasting

Related Child Applications (13)

Application Number Title Priority Date Filing Date
PCT/US2016/066015 Continuation-In-Part WO2017100706A1 (fr) 2008-09-23 2016-12-09 Procédé, appareil et systèmes de détection et de surveillance sans fil d'événements
US16/060,710 Continuation-In-Part US10380881B2 (en) 2015-12-09 2016-12-09 Method, apparatus, and systems for wireless event detection and monitoring
PCT/US2017/021963 Continuation-In-Part WO2017156492A1 (fr) 2008-09-23 2017-03-10 Procédés, appareil, serveurs et systèmes pour détection et surveillance de signes vitaux
US15/861,422 Continuation-In-Part US11025475B2 (en) 2008-09-23 2018-01-03 Method, apparatus, server, and systems of time-reversal technology
US15/873,806 Continuation-In-Part US10270642B2 (en) 2012-09-18 2018-01-17 Method, apparatus, and system for object tracking and navigation
US16/101,444 Continuation-In-Part US10291460B2 (en) 2008-09-23 2018-08-11 Method, apparatus, and system for wireless motion monitoring
US16/125,748 Continuation-In-Part US10833912B2 (en) 2012-09-18 2018-09-09 Methods, devices, servers, apparatus, and systems for wireless internet of things applications
US16/127,151 Continuation-In-Part US11012285B2 (en) 2012-09-18 2018-09-10 Methods, apparatus, servers, and systems for vital signs detection and monitoring
US16/127,092 Continuation-In-Part US10476730B2 (en) 2008-09-23 2018-09-10 Methods, apparatus, servers, and systems for human identification based on human radio biometric information
US16/200,608 Continuation-In-Part US10735298B2 (en) 2012-09-18 2018-11-26 Method, apparatus, server and system for vital sign detection and monitoring
US16/200,616 Continuation-In-Part US10495725B2 (en) 2012-09-18 2018-11-26 Method, apparatus, server and system for real-time vital sign detection and monitoring
US16/203,299 Continuation-In-Part US10374863B2 (en) 2012-09-18 2018-11-28 Apparatus, systems and methods for event recognition based on a wireless signal
US16/203,317 Continuation-In-Part US10397039B2 (en) 2012-09-18 2018-11-28 Apparatus, systems and methods for fall-down detection based on a wireless signal

Publications (1)

Publication Number Publication Date
WO2017155634A1 true WO2017155634A1 (fr) 2017-09-14

Family

ID=59790845

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2017/015909 WO2017155634A1 (fr) 2008-09-23 2017-01-31 Procédés, dispositifs, serveurs, appareil et systèmes destinés à des applications d'internet des objets sans fil

Country Status (1)

Country Link
WO (1) WO2017155634A1 (fr)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10142131B2 (en) 2017-02-14 2018-11-27 Hysky Technologies, Inc. Intelligent shortwave frequency management systems and associated methods
CN109150780A (zh) * 2018-08-13 2019-01-04 南京荣飞科技股份有限公司 一种基于信道状态信息的WiFi ToF测距定位系统
US10270642B2 (en) 2012-12-05 2019-04-23 Origin Wireless, Inc. Method, apparatus, and system for object tracking and navigation
US10291460B2 (en) 2012-12-05 2019-05-14 Origin Wireless, Inc. Method, apparatus, and system for wireless motion monitoring
EP3492946A1 (fr) * 2017-12-01 2019-06-05 Origin Wireless, Inc. Procédé, appareil et système de suivi et de navigation d'objets
CN109946988A (zh) * 2019-04-02 2019-06-28 谢逸思 一种基于物联网的家用电器的控制方法及系统
US10447094B2 (en) 2016-05-03 2019-10-15 Origin Wireless, Inc. Method, system, and apparatus for wireless power transmission based on power waveforming
CN110418315A (zh) * 2019-07-24 2019-11-05 北京市天元网络技术股份有限公司 一种用于计算和管理物联网终端功耗的方法
WO2020037313A1 (fr) * 2018-08-17 2020-02-20 The Regents Of The University Of California Identification de personne sans dispositif et reconnaissance de geste sans dispositif
CN110971285A (zh) * 2019-12-06 2020-04-07 西安电子科技大学 适用于共形天线阵的波束赋形方法
WO2020220112A1 (fr) 2019-04-30 2020-11-05 Cognitive Systems Corp. Modification de paramètres de sensibilité dans un système de détection de mouvement
US11026242B2 (en) * 2017-04-21 2021-06-01 Telefonaktiebolaget Lm Ericsson (Publ) Fingerprinting enhancement with multi-band AoA measurements
US11025475B2 (en) 2012-12-05 2021-06-01 Origin Wireless, Inc. Method, apparatus, server, and systems of time-reversal technology
CN113114399A (zh) * 2021-03-30 2021-07-13 南京航空航天大学 基于生成对抗网络的三维频谱态势补全方法和装置
CN113239832A (zh) * 2021-05-20 2021-08-10 河南中全科技有限公司 基于图像识别的隐患智能识别方法及系统
CN113450536A (zh) * 2021-06-17 2021-09-28 桂林航天工业学院 一种独居老人安全监测系统
CN113484908A (zh) * 2021-08-25 2021-10-08 成都理工大学 部分卷积与注意力机制融合深度学习网络的缺失地震数据重建方法
US20210320703A1 (en) * 2018-07-24 2021-10-14 Lg Electronics Inc. Method for reporting multiple channel state information in wireless communication system and apparatus therefor
TWI745259B (zh) * 2020-12-03 2021-11-01 國立虎尾科技大學 應用於5g智慧製造設備的天線信號均優化方法
CN113765617A (zh) * 2021-09-30 2021-12-07 电子科技大学 一种基于反射放大面对抗同频干扰的方法
US20220039042A1 (en) * 2018-09-27 2022-02-03 Telefonaktiebolaget Lm Ericsson (Publ) Methods, second node and apparatus for determining clock asynchronization
TWI768339B (zh) * 2020-04-29 2022-06-21 新加坡商鴻運科股份有限公司 室內定位方法、電子裝置及電腦可讀儲存媒體
CN114841179A (zh) * 2022-05-31 2022-08-02 电子科技大学 基于rfid和时间反演电磁学的传感系统
US20220263872A1 (en) * 2021-02-15 2022-08-18 Charter Communications Operating, Llc System And Method For Evaluating A Customer Premise Equipment (CPE) Device
CN115133969A (zh) * 2022-07-01 2022-09-30 内蒙古大学 毫米波大规模mimo-noma系统的性能提高方法
US11488267B2 (en) * 2020-02-07 2022-11-01 International Business Machines Coproration Managing transboundary water use using a distributed ledger and machine learning
WO2023066464A1 (fr) * 2021-10-19 2023-04-27 Nokia Technologies Oy Positionnement de dispositif d'utilisateur
WO2023097645A1 (fr) * 2021-12-03 2023-06-08 Oppo广东移动通信有限公司 Procédé et appareil d'acquisition de données, et dispositif, support, puce, produit et programme
CN116367305A (zh) * 2023-06-01 2023-06-30 华中师范大学 一种基于掩码自编器和信号引导的无线定位方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040006265A1 (en) * 2002-04-30 2004-01-08 Karim Alhussiny Wireless transmission-ST-segment preserved of the standard 12 leads EKG apparatus for the remote administration of thrrombolytic therapy under severe cellular channel impairment
US20130039168A1 (en) * 2007-08-20 2013-02-14 Antonio Forenza Systems and methods for wireless backhaul in distributed-input distributed-output wireless systems
US20130315111A1 (en) * 2012-05-22 2013-11-28 Alcatel-Lucent Usa Inc. Method And Apparatus Of Wireless Communication Using Directional Antennas
US8761285B2 (en) * 2012-02-22 2014-06-24 Cisco Technology, Inc. Application-aware dynamic bit-level error protection for modulation-based communication
WO2016011433A2 (fr) * 2014-07-17 2016-01-21 Origin Wireless, Inc. Systèmes de positionnement sans fil

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040006265A1 (en) * 2002-04-30 2004-01-08 Karim Alhussiny Wireless transmission-ST-segment preserved of the standard 12 leads EKG apparatus for the remote administration of thrrombolytic therapy under severe cellular channel impairment
US20130039168A1 (en) * 2007-08-20 2013-02-14 Antonio Forenza Systems and methods for wireless backhaul in distributed-input distributed-output wireless systems
US8761285B2 (en) * 2012-02-22 2014-06-24 Cisco Technology, Inc. Application-aware dynamic bit-level error protection for modulation-based communication
US20130315111A1 (en) * 2012-05-22 2013-11-28 Alcatel-Lucent Usa Inc. Method And Apparatus Of Wireless Communication Using Directional Antennas
WO2016011433A2 (fr) * 2014-07-17 2016-01-21 Origin Wireless, Inc. Systèmes de positionnement sans fil

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11025475B2 (en) 2012-12-05 2021-06-01 Origin Wireless, Inc. Method, apparatus, server, and systems of time-reversal technology
US10270642B2 (en) 2012-12-05 2019-04-23 Origin Wireless, Inc. Method, apparatus, and system for object tracking and navigation
US10291460B2 (en) 2012-12-05 2019-05-14 Origin Wireless, Inc. Method, apparatus, and system for wireless motion monitoring
US10447094B2 (en) 2016-05-03 2019-10-15 Origin Wireless, Inc. Method, system, and apparatus for wireless power transmission based on power waveforming
US10142131B2 (en) 2017-02-14 2018-11-27 Hysky Technologies, Inc. Intelligent shortwave frequency management systems and associated methods
US10547474B2 (en) 2017-02-14 2020-01-28 Hysky Technologies, Inc. Intelligent shortwave frequency management systems and associated methods
US11026242B2 (en) * 2017-04-21 2021-06-01 Telefonaktiebolaget Lm Ericsson (Publ) Fingerprinting enhancement with multi-band AoA measurements
US11991734B2 (en) 2017-04-21 2024-05-21 Telefonaktiebolaget Lm Ericsson (Publ) Fingerprinting enhancement with multi-band AoA measurements
EP3492946A1 (fr) * 2017-12-01 2019-06-05 Origin Wireless, Inc. Procédé, appareil et système de suivi et de navigation d'objets
EP3492945B1 (fr) * 2017-12-01 2023-08-09 Origin Wireless, Inc. Procédé, appareil et système de détection et de surveillance de mouvements périodiques
EP3879298A3 (fr) * 2017-12-01 2021-12-08 Origin Wireless, Inc. Procédé, appareil et système de suivi et de navigation d'objets
US11929806B2 (en) * 2018-07-24 2024-03-12 Lg Electronics Inc. Method for reporting multiple channel state information in wireless communication system and apparatus therefor
US20210320703A1 (en) * 2018-07-24 2021-10-14 Lg Electronics Inc. Method for reporting multiple channel state information in wireless communication system and apparatus therefor
CN109150780A (zh) * 2018-08-13 2019-01-04 南京荣飞科技股份有限公司 一种基于信道状态信息的WiFi ToF测距定位系统
WO2020037313A1 (fr) * 2018-08-17 2020-02-20 The Regents Of The University Of California Identification de personne sans dispositif et reconnaissance de geste sans dispositif
US11800474B2 (en) * 2018-09-27 2023-10-24 Telefonaktiebolaget Lm Ericsson (Publ) Methods, second node and apparatus for determining clock asynchronization
US20220039042A1 (en) * 2018-09-27 2022-02-03 Telefonaktiebolaget Lm Ericsson (Publ) Methods, second node and apparatus for determining clock asynchronization
CN109946988A (zh) * 2019-04-02 2019-06-28 谢逸思 一种基于物联网的家用电器的控制方法及系统
WO2020220112A1 (fr) 2019-04-30 2020-11-05 Cognitive Systems Corp. Modification de paramètres de sensibilité dans un système de détection de mouvement
EP3963557A4 (fr) * 2019-04-30 2022-12-28 Cognitive Systems Corp. Modification de paramètres de sensibilité dans un système de détection de mouvement
CN114072862A (zh) * 2019-04-30 2022-02-18 认知系统公司 修改运动检测系统中的灵敏度设置
CN114072862B (zh) * 2019-04-30 2024-04-09 认知系统公司 修改运动检测系统中的灵敏度设置
CN110418315B (zh) * 2019-07-24 2023-03-31 北京市天元网络技术股份有限公司 一种用于计算和管理物联网终端功耗的方法
CN110418315A (zh) * 2019-07-24 2019-11-05 北京市天元网络技术股份有限公司 一种用于计算和管理物联网终端功耗的方法
CN110971285B (zh) * 2019-12-06 2022-09-23 西安电子科技大学 适用于共形天线阵的波束赋形方法
CN110971285A (zh) * 2019-12-06 2020-04-07 西安电子科技大学 适用于共形天线阵的波束赋形方法
US11488267B2 (en) * 2020-02-07 2022-11-01 International Business Machines Coproration Managing transboundary water use using a distributed ledger and machine learning
US11435190B2 (en) 2020-04-29 2022-09-06 Nanning Fulian Fugui Precision Industrial Co., Ltd. Indoor positioning method, electronic device and readable storage medium
TWI768339B (zh) * 2020-04-29 2022-06-21 新加坡商鴻運科股份有限公司 室內定位方法、電子裝置及電腦可讀儲存媒體
TWI745259B (zh) * 2020-12-03 2021-11-01 國立虎尾科技大學 應用於5g智慧製造設備的天線信號均優化方法
US20220263872A1 (en) * 2021-02-15 2022-08-18 Charter Communications Operating, Llc System And Method For Evaluating A Customer Premise Equipment (CPE) Device
CN113114399A (zh) * 2021-03-30 2021-07-13 南京航空航天大学 基于生成对抗网络的三维频谱态势补全方法和装置
CN113239832B (zh) * 2021-05-20 2023-02-17 众芯汉创(北京)科技有限公司 基于图像识别的隐患智能识别方法及系统
CN113239832A (zh) * 2021-05-20 2021-08-10 河南中全科技有限公司 基于图像识别的隐患智能识别方法及系统
CN113450536A (zh) * 2021-06-17 2021-09-28 桂林航天工业学院 一种独居老人安全监测系统
CN113484908B (zh) * 2021-08-25 2023-07-14 成都理工大学 部分卷积与注意力机制融合深度学习网络的缺失地震数据重建方法
CN113484908A (zh) * 2021-08-25 2021-10-08 成都理工大学 部分卷积与注意力机制融合深度学习网络的缺失地震数据重建方法
CN113765617B (zh) * 2021-09-30 2023-09-22 电子科技大学 一种基于反射放大面对抗同频干扰的方法
CN113765617A (zh) * 2021-09-30 2021-12-07 电子科技大学 一种基于反射放大面对抗同频干扰的方法
WO2023066464A1 (fr) * 2021-10-19 2023-04-27 Nokia Technologies Oy Positionnement de dispositif d'utilisateur
WO2023097645A1 (fr) * 2021-12-03 2023-06-08 Oppo广东移动通信有限公司 Procédé et appareil d'acquisition de données, et dispositif, support, puce, produit et programme
CN114841179A (zh) * 2022-05-31 2022-08-02 电子科技大学 基于rfid和时间反演电磁学的传感系统
CN115133969B (zh) * 2022-07-01 2023-07-25 内蒙古大学 毫米波大规模mimo-noma系统的性能提高方法
CN115133969A (zh) * 2022-07-01 2022-09-30 内蒙古大学 毫米波大规模mimo-noma系统的性能提高方法
CN116367305A (zh) * 2023-06-01 2023-06-30 华中师范大学 一种基于掩码自编器和信号引导的无线定位方法及系统
CN116367305B (zh) * 2023-06-01 2023-08-29 华中师范大学 一种基于掩码自编器和信号引导的无线定位方法及系统

Similar Documents

Publication Publication Date Title
US10833912B2 (en) Methods, devices, servers, apparatus, and systems for wireless internet of things applications
WO2017155634A1 (fr) Procédés, dispositifs, serveurs, appareil et systèmes destinés à des applications d'internet des objets sans fil
US10845463B2 (en) Method, apparatus, and system for wireless object scanning
US11397258B2 (en) Method, apparatus, and system for outdoor target tracking
US10866302B2 (en) Method, apparatus, and system for wireless inertial measurement
US11500056B2 (en) Method, apparatus, and system for wireless tracking with graph-based particle filtering
JP7365587B2 (ja) 無線測位システム
EP3739356A1 (fr) Procédé, appareil et système de suivi, de balayage et de surveillance sans fil
US11408978B2 (en) Method, apparatus, and system for vital signs monitoring using high frequency wireless signals
US11340345B2 (en) Method, apparatus, and system for wireless object tracking
US20220091231A1 (en) Method, apparatus, and system for human identification based on human radio biometric information
US11391830B2 (en) Method, apparatus, and system for qualified wireless sensing
EP3978949A2 (fr) Système et méthode de surveillance sans fil du mouvement
EP3869223A1 (fr) Systeme et procede de detection de materiau sans fil bases sur des informations de canaux multiches
US11181486B2 (en) Method, apparatus, and system for wireless material sensing
US20170212210A1 (en) Wireless positioning systems
US11592913B2 (en) Method, apparatus, and system for wireless writing tracking
US11448728B2 (en) Method, apparatus, and system for sound sensing based on wireless signals
US20230273291A1 (en) Method, apparatus, and system for wireless monitoring with improved accuracy
JP2022191191A (ja) サウンドセンシング及び無線センシングのための方法、装置及びシステム
EP4351016A2 (fr) Procédé, appareil et système de mesure et de rapport de détection sans fil
US20230388840A1 (en) Method, apparatus, and system for wireless sensing measurement and reporting
US20240183936A1 (en) Method, apparatus, and system for wireless sensing measurement and reporting
US20240175983A1 (en) Method, apparatus, and system for wireless sensing based on deep learning
US20240179550A1 (en) Method, apparatus, and system for wireless sensing measurement and reporting

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17763698

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17763698

Country of ref document: EP

Kind code of ref document: A1