2010 IEEE International Geoscience and Remote Sensing Symposium 2010
DOI: 10.1109/igarss.2010.5650741
|View full text |Cite
|
Sign up to set email alerts
|

AN SVM classifier with HMM-based kernel for landmine detection using ground penetrating radar

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Examples of feature-based discriminative classifiers that have been used in this application include K-Nearest Neighbor (KNN), 14 Hidden Markov Models, 15 Support Vector Machines, 16 Random Forest 13 and Multiple-Instance Learning. [17][18][19] Most of these techniques rely on constructing a predictive model to characterize data, and as a consequence are prone to over-fitting the training data.…”
Section: Introductionmentioning
confidence: 99%
“…Examples of feature-based discriminative classifiers that have been used in this application include K-Nearest Neighbor (KNN), 14 Hidden Markov Models, 15 Support Vector Machines, 16 Random Forest 13 and Multiple-Instance Learning. [17][18][19] Most of these techniques rely on constructing a predictive model to characterize data, and as a consequence are prone to over-fitting the training data.…”
Section: Introductionmentioning
confidence: 99%
“…Proposed algorithms have employed a variety of techniques from statistics [17], [18], computer vision [6], [19], [20], and machine learning [7], [21], [22]. The most successful approach to date involves the use of supervised learning techniques [12], [23]- [27].…”
Section: Introductionmentioning
confidence: 99%
“…In order to train supervised classifiers, they must be provided with examples of data from each class (i.e., threat and nonthreat). As mentioned, training examples most often consist of small image patches that are extracted from B-scans at locations in the GPR volume where useful signals (i.e., those corresponding to both threats, or suspicious non-threats) are estimated to exist [1], [4], [6]- [8], [12], [28]- [32]. In this work, we refer to these useful signal locations as "keypoints".…”
Section: Introductionmentioning
confidence: 99%
“…Alarm classification is a subject of research that has been well explored. Examples of classifiers that have been used include K-Nearest Neighbors (KNN) [19] Support Vector Machines (SVM) [24,27], and Hidden Markov Models (HMM) [21,18,28,29,30]. In this thesis, we compare our proposed LP classifier with the provenly successful KNN classifier.…”
Section: Discrimination Algorithmsmentioning
confidence: 99%
“…In this thesis, we compare our proposed LP classifier with the provenly successful KNN classifier. Other classifiers, such as SVM [24,27] [19], and transfer learning [35].…”
Section: Discrimination Algorithmsmentioning
confidence: 99%