2015
DOI: 10.1117/12.2177747
|View full text |Cite
|
Sign up to set email alerts
|

Recognizing subsurface target responses in ground penetrating radar data using convolutional neural networks

Abstract: Improved performance in the discrimination of buried threats using Ground Penetrating Radar (GPR) data has recently been achieved using features developed for applications in computer vision. These features, designed to characterize local shape information in images, have been utilized to recognize patches that contain a target signature in two-dimensional slices of GPR data. While these adapted features perform very well in this GPR application, they were not designed to specifically differentiate between tar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(24 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…[46] Polynomial approximation (the feature vector) are ANN inputs. [47,48] The benefit of using a Convolutional NN (CNNs) is that features extracted from the data are a learned parameter of the system. [49] Regularized deconvolution is utilized to increase range resolution.…”
Section: Techniques Applied To Groundmentioning
confidence: 99%
“…[46] Polynomial approximation (the feature vector) are ANN inputs. [47,48] The benefit of using a Convolutional NN (CNNs) is that features extracted from the data are a learned parameter of the system. [49] Regularized deconvolution is utilized to increase range resolution.…”
Section: Techniques Applied To Groundmentioning
confidence: 99%
“…Once the spatial location is obtained, the temporal location can be estimated. By far, the most common approach for temporal estimation relies on extracting keypoints at locations of high energy (e.g., local maxima) in the GPR A-scans [6], [8], [20], [29], [35]- [39]. These energy-based methods often yield multiple keypoints at each spatial location.…”
Section: A Keypoint Identificationmentioning
confidence: 99%
“…In this scenario, the classifier is applied at regular intervals along the A-scan and keypoints at the locations with the largest classifier decision statistics are utilized [6], [7], [11], [28]. The strategies in [8], [10], [20], [35], [36], [39], [45] set = , so that the same number of keypoints are utilized in training and testing.…”
Section: B Strategies For Testingmentioning
confidence: 99%
See 2 more Smart Citations