Paper
14 May 2015 Buried threat detection using a handheld ground penetrating radar system
Author Affiliations +
Abstract
In this work, we explore the efficacy of two buried threat detectors on handheld data. The first algorithm is an energy-based algorithm, which computes how anomalous a given A-scan measurement after it is normalized according to its local statistics. It is based on a commonly used prescreener for the Husky Mounted Detection System (HMDS). In the HMDS setting measurements are sampled on a crosstrack-downtrack grid, and sequential measurements are at neighboring downtrack locations. In contrast, in the handheld setting sequential scans are often taken at neighboring crosstrack locations, and neighboring downtrack locations can be hundreds of scans away. In order to include both downtrack and crosstrack information, we compute local statistics over a much larger area than in the HMDS setting. The second algorithm is a shape-based algorithm. Shape Invariant Feature Transform (SIFT) features, which capture the gradient distributions of local patches, are extracted and used to train a non-linear Support Vector Machine (SVM). We found that in terms of AUC, the SIFT-SVM algorithm results in a 2.2% absolute improvement over the energy-based algorithm, with the greatest gains seen at lower false alarm rates.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Mary Knox, Peter Torrione, Leslie Collins, and Kenneth Morton Jr. "Buried threat detection using a handheld ground penetrating radar system", Proc. SPIE 9454, Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XX, 94540F (14 May 2015); https://doi.org/10.1117/12.2177812
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Sensors

Detection and tracking algorithms

General packet radio service

Head-mounted displays

Mining

Expectation maximization algorithms

Feature extraction

Back to Top