2014
DOI: 10.1117/12.2052592
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning algorithms for detecting explosive hazards in ground penetrating radar data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…3D (depth and shape) analysis [107][108][109][110][111][112][113][114][115] Advanced driver assistance systems [116][117][118][119][120] Animal detection 121 Anomaly detection 122 Automated Target Recognition [123][124][125][126][127][128][129][130][131][132][133][134] Change detection [135][136][137][138][139] Classification Data fusion 191 Dimensionality reduction 192,193 Disaster analysis/assessment 194 Environment and water analysis [195][196][197][198] Geo-information extraction 199 Human detection [200][201][202][203] Image denoising/enhancement 204,…”
Section: References Area Referencesmentioning
confidence: 99%
“…3D (depth and shape) analysis [107][108][109][110][111][112][113][114][115] Advanced driver assistance systems [116][117][118][119][120] Animal detection 121 Anomaly detection 122 Automated Target Recognition [123][124][125][126][127][128][129][130][131][132][133][134] Change detection [135][136][137][138][139] Classification Data fusion 191 Dimensionality reduction 192,193 Disaster analysis/assessment 194 Environment and water analysis [195][196][197][198] Geo-information extraction 199 Human detection [200][201][202][203] Image denoising/enhancement 204,…”
Section: References Area Referencesmentioning
confidence: 99%
“…At the same time, their shape can significantly change depending on the disturbance source, leading to signal profile variation effect). In fact, the problem described above is quite common when "hand-engineered" feature extraction technique is applied [5].…”
Section: The Problem Descriptionmentioning
confidence: 99%
“…Morton et al [7] presented an anomaly-based prescreener which automatically determined the region over which to compute the local statistics. Besaw and Stimac [8] presented a deep belief network-based method of locating buried threats. In this preliminary work, we explore the efficacy of two well-established GPR-based mine detection systems for the handheld setting after preselecting locations of interest.…”
Section: Introductionmentioning
confidence: 99%