Training Data Generation for Machine Learning Using GPR Images

被引:1
|
作者
Boldt, Markus [1 ]
Thiele, Antje [1 ,2 ]
Schulz, Karsten [1 ]
机构
[1] Fraunhofer IOSB, Gutleuthaus Str 1, D-76275 Ettlingen, Germany
[2] Karlsruhe Inst Technol KIT, Inst Photogrammetry & Remote Sensing IPF, Englerstr 7, D-76131 Karlsruhe, Germany
关键词
Ground Penetrating Radar; GPR; Machine Learning; Training Data; Data Augmentation;
D O I
10.1117/12.2635714
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ground Penetrating Radar (GPR) systems allow the acquisition of images displaying the contents of the underground. Hence, GPR is used everywhere, where structures underneath the visible surface have to be investigated. Consequently, typical application fields are archeology and civil engineering, especially the detection of cables, pipes or other manmade objects. GPR sensors can consist of one channel or of multiple channels, placed side by side. In the latter case, it is possible to acquire a two-dimensional image for each measurement, where the number of channels represents the number of columns in the image matrix. Since a typical track of measurements often contains multiple of thousands GPR images, a visual analysis with focus on the detection of buried objects might be uneconomically. Moreover, due to its noisy characteristic in relation to the specific underground, it is often not easy to interpret GPR images immediately. In this study, an unsupervised approach is presented, that provides both help for the visual analysis of GPR images and for the detection of potential buried objects. Therefore, it is usable to quickly generate or enlarge training datasets for machine learning approaches aiming at the analysis of GPR data. As test data, several measuring tracks acquired by the multi-channel Stream C system at the site of Frankfurt University (GER) are available. The workflow consists of two central processing steps: Change detection and data augmentation.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] On Automatic Generation of Training Images for Machine Learning in Automotive Applications
    Hsieh, Tong-Yu
    Lin, Yuan-Cheng
    Shen, Hsin-Yung
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2019), 2019, : 225 - 228
  • [2] Target detection using supervised machine learning algorithms for GPR data
    N. Smitha
    Vipula Singh
    [J]. Sensing and Imaging, 2020, 21
  • [3] Target detection using supervised machine learning algorithms for GPR data
    Smitha, N.
    Singh, Vipula
    [J]. SENSING AND IMAGING, 2020, 21 (01):
  • [4] Synthetic data generation for machine learning model training for energy theft scenarios using cosimulation
    Narayanan, Anantha
    Hardy, Trevor
    [J]. IET GENERATION TRANSMISSION & DISTRIBUTION, 2023, 17 (05) : 1035 - 1046
  • [5] Supervised machine learning using encrypted training data
    Gonzalez-Serrano, Francisco-Javier
    Amor-Martin, Adrian
    Casamayon-Anton, Jorge
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 365 - 377
  • [6] Supervised machine learning using encrypted training data
    Francisco-Javier González-Serrano
    Adrián Amor-Martín
    Jorge Casamayón-Antón
    [J]. International Journal of Information Security, 2018, 17 : 365 - 377
  • [7] Learning to Remove Clutter in Real-World GPR Images Using Hybrid Data
    Sun, Hai-Han
    Cheng, Weixia
    Fan, Zheng
    [J]. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2022, 60
  • [8] Training machine learning on JPEG compressed images
    Pistono, Maxime
    Coatrieux, Gouenou
    Nunes, Jean-Claude
    Cozic, Michel
    [J]. 2020 DATA COMPRESSION CONFERENCE (DCC 2020), 2020, : 388 - 388
  • [9] Fast Training Data Generation for Machine Learning Analysis of Cosmic Ray Showers
    Hachaj, Tomasz
    Bibrzycki, Lukasz
    Piekarczyk, Marcin
    [J]. IEEE ACCESS, 2023, 11 : 7410 - 7419
  • [10] Analysis of Image Thresholding Algorithms for Automated Machine Learning Training Data Generation
    Creek, Tristan
    Mullins, Barry E.
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 449 - 458