scholarly journals Accuracy Tests and Precision Assessment of Localizing Underground Utilities Using GPR Detection

Sensors ◽  
2021 ◽  
Vol 21 (20) ◽  
pp. 6765
Author(s):  
Krzysztof Ryszard Karsznia ◽  
Klaudia Onyszko ◽  
Sylwia Borkowska

Applying georadar (GPR) technology for detecting underground utilities is an important element of the comprehensive assessment of the location and ground infrastructure status. These works are usually connected with the conducted investment processes or serialised inventory of underground fittings. The detection of infrastructure is also crucial in implementing the BIM technology, 3D cadastre, and planned network modernization works. GPR detection accuracy depends on the type of equipment used, the selected detection method, and external factors. The multitude of techniques used for localizing underground utilities and constantly growing accuracy demands resulting from the fact that it is often necessary to detect infrastructure under challenging conditions of dense urban development leads to the need to improve the existing technologies. The factor that motivated us to start research on assessing the precision and accuracy of ground penetrating radar detection was the need to ensure the appropriate accuracy, precision, and reliability of detecting underground utilities versus different methods and analyses. The results of the multi-variant GPR were subjected to statistical testing. Various analyses were also conducted, depending on the detection method and on the current soil parameters using a unique sensor probe. When planning detection routes, we took into account regular, established grids and tracked the trajectory of movement of the equipment using GNSS receivers (internal and external ones). Moreover, a specialist probe was used to evaluate the potential influence of the changing soil conditions on the obtained detection results. Our tests were conducted in a developed area for ten months. The results confirmed a strong correlation between the obtained accuracy and the measurement method used, while the correlation with the other factors discussed here was significantly weaker.

2013 ◽  
Vol 405-408 ◽  
pp. 422-427
Author(s):  
Chao Wei ◽  
Guo Liang Zhou ◽  
Tie Ping Li

Based on the analysis of the causes and characters of common security risks in nuclear power stations breakwater, using the ground penetrating radar (GPR) to detect breakwater, and to explore the applicability and accuracy. The analysis showed that ground penetrating radar as a non-destructive detection method for the detection of the breakwater is feasible, and the detection accuracy meet the actual requirements of the project, the results can be used for the safety detection and maintenance of the breakwater.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1581
Author(s):  
Xiaolong Chen ◽  
Jian Li ◽  
Shuowen Huang ◽  
Hao Cui ◽  
Peirong Liu ◽  
...  

Cracks are one of the main distresses that occur on concrete surfaces. Traditional methods for detecting cracks based on two-dimensional (2D) images can be hampered by stains, shadows, and other artifacts, while various three-dimensional (3D) crack-detection techniques, using point clouds, are less affected in this regard but are limited by the measurement accuracy of the 3D laser scanner. In this study, we propose an automatic crack-detection method that fuses 3D point clouds and 2D images based on an improved Otsu algorithm, which consists of the following four major procedures. First, a high-precision registration of a depth image projected from 3D point clouds and 2D images is performed. Second, pixel-level image fusion is performed, which fuses the depth and gray information. Third, a rough crack image is obtained from the fusion image using the improved Otsu method. Finally, the connected domain labeling and morphological methods are used to finely extract the cracks. Experimentally, the proposed method was tested at multiple scales and with various types of concrete crack. The results demonstrate that the proposed method can achieve an average precision of 89.0%, recall of 84.8%, and F1 score of 86.7%, performing significantly better than the single image (average F1 score of 67.6%) and single point cloud (average F1 score of 76.0%) methods. Accordingly, the proposed method has high detection accuracy and universality, indicating its wide potential application as an automatic method for concrete-crack detection.


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 197
Author(s):  
Meng-ting Fang ◽  
Zhong-ju Chen ◽  
Krzysztof Przystupa ◽  
Tao Li ◽  
Michal Majka ◽  
...  

Examination is a way to select talents, and a perfect invigilation strategy can improve the fairness of the examination. To realize the automatic detection of abnormal behavior in the examination room, the method based on the improved YOLOv3 (The third version of the You Only Look Once algorithm) algorithm is proposed. The YOLOv3 algorithm is improved by using the K-Means algorithm, GIoUloss, focal loss, and Darknet32. In addition, the frame-alternate dual-thread method is used to optimize the detection process. The research results show that the improved YOLOv3 algorithm can improve both the detection accuracy and detection speed. The frame-alternate dual-thread method can greatly increase the detection speed. The mean Average Precision (mAP) of the improved YOLOv3 algorithm on the test set reached 88.53%, and the detection speed reached 42 Frames Per Second (FPS) in the frame-alternate dual-thread detection method. The research results provide a certain reference for automated invigilation.


Author(s):  
Siyu Chen ◽  
Li Wang ◽  
Zheng Fang ◽  
Zhensheng Shi ◽  
Anxue Zhang

Author(s):  
Chuan Ye ◽  
Liming Zhao ◽  
Qiyan Wang ◽  
Bo Pan ◽  
Youchun Xie ◽  
...  

Abstract In order to accurately detect the abnormal looseness of strapping in the process of steel coil hoisting, an accurate detection method of strapping abnormality based on CCD structured light active imaging is proposed. Firstly, a maximum entropy laser stripe automatic segmentation model integrating multi-scale saliency features is constructed. With the help of saliency detection model, the purpose is to reduce the interference of the environment to the laser stripe and highlight the distinguishability between the stripe and the background. Then, the maximum entropy is used to segment the fused saliency features and accurately extract the stripe contour. Finally, the stripe normal field is obtained by calculating the stripe gradient vector, the stripe center line is extracted based on the stripe distribution normal direction, and the abnormal strapping is recognized online according to the stripe center. Experiments show that the proposed method is effective in terms of detection accuracy and time efficiency, and has certain engineering application value.


2012 ◽  
Vol 572 ◽  
pp. 338-342 ◽  
Author(s):  
Zhi Guo Liang ◽  
Quan Yang ◽  
Ke Xu ◽  
Fei He ◽  
Xiao Chen Wang ◽  
...  

Structured light 3D measurement technology with its simple structure, non-contact measurement, fast measurement speed and other advantages, has been widely used. Steel plate surface quality detection is not confined to the two-dimensional feature of gray detection, and local topography measurement for surface quality of steel plate detection becomes increasingly important. In this paper, steel plate surface 3D detection method based on structured light and the factors affecting the measurement accuracy are analyzed. Several effective methods of improving 3D detection accuracy are put forward. Compared with the traditional structured light 3D detection methods, the detection accuracy of new methods is remarkably improved, thus possessing better application values.


2021 ◽  
Vol 233 ◽  
pp. 02012
Author(s):  
Shousheng Liu ◽  
Zhigang Gai ◽  
Xu Chai ◽  
Fengxiang Guo ◽  
Mei Zhang ◽  
...  

Bacterial colonies detecting and counting is tedious and time-consuming work. Fortunately CNN (convolutional neural network) detection methods are effective for target detection. The bacterial colonies are a kind of small targets, which have been a difficult problem in the field of target detection technology. This paper proposes a small target enhancement detection method based on double CNNs, which can not only improve the detection accuracy, but also maintain the detection speed similar to the general detection model. The detection method uses double CNNs. The first CNN uses SSD_MOBILENET_V1 network with both target positioning and target recognition functions. The candidate targets are screened out with a low confidence threshold, which can ensure no missing detection of small targets. The second CNN obtains candidate target regions according to the first round of detection, intercepts image sub-blocks one by one, uses the MOBILENET_V1 network to filter out targets with a higher confidence threshold, which can ensure good detection of small targets. Through the two-round enhancement detection method has been transplanted to the embedded platform NVIDIA Jetson AGX Xavier, the detection accuracy of small targets is significantly improved, and the target error detection rate and missed detection rate are reduced to less than 1%.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Yubo Song ◽  
Yijin Geng ◽  
Junbo Wang ◽  
Shang Gao ◽  
Wei Shi

Since a growing number of malicious applications attempt to steal users’ private data by illegally invoking permissions, application stores have carried out many malware detection methods based on application permissions. However, most of them ignore specific permission combinations and application categories that affect the detection accuracy. The features they extracted are neither representative enough to distinguish benign and malicious applications. For these problems, an Android malware detection method based on permission sensitivity is proposed. First, for each kind of application categories, the permission features and permission combination features are extracted. The sensitive permission feature set corresponding to each category label is then obtained by the feature selection method based on permission sensitivity. In the following step, the permission call situation of the application to be detected is compared with the sensitive permission feature set, and the weight allocation method is used to quantify this information into numerical features. In the proposed method of malicious application detection, three machine-learning algorithms are selected to construct the classifier model and optimize the parameters. Compared with traditional methods, the proposed method consumed 60.94% less time while still achieving high accuracy of up to 92.17%.


Sign in / Sign up

Export Citation Format

Share Document