Investigation of late time response analysis for security applications
The risk of armed attack by individual’s intent on causing mass casualties against soft targets, such as transport hubs continues. This has led to an increased need for a robust, reliable and accurate detection system for concealed threat items. This new system will need to improve upon existing det...
Main Author: | |
---|---|
Published: |
Manchester Metropolitan University
2015
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.684840 |
id |
ndltd-bl.uk-oai-ethos.bl.uk-684840 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-bl.uk-oai-ethos.bl.uk-6848402017-08-30T03:23:27ZInvestigation of late time response analysis for security applicationsHutchinson, Simon James2015The risk of armed attack by individual’s intent on causing mass casualties against soft targets, such as transport hubs continues. This has led to an increased need for a robust, reliable and accurate detection system for concealed threat items. This new system will need to improve upon existing detection systems including portal based scanners, x-ray scanners and hand held metal detectors as these all suffer from drawbacks of limited detection range and relatively long scanning times. A literature appraisal has been completed to assess the work being undertaken in the relevant field of Concealed Threat Detection (CTD). From this Ultra-Wide Band (UWB) radar has been selected as the most promising technology available for CTD at the present. UWB radar is provided by using Frequency Modulated Continuous Waves (FMCW) from laboratory test equipment over a multi gigahertz bandwidth. This gives the UWB radar the ability to detect both metallic and dielectric objects. Current published results have shown that it is possible to use the LTR technique to detect and discriminate both single objects isolated in air and multiple objects present within the same environment. A Vector Network Analyser (VNA) has been used to provide the Ultra-Wide Band (UWB) Frequency Modulated Continuous Wave (FMCW) radar signal required for the LTR technique. This thesis presents the application of the Generalized Pencil-of-Function (GPOF), Dual Tree Wavelet Transform (DTWT) and the Continuous Wavelet Transform (CWT), both real and complex valued, in Late Time Response (LTR) security analysis to produce a viable detection algorithm. Supervised and unsupervised Artificial Neural Networks (ANN) have been applied to develop a successful classification scheme for Concealed Threat Detection (CTD) in on body security screening. Signal deconvolution and other techniques have been applied in post processing to allow for extraction of the LTR signal from the scattered return. Data vectorization has been applied to the extracted LTR signal using an unsupervised learning based ANN to prepare data for classification. Classification results for both binary threat/non-threat classifiers and a group classifier are presented. The GPOF method presented true positive classification results approaching 72% with wavelet based methods offering between 98% and 100%.006.3Manchester Metropolitan Universityhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.684840http://e-space.mmu.ac.uk/608771/Electronic Thesis or Dissertation |
collection |
NDLTD |
sources |
NDLTD |
topic |
006.3 |
spellingShingle |
006.3 Hutchinson, Simon James Investigation of late time response analysis for security applications |
description |
The risk of armed attack by individual’s intent on causing mass casualties against soft targets, such as transport hubs continues. This has led to an increased need for a robust, reliable and accurate detection system for concealed threat items. This new system will need to improve upon existing detection systems including portal based scanners, x-ray scanners and hand held metal detectors as these all suffer from drawbacks of limited detection range and relatively long scanning times. A literature appraisal has been completed to assess the work being undertaken in the relevant field of Concealed Threat Detection (CTD). From this Ultra-Wide Band (UWB) radar has been selected as the most promising technology available for CTD at the present. UWB radar is provided by using Frequency Modulated Continuous Waves (FMCW) from laboratory test equipment over a multi gigahertz bandwidth. This gives the UWB radar the ability to detect both metallic and dielectric objects. Current published results have shown that it is possible to use the LTR technique to detect and discriminate both single objects isolated in air and multiple objects present within the same environment. A Vector Network Analyser (VNA) has been used to provide the Ultra-Wide Band (UWB) Frequency Modulated Continuous Wave (FMCW) radar signal required for the LTR technique. This thesis presents the application of the Generalized Pencil-of-Function (GPOF), Dual Tree Wavelet Transform (DTWT) and the Continuous Wavelet Transform (CWT), both real and complex valued, in Late Time Response (LTR) security analysis to produce a viable detection algorithm. Supervised and unsupervised Artificial Neural Networks (ANN) have been applied to develop a successful classification scheme for Concealed Threat Detection (CTD) in on body security screening. Signal deconvolution and other techniques have been applied in post processing to allow for extraction of the LTR signal from the scattered return. Data vectorization has been applied to the extracted LTR signal using an unsupervised learning based ANN to prepare data for classification. Classification results for both binary threat/non-threat classifiers and a group classifier are presented. The GPOF method presented true positive classification results approaching 72% with wavelet based methods offering between 98% and 100%. |
author |
Hutchinson, Simon James |
author_facet |
Hutchinson, Simon James |
author_sort |
Hutchinson, Simon James |
title |
Investigation of late time response analysis for security applications |
title_short |
Investigation of late time response analysis for security applications |
title_full |
Investigation of late time response analysis for security applications |
title_fullStr |
Investigation of late time response analysis for security applications |
title_full_unstemmed |
Investigation of late time response analysis for security applications |
title_sort |
investigation of late time response analysis for security applications |
publisher |
Manchester Metropolitan University |
publishDate |
2015 |
url |
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.684840 |
work_keys_str_mv |
AT hutchinsonsimonjames investigationoflatetimeresponseanalysisforsecurityapplications |
_version_ |
1718522526001266688 |