<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Recognition of Explosive Devices Based on the Detectors Signal Using Machine Learning Methods</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Lesia</forename><surname>Mochurad</surname></persName>
							<email>lesia.i.mochurad@lpnu.ua</email>
							<affiliation key="aff0">
								<orgName type="department">Artificial intelligence Department</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vitalii</forename><surname>Savchyn</surname></persName>
							<email>vitaliysavchun@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department">Artificial intelligence Department</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Kravchenko</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<postCode>61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">International Workshop on Intelligent Information Technologies &amp; Systems of Information Security</orgName>
								<address>
									<addrLine>March 24-24</addrLine>
									<postCode>2023</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Recognition of Explosive Devices Based on the Detectors Signal Using Machine Learning Methods</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">5F2B4FCEFDF81B20CBEFC0E7B6B77862</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-04-29T06:46+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Metal detector</term>
					<term>landmines</term>
					<term>GPR</term>
					<term>machine learning</term>
					<term>classification 0000-0002-4957-1512 (L. Mochurad)</term>
					<term>0000-0002-3670-6705 (V. Savchyn)</term>
					<term>0000-0002-6169-1250 (O. Kravchenko)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Due to the full-scale invasion of Ukraine, the demining and methods of automating this process are much more relevant nowadays. Robots and algorithms can help solve this problem. In this study, the methods of automated detection of explosive devices were investigated. We reviewed various modern methods of demining the territory. We analyzed the principle of operation of metal detectors and GPR. After that, we found out the advantages and disadvantages of each of these devices. We investigated which of these devices gives more accurate data about the object detected on the ground and which data is better for training the model. As a result, an information system was developed based on a convolutional neural network and an autoencoder for the automated classification of explosive devices. We used a set of scanned ground images obtained from groundpenetrating radar (GPR) for the autoencoder input data. We received an accuracy of 97.83%. The algorithm described in this study can help in demining the territories of Ukraine.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>A significant territory of our country is littered with explosive objects due to the war and the attack on Ukraine. Demining is a complex, dangerous and long-term process. Civilians and sappers are exposed to constant danger from these explosive devices.</p><p>The purpose of this study is to develop an information system for classifying explosive devices among other metal objects using detector signal analysis or GPR scans. The object of research is devices that allow detecting explosives buried in the ground. The purpose of this work is to develop an information system for the classification of explosive devices in the ground using detector signal analysis or ground-penetrating radar images. The object of research in this case is devices that allow detecting explosives buried in the ground. During the research, we must learn the principle of operation of these devices and find out what information they can provide about the object discovered in the ground. Metal detectors and GPR are often used for non-contact detection of mines or explosives. These devices differ in the principle of operation and sets of information provided about the found object. Metal detectors help detect various metals. They are of different types and functionality, but ground metal detectors are used for demining. They work on the basis of variable magnetic using a double coil, the windings of which are tuned to one frequency. The indicators are activated, which notify about the detection of a disturbance caused by eddy currents in the metal, when a metal object falls into the area of action of this coil <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>The advantages of metal detectors include their relative ease of setup and lower cost compared to GPR. Also, they are versatile and convenient to use, which is why they are popular for demining tasks. However, they also have a number of disadvantages, namely:</p><p>• a dangerous explosive object that does not contain metal cannot be detected;</p><p>• difficult work on littered areas, because metal detectors react to almost all metals contained in the ground;</p><p>• they do not provide enough information about the object discovered in the ground, which makes it difficult to predict what exactly was discovered.</p><p>Another popular device for detecting dangerous objects in the ground is ground-penetrating radar. GPR makes it possible to obtain a soil scan without excavation or drilling. This allows the specialist to get an approximate view of all objects or rocks that are at a depth of several centimeters to several meters. GPR is one of the most advanced devices for soil scanning tasks and has various uses: detection of explosive devices, geological exploration before construction, for scientific research, in archeology, etc <ref type="bibr" target="#b2">[3]</ref>.</p><p>Devices that combine the properties of a metal detector and ground-penetrating radar are considered the most modern and perfect systems at the moment. The MDS-10 from the Minelab company is such a device, which is now actively used in many NATO armies and in Ukraine. It combines metal detector and ground-penetrating radar technologies to detect all metallic and nonmetallic targets, in various soils and climatic zones. It has continuous real-time display functionality with the ability to pause the GPR scan for more accurate identification of a potential target <ref type="bibr" target="#b3">[4]</ref>.</p><p>To develop an information system for the classification of dangerous objects, we will use the input data received from one of the listed devices: a metal detector, ground-penetrating radar or their combined hybrid.</p><p>The set research problem can be solved by machine learning algorithms <ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref>. The developed software will be optimized for use in Ukraine and forecasting accuracy will be improved compared to existing systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Works</head><p>There are many different methods for demining nowadays. For example, manual demining can be used, or heavy specialized armored vehicles can be used to defuse explosive devices on site, or small robots or drones can be used.</p><p>For example, methods of applying machine learning methods for detecting mines using drones are considered in the paper <ref type="bibr" target="#b8">[9]</ref>. Recent advances in drone-based remote sensing using lightweight multispectral and thermal infrared sensors allow rapid detection of landmine contamination over a large area and map surveys. In their publication, the researchers focused on describing the development and testing of an automated technique for the remote detection of anti-personnel mines and the identification of scattered anti-personnel mines during large-area surveys. A methodology was proposed for the detection of scattered plastic mines, the construction of which uses liquid explosives encapsulated in a polyethylene or plastic case. This makes it impossible to detect such explosives using a metal detector, but analyzing images of the earth's surface using artificial intelligence methods can help solve the problem. The study analyzes multispectral and thermal data sets collected by an automated drone survey system containing scattered PFM-1 landmines as test objects and presents the results of an attempt to automate landmine detection by relying on supervised learning algorithms using faster regional convolutional neural network (Faster R-CNN). An RGB visible light demonstration of Faster R-CNN showed a test accuracy of 99.3% for the partially barred test set and 71.5% test accuracy for the fully barred test set. In multiple test environments, the use of centimeterscale, precisely georeferenced datasets combined with Faster R-CNN enabled accurate automated detection of PFM-1 test landmines. This method can be calibrated for other types of cluster antipersonnel mines in future tests to aid humanitarian demining initiatives. As millions of remnants of PFM-1 and similar plastic mines are scattered in post-conflict regions in large quantities and over large areas, they pose a long-term threat to the lives of people in these areas.</p><p>In the article <ref type="bibr" target="#b9">[10]</ref>, the researchers described the relevance of this topic and suggested using convolutional neural networks to solve the task. This article proposes a technology for detecting buried explosive objects. The proposed solution uses a special type of CNN, known as an autoencoder, to analyze spatial data acquired by GPR. Experiments conducted with real data show that the proposed technique does not require special data preparation and preprocessing to achieve accuracy above 93% in complex data sets. This study correlates with ours because our work also uses this type of convolutional neural network, but we have improved the accuracy.</p><p>In the article <ref type="bibr" target="#b10">[11]</ref>, scientists proposed to use CNNs, which are applied based on images obtained from ground-penetrating radar images. The proposed algorithm is capable of recognizing whether the examined soil surface contains hidden explosive devices. Validation of the presented system is performed on real GPR data, although system training is performed relying on artificially generated data. The results show that 95% accuracy can be achieved. The purpose of the proposed system is to determine whether a picture of the soil thickness obtained with the help of GPR contains signs of the presence of dangerous devices there. The proposed method is able to work on small fragments of the image with high accuracy, which allows for sufficiently accurate localization of the target. Experimental results confirmed the idea that CNN can learn from artificially generated data. However, by adding some background GPR data to the training images, the detection accuracy can be greatly increased. However, the system does not necessarily need to be trained on images depicting specific real-world objects. This characteristic is most important for the scenario of detecting hidden explosive devices. Thanks to this approach, it is possible to detect mines that were not in the training dataset before. This work is generally highly competitive with a high accuracy rate of around 95%, but the intelligent system we developed should be more versatile when processing new data and for detecting mine types that were not encountered in the training datasets.</p><p>The authors of the article <ref type="bibr" target="#b11">[12]</ref> describe the methods of analyzing the ground-penetrating radar signal for the classification of mines that may be in the ground. This study describes a technology for multipolarization-based mine detection: a ground-coupled GPR platform that provides adequate performance without compromising operational safety by incorporating a flexible ballistic shield to support potential explosions. Experimental results have shown that the protective shield can not only absorb the impact of fragments caused by the explosion, but also allows obtaining data with the accuracy necessary to create a correct three-dimensional reconstruction of the underground layer. The resulting GPR data is then processed using a CNN capable of detecting hidden objects with a high degree of accuracy. Compared to this study, our information system should be more versatile on new data and detecting explosive devices that were not present in the training data sets.</p><p>The article <ref type="bibr" target="#b12">[13]</ref> describes the development of a new dual-modality metal detector, which integrates georadar spectroscopic metal detection using GPR. This paper presents a feature-level sensor fusion strategy based on three features derived from two sensors. This article shows how data from the two components can be combined together to enrich operator feedback. The algorithms presented in this work are aimed at automating the location of hidden objects. The described system is also able to collect information that can also be used for potential classification of such items.</p><p>The article <ref type="bibr" target="#b13">[14]</ref> describes the development of algorithms for more accurate classification of small metals in mineralized soils. Detecting small metal objects buried in mineralized soil is a challenge for metal detectors. This paper describes a new, portable MIS-based system that can be used to detect buried metallic objects even in difficult soil conditions. Experimental results consisting of 1669 passes through hidden objects or empty ground are presented. Fourteen objects were buried at three different depths in three soil types, including unmineralized and mineralized soils. A new processing algorithm is proposed to demonstrate how spectroscopy can be used to detect metallic objects in mineralized soils based on MIS data. The algorithm is robust for all soil types, objects, and depths used in this experiment, achieving a true positive rate of over 99% with a false positive rate of less than 5% based on just one pass over the object. It was also shown that the algorithm does not need to be trained separately for each soil type.</p><p>The technical and physical part of the work of metal detectors for detecting explosive devices is presented in the study <ref type="bibr" target="#b14">[15]</ref>. The combination of metal detector and GPR to improve the detection of anti-personnel mines is also investigated in this paper. A number of problems arise due to the close integration of these two types of detection. One problem is the proximity of metal GPR antennas to metal detector coils, which affects the performance of the metal detector due to eddy currents created in the structure of the GPR antenna. This article examines the impact of a traditional solid butterfly antenna design on a metal detector, as well as ways to reduce eddy currents.</p><p>In our research, we are developing a system that, based on a detector or GPR signal, will classify objects in the ground and predict with what probability an explosive device is located there. Of course, similar systems already exist, but there are few of them, as well as open access scientific publications on this topic. However, our system is adapted to Ukrainian needs as much as possible and is based on research <ref type="bibr" target="#b15">[16]</ref>, where a detailed analysis of the electromagnetic properties of soils in Donbas is carried out and the approaches that are most optimally used when demining such soils are described.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Proposed methodology</head><p>This study uses the dataset described in <ref type="bibr" target="#b9">[10]</ref>. The researchers collected this data set and uploaded part of it to their GitHub repository <ref type="bibr" target="#b16">[17]</ref>. This dataset contains GPR data. This allows for higher accuracy when training the network, compared to using data from metal detectors.</p><p>To create this dataset, 8 different objects were buried in a plot measuring 1 by 2 meters. There were: 3 real mines PROM1, DM11 and PMN58, a grenade, a metal sphere, an aluminum can, a plastic bottle and a plant root. As a result of the rain that fell a few days before the experiment, the sand was not completely dry, providing a propagation speed of 10 cm/ns and a resulting dielectric value of 9. The consequence of this is that the medium can not be considered strictly homogeneous, since the upper layers of sand were more dry compared to the lower layers. This helped to provide the experiment with conditions even closer to real ones.</p><p>Figure <ref type="figure">1</ref> shows a sample of images that the dataset contains and that will be processed by our neural network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: GPR scan obtained from the dataset</head><p>It can be seen from Figure <ref type="figure">1</ref> that GPR does not allow to obtain a clear picture of the soil section. For example, it is something similar to the work of a locator or ultrasound images of a person. That is why only highly qualified specialists who have learned to understand well what is visible on such images can work with GPR to detect dangerous explosive devices. However, the use of artificial intelligence tools can simplify this task for people or make it possible for robot sappers to work independently without the participation of this operator who would remotely control it in manual mode.</p><p>We have provided Figure <ref type="figure">2</ref>. and Figure <ref type="figure">3</ref>. below to see the difference in images between those that have mines or other unknown objects and those that only have uniform soil with nothing. The first of these two pictures has a uniform color without noticeable significant anomalies. This shows that it was made on a homogeneous surface of the earth, which does not contain any objects.</p><p>However, in the second figure, certain "waves" and disturbances are already visible, which indicate an obstacle in the soil and indicate its approximate location on the time line. From the appearance of these disturbances in the picture, it is possible to find out whether it is a depicted cavity, some object or a rock. The algorithm must record all such places where an explosive device can potentially be located. From Figure <ref type="figure">1</ref> and Figure <ref type="figure">2</ref> above, the difference is noticeable even to an inexperienced person, but often the situation is more complicated, since various rocks, stones, foreign objects that are not mines may be present in the ground. soils are also of different types and moisture content with different dielectric permeability, which affects the quality and efficiency of GPR. That is why the algorithm must be able to recognize dangerous objects under different conditions.</p><p>The input data for training the network are the scans shown above. They can be presented in twodimensional space or in three-dimensional space. This makes the data set more versatile and allows us to train different types of networks on its basis and compare their effectiveness. This means that based on this dataset, we can develop a network that will work with 2D or 3D space and show how objects are placed in the real world.</p><p>Table <ref type="table" target="#tab_0">1</ref> shows the main physical characteristics of the data from the dataset. It is convenient to use neural networks to solve the given problem. This will make it possible to build an information system for automatic recognition of dangerous explosive devices. The selected dataset requires working with images of scanned soil areas, so in this case it will be appropriate to use convolutional neural networks. This type of network effectively copes with tasks of this kind. There are many well-known examples of applications and scientific studies that show high performance of CNNs for solving problems in the field of computer vision.</p><p>The peculiarity of the task set in the work is that completely different types of dangerous explosive devices can be encountered here. These can be mines made in the last century, and modern secret mines that were not used before. Such a complete dataset simply does not exist, so an important requirement for choosing an algorithm and designing a system is the ability of this network to maintain its effectiveness on new types of mines that were not even in the training dataset. Of course, it will not be possible to verify this without practical experiments, but researchers from one of the analyzed works <ref type="bibr" target="#b17">[18]</ref> claim that they managed to develop a model that has similar properties. In their publication, they describe a type of network built on the basis of an autoencoder. Therefore, we also chose the autoencoder architecture.</p><p>We used an incomplete convolutional autoencoder <ref type="bibr" target="#b18">[19]</ref>, which is characterized by a hidden representation of information of a reduced dimension relative to the input data, to solve the task. This autoencoder translates the original data into a smaller value space and then decodes it. It is appropriate to choose this type of neural network, as it can be used to investigate anomalies <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref>, data that do not correspond to the expected results. This is necessary in order to effectively detect types of explosive devices that were not even present in the training data set. The proposed algorithm is actually trained on those data and parts of GPR scans where there are no mines or explosive devices. When an area with a land mine appears on the image, it is fixed as an anomaly, and passing data through different layers of the neural network should make this anomaly more clear and obvious, so that the algorithm does not make a mistake. Such a clever approach makes it possible to detect, through anomalies, even those types of explosive devices that were not included in the training dataset and thereby make the algorithm more universal and suitable for use on the territory of Ukraine.</p><p>Figure <ref type="figure" target="#fig_1">4</ref>. gives a more visual understanding of the principles of CNN and the autoencoder. There is a schematic representation of the general view of the convolutional network. The autoencoder is built on the basis of CNN and is somewhat similar to it and also uses convolutional layers, but schematically the autoencoder can be divided into two parts: the encoder and the decoder, as shown in Figure <ref type="figure" target="#fig_2">5</ref>.</p><p>With this approach, it is possible to train the autoencoder on relatively small volumes of data obtained from ground-penetrating radar, which will not contain a complete set of data on possible explosive devices. After training, this autoencoder processes the entire amount of analyzed data. Then the value of anomalies is calculated for each scan. If an anomaly, which could be a hidden mine, is detected on one of the scans, the value 1 is assigned to the special label Ĵ, but if the magnitude of the anomaly is insufficient or there is no anomaly, then the label Ĵ equal to zero is assigned. As a result, all scans begin to be marked with Ĵ=1 or Ĵ=0. (1) where 𝑤𝑤 𝑖𝑖 and ŵ 𝑖𝑖 are the input and output data. This loss function is the root-mean-square error between the input data 𝑤𝑤 𝑖𝑖 and the output data of the autoencoder ŵ 𝑖𝑖 . If these two measurements come as close as possible to each other in value and the loss function decreases, then we can say that the autoencoder has learned to reproduce the received information correctly. In practice, the value of this function is almost always positive, but it can be zero if the network prediction is 100% correct.</p><p>For each block 𝑤𝑤 𝑖𝑖 of input data W, the Euclidean distance 𝑒𝑒 𝑖𝑖 is calculated according to <ref type="bibr" target="#b1">(2)</ref>. 𝑒𝑒 𝑖𝑖 = �ℎ 𝑖𝑖 − ĥ 𝑖𝑖 � (2) where ℎ 𝑖𝑖 and ĥ 𝑖𝑖 are already encoded data blocks by transforming ℎ 𝑖𝑖 =Ɛ(𝑤𝑤 𝑖𝑖 ) and ĥ 𝑖𝑖 = Ɛ(ŵ 𝑖𝑖 ). Using decoding functions, this hidden data layer can be decoded in the following way: ŵ 𝑖𝑖 = Ɗ(ℎ 𝑖𝑖 ).</p><p>This Euclidean distance 𝑒𝑒 𝑖𝑖 between hidden data blocks can be used as an anomaly detector. Because data blocks containing hyperbola features form a hidden data block ĥ 𝑖𝑖 , which is very different from ℎ 𝑖𝑖 . It also works vice versa, if there are two hidden blocks of data that are similar, it means that the data being analyzed is similar to the samples on which the network is trained.</p><p>In the data aggregation step, the main goal is to combine all the obtained e_i values to detect a volumetric anomaly M of the same size as the data W. This allows to find out which data W should be considered anomalies. These anomalies are likely to be hidden mines. The volumetric anomaly M is constructed by overlapping and averaging the data. Volumetric means that the data is taken in threedimensional space.</p><p>Formula (3) can be used to determine the set of indexes i of blocks w_i containing the sample W(t, x, y).</p><p>Ƒ 𝑡𝑡,𝑥𝑥,𝑦𝑦 = {𝑖𝑖 | 𝑊𝑊(𝑡𝑡, 𝑥𝑥, 𝑦𝑦) ⊂ 𝑤𝑤 𝑖𝑖 } (3) where, the notation ⊂ is used to express that the sample W(t, x, y) is contained in the data block 𝑤𝑤 𝑖𝑖 . Then the anomaly M can be determined by <ref type="bibr" target="#b3">(4)</ref>.</p><p>𝑀𝑀(𝑡𝑡, 𝑥𝑥, 𝑦𝑦)</p><formula xml:id="formula_0">= 1 �Ƒ 𝑡𝑡,𝑥𝑥,𝑦𝑦 � ∑ 𝑒𝑒 𝑖𝑖 𝑖𝑖 ∈ Ƒ 𝑡𝑡,𝑥𝑥,𝑦𝑦<label>(4)</label></formula><p>where �Ƒ 𝑡𝑡,𝑥𝑥,𝑦𝑦 � is the power of the set Ƒ 𝑡𝑡,𝑥𝑥,𝑦𝑦 or its cardinal number. After calculating the magnitude of the anomaly M, we can proceed to check whether this anomaly refers to a mine. Formula (5) can be used to detect anti-personnel mines on a scanned image of the ground from an M-based GPR.</p><formula xml:id="formula_1">Ĵ(𝑦𝑦) = � 1, 𝑖𝑖𝑖𝑖 max 𝑡𝑡,𝑥𝑥 𝑀𝑀(𝑡𝑡, 𝑥𝑥, 𝑦𝑦) &gt; 𝐷𝐷 0, else<label>(5)</label></formula><p>where D is a global threshold value that is chosen during system setup based on a set of GPR scans. If we detect a large anomaly during the analysis of the scans, then this scan is marked as suspicious for the presence of explosive devices there.</p><p>The AUC metric was chosen to assess the accuracy of the trained model. Formula (6) can be used to calculate the rate of true-positive solutions (TPR). TPR = 𝑇𝑇𝑇𝑇 𝑇𝑇𝑇𝑇+𝐹𝐹𝐹𝐹 <ref type="bibr" target="#b5">(6)</ref> where TP is the correct prediction of the positive prediction and FN is the incorrect prediction of the negative prediction.</p><p>The number of false positive forecasts (FPR) can be calculated using formula <ref type="bibr" target="#b6">(7)</ref>. FPR = 𝐹𝐹𝑇𝑇 𝐹𝐹𝑇𝑇+𝑇𝑇𝐹𝐹 <ref type="bibr" target="#b6">(7)</ref> where FP is the incorrect prediction of the positive forecast and TN is the correct prediction of the negative forecast.</p><p>The ROC curve shows the dependence of TPR on FPR. Lowering the classification threshold allows more items to be predicted as a positive prediction, thus increasing the number of false positives and true positives. But to calculate the ROC curve, it would be necessary to calculate the logistic regression model many times with different classification threshold values. This approach to calculations is complex and inefficient, so the AUC metric is used, which is equal to the area under the ROC curve. This allows us to apply integral calculus and makes it convenient to use.</p><p>We should use the activation function to bring the output data to a certain range of values. We chose the tanh function, or another name, the hyperbolic tangent function, which is calculated by formula <ref type="bibr" target="#b7">(8)</ref>.</p><p>tanh(𝑥𝑥) = 2 1+𝑒𝑒 −2𝑥𝑥 − 1 (8) Formula ( <ref type="formula">9</ref>) can be used to calculate the derivative function of the hyperbolic tangent.</p><p>𝑖𝑖´(𝑥𝑥) = 1 − 𝑖𝑖(𝑥𝑥) 2 (9) Summarizing all of the above, the algorithm of the designed intelligent system can be described in the following steps:</p><p>• Prepared data is fed to the network input.</p><p>• Five convolutional layers of the network were created with decreasing filter dimension and image size at each convolution step.</p><p>• The encoder layer was created with the smallest dimension and pass images through it.</p><p>• Five symmetric deconvolution layers were created with a gradual increase in the dimension of the filter and with the return of the image to the original dimension.</p><p>• The decoder was created as the output layer of the autoencoder using the tanh activation function.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results</head><p>During the test runs of the developed software, a number of experiments were conducted regarding the selection of different configurations of models, different number of layers and their parameters. We conducted experiments to understand under which model parameters the best values of the metrics will be obtained. Numerical experiments were carried out with different network input settings. As a result, two designed networks with the best obtained results were selected for a more detailed comparison. Figure <ref type="figure">6</ref> shows basic information about the two designed networks.</p><p>The above data show that both models have similar characteristics. For example, each model has several convolutional layers and several decoder layers transposed to them.</p><p>Figure <ref type="figure" target="#fig_4">7</ref>. shows information about the training epochs of the network. The data was divided into normal and validation and the main metrics were calculated precisely on the validation data for better reliability of the results.</p><p>As a result, 32 epochs were completed during the training of the first model, after which the EarlyStopping function was called, so the loss reduction and improvement of the model did not occur for five epochs before that. The course of training of this network and changes in the value of losses on the validation data with each epoch can be visually seen in Figure <ref type="figure" target="#fig_5">8</ref>.</p><p>We can analyze the graph above and see that the rapid decrease in losses occurred up to about 15 epochs, and after 20 it almost stopped and the improvement was apparently quite insignificant and almost not visually noticeable. However, the effect of retraining also did not occur, since a rapid increase in losses is not observed and the function decreases along its entire length. There are a few small fluctuations, where losses could increase for a short time, but this is acceptable, because the test was carried out on validation data.</p><p>A similar graph of the dependence of losses on the number of epochs is also constructed for the second model (see Figure <ref type="figure" target="#fig_6">9</ref>).</p><p>We can visually see that the training of the second model happened a little faster than the first. A total of 27 epochs were completed, which means that after the <ref type="bibr" target="#b21">22</ref>    After training the models, we checked their performance on test data. After testing, we derived the value of the AUC metric, which describes the accuracy of the prediction. For the first model, the AUC value is equal to 97.83%, and for the second trained model, AUC = 96.32%. Therefore, the configuration of building the first model is more successful for solving the given problem using this dataset. It can be concluded that the first model with five convolutional layers and five decoder layers should be used.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>A large area of our country was mined and required a long and expensive demining process even after the 2014 invasion, but in 2022 the scale of the problem has greatly increased. It is necessary to implement the automation of the demining process and develop new or improve existing technologies to save human lives. The system for predicting or classifying mines in the ground with the help of machine learning can be used as a smart assistant built into metal detectors or GPR, or for sapper robots. This allows us to conclude that such systems will remain relevant in the coming years.</p><p>The autoencoder algorithm is selected. This algorithm is suitable for fast and efficient processing of input images and is flexible to detect explosive devices that might not have entered the training dataset. Therefore, this algorithm is optimal for training the system that will be used in Ukraine, where there may be many unknown types of mines. The paper provides a mathematical description of the algorithm, and describes the principle of calculating anomalies on GPR scans, which may be mines or explosive devices. But for maximum improvement and the most effective detection of dangerous objects, it will be worth retraining the model on a dataset collected using Ukrainian soils with their unique dielectric permeability. Unfortunately, there is currently no such dataset available. Therefore, we chose the most relevant dataset from those that were publicly available on the Internet. Also, we analyzed the principle of operation of metal detectors and ground-penetrating radars. We found out the advantages and disadvantages of each of these devices for demining. We investigated which of these devices provides more accurate information about the object detected in the ground and, accordingly, data from which device is better to use for training the model. After the comparison, we concluded that GPR or hybrid devices that combine sensors of both a metal detector and GPR are best suited to solve the given problem. Such hybrid devices are currently among the most modern. But they appeared relatively recently, and we did not find any datasets on the Internet that use data from such devices. Therefore, we used the data obtained from a conventional GPR to build a classification system. Pictures taken with the help of GPR are usually sufficiently informative for the detection and classification of dangerous explosive objects.</p><p>We used Python and Google Collaboratory to develop the software using the selected autoencoder algorithm and dataset. After that, we compared the results of the models with two different configurations. We conducted numerical experiments and found that the first of the two models gives better performance results (AUC is equal to 97.83%) based on the compared metrics. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :Figure 3 :</head><label>23</label><figDesc>Figure 2: GPR scan of the soil layer without mines</figDesc><graphic coords="5,211.25,72.00,173.21,160.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Schematic representation of a convolutional neural network Figure 4.shows that the network consists of several main parts: the input, convolutional layers, connecting layers, the stage where all neurons are connected and, finally, the output processed data classes.The autoencoder is built on the basis of CNN and is somewhat similar to it and also uses convolutional layers, but schematically the autoencoder can be divided into two parts: the encoder and the decoder, as shown in Figure5.With this approach, it is possible to train the autoencoder on relatively small volumes of data obtained from ground-penetrating radar, which will not contain a complete set of data on possible explosive devices. After training, this autoencoder processes the entire amount of analyzed data. Then the value of anomalies is calculated for each scan. If an anomaly, which could be a hidden mine, is detected on one of the scans, the value 1 is assigned to the special label Ĵ, but if the magnitude of the anomaly is insufficient or there is no anomaly, then the label Ĵ equal to zero is assigned. As a result, all scans begin to be marked with Ĵ=1 or Ĵ=0.</figDesc><graphic coords="6,122.55,444.82,349.87,137.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Schematic image of the autoencoder The principle of autoencoder training is based on minimizing the loss function L. This is an important part of the model and formula (1) for this function is given below: 𝐿𝐿 = 1 𝑛𝑛 ∑ (𝑤𝑤 𝑖𝑖 − ŵ 𝑖𝑖 ) 2 𝑛𝑛 𝑖𝑖=1</figDesc><graphic coords="7,101.00,72.00,394.44,106.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>epoch the network stopped improving and the EarlyStopping function was triggered. The network losses decreased especially rapidly in the first five epochs, after which the process slowed down somewhat, and after the fifteenth epoch the value of the loss indicator almost did not change. a) b) Figure 6: a) Parameters of the first model; b) Parameters of the second model</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: The first ten epochs of the training cycle</figDesc><graphic coords="10,178.60,73.50,251.23,194.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Graph of the loss function for the first modelAfter training the models, we checked their performance on test data. After testing, we derived the value of the AUC metric, which describes the accuracy of the prediction. For the first model, the AUC value is equal to 97.83%, and for the second trained model, AUC = 96.32%. Therefore, the configuration of building the first model is more successful for solving the given problem using this dataset. It can be concluded that the first model with five convolutional layers and five decoder layers should be used.</figDesc><graphic coords="10,74.20,295.33,446.55,210.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: Graph of the loss function for the second model</figDesc><graphic coords="11,78.02,330.98,438.86,205.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="9,163.25,111.45,268.50,323.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="9,160.25,451.79,276.60,286.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Physical parameters of the data from the dataset</figDesc><table><row><cell>Parameter</cell><cell>Value</cell></row><row><cell>Central frequency / Bandwidth</cell><cell>2 GHz/ 2 GHz</cell></row><row><cell>Propagation velocity in soil</cell><cell>10 cm/ ns</cell></row><row><cell>Time sampling</cell><cell>0,0117 ns</cell></row><row><cell>Inline sampling</cell><cell>0,4 cm</cell></row><row><cell>Crossline sampling</cell><cell>1,6 cm</cell></row><row><cell>Time window</cell><cell>20 ns</cell></row><row><cell>Acquired B-scans</cell><cell>66</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1</head><label>1</label><figDesc></figDesc><table /><note>allows us to better understand the data we use and what parameters GPR had when creating scanned images of the soil.</note></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Intelligent Metal Detector</title>
		<author>
			<persName><forename type="first">P</forename><surname>Nováček</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Svatoš</surname></persName>
		</author>
		<idno type="DOI">10.4028/www.scientific.</idno>
		<idno>543.133</idno>
		<ptr target="net/kem." />
	</analytic>
	<monogr>
		<title level="j">Key Engineering Materials</title>
		<imprint>
			<biblScope unit="volume">543</biblScope>
			<biblScope unit="page" from="133" to="136" />
			<date type="published" when="2013-03">Mar. (2013</date>
			<publisher>Trans Tech Publications, Ltd</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A Novel Pulsed Eddy Current Criterion for Non-Ferromagnetic Metal Thickness Quantifications under Large Liftoff</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Qin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Fu</surname></persName>
		</author>
		<idno type="DOI">10.3390/s22020614</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">614</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A Highly Digital Multiantenna Ground-Penetrating Radar System</title>
		<author>
			<persName><forename type="first">A</forename><surname>Srivastav</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mcconnell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">N</forename><surname>Loparo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename></persName>
		</author>
		<idno type="DOI">10.1109/TIM.2020.2984415</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Instrumentation and Measurement</title>
		<imprint>
			<biblScope unit="volume">69</biblScope>
			<biblScope unit="page" from="7422" to="7436" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Minelab&apos;s official site with information about their MDS-10 metal detector</title>
		<ptr target="https://www.minelab.com/countermine/detectors/mds-10-dual-sensor-landmine-detector-by-minelab" />
	</analytic>
	<monogr>
		<title level="m">Electronic resource</title>
				<imprint>
			<date type="published" when="2022">10/17/2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">GPR Signal Characterization for Automated Landmine and UXO Detection Based on Machine Learning Techniques</title>
		<author>
			<persName><forename type="first">X</forename><surname>Núñez-Nieto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Solla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Gómez-Pérez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lorenzo</surname></persName>
		</author>
		<idno type="DOI">10.3390/rs6109729</idno>
	</analytic>
	<monogr>
		<title level="j">Remote Sens</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="9729" to="9748" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A Parallel Algorithm for the Detection of Eye Disease</title>
		<author>
			<persName><forename type="first">L</forename><surname>Mochurad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Panto</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-24475-9_10</idno>
	</analytic>
	<monogr>
		<title level="j">CSDEIS</title>
		<imprint>
			<biblScope unit="volume">158</biblScope>
			<biblScope unit="page" from="1" to="15" />
			<date type="published" when="2022">2022. 2023</date>
		</imprint>
	</monogr>
	<note>LNDECT</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">When not to use machine learning: A perspective on potential and limitations</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Carbone</surname></persName>
		</author>
		<idno type="DOI">10.1557/s43577-022-00417-z</idno>
	</analytic>
	<monogr>
		<title level="j">MRS Bulletin</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<biblScope unit="page" from="968" to="974" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Machine Learning: Algorithms, Real-World Applications and Research Directions</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">H</forename><surname>Sarker</surname></persName>
		</author>
		<idno type="DOI">10.1007/s42979-021-00592-x</idno>
	</analytic>
	<monogr>
		<title level="j">SN COMPUT. SCI</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page">160</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Applying Deep Learning to Automate UAV-Based Detection of Scatterable Landmines</title>
		<author>
			<persName><forename type="first">J</forename><surname>Baur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Steinberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nikulin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Chiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">S</forename><surname>De Smet</surname></persName>
		</author>
		<idno type="DOI">10.3390/rs12050859</idno>
	</analytic>
	<monogr>
		<title level="j">Remote Sensing</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page">859</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Landmine detection using autoencoders on multipolarization GPR volumetric data</title>
		<author>
			<persName><forename type="first">P</forename><surname>Bestagini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Lombardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lualdi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Picetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">&amp;</forename><forename type="middle">S</forename><surname>Tubaro</surname></persName>
		</author>
		<idno type="DOI">10.1109/TGRS.2020.2984951</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Geoscience and Remote Sensing</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="182" to="195" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Landmine detection from GPR data using convolutional neural networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lameri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Lombardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bestagini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lualdi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tubaro</surname></persName>
		</author>
		<idno type="DOI">10.23919/EUSIPCO.2017.8081259</idno>
	</analytic>
	<monogr>
		<title level="m">25th European Signal Processing Conference, EUSIPCO</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="508" to="512" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Ballistic ground penetrating radar equipment for blast-exposed security applications</title>
		<author>
			<persName><forename type="first">F</forename><surname>Lombardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lualdi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Picetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bestagini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Janszen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Di Landro</surname></persName>
		</author>
		<idno type="DOI">10.3390/rs12040717</idno>
	</analytic>
	<monogr>
		<title level="j">Remote Sensing</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Combining electromagnetic spectroscopy and ground-penetrating radar for the detection of antipersonnel landmines</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Marsh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Verre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Davidson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J W</forename><surname>Podd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Daniels</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Peyton</surname></persName>
		</author>
		<idno type="DOI">10.3390/s19153390</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">15</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Detection of metallic objects in mineralized soil using magnetic induction spectroscopy</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Verre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Marsh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Davidson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Cheadle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J W</forename><surname>Podd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Peyton</surname></persName>
		</author>
		<idno type="DOI">10.1109/TGRS.2020.2994814</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Geoscience and Remote Sensing</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="27" to="36" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Reducing the induction footprint of ultra-wideband antennas for ground-penetrating radar in dual-modality detectors</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Verre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J W</forename><surname>Podd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Marsh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Davidson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Daniels</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Peyton</surname></persName>
		</author>
		<idno type="DOI">10.1109/TAP.2020.3026909</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Antennas and Propagation</title>
		<imprint>
			<biblScope unit="volume">69</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1293" to="1301" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Characterization of electromagnetic properties of in situ soils for the design of landmine detection sensors: Application in donbass</title>
		<author>
			<persName><forename type="first">T</forename><surname>Bechtel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Truskavetsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pochanin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Capineri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sherstyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Viatkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Crawford</surname></persName>
		</author>
		<idno type="DOI">10.3390/rs11101232</idno>
	</analytic>
	<monogr>
		<title level="j">ukraine. Remote Sensing</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">10</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<ptr target="https://github.com/polimi-ispl/landmine_detection_autoencoder/tree/master/datasets/giuriati_2(visited05/" />
		<title level="m">The dataset is hosted on GitHub</title>
				<imprint>
			<date type="published" when="2022">11/2022</date>
		</imprint>
	</monogr>
	<note>Electronic resource</note>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Synthetic aperture radar imaging system for landmine detection using a ground penetrating radar on board a unmanned aerial vehicle</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Fernandez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">A</forename><surname>Lopez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Arboleya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">G</forename><surname>Valdes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">R</forename><surname>Vaqueiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">L</forename><surname>Andres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Garcia</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2018.2863572</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="45100" to="45112" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Traffic Data Imputation with Ensemble Convolutional Autoencoder</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Ye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J Q</forename><surname>Yu</surname></persName>
		</author>
		<idno type="DOI">10.1109/ITSC48978.2021.9564839</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Intelligent Transportation Systems Conference (ITSC)</title>
				<meeting><address><addrLine>Indianapolis, IN, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="1340" to="1345" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Modeling of Psychomotor Reactions of a Person Based on Modification of the Tapping Test</title>
		<author>
			<persName><forename type="first">L</forename><surname>Mochurad</surname></persName>
		</author>
		<author>
			<persName><surname>Ya</surname></persName>
		</author>
		<author>
			<persName><surname>Hladun</surname></persName>
		</author>
		<idno type="DOI">10.47839/ijc.20.2.2166</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computing</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="190" to="200" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">A Deep-ConvolutionalNeural-Network-Based Semi-Supervised Learning Method for Anomaly Crack Detection</title>
		<author>
			<persName><forename type="first">X</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Teng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Chen</surname></persName>
		</author>
		<idno type="DOI">10.3390/app12189244</idno>
	</analytic>
	<monogr>
		<title level="j">Appl. Sci</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page">9244</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Google Colaboratory</title>
		<author>
			<persName><forename type="first">E</forename><surname>Bisong</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-1-4842-4470-8_7</idno>
	</analytic>
	<monogr>
		<title level="m">Building Machine Learning and Deep Learning Models on Google Cloud Platform</title>
				<meeting><address><addrLine>Berkeley, CA</addrLine></address></meeting>
		<imprint>
			<publisher>Apress</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
