Cranfield Online Research Data (CORD)
BCorbett_3MT_Slide.pdf (426.87 kB)

Exploiting Synthetic Aperture Radar Signal Processing to Reveal Concealed Building Features and Phenomena

Download (426.87 kB)
posted on 2018-11-15, 13:15 authored by Brandon Corbett
3MT presented at the 2018 Defence and Security Doctoral Symposium.

There has been an increased research interest in the techniques needed to exploit accurate remotely sensed data of the activities within buildings, closed/sealed areas, underground bunkers, etc. One example area which could be influenced by such research includes the detection of illegal or nefarious activities.
Low frequency synthetic aperture radar (LF-SAR) can provide one such solution to this remote sensing problem. It has been shown that LF-SAR can be used to generate images of objects located behind a variety of mediums, including within buildings. However, the current literature shows that obtaining a clear picture of the structure and contents of buildings is difficult.
It is well known that SAR imagery can be affected by various physical phenomena, which can produce a range of artefacts within the images. These artefacts can lead to confusion and difficulty in analysis, as they can be mistaken for targets. A vibrating scatterer is one such example, as it produces a paired echo signature in the SAR image.
On the other hand, these phenomena are of particular interest for the detection of running machinery within a building. It has been shown that a vibrating scatterer can represent aspects of a running machine, e.g. a generator or fan. Therefore understanding the effects produced within a SAR image from a vibrating object behind a wall, could lead to the ability to identify and recognise running machinery within a building from a stand-off location.
The intention of this research is to investigate these phenomena and the techniques required for imaging the interiors of buildings and to develop the necessary SAR tools and analysis methods required for extracting crucial intelligence information from this data.




Authoriser (e.g. PI/supervisor)

Usage metrics



    Ref. manager