LSTM-based system for multiple obstacle detection using ultra-wide band radar

Archive ouverte : Communication dans un congrès

Mimouna, Amira | Ben Khalifa, Anouar | Alouani, Ihsen | Taleb-Ahmed, Abdelmalik | Rivenq, Atika | Ben Amara, Najoua

Edité par HAL CCSD ; SCITEPRESS - Science and Technology Publications

International audience. Autonomous vehicles present a promising opportunity in the future of transportation systems by providing road safety. As significant progress has been made in the automatic environment perception, the detection of road obstacles remains a major challenge. Thus, to achieve reliable obstacle detection, several sensors have been employed. For short ranges, the Ultra-Wide Band (UWB) radar is utilized in order to detect objects in the near field. However, the main challenge appears in distinguishing the real target’s signature from noise in the received UWB signals. In this paper, we propose a novel framework that exploits Recurrent Neural Networks (RNNs) with UWB signals for multiple road obstacle detection. Features are extracted from the time-frequency domain using the discrete wavelet transform and are forwarded to the Long short-term memory (LSTM) network. We evaluate our approach on the OLIMP dataset which includes various driving situations with complex environment and targets from several classes. The obtained results show that the LSTM-based system outperforms the other implemented related techniques in terms of obstacle detection.

Consulter en ligne

Suggestions

Du même auteur

Entropy-Based Ultra-Wide Band Radar Signals Segmentation for Multi Obstacle...

Archive ouverte: Article de revue

Mimouna, Amira | 2021-03-15

International audience. The development of safe intelligent transportation systems (ITS) has driven extensive research to come up with efficient environment perception techniques with a variety of sensors. In short ...

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adve...

Archive ouverte: Communication dans un congrès

Tarchoun, Bilel | 2021-09-28

International audience. While machine learning applications are getting mainstream owing to a demonstrated efficiency in solving complex problems, they suffer from inherent vulnerability to adversarial attacks. Adve...

An Investigation on Inherent Robustness of Posit Data Representation

Archive ouverte: Communication dans un congrès

Alouani, Ihsen | 2021-02-20

International audience. As the dimensions and operating voltages of computer electronics shrink to cope with consumers' demand for higher performance and lower power consumption, circuit sensitivity to soft errors i...

Du même sujet

Towards zero-latency video transmission through frame extrapolation

Archive ouverte: Communication dans un congrès

Vijayaratnam, Melan | 2022-10-16

International audience. In the past few years, several efforts have been devoted to reduce individual sources of latency in video delivery, including acquisition, coding and network transmission. The goal is to impr...

Feeling multiple edges: the tactile perception of short ultrasonic square r...

Archive ouverte: Communication dans un congrès

Gueorguiev, David | 2017-06-06

International audience. This study investigates human perception of tactile feedback using ultrasonic lubrication, in situation where feedback is provided using short frictional cues of varying duration and sharpnes...

Numerical study of the reflected elastic waves using Rayleigh diffraction i...

Archive ouverte: Article de revue

Maghlaoui, Nadir | 2019-10-25

International audience. In this work, the transient ultrasonic waves radiated by a linear phased array transducer in a liquid then reflected at a liquid solid interface is studied. A model based on the Rayleigh inte...

ILC-Unet++ for Covid-19 Infection Segmentation

Archive ouverte: Communication dans un congrès

Bougourzi, Fares | 2022-05-23

International audience. Since the appearance of Covid-19 pandemic, in the end of 2019, Medical Imaging has been widely used to analysis this disease. In fact, CT-scans of the Lung can help to diagnosis, detect and q...

Face Presentation Attack Detection Using Deep Background Subtraction

Archive ouverte: Article de revue

Benlamoudi, Azeddine | 2022-05

International audience. Currently, face recognition technology is the most widely used method for verifying an individual’s identity. Nevertheless, it has increased in popularity, raising concerns about face present...

Blockchain-Based Collaborative Certificate Revocation Systems Using Cluster...

Archive ouverte: Article de revue

Didouh, Ahmed | 2022

International audience. Despite the decisive contribution of intelligent transport systems in road safety, they also open new vulnerabilities to cyber-attacks, particularly vehicle position-linked attacks. For that ...

Chargement des enrichissements...