Back propagation neural network analysis for the detection of explosives based on tagged neutron

被引:0
|
作者
Ke Gong
Shu-Jun Xiao
Shi-Wei Jing
Yu-Lai Zheng
机构
[1] Northeast Normal University,College of Physics
[2] China Institute of Atomic Energy,Key Laboratory of Sichuan Higher Education—Criminal Science and Technology Laboratory
[3] Sichuan Police College,undefined
关键词
Tagged neutron method; Characteristic γ-ray; BP neural network; Explosive detection; Strong interference;
D O I
暂无
中图分类号
学科分类号
摘要
A system for detecting explosives in walls based on the tagged neutron method was established. An associated particle neutron generator ING-27 developed by the All-Russian Research Institute of Automatics (VNIIA) is used as the neutron source, two yttrium lutetium silicate (LYSO) detectors are used for the γ detector, and a silicon detector is used as the α detector. The α-γ coincidence spectra of 300 g ammonium nitrate and TNT samples placed behind 10 cm concrete wall were measured. A neural network algorithm was applied to analyze the data. Through fine selection of time windows of α-γ coincidence spectra, the counts of full-energy peak of N, C and O elements and their proportions are selected as the input eigenvectors. The neural network is trained by the experimental data obtained by this system. Through training, eight groups of test data consisting of 32 γ-ray spectra were identified, and a 98.7% of correct detection rate was achieved.
引用
收藏
页码:329 / 336
页数:7
相关论文
共 50 条
  • [1] Back propagation neural network analysis for the detection of explosives based on tagged neutron
    Gong, Ke
    Xiao, Shu-Jun
    Jing, Shi-Wei
    Zheng, Yu-Lai
    JOURNAL OF RADIOANALYTICAL AND NUCLEAR CHEMISTRY, 2020, 326 (01) : 329 - 336
  • [2] Detection of citrus Huanglongbing based on principal component analysis and back propagation neural network
    Deng, Xiao-Ling
    Kong, Chen
    Wu, Wei-Bin
    Mei, Hui-Lan
    Li, Zhen
    Deng, Xiao-Ling
    Hong, Tian-Sheng
    Guangzi Xuebao/Acta Photonica Sinica, 2014, 43 (04):
  • [3] Parameters of explosives detection through tagged neutron method
    Bagdasaryan, Kh. E.
    Batyaev, V. F.
    Belichenko, S. G.
    Bestaev, R. R.
    Gavryuchenkov, A. V.
    Karetnikov, M. D.
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 2015, 784 : 412 - 416
  • [4] Detection of element content in coal by pulsed neutron method based on an optimized back-propagation neural network
    Sang, HF
    Wang, FL
    Liu, LM
    Sang, HJ
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION B-BEAM INTERACTIONS WITH MATERIALS AND ATOMS, 2005, 239 (03): : 202 - 208
  • [5] An Analysis of Intrusion Detection System using Back Propagation Neural Network
    Jaiganesh, V.
    Sumathi, P.
    Mangayarkarasi, S.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 232 - 236
  • [6] Support Vector Machine-Based Tagged Neutron Method for Explosives Detection
    Li, Guang-Hao
    Jia, Shao-Lei
    Lu, Zhao-Hu
    Jing, Shi-Wei
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (07) : 9895 - 9908
  • [7] Back Propagation Neural Network Based Lifetime Analysis of Wireless Sensor Network
    Yang, Wenjun
    Wang, Bingwen
    Liu, Zhuo
    Hu, Xiaoya
    ADVANCES IN NEURAL NETWORKS - ISNN 2009, PT 3, PROCEEDINGS, 2009, 5553 : 956 - 962
  • [8] Malware Classification Based on the Behavior Analysis and Back Propagation Neural Network
    Pan, Zhi-Peng
    Feng, Chao
    Tang, Chao-Jing
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
  • [9] Simulation and data analysis of a portable tagged neutron system for detection of explosives hidden in packages
    Han, Mu-Chen
    Jing, Shi-Wei
    Gao, Ya-Dong
    RADIATION PHYSICS AND CHEMISTRY, 2021, 182
  • [10] A Disease Detection Method of Liver Based on Improved Back Propagation Neural Network
    Jin, Xin-Yu
    Jin, Qi-Liang
    Yang, Xiong
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2015, : 111 - 113