Underwater Surface Target (Object Detection) through Sonar Using ML Algorithms

Abstract

In underwater environments, the detection and recognition of submerged objects or targets play a crucial role in applications ranging from marine research to naval operations and underwater robotics. This project introduces an innovative approach to enhance the accuracy and efficiency of underwater target detection through the utilization of sonar technology and advanced machine learning algorithms. The project leverages the capabilities of sonar systems to emit sound waves into the underwater environment and receive their echoes, creating acoustic images of underwater surfaces and objects. These acoustic images are rich in information but often challenging to interpret accurately. To address this challenge, state-of-the-art machine learning algorithms, including deep learning techniques, are employed for the automatic detection and classification of underwater legitimate or phishing objects. The system's architecture involves the integration of sonar data acquisition, pre-processing, and feature extraction, followed by the application of machine learning models trained on diverse underwater object datasets. By utilizing deep neural networks and other ML techniques, the system learns to recognize and classify various underwater objects, such as Torpedo’s, Weapons, submarines, marine life, and geological formations. The benefits of this project extend to numerous domains, including marine conservation, underwater archaeology, and defense applications, where precise and rapid underwater object detection is essential. By combining sonar technology and machine learning algorithms, this project contributes to advancing our understanding and exploration of underwater environments, ultimately improving the safety and efficiency of various underwater operations.

Country : India

1 Shaikh Diya2 Tupe Vaishnavi3 Adsul Tejeswini4 Walke Pratiksha5 Prof. U. B. Shelake

  1. Student, Department of Computer Engineering, Adsul Technical Campus, Ahmednagar, Maharashtra, India
  2. Student, Department of Computer Engineering, Adsul Technical Campus, Ahmednagar, Maharashtra, India
  3. Student, Department of Computer Engineering, Adsul Technical Campus, Ahmednagar, Maharashtra, India
  4. Student, Department of Computer Engineering, Adsul Technical Campus, Ahmednagar, Maharashtra, India
  5. Assistant Professor of Department of Computer Engineering, Adsul Technical Campus, Ahmednagar, Maharashtra, India

IRJIET, Volume 8, Issue 4, April 2024 pp. 189-193

doi.org/10.47001/IRJIET/2024.804026

References

  1. Y. Wang, Q. Chen, D. Gan, J. Yang, D. S. Kirschen, and C. Kang, “Deep learning-based socio-demographic information identification from smart meter datafication from smart meter data,” IEEE Transactions on Smart Grid, vol. 10, no. 3, pp. 2593–2602, 2019.
  2. H.-T. Cheng, L. Koc, J. Harmsen et al., “Wide & deep learning for recommender systems,” in Proceedings of the 1st Workshop on Deep Learning for Recommender Systems—DLRS 2016, pp. 7–10, Boston, MA, USA, September 2016.
  3. P. Jokar, N. Arianpoo, and V. C. M. Leung, “Electricity theft detection in AMI using customers’ consumption patterns,” IEEE Transactions on Smart Grid, vol. 7, no. 1, pp. 216–226, 2016.
  4. M. Ismail, M. Shahin, M. F. Shaaban, E. Serpedin, and K. Qaraqe, “Efficient detection of electricity theft cyber-attacks in ami networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, Barcelona, Spain, April 2018.
  5. R. Mehrizi, X. Peng, X. Xu, S. Zhang, D. Metaxas, and K. Li, “A computer vision based method for 3D posture estimation of symmetrical lifting,” Journal of Biomechanics, vol. 69, no. 1, pp. 40–46, 2018.
  6. K. He, X. Zhang, S. Ren, and J. Sun, “Delving deep into rectifiers: surpassing human-level performance on imagenet classification,” in Proceedings of the IEEE Conference on Computer for Sustainable Global Development, pp. 1026–1034, New Delhi, India, March 2015.
  7. Sharif Razavian, H. Azizpour, J. Sullivan, and S. Carlsson, “CNN features off-the-shelf: an astounding baseline for recognition,” Astrophysical Journal Supplement Series, vol. 221, no. 1, pp. 806–813, 2014.
  8. Z. Zheng, Y. Yang, X. Niu, H.-N. Dai, and Y. Zhou, “Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids,” IEEE Transactions on Industrial Informatics, vol. 14, no. 4, pp. 1606–1615, 2018.
  9. Feczko, N. M. Balba, O. Miranda-Dominguez et al., “Subtyping cognitive profiles in autism spectrum disorder using a functional random forest algorithm files in autism spectrum disorder using a functional random forest algorithm,” Neuro Image, vol. 172, pp. 674–688, 2018.
  10. Y.-L. Boureau, J. Ponce, and Y. LeCun, “A theoretical analysis of feature pooling in visual recognition,” in Proceedings of the 27th International Conference on Machine Learning, pp. 111–118, Haifa, Israel, June 2010.
  11. N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: a simply way to prevent neural networks from overfitting,” The Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929–1958, 2014.
  12. M. Abadi, A. Agarwal, P. Barham et al., “Tensorflow: Large-scale machine learning on heterogeneous distributed systems,” 2016, https://arxiv.org/abs/1603.0446.
  13. Pedregosa, G. Varoquaux, A. Gramfort et al., “Scikit-learn: machine learning in python,” Journal of Machine Learning Research, vol. 12, no. 4, pp. 2825–2830, 2011.
  14. J. R. Schofield, “Low carbon london project: data from the dynamic time-of-use electricity pricing trial,” 2017.
  15. J. B. Leite and J. R. S. Mantovani, “Detecting and locating non-technical losses in modern distribution networks,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 1023–1032, 2018.