Efficient Crack Detection and Quantification in Concrete Structures Using IoT
Efficient Crack Detection and Quantification in Concrete Structures Using IoT
Engineering
To cite this article: Ajay Nair, Hemalatha R, P Sangeetha, Harish Kumar K, Dinesh Kumar P,
Inakota Sai Sahith & S. Radha (2021) Efficient crack detection and quantification in concrete
structures using IoT, Australian Journal of Electrical and Electronics Engineering, 18:1, 43-57,
DOI: 10.1080/1448837X.2021.1914905
CONTACT Hemalatha R [email protected] Dept of Electronics and Communication, Sri Sivasubramaniya Nadar College of Engineering,
Chennai, Tamilnadu, India
© Engineers Australia
44 A. NAIR ET AL.
method of filling the gaps between cracks but it can The paper is organised as follows. Information on the
turn up with relatively more number of false posi different types of crack is given in section 2. Section 3
tives. Methods for more specific applications such briefs about the proposed model. Section 4 provides the
as cracks in tunnels and underground pipes are performance evaluation and section 5 explains the IoT
also proposed which extract characteristic shapes (Internet of Things)-based monitoring. Finally, section 6
of such cracks for detection (Sinha and Fieguth concludes the paper with future work.
2006) (Seung-Nam, Jang, and Han 2007).
An effective segmentation method to identify crack
was proposed by Long et al. (Long, Shen, and Chen 2. Overview of cracks
2012). It was enabled through grey level correction Cracking can occur due to various reasons such as
and adaptive minimum error threshold but could not thermal stresses, chemical reaction, corrosion of rein
classify cracks. Han et al. (Han et al. 2016) used an forcement or simply poor construction practices such
interactive genetic algorithm and determined the as poor concrete mix or rapid curing. Cracks can be of
edges of the cracks and calculated its geometric para different types such as alligator, transversal or long
meters through intensive calculations. The combina itudinal (Ajagbe and Ojedele 2018) (Md. et al. 2018).
tion of Canny edge detector and support vector The other types are shrinkage and hairline cracks as
machine was used to detect cracks. This enhanced shown in Figure 1, which may result in leakage.
the ability to extract contours but struggled with Horizontal, vertical and diagonal cracks are charac
cracks [Li et al. (Shi et al. 2016)]. Similarly, Canny terised by how they are oriented in the structure.
edge detection has been used along with fast Haar Alligator cracks occur as a V shape. Settlement cracks
transform algorithm for crack detection but, suffered may occur if there are problems with respect to the
with false crack detection. In addition, the method underlying ground.
could not extract crack pixels. The width of the cracks Manual introduction of cracks is performed in the
was also measured using labelling based on Red-Green laboratory to generate a data base. This involves mak
-Blue (RGB) colour information (Hutchinson and ing of the test specimen in the desired shape as shown
Chen 2006). in Figure 2.
It is also to be noted that a single algorithm for Curing is done for about a month. After a couple of
crack detection is not always expected to give efficient hours of dryness it is kept in an oven for an hour for
results for all practical situations. Some structures hardening. Then, cracks are introduced by the univer
might have a large number of cracks with lesser sal testing machine by applying the desired load as
major ones for repair purposes. Other structures may shown in Figure 3.
have few minute cracks but each crack might have to
be detected to ensure the safety of that structure.
Hence, the two proposed crack detection algorithms 3. Proposed system model
will cater correspondingly to the needs of the afore The proposed system can be visualised based on a flow
mentioned problems. The combination of algorithms diagram as shown in Figure 4.
proposed in this paper is more efficient in detecting The proposed system can be segmented into
even the finest cracks compared to the complex algo three major sections: the image processing, IoT-
rithms (Zhang et al. 2014a). Moreover, real-time mon based monitoring and the crack measurements
itoring methodologies are also illustrated to ensure and analysis section. The system has two algo
seamless implementation. rithms for crack detection either of which can
AUSTRALIAN JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING 45
be used depending on the application, along with 3.1. Pattern classification algorithm
an IoT-based monitoring system. The first algo
Pattern classification algorithm in Figure 5 is used in
rithm optimally detects the presence of true
this paper to classify a given specimen as crack or not
cracks and highlights them. This algorithm aims
a crack. It is applicable to a multi-class condition.
to eliminate maximum false positives generated
The distance of each specimen from each of the
due to inappropriate lighting conditions.
classes is measured and the class with minimum
The second algorithm highlights the presence of
distance is where the specimen belongs.
even the finest of cracks. This is useful in appli
cations where even the slightest of cracking could The image database is created by collecting
be a potential threat for the future. This proposed a large number of similar images of various regions
system has been implemented in real time by of cracks. The acquired image is first converted to
hosting a web server that can monitor cracks greyscale. The quality of input image can be sig
from a remote location. nificantly improved by preprocessing. It may
46 A. NAIR ET AL.
include the removal of noisy regions or improving pixel is replaced with the background pixel. This pro
the lighting. Further denoising can be performed cess helps to remove foreground regions of the image.
using a median filter which essentially smoothens Dilation: The opposite process from erosion
the image. Median filtering preserves the image wherein if even one pixel of the structuring element
edges while removing the noise. A 3 × 3 kernel is overlaps with the foreground image, then the centre
used which takes the median of values in the pixel is replaced with the foreground pixel. This pro
neighbourhood and replaces the centre pixel with cess helps to increase the number of foreground pixels.
it. A large kernel size is good for high noise den Closing: Closing is dilation followed by erosion.
sities but will excessively blur the image. Next, This morphological algorithm is represented in
binarization is used to convert pixel values to bin Figure 6.
ary as expressed in Equation (1). (1) Preprocessing: The image is filtered out by using
� Gaussian blur to remove unwanted noise components.
0ifx � T It is convolved with a Gaussian filter rather than a box
f b ðxÞ ¼ (1)
1ifx > T filter which replaces each pixel with a weighted aver
age of the neighbouring pixels. It is used to remove the
where T is the selected threshold and f b ðxÞ is the
high-frequency components. Here, a 3 × 3 Gaussian
binarized image.
filter governed by Equation (2) is traversed over the
The selection of threshold is a critical step in order
image.
to optimally detect and separate cracks from the
� �
image. Here a statistical analysis is used to determine 1 ðx2 þ y2 Þ
the appropriate threshold. The greyscale peak value GðxÞ ¼ exp (2)
2πσ 2 2σ 2
(N) is obtained using the histogram and is taken as the
initial threshold. If the output is not satisfactory, the where G(x) is the expression for the Gaussian filter in
threshold is manually reduced by 1 pixel increments. two dimensions.
Generally, a threshold of around N-8 to N-10 was Larger the standard deviation (σ), greater is the
found to be suitable by experimentation. For a set of image blurring. It is important to preserve image qual
images under a certain lighting, threshold will most ity along with reducing noise and so it is not advisable
likely not change. This is followed by image segmenta to go for larger values of σ. Here σ = 1 is found to suit
tion and labelling. Segmentation involves partitioning our requirements.
the image into its constituent parts. Labelling is done (2) Bottom hat transform: This is the subtraction of
on the image to identify possible regions of cracks. image closing by original image. This helps to obtain
This requires extraction of features pertaining to darkest regions of the image and remove most of the
cracks. The features used for crack detection are ratio background components (Zhang et al. 2014b). The
of major to minor axis and number of pixels. The ratio appropriate choice of the structuring element will
of major to minor axis for a typical crack is a large enhance the results. Generally, the shape of the struc
value. The input image is given to the two-layer feed- turing element is chosen as close as possible to the
forward network to perform crack classification in shape that is to be highlighted. Hence, a rectangular
MATLAB (Matrix Laboratory Simulation Tool). It is structural element is used. If the size of this element is
trained using scaled conjugate gradient back propaga too small, it takes a longer time to completely traverse
tion. Data for classification is organised into the input the image thereby reducing its efficiency and can bring
matrix X and the target matrix T. Here, a selection of up more noise elements. When larger, the desired
15 neurons was able to provide good results. Half of regions are found to be thicker but can miss out on
the samples are used for training and remaining part some small-sized cracks. Here, a size of 15 × 15 is
for testing and validation. Its performance is moni found suitable to meet the desired requirements of
tored using cross entropy and confusion matrices. The highlighting the crack region as a clear output image.
final output is obtained after the phases of training, The operation can be depicted by the Equations (3) &
testing and prediction. (4) as follows.
A_ ¼ A � B ¼ ðA þ BÞ B (3)
3.2. Morphological processing algorithm
_
Anew ¼ A A (4)
The advantage of morphological image processing for
crack detection is that even the thinnest of cracks can _ Anew are the original, closed and output
Here A, A,
be detected and magnified so that it can be easily images, respectively, and B is the structuring element.
treated. + and– represent dilation and erosion operations
Erosion: The structuring element is moved over the respectively.{\displaystyle\ominus} =
entire image. If even one pixel of the structuring ele (3) Thresholding: The image thresholding is per
ment overlaps with the background, then the centre formed using Otsu’s method (Yang et al. 2012). This
48 A. NAIR ET AL.
Image Acquisition
Gray Scaling
Gaussian Blur
Otsu Thresholding
Noise Removal
Figure 6. Morphological algorithm flow diagram.
method involves selecting a particular threshold and connected and seem isolated, they can easily be
checking the number of pixels on either side. The aim removed as they behave as noise components.
is to find the threshold value where the sum of fore
ground and background spreads is at its minimum. It
is suitable for images with a bimodal histogram dis 4. Performance evaluation
tribution. This helps to clearly visualise the crack Dice: Dice is the ratio of twice the intersection between
regions but along with it, a number of salt noises can the segmentation image and the ground truth to its
also occur. summation. Equation (5) shows the formula for the
(4) Noise Removal: The final image can be obtained Dice metric (Umeha, Hemalatha, and Radha 2018).
by removing all the noise components. Removal of
isolated or sparsely distributed pixels will effectively 2ðA \B Þ
Dice ¼ (5)
remove the noise, which requires the knowledge of AþB
pixel connectivity. The image is segmented into its where A is the segmented image and B is the ground
constituent components. When pixels are hardly truth.
AUSTRALIAN JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING 49
Jaccard index: Jaccard index is the ratio between the 4.2. Morphological processing algorithm
intersection and union of the segmented result and the
The results obtained using morphological proces
ground truth. Equation (6) shows the formula for the
sing algorithm are displayed as shown in Figure 8.
Jaccard index (Umeha, Hemalatha, and Radha 2018).
Improper thresholding due to poor contrast in the
image has resulted in poor output image quality in the
A \B
Jaccard ¼ (6) base algorithm. However, proposed morphological
A [B
processing gives a more magnified and lucid view of
where A is the segmented image and B is the ground the cracks. It is advantageous for detection of
truth. even minute cracks. The algorithm can be tweaked to
Emeasure: E-measure is defined by Equation (7) show even the smallest of defects. The drawback is that
and uses the enhanced alignment matrix φ to capture the detection of false positives cannot be avoided
the pixel-level matching and image-level statistics of easily. Figure 9 shows how the algorithm can be
a binary map. tweaked to show varying levels of the defects on
a surface.
1 X w X h
QFM ¼ ϕ (7)
w � h x¼1 y¼1 FMðx;yÞ 5. Iot-Based Monitoring
A complete crack detection and estimation model can
where h and w are the height and the width of the
be implemented using a Raspberry pi (RPi) setup. The
binary map, respectively, and ϕFM is the enhanced
monitoring system consists of an RPi and the Pi camera
alignment matrix (Fan et al. 2018).
(PiCam). The web server is hosted by the RPi and can
These provide a measure of closeness of output
be accessed by the user on any device by connecting to
image from the neural network with the ground
its IP address. A python program is used to implement
truth image, which can otherwise be termed as accu
morphological image processing algorithm to process
racy of classification.
the images. The image of cracks can be uploaded from
the device or it can be taken remotely using the RPi and
uploaded to the server. The PiCam is also used to
4.1. Pattern classification algorithm
perform live streaming to get a real-time view of the
Crack detection has been performed using pattern inspected structure. The inputs as well as processed
classification method and various experimental images are displayed on the web server which is acces
results are obtained. Figure 7 shows a portion of sible from any device connected to the internet.
images used in evaluating the system The Web server setup comprises of the following:
performance. (1) Web Server: Web Server is an integral part of the
From Figure.7 it is clear that superior results system being designed. A web server on RPi can be used
are obtained using the classification algorithm. to host a full website, or just used to display some. A Web
Large numbers of false positives are observed in server can be accessed through the RPi remotely through
the LDP (Local Directional Pattern) based imple a laptop by using SSH (Secure Shell). It is a cryptographic
mentation output and heavier noise corruption is network protocol that ensures secure data transfer
evident. Based on comparison with the ground between computer and RPi. Apache is a popular web
truth image, the Dice, Jaccard and E-measure server, which is a program that listens for server access
metrics and the accuracy of the classification are requests from Internet browsers and grants them if per
calculated and provided in Table 1. mitted. The web servers can be accessed using its IP
From the pattern classification method of crack detec
address.
tion, fairly good results are obtained with reasonable
accuracy. The primary advantage of this method is that (2) Internet Framework: Python is used to deploy
it is suitable for detection of even a large number of the web server on the RPi. The bottle web framework
cracks on the surface of the specimen with better accu architecture is used to make and enable web requests.
racy when compared to (Zhang et al. 2014a). Also it It is a simple and lightweight structure which comes
enables a very low percentage of false-positive detection. with inbuilt servers and can be used to perform var
However, the disadvantage is that minute cracks might ious routing functions.
not be detected with good accuracy. The proposed algo (3) Live Streaming: The RPi camera can be used to
rithm is implemented in the on-board processor with scan the civil structure and the live video can be
lesser complexity. accessed using any device by connecting to the RPi.
50 A. NAIR ET AL.
Figure 7. A) Input Images b) LDP-based segmentation output c) Proposed classification algorithm-based segmentation output.
AUSTRALIAN JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING 51
Figure 8. (a) Input Images (b) LDP-based segmentation output (c) Morphological processing algorithm-based segmentation
output.
52 A. NAIR ET AL.
Figure 9. (a) Original greyscale image (b) Output after morphological processing (c) Output after noise reduction.
Figure 10. Experimental Setup of RPi with (a) PiCam and (b) an LCD Display.
From the live video, one can capture photos instantly user. This image is sent to the web server for proces
and then use these photos for processing. sing. The captured image as well as the processed image
is displayed as output on the web server. The morpho
logical processing algorithm has been implemented in
5.1. Real-time implementation Python in the RPi (https://www.raspberrypi.org). The
experimental setup is done as shown in Figure 10.
The experimental setup consists of RPi and PiCam.
This setup can be placed on any civil structure for Sample of the web pages is shown in Figure 11. The
continuous monitoring of the structure. The PiCam upload page asks the user to upload the image to be
can be used to take images whenever desired by the processed or the PiCam can be used. The database
AUSTRALIAN JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING 53
page displays the results. These operations can be done 5.2. Measurements and analysis
remotely from any location.
Once the cracks have been identified and processed,
To obtain a real-time view of the structure to be
the next step is to analyse it by performing certain
inspected, live-streaming feature has been provided for
calculations to determine the potential harm that the
continuous monitoring. This process is shown in
crack could possibly impart to the structure under test.
Figure 12.
54 A. NAIR ET AL.
Also it provides the accuracy of crack detection. Thus, repaired. Such quantitative parameters obtained make
once all the parameters are obtained one has to take it easier to ensure a cost-effective treatment of the
a decision on when the structure becomes ready to be affected structure.
AUSTRALIAN JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING 55
length means that the width of the crack is large. Crack Funding
Average width is given by the perpendicular distance
This work was supported by the SSN Trust under Student
between the two end pixels of the midpoint of the line Internal Funding Project;SSN Trust;
joining the two farthest pixels. A larger crack width
usually implies that the associated structure is more
severely affected. Each of these measurements is done Notes on contributors
for the largest crack, which has the potential to cause Ajay Nair obtained his Bachelor’s degree in Department of
maximum harm. These measured parameters give an Electronics and Communication Engineering from Sri
idea of how large the crack is and if it is of immediate Sivasubramaniya Nadar College of Engineering,
concern. Figure 13 and Figure 14 show the measure Tamilnadu, India.
ment results of the largest crack for the particular image. R. Hemalatha is an Associate Professor in the Department
of Electronics and Communication Engineering, Sri
5.2.2. Evaluation metrics Sivasubramaniya Nadar College of Engineering,
Tamilnadu, India. Her area of interest includes Wireless
The metrics which contribute to the overall analysis
Multimedia Sensor Networks, Image Processing, and IoT.
of the crack detection method are calculated in this
section for the five images which are used in the P. Sangeetha is an Associate Professor in the Department of
Civil Engineering, Sri Sivasubramaniya Nadar College of
classification algorithm. The processed images for Engineering, Tamilnadu, India. She completed her B.E
few samples are shown in Figures 15-19 along with (Civil), MS (Research), and Ph.D from college of
their confusion matrices. This will enable the cal Engineering, Guindy, Anna University. Her area of interest
culation of the metrics. Table 2 summarises the includes composite space truss, steel concrete composite,
metric values obtained from the test images. cold formed steel sections and finite element analysis.
From Table 2 it is inferred that the proposed algo Harish Kumar Kobtained his Bachelor’s degree
rithm achieves a detection accuracy of nearly 96.37% in Department of Electronics and Communication
on an average with better precision. The accuracy is Engineering from Sri Sivasubramaniya Nadar College of
Engineering, Tamilnadu, India.
calculated with reference to the manually built ground
truth. P. Dinesh Kumar , obtained his Bachelor’s degree in
Department of Civil Engineering from Sri
Sivasubramaniya Nadar College of Engineering,
6. Conclusions and future work Tamilnadu, India.
Sai Sahith I, obtained his Bachelor’s degree in Department
The presented paper elaborated on two techniques of of Civil Engineering from Sri Sivasubramaniya Nadar
crack detection and backed it up with a real-time crack College of Engineering, Tamilnadu, India.
detection model. The first technique did crack detec
S. Radha is the Professor and Head of the Department of
tion by measuring how well the cracks correlate with Electronics and Communication Engineering, Sri
standard parameters. This method ensures high crack Sivasubramaniya Nadar College of Engineering,
detection accuracy and will significantly reduce false Tamilnadu, India. Her area of interest includes Wireless
positives. The second technique used morphological Sensor networks, energy harvesting devices, MEMS,
processing which detects and highlights even the faint NEMS, IoT and cognitive radios.
est of cracks. This method is particularly useful when
even the smallest of cracks is of due concern. References
Depending on the application, either of the processing
techniques can be used. Further the hosting of a web Ajagbe, W. O., and O. S. Ojedele. 2018. “Structural
Investigation into the Causes of Cracks in Building
server enables remote monitoring of a structure using and Solutions: A Case Study.” American Journal of
IoT. Also the quality of images that are taken can be Engineering Research (AJER) 7 (8): 152–160.
improved with the help of a camera with higher reso Dongna, H., T. Tian, H. Yang, S. Xu, and X. Wang,“Wall
lution. This monitoring system can be integrated with Crack Detection Based on Image Processing” 2012 Third
a mobile robot to allow scanning of the entire struc International Conference on Intelligent Control and
Information Processing, July 15–17, Dalian, China,
ture. Moreover, the correlation between the size and
2012, pp. 597-600, 10.1109/ICICIP.2012.6391474.
type of cracks can be examined to comprehend the Fan, D.-P., C. Gong, Y. Cao, B. Ren, -M.-M. Cheng, and
complexity and severity associated with it in real A. Borji, “Enhanced-alignment Measure for Binary
scenarios. Foreground Map Evaluation”, in Proc. Twenty-Seventh
International Joint Conference on Artificial Intelligence
(IJCAI-18),July 2018, Stockholm, Sweden, pp.698–704.
Disclosure statement Gavilán, M., D. Balcones, D. F. Oscar Marcos, M. A. Llorca,
I. P. Sotelo, M. Ocaña, P. Aliseda, P. Yarza, and
No potential conflict of interest was reported by the A. Amírola. 2011. “Adaptive Road Crack Detection
author(s).
AUSTRALIAN JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING 57
System by Pavement Classification.” Sensors 11: Refinement”, 25th European Signal Processing
9628–9657. doi:10.3390/s111009628. Conference (EUSIPCO), Kos island, Greece, 2017,
Giakoumis, I., N. Nikolaidis, and I. Pitas. 2006. “Digital pp.2080-2084
Image Processing Techniques for the Detection and Seung-Nam, Y., J.-H. Jang, and C.-S. Han. 2007. “Auto
Removal of Cracks in Digitized Paintings.” IEEE Inspection System Using a Mobile Robot for Detecting
Transactions on Image Processing 15: 178–188. Concrete Cracks in a Tunnel.” Automation in
doi:10.1109/TIP.2005.860311. Construction 16: 255–261. doi:10.1016/j.
Han, F., S. Zhao, L. Zhang, and J. Wu. 2016. “Survey of autcon.2006.05.003.
Strategies for Switching off Base Stations in Shi, Y., L. Cui, Z. Qi, F. Meng, and Z. Chen. 2016.
Heterogeneous Networks for Greener 5G Systems.” “Automatic Road Crack detection Using Random
IEEEAccess 4 (August): 49594973. Structured Forests.” IEEE Trans. Intell. Transp.Syst 17
Hoang, N.-D. 2018. “Detection of Surface Crack in Building (12, December): 34343445. doi:10.1109/
Structures Using Image Processing Technique with an TITS.2016.2552248.
Improved Otsu Method for Image Thresholding.”
Sinha, S. K., and P. W. Fieguth. 2006. “Automated Detection
Hindawi Advances in Civil Engineering 2018, pp.1-10.
of Cracks in Buried Concrete Pipe Images.” Automation in
Accessed 15-April-2021
Construction 15 (January): 58–72. doi:10.1016/j.
https://www.raspberrypi.org
autcon.2005.02.006.
Hutchinson, T. C., and Z. Chen. 2006. “Improved Image
Analysis for Evaluating Concrete Damage.” Journal of Umeha, M., R. Hemalatha, and S. Radha, “Structural Crack
Computing in Civil Engineering 20 (3, May): 210–216. Detection Using High Boost Filtering Based Enhanced
doi:10.1061/(ASCE)0887-3801(2006)20:3(210). Average Thresholding”, in the Proceedings of 2018
International Conference on Communication and Signal
Landstrom, A., and M. J. Thurley. 2012. “Morphology-based
Processing (ICCSP),Chennai, India, 2018, pp. 1026-1030,
Crack Detection for Steel Slabs.” IEEE Journal of Selected
10.1109/ICCSP.2018.8524284.
Topics in Signal Processing 6: 866–875. doi:10.1109/
JSTSP.2012.2212416. Yang, X., X. Shen, J. Long, and H. Chen. 2012. “An
Improved Median-based Otsu Image Thresholding
Long, J. W., X. J. Shen, and H. P. Chen. 2012. “Interactive
Algorithm.” AASRI Procedia 3: 468–473. doi:10.1016/
Document Image thresholding Segmentation Algorithm
j.aasri.2012.11.074.
Based on Image Regions.” Journal of Computer Research
Yehia, S., O. Abudayyeh, S. Nabulsi, and I. Abdelqader.
and Development 49(7):14201431. July.
2007. “Detection of Common Defects in Concrete
Md., S. A., B. M. AmrulKaish, C.-O. Woon, and Bridge Decks Using Non-destructive Evaluation
S. N. Raman. 2018. “Early-Age Cracking in Concrete: Techniques.” Journal of Bridge Engineering 12: 215–225.
Causes, Consequences, Remedial Measures, and doi:10.1061/(ASCE)1084-0702(2007)12:2(215).
Recommendations.” Applied Sciences 8: 1730. Zhang, W., Z. Zhang, D. Qi, and Y. Liu. 2014a. “Dapeng Qi
doi:10.3390/app8101730. and Yun Liu, “Automatic Crack Detection and
Nashat, S., A. Abdullah, and M. Abdullah, “A Robust Crack Classification Method for Subway Tunnel Safety
Detection Method for Non-uniform Distributions of Monitoring”.” Sensors 14 (10): 19307–19328.
Coloured and Textured Image,” inProc. IEEE Int. Conf. doi:10.3390/s141019307.
Imag. Syst. Tech. (IST), Batu Ferringhi, Malaysia, May Zhang, W., Z. Zhang, D. Qi, and Y. Liu. 2014b.
2011, pp. 98–103. “Automatic Crack Detection and Classification
Oliveira, H., and P. LobatoCorreia, “Road Surface Crack Method for Subway Tunnel Safety Monitoring.”
Detection: Improved Segmentation with Pixel-based Sensors 14: 19307–19328.