Site assessment of multiple-sensor approaches for buried utility detection

A C D Royal, P R Atkins, M J Brennan, D N Chapman, H Chen, A G Cohn, K Y Foo, K F Goddard, R Hayes, T Hao, P L Lewin, N Metje, J M Muggleton, Adham Naji, Giovanni Orlando, Stephen Pennock, Miles A Redfern, A J Saul, S G Swingler, Ping WangC D F Rogers

Research output: Contribution to journalArticlepeer-review

55 Citations (SciVal)


The successful operation of buried infrastructure within urban environments is fundamental to the conservation of modern living standards. Open-cut methods are predominantly used, in preference to trenchless technology, to effect a repair, replace or install a new section of the network. This is, in part, due to the inability to determine the position of all utilities below the carriageway, making open-cut methods desirable in terms of dealing with uncertainty since the buried infrastructure is progressively exposed during excavation. However, open-cut methods damage the carriageway and disrupt society's functions. This paper describes the progress of a research project that aims to develop a multi-sensor geophysical platform that can improve the probability of complete detection of the infrastructure buried beneath the carriageway. The multi-sensor platform is being developed in conjunction with a knowledge-based system that aims to provide information on how the properties of the ground might affect the sensing technologies being deployed. The fusion of data sources (sensor data and utilities record data) is also being researched to maximize the probability of location. This paper describes the outcome of the initial phase of testing along with the development of the knowledge-based system and the fusing of data to produce utility maps.
Original languageEnglish
Article number496123
Number of pages19
JournalInternational Journal of Geophysics
Publication statusPublished - 2011


  • Mapping the Underworld
  • Sensors


Dive into the research topics of 'Site assessment of multiple-sensor approaches for buried utility detection'. Together they form a unique fingerprint.

Cite this