Concealed metallic object detection is one of the critical tasks for any security system. It has been proved that different objects have their own magnetic fingerprints, which are a series of magnetic anomalies determined by shape, size, physical composition, etc. This study addresses the design of a low-cost power security system for the detection of metallic objects according to their response to the magnetic field. The system consists of three anisotropic magnetoresistance (AMR) sensor arrays, detection circuits, and a microcontroller. A magnetic gradient full-tensor configuration, utilizing four AMR sensors arranged on a planar cross structure, was employed to construct a two-dimensional image from the obtained data, which can further suppress the background noise and reduce the orientation and orthogonality errors. The performance of the system is validated by data validation and multiple object feature segmentation. Numerous magnetic fingerprinting results demonstrate that the system can configure metallic objects more than 50cm clearly and identify multiple objects separated by less than 20 cm, which indicates the feasibility of using this magnetic gradient tensor fingerprint method for metallic object detection.

Because of the abuse of dangerous metallic objects such as knives, guns, etc., numerous public security incidents come out thick and fast in many countries.1,2 A commonly used and accepted commercial method for security detection is the electromagnetic (EM) based approach, in which an induction coil is adopted to sense suspicious metallic objects, such as hand-held metal panel detectors,3 walk through metal detectors,4 etc.5,6 To be specific, the security door can detect the covert carried metallic objects because the two side doors are respectively equipped with an induction coil for receiving and transmitting alternating EM signals.7 In case the metallic objects are polarized by the alternating EM signal, an eddy current would be generated, and thus a secondary magnetic field with the same magnitude in the direction opposite to the initial magnetic field could be produced.8 The metallic object can be detected by measuring the eddy current signal. However, due to the limitation of the EM working principle, this kind of system is always heavy, requires high power, and is bulky in size,9 except the mine-detectors which are mainly employed in military applications. There are also other kinds of EM-based approaches including X-ray,10 terahertz compressive imaging,11 millimeter wave imaging,12 etc.13,14 Likewise, these methods still have the aforementioned shortcomings, making them rarely used now.

Generally, the time-dependent geomagnetic field should be mutated by metallic materials because of their relatively higher magnetic permeability.15,16 Such a kind of minute mutation in the earth’s magnetic field can be detected by a sensitive magnetic sensor, dubbed weak magnetic detection (WMD).17,18 The main difference between the EM and WMD is that the WMD operates in a passive way, which is initially adopted in military investigations.19 Up to now, the WMD method has been employed in many applications such as resource prospection,20 unexploded ordnance detection,21 etc. Moreover, the magnetic characteristics of ocean mines,22 unmanned aerial vehicles,23 and brain imaging24 have been extensively investigated in recent studies, which can be used to describe the temporal and unique distribution of the targets’ magnetic field. The fact that most of the dangerous objects are made of metallic materials makes WMD a promising detection method for public security system.25 However, to the best of our knowledge, there is no other work which has investigated the feasibility of WMD based magnetic imaging for public security applications, especially the magnetic gradient full-tensor fingerprint imaging based approach.

One of the many challenges in designing a WMD based public security system may lie in the difficulty to distinguish the weak object signals (i.e., scissors and hammers) from unknown interference, which would decrease the signal-to-noise ratio (SNR) and the range of the detection zone.26 In this study, aiming to overcome the aforementioned problems, the possibility of detecting such magnetic anomalies using a microelectromechanical system (MEMS) anisotropic magnetoresistance (AMR) sensor is investigated. A magnetic gradient full-tensor configuration arranged on a planar cross structure was employed, which can further suppress the background noise and reduce the orientation and orthogonality errors. The contributions of this work include the following points:

  1. A new magnetic gradient full-tensor fingerprint based security system is developed, which integrates three sets of magnetic sensor arrays, a microcontroller, a battery, and a personal computer (PC).

  2. An efficient magnetic anomaly data processing framework is implemented, which consists of data acquisition, data processing, noise reduction, and magnetic fingerprinting.

  3. Our proposed security system can effectively configure metallic objects more than 50cm and identify multiple objects separated by less than 20 cm.

The remainder of this paper is arranged as follows: Section II explains the preliminary theory of the magnetic gradient tensor and the characterization of the AMR magnetic sensor. Section III considers the development of the security system and the operation principle. Numerous validation results presented in Sec. IV indicate the superiority of the designed security system, and a case of the appropriate object feature segmentation method is discussed. Finally, this paper is summarized in Sec. V, highlighting contributions and future expectations.

In a rectangular coordinate system o-xyz, the magnetic strength vector B can be expressed by its three orthogonal components as (Bx, By, Bz). Likewise, the magnetic gradient tensor G can be derived through calculating the rate-of-change along each direction of (Bx, By, Bz) as27 

G=Bx,By,Bzxyz=BxxBxyBxzByxByyByzBzxBzyBzz.
(1)

Generally, G is both symmetric and traceless in free space, and thus there is Bxy = Byx, Bxz = Bzx, Byz = Bzy, and Bzz = −BxxByy. Hence, Eq. (1) can be rewritten as

G=BxxBxyBxzByxByyByzBzxBzyBzz=BxxBxyBxzBxyByyByzBxzByzBxxByy.
(2)

From Eq. (2), it can be seen that there are five independent elements among the nine elements of G. Hence, G is a real symmetric matrix, and three invariants of the magnetic gradient tensor can be derived directly as

I0=Bxx+Byy+Bzz=0I1=Bxx2Byy2Bxy2Bxz2Byz2BxxBxyI2=2Bxx2ByyBxxByz2+BxxBxy2Bxz2Byy+ByyBxy2+2BxyBxzByz.
(3)

Through measuring the five independent elements, we can obtain all the nine elements of G, and thus the metallic object could be determined. The greatest advantage of using a magnetic gradient tensor is that it is entirely passive when compared with traditional active electromagnetic detection, which can guarantee a long working time. Furthermore, we can obtain nine different magnetic fingerprints to enlarge the effective information of the magnetic object, further improving the detection performance.

For the possibility of detecting such metallic objects, we set up an improved AMR magnetic sensor, dubbed QMC5883L. The operating principles of an AMR magnetometer are significantly different from those of a vector magnetometer, e.g., Hall magnetometers, fluxgate, etc. The QMC5883L module is an improved version of a magneto-resistive sensor embedded with an application specific integrated circuit (ASIC) containing amplification, automatic degaussing strap drivers, offset cancellation, temperature compensation, and a 16-bit analog-to-digital converter (ADC). After initial tests with this sensor, it achieves a field resolution of 1 mG in ±8 G fields and a low power consumption of 75 μA at a low voltage operation from 2.16 V to 3.6 V. In this paper, for the parameters of the sensor, the measurement range is ±0.88 G, the gain is 1370 LSB/G, and the output data rate is 0.75 Hz.

Figure 1 illustrates the internal structure of the QMC5883L module. The controlling of the set or reset function is done automatically by the ASIC for each measurement. One half of the difference from the measurements taken after a set pulse and after a reset pulse will be put in the data output register for each of the three axes. By doing so, the sensor’s internal offset and its temperature dependence are removed or canceled for all measurements.

FIG. 1.

Internal schematic diagram of the QMC5883L.

FIG. 1.

Internal schematic diagram of the QMC5883L.

Close modal

Generally, the separation of or spacing between the arrays has a large impact on the overall design of the security system. The smaller the separation, the greater the required number of sensors, which will increase the cost and complexity. In this study, we trialed numerous sensor separations, and after analyzing the results, four AMR sensors arranged on a planar cross structure with 20 cm spacing were implemented, as shown in Fig. 2, which was found to be a good compromise between system complexity and spatial resolution. In this case, although the selected sensor separation d means that the vertical or horizontal resolution can only be guaranteed as less than 20 cm, it is not particularly useful in object analysis and characterization of the magnetic gradient full-tensor fingerprints.

FIG. 2.

Magnetic gradient full-tensor sensor array.

FIG. 2.

Magnetic gradient full-tensor sensor array.

Close modal

For the structure of the sensor array, the magnetic gradient full-tensor G can be derived based on Eq. (2) as

G=B1xB3x2dB2xB4x2dB1zB3z2dB1yB3y2dB2yB4y2dB2zB4z2dB1zB3z2dB2zB4z2d(B1xB3x)(B2yB4y)2d,
(4)

where m in Bmn stands for the number of each sensor, n stands for the magnetic intensity along x, y, z directions.

The main connection and block diagram of the security system is shown in Fig. 3. The upper part is duplicated three times to make 12 channels in total. The magnetic anomaly signals captured from the QMC5883L sensor are transferred to the data register in the microcontroller. Aiming to improve the SNR of the collected data, a data filtering module using least squares smoothing was used to suppress the unexpected data fluctuations. Hence, the processed data was sent to the PC for magnetic gradient full-tensor fingerprinting.

FIG. 3.

System connection and block diagram.

FIG. 3.

System connection and block diagram.

Close modal

Figure 4 shows the cardinal direction of the sensor array and the overall security system establishment. The array is aligned with the central axis of the detector panel to pick up any magnetic anomalies within the panel width due to the presence of metallic objects. If no anomaly is present in magnetic gradient full-tensor fingerprints, the magnetic field collected by the sensor array is unchanged. Likewise, the existence of a metallic object will cause a distortion in the magnetic field, which can thus be detected by the sensor array.

FIG. 4.

Overall security system and the positioning of the sensor array.

FIG. 4.

Overall security system and the positioning of the sensor array.

Close modal

In this section, the detection distance of the proposed security was evaluated. Several dangerous objects including a mobile phone, a chopping knife, a hammer, and a kitchen knife were employed as the targets, which were invisibly placed in a pocket of a human being. Figure 5 shows the overall practical AMR based security system which consists of three sensor arrays, a microcontroller, a communication module, and a PC. The speed of the walking pass holder was about 1 m/s, which was consistent with the actual situation. Generally, the magnetic field strength will drop rapidly as the distance increases. Hence, in this case, the distance between the target and the sensor array was tested from near to far until the distance was not detectable.

FIG. 5.

Overall experimental setup for metallic target detection.

FIG. 5.

Overall experimental setup for metallic target detection.

Close modal

Table I shows the approximate maximum detectable distance of 60 cm, 70 cm, 80 cm, and 50 cm with respect to the mobile phone, chopping knife, hammer, and kitchen knife, respectively. We observe that the proposed security system is relatively sensitive and can detect all the aforementioned small targets which are no less than 50 cm, which demonstrates that the proposed magnetic gradient full-tensor based approach can offer a viable strategy for public security system applications.

TABLE I.

Approximate maximum detectable distance of different targets.

MobileChoppingKitchen
TargetsphoneknifeHammerknife
Distance (cm) 60 70 80 50 
MobileChoppingKitchen
TargetsphoneknifeHammerknife
Distance (cm) 60 70 80 50 

As mentioned, the collected magnetic anomaly data can be transferred from the security system to the PC, where the magnetic gradient full-tensor fingerprint can be yielded. Figure 6 shows one magnetic fingerprinting result of the three sensor arrays for each target when the detected distance is 50 cm. It can be seen that the fluctuations of the magnetic gradient full-tensor element Byy are conducted as a function of sampling time. The middle sensor array module shows the strongest response because it has the smallest distance with the targets. Furthermore, we observe that different targets have their own unique identifiable magnetic patterns to be discriminated, which demonstrates that the magnetic gradient tensor fingerprint is an effective identification feature for metallic object detection.

FIG. 6.

Samples in the holder and the corresponding magnetic gradient tensor fingerprints Byy: (a) mobile phone, (b) chopping knife, (c) hammer, and (d) kitchen knife.

FIG. 6.

Samples in the holder and the corresponding magnetic gradient tensor fingerprints Byy: (a) mobile phone, (b) chopping knife, (c) hammer, and (d) kitchen knife.

Close modal

Figure 7 presents the nine elements’ variation curvature of the magnetic gradient full-tensor G [refer to Eq. (4)] for the kitchen knife through mapping out the magnetic anomalies from the middle sensor array module. It can be seen that when the kitchen knife holder passes through the security system, different magnetic anomalies are obtained respectively in each of the magnetic gradient full-tensor elements between a sampling time of 2 s to 3 s. The results further demonstrate that the nine independent elements can manifest unique identifiable magnetic patterns for different metallic objects.

FIG. 7.

The magnetic gradient full-tensor G of the kitchen knife.

FIG. 7.

The magnetic gradient full-tensor G of the kitchen knife.

Close modal

The invisible carry-on dangerous metallic objects will not always be independent, i.e., sometimes they could be placed near each other. Hence, the ability of the security system to identify multiple objects is an important character. To evaluate this capability, the hammer and mobile phone were placed on the front and back of the walking pass holder separated by 20 cm. In this case, the detection distance between the two targets and the sensor array is set to be 50 cm, and the walking pass speed is also about 1 m/s.

Figure 8 presents the nine elements’ variation curvature of the magnetic gradient full-tensor G for the kitchen knife and the mobile phone through mapping out the magnetic anomalies from the middle sensor array module. It can be seen that when compared with the results of one target, as shown in Fig. 7, the number of the magnetic anomaly fluctuations, as well as the corresponding magnitude, is increased. This phenomenon should be caused by the superposition or mutual perturbation of the magnetic field generated by the two objects.

FIG. 8.

The magnetic gradient full-tensor G of the two targets (a hammer and a phone).

FIG. 8.

The magnetic gradient full-tensor G of the two targets (a hammer and a phone).

Close modal

Figure 9 shows one magnetic gradient full-tensor fingerprint Byy of the two objects. It can be seen that two magnetic anomalies with respect to the hammer and the mobile phone are obviously detected by the sensor array, respectively. From Table I, we perceive that the hammer has a longer detection distance than the mobile phone, which implies that the hammer should generate stronger magnetic field intensity with the same distance when compared with the mobile phone. The results illustrated in Fig. 9 are consistent with this speculation, where the magnetic gradient tensor fingerprint strength of the hammer is stronger than that of the mobile phone. Consequently, the AMR based security system shows great potential in multiple objects’ feature segmentation without losing their own characteristics of the magnetic gradient full-tensor fingerprints.

FIG. 9.

The magnetic gradient tensor fingerprints Byy of the two targets.

FIG. 9.

The magnetic gradient tensor fingerprints Byy of the two targets.

Close modal

According to the aforementioned investigations for different magnetic anomalies, a LabVIEW monitoring interface, as shown in Fig. 10, was programmed to monitor the detection results when the magnetic data were transferred from the acquisition system to the PC. The time-varying magnetic data collected by the sensor arrays can be monitored by the program, and the abnormal alarm of the metallic target holder can be shown simultaneously by one lamp “alarm light” in the upper-left part. In this case, when this lamp turns red, there should be a suspicious target holder passing by. Otherwise, this lamp should keep itself in green. Furthermore, the x, y, z axial magnetic field of each sensor is real-time displayed in the front panel, and the corresponding magnetic gradient full-tensor fingerprints were employed to further make an accurate pass decision.

FIG. 10.

The front panel board of the security system monitoring program.

FIG. 10.

The front panel board of the security system monitoring program.

Close modal

In this study, a new magnetic gradient full-tensor fingerprint based security system using AMR magnetic sensor arrays was developed. System design, data acquisition, and real-time magnetic fingerprint imaging were also investigated. Commonly used metallic targets, including mobile phone, hammer, etc., were adopted as samples to validate the system and as a verification of the proposed concept. Furthermore, the pattern extraction and feature segmentation were implemented to evaluate the capacity of discrimination between different metallic targets using the proposed security system. Consequently, the proposed new security system based on magnetic gradient full-tensor fingerprint shows a great scope for metallic target detection and discrimination. In addition, the system’s two foremost advantages are (1) the nine elements of the magnetic gradient full-tensor can supply more reference information, further suppressing the background noise and reducing the orientation and orthogonality errors of the magnetic sensor and (2) the WMD based technology allows the system to work in a passive way, making it a promising candidate to be employed in unconstrained environments, and overcome the shortcomings of the EM based system such as heaviness, high power, bulky size, etc.

We have demonstrated the feasibility of the magnetic gradient full-tensor fingerprint based approach used in the security system. However, due to the own characteristics of the AMR magnetic sensor, the magnetic field measurement accuracy is relatively low which would influence the detectable distance. Hence, our future work will focus on investigating a calibration or compensation method for this kind of sensor data and attempt to use a new MEMS magnetic sensor RM3100, to further improve the performance of the proposed security system.

This work was partly supported by the National Natural Science Foundation of China under Grant Nos. 41904164 and 41874212, the Foundation of the National Key R&D Program of China under Grant No. 2018YFC1503702, the Foundation of Science and Technology on Near-Surface Detection Laboratory under Grant Nos. 6142414180913, TCGZ2016A005, and 614241409041217, and the Fundamental Research Funds for the Central Universities, China University of Geosciences (Wuhan), under Grant No. CUG190628.

1.
H.
Liu
,
H.
Dong
,
J.
Ge
,
Z.
Liu
,
Z.
Yuan
,
J.
Zhu
, and
H.
Zhang
, “
Apparatus and method for efficient sampling of critical parameters demonstrated by monitoring an Overhauser geomagnetic sensor
,”
Rev. Sci. Instrum.
89
,
125109
(
2018
).
2.
Z.
Liu
and
H.
Liu
, “
Experimenting capacitive sensing technique for structural integrity assessment
,” in
2017 IEEE International Conference on Industrial Technology (ICIT)
(
IEEE
,
2017
), pp.
922
927
.
3.
J.
Ge
,
H.
Dong
, and
Z.
Yuan
, “
Trace metal detection technology based on background interference suppression algorithm with multi-frequency signal excitation
,”
ICIC Exp. Lett. Part B, Appl.: Int. J. Res. Surv.
6
,
1587
1594
(
2015
).
4.
H.
Liu
,
H.
Dong
,
J.
Ge
, and
Z.
Zhao
, “
Magnetic field gradient detector based on the nuclear Overhauser effect
,”
Chin. J. Sci. Instrum.
36
,
592
600
(
2015
).
5.
H.
Dong
,
S.
Hu
,
J.
Ge
,
H.
Liu
,
W.
Luo
,
Z.
Yuan
,
J.
Zhu
, and
H.
Zhang
, “
A high-precision and fast-sampling frequency measurement method based on FPGA carry chain for airborne optically pumped cesium magnetometer
,”
Rev. Sci. Instrum.
89
,
075001
(
2018
).
6.
H.
Liu
,
H.
Dong
,
Z.
Liu
,
J.
Ge
,
W.
Luo
,
C.
Zhang
,
Z.
Yuan
,
J.
Zhu
, and
H.
Zhang
, “
A comprehensive study on the weak magnetic sensor character of different geometries for proton precession magnetometer
,”
J. Instrum.
13
,
T09003
(
2018
).
7.
G. Y.
Tian
,
A.
Al-Qubaa
, and
J.
Wilson
, “
Design of an electromagnetic imaging system for weapon detection based on GMR sensor arrays
,”
Sens. Actuators, A
174
,
75
84
(
2012
).
8.
Y.
Liu
,
S.
Liu
,
H.
Liu
,
C.
Mandache
, and
Z.
Liu
, “
Pulsed eddy current data analysis for the characterization of the second-layer discontinuities
,”
J. Nondestr. Eval.
38
,
7
(
2019
).
9.
W.
Wu
,
Z.
Liu
, and
Y.
He
, “
Classification of defects with ensemble methods in the automated visual inspection of sewer pipes
,”
Pattern Anal. Appl.
18
,
263
276
(
2015
).
10.
H.
Liu
,
S.
Liu
,
Z.
Liu
,
N.
Mrad
, and
H.
Dong
, “
Prognostics of damage growth in composite materials using machine learning techniques
,” in
2017 IEEE International Conference on Industrial Technology (ICIT)
(
IEEE
,
2017
), pp.
1042
1047
.
11.
C.
Liao
,
Y.
Chen
,
X.
Cao
,
S.
Chen
,
H.
He
,
M.
Mani
,
M.
Jacob
,
V.
Magnotta
, and
J.
Zhong
, “
Efficient parallel reconstruction for high resolution multishot spiral diffusion data with low rank constraint
,”
Magn. Reson. Med.
77
,
1359
1366
(
2017
).
12.
J.
Gollub
,
O.
Yurduseven
,
K.
Trofatter
,
D.
Arnitz
,
M.
Imani
,
T.
Sleasman
,
M.
Boyarsky
,
A.
Rose
,
A.
Pedross-Engel
,
H.
Odabasi
 et al, “
Large metasurface aperture for millimeter wave computational imaging at the human-scale
,”
Sci. Rep.
7
,
42650
(
2017
).
13.
H.
Dong
,
H.
Liu
,
J.
Ge
,
Z.
Yuan
, and
Z.
Zhao
, “
A high-precision frequency measurement algorithm for FID signal of proton magnetometer
,”
IEEE Trans. Instrum. Meas.
65
,
898
904
(
2016
).
14.
H.
Liu
,
J.
Bin
,
H.
Dong
,
J.
Ge
,
Z.
Liu
,
Z.
Yuan
,
J.
Zhu
, and
H.
Zhang
, “
Adaptive pre-whiten filtering for the free induction decay transversal signal in weak magnetic detection
,”
Rev. Sci. Instrum.
90
,
104502
(
2019
).
15.
H.
Liu
,
H.
Dong
,
Z.
Liu
,
J.
Ge
,
B.
Bai
, and
C.
Zhang
, “
Noise characterization for the FID signal from proton precession magnetometer
,”
J. Instrum.
12
,
P07019
(
2017
).
16.
H.
Liu
,
H.
Dong
,
J.
Ge
,
Z.
Liu
,
Z.
Yuan
,
J.
Zhu
, and
H.
Zhang
, “
A fusion of principal component analysis and singular value decomposition based multivariate denoising algorithm for FID transversal data
,”
Rev. Sci. Instrum.
90
,
035116
(
2019
).
17.
Y.
Huang
,
J.
Ge
,
H.
Dong
, and
H.
Liu
, “
An automatic wideband 90° phase shifter for optically pumped cesium magnetometers
,”
IEEE Sens. J.
17
,
7928
7934
(
2017
).
18.
C.
Tan
,
J.
Wang
, and
Z.
Li
, “
A frequency measurement method based on optimal multi-average for increasing proton magnetometer measurement precision
,”
Measurement
135
,
418
423
(
2019
).
19.
H.
Liu
,
H.
Dong
,
Z.
Liu
,
J.
Ge
,
B.
Bai
, and
C.
Zhang
, “
Construction of an Overhauser magnetic gradiometer and the applications in geomagnetic observation and ferromagnetic target localization
,”
J. Instrum.
12
,
T10008
(
2017
).
20.
A. Y.
Denisov
,
V. A.
Sapunov
, and
B.
Rubinstein
, “
Broadband mode in proton-precession magnetometers with signal processing regression methods
,”
Meas. Sci. Technol.
25
,
055103
(
2014
).
21.
J.
Ge
,
C.
Lu
,
H.
Dong
,
H.
Liu
,
Z.
Yuan
, and
Z.
Zhao
, “
The detection technology of near-surface UXO based on magnetic gradient method and Overhauser sensor
,”
Chin. J. Sci. Instrum.
36
,
38
50
(
2015
).
22.
S.
Choi
,
C.
Kim
,
C.
Park
, and
H.
Kim
, “
Estimation of hydrothermal deposits location from magnetization distribution and magnetic properties in the North Fiji Basin
,” in
AGU Fall Meeting Abstracts
(
American Geophysical Union
,
2013
), Vol. 1, p.
1087
.
23.
J.
Ge
,
H.
Li
,
H.
Wang
,
H.
Dong
,
H.
Liu
,
W.
Wang
,
Z.
Yuan
,
J.
Zhu
, and
H.
Zhang
, “
Aeromagnetic compensation algorithm robust to outliers of magnetic sensor based on Huber loss method
,”
IEEE Sens. J.
19
,
5499
5505
(
2019
).
24.
C.
Liao
,
B.
Bilgic
,
M. K.
Manhard
,
B.
Zhao
,
X.
Cao
,
J.
Zhong
,
L. L.
Wald
, and
K.
Setsompop
, “
3D MR fingerprinting with accelerated stack-of-spirals and hybrid sliding-window and GRAPPA reconstruction
,”
Neuroimage
162
,
13
22
(
2017
).
25.
H.
Liu
,
Z.
Liu
,
S.
Liu
,
Y.
Liu
,
J.
Bin
,
F.
Shi
, and
H.
Dong
, “
A nonlinear regression application via machine learning techniques for geomagnetic data reconstruction processing
,”
IEEE Trans. Geosci. Remote Sens.
57
,
128
140
(
2019
).
26.
X.
Zeng
,
M.
Yu
, and
D.
Wang
, “
A new probabilistic multi-hop broadcast protocol for vehicular networks
,”
IEEE Trans. Veh. Technol.
67
,
12165
12176
(
2018
).
27.
B.
Bai
,
H.
Liu
,
J.
Ge
, and
H.
Dong
, “
Research on an improved resonant cavity for Overhauser geomagnetic sensor
,”
IEEE Sens. J.
18
,
2713
2721
(
2018
).