Ultrasonic Flaw Imaging via Multipath Exploitation
Figure 3
Multipath II-A with the virtual receiver when the target is between the transmit/receive pair (a) and outside of the pair (b). Multipath II-B with virtual transmitter when the target is between the transmit/receive pair (c) and outside of the pair (d).