2020
DOI: 10.1007/978-981-15-7130-5_5
|View full text |Cite
|
Sign up to set email alerts
|

An Algorithm for Target Detection, Identification, Tracking and Estimation of Motion for Passive Homing Missile Autopilot Guidance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Due to tunneling current through gate oxide insulator, gate oxide leakage power is another contributor to leakage power. [14] For nano scale gate oxide leakage is comparable to subthreshold leakage power [15][16][17]. For reducing this oxide leakage current high k dielctric materials can be used.…”
Section: Figure 1 Subthreshold Leakage Of Nmosmentioning
confidence: 99%
“…Due to tunneling current through gate oxide insulator, gate oxide leakage power is another contributor to leakage power. [14] For nano scale gate oxide leakage is comparable to subthreshold leakage power [15][16][17]. For reducing this oxide leakage current high k dielctric materials can be used.…”
Section: Figure 1 Subthreshold Leakage Of Nmosmentioning
confidence: 99%
“…In recent years, with the vigorous development of electronic information technology and modern control technology [1], target ltering and tracking technology has been widely used in automatic driving [2], smart security [3], tra c planning [4], navigation, and positioning [5] and has played a vital role. Its essence is to use the state information of the target at the current moment and the measurement information obtained by the sensor to realize the method of estimating the state information at the next moment [6].…”
Section: Introductionmentioning
confidence: 99%
“…Outlier detection is a field of data mining with a wide range of applications in several domains varying from intrusion detection (Angelo et al, 2018), process monitoring (Wang and Mao, 2019), detection of fake iris images (2018), security threats (Sharma and Gupta, 2021) and identification of credit card frauds (Carcillo et al, 2019). Outlier points might be of several types that may occur in different magnitude, intensity and frequency.…”
Section: Introductionmentioning
confidence: 99%