Digital Image Computing: Techniques and Applications (DICTA'05) 2005
DOI: 10.1109/dicta.2005.57
|View full text |Cite
|
Sign up to set email alerts
|

Moving Target Indication and Tracking from Moving Sensors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…target detection e.g. VMTI [16] for motion imagery and saliency technique [28] for still imagery) would process aerial imagery and provide image chips (bounding-box encapsulating the target) consisting of targets within the chip. The framework was implemented in MATLAB on a 64-bit, 2.35 GHz system and in the sections that follow we provide a detailed description of the framework and its evaluation.…”
Section: Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…target detection e.g. VMTI [16] for motion imagery and saliency technique [28] for still imagery) would process aerial imagery and provide image chips (bounding-box encapsulating the target) consisting of targets within the chip. The framework was implemented in MATLAB on a 64-bit, 2.35 GHz system and in the sections that follow we provide a detailed description of the framework and its evaluation.…”
Section: Overviewmentioning
confidence: 99%
“…The target detection techniques do not provide sufficiently precise image chips encapsulating the vehicles as required by the recognition algorithm. As a result, we employ an intermediate vehicle extractor which, when cued by the VMTI [16] or saliency operator [28], segments the vehicle and fits a tightly bounding box.…”
Section: Vehicle Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…The particle filter follows the PJFDT methodology described in [1] and [8]. The pseudo-code for a single iteration of the algorithm is shown in Algorithm 1.…”
Section: B Particle Filtermentioning
confidence: 99%
“…Heuristics are used to spawn new trackers or terminate unmatched ones based on association with foreground mask connected components. All algorithms were implemented in the proprietary Analysts' Detection Support System (ADSS) [8]. ADSS is a flexible processing engine that has been designed to apply a pipeline of algorithms to streaming sensor data in real-time.…”
Section: Experimental Evaluationmentioning
confidence: 99%