2019 20th International Radar Symposium (IRS) 2019
DOI: 10.23919/irs.2019.8768102
|View full text |Cite
|
Sign up to set email alerts
|

Data Analytics and Machine Learning in Wide Area Surveillance Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The methodology encompassed the evaluation of prospective technologies at all levels of the layered architecture, examination of design limitations specific to each layer, and the implementation of a uniform software development framework across multiple layers (utilizing identical code for different layers, known as SC-FDL). The proposed LA was implemented in a practical case study involving air/ground surveillance [15,16,18,19]. Subsequently, performance trials were carried out in various scenarios to evaluate its effectiveness using real-world data-intake situations.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The methodology encompassed the evaluation of prospective technologies at all levels of the layered architecture, examination of design limitations specific to each layer, and the implementation of a uniform software development framework across multiple layers (utilizing identical code for different layers, known as SC-FDL). The proposed LA was implemented in a practical case study involving air/ground surveillance [15,16,18,19]. Subsequently, performance trials were carried out in various scenarios to evaluate its effectiveness using real-world data-intake situations.…”
Section: Discussionmentioning
confidence: 99%
“…Contemporary surveillance networks possess the ability to provide trajectories for various types of boats and aircraft in a global or, at the very least, expansive geographical range [18]. The two most commonly utilized systems for air and maritime surveillance are ADS-B and Automatic Identification System (AIS).…”
Section: Problem Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…This analysis can be also part of a malicious cyberdetection mechanism. As with the algorithmic process of historical AIS data, it is possible to perform self-reporting, vessel trajectory reconstruction [48], or learning [49] or to detect suspicious vessel activities [50]. Historical data could be also used to understand the behavior of the ship [51,52].…”
Section: Purposementioning
confidence: 99%
“…Trajectory-based ML-dynamic algorithms [43,49,50,60,74,82,88,97,123,131,138,140,164,171,174,176,[179][180][181][182]184,186,188,190,191,197,198,200,201,214,228,231,233,235,252] 8.…”
Section: Kinematics Analysismentioning
confidence: 99%