2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2015
DOI: 10.1109/icassp.2015.7178286
|View full text |Cite
|
Sign up to set email alerts
|

GPU acceleration of Threat Map computation and application to selection of sonar field controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The Incze and Dasinger method is computationally expensive because of the large number of virtual targets. However, Simakov and Fletcher [7] implement this model on the GPU, allowing for tens of thousands of virtual targets to be used. We use this approach to calculate the threat map in this paper, and Figure 2 shows an example of how this threat map evolves as sonobuoys ping.…”
Section: Threat Mapmentioning
confidence: 99%
See 2 more Smart Citations
“…The Incze and Dasinger method is computationally expensive because of the large number of virtual targets. However, Simakov and Fletcher [7] implement this model on the GPU, allowing for tens of thousands of virtual targets to be used. We use this approach to calculate the threat map in this paper, and Figure 2 shows an example of how this threat map evolves as sonobuoys ping.…”
Section: Threat Mapmentioning
confidence: 99%
“…After each sonar transmission we first apply a standard threat map update [7], which accounts for ping-induced reduction of weights of virtual targets. In the simulations discussed in this paper, γ k used in (1) had the following values: γ0 fixed and…”
Section: Incorporating Unconfirmed Tracks Into the Threat Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…Greedy scheduling algorithms define a reward for all possible actions a single step ahead and pick the action that maximises this reward. Significant work has since been undertaken to define new metrics for sensor scheduling using greedy algorithms [1,[6][7][8][9][10][11]. Greedy algorithms have the advantage of being computationally efficient, but can have issues effectively prioritising resources in complex multi-target scenarios, especially, as in this case, when conserving the battery power of the sonobuoys is important.…”
Section: Introductionmentioning
confidence: 99%