An underwater target recognition method based on tracking, trajectory, and optimum seeking data joint

Liang Yu, Yong Mei Cheng, Ke Zhe Chen, Jian Xin Liu, Zhun Ga Liu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Most of the underwater target recognition method are built on the spectral analysis. The recognition accuracy isn’t high in the short attack time which leads the torpedo attack on the false target. A method which take the tracking, trajectory and optimum seeking data join have been put forward, which can use the targets’ various information for tracking, trajectory control, optimum seeking, so multiple information can be used for other processes. The method can take full advantage of all key data during the attacking progress which can improve the recognition and attack accuracy. The final attack simulation results verified the high accuracy of the method.

Original languageEnglish
Title of host publicationDistributed Computing and Artificial Intelligence, 13th International Conference
EditorsJulián A. García-García, Ali Semalat, Grzegorz Bocewicz, Paweł Sitek, Javier Bajo, Sigeru Omatu, Izabela Nielsen
PublisherSpringer Verlag
Pages185-193
Number of pages9
ISBN (Print)9783319401614
DOIs
StatePublished - 2016
Event13th International Conference on Distributed Computing and Artificial Intelligence, DCAI 2016 - Sevilla, Spain
Duration: 1 Jun 20163 Jun 2016

Publication series

NameAdvances in Intelligent Systems and Computing
Volume474
ISSN (Print)2194-5357

Conference

Conference13th International Conference on Distributed Computing and Artificial Intelligence, DCAI 2016
Country/TerritorySpain
CitySevilla
Period1/06/163/06/16

Keywords

  • Acoustics
  • Automatic target recognition
  • Feature
  • Military electronic countermeasures
  • Optimum seeking
  • Target tracking
  • Trajectory

Fingerprint

Dive into the research topics of 'An underwater target recognition method based on tracking, trajectory, and optimum seeking data joint'. Together they form a unique fingerprint.

Cite this