Database generation of bistatic ground target signatures

Amit Kumar Mishra*, Bernard Mulgrew

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference Proceeding (Non-Journal item)

10 Citations (Scopus)

Abstract

Automatic target classification has been an area of active study due to many of its significances. With the re advent of bistatic technology in radar, the research into target classification in bistatic scenario seems quite timely. But the study of any classification algorithm demands for a suitable database. Due to the unavailability of suitable field collected bistatic database, computer simulation of such a database is quite pertinent. The present work discusses the approach towards the generation of a similar database, using FEKO as the electromagnetic simulation tool. Various special needs of such a project and the answers of FEKO to those needs, have been discussed. The results conclusively show the suitability of FEKO for the project.

Original languageEnglish
Title of host publication2005 IEEE/ACES International Conference on Wireless Communications and Applied Computational Electromagnetics
PublisherIEEE Press
Pages525-530
Number of pages6
ISBN (Print)0780390687, 9780780390683
DOIs
Publication statusPublished - 03 Apr 2005
Externally publishedYes
Event2005 IEEE/ACES International Conference on Wireless Communications and Applied Computational Electromagnetics - Honolulu, HI, United States of America
Duration: 03 Apr 200507 Apr 2005

Publication series

Name2005 IEEE/ACES International Conference on Wireless Communications and Applied Computational Electromagnetics
Volume2005

Conference

Conference2005 IEEE/ACES International Conference on Wireless Communications and Applied Computational Electromagnetics
Country/TerritoryUnited States of America
CityHonolulu, HI
Period03 Apr 200507 Apr 2005

Keywords

  • Bistatic Target Signature
  • Database generation
  • EM Simulation

Fingerprint

Dive into the research topics of 'Database generation of bistatic ground target signatures'. Together they form a unique fingerprint.

Cite this