Algorithms and Software for Meteor Detection

被引:0
|
作者
Peter S. Gural
机构
[1] SAIC,
来源
Earth, Moon, and Planets | 2008年 / 102卷
关键词
Meteor detection; Transient detection; Meteor tracking;
D O I
暂无
中图分类号
学科分类号
摘要
An ever increasing variety of electronic instrumentation is being brought to bear in meteor studies and analysis, with unique meteor detection challenges arising from the attempt to do automated and near real-time processing of the imagery. Recent algorithm developments in the literature have been applied and implemented in software to provide reliable meteor detection in all-sky imagers, wide-field intensified video, and narrow field-of-view telescopic systems. The algorithms that have been employed for meteor streak detection include Hough transforms with phase coded disk, localized Hough transforms with matched filtering, and fast moving cluster detection. They have found application in identifying meteor tracks in the Spanish Fireball Network all-sky images, detailed analysis of video recordings during the recent Leonid meteor storms, and development of a detection/cueing technology system for rapid slew and tracking of meteors.
引用
收藏
页码:269 / 275
页数:6
相关论文
共 50 条
  • [21] On Efficiency of Selected Machine Learning Algorithms for Intrusion Detection in Software Defined Networks
    Jankowski, Damian
    Amanowicz, Marek
    International Journal of Electronics and Telecommunications, 2016, 62 (03): : 247 - 252
  • [22] INTELLIGENT DETECTION AND ANALYSIS OF SOFTWARE VULNERABILITIES BASED ON ENCRYPTION ALGORITHMS AND FEATURE EXTRACTION
    Li, Heng
    Li, Xinqiang
    Wei, Hongchang
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02):
  • [23] User preferences based software defect detection algorithms selection using MCDM
    Peng, Yi
    Wang, Guoxun
    Wang, Honggang
    INFORMATION SCIENCES, 2012, 191 : 3 - 13
  • [24] On Efficiency of Selected Machine Learning Algorithms for Intrusion Detection in Software Defined Networks
    Jankowski, Damian
    Amanowicz, Marek
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2016, 62 (03) : 247 - 252
  • [25] Software algorithms for false alarm reduction in LWIR hyperspectral chemical agent detection
    Manolakis, D.
    Model, J.
    Rossacci, M.
    Zhang, D.
    Ontiveros, E.
    Pieper, M.
    Seeley, J.
    Weitz, D.
    ALGORITHMS AND TECHNOLOGIES FOR MULTISPECTRAL, HYPERSPECTRAL, AND ULTRASPECTRAL IMAGERY XIV, 2008, 6966
  • [26] Developing a Testing Framework for Intrusion Detection Algorithms Using Software Defined Networking
    Suba, Anton Miguel
    Bautista, Kurt Vincent
    Ledesma, Julio Carlos Tomas
    Yu, William Emmanuel
    INFORMATION SCIENCE AND APPLICATIONS 2018, ICISA 2018, 2019, 514 : 303 - 313
  • [27] INTELLIGENT DETECTION AND ANALYSIS OF SOFTWARE VULNERABILITIES BASED ON ENCRYPTION ALGORITHMS AND FEATURE EXTRACTION
    Li, Heng
    Li, Xinqiang
    Wei, Hongchang
    Scalable Computing, 2024, 25 (02): : 900 - 907
  • [28] An Empirical Study on Software Aging of Long-Running Object Detection Algorithms
    Pietrantuono, Roberto
    Cotroneo, Domenico
    Andrade, Ermeson
    Machida, Fumio
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 1091 - 1102
  • [29] Quantifying the Effectiveness of Software Diversity using Near-Duplicate Detection Algorithms
    Coffman, Joel
    Chakravarty, Aurin
    Russo, Joshua A.
    Gearhart, Andrew S.
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON MOVING TARGET DEFENSE (MTD'18), 2018, : 1 - 10
  • [30] Some guidelines for submitting software to software and Algorithms
    Dellinger, Joe
    Geophysics, 2017, 82 (06)