Share Email Print
cover

Proceedings Paper

Network exploitation using WAMI tracks
Author(s): Ray Rimey; Jim Record; Dan Keefe; Levi Kennedy; Chris Cramer
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

Paper Details

Date Published: 23 May 2011
PDF: 15 pages
Proc. SPIE 8062, Defense Transformation and Net-Centric Systems 2011, 80620L (23 May 2011); doi: 10.1117/12.883093
Show Author Affiliations
Ray Rimey, Lockheed Martin Corp. (United States)
Jim Record, Lockheed Martin Corp. (United States)
Dan Keefe, Lockheed Martin Corp. (United States)
Levi Kennedy, Signal Innovations Group, Inc. (United States)
Chris Cramer, Signal Innovations Group, Inc. (United States)


Published in SPIE Proceedings Vol. 8062:
Defense Transformation and Net-Centric Systems 2011
Raja Suresh, Editor(s)

© SPIE. Terms of Use
Back to Top