advanced-menu-icon

iMM Tracking - Extension of the Kalman Filter on Lateral Positions

Apart of the linear Kalman filter, SkyRadar also presents an implementation of the interacting multiple model (iMM) filter for object tracking.

Read the blog

Tracking for Pulse Radars – the Kalman Filter

One of the most powerful statistical estimation techniques, which is widely applied in navigation, radar tracking, satellite orbit determination, autonomous driving, and many other fields is the Kalman filter. This digital filter provides a quite accurate estimation of the next state (position, movement, temperature, etc.) from any possible noisy input signal, in real time, which makes it very suitable for radar navigation and tracking purposes.

Read the blog

Various Algorithms for Moving Targets Applied on FMCW Raw Data (Video)

The following video shows the algorithms Moving Target Indication (MTI) , MTI with post processing, Moving Target Detection (MTD) as well as MTD with Doppler filter, applied on raw data of a 24 GHz FMCW.

Read the blog

SkyRadar's Monitoring System for ATSEP - Integrating Radar & Tower Simulator, 8 GHz Pulse Radar, as well as Several Technical Training Labs (Video)

This article introduces SkyRadar's Monitoring Training System for ATSEP. It trains ATSEP on rapidly locating errors or points of system degradation, on rapidly fixing them and keeping downtimes short.

Read the blog

Artificial Intelligence for Cybersecurity in Air Traffic Control

This article sheds light on the potential roles of Artificial Intelligence in improving Cybersecurity in times of data-driven and digitalized Air Traffic Management.

Read the blog

The Enchanting Singing and Dancing of the Radars (Video)

My colleague Volker recorded this short video of our NextGen Radars "singing" and "dancing" during release testing.

Read the blog

Establishing Cybersecurity Structures and Procedures in Air Traffic Control - a Webinar (Video)

This webinar has a close look at proactive and reactive security in Air Traffic Control. It introduces into main threats, cybersecurity technology, monitoring and response processes, as well as strategies of buildin Cyber-Security Incident Response Teams.

Read the blog