{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T15:56:07Z","timestamp":1706025367269},"reference-count":26,"publisher":"Institution of Engineering and Technology (IET)","issue":"6","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2012JM8004"],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Computer Vision"],"published-print":{"date-parts":[[2013,12]]},"abstract":"The aim of this article was to investigate multiple targets tracking in natural environment based on Dezert\u2013Smarandache theory (DSmT). On the basis of establishing conflict strategy and combination model, the basic framework and algorithm of fusing multi\u2010source information were described. The multiple targets tracking platform which embedded location and colour cues into the particle filters (PFs) was developed in the framework of DSmT. Three sets of experiments with comparisons were carried out to validate the suggested tracking approach. Results showed that the conflict strategy and DSmT combination model were available, and the introduced approach exhibited a significantly better performance for dealing with high conflict between evidences than a PF. As a result, the approach was suitable for real\u2010time video\u2010based targets tracking, and it had the ability to track interesting targets. Furthermore, the approach can easily be generalised to deal with larger number of targets and additional cues in a complicated environment.<\/jats:p>","DOI":"10.1049\/iet-cvi.2012.0193","type":"journal-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T16:29:48Z","timestamp":1377793788000},"page":"456-466","source":"Crossref","is-referenced-by-count":3,"title":["Dezert\u2013Smarandache theory for multiple targets tracking in natural environment"],"prefix":"10.1049","volume":"7","author":[{"given":"Yi","family":"Wang","sequence":"first","affiliation":[{"name":"School of Information and Navigation Air Force Engineering University Fenghao Road 1 Xi'an 710077 People's Republic of China"}]},{"given":"Yingwu","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Information and Navigation Air Force Engineering University Fenghao Road 1 Xi'an 710077 People's Republic of China"}]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information and Navigation Air Force Engineering University Fenghao Road 1 Xi'an 710077 People's Republic of China"}]},{"given":"Pengyang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Mechanical and Precision Instrument Engineering Xi'an University of Technology Xi'an 710048 People's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2013,12]]},"reference":[{"key":"e_1_2_7_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.03.002"},{"key":"e_1_2_7_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.09.026"},{"key":"e_1_2_7_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2010.12.002"},{"key":"e_1_2_7_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.928889"},{"key":"e_1_2_7_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.894708"},{"key":"e_1_2_7_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2007.07.024"},{"key":"e_1_2_7_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.spa.2011.12.012"},{"key":"e_1_2_7_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcp.2011.09.023"},{"key":"e_1_2_7_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2010.5545199"},{"key":"e_1_2_7_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2008.4516991"},{"key":"e_1_2_7_12_2","doi-asserted-by":"publisher","DOI":"10.2140\/camcos.2010.5.221"},{"key":"e_1_2_7_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.56"},{"key":"e_1_2_7_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263\u2010007\u20100112\u20106"},{"key":"e_1_2_7_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.03.010"},{"key":"e_1_2_7_16_2","volume-title":"Advances and applications of DSmT for information fusion","author":"Dezert J.","year":"2004"},{"key":"e_1_2_7_17_2","first-page":"66","volume-title":"Multi\u2010target tracking applications of Dezert\u2010Smarandache theory","author":"Tehamova A.","year":"2005"},{"key":"e_1_2_7_18_2","first-page":"53","article-title":"Modified combination rule based on DSmT","volume":"33","author":"Qiansu Q.","year":"2010","journal-title":"Electron. Meas. Technol."},{"key":"e_1_2_7_19_2","first-page":"129","article-title":"Fusion of communication interception information based on DSmT","volume":"46","author":"Yang H.\u2010c.","year":"2010","journal-title":"Comput. Eng. Appl."},{"key":"e_1_2_7_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.1051"},{"key":"e_1_2_7_21_2","doi-asserted-by":"crossref","unstructured":"Sun J. Wang Y.: \u2018Research on moving object tracking under occlusion conditions\u2019.IEEE Int. Conf. on Management and Service 2009 pp.1\u20134","DOI":"10.1109\/ICMSS.2009.5302296"},{"key":"e_1_2_7_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/78.978374"},{"key":"e_1_2_7_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2022797"},{"key":"e_1_2_7_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2011.02.010"},{"key":"e_1_2_7_25_2","first-page":"1466","article-title":"Adaptive scale appearance model for object tracking","volume":"20","author":"Wang S.P.","year":"2008","journal-title":"J. Comput. Aided Des. Comput. Graph."},{"key":"e_1_2_7_26_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467\u20108640.1988.tb00279.x"},{"key":"e_1_2_7_27_2","volume-title":"Third Int. Conf. on Information Fusion","author":"Levr E.E.","year":"2000"}],"container-title":["IET Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-cvi.2012.0193","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-cvi.2012.0193","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-cvi.2012.0193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T07:21:30Z","timestamp":1694762490000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/iet-cvi.2012.0193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["10.1049\/iet-cvi.2012.0193"],"URL":"https:\/\/doi.org\/10.1049\/iet-cvi.2012.0193","archive":["Portico"],"relation":{},"ISSN":["1751-9632","1751-9640"],"issn-type":[{"value":"1751-9632","type":"print"},{"value":"1751-9640","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12]]}}}