This software is copyrighted and licensed for use on one computer per copy.
Triton Elics International grants permission to the purchaser to make a limited
number of copies of the program for backup purposes. Additional reproduction of
the programs or this manual is a violation of the copyright law.
The licensee is bound by the terms and conditions set forth in the Software
License Agreement and Limited Warranty that accompanies this document.
Bathy Pro™, Isis
TriPort™, Q-MIPS™, VISTA™, TriCAS™, ROVFlight™, A-B™, and
Convert CD™, are trademarks of Triton Elics International, Inc.;
®
Isis
Sonar is a registered trademark of Triton Elics International, Inc.
The following are copyrights of their respective companies or organizations:
• WinRT Registry: BlueWater Systems
• HawkEye, Imagine 128: Number Nine Visual Technology Corp.
The following are trademarks and/or registered tradem arks of their respective
companies or organizations:
1. Before handling components inside your computer system, exit all
applications and shut down the operating system in accordance with
procedures applicable to them.
2. Turn off the power to the computer and disconnect all cables that may be
feeding electrical power to the system you will be working on.
3. Wear a grounded, anti-static wrist-strap. This is especially important if
you are removing, replacing, or installing a printed circuit board of any
kind.
Failure to adhere to these and other safety precautions mentioned in the manual
could result in harm to property or personnel!
recautions mentioned below. In addition,
observe all safety precautions mentioned in this
manual.
• Please refer to the Appendix entitled “Mass Storage Options” for
important details covering the handling of M-O disks!
• Never boot your system with a writable M-O cartridge inserted
into the drive!
• Use magneto-optical media that has 512 bytes per sector, not
1024 bytes per sector, and use the AFDisk software utility to
format magneto-optical media. Never use Windows 95 to format
M-O media!
Triton Elics Internatonal
125 Westridge Drive
Watsonville, CA 95076
USA
U.S.A.
SOFTWARE LICENSE AGREEMENT
By opening this package, you agree to be
bound by the terms of this Agreement,
which include the software license and the
limited warranty. This Agreement applies to
you and any subsequent licensee of this
software program. If you do not accept or
agree to the terms of this Agreement, do
not open this sealed package. Promptly
return the unopened package to TRITON
ELICS for a refund. However, no refund or
replacement will be given if the sealed
envelope containing the SOFTWARE
Sentinel and Manual has been opened or if
any of the components of the product
(including the software sentinel) are
missing. Grant of license for the software
product and full title and ownership of the
hardware product shall not transfer to the
Buyer until the purchase price, plus any
interest or fees resulting from late payments or pre-arranged terms, has been
received in full by the Seller.
1. GRANT OF LICENSE: TRITON
ELICS grants you the right to use the
enclosed TRITON ELICS software
product in the manner provided below.
YOU MAY:
• Use one copy of the TRITON ELICS
software products identified above on
a single computer.
• Make one (1) copy of the program in
machine-readable form solely for
backup purposes, provided that you
reproduce all proprietary notices.
• Transfer the SOFTWARE and user
documentation on a permanent basis
provided you retain no copies and the
recipient agrees to the terms of this
Agreement.
YOU MAY NOT:
1. Reverse engineer, decompile, modify or
disassemble the SOFTWARE except to the
extent such foregoing restriction is
expressly prohibited by applicable law.
Remove any proprietary notices, labels, or
marks on the program, documentation, or
program disk.
2. UPGRADES. SOFTWARE and
documentation upgrades are provided free
of charge for one year from the date of
shipment. If the SOFTWARE is an
upgrade, you may use or transfer the
SOFTWARE only in conjunction with
upgraded product. You may use that
upgraded product only in accordance with
this License.
3. COPYRIGHT. The SOFTWARE
(including any images, “applets,”
animations, video, audio, music, and text
incorporated into the SOFTWARE) is
owned by TRITON ELICS and is protected
by United States copyright laws and
international treaty provisions.
4. TECHNICAL SUPPORT. Technical
Support is available by phone, fax, modem,
Triton Elics bulletin board service or Internet free of charge during warranty period.
MARISAT charges are invoiced at cost
plus twenty percent.
5. EXPORT RESTRICTIONS. You agree
that neither you nor your customers
intends to or will, directly or indirectly,
export or transmit the SOFTWARE or
related documentation and technical data
to any country to which such export or
transmission is restricted by any applicable
U.S. regulation or statute, without the prior
written consent, if required, of the Bureau
of Export Administration of the U.S.
Department of Commerce, or such other
governmental entity as may have
jurisdiction over such export or
transmission.
LIMITED WARRANTY
TRITON ELICS warrants that (a) the
SOFTWARE will perform substantially in
accordance with the accompanying written
materials for a period of one (1) year from
the date of shipment and (b) any hardware
accompanying the SOFTWARE will be free
from defects in materials and workmanship
under normal use and service for a period
of one (1) year from date of shipment.
CUSTOMER REMEDIES. TRITON
ELICS’s entire liability and your exclusive
remedy shall be, at TRITON ELICS’s
option, repair or replacement of the
SOFTWARE or hardware that does not
meet TRITON ELICS’s Limited Warranty.
Warranty service is F.O.B. TRITON
ELICS’s Watsonville facility. All shipping
and insurance costs are paid by buyer. Onsite Customer Service and Warranty
Repair (including travel hours,
transportation, lodging and meals) may be
provided by TRITON ELICS, at its own
discretion, to Buyer at cost plus twenty
percent. However, actual labor hours to
provide this service or repair will be free of
charge to Buyer. This Limited Warranty is
void if failure of the SOFTWARE or
hardware has resulted from accident,
abuse, or misapplication. Any replacement
SOFTWARE or hardware will be warranted
for the remainder of the original warranty
period or thirty (30) days, whichever is
longer.
NO OTHER WARRANTIES. Except for the
above express limited warranties, TRITON
ELICS makes no warranties, expressed,
implied, statutory, or in any communication
with you, and TRITON ELICS specifically
disclaims any implied warranty of
merchantability or fitness for a particular
purpose. TRITON ELICS does not warrant
that the operation of the program will be
uninterrupted or error free. Some
states/jurisdictions do not allow the
exclusion of implied warranties, so the
above exclusions may not apply to you.
This limited warranty gives you specific
legal rights. You may have others, which
vary from state/jurisdiction to
state/jurisdiction.
NO LIABILITY FOR CONSEQUENTIAL
DAMAGES. To the maximum extent
permitted by applicable law, in no event
shall TRITON ELICS be liable for any
damages whatsoever (including, without
limitation, damages for loss of business
profits, business interruption, loss of
business information, or any other
pecuniary loss) arising out of the use of or
inability to use this TRITON ELICS
product, even if TRITON ELICS has been
advised of the possibility of such damages.
Because some states/ jurisdictions do not
allow the exclusion or limitation of liability
for consequential or incidental damages,
the above limitation may not apply to you.
U.S. GOVERNMENT RESTRICTED
RIGHTS. The SOFTWARE and
documentation are provided with
RESTRICTED RIGHTS. Use, duplication,
or disclosure by the Government is subject
to restrictions as set forth in subparagraph
(c) (1) and (ii) of the Rights in Technical
Data and Computer Software clause at
DFARS 252.227-7013 or subparagraphs
(c) (1) and (2) of the Commercial Computer
Software—Restricted Rights at 48 CFR
52.227-19, as applicable. Manufacturer is
Triton Elics International, Inc., 125
Westridge Drive, Watsonville, CA 95076. If
you acquired this product in the United
States, this Agreement is governed by the
laws of California. If this product was
acquired outside the United States, then
local law may apply.
TRITON ELICS INTERNATIONAL
SOFTWARE LICENSE AGREEMENT
AND LIMITED WARRANTY
CHAPTER 1: OVERVIEW OF THE SOFTWARE
1.1 SOFTWARE ARCHITECTURE
1.1.1 What is TargetPro?
1.1.2 What File Types Can TargetPro Read?
1.1.3 What File Types Can TargetPro Write?
1.1.4 What Formats Are Best for Exporting?
1.2 SYSTEM REQUIREMENTS
1.3 SOFTWARE INSTALLATION
1.3.1 Installing a Hardware Dongle
1.3.2 Installing TargetPro
1.4 UPGRADING TO A NEW RELEASE OF SOFTWARE
CHAPTER 2: USING TARGETPRO
2.1 RUNNING TARGETPRO
2.2 OPENING A FILE
2.3 UNDERSTANDING TARGETPRO'S WINDOWS
2.3.1 Repositoning displayed child windows
2.4 ICONS ON THE TASKBAR
2.5 PAN AND DISPLAY ONLY PROPERTIES WINDOW
2.5.1 The Pan Window
2.5.2 The Display-Only Properties Window
CHAPTER 3: MEASURING A CONTACT
3.1 LENGTH
3.1.1 Length Adjust
3.1.2 Length Rotation
1
1
1
1
2
2
3
3
6
6
6
8
8
9
11
12
15
19
20
20
22
22
22
23
3.1.3 Beam Width 24
3.1.4 Number of Pings
3.2 WIDTH
3.2.1 Width Adjust
3.2.2 Width Rotation
3.3 HEIGHT
3.4 GENERAL DIRECTIONS FOR OBJECT MENSURATION
3.4.1 Measure Distance
3.4.2 Measure Object Echo-Shadow (Tied)
3.4.3 Measure Object Length
3.4.4 Measure Object Echo
3.4.5 Measure Object Shadow
3.5 OBJECT DETECTION
3.5.1 Configuring Object Measurement
CHAPTER 4: OBJECT MODIFICATION AND CLASSIFICATION
4.1 THE ELECTRONIC LIGHT TABLE
4.1.1 The Histogram Window
4.1.2 The Statistics Area
4.1.3 The Rotation/Cropping Area
4.1.4 The Image Processing Area
4.1.5 The Color Processing Area
4.1.6 The Audit Trail Area
4.1.7 Apply to Large Image, Undu Large Image and Close
4.1.8 Annotate
4.2 CLASSIFYING A TARGET
4.3 GEOCORRECTING A CONTACT OR TARGET IMAGE
4.4 SETTING AND VIEWING TARGET IDENTIFICATION
24
25
25
25
26
27
28
28
29
30
30
31
32
33
33
34
35
35
36
38
39
39
40
40
43
47
4.4.1 Setting a Contact Number 47
CHAPTER 5: TARGETPRO MENU
5.1 THE FILE MENU
5.2 THE EDIT MENU
5.3 THE TOOLS MENU
5.3.1 Configuring to Display Data
5.3.2 RAMP Support
5.3.3 Inspecting TAG 270 Information
5.4 THE WINDOW MENU
5.5 THE VIEW MENU
5.6 THE HELP MENU
49
49
54
54
55
59
60
63
63
64
CHAPTER 6: TROUBLESHOOTING
65
ADDENDUM: The Effect of Speed Correction on Images from TargetPro and
Target
68
June 2004 TargetPro™ User's Manual
Chapter 1: Overview of the Software
1.1 Software Architecture
1.1.1 What is TargetPro?
TargetPro is a software module included with Isis sonar from Triton Elics
International, Inc. TargetPro is also sold as a separate, standalone utility.
If you have the Isis Sonar software (also from Triton Elics International), you
can use TargetPro to take snapshots of selective areas of your data imagery
that may be of interest to you. When TargetPro takes a snapshot of an
image, TargetPro also logs the quantitative data (geocoding, contact
mensuration) associated with the original data imagery from which the
image came.
You can then save these small images as files independent of the original
data imagery. Furthermore, you can then recall the image in Isis without
having to play back the entire data imagery that contained the selected
image – or you can have Isis play back the image in the larger context of
your data imagery, in case youwant to see the area surrounding the
selected image.
Even if you don’t have Isis, you can still use TargetPro to view and modify a
wide variety of images, including images that were created by someone else
who did have Isis. Finally, you can run TargetPro from DelphMap as a utility
for viewing and modifying files known to TargetPro.
1.1.2 What File Types Can TargetPro Read?
TargetPro can open (read) these file types:
• Contact (TEI proprietary *.CON files)
• Target (TEI proprietary *.TGT files)
• ESC image (*.TIF or *.TIFF files, with Tag 270 information in them)
• Pulse Code Modulation image (*.PCM, which are compressed ESC
image files)
• Joint Photographic Experts Group (*.JPEG and *.JPG files)
In the preceding list, the numbers in parentheses are the number of bits
supported for the named formats. Note, however, that TargetPro cannot
save PCM images as PCM images; that format can only be saved in
TargetPro as a non-PCM format file, such as TIFF.
1.1.4 What Formats Are Best for Exporting?
If you’re going to export an image from TargetPro and then use that image
in another application, you may want to save your image in a format that
offers the most support in the application that will receive the imported
image. At present, the best formats for saving TargetPro images to be used
in other applications are (in alphabetical order):
• BMP (24-bit)
• GIF (8-bit, 89a non-interlaced)
• JPG (24-bit progressive)
• PCX (24-bit, version5)
• PSD (24-bit PhotoShop file)
• TIF (24-bit)
The 24-bit formats are the only ones to support exporting the image in color.
All formats other than 24-bit will be in gray scale.
Note: The 24-bit TIF and BMP file formats are lossless. This is desirable,
since lossless formats retain all information even if you later compress or
enlarge the image.
Chapter 1: Overview of the Software 2
June 2004 TargetPro™ User's Manual
1.2 System Requirements
You need the following:
• A Pentium-class personal computer running Windows NT,
Windows 2000, or Windows XP.
• At least 32 MB of RAM.
• A software license from Triton Elics International to use the product. (The
license comes with TargetPro when you buy it.)
• A hardware dongle that has been programmed to recognize TargetPro.
• A computer monitor capable of displaying true 24-bit color images
(potentially 16,777,216 colors.) You could use a monitor that supports
fewer colors, but the results won’t be as good as they would be on a
monitor that can support 24-bit color images. Also, so that you can see
all of the application’s working area, your monitor must be set to at least:
1280 X 1024 pixels if you are using large fonts, or
1152 X 864 pixels if you are using small fonts
Before you can use TargetPro, you must install the TargetPro software using
InstallShield, and you must attach a properly configured dongle to your computer
to access the program.
1.3 Software Installation
Typical software installation CD will contain folders like the ones depicted in the
Windows Explorer layout. (See the figure, “Typical listing of TEI software
installation folders’.)
Chapter 1: Overview of the Software 3
June 2004 TargetPro™ User's Manual
Figure 1. Typical listing of TEI software installation folders.
TEI software is compatible with Windows NT 4.0, Windows 2000, and Windows
XP. The following notes will help you achieve a smooth installation of the
software.
• Please exit from all other applications before running any of the
installation programs.
• You will not be able to complete the installation on an NT4.0 or
Windows 2000 system if you do not have administrator’s rights. All Isis
“black boxes” ship with a user name Isis. In this case the Isis user
name has administrator’s rights and does not require a password.
Chapter 1: Overview of the Software 4
June 2004 TargetPro™ User's Manual
• Each application is installed by browsing to the appropriate folder (for
example, Isis5.50 Install) on the CD and double-clicking on the
SETUP.EXE file found in that folder.
• TEI recommends that if you have more than one hard drive, you install
the software on the second (usually the D:) drive, using the default
folder names on the CD. You will be given the option to select any drive
during the setup process, select the Custom option and change the
drive letter.
• The first installation on an NT4.0 system requires a re-boot during the
installation; however, this only occurs for the first installation. Under
Windows 2000 and Windows XP, no rebooting is necessary
installation process. However, you
must reboot the system after
installing under Windows NT 4.0.
• For each application, a number of sample data files can be optionally
installed. These files will reside in a subfolder called Demo Files within
each application’s main folder. These special files can be played back
or processed by the relevant TEI applications without a TEI sentinel
being installed. If no sentinel (dongle) is attached, a message displays,
indicating either that a sentinel was not found or that the sentinel is
damaged. However, you can still play back the sample files that come
from the CD.
• In order to run the software in acquisition mode, or to play back or
process other files, you will need a TEI sentinel attached to the LPT1
printer port. Contact TEI if you need a sentinel.
• If the operating system is Windows NT 4.0 or Windows 2000, you will
need to install a sentinel driver. The driver is included on the CD in the
Sentinel folder; a text file, with installation instructions, is in that folder.
The driver is
not required under Windows 95 or Windows 98.
• In the case of Windows NT 4.0, Service Pack 5 (or higher) needs to be
installed. Service Pack 5 is on the CD.
• The TEI manuals that are installed with the software are in Adobe
Acrobat PDF format. Acrobat Reader software (required to read the
PDF files) is also on the CD.
• The CD has a number of other folders containing drivers and
applications that could be required; each folder has a text file with more
information.
• To remove the software, use the Add/Remove Programs utility in the
Windows Control Panel collection of utilities.
• The installations make two changes which are not restored when the
programs are removed using Add/Remove Programs. They are:
during the
Chapter 1: Overview of the Software 5
June 2004 TargetPro™ User's Manual
The addition of a folder called [TEIdlls] in the Windows, Win95 or
WINNT folder, and
a modification to the PATH environment variable which adds the
[‘TEIdlls] folder to the PATH. The [TEIdlls] folder can be safely
deleted after all TEI software has been removed.
1.3.1 Installing a Hardware Dongle
A hardware dongle comes with TargetPro. The dongle permits TargetPro to
run after the software is installed.
To install the dongle, plug in the male end of the dongle to the female end of
a serial port on your computer.
1.3.2 Installing TargetPro
Triton Elics Int ships TargetPro with a utility used to install the product for
you. From the distribution medium made available to you from Triton Elics
Int, find the file called
install utility InstallShield. Respond to any InstallShield prompts, as may be
needed; let InstallShield guide you in the installation. When InstallShield
finished, the installation is complete, and TargetPro is ready to run.
setup.exe and double-click it. The system runs the
1.4 Upgrading to New Releases of Software
If you already have a version of the software that you wish to upgrade on your
system you will see a dialog box inviting you to modify, repair, or remove the
software you intend to install. See the figure, ‘Modify, Repair, Remove choices
during installation’ for an example of this kind of dialog box.
Chapter 1: Overview of the Software 6
June 2004 TargetPro™ User's Manual
Figure 2. Modify, Repair, Remove choices during installation.
You will need to remove the old version of the software before you will be
permitted to install the new version. To do so, enable the Remove button in the
dialog box and click Next. You can then install the new version by rerunning
setup.exe As noted above, some items are deliberately not removed during the
uninstall process; doing so can cause problems. If necessary, manually delete
the \TEIdlls folder, but only do this if you are going to re-install all TEI
applications.
Important Note: The Windows Installer will fail to uninstall the software if
the operating system has been upgraded from (for example) Windows 98 to
Windows 2000 after the TEI applications were installed. If you want to
upgrade your operating system, uninstall the TEI programs first, and then
re-install the TEI programs after the upgrade.
Chapter 1: Overview of the Software 7
June 2004 TargetPro™ User's Manual
Chapter 2: Using TargetPro
If you’ve installed the TargetPro software and have it running, you can use it to
open CON (contact) or TGT (target) fields, enhance them, and save the changed
files. This chapter explains how to do that.
You can then save these small images as files independent of the original data
imagery. You can then recall the image in Isis without having to playback the
entire data imagery that contained the selected image – or you can have Isis
playback the image in the larger context of your data imagery, in case you want
to see the area surrounding the selected image.
2.1 Running TargetPro
You can run TargetPro in a number of ways, shown next. Choose a convenient
method.
To run TargetPro, double-click on the TargetPro icon in the Triton group
(Microsoft Windows), or
• From Isis, configure for TargetPro availability (Tools → Target Setup…),
and then double-click the left trackball button while imagery is scrolling in an
Isis waterfall window to put a contact in the TargetPro working window.
TargetPro runs and displays its initial screen (Figure 3). Moreover, if you have
run TargetPro before, TargetPro remember the overall size and position of the
application window as it was when you last used it.
Chapter 2: Using TargetPro 8
June 2004 TargetPro™ User's Manual
Figure 3. Initial screen (empty) after first running TargetPro.
Because you have not yet opened a file for TargetPro to display, the Main
Working Area of the initial TargetPro screen, as well as any smaller child
windows that may be present, are empty of information. See ‘Understanding
TargetPro’s Windows’ for an explanation of the various parts of the application’s
overall window.
2.2 Opening a File
As noted earlier, you can work with any file types in TargetPro:
• Contact (TEI proprietary *.CON files)
• Target (TEI proprietary *.TGT files)
• ESC Image (*.TIF or *.TIFF files, with Tag 270 information in them)
Chapter 2: Using TargetPro 9
June 2004 TargetPro™ User's Manual
• PCM Image (*.PCM, which are compressed ESC image files)
• Joint Photographic Experts Group (*.JPEG and *.JPG files)
• Microsoft Windows Paint (*.PCX files, which support color as well as
black and white)
• Microsoft Windows Bitmap (*.BMP files)
• Microsoft Windows Metafile (*.WMF files)
• Enhanced Metafile (*.EMF files)
Those are the only file types that can be opened in TargetPro. If your contact
(CON) or target (TGT) files have been saved as digitized lines and/or polygons,
then TargetPro will display them that way.
To open a file TargetPro can recognize, do any of the following:
• From TargetPro’s main menu, choose File→Open,
• Press <CTRL>+<O>,
• Press [Insert],
or
or
or
• On the taskbar click the Open icon:
Any of those actions displays a standard Windows-based dialog box where you
can specify a file to pen. A typical file opened in TargetPro looks like the sample
shown in Figure 4.
Chapter 2: Using TargetPro 10
June 2004 TargetPro™ User's Manual
Figure 4. Typical file opened in TargetPro
After a file has been opened, the original list of menu items (File, Edit, Tools,
View and Help) expands to include two additional menu choices: Object and
Window.
2.3 Understanding TargetPro’s Windows
Initially TargetPro displays these windows and working areas:
• the Pan window
• the Display-Only Properties window
• the main display area for viewing opened files
Chapter 2: Using TargetPro 11
June 2004 TargetPro™ User's Manual
• the Cursor Status window
• taskbar icons
• Status Bar
In the taskbar area, all icons except for the Open icon and the About icon are
grayed out and unavailable until you open a file in TargetPro. All icons are
explained in “Icons on the Taskbar”.
If you double-click on any of the windows (except for the main display area), the
system displays the windows’ title bars and reveals their identities (Figure 3).
Note that the windows still lack information in them because you have not yet
opened a file in TargetPro. The two windows (Pan and Display-Only Properties
windows) are explained later on.
The Status Bar, where on-going and current status is displayed, is a narrow strip
at the bottom of the TargetPro window (Figure 3).
2.3.1 Repositioning displayed child windows
To reposition a displayed child window, double-click in the child window to
expose the windows title bar. Then, click in the title bar and drag the
window to the new position.
To return an undocked window to its original position, double-click in the
child window and the window moves back to its initial position.
All windows except the Main Display Area are child windows of TargetPro.
You can close or open the child windows from the View menu listed above
the Taskbar icons. The Main Display Area is not redockable (movable).
The individual windows are:
Pan Window. The black window near the upper left corner is a thumbnail
window for the currently active, opened TargetPro image, if any is present.
This window is known as the Pan Window. See ‘Pan and Display-Only
Properties Windows’ for more detailed information on this window.
Display-Only Properties Window. This child window contains four
independent controls for adjusting an image’s brightness, contrast, gamma,
Chapter 2: Using TargetPro 12
June 2004 TargetPro™ User's Manual
and threshold. See ‘Pan and Display-Only Properties Windows’ for more
detailed information on this window.
Cursor Status Area. The rightmost area contains three panels of attribute
fields that may show information when you open a file in TargetPro,
depending on the type of navigation data and other attributes that may have
been present in the opened file prior to opening. Within the Cursor Status
Area, information is arranged in three panels:
• Cursor Panel
• Target-Debris Panel (or Target – Not Classified, if your opened file is not
a target or contact type of file)
• Towfish Panel
The fields in these three groups are explained in Table 1.
Status Bar. When you open a TargetPro file and that file has the active
focus, text identifying key properties of that file (such as file name, number
of pixels in the x and y axes, file size, zoom level, etc.) appear here.
TABLE 1. Table One: Fields in the Cursor Status window
Parent Panel
for Attributes
Cursor
Chapter 2: Using TargetPro 13
Attribute Field Name and Explanation
Date: This is the Julian date the data were recorded.
Time: This is the time (hh:mm:ss) the data were recorded.
Latitude: These are the degrees north or south of the equator
as measured from the point of the trackball pointer when the
contact was made. The heading of this field changes to
Northings if the data were recorded that way.
Longitude: These are the degrees east or west of the meridian
as measured from the point of the trackball pointer when the
contact was made. The heading of this field changes to
Eastings if the data were recorded that way.
Ping: The nth consecutive ping (shot) of the recorded data at
the point where the trackball pointer was placed when the
Target contact was created.
KP: Kilometers of Pipe or Kilometer Posting. Measure of
distance along a pipe or pipeline route.
Range: This is the range from the towfish to the current point,
either the cursor or the object being measured.
June 2004 TargetPro™ User's Manual
Distance: This is the distance between the end-points of the
rubber-band line drawn from one contact to another.
Pixel: This displays the x (x-axis coordinate), y (y-axis
coordinate), and z data (intensity) of any pixel in the displayed
image.
Target –
Debris
(or Target – Not
Classified for
non-contact
files)
Latitude: Degrees north or south of the equator. This changes
to Northings if the data were recorded that way
Longitude: Degrees east or west of the meridian. This changes
to Eastings if the data were recorded that way.
Range: This is the range from the towfish to the current point,
either the cursor or the object being measured.
Width: Across-track distance of mensuration.
Length: Along-track distance of mensuration.
Height: Height is how far an object stands above the seabed.
Height computation uses the length (width in across-track) of
the shadow, distance of the object from the towfish, and the
towfish altitude.
Depth: This is the vertical distance the target is from the sea
surface.
Pings: Number of pings traversed by a drawn line. Also see
‘Number of Pings’.
Beam W.: Width of the beam at a specific range distance. This
parameter is updated with any length measurements. Also see
‘Beam Width’.
Target –
Debris
(or Target – Not
Classified for
non-contact
files,
cont’d)
L.Rot. (Length Rotation) Rotation angle of the length line
relative to a horizontal line. Angle is computed from a
horizontal line. Also see ‘Length Rotation’ on page 28.
L.Adj. (Length Adjust) is the difference between the length of a
line and its along-track length. In the case of a slanted line,
length is derived from the vertical component of the line, and
the L.Adj. measures the difference between the length of the
line and the along-track length. Also see ‘Length Adjust’.
W.Adj. (Width Adjust) is the difference between the length of
the line and the across-track width. Also see ‘Width Adjust’.
W.Rot. (Width Rotation) Rotation angle of the width line
relative to a horizontal line.
Chapter 2: Using TargetPro 14
June 2004 TargetPro™ User's Manual
Towfish
Range: This is the range from the towfish to the current point,
either the cursor or the object being measured.
Speed: This is the towfish’s speed.
Altitude: This is the vertical distance the towfish is from the
seafloor at nadir.
Depth: This is the vertical distance the towfish is from the sea
surface.
Note: altitude + depth = total water column depth
Heading: With respect to standard compass bearings, this is
the direction, in decimal degrees, in which the towfish is
pointed.
Beam: This is the horizontal beam angle of the sidescan sonar.
2.4 Icons on the Taskbar
Immediately underneath the menu list is the TargetPro taskbar of icons. They
are shown in Figures 5 and 6. Several of the icons have to do with operating the
cursor, or trackball pointer in the program. Additional icons are associated with
the Measurement Tool and the Zoom Tool. Tool Tips are attached to each icon,
and each icon has a menu equivalent in the Tools menu.
Group One Group Two
Standard Windows Zoom and Pan Windows
Figure 5. Groups One and Two of TargetPro’s taskbar icons
Group Three Group Four
Image Management Measurement Pointer Types
Figure 6. Groups Three and Four of TargetPro’s taskbar icons.
Chapter 2: Using TargetPro 15
June 2004 TargetPro™ User's Manual
For space reasons, the icons appear in this book in two rows. In the TargetPro
program, the icons are laid out in a single row. Most icons are grayed out until a
contact image is opened. All icons become visible when an image is opened and
as long as the Cursor Tool icon remains clicked. (The Paste icon will be grayed
out if there is nothing in the Windows Clipboard.) All choices within an icon
group are mutually exclusive; you can perform only one function at a time from a
group. Icons in Groups Two, Three and Four are unique to TargetPro. All the
icons are explained in the next few tables.
TABLE 2. Group Two: Standard Icons
Open icon. Click this to get a dialog box where you can specify a file to
open from TargetPro’s combo box. This icon is equivalent to choosing
File →Open from the main menu. The equivalent keyboard shortcut is
<CTRL>+<O>
Copy icon. Click this to copy the currently displayed target contact to the
Windows Clipboard. Menu equivalent: Edit →Copy. The equivalent key-
board shortcut is <CTRL>+<C>
Paste icon. Click this to get a dialog box where you can choose a type of
image to paste: ESC (Electronic Still Camera images as TIFF files having
the Tag 270 attribute), Generic Image, Contact File, or Target. Menu
equivalent: Edit →Paste. The equivalent keyboard shortcut is
<CTRL>+<V>
Print icon. Click this to get the standard Windows Print dialog box from
which you can print the currently displayed image. Menu equivalent:
File→Print. The equivalent keyboard shortcut is <CTRL>+<P>
About icon. Click this to see the About TargetPro information box. The
box reveals the program’s name, version number, date compiled,
Copyright date, and the icon associated with the program. There is no
equivalent keyboard shortcut.
Chapter 2: Using TargetPro 16
Loading...
+ 58 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.