Triton TargetPro User Manual

TM
Using TargetPro
User’s Manual
Software documentation through 2.3
June 2004
Copyright Notice
Bathy Pro™, Isis
TriPort™, Q-MIPS™, VISTA™, TriCAS™, ROVFlight™, A-B™, and
Convert CD™, are trademarks of Triton Elics International, Inc.;
®
Isis
Sonar is a registered trademark of Triton Elics International, Inc.
The following are copyrights of their respective companies or organizations:
WinRT Registry: BlueWater Systems
HawkEye, Imagine 128: Number Nine Visual Technology Corp.
The following are trademarks and/or registered tradem arks of their respective companies or organizations:
EXB-8500, EXB-8505XLI, EXB-8500C, EXB-8205: EXABYTE Corporation
Windows, Windows NT, Windows 95, MS-DOS: Microsoft Corporation
Pentium, MMX: Intel Corporation
Adaptec AHA 1505 and AHA 2940: Adaptec, Inc.
Klein 5000, Klein 2000, Klein 595: Klein Associates, Inc.
DF-1000: EdgeTech
Echoscan, Echotrac: Odom Hydrographic Systems, Inc.
ADS-640, GSP-1086, EPC-9082: EPC Labs, Inc.
Sentinel Scribe: Rainbow Technologies North America, Inc.
mach64: ATI Technologies, Inc.
HYPACK: Coastal Oceanographics, Inc.
International Business Machines
1200C, DesignJet 650C: Hewlett-Packard
1086, 8300, 980x plotters: EPC
TDU 1200, 850, 2000 plotters: Raytheon
195 (same as Dowty 195, Ultra 195 and Ultra 200): Waverley
InstallShield: InstallShield Corporation
All other brand or product names mentioned in this manual are trademarks or registered trademarks of their respective companies or organizations.
®
Sonar Pipeline, Delph Map®, Survey Office™, Hydro Suite™,
p
Safety Precautions
When working with the overall system
1. Before handling components inside your computer system, exit all applications and shut down the operating system in accordance with procedures applicable to them.
2. Turn off the power to the computer and disconnect all cables that may be feeding electrical power to the system you will be working on.
3. Wear a grounded, anti-static wrist-strap. This is especially important if you are removing, replacing, or installing a printed circuit board of any kind.
Failure to adhere to these and other safety precautions mentioned in the manual could result in harm to property or personnel!
When working with magneto-optical cartridge disks
© 1991-2004 Triton Elics International, Inc. All rights reserved. Printed in the
Please adhere to the hardware and software
recautions mentioned below. In addition, observe all safety precautions mentioned in this manual.
Please refer to the Appendix entitled “Mass Storage Options” for important details covering the handling of M-O disks!
Never boot your system with a writable M-O cartridge inserted into the drive!
Use magneto-optical media that has 512 bytes per sector, not 1024 bytes per sector, and use the AFDisk software utility to format magneto-optical media. Never use Windows 95 to format M-O media!
Triton Elics Internatonal
125 Westridge Drive
Watsonville, CA 95076
USA
U.S.A.
SOFTWARE LICENSE AGREEMENT
By opening this package, you agree to be bound by the terms of this Agreement, which include the software license and the limited warranty. This Agreement applies to you and any subsequent licensee of this software program. If you do not accept or agree to the terms of this Agreement, do not open this sealed package. Promptly return the unopened package to TRITON ELICS for a refund. However, no refund or replacement will be given if the sealed envelope containing the SOFTWARE Sentinel and Manual has been opened or if any of the components of the product (including the software sentinel) are missing. Grant of license for the software product and full title and ownership of the hardware product shall not transfer to the Buyer until the purchase price, plus any interest or fees resulting from late pay­ments or pre-arranged terms, has been received in full by the Seller.
1. GRANT OF LICENSE: TRITON ELICS grants you the right to use the enclosed TRITON ELICS software product in the manner provided below. YOU MAY:
Use one copy of the TRITON ELICS software products identified above on a single computer.
Make one (1) copy of the program in machine-readable form solely for backup purposes, provided that you reproduce all proprietary notices.
Transfer the SOFTWARE and user documentation on a permanent basis provided you retain no copies and the recipient agrees to the terms of this Agreement.
YOU MAY NOT:
1. Reverse engineer, decompile, modify or disassemble the SOFTWARE except to the extent such foregoing restriction is expressly prohibited by applicable law. Remove any proprietary notices, labels, or marks on the program, documentation, or program disk.
2. UPGRADES. SOFTWARE and documentation upgrades are provided free of charge for one year from the date of shipment. If the SOFTWARE is an upgrade, you may use or transfer the SOFTWARE only in conjunction with upgraded product. You may use that upgraded product only in accordance with this License.
3. COPYRIGHT. The SOFTWARE (including any images, “applets,” animations, video, audio, music, and text incorporated into the SOFTWARE) is owned by TRITON ELICS and is protected by United States copyright laws and international treaty provisions.
4. TECHNICAL SUPPORT. Technical Support is available by phone, fax, modem, Triton Elics bulletin board service or Inter­net free of charge during warranty period. MARISAT charges are invoiced at cost plus twenty percent.
5. EXPORT RESTRICTIONS. You agree that neither you nor your customers intends to or will, directly or indirectly, export or transmit the SOFTWARE or related documentation and technical data to any country to which such export or transmission is restricted by any applicable U.S. regulation or statute, without the prior written consent, if required, of the Bureau of Export Administration of the U.S. Department of Commerce, or such other governmental entity as may have jurisdiction over such export or transmission.
LIMITED WARRANTY
TRITON ELICS warrants that (a) the SOFTWARE will perform substantially in accordance with the accompanying written materials for a period of one (1) year from the date of shipment and (b) any hardware accompanying the SOFTWARE will be free from defects in materials and workmanship under normal use and service for a period of one (1) year from date of shipment. CUSTOMER REMEDIES. TRITON ELICS’s entire liability and your exclusive remedy shall be, at TRITON ELICS’s option, repair or replacement of the SOFTWARE or hardware that does not meet TRITON ELICS’s Limited Warranty. Warranty service is F.O.B. TRITON ELICS’s Watsonville facility. All shipping and insurance costs are paid by buyer. On­site Customer Service and Warranty Repair (including travel hours, transportation, lodging and meals) may be provided by TRITON ELICS, at its own discretion, to Buyer at cost plus twenty percent. However, actual labor hours to provide this service or repair will be free of charge to Buyer. This Limited Warranty is void if failure of the SOFTWARE or hardware has resulted from accident, abuse, or misapplication. Any replacement SOFTWARE or hardware will be warranted for the remainder of the original warranty period or thirty (30) days, whichever is longer. NO OTHER WARRANTIES. Except for the above express limited warranties, TRITON ELICS makes no warranties, expressed, implied, statutory, or in any communication with you, and TRITON ELICS specifically disclaims any implied warranty of merchantability or fitness for a particular purpose. TRITON ELICS does not warrant that the operation of the program will be uninterrupted or error free. Some states/jurisdictions do not allow the
exclusion of implied warranties, so the above exclusions may not apply to you. This limited warranty gives you specific legal rights. You may have others, which vary from state/jurisdiction to state/jurisdiction. NO LIABILITY FOR CONSEQUENTIAL DAMAGES. To the maximum extent permitted by applicable law, in no event shall TRITON ELICS be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or any other pecuniary loss) arising out of the use of or inability to use this TRITON ELICS product, even if TRITON ELICS has been advised of the possibility of such damages. Because some states/ jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. U.S. GOVERNMENT RESTRICTED RIGHTS. The SOFTWARE and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) (1) and (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c) (1) and (2) of the Commercial Computer Software—Restricted Rights at 48 CFR
52.227-19, as applicable. Manufacturer is Triton Elics International, Inc., 125 Westridge Drive, Watsonville, CA 95076. If you acquired this product in the United States, this Agreement is governed by the laws of California. If this product was acquired outside the United States, then local law may apply.
TRITON ELICS INTERNATIONAL SOFTWARE LICENSE AGREEMENT AND LIMITED WARRANTY
CHAPTER 1: OVERVIEW OF THE SOFTWARE
1.1 SOFTWARE ARCHITECTURE
1.1.1 What is TargetPro?
1.1.2 What File Types Can TargetPro Read?
1.1.3 What File Types Can TargetPro Write?
1.1.4 What Formats Are Best for Exporting?
1.2 SYSTEM REQUIREMENTS
1.3 SOFTWARE INSTALLATION
1.3.1 Installing a Hardware Dongle
1.3.2 Installing TargetPro
1.4 UPGRADING TO A NEW RELEASE OF SOFTWARE
CHAPTER 2: USING TARGETPRO
2.1 RUNNING TARGETPRO
2.2 OPENING A FILE
2.3 UNDERSTANDING TARGETPRO'S WINDOWS
2.3.1 Repositoning displayed child windows
2.4 ICONS ON THE TASKBAR
2.5 PAN AND DISPLAY ONLY PROPERTIES WINDOW
2.5.1 The Pan Window
2.5.2 The Display-Only Properties Window
CHAPTER 3: MEASURING A CONTACT
3.1 LENGTH
3.1.1 Length Adjust
3.1.2 Length Rotation
1 1 1 1 2 2 3 3 6 6 6
8 8
9 11 12 15 19 20 20
22 22 22 23
3.1.3 Beam Width 24
3.1.4 Number of Pings
3.2 WIDTH
3.2.1 Width Adjust
3.2.2 Width Rotation
3.3 HEIGHT
3.4 GENERAL DIRECTIONS FOR OBJECT MENSURATION
3.4.1 Measure Distance
3.4.2 Measure Object Echo-Shadow (Tied)
3.4.3 Measure Object Length
3.4.4 Measure Object Echo
3.4.5 Measure Object Shadow
3.5 OBJECT DETECTION
3.5.1 Configuring Object Measurement
CHAPTER 4: OBJECT MODIFICATION AND CLASSIFICATION
4.1 THE ELECTRONIC LIGHT TABLE
4.1.1 The Histogram Window
4.1.2 The Statistics Area
4.1.3 The Rotation/Cropping Area
4.1.4 The Image Processing Area
4.1.5 The Color Processing Area
4.1.6 The Audit Trail Area
4.1.7 Apply to Large Image, Undu Large Image and Close
4.1.8 Annotate
4.2 CLASSIFYING A TARGET
4.3 GEOCORRECTING A CONTACT OR TARGET IMAGE
4.4 SETTING AND VIEWING TARGET IDENTIFICATION
24 25 25 25 26 27 28 28 29 30 30 31 32
33 33 34 35 35 36 38 39 39 40 40 43 47
4.4.1 Setting a Contact Number 47
CHAPTER 5: TARGETPRO MENU
5.1 THE FILE MENU
5.2 THE EDIT MENU
5.3 THE TOOLS MENU
5.3.1 Configuring to Display Data
5.3.2 RAMP Support
5.3.3 Inspecting TAG 270 Information
5.4 THE WINDOW MENU
5.5 THE VIEW MENU
5.6 THE HELP MENU
49
49 54 54 55 59 60 63 63 64
CHAPTER 6: TROUBLESHOOTING
65
ADDENDUM: The Effect of Speed Correction on Images from TargetPro and Target
68
June 2004 TargetPro™ User's Manual
Chapter 1: Overview of the Software
1.1 Software Architecture
1.1.1 What is TargetPro?
TargetPro is a software module included with Isis sonar from Triton Elics International, Inc. TargetPro is also sold as a separate, standalone utility.
If you have the Isis Sonar software (also from Triton Elics International), you can use TargetPro to take snapshots of selective areas of your data imagery that may be of interest to you. When TargetPro takes a snapshot of an image, TargetPro also logs the quantitative data (geocoding, contact mensuration) associated with the original data imagery from which the image came.
You can then save these small images as files independent of the original data imagery. Furthermore, you can then recall the image in Isis without having to play back the entire data imagery that contained the selected image – or you can have Isis play back the image in the larger context of your data imagery, in case youwant to see the area surrounding the selected image.
Even if you don’t have Isis, you can still use TargetPro to view and modify a wide variety of images, including images that were created by someone else who did have Isis. Finally, you can run TargetPro from DelphMap as a utility for viewing and modifying files known to TargetPro.
1.1.2 What File Types Can TargetPro Read?
TargetPro can open (read) these file types:
Contact (TEI proprietary *.CON files)
Target (TEI proprietary *.TGT files)
ESC image (*.TIF or *.TIFF files, with Tag 270 information in them)
Pulse Code Modulation image (*.PCM, which are compressed ESC
image files)
Joint Photographic Experts Group (*.JPEG and *.JPG files)
Compuserve Portable Network Graphic (*.PNG files)
Chapter 1: Overview of the Software 1
June 2004 TargetPro™ User's Manual
Microsoft Windows Paint (*.PCX files, which support color as well as black and white)
Microsoft Windows Bitmap (*.BMP files)
Microsoft Windows Metafile (*.WMF files)
Enhanced Metafile (*.EMF files)
1.1.3 What File Types Can TargetPro Write?
TargetPro can write (save) files into many file fortmats: LEAD (1,8,24); JPEG (8,12,16,24); CALS 1-bit; Cserve PNG (1,8,24);
DICOM DIC (8,16,24); FAX (raw); EPS; EXIF; FPX (8,24); GEM 1-bit; GIF (1-8); IOCA; MODCA (Raw IOCA); Mac PICT (1,4,8,24); MacPaint 1-bit; MS FAX (AWD); MS Paint; OS/2 BMP (1,4,8,24); PCX (1,4,8,24); PSD (1,8,24); SUN Ras (1,4,8,24,32); TGA 8,16,24,32); TIF (1-8,12,16,24,32); Win BMP (1,4,8,16,24,32); Winfax; WMF (8,24); EMF (8,24); WPG (1,4,8); Win lco (1,4,8); Win Cur 1-bit.
In the preceding list, the numbers in parentheses are the number of bits supported for the named formats. Note, however, that TargetPro cannot save PCM images as PCM images; that format can only be saved in TargetPro as a non-PCM format file, such as TIFF.
1.1.4 What Formats Are Best for Exporting?
If you’re going to export an image from TargetPro and then use that image in another application, you may want to save your image in a format that offers the most support in the application that will receive the imported image. At present, the best formats for saving TargetPro images to be used in other applications are (in alphabetical order):
BMP (24-bit)
GIF (8-bit, 89a non-interlaced)
JPG (24-bit progressive)
PCX (24-bit, version5)
PSD (24-bit PhotoShop file)
TIF (24-bit)
The 24-bit formats are the only ones to support exporting the image in color. All formats other than 24-bit will be in gray scale.
Note: The 24-bit TIF and BMP file formats are lossless. This is desirable, since lossless formats retain all information even if you later compress or enlarge the image.
Chapter 1: Overview of the Software 2
June 2004 TargetPro™ User's Manual
1.2 System Requirements
You need the following:
A Pentium-class personal computer running Windows NT, Windows 2000, or Windows XP.
At least 32 MB of RAM.
A software license from Triton Elics International to use the product. (The
license comes with TargetPro when you buy it.)
A hardware dongle that has been programmed to recognize TargetPro.
A computer monitor capable of displaying true 24-bit color images
(potentially 16,777,216 colors.) You could use a monitor that supports fewer colors, but the results won’t be as good as they would be on a monitor that can support 24-bit color images. Also, so that you can see all of the application’s working area, your monitor must be set to at least:
1280 X 1024 pixels if you are using large fonts, or 1152 X 864 pixels if you are using small fonts
Before you can use TargetPro, you must install the TargetPro software using InstallShield, and you must attach a properly configured dongle to your computer to access the program.
1.3 Software Installation
Typical software installation CD will contain folders like the ones depicted in the Windows Explorer layout. (See the figure, “Typical listing of TEI software installation folders’.)
Chapter 1: Overview of the Software 3
June 2004 TargetPro™ User's Manual
Figure 1. Typical listing of TEI software installation folders.
TEI software is compatible with Windows NT 4.0, Windows 2000, and Windows XP. The following notes will help you achieve a smooth installation of the software.
Please exit from all other applications before running any of the installation programs.
You will not be able to complete the installation on an NT4.0 or Windows 2000 system if you do not have administrator’s rights. All Isis “black boxes” ship with a user name Isis. In this case the Isis user name has administrator’s rights and does not require a password.
Chapter 1: Overview of the Software 4
June 2004 TargetPro™ User's Manual
Each application is installed by browsing to the appropriate folder (for example, Isis5.50 Install) on the CD and double-clicking on the SETUP.EXE file found in that folder.
TEI recommends that if you have more than one hard drive, you install the software on the second (usually the D:) drive, using the default folder names on the CD. You will be given the option to select any drive during the setup process, select the Custom option and change the drive letter.
The first installation on an NT4.0 system requires a re-boot during the installation; however, this only occurs for the first installation. Under Windows 2000 and Windows XP, no rebooting is necessary installation process. However, you
must reboot the system after
installing under Windows NT 4.0.
For each application, a number of sample data files can be optionally installed. These files will reside in a subfolder called Demo Files within each application’s main folder. These special files can be played back or processed by the relevant TEI applications without a TEI sentinel being installed. If no sentinel (dongle) is attached, a message displays, indicating either that a sentinel was not found or that the sentinel is damaged. However, you can still play back the sample files that come from the CD.
In order to run the software in acquisition mode, or to play back or process other files, you will need a TEI sentinel attached to the LPT1 printer port. Contact TEI if you need a sentinel.
If the operating system is Windows NT 4.0 or Windows 2000, you will need to install a sentinel driver. The driver is included on the CD in the Sentinel folder; a text file, with installation instructions, is in that folder. The driver is
not required under Windows 95 or Windows 98.
In the case of Windows NT 4.0, Service Pack 5 (or higher) needs to be installed. Service Pack 5 is on the CD.
The TEI manuals that are installed with the software are in Adobe Acrobat PDF format. Acrobat Reader software (required to read the PDF files) is also on the CD.
The CD has a number of other folders containing drivers and applications that could be required; each folder has a text file with more information.
To remove the software, use the Add/Remove Programs utility in the Windows Control Panel collection of utilities.
The installations make two changes which are not restored when the programs are removed using Add/Remove Programs. They are:
during the
Chapter 1: Overview of the Software 5
June 2004 TargetPro™ User's Manual
The addition of a folder called [TEIdlls] in the Windows, Win95 or
WINNT folder, and
a modification to the PATH environment variable which adds the
[‘TEIdlls] folder to the PATH. The [TEIdlls] folder can be safely deleted after all TEI software has been removed.
1.3.1 Installing a Hardware Dongle
A hardware dongle comes with TargetPro. The dongle permits TargetPro to run after the software is installed.
To install the dongle, plug in the male end of the dongle to the female end of a serial port on your computer.
1.3.2 Installing TargetPro
Triton Elics Int ships TargetPro with a utility used to install the product for you. From the distribution medium made available to you from Triton Elics Int, find the file called install utility InstallShield. Respond to any InstallShield prompts, as may be needed; let InstallShield guide you in the installation. When InstallShield finished, the installation is complete, and TargetPro is ready to run.
setup.exe and double-click it. The system runs the
1.4 Upgrading to New Releases of Software
If you already have a version of the software that you wish to upgrade on your system you will see a dialog box inviting you to modify, repair, or remove the software you intend to install. See the figure, ‘Modify, Repair, Remove choices during installation’ for an example of this kind of dialog box.
Chapter 1: Overview of the Software 6
June 2004 TargetPro™ User's Manual
Figure 2. Modify, Repair, Remove choices during installation.
You will need to remove the old version of the software before you will be permitted to install the new version. To do so, enable the Remove button in the dialog box and click Next. You can then install the new version by rerunning setup.exe As noted above, some items are deliberately not removed during the uninstall process; doing so can cause problems. If necessary, manually delete the \TEIdlls folder, but only do this if you are going to re-install all TEI applications.
Important Note: The Windows Installer will fail to uninstall the software if the operating system has been upgraded from (for example) Windows 98 to Windows 2000 after the TEI applications were installed. If you want to upgrade your operating system, uninstall the TEI programs first, and then re-install the TEI programs after the upgrade.
Chapter 1: Overview of the Software 7
June 2004 TargetPro™ User's Manual
Chapter 2: Using TargetPro
If you’ve installed the TargetPro software and have it running, you can use it to open CON (contact) or TGT (target) fields, enhance them, and save the changed files. This chapter explains how to do that. You can then save these small images as files independent of the original data imagery. You can then recall the image in Isis without having to playback the entire data imagery that contained the selected image – or you can have Isis playback the image in the larger context of your data imagery, in case you want to see the area surrounding the selected image.
2.1 Running TargetPro
You can run TargetPro in a number of ways, shown next. Choose a convenient method.
To run TargetPro, double-click on the TargetPro icon in the Triton group (Microsoft Windows), or
From Isis, configure for TargetPro availability (Tools Target Setup…),
and then double-click the left trackball button while imagery is scrolling in an Isis waterfall window to put a contact in the TargetPro working window.
TargetPro runs and displays its initial screen (Figure 3). Moreover, if you have run TargetPro before, TargetPro remember the overall size and position of the application window as it was when you last used it.
Chapter 2: Using TargetPro 8
June 2004 TargetPro™ User's Manual
Figure 3. Initial screen (empty) after first running TargetPro.
Because you have not yet opened a file for TargetPro to display, the Main Working Area of the initial TargetPro screen, as well as any smaller child windows that may be present, are empty of information. See ‘Understanding TargetPro’s Windows’ for an explanation of the various parts of the application’s overall window.
2.2 Opening a File
As noted earlier, you can work with any file types in TargetPro:
Contact (TEI proprietary *.CON files)
Target (TEI proprietary *.TGT files)
ESC Image (*.TIF or *.TIFF files, with Tag 270 information in them)
Chapter 2: Using TargetPro 9
June 2004 TargetPro™ User's Manual
PCM Image (*.PCM, which are compressed ESC image files)
Joint Photographic Experts Group (*.JPEG and *.JPG files)
CompuServe Portable Network Graphic (*.PNG files)
Microsoft Windows Paint (*.PCX files, which support color as well as
black and white)
Microsoft Windows Bitmap (*.BMP files)
Microsoft Windows Metafile (*.WMF files)
Enhanced Metafile (*.EMF files)
Those are the only file types that can be opened in TargetPro. If your contact (CON) or target (TGT) files have been saved as digitized lines and/or polygons, then TargetPro will display them that way.
To open a file TargetPro can recognize, do any of the following:
From TargetPro’s main menu, choose FileOpen,
Press <CTRL>+<O>,
Press [Insert],
or
or
or
On the taskbar click the Open icon:
Any of those actions displays a standard Windows-based dialog box where you can specify a file to pen. A typical file opened in TargetPro looks like the sample shown in Figure 4.
Chapter 2: Using TargetPro 10
June 2004 TargetPro™ User's Manual
Figure 4. Typical file opened in TargetPro
After a file has been opened, the original list of menu items (File, Edit, Tools, View and Help) expands to include two additional menu choices: Object and Window.
2.3 Understanding TargetPro’s Windows
Initially TargetPro displays these windows and working areas:
the Pan window
the Display-Only Properties window
the main display area for viewing opened files
Chapter 2: Using TargetPro 11
June 2004 TargetPro™ User's Manual
the Cursor Status window
taskbar icons
Status Bar
In the taskbar area, all icons except for the Open icon and the About icon are grayed out and unavailable until you open a file in TargetPro. All icons are explained in “Icons on the Taskbar”.
If you double-click on any of the windows (except for the main display area), the system displays the windows’ title bars and reveals their identities (Figure 3). Note that the windows still lack information in them because you have not yet opened a file in TargetPro. The two windows (Pan and Display-Only Properties windows) are explained later on.
The Status Bar, where on-going and current status is displayed, is a narrow strip at the bottom of the TargetPro window (Figure 3).
2.3.1 Repositioning displayed child windows
To reposition a displayed child window, double-click in the child window to expose the windows title bar. Then, click in the title bar and drag the window to the new position.
To return an undocked window to its original position, double-click in the child window and the window moves back to its initial position.
All windows except the Main Display Area are child windows of TargetPro. You can close or open the child windows from the View menu listed above the Taskbar icons. The Main Display Area is not redockable (movable).
The individual windows are:
Pan Window. The black window near the upper left corner is a thumbnail
window for the currently active, opened TargetPro image, if any is present. This window is known as the Pan Window. See ‘Pan and Display-Only Properties Windows’ for more detailed information on this window.
Display-Only Properties Window. This child window contains four
independent controls for adjusting an image’s brightness, contrast, gamma,
Chapter 2: Using TargetPro 12
June 2004 TargetPro™ User's Manual
and threshold. See ‘Pan and Display-Only Properties Windows’ for more detailed information on this window.
Cursor Status Area. The rightmost area contains three panels of attribute
fields that may show information when you open a file in TargetPro, depending on the type of navigation data and other attributes that may have been present in the opened file prior to opening. Within the Cursor Status Area, information is arranged in three panels:
Cursor Panel
Target-Debris Panel (or Target – Not Classified, if your opened file is not
a target or contact type of file)
Towfish Panel
The fields in these three groups are explained in Table 1.
Status Bar. When you open a TargetPro file and that file has the active
focus, text identifying key properties of that file (such as file name, number of pixels in the x and y axes, file size, zoom level, etc.) appear here.
TABLE 1. Table One: Fields in the Cursor Status window
Parent Panel for Attributes
Cursor
Chapter 2: Using TargetPro 13
Attribute Field Name and Explanation
Date: This is the Julian date the data were recorded. Time: This is the time (hh:mm:ss) the data were recorded. Latitude: These are the degrees north or south of the equator as measured from the point of the trackball pointer when the contact was made. The heading of this field changes to Northings if the data were recorded that way. Longitude: These are the degrees east or west of the meridian as measured from the point of the trackball pointer when the contact was made. The heading of this field changes to Eastings if the data were recorded that way. Ping: The nth consecutive ping (shot) of the recorded data at the point where the trackball pointer was placed when the Target contact was created. KP: Kilometers of Pipe or Kilometer Posting. Measure of distance along a pipe or pipeline route. Range: This is the range from the towfish to the current point, either the cursor or the object being measured.
June 2004 TargetPro™ User's Manual
Distance: This is the distance between the end-points of the rubber-band line drawn from one contact to another. Pixel: This displays the x (x-axis coordinate), y (y-axis coordinate), and z data (intensity) of any pixel in the displayed image.
Target – Debris (or Target – Not Classified for non-contact files)
Latitude: Degrees north or south of the equator. This changes to Northings if the data were recorded that way Longitude: Degrees east or west of the meridian. This changes to Eastings if the data were recorded that way. Range: This is the range from the towfish to the current point, either the cursor or the object being measured. Width: Across-track distance of mensuration. Length: Along-track distance of mensuration. Height: Height is how far an object stands above the seabed. Height computation uses the length (width in across-track) of the shadow, distance of the object from the towfish, and the towfish altitude. Depth: This is the vertical distance the target is from the sea surface. Pings: Number of pings traversed by a drawn line. Also see ‘Number of Pings’. Beam W.: Width of the beam at a specific range distance. This parameter is updated with any length measurements. Also see ‘Beam Width’.
Target – Debris (or Target – Not Classified for non-contact files, cont’d)
L.Rot. (Length Rotation) Rotation angle of the length line relative to a horizontal line. Angle is computed from a horizontal line. Also see ‘Length Rotation’ on page 28. L.Adj. (Length Adjust) is the difference between the length of a line and its along-track length. In the case of a slanted line, length is derived from the vertical component of the line, and the L.Adj. measures the difference between the length of the line and the along-track length. Also see ‘Length Adjust’. W.Adj. (Width Adjust) is the difference between the length of the line and the across-track width. Also see ‘Width Adjust’. W.Rot. (Width Rotation) Rotation angle of the width line relative to a horizontal line.
Chapter 2: Using TargetPro 14
June 2004 TargetPro™ User's Manual
Towfish
Range: This is the range from the towfish to the current point, either the cursor or the object being measured. Speed: This is the towfish’s speed. Altitude: This is the vertical distance the towfish is from the seafloor at nadir. Depth: This is the vertical distance the towfish is from the sea surface. Note: altitude + depth = total water column depth
Heading: With respect to standard compass bearings, this is the direction, in decimal degrees, in which the towfish is pointed. Beam: This is the horizontal beam angle of the sidescan sonar.
2.4 Icons on the Taskbar
Immediately underneath the menu list is the TargetPro taskbar of icons. They are shown in Figures 5 and 6. Several of the icons have to do with operating the cursor, or trackball pointer in the program. Additional icons are associated with the Measurement Tool and the Zoom Tool. Tool Tips are attached to each icon, and each icon has a menu equivalent in the Tools menu.
Group One Group Two
Standard Windows Zoom and Pan Windows
Figure 5. Groups One and Two of TargetPro’s taskbar icons
Group Three Group Four
Image Management Measurement Pointer Types
Figure 6. Groups Three and Four of TargetPro’s taskbar icons.
Chapter 2: Using TargetPro 15
June 2004 TargetPro™ User's Manual
For space reasons, the icons appear in this book in two rows. In the TargetPro program, the icons are laid out in a single row. Most icons are grayed out until a contact image is opened. All icons become visible when an image is opened and as long as the Cursor Tool icon remains clicked. (The Paste icon will be grayed out if there is nothing in the Windows Clipboard.) All choices within an icon group are mutually exclusive; you can perform only one function at a time from a group. Icons in Groups Two, Three and Four are unique to TargetPro. All the icons are explained in the next few tables.
TABLE 2. Group Two: Standard Icons
Open icon. Click this to get a dialog box where you can specify a file to
open from TargetPro’s combo box. This icon is equivalent to choosing
File Open from the main menu. The equivalent keyboard shortcut is
<CTRL>+<O>
Copy icon. Click this to copy the currently displayed target contact to the Windows Clipboard. Menu equivalent: Edit Copy. The equivalent key-
board shortcut is <CTRL>+<C>
Paste icon. Click this to get a dialog box where you can choose a type of
image to paste: ESC (Electronic Still Camera images as TIFF files having the Tag 270 attribute), Generic Image, Contact File, or Target. Menu
equivalent: Edit Paste. The equivalent keyboard shortcut is
<CTRL>+<V>
Print icon. Click this to get the standard Windows Print dialog box from
which you can print the currently displayed image. Menu equivalent:
FilePrint. The equivalent keyboard shortcut is <CTRL>+<P>
About icon. Click this to see the About TargetPro information box. The
box reveals the program’s name, version number, date compiled, Copyright date, and the icon associated with the program. There is no equivalent keyboard shortcut.
Chapter 2: Using TargetPro 16
Loading...
+ 58 hidden pages