By Topic

Systems Engineering and Electronics, Journal of

Issue 3 • Date Sept. 2005

Filter Results

Displaying Results 1 - 25 of 46
  • [Front cover]

    Publication Year: 2005 , Page(s): c1
    Save to Project icon | PDF file iconPDF (70 KB)  
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2005 , Page(s): 1
    Save to Project icon | PDF file iconPDF (198 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contents

    Publication Year: 2005 , Page(s): 1 - 2
    Save to Project icon | PDF file iconPDF (434 KB)  
    Freely Available from IEEE
  • Modulation classification based on spectrogram

    Publication Year: 2005 , Page(s): 475 - 488
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (2804 KB)  

    The aim of modulation classification (MC) is to identify the modulation type of a communication signal. It plays an important role in many cooperative or noncooperative communication applications. Three spectrogram-based modulation classification methods are proposed. Their recognition scope and performance are investigated or evaluated by theoretical analysis and extensive simulation studies. The method taking moment-like features is robust to frequency offset while the other two, which make use of principal component analysis (PCA) with different transformation inputs, can achieve satisfactory accuracy even at low SNR (as low as 2 dB). Due to the properties of spectrogram, the statistical pattern recognition techniques, and the image preprocessing steps, all of our methods are insensitive to unknown phase and frequency offsets, timing errors, and the arriving sequence of symbols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on data association algorithm of multi-passive-sensor location system

    Publication Year: 2005 , Page(s): 489 - 493
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (823 KB)  

    Aiming at three-passive-sensor location system, a generalized 3-dimension (3-D) assignment model is constructed based on property information, and a multi-target programming model is proposed based on direction-finding and property fusion information. The multi-target programming model is transformed into a single target programming problem to resolve, and its data association result is compared with the results which are solved by using one kind of information only. Simulation experiments show the effectiveness of the multi-target programming algorithm with higher data association accuracy and less calculation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model classification rate control algorithm for video coding

    Publication Year: 2005 , Page(s): 494 - 497
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (718 KB)  

    A model classification rate control method for video coding is proposed. The macro-blocks are classified according to their prediction errors, and different parameters are used in the rate-quantization and distortion-quantization model. The different model parameters are calculated from the previous frame of the same type in the process of coding. These models are used to estimate the relations among rate, distortion and quantization of the current frame. Further steps, such as R-D optimization based quantization adjustment and smoothing of quantization of adjacent macroblocks, are used to improve the quality. The results of the experiments prove that the technique is effective and can be realized easily. The method presented in the paper can be a good way for MPEG and H. 264 rate control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural blind beamformer for cyclostationary signals

    Publication Year: 2005 , Page(s): 498 - 501
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (704 KB)  

    A blind beamforming algorithm based on a neural network is presented according to the characteristic of cyclostationary signals. This method transforms the question of estimating beamformer weight vectors into the one of computing the SVD of the cross correlation matrix of array input signals and their frequency shift signals. A cross correlation neural network is introduced to compute the SVD of the cross correlation matrix so as to reduce the computational complexity and carry out the blind beamforming more efficiently. The improved cross-coupled Hebbian learning rule presented can make the weights of the neural network converge much fast. Therefore, it is more promising in the practical use. This method can restrain noise and interference. Simulation proves its correctness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High performance reconfigurable hardware system for real-time image processing

    Publication Year: 2005 , Page(s): 502 - 509
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1695 KB)  

    A novel reconfigurable hardware system which uses both multi-DSP and FPGA to attain high performance and real-time image processing are presented. The system structure and working principle of mainly processing multi-DSP board, extended multi-DSP board are analysed. The outstanding advantage is that the communication among different board components of this system is supported by high speed link ports & serial ports for increasing the system performance and computational power. Then the implementation of embedded real-time operating systems (RTOS) by us is discussed in detail. In this system, we adopt two kinds of parallel structures controlled by RTOS for parallel processing of algorithms. The experimental results show that exploitive period of the system is short, and maintenance convenient. Thus it is suitable for real-time image processing and can get satisfactory effect of image recognition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic algorithm-based wide-band deterministic maximum likelihood direction finding algorithm

    Publication Year: 2005 , Page(s): 510 - 514
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (910 KB)  

    The wide-band direction finding is one of hit and difficult task in array signal processing. This paper generalizes narrow-band deterministic maximum likelihood direction finding algorithm to the wideband case, and so constructions an object function, then utilizes genetic algorithm for nonlinear global optimization. Direction of arrival is estimated without preprocessing of array data and so the algorithm eliminates the effect of pre-estimate on the final estimation. The algorithm is applied on uniform linear array and extensive simulation results prove the efficacy of the algorithm. In the process of simulation, we obtain the relation between estimation error and parameters of genetic algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New method of improving the security of the hyperchaotic cryptosystem

    Publication Year: 2005 , Page(s): 515 - 520
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (933 KB)  

    In chaotic cryptosystems, using (very) high dimensional chaotic attractors for encrypting a given message maybe can improve the privacy of chaotic encoding. A kind of hyperchaotic systems are studied by using some classical methods. The results show that for improving the security of the chaotic cryptosystems, besides the high dimension, the sub-Nyquist sampling interval (SI) is also necessary. Then, we verify this result using the methods of time series analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Region-based multisensorimage fusion method

    Publication Year: 2005 , Page(s): 521 - 526
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (3980 KB)  

    Image fusion should consider the priori knowledge of the source images to be fused, such as the characteristics of the images and the goal of image fusion, that is to say, the knowledge about the input data and the application plays a crucial role. This paper is concerned on multiresolution (MR) image fusion. Considering the characteristics of the multisensor (SAR and FLIR etc) and the goal of fusion, which is to achieve one image in possession of the contours feature and the target region feature. It seems more meaningful to combine features rather than pixels. A multisensor image fusion scheme based on K-means cluster and steerable pyramid is presented. K-means cluster is used to segment out objects in FLIR images. The steerable pyramid is a multiresolution analysis method, which has a good property to extract contours information at different scales. Comparisons are made with the relevant existing techniques in the literature. The paper concludes with some examples to illustrate the efficiency of the proposed scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of phase randomly distributed weak transient signal using chaos

    Publication Year: 2005 , Page(s): 527 - 532
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1336 KB)  

    In practical communication and radar systems, the phase of the received signal is random, the arrival time is unknown, the lasting time is limited and the SNR is often very low. In order to realize the detection of the signal, the method of using a group of nonlinear differential equations is presented. The theory of this chaos-based detection is analyzed. Computer simulation indicates that the shortest lasting time of the transient signal that can be detected out is 12 periods, the detection error of arrival time is less than 7/8 signal's period, the detection characteristics are got using Monte-Carlo simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel block-matching algorithms by subsampling both search candidates and pixels

    Publication Year: 2005 , Page(s): 533 - 537
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (987 KB)  

    A new faster block-matching algorithm (BMA) by using both search candidate and pixel subsampling is proposed. Firstly a pixel-subsampling approach used in adjustable partial distortion search (APDS) is adjusted to visit about half points of all search candidates by subsampling them, using a spiral-scanning path with one skip. Two selected candidates that have minimal and second minimal block distortion measures are obtained. Then a fine-tune step is taken around them to find the best one. Some analyses are given to approve the rationality of the approach of this paper. Experimental results show that, as compared to APDS, the proposed algorithm can enhance the block-matching speed by about 30; while rnaintaining its MSE performance very close to that of it. And it performs much better than many other BMAs such as TSS, NTSS, UCDBS and NPDS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of sensor allocation algorithm based on covariance control

    Publication Year: 2005 , Page(s): 538 - 544
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1402 KB)  

    The covariance control capability of sensor allocation algorithms based on covariance control strategy is an important index to evaluate the performance of these algorithms. Owing to lack of standard performance metric indices to evaluate covariance control capability, sensor allocation ratio, etc, there are no guides to follow in the design procedure of sensor allocation algorithm in practical applications. To meet these demands, three quantified performance metric indices are presented, which are average covariance misadjustment quantity (ACMQ), average sensor allocation ratio (ASAR) and matrix metric influence factor (MMIF), where ACMQ, ASAR and MMIF quantify the covariance control capability, the usage of sensor resources and the robustness of sensor allocation algorithm, respectively. Meanwhile, a covariance adaptive sensor allocation algorithm based on a new objective function is proposed to improve the covariance control capability of the algorithm based on information gain. The experiment results show that the proposed algorithm have the advantage over the preceding sensor allocation algorithm in covariance control capability and robustness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian target tracking based on particle filter

    Publication Year: 2005 , Page(s): 545 - 549
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (874 KB)  

    For being able to deal with the nonlinear or non-Gaussian problems, particle filters have been studied by many researchers. Based on particle filter, the extended Kalman filter (EKF) proposal function is applied to Bayesian target tracking. Markov chain Monte Carlo (MCMC) method, the resampling step, etc novel techniques are also introduced into Bayesian target tracking. And the simulation results confirm the improved particle filter with these techniques outperforms the basic one. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithm of communication network reliabilit-combining links, nodes and capacity

    Publication Year: 2005 , Page(s): 550 - 556
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1280 KB)  

    The conception of the normalized reliability index weighted by capacity is introduced, which combing the communication capacity, the reliability probability of exchange nodes and the reliability probability of the transmission links, in order to estimate the reliability performance of communication network comprehensively and objectively. To realize the full algebraic calculation, the key problem should be resolved, which is to find an algorithm to calculate all the routes between nodes of a network. A kind of logic algebraic algorithm of network routes is studied and based on this algorithm, the full algebraic algorithm of normalized reliability index weighted by capacity is studied. For this algorithm, it is easy to design program and the calculation of reliability index is finished, which is the foundation of the comprehensive and objective estimation of communication networks. The calculation procedure of the algorithm is introduced through typical examples and the results verify the algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2-D minimum fuzzy entropy method of image thresholding based on genetic algorithm

    Publication Year: 2005 , Page(s): 557 - 560
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1311 KB)  

    A new image thresholding method is introduced, which is based on 2-D histgram and minimizing the measures of fuzziness of an input image. A new definition of fuzzy membership function is proposed, it denotes the characteristic relationship between the gray level of each pixel and the average value of its neighborhood. When the threshold is not located at the obvious and deep valley of the histgram, genetic algorithm is devoted to the problem of selecting the appropriate threshold value. The experimental results indicate that the proposed method has good performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TOA estimation algorithm based on multi-search

    Publication Year: 2005 , Page(s): 561 - 565
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (879 KB)  

    A new time of arrival (TOA) estimation algorithm is proposed. The algorithm computes the optimal sub-correlation length based on the SNR theory. So the robust of TOA acquirement is guaranteed very well. Then, according to the actual transmission environment and network system, the multi-search method is given. From the simulation result, the algorithm shows a very high application value in the realization of wireless location system (WLS). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing global view with an ontology-based method for information sharing in the virtual organization

    Publication Year: 2005 , Page(s): 566 - 573
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1667 KB)  

    The problem of constructing global view of heterogeneous information sources for information sharing is becoming more and more important due to the availability of multiple information sources within the virtual organization. Global view is defined to provide a unified representation of the information in the different sources by analyzing concept schemas associated with them and resolving possible semantic heterogeneity. An ontology-based method for global view construction is proposed. In the method, (1) Based on the formal ontologies, the concept of semantic affinity is introduced to assess the level of semantic relationship between information classes from different information sources; (2) Information classes are classified by semantic affinity levels using clustering procedures so that their different representations can be analyzed for unification; (3) Global view is constructed starting from selected clusters by unifying representation of their elements. The application example of using the method in the joint-aerial defense organization is illustrated and the result shows that the proposed method is feasible. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the conceptual design schemes of complex products based on FAHP using fuzzy number

    Publication Year: 2005 , Page(s): 574 - 578
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (777 KB)  

    In the conceptual design stage of complex products, CBR(Case-Based Reasoning) tool is useful to offer a feasible set of schemes. Then the most adaptive scheme can be generated through a procedure of comparison and evaluation. The procedure is essentially a multiple criteria decision-making problem. The traditional multiple criteria programming is not flexible enough in executing the system evaluation algorithm due to both the limited experimental data and the lack of human experiences. To make the CBR tool to be more efficient, a new method for the best choice among the feasible schemes based on the Fuzzy AHP using Fuzzy numbers (FFAHP) is proposed. Since the final results become a problem of ranking the mean of fuzzy numbers by the optimism of decision-maker using the FFAHP, its execution is much more intuitive and effective than with the traditional method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on information utility

    Publication Year: 2005 , Page(s): 579 - 582
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (793 KB)  

    Information has two aspects. One aspect is the objective one; another aspect is the subjective one. Shannon has discussed the objective aspect of information in information theory. But the subjective aspect of information has not been fully discussed. Someone use “Bayesian approaches” to evaluate the value of information. But in some cases it does not meet the information user's need. This paper is focus on the subjective aspect of objectively measurable information and gives formal definitions for information, information utility, and marginal information utility, normalized calculation of information utility. The information discussed in the paper has interdisciplinary nature. This work can be the foundation of many application areas. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the control course of ANFIS based aircraft auto-landing

    Publication Year: 2005 , Page(s): 583 - 587
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1175 KB)  

    The control model in the course of an aircraft auto-landing is first proposed. Then, the common basic hypotheses in the design of a fuzzy logic controller are described. The fuzzy inference system of an aircraft auto-landing fuzzy controller in the course of automatic control on landing is investigated. The auto-landing model for controlling, membership functions of state variables, inference rules in the system, algorithms for fuzzy inference and defuzzification, etc, are analyzed and devised in detail with the emphasis on optimal analysis and design of Takagi-Sugeno ALPC based on adaptive neural fuzzy inference systems. Finally, the simulation for verification and analysis of the designed schemes is made by utilizing Simulink and fuzzy logic toolbox with MATLAB. The simulated results show that the ANFIS based T-S type ALFC scheme has excellent behavior in performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability analysis of extended discrete-time, BAM neural networks based on LMI approach

    Publication Year: 2005 , Page(s): 588 - 594
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1133 KB)  

    We propose a new approach for analyzing the global asymptotic stability of the extended discrete-time bidirectional associative memory (BAM) neural networks. By using the Euler rule, we discretize the continuous-time BAM neural networks as the extended discrete-time BAM neural networks with non-threshold activation functions. Here we present some conditions under which the neural networks have unique equilibrium points. To judge the global asymptotic stability of the equilibrium points, we introduce a new neural network model — standard neural network model (SNNM). For the SNNMs, we derive the sufficient conditions for the global asymptotic stability of the equilibrium points, which are formulated as some linear matrix inequalities (LMIs). We transform the discrete-time BAM into the SNNM and apply the general result about the SNNM to the determination of global asymptotic stability of the discrete-time BAM. The approach proposed extends the known stability results, has lower conservativeness, can be verified easily, and can also be applied to other forms of recurrent neural networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global stabilization of nonlinear systems with uncertain structure

    Publication Year: 2005 , Page(s): 595 - 599
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (708 KB)  

    The global stabilization problem of nonlinear systems with uncertain structure is dealt with. Based on control Lyapunov function (CLF), a sufficient and necessary condition for Lyapunov stabilization is given. From the condition, several simply sufficient conditions for the globally asymptotical stability are deduced. A state feedback control law is designed to globally asymptotically stabilize the equilibrium of the closed system. Last, a simulation shows the effectiveness of the method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic algorithm combined with immune mechanism and its application in skill fuzzy control

    Publication Year: 2005 , Page(s): 600 - 605
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1191 KB)  

    Automation of skill fuzzy control system is an important research aspect of fuzzy control fields. It's significant for those control instances consisted in production and people's daily life. But, how to control a system not movement or behavior rules but only relied on movement parameters, that problem still had not be resolved. This paper proposes a new method used a genetic algorithm based on immune mechanism to learn the degree of membership, at same time, simplifying the corresponding movement equation; its efficiency will be indicated by an example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Journal of Systems Engineering and Electronics reports the latest developments and achievements in both theoretical and practical aspects of systems engineering, electronics and related research areas.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Professor Rong Shi
Journal of Systems Engineering and Electronics