By Topic

Systems Engineering and Electronics, Journal of

Issue 4 • Date Dec. 2007

Filter Results

Displaying Results 1 - 25 of 43
  • [Front cover]

    Page(s): c1
    Save to Project icon | PDF file iconPDF (1521 KB)  
    Freely Available from IEEE
  • Copyright page

    Page(s): 1
    Save to Project icon | PDF file iconPDF (650 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instructions for authors

    Page(s): 1
    Save to Project icon | PDF file iconPDF (1157 KB)  
    Freely Available from IEEE
  • Contents

    Page(s): 1 - 2
    Save to Project icon | PDF file iconPDF (798 KB)  
    Freely Available from IEEE
  • New multi-layer data correlation algorithm for multi-passive-sensor location system

    Page(s): 667 - 672
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1178 KB)  

    Under the scenario of dense targets in clutter, a multi-layer optimal data correlation algorithm is proposed. This algorithm eliminates a large number of false location points from the assignment process by rough correlations before we calculate the correlation cost, so it avoids the operations for the target state estimate and the calculation of the correlation cost for the false correlation sets. In the meantime, with the elimination of these points in the rough correlation, the disturbance from the false correlations in the assignment process is decreased, so the data correlation accuracy is improved correspondingly. Complexity analyses of the new multi-layer optimal algorithm and the traditional optimal assignment algorithm are given. Simulation results show that the new algorithm is feasible and effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing Ultra-wide Band indoor line-of-sight wireless channel

    Page(s): 673 - 678
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1370 KB)  

    By exploring the deterministic characteristics of the measurement data, a new propagation model with two deterministic clusters and stochastic arriving rays within each cluster is proposed. When considering the cumulative distribution function (CDF) of the three key channel statistics, the proposed model fits the measurement data better than SV /IEEE 802.15.3, a model which is known as a standard model for UWB indoor propagation channel. Therefore, with the additional knowledge of the specific environment geometry, the proposed model generating impulse responses “resemble” the measured channel impulse responses better than IEEE model. Moreover, the proposed model's parameters obtaining procedure is simplified by utilizing simple parameters of the environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of wire antennas mounted on large perfectly conducting platforms using MLFMA

    Page(s): 679 - 684
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1220 KB)  

    The electric field integral equation (EFIE) combined with the multilevel fast multipole algorithm (MLFMA) is applied to analyze the radiation and impedance properties of wire antennas mounted on complex conducting platforms to realize fast, accurate solutions. Wire, surface and junction basis functions are used to model the current distribution on the object. Application of MLFMA reduces memory requirement and computing time compared to conventional methods, such as method of moment (MOM), especially for the antenna on a large-sized platform. Generalized minimal residual (GMRES) solver with incomplete LU factorization preconditioner using a dual dropping strategy (ILUT) is applied to reduce the iterative number. Several typical numerical examples are presented to validate this algorithm and show the accuracy and computational efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation research on scattering characteristics by complex targets

    Page(s): 685 - 691
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (2076 KB)  

    A simulation approach based on a full-wave numerical method is presented to study electromagnetic characteristics by complex targets. How to validate simulation results is considered thoroughly under no analytical and measured data, where a double-check criterion is designed for our simulation approach. As an example, the scattering of F-117A is studied by using our simulation approach under all polarizations, different frequency bands, incident and scattering directions, etc., some of which, such as cross-polarization, bistatic RCS, have not been considered in the previous literature. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind channel estimation for redundant precoded OFDM systems

    Page(s): 692 - 697
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (990 KB)  

    Considering that channel estimation can play a crucial role in coherent detection of the information symbols in each data block, a blind channel estimation approach is proposed for redundant precoded orthogonal frequency-division multiplexing (OFDM) systems. A redundant linear frequency-domain precoder is applied to each pair of blocks before they enter the OFDM system. Because of the introduced structure, the frequency-selective channel can be identified at the receiver based on autocorrelation operations, singular value decomposition (SVD), and by resolving the scalar ambiguity. The proposed channel estimation method has low computational complexity and requires no prior statistical information on channel or noise. And the proposed blind method has high spectral efficiency owing to exploiting no training sequence. Computer simulations confirm that this proposed blind channel estimation method can identify the frequency-selective channels perfectly and obtain a good performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New chaos-based encryption scheme for digital sequence

    Page(s): 698 - 703
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1139 KB)  

    To enhance the anti-breaking performance of privacy information, this article proposes a new encryption method utilizing the leaping peculiarity of the periodic orbits of chaos systems. This method maps the secret sequence to several chaos periodic orbits, and a short sequence obtained by evolving the system parameters of the periodic orbits in another nonlinear system will be the key to reconstruct these periodic orbits. In the decryption end, the shadowing method of chaos trajectory based on the modified Newton-Raphson algorithm is adopted to restore these system parameters. Through deciding which orbit each pair coordinate falls on, the original digital sequence can be decrypted. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint estimation of DOA, frequency, and polarization based on cumulants and UCA

    Page(s): 704 - 709
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (962 KB)  

    A joint estimation algorithm of direction of arrival (DOA), frequency, and polarization, based on fourth-order cumulants and uniform circular array (UCA) of trimmed vector sensors is presented for narrowband non-Gaussian signals. The proposed approach, which is suitable for applications in arbitrary Gaussian noise environments, gives a closed-form representation of the estimated parameters, without spectral peak searching. An efficient method is also provided for elimination of cyclic phase ambiguities. Simulations are presented to show the performance of the algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of ultra-wideband radar signals-generated technology using two-channel signal generator

    Page(s): 710 - 715
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1040 KB)  

    Synthesis of ultra-wideband (UWB) linear frequency modulation radar signals is a very important technology for microwave imaging, target identification and detection of low radar-cross-section (RCS) targets. A new method of UWB radar signals generation with two-channel signal generator is presented. The realization structure is given; the principle and errors of signal synthesis are analyzed. At the same time, an automatic adjustment measure of signal phase is proposed because of phase discontinuity of waveform in this method. The simulation experiment and analysis results indicate that radar signals with large instantaneous bandwidth can be generated by means of this method on the condition that the high-speed digital devices are limited. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplified iterative algorithm for OFDM phase noise mitigation

    Page(s): 716 - 720
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (836 KB)  

    OFDM has been widely adopted in several communication systems. However, OFDM systems are very sensitive to the phase noise, which causes the CPE (common phase error) and ICI (inter-carrier interference), and thus degrades the system performance significantly. Based on the IEEE 802.11a standard, a simplified iterative phase noise mitigation algorithm is proposed. The proposed algorithm has very low complexity, and requires no additional pilot information. The simulation result shows that good BER performance can be achieved through several few times of iteration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of continuous long slot leaky-wave antenna for millimeter wave application

    Page(s): 721 - 725
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (768 KB)  

    A simple and efficient design scheme of the continuous long slot leaky-wave antenna is developed. The key steps involved in the scheme are summarized. First, the cut-off frequencies of slot waveguides with different slot offsets are obtained by 3D finite-difference time-domain (FDTD) method. Second, the attenuation function αra is estimated by the aperture distribution, and the attenuation function αrs is determined by the slot radiation. Finally, the attenuation function αra is combined with the attenuation function αrs by the coefficient K. And an example in Ka band is presented. Moreover, the return loss of the E-plane Tee-junction (ET) and the radiation pattern of leaky-wave antenna are simulated. The scheme is verified by comparing with the experimental result. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New hybridization of PO, SBR, and MoM for scattering by large complex conducting objects

    Page(s): 726 - 730
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1204 KB)  

    As a marked extension of the traditional MoM-PO (method of moment-physical optics) hybrid method, a new hybridization of PO, SBR, and MoM (MoM-SBR/PO) is presented to calculate the multi-reflection contribution in the PO region efficiently by introducing the method of SBR based on RDN notion, which avoids the time-consuming iterative procedure and the choice of proper Green's function. As compared with the traditional MoM-PO hybrid method, the calculation efficiency of the proposed method is greatly improved, and its validity is verified by numerical results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Utility function based fair data scheduling algorithm for OFDM wireless network

    Page(s): 731 - 738
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1455 KB)  

    A system model is formulated as the maximization of a total utility function to achieve fair downlink data scheduling in multiuser orthogonal frequency division multiplexing (OFDM) wireless networks. A dynamic subcarrier allocation algorithm (DSAA) is proposed, to optimize the system model. The subcarrier allocation decision is made by the proposed DSAA according to the maximum value of total utility function with respect to the queue mean waiting time. Simulation results demonstrate that compared to the conventional algorithms, the proposed algorithm has better delay performance and can provide fairness under different loads by using different utility functions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of detection threshold in multiple ship target situations with HF ground wave radar

    Page(s): 739 - 744
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1140 KB)  

    A credible method of calculating the detection threshold is presented for the multiple target situations, which appear frequently in the lower Doppler velocity region during the surveillance of sea with HF ground wave radar. This method defines a whole-peak-outlier elimination (WPOE) criterion, which is based on in-peak-samples correlation of each target echo spectra, to trim off the target signals and abnormal disturbances with great amplitude from the complex spectra. Therefore, cleaned background noise samples are obtained to improve the accuracy and reliability of noise level estimation. When the background noise is nonhomogeneous, the detection samples are limited and often occupied heavily with outliers. In this case, the problem that the detection threshold is overvalued can be solved. In applications on experimental data, it is verified that this method can reduce the miss alarm rate of signal detection effectively in multiple target situations as well as make the adaptability of the detector better. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scale transform algorithm used in FMCW SAR data processing

    Page(s): 745 - 750
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1138 KB)  

    The frequency-modulated continuous-wave (FMCW) synthetic aperture radar (SAR) is a light-weight, cost-effective, high-resolution imaging radar, which is suitable for a small flight platform. The signal model is derived for FMCW SAR used in unmanned aerial vehicles (UAV) reconnaissance and remote sensing. An appropriate algorithm is proposed. The algorithm performs the range cell migration correction (RCM C) for continuous nonchirped raw data using the energy invariance of the scaling of a signal in the scale domain. The azimuth processing is based on step transform without geometric resampling operation. The complete derivation of the algorithm is presented. The algorithm performance is shown by simulation results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantified simulation research on harmonious factors in the leadership teams of aerospace enterprise group

    Page(s): 751 - 757
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1853 KB)  

    A brief account of basic connotation and evaluation indexes system of harmonious leadership teams is given. On this basis, a simulation model is built by using the ARENA simulation software and the quantified simulation is carried out for the factors of harmonization of aerospace enterprise leadership teams. Moreover, by taking the characteristics of aerospace enterprise leadership teams into consideration, the comparison of harmonization quantified results of several typical leadership teams, especially on the comparative analysis of influencing degrees of moral characters and capabilities on the leadership teams overall harmonization is emphatically discussed. Finally, a conclusion is drawn. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decentralized and overall condition monitoring system for large-scale mobile and complex equipment

    Page(s): 758 - 763
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1275 KB)  

    It is an urgent project to realize online and overall condition monitoring and timely fault diagnosis for large-scale mobile and complex equipment. Moreover, most of the existing large-scale complex equipment has quite insufficient accessibility of examination, although it still has quite a long service life. The decentralized and overall condition monitoring, as a new concept, is proposed from the point of view of the whole system. A set of complex equipment is divided into several parts in terms of concrete equipment. Every part is processed via one detecting unit, and the main detecting unit is connected with other units. The management work and communications with the remote monitoring center have been taken on by it. Consequently, the difficulty of realizing a condition monitoring system and the complexity of processing information is reduced greatly. Furthermore, excellent maintainability of the condition monitoring system is obtained because of the modularization design. Through an application example, the design and realization of the decentralized and overall condition monitoring system is introduced specifically. Some advanced technologies, such as, micro control unit (MCU), advanced RISC machines (ARM), and control area network (CAN), have been adopted in the system. The system's applicability for the existing large-scale mobile and complex equipment is tested. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • F-generation law and recognition of system law

    Page(s): 764 - 768
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (914 KB)  

    If a system is not disturbed (or invaded) by some law, there is no doubt that each system will move according to the expected law and keep stable. Although such a fact often appears, some unknown law breaks into the system and leads it into turbulence. Using function one direction S-rough sets, this article gives the concept of the F-generation law in the system, the generation model of the F-generation law and the recognition method of the system law. Function one direction singular rough sets is a new theory and method in recognizing the disturbance law existing in the system and recognizing the system law. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SVR mathematical model and methods for sale prediction

    Page(s): 769 - 773
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (883 KB)  

    Sale prediction plays a significant role in business management. By using support vector machine Regression (∊-SVR), a method using to predict sale is illustrated. It takes historical data and current context data as inputs and presents results, i.e. sale tendency in the future and the forecasting sales, according to the user's specification of accuracy and time cycles. Some practical data experiments and the comparative tests with other algorithms show the advantages of the proposed approach in computation time and correctness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel combinatorial algorithm for the problems of fuzzy grey multi-attribute group decision making

    Page(s): 774 - 780
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1231 KB)  

    To study the fuzzy and grey information in the problems of multi-attribute group decision making, the basic concepts of both fuzzy grey numbers and grey interval numbers are given firstly, then a new model of fuzzy grey multi-attribute group decision making based on the theories of fuzzy mathematics and grey system is presented. Furthermore, the grey interval relative degree and deviation degree is defined, and both the optimistic algorithm of the grey interval relational degree and the algorithm of deviation degree minimization for solving this new model are also given. Finally, a decision making example to demonstrate the feasibility and rationality of this new method is given, and the results by using these two algorithms are uniform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis method on shoot precision of weapon in small-sample case

    Page(s): 781 - 784
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (528 KB)  

    Because of limits of cost, in general, the test data of weapons are shortness. It is always an important topic that to gain scientific results of weapon performance analyses in small-sample case. Based on the analysis of distribution function characteristics and grey mathematics, a weighting grey method in small-sample case is presented. According to the analysis of test data of a weapon, it is proved that the method is a good method to deal with data in the small-sample case and has a high value in the analysis of weapon performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent cooperative intrusion response in mobile adhoc networks

    Page(s): 785 - 794
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1960 KB)  

    The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Journal of Systems Engineering and Electronics reports the latest developments and achievements in both theoretical and practical aspects of systems engineering, electronics and related research areas.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Professor Rong Shi
Journal of Systems Engineering and Electronics