30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month| Most Downloaded in Recent Year|

Most Downloaded in Recent Month
Please wait a minute...
For Selected: Toggle Thumbnails
Synthesis of thinned linear antenna array using genetic algorithm to lower peak sidelobe level and maintain half-power beamwidth
Maksim STEPANOV, Alexey KARASEV
Journal of Systems Engineering and Electronics    2025, 36 (5): 1113-1121.   DOI: 10.23919/JSEE.2024.000134
Abstract169)   HTML12)    PDF(pc) (4540KB)(191)       Save

Thinning of antenna arrays has been a popular topic for the last several decades. With increasing computational power, this optimization task acquired a new hue. This paper suggests a genetic algorithm as an instrument for antenna array thinning. The algorithm with a deliberately chosen fitness function allows synthesizing thinned linear antenna arrays with low peak sidelobe level (SLL) while maintaining the half-power beamwidth (HPBW) of a full linear antenna array. Based on results from existing papers in the field and known approaches to antenna array thinning, a classification of thinning types is introduced. The optimal thinning type for a linear thinned antenna array is determined on the basis of a maximum attainable SLL. The effect of thinning coefficient on main directional pattern characteristics, such as peak SLL and HPBW, is discussed for a number of amplitude distributions.

Table and Figures | Reference | Related Articles | Metrics
Jamming suppression by blind source separation: from a perspective of spatial band-pass filters
Quanhua LIU, Xinran SUI, Xinliang CHEN, Zhennan LIANG, Rui ZHU
Journal of Systems Engineering and Electronics    2025, 36 (5): 1169-1176.   DOI: 10.23919/JSEE.2025.000005
Abstract102)   HTML15)    PDF(pc) (7032KB)(83)       Save

Jamming suppression is traditionally achieved through the use of spatial filters based on array signal processing theory. In order to achieve better jamming suppression performance, many studies have applied blind source separation (BSS) to jamming suppression. BSS can achieve the separation and extraction of the individual source signals from the mixed signal received by the array. This paper proposes a perspective to recognize BSS as spatial band-pass filters (SBPFs) for jamming suppression applications. The theoretical derivation indicates that the processing of mixed signals by BSS can be perceived as the application of a set of SBPFs that gate the source signals at various angles. Simulations are performed using radar jamming suppression as an example. The simulation results suggest that BSS and SBPFs produce approximately the same effects. Simulation results are consistent with theoretical derivation results.

Table and Figures | Reference | Related Articles | Metrics
DOA estimation based on sparse Bayesian learning under amplitude-phase error and position error
Yijia DONG, Yuanyuan XU, Shuai LIU, Ming JIN
Journal of Systems Engineering and Electronics    2025, 36 (5): 1122-1131.   DOI: 10.23919/JSEE.2025.000052
Abstract102)   HTML5)    PDF(pc) (5087KB)(164)       Save

Most of the existing direction of arrival (DOA) estimation algorithms are applied under the assumption that the array manifold is ideal. In practical engineering applications, the existence of non-ideal conditions such as mutual coupling between array elements, array amplitude and phase errors, and array element position errors leads to defects in the array manifold, which makes the performance of the algorithm decline rapidly or even fail. In order to solve the problem of DOA estimation in the presence of amplitude and phase errors and array element position errors, this paper introduces the first-order Taylor expansion equivalent model of the received signal under the uniform linear array from the Bayesian point of view. In the solution, the amplitude and phase error parameters and the array element position error parameters are regarded as random variables obeying the Gaussian distribution. At the same time, the expectation-maximization algorithm is used to update the probability distribution parameters, and then the two error parameters are solved alternately to obtain more accurate DOA estimation results. Finally, the effectiveness of the proposed algorithm is verified by simulation and experiment.

Table and Figures | Reference | Related Articles | Metrics
Direction finding for wideband signal and multi-target with interferometer
Bo PENG, Jikang SUN, Chao LI
Journal of Systems Engineering and Electronics    2025, 36 (5): 1132-1139.   DOI: 10.23919/JSEE.2025.000106
Abstract67)   HTML4)    PDF(pc) (7744KB)(86)       Save

According to the measurement principle of the traditional interferometer, a narrowband signal model is established and used, however, for wideband signals or multiple signals, this model is invalid. For the problems of direction finding with interferometer for wideband signals and multiple signals scene, a frequency domain phase interferometer is proposed and the concrete implementation scheme is given. The proposed method computes the phase difference in frequency domain, and finds multi-target results with judging the spectrum amplitude changing, and uses the frequency phase difference to compute the arrival angle. Theoretical analysis and simulation results show that the proposed method effectively solves the problem of the angle estimation with phase interferometer for wideband signals, and has good performance in multiple signals scene with non-overlapping spectrum or partially overlapping. In addition, the wider the signal bandwidth, the better direction finding performance of this algorithm.

Table and Figures | Reference | Related Articles | Metrics
CONTENTS
Journal of Systems Engineering and Electronics    2025, 36 (5): 0-0.  
Abstract24)      PDF(pc) (127KB)(77)       Save
Related Articles | Metrics
Learning Bayesian network parameters under new monotonic constraints#br#
Ruohai Di, Xiaoguang Gao, and Zhigao Guo
Journal of Systems Engineering and Electronics    2017, 28 (6): 1248-1255.   DOI: 10.21629/JSEE.2017.06.22
Abstract450)      PDF(pc) (453KB)(592)       Save
When the training data are insufficient, especially when only a small sample size of data is available, domain knowledge will be taken into the process of learning parameters to improve the performance of the Bayesian networks. In this paper, a new monotonic constraint model is proposed to represent a type of common domain knowledge. And then, the monotonic constraint estimation algorithm is proposed to learn the parameters with the monotonic constraint model. In order to demonstrate the superiority of the proposed algorithm, series of experiments are carried out. The experiment results show that the proposed algorithm is able to obtain more accurate parameters compared to some existing algorithms while the complexity is not the highest. 
Related Articles | Metrics
Differential evolution algorithm for hybrid flow-shop scheduling problems
Ye Xu and Ling Wang
Journal of Systems Engineering and Electronics    2011, 22 (5): 794-798.   DOI: 10.3969/j.issn.1004-4132.2011.05.011
Abstract956)      PDF(pc) (488KB)(849)       Save
Aiming at the hybrid flow-shop (HFS) scheduling that is a complex NP-hard combinatorial problem with wide engineering background, an effective algorithm based on differential evolution (DE) is proposed. By using a special encoding scheme and combining DE based evolutionary search and local search, the exploration and exploitation abilities are enhanced and well balanced for solving the HFS problems. Simulation results based on some typical problems and comparisons with some existing genetic algorithms demonstrate the proposed algorithm is effective, efficient and robust for solving the HFS problems.
Related Articles | Metrics
Analysis of auxiliary antenna array effect on performance of wideband noncooperative interference cancellation
Zheyu LI, Yaxing LI, Ze WANG, Jiaqi LIANG, Fangmin HE, Jin MENG
Journal of Systems Engineering and Electronics    2025, 36 (5): 1188-1201.   DOI: 10.23919/JSEE.2025.000007
Abstract73)   HTML2)    PDF(pc) (8929KB)(49)       Save

In wideband noncooperative interference cancellation, the reference signals obtained through auxiliary antennas are weighted to cancel with the interference signal. The correlation between the reference signal and the interference signal determines interference cancellation performance, while the auxiliary antenna array affects the correlation by influencing the amplitude and phase of the reference signals. This paper analyzes the effect of auxiliary antenna array on multiple performances of wideband noncooperative interference cancellation. Firstly, the array received signal model of wideband interference is established, and the weight vector coupled with the auxiliary antennas array manifold is solved by spectral analysis and eigen-subspace decomposition. Then, multiple performances which include cancellation resolution, grating null, wideband interference cancellation ratio (ICR), and convergence rate are quantitatively characterized with the auxiliary antenna array. It is obtained through analysis that the performances mutually restrict the auxiliary antenna array. Higher cancellation resolution requires larger array aperture, but when the number of auxiliary antennas is fixed, larger array aperture results in more grating nulls. When the auxiliary antennas are closer to the main antenna, the wideband ICR is improved, but the convergence rate is reduced. The conclusions are verified through simulation of one-dimensional uniform array and two-dimensional nonuniform array. The experiments of three arrays are compared, and the results conform well with simulation and support the theoretical analysis.

Table and Figures | Reference | Related Articles | Metrics
Study on the Hungarian algorithm for the maximum likelihood data association problem
Wang Jianguo, He Peikun & Cao Wei
Journal of Systems Engineering and Electronics    2007, 18 (1): 27-32.  
Abstract561)      PDF(pc) (236KB)(1133)       Save

A specialized Hungarian algorithm was developed here for the maximum likelihood data association problem with two implementation versions due to presence of false alarms and missed detections. The maximum likelihood data association problem is formulated as a bipartite weighted matching problem. Its duality and the optimality conditions are given. The Hungarian algorithm with its computational steps, data structure and computational complexity is presented. The two implementation versions, Hungarian forest (HF) algorithm and Hungarian tree (HT) algorithm, and their combination with the naïve auction initialization are discussed. The computational results show that HT algorithm is slightly faster than HF algorithm and they are both superior to the classic Munkres algorithm.

Related Articles | Metrics
Research on the unified robust Gaussian filters based on M-estimation
Yunlong ZUO, Xu LYU, Xiaofeng ZHANG
Journal of Systems Engineering and Electronics    2025, 36 (5): 1161-1168.   DOI: 10.23919/JSEE.2024.000116
Abstract60)   HTML2)    PDF(pc) (3903KB)(56)       Save

In this paper, the newly-derived maximum correntropy Kalman filter (MCKF) is re-derived from the M-estimation perspective, where the MCKF can be viewed as a special case of the M-estimations and the Gaussian kernel function is a special case of many robust cost functions. Based on the derivation process, a unified form for the robust Gaussian filters (RGF) based on M-estimation is proposed to suppress the outliers and non-Gaussian noise in the measurement. The RGF provides a unified form for one Gaussian filter with different cost functions and a unified form for one robust filter with different approximating methods for the involved Gaussian integrals. Simulation results show that RGF with different weighting functions and different Gaussian integral approximation methods has robust anti-jamming performance.

Table and Figures | Reference | Related Articles | Metrics
A multi target intention recognition model of drones based on transfer learning
Shichang WAN, Hao LI, Yahui HU, Xuhua WANG, Siyuan CUI
Journal of Systems Engineering and Electronics    2025, 36 (5): 1247-1258.   DOI: 10.23919/JSEE.2025.000137
Abstract72)   HTML4)    PDF(pc) (7604KB)(49)       Save

To address the issue of neglecting scenarios involving joint operations and collaborative drone swarm operations in air combat target intent recognition. This paper proposes a transfer learning-based intention prediction model for drone formation targets in air combat. This model recognizes the intentions of multiple aerial targets by extracting spatial features among the targets at each moment. Simulation results demonstrate that, compared to classical intention recognition models, the proposed model in this paper achieves higher accuracy in identifying the intentions of drone swarm targets in air combat scenarios.

Table and Figures | Reference | Related Articles | Metrics
Design of multi-band frequency selective surfaces using multi-periodicity combined elements
Lü Mingyun, Huang Minjie & Wu Zhe
Journal of Systems Engineering and Electronics    2009, 20 (4): 675-680.  
Abstract838)      PDF(pc) (325KB)(2218)       Save

Traditional multi-band frequency selective surface (FSS) approaches are hard to achieve a perfect resonance response in a wide band due to the limit of the onset grating lobe frequency determined by the array. To solve this problem, an approach of combining elements in different period to build a hybrid array is presented. The results of series of numerical simulation show that multi-periodicity combined element FSS, which are designed using this approach, usually have much weaker grating lobes than the traditional FSS. Furthermore, their frequency response can be well predicted through the properties of their member element FSS. A prediction method for estimating the degree of expected grating lobe energy loss in designing multi-band FSS using this approach is provided.

Related Articles | Metrics
Novel imaging methods of stepped frequency radar based on compressed sensing
Jihong Liu, Shaokun Xu, Xunzhang Gao, and Xiang Li
Journal of Systems Engineering and Electronics    2012, 23 (1): 47-56.   DOI: 10.1109/JSEE.2012.00007
Abstract1198)      PDF(pc) (764KB)(1113)       Save

The theory of compressed sensing (CS) provides a new chance to reduce the data acquisition time and improve the data usage factor of the stepped frequency radar system. In light of the sparsity of radar target reflectivity, two imaging methods based on CS, termed the CS-based 2D joint imaging algorithm and the CS-based 2D decoupled imaging algorithm, are proposed. These methods incorporate the coherent mixing operation into the sparse dictionary, and take random measurements in both range and azimuth directions to get high resolution radar images, thus can remarkably reduce the data rate and simplify the hardware design of the radar system while maintaining imaging quality. Experimentsfrom both simulated data and measured data in the anechoic chamber show that the proposed imaging methods can get more focused images than the traditional fast Fourier transform method. Wherein the joint algorithm has stronger robustness and can provide clearer inverse synthetic aperture radar images, while the decoupled algorithm is computationally more efficient but has slightly degraded imaging quality, which can be improved by increasing measurements or using a robuster recovery algorithm nevertheless

Related Articles | Metrics
Modified constriction particle swarm optimization algorithm
Zhe Zhang, Limin Jia, and Yong Qin
Journal of Systems Engineering and Electronics    DOI: 10.1109/JSEE.2015.00120
Fast BSC-based algorithm for near-field signal localization via uniform circular array
Xiaolong SU, Zhen LIU, Bin SUN, Yang WANG, Xin CHEN, Xiang LI
Journal of Systems Engineering and Electronics    2022, 33 (2): 269-278.   DOI: 10.23919/JSEE.2022.000028
Abstract469)   HTML67)    PDF(pc) (1412KB)(415)       Save

In this paper, we propose a beam space coversion (BSC)-based approach to achieve a single near-field signal localization under uniform circular array (UCA). By employing the centro-symmetric geometry of UCA, we apply BSC to extract the two-dimensional (2-D) angles of near-field signal in the Vandermonde form, which allows for azimuth and elevation angle estimation by utilizing the improved estimation of signal parameters via rotational invariance techniques (ESPRIT) algorithm. By substituting the calculated 2-D angles into the direction vector of near-field signal, the range parameter can be consequently obtained by the 1-D multiple signal classification (MUSIC) method. Simulations demonstrate that the proposed algorithm can achieve a single near-field signal localization, which can provide satisfactory performance and reduce computational complexity.

Table and Figures | Reference | Related Articles | Metrics
Optimization model for performance-based warranty decision of degraded systems based on improved sparrow search algorithm
Enzhi DONG, Zhonghua CHENG, Zichang LIU, Xi ZHU, Rongcai WANG, Yongsheng BAI
Journal of Systems Engineering and Electronics    2025, 36 (5): 1259-1280.   DOI: 10.23919/JSEE.2025.000135
Abstract44)   HTML4)    PDF(pc) (14187KB)(42)       Save

Performance-based warranties (PBWs) are widely used in industry and manufacturing. Given that PBW can impose financial burdens on manufacturers, rational maintenance decisions are essential for expanding profit margins. This paper proposes an optimization model for PBW decisions for systems affected by Gamma degradation processes, incorporating periodic inspection. A system performance degradation model is established. Preventive maintenance probability and corrective renewal probability models are developed to calculate expected warranty costs and system availability. A benefits function, which includes incentives, is constructed to optimize the initial and subsequent inspection intervals and preventive maintenance thresholds, thereby maximizing warranty profit. An improved sparrow search algorithm is developed to optimize the model, with a case study on large steam turbine rotor shafts. The results suggest the optimal PBW strategy involves an initial inspection interval of approximately 20 months, with subsequent intervals of about four months, and a preventive maintenance threshold of approximately 37.39 mm wear. When compared to common cost-minimization-based condition maintenance strategies and PBW strategies that do not differentiate between initial and subsequent inspection intervals, the proposed PBW strategy increases the manufacturer’s profit by 1% and 18%, respectively. Sensitivity analyses provide managerial recommendations for PBW implementation. The PBW strategy proposed in this study significantly increases manufacturers’ profits by optimizing inspection intervals and preventive maintenance thresholds, and manufacturers should focus on technological improvement in preventive maintenance and cost control to further enhance earnings.

Table and Figures | Reference | Related Articles | Metrics
Safety analysis of wheel brake system based on STAMP/STPA and Monte Carlo simulation
Jianbo HU, Lei ZHENG, Shukui XU
Journal of Systems Engineering and Electronics    2018, 29 (6): 1327-1339.   DOI: 10.21629/JSEE.2018.06.20
Abstract553)   HTML9)    PDF(pc) (895KB)(920)       Save

The wheel brake system safety is a complex problem which refers to its technical state, operating environment, human factors, etc., in aircraft landing taxiing process. Usually, professors consider system safety with traditional probability techniques based on the linear chain of events. However, it could not comprehensively analyze system safety problems, especially in operating environment, interaction of subsystems, and human factors. Thus, we consider system safety as a control problem based on the system-theoretic accident model, the processes (STAMP) model and the system theoretic process analysis (STPA) technique to compensate the deficiency of traditional techniques. Meanwhile, system safety simulation is considered as system control simulation, and Monte Carlo methods are used which consider the range of uncertain parameters and operation deviation to quantitatively study system safety influence factors in control simulation. Firstly, we construct the STAMP model and STPA feedback control loop of the wheel brake system based on the system functional requirement. Then four unsafe control actions are identified, and causes of them are analyzed. Finally, we construct the Monte Carlo simulation model to analyze different scenarios under disturbance. The results provide a basis for choosing corresponding process model variables in constructing the context table and show that appropriate brake strategies could prevent hazards in aircraft landing taxiing.

Table and Figures | Reference | Related Articles | Metrics
Hierarchical cooperative path planning method using three-dimensional velocity-obstacle strategy for multiple fixed-wing UAVs
Zhenlin ZHOU, Teng LONG, Jingliang SUN, Junzhi LI
Journal of Systems Engineering and Electronics    2025, 36 (5): 1342-1352.   DOI: 10.23919/JSEE.2025.000087
Abstract65)   HTML4)    PDF(pc) (2060KB)(39)       Save

A three-dimensional path-planning approach has been developed to coordinate multiple fixed-wing unmanned aerial vehicles (UAVs) while avoiding collisions. The hierarchical path-planning architecture that divides the path-planning process into two layers is proposed by designing the velocity-obstacle strategy for satisfying timeliness and effectiveness. The upper-level layer focuses on creating an efficient Dubins initial path considering the dynamic constraints of the fixed wing. Subsequently, the lower-level layer detects potential collisions and adjusts its flight paths to avoid collisions by using the three-dimensional velocity obstacle method, which describes the maneuvering space of collision avoidance as the intersection space of half space. To further handle the dynamic and collision-avoidance constraints, a priority mechanism is designed to ensure that the adjusted path is still feasible for fixed-wing UAVs. Simulation experiments demonstrate the effectiveness of the proposed method.

Table and Figures | Reference | Related Articles | Metrics
No-reference image quality assessment based on AdaBoost BP neural network in wavelet domain
Junhua YAN, Xuehan BAI, Wanyi ZHANG, Yongqi XIAO, Chris CHATWIN, Rupert YOUNG, Phil BIRCH
Journal of Systems Engineering and Electronics    2019, 30 (2): 223-237.   DOI: 10.21629/JSEE.2019.02.01
Abstract513)   HTML1)    PDF(pc) (5219KB)(479)       Save

Considering the relatively poor robustness of quality scores for different types of distortion and the lack of mechanism for determining distortion types, a no-reference image quality assessment (NR-IQA) method based on the AdaBoost BP neural network in the wavelet domain (WABNN) is proposed. A 36-dimensional image feature vector is constructed by extracting natural scene statistics (NSS) features and local information entropy features of the distorted image wavelet sub-band coefficients in three scales. The ABNN classifier is obtained by learning the relationship between image features and distortion types. The ABNN scorer is obtained by learning the relationship between image features and image quality scores. A series of contrast experiments are carried out in the laboratory of image and video engineering (LIVE) database and TID2013 database. Experimental results show the high accuracy of the distinguishing distortion type, the high consistency with subjective scores and the high robustness of the method for distorted images. Experiment results also show the independence of the database and the relatively high operation efficiency of this method.

Table and Figures | Reference | Related Articles | Metrics
Phase noise in mmWave OTFS system: consequences and compensation
Fuchen XU, Huiyang QU, Chengxiang LIU, Ji ZHOU, Guanghui LIU
Journal of Systems Engineering and Electronics    2025, 36 (5): 1140-1145.   DOI: 10.23919/JSEE.2025.000127
Abstract55)   HTML0)    PDF(pc) (6925KB)(46)       Save

In this paper, we study the orthogonal time frequency space signal transmission over multi-path channel in the presence of phase noise (PHN) at both sides of millimeter wave (mmWave) communication links. The statistics characteristics of the PHN-induced common phase error and inter-Doppler interference are investigated. Then, a column-shaped pilot structure is designed, and training pilots are used to realize linear-complexity PHN tracking and compensation. Numerical results demonstrate that the proposed scheme enables the signal to noise ratio loss to be restrained within 1 dB in contrast to the no PHN case.

Table and Figures | Reference | Related Articles | Metrics
A review on fission-fusion behavior in unmanned aerial vehicle swarm systems
Wenrui DING, Xiaorong ZHANG, Yufeng WANG, Qingyi LIU, Fuyuan MA
Journal of Systems Engineering and Electronics    2025, 36 (5): 1216-1234.   DOI: 10.23919/JSEE.2025.000024
Abstract44)   HTML0)    PDF(pc) (7635KB)(37)       Save

The exploration of unmanned aerial vehicle (UAV) swarm systems represents a focal point in the research of multi-agent systems, with the investigation of their fission-fusion behavior holding significant theoretical and practical value. This review systematically examines the methods for fission-fusion of UAV swarms from the perspective of multi-agent systems, encompassing the composition of UAV swarm systems and fission-fusion conditions, information interaction mechanisms, and existing fission-fusion approaches. Firstly, considering the constituent units of UAV swarms and the conditions influencing fission-fusion, this paper categorizes and introduces the UAV swarm systems. It further examines the effects and limitations of fission-fusion methods across various categories and conditions. Secondly, a comprehensive analysis of the prevalent information interaction mechanisms within UAV swarms is conducted from the perspective of information interaction structures. The advantages and limitations of various mechanisms in the context of fission-fusion behaviors are summarized and synthesized. Thirdly, this paper consolidates the existing implementation research findings related to the fission-fusion behavior of UAV swarms, identifies unresolved issues in fission-fusion research, and discusses potential solutions.Finally, the paper concludes with a comprehensive summary and systematically outlines future research opportunities.

Table and Figures | Reference | Related Articles | Metrics
Analysis and improvement of missile three-loop autopilots
Lin Defu, Fan Junfang, Qi Zaikang & Mou Yu
Journal of Systems Engineering and Electronics    2009, 20 (4): 844-851.  
Abstract1171)      PDF(pc) (2168KB)(3116)       Save

The non-minimum phase feature of tail-controlled missile airframes is analyzed. Three selection strategies for desired performance indexes are presented. An acceleration autopilot design methodology based on output feedback and optimization is proposed. Performance and robustness comparisons between the two-loop and classical three-loop topologies are made. Attempts to improve the classical three-loop topology are discussed. Despite the same open-loop structure, the classical three-loop autopilot shows distinct characteristics from a two-loop autopilot with PI compensator. Both the two-loop and three-loop topologies can stabilize a static unstable missile. However, the finite actuator resource is the crucial factor dominating autopilot function.

Related Articles | Metrics
Effective path planning method for low detectable aircraft
Wang Lingxiao & Zhou Deyun
Journal of Systems Engineering and Electronics    2009, 20 (4): 784-789.  
Abstract759)      PDF(pc) (805KB)(958)       Save

To utilizing the characteristic of radar cross section (RCS) of the low detectable aircraft, a special path planning algorithm to eluding radars by the variable RCS is presented. The algorithm first gives the RCS changing model of low detectable aircraft, then establishes a threat model of a ground-based air defense system according to the relations between RCS and the radar range coverage. By the new cost functions of the flight path, which consider both factors of the survival probability and the distance of total route, this path planning method is simulated based on the Dijkstra algorithm, and the planned route meets the flight capacity constraints. Simulation results show that using the effective path planning algorithm, the low detectable aircraft can give full play to its own advantage of stealth to achieve the purpose of silent penetration.

Related Articles | Metrics
Online midcourse guidance method for intercepting high-speed gliding target
Jinlin ZHANG, Jiong LI, Jikun YE, Humin LEI, Wanli LI, Yangchao HE
Journal of Systems Engineering and Electronics    2025, 36 (5): 1374-1388.   DOI: 10.23919/JSEE.2025.000133
Abstract49)   HTML2)    PDF(pc) (8252KB)(31)       Save

In this paper, an online midcourse guidance method for intercepting high-speed maneuvering targets is proposed. Firstly, the affine system is used to build a dynamic model and analyze the state constraints. The midcourse guidance problem is transformed into a continuous time optimization problem. Secondly, the problem is transformed into a discrete convex programming problem by affine control variable relaxation, Gaussian pseudospectral discretization and constraints linearization. Then, the off-line midcourse guidance trajectory is generated before midcourse guidance. It is used as the initial reference trajectory for online correction of midcourse guidance. An online guidance framework is used to eliminate the error caused by calculation of guidance instruction time. And the design of discrete points decreases with flight time to improve the solving efficiency. In addition, it is proposed that the terminal guidance capture is used innovatively space to judge the success of midcourse guidance. Numerical simulation shows the feasibility and effectiveness of the proposed method.

Table and Figures | Reference | Related Articles | Metrics
Complex systems and network science: a survey
Kewei YANG, Jichao LI, Maidi LIU, Tianyang LEI, Xueming XU, Hongqian WU, Jiaping CAO, Gaoxin QI
Journal of Systems Engineering and Electronics    2023, 34 (3): 543-573.   DOI: 10.23919/JSEE.2023.000080
Abstract669)   HTML29)    PDF(pc) (8641KB)(510)       Save

Complex systems widely exist in nature and human society. There are complex interactions between system elements in a complex system, and systems show complex features at the macro level, such as emergence, self-organization, uncertainty, and dynamics. These complex features make it difficult to understand the internal operation mechanism of complex systems. Networked modeling of complex systems is a favorable means of understanding complex systems. It not only represents complex interactions but also reflects essential attributes of complex systems. This paper summarizes the research progress of complex systems modeling and analysis from the perspective of network science, including networked modeling, vital node analysis, network invulnerability analysis, network disintegration analysis, resilience analysis, complex network link prediction, and the attacker-defender game in complex networks. In addition, this paper presents some points of view on the trend and focus of future research on network analysis of complex systems.

Table and Figures | Reference | Related Articles | Metrics
Adaptive resource allocation for workflow containerization on Kubernetes
Chenggang SHAN, Chuge WU, Yuanqing XIA, Zehua GUO, Danyang LIU, Jinhui ZHANG
Journal of Systems Engineering and Electronics    2023, 34 (3): 723-743.   DOI: 10.23919/JSEE.2023.000073
Abstract304)   HTML1)    PDF(pc) (7442KB)(544)       Save

In a cloud-native era, the Kubernetes-based workflow engine enables workflow containerized execution through the inherent abilities of Kubernetes. However, when encountering continuous workflow requests and unexpected resource request spikes, the engine is limited to the current workflow load information for resource allocation, which lacks the agility and predictability of resource allocation, resulting in over and under-provisioning resources. This mechanism seriously hinders workflow execution efficiency and leads to high resource waste. To overcome these drawbacks, we propose an adaptive resource allocation scheme named adaptive resource allocation scheme (ARAS) for the Kubernetes-based workflow engines. Considering potential future workflow task requests within the current task pod’s lifecycle, the ARAS uses a resource scaling strategy to allocate resources in response to high-concurrency workflow scenarios. The ARAS offers resource discovery, resource evaluation, and allocation functionalities and serves as a key component for our tailored workflow engine (KubeAdaptor). By integrating the ARAS into KubeAdaptor for workflow containerized execution, we demonstrate the practical abilities of KubeAdaptor and the advantages of our ARAS. Compared with the baseline algorithm, experimental evaluation under three distinct workflow arrival patterns shows that ARAS gains time-saving of 9.8% to 40.92% in the average total duration of all workflows, time-saving of 26.4% to 79.86% in the average duration of individual workflow, and an increase of 1% to 16% in centrol processing unit (CPU) and memory resource usage rate.

Table and Figures | Reference | Related Articles | Metrics
A survey on joint-operation application for unmanned swarm formations under a complex confrontation environment
Jialong ZHANG, Kun HAN, Pu ZHANG, Zhongxi HOU, Lei YE
Journal of Systems Engineering and Electronics    2023, 34 (6): 1432-1446.   DOI: 10.23919/JSEE.2023.000162
Abstract465)   HTML27)    PDF(pc) (4415KB)(344)       Save

With the rapid development of informatization, autonomy and intelligence, unmanned swarm formation intelligent operations will become the main combat mode of future wars. Typical unmanned swarm formations such as ground-based directed energy weapon formations, space-based kinetic energy weapon formations, and sea-based carrier-based formations have become the trump card for winning future wars. In a complex confrontation environment, these sophisticated weapon formation systems can precisely strike mobile threat group targets, making them extreme deterrents in joint combat applications. Based on this, first, this paper provides a comprehensive summary of the outstanding advantages, strategic position and combat style of unmanned clusters in joint warfare to highlight their important position in future warfare. Second, a detailed analysis of the technological breakthroughs in four key areas, situational awareness, heterogeneous coordination, mixed combat, and intelligent assessment of typical unmanned aerial vehicle (UAV) swarms in joint warfare, is presented. An in-depth analysis of the UAV swarm communication networking operating mechanism during joint warfare is provided to lay the theoretical foundation for subsequent cooperative tracking and control. Then, an in-depth analysis of the shut-in technology requirements of UAV clusters in joint warfare is provided to lay a theoretical foundation for subsequent cooperative tracking control. Finally, the technical requirements of UAV clusters in joint warfare are analysed in depth so the key technologies can form a closed-loop kill chain system and provide theoretical references for the study of intelligent command operations.

Table and Figures | Reference | Related Articles | Metrics
Time-efficient cooperative attack strategy considering collision avoidance for missile swarm
Yixin HU, Yun XU, Zhaohui DANG
Journal of Systems Engineering and Electronics    2025, 36 (5): 1306-1316.   DOI: 10.23919/JSEE.2025.000088
Abstract55)   HTML2)    PDF(pc) (4448KB)(29)       Save

In the realm of missile defense systems, the self-sufficient maneuver capacity of missile swarms is pivotal for their survival. Through the analysis of the missile dynamics model, a time-efficient cooperative attack strategy for missile swarm is proposed. Based on the distribution of the attackers and defenders, the collision avoidance against the defenders is considered during the attack process. By analyzing the geometric relationship between the relative velocity vector and relative position vector of the attackers and defenders, the collision avoidance constrains of attacking swarm are redefined. The key point is on adjusting the relative velocity vectors to fall outside the collision cone. This work facilitates high-precision attack toward the target while keeping safe missing distance between other attackers during collision avoidance process. By leveraging an innovative repulsion artificial function, a time-efficient cooperative attack strategy for missile swarm is obtained. Through rigorous simulation, the effectiveness of this cooperative attack strategy is substantiated. Furthermore, by employing Monte Carlo simulation, the success rate of the cooperative attack strategy is assessesed and the optimal configuration for the missile swarm is deduced.

Table and Figures | Reference | Related Articles | Metrics
DHSEGATs: distance and hop-wise structures encoding enhanced graph attention networks
Zhiguo HUANG
Journal of Systems Engineering and Electronics    2023, 34 (2): 350-359.   DOI: 10.23919/JSEE.2023.000057
Abstract199)   HTML0)    PDF(pc) (495KB)(198)       Save

Numerous works prove that existing neighbor-averaging graph neural networks (GNNs) cannot efficiently catch structure features, and many works show that injecting structure, distance, position, or spatial features can significantly improve the performance of GNNs, however, injecting high-level structure and distance into GNNs is an intuitive but untouched idea. This work sheds light on this issue and proposes a scheme to enhance graph attention networks (GATs) by encoding distance and hop-wise structure statistics. Firstly, the hop-wise structure and distributional distance information are extracted based on several hop-wise ego-nets of every target node. Secondly, the derived structure information, distance information, and intrinsic features are encoded into the same vector space and then added together to get initial embedding vectors. Thirdly, the derived embedding vectors are fed into GATs, such as GAT and adaptive graph diffusion network (AGDN) to get the soft labels. Fourthly, the soft labels are fed into correct and smooth (C&S) to conduct label propagation and get final predictions. Experiments show that the distance and hop-wise structures encoding enhanced graph attention networks (DHSEGATs) achieve a competitive result.

Table and Figures | Reference | Related Articles | Metrics
Widely linear UKF constant modulus algorithm for blind adaptive beamforming
Huaming Qian, Ke Liu, Long Li, Linchen Qian, and Junda Ma
Systems Engineering and Electronics    DOI: 10.21629/JSEE.2017.03.01
Method to reconnoiter pulse amplitude train for phased array radar based on Hausdorff distance#br#
Chuan Sheng, Yongshun Zhang, Wenlong Lu, and Junwei Xie
Journal of Systems Engineering and Electronics    2017, 28 (6): 1089-1097.   DOI: 10.21629/JSEE.2017.06.07
Abstract492)      PDF(pc) (1079KB)(396)       Save
This paper presents a method to estimate beam pointing of phased array radar by the pulse amplitude train, which is significant in radar electronic reconnaissance and electronic support measure. Firstly, the antenna patterns modeling of the phased array system is exploited to build the radar sweeping model and the signal propagation model. Secondly, the relationship between the variation of the radiated power and the antenna beam pointing angles in the given airspace is analyzed. Based on the above two points, the sample with obvious amplitude characteristics of the pulse amplitude train can be screened out after detecting the train peaks. Finally, the sample is matched to the subsequent pulse amplitude train based on the Hausdorff distance. The proposed methods have less prior knowledge and higher efficiency and are easier to process. By cross correlating the sample of the pulse amplitude train with the sample data of the antenna follow-up radiation, the probability of detection of the beam pointing direction becomes larger in case that the subsequent antenna beam returns to the specific position. 
Related Articles | Metrics
Diffusion mechanism simulation of cloud manufacturing complex network based on cooperative game theory
Chao GENG, Shiyou QU, Yingying XIAO, Mei WANG, Guoqiang SHI, Tingyu LIN, Junjie XUE, Zhengxuan JIA
Journal of Systems Engineering and Electronics    2018, 29 (2): 321-335.   DOI: 10.21629/JSEE.2018.02.13
Abstract441)   HTML1)    PDF(pc) (2605KB)(656)       Save

Cloud manufacturing is a specific implementation form of the "Internet + manufacturing" strategy. Why and how to develop cloud manufacturing platform (CMP), however, remains the key concern of both platform operators and users. A microscopic model is proposed to investigate advantages and diffusion forces of CMP through exploration of its diffusion process and mechanism. Specifically, a three-stage basic evolution process of CMP is innovatively proposed. Then, based on this basic process, a more complex CMP evolution model has been established in virtue of complex network theory, with five diffusion forces identified. Thereafter, simulations on CMP diffusion have been conducted. The results indicate that, CMP possesses better resource utilization, user satisfaction, and enterprise utility. Results of simulation on impacts of different diffusion forces show that both the time required for CMP to reach an equilibrium state and the final network size are affected simultaneously by the five diffusion forces. All these analyses indicate that CMP could create an open online cooperation environment and turns out to be an effective implementation of the "Internet + manufacturing" strategy.

Table and Figures | Reference | Related Articles | Metrics
Feature fusion method for edge detection of color images
Ma Yu, Gu Xiaodong & Wang Yuanyuan
Journal of Systems Engineering and Electronics    2009, 20 (2): 394-399.  
Abstract710)      PDF(pc) (418KB)(812)       Save

A novel feature fusion method is proposed for the edge detection of color images. Except for the typical features used in edge detection, the color contrast similarity and the orientation consistency are also selected as the features. The four features are combined together as a parameter to detect the edges of color images. Experimental results show that the method can inhibit noisy edges and facilitate the detection for weak edges. It has a better performance than conventional methods in noisy environments.

Related Articles | Metrics
Remaining lifetime prediction for nonlinear degradation device with random effect
Zhongyi CAI, Yunxiang CHEN, Jiansheng GUO, Qiang ZHANG, Huachun XIANG
Journal of Systems Engineering and Electronics    2018, 29 (5): 1101-1110.   DOI: 10.21629/JSEE.2018.05.20
Abstract413)   HTML1)    PDF(pc) (469KB)(427)       Save

For the large number of nonlinear degradation devices existing in a project, the existing methods have not systematically studied the effects of random effect on the remaining lifetime (RL), the accuracy and efficiency of the parameters estimation are not high, and the current degradation state of the target device is not accurately estimated. In this paper, a nonlinear Wiener degradation model with random effect is proposed and the corresponding probability density function (PDF) of the first hitting time (FHT) is deduced. A parameter estimation method based on modified expectation maximum (EM) algorithm is proposed to obtain the estimated value of fixed coefficient and the priori value of random coefficient in the model. The posterior value of the random coefficient and the current degradation state of target device are updated synchronously by the state space model (SSM) and the Kalman filter algorithm. The PDF of RL with random effect is deduced. A simulation example is analyzed to verify that the proposed method has the obvious advantage over the existing methods in parameter estimation error and RL prediction accuracy.

Table and Figures | Reference | Related Articles | Metrics
Weapons equipment portfolios selection based on equipment system contribution rates
Peng LIU, Jichao LI, Boyuan XIA, Danling ZHAO, Yuejin TAN
Journal of Systems Engineering and Electronics    2021, 32 (3): 584-595.   DOI: 10.23919/JSEE.2021.000050
Abstract222)   HTML3)    PDF(pc) (6523KB)(127)       Save

Equipment selection is an essential work in the research and development planning of equipment. The scientific and rational development of weapons equipment portfolios is of considerable significance to the optimization of equipment architecture design, the adequate resources allocation, and the joint combat performance. From the system view, this paper proposes a method of weapons equipment portfolios selection (WEPS) based on the contribution rate of weapon systems, providing a new idea for weapon equipment portfolio selection. Firstly, we analyze the WEPS problem and the concept of the contribution rate under the systems background. Secondly, we propose a combat network modeling method for weapon equipment systems based on the function chain. Thirdly, we propose a WEPS method based on the contribution rate, fully considering the correlation relationships between potential weapons and the old weapon systems by the combat network model, under the limitation of capability demands and budget resources, with the objective to maximally increasing the combat ability of weapon systems. Finally, we make a case study with a specific WEPS problem where the whole calculation processes and results are analyzed and exhibited to verify the feasibility and effectiveness of the proposed method model.

Table and Figures | Reference | Related Articles | Metrics
Dual CG-IG distribution model for sea clutter and its parameter correction method
Zhen LI, Huafeng HE, Tao ZHOU, Qi ZHANG, Xiaofei HAN, Yongquan YOU
Journal of Systems Engineering and Electronics    2025, 36 (5): 1177-1187.   DOI: 10.23919/JSEE.2025.000050
Abstract46)   HTML1)    PDF(pc) (7093KB)(28)       Save

Accurate modeling and parameter estimation of sea clutter are fundamental for effective sea surface target detection. With the improvement of radar resolution, sea clutter exhibits a pronounced heavy-tailed characteristic, rendering traditional distribution models and parameter estimation methods less effective. To address this, this paper proposes a dual compound-Gaussian model with inverse Gaussian texture (CG-IG) distribution model and combines it with an improved Adam algorithm to introduce a method for parameter correction. This method effectively fits sea clutter with heavy-tailed characteristics. Experiments with real measured sea clutter data show that the dual CG-IG distribution model, after parameter correction, accurately describes the heavy-tailed phenomenon in sea clutter amplitude distribution, and the overall mean square error of the distribution is reduced.

Table and Figures | Reference | Related Articles | Metrics
Task scheduling and virtual machine allocation policy in cloud computing environment
Xiong Fu and Yeliang Cang
Journal of Systems Engineering and Electronics    DOI: 10.1109/JSEE.2015.00092
Design of integrated radar and communication system based on MIMO-OFDM waveform
Yongjun Liu, Guisheng Liao, Zhiwei Yang, and Jingwei Xu
Systems Engineering and Electronics    DOI: 10.21629/JSEE.2017.04.06
Noise level estimation method with application to EMD-based signal denoising
Xiaoyu Li, Jing Jin, Yi Shen, and Yipeng Liu
Systems Engineering and Electronics    DOI: 10.21629/JSEE.2016.04.04
Two-channel model based adaptive schlieren detection algorithm for BOS system
Han LIU, Yanmei ZHANG, Baojun ZHAO, Haichao GUO, Boya ZHAO
Journal of Systems Engineering and Electronics    2019, 30 (2): 251-258.   DOI: 10.21629/JSEE.2019.02.04
Abstract447)   HTML2)    PDF(pc) (1008KB)(286)       Save

A schlieren detection algorithm is proposed for the ground-to-air background oriented schlieren (BOS) system to achieve high-speed airplane shock waves visualization. The proposed method consists of three steps. Firstly, image registration is incorporated for reducing errors caused by the camera motion. Then, the background subtraction dual-model single Gaussian model (BS-DSGM) is proposed to build a precise background model. The BS-DSGM could prevent the background model from being contaminated by the shock waves. Finally, the twodimensional orthogonal discrete wavelet transformation is used to extract schlieren information and averaging schlieren data. Experimental results show our proposed algorithm is able to detect the aircraft in-flight and to extract the schlieren information. The precision of schlieren detection algorithm is 0.96. Three image quality evaluation indices are chosen for quantitative analysis of the shock waves visualization. The white Gaussian noise is added in the frames to validate the robustness of the proposed algorithm. Moreover, we adopt two times and four times down sampling to simulate different imaging distances for revealing how the imaging distance affects the schlieren information in the BOS system.

Table and Figures | Reference | Related Articles | Metrics