Skip to main content

Distinguished Lecturer Program

You are here

All AESS Chapters and IEEE Sections are encouraged to take advantage of the AESS Distinguished Lecturer and Tutorial Program for their regular or special meetings, that allows them to select from an outstanding list of truly distinguished speakers who are experts in the technical fields of the society. The AES Society will pay reasonable speaker’s expenses for economy-class travel, lodging and meals, with the inviting IEEE organization expected to cover 50% of the speaker's expenses. As a general guideline, speaker’s expenses involving travel wholly within North America or within the European Union can be approved to be covered up to $1,000 USD. Expenses involving extensive international travel can be approved to be covered up to $2,000 USD. The Society encourages arrangements whereby more than one lecture is presented in a single trip, and costs in such situations will be considered on a case by case basis.

Non-IEEE entities (such as universities, research organizations, and companies) are also eligible to contact speakers directly. If a speaker agrees to give the non-IEEE lecture on a particular date and location, the inviting organization is required to pay 100% of the speaker's expenses as mutually agreed between the speaker and the organization. While the AESS has no responsibilities for any arrangements or costs regarding the lecture, speakers should keep the VP Education advised of their Distinguished Lectures.

The procedure for obtaining a speaker is as follows: If a Chapter or Section has an interest in inviting one of the speakers, it should first contact the speaker directly in order to obtain his or her agreement to give the lecture on a particular date. After this is accomplished, the Chapter or Section must notify the AESS VP for Education by sending in a DL Request Form. If financial support from the AESS is required for the speaker’s expenses, he or she must submit an estimate to the AESS VP for Education before actually incurring any expenses. This estimate must be provided at least 45 days before the planned meeting to provide time for feedback from the VP for Education and for changes if needed. The VP for Education must provide written authorization to proceed.

Distinguished Lecturers and Tutorial speakers are ambassadors of the AESS, who serve as an important demonstration of the value of membership in IEEE and AESS in particular. A short presentation on the benefits of Society membership is available and included in each Distinguished Lecture presentation. Speakers should contact Judy Scharmann well in advance of each lecture to arrange for shipping AESS and IEEE Membership brochures and copies of society publications to hand out.

Following the lecture, the speaker and/or host are asked to prepare a short report suitable for publication and posting on the AESS web site. Pictures taken at the meeting are highly desirable.

List of Distinguished Lecturers:

Onboard Adjustable Learning Rates for Autonomous Space Vehicle Proximity Operations

The lack of adequate on-orbit verification protocols presents a formidable obstacle blocking the broader embrace of autonomy within many space missions.  In this lecture, we review some recent advances in nonlinear stability theory and robust adaptive control that involve immersion and invariance approaches. These technical foundations are strongly motivated by growing numbers of aerospace engineering applications that are currently addressing the critical need for autonomous (and semiautonomous) control systems with agile maneuvering and robust perception inside dynamic, complex and uncertain environments. Specifically, these new state-estimation and control design tools involve the construction of auxiliary filters (state-space augmentation) for dynamically adjusting the “rate of adaptation” - ultimately leading to some strong convergence properties and robustness features. The lecture will focus upon space robot manipulators and proximity operation applications under the framework of large-scale model uncertainties and non-negligible time-delays due to network-based control implementations. The lecturer concludes with a brief discussion of broader astrodynamics applications that include spacecraft motion control within arbitrary potential fields. 

Target Tracking and Data Fusion: How to Get the Most Out of Your Sensors

This talk describes the evolution of the technology of tracking objects of interest (targets) in a cluttered environment using remote sensors. Approaches for handling target maneuvers (unpredictable motion) and false measurements (clutter) are discussed. Advanced ("intelligent") techniques with moderate complexity are described. The emphasis is on algorithms which model the environment and the scenarios of interest in a realistic manner and have the ability to track low observable (LO) targets. The various architectures of information processing for multi-sensor data fusion are discussed. Applications are presented from Air Traffic Control (data fusion from 5 FAA radars for 800 targets) and underwater surveillance for a LO target.

Overview of High-Level Information Fusion Theory, Models, and Representations

The High-Level Information Fusion (HLIF) lecture describes the developments over the past decade on concepts, papers, needs, and grand challenges for practical system designs. This lecture brings together the contemporary concepts, models, and definitions to give the attendee a summary of the state-of-the-art in HLIF research (e.g., situation awareness and interface design between manmachine information fusion systems). Analogies from low-level information fusion (LLIF) of object tracking and identification are extended to the HLIF concepts of situation/impact assessment and process/user refinement.  HLIF theories (operational, functional, formal, cognitive) are mapped to representations (semantics, ontologies, axiomatics, and agents) with contemporary issues of modeling, testbeds, evaluation, and human-machine interfaces. Discussions with examples of search and rescue, cyber analysis, and surveillance are presented. The attendee will gain an appreciation of HLIF through the topic organization from the perspectives of numerous authors, practitioners, and developers of information fusion systems. The lecture is organized as per the recent text:  E. P. Blasch, E. Bosse, and D. A. Lambert, Information Fusion Theory and Representations, Artech House, April 2012, of (1) HLIF theories (2) HLIF representations in information fusion testbeds, and (3) HLIF supporting elements of humansystem interaction, scenario-based design, and HLIF evaluation.

Fundamentals of Inertial Aiding

 Navigation-grade inertial systems are characterized by so-called “free inertial” position error drift rates on the order of one nautical mile-per-hour of operation.  Such performance implies a certain class of gyros and accelerometers and thus certain specifications on biases, scale factor errors and noise.  For more than five decades, the Kalman filter has been the primary tool used to reduce inertial drift through the integration of various sensors.  Specifically, the aiding sources (e.g., stellar, Doppler, GPS, etc) are used by the filter to estimate the errors in the free inertial processing.  Thus, the heart of any aided-inertial Kalman filter is the inertial error model including, specifically, sensor errors.  We will discuss these models and will proceed to explain how aiding source observations are then used by the filter, in conjunction with the models, to estimate the inertial errors.  For example, a given aiding source may provide an independent measurement of position, yet somehow the filter is able to use this in order to estimate gyro biases in the inertial system. The daunting matrix mathematics involved in the full algorithm can be extremely intimidating to the newcomer.  In this lecture, the basic concepts of estimation theory will be briefly reviewed and the Kalman Filter will be described first in terms of simple one-dimensional problems for which the full algorithm reduces to an approachable set of scalar equations.  We will look at the performance of the filter in some simple case studies and by the end will have an intuitive feel for how the full filter operates.  We will then apply the Kalman filter to the aiding of inertial systems.  We will see how external sources of position and velocity (such as GPS) can be used first to measure inertial system error and then, with the aid of the Kalman filter, to estimate and correct inertial sensor error as well as system error.  

Fundamentals of Inertial Navigation

Inertial navigation systems (INS) are modern technologically sophisticated implementations of the age-old concept of dead reckoning.  The basic philosophy is to begin with a knowledge of initial position, keep track of speed and direction, and thus be able to determine position continually as time progresses.  Perhaps surprisingly, the rise of GNSS has actually expanded the need for inertial-based systems.  Accelerometers and gyroscopes are the basic sensors utilized and since INS are essentially self-contained, they do not suffer from interference or unavailability that can affect radio-based systems such as GNSS.  Furthermore, INS are highly complementary to GNSS since they provide high data rates, low data latencies and attitude-determination along with position and velocity.  This lecture will start by highlighting the basic principles of operation of an inertial navigation system.  We will focus initially on the concepts underlying the algorithms used to determine position, velocity and attitude from inertial sensor measurements.  Key error characteristics will then be described as well such as the Schuler oscillation and vertical channel instability.  We will also consider the impact of various sensor errors on system performance.

Characterization and Mitigation of Multipath in GNSS

Multipath is the phenomenon whereby a transmitted signal arrives at a receiver via multiple paths due to reflection and diffraction. These non-direct-path signals distort the received signal and cause errors in GNSS pseudorange and carrier-phase measurements. Differential techniques do not eliminate multipath and thus multipath is a critical error source in high precision applications. The physical surroundings around the user’s antenna dictate the multipath environment and thus cause significant differences for land, marine, airborne, and spaceborne applications. This lecture describes the multipath environment and the impact of multipath on code and phase measurements. The influence of the type and rate of the broadcast code as well as the receiver architecture will be presented. Mitigation strategies will also be described along with multipath measurement techniques.

Metamaterial Advances for Radar and Communications

Metamaterials have gained much interest in recent years because they offer the potential to provide phased arrays and antennas having better performance at lower cost. Metamaterials are man-made materials in which an array of structures having a size less than a wavelength are embedded. These materials have properties not found in nature, like a negative index of refraction. Much progress has been made using metamaterials. Kymeta demonstrated transmission to satellites and back using 20 and 30 GHz antennas which use metamaterial resonators in a very novel way for realize phase steering. Echodyne and Xerox’s PARC have developed metamaterial arrays for radar. The Army Research Laboratory funded the development of a metamaterial 250 to 505 MHz low profile antenna with a λ/20 thickness for replacement of the very tall whip antennas on HMMWVs thus providing greater survivability. Complementing this, a conventional tightly coupled dipole antenna (TCDA) has been developed which provides a 20:1 bandwidth with a λ/40 thickness. Target cloaking (invisibility) has been demonstrated at microwaves over a narrow bandwidth using metamaterials. Cloaking has been demonstrated over a 50% bandwidth at L-band using fractals. Stealthing by absorption using a thin flexible and stretchable metamaterial sheet has been shown to provide 6 dB absorption over an 8 to 10 GHz band, with greater absorption over a narrower band. Using fractals sheets < 1 mm thick simulation has shown a 20dB absorption over a band from 10-15 GHz and 10 dB from 2-20 GHz. Good absorption was achieved for all incident angles and polarizations. Metamaterial has been used in cell phones to provide antennas that are 5× smaller (1/10th λ) having 700 MHz to 2.7 GHz bandwidth. It has also provided isolation equivalent to 1 m separation in antennas with 2.5 cm separation and has the potential for use in phased array for wide angle impedance matching (WAIM). Using metamaterial one can focus 6X beyond diffraction limit at 0.38 μm (Moore’s Law marches on); 40X diffraction limit, λ/80, at 375 MHz.


Phased-Arrays and Radar: Advances, Breakthroughs and Future Trends

ABSTRACT: SYSTEMS: Patriot now has GaN AESA providing 360o coverage; S-band AMDR provides 30 times the sensitivity and number of tracks as SPY-1D(V); 3, 4, 6 face “Aegis” systems developed by China, Japan, Australia, Netherlands, USA; LOW COST PACKAGING: Raytheon, MIT-Lincoln-Lab./MA-COM, Rockwell Collins and South Korea developing low cost S and X-band flat panel arrays using COTS: PCBs and commercial packaging. EXTREME MMIC: Whole 64 and 256 element T/R phased array on single chip at 60 GHz, RF circuitry of car radar put on one chip, these chips expected to cost only few dollars in future.. DIGITAL BEAM FORMING (DBF): Israel, Thales, Lockheed Martin (LM) and Australia AESAs have an A/D for every receive channel (LM has 172K A/Ds for their space fence radar) ; Raytheon developing element level mixer-less direct RF A/D having >400 MHz instantaneous bandwidth, reconfigurable between S and X-band; Lincoln Lab increases spurious free dynamic range of receiver plus A/D by 40 dB. MOORE’S LAW: Slowing down but expect increase in chip density of ~50 in next 30 years and reduction in power consumption of factor of ~75 per transistor. Potential continuation of Moore’s Law: 1. via Spintronics - which could revolutionize computer architecture away from John von Neumann model, 2. via Memristor – which potentially allows one to do what mouse’s brain does in a shoe box instead of a computer the size of a small city requiring several nuclear power plants, 3. via Graphene which has potential for Thz clock speed transistors, and/or 4. via Quantum Computing - which has the potential of orders of magnitude advance in computation power per 2 years. METAMATERIALS: 2-D Electronically Steered Antennas at 20 and 30 GHz, cost goal only $1K, explained in simple terms, to be used in worldwide coverage satellite internet systems of the future, companies like Google and Qualcomm working on it; Echodyne and PARC (a Xerox Co.) developed radar electronic scanning arrays; Stealthing by absorption:  Simulation shows 10 dB absorption over 2-20GHz band using <1 mm thick fractal coating, 20 dB over 10-15 GHz, good results for all incidence angles and polarizations; Stealthing by cloaking: Target made invisible over 50% bandwidth at L-band using fractals; Army 250-505 MHZ conformal antenna with a l/20 thickness; Focus beyond diffraction limit: 6X at 0.38 μm; Provides isolation: Between antennas having 2.5 cm separation equivalent to 1m separation; potential use for phased array WAIM; Negative Index of Refraction: For n-doped graphene, first such material found in nature. VERY LOW COST SYSTEMS: Valeo Raytheon  (now Valeo Radar) developed low cost, $100s, 25 GHz 7 beam phased array car radar; about 2 million sold already, more than all the radars ever built up to a very few years ago. WIDEBAND LOW PROFILE ANTENNA: Tightly coupled dipole antenna (TCDA) provides 20:1 bandwidth with l/40 thickness for the lowest  frequency. MIMO (MULTIPLE INPUT MULTIPLE OUTPUT): Explained in simple physical terms instead of with heavy math; It is claimed MIMO array radars can provide 1, 2 or 3 orders of magnitude better resolution and accuracy than conventional array radars; It is shown how conventional arrays can do as well; MIMO does not let us use fewer elements than conventional array; MIMO does not provide better barrage-noise-jammer, repeater-jammer or hot-clutter rejection than conventional array radars; Should not provide better GMTI than conventional radar; Where it makes sense to use.  LOW COST PRINTED ELECTRONICS: 1.6 GHz printed diodes achieved (goal 2.4 GHz).  ELECTRICAL AND OPTICAL SIGNALS ON SAME CHIP: Will allow data transfer at the speed of light; IR transparent in silicon. BIODEGRADABLE ARRAYS OF TRANSISTORS OR LEDS: Imbedded under skin for detecting cancer or low glucose. QUANTUM RADAR: Has potential to defeat stealth targets. NEW POLARIZATIONS: OAMS, (ORBITAL ANGULAR MOMENTUM) unlimited data rate over finite band using new polarizations??

MIMO Demystified and Its Conventional Equivalents

This talk is given in tutorial form using a simple explanation starting from basics of phased arrays and how they work. Physical insight into MIMO is then given. No heavy math used. It has been shown in the literature that MIMO thin/full array radars can provide orders of magnitude better resolution and accuracy than conventional radars. The thin/full array consisted of two collocated parallel linear arrays of N elements each. One is a thin array and the other a full array having spacings respectively of Nλ/2 and λ/2 with the thin one used for transmit and the full for receive. We show how to use the same thin/full arrays in conventional radars to do as well and also without grating lobes (GLs). Also covered are full/thin array equivalents where the full array is used for transmit and the thin is used for receive. Detailed are the monostatic MIMO full array radar and its Skolnik ubiquitous equivalent and a machine gunning equivalent. The performance of these systems against jammers is summarized.  A simple physical explanation is given of why the Cramer-Rao bound provides a 2 better angle accuracy for the MIMO monostatic full array than the conventional ubiquitous array equivalent and why this result does not apply for the machine gunning equivalent. It has been also shown in the literature that a MIMO thin/full array airborne GMTI radar can provide a better minimum detectable velocity (MDV) than a conventional one. We show how the same thin/full array can be used in a conventional GMTI radar system to provide the same advantages as the MIMO system re coherence dwell time and aperture size and thus should provide the same MDV. The operation, waveforms, detection sensitivities, use of maximum likelihood estimation (MLE) for angle estimation and detection, and resolutions of these systems are detailed.  We show that the signal processing load for the MIMO radar system can typically be much larger than for its conventional equivalents. There is also usually a more difficult waveform design problem with MIMO. Covered also are practical issues like the effects of the different mutual coupling between the elements of the thin and full arrays and how to deal with it.

It has been claimed that MIMO radars perform better than conventional radars against repeater and hot clutter jammers (jammer signals reflected from the ground into the radar). It is shown here that conventional radars can perform as well if not better than MIMO radars against these jammers as well as against barrage noise jammers. The results here are also presented in tutorial form without heavy math. Instead physical explanations are given for these results. Applied here to reject the barrage jammer and hot clutter is the Adaptive-Adaptive Array Processing (AAAP) technique which makes use of the information available as to where the jammers are rather than assuming there location is not known as done for the classical sample matrix inversion (SMI) method. This is reminiscent of the KA-STAP technique used by DARPA. The method reduces the transient time (the number of time samples needed to calculate the interference covariance matrix) by orders of magnitude. Also the interference covariance matrix size is reduced by orders of magnitude and in turn the computation of its matrix inverse. Finally this method reduces the sidelobe degradation usually resulting from using the SMI method. The AAAP technique lends itself well to both the MIMO and conventional array systems when digital beam forming is used.

Finally, we present potential practical applications of the MIMO radar concept: 1. For conventional radar combining to get better power-aperture for search and power-aperture-gain for track, respectively 6 dB and 9 dB for two radars; 2. For OTH radars and 3. For automobile radars.

Cognitive Adaptive Array Processing for Radar

Usually adaptive array processing is presented with exotic matrix equations that are difficult to understand and do not give a physical feel to what is going on so one can improve on the jammer suppression. This tutorial is present the subject from physical point of view which gives one great insight into the best way to do jammer suppression. We show how to do Cognitive Adaptive Array Processing (CAAP). The immense power of CAAP is demonstrated. Digital beam forming (DBF) makes CAAP the processing of the future.

Around the World In 60 Minutes – Exotic Places with a Radar Twist

An informative and humorous adventure covering: (1) China: the Yangtze River, Three Gorge Dam, Chinese Opera and Acrobatics, their dynamic growth, their amazing capitalistic, communist run  country with its very modern cities of Shanghai, Beijing and Xian and its famous terracotta soldiers; (2) Nepal: its friendly colorful people, cremations, animal sacrifices, mountains and beautiful county side; (3) Vietnam: their very warm full of energy people in the North, the colorful ethnic minority tribe people, markets, Hanoi Hilton, Mai Chau and Perfume Pagoda; (4) Singapore: it is clean and very strict (known for its canings) but it is also offers some of the most interesting things to see in the world like the Indian HinduThaipusam Festival (with cheek, tongue, torso piercing which make our hippies look tame) and Fire Walking (over red hot coal), Chinese, Arab and Malaysian culture, a world class zoo and lots of good shopping; (5) Sumatra, Indonesia: get close to free roaming orangutans, beautiful scenery and people, very low cost touring, what I call professional travelers go there for 6, 12 or 24 months of traveling at a time; (6) Turkey: take a tour of Capredocia in a hot air balloon and see the famous cave dwelling there, visit Istanbul where the East meets the West, opulent heritage dating back some 8,000 years to Neolithic settlements, now a modern, exciting, lively city.; (6) Saudi Arabia: see the very modern and beautiful King Saudi University in Riyadh, visit Jubail (Dharan) and Jeddah and see its people and culture,  see the separate life of the expatriates; (7) Papua New Guinea: visit these colorful people who where first discovered in 1930 living in an iron age, like going back time and seeing how we lived many years ago, a living museum; (8) also visit India, South Korea, Taiwan, Chile, France, Russia, Thailand, England, Spain, Peru, Japan, Hong Kong, Macau, Mexico, Africa, Shemya (an island far out on the Aleutian Island Chain of Alaska), Norway, Austria, Holland, Germany, Malaysia, Canada, Israel, Switzerland, Australia, the Netherlands, Belgium, Union of South Africa, Egypt, New Zealand, Brazil, Philippines, Borneo, Bali, Iran, Dubai, Abu Dhabi Ukraine.

The twist is an explanation that all can understand on how radars and phased arrays work and some of the recent amazing breakthroughs in radars.

National Missile Defense

Missile Defense is a major technical and political issue facing the US and the rest of the world. Until the US began to develop a hit-to-kill system, there was no effective defense against an incoming ICBM – so nations had to rely on Mutual Assured Destruction. This was indeed mad, so in the 1980’s President Reagan began to investigate alternate methods to protect against incoming ICBM’s such as his “Star Wars” proposal. However, technology was not mature enough at that time for such an expansive system.

In the 2000’s, the Bush administration developed a limited Missile Defense System in Alaska and California to counter threats from North Korea. The Obama administration continued this limited development with the installation of the Phased Adaptive System in Europe for protection against Iran. The Obama administration attempted to satisfy Russian concerns by using a phased build-up for the Missile Defense system in Europe. They focused on the total system problem but proposed to install only the equipment necessary for current threats. The Trump Administration is still finalizing its approach to NMD but plans to increase spending and increase capabilities.  

The current issue is China’s concern with the proposed Terminal High Altitude Area Defense (THAAD) installation in South Korea for protection against North Korea. China is opposed to the THAAD installation in South Korea even though it is for “defense” only and does not threaten the Chinese ICBM force in any way.

This talk will provide background information and technical information on the major parts of the current US Missile Defense System. The talk will discuss how and why technical personnel from all countries should engage in mutual discussions on Missile Defense so that they can provide the correct technical details to their political leaders on important world issues such as Missile Defense. Missile Defense will continue to be a key technical and political issue facing the US and the rest of the world. However, system engineering and project management techniques can help technical personnel be involved in the decision-making process for solving such complex issues.  

Nonlinear filters with particle flow

We have invented a new particle filter, which improves accuracy by several orders of magnitude compared with the extended Kalman filter for difficult nonlinear problems. Our filter runs
many orders of magnitude faster than standard particle filters for problems with dimension higher than four. We do not resample particles, and we do not use any proposal density, which is a
radical departure from other particle filters. We show very interesting movies of particle flow and many numerical results.  The key idea is to compute Bayes’ rule using a flow of particles
rather than as a point wise multiplication; this solves the well known problem of “particle degeneracy”. Our derivation is based on freshman calculus and physics. This talk is for normal engineers who do not have log-homotopy for breakfast.

MIMO radar: snake oil or good idea?

MIMO (multiple input multiple output) communication is theoretically superior to conventional comm. under certain conditions, and MIMO comm. also appears to be practical and cost effective in the real World for some applications. It is natural to suppose that the same is true for MIMO radar, but the situation is not so clear. Researchers claim many advantages of MIMO radar relative to boring old phased array radars (SIMO radar). We will evaluate such assertions from a radar system engineering viewpoint. It is very rare to see a paper on MIMO radar with a correct quantitative apples & apples comparison including cost, complexity, risk and all relevant real World physical effects.  Moreover, MIMO radar researchers often use boring old phased arrays in a highly suboptimal way, whereas the MIMO radar is used optimally. Hardboiled radar system engineers view such comparisons with skepticism.

Real World data fusion

Fusion of data from multiple sensors has the promise of substantial improvement in system performance for many important applications. However, there are several practical issues that must
be addressed to achieve such improvement: (1) residual bias errors between sensors; (2) dense multiple target environments; (3) unresolved data; (4) errors in data association between sensors; (5) sensor errors that are not fixed in time or space but which are not white noise either. We describe state-of-the-art algorithms that attempt to mitigate such problems. We show simple back-of-theenvelope formulas which quantify the situation, as well as one well known formula that is extremely pessimistic.

Never trust a simulation without a simple back-of-the-envelope calculation that explains it

Simulations are a crucial tool for systems engineers, and I have coded, developed, analyzed, tested, debugged and debunked many such simulations. However, they cannot be trusted. All too often system engineers come a cropper due to believing the results of simulations without making sure that the results are correct and relevant. Significant errors can occur for many reasons: bugs, bugs, bugs, incorrect parameters, incorrect physical models, incorrect application of perfectly fine code, incorrect interpretation of accurate results, etc. I was deeply shaped by a system
engineering culture that valued simple back-of-the-envelope calculations to provide insight into what was going on. Moreover, I am appalled when I see system engineers blindly believe the
results of simulations. My talk will give five or ten examples of system engineering blunders caused by faulty simulations or erroneous physical experiments, as well as two surprising twists.

Is there a royal road to robustness?

There is much confusion and misinformation about robustness among engineers. For example, many smart hard working and well educated engineers believe that there are decision rules and
estimation algorithms that are more robust than Bayesian algorithms. In particular, some engineers think that fuzzy logics or Dempster-Shafer methods are more robust than Bayesian methods.
We discuss a long list of standard methods to improve robustness, as well as a little known fact about the robustness of Bayesian algorithms.

Ultra Wideband Surveillance Radar

Foliage Penetration (FOPEN) Radar is a technical approach to find and characterize man-made objections under dense foliage, as well as characterizing the foliage itself. It has applications in both military surveillance and civilian geospatial imaging. This Tutorial is divided into three parts.
•    The early history of FOPEN Radar: battlefield surveillance and the early experiments in foliage penetration radar are covered. There were some very interesting developments in radar technology that enabled our ability to detect fixed and moving objects under dense foliage. The most important part of that technology was the widespread awareness of the benefits of coherent radar and the advent of digital processing. Almost as important was the quantification of the radar propagation through foliage, and its scattering and loss effects.
•    FOPEN synthetic aperture radar (SAR) with concentration on development results from several systems. These systems were developed for both military and commercial applications, and during a time of rapid awareness of the need and ability to operate in a dense signal environment. A brief description of each radar system will be provided along with illustrations of the SAR image and fixed object detection capability. The next section will quantify the benefits of polarization diversity in detecting and characterizing both man made and natural objects. There is a clear benefit for use of polarization in the target characterization and false alarm mitigation. Finally the techniques developed for ultra wideband and ultra wide angle image formation will be presented.
•    New research in Multi-mode Ultra-Wideband Radar, with the design of both SAR and moving target indication (MTI) FOPEN systems. Particular note will be taken on the benefits and difficulties in designing these ultra-wideband (UWB) systems, and operation in real world electromagnetic environments. At common FOPEN frequencies, the systems have generally been either SAR or MTI due to the difficulties of obtaining either bandwidth or aperture characteristics for efficient operation. The last two sections of the tutorial will illustrate new technologies that are appearing in the literature that have promise for future multimode operation: the need to detect low minimum discernable velocity movement; and the operation of bistatic SAR in concert with a stationary GMTI illumination waveform.

Bridging the Valley of Death: Overcoming barriers to adopting disruptive technologies in aerospace applications

Opportunities to create incremental technological innovations are relatively easy to accomplish and adopt.  Disruptive technologies significantly alter the ways that businesses operate, and therefore are often more difficult to adopt.  Applied research and development plays an important role in technology transfer of disruptive innovations from the laboratory to industry.  This talk will describe that role and provide examples from the aerospace industry.

Spacecraft Avionics and Scientific Instruments for Unmanned Space Missions

Developing advanced spacecraft avionics and scientific instruments for unmanned space missions is a particularly challenging endeavor that requires solutions accommodating many conflicting design constraints including:

  • State-of-the-art technologies for data, signal, and image processing,
  • High reliability hardware and software requirements,
  • Long duration missions involving dormant and operational periods,
  • Extreme physical, electromagnetic, and radiation environments,
  • Size, weight, and power limitations,
  • High Technology Readiness Level (TRL) designs, and
  • Proven flight heritage.

The purpose of this lecture is to present a review of these design considerations, illustrated by several examples from past and current unmanned space missions including:

  • New Horizons
  • Juno
  • Magnetospheric Multiscale
  • IBEX
  • Mars Science Laboratory
  • Lunar Reconnaissance Orbiter
  • Deep Impact
  • Rosetta
  • Cassini

Over-The-Horizon Radar: Fundamental Principles, Adaptive Processing and Emerging Applications.

Skywave over-the-horizon (OTH) radars operate in the high frequency (HF) band (3–30 MHz) and exploit signal reflection from the ionosphere to detect and track targets at ranges of 1000 to 3000 km. The long-standing interest in OTH radar technology stems from its ability to provide persistent and cost-effective early-warning surveillance over vast geographical areas (millions of square kilometres). Australia is recognized as a world-leader in the OTH radar field. Pioneering research and development covering every facet of this technology has resulted in the multi-billion-dollar Jindalee Operational Radar Network (JORN) of three state-of-the-art operational OTH radars in Australia.
The first part of the tutorial introduces the fundamental principles of OTH radar design and operation in the challenging HF environment to motivate and explain the architecture and capabilities of modern OTH radar systems. The second describes mathematical models characterizing the HF propagation channel and adaptive processing techniques for clutter and interference mitigation. The third delves into emerging applications, including HF passive radar, blind signal separation and multipath-driven geolocation. A highlight of the tutorial is the prolific inclusion of experimental results illustrating the application of robust signal processing techniques to real-world OTH radar systems. This is expected to benefit students, researchers and practitioners with limited prior knowledge of HF radar and with an interest in the application of advanced processing techniques to practical systems.

Robust Adaptive Array Processing for Radar

Adaptive array processing techniques represent a key element for enhancing the performance and capabilities of multi-channel radar systems that must operate in demanding and complex disturbance environments, which in general includes clutter, man-made interference and naturally-occurring noise. The first part of this lecture recalls some foundational adaptive processing principles and the main assumption and conditions under which seminal theoretical results have been derived. The second contrasts these main assumptions and conditions with those actually encountered by a wide range of practical radar systems that operate in real-world environments. In the presence of environmental uncertainties, instrumental imperfections, and operational constraints, which are ubiquitously faced by practical systems, the implementation of robust adaptive techniques becomes an essential ingredient for effective and efficient operation. The third part of this lecture discusses the design and application of robust adaptive array processing techniques in the dimensions of space, time and space-time. Experimental results are illustrated for OTH radar systems to lend concreteness by way of example. This lecture is expected to benefit students, researchers and practitioners with an interest in the effective and efficient application of advanced processing techniques to practical radar systems.

Radar Adaptivity: Antenna Based Signal Processing Techniques

The lecture discusses the following topics:
• Introducing Radar: from its conception to recent industrial achievements,
• Operational needs requiring adaptivity, 
• Side lobe blanking and cancellation techniques,
• Adaptive arrays of antennas,
• Some practical application examples of adaptivity,
• Conclusions and way ahead.
Each part is structured with some mathematical background, presentation of key processing algorithms, performance evaluation of the algorithms either in closed form or via Monte Carlo simulation, practical engineering implications related to the implementation of processing algorithms and, finally, examples of application potentials. A comprehensive set of technical references is also provided for further study and investigation. 


Advanced Techniques of Radar Detection in Non-Gaussian Background

For several decades, the Gaussian assumption on the disturbance modeling in radar systems has been widely used to deal with detection problems. But, in modern high-resolution radar systems, the disturbance cannot be modelled as Gaussian distributed and the classical detectors suffer from high losses. 
    In this talk, after a brief description of modern statistical and spectral models for high-resolution clutter, coherent optimum and sub-optimum detectors, designed for such a background, will be presented and their performance analyzed against a non-Gaussian disturbance. Different interpretations of the various detectors are provided that highlight the relationships and the differences among them. 
    After this first part, some discussion will be dedicated to how to make adaptive the detectors, by incorporating a proper estimate of the disturbance covariance matrix. Recent works on Maximum Likelihood and robust covariance matrix estimation have proposed different approaches such as the Approximate ML (or Fixed-Point) Estimator or the M-estimators. These techniques allow to improve the detection performance in terms of false alarm regulation and detection gain in SNR. 
Some of results with simulated and real recorded data will be shown. 


Sea and land clutter statistical analysis and modeling

The modeling of the clutter echoes is a central issue for the design and performance evaluation of radar systems. Main goal of this lecture is to describe the state-of-the-art approaches to the modeling and understanding of land and sea clutter echoes and their implications on performance prediction and signal processors design. 
The lecture first introduces radar sea and ground clutter phenomena, measurements and measurement limitations, at high and low resolution, high and low grazing angles with particular attention to classical model for RCS prediction. Most part of the lecture will be dedicated to modern statistical and spectral models for high resolution sea and ground clutter and to the methods of experimental validation using recorded data sets. Some comparison between monostatic and bistatic sea clutter data will be provided together with some results on non-stationarity analysis of the high resolution sea clutter.


Sensor selection for multistatic radar networks

After an introduction to bistatic/multistatic radar systems, the talk will focus on multistatic passive radars. The characteristics of the systems with different sources of opportunity will be described.
The concept of bistatic ambiguity function (BAF), often used to measure the possible global resolution and large error properties of the target parameters estimates, will be introduced and its relation with the Fisher Information Matrix (FIM) and Cramér-Rao Lower Bounds (CRLBs) highlighted. Some example will be provided concerning active LFM radar and passive radar using an UMTS or FM signal as source of opportunity.
The information gained through the calculation of the bistatic CRLBs can be used in a multistatic radar system for the dynamic choice of the optimum Tx-Rx pair or set of bistatic channels for radar target tracking in a multistatic scenario. Taking advantage of the knowledge of the CRLBs is a kind of “radar cognition”, that, applied in multistatic realistic scenarios with both active and passive sensors, can improve the performance of the target tracker and reduce the computational load of surveillance operations. Some results will be shown in both certain and uncertain radar measurements.  


The Challenge of Waveform Diversity

Waveform Diversity is defined in the IEEE Std 868-2008 as ‘Adaptivity of the radar waveform to dynamically optimize the radar performance for the particular scenario and tasks. May also exploit adaptivity in other domains, including the antenna radiation pattern (both on transmit and receive), time domain, frequency domain, coding domain and polarization domain’. In other words, modern digital technology now allows us to generate precise, wide-bandwidth radar waveforms, and to vary them adaptively – potentially even on a pulse-by-pulse basis.
This opens up many new possibilities, including ultra-low range sidelobe waveforms, orthogonally-coded waveforms for MIMO radar applications, waveforms with spectral nulls to allow co-existence with other transmissions without mutual interference, and so-called target-matched illumination, where a waveform may be matched to the impulse response of a specific target at a specific aspect angle. We may also learn from natural systems such as bats, whose acoustic signals are sophisticated and are used in an intelligent, cognitive manner.
The lecture will describe the design of these waveforms and their applications, and the prospects for the future.

Bistatic & Multistatic Radar

Bistatic and multistatic radar systems have been studied and built since the earliest days of radar. As an early example, the Germans used the British Chain Home radars as illuminators for their Klein Heidelberg bistatic system. Bistatic radars have some obvious advantages. The receiving systems are passive, and hence undetectable. The receiving systems are also potentially simple and cheap. Bistatic radar may also have a counter-stealth capability, since target shaping to reduce target monostatic RCS will in general not reduce the bistatic RCS.
Furthermore, bistatic radar systems can utilize VHF and UHF broadcast and communications signals as 'illuminators of opportunity', at which frequencies target stealth treatment is likely to be less effective.

Bistatic systems have some disadvantages. The geometry is more complicated than that of monostatic systems. It is necessary to provide some form of synchronization between transmitter and receiver, in respect of transmitter azimuth angle, instant of pulse transmission, and (for coherent processing) transmit signal phase. Receivers which use transmitters which scan in azimuth will probably have to utilize 'pulse chasing' processing.

Over the years a number of bistatic and multistatic radar systems have been built and evaluated. However, rather few have progressed beyond the 'technology demonstrator' phase. Willis, in his book Bistatic Radar, has remarked that interest in bistatic radar tends to vary on a period of approximately fifteen years, and that currently we are at a peak of that cycle. The purpose of this lecture is therefore to present a subjective review of the properties and current developments in the subject, with particular emphasis on 'passive coherent location' and to consider whether or not the present interest is just another peak in the cycle. It draws on material in the book Advances in Bistatic Radar, edited by Willis and Griffiths, and recently published by SciTech.

Tracking and Sensor Data Fusion – Methodological Framework and Selected Applications.

The tutorial covers material of the recently published book of the presenter with the same title (Springer 2014, Mathematical Engineering Series, ISBN 978-3-642-39270-2) and thus provides an guided introduction to deeper reading. Starting point is the well known JDL model of sensor data and information fusion that provides general orientation within the world of fusion methodologies and its various applications, covering a dynamically evolving field of ever increasing relevance. Using the JDL model as a guiding principle, the tutorial introduces into advanced fusion technologies based on practical examples taken from real world applications. 

Multistatic Exploration – Introduction to Modern Passive Radar and Multistatic Tracking & Data Fusion

Advanced distributed signal and data fusion for passive radar systems, where DVB TV or GSM mobile phone base stations are used as sources for illuminating targets, for example, is a topic of increasing interest. Even in remote regions of the world, transmitters of electromagnetic radiation become a potential radar transmitter stations enabling covert surveillance for air, sea, and ground scenarios. Analogous considerations are valid for sub-sea surveillance. Illustrated by examples and experimental results, principles of passive radar as well as advanced multistatic tracking and de-ghosting techniques will be discussed.

Feature Object Extraction: Evidence Accrual Applied to Information Assurance and Other Problems

Information assurance, also referred to as cyber security, is the process of protecting information from theft, destruction, or manipulation. Cyber threats can be either from internal or external sources, sudden or taking time to develop, such as a slow denial of service (DOS) attack. Some techniques have been developed to behave as sensors to quickly assess elements of attacks that rely on a decision engine to fuse the information to estimate whether or not an attack is underway. Interpreting cybersecurity as a sensor fusion problem, includes a number of additional alternative techniques into the solution space. The concept of evidence accrual is gather measurements over time from different sensors to provide estimates of what event is occurring.  A classification fusion technique using feature extraction and fuzzy logic known as Feature Object Extraction is developed and applied to problems such as cyber security and GPS attacks.  The feature-aided object extraction technique was developed for the classification problem to fuse different features and generate both a classification and a measure of the quality of the classification estimate.  A primary advantage of this is that it evidence is built for each possibility without excluding classes.  Thus, the evidence may point to multiple possibilities until evidence disproves a class.  Most probabilistic techniques increase the probability of one class by lowering the probability on other classes.  Another difference exists in the fact that evidence can be applied to individual classes and not all classes.  Feature Object Extraction also allows for a level of evidence to recover from erroneous negative information which might normally cause elimination of a possibility.  These design features of Feature Object Extraction are applied to the cybersecurity problem where multiple attacks might be underway simultaneously.

Navigation: The Road to GPS and Getting Beyond It

Navigation can be viewed as merely determining position or direction, but more commonly it relies on knowledge of position or direction to control or monitor movement from one place to another. In this talk, the field of navigation is introduced, including the evolution of techniques up through modern navigation dominated by electronic navigation including radio, radar, and satellite. The working of GPS, a navigation system based on a constellation of satellites in medium earth orbit that provides positioning information with global coverage is explained. Since its launch in 1978, it has been in ever wider use for finding and keeping track of just about anything: people, animals, boats, trucks, planes, and more. Its initial military uses have expanded far into civilian applications both for individuals and for large-scale commerce and transportation. The wide availability of first personal vehicle GPS navigation and later mobile phone-based navigation have changed how the world does business and how people and goods are moved around. As more and more vehicles and people rely upon it, any threats to GPS navigation become more dangerous. This is a result that more systems have become completely or primarily dependent on GPS for guidance and navigation. Simple jamming of the GPS can render a system completely blind to its location, while more sophisticated attacks can spoof a GPS signal to control its navigation. Future trends and technologies to address the security issue and to move forward in navigation are discussed.

History and Future of Radar

This lecture is meant for an audience that wishes to be introduced to Radar, EW, their market and AESS in general. The lecture is a motivational speech for students, young professionals, or events that require a plenary speaker. The lecture begins with the history of radar, including trivia and fun facts. Then, the lecture continues by showing the utmost recent advances in Radar and electronic warfare, emphasizing both military and commercial applications. The lecture then discusses the recent radar market, and the reasons for engineers to embrace this field. The lecture ends with an introduction to AESS and all the benefits that it has to offer.

Radar Systems Prototyping

Whether you are a student seeking real data to prove your Ph.D. thesis, or a researcher planning for experimentation in your grant proposal, or a system engineer in need of a radar prototype to demonstrate your innovative idea to a customer, you will be faced with prototyping a radar system with limited time and budget. There exist many books and tutorials on radar signal processing, but little is found on how to build your radar prototype that can support and run these algorithms.  This tutorial will provide you with practical skills and techniques needed to build your advanced radar prototype. The focus is not on how devices/algorithms work, but on how to relate the choice of microwave devices and signal processing algorithms to the desired radar specifications. You will learn how to interpret datasheets, how components/algorithms affect each other, and how signal processing dictates RF constraints, and how signal processing can fix your RF limitations.  The course will end with a step-by-step MIMO radar design example, starting from the requirements and ending with a schematic and bill of material. All participants will also receive a free consultation to their current radar system design until their project is completed.

Satellite Navigation and Sensing

Satellite-based navigation has impacted nearly every aspect of our modern society. Yet, this powerful technology relies on extremely low power, vulnerable signals traversing a vast space to reach receivers on the Earth surface or near-Earth space environments. Many complex elements interfere with the signals along their propagation path, including plasma in the upper atmosphere, water vapor in the lower troposphere, as well as physical objects and electromagnetic sources in the user environments. These nuisance factors degrade and limit navigation systems performance. Understanding their effects on navigation signals is the pre-requisite for developing robust navigation technologies that can mitigate these elements impact. Moreover, these effects enable satellite navigation signals to function as signals-of-opportunity for low cost, distributed, passive sensing of our space and local environments. This presentation will first discuss efforts in developing a worldwide network of software-defined sensors to capture and characterize the effects of the space and local environments on satellite navigation signals, followed by the latest technology development to mitigate these effects, and finally case studies demonstrating the potential powerful applications of the satellite navigation sensor network for environmental monitoring.

Optimum Co-Design for Spectrum Sharing Between MIMO Radar and MIMO Communication Systems

Spectrum congestion in commercial wireless communications is a growing problem as high-data-rate applications become prevalent. In an effort to relieve the problem, US federal agencies intend to make available spectrum in the 3.5 GHz band, which was primarily used by federal radar systems for surveillance and air defense, to be shared by both radar and communication applications. Even before the new spectrum is released, high UHF radars overlap with GSM communication systems, and S-band radars partially overlap with Long Term Evolution (LTE) and WiMax systems. When communication and radar systems overlap in the frequency domain, they exert interference to each other. 
Spectrum sharing is a new line of work that targets at enabling radar and communication systems to share the spectrum efficiently by minimizing interference effects. The current literature on spectrum sharing includes approaches which either use large physical separation between radar and communication systems, or optimally schedule dynamic access to the spectrum by using OFDM signals, or allow radar and communication system to co-exist in time and frequency via use of multiple antennas at both the radar and communication systems. The latter approach greatly improves spectral efficiency as compared to the other approaches. This talk presents our recent work on the latter approach. In particular, we discuss optimal co-design of MIMO radar and MIMO communication system signaling schemes, so that the effective interference power to the radar receiver is minimized, while a desirable level of communication rate and transmit power are maintained.

Multidimensional Sparse Fourier Transform and Application to Digital Beamforming Automotive Radar

With the rapid developments in advanced driver-assistance systems and self-driving vehicles, the automotive radar plays an increasingly important role in providing multidimensional information on the dynamic environment to the control unit of the vehicle. Traditional automotive radars use digital beamforming to identify range, velocity, and angular parameters of pedestrians, vehicles, obstacles, referred to here as targets. In that context, in the return signal after demodulation, each target is represented as a D-dimensional complex sinusoid, whose frequency in each dimension is related to the target parameters. When the number of targets is much smaller than the number of samples, the return is sparse in the D- dimensional frequency domain. 
Sparsity can be employed to reduce the complexity and computation time of the process that estimates D-dimensional frequencies.
In this talk, we present MARS-SFT, a novel sparse Fourier transform for multidimensional, frequency-domain sparse signals, inspired by the idea of the Fourier projection-slice theorem. MARS-SFT identifies frequencies by operating on one-dimensional slices of the discrete-time domain data, taken along specially designed lines; those lines are parametrized by slopes that are randomly generated from a set at runtime. The Discrete Fourier Transforms (DFT) of data slices represent multidimensional DFT projections onto the lines along which the slices were taken. On designing the line lengths and slopes so that they allow for orthogonal and uniform projections of the sparse frequencies, frequency collisions are avoided with high probability, and the multidimensional frequencies can be recovered with low sample and computational complexity.
We show analytically that the large number of degrees of freedom of frequency projections allows for the recovery of less sparse signals. Although the theoretical results are obtained for uniformly distributed frequencies, empirical evidences suggest that MARS-SFT is also effective in recovering clustered frequencies. We also propose an extension of MARS-SFT to address noisy signals that contain off-grid frequencies, and demonstrate its performance in digital beamforming automotive radar, where MARS-SFT can be used to identify range, velocity and angular parameters of targets with low sample and computational complexity.

On Radar Privacy in Shared Spectrum Scenarios

To satisfy the increasing consumer demand for mobile data, regulatory bodies have set forward to allow commercial wireless systems to operate on spectrum bands that until recently were reserved for military radar. Such co-existence would require mechanisms for controlling the interference. One such mechanism is to assign a precoder to the communication system, designed to meet certain interference related objectives. This talk looks into whether the implicit radar information contained in such precoder can be exploited by an adversary to infer the radar's location. For two specific precoder schemes, we simulate a machine learning based location inference attack. We show that the information leaked from the precoder can indeed pose various degrees of risk to the radar's privacy, and further confirm this by computing the mutual information between the respective precoder and radar location.

Cooperative and Distributed Guidance

Standard guidance algorithms such as Pro-Nav law and GENEX guidance law are optimal control solutions for single munition to hit its target. For a salvo of munitions swarming onto a target, each munition may only communicate with some of its neighboring missiles intermittently and, under such varying topologies, a cooperative guidance law is needed to take full advantage of available information and also be optimal with respect to predefined objectives. In this talk, an explicit cooperative guidance law is constructed in such a way that, while minimizing the total control energy required, all the munitions arrive at a target or targets simultaneously. Effectiveness of the proposed guidance law is illustrated, and robustness to communication losses and/or changing communication topologies is demonstrated. Future directions of research are also discussed

Distributed Kalman Filter Design and Applications

In this talk, distributed optimization is investigated from the perspective of dissipativity theory and in the multi-agent framework. Specifically, the basic concepts of passive systems and passivity-short systems are introduced to study the consensus problem of intermittently connected systems. Constrained optimization is then cast into the consensus problem, and distributed optimization is motivated using a gradient-based cooperative algorithm. In turn, a design of distributed and cooperative Kalman filters is presented for improving the state estimation of a group of heterogeneous dynamic systems within the confines of a dynamic and incomplete communications network. To illustrate the proposed design, state estimation and data fusing in a GPS denied environment is studied, and comparison is done among the global Kalman filter, centralized design of cooperative Kalman filters, and distributed Kalman filters.

Cooperative Control and Resilient Operations of Unmanned Vehicles

This talk aims to motivate and address several fundamental issues toward intelligent operation of cyber-physical-human systems, in particular, team operation of unmanned vehicles. A hierarchical design framework is presented for vehicle–level control and networked cooperative control. Individual controls are designed to ensure optimal tracking performance for nonholonomic vehicles. Through local and intermittent communication networks, cooperative control enables heterogeneous appropriately-controlled vehicles to cooperate as a team, to interact with human operator, and to collaboratively fulfill their mission. Autonomy such as path planning, formation control and collision avoidance in a dynamic environment is illustrated, as well as tele-operation by an operator. The issue of designing secure cyber-physical systems is also addressed from the perspective of topological and information requirements under which networked operation of cooperative systems becomes robust under malicious attacks.

Business Case for Systems Engineering - Is Systems Engineering Effective?

One of the oft-discussed elements in the field of Systems Engineering is how can one justify the expenditure of program or project monies for systems engineering? In short, what is the payback, or business case, for doing systems engineering? Those who are somewhat knowledgeable in the field of systems engineering know what the value is, but what are the tangible results of doing SE on programs and projects? How do we convince our program and project managers that SE is needed, or essential?

The Systems Engineering Division of the National Defense Industrial Association, in conjunction with the Software Engineering Institute (SEI) of Carnegie Mellon University initiated a comprehensive study in 2008 to try to determine the tangible benefits of performing SE in terms of program/project performance. The study consisted of a series of questions based on SE work products as defined in CMMI® (Capability Maturity Model Integration), which is the currently accepted systems engineering process model in widespread adoption, worldwide. The study concluded that there indeed is a positive correlation of SE performed and program/project performance in terms of budget (cost), schedule and requirements.

The number of responses to this initial study survey was small, in the order of 46 valid responses, from the US defense industry. In order to validate the results with a larger response base to include commercial as well as non-US organizations, in 2011 the NDIA and SEI partnered with the IEEE Aerospace & Electronic Systems Society to reach a broader audience, and the results of this updated survey with over 180 valid responses was completed and released in late 2012. 

This lecture will present the results of the updated study of SE performed on programs/projects and program performance in terms of cost, schedule and requirements. It will show that programs with the greater amount of SE performed demonstrate the best performance, while the programs with less SE had a lower rate of success. Since the study correlates program successes in terms of specific SE activities, these results can be used within organizations to assist in establishing systems engineering plans on programs and projects.

Navigation Sensors and Systems in GNSS Degraded and Denied Environments (Or How I Learned to Stop Worrying About GPS)

Position, velocity, and timing (PVT) signals from Global Navigation Satellite Systems (GNSS) are used throughout the world. However, the availability, reliability, and integrity of these signals in all environments have become a cause for concern for both civilian and military applications. International news reports about a successful GPS spoofing attack on ships navigating the Black Sea in June 2017 have caused concerns. Prior to that, reports about a successful GPS spoofing attack on a civilian UAV in the USA increased questions over the planned use of UAVs in the national airspace and the safety of flight in general. Jamming of GPS by the North Koreans has interfered with ship and aircraft navigation for several years. Recently, the Russians have apparently equipped cell towers with GPS jamming devices as a defense against attack. All of these incidents have led the navigation community to search for reliable solutions in the face of spoofing and jamming. Based on his own experiences with navigation systems since Sputnik and Apollo, the presenter will give an historical and personal perspective on what is required for civilian and military navigation applications now and in the future.

Inertial System and GPS Technology Trends

This presentation presents a roadmap for the development of inertial sensors, the Global Positioning System (GPS), and integrated inertial navigation system (INS)/GPS technology.  This roadmap will lead to better than 1-m accuracy, low-cost, moving platform navigation in the near future. Such accuracy will enable military and civilian applications which were previously unthought-of a few years ago.  After a historical perspective, a vision of the inertial sensor instrument field and inertial systems for the future is given.   Accuracy and other planned improvements for GPS are explained.  The trend from loosely-coupled to tightly-coupled INS/GPS systems to deeply-integrated INS/GPS is described, and the synergistic benefits are explored.  Some examples of the effects of GPS interference and jamming are illustrated.  Expected technology improvements to system robustness are also described.  Applications that will be made possible by this new technology include personal navigation systems, robotic navigation, and autonomous systems with unprecedented low-cost and accuracy.

Inside Apollo: Heroes, Rules and Lessons Learned in the Guidance, Navigation, and Control (GNC) System Development

This Abstract was written in March 2019 which is halfway between the 50th Anniversary of Apollo 8 (Dec 1968) and Apollo 11 (July 1969).  Those 2 flights were among the greatest explorations of mankind.  In 8, astronauts deliberately put themselves in orbit around the moon expecting the rocket engine to later fire and bring them home to Earth.  In 11, it was mankind’s first visit to the moon and Tranquility Base.  Movies, books, articles, and documentaries have covered the space race.  The author will give his thoughts based on 10 years inside the GNC program design, many hours in the Spacecraft Control room at Cape Kennedy monitoring GNC performance through liftoff, and then providing real-time mission support to NASA from MIT in Cambridge, MA.

How it's Managed - HAV Policies and Regulations.

UAS technology and applications are advancing at such a rapid rate, that operator regulations and public education are struggling to keep up. Before a drone hobbyist can become a commercial UAV operator, she must be knowledgeable of current UAV policies and regulations and pass a certification exam to become a licensed operator. This lecture provides an overview of the knowledge areas necessary to become an FAA licensed UAV operator. An exploration of current FAA concerns and near-term considerations is also provided.

How It’s Used – UAV Applications and Business Opportunities

UAS technology, sensing, and software are advancing at such a rapid rate, that operators are always finding new ways to use them in commercial applications. Whereas drone used to be primarily used for photography, by adding advanced sending systems, they can be used for surveillance, inspection, security, and even VLOS/NVLOS material delivery. This lecture provides an overview of the currently popular commercial applications for UAVs as well as an exploration of future possibilities. An overview of business operations will guide entrepreneurs to start their own UAV operator business.

A Course for New Drone Operators – UAV Technology, Regulations, and Applications

Drone operations are becoming more commonplace in society. Any adult may purchase a drone for hobby operation and may choose to pursue licensing for commercial operation. A new pilot may become more effective by understanding drone technology. A new business operator can be more profitable by understanding relevant drone applications. The FAA has recently issued updated rules for drone registration, pilot licensure, and operation. The purpose of this course is to prepare the public to be knowledgeable users of drone technology, effective strategists in drone business applications, and good citizens of drone operator regulations and policies.

How It Works – UAV Technology Overview

Commercial level drones and UAVs are readily available to everyone today. New users can benefit from and drone technology familiarization. This lecture provides a technology overview of unmanned air vehicles and systems (UAV/UAS). A system overview with component descriptions is provided. UAV flight dynamics are discussed. Subsystems and component functions of UAS interfaces are outlined. Hardware and software are demonstrated. Participants will become familiar with the methods and practices of flight operations.

Advanced Sensor Concepts, Exploitation, Signal Processing and Systems Engineering

In this talk, a number of concepts and technologies forming the foundation for the exploitation of sensors from a Big Data perspective are presented. A signal processing and systems engineering approach is discussed, and heuristic techniques are presented as being critical to leap ahead advances in sensor exploitation.  While radar centric in nature, the foundation for a more general sensors approach to Big Data exploitation is discussed. Archival data is considered to be essential to the optimal exploitation of sensor phenomena, as humans are unable to fully observe or even comprehend the volumes of rapidly changing data available today. Topics as diverse as radio frequency tomography for below ground imaging, millimeter wave sensing for exquisite feature extraction, target resonance and dynamic imaging of targets obscured by clutter and cover, as well as space-time adaptive processing are presented. The integrating theme of Big Data exploitation is discussed within the context of these enabling sensor technologies as is the “Velocity of Sensor Data.”  

Maximum-Likelihood Methods in Target Tracking And Fundamental Results on Trackability

If a GLR (generalized likelihood ratio) test cannot make a good decision, then there is no good decision to be made. If the test is as to whether or not a VLO target is present in heavy clutter, the GLR should be the maximum-likelihood probabilistic data association (MLPDA) tracker. The MLPDA is very effective, but has several operational shortcomings that its close cousin, the maximum-likelihood probabilistic multi-hypothesis  tracker (MLPMHT) avoids. We will discuss and compare both algorithms, plus show some fortuitous new MLPMHT developments. Perhaps most interesting, we are now able to set the MLPMHT threshold accurately and confidently, as would be a requirement for real-time operation. And since one cannot do better than ML, we are now able to make fundamental statements about which targets  can  be  tracked  and  which  cannot:  these  statements  are  essentially  a bound,  as opposed  to algorithm-specific performance experience.

A Primer on Various Approaches to Data Association

To thread measurements (well, many call them “hits” or “plots”) of radar, sonar or imaging observations to a credible, smooth and reportable trajectory requires a filter. We’ll discuss those – Kalman, Unscented, particle, etc. – briefly. But the main topic here arises because one cannot even begin to filter without knowing which hits come from which targets, and which hits are complete nonsense (clutter). When wrapped inside some scheme for such data-association, a filter becomes a tracker. This talk is intended to explain, at a fairly high level, the intuition behind some of the popular tracking algorithms.

Distributed Detection and Data Fusion

The initial paper on the subject of distributed detection, by Tenney and Sandell, showed that under a fixed fusion rule, for two sensors with one bit outputs, the optimal Bayes sensor decision rule is a likelihood ratio test. It has been shown that the optimal fusion rule for N sensors is a likelihood ratio test on the data received from the sensors. Reibman and Nolte and Hoballah and Varshney have generalized the results to N sensors with optimal fusion, again with the restriction of one bit sensor outputs; this has been relaxed later to multi-bit quantizations.. In this “primer” talk we explore a number of issues in distributed detection, including some pathologies, the benefits of fusion, optimal design, structures for decision flow, consensus, sensor biases, feedback, deliberate obfuscation (i.e., security) and censoring. We also devote some time to distributed estimation (i.e., fusion for tracking): why is it difficult and what seems to work best? 

Field of Interest

“The field of interest shall be the organization, systems engineering, design, development, integration, and operation of complex systems for space, air, ocean, or ground environments. These systems include but are not limited to navigation, avionics, mobile electric power and electronics, radar, sonar, telemetry, military, law-enforcement, automatic test, simulators, and command and control."


Technology Navigator  Spectrum  


Enter the characters shown in the image.