By Topic

Aerospace and Electronic Systems Magazine, IEEE

Issue 9 • Date Sept. 2007

Filter Results

Displaying Results 1 - 25 of 25
  • Front cover - IEEE Aerospace and Electronic Systems Magazine

    Publication Year: 2007 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (522 KB)  
    Freely Available from IEEE
  • This month's cover …

    Publication Year: 2007 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (603 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (453 KB)  
    Freely Available from IEEE
  • In this issue - Technically

    Publication Year: 2007 , Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (831 KB)  
    Freely Available from IEEE
  • Information Needs in Flight Monitoring: A Tool in Aviation Security [25th DASC Plenary]

    Publication Year: 2007 , Page(s): 3 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1821 KB) |  | HTML iconHTML  

    The next generation air transportation system security concept introduced flight monitoring as a part of risk management and shared situational awareness. Information on the aircraft performance, its flight trajectory, and the onboard situation with people and cargo are all part of the flight monitoring. This information is required to manage both an air traffic management (ATM) emergency and a security event. That information today is distributed among many operators in the system: air carriers, air traffic and air security and defense operators, and the aircraft. Sharing this information is currently dependent on manual interactions of various organizations that have data on a flight and usually occurs during the event. Avionics could provide a more meaningful picture through automatic updates or in response to interrogation. For better risk management and more complete situational awareness, the aircraft could share status that goes well beyond what is required for air traffic management alone. For example, automated emergency declarations could include the type of emergency such as "cabin depressurization." These indications may help explain erratic behavior by a flight and might quickly separate routine ATM events from security events. This is intended to initiate a dialogue within the community on the potential role of avionics to be used as a tool in aviation security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expert Systems for Earthquake Damage Assessment

    Publication Year: 2007 , Page(s): 6 - 10
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3227 KB) |  | HTML iconHTML  

    An earthquake is a calamity that can cause colossal damage to buildings, infrastructure, and environment, consequently leading to heavy casualties. It is therefore imperative for disaster relief agencies and civil protection bodies to assess the damage for planning purposes. Satellite remote sensing and geographic information systems can help prepare initial damage assessment maps. This examines the preparation of damage assessment maps using decision tree-based expert systems. The inductive machine learning-based decision tree classification has correctly identified 61% of the severely damaged buildings, and hence, is a viable option for preparing damage assessment maps. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Simulation for Vulnerability Assessment

    Publication Year: 2007 , Page(s): 11 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3686 KB) |  | HTML iconHTML  

    This discusses simulation technologies developed to "stimulate" an operational command and control security system. Herein, we discuss simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. This discusses specific techniques used for creating a 3d virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition, we discuss advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. This draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development, and pre-acquisition planning and testing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Planning and Building a Taiwan Cyber Forensic Laboratory

    Publication Year: 2007 , Page(s): 17 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3408 KB) |  | HTML iconHTML  

    The problems of safeguarding cybersecurity have gotten much worse in recent years. The risks in cybersecurity are increasing rapidly in our country. Because the cybersecurity defenses and computer crime investigation systems of our government and businesses have been threatened, the damage of cybercrime for national security and public security will become more critical, even more than violent crime and economic crime. The national cyber forensics mechanism and laboratory will play a crucial role in dealing with cybercrime. In 2003, our government conducted a research of digital evidence, the standard procedure of the operations and cyber forensic laboratory. It included the organization, training, technical capability, legislation, and operation procedures. In 2004, our government made a policy to build the first nationwide cyber security and forensic laboratory. It will be one of the major cybersecurity defense mechanisms in Taiwan. Our bureau (MJIB) made a plan and got the additional budget to build a cyber forensic lab this year. This study has four aspects: 1) The study of reliable cyber forensic software and hardware; 2) The standard of the operating procedures of cyber forensics; 3) Training courses for the examiner, including an internationally well-known certification system in cyber forensics; and 4) The study of certification for the cyber forensic laboratory. Cyber forensics is still in its early stages in Taiwan. More professional cyber forensic manpower is needed, as well as a certified cyber forensic mechanism. It is expected that cyber forensics will become increasingly important for cybersecurity policy and management in the future. Hence, building a certificated laboratory and establishing the SOP of cyber forensics from this study can be the basis to cultivate cyber forensic capabilities in our country. In this way, law enforcement will get more help from our laboratory. The laboratory, through its operation, also enhances the ability of Taiwan's- cyber forensic professionals and provides more convincing digital evidence in court. Furthermore, it can consolidate cybersecurity systems and the e-Taiwan environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and Information Systems for Air Company

    Publication Year: 2007 , Page(s): 23 - 27
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3051 KB) |  | HTML iconHTML  

    Security is always a priority in the implementation of information technology solutions. The necessity of IT as well as the complexity of IT-based solutions has increased. The technology of the Internet and distributed processing enable information processing in a geographically broad area. The IT awareness and the technological sophistication of users produce a large number of educated hackers and cyber criminals. Companies worry about this threat and are willing (forced) to invest in improving the safety characteristics of their IT systems. Sophisticated security equipment and excellent aviation security requirements are not sufficient to assure efficient aviation security services. The human being continues to be the most important factor in the security process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vacuum Electronics: Status and Trends

    Publication Year: 2007 , Page(s): 28 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4360 KB) |  | HTML iconHTML  

    The vast preponderance of US radar transmitters today use vacuum electronic amplifiers, spanning the spectrum from UHF to EHF. Enhancements to performance, reliability, and cost of ownership are being applied continuously to these systems: routine in-service life extensions mandate continuing vacuum electronics research and development to support system needs for the foreseeable future. In addition, exciting advances in vacuum electronics will provide dramatic improvements in millimeter-wave radar resolution, broadband low-noise power at microwave frequencies, compact high power sources operating at lower voltages, and life-cycle cost improvement. Recent progress in key enabling technologies, e.g., advanced device modeling and micro-fabrication, is expected to continue. This reviews the status and trends of vacuum electronics, with selected applications emphasizing recent advances in device performance in the microwave regime: multiple-beam klystrons (MBKs), microwave power modules (MPMs), and gyro-amplifiers in the millimeter-wave regime. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radar Conference Awards [presented to Dr. Eli Brookner, Dr. Joseph Guerci, and Dr. Michael Picciolo]

    Publication Year: 2007 , Page(s): 36
    Save to Project icon | Request Permissions | PDF file iconPDF (1155 KB)  
    Freely Available from IEEE
  • Two publication awards for systems magazine [Magnum Opus Bronze Award and Apex Annual Award]

    Publication Year: 2007 , Page(s): 37
    Save to Project icon | Request Permissions | PDF file iconPDF (629 KB)  
    Freely Available from IEEE
  • Robert A. Profet Award [Posthumous]

    Publication Year: 2007 , Page(s): 40
    Save to Project icon | Request Permissions | PDF file iconPDF (1898 KB)  
    Freely Available from IEEE
  • Call for Papers - 15th Saint Petersburg International Conference on Integrated Navigation Systems

    Publication Year: 2007 , Page(s): 41
    Save to Project icon | Request Permissions | PDF file iconPDF (582 KB)  
    Freely Available from IEEE
  • Society News & Information - Distinguished Tutorials Program

    Publication Year: 2007 , Page(s): 42 - 43
    Save to Project icon | Request Permissions | PDF file iconPDF (932 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2007 IEEE Judith A. Resnik Award [Presented to Daniele Mortari]

    Publication Year: 2007 , Page(s): 44 - 45
    Save to Project icon | Request Permissions | PDF file iconPDF (1219 KB)  
    Freely Available from IEEE
  • September 2007 - Distinguished Lecturers Program

    Publication Year: 2007 , Page(s): 46
    Save to Project icon | Request Permissions | PDF file iconPDF (515 KB)  
    Freely Available from IEEE
  • IEEE Aerospace & Electronic Systems Society Organization

    Publication Year: 2007 , Page(s): 47
    Save to Project icon | Request Permissions | PDF file iconPDF (679 KB)  
    Freely Available from IEEE
  • IEEE 2007 IEEE AEROSPACE AND ELECTRONIC SYSTEMS SOCIETY MEMBERSHIP APPLICATION

    Publication Year: 2007 , Page(s): 48
    Save to Project icon | Request Permissions | PDF file iconPDF (555 KB)  
    Freely Available from IEEE
  • Directory of IEEE-AESS Personnel

    Publication Year: 2007 , Page(s): 49
    Save to Project icon | Request Permissions | PDF file iconPDF (800 KB)  
    Freely Available from IEEE
  • AESS meetings & conferences

    Publication Year: 2007 , Page(s): 50
    Save to Project icon | Request Permissions | PDF file iconPDF (447 KB)  
    Freely Available from IEEE
  • Internetworking and Resource Management in Satellite Systems - A series of articles in the IEEE Aerospace and Electronics Systems Magazine

    Publication Year: 2007 , Page(s): C-1
    Save to Project icon | Request Permissions | PDF file iconPDF (166 KB)  
    Freely Available from IEEE
  • Discourse - [to special section on "Interworking and Resource Management in Satellite Systems"]

    Publication Year: 2007 , Page(s): C-3
    Save to Project icon | Request Permissions | PDF file iconPDF (311 KB)  
    Freely Available from IEEE
  • Internetworking and Resource Management in Satellite Systems - A series of articles in the IEEE Aerospace and Electronics Systems Magazine

    Publication Year: 2007 , Page(s): C-5
    Save to Project icon | Request Permissions | PDF file iconPDF (285 KB)  
    Freely Available from IEEE
  • Advanced Channel Coding for HAP-based Broadband Services [Internetworking and Resource Management in Satellite Systems Series]

    Publication Year: 2007 , Page(s): C-7 - C-16
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5928 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Aerospace and Electronic Systems Magazine publishes articles and tutorials concerned with the various aspects of systems for space, air, ocean, or ground environments.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Teresa Pace, PhD EE
Chief Engineer SenTech
SenTech, LLC - A DSCI Company
12601 Research Parkway
Orlando, FL 32826
(407) 207-1900 ext: 2102
(407) 450-0929 (BB)
tpace@sentech.dsci.com