By Topic

# IEEE Systems Journal

### Early Access Articles

Early Access articles are made available in advance of the final electronic or print versions. Early Access articles are peer reviewed but may not be fully edited. They are fully citable from the moment they appear in IEEE Xplore.

## Filter Results

Displaying Results 1 - 25 of 473
• ### A Novel and Robust Authentication Factor Based on Network Communications Latency

Publication Year: 2017, Page(s):1 - 12
| | PDF (946 KB)

We propose a new authentication factor based on network round trip time ($rm {NRTT}$). We show how $rm {NRTT}$ can be used to uniquely and securely identify login locations and hence can support location-based web authentication mechanisms. The first research challenge is how to securely measure and verify $rm {NRTT}$... View full abstract»

• ### Profit Optimization-Based Power Compensation Control Strategy for Grid-Connected PV System

Publication Year: 2017, Page(s):1 - 4
| | PDF (725 KB)

A novel power compensation control strategy based on profit optimization is proposed in this study for the grid-connected photovoltaic (PV) system in low-voltage grid. Unlike the conventional control strategy, which only considers from the perspective of the distribution system operators (DSOs), the proposed control strategy not only meets the requirements of the DSOs but also maximize the profit ... View full abstract»

• ### Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel

Publication Year: 2017, Page(s):1 - 12
| | PDF (934 KB)

The simultaneous wireless information and power transfer (SWIPT) technique is regarded as a promising approach to enhance performance of wireless networks with limited energy supply. However, due to the broadcast nature of wireless radio, the energy receiver may act as a potential eavesdropper to eavesdrop the information sent to the information receiver. To address this issue, in this paper, we p... View full abstract»

• ### Prospects for Electrification of Road Freight

Publication Year: 2017, Page(s):1 - 12
| | PDF (1555 KB)

A plethora of decarbonization pathways have been suggested over the last few years and it has been generally accepted that substantial progress toward more sustainable transport requires a significant contribution from the freight sector. Deep decarbonization of road freight by conventional means is difficult, so alternatives need to be investigated. One of the most potentially beneficial approach... View full abstract»

• ### Scalable Architecture for SDN Traffic Classification

Publication Year: 2017, Page(s):1 - 12
| | PDF (3666 KB)

Scalable network-wide traffic classification (TC), combined with knowledge of endpoint identities, will enable the next wave of innovation in networking, by exposing a valuable layer of TC-enriched flow context information for applications to consume. However, full TC services over standard software-defined networking (SDN) architecture, where packets requiring application services must pass via t... View full abstract»

• ### An Advanced Measurement Placement Method for Power System Observability Using Semidefinite Programming

Publication Year: 2017, Page(s):1 - 9
| | PDF (596 KB)

This paper presents an advanced method for joint placement of unsynchronized conventional measurements and synchronized phasorial measurements in unobservable power systems. Observability checking and determination of maximal observable islands are carried out either by a numerical procedure using the triangular factors of the gain matrix or by a binary semidefinite programming (BSDP) method that ... View full abstract»

• ### Comparative Performance Analysis of DG and DSTATCOM Using Improved PSO Based on Success Rate for Deregulated Environment

Publication Year: 2017, Page(s):1 - 12
| | PDF (1055 KB)

A new and improved particle swarm optimization (PSO) technique with adaptive inertia weight (w) based on success rate is proposed to find the optimal allocation of distributed generation (DG) and distribution static compensator (DSTATCOM) considering security limits. For the optimal sizing and siting of the device, technical, economic, and social objectives are considered. Logical and innovative i... View full abstract»

• ### Robust Testing of Cascading Failure Mitigations Based on Power Dispatch and Quick-Start Storage

Publication Year: 2017, Page(s):1 - 12
| | PDF (1031 KB)

We present a formal robust testing method for power system cascading failure mitigations. The approach is model-based, using simulated trajectories of the system and proving that uncertainties, e.g., in the initial states or disturbances, do not perturb the trajectories beyond a robust neighborhood around them. We model power systems as hybrid systems with locations representing different swing dy... View full abstract»

• ### A Nonlinear H-infinity Control Approach to Stabilization of Distributed Synchronous Generators

Publication Year: 2017, Page(s):1 - 10
| | PDF (756 KB)

This paper proposes a new nonlinear H-infinity control method for stabilization and synchronization of distributed interconnected synchronous generators. At first stage, local linearization of the distributed generators’ model is performed round its present operating point. The approximation error that is introduced to the linearized model is due to truncation of higher-order terms in the p... View full abstract»

• ### Data-Driven Photovoltaic Power Production Nowcasting and Forecasting for Polygeneration Microgrids

Publication Year: 2017, Page(s):1 - 12
| | PDF (2037 KB)

In this paper, we deal with the problem of nowcasting and forecasting the photovoltaic power production (PvPP) on the basis of real data available for the Savona Campus and coming from the energy management systems (EMSs) of the smart polygeneration microgrid that feeds buildings in the University area. In this paper, we show how PvPP nowcast and forecast problems can be solved with the state-of-t... View full abstract»

• ### After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange

Publication Year: 2017, Page(s):1 - 10
| | PDF (381 KB)

Authenticated key exchange (AKE) scheme is one of the most widely used cryptographic primitives in practice, even in the Internet-of-Things (IoT) environments. In order to resist side-channel attacks, several works have been proposed for defining leakage-resilient (LR) security models and constructing LR-AKE protocols. However, all these LR-AKE schemes employed the traditional X.509 certificate-ba... View full abstract»

• ### Distributed Average Tracking in Multi-Agent Coordination: Extensions and Experiments

Publication Year: 2017, Page(s):1 - 9
| | PDF (540 KB)

This paper addresses the distributed average tracking (DAT) problem for a group of agents to track the average of multiple time-varying reference signals, each of which is available to only one agent, under local interaction with neighbors and an undirected graph. We consider three cases: 1) DAT for single-integrator dynamics with a chain of integrators in algorithm design; 2) DAT with swarm behav... View full abstract»

• ### Resource Allocation and Multisession Routing Algorithms in Coordinated Multipoint Wireless Communication Networks

Publication Year: 2017, Page(s):1 - 12
| | PDF (1402 KB)

In heterogeneous wireless networks, coordinated multipoint technology facilitates coordination and mutual cooperation among various types of networks and applications. The resource requirements of various applications differ considerably under the constraint of limited resources so that the allowable delay is considered. This study considered a centralized management scheme involving fourth-genera... View full abstract»

• ### A Petri Net Approach to Fault Diagnosis and Restoration for Power Transmission Systems to Avoid the Output Interruption of Substations

Publication Year: 2017, Page(s):1 - 11
| | PDF (1059 KB)

A traditional power transmission system (TPTS) is composed of many electrical substations (ESs) and transmission lines. When the latter meet faults, the output of the ESs may be interrupted. In this paper, a methodology is proposed to construct controlled systems with battery energy storage systems to avoid the output interruption during the fault detection and restoration for some important ESs. ... View full abstract»

• ### Vector OFDM Transmission Over Non-Gaussian Power Line Communication Channels

Publication Year: 2017, Page(s):1 - 9
| | PDF (1085 KB)

Most of the recent power line communication (PLC) systems and standards, both narrow-band and broadband, are based on orthogonal frequency-division multiplexing (OFDM). This multiplexing scheme, however, suffers from the high peak-to-average power ratio (PAPR), which can considerably impact the energy efficiency, size, and cost of PLC modems as well as cause electromagnetic compatibility (EMC) iss... View full abstract»

• ### A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in Multirate MANETs

Publication Year: 2017, Page(s):1 - 12
| | PDF (1062 KB)

Due to significant advances in wireless modulation technologies, some MAC standards such as 802.11a, 802.11b, and 802.11g can operate with multiple data rates for QoS-constrained multimedia communication to utilize the limited resources of MANETs more efficiently. In this paper, by means of measuring the busy/idle ratio of the shared radio channel, a method for estimating one-hop delay is first su... View full abstract»

• ### Performance Assessment in Complex Engineering Projects Using a System-of-Systems Framework

Publication Year: 2017, Page(s):1 - 12
| | PDF (1868 KB)

In this paper, a system-of-systems (SoS) framework is proposed for bottom-up assessment of complex engineering projects. Two principles of SoS analysis (i.e., base-level abstraction and multilevel aggregation) are used to develop the proposed framework. At the base level, complex engineering projects are abstracted as various entities (i.e., human agents, resources, and information) whose attribut... View full abstract»

• ### Distributed Topology Control for Energy-Efficient and Reliable Wireless Communications

Publication Year: 2017, Page(s):1 - 10
| | PDF (961 KB)

A dense wireless ad hoc network with a high average node degree offers a strong connectivity for packet routing, but at the same time increases the probability of interference between nodes and results in rapid depletion of node energy. To remedy this issue, topology control mechanisms aim at optimizing transmission power of nodes in a wireless ad hoc network to maintain the connectivity of the ne... View full abstract»

• ### An Optimal Frequency Control Method Through a Dynamic Load Frequency Control (LFC) Model Incorporating Wind Farm

Publication Year: 2017, Page(s):1 - 10
| | PDF (1118 KB)

In a high penetrated wind farm power system, wind farms can collaborate to control the power system frequency as like as conventional units. This paper presents a novel model to control the frequency of the wind farm connected to conventional units. Throughout the proposed frequency control, the integral controller, washout filter, and the PID controller could determine the active power variation ... View full abstract»

• ### Entailment-Based Intelligent System for Software Project Monitoring and Control

Publication Year: 2017, Page(s):1 - 12
| | PDF (3439 KB)

In recent years, software project managers compare actual completion of activities against the progress reports filled by project members to identify significant deviations from the estimated schedules and manage software project risks. However, quantitative measurements are limited due to the format of project documents, which are mostly natural languages. In this paper, we propose an inte... View full abstract»

• ### Novel Framework of Risk-Aware Virtual Network Embedding in Optical Data Center Networks

Publication Year: 2017, Page(s):1 - 10
| | PDF (1442 KB)

The traffic between geographically distributed data centers (DCs) becomes bandwidth hungry. Since the optical interconnection has a high capacity, the optical data center network (ODCN)—where DCs are located at the edge of the optical backbone—emerges. By virtualization, the virtual networks—representing service requirements—are embedded onto the same part of the substr... View full abstract»

• ### User-Priority-Based Power Control in D2D Networks for Mobile Health

Publication Year: 2017, Page(s):1 - 9
| | PDF (664 KB)

A device-to-device (D2D) assisted cellular network is pervasive to support ubiquitous healthcare applications, since it is expected to bring the significant benefits of improving user throughput, extending the battery life of mobiles, etc. However, D2D and cellular communications in the same network may cause cross-tier interference (CTI) to each other. Also a critical issue of using D2D assisted ... View full abstract»

• ### Multiobjective Robust Power System Expansion Planning Considering Generation Units Retirement

Publication Year: 2017, Page(s):1 - 12
| | PDF (590 KB)

This paper presents a mixed-integer linear robust multiobjective model for the expansion planning of an electric power system. An information-gap decision theory-based framework is proposed to take into account the uncertainties in electrical demand and new power system elements prices. The model is intended to increase the power system resistance against the uncertainties caused by forecast error... View full abstract»

• ### Robust Insider Attacks Countermeasure for Hadoop: Design and Implementation

Publication Year: 2017, Page(s):1 - 12
| | PDF (916 KB)

Hadoop is an open source software framework for storage and processing of large-scale datasets. The proliferation of cloud services and its corresponding increasing number of users lead to a larger attack surface, especially for internal threats. Therefore, in corporate data centers, it is essential to ensure the security, authenticity, and integrity of all the entities of Hadoop. The current secu... View full abstract»

• ### A Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments

Publication Year: 2017, Page(s):1 - 12
| | PDF (542 KB)

How to simultaneously achieve security robustness and maintain the usage convenience of mobile payments within insecure public communication networks is a crucial topic for intelligent mobile device manufacturers, telecommunication companies, and mobile users. In this paper, we introduce a secure transaction scheme with certificateless cryptographic primitives for mobile payments. The proposed sch... View full abstract»

## Aims & Scope

The IEEE Systems Journal is created to provide a systems-level focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
Professor Vincenzo Piuri
Università degli Studi di Milano