Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Aerospace and Electronic Systems Magazine, IEEE

Issue 6 • Date June 2009

Filter Results

Displaying Results 1 - 18 of 18
  • IEEE Aerospace and Electronic Systems Magazine

    Publication Year: 2009 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (486 KB)  
    Freely Available from IEEE
  • This month's covers ...

    Publication Year: 2009 , Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (573 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (468 KB)  
    Freely Available from IEEE
  • In this issue - technically

    Publication Year: 2009 , Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (629 KB)  
    Freely Available from IEEE
  • From the Editor-in-Chief [Society News & Information]

    Publication Year: 2009 , Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (561 KB)  
    Freely Available from IEEE
  • Plans 2010 Position Location and Navigation Symposium [Society News & Information]

    Publication Year: 2009 , Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (561 KB)  
    Freely Available from IEEE
  • Changes to vascular biometric system security & performance

    Publication Year: 2009 , Page(s): 4 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5995 KB) |  | HTML iconHTML  

    When considering biometrics for a personal identification system, different modalities can be considered. The final selection will depend on specific application requirements. From the several modalities existing nowadays, vascular systems have appeared on the scene lately. Vein-based identification is claimed to be as reliable as fingerprint or iris identification, but with the usability of hand geometry or even the face. As with any other biometric modalities, vascular solutions have to be deeply analyzed for all relevant factors that could affect their performance or the security level achieved. This will show the analysis of the performance and security achieved by a commercial vascular biometric system, when being applied in several real-world scenarios. These scenarios will cover typical office environments to the more extreme environments, such as extreme light and temperatures, as those suffered in a banking ATM, or with high humidity such as in a gym. The results will show the strengths of this modality, as well as those points where further improvements are needed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing large applications against command injections

    Publication Year: 2009 , Page(s): 15 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6733 KB) |  | HTML iconHTML  

    The ability to produce more secure software or to improve the security of existing software is a growing concern and a real challenge for the field of software engineering. Among the various existing types of software vulnerabilities, command injections are particularly common. It is a difficult problem to address, having seemingly endless variations. We present a unified, formal definition of command injections that, is not based on a particular technology and captures not only the existing variations but also the future instances of the problem. We then propose a Simple, yet effective, strategy to deal with the problem in existing large applications, focusing on the cost-effectiveness of the method. We also report on successful experiments applying our solution to large commercial applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing security systems: Changing the way we think

    Publication Year: 2009 , Page(s): 25 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4763 KB) |  | HTML iconHTML  

    Today's world demands new ways of thinking about security solutions. The problem space is complex and ambiguous. Solutions must be multi-dimensional, incorporating not only technology, but the social, economic, political, and religious dynamics of a security intervention. A facilitator-led experiential training program was designed for our technical staff that leads them out of the box. The course design is based upon the theories of cognitive flexibility and situated cognition, and uses a socio-constructivist approach. Participants are led by a senior systems engineer/facilitator through a series of exercises in which they observe contextually relevant right way/wrong way videos, engage in critical thinking assessments about what they observed, and solve logic puzzles. Group interaction and problem-solving is emphasized. As in the real world, there is no one "right" solution. Outcomes can include a broader understanding of the threat space, creative solutions that enable survival in spite of an evolving enemy, and a deeper sense of the complex dynamics involved in any security decision. Training impact is being evaluated using a mixed qualitative/quantitative approach. Survey data combined with ethnographic interviewing techniques will determine whether participants have transferred their new understandings to the work environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Air transport security and crisis management

    Publication Year: 2009 , Page(s): 33 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5180 KB) |  | HTML iconHTML  

    Network management is one of the key technologies needed to fulfill the requirements. In other words, a new paradigm for network management is also needed, in order to address the requirements arising both from the ATN side and the telecommunication side of the new telecommunication infrastructure. In particular, the new network management paradigm will incorporate the ATN management framework consisting of related standards, along with the telecommunication management framework, notably telecommunication management network (TMN) standards from ITU-T. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2008 IEEE Radar Conference - Rome, Italy 26-30 May 2008

    Publication Year: 2009 , Page(s): 41 - 42
    Save to Project icon | Request Permissions | PDF file iconPDF (1268 KB)  
    Freely Available from IEEE
  • 2008 Digital Avionics System Conference (DASC) [Conference Report ]

    Publication Year: 2009 , Page(s): 43 - 44
    Save to Project icon | Request Permissions | PDF file iconPDF (1186 KB)  
    Freely Available from IEEE
  • IEEE Aerospace & Electronic Systems Society Organization

    Publication Year: 2009 , Page(s): 45
    Save to Project icon | Request Permissions | PDF file iconPDF (535 KB)  
    Freely Available from IEEE
  • Directory of IEEE-AESS Personnel

    Publication Year: 2009 , Page(s): 46
    Save to Project icon | Request Permissions | PDF file iconPDF (512 KB)  
    Freely Available from IEEE
  • Student membership application - 2009 IEEE Aerospace and Electronic Systems Society

    Publication Year: 2009 , Page(s): 47
    Save to Project icon | Request Permissions | PDF file iconPDF (497 KB)  
    Freely Available from IEEE
  • 2009 IEEE Aerospace and Electronic Systems Society membership application

    Publication Year: 2009 , Page(s): 48
    Save to Project icon | Request Permissions | PDF file iconPDF (492 KB)  
    Freely Available from IEEE
  • AESS Meetings and Conferences

    Publication Year: 2009 , Page(s): 49
    Save to Project icon | Request Permissions | PDF file iconPDF (424 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2009 , Page(s): 50
    Save to Project icon | Request Permissions | PDF file iconPDF (562 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Aerospace and Electronic Systems Magazine publishes articles and tutorials concerned with the various aspects of systems for space, air, ocean, or ground environments.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Teresa Pace, PhD EE
Chief Engineer SenTech
SenTech, LLC - A DSCI Company
12601 Research Parkway
Orlando, FL 32826
(407) 207-1900 ext: 2102
(407) 450-0929 (BB)
tpace@sentech.dsci.com