IEEE Systems Journal | Early Access | IEEE Xplore

Issue 2 • June-2021

Loading...

[Front cover]

Publication Year: 2021,Page(s):C1 - C1

[Front cover]

Year: 2021 | Volume: 15 | Issue: 2

IEEE Systems Journal

Publication Year: 2021,Page(s):C2 - C2

IEEE Systems Journal

Year: 2021 | Volume: 15 | Issue: 2

Table of Contents

Publication Year: 2021,Page(s):1511 - 1516

Table of Contents

Year: 2021 | Volume: 15 | Issue: 2

Editorial

Amir Aghdam

Publication Year: 2021,Page(s):1517 - 1517

Editorial

Amir Aghdam

Year: 2021 | Volume: 15 | Issue: 2
In distribution networks, N-1 contingencies are the main threats to load loss. To reduce the risk from power system threats, the energy storage (ES) can be applied to mitigate the load loss after the N-1 contingencies. However, for a given number of ESs, different location of ESs may have different mitigation results. This article first proposes a bi-level optimization model to find an optimal all...Show More
Without the requirement of trusted third parties (TTPs), Blockchain builds an environment where mutual trust among valid members is established. Nevertheless, the associated transparency property caused a hazard to real-world applications because every on-chain information is exposed to the public. That implies those applications involving sensitive data or personal information, which require secu...Show More
Noninvasive brain/neural controlled robots are promising tools to improve autonomy and quality of life in severe paralysis, but require biosignal recordings, such as electroencephalography (EEG) and electrooculography (EOG), from various sites distributed over the user's head. This limits the applicability and practicality of noninvasive brain/neural robot control on an everyday basis. It would th...Show More
This article proposes a new two-stage hybrid stochastic–information gap-decision theory (IGDT) based on the network-constrained unit commitment framework. The model is applied for the market clearing of joint energy and flexible ramping reserve in integrated heat- and power-based energy systems. The uncertainties of load demands and wind power generation are studied using the Monte Carlo simulatio...Show More
The internal states of generators obtained by dynamic states estimation (DSE) may provide additional information for the control performances. However, conventional sigma-point Kalman filter (SPKF)-based DSE may experience the loss of positive definiteness and symmetricalness of state noise covariances. This article proposes three numerically stable square-root SPKF (SR-SPKF) algorithms and propos...Show More
Brain-computer interface (BCI) can permit individuals to use their thoughts as the sole means to control objects such as smart homes and robots. While BCI is a promising interdisciplinary tool, researchers are confronting network lifetime as an obstacle to further development. Furthermore, the medium access control (MAC) protocol is the bottleneck of the network reliability. There are many standar...Show More
In prior work, a measure of resilience for use in systems design and management was presented. The measure has the form of a time integral of the system performance level. This form generates the research question: Is the time value of resilience a meaningful concept, like the time value of money in engineering economics. This article presents four scenarios to explore the relationship between tim...Show More
Advancement in digital technologies presents a user-friendly environment for the digital content distribution. However, it makes digital content prone to piracy issues. Digital rights management (DRM) systems aim to ensure the authorized content usage. As the digital content broadcasts through the public network, a secure and authorized content access mechanism is required. As digital media users ...Show More
Joint maximum likelihood (ML) multiuser detection for quasi-synchronous multicarrier code division multiple access (MC-CDMA) system has an excessive computational complexity, and it increases exponentially as the number of users and bits in each of the modulation symbols increases. Recently, sphere decoding (SD) has been adopted for multiuser detection whose complexity is polynomial in nature with...Show More
Expressions and propagations of uncertainties have been the core topics in the development of risk science in last decades, whose purpose is to provide decision-makers with clear information about the uncertainty of system's risk. Uncertainty theory is an emerging theory that has great advantages in the expression of epistemic uncertainty, compared to the theories such as subjective probability, e...Show More
The bulk of the research on long term evolution/long term evolution-advanced [(LTE)/(LTE-A)] packet scheduling is concentrated in the downlink and the uplink and is comparatively less explored. In uplink, channel aware scheduling with throughput maximization has been widely studied while considering an infinitely backlogged buffer model, which makes the investigations unrealistic. Therefore, we pr...Show More
Modern systems, that are often constituted of different interacting components, have increasing requirements for improving availability and safety when suffering unanticipated failures. Therefore, one needs to continuously monitor them, estimate and predict their health states through the implementation of prognostics and health management processes. To make this estimation and prediction more rel...Show More
An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of pack...Show More
In this article, we propose an efficient inexact gradient descent method to obtain the channel capacity-achieving input distribution of visible light communication (VLC). Under both a peak and an average optical power constraints, finding the channel capacity of VLC is formulated as a mixed continuous-discrete optimization problem without an analytical expression of the objective function. To solv...Show More
The array formed by multiple AUVs can effectively improve target detection capabilities when each AUV is equipped with a sonar unit. However, due to the limited data processing capabilities of an AUV and its communication range limitations, efficiently forming and transforming arrays are challenging. Therefore, this article innovatively uses the optimal assignment in operations research to solve t...Show More
This article proposes a unified controller for Cuk converter assisted variable speed wind turbine driven self-excited induction generator (SEIG) in dc nanogrid configuration for rural electrification. Cuk converter assisted SEIG based wind energy conversion system (WECS) is considered as a master source in the proposed nanogrid, which operates in both grid-connected and islanded mode of operation....Show More
This article deals with a generalized second-order filter (GSOF) for a two-stage grid interfaced solar photovoltaic (PV) system at abnormal situations of dc offset, voltage unbalances and distortions, grid faults, variable PV array irradiation and grid voltage sags/swells. The prime objective of using this GSOF control is to extract positive sequence components from the unbalanced and distorted vo...Show More
With the evolution of wireless communication networks (WCNs), the absolute fulfillment of security occupies the fundamental concern. In view of security, we have identified another research direction based on the attenuation impact of rain in WCN. An approach is initiated by an eavesdropper in which a secure communication environment is degraded by generating artificial rain (AR), which creates an...Show More
In recent years, healthcare wireless sensor networks (HWSNs) have received extensive attention. Due to the direct participation of patients' personal health data, privacy issues, and security are very sensitive in HWSNs. How to aggregate the sensitive patient information securely and efficiently is still a challenging task to the HWSNs communication scenario. In this article, a lightweight data ag...Show More
This survey presents a comprehensive overview of machine learning methods for cybersecurity intrusion detection systems, with a specific focus on recent approaches based on deep learning (DL). The review analyzes recent methods with respect to their intrusion detection mechanisms, performance results, and limitations as well as whether they use benchmark databases to ensure a fair evaluation. In a...Show More
With the significant development of the Internet, Internet of Things (IoT) has become an emerging technology in many industries. To support security and privacy in the Industrial IoT environment, a user may interact with another user on the Internet to share confidential information, which requires an authenticated communication channel. To meet this demand, in this article the authors developed a...Show More

Contact Information

Editor-in-Chief
Amir G. Aghdam
Professor
Concordia University, Department of Electrical and Computer Engineering
Montreal,QC
Canada
aghdam@ece.concordia.ca

Contact Information

Editor-in-Chief
Amir G. Aghdam
Professor
Concordia University, Department of Electrical and Computer Engineering
Montreal,QC
Canada
aghdam@ece.concordia.ca