By Topic

IEEE Potentials

Issue 2 • Date Apr/May 1998

 This issue contains several parts.Go to:  Part Supplement 

Filter Results

Displaying Results 1 - 12 of 12
  • The Internet Protocol version 6

    Publication Year: 1998, Page(s):11 - 12
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Today, the World Wide Web and the Internet are quickly becoming a ubiquitous part of modern life. The Internet operates using the Internet Protocol (IP) as the base. This protocol has worked well for a number of years. However, IP version 4 (IPv4) is showing its age as unexpected growth problems have appeared. Most notable is the rapid consumption of network addresses and the explosion in performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nomadic transaction management

    Publication Year: 1998, Page(s):31 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The distinguishing characteristic for nomadic (mobile) computing is the wireless communication medium. This makes it possible for a fixed computer system to support a mobile user. The general nomadic multidatabase management system (NMDBMS) discussed in this article is a collection of autonomous databases connected to a fixed network. The respective DBMSs retain complete control over their data. E... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synthesizing variant impedances in SPICE. A fast solution for power electronics and electric power systems simulations

    Publication Year: 1998, Page(s):13 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1396 KB)

    The Simulation Program with Integrated Circuit Emphasis (SPICE) is a program widely used to simulate electric circuits. Characteristics such as versatility, large component libraries, integration of schematic edition, simulation and analyses have made it popular. As many students use this program early on, there is a natural tendency to continue using it in power electronics, electrical drives and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual reality

    Publication Year: 1998, Page(s):20 - 23
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    Virtual reality (VR) is an advanced, human-computer interface that simulates a realistic environment. The participants can move around in the virtual world. They can see it from different angles, reach into it, grab it and reshape it. Cyberspace is thought of as the ultimate virtual reality environment. It is an alternative computer universe where data exists like cities of light. Information work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gearing up for the virtual computer

    Publication Year: 1998, Page(s):4 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    The ultimate virtual computer will not model a Turing machine or even one of today's desktop computers. This computer will model complex systems that interact with people and respond to outside events continuously over time. This computational model will have a highly parallel/asynchronous architecture. Its components will interact through a future incarnation of the Internet. The paper discusses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hands-on software design [real-time programming]

    Publication Year: 1998, Page(s):42 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    Reactive and time-critical software is used when safety is the issue and the margin for errors is narrow. The issues of timing, concurrency, interprocess communication, resource sharing and external device handling are very important. Graduates who understand how the software will interact with the operating system and the environment are in high demand. In an effort to provide students with such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy requirements

    Publication Year: 1998, Page(s):24 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    Requirement analysis and specification is the first major step in software development. The goal is to develop a requirements specification that contains all the customers' true needs. The analysis describes quality requirements and their constraints, such as cost and resources. Functional requirements are analyzed in terms of inputs, outputs and their relationships. Hence, requirements analysis e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility and the Internet

    Publication Year: 1998, Page(s):8 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    The Internet Protocol (IP) was never intended for mobility. Nevertheless, we need to provide this functionality without changing the underlying protocol. If we could start over again, hindsight would provide a wealth of wisdom in implementing a mobility protocol. However, given the installed base, the overriding design requirement must be to remain compatible with the standard IP. Mobile-IP must b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech coding with wavelets

    Publication Year: 1998, Page(s):38 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    Speech is a very basic way for humans to convey information to one another. From a communications standpoint, information can be sent efficiently by sending it as just text. However, with a bandwidth of only 4 kHz, speech can convey information with the emotion of a human voice. People want to be able to hear someone's voice from anywhere in the world-as if the person was in the same room. As a re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling digital systems using VHDL

    Publication Year: 1998, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    VHDL is a hardware description language for delineating digital electronic systems. It arose out of the US government's Very High Speed Integrated Circuits (VHSIC) program. During this program, the need for a standard language for describing the structure and function of integrated circuits became clear. Hence, the VHSIC Hardware Description Language (VHDL) was developed. VHDL was subsequently dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The fast Haar transform

    Publication Year: 1998, Page(s):34 - 37
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    Wavelet theory and its relatives (subband coding, filter banks and multiresolution analysis) have become hot this last decade. Like the sinusoids in Fourier analysis, wavelets form bases that can decompose (analyze) and reconstruct (synthesize) signals and images. As a by-product, we obtain the accompanying processing (filtering, compression, denoising, etc.). But unlike the sinusoids, there seems... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent agents

    Publication Year: 1998, Page(s):16 - 19
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1224 KB)

    Today, everything moves at such a hectic pace. Everyone has more to think about and more things to do. In a perfect world, everyone would have a personal assistant to handle the mundane, purely routine tasks. Intelligent agents (IAs) could do these mundane jobs automatically. Of course, such flexible and ubiquitous agents are currently not possible for certain cost and feasibility reasons. The pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com