By Topic

IEEE Potentials

Issue 1 • Date Feb/Mar 2001

Filter Results

Displaying Results 1 - 11 of 11
  • Cryptography

    Publication Year: 2001, Page(s):36 - 38
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    The field of cryptography deals with the techniques for conveying information securely. The goal is to allow the intended recipients of a message to receive the message properly while preventing eavesdroppers from understanding the message. Early classical ciphers' substitution and transposition operations form the building blocks for today's powerful ciphers such as the data encryption standard (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three generations of cellular wireless systems

    Publication Year: 2001, Page(s):32 - 35
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    Advances in cellular communication technology have resulted in improved capacity, higher data rates and better quality of service (QoS). Many first and second-generation systems have been deployed and currently offer a range of predominantly voice-oriented services. Third generation cellular systems have been proposed with the goal of providing a seamless integration of mobile multimedia services ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining GOLD

    Publication Year: 2001, Page(s):24 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revealing secrets regarding success

    Publication Year: 2001, Page(s):42 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linear block codes

    Publication Year: 2001, Page(s):29 - 31
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    The article discusses systematic cyclic linear block codes. A block code uses an encoder that accepts a block of message symbols, and generates a block of code word symbols at the output. This type is in contrast to a convolutional code when the encoder accepts a continuous stream of symbols and similarly generates a continuous encoded output stream. A code is linear if the addition of any two val... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active network technology

    Publication Year: 2001, Page(s):5 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    The modern electronic world is increasingly interconnected. Many technologies exist today that facilitate communications amongst individuals, organizations and equipment. As a result, larger and faster networks are being constructed. However, the current model of building higher bandwidth links combined with more powerful processors in switching and routing elements contains a fundamental flaw. It... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image compression technique

    Publication Year: 2001, Page(s):19 - 23
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Digital images generally contain significant amounts of spatial and spectral redundancy. Spatial redundancy is due to the correlation between neighboring pixel values, and spectral redundancy is due to the correlation between different color planes. Image compression (coding) techniques reduce the number of bits required to represent an image by taking advantage of these redundancies. An inverse p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feigenbaum encryption of messages

    Publication Year: 2001, Page(s):39 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    To avoid many of the problems of symmetric-key encryption, public key encryption was proposed by Hellman and Diffe (1976). The author discusses the Feigenbaum algorithm. Felgenbaum was the first person to analyse and explain chaotic behavior in cryptography using renormalization group theory. The author also clarifies some of the implications of Feigenbaum algorithm, and develops an error analysis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error control coding

    Publication Year: 2001, Page(s):26 - 28
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    The basic goal in digital communications is to transport bits of information without losing too much information along the way. The level of information loss that is tolerable/acceptable varies for different applications. The loss is measured in terms of the bit error rate, or BER. An interesting application that employs error control coding is a system with a storage medium such as a hard disk dr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual private networks

    Publication Year: 2001, Page(s):11 - 15
    Cited by:  Papers (27)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links. VPN services enable remote access to the intranet at significantly lower cost, thus enabling support for a mobile workforce. Ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Internet protocol

    Publication Year: 2001, Page(s):16 - 18
    Cited by:  Papers (2)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    The Internet works on a simple principle. The two endpoints are essentially stationary computers. The IP routes the packets of data from source to destination with the help of routers. This forwarding of packets by the routers is done depending upon the contents of their router tables. The router tables maintain the out-bound network interface (i.e., the next hop) information for each destination ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com