By Topic

IEEE Potentials

Issue 1 • Date Feb.-March 2004

Filter Results

Displaying Results 1 - 19 of 19
  • The way ahead

    Publication Year: 2004, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the job: choosing a workplace

    Publication Year: 2004, Page(s):5 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Streaming multimedia over the Internet

    Publication Year: 2004, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Media streaming has emerged as an important service offered over the Internet. In response, the ISO/IEC MPEG-4 multimedia standard has been introduced. It encompasses a wide range of tools and technologies for delivering multimedia content. The MPEG-4 standard does not focus only on media compression, it also considers the media packaging and delivery components. One of the most interesting featur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-integrated computing

    Publication Year: 2004, Page(s):28 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    The integration of design tools and an executable system is an important step in software engineering's evolution. Model-integrated computing (MIC) through the use of domain specific modeling environments (DSMEs) is an emerging approach to computer programming. By providing a customized level of abstraction in a relatively short period of time, and leveraging existing domain knowledge by creating ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pushing the limits of artificial vision

    Publication Year: 2004, Page(s):21 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    The field of neural prostheses has made significant strides toward restoring damaged or lost nervous system function for millions of people. These advances have led to the development of selective electrical interfaces that communicate directly with nerve cells to modulate neural processes rationally. The first neural prosthesis developed was the cardiac pacemaker, which has become pervasive in so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bioinformatics

    Publication Year: 2004, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    Computational methods are becoming an increasingly important aspect of the evaluation and analysis of experimental data in molecular biology. The use of computational methods towards solving problems in biology is known as bioinformatics. The field of bioinformatics is constantly redefining itself as methods for collecting biological data are developed and refined. While the future directions of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2004 student activities committee e-mail addresses

    Publication Year: 2004, Page(s):47 - 48
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Microwaving the heart

    Publication Year: 2004, Page(s):18 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    Atrial fibrillation (AF) is a chaotic (and lethal) cardiac rhythm disorder that profoundly affects the cardiovascular performance. Surgical therapeutic intervention has been the principal method of treatment in these cases. The standard method has been the scalpel based "maze" cut and sew procedure. The method aims at interrupting the circular electrical patterns that are responsible for the arrhy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interpreting EEG functional brain activity

    Publication Year: 2004, Page(s):8 - 13
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB) | HTML iconHTML

    A critical issue in the presurgical evaluation of brain operations is mapping regions that control speech and language functions. The goal is to preserve these regions during surgery. Mapping done by electrically stimulating the cortex subdurally with implanted electrodes is highly effective, but introduces a high risk for cortical tissue injury. Mapping the brain with non-invasive techniques, suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Confocal microscopy [detecting and diagnosing cancers]

    Publication Year: 2004, Page(s):14 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (882 KB) | HTML iconHTML

    Optical technologies, such as reflectance and fluorescence microscopy, may help detect and diagnose cancers that originate in the epithelium. The epithelium is the layer of tissue that is exposed to the environment and lines the body's cavities. Cancers that originate in the epithelium include cervical, oral, colon, lung, stomach, bladder and skin cancers. The curable precursors to cervical cancer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptic primes

    Publication Year: 2004, Page(s):43 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Prime numbers reserve a special place in number theory and computer science. Their extensive use in data structures, cryptography, nucleotide encoding, in developing musical tones and such merit their importance across all disciplines, especially in computer science. The article looks at the history and applications of primes, particularly their use in classical cryptographic systems, such as the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stereoscopic imaging: a real-time, in depth look

    Publication Year: 2004, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    There is a general push for biometric-based solutions to replace keys, ID cards, passwords and PINs. Facial recognition, as one of the computational biometrics technologies, has received renewed attention and publicity lately, but for its inaccurate results. One major reason for the inaccuracy is the fact that, generally, facial recognition tools are rooted in 2D imaging methods which are limited ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reinforcement learning in case-based systems

    Publication Year: 2004, Page(s):31 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    Case-based reasoning (CBR) systems compare a new problem to a library of cases and adapt a similar library case to the problem, producing a preliminary solution. Since CBR systems require only a record of library cases with successful solutions, they are often used in areas lacking a strong theoretical domain model, such as medicine, economics and law. The problem is that many CBR systems use expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Potentials Magazine

    Publication Year: 2004, Page(s): 0_1
    Request permission for commercial reuse | PDF file iconPDF (437 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (207 KB)
    Freely Available from IEEE
  • IEEE Potential's Staff List

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2004, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (189 KB) | HTML iconHTML
    Freely Available from IEEE
  • Essays

    Publication Year: 2004, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (188 KB) | HTML iconHTML
    Freely Available from IEEE
  • Gamesman solutions

    Publication Year: 2004, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com