By Topic

Potentials, IEEE

Issue 3 • Date Aug.-Sept. 2004

Filter Results

Displaying Results 1 - 21 of 21
  • QoS on LEO satellites

    Publication Year: 2004 , Page(s): 11 - 17
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (743 KB) |  | HTML iconHTML  

    This paper discusses the role played by wireless network infrastructure in mobile commerce applications. The user's perception of service quality depends on the available resources and capabilities of the network. The new generation of low earth orbit (LEO) mobile satellite networks, deployed at altitudes ranging from 500 km to 2000 km, are well suited to handle multimedia traffic and to offer end... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2004 Student Activities Committee e-mail addresses

    Publication Year: 2004 , Page(s): 47
    Request Permissions | PDF file iconPDF (204 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The electrifying future of the hybrid automobile

    Publication Year: 2004 , Page(s): 4 - 7
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (794 KB) |  | HTML iconHTML  

    This paper describes the hybrid-electric vehicles (HEVs) and automotive propulsion technologies. The viability of the hybrid-electric concept and electric propulsion as major ways to improve energy efficiency and reduce the automobile's environmental effects and energy consumption has been demonstrated. The principal features are multiple power sources, an internal combustion engine, an electric m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data preprocessing for WUM

    Publication Year: 2004 , Page(s): 22 - 25
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1792 KB) |  | HTML iconHTML  

    This paper focuses on data preprocessing for WUM. Web page mining (WUM) applies data procedures to analyze user access of Well sites. As with any knowledge, discovery and data mining (KDD) process, WUM contains three main steps: preprocessing, knowledge extraction and results analysis. This data preprocessing try to determine the exact list of users who accessed the Web site and to reconstitute us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bits and bytes

    Publication Year: 2004 , Page(s): 26 - 27
    Request Permissions | Click to expandAbstract | PDF file iconPDF (219 KB) |  | HTML iconHTML  

    This paper describes how to protect themselves and feel secure in their workplace. The significant need of this fact is that the stress felt from rampant backstabbing, internal politics, hidden agendas and blatant unfairness by vast majority of workers in their job. Several problematic behaviors of the employees in the working place are focused upon. This paper also describes the ways to protect t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electrical safety for an offshore power system

    Publication Year: 2004 , Page(s): 39 - 42
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (764 KB) |  | HTML iconHTML  

    This paper describes the electrical safety for a power system analysis. For an efficient and reliable electrical system, routine and detailed maintenance must be performed. One method of preventive maintenance uses infrared thermography. This technology visually depicts heat differentials in a circuit breakers and transformers that are housed in metal-glad switchgear. Predictive maintenance involv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring and managing tire pressure

    Publication Year: 2004 , Page(s): 8 - 10
    Cited by:  Papers (3)  |  Patents (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (823 KB) |  | HTML iconHTML  

    This paper describes the monitoring and managing of tire pressure. The cheap micro controller working in conjunction with existing wireless transmitters and tire pressure monitoring devices for motor vehicle applications is designed. The main goal is to develop a working unit capable of detecting pressure in multiple tires and adjustment of pressure in the tires to the appropriate predefined value... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The way ahead

    Publication Year: 2004 , Page(s): 3
    Request Permissions | PDF file iconPDF (187 KB) |  | HTML iconHTML  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Essays: the fudge factor

    Publication Year: 2004 , Page(s): 46
    Request Permissions | PDF file iconPDF (623 KB) |  | HTML iconHTML  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data-image-video encryption

    Publication Year: 2004 , Page(s): 28 - 34
    Cited by:  Papers (18)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (682 KB) |  | HTML iconHTML  

    This paper describes the most representative algorithms and standards for the encryption of data, digital images and MPEG video. The general model a typical encryption/decryption system about the security principle is discussed. Data encryption mainly is the scrambling of the content of data, text, image, audio, and video and to make the data unreadable, invisible or incomprehensible during cipher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Powering sensor networks

    Publication Year: 2004 , Page(s): 35 - 38
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (516 KB) |  | HTML iconHTML  

    This paper describes the sensor networks that are wireless systems in which large number of sensors can be deployed. A snapshot of the first-generation hardware and software for sensor networks, the requirements of the sensor nodes by their capabilities, and an outlook on future implementations are focused. These networks have been enabled in part by advancements in silicon sensor technology, low-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling transient discharge suppressors

    Publication Year: 2004 , Page(s): 43 - 45
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1358 KB) |  | HTML iconHTML  

    This paper describes the modeling transient discharge suppressors. Protection of power lines against transient propagation is considered. The use of the transmission-line modeling method (TLM) is very appropriate to analyze the behavior of the lightning discharge in transmission lines because it is a time-domain iterative method. This permits to know the voltage and the current in any branch of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling threats

    Publication Year: 2004 , Page(s): 18 - 21
    Cited by:  Papers (6)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (365 KB) |  | HTML iconHTML  

    This paper discusses the prior information of choosing model parameters for constant threat from well planned, sophisticated and coordinated terrorist operations against geographically diverse targets, which causes significant loss to human life and property. A semiautomated model-based tool to detect and track terrorist activity are developed based on the analysis of prior terrorist attacks throu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Job/money outlook (US) [bytes and bits]

    Publication Year: 2004 , Page(s): 27
    Request Permissions | PDF file iconPDF (505 KB) |  | HTML iconHTML  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Potentials

    Publication Year: 2004 , Page(s): 0_1
    Request Permissions | PDF file iconPDF (2674 KB)  
    Freely Available from IEEE
  • Now you can... Xplore - IEEE

    Publication Year: 2004 , Page(s): 02
    Request Permissions | PDF file iconPDF (863 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004 , Page(s): 1
    Request Permissions | PDF file iconPDF (245 KB)  
    Freely Available from IEEE
  • IEEE Potential's Staff List

    Publication Year: 2004 , Page(s): 2
    Request Permissions | PDF file iconPDF (188 KB)  
    Freely Available from IEEE
  • Editorial

    Publication Year: 2004 , Page(s): 3
    Request Permissions | PDF file iconPDF (187 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Gamesman problems / Gamesman solutions

    Publication Year: 2004 , Page(s): 48 - 47
    Request Permissions | PDF file iconPDF (254 KB)  
    Freely Available from IEEE
  • Got plans? Now you do! - IEEE Insurance [advertisement]

    Publication Year: 2004 , Page(s): 03
    Request Permissions | PDF file iconPDF (241 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David Tian
Carnegie Mellon University
david.tian@ieee.org