By Topic

IEEE Potentials

Issue 2 • Date March-April 2008

Filter Results

Displaying Results 1 - 17 of 17
  • Front cover - IEEE Potentials - Mar.-Apr. 2008

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1077 KB)
    Freely Available from IEEE
  • Table of contents - Vol 27 No 2

    Publication Year: 2008, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Editorial [IEEE student branches and regions]

    Publication Year: 2008, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (36 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Way Ahead [IEEE Student Members]

    Publication Year: 2008, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (36 KB) | HTML iconHTML
    Freely Available from IEEE
  • Student Editor of IEEE Potentials

    Publication Year: 2008, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • 2007 Student Paper Contest Winners

    Publication Year: 2008, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (1185 KB)
    Freely Available from IEEE
  • Abroad Experience: Foreign Classrooms Expand Engineers' Horizons

    Publication Year: 2008, Page(s):8 - 14
    Request permission for commercial reuse | PDF file iconPDF (864 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Primer on Fractions

    Publication Year: 2008, Page(s):10 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2334 KB) | HTML iconHTML

    The decision to use fixed-point arithmetic on an integer CPU or floating-point on a specialized processor is one that is common not only in digital signal processing applications, but also in many embedded applications. It is a typical engineering tradeoff fixed-point processing is cheaper, being implementable on common integer hardware, but the algorithms are complicated and the capabilities are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering Nature's Nanotech

    Publication Year: 2008, Page(s):15 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1353 KB) | HTML iconHTML

    In this paper, the author discussed the possibilities and the advantages of natural nanotechnology over synthethic materials. Proteins for example, as nature's nanomachines is easily accessible and does not require fabrication. nanotechnology is set to open up numerous doors for the future, some of which we will likely not even be able to foresee today. As we begin to venture forth into this new n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Phones: Bad for Your Health?

    Publication Year: 2008, Page(s):18 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    Mobile phones use electromagnetic fields to establish a wireless communication link to the nearest base station. When someone speaks on a mobile phone, that phone is sending out electromagnetic waves (EM). When someone listens on a mobile phone, that phone is capturing electromagnetic waves. Electromagnetic waves go out and come into a mobile phone through its antenna. That antenna is located very... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The wonderful world of wiki benefits students and instructors

    Publication Year: 2008, Page(s):21 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2016 KB) | HTML iconHTML

    In order to educate students on the software engineering process, the University of Alabama in Huntsville requires computer engineering students to work as a group on a mock project. Along with the final source code, the group is expected to turn in all relevant requirements, design, and test documents along with their revision histories, tracked by the method of our choice. Based on experience wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local fidelity, constrained codes, and the Meru Prastara

    Publication Year: 2008, Page(s):27 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1014 KB) | HTML iconHTML

    Information theory provides fundamental bounds on the tradeoff between achievable distortion in communication and the amount of resources that are allocated to the communication system. For optimal point-to-point communication, this is a condition on rate matching. Most theoretical computation work has focused on single-letter fidelity and resource criteria due to tractability. However, these may ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart phones and interactive reports leave traffic in the rearview mirror

    Publication Year: 2008, Page(s):33 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1513 KB) | HTML iconHTML

    To convey the dynamic information related to traffic conditions in various parts of a city, we propose an environment utilizing the technology of smart phones to provide information anywhere and anytime. Called ";The Interactive Traffic Beat Project,"; it uses a Web-based service to deliver this information to people through their cell phones at the right time so that valuable time can be saved an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Edging out the competition: Lossy image coding with wavelets and contourlets

    Publication Year: 2008, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2531 KB) | HTML iconHTML

    Image compression offers a good representation of images while using the least quantity of bits. Several lossy image coders are designed without considering the image nature. The image important information (e.g., edges) can be discarded at the coding quantization stage; that information is needed for image understanding and recognition. The possibility of saving storage space and preserving image... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Potentials Reviewer Team

    Publication Year: 2008, Page(s): 45
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Gamesman solutions

    Publication Year: 2008, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Gamesman problems

    Publication Year: 2008, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com