By Topic

IEEE Potentials

Issue 1 • Date Jan.-Feb. 2010

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (633 KB)
    Freely Available from IEEE
  • IEEE Expert Now

    Publication Year: 2010, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (1008 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • The way ahead

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Student Branch profile: To serve and connect

    Publication Year: 2010, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1658 KB)
    Freely Available from IEEE
  • Solar flair: An open-road challenge

    Publication Year: 2010, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1874 KB) | HTML iconHTML

    Imagine that you've been working on a student project team for two years. You've made many friends and together you are about to finish an 11-day, 2,500-mile trek from Austin, Texas, USA, to Calgary, Alberta, Canada, on photons alone. Over those two years your team has sacrificed much to design, build, develop, and now race a solar electric-drive vehicle. The race has been grueling, but now you se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Upgrading yourself - technical and nontechnical competencies

    Publication Year: 2010, Page(s):10 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    A good balance between technical and nontechnical skills for better career. The ideal training schedule or procedure. Identifying the competencies (both technical and nontechnical) needed for the role a professional in work environment. Self assessment of competencies is a good practice. Then define priorities for each one depending on their importance for the role. Then a professional should crea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Side-stepping the valley of death in New York City

    Publication Year: 2010, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1661 KB) | HTML iconHTML

    Five years ago, I had never heard of the "valley of death." But recently it appears all around me, lying in wait for any misstep. As a research professor in biomedical engineering, I spend a great amount of time carefully shepherding seemingly successful technologies from falling into this valley of oblivion. Typically, one enters the valley of death when you have developed a working medical instr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing a cushion for wireless healthcare application development

    Publication Year: 2010, Page(s):19 - 23
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2808 KB) | HTML iconHTML

    Recent advances in the electronics industry and wireless communication have enabled the evolution of innovative application domains. Smaller embedded processors and systems have allowed a new level of mobile communication and interaction in everyday life. In particular, the expansion of broadband wireless services and the advancement of handheld technology have allowed for real-time patient monito... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Following virtual trails

    Publication Year: 2010, Page(s):24 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1965 KB) | HTML iconHTML

    In the virtual world, implemented by the Internet, Web, satellite navigation, and other technologies, people are also roaming around that exploits the knowledge of others by following their trails. The advantage of utilizing trails is that they are adaptive, systems can catch all types of trails, and the program only has to distinguishes trails-it does not have to comprehend the common goals of al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reinventing electric distribution

    Publication Year: 2010, Page(s):29 - 31
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1126 KB) | HTML iconHTML

    This article will focus on areas of ongoing technological improvement and highlight topics of interest both on professional and personal levels. In today's world, energy is scarce, costly, and it is harder to meet the demand after every new peak. To respond to these challenges, distributors have developed a package of fresh solutions involving the use of new technologies, commonly referred to as t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Surviving cyber warfare with a hybrid multiagent-base intrusion prevention system

    Publication Year: 2010, Page(s):32 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3679 KB) | HTML iconHTML

    Inspecting network traffic that only protects the network and its entire host is not sufficient to secure the network and is a time wasting task, since network traffic payloads may contain polymorphic or encrypted malicious code and executables. The proposed system ensures the preemptive protection against zero-day attacks and malwares, by applying behavioral analysis techniques that focus on obje... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signals and Systems II Part I: Signals and their representations

    Publication Year: 2010, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1497 KB) | HTML iconHTML

    The goal of this series is a principles-based capability to design signal-processing architectures to convert signals between various forms. Signals are continuous-time or discrete-time, real or complex, and baseband or passband. Operations used on those signals include analog filtering, digital filtering, interpolation, decimation, and frequency shifts. The approach is rigorous but largely graphi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gamesman solutions

    Publication Year: 2010, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • IEEE sponsoring regional student design competition

    Publication Year: 2010, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • 2010 Student Activities Committee e-mail address

    Publication Year: 2010, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • IEEE Media Advertising Sales Offices

    Publication Year: 2010, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Gamesman problems

    Publication Year: 2010, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Ad index

    Publication Year: 2010, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • IEEE Proceedings [advertisement]

    Publication Year: 2010, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (845 KB)
    Freely Available from IEEE
  • Marsh Affinity Group [advertisement]

    Publication Year: 2010, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (980 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com