By Topic

IEEE Potentials

Issue 2 • Date March-April 2010

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1206 KB)
    Freely Available from IEEE
  • IEEE USA

    Publication Year: 2010, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (888 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • The way ahead

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • Community crusaders [IEEE Student Branch Profile]

    Publication Year: 2010, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (901 KB) | HTML iconHTML
    Freely Available from IEEE
  • Time to look at the future and the past [Essay]

    Publication Year: 2010, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (970 KB) | HTML iconHTML

    What is time? Time is an abstract dimension that we cannot perceive. We assume that it all started with a big bang and since then, it has been building up. We named it "time." Time is not perceivable by our sense organs, and yet it influences the entire phenomenon and our behavior the most. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Make Your Mark

    Publication Year: 2010, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (745 KB)
    Freely Available from IEEE
  • A sign of the times: A composite input device for human-computer interactions

    Publication Year: 2010, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1529 KB) | HTML iconHTML

    Advances in gesture recognition create avenues for new ways of interacting with computers, machines, and virtual environments. In 1994, Fukumoto and Suenaga looked at the possibility of using hand gestures as input for computer devices, especially mobile devices. Their system used a chordal input method where the finger movements were similar to those involved in playing a piano. Most recently, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method of pupil identification

    Publication Year: 2010, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3712 KB) | HTML iconHTML

    Biometrics offers a genuine method of identification that most other systems are unable to match, in spite of possible flaws. As a trade off, the high reliability provided by the system requires increased responsibility to keep user information private and secure from even the users themselves. Biometric security systems are extremely difficult, if not impossible, to subvert using conventional cra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remapping the world in 3D

    Publication Year: 2010, Page(s):21 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2724 KB) | HTML iconHTML

    During the past few years, we have witnessed the explosive growth in demand for three-dimensional geospatial data and the popularization of related applications has reached levels never before imaged. Arguably, the major catalysts behind the increasing interest in geospatial information by the general public have been Internet search engines like Google, which places integrated maps into its resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embellished macro descriptive language for reverse assembly code

    Publication Year: 2010, Page(s):26 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1187 KB) | HTML iconHTML

    This article illustrates both theoretically and practically how LLL, HLL and MDL could be fused together to shape the elementary code structure into more approachable, elegant, and sophisticated delineation metastatements. Further work must be done in the area of code symbolization and interrelation to achieve an agreeable scheme. The development and improvement on MDL will continue from many diff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to reactive protocol

    Publication Year: 2010, Page(s):34 - 35
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1180 KB) | HTML iconHTML

    A protocol is set of rules for communications. Reactive protocols are a kind of communication protocol. The main purpose of reactive protocols is to react based only "on the demand." It is just like saying, "When you need me, tell me." A mobile ad hoc network (MANET) contains several different kinds of protocol, one of which is the ad hoc distance vector routing algorithm (AODV). The AODV routing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fractality of numeric and symbolic sequences

    Publication Year: 2010, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1933 KB) | HTML iconHTML

    The behavior of systems can be studied to an extent, by analyzing the sequences generated by them. These systems can include galaxies, living beings, machines, or oceans, among others. Generally, these sequences contain numbers or symbols. For example, they can range from counting numbers (1, 2, 3, 4...) to DNA sequences (deoxyribo nucleic acid, GTCGTAGCTCCGTA) or from the duty cycle of a device (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Calling All Student Branches

    Publication Year: 2010, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (935 KB)
    Freely Available from IEEE
  • Signals and Systems II: Part II: Interpolation, decimation, complex signals, and Nyquist signaling

    Publication Year: 2010, Page(s):40 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1583 KB) | HTML iconHTML

    This six-part series is a minicourse, focused on system concepts, that is aimed at the gap between Signals and Systems and the usual first digital signal processing course. Part I discussed motivation, philosophy, and notation. This second article in the series focuses on oversampling in D/A conversion and the basics of decimation, complex signals, and Nyquist signaling. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gamesman solutions

    Publication Year: 2010, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (1237 KB)
    Freely Available from IEEE
  • Game On!

    Publication Year: 2010, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (1237 KB)
    Freely Available from IEEE
  • 2010 Student Activities Committee E-mail Addresses

    Publication Year: 2010, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • IEEE Media Advertising Sales Offices

    Publication Year: 2010, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Gamesman problems

    Publication Year: 2010, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Ad index

    Publication Year: 2010, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • IEEE Proceedings [advertisement]

    Publication Year: 2010, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (845 KB)
    Freely Available from IEEE
  • Marsh Affinity Group [advertisement]

    Publication Year: 2010, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (685 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com