By Topic

Potentials, IEEE

Issue 6 • Date Nov.-Dec. 2013

Filter Results

Displaying Results 1 - 20 of 20
  • Front Cover

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (1688 KB)  
    Freely Available from IEEE
  • Table of Contents

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (645 KB)  
    Freely Available from IEEE
  • Masthead

    Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (279 KB)  
    Freely Available from IEEE
  • [Editorial]

    Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (106 KB)  
    Freely Available from IEEE
  • [The Way Ahead]

    Page(s): 3 - 31
    Save to Project icon | Request Permissions | PDF file iconPDF (163 KB)  
    Freely Available from IEEE
  • [Letter to the Editor]

    Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (107 KB)  
    Freely Available from IEEE
  • IEEE?HKN Lambda Theta: A Year in Review

    Page(s): 5 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (944 KB)  
    Freely Available from IEEE
  • Privacy Engineering Emerges as a Hot New Career

    Page(s): 7 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3569 KB) |  | HTML iconHTML  

    Are you concerned about the privacy implications of big data; government surveillance; or the ability of social networks, search engines, and online advertisers to amass detailed profiles of individuals? Do you want to use your technical skills to help reverse the trend toward diminishing privacy? Would you like to help find ways to design privacy into products and services without sacrificing functionality or convenience? Do you want to help people take control over their own personal information? If you answered ?yes? to any of these questions, then a career in privacy engineering may be for you. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Generalized Pseudo-Knight?s Tour Algorithm for Encryption of an Image

    Page(s): 10 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4161 KB) |  | HTML iconHTML  

    With more data being stored and transferred in some digitized form, it is becoming considerably easy for unauthorized people to access this data. It is important to have measures to hide data considering the inevitability of it falling into wrong hands. Measures like symmetric key cryptosystem protects against such threats. But sometimes even such systems or an algorithm can be broken without the key making it, so it is important to ocassionally use unorthodox methods to create a fail-safe system that can hold on for some time since, eventually, every algorithm has a glitch that can be exploited and analyzed against the algorithms integrity. Any encryption system can be made to work around a pseudo-knight's tour (PKT) matrix. The encryption process itself is very flexible and can be built around PKT, rendering the user of PKT the required level of security of the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gamesman Solutions

    Page(s): 17
    Save to Project icon | Request Permissions | PDF file iconPDF (309 KB)  
    Freely Available from IEEE
  • Topics in Biometric Human-Machine Interaction Security

    Page(s): 18 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1472 KB) |  | HTML iconHTML  

    Biometrics is the science and technology of measuring and statistically analyzing biological data. As applied to computing and human-machine interaction (HMI), biometric applications deal with recognizing the individual or deciphering the individual's conversation (e.g., in the form of voice commands or gestures) or collecting and analyzing data regarding the individual's health and emotional status.These applications inherently deal with personally identifiable information (PII), which ultimately has to be stored somewhere, retrieved at some point of time, processed, and probably stored again, perhaps over a wireless channel. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inside SHA-3

    Page(s): 26 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1064 KB) |  | HTML iconHTML  

    The National Institute of Standards and Technology (NIST) has selected a new cryptographic hash algorithm through a public competition. The new hash algorithm is referred to as the Secure Hash Algorithm 3 (SHA-3) and is intended to complement the SHA-2 hash algorithms currently specified in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. The selected algorithm is intended to be suitable for use by the U.S. government as well as the private sector and is available royalty-free worldwide. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Susceptibility of Magnetic Hard Disk Drives to External dc Magnetic Fields

    Page(s): 32 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (989 KB) |  | HTML iconHTML  

    The first magnetic hard disk drive was created by IBM in 1956. Despite extreme improvements in data density and data transfer rates, the fundamental concept of operation in modern drives remains largely intact (Hayes, 2002). The drives store and retrieve data using moveable read and write heads held proximal to rotating platters. The platters are coated with a thin layer of cobalt alloy (previously an iron-based magnetic material) that is divided into magnetic domains called bit cells. A bit cell in a modern drive contains 50-100 grains of magnetic material, and the collective magnetic orientation of these grains in a single bit cell represents a logical binary "0" or "1." Through the read/write heads, the disk drive has the means to both detect previously written ones and zeroes (read) and to create or reverse magnetic polarization in bit cells to create new stored data (write). Figure 1 shows this arrangement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Turning Remote-Controlled Military Systems into Autonomous Force Multipliers

    Page(s): 39 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2636 KB) |  | HTML iconHTML  

    Conducting military combat missions requires manpower and places our service members? lives at risk. The military has begun employing remotely controlled assets, such as unmanned aerial vehicles and unmanned ground vehicles, to improve personnel safety. Despite this obvious advantage, there is one particular drawback: current unmanned systems still require one or more personnel to control each system. In some cases this takes more manpower than the manned system alternative. Thus the operator workload for a given unmanned system is high, and the operator must be engaged at all times to render the system useful. The requirement to actively focus on operating these remote-controlled systems consumes valuable human resources and lowers their situational awareness in combat environments. The benefit of these unmanned systems can be greatly increased if the demand on the operator is reduced or eliminated; there is a need for these unmanned systems to function more autonomously. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • My First Love [My First Job]

    Page(s): 44 - 45
    Save to Project icon | Request Permissions | PDF file iconPDF (555 KB)  
    Freely Available from IEEE
  • Color the World with Your Words

    Page(s): 45
    Save to Project icon | Request Permissions | PDF file iconPDF (346 KB)  
    Freely Available from IEEE
  • 2013 Student Activities Committee E-mail Addresses

    Page(s): 46
    Save to Project icon | Request Permissions | PDF file iconPDF (180 KB)  
    Freely Available from IEEE
  • IEEE Media Advertising Sales Offices

    Page(s): 46
    Save to Project icon | Request Permissions | PDF file iconPDF (180 KB)  
    Freely Available from IEEE
  • Gamesman Problems

    Page(s): 47
    Save to Project icon | Request Permissions | PDF file iconPDF (351 KB)  
    Freely Available from IEEE
  • Join the Gaming Empire!

    Page(s): 48
    Save to Project icon | Request Permissions | PDF file iconPDF (490 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elizabeth T.B. Johnston
Design Alaska, Inc.