IEEE Potentials

Issue 6 • Nov.-Dec. 2013

Filter Results

Displaying Results 1 - 20 of 20
  • Front Cover

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1688 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (645 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2013, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • [Editorial]

    Publication Year: 2013, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (106 KB) | HTML iconHTML
    Freely Available from IEEE
  • [The Way Ahead]

    Publication Year: 2013, Page(s):3 - 31
    Request permission for commercial reuse | PDF file iconPDF (163 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Letter to the Editor]

    Publication Year: 2013, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE?HKN Lambda Theta: A Year in Review

    Publication Year: 2013, Page(s):5 - 6
    Request permission for commercial reuse | PDF file iconPDF (944 KB)
    Freely Available from IEEE
  • Privacy Engineering Emerges as a Hot New Career

    Publication Year: 2013, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3569 KB) | HTML iconHTML

    Are you concerned about the privacy implications of big data; government surveillance; or the ability of social networks, search engines, and online advertisers to amass detailed profiles of individuals? Do you want to use your technical skills to help reverse the trend toward diminishing privacy? Would you like to help find ways to design privacy into products and services without sacrificing fun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Generalized Pseudo-Knight?s Tour Algorithm for Encryption of an Image

    Publication Year: 2013, Page(s):10 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4161 KB) | HTML iconHTML

    With more data being stored and transferred in some digitized form, it is becoming considerably easy for unauthorized people to access this data. It is important to have measures to hide data considering the inevitability of it falling into wrong hands. Measures like symmetric key cryptosystem protects against such threats. But sometimes even such systems or an algorithm can be broken without the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gamesman Solutions

    Publication Year: 2013, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (309 KB)
    Freely Available from IEEE
  • Topics in Biometric Human-Machine Interaction Security

    Publication Year: 2013, Page(s):18 - 25
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1472 KB) | HTML iconHTML

    Biometrics is the science and technology of measuring and statistically analyzing biological data. As applied to computing and human-machine interaction (HMI), biometric applications deal with recognizing the individual or deciphering the individual's conversation (e.g., in the form of voice commands or gestures) or collecting and analyzing data regarding the individual's health and emotional stat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inside SHA-3

    Publication Year: 2013, Page(s):26 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB) | HTML iconHTML

    The National Institute of Standards and Technology (NIST) has selected a new cryptographic hash algorithm through a public competition. The new hash algorithm is referred to as the Secure Hash Algorithm 3 (SHA-3) and is intended to complement the SHA-2 hash algorithms currently specified in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. The selected algorithm is intend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Susceptibility of Magnetic Hard Disk Drives to External dc Magnetic Fields

    Publication Year: 2013, Page(s):32 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (989 KB) | HTML iconHTML

    The first magnetic hard disk drive was created by IBM in 1956. Despite extreme improvements in data density and data transfer rates, the fundamental concept of operation in modern drives remains largely intact (Hayes, 2002). The drives store and retrieve data using moveable read and write heads held proximal to rotating platters. The platters are coated with a thin layer of cobalt alloy (previousl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Turning Remote-Controlled Military Systems into Autonomous Force Multipliers

    Publication Year: 2013, Page(s):39 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2636 KB) | HTML iconHTML

    Conducting military combat missions requires manpower and places our service members? lives at risk. The military has begun employing remotely controlled assets, such as unmanned aerial vehicles and unmanned ground vehicles, to improve personnel safety. Despite this obvious advantage, there is one particular drawback: current unmanned systems still require one or more personnel to control each sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • My First Love [My First Job]

    Publication Year: 2013, Page(s):44 - 45
    Request permission for commercial reuse | PDF file iconPDF (555 KB) | HTML iconHTML
    Freely Available from IEEE
  • Color the World with Your Words

    Publication Year: 2013, Page(s): 45
    Request permission for commercial reuse | PDF file iconPDF (346 KB)
    Freely Available from IEEE
  • 2013 Student Activities Committee E-mail Addresses

    Publication Year: 2013, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • IEEE Media Advertising Sales Offices

    Publication Year: 2013, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • Gamesman Problems

    Publication Year: 2013, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (351 KB)
    Freely Available from IEEE
  • Join the Gaming Empire!

    Publication Year: 2013, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (490 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com