Issue 1 • Jan.-Feb. 2019

Purchase of this issue is not available.

Filter Results

Displaying Results 1 - 16 of 16
  • Front Cover

    Publication Year: 2019, Page(s): C1
    Request permission for reuse | PDF file iconPDF (907 KB)
    Freely Available from IEEE
  • IEEE Student Editor Announcement

    Publication Year: 2019, Page(s): C2
    Request permission for reuse | PDF file iconPDF (3106 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2019, Page(s): 1
    Request permission for reuse | PDF file iconPDF (327 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2019, Page(s): 2
    Request permission for reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • The Future Is Now [Editorial]

    Publication Year: 2019, Page(s): 3
    Request permission for reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Opportunities for Student Members [The Way Ahead]

    Publication Year: 2019, Page(s):4 - 48
    Request permission for reuse | PDF file iconPDF (224 KB) | HTML iconHTML
    Freely Available from IEEE
  • Gamesman Solutions

    Publication Year: 2019, Page(s): 5
    Request permission for reuse | PDF file iconPDF (223 KB)
    Freely Available from IEEE
  • Smart Consumer Electronic Systems

    Publication Year: 2019, Page(s):6 - 7
    Request permission for reuse | PDF file iconPDF (588 KB) | HTML iconHTML
    Freely Available from IEEE
  • Power Supplies for Consumer Electronic Devices

    Publication Year: 2019, Page(s):8 - 13
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (3032 KB) | HTML iconHTML

    A device used for noncommercial purposes in entertainment, communication, and home offices is called a consumer electronics device (CED), which incorporates electronic circuits for operation. By this definition, computers, cell phones, mobile devices, light-emitting diode (LED) lights, TVs, cameras, gaming stations/consoles, and various other home electronics are examples of CEDs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • S-CHIRP: Securing Communications in Lightweight Peer-to-Peer Networks in the IoT

    Publication Year: 2019, Page(s):14 - 19
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1606 KB) | HTML iconHTML

    Although you may think of our technological world as a giant web of elegantly interconnected devices, the reality is a collection of messy overlapping networks, all communicating simultaneously on disparate infrastructural backbones. To communicate within the chaos today, specific components may be forced to share space on dedicated local networks, or, in many cases, they must rely on complex swit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Neighbor Trust-Based Mechanism to Protect Mobile Networks

    Publication Year: 2019, Page(s):20 - 25
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1059 KB) | HTML iconHTML

    Mobile nodes in a mobile ad hoc network (MANET) form a temporal link between a sender and receiver due to their continuous movement in a limited area. This network can be easily attacked because there is no organized identity. This article discusses the MANET, its various associated challenges, and selected solutions. As a case study, a neighbor trust-based security scheme that can prevent malicio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proof of Authentication: IoT-Friendly Blockchains

    Publication Year: 2019, Page(s):26 - 29
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1598 KB) | HTML iconHTML

    This article introduces the concept of proof of authentication (PoAh) for the lightweight implementation of blockchains in the Internet of Things (IoT). The PoAh can replace existing consensus algorithms, such as proof of work (PoW), proof of stake (PoS), and proof of activity (PoA), for resource- and energy-constrained infrastructures, such as the IoT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Drones: Augmenting Our Quality of Life

    Publication Year: 2019, Page(s):30 - 36
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2057 KB) | HTML iconHTML

    Drone technology that has the potential to disrupt and augment our quality of life is swiftly evolving. Drones are rapidly growing in popularity and are used in various applications, such as agriculture, emergency response, border control, asset inspection, intelligent transportation, and many more areas. This is primarily due to the rapid advances in mobile embedded computing that allow for vario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Localizing the Eye Pupil for Point-of-Gaze Estimation

    Publication Year: 2019, Page(s):37 - 42
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1688 KB) | HTML iconHTML

    The estimation of the point of gaze in a scene presented on a digital screen has many applications, such as fatigue detection and attention tracking. Some popular applications of eye tracking through gaze estimation are depicted in Fig. 1. When estimating the point of gaze, indentifying the visual focus of a person within a scene is required. This is known as the eye fix or point of fixation. Find... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-Marketing via Augmented Reality: A Case Study in the Tourism and Hospitality Industry

    Publication Year: 2019, Page(s):43 - 47
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (917 KB) | HTML iconHTML

    Marketing plays an extremely significant role in the success of any business. In the hospitality and tourism industry, marketing is a key tool to introduce various destinations to customers and attract them to visit a place or stay in a particular hotel. The forms of marketing have considerably evolved during the past decades owing to enhancements in technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gamesman Problems

    Publication Year: 2019, Page(s): 48
    Request permission for reuse | PDF file iconPDF (207 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Vaughan Clarkson

v.clarkson@ieee.org