By Topic

Computing & Control Engineering Journal

Issue 3 • Date June 2000

Filter Results

Displaying Results 1 - 8 of 8
  • E-commerce-an introduction

    Page(s): 107 - 108
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (182 KB)  

    The e-enablement of business is simply a logical step in a progression which has taken business from the model of the privately owned, self-contained trading unit through to a publicly owned and traded enterprise, integrated into its markets, supply chains and culture. The technology of e-commerce provides businesses with an unprecedented ability to communicate directly with their market. At the consumer level, Web surfing is a very personal activity. An individual customer makes personal contact with the information systems of a potential supplier directly via their Web browser. The availability of active content, personal identification (via the acceptance and analysis of 'cookies' or via exchange of personal digital certificates) and of sophisticated customer databases has allowed businesses to develop very personal relationships with their customers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The relevance of e-commerce to UK business: development and survival in a changing business environment

    Page(s): 109 - 110
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (176 KB)  

    When historians look back at the opening years of the 21st century, they may well conclude that the introduction of e-business techniques represented change on a scale directly comparable to the introduction of electrical power at the end of the 19th. Over the past 12 months (1999-2000), awareness of the potential importance of e-business has risen dramatically in the UK, both in business-to-business (B2B) and business-to-consumer (B2C) applications. According to IDC, UK B2B revenues are expected to reach #28 billion in 2002: some 4% of UK GDP. According to Ernst and Young, B2C may provide 24% of all UK retail sales by the same date. The implementation of e-business is reducing overall inflation. It is also likely to increase long-run sustainable growth in the UK economy by up to 0.5% per annum for the next ten years. Many companies are now exploring how these tools can make their existing business more efficient, by improving customer service, reducing inventory, enhancing quality and speeding up time to market. For most businesses, however, this represents only the first step in a process that may ultimately transform the nature of the business itself. It may lead to radically new types of product or service, new means of financing and novel charging methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legal aspects of e-commerce

    Page(s): 111 - 114
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (362 KB)  

    In principle, a Web site owner or e-commerce trader might inadvertently breach any law in any part of the world, with potentially infinite liability. The issues discussed, as they apply to commercial business over the Internet, include the legal protection of valuable but intangible assets of data and information. Certain information is formally regulated. Legal risk management is effected through administrative procedures and enforceable contracts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-commerce security

    Page(s): 115 - 118
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (432 KB)  

    The past few years have seen the explosive growth of the Internet and of all kinds of Internet services, taking the Internet out of the academic community and firmly into the realm of commerce. To summarise the task of e-commerce security, its primary purpose is not to protect the messages exchanged during business transactions, but to protect the parties involved in those transactions. To be precise, security measures are there to limit the negative impact of engaging in commercial transactions over some electronic medium. Many commercial transactions have impact outside the e-world, and thus e-commerce security also needs to extend its basis beyond technical measures. The author concludes with a comment that has been well used by security professionals in the past: 'security is a people problem'. Education about information security in general and about e-commerce in particular for all parties involved has to be a core part of any strategy to improve e-commerce security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML: what is it good for?

    Page(s): 119 - 124
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (415 KB)  

    XML is fundamental to intelligent data interchange between organisations via the Internet. The key ingredient is standardisation within and across industries. The engineering industry must consider what standards would help it communicate with customers and suppliers and others and develop standards accordingly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for industrial model predictive control

    Page(s): 125 - 134
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (717 KB)  

    The article is concerned with control methods that have been embedded in an industrial model predictive control software package and that have been applied to a wide variety of industrial processes. Three methods are described and the various features are evaluated by considering a constrained multivariable simulation. One method has been in use since 1988 and is widely exploited in industry. The latest methods employ quadratic programming, which has become realistic to employ because of the advances in computing. The relative attributes are contrasted by assessing the ability of the controllers to recover effectively from the impact of a large unmeasured disturbance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a Java microprocessor core using FPGA technology

    Page(s): 135 - 141
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (553 KB)  

    Ever since its introduction from Sun Microsystems four years ago (1996), Java has been widely accepted in the computing and Internet industry. However, the runtime performance is still not good enough for Java to become a general-purpose programming language. The article shows how to implement a Java microprocessor core in silicon to speed up the execution of Java. For a reconfigurable and flexible design, the field programmable gate array is chosen as a target technology for the Java microprocessor. By applying a top-down hardware design methodology to the FPGA design process, it becomes easier and more flexible to implement Java in a FPGA. The DFT technique is added for better testability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Z39.50 information retrieval standard

    Page(s): 143 - 151
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (700 KB)  

    Although the Z39.50 standard is not being widely adopted by the Internet community, it is a mature standard which represents over two decades of collaboration between experts in the information retrieval community. The rapid growth in networked computers has motivated the development of this standard from its origins in the bibliographic domain to becoming a general-purpose information retrieval standard. The article provides an insight into what may at first sight seem to be an overly complex standard and explains some of the main concepts that provide potential for making the protocol a key part of the future of information retrieval. The focus is from a computer networking perspective, and a deliberate attempt has been made not to reference the work in terms of its current popularity amongst the librarian community. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Published from 2003-2007, Computing and Control Engineering was concerned with computing, communications, control and instrumentation.

Full Aims & Scope