By Topic

IEE Review

Issue 1 • 19 Jan 1995

Filter Results

Displaying Results 1 - 5 of 5
  • Power struggles: crisis management in the UK electricity industry

    Publication Year: 1995, Page(s):21 - 25
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (336 KB)

    The 1984-85 miners' strike marked a turning point in British industrial relations. During the year-long struggle, it took all the management and diplomatic skills of the CEGB to avoid being dragged into the conflict and keep electricity flowing. The authors discuss the measures taken by the CEGB to supply England and Wales with electricity. These including conserving coal, increasing the use of oi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anyhow, anywhere: the rise of open distributed processing

    Publication Year: 1995, Page(s):17 - 20
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (340 KB)

    In the next revolution in computing, programmers will continue to program to a virtual machine, but behind this unitary programming interface will lie, not a single computer, but multiple computers at various locations, with different machine architectures, different operating systems and running code in a multiplicity of programming languages. The umbrella name for this new era of computational f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chasing wolves: an engineer's view of the Battle of the Atlantic

    Publication Year: 1995, Page(s):35 - 37
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (340 KB)

    The Battle of the Atlantic was one of the most protracted and vital episodes of the Second World War; and, more than any other, it was won largely by electronic technology. The author describes the radio system used by German U-boats and how the messages were intercepted by allied forces. The use of HF/DF against the U-boats is described, and in particular the receiving and transmitting antenna sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cost of computer crime

    Publication Year: 1995, Page(s):29 - 32
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (300 KB)

    Computer-related crime cost UK businesses an estimated £473 million in 1993-94. How do these losses occur, and how can they be prevented? The author describes the different types of security breach (both accidental and deliberate) which fall into two main categories, physical and logical, quoting real life examples. The damage caused and the cost of these security breaches are discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firming designs: rapid prototyping

    Publication Year: 1995, Page(s):38 - 39
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (136 KB)

    Although modern CAD packages can give a very good idea of what a finished part will look like, there is still no substitute for a tangible model. Most modern computer-aided design (CAD) systems have excellent shading and animation features, but there is no substitute for a physical solid model to establish the feel of a product. Various analysis techniques can only be applied with a physical part:... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.