IEE Review
Volume 51, Issue 10, October 2005
Volumes & issues:
-
Volume 52 (2006)
-
Volume 51 (2005)
-
Volume 50 (2004)
-
Volume 49 (2003)
-
Volume 48 (2002)
-
Volume 47 (2001)
-
Volume 46 (2000)
-
Volume 45 (1999)
-
Volume 44 (1998)
-
Volume 43 (1997)
-
Volume 42 (1996)
-
Volume 41 (1995)
-
Volume 40 (1994)
-
Volume 39 (1993)
-
Volume 38 (1992)
-
Volume 37 (1991)
-
Volume 36 (1990)
-
Volume 35 (1989)
-
Volume 34 (1988)
Volume 51, Issue 10
October 2005
-
- Source: IEE Review, Volume 51, Issue 10, page: 2 –2
- DOI: 10.1049/ir:20051005
- Type: Article
- + Show details - Hide details
-
p.
2
(1)
- Source: IEE Review, Volume 51, Issue 10, p. 4 –5
- DOI: 10.1049/ir:20051006
- Type: Article
- + Show details - Hide details
-
p.
4
–5
(2)
- Source: IEE Review, Volume 51, Issue 10, page: 6 –6
- DOI: 10.1049/ir:20051007
- Type: Article
- + Show details - Hide details
-
p.
6
(1)
(8 pages) - Source: IEE Review, Volume 51, Issue 10, page: 23 –23
- DOI: 10.1049/ir:20051008
- Type: Article
- + Show details - Hide details
-
p.
23
(1)
(2 pages) - Author(s): D. Lenton
- Source: IEE Review, Volume 51, Issue 10, p. 26 –27
- DOI: 10.1049/ir:20051001
- Type: Article
- + Show details - Hide details
-
p.
26
–27
(2)
Online criminals have a new target - the valuable documents that are lying vulnerable on corporate networks. This article describes the new phenomena of enterprise phishing. This is when intruders go into organisations looking for key documents. They may buy them from insiders, they may come in, do directory harvest attacks and look for specific employees and the access they have to documents, and they then sell these for a lot of money. Business strategic plans and intellectual properties are two such documents considered. - Author(s): J. Hayes
- Source: IEE Review, Volume 51, Issue 10, page: 29 –29
- DOI: 10.1049/ir:20051009
- Type: Article
- + Show details - Hide details
-
p.
29
(1)
Losing key computers need not mean losing key data if businesses have a strategy for disaster recovery. - Source: IEE Review, Volume 51, Issue 10, p. 30 –32
- DOI: 10.1049/ir:20051010
- Type: Article
- + Show details - Hide details
-
p.
30
–32
(3)
You may not know him, but, to the millions who watched this year's UK Big Brother on television, Eugene Sully is a star. He's also an IEE member and a 'reasonably serious engineer'. Can he fuse these roles? - Author(s): R. Harle and A. Beresford
- Source: IEE Review, Volume 51, Issue 10, p. 34 –37
- DOI: 10.1049/ir:20051002
- Type: Article
- + Show details - Hide details
-
p.
34
–37
(4)
Road pricing schemes dependent on massive centralised databases will be hugely expensive while posing a threat to personal liberty. This article proposes an alternative. In operation, vehicles would use a radio interface to communicate with the central charging authority, purchasing congestion charge tickets and downloading current prices and charging zones into a local database. Communication with other vehicles is also by radio. As the vehicle moves, the positioning system estimates the instantaneous location, which, used in combination with the local database, allows the computer to determine the current charging zone. The computer also analyses the video stream from a camera and uses automatic number plate recognition to identify any vehicles in front of it. If it successfully identifies a vehicle, the computer uses the radio channel to request the electronic ticket from the identified vehicle; thereby verifying payment. If verification fails, the image is stored by the car, until communication with the central authority becomes possible. In this scheme, enforcement is achieved primarily by other vehicles, and not the central authority. - Author(s): J.P. Conti
- Source: IEE Review, Volume 51, Issue 10, p. 38 –42
- DOI: 10.1049/ir:20051003
- Type: Article
- + Show details - Hide details
-
p.
38
–42
(5)
Open standards and the support of major players are making WiMAX the 'hot' technology for fixed wireless access. WiMAX is a shorthand way of referring to the IEEE 802.16 standard. The type of communication it specifies is known as W-MAN (wireless metropolitan area network), and it extends the distance between the transmitting and receiving devices from less than 100 m in Wi-Fi to some 10 km in WiMAX. This article outlines the technology involved and describes a typical network architecture which consists of a base station (or a number of base stations) in the centre of a city, with the base stations communicating with customer premises equipment. - Author(s): C. Evans-Pughe
- Source: IEE Review, Volume 51, Issue 10, p. 44 –47
- DOI: 10.1049/ir:20051004
- Type: Article
- + Show details - Hide details
-
p.
44
–47
(4)
Video content on mobile phones represents a huge, and potentially lucrative, market provided the regulatory and technical challenges can be overcome. This article begins by discussing two commercial trials in the UK looking at broadcasting television to mobile phone users via digital radio and digital TV-type networks. It then outlines the technical issues involved, such as spectrum allocation, mobile broadcast TV standards, and European systems compatibility.
Editor's comment
News special
News
Asia news
Bigger phish to fry [online enterprise document theft]
Reaping the whirlwind
The most famous engineer in the UK?
Keeping big brother off the road [road congestion charging scheme]
The long road to WiMAX [wireless MAN standard]
Movies on the move [mobile phone video content reception]
Most viewed content for this Journal
Article
content/journals/ir
Journal
5
Most cited content for this Journal
We currently have no most cited data available for this content.