3,819 results on '"NETWORK neutrality"'
Search Results
2. HydraulicBridge: Covert Signaling Channel between Air-Gapped Systems Using Hydraulic-Pressure Fluctuations.
- Author
-
Liang, Yongyu, Shan, Hong, Zhao, Jun, Lu, Canju, and Yang, Guozheng
- Subjects
WATER pressure ,NETWORK neutrality ,TELECOMMUNICATION ,COMPUTER systems ,COMMUNICATION of technical information - Abstract
To protect critical computing systems from network attacks, modern enterprises typically employ physical isolation measures to disconnect them from open networks such as the Internet. However, attackers can still infiltrate these closed networks through internal employees or supply chain vulnerabilities. This presents the primary challenge that attackers face: how to effectively manage and manipulate infected devices that are isolated from the external network. In this paper, we propose a new covert communication technology called HydraulicBridge, which demonstrates how air gap networks can communicate through covert water pressure-fluctuation channels. Specifically, we demonstrate how water pressure from water pipes can be used to communicate with infected hosts within an air gap network. Additionally, we provide experimental results demonstrating the feasibility of covert channels and test the communication speed in the experimental environment. Finally, we offer a forensic analysis and propose various methods for detecting and blocking this channel. We believe that this study provides a comprehensive introduction to previously unseen attack vectors that security experts should be aware of. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. The Future of Speech Online: International Cooperation for a Free & Open Internet.
- Author
-
Clegg, Nick
- Subjects
- *
NETWORK neutrality , *INTERNATIONAL cooperation , *INTERNET , *CENSORSHIP , *SOVEREIGNTY - Abstract
This essay explores the impact that the resurgence of sovereignty has had on freedom of online speech. I argue that, in the past few decades, the internet has undergone a radical transformation from a universal tool of free communication to one that is increasingly fragmented into national and regional siloes. While acknowledging that recent internet regulation by democratic governments has been both necessary and inevitable, I argue that the authoritarian internet model-with citizens segregated from the rest of the global internet and subject to extensive surveillance and censorship - is on the rise, presenting a real risk to the internet as we know it. In the face of this threat, the world's techno-democracies need to work together to protect the freedoms that the internet has so far made possible. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. A Conditional Privacy-Preserving Identity-Authentication Scheme for Federated Learning in the Internet of Vehicles.
- Author
-
Xu, Shengwei and Liu, Runsheng
- Subjects
- *
FEDERATED learning , *ARTIFICIAL intelligence , *AUTOMOBILE industry , *NETWORK neutrality , *INTERNET , *BLOCK ciphers - Abstract
With the rapid development of artificial intelligence and Internet of Things (IoT) technologies, automotive companies are integrating federated learning into connected vehicles to provide users with smarter services. Federated learning enables vehicles to collaboratively train a global model without sharing sensitive local data, thereby mitigating privacy risks. However, the dynamic and open nature of the Internet of Vehicles (IoV) makes it vulnerable to potential attacks, where attackers may intercept or tamper with transmitted local model parameters, compromising their integrity and exposing user privacy. Although existing solutions like differential privacy and encryption can address these issues, they may reduce data usability or increase computational complexity. To tackle these challenges, we propose a conditional privacy-preserving identity-authentication scheme, CPPA-SM2, to provide privacy protection for federated learning. Unlike existing methods, CPPA-SM2 allows vehicles to participate in training anonymously, thereby achieving efficient privacy protection. Performance evaluations and experimental results demonstrate that, compared to state-of-the-art schemes, CPPA-SM2 significantly reduces the overhead of signing, verification and communication while achieving more security features. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Comments of Tejas N. Narechania, Safeguarding and Securing the Open Internet, FCC WC Docket No. 23-320
- Author
-
Narechania, Tejas N
- Subjects
Open Internet ,net neutrality ,network neutrality ,FCC ,Federal Communications Commission ,federalism ,preeemption ,major questions doctrine ,Chevron ,Brand X - Published
- 2023
6. Network Neutrality Policies in the 5G South American Market
- Author
-
Triviño, Roberto, Franco-Crespo, Antonio, Ochoa-Urrego, Leonardo, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Olmedo Cifuentes, Gonzalo Fernando, editor, Arcos Avilés, Diego Gustavo, editor, and Lara Padilla, Hernán Vinicio, editor
- Published
- 2024
- Full Text
- View/download PDF
7. FCC pursues rule forcing carriers to unlock phones after 60 days.
- Author
-
Alleven, Monica
- Subjects
AMERICAN consumers ,POOR communities ,CONSUMER activism ,NETWORK neutrality ,CELL phones - Abstract
The article reports on the decision of the U.S. Federal Communications Commission (FCC) to pursue a rule requiring mobile phone service providers to unlock cell phones of customers within 60 days. It informs about the conditions imposed by the FCC related to Verizon's acquisition of TracFone and the merger of Sprint and T-Mobile. It shows the positive response of consumer advocacy group Public Knowledge, Mobile X and the National Telecommunications and Information Administration to the policy.
- Published
- 2024
8. Far Right > Digital Rights: The Precarity of Free Expression, Internet Access, Net Neutrality and Data Privacy in Bolsonaro's Brazil.
- Author
-
Hoskins, Guy T.
- Subjects
- *
DATA privacy , *INTERNET access , *NETWORK neutrality , *RIGHT-wing populism , *PRECARITY , *FREEDOM of expression , *PUBLIC sphere - Abstract
The election of Jair Bolsonaro to the Brazilian Presidency in 2018 was a politically destabilising event with far-reaching consequences. The fate of digital rights in Brazil was particularly impacted, with the legacy of the celebrated Marco Civil da Internet rights charter called into question. By examining the many ways that the fragile gains of the Marco Civil were corroded during the Bolsonaro presidency – including systematic attacks on freedom of expression online, disinformation campaigns, the violation of network neutrality through zero rating, and the continuing assault on privacy rights – we can understand the multi-pronged nature of Bolsonaro's assault on the public sphere in Brazil as well as the inadequacy of digital rights in safeguarding against the conjoined threats of platform capitalism and far-right populism. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Fair share of network costs and regulatory myopia: learning from net neutrality mistakes.
- Author
-
Colangelo, Giuseppe
- Subjects
- *
NETWORK neutrality , *TELECOMMUNICATION systems , *COMMUNICATION infrastructure , *HIGH technology industries , *MYOPIA - Abstract
To boost the roll-out of the next generation telecommunications infrastructure, EU policy makers have advanced a proposal mandating some large online platforms to compensate network operators with a usage fee. Framed as a matter of large market players paying their fair share of contribution to telecommunications networks, the proposal would represent another unnecessary and harmful regulatory intervention. Indeed, the paper aims to demonstrate that the fair share debate is the poison fruit of a previous intrusive government initiative, that is, the net neutrality regulation. Furthermore, like net neutrality anti-discrimination rules, a fair share Big Tech tax would be a solution that wouldn't work for a problem that doesn't exist. Instead of continuing to interfere in market dynamics and private negotiations without any solid evidence of market failures, the EU should learn from past mistakes and acknowledge the limited scope for regulation in these dynamic markets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Upstream market regulation between competitive tension and technological innovation.
- Author
-
Niola, Francesca
- Subjects
- *
TELECOMMUNICATIONS laws & regulations , *NETWORK neutrality , *TRADE regulation , *TELECOMMUNICATION , *ANTITRUST law - Abstract
The document examines challenges and innovations in telecommunications law, focusing on the European context. It highlights the importance of asymmetric regulation and ex ante identification of enterprises with substantial market power. The 2018 European Electronic Communications Code introduces pivotal changes, including co-investment agreements (Art. 76), aiming to foster cost and risk sharing among operators, benefiting smaller enterprises. Such agreements respond to the need for sustainable competition. Art. 72 introduces a new obligation: access to civil engineering infrastructures. This obligation can extend beyond the traditional market if necessary and proportionate to achieve competition and unhindered access objectives. The document emphasizes the regulations' efforts to balance the interests of economic operators and consumers, promoting competition and innovation in the telecommunications sector. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Cloud‐based video streaming services: Trends, challenges, and opportunities.
- Author
-
Kumar, Tajinder, Sharma, Purushottam, Tanwar, Jaswinder, Alsghier, Hisham, Bhushan, Shashi, Alhumyani, Hesham, Sharma, Vivek, and Alutaibi, Ahmed I.
- Subjects
MULTICASTING (Computer networks) ,STREAMING video & television ,ARTIFICIAL intelligence ,DATA privacy ,INTERNET content moderation ,NETWORK neutrality - Abstract
Cloud computing has drastically changed the delivery and consumption of live streaming content. The designs, challenges, and possible uses of cloud computing for live streaming are studied. A comprehensive overview of the technical and business issues surrounding cloud‐based live streaming is provided, including the benefits of cloud computing, the various live streaming architectures, and the challenges that live streaming service providers face in delivering high‐quality, real‐time services. The different techniques used to improve the performance of video streaming, such as adaptive bit‐rate streaming, multicast distribution, and edge computing are discussed and the necessity of low‐latency and high‐quality video transmission in cloud‐based live streaming is underlined. Issues such as improving user experience and live streaming service performance using cutting‐edge technology, like artificial intelligence and machine learning are discussed. In addition, the legal and regulatory implications of cloud‐based live streaming, including issues with network neutrality, data privacy, and content moderation are addressed. The future of cloud computing for live streaming is examined in the section that follows, and it looks at the most likely new developments in terms of trends and technology. For technology vendors, live streaming service providers, and regulators, the findings have major policy‐relevant implications. Suggestions on how stakeholders should address these concerns and take advantage of the potential presented by this rapidly evolving sector, as well as insights into the key challenges and opportunities associated with cloud‐based live streaming are provided. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. An Assessment of CO 2 Capture Technologies towards Global Carbon Net Neutrality.
- Author
-
Karayil, Amith, Elseragy, Ahmed, and Aliyu, Aliyu M.
- Subjects
- *
CARBON sequestration , *CARBON offsetting , *NETWORK neutrality , *EFFECT of human beings on climate change , *CARBON emissions , *CARBON nanofibers - Abstract
Carbon dioxide, the leading contributor to anthropogenic climate change, is released mainly via fossil fuel combustion, mostly for energy generation. Carbon capture technologies are employed for reducing the emissions from existing huge point sources, along with capturing them from direct air, to reduce the existing concentration. This paper provides a quantitative analysis of the various subtypes of carbon capture technologies with the aim of providing an assessment of each from technological, social, geo-political, economic, and environmental perspectives. Since the emissions intensity and quantity, along with the social–political–economic conditions, vary in different geographic regions, prioritising and finding the right type of technology is critical for achieving ambitious net-zero targets. Four main types of carbon capture technology were analysed (adsorption, absorption, membrane, and cryogenic) under four scenarios depending on the jurisdiction. The Technique for Order of Preference by Similarity to Ideal Solution (also known as the TOPSIS method) was used to establish a quantitative ranking of each, where weightages were allocated according to the emissions status and economics of each depending on the jurisdiction. Furthermore, forecasting the trends for technology types vis à vis carbon neutral targets between 2040 and 2050 was carried out by applying regression analysis on existing data and the emissions footprint of major contributing countries. The study found the membrane score to be the highest in the TOPSIS analysis in three of the four scenarios analysed. However, absorption remains the most popular for post-combustion capture despite having the highest energy penalty per ton of CO2 capture. Overall, capture rates are well short of projections for carbon neutrality; the methodology put forward for prioritising and aligning appropriate technologies and the region-by-region analysis will help highlight to technocrats, governments, and policymakers the state of the art and how to best utilise them to mitigate carbon emissions—critical in achieving the net-zero goals set at various international agreements on climate change. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Spatially resolved land and grid model of carbon neutrality in China.
- Author
-
Da Zhang, Ziheng Zhu, Shi Chen, Chongyu Zhang, Xi Lu, Xiliang Zhang, Xiaoye Zhang, and Davidson, Michael R.
- Subjects
- *
CARBON offsetting , *LAND use , *SOLAR wind , *ACCOUNTING policies , *NETWORK neutrality , *GRIDS (Cartography) , *CLIMATE change - Abstract
China has committed to achieve net carbon neutrality by 2060 to combat global climate change, which will require unprecedented deployment of negative emissions technologies, renewable energies (RE), and complementary infrastructure. At terawatt-scale deployment, land use limitations interact with operational and economic features of power systems. To address this, we developed a spatially resolved resource assessment and power systems planning optimization that models a full year of power system operations, sub-provincial RE siting criteria, and transmission connections. Our modeling results show that wind and solar must be expanded to 2,000 to 3,900 GW each, with one plausible pathway leading to 300 GW/yr combined annual additions in 2046 to 2060, a three-fold increase from today. Over 80% of solar and 55% of wind is constructed within 100 km of major load centers when accounting for current policies regarding land use. Large-scale low-carbon systems must balance key trade-offs in land use, RE resource quality, grid integration, and costs. Under more restrictive RE siting policies, at least 740 GW of distributed solar would become economically feasible in regions with high demand, where utility-scale deployment is limited by competition with agricultural land. Effective planning and policy formulation are necessary to achieve China's climate goals. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Website blocking in the European Union: Network interference from the perspective of Open Internet.
- Author
-
Ververis, Vasilis, Lasota, Lucas, Ermakova, Tatiana, and Fabian, Benjamin
- Subjects
NETWORK neutrality ,INTERNET censorship ,INTERNET service providers ,HEALTH websites - Abstract
Copyright of Policy & Internet is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
15. The past, present, and future of (net) neutrality: A state of knowledge review and research agenda.
- Author
-
Hildebrandt, Christian and Wiewiorra, Lukas
- Subjects
NETWORK neutrality ,INTERNET access ,INTERNET service providers ,MARKET power ,QUALITY of service ,GATEKEEPERS ,INFORMATION technology & economics ,TELECOMMUNICATION - Abstract
For almost two decades, the debate on net neutrality influences the governance of the Internet infrastructure operated by Internet service providers (ISPs) and has spurred an enormous body of academic literature. However, new business models such as zero-rating, rapid technological progress, changing consumer behavior and political transformations constantly challenge our understanding of net neutrality. Despite the breadth and depth of knowledge on this topic, a conceptualization and synthesis of almost two decades of interdisciplinary literature is missing. This paper provides a comprehensive state of knowledge review based on a framework of net neutrality that captures the chronology of the debate as well as individual, organizational, and societal level concepts, which allows us to disentangle the nature, effects, and implications of different business practices of ISPs in order to extract new insights. Finally, we develop a research agenda on net neutrality in telecommunications and on neutrality in the wider Internet ecosystem addressing the challenges with respect to digital platforms and data gatekeepers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Nachrichten.
- Subjects
NETWORK neutrality ,INTERNET access ,METADATA ,PILOT projects ,INSTITUTIONAL repositories ,ECOSYSTEMS - Abstract
Copyright of ABI Technik is the property of De Gruyter and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
17. The Activist Potential of Networked Satire: Last Week Tonight with John Oliver and the Struggle for Net Neutrality.
- Author
-
Meier, Matthew R. and Berg, Suzanne V. L.
- Subjects
- *
NETWORK neutrality , *SATIRE , *GOVERNMENT policy , *ACTIVISTS , *ACTIVISM - Abstract
In the fifth episode of Last Week Tonight,John Oliver satirized an FCC proposal to alter net neutrality leading to a surge in public comments, a groundswell of media attention, and the proposal's defeat. In 2017, the FCC considered the proposal again and, despite Oliver's redoubled efforts, voted against net neutrality. These engagements illustrate how satire like Oliver's leverages the inventional resources of networked rhetoric to captivate audiences and direct shared sentiments toward activism by drawing attention to, creating, and extending moments for activism, revealing and engaging adversaries, and challenging discursive barriers that can foster engagement with public policies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. The profitability of flat-price broadband with an over-the-top subscription content product -benefits from cooperation.
- Author
-
Potgieter, Petrus H. and Howell, Bronwyn E.
- Subjects
- *
NETWORK neutrality , *PRICES , *MARKET pricing , *PRICE increases , *CONSUMERS - Abstract
We investigate the effect on the broadband market when an over-the-top subscription content product is introduced. Does it necessarily increase or decrease profitability of the broadband product when it (a) boosts the utility of broadband but (b) imposes additional costs to deliver the broadband service? The short answer is it depends. The different scenarios that we choose to illustrate this demonstrate that in many cases, the broadband and content providers can jointly benefit from coordination on how the content product is priced. Empirical evidence confirms that coordination does take place where 'network neutrality' is not mandated. In addition to the illustrative scenarios, we run a large number of simulations with a single broadband and single content provider, restricting the firms to integer prices, for different distributions of the customer valuations. The results show that cooperation between the firms (possibly through paid peering) generally produces better outcomes (also from the consumer point of view) than when the broadband provider reacts by raising the price of broadband independently. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Light-Weight Clustered Trust Sensing Mechanism for Internet of Things Network.
- Author
-
Rajendra Prasad, M. and Krishna Reddy, D.
- Subjects
- *
TRUST , *INTERNET of things , *TECHNOLOGICAL innovations , *NETWORK neutrality , *SECURITIES trading , *COMMUNICATION infrastructure - Abstract
In recent years due to technological advancements, the Internet of Things (IoT) has been continuously shaping the way to interact with the world around us in homes, workplaces and in different aspects of our life. However, the IoT is an infrastructure-less network and used for long-distance communication, the IoT nodes seek the help of other nodes for effective communication and information transfer. In IoT network, secure communication is the prime concern because of the open internet source and heterogeneity which offers challenges to the network. To achieve efficient security in the IoT devices and to make the IoT network more resilient to different attacks, there is a need to design a secure framework to make the IoT more secure against several security threats. Trust Sensing has been playing a significant role in dealing with security issues. A new Light Weight Clustered Trust Sensing (LWCTS) Mechanism is developed which mainly aims at the reduction of energy consumption of IoT nodes. Initially, the LWCTS clusters the network and chooses Cluster Heads that are rich in resources. Furthermore, the proposed trust model considers two factors: Interactive trust factor and the mobility factor for trust sensing. The mobility factor involvement is mainly implemented to reduce the false positive count in the network. Simulation experiments are conducted over the proposed model and the performance is measured with Malicious Detection Rate, False Negative Rate, False Positive Rate, Average Energy Consumption, and Packet Delivery Ratio. The obtained results prove the effectiveness when compared with existing approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. WEST VIRGINIA V. EPA, A NEW MAJOR QUESTIONS DOCTRINE OR MAINTAINING THE STATUS QUO? AN APPLICATION TO NET NEUTRALITY.
- Author
-
BENDER, DAVID
- Subjects
CLEAN Air Act (U.S.) ,GREENHOUSE gas mitigation ,ENVIRONMENTAL policy ,ADMINISTRATIVE law ,NETWORK neutrality - Abstract
The article focuses on the Supreme Court case West Virginia v. EPA, which rejected the EPA's expansive interpretation of the Clean Air Act regarding greenhouse gas emissions. It explores the implications of "major questions doctrine" invoked by the Court for first time, impacting not only environmental policy but also administrative law principles. It discusses potential ramifications for net neutrality regulations and examines the development and application of the major questions doctrine.
- Published
- 2024
21. THE CONCEPT OF NETWORK NEUTRALITY.
- Author
-
Fatoki, Yewande and Akintoye, Olariyike Damola
- Subjects
NETWORK neutrality ,INTERNET traffic ,INTERNET service providers ,INTERNET users - Abstract
Technology is meant to give people a platform to express themselves. Therefore, network neutrality is a creation for platform where contents, applications, services are to move on the internet without any form of restrictions. It is worrisome to some that internet providers are beginning to give unfair advantage to some data streams thereby making it almost difficult for smaller content creators and to grow. Network neutrality is the principle that internet provider and the Government should treat internet traffic the same. It connotes putting policy and regulatory measures in place to ensure open access and fair treatment of all internet users. This paper discusses the concept of network neutrality according to Tim Wu. It also considers the advantages and disadvantages of network neutrality. It discusses network neutrality in the United States and also the provisions of the Draft code released by the Nigerian Communication Commission in 2017. Hence, a doctrinal methodology was adopted using primary and secondary sources [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks.
- Author
-
Li, Zhe, Liu, Jin, Dong, Yibo, Ren, Jiaqi, and Li, Weili
- Subjects
- *
INFRASTRUCTURE (Economics) , *NETWORK neutrality , *ZERO sum games , *NETWORK performance , *ELECTRIC power distribution grids - Abstract
Network attack and defence games are gradually becoming a new approach through which to study the protection of infrastructure networks such as power grids and transportation networks. Uncertainty factors, such as the subjective decision preferences of attackers and defenders, are not considered in existing attack and defence game studies for infrastructure networks. In this paper, we introduce, respectively, the attacker's and defender's expectation value, rejection value, and hesitation degree of the target, as well as construct an intuitionistic fuzzy goal-based attack and defence game model for infrastructure networks that are based on the maximum connectivity slice size, which is a network performance index. The intuitionistic fuzzy two-player, zero-sum game model is converted into a linear programming problem for solving, and the results are analysed to verify the applicability and feasibility of the model proposed in this paper. Furthermore, different situations, such as single-round games and multi-round repeated games, are also considered. The experimental results show that, when attacking the network, the attacker rarely attacks the nodes with higher importance in the network, but instead pays more attention to the nodes that are not prominent in the network neutrality and median; meanwhile, the defender is more inclined to protect the more important nodes in the network to ensure the normal performance of the network. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Development paths for small businesses in Ukraine after the war.
- Author
-
SHEPEL, Maryna, BALAN, Oleksandr, and LYPYNSKA, Olena
- Subjects
- *
SMALL business , *BUSINESS development , *NETWORK neutrality , *SCIENTIFIC literature , *BUSINESSPEOPLE - Abstract
The article examines the ways to develop small businesses in Ukraine in the post-war period. The overall objective of the study is to identify potential ways to promote small business development in Ukraine in the post-war period. The research objective leads to the following question: what are the best practices and tools that can be used to develop small businesses in Ukraine in the post-war period. To achieve the research objective, the following tasks were used: the analysis of scientific literature on the research topic, using the data obtained within the framework of the UUT 25 Grant Project "Dynamic Capabilities building in Ukrainian SMEs for development and growth in the framework of post-war restoration of territorial communities of Ukraine" (Odesa Polytechnic National University, 2023) and secondary analysis of data from open Internet resources, and the proposals for the small businesses in Ukraine development in the post-war period were given. [ABSTRACT FROM AUTHOR]
- Published
- 2023
24. SMART-FCD: IOT DATA INTEROPERABILITY USING SENSOR BASED FUZZY LINKED RULES FOR CROSS DOMAIN APPLICATIONS.
- Author
-
Anitha, K., Balasubramani, Muthukumar, and K. S., Venkatesh Prasad
- Subjects
INTERNET of things ,SEMANTIC Web ,NETWORK neutrality ,TEMPERATURE sensors ,DATA transmission systems ,INTERNETWORKING ,RDF (Document markup language) - Abstract
Internet of Things (IoT) is connected everywhere and enables massive information exchange between objects and people. The unified global IoT must manage a massive amount of data generated by these connected smart which arises the interoperability challenges such as lack of communication protocols, device support, and accepted open standards in smart environments. To combat these issues, a novel Smart-Fuzzy linked rules for Cross Domain application (Smart-FCD) framework is proposed to ensure interoperability by enabling efficient communication and data exchange between multiple platforms and systems. Initially, the heterogenous data from the sensors such as temperature sensors and humidity sensors, and the descriptions are implemented according to the Sensor Measurement List (SenML) language. After composing, semantic modelling will occur which converts the relational data into Resource Description Framework (RDF) format. The Linked Open Vocabulary for the Internet of Things (LOV4IoT) dataset is used to extract interoperable domain knowledge, which is then fed into the related sensor-based fuzzy rules. The IoT preset semantic models which utilise interoperable datasets and domain instances, which are updated via fuzzy association rules. Semantic Web of Things (SWoT) is a technology that assists in creating semantic-based IoT applications, thus IoT developers may use it to create intelligent applications. The sensor data, RDF simulation, evolution time and latency are some of the parameters that are used to evaluate the effectiveness of the proposed Smart-FCD methodology. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. Evaluating MPTCP Congestion Control Algorithms: Implications for Streaming in Open Internet.
- Author
-
Łuczak, Łukasz Piotr, Ignaciuk, Przemysław, and Morawski, Michał
- Subjects
NETWORK neutrality ,INDUSTRIAL robots ,DIGITAL technology ,ALGORITHMS ,KNOWLEDGE gap theory - Abstract
In today's digital era, the demand for uninterrupted and efficient data streaming is paramount across various sectors, from entertainment to industrial automation. While the traditional single-path solutions often fell short in ensuring rapid and consistent data transfers, Multipath TCP (MPTCP) emerges as a promising alternative, enabling simultaneous data transfer across multiple network paths. The efficacy of MPTCP, however, hinges on the choice of appropriate congestion control (CC) algorithms. Addressing the present knowledge gap, this research provides a thorough evaluation of key MPTCP CC algorithms in the context of streaming applications in open Internet environments. Our findings reveal that BALIA stands out as the most suitable choice for MPTCP streaming, adeptly balancing waiting time, throughput, and Head-of-Line blocking reduction. Conversely, the wVegas algorithm, with its delay-centric approach, proves less adequate for multipath streaming. This study underscores the imperative to fine-tune MPTCP for streaming applications, at the same time offering insights for future development areas and innovations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. Sobre Fronteiras, Cavalos e Gatekeepers: A Evolução do Debate sobre Interoperabilidade e Acesso às Redes no Direito Cibernético.
- Author
-
Casotti, Fábio
- Subjects
NETWORK neutrality ,BARGAINING power ,INTERNET laws ,OPEN innovation ,POWER resources ,SUSTAINABILITY - Abstract
Copyright of Law, State & Telecommunications Review / Revista de Direito, Estado e Telecomunicações is the property of Grupo de Estudos em Direito das Telecomunicacoes (GETEL) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
27. Network Slicing vs. Network Neutrality – Is Consent Possible?
- Author
-
Tomaszewski, Lechosław, Kołakowski, Robert, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Stettner, Lukasz, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Rettberg, Achim, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Maglogiannis, Ilias, editor, Iliadis, Lazaros, editor, Papaleonidas, Antonios, editor, and Chochliouros, Ioannis, editor
- Published
- 2023
- Full Text
- View/download PDF
28. Net neutrality takes a right turn again: Led by Biden's commitment to protecting the Open Internet, the recent FCC decision has brought the Net Neutrality debate back to the front.
- Author
-
SINGHAL, AMITABH
- Subjects
NETWORK neutrality ,TELECOMMUNICATION ,COMMUNICATION policy ,COMMUNICATION infrastructure ,DIGITAL communications ,INTERNET telephony - Abstract
The recent decision by the Federal Communications Commission (FCC) to restore net neutrality has reignited the debate on the topic. Led by President Biden's commitment to protecting the Open Internet, the FCC has reclassified broadband services as common carriers under Title II of the Telecommunications Act, ensuring that ISPs are prohibited from blocking, throttling, or engaging in paid prioritization of lawful content. Net neutrality, which seeks to prevent blocking and filtering of lawful content and services, has been a topic of discussion in various countries, including India, where the principles were adopted in 2018. However, concerns remain about internet shutdowns and content blockings in India. [Extracted from the article]
- Published
- 2024
29. Studying large language models as compression algorithms for human culture.
- Author
-
Buttrick, Nicholas
- Subjects
- *
LANGUAGE models , *NETWORK neutrality , *ALGORITHMS , *RESEARCH personnel - Abstract
Large language models (LLMs) extract and reproduce the statistical regularities in their training data. Researchers can use these models to study the conceptual relationships encoded in this training data (i.e., the open internet), providing a remarkable opportunity to understand the cultural distinctions embedded within much of recorded human communication. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Virtually Hidden: A Theoretical Framework for Understanding and Conceptualising Online Drug Use Pornography.
- Author
-
Scheibein, Florian, Van Hout, Marie Claire, Henriques, Susana, and Wells, John
- Subjects
- *
DRUG utilization , *MEDICAL personnel , *PORNOGRAPHY , *PERFORMANCE theory , *NETWORK neutrality - Abstract
Online drug use pornography has been freely available through websites on the open internet for at least 7 years. Surprisingly there is almost no exploration of its nature, character or impacts on both performers and those engaging with this type of content within the research literature. Nor is it an issue that has engaged health care providers and other statutory and non-statutory agencies even though it may have implications within their respective domains. A preliminary scoping of the online environment is used to propose a theoretical framework that combines Goffman's performance theory with that of Turner and Schechner's positioning of ritual theory within performance theory, Butler's concept of performativity online and Luppichi's concept of the 'technoself'. Utilising the proposed theoretical framework, it is postulated that the presence, performance and engagement of online drug use pornography is a social boundary testing and possibly breaking performance centred on iterative relationships between performer and consumers of this content. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. AT&T: do monopólio privado à concorrência com serviços de streaming e os desafios da regulação.
- Author
-
Beatriz Lemos, Ana and Oliveira Paulino, Fernando
- Subjects
- *
NETWORK neutrality , *POLITICAL communication , *MERGERS & acquisitions , *NINETEENTH century , *TWENTIETH century - Abstract
The article covers the history of AT&T, from the emergence, in the 19th century, from the private monopoly to its collapse in the 20th century, and the restructuring to maintain its dominance in the 21st. In the latter, the trajectory culminates in the merger with WarnerMedia, to face competition with audiovisual streaming services. The article uses the theoretical contribution of the Political Economy of Communication (EPC), in addition to the framework on Network Neutrality, to understand the undoing of this merger, followed by the joining of WarnerMedia with Discovery. It ends with experiences regulating streaming services and challenges to reduce regulatory asymmetries. [ABSTRACT FROM AUTHOR]
- Published
- 2023
32. Brazilian Trans Artivism, Comics and Communities, between Digital and Print: The Cases of Pequenas felicidades trans and Transistorizada.
- Author
-
Mandolini, Nicoletta and Rizzi, Giorgio Busi
- Subjects
COMEDIANS ,DIGITAL printing ,COMIC books, strips, etc. ,MEMOIRS ,NETWORK neutrality ,SEMI-structured interviews - Abstract
This article looks at the intersection of web-based comics and print graphic memoirs authored by transgender Brazilian comics artists. Brazilian comics have in recent years opened up to internet platforms, a change that has proved particularly fruitful for LGBTQ+ artists, traditionally marginalised by the Brazilian comics industry. The article examines two case studies - those of Luiza Lemos and Alice Pereira, both authors of comics originally posted on social media and later published in print. By means of a mixed methodology that brings together semi-structured interviews with the authors and close readings, this contribution investigates the dynamics regulating the creative and publishing processes of these works, as well as the relationship that they entertain with the practice of transsexual self-narration and self-portraiture. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. The effect of hybrid SCMC (BYOD) on foreign language anxiety and learning experience in comparison to pure SCMC and FTF communication.
- Author
-
Xuecheng Liu
- Subjects
DISTRACTION ,BLENDED learning ,LANGUAGE & languages ,CHINESE-speaking students ,NETWORK neutrality ,ANXIETY ,FOREIGN students - Abstract
This study aims to investigate the impact of using synchronized computermediated communication (SCMC) in a face-to-face (FTF) classroom on reducing foreign language anxiety (FLA) and enhancing the learning experience. Fifty Chinese college students participated in a learning activity under three modes: normal FTF classroom (the blank sample), pure SCMC, and hybrid SCMC (BYOD). Smartphones, PCs, open internet, and the bring-your-own-device (BYOD) concept were used for SCMC applications. After completing the learning activity, the students completed Foreign Language Classroom Anxiety Scale (FLCAS) questionnaires. The students were also asked to complete perceptual questionnaires to assess their interaction, anxiety, distraction from the internet, and class atmosphere in the three modes. The results showed that the hybrid SCMC (BYOD) resulted in better interaction than the normal FTF classroom mode (the blank sample), while pure SCMC showed no significant improvement. Both SCMC modes reduced FLA compared to the normal FTF classroom mode (the blank sample), but pure SCMC caused a noticeable increase in distraction from the internet and weakened the classroom atmosphere. In contrast, the hybrid SCMC (BYOD) mode slightly increased distraction and improved the classroom atmosphere. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Net Neutrality: A Fundamental Right in the Digital Constitution?
- Author
-
GRABER, CHRISTOPH B.
- Subjects
- *
CONSTITUTIONALISM , *NETWORK neutrality , *JURISDICTION , *DIGITAL technology , *CIVIL rights , *SOCIETIES - Abstract
Has net neutrality been institutionalized as a fundamental right in the digital constitution? Empirical evidence shows that statutory embedding of net neutrality has recently been taking shape in certain jurisdictions. The unfolding of constitutional structures and processes--the next step to be expected according to the theory of societal constitutionalism--is still pending. What would the scope of protection of net neutrality be if institutionalized as a fundamental right? To answer this normative question, two theoretically challenging issues must be addressed as a preliminary: First, what should be the adequate conceptualization of the relationship between the social and the technological? The perspective adopted by this paper is a combination between science and technology studies scholarship and legal sociology literature. Second, as net neutrality involves relationships between private parties, the question is how fundamental rights should be conceived beyond state-centrism. Methodologically, the sociological reflection of fundamental rights as institutions of society will serve as a benchmark for evaluating future developments of constitutional legal doctrine. [ABSTRACT FROM AUTHOR]
- Published
- 2023
35. Securing Group Patient Communication in 6G-Aided Dynamic Ubiquitous Healthcare with Real-Time Mobile DNA Sequencing.
- Author
-
Le, Tuan-Vinh
- Subjects
- *
MOBILE genetic elements , *MOBILE health , *MULTI-factor authentication , *TELECOMMUNICATION systems , *NETWORK neutrality , *DNA - Abstract
(1) Background: With an advanced technique, third-generation sequencing (TGS) provides services with long deoxyribonucleic acid (DNA) reads and super short sequencing time. It enables onsite mobile DNA sequencing solutions for enabling ubiquitous healthcare (U-healthcare) services with modern mobile technology and smart entities in the internet of living things (IoLT). Due to some strict requirements, 6G technology can efficiently facilitate communications in a truly intelligent U-healthcare IoLT system. (2) Research problems: conventional single user–server architecture is not able to enable group conversations where "multiple patients–server" communication or "patient–patient" communication in the group is required. The communications are carried out via the open Internet, which is not a trusted channel. Since heath data and medical information are very sensitive, security and privacy concerns in the communication systems have become extremely important. (3) Purpose: the author aims to propose a dynamic group-based patient-authenticated key distribution protocol for 6G-aided U-healthcare services enabled by mobile DNA sequencing. In the protocol, an authenticated common session key is distributed by the server to the patients. Using the key, patients in a healthcare group are allowed to securely connect with the service provider or with each other for specific purposes of communication. (4) Results: the group key distribution process is protected by a secure three-factor authentication mechanism along with an efficient sequencing-device-based single sign-on (SD-SSO) solution. Based on traceable information stored in the server database, the proposed approach can provide patient-centered services which are available on multiple mobile devices. Security robustness of the proposed protocol is proven by well-known verification tools and a detailed semantic discussion. Performance evaluation shows that the protocol provides more functionality and incurs a reasonable overhead in comparison with the existing works. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Color Image Steganography Using Gradient Selective Bezier Curves.
- Author
-
Mohammed, Suhaila N.
- Subjects
- *
CRYPTOGRAPHY , *TELECOMMUNICATION , *DATA transmission systems , *MULTIMEDIA communications , *COMMUNICATION of technical information , *NETWORK neutrality - Abstract
Internet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interpolation. On the other hand, because human vision is less sensitive to aberrations in edge regions, imperceptibility is guaranteed by utilizing curves that cross through these regions. Experiments indicate that utilizing gradient selective Bezier curves for secret text concealment can keep the imperceptibility even when the payload capacity is increased. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. A folklorist in Search of Cinderella's Shoe: Internet Databases and Open Systems as Instruments for Creating Folklore Archives and Providing Accessibility to Folkloristic Sources on the Internet.
- Author
-
Perez, Yoel Shalom
- Subjects
- *
DATABASES , *FOLKLORE , *FOLKLORISTS , *NETWORK neutrality , *INTERNET , *CINDERELLA (Legendary character) - Abstract
The article presents the advantages of using databases for the organization of folklore materials found on the internet, such as folktale archives, motif databases and books. It explores examples of databases that already exist on the internet and contain folklore materials and examines the possibility of establishing an open system of folklore databases and other projects that enable the participation of folklorists from around the world. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. KÖNNEN SIE DEN AUSDRUCK NICHT ABSCHAFFEN? - WIE SICH MANCHE MENSCHEN SPRACHVERÄNDERUNG UND SPRACHLENKUNG VORSTELLEN.
- Author
-
Donalies, Elke
- Subjects
LINGUISTIC change ,GERMAN language ,NETWORK neutrality ,LANGUAGE ability testing ,GENERATION gap ,MARITAL conflict ,INTERNET forums ,WINTER festivals - Abstract
Copyright of Sprachreport is the property of Institut fuer Deutsche Sprache and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
39. The Impact of Network Neutrality Violation on the Streaming Platform Ecosystem: Evidence from Twitch TV.
- Author
-
Dongwon Shin and Gunwoong Lee
- Subjects
COMPUTER network traffic ,INTERNET service providers ,QUALITY of service ,NETWORK neutrality ,COMPUTER network management - Abstract
The widespread use of media streaming services has resulted in a surge in network traffic, triggering debates on network usage fees between Internet service providers (ISPs) and content providers (CPs). As a response to network usage fees imposed by ISPs, CPs have opted to provide discriminatory service quality as a means of mitigating costs associated with high traffic volume. In 2022, a leading Korean ISP charged discriminatory network usage fees to Twitch TV, the media streaming platform, due to its excessive network traffic. In response, Twitch implemented a discriminatory service quality reduction policy. Our study examines the impact of this policy on the streaming platform ecosystem. Our results indicate that the implementation of the service quality reduction led to a remarkable decline in the number of viewers, which then resulted in adverse effects for streamers. This study contributes to the literature on network neutrality violation by offering empirical evidence. [ABSTRACT FROM AUTHOR]
- Published
- 2023
40. A fresh epoch for the communication sector: The Telecom Act 2023 marks a significant stride in India's telecom sector drawing upon various aspects of similar global regulations.
- Author
-
GHOSH, JAIDEEP
- Subjects
TELECOMMUNICATION equipment ,TELECOMMUNICATION systems ,DATA privacy ,TELECOMMUNICATIONS services ,DIGITAL technology ,NETWORK neutrality - Published
- 2024
41. Internet Federalism
- Author
-
Narechania, Tejas N and Stallman, Erik
- Subjects
broadband ,federalism ,network neutrality ,net neutrality ,universal service ,municipal broadband ,preemption ,dormant commerce clause ,interconnection ,intercarrier compensation ,pole attachments ,localism ,subsidiarity - Published
- 2020
42. Editor's Note—Fall 2023.
- Author
-
Hettinga, Kirstie
- Subjects
- *
ELECTION coverage , *INDIGENOUS women , *EDITORIAL writing , *NETWORK neutrality , *WOMEN politicians , *WORKPLACE romance , *FREEDOM of the press - Abstract
The article discusses various topics related to news media and journalism. It mentions the resignation of Rupert Murdoch from his leadership role at Fox Corp. and News Corp, as well as the ongoing discussion about net neutrality regulations. The article also highlights the extensive coverage of the budding romance between Taylor Swift and Travis Kelce, which reflects the power of news consumers and its impact on journalistic norms. It further explores the divisive and misinformation aspects of news media. Additionally, the article provides a summary of research articles on topics such as Native women politicians, the use of databases in content analysis, linguistic variation in Pakistani English newspaper editorials, mobile news use in Sub-Saharan Africa, the impact of the COVID-19 pandemic on weekly newspapers, and gendered election coverage in Taiwan. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
43. Net neutrality and high-speed broadband networks: evidence from OECD countries.
- Author
-
Briglauer, Wolfgang, Cambini, Carlo, Gugler, Klaus, and Stocker, Volker
- Subjects
NETWORK neutrality ,INTERNET service providers ,PANEL analysis - Abstract
Network neutrality regulations are intended to preserve the Internet as a non-discriminatory, public network and an open platform for innovation. Whereas the U.S. reversed its regulations in 2017, returning to a less strict regime, the EU has maintained its course and recently revised implementation guidelines for its strict and rather interventionist net neutrality regulations. To this day, there exist only a few empirical investigations on the impact of network neutrality regulations, based on rather broad measures of investment activities for individual countries. Our paper provides the first estimation results on the causal impact of net neutrality regulations on new high-speed (fiber-optic cable-based) infrastructure investment by Internet service providers. We use a comprehensive and most recent OECD panel data set for 32 countries for the period from 2000 to 2021 covering the entire high-speed broadband network deployment period. We employ various panel estimation techniques, including instrumental variables estimation. Our empirical analysis is based on theoretical underpinnings derived from a simplified model in a two-sided market framework. We find empirical evidence that net neutrality regulations exert a significant and strong negative impact on fiber investments. Our results suggest that, while we cannot provide evidence on the overall welfare consequences of net neutrality, imposing strict net neutrality regulations clearly slow down the deployment of new fiber-based broadband connections. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. The UK's net neutrality regulation helps neither consumers nor innovators.
- Author
-
Layton, Roslyn
- Subjects
NETWORK neutrality ,CONSUMERS ,BUSINESSPEOPLE ,INTERNET traffic ,INFORMATION technology ,SELF regulation ,FORECLOSURE - Abstract
This lacklustre performance belies a history of significant internet entrepreneurs who pioneered UK ecommerce (Archives IT, [3]) and UK internet engineers whose fundamental contributions help make the internet that we know today (Kirstein, [12]). NN regulation is frequently proffered as a notion that all internet data is equal and, as such, flat-rate broadband packages based on internet speed are the most fair and equitable way to offer broadband to consumers, presumably to maximise the data from all possible points of the internet. HOW NN REGULATION HARMED INNOVATORS The largest US internet companies were founded well before NN regulation was framed and had already globalised by the time rules were imposed in 2015. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
45. Platelet-rich plasma outcomes do not correlate with patient satisfaction or perceived cost-effectiveness.
- Author
-
Mojica, Edward S., Lin, Charles C., Kirschner, Noah, Ortega, Paola F., Hurley, Eoghan T., Campbell, Kirk A., Alaia, Michael J., and Jazrawi, Laith M.
- Subjects
PLATELET-rich plasma ,PATIENT satisfaction ,SATISFACTION ,KNEE osteoarthritis ,NETWORK neutrality - Abstract
As platelet-rich plasma injection for knee osteoarthritis (OA) has increased in popularity, it has become more important to assess its effectiveness and satisfaction with its use in the context of its high cost. The purpose of this study was to determine satisfaction, commercial appeal, and effectiveness of platelet-rich plasma (PRP) for the treatment of knee OA. A retrospective review of patients who underwent PRP injection in the knee from 2016 to 2019 was performed. Various patient-reported outcomes were collected, including: satisfaction with the PRP injection (out of 100), whether the patient would want to undergo PRP injection again, whether they would recommend the injection and whether they felt that the injection was worth the cost was collected. VAS pain scores were collected and measured out of 100. Demographics and radiographical information were obtained via chart review. Statistical analyses were conducted including descriptive statistics and binary logistic and linear regressions. Overall, 114 patients were included. The mean pre-injectionpain score was 70.4, and the mean pain level decreased after injection to 36.8. Patients rated their satisfaction on average as neutral along the aforementioned continuous scale (49.2), , 50.9% stated that they would get the PRP injection again, 60.5% would recommend to a friend, and 50.9% felt the injection was worth the cost. Younger age and improved post-injection pain correlated with increasing likelihood of desiring further PRP injection. Patients on average rated satisfaction slightly below average, indicating net neutrality in terms of satisfaction with their injection. Furthermore, only half of the patients indicated that it was worth the cost and that they would receive it again. Younger age and post-injection pain relief increased desire for further injection, but pain-relief did not correlate with patients saying that the injection was worth the cost. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. Compensating Downzoning. A Comparative Analysis of European Compensation Schemes in the Light of Net Land Neutrality.
- Author
-
Lacoere, Peter, Hengstermann, Andreas, Jehling, Mathias, and Hartmann, Thomas
- Subjects
- *
NETWORK neutrality , *SPATIAL systems , *COMPARATIVE studies - Abstract
Most spatial planning systems are growth-oriented and focus on upzoning. However, downzoning is becoming increasingly important, as European planning is taking a "resourcial turn" and needs to integrate net land neutrality. Yet downzoning may entail financial compensation for landowners losing their development rights. Understanding the legal and financial mechanisms of compensation schemes is therefore essential for planners. This comparative study investigates the rationale, conditions, and calculations of five European compensation schemes. Our research shows how compensation schemes differ significantly within the European context and concludes that a feasible and affordable compensation scheme is essential for adaptable planning. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. Recovery of Li 2 CO 3 from Spent LiFePO 4 by Using a Novel Impurity Elimination Process.
- Author
-
Chen, Wen-Lan, Chen, Chi, Xiao, Hao, Chen, Cheng-Wei, and Sun, Dan
- Subjects
- *
BATTERY storage plants , *CARBON dioxide , *CARBON offsetting , *NETWORK neutrality - Abstract
The large-scale implementations of lithium iron phosphate (LFP) batteries for energy storage systems have been gaining attention around the world due to their quality of high technological maturity and flexible configuration. Unfortunately, the exponential production of LFP batteries is accompanied by an annual accumulation of spent batteries and a premature consumption of the lithium resource. Recycling souring critical battery materials such as Li2CO3 is essential to reduce the supply chain risk and achieve net carbon neutrality goals. During the recovery of Li2CO3, impurity removal is the most crucial step in the hydrometallurgy process of spent LiFePO4, which determines the purity of Li2CO3. By investigating and comparing the results of impurity elimination from the purified Li+-containing liquids with strong and weak alkalis under identical pH conditions, respectively, a strategy based on an alkali mixture has been proposed. The purified Li+-containing liquid was, thereafter, concentrated and sodium carbonate was added in order to precipitate Li2CO3. As a result, a high purity Li2CO3 (99.51%) of battery grade was obtained. LiFePO4 prepared with the recovered Li2CO3 and FePO4 as raw materials also displayed a comparative high capacity and stable cycle performance to the commercial product and further verified the electrochemical activity of the recovered materials. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Need for Speed: The Impact of In-Process Delays on Customer Behavior in Online Retail.
- Author
-
Gallino, Santiago, Karacaoglu, Nil, and Moreno, Antonio
- Subjects
ELECTRONIC commerce ,CONSUMERS ,WEB design ,INTERNET sales ,NETWORK neutrality ,ONLINE shopping - Abstract
Online retail has become more prominent around the world in the last decade. As a result, online retailers' website performance is increasingly important. Previous literature has extensively studied customer sensitivity to service speed and wait times in offline services. In "Need for Speed: The Impact of In-Process Delays on Customer Behavior in Online Retail," Gallino, Karacaoglu, and Moreno extend this literature to online retail. They study the impact of delays in online retail on customer behavior. They estimate sizable negative effects of website slowdowns on online sales and conversion rates. Moreover, they explore how customer sensitivity to online delays varies throughout customers' shopping journeys. They find that the impact of waiting times varies along the different stages of the shopping journey, with customers becoming more sensitive to slowdowns at the checkout stage. Their findings have implications for website design decisions. This research is especially relevant in the current regulatory environment with ongoing policy debates about net neutrality. The impact of delays has been widely studied in various offline services. The focus of this study is online services, and we explore the impact of in-process delays—measured by website speed—on customer behavior. We leverage novel retail and website speed data to investigate how delays impact online sales and how customer sensitivity to in-process delays varies across the different stages of a customer's shopping journey. We estimate sizable adverse effects of website slowdowns on online sales. Using threshold regression models, we show that customers exhibit diminishing sensitivity to increases in website slowdowns. Our results suggest that waiting times affect customer abandonment differently at different stages of the shopping journey. Customers are more sensitive to slowdowns at the checkout stage. Our findings have implications for website design decisions such as improving website speed at the checkout stage, selecting third-party content providers, and customizing the design of mobile and desktop channels. The paper's results are especially relevant in the current regulatory environment with ongoing policy debates about net neutrality. History: This paper has been accepted for the Operations Research Special Issue on Behavioral Queueing Science. Supplemental Material: The online appendix is available at https://doi.org/10.1287/opre.2022.2262. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. The mediated life of (Ajit) Pai: Disciplining 'model minorities' in neoliberal times.
- Author
-
Bakrania, Falu
- Subjects
- *
RACE , *MINORITIES , *WHITE supremacy , *PROMOTIONAL films , *NETWORK neutrality , *ETHNIC groups - Abstract
The last several years has seen an incredible rise in the visibility of right wing South Asian American politicians. This essay examines the unprecedented media battle waged by and against one such figure, Ajit Pai, the Trump-appointed Chair of the Federal Communications Commission who led a charge to repeal net neutrality. This battle, which took place through promotional videos that Pai produced and a racist meme-driven backlash, is a rich archive for exploring the shifting racial constructions of the 'model minority' in neoliberal times. It reveals new ways in which the 'model minority' is performing race and in turn being racialized. It thereby extends our understanding of how model minority discourse works as a strategy of state governance and of disciplining people of color. Pai enacts what I call 'model minority cool', a subject position that insidiously deploys race: while it performs 'cool' to identify as a person of color who experiences racism, it perpetuates white supremacy. In turn, the backlash against Pai reveals that the model minority is now fungible with the intersecting, abject categories of terrorist, fag, and Black, extending the disciplining reach of model minority ideology. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. An open source smart home management system based on IOT.
- Author
-
Naik, Kevin and Patel, Supriya
- Subjects
- *
SMART homes , *INTERNET of things , *WEB services , *NETWORK neutrality , *ENERGY shortages , *MICROCONTROLLERS - Abstract
Systems which can utilize the energy efficiently have been of much interest due to its promise to mitigate the energy crises. Internet of Things (IoT), i.e. the intercommunication of machines for an effective delivery of services with minimal human intervention, can form the basis of such systems. IoT based systems are gaining popularity due to the availability of high-speed mobile networks coupled with cost effective, accessible and fast embedded hardware. In this paper we propose an IoT based smart home management system using sensors, actuators, smartphone, web services and micro-controllers. The paper offers interoperability with exceptionally reliable connections. The system architecture takes care of the scenario where the devices are turned off when they are not in use. Being an entirely open source framework, a more deterministic control of security features can be attained by the user. Unlike existing frameworks, the proposed architecture makes the IoT system completely available via internet and open source systems. Finally, the implemented prototype demonstrates a flexible platform that can be extended to cater to changing needs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.