183 research outputs found

    Revisiting network neutrality

    Get PDF
    The paper discusses the topical subject of network neutrality, from a US and European legal perspective. The article will begin by first defining network neutrality before addressing the underpinning technology and will then compare the legal approaches adopted by Europe and the US. In Europe, there is an existing electronic communications regulatory framework which can be used to address the network neutrality problem rendering any further legislation unnecessary and perhaps, detrimental to the current framework. In the US, however, the main concern arising is a potential for a 'fragmented' internet, which leads to our conclusion that network neutrality legislation is necessary on multiple levels. The article will conclude that the US' stance on network neutrality legislation will cause a seismic shift in the way we view technology and the way that networks are accessed and utilised

    Autonomous control of a reconfigurable constellation of satellites on geostationary orbit with artificial potential fields

    Get PDF
    This paper presents a method of controlling a constellation of small satellites in Geostationary Earth Orbit (GEO) such that the constellation is able to reconfigure - changing the angular position of its members relative to the Earth’s surface in order to cluster them above particular target longitudes. This is enabled through the use of an artificial potential function whose minimum value corresponds to a state where the phase angle between each satellite and its intended target is minimised. By linking the tangential low-thrust acceleration of each satellite to this artificial potential function, the altitude of each satellite relative to the nominal GEO altitude is manipulated in order to achieve the required drift rate. A demonstration of the efficacy of the method is given through a simple test case in which a constellation of 90 satellites converge upon 3 equatorial targets, with each target requiring the attention of a varying number of spacecraft from the constellation. The constellation performance is analysed in terms of the time taken for the satellites to converge over their targeted longitudes and the Dv required to actuate the phasing maneuvers. This analysis is performed across a parameter space by varying the number of satellites in the constellation, the number of targeted longitudes, and a parameter representing the maximum acceleration of the thruster

    The Impact of Prescribed Fire on Moth Assemblages in the Boston Mountains and Ozark Highlands, in Arkansas

    Get PDF
    In addition to the impacts of prescribed fires on forest vegetation, this ecosystem process also has dramatic impacts on associated insect assemblages. For herbivorous, terrestrial insects, fire predictably results in a cycle of initial insect population reduction followed by recovery and growth, in which these insect populations exceed pre-fire abundances. We sought to examine if fire-induced disturbance cycles make prescribed burned areas more or less suitable specifically for moths (order Lepidoptera), which is a major food source for, among others, multiple bat species. We surveyed moth assemblages at 20 burned and 20 unburned sites in the Boston Mountain and Ozark Highland ecoregions of Arkansas, to determine if biomass or abundance of moths differed between areas that had been burned in the past 10 years, and those areas that had never been burned. Samples were collected early (April to July) and late (August to November) in the growing season of 2017 (hereafter early season and late season, respectively). We compared biomass and abundance of all moths, and of five representative moth species, between burned and unburned sites. The five moth species were chosen and considered to be representative due to their high relative abundance, and ease of identification. The five chosen moth species included the banded tussock moth (Halysidota tessellaris), white-dotted prominent moth (Nadata gibbosa), ailanthus moth (Atteva aurea), grape leaffolder (Desmia funeralis), and painted lichen moth (Hypoprepia fucosa). Results from paired t-tests showed no significant difference in total biomass, or abundance of representative species between burned and unburned sites. However, generalized linear regression models showed significantly higher abundance of moths in areas with high basal area that had been previously burned (β = -0.038 ± 0.004 SE,

    Autonomous satellite constellation for enhanced Earth coverage using coupled selection equations

    Get PDF
    This paper presents a novel solution to the problem of autonomous task allocation for a self-organising constellation of small satellites in Earth orbit. The method allows the constellation members to plan manoeuvres to cluster themselves above particular target longitudes on the Earth’s surface. This is enabled through the use of Coupled Selection Equations, which represent a dynamical systems approach to combinatorial optimisation problems, and whose solution tends towards a Boolean matrix which describes pairings of the satellites and targets which solves the relevant assignment problems. Satellite manoeuvres are actuated using a simple control law which incorporates the results of the Coupled Selection Equations. Three demonstrations of the efficacy of the method are given in order of increasing complexity - first with an equal number of satellites and targets, then with a surplus of satellites, including agent failure events, and finally with a constellation of two different satellite types. The method is shown to provide efficient solutions, whilst being computationally non-intensive, quick to converge and robust to satellite failures. Proposals to extend the method for on-board processing on a distributed architecture are discussed

    Coddling Spies: Why the Law Doesn’t Adequately Address Computer Spyware

    Get PDF
    Consumers and businesses have attempted to use the common law of torts as well as federal statutes like the Computer Fraud and Abuse Act, the Stored Wire and Electronic Communications and Transactional Records Act, and the Wiretap Act to address the expanding problem of spyware. Spyware, which consists of software applications inserted into another\u27s computer to report a user\u27s activity to an outsider, is as innocuous as tracking purchases or as sinister as stealing trade secrets or an individual\u27s identity. Existing law does not address spyware adequately because authorization language, buried in click-through boilerplate, renders much of current law useless. Congress must act to make spyware companies disclose their intentions with conspicuous and clearly-stated warnings

    Self-organising satellite constellation in geostationary Earth orbit

    Get PDF
    This paper presents a novel solution to the problem of autonomous task allocation for a self-organizing satellite constellation in Earth orbit. The method allows satellites to cluster themselves above targets on the Earth’s surface. This is achieved using Coupled Selection Equations (CSE) - a dynamical systems approach to combinatorial optimization whose solution tends asymptotically towards a Boolean matrix describing the pairings of satellites and targets which solves the relevant assignment problems. Satellite manoeuvers are actuated by an Artificial Potential Field method which incorporates the CSE output. Three demonstrations of the method’s efficacy are given - first with equal numbers of satellites and targets, then with a satellite surplus, including agent failures, and finally with a fractionated constellation. Finally, a large constellation of 100 satellites is simulated to demonstrate the utility of the method in future swarm mission scenarios. The method provides efficient solutions with quick convergence, is robust to satellite failures, and hence appears suitable for distributed, on-board autonomy

    Effective Keyword Selection Requires a Mastery of Storage Technology and the Law

    Get PDF
    Selecting keywords for searching large volumes of electronically stored information (“ESI”) is an unavoidable, but necessary step in the process of electronic discovery. The parties to a case, or the court, may choose the terms for the search. However, an efficient alternative to both options involves a mediator, neutral, or special master with a thorough understanding of the legal elements of the case and the technology systems that will be subject to keyword search. This alternative can benefit both parties, as well as the court, because a “technology-aware” mediator can expedite an agreement that allows both parties to maintain oversight of the keyword selection process. This serves both parties’ interests because, as the Zubulake court noted, “[i]t might be advisable to solicit a list of search terms from the opposing party for [the purpose of preservation], so that [opposing counsel] could not later complain about which terms were used.” A poorly designed search term list guarantees that the parties will have to perform a series of subsidiary searches as gaps and problems in the original search become apparent. This can easily be mitigated with a mediator who knows the relevant law and technology. An effective search that results in responsive items being identified begins with the intangible creativity that forms a bond between knowledge of the law and technology

    Data protection: the challenges facing social networking

    Get PDF
    The popularity of social networking sites has increased dramatically over the past decade. A recent report indicated that thirty-eight percent of online users have a social networking profile. Many of these social networking site users (SNS users) post or provide personal information over the internet every day. According to the latest OfCom study, the average adult SNS user has profiles on 1.6 sites and most check their profiles at least once every other day. However, the recent rise in social networking activity has opened the door to the misuse and abuse of personal information through identity theft, cyber stalking, and undesirable screenings by prospective employers. Behavioral advertising programs have also misused personal information available on social networking sites. Society is now facing an important question: what level of privacy should be expected and required within the social networking environment
    corecore