1,477 research outputs found

    Relativistic DNLS and Kaup-Newell Hierarchy

    Get PDF
    By the recursion operator of the Kaup-Newell hierarchy we construct the relativistic derivative NLS (RDNLS) equation and the corresponding Lax pair. In the nonrelativistic limit cc \rightarrow \infty it reduces to DNLS equation and preserves integrability at any order of relativistic corrections. The compact explicit representation of the linear problem for this equation becomes possible due to notions of the qq-calculus with two bases, one of which is the recursion operator, and another one is the spectral parameter

    The Impacts of Fees and Taxes on Choices of Development Timing and Capital Intensity

    Get PDF
    This article compares the effects of various fiscal policies on choices of development timing and capital intensity when rents on housing follow geometric Brownian motion with those when rents follow arithmetic Brownian motion. These policy instruments include fees on capital, housing, and land, and taxes on urban income, and properties both before and after development. Regardless of the motion of rents, when one choice is fixed, the effects of these policy instruments on the other choice are qualitatively the same. When the two choices are determined endogenously, although these policy instruments exhibit the same qualitative effect on the choice of development timing, they may exhibit different effects on the choice of capital intensity if rents on housing follow different types of motions.Capital intensity, Development Timing, Fees, Taxation, Real Options, International Development, G13, H21, H23, R52,

    Self-Dual Vortices in Chern-Simons Hydrodynamics

    Get PDF
    The classical theory of non-relativistic charged particle interacting with U(1) gauge field is reformulated as the Schr\"odinger wave equation modified by the de-Broglie-Bohm quantum potential nonlinearity. For, (1 - 2\hbar^2) deformed strength of quantum potential the model is gauge equivalent to the standard Schr\"odinger equation with Planck constant \hbar, while for the strength (1 + 2\hbar^2), to the pair of diffusion-anti-diffusion equations. Specifying the gauge field as Abelian Chern-Simons (CS) one in 2+1 dimensions interacting with the Nonlinear Schr\"odinger field (the Jackiw-Pi model), we represent the theory as a planar Madelung fluid, where the Chern-Simons Gauss law has simple physical meaning of creation the local vorticity for the fluid flow. For the static flow, when velocity of the center-of-mass motion (the classical velocity) is equal to the quantum one (generated by quantum potential velocity of the internal motion), the fluid admits N-vortex solution. Applying the Auberson-Sabatier type gauge transform to phase of the vortex wave function we show that deformation parameter \hbar, the CS coupling constant and the quantum potential strength are quantized. Reductions of the model to 1+1 dimensions, leading to modified NLS and DNLS equations with resonance soliton interactions are discussed.Comment: 12 pages, Tex, to be published in Proc. "NEEDS'2000", Gokova, Turkey, 2000; Theor. and Math.Physic

    Implementing the FRAND Standard in China

    Get PDF
    The modern world relies on technical standards, most of which involve standard-essential patents (SEPs). To balance SEP holders\u27fair compensation with standard implementers\u27 access to standardized technologies, standard-setting organizations (SSOs) generally require that their members commit to license their SEPs on a fair, reasonable,and non-discriminatory (FRAND) basis. In recent years, the communications industry has seen a growing amount of litigation concerning SEPs and FRAND in many jurisdictions. As China has grown into a major player and market in the worldwide communications business, its public policy, court decisions, and private business strategies concerning SEPs and FRAND are likely to have a huge global impact in the high-technology sector. The high-profile Huawei v. IDC is the first Chinese court decision ruling on FRAND-encumbered SEPs issues. This is also the first Asian case in which the court determined a FRAND royalty rate to calculate the fee paid by the standard implementer to the SEP holder. Based on the Chinese government\u27s policy toward technical standards and the case of Huawei, this Article identifies two distinguishing features in China\u27s encounter with standard-related issues. The first is the active role played by the government in domestic standard-setting activities, while the second is Chinese courts\u27 civil law approach, associated with good faith, to the enforcement of FRAND commitments. Based on a comparative and critical viewpoint, this Article uses Huawei as an example to illustrate the challenges and perplexities for the judicial determination of a FRAND rate. The reasoning in Huawei is far from sufficient and satisfactory, and it is unclear whether the Chinese courts are tasked to implement the government\u27s industrial policy. Nonetheless, Huawei did identify some crucial factors concerning FRAND and SEPs, and it has had a significant impact on Chinese related standard-setting activities

    Licensing Open Government Data

    Get PDF
    Governments around the world create and collect an enormous and wide-ranging amount of data. For various social, political, and economic reasons, open data has become a popular government practice and international movement in recent years. It is estimated that more than 250 national or local governments from around 50 developed and developing countries have launched open government data (OGD) initiatives. Open data policies are widely recognized as a tool to foster government transparency and economic growth. Businesses have also developed innovative applications, products, and services based on OGD. Although OGD is a global movement, it faces a number of unsolved legal hurdles. Among others, it is critically important for participating governments to devise the most appropriate legal means of releasing data, and intellectual property (IP) licensing has been viewed as one of the main obstacles for governments in this regard. Consequently, entrepreneurs may hesitate to use or reuse government data if there is no reliable licensing or clear legal arrangement governing it. This Article focuses on the legal issues associated with OGD licenses. Different government agencies have chosen different licensing terms to manage the release of their data. This study compares current open data licenses and argues that licensing terms reflect policy considerations, which are quite different from those contemplated in business transactions or shared in typical commons communities. This Article investigates the ambiguous legal status of data together with the new wave of OGD, which concerns some fundamental IP questions not covered by, or analyzed in depth in, the current literature. Moreover, this study suggests that governments should choose or adapt OGD licenses according to their own IP regimes. For example, whether a database right is protected as a sui generis right and whether moral rights are waivable in the subject jurisdiction both lead to licensing terms being designed differently. In the end, this Article argues that the design or choice of OGD license forms an important element of information policy; governments, therefore, should make this decision in accordance with their policy goals and in compliance with their own jurisdictions’ IP laws

    Reconfigurable Security: Edge Computing-based Framework for IoT

    Full text link
    In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security. We then introduce a new reconfigurable security framework based on edge computing, which utilizes a near-user edge device, i.e., security agent, to simplify key management and offload the computational costs of security algorithms at IoT devices. This framework is designed to overcome the challenges including high computation costs, low flexibility in key management, and low compatibility in deploying new security algorithms in IoT, especially when adopting advanced cryptographic primitives. We also provide the design principles of the reconfigurable security framework, the exemplary security protocols for anonymous authentication and secure data access control, and the performance analysis in terms of feasibility and usability. The reconfigurable security framework paves a new way to strength IoT security by edge computing.Comment: under submission to possible journal publication

    The Ping-Pong Olympics of Antisuit Injunction in FRAND Litigation

    Get PDF
    In the past two years, antisuit injunctions (ASIs) and subsequent legal proceedings associated with standard-essential patents (SEPs) subject to fair, reasonable, and nondiscriminatory (FRAND) commitments have proliferated in multiple jurisdictions. This phenomenon reveals not only the transnational nature of technical standards and FRAND-encumbered SEPs but also the jurisdictional tension between different national courts. This Article explains the emergence of ASIs in FRAND scenarios and recent developments in six jurisdictions with major interests in standard development and adoption. Countries have developed different approaches to ASIs based on their own domestic rules and interests. We believe that to promote technical compatibility and international comity, it is necessary to facilitate legal compatibility between jurisdictions at the policy level. Currently, courts in multiple jurisdictions are competing to grant ASIs and anti-anti-suit injunctions (AASIs), leading to fragmented decisions and significant costs for global standardization. We propose to include an exclusive forum selection clause in the policy documents of standard-setting organizations (SSOs) to reduce undesirable transaction costs stemming from ASIs and subsequent legal actions. Our proposal is more realistic and cost-effective than others concerning FRAND dispute resolution

    Comparative Cybersecurity Law in Socialist Asia

    Get PDF
    This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. The two laws both converge and diverge. Their convergences include the stringent regulation of banned acts, network operators, critical infrastructure, data localization, and personal data. These are all shaped by the immediate diffusion of China\u27s Cybersecurity Law in Vietnam and broader structural factors: namely, the common features of the socialist state, socialist legality, and the statist approach to human rights. The foundational divergence is between the Chinese notion of cybersecurity sovereignty and the Vietnamese notion of national cyberspace, which is due to the global diffusion of cybersecurity law in Vietnam and the differences in technological infrastructure and developmental approaches-Chinese exceptionalism and Vietnamese universalism. This Article has implications for comparative law generally and comparative cybersecurity law particularly

    Real-Name Registration Rules and the Fading Digital Anonymity in China

    Get PDF
    China has implemented comprehensive online real-name registration rules, which require Internet users to disclose their identities. Chinese national law has required most online service providers to implement real-name registration since 2012. This article uses the real-name registration rules to illustrate the supremacy and limitations of the Network Authoritarian Model (NAM), an approach leveraging corporate resources for political surveillance and occasionally adopted by the Chinese party-state. By addressing the evolution of real-name registration rules in China, this article illustrates the party-state’s gradual efforts in both eliminating cyberspace anonymity and etching Chinese characteristics on the architecture of the Internet. Although the Chinese government has faced serious challenges in enforcing the real-name registration policy and current enforcement is far from satisfactory, China is not alone in promoting such a policy. Major Internet companies, including Google, Facebook, and LinkedIn, have expressed similar interests in requiring users to register their real names. Moreover, policymakers in developed and developing countries are exploring similarly themed regulations and China, therefore, may well be in the vanguard of the global movement for online real-name registration. Nonetheless, requiring real-name registration in China has not only created huge costs for Internet companies, but also given rise to fierce controversy associated with free speech, privacy, and law enforcement. In this article, we identify several important legal and policy implications of the Chinese real-name registration policy. We also illustrate the foremost predicament currently faced by the Chinese party-state in enforcing the policy. This analysis argues that China may create a “spillover effect” in jurisdictions outside China as well as in the global Internet architecture

    Chiral Resonant Solitons in Broer-Kaup Type New Hydrodynamic Systems

    Full text link
    New Broer-Kaup type systems of hydrodynamic equations are derived from the derivative reaction-diffusion systems arising in SL(2,R) Kaup-Newell hierarchy, represented in the non-Madelung hydrodynamic form. A relation with the problem of chiral solitons in quantum potential as a dimensional reduction of 2+1 dimensional Chern-Simons theory for anyons is shown. By the Hirota bilinear method, soliton solutions are constructed and the resonant character of soliton interaction is found.Comment: 16 pages, 2 figure
    corecore