To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
In this paper, we investigate the number of customers that overlap or coincide with a virtual customer in an Erlang-A queue. Our analysis starts with the fluid and diffusion limit differential equations to obtain the mean and variance of the queue length. We then develop precise approximations for waiting times using fluid limits and the polygamma function. Building on this, we introduce a novel approximation scheme to calculate the mean and variance of the number of overlapping customers. This method facilitates the assessment of transient overlap risks in complex service systems, offering a useful tool for service providers to mitigate significant overlaps during pandemic seasons.
Regression is a fundamental prediction task common in data-centric engineering applications that involves learning mappings between continuous variables. In many engineering applications (e.g., structural health monitoring), feature-label pairs used to learn such mappings are of limited availability, which hinders the effectiveness of traditional supervised machine learning approaches. This paper proposes a methodology for overcoming the issue of data scarcity by combining active learning (AL) for regression with hierarchical Bayesian modeling. AL is an approach for preferentially acquiring feature-label pairs in a resource-efficient manner. In particular, the current work adopts a risk-informed approach that leverages contextual information associated with regression-based engineering decision-making tasks (e.g., inspection and maintenance). Hierarchical Bayesian modeling allow multiple related regression tasks to be learned over a population, capturing local and global effects. The information sharing facilitated by this modeling approach means that information acquired for one engineering system can improve predictive performance across the population. The proposed methodology is demonstrated using an experimental case study. Specifically, multiple regressions are performed over a population of machining tools, where the quantity of interest is the surface roughness of the workpieces. An inspection and maintenance decision process is defined using these regression tasks, which is in turn used to construct the active-learning algorithm. The novel methodology proposed is benchmarked against an uninformed approach to label acquisition and independent modeling of the regression tasks. It is shown that the proposed approach has superior performance in terms of expected cost—maintaining predictive performance while reducing the number of inspections required.
This study explored the effects of interacting with ChatGPT 4.0 on L2 learners’ motivation to write English argumentative essays. Conducted at a public university in a non-English-speaking country, the study had an experimental and mixed-methods design. It utilized both quantitative and qualitative data analyses to inform the development of effective AI-enhanced tailored interventions for teaching L2 essay writing. Overall, the results revealed that interacting with ChatGPT 4.0 had a positive lasting effect on learners’ motivation to write argumentative essays in English. However, a decline in their motivation at the delayed post-intervention stage suggested the need to maintain a balance between utilizing ChatGPT as a writing support tool and enhancing their independent writing capabilities. Learners attributed the increase in their motivation to several factors, including their perceived improvement in essay writing skills, the supportive learning environment created by ChatGPT as a tutor, positive interactions with it, and the development of meta-cognitive awareness by addressing their specific writing issues. The study highlights the potential of AI-based tools in enhancing L2 learners’ motivation in English classrooms.
We consider the count of subgraphs with an arbitrary configuration of endpoints in the random-connection model based on a Poisson point process on ${\mathord{\mathbb R}}^d$. We present combinatorial expressions for the computation of the cumulants and moments of all orders of such subgraph counts, which allow us to estimate the growth of cumulants as the intensity of the underlying Poisson point process goes to infinity. As a consequence, we obtain a central limit theorem with explicit convergence rates under the Kolmogorov distance and connectivity bounds. Numerical examples are presented using a computer code in SageMath for the closed-form computation of cumulants of any order, for any type of connected subgraph, and for any configuration of endpoints in any dimension $d{\geq} 1$. In particular, graph connectivity estimates, Gram–Charlier expansions for density estimation, and correlation estimates for joint subgraph counting are obtained.
We apply moral foundations theory (MFT) to explore how the public conceptualizes the first eight months of the conflict between Ukraine and the Russian Federation (Russia). Our analysis includes over 1.1 million English tweets related to the conflict over the first 36 weeks. We used linguistic inquiry word count (LIWC) and a moral foundations dictionary to identify tweets’ moral components (care, fairness, loyalty, authority, and sanctity) from the United States, pre- and post-Cold War NATO countries, Ukraine, and Russia. Following an initial spike at the beginning of the conflict, tweet volume declined and stabilized by week 10. The level of moral content varied significantly across the five regions and the five moral components. Tweets from the different regions included significantly different moral foundations to conceptualize the conflict. Across all regions, tweets were dominated by loyalty content, while fairness content was infrequent. Moral content over time was relatively stable, and variations were linked to reported conflict events.
Even though Sub-Saharan Africa (SSA) is lagging in digital technology adoption among the global average, there is substantial progress in terms of Information and Communication Technology (ICT) access and use, where it plays a crucial role in increasing the quality of life in the regions. However, digital gaps still exist within the continents, even though technology adoption across African nations has shown an increase in progress. This paper aims to explore factors that contribute to different adoption rates among three digital technologies in SSA, specifically mobile phones, fixed broadband, and fixed telephones. The methodology utilizes panel regression analysis to examine data sourced from the World Bank, which consists of 48 SSA countries from 2006 to 2022. The findings show a consistent growth in mobile phone subscriptions, different from fixed telephone and broadband internet that shows stagnant progress. Furthermore, infrastructure, and human capital are the most significant factors in addition to other influencing factors. The results of this study provide the African governments with insightful advice on addressing the digital divide and accelerating their digital transformation.
A more intuitive appreciation of spatial compliant behavior can be obtained through analysis and description of the behavior in terms of its centers, specifically the center of stiffness, the center of compliance, and the center of elasticity. This paper investigates the properties of each of these centers. Necessary and sufficient conditions for the coincidence of these centers are identified. A physical appreciation of those compliant behaviors that have coincident centers is obtained in terms of restrictions on the geometry of topologically simple mechanisms that realize those behaviors. The results can be used in the design of compliant mechanisms for robotic manipulation, especially when the compliance is characterized by the location of its center.
This chapter examines the extent to which e-commerce platforms may be held liable for problematic goods sold by third-party sellers on their websites. Several courts have hesitated to find e-commerce platforms liable under products liability and warranty law for products sold on their marketplaces by third-party sellers. This chapter argues that the increasing shift from in-person sales of goods to online sales necessitates a shift in current interpretations of key principles under state products liability and warranty law under Article 2 of the Uniform Commercial Code to better protect consumer interests. E-commerce platforms should, upon meeting certain criteria, be viewed as sellers and merchants for purposes of Article 2 warranties and products liability law. This chapter also highlights the role of state consumer law mandating product warnings and the federal Communications Decency Act, which, in some cases, may pose a hurdle to successful consumer claims against e-commerce platforms. The chapter concludes by offering a path forward.
3D printing, or additive manufacturing, has consequences for intellectual property (IP) law and for business models. The mechanical and digital technology of 3D printing enables the creations of a three-dimensional object from a digital 3D software model in a Computer-aided Design (CAD) file. The 3D printing platforms for creating, modifying, and transferring CAD files can take place in digital form easily and quickly, which presents opportunities for copying and raises new IP law protection considerations. 3D printing’s proliferating use by hobbyists and in new industries transforms traditional methods of creation, distribution, and sale of goods through the use of CAD files, and, in so doing, raises questions about the scope of IP legal protection and necessitates reevaluation of IP statutes. 3D printing’s technological advancement may require IP laws to evolve and respond to the nature of the technology. In addition, 3D printing raises new considerations for business models and for the supply chain due to the technology’s ability to provide complexity, customization, efficiency, expansive range of applications, and modularization. Moreover, the digital nature of CAD files, which embody physical objects in digital form, transforms design, modification, and transfer of objects and parts, reallocating production of objects to be more nimble and more flexible. As such, 3D printing can enable a new way to mass customize and can replace mass production in ways that allow new business entities to capture a new way of creating value.
Quantum technologies are promising to become one of the most impactful emerging technologies of the century. As governments and the private sector race to achieve quantum supremacy, it is crucial for the legal community to understand and analyze how these technologies will influence societies and shape consumer experiences. This essay offers an overview of the potential impacts of Quantum Information Science and Technology (QIST) on privacy as we know it today. It reviews quantum computers, quantum internet, quantum encryptions, and quantum sensing to offer a brief introduction of these fields for the legal community. This essay then proposes a novel analytical framework for future scholarly work on QIST privacy impacts. It concludes that QIST could have primary and secondary effects on privacy that would both improve and undermine privacy. Understanding the challenges that privacy scholars may soon face and having a robust framework to work with is a crucial step for future research in this emerging area of study.
The right to repair not only has important consumer value by preserving the useful life of existing products, but it also has additional and important social value by conserving natural resources and reducing pollution. However, the consumer right to repair in recent years has come under threat through the overextension by intellectual property (IP) doctrines that avoid current limits on antitrust liability by leasing or licensing rather than selling products to avoid “exhausting” IP rights and by applying IP rights to smaller portions of overall sold products, thereby treating parts rehabilitation or parts supply as prohibited acts of making or importation. Constitutional conflicts preemption might address some of these concerns, but federal legislation also is needed to protect consumers’ right to repair their purchased products.
Novel methods of data collection and analysis can enhance traditional risk management practices that rely on expert engineering judgment and established safety records, specifically when key conditions are met: Analysis is linked to the decisions it is intended to support, standards and competencies remain up to date, and assurance and verification activities are performed. This article elaborates on these conditions. The reason engineers are required to perform calculations is to support decision-making. Since humans are famously weak natural statisticians, rather than ask stakeholders to implicitly assimilate data, and arrive at a decision, we can instead rely on subject matter experts to explicitly define risk management decision problems. The results of engineering calculation can then also communicate which interventions (if any) are considered to be risk-optimal. It is also proposed that the next generation of engineering standards should learn from the success of open source software development in community building. Interacting with open datasets and code can promote engagement, identification (and resolution) of errors, training and ultimately competence. Finally, the profession’s tradition of independent verification should also be applied to the complex models that will increasingly contribute to the safety of the built environment. Model assurance will be required to keep pace with model development to identify suitable use cases as adequately safe. These are considered to be increasingly important components in ensuring that methods of data-centric engineering can be safely and appropriately adopted in industry.
This chapter explores the intersection of property law and consumer protection in the digital age, particularly in the context of purchasing technological or digital goods. The unique nature of transactions involving autonomous vehicles, drones, robot-chefs, smart appliances, and eBooks raises questions about the traditional understanding of property rights. While existing critiques often rely on contract law and consumer protection regulations, this chapter argues for the affirmative use of property law in addressing the challenges posed by the restricted usability and alienability of digital products. The prevailing assumption that property law is unsuitable for such issues is challenged, and the chapter advocates for a theoretical and normative shift. By analyzing the regulation and management of technological property through a property law lens, the chapter proposes a new perspective and outlines a roadmap for understanding and addressing the property challenges inherent in the digital consumer landscape.
The EU is attempting to indirectly regulate the Internet of Things by improving access to data through a cross-sectoral data governance framework. On the face of it, recent EU data governance laws – Data Governance Act, Digital Markets Act, Digital Services Act, AI Act – go in the direction of more open, accessible, and reusable data. However, they tend to balance that ethos with provisions that IoT big tech can use to retain and strengthen data enclosures. This chapter aims to critically assess whether the attempt to balance openness and IP results in the prevalence of closed IoT systems, thus ultimately preventing smart data from reuse that would otherwise benefit society at large.
The auction of Bored Ape #8817 for $3.4 million in October 2021 marked a watershed moment in the escalating trend of non-fungible tokens (NFTs). This chapter ventures into the core of the tokenization phenomenon, scrutinizing the legal implications of creating digital representations (tokens) of diverse assets. Amid the burgeoning NFT market, a pivotal question emerges: What precisely are the property rights conferred upon those acquiring these tokens? Beyond the staggering sales figures, the chapter dissects the tokenization process, emphasizing the NFT minting process and blockchain technology. It explores claims that NFTs herald the future of digital property, challenging traditional governmental powers. Anticipating legal challenges, the chapter navigates critical inquiries about token holders’ rights, the tethering (or not) of tokens to underlying assets, and the impact of the 2022 Uniform Commercial Code revisions. This chapter seeks to provide a nuanced perspective, unraveling legal realities from the fervor surrounding tokenization’s transformative potential in the digital era.