Hasil untuk "Commercial law"

Menampilkan 20 dari ~6783223 hasil · dari CrossRef, DOAJ, arXiv, Semantic Scholar

JSON API
arXiv Open Access 2026
Digital Weight Management Interventions: A review of commercial solutions and survey analysis of user needs

Suncica Hadzidedic, Jingyun Wang, Victor Elijah Adeyemo et al.

Obesity is a global health challenge. According to the World Health Organization (WHO), between 1990 and 2022, adult obesity more than doubled. Weight management interventions (WMIs) support individuals in achieving and maintaining a healthy weight through dietary guidance, physical activity promotion and behavioural counselling. However, traditional WMIs often have limited accessibility. Digital WMIs or DWMIs are delivered via websites or smartphone applications and provide scalable and cost-effective alternatives. However, user needs for digital services and their prevalence in the existing commercial solutions remain underexplored. Hence, our study systematically identified 26 commercial DWMIs to identify their features, services, and data collection practices. Additionally, we performed a user needs analysis by recruiting 207 individuals involved in a real-life WMI. Our findings indicated that DWMIs integrated self-monitoring, goal setting, and behaviour change strategies, yet lack social support, virtual reality applications and adaptive personalisation. WMI clients prefer smartphone Apps and fitness trackers for tracking weight management progress and have varying levels of comfort in using digital resources. The presented results serve as recommendations for future directions in the design and implementation of services for DWMIs.

en cs.HC
arXiv Open Access 2025
On miniature ultra-high-field commercial stellarator reactors with breeding external to resistive coils

V. Queral, E. Rincon, A. de Castro et al.

The working parameters and challenges of transposed (breeding external to resistive coils) ultra-high-field pulsed commercial stellarator reactors of small plasma volume are studied. They may allow production of commercial heat and electricity in a tiny and simple device, and contribute to the knowledge on burning plasmas. The concept is based on the previous works (V. Queral et al.) performed for the high-field experimental fusion reactor i-ASTER (J. Fus. Energy 37 2018) and the recent Distributed Divertor concept (non-resonant divertor on the full toroid; J. Fus. Energy 44 2025). The present proposal is driven by the limitation on the minimum size of typical commercial stellarator reactors due to the space needed for internal breeding and shielding of superconducting coils. This limit is about 400 m3, as deduced from e.g. ARIES-CS, ASTER-CP-(IEEE Trans. Plasma Sci. 52 2024) and Stellaris reactors. This fact, together with the accuracy and complexity of the systems, hinders quick iterations for the fast development of stellarator reactors, and also tokamaks. The concept is based on a pulsed high-beta large-aspect-ratio stellarator of small plasma volume (2-4 m3) and ultra-high magnetic field (~ 10-20 T), structured alike i-ASTER and UST_3 stellarators (external monolithic support and internal resistive coils), thermally-adiabatic aluminium conductors for neutron transparency, a low-recycling Distributed Divertor to extract the huge short-pulsed heat power from ionized particles (pulse ~ 5 τE), low pulsed duty cycle of 1-5%, and liquid or solid breeding material around and externally to the reactor core. Different cases and operating points are studied. The main elements, e.g. heat power on the Distributed Divertor, mechanical stresses in the coil support, radiation lifetime, and the prospect of net electricity production are evaluated. The involved challenges are assessed.

en physics.plasm-ph
arXiv Open Access 2025
The high-order Hermite discrete correction function method for surface-driven electromagnetic problems

Yann-Meing Law

The Hermite-Taylor method evolves all the variables and their derivatives through order $m$ in time to achieve a $2m+1$ order rate of convergence. The data required at each node of the staggered Cartesian meshes used by this method makes the enforcement of boundary and interface conditions challenging. In this work, we propose a novel correction function method, referred to as the discrete correction function method, which provides all the data required by the Hermite method near the surface where a condition is enforced. The flexibility of the resulting Hermite-Taylor discrete correction function method is demonstrated by considering a wide range of problems, including those with variable coefficients, discontinuous solutions at the interface, and generalized sheet transition conditions. Although the focus of this work is on Maxwell's equations, this high-order method can be adapted to other linear wave systems. Several numerical examples in two space dimensions are performed to verify the properties of the proposed method, including long-time simulations.

en math.NA
arXiv Open Access 2025
Federated Learning for Commercial Image Sources

Shreyansh Jain, Koteswar Rao Jerripothula

Federated Learning is a collaborative machine learning paradigm that enables multiple clients to learn a global model without exposing their data to each other. Consequently, it provides a secure learning platform with privacy-preserving capabilities. This paper introduces a new dataset containing 23,326 images collected from eight different commercial sources and classified into 31 categories, similar to the Office-31 dataset. To the best of our knowledge, this is the first image classification dataset specifically designed for Federated Learning. We also propose two new Federated Learning algorithms, namely Fed-Cyclic and Fed-Star. In Fed-Cyclic, a client receives weights from its previous client, updates them through local training, and passes them to the next client, thus forming a cyclic topology. In Fed-Star, a client receives weights from all other clients, updates its local weights through pre-aggregation (to address statistical heterogeneity) and local training, and sends its updated local weights to all other clients, thus forming a star-like topology. Our experiments reveal that both algorithms perform better than existing baselines on our newly introduced dataset.

en cs.CV, eess.IV
arXiv Open Access 2025
Computer-based Deceptive Game Design in Commercial Virtual Reality Games: A Preliminary Investigation

Hilda Hadan, Leah Zhang-Kennedy, Lennart E. Nacke

As Virtual Reality (VR) games become more popular, it is crucial to understand how deceptive game design patterns manifest and impact player experiences in this emerging medium. Our study sheds light on the presence and effects of manipulative design techniques in commercial VR games compared to a traditional computer game. We conducted an autoethnography study and developed a VR Deceptive Game Design Assessment Guide based on a critical literature review. Using our guide, we compared how deceptive patterns in a popular computer game are different from two commercial VR titles. While VR's technological constraints, such as battery life and limited temporal manipulation, VR's unique sensory immersion amplified the impact of emotional and sensory deception. Current VR games showed similar but evolved forms of deceptive design compared to the computer game. We forecast more sophisticated player manipulation as VR technology advances. Our findings contribute to a better understanding of how deceptive game design persists and escalates in VR. We highlight the urgent need to develop ethical design guidelines for the rapidly advancing VR games industry.

arXiv Open Access 2025
GNSS jammer localization and identification with airborne commercial GNSS receivers

Marco Spanghero, Filip Geib, Ronny Panier et al.

Global Navigation Satellite Systems (GNSS) are fundamental in ubiquitously providing position and time to a wide gamut of systems. Jamming remains a realistic threat in many deployment settings, civilian and tactical. Specifically, in Unmanned Aerial Vehicles (UAVs) sustained denial raises safety critical concerns. This work presents a strategy that allows detection, localization, and classification both in the frequency and time domain of interference signals harmful to navigation. A high-performance Vertical Take Off and Landing (VTOL) UAV with a single antenna and a commercial GNSS receiver is used to geolocate and characterize RF emitters at long range, to infer the navigation impairment. Raw IQ baseband snapshots from the GNSS receiver make the application of spectral correlation methods possible without extra software-defined radio payload, paving the way to spectrum identification and monitoring in airborne platforms, aiming at RF situational awareness. Live testing at Jammertest, in Norway, with portable, commercially available GNSS multi-band jammers demonstrates the ability to detect, localize, and characterize harmful interference. Our system pinpointed the position with an error of a few meters of the transmitter and the extent of the affected area at long range, without entering the denied zone. Additionally, further spectral content extraction is used to accurately identify the jammer frequency, bandwidth, and modulation scheme based on spectral correlation techniques.

DOAJ Open Access 2024
Kumanovo Commercial and Industrial Bank

Becić Ivan M.

As a large town in the southeastern part of the Kingdom of SHS, Kumanovo was suitable tor the work of financial institutions, especially since no bank operated there until 1921 when at the end of the year Kumanovo Commercial and Industrial Bank was founded. Over time, two banks from Vranje opened branches in this city, and from 1928, the Kumanovo Export and Traffic Bank also operated. The founders of this bank were persons who were already shareholders of the Kumanovo Commercial and Industrial Bank, among whom the most famous was Ilija Vukotić, the national representative. The political involvement of Vukotić and Ćira Manević, the president of the Board of Directors of the Kumanovo Commercial and Industrial Bank on opposite sides, hints at the political background of the establishment of this financial institution. The bank operated successfully until the outbreak of the banking crisis in the Kingdom of Yugoslavioa in 1931, and its position was further compicated by the adoption of the Law on the Protection og Farmers in 1932. The bank paid its obligations until 1936, when it was forced to put itself under protection. In the following years, this institution was an example of the legal application of the moratorium and reduction of inst obligations to investors. Through its operations, the bank carried out a silent liquidation, and its management tool upon itself the burden of unfavorable conditions for the work of banks in the Kingdom of Yugoslavia during the thirtes of thetwntieth century.

History (General) and history of Europe, Social sciences (General)
DOAJ Open Access 2024
Standardized nomenclature for litigational legal prompting in generative language models

Aditya Sivakumar, Ben Gelman, Robert Simmons

Abstract With the increasing availability of commercial Artificial Intelligence, General Language Models (GLMs) have been widely explored in various domains, including law. However, to ensure accurate and standardized legal results, it is crucial to establish a consistent framework for prompting GLMs. This paper presents one of the first instances of such nomenclature, providing a robust framework of “variables” and “clauses” that enhances legal-focused results. The proposed framework was applied in diverse legal scenarios, demonstrating its potential from both client and attorney perspectives. By introducing standardized variables and clauses, legal professionals can effectively communicate with GLMs. This not only improves the accuracy of the generated outcomes but also facilitates collaboration between AI systems and legal experts. With a common framework in place, legal practitioners can leverage AI technology confidently, knowing that the results produced align with established legal principles. Furthermore, the framework serves as a foundation for future research in the field of legal prompting with GLMs, and several avenues for future research are recommended in this paper. This standardization of nomenclature is expected to contribute to the wider adoption and benefit of GLMs in the legal field, leading to more accurate and reliable outcomes.

Computational linguistics. Natural language processing, Electronic computers. Computer science
DOAJ Open Access 2024
DETERMINANTS OF EFFECTIVE TAX RATES OF PUBLIC ENTERPRISES AS AN INDICATION OF TAX AVOIDANCE ON PROFIT TAX

Goranka Knezevic, Vladimir Ristanović, Vladan Pavlovic

Scientific research related to the avoidance of calculation and payment of profit tax in public enterprises is very rare, due to the belief that public enterprises do not avoid paying profit tax because their owner is the state, city, or local government unit. The research conducted in this paper has shown that the largest public enterprises in Serbia, which have a high profitability rate, as well as capital-intensive enterprises, have a higher effective tax rate and do not use tax planning techniques to avoid taxes. These findings can be considered scientifically adequate. All other determinants used in this paper did not show a statistically significant impact on the effective tax rate. When deciding and implementing the profit tax rate policy, as well as tax exemptions, the state must take into account the specificities of the operations of public enterprises and assess the effects of these policies on this sector of the economy.

Criminal law and procedure, Civil law
arXiv Open Access 2024
Comparative Efficacy of Commercial Wearables for Circadian Rhythm Home Monitoring from Activity, Heart Rate, and Core Body Temperature

Fan Wu, Patrick Langer, Jinjoo Shim et al.

Circadian rhythms govern biological patterns that follow a 24-hour cycle. Dysfunctions in circadian rhythms can contribute to various health problems, such as sleep disorders. Current circadian rhythm assessment methods, often invasive or subjective, limit circadian rhythm monitoring to laboratories. Hence, this study aims to investigate scalable consumer-centric wearables for circadian rhythm monitoring outside traditional laboratories. In a two-week longitudinal study conducted in real-world settings, 36 participants wore an Actigraph, a smartwatch, and a core body temperature sensor to collect activity, temperature, and heart rate data. We evaluated circadian rhythms calculated from commercial wearables by comparing them with circadian rhythm reference measures, i.e., Actigraph activities and chronotype questionnaire scores. The circadian rhythm metric acrophases, determined from commercial wearables using activity, heart rate, and temperature data, significantly correlated with the acrophase derived from Actigraph activities (r=0.96, r=0.87, r=0.79; all p<0.001) and chronotype questionnaire (r=-0.66, r=-0.73, r=-0.61; all p<0.001). The acrophases obtained concurrently from consumer sensors significantly predicted the chronotype (R2=0.64; p<0.001). Our study validates commercial sensors for circadian rhythm assessment, highlighting their potential to support maintaining healthy rhythms and provide scalable and timely health monitoring in real-life scenarios.

en eess.SP
arXiv Open Access 2024
Common-Mode Control and Confinement Inversion of Electrostatically Defined Quantum Dots in a Commercial CMOS Process

Andrii Sokolov, Xutong Wu, Conor Power et al.

Confining electrons or holes in quantum dots formed in the channel of industry-standard fully depleted silicon-on-insulator CMOS structures is a promising approach to scalable qubit architectures. In this article, we present our results on a calibrated model of a commercial nanostructure using the simulation tool Quantum TCAD, along with our experimental verification of all model predictions. We demonstrate here that quantum dots can be formed in the device channel by applying a combination of a common-mode voltage to the source and drain and a back gate voltage. Moreover, in this approach, the amount of quantum dots can be controlled and modified. Also, we report our results on an effective detuning of the energy levels in the quantum dots by varying the barrier gate voltages. Given the need and importance of scaling to larger numbers of qubits, we demonstrate here the feasibility of simulating and improving the design of quantum dot devices before their fabrication based on a commercial process.

en cond-mat.mes-hall
S2 Open Access 2001
Islamic banking

Christian E. Castro

In recent years the rise of Islamic banking has been one of the most important trends in the economic sphere, with an estimated 1.5 billion Muslims in the world, this arena has plenty of room for expansion. Conforming to Shariah (Islamic Law) puts a huge demand among Muslims looking for financial products and services that adhere to their beliefs. If it weren’t for the creation of such alter-natives to conventional banking and finance, Muslims would find it hard to participate in our globalized world without violating their religious principles. There are currently over 300 financial Institutions across the global sphere providing some type of Islamic financial product. According to some experts, the assets that are currently being managed under Shariah law, which range from investment to commercial banks and investment funds, are estimated to be no less than 300 billion. Other experts in the industry estimate the assets under mana-gement to be much larger. The FSA (Financial Services Authority), a regulator for financial services based out of London, estimates the total amount associated with Shariah banking to be as much as 500 billion. Even the U.S rating agency, S & P, estimates the sukuk (deed) market has reached over 75 billion and will likely be over 150 billion by the end of the decade. It used to be that Islamic fi-nancial products were more of a niche market but over time they are now considered mainstream, with many well-known interna-tional financial institutions battling to get a little piece of the pie.

DOAJ Open Access 2023
DIGITAL ASSETS – A LEGAL APPROACH TO THE REGULATION OF THE NEW PROPERTY LAW INSTITUTE

Predrag Mirković

Development of a digital technology has transformed the way in which an individual, a social group or community, i.e. a state, interacts in their domains of interest. The application of a digital technology, especially ICT, has caused the need to review whether the existing legislative solutions correspond to such news, or whether it is necessary to change or supplement the legal system of the state with new regulations. One of such issues refers to the creation of new types of assets identified as digital assets or the assets based on the creation of a digital technology. The subject of the research paper is the analysis of the institute of digital property with a special reference to the legislative domain of the way of issuing digital property. In his work, the author affirmed the issue of the importance of the legislative challenge in the standardization of relevant social phenomena and relations in the age of the intensive development and application of a digital technology. The aim of the work was achieved in the domain of the conducted normative analysis of the relevant provisions of the Digital Property Act in the part referring to the legislative approach to standardizing the concept of the digital property institute, as well as the particular issues from the domain of issuing digital property.

Criminal law and procedure, Civil law
DOAJ Open Access 2023
Kedudukan Hukum Ahli Waris Penyandang Cacat Mental Dalam Memperoleh Hak Warisnya (Harta Waris)

Imam Sanusi, Dominikus Rato, Dyah Octhorina Susanti

Every human being is born with their own diversity and uniqueness, some have differences called special needs. Many people out there view that a person who is born with special needs is called an imperfect human or is commonly called a cripple. Normative legal research is used in this study to find solutions to the legal position of heirs of people with mental disabilities. The approach used is a statutory approach and a conceptual approach to the authority of guardians, inheritance management, and the rights of people with mental disabilities. People who have mental disorders or disabilities when faced with legal problems, in this case regarding the matter of inheritance, they cannot take/perform legal actions themselves. Even though he is in a state of being unable to carry out legal actions independently, he is still referred to as a legal subject. By recognizing persons with mental disabilities as legal subjects, they are included in legal subjects who are incompetent and can be assisted by guardians to receive inheritance. Keywords : Inheritance, Mental Disability, Empowerment

Commercial law, Public law
arXiv Open Access 2023
AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

Robert A. Bridges, Brian Weber, Justin M. Beaver et al.

This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intelligence Applications to Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 100K files (50/50% benign/malicious) with a stratified distribution of file types, including ~1K zero-day program executables (increasing experiment size two orders of magnitude over previous work). We present an evaluation process of delivering a file to a fresh virtual machine donning the detection technology, waiting 90s to allow static detection, then executing the file and waiting another period for dynamic detection; this allows greater fidelity in the observational data than previous experiments, in particular, resource and time-to-detection statistics. To execute all 800K trials (100K files $\times$ 8 tools), a software framework is designed to choreographed the experiment into a completely automated, time-synced, and reproducible workflow with substantial parallelization. A cost-benefit model was configured to integrate the tools' recall, precision, time to detection, and resource requirements into a single comparable quantity by simulating costs of use. This provides a ranking methodology for cyber competitions and a lens through which to reason about the varied statistical viewpoints of the results. These statistical and cost-model results provide insights on state of commercial malware detection.

en cs.CR
arXiv Open Access 2023
Characterizing current noise of commercial constant-current sources by using of an optically-pumped rubidium atomic magnetometer

Ni Zhao, Lulu Zhang, Yongbiao Yang et al.

This paper introduces a method for characterizing the current noise of commercial constant-current sources(CCSs) using a free-induction-decay(FID) type optically-pumped rubidium atomic magnetometer driven by a radio-frequency(RF) magnetic field. We convert the sensitivity of the atomic magnetometer into the current noise of CCS by calibrating the coil constant. At the same time, the current noise characteristics of six typical commercial low-noise CCSs are compared. The current noise level of the KeySight Model B2961A is the lowest among the six tested CCSs, which is 36.233 0.022 nA / Hz1/2 at 1-25 Hz and 133.905 0.080 nA / Hz1/2 at 1-100 Hz respectively. The sensitivity of atomic magnetometer is dependent on the current noise level of the CCS. The CCS with low noise is of great significance for high-sensitivity atomic magnetometer. The research provides an important reference for promoting the development of high precision CCS, metrology and basic physics research.

en physics.atom-ph
S2 Open Access 2017
Contracts: Ex Machina

K. Werbach, N. Cornell

Smart contracts are self-executing digital transactions using decentralized cryptographic mechanisms for enforcement. They were theorized more than twenty years ago, but the recent development of Bitcoin and blockchain technologies has rekindled excitement about their potential among technologists and industry. Startup companies and major enterprises alike are now developing smart contract solutions for an array of markets, purporting to offer a digital bypass around traditional contract law. For legal scholars, smart contracts pose a significant question: Can smart contracts offer a superior solution to the problem that contract law addresses? In this article, we aim to understand both the potential and the limitations of smart contracts. We conclude that smart contracts offer novel possibilities, may significantly alter the commercial world, and will demand new legal responses. But smart contracts will not displace contract law. Understanding why not brings into focus the essential role of contract law as a remedial institution. In this way, smart contracts actually can illuminate the role of contract law more than they can obviate it.

167 sitasi en Business, Economics
arXiv Open Access 2022
Who Tracks Who? A Surveillance Capitalist Examination of Commercial Bluetooth Tracking Networks

Hongrui Jin

Object and person tracking networks powered by Bluetooth and mobile devices have become increasingly popular for purposes of public safety and individual concerns. This essay examines popular commercial tracking networks and their campaigns from Apple, Samsung and Tile with reference to surveillance capitalism and digital privacy, discovering the hidden assets commodified through said networks, and their potential of turning users into unregulated digital labour while leaving individual privacy at risk.

en cs.SI, cs.CY
arXiv Open Access 2022
Chewing Detection from Commercial Smart-glasses

Vasileios Papapanagiotou, Anastasia Liapi, Anastasios Delopoulos

Automatic dietary monitoring has progressed significantly during the last years, offering a variety of solutions, both in terms of sensors and algorithms as well as in terms of what aspect or parameters of eating behavior are measured and monitored. Automatic detection of eating based on chewing sounds has been studied extensively, however, it requires a microphone to be mounted on the subject's head for capturing the relevant sounds. In this work, we evaluate the feasibility of using an off-the-shelf commercial device, the Razer Anzu smart-glasses, for automatic chewing detection. The smart-glasses are equipped with stereo speakers and microphones that communicate with smart-phones via Bluetooth. The microphone placement is not optimal for capturing chewing sounds, however, we find that it does not significantly affect the detection effectiveness. We apply an algorithm from literature with some adjustments on a challenging dataset that we have collected in house. Leave-one-subject-out experiments yield promising results, with an F1-score of 0.96 for the best case of duration-based evaluation of eating time.

Halaman 17 dari 339162