289 resultados para Singleton bound


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We used Monte Carlo simulations of Brownian dynamics of water to study anisotropic water diffusion in an idealised model of articular cartilage. The main aim was to use the simulations as a tool for translation of the fractional anisotropy of the water diffusion tensor in cartilage into quantitative characteristics of its collagen fibre network. The key finding was a linear empirical relationship between the collagen volume fraction and the fractional anisotropy of the diffusion tensor. Fractional anisotropy of the diffusion tensor is potentially a robust indicator of the microstructure of the tissue because, in the first approximation, it is invariant to the inclusion of proteoglycans or chemical exchange between free and collagen-bound water in the model. We discuss potential applications of Monte Carlo diffusion-tensor simulations for quantitative biophysical interpretation of MRI diffusion-tensor images of cartilage. Extension of the model to include collagen fibre disorder is also discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A recent decision by the Australian High Court means that, unless faculty are bound by an assignment or intellectual property (IP) policy, they may own inventions resulting from their research. Thirty years after its introduction, the US Bayh-Dole Act, which vests ownership of employee inventions in the employer university or research organization, has become a model for commercialization around the world. In Australia, despite recommendations that a Bayh-Dole style regime be adopted, the recent decision in University of Western Australia (UWA) v Gray1 has moved the default legal position in a diametrically opposite direction. A key focus of the debate was whether faculty’s duty to carry out research also encompasses a duty to invent. Late last year, the Full Federal Court confirmed a lower court ruling that it does not, and this year the High Court refused leave to appeal (denied certiorari). Thus, Gray stands as Australia’s most faculty-friendly authority to date.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In open railway access markets, a train service provider (TSP) negotiates with an infrastructure provider (IP) for track access rights. This negotiation has been modeled by a multi-agent system (MAS) in which the IP and TSP are represented by separate software agents. One task of the IP agent is to generate feasible (and preferably optimal) track access rights, subject to the constraints submitted by the TSP agent. This paper formulates an IP-TSP transaction and proposes a branch-and-bound algorithm for the IP agent to identify the optimal track access rights. Empirical simulation results show that the model is able to emulate rational agent behaviors. The simulation results also show good consistency between timetables attained from the proposed methods and those derived by the scheduling principles adopted in practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dental pulp cells (DPCs) are capable of differentiating into odontoblasts that secrete reparative dentin after pulp injury. The molecular mechanisms governing reparative dentinogenesis are yet to be fully understood. Here we investigated the differential protein profile of human DPCs undergoing odontogenic induction for 7 days. Using two-dimensional differential gel electrophoresis coupled with matrix-assisted laser adsorption ionization time of flight mass spectrometry, 2 3 protein spots related to the early odontogenic differentiation were identified. These proteins included cytoskeleton proteins, nuclear proteins, cell membrane-bound molecules, proteins involved in matrix synthesis, and metabolic enzymes. The expression of four identified proteins, which were heteronuclear ribonuclear proteins C, annexin VI, collagen type VI, and matrilin-2, was confirmed by Western blot and real-time realtime polymerase chain reaction analyses. This study generated a proteome reference map during odontoblast- like differentiation of human DPCs, which will be valuable to better understand the underlying molecular mechanisms in odontoblast-like differentiation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Poor patient compliance with peritoneal dialysis (PD) has significant adverse effects on morbidity and mortality rates in individuals with chronic kidney disease (CKD). It also adds to the resource burdens of healthcare services and providers. This paper explores the notion of PD compliance in patients with CKD with reference to the relevant published literature. The analysis of the literature reveals that ‘PD compliance’ is a complex and challenging construct for both patients and health professionals. There is no universal definition of compliance that is widely adopted in practice and research, and therefore a lack of consensus on how to determine ‘compliant’ patient outcomes. There are also multiple and interconnected determinants of PD compliance that are context-bound, which healthcare professionals must be aware of, and which makes producing consensus of measuring PD compliance difficult. The complexity of the interventions required to produce even a modest improvement in PD compliance, which are described in this paper, are significant. Compliance with PD and other treatments for CKD is a multidimensional, context-bound concept, that to date has tended to efface the role and needs of the renal patient. We conclude the paper with the implications for contemporary practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This correspondence paper addresses the problem of output feedback stabilization of control systems in networked environments with quality-of-service (QoS) constraints. The problem is investigated in discrete-time state space using Lyapunov’s stability theory and the linear inequality matrix technique. A new discrete-time modeling approach is developed to describe a networked control system (NCS) with parameter uncertainties and nonideal network QoS. It integrates a network-induced delay, packet dropout, and other network behaviors into a unified framework. With this modeling, an improved stability condition, which is dependent on the lower and upper bounds of the equivalent network-induced delay, is established for the NCS with norm-bounded parameter uncertainties. It is further extended for the output feedback stabilization of the NCS with nonideal QoS. Numerical examples are given to demonstrate the main results of the theoretical development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To date, biodegradable networks and particularly their kinetic chain lengths have been characterized by analysis of their degradation products in solution. We characterize the network itself by NMR analysis in the solvent-swollen state under magic angle spinning conditions. The networks were prepared by photoinitiated cross-linking of poly(dl-lactide)−dimethacrylate macromers (5 kg/mol) in the presence of an unreactive diluent. Using diffusion filtering and 2D correlation spectroscopy techniques, all network components are identified. By quantification of network-bound photoinitiator fragments, an average kinetic chain length of 9 ± 2 methacrylate units is determined. The PDLLA macromer solution was also used with a dye to prepare computer-designed structures by stereolithography. For these networks structures, the average kinetic chain length is 24 ± 4 methacrylate units. In all cases the calculated molecular weights of the polymethacrylate chains after degradation are maximally 8.8 kg/mol, which is far below the threshold for renal clearance. Upon incubation in phosphate buffered saline at 37 °C, the networks show a similar mass loss profile in time as linear high-molecular-weight PDLLA (HMW PDLLA). The mechanical properties are preserved longer for the PDLLA networks than for HMW PDLLA. The initial tensile strength of 47 ± 2 MPa does not decrease significantly for the first 15 weeks, while HMW PDLLA lost 85 ± 5% of its strength within 5 weeks. The physical properties, kinetic chain length, and degradation profile of these photo-cross-linked PDLLA networks make them most suited materials for orthopedic applications and use in (bone) tissue engineering.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Osteoarthritis (OA) is the most common musculoskeletal disorder and represents a major health burden to society. In the course of the pathological development of OA, articular cartilage chondrocytes (ACCs) undergo atypical phenotype changes characterized by the expression of hypertrophic differentiation markers. Also, the adjacent subchondral bone shows signs of abnormal mineral density and enhanced production of bone turnover markers, indicative of osteoblast dysfunction. Collectively these findings indicate that the pathological changes typical of OA, involve alterations of the phenotypic properties of cells in both the subchondral bone and articular cartilage. However, the mechanism(s) by which these changes occur during OA development are not completely understood. The purpose of this project was to address the question of how subchondral bone osteoblasts (SBOs) and ACCs interact with each other with respect to regulation of respective cells’ phenotypic properties and in particular the involvement of mitogen activated protein kinase (MAPK) signalling pathways under normal and OA joint condition. We also endeavoured to test the influence of cross-talk between SBOs and ACCs isolated from normal and OA joint on matrix metalloproteinase (MMP) expression. For this purpose tissues from the knees of OA patients and normal controls were collected to isolate SBOs and ACCs. The cellular cross-talk of SBOs and ACCs were studied by means of both direct and indirect co-culture systems, which made it possible to identify the role of both membrane bound and soluble factors. Histology, immunohistochemistry, qRT-PCR, zymography, ELISA and western blotting were some of the techniques applied to distinguish the changes in the co-cultured vs. non co-cultured cells. The MAPK signalling pathways were probed by using targeted MAPK inhibitors, and their activity monitored by western blot analysis using phospho MAPK specific antibodies. Our co-culture studies demonstrated that OA ACCs enhanced the SBOs differentiation compared to normal ACCs. We demonstrated that OA ACCs induced these phenotypic changes in the SBOs via activating an ERK1/2 signalling pathway. The findings from this study thus provided clear evidence that OA ACCs play an integral role in altering the SBO phenotype. In the second study, we tested the influence of normal SBOs and OA SBOs on ACCs phenotype changes. The results showed that OA SBOs increased the hypertrophic gene expression in co-cultured ACCs compared to normal SBOs, a phenotype which is considered as pathological to the health and integrity of articular cartilage. It was demonstrated that these phenotype changes occurred via de-activation of p38 and activation of ERK1/2 signaling pathways. These findings suggest that the pathological interaction of OA SBOs with ACCs is mediated by cross-talking between ERK1/2 and p38 pathways, resulting in ACCs undergoing hypertrophic differentiation. Subsequent experiments to determine the effect on MMP regulation, of SBOs and ACCs cross-talk, revealed that co-culturing OA SBOs with ACCs significantly enhanced the proteolytic activity and expression of MMP-2 and MMP-9. In turn, co-culture of OA ACCs with SBOs led to abundant MMP-2 expression in SBOs. Furthermore, we showed that the addition of ERK1/2 and JNK inhibitors reversed the elevated MMP-2 and MMP-9 production which otherwise resulted from the interactions of OA SBOs-ACCs. Thus, this study has demonstrated that the altered interactions between OA SBOs-ACCs are capable of triggering the pathological pathways leading to degenerative changes seen in the osteoarthritic joint. In conclusion, the body of work presented in this dissertation has given clear in vitro evidence that the altered bi-directional communication of SBOs and ACCs may play a role in OA development and that this process was mediated by MAPK signalling pathways. Targeting these altered interactions by the use of MAPK inhibitors may provide the scientific rationale for the development of novel therapeutic strategies in the treatment and management of OA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis employs the theoretical fusion of disciplinary knowledge, interlacing an analysis from both functional and interpretive frameworks and applies these paradigms to three concepts—organisational identity, the balanced scorecard performance measurement system, and control. As an applied thesis, this study highlights how particular public sector organisations are using a range of multi-disciplinary forms of knowledge constructed for their needs to achieve practical outcomes. Practical evidence of this study is not bound by a single disciplinary field or the concerns raised by academics about the rigorous application of academic knowledge. The study’s value lies in its ability to explore how current communication and accounting knowledge is being used for practical purposes in organisational life. The main focus of this thesis is on identities in an organisational communication context. In exploring the theoretical and practical challenges, the research questions for this thesis were formulated as: 1. Is it possible to effectively control identities in organisations by the use of an integrated performance measurement system—the balanced scorecard—and if so, how? 2. What is the relationship between identities and an integrated performance measurement system—the balanced scorecard—in the identity construction process? Identities in the organisational context have been extensively discussed in graphic design, corporate communication and marketing, strategic management, organisational behaviour, and social psychology literatures. Corporate identity is the self-presentation of the personality of an organisation (Van Riel, 1995; Van Riel & Balmer, 1997), and organisational identity is the statement of central characteristics described by members (Albert & Whetten, 2003). In this study, identity management is positioned as a strategically complex task, embracing not only logo and name, but also multiple dimensions, levels and facets of organisational life. Responding to the collaborative efforts of researchers and practitioners in identity conceptualisation and methodological approaches, this dissertation argues that analysis can be achieved through the use of an integrated framework of identity products, patternings and processes (Cornelissen, Haslam, & Balmer, 2007), transforming conceptualisations of corporate identity, organisational identity and identification studies. Likewise, the performance measurement literature from the accounting field now emphasises the importance of ‘soft’ non-financial measures in gauging performance—potentially allowing the monitoring and regulation of ‘collective’ identities (Cornelissen et al., 2007). The balanced scorecard (BSC) (Kaplan & Norton, 1996a), as the selected integrated performance measurement system, quantifies organisational performance under the four perspectives of finance, customer, internal process, and learning and growth. Broadening the traditional performance measurement boundary, the BSC transforms how organisations perceived themselves (Vaivio, 2007). The rhetorical and communicative value of the BSC has also been emphasised in organisational self-understanding (Malina, Nørreklit, & Selto, 2007; Malmi, 2001; Norreklit, 2000, 2003). Thus, this study establishes a theoretical connection between the controlling effects of the BSC and organisational identity construction. Common to both literatures, the aspects of control became the focus of this dissertation, as ‘the exercise or act of achieving a goal’ (Tompkins & Cheney, 1985, p. 180). This study explores not only traditional technical and bureaucratic control (Edwards, 1981), but also concertive control (Tompkins & Cheney, 1985), shifting the locus of control to employees who make their own decisions towards desired organisational premises (Simon, 1976). The controlling effects on collective identities are explored through the lens of the rhetorical frames mobilised through the power of organisational enthymemes (Tompkins & Cheney, 1985) and identification processes (Ashforth, Harrison, & Corley, 2008). In operationalising the concept of control, two guiding questions were developed to support the research questions: 1.1 How does the use of the balanced scorecard monitor identities in public sector organisations? 1.2 How does the use of the balanced scorecard regulate identities in public sector organisations? This study adopts qualitative multiple case studies using ethnographic techniques. Data were gathered from interviews of 41 managers, organisational documents, and participant observation from 2003 to 2008, to inform an understanding of organisational practices and members’ perceptions in the five cases of two public sector organisations in Australia. Drawing on the functional and interpretive paradigms, the effective design and use of the systems, as well as the understanding of shared meanings of identities and identifications are simultaneously recognised. The analytical structure guided by the ‘bracketing’ (Lewis & Grimes, 1999) and ‘interplay’ strategies (Schultz & Hatch, 1996) preserved, connected and contrasted the unique findings from the multi-paradigms. The ‘temporal bracketing’ strategy (Langley, 1999) from the process view supports the comparative exploration of the analysis over the periods under study. The findings suggest that the effective use of the BSC can monitor and regulate identity products, patternings and processes. In monitoring identities, the flexible BSC framework allowed the case study organisations to monitor various aspects of finance, customer, improvement and organisational capability that included identity dimensions. Such inclusion legitimises identity management as organisational performance. In regulating identities, the use of the BSC created a mechanism to form collective identities by articulating various perspectives and causal linkages, and through the cascading and alignment of multiple scorecards. The BSC—directly reflecting organisationally valued premises and legitimised symbols—acted as an identity product of communication, visual symbols and behavioural guidance. The selective promotion of the BSC measures filtered organisational focus to shape unique identity multiplicity and characteristics within the cases. Further, the use of the BSC facilitated the assimilation of multiple identities by controlling the direction and strength of identifications, engaging different groups of members. More specifically, the tight authority of the BSC framework and systems are explained both by technical and bureaucratic controls, while subtle communication of organisational premises and information filtering is achieved through concertive control. This study confirms that these macro top-down controls mediated the sensebreaking and sensegiving process of organisational identification, supporting research by Ashforth, Harrison and Corley (2008). This study pays attention to members’ power of self-regulation, filling minor premises of the derived logic of their organisation through the playing out of organisational enthymemes (Tompkins & Cheney, 1985). Members are then encouraged to make their own decisions towards the organisational premises embedded in the BSC, through the micro bottom-up identification processes including: enacting organisationally valued identities; sensemaking; and the construction of identity narratives aligned with those organisationally valued premises. Within the process, the self-referential effect of communication encouraged members to believe the organisational messages embedded in the BSC in transforming collective and individual identities. Therefore, communication through the use of the BSC continued the self-producing of normative performance mechanisms, established meanings of identities, and enabled members’ self-regulation in identity construction. Further, this research establishes the relationship between identity and the use of the BSC in terms of identity multiplicity and attributes. The BSC framework constrained and enabled case study organisations and members to monitor and regulate identity multiplicity across a number of dimensions, levels and facets. The use of the BSC constantly heightened the identity attributes of distinctiveness, relativity, visibility, fluidity and manageability in identity construction over time. Overall, this research explains the reciprocal controlling relationships of multiple structures in organisations to achieve a goal. It bridges the gap among corporate and organisational identity theories by adopting Cornelissen, Haslam and Balmer’s (2007) integrated identity framework, and reduces the gap in understanding between identity and performance measurement studies. Parallel review of the process of monitoring and regulating identities from both literatures synthesised the theoretical strengths of both to conceptualise and operationalise identities. This study extends the discussion on positioning identity, culture, commitment, and image and reputation measures in integrated performance measurement systems as organisational capital. Further, this study applies understanding of the multiple forms of control (Edwards, 1979; Tompkins & Cheney, 1985), emphasising the power of organisational members in identification processes, using the notion of rhetorical organisational enthymemes. This highlights the value of the collaborative theoretical power of identity, communication and performance measurement frameworks. These case studies provide practical insights about the public sector where existing bureaucracy and desired organisational identity directions are competing within a large organisational setting. Further research on personal identity and simple control in organisations that fully cascade the BSC down to individual members would provide enriched data. The extended application of the conceptual framework to other public and private sector organisations with a longitudinal view will also contribute to further theory building.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Against a background of already thin markets in some sectors of major public sector infrastructure in Australia and the desire of Australian federal government to leverage private finance, concerns about ensuring sufficient levels of competition are prompting federal government to seek new sources of in-bound Foreign Direct Income. The aim of this paper is to justify and develop a means to deploying the eclectic paradigm of internationalisation that forms part of an Australian federally funded research project designed to explain the determinants of multinational contractors' willingness to bid for Australian public sector major infrastructure projects. Despite the dominance of the eclectic paradigm as a theory of internationalisation for over two decades, it has seen limited application in terms of multinational construction. It is expected that the research project will be the first empirical study to deploy the eclectic paradigm to inbound FDI to Australia whilst using the dominant economic theories advocated for use within the eclectic paradigm. Furthermore, the research project is anticipated to yield a number of practical benefits. These include estimates of the potential scope to attract more multinational contractors to bid for Australian public sector infrastructure, including the nature and extent to which this scope can be influenced by Australian governments responsible for the delivery of infrastructure. On the other hand, the research is also expected to indicate the extent to which indigenous and other multinational contractors domiciled in Australia are investing in special purpose technology and achieving productivity gains relative to foreign multinational contractors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Powers of Horror, Julia Kristeva writes about lost children. These are what she calls “dejects,” who, in the psychodrama of subject formation, fail to fully absent the body of the mother, to accept the Law of the Father and the Symbolic, and subsequently to establish “clear boundaries which constitute the object-world for normal subjects.” Dejects are “strays” looking for a place to belong, a place that is bound up with the Imaginary mother of the pre-Oedipal period. Kristeva’s sketch of the deject as one who is unable to negotiate a proper path to the Symbolicis useful to a reading of Hartnett’s Of A Boy (2002),a novel that also deals with lost children and imaginary mothers. However, in its portrayal of children who are doomed to never achieve adulthood, Of A Boy enacts a haunting retrieval of the pre-Oedipal from the dark side of phallocentric representation, privileging the semiotic (Kristeva’s concept) and the maternal as necessary disruptive checks on a patriarchal Symbolic Order.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent studies have demonstrated that IGF-I associates with VN through IGF-binding proteins (IGFBP) which in turn modulate IGF-stimulated biological functions such as cell proliferation, attachment and migration. Since IGFs play important roles in transformation and progression of breast tumours, we aimed to describe the effects of IGF-I:IGFBP:VN complexes on breast cell function and to dissect mechanisms underlying these responses. In this study we demonstrate that substrate-bound IGF-I:IGFBP:VN complexes are potent stimulators of MCF-7 breast cell survival, which is mediated by a transient activation of ERK/MAPK and sustained activation of PI3-K/AKT pathways. Furthermore, use of pharmacological inhibitors of the MAPK and PI3-K pathways confirms that both pathways are involved in IGF-I:IGFBP:VN complex-mediated increased cell survival. Microarray analysis of cells stimulated to migrate in response to IGF-I:IGFBP:VN complexes identified differential expression of genes with previously reported roles in migration, invasion and survival (Ephrin-B2, Sharp-2, Tissue-factor, Stratifin, PAI-1, IRS-1). These changes were not detected when the IGF-I analogue (\[L24]\[A31]-IGF-I), which fails to bind to the IGF-I receptor, was substituted; confirming the IGF-I-dependent differential expression of genes associated with enhanced cell migration. Taken together, these studies have established that IGF-I:IGFBP:VN complexes enhance breast cell migration and survival, processes central to facilitating metastasis. This study highlights the interdependence of ECM and growth factor interactions in biological functions critical for metastasis and identifies potential novel therapeutic targets directed at preventing breast cancer progression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The success rate of carrier phase ambiguity resolution (AR) is the probability that the ambiguities are successfully fixed to their correct integer values. In existing works, an exact success rate formula for integer bootstrapping estimator has been used as a sharp lower bound for the integer least squares (ILS) success rate. Rigorous computation of success rate for the more general ILS solutions has been considered difficult, because of complexity of the ILS ambiguity pull-in region and computational load of the integration of the multivariate probability density function. Contributions of this work are twofold. First, the pull-in region mathematically expressed as the vertices of a polyhedron is represented by a multi-dimensional grid, at which the cumulative probability can be integrated with the multivariate normal cumulative density function (mvncdf) available in Matlab. The bivariate case is studied where the pull-region is usually defined as a hexagon and the probability is easily obtained using mvncdf at all the grid points within the convex polygon. Second, the paper compares the computed integer rounding and integer bootstrapping success rates, lower and upper bounds of the ILS success rates to the actual ILS AR success rates obtained from a 24 h GPS data set for a 21 km baseline. The results demonstrate that the upper bound probability of the ILS AR probability given in the existing literatures agrees with the actual ILS success rate well, although the success rate computed with integer bootstrapping method is a quite sharp approximation to the actual ILS success rate. The results also show that variations or uncertainty of the unit–weight variance estimates from epoch to epoch will affect the computed success rates from different methods significantly, thus deserving more attentions in order to obtain useful success probability predictions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work reviews the rationale and processes for raising revenue and allocating funds to perform information intensive activities that are pertinent to the work of democratic government. ‘Government of the people, by the people, for the people’ expresses an idea that democratic government has no higher authority than the people who agree to be bound by its rules. Democracy depends on continually learning how to develop understandings and agreements that can sustain voting majorities on which democratic law making and collective action depends. The objective expressed in constitutional terms is to deliver ‘peace, order and good government’. Meeting this objective requires a collective intellectual authority that can understand what is possible; and a collective moral authority to understand what ought to happen in practice. Facts of life determine that a society needs to retain its collective competence despite a continual turnover of its membership as people die but life goes on. Retaining this ‘collective competence’ in matters of self-government depends on each new generation: • acquiring a collective knowledge of how to produce goods and services needed to sustain a society and its capacity for self-government; • Learning how to defend society diplomatically and militarily in relation to external forces to prevent overthrow of its self-governing capacity; and • Learning how to defend society against divisive internal forces to preserve the authority of representative legislatures, allow peaceful dispute resolution and maintain social cohesion.