816 resultados para Gain sharing.
Resumo:
Purpose – This paper aims to go beyond a bookkeeping approach to evolutionary analysis whereby surviving firms are better adapted and extinct firms were less adapted. From discussion of the preliminary findings of research into the Hobart pizza industry, evidence is presented of the need to adopt a more traditional approach to applying evolutionary theories with organizational research. Design/methodology/approach – After a brief review of the relevant literature, the preliminary findings of research into the Hobart pizza industry are presented. Then, several evolutionary concepts that are commonplace in ecological research are introduced to help explain the emergent findings. The paper concludes with consideration given to advancing a more consistent approach to employing evolutionary theories within organizational research. Findings – The paper finds that the process of selection cannot be assumed to occur evenly across time and/or space. Within geographically small markets different forms of selection operate in different ways and degrees requiring the use of more traditional evolutionary theories to highlight the causal process associated with population change. Research limitations/implications – The paper concludes by highlighting Geoffrey Hodgson’s Principle of Consistency. It is demonstrated that a failure to truly understand how and why theory is used in one domain will likely result in its misuse in another domain. That, at present, too few evolutionary concepts are employed in organisational research to ensure an appreciation of any underlying causal processes through which social change occurs. Originality/value – The concepts introduced throughout this paper, whilst not new, provide new entry points for organizational researchers intent on employing an evolutionary approach to understand the process of social change.
Resumo:
In this thesis we study a series of multi-user resource-sharing problems for the Internet, which involve distribution of a common resource among participants of multi-user systems (servers or networks). We study concurrently accessible resources, which for end-users may be exclusively accessible or non-exclusively. For all kinds we suggest a separate algorithm or a modification of common reputation scheme. Every algorithm or method is studied from different perspectives: optimality of protocols, selfishness of end users, fairness of the protocol for end users. On the one hand the multifaceted analysis allows us to select the most suited protocols among a set of various available ones based on trade-offs of optima criteria. On the other hand, the future Internet predictions dictate new rules for the optimality we should take into account and new properties of the networks that cannot be neglected anymore. In this thesis we have studied new protocols for such resource-sharing problems as the backoff protocol, defense mechanisms against Denial-of-Service, fairness and confidentiality for users in overlay networks. For backoff protocol we present analysis of a general backoff scheme, where an optimization is applied to a general-view backoff function. It leads to an optimality condition for backoff protocols in both slot times and continuous time models. Additionally we present an extension for the backoff scheme in order to achieve fairness for the participants in an unfair environment, such as wireless signal strengths. Finally, for the backoff algorithm we suggest a reputation scheme that deals with misbehaving nodes. For the next problem -- denial-of-service attacks, we suggest two schemes that deal with the malicious behavior for two conditions: forged identities and unspoofed identities. For the first one we suggest a novel most-knocked-first-served algorithm, while for the latter we apply a reputation mechanism in order to restrict resource access for misbehaving nodes. Finally, we study the reputation scheme for the overlays and peer-to-peer networks, where resource is not placed on a common station, but spread across the network. The theoretical analysis suggests what behavior will be selected by the end station under such a reputation mechanism.
Resumo:
The mango industry in Australia is worth in excess of $150 million annually with the Kensington Pride (KP) cultivar capturing 60% of the domestic market. Valued by consumers for desirable taste and colour characteristics, KP has been used extensively as a parent in the Department of Agriculture and Fisheries’ (Queensland, Australia) mango breeding program with over 400 hybrid trees sharing KP as the male parent. In order to gain a better understanding of Australia’s most significant mango variety, Horticulture Innovation Australia had led an international collaboration between the Queensland Department of Agriculture and Fisheries (Australia), the International Crops Research Institute for the Semi-Arid Tropics (ICRISAT, India) and the Beijing Genomics Institute (China) to sequence the KP genome. Preliminary de novo assembly of illumina short read sequence data suggests that the KP genome is highly heterozygous and has an estimated genome size of 407 Mb. As refinements and additional sequence data are added to the assembly, a more complete picture of the mango genome will be elucidated.
Resumo:
The hobby of collecting represents the passionate acquisition and possession of a specific type(s) of object; creating a ‘spectacle’, to be shared with others. The fundamentality of the physical objects in collections against the backdrop of the growing ubiquity of computing provides a unique and compelling avenue for design. Based on interviews with 11 self-identified collectors, this paper discusses the role collectors have in informing HCI design and in turn, the potential HCI has in designing technology to assist collectors in sharing what we term the ‘spectacle’ of collecting. Toward this, we suggest two ideas for future designs, including building personal histories of individual collectable items and developing a simple digital means of connecting proximate collectors with those who stand to benefit from collectors’ unique and item-specific knowledge.
Resumo:
A twenty stage electron multiplier using aluminium as dynode material is described. When operated in DC mode, very stable gains approaching 106 were obtained with input currents of the order of 10-12 A, even after repeated exposures to the atmospheres.
Resumo:
A finite gain differential amplifier is used along with a few passive RC elements to simulate an inductor. Methods for obtaining low Q inductance and frequency dependent high QI inductance are described. Sensitivity analysis when the gain varies is also included.
Resumo:
Based on a method proposed by Reddy and Shanmugasundaram, similar solutions have been obtained for the steady inviscid quasi-one-dimensional nonreacting flow in the supersonic nozzle of CO2-N2-H2O and CO2-N2-He gasdynamic laser systems. Instead of using the correlations of a nonsimilar function NS for pure N2 gas, as is done in previous publications, the NS correlations are computed here for the actual gas mixtures used in the gasdynamic lasers. Optimum small-signal optical gain and the corresponding optimum values of the operating parameters like reservoir pressure and temperature and nozzle area ratio are computed using these correlations. The present results are compared with the previous results and the main differences are discussed. Journal of Applied Physics is copyrighted by The American Institute of Physics.
Resumo:
Technologies that facilitate the collection and sharing of personal information can feed people's desire for enhanced self-knowledge and help them to change their behaviour, yet for various reasons people can also be reluctant to use such technologies. This paper explores this tension through an interview study in the context of smoking cessation. Our findings show that smokers and recent ex-smokers were ambivalent about their behaviour change as well as about collecting personal information through technology and sharing it with other users. We close with a summary of three challenges emerging from such ambivalence and directions to address them.
Resumo:
Training for bodybuilding competition is clearly a serious business that inflicts serious demands on the competitor. Not only did Francis commit time and money to compete, but he also arguably put winning before his physical well-being—enduring pain and suffering from his injury. Bodybuilding may seem like an extreme example, but it is not the only activity in which people suffer in pursuit of their goals. Boxers fight each other in the ring; soccer players risk knee and ankle injuries, sometimes playing despite being hurt; and mountaineers risk their lives in dangerous climbs. In the arts there are many examples of people suffering to achieve their goals: Beethoven kept composing, conducting, and performing despite his hearing loss; van Gogh grappled with depression but kept painting, finding fame only posthumously; and Mozart lived the final years of his life impoverished but still composing. These examples show that many great achievements come at a price: severe suffering...
Resumo:
Attention is given to the results of optimization studies with a 16-micron CO2-N2-H2 GDL employing two-dimensional wedge nozzles. The optimum value of the achievable gain reaches 12.7 percent/cm on the P(15) line for a 30:50:20 percent respective apportionment of the aforementioned gases. The corresponding optimum values for reservoir pressure and area ratio are computed as functions of reservoir temperature, and presented graphically.
Resumo:
This paper deals with low maximum-likelihood (ML)-decoding complexity, full-rate and full-diversity space-time block codes (STBCs), which also offer large coding gain, for the 2 transmit antenna, 2 receive antenna (2 x 2) and the 4 transmit antenna, 2 receive antenna (4 x 2) MIMO systems. Presently, the best known STBC for the 2 2 system is the Golden code and that for the 4 x 2 system is the DjABBA code. Following the approach by Biglieri, Hong, and Viterbo, a new STBC is presented in this paper for the 2 x 2 system. This code matches the Golden code in performance and ML-decoding complexity for square QAM constellations while it has lower ML-decoding complexity with the same performance for non-rectangular QAM constellations. This code is also shown to be information-lossless and diversity-multiplexing gain (DMG) tradeoff optimal. This design procedure is then extended to the 4 x 2 system and a code, which outperforms the DjABBA code for QAM constellations with lower ML-decoding complexity, is presented. So far, the Golden code has been reported to have an ML-decoding complexity of the order of for square QAM of size. In this paper, a scheme that reduces its ML-decoding complexity to M-2 root M is presented.
Resumo:
In this paper, an achievable rate region for the three-user discrete memoryless interference channel with asymmetric transmitter cooperation is derived. The three-user channel facilitates different ways of message sharing between the transmitters. We introduce a manner of noncausal (genie aided) unidirectional message-sharing, which we term cumulative message sharing. We consider receivers with predetermined decoding capabilities, and define a cognitive interference channel. We then derive an achievable rate region for this channel by employing a coding scheme which is a combination of superposition and Gel'fand-Pinsker coding techniques.
Resumo:
Information professionals and information organisations use Twitter in a variety of ways. Typically both organisations and the individuals that work for them have separate identities on Twitter, but often individuals identify their organization through their profile or Twitter content. This paper considers the way information professionals use Twitter and their practices with regard to privacy, personal disclosure and identifying their organisational affiliations. Drawing on data from a research study involving a questionnaire and social media observation, the paper will provoke discussion about information professionals’ use of Twitter, personal and organizational identity, and the value of Twitter for professional development. In keeping with the subject matter, a curated set of social media content will be available in lieu of a formal paper.
Resumo:
In the general population, the timing of puberty is normally distributed. This variation is determined by genetic and environmental factors, but the exact mechanisms underlying these influences remain elusive. The purpose of this study was to gain insight into genetic regulation of pubertal timing. Contributions of genetic versus environmental factors to the normal variation of pubertal timing were explored in twins. Familial occurrence and inheritance patterns of constitutional delay of growth and puberty, CDGP (a variant of normal pubertal timing), were studied in pedigrees of patients with this condition. To ultimately detect genes involved in the regulation of pubertal timing, genetic loci conferring susceptibility to CDGP were mapped by linkage analysis in the same family cohort. To subdivide the overall phenotypic variance of pubertal timing into genetic and environmental components, genetic modeling based on monozygous twins sharing 100% and dizygous twins sharing 50% of their genes was used in 2309 girls and 1828 boys from the FinnTwin 12-17 study. The timing of puberty was estimated from height growth, i.e. change in the relative height between the age when pubertal growth velocity peaks in the general population and adulthood. This reflects the percentage of adult height achieved at the average peak height velocity age, and thus, pubertal timing. Boys and girls diagnosed with CDGP were gathered through medical records from six pediatric clinics in Finland. First-degree relatives of the probands were invited to participate by letter; altogether, 286 families were recruited. When possible, families were extended to include also second-, third-, or fourth-degree relatives. The timing of puberty in all family members was primarily assessed from longitudinal growth data. Delayed puberty was defined by onset of pubertal growth spurt or peak height velocity taking place 1.5 (relaxed criterion) or 2 SD (strict criterion) beyond the mean. If growth data were unavailable, pubertal timing was based on interviews. In this case, CDGP criteria were set as having undergone pubertal development more than 2 (strict criterion) or 1.5 years (relaxed criterion) later than their peers, or menarche after 15 (strict criterion) or 14 years (relaxed criterion). Familial occurrence of strict CDGP was explored in families of 124 patients (95 males and 29 females) from two clinics in Southern Finland. In linkage analysis, we used relaxed CDGP criteria; 52 families with solely growth data-based CDGP diagnoses were selected from all clinics. Based on twin data, genetic factors explain 86% and 82% of the variance of pubertal timing in girls and boys, respectively. In families, 80% of male and 76% of female probands had affected first-degree relatives, in whom CDGP was 15 times more common than the expected (2.5%). In 74% (17 of 23) of the extended families with only one affected parent, familial patterns were consistent with autosomal dominant inheritance. By using 383 multiallelic markers and subsequently fine-mapping with 25 additional markers, significant linkage for CDGP was detected to the pericentromeric region of chromosome 2, to 2p13-2q13 (multipoint HLOD 4.44, α 0.41). The findings of the large twin study imply that the vast majority of the normal variation of pubertal timing is attributed to genetic effects. Moreover, the high frequency of dominant inheritance patterns and the large number of affected relatives of CDGP patients suggest that genetic factors also markedly contribute to constitutional delay of puberty. Detection of the locus 2p13-2q13 in the pericentromeric region of chromosome 2 associating with CDGP is one step towards unraveling the genes that determine pubertal timing.