952 resultados para checking account
Resumo:
What are the main elements of successful Key Account Management (KAM)? What is the nature of quality for the company and for the individual in business-to-business relationships? What kind of managerial practices are required at the company and individual level in Key Account Management? This paper focuses on these central aspects of KAM. It describes the main elements of KAM, which is a systematic marketing management approach in the business-to-business context with the objective to build profitable and long-lasting relationships with major accounts. Although paying customers in the business-to-business market are organizations, they are always represented by individuals. Thus, successful KAM requires appropriate handling of both the organizational and the individual levels. This paper describes the nature of quality for the company and for the individual in business-to-business relationships. As a synthesis, this paper suggests a framework for KAM practices deploying the main elements of KAM and the company and individual levels of business-to-business relationships. The weakness of the traditional quality management approach is that it pays little, if any, attention to customer importance. By providing similar quality to each customer, more important customers are penalized and less important customers are rewarded. This paper broadens the traditional quality management approach by introducing the concept of targeted quality based on customer importance.
Resumo:
What is the nature of customer commitment in business-to-business relationships and what are its antecedents? What Key Account Management practices help to build customer commitment? Commitment is an important element of Key Account Management since customer relationships are built upon a the foundation of commitment. Building long-term key account relationships occurs by enhancing and maintaining their commitment. Customer commitment has various antecedents, and managing commitment involves focusing on these antecedents. This paper explains the nature of commitment and describes its antecedents. It also suggests how to manage each of these antecedents to strengthen customer commitment.
Resumo:
This paper presents a physical explanation of the phenomenon of low frequency oscillations experienced in power systems. A brief account of the present practice of providing fixed gain power system stabilizers (PSS) is followed by a summary of some of the recent design proposals for adaptive PSS. A novel PSS based on the effort of cancelling the negative damping torque produced by the automatic voltage regulator (AVR) is presented along with some recent studies on a multimachine system using a frequency identification technique.
Resumo:
Whether HIV-1 evolution in infected individuals is dominated by deterministic or stochastic effects remains unclear because current estimates of the effective population size of HIV-1 in vivo, N-e, are widely varying. Models assuming HIV-1 evolution to be neutral estimate N-e similar to 10(2)-10(4), smaller than the inverse mutation rate of HIV-1 (similar to 10(5)), implying the predominance of stochastic forces. In contrast, a model that includes selection estimates N-e>10(5), suggesting that deterministic forces would hold sway. The consequent uncertainty in the nature of HIV-1 evolution compromises our ability to describe disease progression and outcomes of therapy. We perform detailed bit-string simulations of viral evolution that consider large genome lengths and incorporate the key evolutionary processes underlying the genomic diversification of HIV-1 in infected individuals, namely, mutation, multiple infections of cells, recombination, selection, and epistatic interactions between multiple loci. Our simulations describe quantitatively the evolution of HIV-1 diversity and divergence in patients. From comparisons of our simulations with patient data, we estimate N-e similar to 10(3)-10(4), implying predominantly stochastic evolution. Interestingly, we find that N-e and the viral generation time are correlated with the disease progression time, presenting a route to a priori prediction of disease progression in patients. Further, we show that the previous estimate of N-e>10(5) reduces as the frequencies of multiple infections of cells and recombination assumed increase. Our simulations with N-e similar to 10(3)-10(4) may be employed to estimate markers of disease progression and outcomes of therapy that depend on the evolution of viral diversity and divergence.
Resumo:
In this paper we present simple methods for construction and evaluation of finite-state spell-checking tools using an existing finite-state lexical automaton, freely available finite-state tools and Internet corpora acquired from projects such as Wikipedia. As an example, we use a freely available open-source implementation of Finnish morphology, made with traditional finite-state morphology tools, and demonstrate rapid building of Northern Sámi and English spell checkers from tools and resources available from the Internet.
Resumo:
In social Hymenoptera, foraging, nest building, brood care and all other colony maintenance functions are carried out by the females while males function solely as reproductives. This asymmetry in social roles of the two sexes has led social insect researchers to focus almost exclusively on the females whereas males have remained relatively neglected. We studied two sympatric, primitively eusocial wasps, Ropalidia marginata and Ropalidia cyathiformis, and compared the morphological and behavioural profiles of males and females. Males of both species are smaller in size and weigh less compared to females. Males of the two species live in the nest for different durations. Borrowing from the ecological literature we use novel methods to compute and compare behavioural diversity and behavioural richness and show that females of both species are behaviourally richer and more diverse than the males.
Resumo:
The conventional Cornell's source-based approach of probabilistic seismic-hazard assessment (PSHA) has been employed all around the world, whilst many studies often rely on the use of computer packages such as FRISK (McGuire FRISK-a computer program for seismic risk analysis. Open-File Report 78-1007, United States Geological Survey, Department of Interior, Washington 1978) and SEISRISK III (Bender and Perkins SEISRISK III-a computer program for seismic hazard estimation, Bulletin 1772. United States Geological Survey, Department of Interior, Washington 1987). A ``black-box'' syndrome may be resulted if the user of the software does not have another simple and robust PSHA method that can be used to make comparisons. An alternative method for PSHA, namely direct amplitude-based (DAB) approach, has been developed as a heuristic and efficient method enabling users to undertake their own sanity checks on outputs from computer packages. This paper experiments the application of the DAB approach for three cities in China, Iran, and India, respectively, and compares with documented results computed by the source-based approach. Several insights regarding the procedure of conducting PSHA have also been obtained, which could be useful for future seismic-hazard studies.
Resumo:
The paper propose a unified error detection technique, based on stability checking, for on-line detection of delay, crosstalk and transient faults in combinational circuits and SEUs in sequential elements. The proposed method, called modified stability checking (MSC), overcomes the limitations of the earlier stability checking methods. The paper also proposed a novel checker circuit to realize this scheme. The checker is self-checking for a wide set of realistic internal faults including transient faults. Extensive circuit simulations have been done to characterize the checker circuit. A prototype checker circuit for a 1mm2 standard cell array has been implemented in a 0.13mum process.
Resumo:
The performance characteristics of a junction field-effect transistor (j.f.e.t.) are evaluated considering the presence of the gap between the gate electrode and the source and drain terminals. It is concluded that the effect of the gap is to demand a higher drain voltage to maintain the same drain current. So long as the device is operated at the same drain current, the presence of the gap does not change the performance of the device as an amplifier. The nature of the performance of the device as a variable resistor is not affected by the gap if it is less than or equal to the physical height of the channel. For gap lengths larger than the channel height, the effect of the gap is to add a series resistance in the drain.
Resumo:
A theoretical analysis is carried out to observe the influence of important flow parameters such as Nusselt number and Sherwood number on the tip speed of an equiaxed dendrite growing in a convecting alloy melt. The effect of thermal and solutal transfer at the interface due to convection is equated to an undercooling of the melt, and an expression is derived for this equivalent undercooling in terms of the flow Nusselt number and Sherwood number. Results for the equivalent undercooling are compared with corresponding numerical values obtained by performing simulations based on the enthalpy method. This method represents a relatively simple procedure to analyze the effects of melt convection on the growth rate of dendrites. (C) 2013 Elsevier Ltd. All rights reserved.
Resumo:
Bisimulation-based information flow properties were introduced by Focardi and Gorrieri [1] as a way of specifying security properties for transition system models. These properties were shown to be decidable for finite-state systems. In this paper, we study the problem of verifying these properties for some well-known classes of infinite state systems. We show that all the properties are undecidable for each of these classes of systems.
Resumo:
Large software systems are developed by composing multiple programs. If the programs manip-ulate and exchange complex data, such as network packets or files, it is essential to establish that they follow compatible data formats. Most of the complexity of data formats is associated with the headers. In this paper, we address compatibility of programs operating over headers of network packets, files, images, etc. As format specifications are rarely available, we infer the format associated with headers by a program as a set of guarded layouts. In terms of these formats, we define and check compatibility of (a) producer-consumer programs and (b) different versions of producer (or consumer) programs. A compatible producer-consumer pair is free of type mismatches and logical incompatibilities such as the consumer rejecting valid outputs gen-erated by the producer. A backward compatible producer (resp. consumer) is guaranteed to be compatible with consumers (resp. producers) that were compatible with its older version. With our prototype tool, we identified 5 known bugs and 1 potential bug in (a) sender-receiver modules of Linux network drivers of 3 vendors and (b) different versions of a TIFF image library.
Resumo:
Counter systems are a well-known and powerful modeling notation for specifying infinite-state systems. In this paper we target the problem of checking liveness properties in counter systems. We propose two semi decision techniques towards this, both of which return a formula that encodes the set of reachable states of the system that satisfy a given liveness property. A novel aspect of our techniques is that they use reachability analysis techniques, which are well studied in the literature, as black boxes, and are hence able to compute precise answers on a much wider class of systems than previous approaches for the same problem. Secondly, they compute their results by iterative expansion or contraction, and hence permit an approximate solution to be obtained at any point. We state the formal properties of our techniques, and also provide experimental results using standard benchmarks to show the usefulness of our approaches. Finally, we sketch an extension of our liveness checking approach to check general CTL properties.