2,012 research outputs found
POSTURAL CONTROL IN ELITE ARCHERS DURING SHOOTING
Archery is described as a static sport requiring fine movement control and proper endurance strength of the upper body (Soylu, Ertan, & Korkusuz, 2006).To investigate the differences of postural control (PC) between elite and general collegiate archers during static and shooting conditions
Risk Sorting for Enterprise under EC Environments
With the rapid development of internet and emerging of global economic, risk management for enterprise under EC (Electronic Commerce) environments has drawn attentions of many researchers. In this paper, the characteristics of risk for EC enterprise are analyzed. Further, focused on the project organization mode and the uncertain factor of the enterprise under EC, which are main different characteristics from the conventional enterprise, enterprise risk sorting, which is one of the key problems of risk management under EC environments, is studied by using fuzzy ISODATA cluster method based on fuzzy describing of risks. Case study suggests the effectiveness of the method
CBR Based Risk Management for Virtual Organization
After researching various factors that influence the management and decisions on risk management of virtual organization, CBR based risk management for virtual organization is proposed in this paper. Relevant theories of fuzzy mathematics are utilized in the process of modifying the corresponding similar cases. Correct application of the new method is demonstrated substantially through instance simulation
Virtual Enterprises Risk Management DSS under Electronic Commerce
Risk management is important to the development of enterprise as well as social-economic prosperity. Virtual enterprise is the potential mode of future enterprise under electronic commerce environment and the risk management for it is a popular research area recently. Due to the complexity of its risk management a decision support system (DSS) with 3-bases-1-cell structure was designed. By coordinating data base, model base, algorithm base and dialogue cell, the functions of project management, risk identification, risk assessment, risk evaluation and risk programming was supported. The user-friendly system has such main characteristics as generality for verity virtual enterprise as well as different projects and the flexibility of model and algorithm, ensuring a standardized, scientific and informational risk management for virtual enterprises
Risk Evaluation for Virtual Enterprise
Virtual Enterprise is the potential mode of enterprise in the future. The risk management for virtual enterprise is the new research area recently. In virtual enterprise, the enterprise operation is always organized by project mode and there is always less historical data and there are many uncertain factors. Hence, in this paper, the fuzzy synthetic evaluation model for the risk evaluation of virtual enterprise is established focus on the project mode and uncertain characteristics of virtual enterprise. In the 5 levels model, the goal and sub-goal of the enterprise, the process of the project, as well as the risk event and risk factors are considered. The case study suggests that the method is useful
Effective Potential on Fuzzy Sphere
The effective potential of quantized scalar field on fuzzy sphere is
evaluated to the two-loop level. We see that one-loop potential behaves like
that in the commutative sphere and the Coleman-Weinberg mechanism of the
radiatively symmetry breaking could be also shown in the fuzzy sphere system.
In the two-loop level, we use the heavy-mass approximation and the
high-temperature approximation to perform the evaluations. The results show
that both of the planar and nonplanar Feynman diagrams have inclinations to
restore the symmetry breaking in the tree level. However, the contributions
from planar diagrams will dominate over those from nonplanar diagrams by a
factor N^2. Thus, at heavy-mass limit or high-temperature system the quantum
field on the fuzzy sphere will behave like those on the commutative sphere. We
also see that there is a drastic reduction of the degrees of freedom in the
nonplanar diagrams when the particle wavelength is smaller than the
noncommutativity scale.Comment: Latex 18 pages, some typos correcte
Fuzzy Rings in D6-Branes and Magnetic Field Background
We use the Myers T-dual nonabelin Born-Infeld action to find some new
nontrivial solutions for the branes in the background of D6-branes and Melvin
magnetic tube field. In the D6-Branes background we can find both of the fuzzy
sphere and fuzzy ring solutions, which are formed by the gravitational
dielectric effect. We see that the fuzzy ring solution has less energy then
that of the fuzzy sphere. Therefore the fuzzy sphere will decay to the fuzzy
ring configuration. In the Melvin magnetic tube field background there does not
exist fuzzy sphere while the fuzzy ring configuration may be formed by the
magnetic dielectric effect. The new solution shows that propagating in
the D6-branes and magnetic tube field background may expand into a rotating
fuzzy ring. We also use the Dirac-Born-Infeld action to construct the ring
configuration from the D-branes.Comment: Latex, 15 pages, detailed comments in section 2, typos correcte
A Risk Identification Method of Virtual Enterprise
Virtual enterprise is the potential mode of future enterprise under global economic environment and the risk management for it is a popular research area recently. Risk identification is the key phrase of risk management. Considering the risk identification problem in the virtual enterprise, a new identification method based on the BP network is provided in this paper. Using this method and the data related to the problem, the possible to take place of the risks could be obtained by training the neural network, so that risks can be investigated in time and managed effectively. The simulation results prove its validit
Attributions and Outcomes of Customer Misbehavior
The purpose of this study is to determine which attribution dimensions concerning dysfunctional other-customer misbehavior most influence customer dissatisfaction toward a service firm. Our research hypotheses were tested using a 2 (Controllability: controllable versus uncontrollable) x 2 (Stability: unstable versus stable) x 2 (Globality: specific versus global) experimental design in a hypothetical restaurant context. Our empirical results demonstrate that when customers feel that the other-customer's misbehavior can be controlled by the firm (i.e., controllability attributions) or is likely to recur (i.e., stability attributions), they render unfavorable service evaluations toward that firm. However, these harmful effects may be mitigated if the customer believes that the same type of dysfunctional customer behavior also occurs during service encounters in other firms (i.e., globality attributions). With a view to diminishing the unsatisfactory experience of other-customer failure, the service organizations need to: (1) act as "police officers" to ensure that their customers behave appropriately; (2) have policies and procedures in place to manage their guests' behavior so as to reduce the recurrence of other-customer failure; and (3) consider communications intended to enhance attributions of globality following an other-customer failure, that will help to buffer the negative impact of controllability and stability attributions on satisfaction and behavioral reactions with the firm. This is the first time that controllability, stability, and globality attributions are clearly shown to be part of the process by which customers transfer their negative response to other-customer misbehavior to the organization
- âŠ