517 resultados para Multi modes
Resumo:
Consumersatisfaction is fundamental to organisational success. It is well recognised that personal service is important in achieving consumer satisfaction. However, the application of self-service technology (SST) is widcning and is attennuating traditional exchanges between consumers and service employees. The effect of this reduction of personal service on consumer satisfaction judgements is not well understood. This study addresses this gap by investigating the relative effects of SST and personal service attributes on overall consumer satisfaction. Thc study highlights important service attributes applicable to SST and personal service. The conceptual framework is tested using data collected from 241 leisure and business travellers drawn from premium hotels in a regional area. Structural equation modelling techniques support the conceptual framework. As expected, the attributes of personal service and SST contribute to consumer satisfaction. However, thc impact of personal service attributes 011 consumer satisfaction is much stronger than the effects of SST attributes. Though SST is an important determinant of consumer satisfaction, interactions with staff are critical. These results have applications for the theory and practice of services marketing, and high light avenues for further investigation.
Resumo:
The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.
Resumo:
The availability of innumerable intelligent building (IB) products, and the current dearth of inclusive building component selection methods suggest that decision makers might be confronted with the quandary of forming a particular combination of components to suit the needs of a specific IB project. Despite this problem, few empirical studies have so far been undertaken to analyse the selection of the IB systems, and to identify key selection criteria for major IB systems. This study is designed to fill these research gaps. Two surveys: a general survey and the analytic hierarchy process (AHP) survey are proposed to achieve these objectives. The first general survey aims to collect general views from IB experts and practitioners to identify the perceived critical selection criteria, while the AHP survey was conducted to prioritize and assign the important weightings for the perceived criteria in the general survey. Results generally suggest that each IB system was determined by a disparate set of selection criteria with different weightings. ‘Work efficiency’ is perceived to be most important core selection criterion for various IB systems, while ‘user comfort’, ‘safety’ and ‘cost effectiveness’ are also considered to be significant. Two sub-criteria, ‘reliability’ and ‘operating and maintenance costs’, are regarded as prime factors to be considered in selecting IB systems. The current study contributes to the industry and IB research in at least two aspects. First, it widens the understanding of the selection criteria, as well as their degree of importance, of the IB systems. It also adopts a multi-criteria AHP approach which is a new method to analyse and select the building systems in IB. Further research would investigate the inter-relationship amongst the selection criteria.
Resumo:
We present a method for topological SLAM that specifically targets loop closing for edge-ordered graphs. Instead of using a heuristic approach to accept or reject loop closing, we propose a probabilistically grounded multi-hypothesis technique that relies on the incremental construction of a map/state hypothesis tree. Loop closing is introduced automatically within the tree expansion, and likely hypotheses are chosen based on their posterior probability after a sequence of sensor measurements. Careful pruning of the hypothesis tree keeps the growing number of hypotheses under control and a recursive formulation reduces storage and computational costs. Experiments are used to validate the approach.
Resumo:
Objective: There is a paucity of information regarding cases of multi-victim sexual assault of children. The reported incidence suggests that these cases are rare. The aim of this paper is to provide practitioners with information about effective intervention strategies arising out of the direct experience of managing a case of multi-victim sexual assault in an Australian rural community. --------- Method: A descriptive, case-report methodology summarizing the investigation and intervention in a case of multi-victim sexual assault is reported. A community based intervention arising out of the disclosures of 21 male children is described. The intervention occurred at an individual, group, and community level using a coordinated multi-disciplinary team and natural helping networks. ---------- Results: The coordination of police and welfare services increased the communication flow to victims, their families, and the community. The case also demonstrated the utility in regularly briefing political and bureaucratic authorities as well as local officials about emergent issues. Coordinating political and bureaucratic responses was essential in obtaining ongoing support and sufficient researching to enable the effective delivery of services. ---------- Conclusions: Interventions were focused at an individual, group, and community level using a coordinated multi-disciplinary team and natural helping networks. This provided a choice of services which were sensitive to the case setting. Recommendations are offered for practitioners who are confronted with similar events. While this paper describes an approach for intervening in a case of multi-victim sexual assault, further empirical research is needed to enable service deliverers to efficaciously target interventions which offer choice to victims and their families.