2,749 research outputs found

    Industry Labor Force Quality: An Investigation from the Customer Service Perspective

    Full text link
    To investigate the labor force quality deficiency in the Macao casino industry, this study conducted a survey among Macao casino guests on their assessment of customer service. The mean scores of different service features were calculated and compared across casinos operated by different casino companies. Furthermore, different service features were examined for their importance to the overall customer satisfaction based on an estimated regression model. The study found that most of the service features were below satisfactory rating, but Wynn Resorts stood out as the top performer among the four gaming companies. The regression model identified respect , smile and skill as the most important contributors to overall customer satisfaction. The findings suggest that to become a top gaming destination, Macao must strengthen its labor force quality in both technical and interpersonal skills

    On the coexistence and complementarity of Chinese translation methods of English metrical poetry

    Get PDF
    The Chinese translation of English metrical poetry has a history of more than one hundred years, but it is still controversial on how to translate English metrical poetry into Chinese. Chinese translators have hitherto devised three methods to render English metrical poetry: sinolization, liberalization, and poetic form transplantation. Translators practicing the methods of sinolization and liberalization belong to the group in favor of spiritual resemblance. Translators who follow the method of poetic form transplantation belong to the group in favor of formal resemblance. It is quite obvious that the two groups have disagreement on the translation standard or guiding principle. Actually the translation standards of the two groups can coexist, and the translation methods under the guidance of these different translation standards can coexist and complement each other. It is impractical and impossible to use one Chinese translation method or standard to guide all the Chinese translation practice, and the diverse Chinese translation methods of English metrical poetry can coexist and complement each other in the foreseeable future

    DeepSLAM: A Robust Monocular SLAM System with Unsupervised Deep Learning

    Get PDF
    In this paper, we propose DeepSLAM, a novel unsupervised deep learning-based visual Simultaneous Localization and Mapping (SLAM) system. The DeepSLAM training is fully unsupervised since it only requires stereo imagery instead of annotating ground-truth poses. Its testing takes a monocular image sequence as the input. Therefore, it is a monocular SLAM paradigm. DeepSLAM consists of several essential components, including Mapping-Net, Tracking-Net, Loop-Net and a graph optimization unit. Specifically, the Mapping-Net is an encoder and decoder architecture for describing the 3D structure of the environment while the Tracking-Net is a Recurrent Convolutional Neural Network (RCNN) architecture for capturing the camera motion. The Loop-Net is a pre-trained binary classifier for detecting loop closures. DeepSLAM can simultaneously generate pose estimate, depth map and outlier rejection mask. We evaluate its performance on various datasets, and find that DeepSLAM achieves good performance in terms of pose estimation accuracy, and is robust in some challenging scenes

    Effect of micro-grooved surface on the static and dynamic characteristics of journal bearings with misalignment

    Get PDF
    This paper presents a hydrodynamic lubrication model to investigate the static and dynamic characteristics of micro-grooved bearings considering journal misalignment. An averaged Reynolds equation with the mass conservation is derived and numerical procedure is solved by the finite difference method. The influences of eccentricity ratio, misalignment and micro-groove parameters on lubrication performances of aligned/misaligned journal bearings are compared systematically. Mathematical expressions of five micro-grooves with different geometric shapes i.e., straight-groove, left spiral-groove, right spiral-groove, left herringbone-groove and right herringbone-groove are given. The results show that with the increase of degree of misalignment, the load carrying capacity, main stiffness and damping coefficients increase, and the friction coefficient decreases, while the effect of misalignment angle on bearing performance is opposite. The results also indicated that the left herringbone-groove has better performance improvement for aligned journal bearing, while the right spiral-groove has better performance improvement for misaligned journal bearing under the optimal micro-groove parameters, especially at low eccentricity ratio. Moreover, the amount of the performance improvement of micro-grooved bearing depends on the design of the micro-groove parameters. This study can provide theoretical guidance for the design optimization of micro-grooved journal bearings with misalignment.</p

    Similar operation template attack on RSA-CRT as a case study

    Get PDF
    A template attack, the most powerful side-channel attack methods, usually first builds the leakage profiles from a controlled profiling device, and then uses these profiles to recover the secret of the target device. It is based on the fact that the profiling device shares similar leakage characteristics with the target device. In this study, we focus on the similar operations in a single device and propose a new variant of the template attack, called the similar operation template attack (SOTA). SOTA builds the models on public variables (e.g., input/output) and recovers the values of the secret variables that leak similar to the public variables. SOTA’s advantage is that it can avoid the requirement of an additional profiling device. In this study, the proposed SOTA method is applied to a straightforward RSA-CRT implementation. Because the leakage is (almost) the same in similar operations, we reduce the security of RSA-CRT to a hidden multiplier problem (HMP) over GF(q), which can be solved byte-wise using our proposed heuristic algorithm. The effectiveness of our proposed method is verified as an entire prime recovery procedure in a practical leakage scenario
    • …
    corecore