4 research outputs found

    Toward a Taxonomy of Service-Oriented Chatbots

    Get PDF
    As applications of chatbots evolve, they become an appealing technology for service-oriented businesses in hospitality and tourism (HT). Indeed, the research about chatbots in HT context is growing rapidly covering a range of perspectives from users to experts. Nevertheless, chatbots research in HT field remains new with a wide ranging variability of challenges. Hence, the purpose of this study is to develop a taxonomy for chatbots in HT guided by a phenetic approach. The taxonomy focuses on two dimensions: the type of information and the level of interaction. Four categories of chatbots were identified, respectively informer, facilitator, planner, and performer. We utilize this taxonomy to advance the discussion of research gaps about chatbots in HT, as well as indicate the future research opportunities. The findings of the study help to understand the potential for chatbot applications in HT

    The Computational Modeling of the Non-Constraint Mechanical Systems

    Get PDF
    This study has contained the computer programming models which have been considering the equations of the motion in the Lagrange dynamics. The obtained equations for a mechanical system with sliding coulomb friction have been presented. Furthermore, the equations of a motion with sliding coulomb friction have been simulated by using MATLAB-SIMULINK program. Finally, some results have been obtained from the computer programming models of the non constraint mechanical systems in Lagrange dynamics

    Issues of Security in Routing Optimization at Mobile IPv6

    Get PDF
    Mobile Internet Protocol version 6 (MIPv6) adds the mobility function toIPv6. An IPv6 host that supports the Mobile IPv6 function can move around theIPv6 Internet. A connection between two nodes is maintained by the pairing of thesource address and the destination address. The IPv6 node address is assigned basedon the prefix of home network. The assigned address on a given network becomes invalid when the host leaves that network and attaches itself to another network.The reason for this problem came from the nature of IP addresses when a node visits a foreign network: it is still reachable through the indirect packet forwarding from its home network. This triangular routing feature supports node mobility but increases the communication latency between nodes.So it can be supposed to be overcome by using a Binding Update (BU)scheme, which let nodes to update IP addresses and communicate with each other through direct IP routing. To protect the security of Binding Update, a Return Routability (RR) procedure is developed which results vulnerable to many attacks.In Route Optimization, the mobile node sends the binding message to its peer node,the message contains the new address of the mobile node, called as Care ofAddress, which confirms that the mobile node is infect moved to the new location from its Home Network. After receiving the binding message, the peer node sendsall packets which are destined to the Mobile's Home Address to the Care ofAddress.There are many security risks involved, when a malicious node might be able tocreate a connection with the mobile node by sending the false binding messages.By doing so malicious node can divert the traffic, can launch the DOS Attacks andcan also resend the authenticated messages, etc. So considering these securityissues, we will discuss for a secure protocol which prevents the attacker to establish false connections and assures the secrecy and integrity of the mobile node and its peers

    Social Media Analytics

    No full text
    This project is about social media analytics. A database with methodology information from 84 articles published in top ten journals in hospitality and tourism is created. The data is being analyzed to understand what have been done in social media analytics research in hospitality and tourism
    corecore