Search results

1 – 10 of 46
Book part
Publication date: 10 June 2021

Michelle (Myongjee) Yoo and Sybil Yang

Forecasting is a vital part of hospitality operations because it allows businesses to make imperative decisions, such as pricing, promotions, distribution, scheduling, and…

Abstract

Forecasting is a vital part of hospitality operations because it allows businesses to make imperative decisions, such as pricing, promotions, distribution, scheduling, and arranging facilities, based on the predicted demand and supply. This chapter covers three main concepts related to forecasting: it provides an understanding of hospitality demand and supply, it introduces several forecasting methods for practical application, and it explains yield management as a function of forecasting. In the first section, characteristics of hospitality demand and supply are described and several techniques for managing demand and supply are addressed. In the second section, several forecasting methods for practical application are explored. In the third section, yield management is covered. Additionally, examples of yield management applications from airlines, hotels, and restaurants are presented.

Details

Operations Management in the Hospitality Industry
Type: Book
ISBN: 978-1-83867-541-7

Keywords

Content available
Book part
Publication date: 10 June 2021

Abstract

Details

Operations Management in the Hospitality Industry
Type: Book
ISBN: 978-1-83867-541-7

Article
Publication date: 16 June 2021

Umesh K. Raut and L.K. Vishwamitra

Software-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource…

110

Abstract

Purpose

Software-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource allocation strategy is focused on which the seek-and-destroy algorithm is implemented in the controller in such a way that an effective allocation of the resources is done based on the multi-objective function.

Design/methodology/approach

The purpose of this study is focuses on the resource allocation algorithm for the SDVN with the security analysis to analyse the effect of the attacks in the network. The genuine nodes in the network are granted access to the communication in the network, for which the factors such as trust, throughput, delay and packet delivery ratio are used and the algorithm used is Seek-and-Destroy optimization. Moreover, the optimal resource allocation is done using the same optimization in such a way that the network lifetime is extended.

Findings

The security analysis is undergoing in the research using the simulation of the attackers such as selective forwarding attacks, replay attacks, Sybil attacks and wormhole attacks that reveal that the replay attacks and the Sybil attacks are dangerous attacks and in future, there is a requirement for the security model, which ensures the protection against these attacks such that the network lifetime is extended for a prolonged communication. The achievement of the proposed method in the absence of the attacks is 84.8513% for the remaining nodal energy, 95.0535% for packet delivery ratio (PDR), 279.258 ms for transmission delay and 28.9572 kbps for throughput.

Originality/value

The seek-and-destroy algorithm is one of the swarm intelligence-based optimization designed based on the characteristics of the scroungers and defenders, which is completely novel in the area of optimizations. The diversification and intensification of the algorithm are perfectly balanced, leading to good convergence rates.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 April 2008

Zhen Cao, Jianbin Hu, Zhong Chen, Maoxing Xu and Xia Zhou

Wireless sensor networks, due to their potentially wide application perspectives, may proliferate in future. Two major stumbling blocks are the dynamic variance of the network…

Abstract

Purpose

Wireless sensor networks, due to their potentially wide application perspectives, may proliferate in future. Two major stumbling blocks are the dynamic variance of the network caused by both the capacity constraint of sensor nodes and uncertainties of wireless links, and secure routing in the special security sensitive environment. Therefore, adaptable and defendable routing mechanism is in urgent need for the deployment of sensor networks. This paper aims to propose a feedback‐based secure routing protocol (FBSR).

Design/methodology/approach

Feedback from the neighboring nodes serves as the dynamic information of the current network, with which sensor nodes make forwarding decisions in a secure and energy aware manner. Feedback message is included in the MAC layer acknowledgement frame to avoid network congestion, and it is authenticated with the proposed Keyed One Way Hash Chain (Keyed‐OWHC) to avoid feedback fabrication. FBSR's resilience to node compromise is enhanced by statistic efforts accomplished by the base station.

Findings

Both mathematical analysis and simulation results show that FBSR is not only reliable but also energy efficient.

Originality/value

The paper introduces a novel routing scheme for wireless sensor networks.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Keywords

Article
Publication date: 10 April 2017

Sybille Persson, Bertrand Agostini and Aurélie Kleber

The purpose of this paper is to highlight the Western roots of the gap between practice and theory in HRM to underline the relevance of a flexible HR support. This support…

Abstract

Purpose

The purpose of this paper is to highlight the Western roots of the gap between practice and theory in HRM to underline the relevance of a flexible HR support. This support deserves to be nurtured by an insightful consideration of traditional Chinese thought, especially “vital nourishments” and “non-action.”

Design/methodology/approach

Following the methodology of deconstruction provided by French Sinologist and Philosopher François Jullien, this paper brings forward the implicit tenets of Western thought that feed HRD. The work of deconstruction relies here on an “heterotopia” (which literally means “a thought coming from elsewhere”) while making use of the founding tenets of traditional Chinese thought.

Findings

A flexible support, echoing some existing practices of coaching, mentoring and other developmental interactions, acts as an efficient and natural “non-active” development of HR especially relevant when facing stress at work.

Research limitations/implications

If it is worth recalling the already existing bridges between theory and practice in HRM, it is also important to imagine new ones favorable to HRD.

Practical implications

The paper provides a critical reference for managers in charge of HRD.

Social implications

The paper provides a critical reference for academics who wish to be more scholarly engaged in supporting executives and managers.

Originality/value

The paper challenges the Western ethnocentric reading of management in order to welcome another millenary way of thinking built in China. It escapes the fundamentals of managerial thought which have durably ruled over Western management studies.

Details

Journal of Management Development, vol. 36 no. 3
Type: Research Article
ISSN: 0262-1711

Keywords

Open Access
Article
Publication date: 14 August 2017

Andres Bejarano, Agrima Jindal and Bharat Bhargava

Recommender systems collect information about users and businesses and how they are related. Such relation is given in terms of reviews and votes on reviews. User reviews gather…

3355

Abstract

Purpose

Recommender systems collect information about users and businesses and how they are related. Such relation is given in terms of reviews and votes on reviews. User reviews gather opinions, rating scores and review influence. The latter component is crucial for determining which users are more relevant in a recommender system, that is, the users whose reviews are more popular than the average user’s reviews.

Design/methodology/approach

A model of measure of user influence is proposed based on review and social attributes of the user. User influence is also used for determining how influenced has been a business being based on popular reviews.

Findings

Results indicate there is a connection between social attributes and user influence. Such results are relevant for marketing, credibility estimation and Sybil detections, among others.

Originality/value

The proposed model allows search parameterization based on the social attribute weights of users, reviews and businesses. Such weights defines the relevance on each attribute, which can be adjusted according to the search needs. Popularity results are then a function of weight preferences on user, reviews and businesses data join.

Details

PSU Research Review, vol. 1 no. 2
Type: Research Article
ISSN: 2399-1747

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 12 August 2021

Faten Fakhfakh, Mohamed Tounsi and Mohamed Mosbah

Nowadays, connected vehicles are becoming quite complex systems which are made up of different devices. In such a vehicle, there are several electronic control units (ECUs) that…

Abstract

Purpose

Nowadays, connected vehicles are becoming quite complex systems which are made up of different devices. In such a vehicle, there are several electronic control units (ECUs) that represent basic units of computation. These ECUs communicate with each other over the Controller Area Network (CAN) bus protocol which ensures a high communication rate. Even though it is an efficient standard which provides communication for in-vehicle networks, it is prone to various cybersecurity attacks. This paper aims to present a systematic literature review (SLR) which focuses on potential attacks on CAN bus networks. Then, it surveys the solutions proposed to overcome these attacks. In addition, it investigates the validation strategies aiming to check their accuracy and correctness.

Design/methodology/approach

The authors have adopted the SLR methodology to summarize existing research papers that focus on the potential attacks on CAN bus networks. In addition, they compare the selected papers by classifying them according to the adopted validation strategies. They identify also gaps in the existing literature and provide a set of open challenges that can significantly improve the existing works.

Findings

The study showed that most of the examined papers adopted the simulation as a validation strategy to imitate the system behavior and evaluate a set of performance criteria. Nevertheless, a little consideration has been given to the formal verification of the proposed systems.

Originality/value

Unlike the existing surveys, this paper presents the first SLR that identifies local and remote security attacks that can compromise in-vehicle and inter-vehicle communications. Moreover, it compares the reviewed papers while focusing on the used validation strategies.

Details

Library Hi Tech, vol. 40 no. 5
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 2 June 2020

Patrícia R. Sousa, João S. Resende, Rolando Martins and Luís Antunes

The aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving…

Abstract

Purpose

The aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving approaches and its applications to healthcare scenarios.

Design/methodology/approach

The paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT. Then, it is important to analyze whether blockchain should be used in all scenarios, according to the importance of each feature for different use cases.

Findings

Based on analysis of existing systems, Sovrin is the IdM system that covers more features and is based on blockchain. For each of the evaluated use cases, Sovrin and UniquID were the chosen systems.

Research limitations/implications

This paper opens new lines of research for IdM systems in IoT, including challenges related to device identity definition, privacy preserving and new security mechanisms.

Originality/value

This paper contributes to the ongoing research in IdM systems for IoT. The adequacy of blockchain is not only analyzed considering the technology; instead the authors analyze its application to real environments considering the required features for each use case.

Details

Journal of Enterprise Information Management, vol. 35 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of 46