Ciara Heavin, University College Cork, Ireland Brij Gupta, National Institute of Technology, Kurukshetra, India Chia-Huei Wu, Minghsin University of Science and Technology, Taiwan Chi-Hua Chen, Fuzhou University, China Ayankunle Taiwo, Eastfield College, United States Bilal Abu Salih, The University of Jordan, Australia Additionally, all articles within this journal undergo a rigorous double-blind peer review process ensuring that all material is of the utmost quality.Īkhilesh Bajaj, University of Tulsa, United States As both editors have extensively contributed to IGI Global publications and others within their field of research, this journal provides the latest findings through full-length research manuscripts, as well as featured open access articles.
![nik collection promotional code nik collection promotional code](https://www.orangeoffer.com/mimg/merimg/shoreline-sightseeing59cb9b2c3c987.png)
Due to its comprehensive coverage, as well as it’s expanding list of over 1,000+ industry-leading contributors from more than 30 countries, spanning six continents, this journal has been accepted into prestigious indices most notably Web of Science® - Science Citation Index Expanded®, Web of Science Social Science Citation Index®, Scopus®, Compendex®, and more. The Journal of Organizational and End User Computing (JOEUC), which has been published for more than 30 years, provides high impact research in all areas of organizational and end-user computing (OEUC), spanning topics including human-computer interaction, web design, end user computing management, computing privacy and security, productivity and performance, and more. Results can provide scientific basis for online travel platforms or hospitality operators to optimize the design of online hospitality review systems and to obtain reference value to increase the satisfaction of consumers’ decision making. Finally, the paper quantitatively measures their importance in online hospitality review systems. Then, the paper proposes an improved method to classify design features on the basis of the Kano questionnaire design and survey data. First, the paper analyzes the design features of online hospitality review systems. In this context, this research conducts an empirical study on the design features of online hospitality review systems based on the Kano model. A well-designed online hospitality review system is crucial to reduce the uncertainty of consumers’ decision making, to grasp the actual needs of consumers, and to improve the quality experience of platforms. Online hospitality reviews have an important impact on consumers’ travel and hospitality booking decisions in the Internet age. The best model from the study is the Support Vector Machine (SVM) that has been able to provide R2 of 0.86 for the training data set and 0.85 for the testing data set with a low coefficient of variation, and the most significant product of this smart factory is Skelp. The performance of prediction models measured by R2 error, Root Mean Squared Error (RMSE), Mean Absolute Error (MAE), and Coefficient of Variation (CV). With repeated cross-validation, three statistical models were trained and tested in a test set: 1) General Linear Regression Model (GLM), 2) Support Vector Machine (SVM), and 3) boosting Tree (BT). This study aims to present and analyse the predictive models of the data-driven system to be used by appliances and find out the most significant product item. Analysis and modeling of industrial energy are currently a time-insertion process because more and more energy is consumed for economic growth in a smart factory. Then, this method optimizes the chaotic sequences to further enhance system security.Įnergy has been obtained as one of the key inputs for a country's economic growth and social development.
![nik collection promotional code nik collection promotional code](https://i3.ytimg.com/vi/JzLjVgneNA8/hqdefault.jpg)
This method constitutes a key pool with the three-dimensional Lorenz System, the four-dimensional Cellular Neural Network (CNN) System and the four-dimensional Chen System where the key source system and initial conditions are decided by the plaintext video frame itself. The method has a network access authentication and service encryption workflow, which implants startup authentication and key distribution into the information control signaling procedure.
![nik collection promotional code nik collection promotional code](https://nikonrumors.com/wp-content/uploads/2020/02/ON1-Creative-Styles-coupon-code-2.png)
After meeting the requirements of voice and video dispatch, this paper proposes an end-to-end encryption method of multimedia information that introduces a multiple protection mechanism including selective encryption and selective integrity protection. Video command and dispatch systems have become essential communication safeguard measures in circumstances of emergency rescue, epidemic prevention, and control command as, data security has become especially important.