Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Factors Influencing Service Robot Adoption: A Comparative Analysis Of Hotel-Specific Service Robot Acceptance Models, Ying Dong Dec 2021

Factors Influencing Service Robot Adoption: A Comparative Analysis Of Hotel-Specific Service Robot Acceptance Models, Ying Dong

UNLV Theses, Dissertations, Professional Papers, and Capstones

The market for service robots is expected to expand significantly owing to the increasing relevance of service automation under the outbreak of the COVID-19 pandemic. Despite the growing managerial interest in robotic applications in the hotel industry, current robotic research has been mostly conceptual with limited robot data on hand. In light of this issue, this paper will conduct a comparative analysis of hotel-specific service robot acceptance models between the Service Robot Acceptance Model (sRAM) and the Service Robot Integration Willingness (SRIW) framework. By identifying key elements of each service robot acceptance model, this paper puts an emphasis on investigating …


Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery Jun 2015

Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery

UNLV Gaming Research & Review Journal

Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …


Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova May 2013

Communication Artifacts And Interaction Evaluation For Requirements Engineering, Miloslava Plachkinova

UNLV Theses, Dissertations, Professional Papers, and Capstones

This paper aims to answer an important question regarding the development of new information systems (IS): "What is the predominant factor for the selection of communication artifacts for requirements engineering (RE)?". Many researchers have focused on the RE and communication as separate disciplines, but little or no research addressed the RE communication issues. These problems are important because they often lead to misunderstanding and misinterpretation of the gathered requirements. We develop expectations about the RE communication process based on prior literature from both disciplines and we test them through several case studies. Our methodology consists of analysis of six case …


Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang Jan 2011

Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang

Management, Entrepreneurship and Technology Faculty Publications

The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …


A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim Apr 2010

A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim

UNLV Theses, Dissertations, Professional Papers, and Capstones

Nowadays, electronic payment system is an essential part of modern business. Credit cards or debit cards have been widely used for on-site or remote transactions, greatly reducing the need for inconvenient cash transactions. However, there have been a huge number of incidents of credit card frauds over the Internet due to the security weakness of electronic payment system. A number of solutions have been proposed in the past to prevent this problem, but most of them were inconvenient and did not satisfy the needs of cardholders and merchants at the same time.

In this thesis, we present a new secure …


Research Poster: Htsma: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme In Heterogeneous Wireless Mesh Networks, Yan Jin, Ju-Yeon Jo, Mei Yang, Yoohwan Kim, Yingtao Jiang, John Gowens Feb 2010

Research Poster: Htsma: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme In Heterogeneous Wireless Mesh Networks, Yan Jin, Ju-Yeon Jo, Mei Yang, Yoohwan Kim, Yingtao Jiang, John Gowens

2010 Annual Nevada NSF EPSCoR Climate Change Conference

Research poster