Framework to Understand and Deploy AI-Based Smart CRM in the Airline Industry

2022 ◽  
pp. 154-165
Author(s):  
Vikram Bawa

This is the age of AI. Soon what customers think will be understood by the smart applications on their mobile devices and the information—most of which will be pre-processed based on the customer personas—will be available at the blink of an eye. In this chapter a critical analysis of how AI bolsters CRM capabilities in the airline industry is conducted. To understand that, AI capabilities are surveyed and its transformational effects on CRM and its impact on customer acquisition, retention, loyalty, and experience are explored in depth. In the end, a customer journey-based deployment framework is presented that supports the finding of the AI-CRM implementation use cases.

2017 ◽  
Vol 8 (2) ◽  
pp. 104-133
Author(s):  
Yvonne Ziegler ◽  
Jörg Troester ◽  
Abdul Mu’ti Sazali

In 2012 IATA has initiated a new communication standard in airline distribution called New Distribution Capability (NDC) that will enable airlines, IT providers, and travel agents to work together to create new capability in the distribution of airline products and services as well as to simplify the business. NDC has been introduced to solve limitations of the existing programs in the distribution system and to represent the modernization of future air travel distribution. NDC standard intends to give a potential impact on future airline distribution where airlines will have wider opportunities to directly interact with intermediaries and reduce commission fees to the Global Distribution System (GDS). This study, in particular, confirms that airline distribution specialists firmly believe that NDC constitutes an important development in the airline industry and, while still being in its development stage, it clearly has the potential to address today´s market issues and to solve tomorrow´s challenges.


Author(s):  
Theodora Dame Adjin-Tettey ◽  
Vincentia Abui Akrobotu

The use of mobile devices, especially, by teens has been looked at with much apprehension and suspicion with some saying that it can be used to acquire information which can be detrimental to their social and psychological growth. Some teachers complain that it affects teens' studies as these teenagers stay up late in the night browsing, chatting, watching movies and playing games which cause them to sleep in class or pay little attention because of tiredness. In Ghana students in public schools up to Senior High School are not allowed to use personal mobile phones, laptops and other mobile gadgets in school because of implications such as those enumerated above. On the other hand, some, including those in prominent positions in government, have called for a rethink of such a directive by the Ministry of Education. This chapter critically looks into previous literature on the use of mobile devices in the classroom and suggests ways in which it can be effectively used to advance academic work in the classroom.


Author(s):  
Gabriel Orsini ◽  
Wolf Posdorfer ◽  
Winfried Lamersdorf

Abstract Use cases in the Internet of Things (IoT) and in mobile clouds often require the interaction of one or more mobile devices with their infrastructure to provide users with services. Ideally, this interaction is based on a reliable connection between the communicating devices, which is often not the case. Since most use cases do not adequately address this issue, service quality is often compromised. Aimed to address this issue, this paper proposes a novel approach to forecast the connectivity and bandwidth of mobile devices by applying machine learning to the context data recorded by the various sensors of the mobile device. This concept, designed as a microservice, has been implemented in the mobile middleware CloudAware, a system software infrastructure for mobile cloud computing that integrates easily with mobile operating systems, such as Android. We evaluated our approach with real sensor data and showed how to enable mobile devices in the IoT to make assumptions about their future connectivity, allowing for intelligent and distributed decision making on the mobile edge of the network.


Author(s):  
Michael Kohlhaas ◽  
Lea Seidlmayer ◽  
Mathias Kaspar

The detection of cardiac arrhythmias has a long history in medicine, with current developments focusing on early detection using mobile devices. In basic research, however, the use cases and data differ greatly from the experimental setup. We developed a Python-based system to ease detection and analysis of arrhythmic sections in signals measured on extracted and stimulated cardiac myocytes. Multiple algorithms were integrated into the system, tested and evaluated. The best algorithm resulted in an F1-score of 0.97 and was primarily provided in the application.


2021 ◽  
Vol 4 (2) ◽  
pp. 1-29
Author(s):  
Moses Ashawa ◽  
Sarah Morris

The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society. This paper presents an analysis of mobile malware evolution between 2000-2020. The paper presents mobile malware types and in-depth infection strategies malware deploys to infect mobile devices. Accordingly, factors that restricted the fast spread of early malware and those that enhance the fast propagation of recent malware are identified. Moreover, the paper discusses and classifies mobile malware based on privilege escalation and attack goals. Based on the reviewed survey papers, our research presents recommendations in the form of measures to cope with emerging security threats posed by malware and thus decrease threats and malware infection rates. Finally, we identify the need for a critical analysis of mobile malware frameworks to identify their weaknesses and strengths to develop a more robust, accurate, and scalable tool from an Android detection standpoint. The survey results facilitate the understanding of mobile malware evolution and the infection trend. They also help mobile malware analysts to understand the current evasion techniques mobile malware deploys


Author(s):  
Diego Romano ◽  
Giovanni Schmid

In the last four years, the evolution and adoption of blockchain and, more generally, distributed ledger systems have shown the affirmation of many concepts and models with significant differences in system governance and suitable applications. This work aims to update the critical analysis of blockchain technologies carried out by our previous contribution to this journal, extending the focus to distributed ledger components and systems. Starting from the topical concept of decentralization, we introduce concepts and building blocks currently adopted in the available systems centering on their functional aspects and impact on possible applications. We present some conceptual framing tools helpful in the application context, and we will propose the concept of process authenticity, which we will discuss through two use cases: blockchain document dematerialization and e-voting.


Author(s):  
Sima Nadler

One of the key things that differentiate mobile devices from static computing platforms is the ability to provide information about the device user's location. While the raw location is often useful, it is the ability to understand the user's context that makes this capability so powerful. This chapter will review the technologies used today to provide location tracking of mobile devices and which are best for different types of use cases. It will also address challenges associated with location tracking, such as accuracy, performance and privacy.


2015 ◽  
Vol 40 (4) ◽  
Author(s):  
Lee McGuigan ◽  
Graham Murdock

Taking Marx’s analysis as the point of departure, and drawing on a range of concrete examples, this article argues that rather than concentrating on the “new” forms of social and economic intercourse animated by digital media, and especially internet-enabled mobile devices, critical analysis needs to trace the ways in which digital consumption is intensifying the progressive integration of marketing, marketplaces, and forms of payment that have been central to the generation of surplus value and the maintenance of “business as usual,” from the emergence of the modern consumer system at the turn of the twentieth century.Cet article a recours d’abord à l’analyse de Marx puis à un éventail d’exemples concrets pour soutenir que l’analyse critique, plutôt que de se concentrer sur de « nouvelles » formes d’interaction sociale et économique engendrées par les médias numériques, y compris en particulier parmi ces derniers les appareils mobiles avec accès internet, a besoin de recenser les manières dont la consommation numérique est en train d’intensifier l’intégration graduelle du marketing, des marchés et des modes de paiement qui ont été au centre de la création de plus-value et du maintien du statu quo à partir de l’émergence du système de consommation moderne au début du vingtième siècle.


2007 ◽  
Vol 177 (4S) ◽  
pp. 126-126
Author(s):  
Matthew E. Nielsen ◽  
Danil V. Makarov ◽  
Elizabeth B. Humphreys ◽  
Leslie A. Mangold ◽  
Alan W. Partin ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document