Role of information security-based tourism management system in the intelligent recommendation of tourism resources
-
Published:2021
Issue:6
Volume:18
Page:7955-7964
-
ISSN:1551-0018
-
Container-title:Mathematical Biosciences and Engineering
-
language:
-
Short-container-title:MBE
Author:
Nan Xiang, ,kanato Kayo
Abstract
<abstract>
<p>With the rapid development of tourism and the Internet industry, tourism activities have increasingly become a fashion behavior of people. The role of intelligent tourism resources in tourism activities has gradually become prominent. In order to meet the needs of all kinds of users, the tourism management system services are developing in the direction of diversification and individualization, and recommending the tourism resource products that best meet the needs of users to users has become a top priority. This article aims to improve the practical value of the system through the intelligent functions of the tourism management system based on information security in the intelligent recommendation of tourism resources. The tourism management system can display the received information about tourists. Through the experimental research of the accompanying information security algorithm and the analysis of the recommendation of the tourism system, the intelligent functions of the tourism management system based on information security can be captured in the intelligent recommendation of tourism resources. Develop the tourism management system to solve efficiency problems and realize tourism management information. Experimental results show that based on information security, 80% of tourists have become a popular choice for smart recommendation countries, which will bring more convenience to tourists during the game.</p>
</abstract>
Publisher
American Institute of Mathematical Sciences (AIMS)
Subject
Applied Mathematics,Computational Mathematics,General Agricultural and Biological Sciences,Modeling and Simulation,General Medicine
Reference20 articles.
1. M. Li, Optimization of practical teaching system of tourism management inferior course based on learning cycle theory, J. Yuxi Normal University, 35 (2019), 112-116. 2. L. Xu, C. Jiang, J. Wang, J. Yuan, Y. Ren, Information security in big data: Privacy and data mining, IEEE Access, 2 (2017), 1149-1176. 3. X. Shao, Y. Ji, H. Le, Research and practice of cloud computing and big data in Omni-directional multi-angle information security technology, Sci. Technol. Bulletin, 33 (2017), 76-79. 4. Z. Trabelsi, M. A. Matrooshi, S. A. Bairaq, W. Ibrahim, M. M. Masud, Android based mobile apps for information security hands-on education, Educ. Inform. Technol., 22 (2017), 125-144. 5. Q. Da, J. Sun, L. Zhang, L. Kou, W. S. Wang, Q. L. Han, et al., A novel hybrid information security scheme for 2D vector map, Mobile Networks Appl., 23 (2018), 734-742.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|