Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICEBE
ICEBE 2018
Generate Citations
2018 IEEE 15th International Conference on e-Business Engineering (ICEBE)
Oct. 12 2018 to Oct. 14 2018
Xi'An, China
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-10
Message from the General Chairs
Freely available from IEEE.
pp. 11-11
Message from the Program Chairs
Freely available from IEEE.
pp. 12-13
Message from the Workshop Chairs
Freely available from IEEE.
pp. 14-14
Conference Organization
Freely available from IEEE.
pp. 15-16
Program Committee
Freely available from IEEE.
pp. 17-19
Workshop Organization
Freely available from IEEE.
pp. 20-20
Keynotes
Freely available from IEEE.
pp. 21-22
Prediction of Crowdfunding Project Success with Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Pi-Fen Yu
,
Fu-Ming Huang
,
Chuan Yang
,
Yu-Hsin Liu
,
Zi-Yi Li
,
Cheng-Hung Tsai
Deep Learning Based Image Cognition Platform for IoT Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Yan Sun
,
Lida Xu
,
Ling Li
,
Boyi Xu
,
Changbao Yin
,
Hongming Cai
Meta-Feature Based Data Mining Service Selection and Recommendation Using Machine Learning Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-24
by
Bayan Alghofaily
,
Chen Ding
Mining Emotions of the Public from Social Media for Enhancing Corporate Credit Rating
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-30
by
Hui Yuan
,
Raymond Y.K. Lau
,
Michael C.S. Wong
,
Chunping Li
Solution and Reference Recommendation System Using Knowledge Fusion and Ranking
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-38
by
Yu Zhang
,
Morteza Saberi
,
Elizabeth Chang
,
Alireza Abbasi
Research on Governmental Data Sharing Based on Local Differential Privacy Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-45
by
Liping Liu
,
Chunhui Piao
,
Xuehong Jiang
,
Lijuan Zheng
Towards a Process Analysis Approach to Adopt Robotic Process Automation
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-53
by
Abderrahmane Leshob
,
Audrey Bourgouin
,
Laurent Renard
A Survey on Chatbot Implementation in Customer Service Industry through Deep Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-61
by
Mohammad Nuruzzaman
,
Omar Khadeer Hussain
A Hybrid Decision Model for Heterogeneous Schemes in "Internet Plus" Hackerspace Product Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-69
by
Ye Gu
,
Shuyou Zhang
Service Dependency Based Dynamic Load Balancing Algorithm for Container Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-77
by
Jianxin Zhang
,
Rui Ren
,
Chengxi Huang
,
Xiang Fei
,
Wu Qun
,
Hongming Cai
Optimal Evidence Collection for Accountability in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-85
by
Fatma Masmoudi
,
Mohamed Sellami
,
Monia Loulou
,
Ahmed Hadj Kacem
A Cross-Age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-93
by
Ping Wang
,
Wen-Hui Lin
,
Bao-Hua Wu
,
Kuo-Ming Chao
,
Chi-Chun Lo
Topic Model Based Knowledge Graph for Entity Similarity Measuring
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-101
by
Haoran Sun
,
Rui Ren
,
Hongming Cai
,
Boyi Xu
,
Yonggang Liu
,
Tongyu Li
Design of Evaluation System for Digital Education Operational Skill Competition Based on Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-109
by
Bin Wu
,
Yinsheng Li
Shapes Similarity and Feature Reconstruction Comparison Based Active Contour Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-118
by
Ni Bo
,
Xiantao Cai
,
JiaXin Chen
Customer Segmentation and Strategy Development Based on User Behavior Analysis, RFM Model and Data Mining Techniques: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-126
by
Mohammadreza Tavakoli
,
Mohammadreza Molavi
,
Vahid Masoumi
,
Majid Mobini
,
Sadegh Etemad
,
Rouhollah Rahmani
Discovery of Rare Key Phrases
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
by
Yanping Chen
,
Sha Liu
,
Qinghua Zheng
,
Ruizhang Huang
,
Yongbin Qin
,
Jiwei Qin
,
Ping Chen
A Case Study of Service-Centric IoT Model for Rural Sewage Disposal
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-138
by
Zheng Liu
,
Beibei Yu
,
Zhibo Chen
,
Jiqin Peng
,
Qiang Feng
,
Qing Liu
,
Cheng Xie
Towards a Software Centric Approach for Ontology Development: Novel Methodology and its Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-146
by
Santhosh John
,
Nazaraf Shah
,
Craig Stewart
The Influence Factors of Online Review Quality and Their Mechanism on Trust Intention
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-152
by
Cong Cao
,
Jun Yan
,
Mengxiang Li
Customised Data Dashboard for Contact Centres by Focussing on Customer Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-157
by
Morteza Saberi
,
Elizabeth Chang
,
Mohammad Saffari
,
Omar Khadeer Hussain
Cloud Service Composition with Multiple QoS Constraints for Manufacturing Resource
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-163
by
Guodong Yi
,
Hangjian Hu
,
Shuyou Zhang
,
Longfei Sun
Artificial Intelligence and Mobile Phone Sensing Based User Activity Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-171
by
Chia-Liang Chen
,
Fu-Ming Huang
,
Yu-Hsin Liu
,
Dai-En Wu
A Traffic Prediction System Based on Traffic Investigation Data and Mobile Phone Signaling
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-177
by
Han Feng
,
Lihong Jiang
,
Hongming Cai
A Blockchain-Based Autonomous Credit System
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-186
by
Yinsheng Li
,
Xu Liang
,
Xiao Zhu
,
Bin Wu
Yet Another Blockchain Use Case – The Label Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-194
by
Thomas Keller
,
Nik Kessler
Automatic Note Recognition and Generation of MDL and MML using FFT
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-200
by
Hanchao Li
,
Hongyu You
,
Xiang Fei
,
Ming Yang
,
Kuo-Ming Chao
,
Chaobo He
An Author-Centered Media Blockchain Ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-206
by
Sijie Li
Personalized Intelligent Push Method of Design Tasks for Designers in the Hackerspace
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-212
by
Changlong Cheng
,
Shuyou Zhang
A Data Collection Collar for Vital Signs of Cows on the Grassland Based on LoRa
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Qi Li
,
Zhanghua Liu
,
Junsheng Xiao
Analysis of Public Opinion Heat Trend in Universities on The Basis of Markov Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-222
by
Ning Yu
,
Kun Liu
,
Kun Ma
Is It Beneficial to Provide Historical Price Information Under Social Influence?
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-227
by
Mei Xue
,
Xinyu Sun
,
Jiayin Wang
,
Yuqiu Wang
A Social Network Model Based on the Community Evolutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-233
by
Zhenming Liu
,
Yueting Chai
,
Yi Liu
,
Zequn Li
Fault Diagnosis of Wind Turbine Gearbox Based on Vibration Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-238
by
Zeyuan Wang
,
Hongwei Wang
,
Wei Liu
Scenario-Based Microservice Retrieval Using Word2Vec
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-244
by
Shang-Pin Ma
,
Yen Chuang
,
Ci-Wei Lan
,
Hsi-Min Chen
,
Chun-Ying Huang
,
Chia-Yu Li
Semantic Document Exchange through Mediation of Machine Natural Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-250
by
Peng Qin
,
Jingzhi Guo
,
Yiling Xu
,
Longqi Wang
Capital Structure and Firm Performance: Empirical Research Based on Global E-Retailing Companies
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-256
by
Rui She
,
Jingzhi Guo
AutoCOT - AutoEncoder Based Cooperative Training for Sparse Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-262
by
Rong Bai
,
Haiping Zhu
,
Yifu Ni
,
Yan Chen
,
Qinghua Zheng
Linked Open Data-Driven Contrastive Cognitive Subgraph Searching for Understanding Concepts in e-Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-268
by
Mengge Liu
,
Feng Tian
,
Yundong Yao
,
Yifu Ni
,
Yan Chen
,
Haiping Zhu
,
Qinghua Zheng
Toward a Self-Learned Smart Contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-273
by
Ahmed S. Almasoud
,
Maged M. Eljazzar
,
Farookh Hussain
Host Overloading Detection Based on EWMA Algorithm in Cloud Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-279
by
Shin-Li Lu
,
Jen-Hsiang Chen
A Study on the Applications of Big Data in Cross-Border E-Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-284
by
Xuesong Zhao
Differential Privacy Protection Recommendation Algorithm Based on Student Learning Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-288
by
Pei Feng
,
Haiping Zhu
,
Yu Liu
,
Yan Chen
,
Qinghua Zheng
Intelligent Risk Management Framework for BYOD
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-293
by
khoula Al Harthy
,
Nazaraf Shah
,
Arun Shankarappa
Research on Influence Factors of Micro-Blog Users' Social Influence
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-299
by
YI Su
,
Wei Qi
,
Juan Qin
Attractor for a Strongly Damped Lattice System with Nonlinear Damping
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-305
by
Hongyan Li
,
Rui Zhang
Protocol Programming: A Layered Programming Paradigm
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-311
by
Yanping Chen
,
Zehua Ding
,
Qinghua Zheng
,
Bin Liu
,
Nazaraf Shah
The Concept and Framework of Basic Information Facilities for E-Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-317
by
Yueting Chai
,
Xiao Yu
,
Xiang Gu
Application Layer Challenges and Adoption Barriers to Internet Based Advanced Communication Technologies In SME
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-323
by
N. Kuruwitaarachch
Research on the Memory of Online Advertising Based on Eye-Tracking Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-328
by
Yao Lu
,
Wei Qi
,
Juan Qin
Lattice-Based Universal Designated Verifier Signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-334
by
BaoHong Li
,
YanZhi Liu
,
Sai Yang
System Framework and Information Model for a Distributed Dance Teaching Resource Repository
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-339
by
Min Wei
,
Hongwei Wang
,
Wei Liu
Electronic Human Resource Management Survey Enabled by Big Data Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-346
by
Hongwei Wang
,
Danmoyi Tan
,
Wei Liu
Author Index
Freely available from IEEE.
pp. 347-349
Publisher's Information
Freely available from IEEE.
pp. 340-340
Showing 66 out of 66