


default search action
ICEBE 2023: Sydney, Australia
- IEEE International Conference on e-Business Engineering, ICEBE 2023, Sydney, Australia, November 4-6, 2023. IEEE 2023, ISBN 979-8-3503-2555-3

- Saptashwa Maity, Soujatya Khan, Sobhan Sarkar:

A Two-phase Approach to Determine User-Preference and Feature Importance in Pricing of Cryptocurrencies using Twitter Data. 1-7 - Hironori Takeuchi, Jati H. Husen

, Hnin Thandar Tun, Hironori Washizaki, Nobukazu Yoshioka:
Enterprise Architecture-based Metamodel for a Holistic Business - IT Alignment View on Machine Learning Projects. 8-15 - Wael Jefry, Firas Al-Doghman

, Farookh Khadeer Hussain:
Comparison of Artificial Intelligence Models in Cross-lingual Transfer Learning through Sentiment Analysis. 16-22 - Mwaheb Almadani

, Farookh Khadeer Hussain:
Implementing a Secure Blockchain-Based Wallet System with Multi-Factor Authentication. 23-30 - Bingqing Shen, Yuxin Zeng, Linjing Cai, Aifan Ling, Jingzhi Guo, Lihong Jiang:

Online Investment Protection through Efficient Loan Exchange. 31-38 - Berkan Oztas

, Deniz Cetinkaya, Festus Fatai Adedoyin, Marcin Budka, Huseyin Dogan, Gökhan Aksu:
Perspectives from Experts on Developing Transaction Monitoring Methods for Anti-Money Laundering. 39-46 - Berkan Oztas

, Deniz Cetinkaya, Festus Fatai Adedoyin, Marcin Budka, Huseyin Dogan, Gökhan Aksu:
Enhancing Anti-Money Laundering: Development of a Synthetic Transaction Monitoring Dataset. 47-54 - Sheng-Kai Wang, Shang-Pin Ma, Chen-Hao Chao, Guan-Hong Lai:

Low-code ChatOps for Microservices Systems Using Service Composition. 55-62 - E. M. I. M. Ekanayaka, J. K. K. H. Thathsarani, D. S. Karunanayaka, Nuwan Kuruwitaarachchi, N. Skandakumar:

Enhancing Devops Infrastructure For Efficient Management Of Microservice Applications. 63-68 - Aurèle Zannou, Abderrahmane Leshob, Raqeebir Rab, Pierre Hadaya:

A Method for Selecting a Suitable Cloud Computing Deployment Strategy. 69-76 - Nour El Houda Boubaker, Karim Zarour, Nawal Guermouche, Djamel Benmerzoug:

A Q-learning-based Approach for Optimizing Workflow Migration in Fog Environments. 77-84 - Asma AlKhalaf, Farookh Khadeer Hussain:

Optimisation of Volunteer Node Selection for Scalable and Trustworthy Fog Environments. 85-89 - Tendai Mukande

, Esraa Ali, Annalina Caputo, Ruihai Dong, Noel E. O'Connor
:
A Sparse Sinkhorn Transformer for Multi-Behaviour Recommendation. 90-96 - Hui Zhu, Zhong Ning, Mengyuan Shen, Wenfeng Zheng:

Empirical Analysis of the Relationship between Regional Innovation, Trade Vitality, and Digital Trade Barriers Based on PVAR Model: A Case Study of the Guangdong Hong Kong Macao Greater Bay Area. 97-102 - Isti Surjandari, Anindya Putri Maulita:

Efficiency Analysis of Conventional Commercial Banks in Indonesia: A DEA Approach. 108-113 - Yasu Wu, Changlong Fu, Manwen Yang, Haoran Duan, Cheng Xie

:
Motif Masking-based Self-Supervised Learning For Molecule Graph Representation Learning. 114-121 - Suhair Alotaibi, Hada Alsobhi, Ming Zhao

, Farookh Khadeer Hussain:
Blockchain for Identity Management: Ensuring Trust and Integrity in the Education Sector. 122-128 - Samar Alsulaimani, Farookh Khadeer Hussain, Omar Hussain:

Digital Asset Ownership based on Blockchain: A Literature Review. 129-133 - Nada Atetallah Alghanmi

, Nouf Alghanmi, Hadeel Alhosaini, Farookh Khadeer Hussain:
Carbon Credits Storage: A Comparative Multifactor Analysis of On-chain vs Off-chain Approaches. 134-142 - Abdullah J. Abualhamayl, Mohanad A. Almalki, Firas Al-Doghman

, Abdulmajeed A. Alyoubi, Farookh Khadeer Hussain:
Towards Fractional NFTs for Joint Ownership and Provenance in Real Estate. 143-148 - Rasenthiran Kohilan, Harsha Edirisinghe Warakagoda, Tharushi Thathsarani Kitulgoda, Nimalaprakasan Skandhakumar, Nuwan Kuruwitaarachchi:

A Machine Learning-based Approach for Detecting Smishing Attacks at End-user Level. 149-154 - Paul Whittington, Huseyin Dogan:

Authentibility Pass: An Accessible Authentication Gateway for People with Reduced Abilities. 155-162 - Ching-Lung Lin, Ren Rong Guo, Sheng-Yu Chuang, Ching-Feng Lin:

Analysis of Rehabilitation Benefits of IoT Cloud Computing Applied to Elderly Rehabilitation Equipment. 163-169 - Theresia Dwi Hastuti, Ridwan Sanjaya, Benediktus Danang Setianto:

The Driven Factor of Whistlelower's Intention Using Whistleblowing Systems. 170-177 - Jeonghye Han, Youngtaek Shim:

Inclusive Design of a Tool to Screen Literacy of Lower Grade Elementary School Students. 178-180 - Yi-Ju Cho, Shin-Jie Lee:

Utilizing Machine Learning for the Identification of Visually Similar Web Elements. 181-186 - Hanchao Li, Xiang Li:

A Case Study on Analyzing the Similarity Between Two Similar Stocks: Building the CrC-LSTM Model. 187-191 - Alireza Faed, Omar Khadeer Hussain:

Comparison of Incentive Strategies on the Buyer's Decision-making Process Using PLS-SEM Approach. 192-198 - Mahasen Alsolmy, Farookh Khadeer Hussain:

Blockchain Adoption in Saudi Manufacturing: The Conceptual Model and Research Hypotheses. 199-204 - Yang Chengjie, Qi Wei:

Taobao User Purchase Behavior Prediction And Feature Analysis Based On Ensemble Learning. 205-209 - Digant Singh, Devwardhan Kothari, Lupam K. Saha:

A Study of Digital Games as a Method of Reducing Stress for Students in the Modern World : Study took place at Indian Institute of Information Technology Dharwad (IIIT Dharwad). 210-216 - Jun Nian Lo, Shin-Jie Lee:

An Empirical Study on Web GUI Load Testing and the Hybrid with HTTP Requests. 217-224 - Shang-Pin Ma, Yu-An Chen, Yi-Jie Guo, Yu-Sheng Su

:
Semi-Automated Behavior-Driven Testing for the Web Front-Ends. 225-230 - Iman AlJassasi, Youcef Baghdadi:

A Front-end Requirement Engineering Framework of Social Commerce Enterprises (Design-Phase). 231-239 - Ronald Petrlic, David Stiegler:

Why Johnny was allowed to send this email: How to better provide transparency in email security towards the recipient. 240-245 - Yifei Zhao, Kuo-Ming Chao, Yinsheng Li:

Domain Information Learning For Multi-Domain Knowledge Graph Link Prediction. 246-252 - Chih-En Li, Wei-Lun Liu, Kun-Yi Lai, Yu-Hsiang Chiang, Xiaowei Yan, Hao-Xiang Chen, Hsu-Ching Li, Wan-Shu Cheng:

Intelligent Recognition of Immune Cells: Analysis and Research. 253-256 - Zhuorui Qin, Xiaoqian Wu, Yimin Zheng, Qingyao Wu:

Research on Multi-AGVs dynamic scheduling based on deep reinforcement learning. 257-262 - Uzu-Kuei Hsu, Hong-Bin Chang, Yao-Yu Tsai, Chang-Hsien Tai:

Dynamic Numerical Studies of a Rotorcraft Entering and Exiting Rectangular Tunnel. 263-269 - Je-Yao Chang, Tsu-Yu Lo, Tan-Zhi Wei, Shih-Ping Huang, Chih-Ming Kung, Shao-Gang Mao:

Wireless Precise Positioning Technology With Application to Autonomous Aircraft Shipborne Landing System. 270-275 - Zhi-Hao Chen:

Based on Intelligent Attack and Defense Command Technology System for Multi-Rotor TiltingVertical Takeoff and Landing Swarm UAVs. 276-280 - Hui-Ching Hsieh, Gene Eu Jan, He-Lin Luo:

The Applications and Presentations of Drones in Staged Performances and Contemporary Art. 281-286 - Kuen-Yu Tsai, Guang-Yun Meng, Tung-Ling Wu, Ming-Hui Zheng, Wei-Yao Wang, Chih-Ming Kung, Yen-Chuan Chen, Chi-Fa Huang, Tsang-Chieh Hsieh, Hsin-Sheng Hsu, Huei-Der Lin, Jing-Xiang Shi:

eVTOL, UAM, and AAM: Brief Development History and Implementation Outlook of the United States. 287-296 - Gene Eu Jan, Ching-Chi Lin, Chih-Wei Hsu, Chih-Ming Kung, Hui-Ching Hsieh, Yung-Hao Wong:

Innovative Search and Rescue Methods Using Drones: An Algorithm Combining 3D Modeling and Laser Ranging Scanning. 297-303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














