Computational Intelligence in Communications and Business Analytics [E-Book] : 5th International Conference, CICBA 2023, Kalyani, India, January 27-28, 2023, Revised Selected Papers, Part II / edited by Kousik Dasgupta, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta.
This two-volume set constitutes the refereed proceedings of the 5th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2023, held in Kalyani, India, during January 27-28, 2023. The 52 full papers presented in this volume were carefully reviewed and...
Saved in:
Full text |
|
Personal Name(s): | Dasgupta, Kousik, editor |
Dutta, Paramartha, editor / Mandal, Jyotsna K., editor / Mukhopadhyay, Somnath, editor | |
Edition: |
1st edition 2024. |
Imprint: |
Cham :
Springer,
2024
|
Physical Description: |
XIX, 363 pages 211 illustrations, 155 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783031488795 |
DOI: |
10.1007/978-3-031-48879-5 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Communications in Computer and Information Science ;
1956 |
Subject (LOC): |
- Track: Theories and Applications to Data Communications
- A novel approach of fragile watermarking for authentication and tamper detection exploiting Local Binary Pattern (LBP).
- A Machine Learning Based Video Summarization Framework for Yoga-Posture Video
- Real-Time Human Fall Detection using a Lightweight Pose Estimation Technique
- Design of a Vehicle Overspeed Management System Using Blockchain-Assisted IoV
- A Study on Algorithms for Detection of Communities in Dynamic Social Networks: A Review
- Spanning Cactus Existence Problem onFlower Snark Graphs
- Analysis of Quantum Cryptology and the RSA Algorithms Defense against Attacks using Shor's Algorithm in a Post Quantum Environment
- Blockchain-enabled IoV Framework for Establishing Automated Communication Using Smart Contract
- Load balancing In a Heterogeneous Cloud Environment with a New Cloudlet Scheduling Strategy
- Protocol For Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality
- Dynamic Priority Based Application Offloading Strategy in Mobile Cloud Computing
- Chaotic Quasi-Oppositional Moth Flame Optimization for solving multi-objective optimal DG emplacement problem in radial distribution network
- Authentication and Access Control by Face Recognition and Intrusion Detection System
- A novel trigonometric mutation-based backtracking search algorithm for solving optimal power flow problem considering renewable energysources
- Qualitative and Quantitative analysis of modifications of Playfair Cipher
- Single Electron Tunnelling based Threshold Logic Unit
- Edge-based Image Steganography
- Track: Theories and Applications to Data Analytics
- Classification of Microstructural Steel Images using an Attention-aided Transfer Learning Network
- Feature Selection approaches in Online Bangla Handwriting Recognition
- Predicting DiseaseAssociated Genes throughInteraction and Ontologybased Inference Technique
- An automatic POS tagger system for code mixed Indian social media text
- Scrutinization of Text, Images and Audio posts on Social Media for identifying Fake Content
- Machine Translation Systems for Official languages of North-eastern India: A Review
- An Introduction to KDB: Knowledge Discovery in Biodiversity
- Segmented-based and segmented-free approachfor COVID-19 detection
- A Study of Word Embedding Models for Machine Translation of North Eastern Languages.