Amazon cover image
Image from Amazon.com

Computational Intelligence in Communications and Business Analytics [electronic resource] : 5th International Conference, CICBA 2023, Kalyani, India, January 27–28, 2023, Revised Selected Papers, Part II /

Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 1956Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2024Edition: 1st ed. 2024Description: XIX, 363 p. 211 illus., 155 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783031488795
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.73 23
  • 003.54 23
LOC classification:
  • QA76.9.D35
  • Q350-390
Online resources:
Contents:
Track: Theories and Applications to Data Communications -- A novel approach of fragile watermarking for authentication and tamper detection exploiting Local Binary Pattern (LBP). -- A Machine Learning Based Video Summarization Framework for Yoga-Posture Video -- Real-Time Human Fall Detection using a Lightweight Pose Estimation Technique -- Design of a Vehicle Overspeed Management System Using Blockchain-Assisted IoV -- A Study on Algorithms for Detection of Communities in Dynamic Social Networks: A Review -- Spanning Cactus Existence Problem onFlower Snark Graphs -- Analysis of Quantum Cryptology and the RSA Algorithms Defense against Attacks using Shor’s Algorithm in a Post Quantum Environment -- Blockchain-enabled IoV Framework for Establishing Automated Communication Using Smart Contract -- Load balancing In a Heterogeneous Cloud Environment with a New Cloudlet Scheduling Strategy -- Protocol For Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality -- Dynamic Priority Based Application Offloading Strategy in Mobile Cloud Computing -- Chaotic Quasi-Oppositional Moth Flame Optimization for solving multi-objective optimal DG emplacement problem in radial distribution network -- Authentication and Access Control by Face Recognition and Intrusion Detection System -- A novel trigonometric mutation-based backtracking search algorithm for solving optimal power flow problem considering renewable energysources -- Qualitative and Quantitative analysis of modifications of Playfair Cipher -- Single Electron Tunnelling based Threshold Logic Unit -- Edge-based Image Steganography -- Track: Theories and Applications to Data Analytics -- Classification of Microstructural Steel Images using an Attention-aided Transfer Learning Network -- Feature Selection approaches in Online Bangla Handwriting Recognition -- Predicting DiseaseAssociated Genes throughInteraction and Ontologybased Inference Technique -- An automatic POS tagger system for code mixed Indian social media text -- Scrutinization of Text, Images and Audio posts on Social Media for identifying Fake Content -- Machine Translation Systems for Official languages of North-eastern India: A Review -- An Introduction to KDB: Knowledge Discovery in Biodiversity -- Segmented-based and segmented-free approachfor COVID-19 detection -- A Study of Word Embedding Models for Machine Translation of North Eastern Languages.
In: Springer Nature eBookSummary: This two-volume set constitutes the refereed proceedings of the 5th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2023, held in Kalyani, India, during January 27–28, 2023. The 52 full papers presented in this volume were carefully reviewed and selected from 187 submissions. The papers present recent research on intersection of computational intelligence, communications, and business analytics, fostering international collaboration and the dissemination of cutting-edge research.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Track: Theories and Applications to Data Communications -- A novel approach of fragile watermarking for authentication and tamper detection exploiting Local Binary Pattern (LBP). -- A Machine Learning Based Video Summarization Framework for Yoga-Posture Video -- Real-Time Human Fall Detection using a Lightweight Pose Estimation Technique -- Design of a Vehicle Overspeed Management System Using Blockchain-Assisted IoV -- A Study on Algorithms for Detection of Communities in Dynamic Social Networks: A Review -- Spanning Cactus Existence Problem onFlower Snark Graphs -- Analysis of Quantum Cryptology and the RSA Algorithms Defense against Attacks using Shor’s Algorithm in a Post Quantum Environment -- Blockchain-enabled IoV Framework for Establishing Automated Communication Using Smart Contract -- Load balancing In a Heterogeneous Cloud Environment with a New Cloudlet Scheduling Strategy -- Protocol For Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality -- Dynamic Priority Based Application Offloading Strategy in Mobile Cloud Computing -- Chaotic Quasi-Oppositional Moth Flame Optimization for solving multi-objective optimal DG emplacement problem in radial distribution network -- Authentication and Access Control by Face Recognition and Intrusion Detection System -- A novel trigonometric mutation-based backtracking search algorithm for solving optimal power flow problem considering renewable energysources -- Qualitative and Quantitative analysis of modifications of Playfair Cipher -- Single Electron Tunnelling based Threshold Logic Unit -- Edge-based Image Steganography -- Track: Theories and Applications to Data Analytics -- Classification of Microstructural Steel Images using an Attention-aided Transfer Learning Network -- Feature Selection approaches in Online Bangla Handwriting Recognition -- Predicting DiseaseAssociated Genes throughInteraction and Ontologybased Inference Technique -- An automatic POS tagger system for code mixed Indian social media text -- Scrutinization of Text, Images and Audio posts on Social Media for identifying Fake Content -- Machine Translation Systems for Official languages of North-eastern India: A Review -- An Introduction to KDB: Knowledge Discovery in Biodiversity -- Segmented-based and segmented-free approachfor COVID-19 detection -- A Study of Word Embedding Models for Machine Translation of North Eastern Languages.

This two-volume set constitutes the refereed proceedings of the 5th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2023, held in Kalyani, India, during January 27–28, 2023. The 52 full papers presented in this volume were carefully reviewed and selected from 187 submissions. The papers present recent research on intersection of computational intelligence, communications, and business analytics, fostering international collaboration and the dissemination of cutting-edge research.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in