Computational Intelligence in Communications and Business Analytics 5th International Conference, CICBA 2023, Kalyani, India, January 27-28, 2023, Revised Selected Papers, Part II / [electronic resource] :
edited by Kousik Dasgupta, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta.
- 1st ed. 2024.
- XIX, 363 p. 211 illus., 155 illus. in color. online resource.
- Communications in Computer and Information Science, 1956 1865-0937 ; .
- Communications in Computer and Information Science, 1956 .
Track: Theories and Applications to Data Communications -- A novel approach of fragile watermarking for authentication and tamper detection exploiting Local Binary Pattern (LBP). -- A Machine Learning Based Video Summarization Framework for Yoga-Posture Video -- Real-Time Human Fall Detection using a Lightweight Pose Estimation Technique -- Design of a Vehicle Overspeed Management System Using Blockchain-Assisted IoV -- A Study on Algorithms for Detection of Communities in Dynamic Social Networks: A Review -- Spanning Cactus Existence Problem onFlower Snark Graphs -- Analysis of Quantum Cryptology and the RSA Algorithms Defense against Attacks using Shor's Algorithm in a Post Quantum Environment -- Blockchain-enabled IoV Framework for Establishing Automated Communication Using Smart Contract -- Load balancing In a Heterogeneous Cloud Environment with a New Cloudlet Scheduling Strategy -- Protocol For Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality -- Dynamic Priority Based Application Offloading Strategy in Mobile Cloud Computing -- Chaotic Quasi-Oppositional Moth Flame Optimization for solving multi-objective optimal DG emplacement problem in radial distribution network -- Authentication and Access Control by Face Recognition and Intrusion Detection System -- A novel trigonometric mutation-based backtracking search algorithm for solving optimal power flow problem considering renewable energysources -- Qualitative and Quantitative analysis of modifications of Playfair Cipher -- Single Electron Tunnelling based Threshold Logic Unit -- Edge-based Image Steganography -- Track: Theories and Applications to Data Analytics -- Classification of Microstructural Steel Images using an Attention-aided Transfer Learning Network -- Feature Selection approaches in Online Bangla Handwriting Recognition -- Predicting DiseaseAssociated Genes throughInteraction and Ontologybased Inference Technique -- An automatic POS tagger system for code mixed Indian social media text -- Scrutinization of Text, Images and Audio posts on Social Media for identifying Fake Content -- Machine Translation Systems for Official languages of North-eastern India: A Review -- An Introduction to KDB: Knowledge Discovery in Biodiversity -- Segmented-based and segmented-free approachfor COVID-19 detection -- A Study of Word Embedding Models for Machine Translation of North Eastern Languages.
This two-volume set constitutes the refereed proceedings of the 5th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2023, held in Kalyani, India, during January 27-28, 2023. The 52 full papers presented in this volume were carefully reviewed and selected from 187 submissions. The papers present recent research on intersection of computational intelligence, communications, and business analytics, fostering international collaboration and the dissemination of cutting-edge research.
9783031488795
10.1007/978-3-031-48879-5 doi
Data structures (Computer science).
Information theory.
Computer engineering.
Computer networks .
Artificial intelligence.
Social sciences--Data processing.
Data Structures and Information Theory.
Computer Engineering and Networks.
Computer Communication Networks.
Artificial Intelligence.
Computer Application in Social and Behavioral Sciences.
QA76.9.D35 Q350-390
005.73 003.54
Track: Theories and Applications to Data Communications -- A novel approach of fragile watermarking for authentication and tamper detection exploiting Local Binary Pattern (LBP). -- A Machine Learning Based Video Summarization Framework for Yoga-Posture Video -- Real-Time Human Fall Detection using a Lightweight Pose Estimation Technique -- Design of a Vehicle Overspeed Management System Using Blockchain-Assisted IoV -- A Study on Algorithms for Detection of Communities in Dynamic Social Networks: A Review -- Spanning Cactus Existence Problem onFlower Snark Graphs -- Analysis of Quantum Cryptology and the RSA Algorithms Defense against Attacks using Shor's Algorithm in a Post Quantum Environment -- Blockchain-enabled IoV Framework for Establishing Automated Communication Using Smart Contract -- Load balancing In a Heterogeneous Cloud Environment with a New Cloudlet Scheduling Strategy -- Protocol For Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality -- Dynamic Priority Based Application Offloading Strategy in Mobile Cloud Computing -- Chaotic Quasi-Oppositional Moth Flame Optimization for solving multi-objective optimal DG emplacement problem in radial distribution network -- Authentication and Access Control by Face Recognition and Intrusion Detection System -- A novel trigonometric mutation-based backtracking search algorithm for solving optimal power flow problem considering renewable energysources -- Qualitative and Quantitative analysis of modifications of Playfair Cipher -- Single Electron Tunnelling based Threshold Logic Unit -- Edge-based Image Steganography -- Track: Theories and Applications to Data Analytics -- Classification of Microstructural Steel Images using an Attention-aided Transfer Learning Network -- Feature Selection approaches in Online Bangla Handwriting Recognition -- Predicting DiseaseAssociated Genes throughInteraction and Ontologybased Inference Technique -- An automatic POS tagger system for code mixed Indian social media text -- Scrutinization of Text, Images and Audio posts on Social Media for identifying Fake Content -- Machine Translation Systems for Official languages of North-eastern India: A Review -- An Introduction to KDB: Knowledge Discovery in Biodiversity -- Segmented-based and segmented-free approachfor COVID-19 detection -- A Study of Word Embedding Models for Machine Translation of North Eastern Languages.
This two-volume set constitutes the refereed proceedings of the 5th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2023, held in Kalyani, India, during January 27-28, 2023. The 52 full papers presented in this volume were carefully reviewed and selected from 187 submissions. The papers present recent research on intersection of computational intelligence, communications, and business analytics, fostering international collaboration and the dissemination of cutting-edge research.
9783031488795
10.1007/978-3-031-48879-5 doi
Data structures (Computer science).
Information theory.
Computer engineering.
Computer networks .
Artificial intelligence.
Social sciences--Data processing.
Data Structures and Information Theory.
Computer Engineering and Networks.
Computer Communication Networks.
Artificial Intelligence.
Computer Application in Social and Behavioral Sciences.
QA76.9.D35 Q350-390
005.73 003.54