000 05834nam a22006735i 4500
001 978-3-031-48879-5
003 DE-He213
005 20240730170556.0
007 cr nn 008mamaa
008 231129s2024 sz | s |||| 0|eng d
020 _a9783031488795
_9978-3-031-48879-5
024 7 _a10.1007/978-3-031-48879-5
_2doi
050 4 _aQA76.9.D35
050 4 _aQ350-390
072 7 _aUMB
_2bicssc
072 7 _aGPF
_2bicssc
072 7 _aCOM021000
_2bisacsh
072 7 _aUMB
_2thema
072 7 _aGPF
_2thema
082 0 4 _a005.73
_223
082 0 4 _a003.54
_223
245 1 0 _aComputational Intelligence in Communications and Business Analytics
_h[electronic resource] :
_b5th International Conference, CICBA 2023, Kalyani, India, January 27-28, 2023, Revised Selected Papers, Part II /
_cedited by Kousik Dasgupta, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXIX, 363 p. 211 illus., 155 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1956
505 0 _aTrack: Theories and Applications to Data Communications -- A novel approach of fragile watermarking for authentication and tamper detection exploiting Local Binary Pattern (LBP). -- A Machine Learning Based Video Summarization Framework for Yoga-Posture Video -- Real-Time Human Fall Detection using a Lightweight Pose Estimation Technique -- Design of a Vehicle Overspeed Management System Using Blockchain-Assisted IoV -- A Study on Algorithms for Detection of Communities in Dynamic Social Networks: A Review -- Spanning Cactus Existence Problem onFlower Snark Graphs -- Analysis of Quantum Cryptology and the RSA Algorithms Defense against Attacks using Shor's Algorithm in a Post Quantum Environment -- Blockchain-enabled IoV Framework for Establishing Automated Communication Using Smart Contract -- Load balancing In a Heterogeneous Cloud Environment with a New Cloudlet Scheduling Strategy -- Protocol For Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality -- Dynamic Priority Based Application Offloading Strategy in Mobile Cloud Computing -- Chaotic Quasi-Oppositional Moth Flame Optimization for solving multi-objective optimal DG emplacement problem in radial distribution network -- Authentication and Access Control by Face Recognition and Intrusion Detection System -- A novel trigonometric mutation-based backtracking search algorithm for solving optimal power flow problem considering renewable energysources -- Qualitative and Quantitative analysis of modifications of Playfair Cipher -- Single Electron Tunnelling based Threshold Logic Unit -- Edge-based Image Steganography -- Track: Theories and Applications to Data Analytics -- Classification of Microstructural Steel Images using an Attention-aided Transfer Learning Network -- Feature Selection approaches in Online Bangla Handwriting Recognition -- Predicting DiseaseAssociated Genes throughInteraction and Ontologybased Inference Technique -- An automatic POS tagger system for code mixed Indian social media text -- Scrutinization of Text, Images and Audio posts on Social Media for identifying Fake Content -- Machine Translation Systems for Official languages of North-eastern India: A Review -- An Introduction to KDB: Knowledge Discovery in Biodiversity -- Segmented-based and segmented-free approachfor COVID-19 detection -- A Study of Word Embedding Models for Machine Translation of North Eastern Languages.
520 _aThis two-volume set constitutes the refereed proceedings of the 5th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2023, held in Kalyani, India, during January 27-28, 2023. The 52 full papers presented in this volume were carefully reviewed and selected from 187 submissions. The papers present recent research on intersection of computational intelligence, communications, and business analytics, fostering international collaboration and the dissemination of cutting-edge research.
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aArtificial intelligence.
_93407
650 0 _aSocial sciences
_xData processing.
_983360
650 1 4 _aData Structures and Information Theory.
_931923
650 2 4 _aComputer Engineering and Networks.
_994422
650 2 4 _aComputer Communication Networks.
_994424
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aComputer Application in Social and Behavioral Sciences.
_931815
700 1 _aDasgupta, Kousik.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_994427
700 1 _aMukhopadhyay, Somnath.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_994429
700 1 _aMandal, Jyotsna K.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_994430
700 1 _aDutta, Paramartha.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_994432
710 2 _aSpringerLink (Online service)
_994434
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031488788
776 0 8 _iPrinted edition:
_z9783031488801
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1956
_994435
856 4 0 _uhttps://doi.org/10.1007/978-3-031-48879-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c87058
_d87058