Skip to main content

Page of 2 next disabled
and
  1. No Access

    Chapter and Conference Paper

    Study of Information Diffusion and Content Popularity in Memes

    The tremendous use of internet, mobile platforms, online commerce sites, social media services, human behavior is very easily recorded in digital world. From these information various facts can be observed, li...

    Bani Maji, Indra Bhattacharya, Kaustav Nag in Computational Intelligence, Communications… (2019)

  2. No Access

    Chapter and Conference Paper

    Load Balancing Strategy in Cloud Computing Using Simulated Annealing

    Cloud computing is an idea of diminution-based distributional model which depends on appropriate protocol over the internet. To meet the end user requirement here the resources like CPU, bandwidth and memory a...

    Gopa Mandal, Santanu Dam, Kousik Dasgupta in Computational Intelligence, Communications… (2019)

  3. No Access

    Chapter

    Understanding Email Interactivity and Predicting User Response to Email

    Email is important for task and project management, information exchange, scheduling, and also for social communication among users. Understanding the pattern of interaction in between the email and the recipi...

    Soumyadeep Roy, Nibir Pal, Kousik Dasgupta in Methodologies and Application Issues of Co… (2018)

  4. No Access

    Chapter

    Offline Extraction of Indic Regional Language from Natural Scene Image Using Text Segmentation and Deep Convolutional Sequence

    Regional language extraction from a natural scene image is always a challenging proposition due to its dependence on the text information extracted from Image. Text Extraction on the other hand varies on diffe...

    Sauradip Nag, Pallab Kumar Ganguly in Methodologies and Application Issues of Co… (2018)

  5. No Access

    Chapter and Conference Paper

    An Ant Colony Based Load Balancing Strategy in Cloud Computing

    Cloud computing thrives a new supplement of consumption and delivery model for internet based services and protocol. It provides large scale computing infrastructure defined on usage and also provides infrastr...

    Santanu Dam, Gopa Mandal, Kousik Dasgupta in Advanced Computing, Networking and Informa… (2014)

  6. No Access

    Chapter and Conference Paper

    A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO)

    The two key issues related to steganography techniques are, statistical undetectability and picture quality. Image steganography takes the advantage of limited power of Human Visual System (HVS). The proposed ...

    Debiprasad Bandyopadhyay, Kousik Dasgupta in Proceedings of the Fifth International Con… (2014)

  7. No Access

    Chapter and Conference Paper

    A Novel Visual Cryptographic Technique through Grey Level Inversion (VCTGLI)

    In this paper a new (2, 2) visual cryptographic technique has been proposed, where the aspect ratio and the dimension of the secrete image/share with respect to source image remains constant during the process...

    Jayanta Kumar Pal, J. K. Mandal in Recent Trends in Networks and Communicatio… (2010)

Page of 2 next disabled