![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Study of Information Diffusion and Content Popularity in Memes
The tremendous use of internet, mobile platforms, online commerce sites, social media services, human behavior is very easily recorded in digital world. From these information various facts can be observed, li...
-
Chapter and Conference Paper
Load Balancing Strategy in Cloud Computing Using Simulated Annealing
Cloud computing is an idea of diminution-based distributional model which depends on appropriate protocol over the internet. To meet the end user requirement here the resources like CPU, bandwidth and memory a...
-
Chapter
Understanding Email Interactivity and Predicting User Response to Email
Email is important for task and project management, information exchange, scheduling, and also for social communication among users. Understanding the pattern of interaction in between the email and the recipi...
-
Chapter
Offline Extraction of Indic Regional Language from Natural Scene Image Using Text Segmentation and Deep Convolutional Sequence
Regional language extraction from a natural scene image is always a challenging proposition due to its dependence on the text information extracted from Image. Text Extraction on the other hand varies on diffe...
-
Chapter and Conference Paper
An Ant Colony Based Load Balancing Strategy in Cloud Computing
Cloud computing thrives a new supplement of consumption and delivery model for internet based services and protocol. It provides large scale computing infrastructure defined on usage and also provides infrastr...
-
Chapter and Conference Paper
A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO)
The two key issues related to steganography techniques are, statistical undetectability and picture quality. Image steganography takes the advantage of limited power of Human Visual System (HVS). The proposed ...
-
Chapter and Conference Paper
A Novel Visual Cryptographic Technique through Grey Level Inversion (VCTGLI)
In this paper a new (2, 2) visual cryptographic technique has been proposed, where the aspect ratio and the dimension of the secrete image/share with respect to source image remains constant during the process...