Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Load Balancing in a Heterogeneous Cloud Environment with a New Cloudlet Scheduling Strategy

    The idea of cloud computing has completely changed the digital world in the age of the internet. Cloud computing offers a variety of cloud services, including software (Software as a Service), platforms (Platf...

    Gopa Mandal, Santanu Dam, Kousik Dasgupta in Computational Intelligence in Communicatio… (2024)

  2. No Access

    Chapter and Conference Paper

    Blockchain-Enabled IoV Framework for Establishing Automated Communication Using Smart Contract

    A global network known as the Internet of Things (IoT) connects all sentient objects and allows inter-object communication. Internet of Vehicles (IoV) refers to the IoT-on-Wheels, wherein moving objects exchan...

    Rakhi Chakraborty, Kousik Dasgupta in Computational Intelligence in Communicatio… (2024)

  3. No Access

    Book and Conference Proceedings

    Computational Intelligence in Communications and Business Analytics

    5th International Conference, CICBA 2023, Kalyani, India, January 27–28, 2023, Revised Selected Papers, Part I

    Kousik Dasgupta, Somnath Mukhopadhyay in Communications in Computer and Information Science (2024)

  4. No Access

    Book and Conference Proceedings

    Computational Intelligence in Communications and Business Analytics

    5th International Conference, CICBA 2023, Kalyani, India, January 27–28, 2023, Revised Selected Papers, Part II

    Kousik Dasgupta, Somnath Mukhopadhyay in Communications in Computer and Information Science (2024)

  5. No Access

    Chapter and Conference Paper

    Classification of Cricket Shots from Cricket Videos Using Self-attention Infused CNN-RNN (SAICNN-RNN)

    Millions of people play and enjoy the game of cricket, however, classifying the diverse batting style and postures used frequently by the batsman during a cricket match has always been a difficult proposition....

    Arka Dutta, Abhishek Baral, Sayan Kundu in Computational Intelligence in Communicatio… (2024)

  6. No Access

    Article

    Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm

    Steganography is one of the leading strategy that is employed to hide restricted content into a cover media so that the person unaware of the fact can’t predict that the cover media can acquire some secret inf...

    Ratan Kumar Basak, Ritam Chatterjee, Paramartha Dutta in Wireless Personal Communications (2022)

  7. No Access

    Chapter and Conference Paper

    A Novel Equilibrium Optimization Technique for Band Selection of Hyperspectral Images

    Band selection of hyperspectral images is a rising research area. Because of the shortage of the labeled information set of hyperspectral imagery, it is additionally challenging task. Band selection problem ca...

    Aditi Roy Chowdhury, Joydev Hazra in Computational Intelligence in Communicatio… (2021)

  8. No Access

    Chapter and Conference Paper

    Load Balancing Strategy in Cloud Computing Using Simulated Annealing

    Cloud computing is an idea of diminution-based distributional model which depends on appropriate protocol over the internet. To meet the end user requirement here the resources like CPU, bandwidth and memory a...

    Gopa Mandal, Santanu Dam, Kousik Dasgupta in Computational Intelligence, Communications… (2019)

  9. No Access

    Chapter and Conference Paper

    A Novel Visual Cryptographic Technique through Grey Level Inversion (VCTGLI)

    In this paper a new (2, 2) visual cryptographic technique has been proposed, where the aspect ratio and the dimension of the secrete image/share with respect to source image remains constant during the process...

    Jayanta Kumar Pal, J. K. Mandal in Recent Trends in Networks and Communicatio… (2010)