Computational Intelligence in Communications and Business Analytics
5th International Conference, CICBA 2023, Kalyani, India, January 27–28, 2023, Revised Selected Papers, Part I
Chapter and Conference Paper
The idea of cloud computing has completely changed the digital world in the age of the internet. Cloud computing offers a variety of cloud services, including software (Software as a Service), platforms (Platf...
Chapter and Conference Paper
A global network known as the Internet of Things (IoT) connects all sentient objects and allows inter-object communication. Internet of Vehicles (IoV) refers to the IoT-on-Wheels, wherein moving objects exchan...
Book and Conference Proceedings
5th International Conference, CICBA 2023, Kalyani, India, January 27–28, 2023, Revised Selected Papers, Part I
Book and Conference Proceedings
5th International Conference, CICBA 2023, Kalyani, India, January 27–28, 2023, Revised Selected Papers, Part II
Chapter and Conference Paper
Millions of people play and enjoy the game of cricket, however, classifying the diverse batting style and postures used frequently by the batsman during a cricket match has always been a difficult proposition....
Article
Steganography is one of the leading strategy that is employed to hide restricted content into a cover media so that the person unaware of the fact can’t predict that the cover media can acquire some secret inf...
Chapter and Conference Paper
Band selection of hyperspectral images is a rising research area. Because of the shortage of the labeled information set of hyperspectral imagery, it is additionally challenging task. Band selection problem ca...
Chapter and Conference Paper
Cloud computing is an idea of diminution-based distributional model which depends on appropriate protocol over the internet. To meet the end user requirement here the resources like CPU, bandwidth and memory a...
Chapter and Conference Paper
In this paper a new (2, 2) visual cryptographic technique has been proposed, where the aspect ratio and the dimension of the secrete image/share with respect to source image remains constant during the process...