06032nam 22006855 450 991029982490332120200703114419.081-322-2550-310.1007/978-81-322-2550-8(CKB)3710000000452240(EBL)3567807(SSID)ssj0001534676(PQKBManifestationID)11819166(PQKBTitleCode)TC0001534676(PQKBWorkID)11494614(PQKB)11104497(DE-He213)978-81-322-2550-8(MiAaPQ)EBC3567807(PPN)187685711(EXLCZ)99371000000045224020150717d2015 u| 0engur|n|---|||||txtccrEmerging Research in Computing, Information, Communication and Applications[electronic resource] ERCICA 2015, Volume 1 /edited by N. R. Shetty, N.H. Prasad, N. Nalini1st ed. 2015.New Delhi :Springer India :Imprint: Springer,2015.1 online resource (569 p.)Description based upon print version of record.81-322-2549-X Includes bibliographical references at the end of each chapters and index.""Preface""; ""Organizing Committee""; ""About the Conference""; ""Acknowledgments""; ""Contents""; ""1 Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion""; ""Abstract""; ""1 Introduction""; ""2 Problem Statement""; ""3 Underlying Algorithm""; ""3.1 Input""; ""3.2 Space Encryption""; ""3.3 Content of the Encrypted Text File""; ""3.4 Ciphered Key""; ""3.5 Decryption of Ciphered Key""; ""3.6 Content of Text File After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References""""2 Doubly Inserted Sort: A Partially Insertion Based Dual Scanned Sorting Algorithm""""Abstract""; ""1 Introduction""; ""2 Problem Under Consideration""; ""3 Flow of Algorithm""; ""4 Step by Step Solution of the Newly Proposed Algorithm Based on C Code""; ""5 Time Complexity""; ""5.1 Best Case""; ""5.2 Average Case""; ""5.3 Worst Case""; ""6 A Brief Comparison Study Among the Conventional Iterative and Recursive Algorithms with the Doubly Inserted Sort""; ""7 Conclusion""; ""References""; ""3 A Rotation Based Encryption Technique Using Symmetric Key Method""; ""Abstract""; ""1 Introduction""""2 Problem Definition""""3 Underlying Process""; ""3.1 Input""; ""3.2 Message After Encryption""; ""3.3 Message After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References""; ""4 An Identification of Abnormalities in Dental with Support Vector Machine Using Image Processing""; ""Abstract""; ""1 Introduction""; ""2 Related Work""; ""3 Our New Approach""; ""4 A Framework Model for Defect Analysis""; ""4.1 Preprocessing""; ""4.2 Image Segmentation""; ""4.3 Feature Extraction""; ""5 Conclusion""; ""References""""5 Noval Asynchronous Addition Architectures for Portable Applications""""Abstract""; ""1 Introduction""; ""2 The 2:1 Multiplexer Adder""; ""3 Adder for Reducing Sum Validation Time""; ""4 Introduction of OECS""; ""5 Simulation and Analysis""; ""6 Conclusion""; ""References""; ""6 Reliability Analysis of Exponential Models Based on Skewness and Kurtosis""; ""Abstract""; ""1 Introduction""; ""2 MLE and MVUE of R(T)""; ""3 Skewness and Kurtosis of Reliability Functions""; ""4 Conclusion""; ""References""; ""7 Missing Value Imputation with Unsupervised Kohonen Self Organizing Map""""Abstract""""1 Introduction""; ""2 Related Work""; ""3 Proposed Approach""; ""4 Experimental Results""; ""5 Neural Network Training for Milk Products""; ""6 Conclusion""; ""References""; ""8 An Improved Single Sign-On Mechanism by Enhancing the Functionality of Reverse Proxy""; ""Abstract""; ""1 Introduction""; ""1.1 Summary of the Design""; ""2 Related Work""; ""2.1 Need for This Design""; ""3 Implementing the SSO Design""; ""3.1 Ajax Routine Implementation""; ""3.2 Reverse Proxy Implementation""; ""3.3 Profiling Service and Backend Server""; ""4 Results""; ""4.1 Security Aspects""""4.2 Design Evaluation""This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of  Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers.Electrical engineeringApplication softwareOptical data processingCommunications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Computer Imaging, Vision, Pattern Recognition and Graphicshttps://scigraph.springernature.com/ontologies/product-market-codes/I22005Electrical engineering.Application software.Optical data processing.Communications Engineering, Networks.Information Systems Applications (incl. Internet).Computer Imaging, Vision, Pattern Recognition and Graphics.004Shetty N. Redthttp://id.loc.gov/vocabulary/relators/edtPrasad N.Hedthttp://id.loc.gov/vocabulary/relators/edtNalini Nedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910299824903321Emerging Research in Computing, Information, Communication and Applications1407619UNINA