LEADER 06032nam 22006855 450 001 9910299824903321 005 20200703114419.0 010 $a81-322-2550-3 024 7 $a10.1007/978-81-322-2550-8 035 $a(CKB)3710000000452240 035 $a(EBL)3567807 035 $a(SSID)ssj0001534676 035 $a(PQKBManifestationID)11819166 035 $a(PQKBTitleCode)TC0001534676 035 $a(PQKBWorkID)11494614 035 $a(PQKB)11104497 035 $a(DE-He213)978-81-322-2550-8 035 $a(MiAaPQ)EBC3567807 035 $a(PPN)187685711 035 $a(EXLCZ)993710000000452240 100 $a20150717d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aEmerging Research in Computing, Information, Communication and Applications$b[electronic resource] $eERCICA 2015, Volume 1 /$fedited by N. R. Shetty, N.H. Prasad, N. Nalini 205 $a1st ed. 2015. 210 1$aNew Delhi :$cSpringer India :$cImprint: Springer,$d2015. 215 $a1 online resource (569 p.) 300 $aDescription based upon print version of record. 311 $a81-322-2549-X 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $a""Preface""; ""Organizing Committee""; ""About the Conference""; ""Acknowledgments""; ""Contents""; ""1 Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion""; ""Abstract""; ""1 Introduction""; ""2 Problem Statement""; ""3 Underlying Algorithm""; ""3.1 Input""; ""3.2 Space Encryption""; ""3.3 Content of the Encrypted Text File""; ""3.4 Ciphered Key""; ""3.5 Decryption of Ciphered Key""; ""3.6 Content of Text File After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References"" 327 $a""2 Doubly Inserted Sort: A Partially Insertion Based Dual Scanned Sorting Algorithm""""Abstract""; ""1 Introduction""; ""2 Problem Under Consideration""; ""3 Flow of Algorithm""; ""4 Step by Step Solution of the Newly Proposed Algorithm Based on C Code""; ""5 Time Complexity""; ""5.1 Best Case""; ""5.2 Average Case""; ""5.3 Worst Case""; ""6 A Brief Comparison Study Among the Conventional Iterative and Recursive Algorithms with the Doubly Inserted Sort""; ""7 Conclusion""; ""References""; ""3 A Rotation Based Encryption Technique Using Symmetric Key Method""; ""Abstract""; ""1 Introduction"" 327 $a""2 Problem Definition""""3 Underlying Process""; ""3.1 Input""; ""3.2 Message After Encryption""; ""3.3 Message After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References""; ""4 An Identification of Abnormalities in Dental with Support Vector Machine Using Image Processing""; ""Abstract""; ""1 Introduction""; ""2 Related Work""; ""3 Our New Approach""; ""4 A Framework Model for Defect Analysis""; ""4.1 Preprocessing""; ""4.2 Image Segmentation""; ""4.3 Feature Extraction""; ""5 Conclusion""; ""References"" 327 $a""5 Noval Asynchronous Addition Architectures for Portable Applications""""Abstract""; ""1 Introduction""; ""2 The 2:1 Multiplexer Adder""; ""3 Adder for Reducing Sum Validation Time""; ""4 Introduction of OECS""; ""5 Simulation and Analysis""; ""6 Conclusion""; ""References""; ""6 Reliability Analysis of Exponential Models Based on Skewness and Kurtosis""; ""Abstract""; ""1 Introduction""; ""2 MLE and MVUE of R(T)""; ""3 Skewness and Kurtosis of Reliability Functions""; ""4 Conclusion""; ""References""; ""7 Missing Value Imputation with Unsupervised Kohonen Self Organizing Map"" 327 $a""Abstract""""1 Introduction""; ""2 Related Work""; ""3 Proposed Approach""; ""4 Experimental Results""; ""5 Neural Network Training for Milk Products""; ""6 Conclusion""; ""References""; ""8 An Improved Single Sign-On Mechanism by Enhancing the Functionality of Reverse Proxy""; ""Abstract""; ""1 Introduction""; ""1.1 Summary of the Design""; ""2 Related Work""; ""2.1 Need for This Design""; ""3 Implementing the SSO Design""; ""3.1 Ajax Routine Implementation""; ""3.2 Reverse Proxy Implementation""; ""3.3 Profiling Service and Backend Server""; ""4 Results""; ""4.1 Security Aspects"" 327 $a""4.2 Design Evaluation"" 330 $aThis proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of  Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers. 606 $aElectrical engineering 606 $aApplication software 606 $aOptical data processing 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22005 615 0$aElectrical engineering. 615 0$aApplication software. 615 0$aOptical data processing. 615 14$aCommunications Engineering, Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a004 702 $aShetty$b N. R$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPrasad$b N.H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNalini$b N$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910299824903321 996 $aEmerging Research in Computing, Information, Communication and Applications$91407619 997 $aUNINA