Vai al contenuto principale della pagina
Titolo: | Emerging Research in Computing, Information, Communication and Applications [[electronic resource] ] : ERCICA 2015, Volume 2 / / edited by N. R. Shetty, N.H. Prasad, N. Nalini |
Pubblicazione: | New Delhi : , : Springer India : , : Imprint : Springer, , 2016 |
Edizione: | 1st ed. 2016. |
Descrizione fisica: | 1 online resource (599 p.) |
Disciplina: | 620 |
Soggetto topico: | Electrical engineering |
Application software | |
Optical data processing | |
Communications Engineering, Networks | |
Information Systems Applications (incl. Internet) | |
Computer Imaging, Vision, Pattern Recognition and Graphics | |
Persona (resp. second.): | ShettyN. R |
PrasadN.H | |
NaliniN | |
Note generali: | Description based upon print version of record. |
Nota di bibliografia: | Includes bibliographical references at the end of each chapters and index. |
Nota di contenuto: | Preface; Organizing Committee; Chief Patrons; Conference Chair; Program Chairs; Publication Chair; Editorial Board; Advisory Chairs; Advisory Committee; Program Committee; Organizing Committee; About the Conference; Acknowledgments; Contents; 1 Analysis and Visualization of Professional's LinkedIn Data; Abstract; 1 Introduction; 2 Clustering Techniques; 2.1 Greedy Clustering; 2.2 Hierarchical Clustering; 2.3 k-Means Clustering; 3 Dataset and Its Features; 3.1 Source; 3.2 Data Normalization; 4 Methodology; 5 Results and Discussion; 6 Conclusion; References |
2 Optimizing Websites for Online CustomersAbstract; 1 Introduction; 2 Website Optimization; 3 The MCWSO Problem; 4 MCWSO Using Vega; 4.1 VEGA; 4.2 MCWSOVEGA; 5 An Example; 6 Experimental Results; 7 Conclusion; References; 3 Prevention Guidelines of SQL Injection Database Attacks: An Experimental Analysis; Abstract; 1 Introduction; 2 SQLI Types; 2.1 Bypass Authentication; 2.2 Data Base Finger Printing; 2.2.1 Using DBMS Error Messages; 2.2.2 Using String Concatenation; 2.2.3 Using SQL Dialects; 2.3 SQL Injection with Union Query; 3 Experimental Analysis; 3.1 Bypass Authentication | |
3.2 Data Base Finger Printing3.2.1 Using DBMS Error Messages; 3.2.2 Using String Concatenation; 3.2.3 Using SQL Dialects; 3.3 Using Union Query; 4 Conclusion; References; 4 Automated Data Analytics in Measuring Brand Sentiment Using Ml Technique from Online Conversations---Twitter; Abstract; 1 Introduction; 2 Discussions; 3 Methodology; 3.1 Feature Extraction to Create Feature Subset; 3.1.1 Labeling [12]; 3.2 Classification; 3.2.1 Naïve Bayes Algorithm; 4 Analysis of Tweets Using Naïve Bayes Algorithm; 5 Conclusion; References | |
5 Design of Five Port Structure and Evaluation of Its Performance at 5.8 Ghz for SDR ApplicationAbstract; 1 Introduction; 2 Port Structures in Software Defined Radio; 3 Design Philosophy of Five Port Structure; 3.1 Power Divider; 3.2 Wilkinson Power Divider; 3.3 Hybrid Coupler; 3.4 Phase Shifter; 4 Results and Discussion; 5 Conclusion; References; 6 Optimization of Code Blocking in W-CDMA Based on Modified Solid State Genetic Algorithm (MSSGA); Abstract; 1 Introduction; 2 Related Works; 3 MSSGA Based Dynamic OVSF Code Allocation; 4 Performance Evaluation; 4.1 Blocking Probability | |
4.2 Spectral Efficiency4.3 Delay of Optimization; 5 Conclusion and Future Work; References; 7 Augmented Reality Simulation to Visualize Global Warming and Its Consequences; Abstract; 1 Introduction; 1.1 Augmented Reality Toolkit; 2 Related Work; 3 Solution Approach; 4 Performance Analysis; 5 Conclusion; Acknowledgments; References; 8 Design and Modeling of Microfluidic Channel in a Dielectric Planar Waveguide Using Cosmol Multiphysics; Abstract; 1 Introduction; 2 Waveguide Modal Analysis; 2.1 Laminar Flow; 3 Design of Planar Waveguide; 3.1 Finite Element Method; 4 Results and Discussion | |
5 Conclusion | |
Sommario/riassunto: | This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers. |
Titolo autorizzato: | Emerging Research in Computing, Information, Communication and Applications |
ISBN: | 81-322-2553-8 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910254179003321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |