top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Emerging Research in Computing, Information, Communication and Applications [[electronic resource] ] : ERCICA 2015, Volume 2 / / edited by N. R. Shetty, N.H. Prasad, N. Nalini
Emerging Research in Computing, Information, Communication and Applications [[electronic resource] ] : ERCICA 2015, Volume 2 / / edited by N. R. Shetty, N.H. Prasad, N. Nalini
Edizione [1st ed. 2016.]
Pubbl/distr/stampa New Delhi : , : Springer India : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (599 p.)
Disciplina 620
Soggetto topico Electrical engineering
Application software
Optical data processing
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 81-322-2553-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface; Organizing Committee; Chief Patrons; Conference Chair; Program Chairs; Publication Chair; Editorial Board; Advisory Chairs; Advisory Committee; Program Committee; Organizing Committee; About the Conference; Acknowledgments; Contents; 1 Analysis and Visualization of Professional's LinkedIn Data; Abstract; 1 Introduction; 2 Clustering Techniques; 2.1 Greedy Clustering; 2.2 Hierarchical Clustering; 2.3 k-Means Clustering; 3 Dataset and Its Features; 3.1 Source; 3.2 Data Normalization; 4 Methodology; 5 Results and Discussion; 6 Conclusion; References
2 Optimizing Websites for Online CustomersAbstract; 1 Introduction; 2 Website Optimization; 3 The MCWSO Problem; 4 MCWSO Using Vega; 4.1 VEGA; 4.2 MCWSOVEGA; 5 An Example; 6 Experimental Results; 7 Conclusion; References; 3 Prevention Guidelines of SQL Injection Database Attacks: An Experimental Analysis; Abstract; 1 Introduction; 2 SQLI Types; 2.1 Bypass Authentication; 2.2 Data Base Finger Printing; 2.2.1 Using DBMS Error Messages; 2.2.2 Using String Concatenation; 2.2.3 Using SQL Dialects; 2.3 SQL Injection with Union Query; 3 Experimental Analysis; 3.1 Bypass Authentication
3.2 Data Base Finger Printing3.2.1 Using DBMS Error Messages; 3.2.2 Using String Concatenation; 3.2.3 Using SQL Dialects; 3.3 Using Union Query; 4 Conclusion; References; 4 Automated Data Analytics in Measuring Brand Sentiment Using Ml Technique from Online Conversations---Twitter; Abstract; 1 Introduction; 2 Discussions; 3 Methodology; 3.1 Feature Extraction to Create Feature Subset; 3.1.1 Labeling [12]; 3.2 Classification; 3.2.1 Naïve Bayes Algorithm; 4 Analysis of Tweets Using Naïve Bayes Algorithm; 5 Conclusion; References
5 Design of Five Port Structure and Evaluation of Its Performance at 5.8 Ghz for SDR ApplicationAbstract; 1 Introduction; 2 Port Structures in Software Defined Radio; 3 Design Philosophy of Five Port Structure; 3.1 Power Divider; 3.2 Wilkinson Power Divider; 3.3 Hybrid Coupler; 3.4 Phase Shifter; 4 Results and Discussion; 5 Conclusion; References; 6 Optimization of Code Blocking in W-CDMA Based on Modified Solid State Genetic Algorithm (MSSGA); Abstract; 1 Introduction; 2 Related Works; 3 MSSGA Based Dynamic OVSF Code Allocation; 4 Performance Evaluation; 4.1 Blocking Probability
4.2 Spectral Efficiency4.3 Delay of Optimization; 5 Conclusion and Future Work; References; 7 Augmented Reality Simulation to Visualize Global Warming and Its Consequences; Abstract; 1 Introduction; 1.1 Augmented Reality Toolkit; 2 Related Work; 3 Solution Approach; 4 Performance Analysis; 5 Conclusion; Acknowledgments; References; 8 Design and Modeling of Microfluidic Channel in a Dielectric Planar Waveguide Using Cosmol Multiphysics; Abstract; 1 Introduction; 2 Waveguide Modal Analysis; 2.1 Laminar Flow; 3 Design of Planar Waveguide; 3.1 Finite Element Method; 4 Results and Discussion
5 Conclusion
Record Nr. UNINA-9910254179003321
New Delhi : , : Springer India : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging Research in Computing, Information, Communication and Applications [[electronic resource] ] : ERCICA 2015, Volume 1 / / edited by N. R. Shetty, N.H. Prasad, N. Nalini
Emerging Research in Computing, Information, Communication and Applications [[electronic resource] ] : ERCICA 2015, Volume 1 / / edited by N. R. Shetty, N.H. Prasad, N. Nalini
Edizione [1st ed. 2015.]
Pubbl/distr/stampa New Delhi : , : Springer India : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (569 p.)
Disciplina 004
Soggetto topico Electrical engineering
Application software
Optical data processing
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 81-322-2550-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Preface""; ""Organizing Committee""; ""About the Conference""; ""Acknowledgments""; ""Contents""; ""1 Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion""; ""Abstract""; ""1 Introduction""; ""2 Problem Statement""; ""3 Underlying Algorithm""; ""3.1 Input""; ""3.2 Space Encryption""; ""3.3 Content of the Encrypted Text File""; ""3.4 Ciphered Key""; ""3.5 Decryption of Ciphered Key""; ""3.6 Content of Text File After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References""
""2 Doubly Inserted Sort: A Partially Insertion Based Dual Scanned Sorting Algorithm""""Abstract""; ""1 Introduction""; ""2 Problem Under Consideration""; ""3 Flow of Algorithm""; ""4 Step by Step Solution of the Newly Proposed Algorithm Based on C Code""; ""5 Time Complexity""; ""5.1 Best Case""; ""5.2 Average Case""; ""5.3 Worst Case""; ""6 A Brief Comparison Study Among the Conventional Iterative and Recursive Algorithms with the Doubly Inserted Sort""; ""7 Conclusion""; ""References""; ""3 A Rotation Based Encryption Technique Using Symmetric Key Method""; ""Abstract""; ""1 Introduction""
""2 Problem Definition""""3 Underlying Process""; ""3.1 Input""; ""3.2 Message After Encryption""; ""3.3 Message After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References""; ""4 An Identification of Abnormalities in Dental with Support Vector Machine Using Image Processing""; ""Abstract""; ""1 Introduction""; ""2 Related Work""; ""3 Our New Approach""; ""4 A Framework Model for Defect Analysis""; ""4.1 Preprocessing""; ""4.2 Image Segmentation""; ""4.3 Feature Extraction""; ""5 Conclusion""; ""References""
""5 Noval Asynchronous Addition Architectures for Portable Applications""""Abstract""; ""1 Introduction""; ""2 The 2:1 Multiplexer Adder""; ""3 Adder for Reducing Sum Validation Time""; ""4 Introduction of OECS""; ""5 Simulation and Analysis""; ""6 Conclusion""; ""References""; ""6 Reliability Analysis of Exponential Models Based on Skewness and Kurtosis""; ""Abstract""; ""1 Introduction""; ""2 MLE and MVUE of R(T)""; ""3 Skewness and Kurtosis of Reliability Functions""; ""4 Conclusion""; ""References""; ""7 Missing Value Imputation with Unsupervised Kohonen Self Organizing Map""
""Abstract""""1 Introduction""; ""2 Related Work""; ""3 Proposed Approach""; ""4 Experimental Results""; ""5 Neural Network Training for Milk Products""; ""6 Conclusion""; ""References""; ""8 An Improved Single Sign-On Mechanism by Enhancing the Functionality of Reverse Proxy""; ""Abstract""; ""1 Introduction""; ""1.1 Summary of the Design""; ""2 Related Work""; ""2.1 Need for This Design""; ""3 Implementing the SSO Design""; ""3.1 Ajax Routine Implementation""; ""3.2 Reverse Proxy Implementation""; ""3.3 Profiling Service and Backend Server""; ""4 Results""; ""4.1 Security Aspects""
""4.2 Design Evaluation""
Record Nr. UNINA-9910299824903321
New Delhi : , : Springer India : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui