Emerging Research in Computing, Information, Communication and Applications [[electronic resource] ] : ERCICA 2015, Volume 2 / / edited by N. R. Shetty, N.H. Prasad, N. Nalini |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | New Delhi : , : Springer India : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (599 p.) |
Disciplina | 620 |
Soggetto topico |
Electrical engineering
Application software Optical data processing Communications Engineering, Networks Information Systems Applications (incl. Internet) Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 81-322-2553-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Preface; Organizing Committee; Chief Patrons; Conference Chair; Program Chairs; Publication Chair; Editorial Board; Advisory Chairs; Advisory Committee; Program Committee; Organizing Committee; About the Conference; Acknowledgments; Contents; 1 Analysis and Visualization of Professional's LinkedIn Data; Abstract; 1 Introduction; 2 Clustering Techniques; 2.1 Greedy Clustering; 2.2 Hierarchical Clustering; 2.3 k-Means Clustering; 3 Dataset and Its Features; 3.1 Source; 3.2 Data Normalization; 4 Methodology; 5 Results and Discussion; 6 Conclusion; References
2 Optimizing Websites for Online CustomersAbstract; 1 Introduction; 2 Website Optimization; 3 The MCWSO Problem; 4 MCWSO Using Vega; 4.1 VEGA; 4.2 MCWSOVEGA; 5 An Example; 6 Experimental Results; 7 Conclusion; References; 3 Prevention Guidelines of SQL Injection Database Attacks: An Experimental Analysis; Abstract; 1 Introduction; 2 SQLI Types; 2.1 Bypass Authentication; 2.2 Data Base Finger Printing; 2.2.1 Using DBMS Error Messages; 2.2.2 Using String Concatenation; 2.2.3 Using SQL Dialects; 2.3 SQL Injection with Union Query; 3 Experimental Analysis; 3.1 Bypass Authentication 3.2 Data Base Finger Printing3.2.1 Using DBMS Error Messages; 3.2.2 Using String Concatenation; 3.2.3 Using SQL Dialects; 3.3 Using Union Query; 4 Conclusion; References; 4 Automated Data Analytics in Measuring Brand Sentiment Using Ml Technique from Online Conversations---Twitter; Abstract; 1 Introduction; 2 Discussions; 3 Methodology; 3.1 Feature Extraction to Create Feature Subset; 3.1.1 Labeling [12]; 3.2 Classification; 3.2.1 Naïve Bayes Algorithm; 4 Analysis of Tweets Using Naïve Bayes Algorithm; 5 Conclusion; References 5 Design of Five Port Structure and Evaluation of Its Performance at 5.8 Ghz for SDR ApplicationAbstract; 1 Introduction; 2 Port Structures in Software Defined Radio; 3 Design Philosophy of Five Port Structure; 3.1 Power Divider; 3.2 Wilkinson Power Divider; 3.3 Hybrid Coupler; 3.4 Phase Shifter; 4 Results and Discussion; 5 Conclusion; References; 6 Optimization of Code Blocking in W-CDMA Based on Modified Solid State Genetic Algorithm (MSSGA); Abstract; 1 Introduction; 2 Related Works; 3 MSSGA Based Dynamic OVSF Code Allocation; 4 Performance Evaluation; 4.1 Blocking Probability 4.2 Spectral Efficiency4.3 Delay of Optimization; 5 Conclusion and Future Work; References; 7 Augmented Reality Simulation to Visualize Global Warming and Its Consequences; Abstract; 1 Introduction; 1.1 Augmented Reality Toolkit; 2 Related Work; 3 Solution Approach; 4 Performance Analysis; 5 Conclusion; Acknowledgments; References; 8 Design and Modeling of Microfluidic Channel in a Dielectric Planar Waveguide Using Cosmol Multiphysics; Abstract; 1 Introduction; 2 Waveguide Modal Analysis; 2.1 Laminar Flow; 3 Design of Planar Waveguide; 3.1 Finite Element Method; 4 Results and Discussion 5 Conclusion |
Record Nr. | UNINA-9910254179003321 |
New Delhi : , : Springer India : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Emerging Research in Computing, Information, Communication and Applications [[electronic resource] ] : ERCICA 2015, Volume 1 / / edited by N. R. Shetty, N.H. Prasad, N. Nalini |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | New Delhi : , : Springer India : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (569 p.) |
Disciplina | 004 |
Soggetto topico |
Electrical engineering
Application software Optical data processing Communications Engineering, Networks Information Systems Applications (incl. Internet) Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 81-322-2550-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Preface""; ""Organizing Committee""; ""About the Conference""; ""Acknowledgments""; ""Contents""; ""1 Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion""; ""Abstract""; ""1 Introduction""; ""2 Problem Statement""; ""3 Underlying Algorithm""; ""3.1 Input""; ""3.2 Space Encryption""; ""3.3 Content of the Encrypted Text File""; ""3.4 Ciphered Key""; ""3.5 Decryption of Ciphered Key""; ""3.6 Content of Text File After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References""
""2 Doubly Inserted Sort: A Partially Insertion Based Dual Scanned Sorting Algorithm""""Abstract""; ""1 Introduction""; ""2 Problem Under Consideration""; ""3 Flow of Algorithm""; ""4 Step by Step Solution of the Newly Proposed Algorithm Based on C Code""; ""5 Time Complexity""; ""5.1 Best Case""; ""5.2 Average Case""; ""5.3 Worst Case""; ""6 A Brief Comparison Study Among the Conventional Iterative and Recursive Algorithms with the Doubly Inserted Sort""; ""7 Conclusion""; ""References""; ""3 A Rotation Based Encryption Technique Using Symmetric Key Method""; ""Abstract""; ""1 Introduction"" ""2 Problem Definition""""3 Underlying Process""; ""3.1 Input""; ""3.2 Message After Encryption""; ""3.3 Message After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References""; ""4 An Identification of Abnormalities in Dental with Support Vector Machine Using Image Processing""; ""Abstract""; ""1 Introduction""; ""2 Related Work""; ""3 Our New Approach""; ""4 A Framework Model for Defect Analysis""; ""4.1 Preprocessing""; ""4.2 Image Segmentation""; ""4.3 Feature Extraction""; ""5 Conclusion""; ""References"" ""5 Noval Asynchronous Addition Architectures for Portable Applications""""Abstract""; ""1 Introduction""; ""2 The 2:1 Multiplexer Adder""; ""3 Adder for Reducing Sum Validation Time""; ""4 Introduction of OECS""; ""5 Simulation and Analysis""; ""6 Conclusion""; ""References""; ""6 Reliability Analysis of Exponential Models Based on Skewness and Kurtosis""; ""Abstract""; ""1 Introduction""; ""2 MLE and MVUE of R(T)""; ""3 Skewness and Kurtosis of Reliability Functions""; ""4 Conclusion""; ""References""; ""7 Missing Value Imputation with Unsupervised Kohonen Self Organizing Map"" ""Abstract""""1 Introduction""; ""2 Related Work""; ""3 Proposed Approach""; ""4 Experimental Results""; ""5 Neural Network Training for Milk Products""; ""6 Conclusion""; ""References""; ""8 An Improved Single Sign-On Mechanism by Enhancing the Functionality of Reverse Proxy""; ""Abstract""; ""1 Introduction""; ""1.1 Summary of the Design""; ""2 Related Work""; ""2.1 Need for This Design""; ""3 Implementing the SSO Design""; ""3.1 Ajax Routine Implementation""; ""3.2 Reverse Proxy Implementation""; ""3.3 Profiling Service and Backend Server""; ""4 Results""; ""4.1 Security Aspects"" ""4.2 Design Evaluation"" |
Record Nr. | UNINA-9910299824903321 |
New Delhi : , : Springer India : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|