Emerging Research in Computing, Information, Communication and Applications : ERCICA 2015.: ERCICA 2015. Volume 1 (2015)
- Record Type:
- Book
- Title:
- Emerging Research in Computing, Information, Communication and Applications : ERCICA 2015.: ERCICA 2015. Volume 1 (2015)
- Main Title:
- Emerging Research in Computing, Information, Communication and Applications : ERCICA 2015.
- Other Titles:
- ERCICA 2015
- Further Information:
- Note: N.R. Shetty, N.H. Prasad, N. Nalini, editors.
- Editors:
- (Educator), Shetty, N. R
Prasad, N. H
(Computer scientist), Nalini, N - Other Names:
- International Conference on "Emerging Research in Computing, Information, Communication and Applications", 3rd
- Contents:
- ""Preface""; ""Organizing Committee""; ""About the Conference""; ""Acknowledgments""; ""Contents""; ""1 Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion""; ""Abstract""; ""1 Introduction""; ""2 Problem Statement""; ""3 Underlying Algorithm""; ""3.1 Input""; ""3.2 Space Encryption""; ""3.3 Content of the Encrypted Text File""; ""3.4 Ciphered Key""; ""3.5 Decryption of Ciphered Key""; ""3.6 Content of Text File After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References"" ""2 Doubly Inserted Sort: A Partially Insertion Based Dual Scanned Sorting Algorithm""""Abstract""; ""1 Introduction""; ""2 Problem Under Consideration""; ""3 Flow of Algorithm""; ""4 Step by Step Solution of the Newly Proposed Algorithm Based on C Code""; ""5 Time Complexity""; ""5.1 Best Case""; ""5.2 Average Case""; ""5.3 Worst Case""; ""6 A Brief Comparison Study Among the Conventional Iterative and Recursive Algorithms with the Doubly Inserted Sort""; ""7 Conclusion""; ""References""; ""3 A Rotation Based Encryption Technique Using Symmetric Key Method""; ""Abstract""; ""1 Introduction"" ""2 Problem Definition""""3 Underlying Process""; ""3.1 Input""; ""3.2 Message After Encryption""; ""3.3 Message After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References""; ""4 An Identification of Abnormalities in Dental with Support Vector Machine Using Image Processing""; ""Abstract""; ""1 Introduction""; ""2 Related Work""; ""3 Our New Approach"";""Preface""; ""Organizing Committee""; ""About the Conference""; ""Acknowledgments""; ""Contents""; ""1 Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion""; ""Abstract""; ""1 Introduction""; ""2 Problem Statement""; ""3 Underlying Algorithm""; ""3.1 Input""; ""3.2 Space Encryption""; ""3.3 Content of the Encrypted Text File""; ""3.4 Ciphered Key""; ""3.5 Decryption of Ciphered Key""; ""3.6 Content of Text File After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References"" ""2 Doubly Inserted Sort: A Partially Insertion Based Dual Scanned Sorting Algorithm""""Abstract""; ""1 Introduction""; ""2 Problem Under Consideration""; ""3 Flow of Algorithm""; ""4 Step by Step Solution of the Newly Proposed Algorithm Based on C Code""; ""5 Time Complexity""; ""5.1 Best Case""; ""5.2 Average Case""; ""5.3 Worst Case""; ""6 A Brief Comparison Study Among the Conventional Iterative and Recursive Algorithms with the Doubly Inserted Sort""; ""7 Conclusion""; ""References""; ""3 A Rotation Based Encryption Technique Using Symmetric Key Method""; ""Abstract""; ""1 Introduction"" ""2 Problem Definition""""3 Underlying Process""; ""3.1 Input""; ""3.2 Message After Encryption""; ""3.3 Message After Decryption""; ""4 Results and Discussion""; ""5 Conclusion""; ""References""; ""4 An Identification of Abnormalities in Dental with Support Vector Machine Using Image Processing""; ""Abstract""; ""1 Introduction""; ""2 Related Work""; ""3 Our New Approach""; ""4 A Framework Model for Defect Analysis""; ""4.1 Preprocessing""; ""4.2 Image Segmentation""; ""4.3 Feature Extraction""; ""5 Conclusion""; ""References"" ""5 Noval Asynchronous Addition Architectures for Portable Applications""""Abstract""; ""1 Introduction""; ""2 The 2:1 Multiplexer Adder""; ""3 Adder for Reducing Sum Validation Time""; ""4 Introduction of OECS""; ""5 Simulation and Analysis""; ""6 Conclusion""; ""References""; ""6 Reliability Analysis of Exponential Models Based on Skewness and Kurtosis""; ""Abstract""; ""1 Introduction""; ""2 MLE and MVUE of R(T)""; ""3 Skewness and Kurtosis of Reliability Functions""; ""4 Conclusion""; ""References""; ""7 Missing Value Imputation with Unsupervised Kohonen Self Organizing Map"" ""Abstract""""1 Introduction""; ""2 Related Work""; ""3 Proposed Approach""; ""4 Experimental Results""; ""5 Neural Network Training for Milk Products""; ""6 Conclusion""; ""References""; ""8 An Improved Single Sign-On Mechanism by Enhancing the Functionality of Reverse Proxy""; ""Abstract""; ""1 Introduction""; ""1.1 Summary of the Design""; ""2 Related Work""; ""2.1 Need for This Design""; ""3 Implementing the SSO Design""; ""3.1 Ajax Routine Implementation""; ""3.2 Reverse Proxy Implementation""; ""3.3 Profiling Service and Backend Server""; ""4 Results""; ""4.1 Security Aspects"" … (more)
- Issue Display:
- Volume 1
- Volume:
- 1
- Issue Sort Value:
- 0000-0001-0000-0000
- Publisher Details:
- New Delhi : Springer
- Publication Date:
- 2015
- Copyright Date:
- 2015
- Extent:
- 1 online resource (xx, 580 pages), illustrations (some color)
- Subjects:
- 004
Computer science -- Congresses
Information technology -- Congresses
Telecommunication systems -- Congresses
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Computer science
Information technology
Telecommunication systems
Engineering
Communications Engineering, Networks
Information Systems Applications (incl. Internet)
Computer Imaging, Vision, Pattern Recognition and Graphics
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9788132225508
8132225503
9788132225492 - Related ISBNs:
- 813222549X
9788132225492 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed July 22, 2015).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.403533
- Ingest File:
- 02_450.xml