<p>This book presents selected papers from the International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2018. The conference provided an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists
Emerging Research in Computing, Information, Communication and Applications: ERCICA 2015, Volume 2
✍ Scribed by N. R. Shetty, N.H. Prasad, N. Nalini (eds.)
- Publisher
- Springer India
- Year
- 2016
- Tongue
- English
- Leaves
- 599
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers.
✦ Table of Contents
Front Matter....Pages i-xx
Analysis and Visualization of Professional’s LinkedIn Data....Pages 1-9
Optimizing Websites for Online Customers....Pages 11-22
Prevention Guidelines of SQL Injection Database Attacks: An Experimental Analysis....Pages 23-32
Automated Data Analytics in Measuring Brand Sentiment Using Ml Technique from Online Conversations—Twitter....Pages 33-46
Design of Five Port Structure and Evaluation of Its Performance at 5.8 Ghz for SDR Application....Pages 47-55
Optimization of Code Blocking in W-CDMA Based on Modified Solid State Genetic Algorithm (MSSGA)....Pages 57-68
Augmented Reality Simulation to Visualize Global Warming and Its Consequences....Pages 69-78
Design and Modeling of Microfluidic Channel in a Dielectric Planar Waveguide Using Cosmol Multiphysics....Pages 79-87
Game Based Learning to Reduce Carbon Foot Print....Pages 89-98
Analysis of Black Hole Attack in Ad Hoc Network Using AODV and AOMDV Protocols....Pages 99-108
An Approach to Overcome Startup Issues Using Serious Game....Pages 109-121
Integrating Different Machine Learning Techniques for Assessment and Forecasting of Data....Pages 123-130
Simulative Analysis of DWDM Systems Using Loop Control in Inter Satellite Optical Wireless Communication Channel for 10,000 km Long Distance Transmission....Pages 131-142
A Novel Rate Based Overload Control Method for SIP Servers....Pages 143-152
Discovery of Multi-frequent Patterns Using Directed Graph....Pages 153-162
Efficient Identification of Users and User Sessions from Web Log Repository Using Dimensionality Reduction Techniques and Combined Methodologies....Pages 163-173
Co-operative Co-evolution Based Hybridization of Differential Evolution and Particle Swarm Optimization Algorithms in Distributed Environment....Pages 175-187
Application of Multiple Databases Based on Hand Features in Hand Biometry....Pages 189-196
Serious Game on Flood Risk Management....Pages 197-206
SS_PAR: Signal Strength Based Petal Ant Routing Algorithm for Mobile Ad Hoc Network....Pages 207-217
A Novel Framework for Data Processing and Computation of Wireless Sensor Networks on Cloud....Pages 219-226
Online Signature Verification Using Single Spiking Neuron Model....Pages 227-236
Comparative Study of Classification Algorithms for Spam Email Detection....Pages 237-244
CSCR-A Context Sensitive Concept Ranking Approach....Pages 245-252
Energy-Aware Application Scheduling and Consolidation in Mobile Cloud Computing with Load Balancing....Pages 253-264
Classroom Collaboration Using an In-Home Gaming Device....Pages 265-277
An Effective Implementation of Exudate Extraction from Fundus Images of the Eye for a Content Based Image Retrieval System Through Hardware Description Language....Pages 279-290
Energy Efficient Dynamic Reconfiguration of Routing Agents for WSN Data Aggregation....Pages 291-301
Load Based Migration Based on Virtualization Using Genetic Algorithm....Pages 303-310
An Architecture for Detection of Land Mines Using Swarm Robots....Pages 311-323
A Study of Challenges and Solutions for Smart Phone Security....Pages 325-334
Software Architecture Validation Methods, Tools Support and Case Studies....Pages 335-345
A Novel Approach for Performance Analysis and Optimal Selection of Players in Indian Premier League Auction....Pages 347-365
Supporting Linked Databases in Keyword Query Searching Using Density Inverted Indexes....Pages 367-375
Composite Analysis of Different Jammers in Cognitive Radio Networks Under Denial of Service Attack....Pages 377-386
IDLS: Framework for Interactive Digital Learning System with Efficient Component Modelling....Pages 387-399
A Vertical and Horizontal Segregation Based Data Dissemination Protocol....Pages 401-412
Application of Data Mining Techniques on Heart Disease Prediction: A Survey....Pages 413-426
An Efficient Approach for Constructing Spanning Trees by Applying BFS and DFS Algorithm Directly on Non-regular Graphic Sequences....Pages 427-436
A Novel Approach for Data Transmission Technique Through Secret Fragment Visible Mosaic Image....Pages 437-447
Edge Preserved De-noising Method for Medical X-Ray Images Using Wavelet Packet Transformation....Pages 449-467
Visual Tracking on Riemannian Space via Standard Deviation Based Model Updated Method....Pages 469-478
Kannpos-Kannada Parts of Speech Tagger Using Conditional Random Fields....Pages 479-491
Image Processing for Soybean Disease Classification and Severity Estimation....Pages 493-500
Secure Cryptographic Algorithm Using Digital Logic....Pages 501-510
‘Let’s Exercise’: A Context Aware Mobile Agent for Motivating Physical Activity....Pages 511-520
Real Time Smart, Intelligent and Novel Embedded Vehicle Interceptor for Security Applications....Pages 521-534
1-Wire Communication Protocol for Debugging Modem Chipsets....Pages 535-548
Wavelet Transform Based Multi Rate Filter Bank for Human Auditory System....Pages 549-556
Integrating Neural Linguistic Programming with Exergaming....Pages 557-566
Standardization of UAN Simulator Channel Framework....Pages 567-574
Analysis of AODV Routing Protocol and Enhancement for Energy Efficiency....Pages 575-584
The Cost-Benefit Analysis of Vulnerability of Web Server Through Investigation....Pages 585-597
Back Matter....Pages 599-600
✦ Subjects
Communications Engineering, Networks; Information Systems Applications (incl. Internet); Computer Imaging, Vision, Pattern Recognition and Graphics
📜 SIMILAR VOLUMES
<p><p>This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information,
<p>This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Co
<p><p>This book presents selected papers from the International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2018. The conference provided an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologi
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discus
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discus