Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_41
K. Ajay, V. Chamundeeswari
{"title":"Analysis of Stability in Super-Lift Converters","authors":"K. Ajay, V. Chamundeeswari","doi":"10.1007/978-3-030-32150-5_41","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_41","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126759291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_149
D. G. RatnaMary, D. Victoria
{"title":"A Study on the Attitude of Students in Higher Education Towards Information Communication Technology","authors":"D. G. RatnaMary, D. Victoria","doi":"10.1007/978-3-030-32150-5_149","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_149","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123275108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_11
P. Upadhyay, B. Ram
{"title":"N-2 Contingency Screening and Ranking of an IEEE Test System","authors":"P. Upadhyay, B. Ram","doi":"10.1007/978-3-030-32150-5_11","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_11","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122316088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_136
C. Raghavendran, G. N. Satish, P. S. Varma
{"title":"Group Key Management Protocols for Securing Communication in Groups over Internet of Things","authors":"C. Raghavendran, G. N. Satish, P. S. Varma","doi":"10.1007/978-3-030-32150-5_136","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_136","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_82
R. Manikandan, A. Rengarajan, C. Devibala, K. Gayathri, T. Malarvizhi
{"title":"Secure and Traceable Medical Image Sharing Using Enigma in Cloud?","authors":"R. Manikandan, A. Rengarajan, C. Devibala, K. Gayathri, T. Malarvizhi","doi":"10.1007/978-3-030-32150-5_82","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_82","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133529150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_92
S. Balaji, S. Subburaj, N. Sathish, A. Raj
{"title":"An Hybrid Defense Framework for Anomaly Detection in Wireless Sensor Networks","authors":"S. Balaji, S. Subburaj, N. Sathish, A. Raj","doi":"10.1007/978-3-030-32150-5_92","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_92","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133368044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_39
R. R. Kumar, R. Pandian, B. Kiruthiga, P. Indumathi
{"title":"Design of Modified Code Word for Space Time Block Coded Spatial Modulation","authors":"R. R. Kumar, R. Pandian, B. Kiruthiga, P. Indumathi","doi":"10.1007/978-3-030-32150-5_39","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_39","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115365408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_142
M. Prabhavathy, S. Maheswari
{"title":"Remote Network Injection Attack Using X-Cross API Calls","authors":"M. Prabhavathy, S. Maheswari","doi":"10.1007/978-3-030-32150-5_142","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_142","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_101
M. Vidhyasree, R. Parameswari
{"title":"A Systematic Approach of Classification Model Based Prediction of Metabolic Disease Using Optical Coherence Tomography Images","authors":"M. Vidhyasree, R. Parameswari","doi":"10.1007/978-3-030-32150-5_101","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_101","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121771163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-22DOI: 10.1007/978-3-030-32150-5_87
R. Bose, N. Balamurugan
{"title":"Improving the Invulnerability of Wireless Sensor Networks Against Cascading Failure","authors":"R. Bose, N. Balamurugan","doi":"10.1007/978-3-030-32150-5_87","DOIUrl":"https://doi.org/10.1007/978-3-030-32150-5_87","url":null,"abstract":"","PeriodicalId":230961,"journal":{"name":"Emerging Trends in Computing and Expert Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}