RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCOPUSKCI등재

        A Comparative Study of Estimation by Analogy using Data Mining Techniques

        Nagpal, Geeta,Uddin, Moin,Kaur, Arvinder Korea Information Processing Society 2012 Journal of information processing systems Vol.8 No.4

        Software Estimations provide an inclusive set of directives for software project developers, project managers, and the management in order to produce more realistic estimates based on deficient, uncertain, and noisy data. A range of estimation models are being explored in the industry, as well as in academia, for research purposes but choosing the best model is quite intricate. Estimation by Analogy (EbA) is a form of case based reasoning, which uses fuzzy logic, grey system theory or machine-learning techniques, etc. for optimization. This research compares the estimation accuracy of some conventional data mining models with a hybrid model. Different data mining models are under consideration, including linear regression models like the ordinary least square and ridge regression, and nonlinear models like neural networks, support vector machines, and multivariate adaptive regression splines, etc. A precise and comprehensible predictive model based on the integration of GRA and regression has been introduced and compared. Empirical results have shown that regression when used with GRA gives outstanding results; indicating that the methodology has great potential and can be used as a candidate approach for software effort estimation.

      • SCOPUSKCI등재

        A Review of Mercury Exposure and Health of Dental Personnel

        Nagpal, Natasha,Bettiol, Silvana S.,Isham, Amy,Hoang, Ha,Crocombe, Leonard A. Occupational Safety and Health Research Institute 2017 Safety and health at work Vol.8 No.1

        Considerable effort has been made to address the issue of occupational health and environmental exposure to mercury. This review reports on the current literature of mercury exposure and health impacts on dental personnel. Citations were searched using four comprehensive electronic databases for articles published between 2002 and 2015. All original articles that evaluated an association between the use of dental amalgam and occupational mercury exposure in dental personnel were included. Fifteen publications from nine different countries met the selection criteria. The design and quality of the studies showed significant variation, particularly in the choice of biomarkers as an indicator of mercury exposure. In several countries, dental personnel had higher mercury levels in biological fluids and tissues than in control groups; some work practices increased mercury exposure but the exposure levels remained below recommended guidelines. Dental personnel reported more health conditions, often involving the central nervous system, than the control groups. Clinical symptoms reported by dental professionals may be associated with low-level, long-term exposure to occupational mercury, but may also be due to the effects of aging, occupational overuse, and stress. It is important that dental personnel, researchers, and educators continue to encourage and monitor good work practices by dental professionals.

      • SCOPUSKCI등재

        A Survey on the Detection of SQL Injection Attacks and Their Countermeasures

        Nagpal, Bharti,Chauhan, Naresh,Singh, Nanhay Korea Information Processing Society 2017 Journal of information processing systems Vol.13 No.4

        The Structured Query Language (SQL) Injection continues to be one of greatest security risks in the world according to the Open Web Application Security Project's (OWASP) [1] Top 10 Security vulnerabilities 2013. The ease of exploitability and severe impact puts this attack at the top. As the countermeasures become more sophisticated, SOL Injection Attacks also continue to evolve, thus thwarting the attempt to eliminate this attack completely. The vulnerable data is a source of worry for government and financial institutions. In this paper, a detailed survey of different types of SQL Injection and proposed methods and theories are presented, along with various tools and their efficiency in intercepting and preventing SQL attacks.

      • SCOPUSKCI등재

        ModifiedFAST: A New Optimal Feature Subset Selection Algorithm

        Nagpal, Arpita,Gaur, Deepti The Korea Institute of Information and Commucation 2015 Journal of information and communication convergen Vol.13 No.2

        Feature subset selection is as a pre-processing step in learning algorithms. In this paper, we propose an efficient algorithm, ModifiedFAST, for feature subset selection. This algorithm is suitable for text datasets, and uses the concept of information gain to remove irrelevant and redundant features. A new optimal value of the threshold for symmetric uncertainty, used to identify relevant features, is found. The thresholds used by previous feature selection algorithms such as FAST, Relief, and CFS were not optimal. It has been proven that the threshold value greatly affects the percentage of selected features and the classification accuracy. A new performance unified metric that combines accuracy and the number of features selected has been proposed and applied in the proposed algorithm. It was experimentally shown that the percentage of selected features obtained by the proposed algorithm was lower than that obtained using existing algorithms in most of the datasets. The effectiveness of our algorithm on the optimal threshold was statistically validated with other algorithms.

      • SCIESCOPUSKCI등재

        CONSTRUCTION OF SUBCLASSES OF UNIVALENT HARMONIC MAPPINGS

        Nagpal, Sumit,Ravichandran, V. Korean Mathematical Society 2014 대한수학회지 Vol.51 No.3

        Complex-valued harmonic functions that are univalent and sense-preserving in the open unit disk are widely studied. A new methodology is employed to construct subclasses of univalent harmonic mappings from a given subfamily of univalent analytic functions. The notions of harmonic Alexander operator and harmonic Libera operator are introduced and their properties are investigated.

      • Analytical Modelling Approach To Measure The Usability of Website

        Renuka Nagpal,Deepti Mehrotra,Pradeep Kumar Bhatia 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.5

        The aim of the study this to propose the usability metrics of the website and design an algorithm to evaluate it. The usability of websites depends on its structural dimension, functionality and user satisfaction. In this paper, the case study of the website of academic institutions is considered. Key criteria that affect the usability of the website were identified. Each of these criteria's is evaluated using the suitable method for given six sample website of academic institutes. Entropy approach is used for weights estimation and calculation of overall usability metrics.

      • KCI등재

        CONSTRUCTION OF SUBCLASSES OF UNIVALENT HARMONIC MAPPINGS

        Sumit Nagpal,V. Ravichandran 대한수학회 2014 대한수학회지 Vol.51 No.3

        Complex-valued harmonic functions that are univalent and sense-preserving in the open unit disk are widely studied. A new method- ology is employed to construct subclasses of univalent harmonic mappings from a given subfamily of univalent analytic functions. The notions of harmonic Alexander operator and harmonic Libera operator are intro- duced and their properties are investigated.

      • KCI등재

        A Review of Mercury Exposure and Health of Dental Personnel

        Natasha Nagpal,Silvana S. Bettiol,Amy Isham,Ha Hoang,Leonard A. Crocombe 한국산업안전보건공단 산업안전보건연구원 2017 Safety and health at work Vol.8 No.1

        Considerable effort has been made to address the issue of occupational health and environmental exposure to mercury. This review reports on the current literature of mercury exposure and health impacts on dental personnel. Citations were searched using four comprehensive electronic databases for articles published between 2002 and 2015. All original articles that evaluated an association between the use of dental amalgam and occupational mercury exposure in dental personnel were included. Fifteen publications from nine different countries met the selection criteria. The design and quality of the studies showed significant variation, particularly in the choice of biomarkers as an indicator of mercury exposure. In several countries, dental personnel had higher mercury levels in biological fluids and tissues than in control groups; some work practices increased mercury exposure but the exposure levels remained below recommended guidelines. Dental personnel reported more health conditions, often involving the central nervous system, than the control groups. Clinical symptoms reported by dental professionals may be associated with low-level, long-term exposure to occupational mercury, but may also be due to the effects of aging, occupational overuse, and stress. It is important that dental personnel, researchers, and educators continue to encourage and monitor good work practices by dental professionals.

      • KCI등재

        A Survey on the Detection of SQL Injection Attacks and Their Countermeasures

        ( Bharti Nagpal ),( Naresh Chauhan ),( Nanhay Singh ) 한국정보처리학회 2017 Journal of information processing systems Vol.13 No.4

        The Structured Query Language (SQL) Injection continues to be one of greatest security risks in the world according to the Open Web Application Security Project`s (OWASP) [1] Top 10 Security vulnerabilities 2013. The ease of exploitability and severe impact puts this attack at the top. As the countermeasures become more sophisticated, SOL Injection Attacks also continue to evolve, thus thwarting the attempt to eliminate this attack completely. The vulnerable data is a source of worry for government and financial institutions. In this paper, a detailed survey of different types of SQL Injection and proposed methods and theories are presented, along with various tools and their efficiency in intercepting and preventing SQL attacks.

      • KCI등재

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼