咨询与建议

限定检索结果

文献类型

  • 624 篇 会议
  • 229 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 869 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 492 篇 工学
    • 313 篇 计算机科学与技术...
    • 231 篇 软件工程
    • 146 篇 信息与通信工程
    • 88 篇 电气工程
    • 77 篇 电子科学与技术(可...
    • 63 篇 控制科学与工程
    • 55 篇 生物工程
    • 48 篇 材料科学与工程(可...
    • 42 篇 动力工程及工程热...
    • 40 篇 化学工程与技术
    • 38 篇 生物医学工程(可授...
    • 35 篇 机械工程
    • 26 篇 光学工程
    • 19 篇 网络空间安全
    • 17 篇 安全科学与工程
    • 16 篇 冶金工程
  • 284 篇 理学
    • 148 篇 数学
    • 98 篇 物理学
    • 63 篇 生物学
    • 48 篇 统计学(可授理学、...
    • 42 篇 化学
    • 30 篇 系统科学
    • 16 篇 地球物理学
  • 125 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 37 篇 医学
    • 33 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
  • 26 篇 法学
    • 22 篇 社会学
  • 13 篇 教育学
  • 11 篇 经济学
  • 7 篇 农学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 27 篇 accuracy
  • 25 篇 routing protocol...
  • 23 篇 routing
  • 23 篇 mathematical mod...
  • 21 篇 machine learning
  • 20 篇 computational mo...
  • 20 篇 training
  • 19 篇 ad hoc networks
  • 19 篇 genetic algorith...
  • 18 篇 feature extracti...
  • 17 篇 mobile ad hoc ne...
  • 17 篇 support vector m...
  • 17 篇 information tech...
  • 16 篇 algorithm design...
  • 15 篇 computer science
  • 15 篇 bandwidth
  • 14 篇 data mining
  • 14 篇 security
  • 14 篇 testing
  • 14 篇 artificial neura...

机构

  • 34 篇 department of co...
  • 28 篇 division of comp...
  • 23 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 16 篇 netaji subhas un...
  • 16 篇 division of info...
  • 16 篇 division of comp...
  • 15 篇 netaji subhas un...
  • 14 篇 school of comput...
  • 13 篇 division of comp...
  • 12 篇 division of info...
  • 12 篇 department of co...
  • 11 篇 department of in...
  • 11 篇 computer enginee...
  • 10 篇 department of co...
  • 10 篇 caitfs division ...
  • 10 篇 division of elec...
  • 9 篇 school of inform...
  • 9 篇 department of co...

作者

  • 23 篇 bhatia m.p.s.
  • 22 篇 isaac woungang
  • 21 篇 satish chand
  • 19 篇 sanjay k. dhuran...
  • 19 篇 sanjay kumar dhu...
  • 17 篇 mohammad s. obai...
  • 16 篇 kumar bijendra
  • 16 篇 bijendra kumar
  • 15 篇 dhurandher sanja...
  • 14 篇 chakraborty pina...
  • 14 篇 obaidat mohammad...
  • 14 篇 smriti srivastav...
  • 13 篇 woungang isaac
  • 13 篇 anand gupta
  • 12 篇 hasmat malik
  • 12 篇 dhurandher sanja...
  • 12 篇 sabharwal sangee...
  • 12 篇 bhim singh
  • 11 篇 samayveer singh
  • 11 篇 chand satish

语言

  • 812 篇 英文
  • 41 篇 其他
  • 18 篇 中文
检索条件"机构=Department of Computer Engineering Netaji Subhas Institute of Technology"
869 条 记 录,以下是431-440 订阅
排序:
A New Image Steganography Technique Based on Pixel Intensity and Similarity in Secret Message
A New Image Steganography Technique Based on Pixel Intensity...
收藏 引用
2018 IEEE International Conference on Advances in Computing, Communication Control and Networking, ICACCCN 2018
作者: Malik, Aruna Kumar, Rajeev Singh, Samayveer School of Computing Science Engineering Galgotias University Gr Noida UP India Division of Computer Engineering Netaji Subhas Institute of Technology New Delhi India Department of Computer Science Engineering Bennett University Gr Noida UP India
In this paper, we propose a new enhanced image steganography scheme for color images. The proposed scheme is based on the pixel intensity of the cover image and the similarity in secret message. It can hide the secret... 详细信息
来源: 评论
Modified Binary Dragonfly Algorithm for Feature Selection in Human Papillomavirus-Mediated Disease Treatment
Modified Binary Dragonfly Algorithm for Feature Selection in...
收藏 引用
International Conference on Communication, Computing and Internet of Things (IC3IoT)
作者: Ramit Sawhney Roopal Jain Department of Computer Engineering Netaji Subhas Institute of Technology Delhi India
Diseased caused through the rapid mediation of Human Papillomavirus (HPV) have surged in the recent decades. While there are a large amount of treatment methods, medical data is often voluminous, high dimensional and ... 详细信息
来源: 评论
An Evolutionary Learning Approach to Play Othello Using XCS
An Evolutionary Learning Approach to Play Othello Using XCS
收藏 引用
Congress on Evolutionary Computation
作者: Satvik Jain Siddharth Verma Swaraj Kumar Swati Aggarwal Department of Computer Engineering Netaji Subhas Institute of Technology Delhi India
Due to the multifarious challenges that emerge when developing an artificial intelligent (AI) agent that can compete with human players, the classic game of Othello has received a lot of attention from the Computation... 详细信息
来源: 评论
EEG Based Participant Independent Emotion Classification using Gradient Boosting Machines
EEG Based Participant Independent Emotion Classification usi...
收藏 引用
IEEE International Advance Computing Conference, IACC
作者: Sagar Aggarwal Luv Aggarwal Manshubh Singh Rihal Swati Aggarwal Department Of Computer Engineering Netaji Subhas Institute of Technology Dwarka Delhi India
Analysis of EEG (Electroencephalography) signals provides an alternative ingenious approach towards Emotion recognition. Nowadays, Gradient Boosting Machines (GBMs) have emerged as state-of-the-art supervised classifi...
来源: 评论
Cyberbullying: A Risk of CyberAddiction
Cyberbullying: A Risk of CyberAddiction
收藏 引用
International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
作者: Geetika Sarna MPS Bhatia Computer Engineering Department Netaji Subhas Institute of Technology New Delhi India
With the advancement in the digital technologies, the internet has become major break-through and has been universally acceptable technology by the people of all the ages. They use the internet for the purpose of ente... 详细信息
来源: 评论
Identification of Suspicious Patterns in Social Network using Zipf's Law
Identification of Suspicious Patterns in Social Network usin...
收藏 引用
International Conference on Advances in Computing, Communication Control and Networking
作者: GeetikaSarna MPS Bhatia Computer Engineering Department Netaji Subhas Institute of Technology New Delhi India
Scale-Free social network is universally popular among the users of almost all the ages. This scale-free network follows the Power Law that expresses the distribution of data in the form of body and tail. Tail can be ... 详细信息
来源: 评论
Augmented Gene Expression Programming: A Population Diversifying Paradigm
Augmented Gene Expression Programming: A Population Diversif...
收藏 引用
Congress on Evolutionary Computation
作者: Shreya Kataria Somya Sangal Twishi Tyagi Swati Aggarwal Department of Computer Engineering Netaji Subhas Institute of Technology Delhi Delhi India
Gene Expression Programming, a popular evolutionary paradigm, has acquired great attention from researchers in the domain of mathematical modeling. In view of its insufficiencies arising due to premature convergence, ... 详细信息
来源: 评论
Spoofed Fingerprint Detection Based on Time Series Fingerprint Image Analysis
Spoofed Fingerprint Detection Based on Time Series Fingerpri...
收藏 引用
International Conference on Secure Cyber Computing and Communication (ICSCCC)
作者: Shefali Arora Naman Maheshwari MPS Bhatia Division of Computer Engineering Netaji Subhas Institute of technology delhi india
The primary purpose of fingerprint recognition is to make sure that user authentication is reliable. Fully connected Convolutional networks help to attain good performance in classifying a time-series sequence of capt... 详细信息
来源: 评论
Predicting the Popularity of Online News using Social Features
Predicting the Popularity of Online News using Social Featur...
收藏 引用
International Conference on Green Computing and Internet of Things (ICGCIoT)
作者: Harsh Vardhan Singh Division of Computer Engineering Netaji Subhas Institute of Technology New Delhi
Consuming news via social media is an integral part of our lives. Various news agencies use social media as a medium to spread their content. Popularity prediction of news before publication is a challenging task beca...
来源: 评论
A computer Vision System for Iris Recognition Based on Deep Learning
A Computer Vision System for Iris Recognition Based on Deep ...
收藏 引用
IEEE International Advance Computing Conference, IACC
作者: Shefali Arora M. P. S Bhatia Division of Computer Engineering Netaji Subhas Institute of Technology Delhi India
Biometric systems are playing an important role in identifying a person, thus contributing to global security. There are many possible biometrics, for example height, DNA, handwriting etc., but computer vision based b...
来源: 评论