咨询与建议

限定检索结果

文献类型

  • 622 篇 会议
  • 227 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 865 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 489 篇 工学
    • 312 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 144 篇 信息与通信工程
    • 87 篇 电气工程
    • 76 篇 电子科学与技术(可...
    • 63 篇 控制科学与工程
    • 55 篇 生物工程
    • 48 篇 材料科学与工程(可...
    • 42 篇 动力工程及工程热...
    • 40 篇 化学工程与技术
    • 38 篇 生物医学工程(可授...
    • 35 篇 机械工程
    • 26 篇 光学工程
    • 19 篇 网络空间安全
    • 17 篇 安全科学与工程
    • 16 篇 冶金工程
  • 283 篇 理学
    • 147 篇 数学
    • 98 篇 物理学
    • 63 篇 生物学
    • 48 篇 统计学(可授理学、...
    • 42 篇 化学
    • 30 篇 系统科学
    • 16 篇 地球物理学
  • 125 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 37 篇 医学
    • 33 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
  • 26 篇 法学
    • 22 篇 社会学
  • 13 篇 教育学
  • 11 篇 经济学
  • 7 篇 农学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 27 篇 accuracy
  • 25 篇 routing protocol...
  • 23 篇 routing
  • 23 篇 mathematical mod...
  • 21 篇 machine learning
  • 20 篇 computational mo...
  • 20 篇 training
  • 19 篇 ad hoc networks
  • 19 篇 genetic algorith...
  • 18 篇 feature extracti...
  • 17 篇 mobile ad hoc ne...
  • 17 篇 support vector m...
  • 17 篇 information tech...
  • 16 篇 algorithm design...
  • 15 篇 computer science
  • 15 篇 bandwidth
  • 14 篇 data mining
  • 14 篇 security
  • 14 篇 testing
  • 14 篇 artificial neura...

机构

  • 34 篇 department of co...
  • 28 篇 division of comp...
  • 23 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 16 篇 netaji subhas un...
  • 16 篇 division of info...
  • 16 篇 division of comp...
  • 15 篇 netaji subhas un...
  • 14 篇 school of comput...
  • 13 篇 division of comp...
  • 12 篇 division of info...
  • 12 篇 department of co...
  • 11 篇 department of in...
  • 11 篇 computer enginee...
  • 10 篇 department of co...
  • 10 篇 caitfs division ...
  • 10 篇 division of elec...
  • 9 篇 school of inform...
  • 9 篇 department of co...

作者

  • 23 篇 bhatia m.p.s.
  • 22 篇 isaac woungang
  • 20 篇 satish chand
  • 19 篇 sanjay k. dhuran...
  • 19 篇 sanjay kumar dhu...
  • 17 篇 mohammad s. obai...
  • 16 篇 kumar bijendra
  • 16 篇 bijendra kumar
  • 15 篇 dhurandher sanja...
  • 14 篇 chakraborty pina...
  • 14 篇 obaidat mohammad...
  • 14 篇 smriti srivastav...
  • 13 篇 woungang isaac
  • 13 篇 anand gupta
  • 12 篇 hasmat malik
  • 12 篇 dhurandher sanja...
  • 12 篇 sabharwal sangee...
  • 12 篇 bhim singh
  • 11 篇 samayveer singh
  • 11 篇 chand satish

语言

  • 822 篇 英文
  • 27 篇 其他
  • 18 篇 中文
检索条件"机构=Department of Computer Engineering Netaji Subhas Institute of Technology"
865 条 记 录,以下是641-650 订阅
排序:
Social Networks analysis: Trends, techniques and future prospects
Social Networks analysis: Trends, techniques and future pros...
收藏 引用
Fourth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom2012)
作者: Pooja Wadhwa M.P.S Bhatia Computer Engineering Department Netaji Subhash Institute Of Technology Azad Hind Fauj Marg Sector 3 Dwarka New Delhi India
The Online Social Networks have become a very popular Web 2.0 application. The powerful combination of methods and techniques makes social networks analysis special. This paper discusses the challenges and opportuniti... 详细信息
来源: 评论
New OTRA-Based Generalized Impedance Simulator
收藏 引用
International Scholarly Research Notices 2013年 第1期2013卷
作者: Ashish Gupta Raj Senani D. R. Bhaskar A. K. Singh Department of Electronics and Communication Engineering I.T.S. Engineering College 46 KP-III Greater Noida Uttar Pradesh 201306 Indiaitsecgn.edu.in Division of Electronics and Communication Engineering Netaji Subhas Institute of Technology Sector-3 Dwarka New Delhi 110078 Indiansit.ac.in Department of Electronics and Communication Engineering Faculty of Engineering and Technology Jamia Millia Islamia New Delhi 110025 Indiajmi.ac.in Department of Electronics and Communication Engineering H.R. Group of Institutions Ghaziabad Uttar Pradesh 201003 Indiahrit.ac.in
Operational transresistance amplifier (OTRA) has attracted considerable attention in the recent literature in several applications such as impedance simulation, universal biquad filter realization, realization of sinu...
来源: 评论
Inscribed gasket fractal circular monopole antenna for UWB application
Inscribed gasket fractal circular monopole antenna for UWB a...
收藏 引用
International Conference on Emerging technology Trends in Electronics, Communication and Networking (ET2ECN)
作者: Rowdra Ghatak Anirban Karmakar Balaka Biswas D R Poddar Department of ECE National Institute of Technology Durgapur West Bengal India ECE Department Netaji Subhas Engineering College Kolkata West Bengal India ETCE Department Jadavpur University Kolkata West Bengal India
A novel planar ultra wideband (UWB) antenna using a third iteration Sierpinski gasket fractal shape with circular boundary is presented in this paper. Size reduction of the antenna is done by Sierpinski gasket fractal... 详细信息
来源: 评论
DGW-canny: An improvised version of Canny edge detector
DGW-canny: An improvised version of Canny edge detector
收藏 引用
19th IEEE International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2011
作者: Gupta, Anand Dalal, Ravi Kumar Gupta, Rahul Wadhwa, Pulkit Department of Information Technology Netaji Subhas Institute of Technology New Delhi India Department of Computer Engineering Netaji Subhas Institute of Technology New Delhi India
Edge detection is a field which has intrigued programmers since early 1970s. Since then, a good number of edge detection techniques have come up but the technique used by Canny [1] is very widely used. However, it has... 详细信息
来源: 评论
Comparison of Two Security Protocols for Preventing Packet Dropping and Message Tampering Attacks on AODV-Based Mobile Ad Hoc Networks
Comparison of Two Security Protocols for Preventing Packet D...
收藏 引用
institute of Electrical and Electronics Engineers Globecom Workshops
作者: Isaac Woungang Sanjay Kumar Dhurandher Vincent Koo Issa Traore Department of Computer Science Ryerson University Division of Information Technology Netaji Subhas Institute of Technology University of Delhi Department of Computer and Electrical Engineering University of Victoria
In Emergency MANETs (eMANETs), the broadcasting nature of the wireless medium, the lack of pre-established trust relationship among nodes, and the frequent topology changes, cause some serious security challenges, mak... 详细信息
来源: 评论
State model for scheduling built-in self-test and scrubbing in FPGA to maximize the system availability in space applications
State model for scheduling built-in self-test and scrubbing ...
收藏 引用
India International Conference on Power Electronics, IICPE 2010
作者: Agarwal, Ankit Bhatia, Gaurav Chakraverty, Shampa Computer Engineering Department Netaji Subhas Institute of Technology New Delhi India
Reconfigurable Field Programmable Gate Arrays (rFPGAs) are employed extensively in spacecraft electronic systems to implement low-power adaptable systems that provide high density functionality. A challenge that must ... 详细信息
来源: 评论
A genetic algorithm based approach for prioritization of test case scenarios in static testing
A genetic algorithm based approach for prioritization of tes...
收藏 引用
2011 2nd International Conference on computer and Communication technology, ICCCT-2011
作者: Sabharwal, Sangeeta Sibal, Ritu Sharma, Chayanika Department of Computer Science and IT Netaji Subhas Institute of Technology Delhi India
White box testing is a test technique that takes into account program code, code structure and internal design flow. White box testing is primarily of two kinds-static and structural. Whereas static testing requires o... 详细信息
来源: 评论
Optimal Design of Single Fault Tolerant Candidate Set for a Communication Network
Optimal Design of Single Fault Tolerant Candidate Set for a ...
收藏 引用
International Conference on Communication Systems and Network Technologies (CSNT)
作者: A.Q. Ansari Koyel Datta Gupta Maneesha Dabas Department of Electrical Engg Jamia Millia Islamia New Delhi India Dept of Computer Science & Engg. Maharaja Surajmal Inst.of Tech. New Delhi India Dept of Computer Science & Engg. Netaji Subhas Institute of Technology New Delhi India
The cost and reliability of a network are very much affected by its topology. Moreover, the network parameters like path length and link load are also dependent on the topology used for a network. These parameters are... 详细信息
来源: 评论
A parallel approach to context-based term weighting
A parallel approach to context-based term weighting
收藏 引用
2011 World Congress on Information and Communication Technologies, WICT 2011
作者: Arora, Silky Chakravarty, Shampa Dept. of Information Technology Netaji Subhas Institute of Technology New Delhi India Dept. of Computer Engineering Netaji Subhas Institute of Technology New Delhi India
Information retrieval and extraction essentially rely on estimating the relevance of words present in a large corpus of documents or text. One of the approaches to measuring relevance is analyzing the importance of wo... 详细信息
来源: 评论
Trust-Enhanced Message Security Protocol for Mobile Ad Hoc Networks
Trust-Enhanced Message Security Protocol for Mobile Ad Hoc N...
收藏 引用
IEEE International Conference on Communications
作者: Isaac Woungang Sanjay Kumar Dhurandher Mohammed S. Obaidat Han-Chieh Chao Chris Liu Department of Computer Science Ryerson University CAITFS Division of Information Technology Netaji Subhas Institute of Technology University of Delhi Department of Computer Sciences Monmouth University Institute of Computer Science & Information Engineering National I-lan University
Securing the routing of message in mobile ad hoc networks (MANETs) is still a challenging issue. This paper proposes an enhanced trust-based multipath Dynamic Source Routing (DSR) protocol (so-called ETB-MDSR) to secu... 详细信息
来源: 评论