咨询与建议

限定检索结果

文献类型

  • 432 篇 会议
  • 127 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 302 篇 工学
    • 184 篇 计算机科学与技术...
    • 132 篇 软件工程
    • 100 篇 信息与通信工程
    • 60 篇 电气工程
    • 55 篇 电子科学与技术(可...
    • 43 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 16 篇 机械工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 15 篇 化学工程与技术
    • 11 篇 安全科学与工程
    • 10 篇 力学(可授工学、理...
    • 10 篇 网络空间安全
    • 8 篇 冶金工程
  • 152 篇 理学
    • 93 篇 数学
    • 56 篇 物理学
    • 29 篇 生物学
    • 25 篇 系统科学
    • 22 篇 统计学(可授理学、...
    • 16 篇 化学
  • 65 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 15 篇 医学
    • 15 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 8 篇 药学(可授医学、理...
  • 13 篇 法学
    • 11 篇 社会学
  • 7 篇 经济学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 23 篇 routing protocol...
  • 21 篇 routing
  • 19 篇 mathematical mod...
  • 18 篇 mobile ad hoc ne...
  • 18 篇 ad hoc networks
  • 18 篇 algorithm design...
  • 17 篇 fading
  • 16 篇 optimization
  • 15 篇 signal to noise ...
  • 15 篇 genetic algorith...
  • 14 篇 relays
  • 14 篇 training
  • 13 篇 transfer functio...
  • 12 篇 bandwidth
  • 12 篇 computational mo...
  • 12 篇 security
  • 11 篇 feature extracti...
  • 11 篇 mobile computing
  • 10 篇 peer to peer com...
  • 10 篇 statistics

机构

  • 37 篇 division of elec...
  • 28 篇 division of comp...
  • 23 篇 department of co...
  • 17 篇 division of info...
  • 16 篇 department of in...
  • 16 篇 division of inst...
  • 16 篇 division of comp...
  • 13 篇 division of comp...
  • 12 篇 division of info...
  • 12 篇 department of co...
  • 12 篇 division of elec...
  • 11 篇 computer enginee...
  • 10 篇 caitfs division ...
  • 8 篇 department of co...
  • 8 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 netaji subhas in...
  • 6 篇 division of comp...

作者

  • 22 篇 isaac woungang
  • 20 篇 satish chand
  • 20 篇 tarun kumar rawa...
  • 19 篇 sanjay k. dhuran...
  • 18 篇 sanjay kumar dhu...
  • 17 篇 parul garg
  • 17 篇 vineet kumar
  • 16 篇 mohammad s. obai...
  • 14 篇 obaidat mohammad...
  • 13 篇 dhurandher sanja...
  • 13 篇 puneet mishra
  • 12 篇 dhurandher sanja...
  • 12 篇 bijendra kumar
  • 12 篇 prabhat kumar sh...
  • 11 篇 bhatia m.p.s.
  • 11 篇 samayveer singh
  • 11 篇 anand gupta
  • 10 篇 woungang isaac
  • 9 篇 raj senani
  • 9 篇 chand satish

语言

  • 547 篇 英文
  • 12 篇 中文
  • 8 篇 其他
检索条件"机构=Division of Computer Engineering Netaji Subhas Institute of Technology"
567 条 记 录,以下是401-410 订阅
排序:
E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks
E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks...
收藏 引用
International Conference on Advanced Information Networking and Applications Workshops (AINAW)
作者: Sanjay Kumar Dhurandher Isaac Woungang Abhishek Gupta Bharat K. Bhargava CAITFS Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science Ryerson University Toronto ONT Canada CAITFS Division of Information Technology Netaji Subas Institute of Technology University of Delhi New Delhi India Department of Computer Sciences Purdue University West Lafayette IN USA
Wormhole attacks are considered as a severe security threat in multi-hop wireless ad hoc networks. In this paper, we propose an Energy-Efficient Scheme Immune to Wormhole attacks (our so-called E2SIW). This protocol u... 详细信息
来源: 评论
New Voltage Mode Universal Filters Using Only Two CDBAs
收藏 引用
International Scholarly Research Notices 2013年 第1期2013卷
作者: J. K. Pathak A. K. Singh Raj Senani Department of Electronics and Communication Engineering Echelon Institute of Technology Kabulpur Jasana-Manjawali Road Faridabad Haryana 121101 India Department of Electronics and Communication Engineering Faculty of Engineering and Technology HRCT Group of Institutions 7th Km Stone Meerut Road Morta Ghaziabad 201001 Indiaitsecgn.edu.in Division of Electronics and Communication Engineering Netaji Subhas Institute of Technology Sector-3 Dwarka New Delhi Delhi 110078 Indiansit.ac.in
Two new configurations for voltage mode universal filters (VMUFs) using only two current differencing buffered amplifiers (CDBAs) are proposed. Both of the new configurations can realize all the five standard types of...
来源: 评论
Preventing packet dropping and message tampering attacks on AODV-based Mobile Ad Hoc Networks
Preventing packet dropping and message tampering attacks on ...
收藏 引用
International Conference on computer, Information and Telecommunication Systems (CITS)
作者: Mohammad S. Obaidat Isaac Woungang Sanjay Kumar Dhurandher Vincent Koo Department of Computer Science and Software Engineering Monmouth University West Long Branch NJ USA Department of Computer Science Ryerson University Toronto ONT Canada Division of Information Technology Netaji Subhas Institute of Technology University of Delhi India
Due to recent advances in mobile wireless communication and computing technologies, Mobile Ad hoc Networks (MANETs) have become the network of choice for use in various applications. But this advantage comes with seri... 详细信息
来源: 评论
New OTRA-Based Generalized Impedance Simulator
收藏 引用
International Scholarly Research Notices 2013年 第1期2013卷
作者: Ashish Gupta Raj Senani D. R. Bhaskar A. K. Singh Department of Electronics and Communication Engineering I.T.S. Engineering College 46 KP-III Greater Noida Uttar Pradesh 201306 Indiaitsecgn.edu.in Division of Electronics and Communication Engineering Netaji Subhas Institute of Technology Sector-3 Dwarka New Delhi 110078 Indiansit.ac.in Department of Electronics and Communication Engineering Faculty of Engineering and Technology Jamia Millia Islamia New Delhi 110025 Indiajmi.ac.in Department of Electronics and Communication Engineering H.R. Group of Institutions Ghaziabad Uttar Pradesh 201003 Indiahrit.ac.in
Operational transresistance amplifier (OTRA) has attracted considerable attention in the recent literature in several applications such as impedance simulation, universal biquad filter realization, realization of sinu...
来源: 评论
Comparison of Two Security Protocols for Preventing Packet Dropping and Message Tampering Attacks on AODV-Based Mobile Ad Hoc Networks
Comparison of Two Security Protocols for Preventing Packet D...
收藏 引用
institute of Electrical and Electronics Engineers Globecom Workshops
作者: Isaac Woungang Sanjay Kumar Dhurandher Vincent Koo Issa Traore Department of Computer Science Ryerson University Division of Information Technology Netaji Subhas Institute of Technology University of Delhi Department of Computer and Electrical Engineering University of Victoria
In Emergency MANETs (eMANETs), the broadcasting nature of the wireless medium, the lack of pre-established trust relationship among nodes, and the frequent topology changes, cause some serious security challenges, mak... 详细信息
来源: 评论
Verification of the veracity of brachistochrone curve and evolution of optimal control
Verification of the veracity of brachistochrone curve and ev...
收藏 引用
India International Conference on Power Electronics, IICPE 2010
作者: Jha, S.K. Parthsarathy, H. Gupta, J.R.P. Gaur, Prerna Division of Instrumentation and Control Engineering Netaji Subhas Institute of Technology Delhi-78 India Division of Electronics and Communication Engineering Netaji Subhas Institute of Technology Delhi-78 India
An evocative solution for the brachistochrone problem is presented by Euler-Lagrange equation. The solution of brachistochrone problem by variational approach i.e. Euler-Lagrange equation leads to the curve of a cyclo... 详细信息
来源: 评论
DGW-canny: An improvised version of Canny edge detector
DGW-canny: An improvised version of Canny edge detector
收藏 引用
19th IEEE International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2011
作者: Gupta, Anand Dalal, Ravi Kumar Gupta, Rahul Wadhwa, Pulkit Department of Information Technology Netaji Subhas Institute of Technology New Delhi India Department of Computer Engineering Netaji Subhas Institute of Technology New Delhi India
Edge detection is a field which has intrigued programmers since early 1970s. Since then, a good number of edge detection techniques have come up but the technique used by Canny [1] is very widely used. However, it has... 详细信息
来源: 评论
SDC: Secure deletion classification
SDC: Secure deletion classification
收藏 引用
International Conference on Recent Trends in Information technology
作者: Gupta, Anand Singhal, Manik Gangil, Akash Mishra, Abhishek Division of Computer Engineering Delhi University Netaji Subhas Institute of Technology Dwarka New Delhi India
This paper introduces a novel perspective by classifying the secure deletion methods into four categories based on their methodology. For each of the proposed deletion category its associated algorithm is explained an... 详细信息
来源: 评论
A parallel approach to context-based term weighting
A parallel approach to context-based term weighting
收藏 引用
2011 World Congress on Information and Communication Technologies, WICT 2011
作者: Arora, Silky Chakravarty, Shampa Dept. of Information Technology Netaji Subhas Institute of Technology New Delhi India Dept. of Computer Engineering Netaji Subhas Institute of Technology New Delhi India
Information retrieval and extraction essentially rely on estimating the relevance of words present in a large corpus of documents or text. One of the approaches to measuring relevance is analyzing the importance of wo... 详细信息
来源: 评论
State model for scheduling built-in self-test and scrubbing in FPGA to maximize the system availability in space applications
State model for scheduling built-in self-test and scrubbing ...
收藏 引用
India International Conference on Power Electronics, IICPE 2010
作者: Agarwal, Ankit Bhatia, Gaurav Chakraverty, Shampa Computer Engineering Department Netaji Subhas Institute of Technology New Delhi India
Reconfigurable Field Programmable Gate Arrays (rFPGAs) are employed extensively in spacecraft electronic systems to implement low-power adaptable systems that provide high density functionality. A challenge that must ... 详细信息
来源: 评论