咨询与建议

限定检索结果

文献类型

  • 432 篇 会议
  • 127 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 302 篇 工学
    • 184 篇 计算机科学与技术...
    • 132 篇 软件工程
    • 100 篇 信息与通信工程
    • 60 篇 电气工程
    • 55 篇 电子科学与技术(可...
    • 43 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 16 篇 机械工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 15 篇 化学工程与技术
    • 11 篇 安全科学与工程
    • 10 篇 力学(可授工学、理...
    • 10 篇 网络空间安全
    • 8 篇 冶金工程
  • 152 篇 理学
    • 93 篇 数学
    • 56 篇 物理学
    • 29 篇 生物学
    • 25 篇 系统科学
    • 22 篇 统计学(可授理学、...
    • 16 篇 化学
  • 65 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 15 篇 医学
    • 15 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 8 篇 药学(可授医学、理...
  • 13 篇 法学
    • 11 篇 社会学
  • 7 篇 经济学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 23 篇 routing protocol...
  • 21 篇 routing
  • 19 篇 mathematical mod...
  • 18 篇 mobile ad hoc ne...
  • 18 篇 ad hoc networks
  • 18 篇 algorithm design...
  • 17 篇 fading
  • 16 篇 optimization
  • 15 篇 signal to noise ...
  • 15 篇 genetic algorith...
  • 14 篇 relays
  • 14 篇 training
  • 13 篇 transfer functio...
  • 12 篇 bandwidth
  • 12 篇 computational mo...
  • 12 篇 security
  • 11 篇 feature extracti...
  • 11 篇 mobile computing
  • 10 篇 peer to peer com...
  • 10 篇 statistics

机构

  • 37 篇 division of elec...
  • 28 篇 division of comp...
  • 23 篇 department of co...
  • 17 篇 division of info...
  • 16 篇 department of in...
  • 16 篇 division of inst...
  • 16 篇 division of comp...
  • 13 篇 division of comp...
  • 12 篇 division of info...
  • 12 篇 department of co...
  • 12 篇 division of elec...
  • 11 篇 computer enginee...
  • 10 篇 caitfs division ...
  • 8 篇 department of co...
  • 8 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 netaji subhas in...
  • 6 篇 division of comp...

作者

  • 22 篇 isaac woungang
  • 20 篇 satish chand
  • 20 篇 tarun kumar rawa...
  • 19 篇 sanjay k. dhuran...
  • 18 篇 sanjay kumar dhu...
  • 17 篇 parul garg
  • 17 篇 vineet kumar
  • 16 篇 mohammad s. obai...
  • 14 篇 obaidat mohammad...
  • 13 篇 dhurandher sanja...
  • 13 篇 puneet mishra
  • 12 篇 dhurandher sanja...
  • 12 篇 bijendra kumar
  • 12 篇 prabhat kumar sh...
  • 11 篇 bhatia m.p.s.
  • 11 篇 samayveer singh
  • 11 篇 anand gupta
  • 10 篇 woungang isaac
  • 9 篇 raj senani
  • 9 篇 chand satish

语言

  • 547 篇 英文
  • 12 篇 中文
  • 8 篇 其他
检索条件"机构=Division of Computer Engineering Netaji Subhas Institute of Technology"
567 条 记 录,以下是481-490 订阅
排序:
High-input Impedance Voltage-mode Universal Filter Using CCCCTAs
High-input Impedance Voltage-mode Universal Filter Using CCC...
收藏 引用
Electronics, computer, Telecommunications and Information technology International Conference on Electrical engineering/Electronics, computer, Telecommunications and Information technology
作者: Winai Jaikla Abhirup Lahiri Adisorn Kwawsibsame Montree Siripruchyanun Electric and Electronic Program Faculty of Industrial Technology Suan Sunandha Rajabhat University Dusit Bangkok THAILAND Part of the work done while the author was with Division of Electronics and Communications Netaji Subhas Institute of Tec hnology Electronics Department Lanna Polytechnical College Chiangmai Department of Teacher Training in Electrical Engineering Faculty of Technical Education King Mongkut's University of Technology North Bangkok
This article presents a voltage-mode universal biquadratic filter (low-pass, high-pass, band-pass functions), based on current controlled current conveyor transconductance amplifiers (CCCCTAs). The features of the cir... 详细信息
来源: 评论
Mitigating the degenerations in microsoft word documents: An improved steganographic method
Mitigating the degenerations in microsoft word documents: An...
收藏 引用
2009 2nd International Conference on computer, Control and Communication, IC4 2009
作者: Gupta, Anand Barr, Deepak Kumar Sharma, Deepali Department of Computer Engineering Netaji Subhas Institute of Technology Dwarka New Delhi India Department of Biotechnology Netaji Subhas Institute of Technology Dwarka New Delhi India
Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes if there is any hidden message. Most of the research done before in this are...
来源: 评论
Privacy violation in limited disclosure of database having functional dependency
Privacy violation in limited disclosure of database having f...
收藏 引用
2009 2nd International Conference on computer, Control and Communication, IC4 2009
作者: Gupta, Anand Mondal, Arnab Singal, Ashish Mittal, Atul Department of Computer Engineering Netaji Subhas Institute of Technology Dwarka New Delhi India
Upholding the privacy of data has gathered increased interest in the current industrial scenario. The databases that hold personal information and the individuals' choices of privacy are often subjected to attacks... 详细信息
来源: 评论
Complex diffusion based speckle reduction from digital images
Complex diffusion based speckle reduction from digital image...
收藏 引用
International Conference on Methods and Models in computer Science, ICM2CS09
作者: Srivastava, Rajeev Gupta, J.R.P. Parthasarthy, Harish Department of Computer Engineering Institute of Technology BHU Varanasi-221005 India Netaji Subhas Institute of Technology Dwarka New Delhi-110078 India
A complex diffusion process based on Schriidinger wave equation is proposed and implemented as a nonlinear filter to perform homomorphic filtering for reducing speckle noise from digital images. Due to the multiplicat... 详细信息
来源: 评论
A New Method for Reverse Prediction of MPEG frames in Video Streaming
A New Method for Reverse Prediction of MPEG frames in Video ...
收藏 引用
IEEE International Advance Computing Conference, IACC
作者: Sandeep Kumar Satish Chand Division of Computer Engineering Netaji Subhas Institute of Technology New Delhi India
Recently macroblock based technique for backward playback of MPEG video streaming has been discussed in which the network bandwidth and buffer size requirements are less. In this technique, the macroblocks are divided... 详细信息
来源: 评论
An efficient power-aware broadcast technique for wireless ad hoc networks
An efficient power-aware broadcast technique for wireless ad...
收藏 引用
2009 Spring Simulation Multiconference, SpringSim 2009
作者: Dhurandher, Sanjay K. Misra, Sudip Obaidat, Mohammad S. Lochab, Priyedev Sharma, Varun Kumar Gautam, Siddharth Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India School of Information Technology Indian Institute of Technology KharagpurWest Bengal India Department of Computer Science Monmouth University NJ United States
In this paper we focus on the problem of constructing an optimal broadcast tree rooted at a given source node that maximizes the network lifetime from the view point of number of messages broadcasted during the networ... 详细信息
来源: 评论
ADT: Age determination technique
ADT: Age determination technique
收藏 引用
Proceeding of International Conference on Methods and Models in computer Science (ICM2CS)
作者: Anand Gupta K. Ravi Manish Gupta Kartik Gupta Department of Computer Science Engineering Netaji Subhas Institute of Technology New Delhi India Instrumentation & Control Engineering Netaji Subhas Institute of Technology New Delhi India
Biometrics has carved an important place in the field of identification and authentication. Identification in biometrics includes various applications like face recognition. There are scads of work done in the area of... 详细信息
来源: 评论
Mitigating the degenerations in Microsoft Word documents : An improved steganographic method
Mitigating the degenerations in Microsoft Word documents : A...
收藏 引用
International Conference on computer, Control and Communication
作者: Anand Gupta Deepak Kumar Barr Deepali Sharma Department of Computer Engineering Netaji Subhas Institute of Technology New Delhi India
Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes if there is any hidden message. Most of the research done before in this are... 详细信息
来源: 评论
Meliorated Approach for Efficient Computation of Shortest Path on Edge Based Data Structure
Meliorated Approach for Efficient Computation of Shortest Pa...
收藏 引用
IEEE International Advance Computing Conference, IACC
作者: Anand Gupta Ankur Maheshwari Gaurav Jain Department of Computer Engineering Netaji Subhas Institute of Technology New Delhi India
The novel representation of the graph using edge based data structure, as proposed in [1] is an adapted version of half edge structure, traditionally used in digital geometry processing [6]. This edge based data struc... 详细信息
来源: 评论
Privacy violation in limited disclosure of database having functional dependency
Privacy violation in limited disclosure of database having f...
收藏 引用
International Conference on computer, Control and Communication
作者: Anand Gupta Arnab Mondal Ashish Singal Atul Mittal Department of Computer Engineering Netaji Subhas Institute of Technology New Delhi India
Upholding the privacy of data has gathered increased interest in the current industrial scenario. The databases that hold personal information and the individuals' choices of privacy are often subjected to attacks... 详细信息
来源: 评论