咨询与建议

限定检索结果

文献类型

  • 432 篇 会议
  • 127 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 302 篇 工学
    • 184 篇 计算机科学与技术...
    • 132 篇 软件工程
    • 100 篇 信息与通信工程
    • 60 篇 电气工程
    • 55 篇 电子科学与技术(可...
    • 43 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 16 篇 机械工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 15 篇 化学工程与技术
    • 11 篇 安全科学与工程
    • 10 篇 力学(可授工学、理...
    • 10 篇 网络空间安全
    • 8 篇 冶金工程
  • 152 篇 理学
    • 93 篇 数学
    • 56 篇 物理学
    • 29 篇 生物学
    • 25 篇 系统科学
    • 22 篇 统计学(可授理学、...
    • 16 篇 化学
  • 65 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 15 篇 医学
    • 15 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 8 篇 药学(可授医学、理...
  • 13 篇 法学
    • 11 篇 社会学
  • 7 篇 经济学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 23 篇 routing protocol...
  • 21 篇 routing
  • 19 篇 mathematical mod...
  • 18 篇 mobile ad hoc ne...
  • 18 篇 ad hoc networks
  • 18 篇 algorithm design...
  • 17 篇 fading
  • 16 篇 optimization
  • 15 篇 signal to noise ...
  • 15 篇 genetic algorith...
  • 14 篇 relays
  • 14 篇 training
  • 13 篇 transfer functio...
  • 12 篇 bandwidth
  • 12 篇 computational mo...
  • 12 篇 security
  • 11 篇 feature extracti...
  • 11 篇 mobile computing
  • 10 篇 peer to peer com...
  • 10 篇 statistics

机构

  • 37 篇 division of elec...
  • 28 篇 division of comp...
  • 23 篇 department of co...
  • 17 篇 division of info...
  • 16 篇 department of in...
  • 16 篇 division of inst...
  • 16 篇 division of comp...
  • 13 篇 division of comp...
  • 12 篇 division of info...
  • 12 篇 department of co...
  • 12 篇 division of elec...
  • 11 篇 computer enginee...
  • 10 篇 caitfs division ...
  • 8 篇 department of co...
  • 8 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 netaji subhas in...
  • 6 篇 division of comp...

作者

  • 22 篇 isaac woungang
  • 20 篇 satish chand
  • 20 篇 tarun kumar rawa...
  • 19 篇 sanjay k. dhuran...
  • 18 篇 sanjay kumar dhu...
  • 17 篇 parul garg
  • 17 篇 vineet kumar
  • 16 篇 mohammad s. obai...
  • 14 篇 obaidat mohammad...
  • 13 篇 dhurandher sanja...
  • 13 篇 puneet mishra
  • 12 篇 dhurandher sanja...
  • 12 篇 bijendra kumar
  • 12 篇 prabhat kumar sh...
  • 11 篇 bhatia m.p.s.
  • 11 篇 samayveer singh
  • 11 篇 anand gupta
  • 10 篇 woungang isaac
  • 9 篇 raj senani
  • 9 篇 chand satish

语言

  • 547 篇 英文
  • 12 篇 中文
  • 8 篇 其他
检索条件"机构=Division of Computer Engineering Netaji Subhas Institute of Technology"
567 条 记 录,以下是71-80 订阅
排序:
Linking Classroom Studies with Dynamic Environment
Linking Classroom Studies with Dynamic Environment
收藏 引用
2019 International Conference on Computing, Power and Communication Technologies, GUCON 2019
作者: Kanika, Kanika Chakraverty, Shampa Chakraborty, Pinaki Agnihotri, Shikhar Bansal, Prakriti Mohapatra, Soumya Netaji Subhas University of Technology Division of Computer Engineering New Delhi India
technology is touching every aspect of our lives and learning is not an exception. Mobile technologies and e-learning can be used to eliminate the boundaries of classroom. To circumvent the boundaries imposed by class... 详细信息
来源: 评论
AI Enabled- Information Retrival Engine (AI-IRE) in Legal Services: An Expert-Annotated NLP for Legal Judgements
AI Enabled- Information Retrival Engine (AI-IRE) in Legal Se...
收藏 引用
Augmented Intelligence and Sustainable Systems (ICAISS), International Conference on
作者: Kishan Kanhaiya Naveen Arpit Kumar Sharma Kamlesh Gautam Pramod Singh Rathore Netaji Subhas University of Technology Delhi India National Institute of Technology Kurukshetra India Department of Computer and Communcation Engineering Manipal University Jaipur India Department of Advance Computing Poornima College of Engineering Jaipur Rajasthan India
The relationships between the law and fact, and the use of the facts to support a legal conclusion requires practice. This study introduces a technique called the "legal analysis of data extraction" which he...
来源: 评论
Multi-attributed and structured text-to-face synthesis
Multi-attributed and structured text-to-face synthesis
收藏 引用
2020 IEEE International Conference on technology, engineering, Management for Societal Impact Using Marketing, Entrepreneurship and Talent, TEMSMET 2020
作者: Wadhawan, Rohan Drall, Tanuj Singh, Shubham Chakraverty, Shampa Netaji Subhas Institute of Technology Department of Computer Science and Engineering New Delhi India Netaji Subhas University of Technology Department of Computer Science and Engineering New Delhi India
Generative Adversarial Networks (GANs) have revolutionized image synthesis through many applications like face generation, photograph editing, and image super-resolution. Image synthesis using GANs has predominantly b... 详细信息
来源: 评论
Deep Q-Network Dueling-Based Opportunistic Data Transmission in Blockchain-Enabled M2M Communication
Deep Q-Network Dueling-Based Opportunistic Data Transmission...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Jagdeep Singh Sanjay Kumar Dhurandher Isaac Woungang Department of Computer Science and Engineering Sant Longowal Institute of Engineering and Technology Longowal Punjab India Department of Information Technology Netaji Subhas University of Technology New Delhi India National Institute of Electronics and Information Technology New Delhi India Department of Computer Science Toronto Metropolitan University Toronto ON Canada
The growth of the opportunistic network (OppNet) in recent years has created a variety of opportunities and concerns. Machine-to-machine (M2M) communications, which are a critical component of OppNet, provide a novel ...
来源: 评论
Analysis of Prevalence and Effectiveness of Mobile Devices and Wearables in the Domain of Education
Analysis of Prevalence and Effectiveness of Mobile Devices a...
收藏 引用
Computational Performance Evaluation (ComPE), International Conference on
作者: Arshia Kaul Pooja Pooja Division of Computer Engineering Netaji Subhas University of Technology New Delhi India
Significant developments in the field of wireless communication, networking and semiconductors have paved the way for ubiquity of mobile technology. Being lightweight, portable and affordable, it is used by a large nu... 详细信息
来源: 评论
Demystifying Cyber terrorism: Causes, Costs & its impact on individuals’ psyche and public confidence
Demystifying Cyber terrorism: Causes, Costs & its impact on ...
收藏 引用
Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON), International Conference on
作者: Syed Rameem Zahra Tausifa Jan Saleem Sonia Department of Computer Science and Engineering Netaji Subhas University of Technology Delhi India Department of Electrical Engineering Indian Institute of Technology Delhi Delhi India Yogananda School of AI Computer and Data Science Shoolini University Solan H.P India
Just like the game for Information technology (IT) security was turned topsy-turvy by the arrival of mobile devices a few decades ago, the Internet of Things (IoT) today is changing it again a big time. Data breaches,...
来源: 评论
Data Protection for Backups and Recovery in Cloud Storage
Data Protection for Backups and Recovery in Cloud Storage
收藏 引用
Smart Generation Computing, Communication and Networking (SMART GENCON), International Conference on
作者: Abhijeet Kumar Ayan Kumar Das Department of Electronics and Communication Engineering Netaji Subhas Institute of Technology (NSIT) Bihta Patna Department of Computer Science & Engineering BIT Patna Mesra Campus
Cloud provides its users with different services. Every day during cloud computing, a great deal of data is generated. The data should be saved on the cloud servers properly. If this data is missing from the server, a... 详细信息
来源: 评论
Simulation studies on aerodynamic features of Eurofighter Typhoon and Dassault Rafale combat aircraft
收藏 引用
Materials Today: Proceedings 2021年 38卷 191-197页
作者: Lohit Malik Sachin Rawat Manish Kumar Abhishek Tevatia Division of Manufacturing Processes and Automation Engineering Netaji Subhas Institute of Technology University of Delhi New Delhi 110 078 India Department of Mechanical Engineering Netaji Subhas University of Technology New Delhi 110 078 India
Comparative study using computational fluid dynamics (CFD) of aircraft Eurofighter Typhoon and Dassault Rafale is carried out while presenting the importance of examining the complete aircraft including all the compon... 详细信息
来源: 评论
A Buffer Occupancy Estimation Model for Opportunistic Networks
A Buffer Occupancy Estimation Model for Opportunistic Networ...
收藏 引用
Biennial Symposium on Communications, QBSC
作者: Jagdeep Singh Sanjay K. Dhurandher Isaac Woungang Periklis Chatzimisios Department of Computer Science and Engineering Sant Longowal Institute of Engineering and Technology Longowal India Department of Information Technology Netaji Subhas University of Technology New Delhi India Department of Computer Science Toronto Metropolitan University Toronto ON Canada International Hellenic University Thessaloniki Greece University of New Mexico USA
When designing routing schemes for opportunistic networks (OppNets), node's buffer congestion is one of the major concerns. Most buffer management schemes for OppNets are reactive ones, which require that more mes...
来源: 评论
Comparison of LSCP and Cluster Coverage Model for Emergency Train’s Assets Management:Use Case;North Eastern Railway
Comparison of LSCP and Cluster Coverage Model for Emergency ...
收藏 引用
Maintenance and Intelligent Asset Management (ICMIAM), International Conference on
作者: Kshitij Mishra Swastika Mishra Abhyuday Computer Engineering International Institute of Information Technology Hyderabad India Mechanical Engineering Netaji Subhas University of Technology New Delhi Indian Railways Service of Mechanical Engineers Indian Institute of Technology Kharagpur India
Deployment of Accident Relief Medical Vans (ARMV) used for accident relief and rescue operations is generally done heuristically. ARMV is an ambulance-train equipped with various tools like jacks, heavy cutting tools,...
来源: 评论