“Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Visual voice activity detection as a help for speech source separation from convolutive mixtures ₹4,500 Visual voice activity detection as a help for speech source separation from convolutive mixtures quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data ₹4,500 DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data quantity ₹4,500 × Lifetime & Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks ₹5,500 Lifetime & Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks quantity ₹5,500 × On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users ₹4,500 On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users quantity ₹4,500 × QoS-aware Node Selection Algorithm for Routing Protocols in VANETs ₹4,500 QoS-aware Node Selection Algorithm for Routing Protocols in VANETs quantity ₹4,500 × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 × Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks ₹4,500 Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks quantity ₹4,500 × Design Space?Time Trellis-Coded Intercarrier Interference Parallel Cancelation Architectures for OFDM Systems ₹4,500 Design Space?Time Trellis-Coded Intercarrier Interference Parallel Cancelation Architectures for OFDM Systems quantity ₹9,000 × A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold ₹3,500 A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold quantity ₹3,500 × Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? ₹4,500 Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? quantity ₹4,500 × Energy-Efficient Configuration of spatial and frequency Resources in MIMO_OFDMA Systems ₹4,500 Energy-Efficient Configuration of spatial and frequency Resources in MIMO_OFDMA Systems quantity ₹4,500 × Hybrid Clustering Scheme for Drone based Cognitive Internet of Things ₹4,500 Hybrid Clustering Scheme for Drone based Cognitive Internet of Things quantity ₹4,500 × A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ₹4,500 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing quantity ₹4,500 × Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algoritham ₹4,500 Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algoritham quantity ₹4,500 × User-Defined Privacy Grid System for Continuous Location-Based Services ₹4,500 User-Defined Privacy Grid System for Continuous Location-Based Services quantity ₹4,500 × Data Mining for Patient Friendly Apnea Detection ₹4,500 Data Mining for Patient Friendly Apnea Detection quantity ₹4,500 × Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation ₹4,500 Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation quantity ₹4,500 × A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks ₹4,500 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks quantity ₹4,500 × Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework ₹4,500 Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹99,000 Total ₹99,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout