“DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments” has been added to your cart. Continue shopping “On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Sum capacity maximization for MIMO?OFDMA based cognitive radio networks ₹3,500 Sum capacity maximization for MIMO?OFDMA based cognitive radio networks quantity ₹3,500 × Application of Data Mining Techniques in Weather Prediction and Climate Change Studies ₹4,500 Application of Data Mining Techniques in Weather Prediction and Climate Change Studies quantity ₹4,500 × A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold ₹3,500 A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold quantity ₹3,500 × UWB Antenna for Brain stroke and Brain Tumour Detection ₹5,500 UWB Antenna for Brain stroke and Brain Tumour Detection quantity ₹5,500 × Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework ₹4,500 Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework quantity ₹4,500 × A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ₹4,500 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing quantity ₹4,500 × A Survey on Blood Vessel detection Methodologies in Retinal Images ₹4,500 A Survey on Blood Vessel detection Methodologies in Retinal Images quantity ₹4,500 × Hybrid Clustering Scheme for Drone based Cognitive Internet of Things ₹4,500 Hybrid Clustering Scheme for Drone based Cognitive Internet of Things quantity ₹4,500 × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 × Optimal Source and Relay Design for Multiuser MIMO AF Relay Communication Systems With Direct Links and Imperfect Channel Information ₹5,500 Optimal Source and Relay Design for Multiuser MIMO AF Relay Communication Systems With Direct Links and Imperfect Channel Information quantity ₹5,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Weakly-Supervised Network for Detection of COVID-19 in Chest CT Scans ₹5,500 Weakly-Supervised Network for Detection of COVID-19 in Chest CT Scans quantity ₹5,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments ₹4,500 DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments quantity ₹4,500 × On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users ₹4,500 On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹68,500 Total ₹68,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout