“Relevance Feature Discovery for Text Mining” has been added to your cart. Continue shopping “Supervised Classification Analysis with Information-Theoretic Methods” has been added to your cart. Continue shopping “Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × Supervised Classification Analysis with Information-Theoretic Methods ₹4,500 Supervised Classification Analysis with Information-Theoretic Methods quantity ₹4,500 × Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers ₹4,500 Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹18,000 Total ₹18,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout