“Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation” has been added to your cart. Continue shopping “Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks ₹4,500 Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks quantity ₹4,500 × Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework ₹4,500 Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework quantity ₹4,500 × Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm ₹4,500 Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm quantity ₹4,500 × A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold ₹3,500 A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold quantity ₹3,500 × A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ₹4,500 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing quantity ₹4,500 × A Survey on Blood Vessel detection Methodologies in Retinal Images ₹4,500 A Survey on Blood Vessel detection Methodologies in Retinal Images quantity ₹4,500 × An Optimal Scheduling Algorithm for Maximizing Throughput in WiMAX Mesh Networks ₹4,500 An Optimal Scheduling Algorithm for Maximizing Throughput in WiMAX Mesh Networks quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × Energy-Efficient Configuration of spatial and frequency Resources in MIMO_OFDMA Systems ₹4,500 Energy-Efficient Configuration of spatial and frequency Resources in MIMO_OFDMA Systems quantity ₹4,500 × DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments ₹4,500 DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments quantity ₹4,500 × QoS-aware Node Selection Algorithm for Routing Protocols in VANETs ₹4,500 QoS-aware Node Selection Algorithm for Routing Protocols in VANETs quantity ₹4,500 × Lifetime & Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks ₹5,500 Lifetime & Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks quantity ₹5,500 × Stocks Market Prediction Using Support Vector Machine ₹4,500 Stocks Market Prediction Using Support Vector Machine quantity ₹4,500 × CSR: Classi?ed Source Routing in DHT-Based Networks ₹4,500 CSR: Classi?ed Source Routing in DHT-Based Networks quantity ₹4,500 × Low-Complexity Channel Estimation and Detection for MIMO-OFDM Receiver With ESPAR Antenna ₹5,500 Low-Complexity Channel Estimation and Detection for MIMO-OFDM Receiver With ESPAR Antenna quantity ₹5,500 × Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation ₹4,500 Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation quantity ₹4,500 × Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data ₹4,500 Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹82,000 Total ₹82,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout