“Secure Sensitive Data Sharing on a Big Data Platform” has been added to your cart. Continue shopping “Hybrid Clustering Scheme for Drone based Cognitive Internet of Things” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Detection and Prevention of Wormhole Attack Manet ₹3,500 Detection and Prevention of Wormhole Attack Manet quantity ₹3,500 × An 8T Low-Voltage and Low-Leakage Half-Selection Disturb-Free SRAM Using Bulk-CMOS and FinFETs ₹4,500 An 8T Low-Voltage and Low-Leakage Half-Selection Disturb-Free SRAM Using Bulk-CMOS and FinFETs quantity ₹4,500 × SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays ₹4,500 SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays quantity ₹4,500 × A Survey on Blood Vessel detection Methodologies in Retinal Images ₹4,500 A Survey on Blood Vessel detection Methodologies in Retinal Images quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × UWB Antenna for Brain stroke and Brain Tumour Detection ₹5,500 UWB Antenna for Brain stroke and Brain Tumour Detection quantity ₹5,500 × Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework ₹4,500 Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework quantity ₹4,500 × Self-Deployment of Mobile Sensors to Achieve Target Coverage in the Presence of Obstacles ₹5,500 Self-Deployment of Mobile Sensors to Achieve Target Coverage in the Presence of Obstacles quantity ₹5,500 × An Energy-Ef?cient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks ₹4,500 An Energy-Ef?cient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × A Multi-Interface Multi-Channel Routing (MMCR) Protocol for Wireless Ad Hoc Networks ₹4,500 A Multi-Interface Multi-Channel Routing (MMCR) Protocol for Wireless Ad Hoc Networks quantity ₹4,500 × Sum capacity maximization for MIMO?OFDMA based cognitive radio networks ₹3,500 Sum capacity maximization for MIMO?OFDMA based cognitive radio networks quantity ₹3,500 × Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services ₹4,500 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services quantity ₹4,500 × Pupil Dynamics for Iris Liveness Detection ₹3,500 Pupil Dynamics for Iris Liveness Detection quantity ₹3,500 × New power-Aware multicast for mobile Adhoc networks ₹5,500 New power-Aware multicast for mobile Adhoc networks quantity ₹5,500 × Data Mining for Patient Friendly Apnea Detection ₹4,500 Data Mining for Patient Friendly Apnea Detection quantity ₹4,500 × User-Defined Privacy Grid System for Continuous Location-Based Services ₹4,500 User-Defined Privacy Grid System for Continuous Location-Based Services quantity ₹4,500 × Design Space?Time Trellis-Coded Intercarrier Interference Parallel Cancelation Architectures for OFDM Systems ₹4,500 Design Space?Time Trellis-Coded Intercarrier Interference Parallel Cancelation Architectures for OFDM Systems quantity ₹4,500 × Secure Sensitive Data Sharing on a Big Data Platform ₹4,500 Secure Sensitive Data Sharing on a Big Data Platform quantity ₹4,500 × Hybrid Clustering Scheme for Drone based Cognitive Internet of Things ₹4,500 Hybrid Clustering Scheme for Drone based Cognitive Internet of Things quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹90,000 Total ₹90,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout