“DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data” has been added to your cart. Continue shopping “Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays ₹4,500 SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays quantity ₹4,500 × Low Power Address Generator for Memory Built-In Self Test ₹4,500 Low Power Address Generator for Memory Built-In Self Test quantity ₹4,500 × Broadband Dual-Polarization and Stable-Beamwidth Slot Antenna Fed by U-Shape Microstrip Line ₹5,500 Broadband Dual-Polarization and Stable-Beamwidth Slot Antenna Fed by U-Shape Microstrip Line quantity ₹5,500 × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Data Mining for Patient Friendly Apnea Detection ₹4,500 Data Mining for Patient Friendly Apnea Detection quantity ₹4,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × New power-Aware multicast for mobile Adhoc networks ₹5,500 New power-Aware multicast for mobile Adhoc networks quantity ₹5,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation ₹4,500 Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation quantity ₹4,500 × Visual voice activity detection as a help for speech source separation from convolutive mixtures ₹4,500 Visual voice activity detection as a help for speech source separation from convolutive mixtures quantity ₹4,500 × On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users ₹4,500 On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users quantity ₹4,500 × QoS-aware Node Selection Algorithm for Routing Protocols in VANETs ₹4,500 QoS-aware Node Selection Algorithm for Routing Protocols in VANETs quantity ₹4,500 × Enhancing Heart-Beat-Based Security for mHealth Applications ₹4,500 Enhancing Heart-Beat-Based Security for mHealth Applications quantity ₹4,500 × Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm ₹4,500 Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm quantity ₹4,500 × DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data ₹4,500 DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data quantity ₹4,500 × Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm ₹4,500 Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹78,500 Total ₹78,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout