“Joint Physical-Layer and System-Level Power Management for Delay-Sensitive Wireless Communications” has been added to your cart. Continue shopping “Error analysis for high data rate applications using Welch?s power spectral by Cognitive Radio Users” has been added to your cart. Continue shopping “A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Low Power Address Generator for Memory Built-In Self Test ₹4,500 Low Power Address Generator for Memory Built-In Self Test quantity ₹4,500 × Secure Sensitive Data Sharing on a Big Data Platform ₹4,500 Secure Sensitive Data Sharing on a Big Data Platform quantity ₹4,500 × Dynamic Cluster Head Selection Method for Wireless Sensor Network ₹5,500 Dynamic Cluster Head Selection Method for Wireless Sensor Network quantity ₹5,500 × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 × A Survey on Blood Vessel detection Methodologies in Retinal Images ₹4,500 A Survey on Blood Vessel detection Methodologies in Retinal Images quantity ₹4,500 × Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm ₹4,500 Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm quantity ₹4,500 × Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data ₹4,500 Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × CSR: Classi?ed Source Routing in DHT-Based Networks ₹4,500 CSR: Classi?ed Source Routing in DHT-Based Networks quantity ₹4,500 × Stocks Market Prediction Using Support Vector Machine ₹4,500 Stocks Market Prediction Using Support Vector Machine quantity ₹4,500 × Joint Physical-Layer and System-Level Power Management for Delay-Sensitive Wireless Communications ₹4,500 Joint Physical-Layer and System-Level Power Management for Delay-Sensitive Wireless Communications quantity ₹4,500 × Error analysis for high data rate applications using Welch?s power spectral by Cognitive Radio Users ₹5,500 Error analysis for high data rate applications using Welch?s power spectral by Cognitive Radio Users quantity ₹5,500 × A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold ₹3,500 A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold quantity ₹3,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹64,000 Total ₹64,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout