“An efficient multi-channel MAC protocol for wireless adhoc networks” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Network Intrusion Detection for IoT Security based on Learning Techniques ₹4,500 Network Intrusion Detection for IoT Security based on Learning Techniques quantity ₹4,500 × Supervised Classification Analysis with Information-Theoretic Methods ₹4,500 Supervised Classification Analysis with Information-Theoretic Methods quantity ₹4,500 × Application of Data Mining Techniques in Weather Prediction and Climate Change Studies ₹4,500 Application of Data Mining Techniques in Weather Prediction and Climate Change Studies quantity ₹4,500 × Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm ₹4,500 Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm quantity ₹4,500 × User-Defined Privacy Grid System for Continuous Location-Based Services ₹4,500 User-Defined Privacy Grid System for Continuous Location-Based Services quantity ₹4,500 × A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ₹4,500 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing quantity ₹4,500 × Securing Cognitive Radio Networks against Primary User Emulation Attacks ₹4,500 Securing Cognitive Radio Networks against Primary User Emulation Attacks quantity ₹4,500 × An efficient multi-channel MAC protocol for wireless adhoc networks ₹5,500 An efficient multi-channel MAC protocol for wireless adhoc networks quantity ₹5,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹37,000 Total ₹37,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout