Product | Details | Total |
---|---|---|
![]() | Face recognition under varying illumination based on adaptive homomorphic eight local directional patterns Rs3,500.00 Spoofing attacks are one of the security traits that biometric recognition systems are proven to… | Rs3,500.00 |
![]() | RIHT A novel Hybrid IP Traceback scheme Rs2,500.00 Because the Internet has been widely applied in various fields, more and more network security… | Rs2,500.00 |
![]() | NDCMC: A Hybrid Data Collection Approach for Large-Scale WSNs Using Mobile Element and Hierarchical Clustering Rs4,500.00 To collect data from large-scale wireless sensor networks (WSNs) is a challenging issue and… | Rs4,500.00 |
![]() | Zone Trust Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using SHT Rs2,500.00 Abstract—Due to the unattended nature of wireless sensor networks, an adversary can physically capture and… | Rs2,500.00 |
![]() | Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks Tractable Approximations by Conic Optimization Rs3,500.00 This paper considers robust transmit beamforming for multiuser multi-input single-output (MISO) downlink transmission, where imperfect… | Rs3,500.00 |
![]() | Generalized Code Index Modulation Technique for High-Data-Rate Communication Systems Rs4,500.00 A generalized code index modulation (CIM) technique for direct-sequence spread spectrum (DSSS) communication. In particular… | Rs4,500.00 |
Cart totals
Add a coupon
SubtotalRs21,000.00
9% CGSTRs1,890.00
9% SGSTRs1,890.00
Total
Rs24,780.00