Product | Details | Total |
---|---|---|
![]() | Exposing Postprocessed Copy-Paste Forgeries Through Transform Invarient Features Rs2,500.00 The easy accessibility of advanced image editing software and powerful computing hardware. Various types of… | Rs2,500.00 |
![]() | Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration Previous price: Save Rs1,000.00 Machine Learning Algorithms-based “Network Intrusion Detection System” is a soft device that monitors computer networks… | Rs5,500.00 |
![]() | Machine Learning Approach to Personality Type Prediction Based on the Myers-Briggs Type Indicator Rs5,000.00 Neuro Linguistic Programming (NLP) is a collection of techniques for personality development. Meta programmes, which… | Rs5,000.00 |
![]() | Energy-Price-Driven Request Dispatching for Cloud Data Centers Rs2,500.00 Energy-price-driven request dispatcher that forwards client requests to data centers in an electric-cost-saving way. We… | Rs2,500.00 |
![]() | Wormhole Attack Detection Algorithms in WirelessNetwork Coding Systems Rs3,000.00 As attacks become more frequently in mobile networks, deploying an efficient defense system to protect… | Rs3,000.00 |
Cart totals
Add a coupon
SubtotalRs18,500.00
9% CGSTRs1,665.00
9% SGSTRs1,665.00
Total
Rs21,830.00