Product | Details | Total |
---|---|---|
![]() | Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison Rs3,000.00 As the technology trends to continuously shrink from small scale integration (SSI) to very large… | Rs3,000.00 |
![]() | Rs3,500.00 | |
![]() | On the Energy Efficiency and Effective Throughput Tradeoff of Fading Channels Rs4,500.00 The tradeoff between the energy efficiency (EE) and the effective throughput (ET) of fading… | Rs4,500.00 |
![]() | Design and implementation of efficient integrity protection for open mobile platforms Rs3,000.00 Design and implementation of efficient integrity protection for open mobile platforms. The security of… | Rs3,000.00 |
![]() | Combining Generative and Discriminative Representation Learning for Lung CT Analysis with Convolutional Restricted Boltzmann Rs4,500.00 The choice of features greatly influences the performance of a tissue classification system. Despite… | Rs4,500.00 |
![]() | Rs4,500.00 | |
![]() | PROVEST: Provenance-based Trust Model for Delay Tolerant Networks Rs4,500.00 Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity… | Rs4,500.00 |
Cart totals
Add a coupon
SubtotalRs27,500.00
9% CGSTRs2,475.00
9% SGSTRs2,475.00
Total
Rs32,450.00