Product | Details | Total |
---|---|---|
![]() | Rs4,500.00 | |
![]() | Risk Aware Query Replacement Approach For Secure Databases Performance Management Rs3,000.00 Risk Aware Query Replacement Approach For Secure Databases Performance Management. Large amount of data… | Rs3,000.00 |
![]() | Images as Occlusions of Textures A Frame work +B74 for Segmentation Rs3,000.00 TImages as Occlusions of Textures: A Framework for Segmentation. We propose a new mathematical and… | Rs3,000.00 |
![]() | A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks Rs4,500.00 Mobile Ad hoc Networks (MANET) are selfconfiguring, infrastructureless, dynamic wireless networks in which the… | Rs4,500.00 |
![]() | Compact Conformal Map for Greedy Routing in Wireless Mobile Sensor Networks Rs4,500.00 Motivated by mobile sensor networks as in participatory sensing applications, we are interested in developing… | Rs4,500.00 |
![]() | Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Rs3,500.00 The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes… | Rs3,500.00 |
Cart totals
Add a coupon
SubtotalRs23,000.00
9% CGSTRs2,070.00
9% SGSTRs2,070.00
Total
Rs27,140.00