Product | Details | Total |
---|---|---|
![]() | VLSI Design for SVM-Based Speaker Verification System Rs3,500.00 This brief presents the chip implementation of a support vector machine (SVM)-based speaker verification system… | Rs3,500.00 |
![]() | Hospital Management System Rs6,500.00 Here web based technology offers many online services in almost every field. Almost everything can… | Rs6,500.00 |
![]() | A Pre Authentication Approach to Proxy Re encryption in Big Data Context Rs3,500.00 With the growing amount of data, the demand of big data storage significantly increases. Through… | Rs3,500.00 |
![]() | Fuzzy Identity Based Data Integrity Auditing for Reliable Cloud Storage System Rs3,500.00 Data integrity, a core security issue in reliable cloud storage, has received much attention. Data… | Rs3,500.00 |
![]() | Efficient Distance Aware Influence Maximization in Geo Social Networks Rs3,500.00 As the proliferation of geo-social networks, location-aware promotion is becoming more necessary in real applications… | Rs3,500.00 |
![]() | Exploring a Fine-Grained Multiscale Method for Cross-Modal Remote Sensing Image Retrieval Previous price: Save Rs1,000.00 Content-Based Image Retrieval (CBIR) is an approach of retrieving similar images from a large image… | Rs5,500.00 |
![]() | Dynamic Vulnerability Detection on Smart Contracts Using Machine Learning Previous price: Save Rs1,000.00 In this work we propose Dynamit, a monitoring framework to detect reentrancy vulnerabilities in Ethereum… | Rs5,500.00 |
Cart totals
Add a coupon
SubtotalRs31,500.00
9% CGSTRs2,835.00
9% SGSTRs2,835.00
Total
Rs37,170.00