Product | Details | Total |
---|---|---|
![]() | Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison Rs3,000.00 As the technology trends to continuously shrink from small scale integration (SSI) to very large… | Rs3,000.00 |
![]() | Rs3,500.00 | |
![]() | On the Energy Efficiency and Effective Throughput Tradeoff of Fading Channels Rs4,500.00 The tradeoff between the energy efficiency (EE) and the effective throughput (ET) of fading… | Rs4,500.00 |
![]() | Design and implementation of efficient integrity protection for open mobile platforms Rs3,000.00 Design and implementation of efficient integrity protection for open mobile platforms. The security of… | Rs3,000.00 |
![]() | Combining Generative and Discriminative Representation Learning for Lung CT Analysis with Convolutional Restricted Boltzmann Rs4,500.00 The choice of features greatly influences the performance of a tissue classification system. Despite… | Rs4,500.00 |
![]() | Rs4,500.00 | |
![]() | PROVEST: Provenance-based Trust Model for Delay Tolerant Networks Rs4,500.00 Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity… | Rs4,500.00 |
![]() | Modeling, Modulation, and Control of the Three-Phase Four-Switch PWM Rectifier under Balanced voltage Rs4,500.00 The modeling, modulation, and control of the threephase four-switch (TPFS) PWM rectifier are investigated… | Rs4,500.00 |
Cart totals
Add a coupon
SubtotalRs32,000.00
9% CGSTRs2,880.00
9% SGSTRs2,880.00
Total
Rs37,760.00