Products in cart

ProductDetailsTotal
Swiper Exploiting Virtual Machine Vulnerability in Third-Party
Swiper Exploiting Virtual Machine Vulnerability in Third-Party
Rs3,000.00
Rs3,000.00
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
Best peer Peer to peer Based large scale data processing platform
Rs3,000.00
Rs3,000.00
A Similarity-Based Learning Algorithm Using Distance Transformation
Backward Path Growth for Efficient Mobile Sequential Recommendation
Rs3,000.00
Rs3,000.00
Analysis and Design of an E-Band Transformer-Coupled Low-Noise Quadrature VCO in 28-nm CMOS
A 65 nm Cryptographic Processor for High Speed Pairing Computation
Rs3,500.00
Rs3,500.00
Analysis and Design of an E-Band Transformer-Coupled Low-Noise Quadrature VCO in 28-nm CMOS
High-Throughput LDPC-Decoder Architecture Using Efficient Comparison Techniques & Dynamic Multi-Frame Processing Schedule
Rs3,500.00
Rs3,500.00

Cart totals

SubtotalRs16,000.00
9% CGSTRs1,440.00
9% SGSTRs1,440.00