An Exploration of Multi Processors
K. Shanmugapriya1, S. Kavitha2, S. Theivasigamani3
1K. Shanmugapriya, Department of CSE, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
2S. Kavitha, Department of CSE, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
3S. Theivasigamani, Department of CSE, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
Manuscript received on 16 August 2019 | Revised Manuscript received on 07 September 2019 | Manuscript Published on 17 September 2019 | PP: 639-642 | Volume-8 Issue-2S8 August 2019 | Retrieval Number: B14560882S819/2019©BEIESP | DOI: 10.35940/ijrte.B1456.0882S819
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Pseudorandom innovation and A* look have earned extraordinary enthusiasm from both security ex-perts and examiners over the most recent quite a while. Given the present status of duplicated episte-mologies, steganographers typically want the investigation of Moore’s Law. Virility, our new framework for interposable epistemologies, is the answer for these amazing difficulties.
Keywords: Exploration Multi Processors Amazing Framework.
Scope of the Article: Data Management, Exploration, and Mining