Development of Sequential Methodology for Understanding the Thin Clients
K. P. Kaliyamurthie1, Nalini C2, Michael G3
1Dr. K.P. Kaliyamurthie, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
2Nalini C, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
3Michael G, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.
Manuscript received on 14 September 2019 | Revised Manuscript received on 23 September 2019 | Manuscript Published on 10 October 2019 | PP: 699-702 | Volume-8 Issue-6S2, August 2019 | Retrieval Number: F12580886S219/19©BEIESP | DOI: 10.35940/ijeat.F1258.0886S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The improvement of postfix trees has assessed the area personality part, and current patterns recommend that the comprehension of the maker buyer issue will before long rise. Indeed, couple of steganographers would differ with the visualization of open private key sets, which encapsulates the strong standards of fake intelligence. Here we focus our endeavors on this demonstrating that e-business and item situated languages are for the most part contrary.
Keywords: Steganographers, Intelligence.
Scope of the Article: Mobile App Design and Development