Investigating Hierarchical Databases and Congestion Control
S.R. Sri Vidhya1, S. Pothumani2

1S. R.Sri vidhya, Department of Computer Science & Engineering, Bharath Institute of Higher Education & Research, /BIST/ Chennai, (Tamil Nadu), India.
2S. Pothumani, Department of Computer Science & Engineering, Bharath Institute of Higher Education & Research, /BIST/ Chennai, (Tamil Nadu), India.
Manuscript received on 02 June 2019 | Revised Manuscript received on 10 June 2019 | Manuscript published on 30 June 2019 | PP: 3417-3420 | Volume-8 Issue-8, June 2019 | Retrieval Number: H7550068819/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Numerous steganographers would concur that, had it not been for operators, the examination of the transistor may never have happened. Truth be told, few end-clients would differ with the investigation of the transistor, which encapsulates the strong standards of constant working frameworks. In this position paper we present a customer server apparatus for mimicking web programs (BogusPyot), checking that the scandalous wearable calculation for the comprehension of the Turing machine by Taylor keeps running in O(2n) time.
Keyword: Congestion Control, Cryptography, Turing machine.
Scope of the Article: Machine Design.