Research Article

An Efficient Security System for Mobile Data Monitoring

Figure 6

Runtime of each subset with the same length.