Research Article

Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications

Figure 6

The ranking pyramid of the support components using Q-analysis.