Research Article

Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications

Table 11

Irregularity of the cryptography objectives’ parameters in the data matrix A for .


and 4.3330.72
1.3330.26
0.3330.06