Research Article

Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications

Table 16

Ranking the implementation techniques of the cryptography algorithms considering various alpha-cuts using Q-analysis.

Equivalence classes for the parameters with minimum relationship level (qā€‰=ā€‰0)

Basic sciences
Key
Hardware and steganography
Avalanche effect and hybrid method
{Artificial intelligence, software}, {occupation area, energy consumption, memory consumption}