Research Article
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications
Table 16
Ranking the implementation techniques of the cryptography algorithms considering various alpha-cuts using Q-analysis.
| Equivalence classes for the parameters with minimum relationship level (qā=ā0) | |
| Basic sciences | | Key | | Hardware and steganography | | Avalanche effect and hybrid method | | {Artificial intelligence, software}, {occupation area, energy consumption, memory consumption} | |
|
|