Research Article
A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques
Figure 2
Clustered output for proposed algorithms on all three datasets: (a) s = 15 and k = 50; (b) s = 10 and k = 50; (c) s = 5 and k = 50; (d) s = 100 and k = 10; (e) s = 10 and k = 50; (f) k = 300.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |