11 Questions 8 Answers 0 Followers
Questions related from Sameer Hameed Abdulshaheed
publishing journal
27 August 2019 7,745 8 View
In mamdani the input and output are similar, in sugeno the output is linear or constant while the input is membership function
13 August 2014 9,805 4 View
tools which help to measure the complexity (level of security) to encryption design, to other type of time complexity.
17 February 2014 990 6 View
In fuzzy inference process with example
12 February 2014 6,850 4 View
The correlation attack is one of the most important attacks that attacks stream cipher. Can someone share an illustrative example of a simple application process for this attack.
12 February 2014 5,356 3 View
Thanks.
09 February 2014 1,669 12 View
In fuzzification stage how to be determined number of linguistic variables
08 February 2014 6,352 2 View
In non-linear combination stream cipher.
21 January 2014 9,396 1 View
.
01 January 2014 6,892 13 View
In stream cipher encryption
12 December 2013 1,890 1 View
Bluetooth security
20 January 2013 4,924 2 View