11 Questions 8 Answers 0 Followers
Questions related from Sameer Hameed Abdulshaheed
publishing journal
27 August 2019 7,764 8 View
In mamdani the input and output are similar, in sugeno the output is linear or constant while the input is membership function
13 August 2014 9,822 4 View
tools which help to measure the complexity (level of security) to encryption design, to other type of time complexity.
17 February 2014 1,007 6 View
In fuzzy inference process with example
12 February 2014 6,909 4 View
The correlation attack is one of the most important attacks that attacks stream cipher. Can someone share an illustrative example of a simple application process for this attack.
12 February 2014 5,366 3 View
Thanks.
09 February 2014 1,684 12 View
In fuzzification stage how to be determined number of linguistic variables
08 February 2014 6,364 2 View
In non-linear combination stream cipher.
21 January 2014 9,411 1 View
.
01 January 2014 6,899 13 View
In stream cipher encryption
12 December 2013 1,899 1 View
Bluetooth security
20 January 2013 4,944 2 View