11 Questions 8 Answers 0 Followers
Questions related from Sameer Hameed Abdulshaheed
publishing journal
27 August 2019 7,769 8 View
In mamdani the input and output are similar, in sugeno the output is linear or constant while the input is membership function
13 August 2014 9,825 4 View
tools which help to measure the complexity (level of security) to encryption design, to other type of time complexity.
17 February 2014 1,010 6 View
In fuzzy inference process with example
12 February 2014 6,912 4 View
The correlation attack is one of the most important attacks that attacks stream cipher. Can someone share an illustrative example of a simple application process for this attack.
12 February 2014 5,371 3 View
Thanks.
09 February 2014 1,685 12 View
In fuzzification stage how to be determined number of linguistic variables
08 February 2014 6,367 2 View
In non-linear combination stream cipher.
21 January 2014 9,412 1 View
.
01 January 2014 6,900 13 View
In stream cipher encryption
12 December 2013 1,902 1 View
Bluetooth security
20 January 2013 4,947 2 View