11 Questions 8 Answers 0 Followers
Questions related from Sameer Hameed Abdulshaheed
publishing journal
27 August 2019 7,751 8 View
In mamdani the input and output are similar, in sugeno the output is linear or constant while the input is membership function
13 August 2014 9,815 4 View
tools which help to measure the complexity (level of security) to encryption design, to other type of time complexity.
17 February 2014 999 6 View
In fuzzy inference process with example
12 February 2014 6,880 4 View
The correlation attack is one of the most important attacks that attacks stream cipher. Can someone share an illustrative example of a simple application process for this attack.
12 February 2014 5,359 3 View
Thanks.
09 February 2014 1,677 12 View
In fuzzification stage how to be determined number of linguistic variables
08 February 2014 6,358 2 View
In non-linear combination stream cipher.
21 January 2014 9,404 1 View
.
01 January 2014 6,894 13 View
In stream cipher encryption
12 December 2013 1,892 1 View
Bluetooth security
20 January 2013 4,935 2 View