11 Questions 8 Answers 0 Followers
Questions related from Sameer Hameed Abdulshaheed
publishing journal
27 August 2019 7,726 8 View
In mamdani the input and output are similar, in sugeno the output is linear or constant while the input is membership function
13 August 2014 9,794 4 View
tools which help to measure the complexity (level of security) to encryption design, to other type of time complexity.
17 February 2014 971 6 View
In fuzzy inference process with example
12 February 2014 6,828 4 View
The correlation attack is one of the most important attacks that attacks stream cipher. Can someone share an illustrative example of a simple application process for this attack.
12 February 2014 5,348 3 View
Thanks.
09 February 2014 1,652 12 View
In fuzzification stage how to be determined number of linguistic variables
08 February 2014 6,337 2 View
In non-linear combination stream cipher.
21 January 2014 9,378 1 View
.
01 January 2014 6,887 13 View
In stream cipher encryption
12 December 2013 1,883 1 View
Bluetooth security
20 January 2013 4,906 2 View