|
other_w |
2014 |
Multidisplinary perspectives in cryptology and information security |
م . صبيحه فاضل جواد |
Chapter 6: FUZZY LOGIC Based SECURITY EVALUATION of STREAM CIPHER-pages 157-178 |
1 |
|
other_w |
2015 |
book-Application of Meta-Heuristic Optimization Algorithms in Electric Power Systems |
م . صبيحه فاضل جواد |
Fuzzy Logic-Based Security Evaluation of Stream Cipher (pages 277-298)-Chapter13 |
2 |
|
scopus |
2018 |
IEEExplore -pages 76-80 |
م . صبيحه فاضل جواد |
Handwritten Recognition based on Hybrid ANN and Wavelet Transformation |
3 |
|
local |
2011 |
Journal of Basrah Researches ((Sciences)) Volume 37 , ISSue 4 |
م . صبيحه فاضل جواد |
1- Complexity Evaluation of Knapsack Crypto System using Fuzzy Set |
4 |
|
local |
2013 |
مجلة كلية التربيه |
م . صبيحه فاضل جواد |
المنطق المضبب وقابلية تطبيقه في عدد من المجالات العلمية |
5 |
|
scopus |
17-6-2017 |
IEEE Explorer |
م . صبيحه فاضل جواد |
Intelligent Network used in Distributed Computer Systems |
6 |