- DocumentLECT-3 Requirement Analysisuploaded byIsha Keshav
- DocumentLECT2 Mod-1 Paer-2 Life Cycle models (1)uploaded byIsha Keshav
- DocumentFlow Contol Notesuploaded byIsha Keshav
- DocumentChapter 1- Introduction to neuro-fuzzy and soft computing (1)uploaded byIsha Keshav
- Document3 Cryptographic Attacksuploaded byIsha Keshav
- Document2 Different Types of Ciphersuploaded byIsha Keshav