Image Encryption Using Block Cipher Based Serpent Algorithm
Image Encryption Using Block Cipher Based Serpent Algorithm

Yossra Hussain Ali; Haider Aabdali Ressan

Volume 34, 2B , February 2016, , Page 278-286

https://doi.org/10.30684/etj.34.2B.10

Abstract
  In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A ...  Read More ...
Aircraft Pitch Control Using Type-2 Fuzzy Logic
Aircraft Pitch Control Using Type-2 Fuzzy Logic

Yamama A.shafeek

Volume 33, 3A , April 2015, , Page 668-681

https://doi.org/10.30684/etj.33.3A.12

Abstract
  Modern aircrafts design is tending to employ automatic control in their every part.In this paper, an autopilot is designed to control the pitch of an aircraft using both PD-like type-1 ...  Read More ...
Design of Type-2 Fuzzy Logic Controller for a Simple Furnace System
Design of Type-2 Fuzzy Logic Controller for a Simple Furnace System

Saba T. Salim

Volume 30, Issue 8 , April 2012, , Page 1306-1317

https://doi.org/10.30684/etj.30.8.2

Abstract
  Model uncertainty and robustness have been a central theme in the field of automatic control. Many control techniques are used to reduce the effects of uncertainty which may appear ...  Read More ...
Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network
Proposed 256 bits RC5 Encryption Algorithm Using Type-3 Feistel Network

Yossra H. Ali

Volume 28, Issue 12 , June 2010, , Page 2337-2352

https://doi.org/10.30684/etj.28.12.5

Abstract
  Proposed 256 bits RC5 is an improvement to RC5, designed to meetthe requirements of increased security and better performance. Proposed256 bits RC5 algorithm makes use of data dependent ...  Read More ...