Volume-7 (Second International Conference on Emerging Trends in Engineering' 2013)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | "ADOPTION OF SYNCHROPHASOR TECHNOLOGY IN INDIAN GRID TO AVOID GRID FAILURES & BLACKOUTS |
Country | : | India |
Authors | : | Dr.D.P.KOTHARI Ph.D , DR.PRAVEEN Ph.D, K.K.JAIN (Ph.D), |
Abstract:India suffered a major grid disturbance in northern region at night at 02:33hrs on 30th July 2012 and further severe disturbance occurred at 13hrs on31st July resulting collapse of 48000MW of power in North, East& North-East Regions EXCEPT Western& South Regions. This grid disturbance affected normal life of 60crore population of the country for more than 8hrs.This has necessitated our grid system for modernization and development to the level of a smart grid by deploying synchrophasor technology which is world wide accepted as a solution towards future blackouts and grid failures. This is a ultra fast measurement system of grid parameters which would be 100 Times faster then present SCADA/EMS system. Adoption of this technology is been done in phased manner in coming 10years by 2022.This paper deals with present status of grid system and complicated structure to be dealt in future with coming IPPS and UMPPS and renewable energy generation to be added to the system for efficient grid operation.
Keywords: Synchrophasor technology, wide area measurement systems (WAMS).
1. Modern Power System Analysis [Fourth Edition] by D P Kothari &I J Nagrath.
2. Arun Phadke,"Synchronized Phasors" article"IEEE Computer Applications in Power",April 1993.
3. V.K.Agarwal and P.K.Agarwal,[Power Grid,India Limited]"commissioning of PMU's Pilot project in north regiojn of India",Nation Power System Conference 2010,India.
4. IEEE Standard C37.118-2005,IEEE Standard for Power Systems.
5. WebSites
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | CAD System for Lung Cancer Detection using ANN |
Country | : | India |
Authors | : | Shamala B.Terdale, K.V.Kulhalli |
Abstract: Lung Cancer is the leading cause of death in both men and women throughout the world. It spreads rapidly after it forms. The survival rate of patient is very less. If the disease is identified while it is still localized the survival rate of the patient can be improved greatly. In this paper, we represent computer aided diagnosis(CAD) system for detection of lung cancer by analyzing CT images of chest. CAD system helps to improve the diagnostic performance of radiologists in their image interpretations. The first stage of CAD system is segmentation of lung region from lung CT image which is nothing but first region of interest(ROI). The first ROI is obtained using region based approach and it gives good segmentation result in short time. To distinguish between true and false candidate nodules we have used Artificial Neural network. The proposed CAD system is capable of detecting lung nodules with diameter ≥ 2mm. the obtained results are good and satisfactory.
Keywords - Artificial Neural Network, Computer Aided diagnosis(CAD), Medical Image processing, Region growing, ROI, Segmentation
[1] Ramnath Takiar , Deenu Nadayil, a Nandakumar," Projection of number of cancer cases in India (2010-2020) by Cancer Groups", Asian Pacific Journal of Cancer Prevention, Vol 11,2010. [2] Rachid Sammouda, Jamal Abu Hassan , Mohamed Sammouda, Abdulridha Al-Zuhairatem abou ElAbbas , "Computer Aided Diagnosis System for Early detection of Lung Cancer Using Chest Computer Tomography Images" ,GVIP 05 Conference,19-20 December 2005,CICC,Cairo,Egypt. [3] JIA Tong, ZHAO Da-Zhe, WEI Ying, ZHU Xin-Hua, WANG Xu, "Computer-Aided Lung Nodule Detection Based On CT Images", IEEE/ICME International Conference on Complex Medical Engineering, 2007.
[4] Tetsuya Tozaki, Yoshiki Kawata, Noboru Niki,Hironobu Ohmatsu,Kenji Eguchi, Noriyuki Moriyama,"3D Image Analysis of The Lung Area Using Thin Section CT Images and Its Application To differential diagnosis" , IEEE 1996. [5] S.A.Patil, Dr. V.R. Udupi ,Dr. C.D. Kane , Dr. A.I.Wasif, Dr.J.V.Desai,A.N.Jadhav, " Geometrical and Texture Feature Estimation of Lung Cancer And TB Image Using Chest X-ray Database", IEEE 2009. [6] M.Gomathi , Dr. P. Thangaraj, "A Computer Aided Diagnosis System for Detection of Lung Cancer Nodules Using Extreme Learning Machine" , International Journal of Engineering Science And Technology Vol.2(10),2010. [7] Penedo, M.G., Carreira, M.J., Mosquera, A. and Cabello, D., "Computer-Aided Diagnosis: ANeural-Network-Based Approach to Lung Nodule Detection", IEEE Transactions on Medical Imaging, Pp: 872 – 880, 1998.
[8] Fatma Taher ,Rachid Sammouda, "Identification of Lung Cancer Based On Shape and Color"- IEEE 2008.
[9] Azian azamimi Abdulla, Syamimi Mardiah Shaharum," Lung Cancer Cell Classification Method using Artificial Neural Network", information Engineering Letters ,Vol. 2 No.1 March 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparison between Blind Deconvolution of images using wavelet analysis and using Gabor filter & Independent Component Analysis |
Country | : | India |
Authors | : | Prof. Archana N. Ulmek , Prof. Chougule D.G. |
Abstract: The image restoration is to estimate an original image from the image degraded by blurring and noise. The degrading process is usually modeled as a convolution of a Point Spread Function (PSF) with an original image. In this paper we compared two prominent methods of blind deconvolution. One uses wavelet analysis and second method uses Gabor filter & Independent Component Analysis (ICA). Method using wavelet analysis does not remove noise. Blind deconvolution using Gabor filter & Independent Component Analysis even though is complex, gives superior results as compared to wavelet analysis.
Keywords – Blind deconvolution, PSF, Gabor filter, Image Restoration
2. Jean-Marc Conan, Thierry Fusco, Laurent M. Mugnier, Evy Kersal´e and Vincent Michau, "Deconvolution of adaptive optics images with imprecise knowledge of the point spread function: results on astronomical objects", Office National d'´Etudes et de Recherches A´erospatiales (ONERA),D´epartement d'Optique Th´eorique et Appliqu´ee,BP 72, F-92322 Chˆatillon cedex, France
3. Shinji Umeyama, "Blind Deconvolution Of Images Using Gabor Filters And Independent Component Analysis",ICA2003,Nara,Japan
4. "A robust method based on ICA for edge detection in medical images", Springer Verlog London Limited, DOI 10.1007/s11760-009-0140-5
5. Dong-Dong Cao,Ping Guo"Blind image restoration based on wavelet analysis" International conference on machine learning and cybernetics,Guangzhou,August 2005
6. Mark R. Banham, and Aggelos K. katsaggelos, "Digital Image Restoration",IEEE Signal Processing Magazine,pp.24-41 March 1997
7. Coifman RR, and Donoho DL, "Translation-Invariant denoising",Springer-Verlag,1995
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cope with black hole attacks in AODV protocol in MANET by end to end route discovery |
Country | : | India |
Authors | : | Prof.D.S.Patil, Prof.A.M.Ghorpade |
Abstract: Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and capability. The black hole attack which is one of the major possible attacks in AODV routing protocol, in which intermediate node absorbs all the packets instead of sending those to desired destinations and behaves as a black hole and degrades the performance . In this paper AODV is modified in such a way that ,the provision of checking and sending route reply by intermediate node is cancelled. But the destination node after inspecting the RREQ can only reply with RREP to the source node. Thus only one reply message is received to source and that is only from the desired destination. Thus misbehaving of intermediate node i.e. black hole behavior can be reduced and network can be made more reliable and secured.
Keywords - AODV, black hole , intermediate node ,MANET, black hole, RREP,RREQ.
[1]Yibeltal Fantahun Alem and Zhao Cheng Xuan ,Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly
Detection,2nd International Conference on Future Computer and Communication, 2010
[2]Zhao Min and Zhou Jiliu , Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks , International Symposium on
Information Engineering and Electronic Commerce,2009
Books:
[3]C.Siva Ram Murty and B.S.Manoj, Ad-hoc Wireless Networks,Architectures and Protocols (Fourth Edition,Pearson Education,2009 )
Proceedings Paper:
[4]Mehdi Medadian, Ahmad Mebadiand and Elham Shahri, Combat with Black Hole Attack in AODV Routing Protocol , Proceedings of the 2009 IEEE 9th Malaysia International Conference on Communications 15 -17 December 2009 Kuala Lumpur Malasiya.
[5]C.E.Perkins and E.M.Royer, AD-HOC On-Demand Distance Vector Routing, , In proceedings of the 2nd IEEE Workshop on Mobile
Computing Systems and,Applications,p,p . 90-100, New 04- U. Feb. 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | DESIGN OF MAXIMUM POWER POINT TRACKING (MPPT) BASED PV CHARGER |
Country | : | India |
Authors | : | Mr. S. K. Patil , Mr.D.K.Mahadik |
Abstract: Maximum Power Point Tracking (MPPT) is used in photovoltaic systems to maximize the photovoltaic array output power, irrespective of the temperature, irradiation conditions and electrical characteristics of the load. A new MPPT system is developed, consisting of DC to DC converter, which is controlled by a microcontroller based unit. There are two charging stages for the proposed PV charger. At the beginning of the charging process, a continuous MPPT-charging scheme is adopted. When the State of Charge (SOC) of battery reaches a given condition, a pulse-current-charging scheme with an adaptive rest period is applied to obtain an average charging current with an exponential profile. During the charging period, the MPPT function is retained to achieve high charging efficiency. Overcharging of the battery can be avoided using the pulse-charging scheme with adaptive rest period. The main difference between the method used in the MPPT system and other techniques used in the past is that the PV array output power is used to directly control the DC to DC converter, thus reducing the complexity of the system.
Keywords - Charge Controller, Converter, microcontroller, MOSFET, MPPT, PV array
[2] Jui Liang yang, Ding Tsair Su, Ying Shing Shao, "Research on MPPT and single stage grid connected photovoltaic system," WSEAS Transactions on system.
[3] Evans Lampi, Godfray Chinyamma, "Development of microprocessor based charge controller for home photo voltaic system," ATDF
journal, Vol. 2 issue 2, pp 19-22.
[4] A. Daoud, A. Midoun, "Fuzzy control of a lead acid battery charger," Journal of electrical systems, 1-1(2005): pp52-59.
[5] Huang-Jen Chiu, Senior Member, IEEE, Yu-Kang Lo, Member, IEEE, Chun-Jen Yao, and Shih-Jen Cheng, "Design and Implementation
of a Photovoltaic High-Intensity-Discharge Street Lighting System", IEEE Transactions on Power Electronics, Vol. 26, No. 12, December
2011
[6] T. Suntio, J. Lepp¨aaho, J. Huusari, and L. Nousiainen, "Issues on solar generator interfacing with current-fed MPP-tracking
converters", IEEE Transactions Power Electronics., vol. 25, no. 9, pp. 2409-2419, Sep. 2010.
[7] S. J. Chiang, Hsin-Jang Shieh, Member, IEEE, and Ming-Chieh Chen, "Modeling and Control of PV Charger System With SEPIC Converter", IEEE Transactions On Industrial Electronics, Vol.56, No. 11, November 2009.
[8] B. Yang, W. Li, Y. Zhao, and X. He, "Design and analysis of a grid connected photovoltaic power system", IEEE Transactions of Power Electronics, vol. 25, no. 4, pp. 992–1000, April 2010
[9] Mohammad H. Rashid, Power Electronics-Circuit devices and applications, 3rd Edition, Pearson, ISBN 978-81-317-0246-8, 2009, INDIA
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | EEG Based Cognitive Workload Assessment for Maximum Efficiency |
Country | : | India |
Authors | : | Revati Shriram,, Dr. M. Sundhararajan, Nivedita Daimiwal |
Abstract: Modern work requires multitasking and the need for sustained vigilance, which result in work-related stress and increase the possibility of human error. So methods for estimating cognitive overload and mental fatigue of the brain during work performance are needed. Cognitive load (CL) refers to the amount of mental demand imposed by a task on a person, and has been associated with the limited capacity of working memory. It is very important to maintain the optimal cognitive load so as to achieve the maximum efficiency and productivity. So real time non invasive measurement of cognitive load is very important. Physiological measures are good for continuous monitoring of workload levels. Five most important physiological areas to measure workload are: cardiac activity, respiratory activity, eye activity, speech measures, and brain activity. Tracking the level of performance in cognitive tasks may be useful in environments, such as aircraft, where the awareness of the pilots is critical for security. EEG has the potential to identify changes in cognitive load in tasks that require continuous and intensive allocation of attention. This paper describes the usefulness of EEG brain activity in the workload prediction. The important benefit of this method is that it can be used continuously without the interference of any task but the drawback is it requires a special instrument to capture process and interpret the signal.
Keywords - Brain Imaging, Workload, EEG, Cognitive Load, and Theta-Alpha Waveforms.
[2] A.W. Toga, P.M. Thompson, "The Role of Image Registration in Brain Mapping", Image and Vision Computing 19 (2001) 3–24.
[3] Sarah Miller, "National Advanced Driving Simulator", Document ID: N01-006, August 2001.
[4] D Aba´solo, R Hornero, P Espino, D A´ lvarez and J Poza, "Entropy analysis of the EEG background activity in Alzheimer‟s disease patients", Institute Of Physics Publishing Physiological Measurement, Physiol. Meas. 27 (2006) 241–253.
[5] Dr. Fang Chen, "Neuro-ergonomic Research for Online Assessment of Cognitive Workload", Project by National ICT Australia, 2011.
[6] Anu Holm, Kristian Lukander, Jussi Korpela, Mikael Sallinen, and Kiti M. I. Müller, " Estimating brain load from the EEG", The Scientific World JOURNAL, volume 9, pages 639-651, 2009.
[7] Federico Cirett Gal´an and Carole R. Beal, "EEG Estimates of Engagement and Cognitive Workload Predict Math Problem Solving Outcomes", Springer-Verlag Berlin Heidelberg, UMAP 2012, LNCS 7379, pp. 51–62, 2012.
[8] Chris Berka, Daniel J. Levendowski, Caitlin K. Ramsey, Gene Davis, Michelle N. Lumicao, Kay Stanney, Leah Reeves, Susan Harkness Regli, Patrice D. Tremoulet, Kathleen Stibler, "Evaluation of an EEG-workload model in the Aegis simulation environment".
[9] Revati Shriram, M. Sundhararajan, Nivedita Daimiwal, "Brain Connectivity Analysis Methods for Better Understanding of Coupling", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 11, pp 14-21, November 2012
[10] Anne-Marie Brouwer, Maarten A Hogervorst, Jan B F Van Erp, Tobias Heffelaar Patrick H Zimmerman And Robert Oostenveld, "Estimating Workload Using EEG Spectral Power And Erps In The N-Back Task", JOURNAL OF NEURAL ENGINEERING, (2012) 045008 (14pp).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations |
Country | : | India |
Authors | : | Mahesh Yanagimath, Purnima Savadattimath, Balawant Patil |
Abstract: Ethernet is the networking technology used in many offices and homes to enable computers to communicate and share resources. Recent innovations in the Ethernet networking technology are enhancing both the scalability and capability of Ethernet as a carrier-grade and transport technology. This paper explains four main innovations recently added to ethernet, namely improvements related to scalability, OAM functionality and enhanced forwarding capability in order to permit Ethernet to assume a much larger role in carrier networks with substatial economic and operational benefits.
Keywords - Optical Ethernet, Networks, Protocols, Communication Systems, Optical Communication
[1] IEEE Std. 802.1D, ―Local and Metropolitan Area Networks, Media Access Control (MAC) Bridges,‖ 2004.
[2] IETF Internet draft, ―GMPLS control of Ethernet PBB-TE,‖ Nov. 2007 (work in progress), available at draft-fedyk-gmpls-ethernet-pbb-te-02
[3] IETF Internet draft, "Carrying PWE3 Pseudo Wires over Provider Backbone Transport," July 2007 (work in progress) available at draftallan- pw-o-pbt-03.txt. [4] http://www.ieee802.org/1/files/public/docs2007/aqfedyk-provider-link-state-bridging-0107-1.pdf
[5] http://www.nortel.com/pbt
[6] Embedded Ethernet and Internet Complete, Designing and Programming small Devices for Networking, By Jon Axelsonoc. 8th
International Conference Pattern Recognition, Paris (France), 1986, pp. 369-373.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mitigation of harmonics using shunt active filter |
Country | : | India |
Authors | : | Mrs.Chhaya S Bandgar , Ms.Shamal B Patil |
Abstract: Power Quality issues are becoming a major concern of today's power system engineers. Harmonics play significant role in deteriorating power quality, called harmonic distortion. Harmonic distortion in electric distribution system is increasingly growing due to the widespread use of nonlinear loads. Large considerations of these loads have the potential to raise harmonic voltage and currents in an electrical distribution system to unacceptable high levels that can adversely affect the system. IEEE standards have defined limits for harmonic voltages and harmonic currents. Active power filters have been considered a potential candidate to bring these harmonic distortions within the IEEE limit. A voltage source inverter with pulse width modulation (PWM) is employed to form the APF. A diode rectifier feeding capacitive-resistive load is considered as nonlinear load on ac mains for the elimination of harmonics by the proposed APF. MATLAB model of the scheme is simulated and obtained results are studied.[1]
[1] Power System Harmonics Causes and Effects of Variable Frequency Drives Relative to the IEEE 519-1992 Standard.
[2] Design and Simulation of Single Phase Shunt Active Power Filter for Harmonic Mitigation in Distribution System
[3] "COMPARISON OF TOPOLOGIES OF SHUNT ACTIVE POWER FILTER IMPLEMENTED ON THREE PHASE FOUR-WIRE SYSTEM" THESIS:
[4] Advanced Control of Active Filters in a Battery Charger Application PAPER:
[5]Implementation of Single Phase Shunt Active Filter for Low Voltage Distribution System
[6] "Single-Phase Resonant Converter with Active Power Filter"
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Sensing methods for Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks |
Country | : | India |
Authors | : | S.R. Shetake,S.S.Sannakki |
Abstract: Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection. simulation results show the advantage of multiple sensor in heterogeneous WSNs.Wireless sensor networks are tremendously being used to perform various monitoring tasks such as search,rescue,disaster Relief,target tracking and number of tasks in smart environments.WSN in three dimensional space is common in different application ares such as space monitoring,cave monitoring under water eco system and so on.
[1] D.P. Agrawal and Q.-A. Zeng, Introduction to Wireless and Mobile Systems. Brooks/Cole Publishing, Aug. 2003.
[2] B. Liu and D. Towsley, "Coverage of Sensor Networks: Fundamental Limits," Proc. Third IEEE Int'l Conf. Mobile Ad Hoc and Sensor Systems (MASS), Oct. 2004.
[3] S. Ren, Q. Li, H. Wang, X. Chen, and X. Zhang, "Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks," IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 3, pp. 334-350, Mar. 2007. [4] S. Banerjee, C. Grosan, A. Abraham, and P. Mahanti, "Intrusion Detection on Sensor Networks Using Emotional Ants," Int'l J. Applied Science and Computations, vol. 12, no. 3, pp. 152-173, 2005.
[5] S. Capkun, M. Hamdi, and J. Hubaux, "GPS-Free Positioning in Mobile Ad-Hoc Networks," Proc. 34th Ann. Hawaii Int'l Conf.System Sciences, Jan. 2001.
[6] B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, "Mobility Improves Coverage of Sensor Networks," Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc '05), pp. 300-308, 2005.
[7] X. Wang, Y. Yoo, Y. Wang, and D.P. Agrawal, "Impact of Node Density and Sensing Range on Intrusion Detection in Wireless Sensor Networks," Proc. 15th Int'l Conf. Computer Comm.and Networks (ICCCN '06), Oct. 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | VLSI Based Implementation of Single Round AES Algorithm |
Country | : | India |
Authors | : | Mr.Shelke R.B., Mrs.Patil A.P., Dr.(Mrs)Patil S.B. |
Abstract: This paper presents VLSI based implementation of single round AES algorithm for encryption purpose and it is one of the most popular algorithm used in symmetric key cryptography The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt and decrypt information. Encryption converts data to an unintelligible form called cipher text; decrypting the cipher text converts the data back into its original form, called plaintext. This paper illustrates number of different transformations applied consecutively over the data block bits, in a single iteration, called round. The number of rounds depends on the length of the Key used for the encryption process. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits, this paper implements the 128 bit key length with single round. VHDL is used as the hardware description language because of the flexibility to exchange among environments. The software used for this work is Xilinx ISE Design Suite 13.2 the tools primarily used is the Xilinx ISE and ISim for simulation, Synthesis and Implementation. Some results verified using test bench for the input plaint text of 128 bit and output Cipher Text of 128 bit.
Keywords – Cryptography, Decryption, Encryption, Key schedule, Mix Columns, Shift Rows, Simulation, Sub Bytes, Synthesis.
[1] Xinmiao Zhang and Keshab K. Parhi "High-Speed VLSI Architectures for the AES Algorithm" IEEE transactions on very large scale integration (VLSI) systems, vol. 12, no.9, September 2004 ,957
[2] Adam J. Elbirt, W. Yip, B. Chetwynd, and C. Paar "An FPGA-Based Performance and the Evaluation of AES Block Cipher Candidate Algorithm Finalists" IEEE transactions on very large scale integration (VLSI) systems, vol. 9, no. 4, august 2001, 545
[3] H. Li, Z. Friggstad, "An Efficient Architecture for the AES Mix Columns Operation," IEEE International Symposium on Circuits and Systems, Kobe, Japan, May 2005
[4] X. Zhang and K. K. Parhi, "Implementation approaches for the advanced encryption standard algorithm," IEEE Circuits Syst. Mag., vol. 2, no. 4,pp. 24–46, 2002.
[5] National Institute of Standards and Technology (NIST), "Federal Information Processing Standard 197, The Advanced Encryption standard (AES)", Nov. 2001 http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
[6] William Stallings, "cryptography and network security principles and practice", (4th Edition, Prentice-Hall, Inc. 2006)
[7] A.A.Zaidan, B.B.Zaidan, Anas Majeed, "High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm", World Academy of Science Engineering and Technology (WASET), Vol.54, ISSN: 2070-3724, P.P 468-479.
[8] Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani "New Comparative Study Between DES, 3DES and AES within Nine Factors" journal of computing, volume 2, issue 3, march 2010, issn 2151-9617
[9] E. M. Popovici and P. Fitzpatrick, "Algorithm and architecture for a Galois field multiplicative arithmetic processor," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3303–3307, Dec. 2003.