Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777777
M. Ali, M.A. Khan, R. Ali
The constructions in Pashto, having a question involving a WH-word equivalent and an answer or response to that question, are called WH-constructions. In most of the cases, in both written and spoken WH-constructions, there occur ellipses among them. This paper presents the first ever rulebased algorithm and the factors involved in ellipses resolution in WH-constructions in Pashto text. The algorithm resolves ellipses occurring in the answers to WH-questions by using the morphological and syntactic information of both the question and its corresponding answer. The algorithm accurately resolves the ellipses occurring in the answers to the questions having WH-words i.e. (Who-Dir), (Who-Obl), (What), (Which), (Where) and (How much) among them. The algorithm has been tested on real world text of Pashto taken from various genres such as books, novels, newspapers and online magazines. The algorithm achieved an accuracy of 76%.
{"title":"Ellipses resolution in WH-constructions in Pashto","authors":"M. Ali, M.A. Khan, R. Ali","doi":"10.1109/INMIC.2008.4777777","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777777","url":null,"abstract":"The constructions in Pashto, having a question involving a WH-word equivalent and an answer or response to that question, are called WH-constructions. In most of the cases, in both written and spoken WH-constructions, there occur ellipses among them. This paper presents the first ever rulebased algorithm and the factors involved in ellipses resolution in WH-constructions in Pashto text. The algorithm resolves ellipses occurring in the answers to WH-questions by using the morphological and syntactic information of both the question and its corresponding answer. The algorithm accurately resolves the ellipses occurring in the answers to the questions having WH-words i.e. (Who-Dir), (Who-Obl), (What), (Which), (Where) and (How much) among them. The algorithm has been tested on real world text of Pashto taken from various genres such as books, novels, newspapers and online magazines. The algorithm achieved an accuracy of 76%.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128975205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777697
H. Bouzari, H. Moradi, E. Bouzari
In this study, a new method for designing an adaptive controller based on Wavelet Neural Networks, is represented. The proposed controlling method is based on a Neuro-Wavelet controller and a robust controller. The Neuro-Wavelet controller is designed to emulate an ideal controller and a robust controller is designed to recover the residual approximation for ensuring the stable control performance. The adaptive law is derived on the basis of Lyapunov stability theorem, so, the stability of the under controlled system is guaranteed, when no exact condition or no prior knowledge is available. Moreover, to relax the requirement for a known bound on aggregated uncertainty, which comprises a minimum approximation error, optimal network parameters and higher order terms in a Taylor series expansion of the wavelet functions, a system with adaptive bound estimation was investigated for the control of a forward switch mode power supply. In addition, numerical simulation results show that the dynamic behaviors of the proposed systems, due to periodic commands, are robust with regard to parameter variations and external load resistance disturbance.
{"title":"Adaptive neuro-wavelet system for the robust control of switching power supplies","authors":"H. Bouzari, H. Moradi, E. Bouzari","doi":"10.1109/INMIC.2008.4777697","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777697","url":null,"abstract":"In this study, a new method for designing an adaptive controller based on Wavelet Neural Networks, is represented. The proposed controlling method is based on a Neuro-Wavelet controller and a robust controller. The Neuro-Wavelet controller is designed to emulate an ideal controller and a robust controller is designed to recover the residual approximation for ensuring the stable control performance. The adaptive law is derived on the basis of Lyapunov stability theorem, so, the stability of the under controlled system is guaranteed, when no exact condition or no prior knowledge is available. Moreover, to relax the requirement for a known bound on aggregated uncertainty, which comprises a minimum approximation error, optimal network parameters and higher order terms in a Taylor series expansion of the wavelet functions, a system with adaptive bound estimation was investigated for the control of a forward switch mode power supply. In addition, numerical simulation results show that the dynamic behaviors of the proposed systems, due to periodic commands, are robust with regard to parameter variations and external load resistance disturbance.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127867198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777747
M. Rizwan, S. Abbas
This paper describes a microcellular type propagation environment model that is typical in the Defence Housing Authority in Pakistan. Broadband Access systems are being deployed in this environment. Propagation characteristics in this environment have been investigated in this paper for the typically deployed frequency of 3.5 GHZ. Median path loss, fading and coverage is being reported for propagation at 3.5 GHz band and has been compared with a new band that is being opened up for Broadband wireless access across the globe in the 700 MHz band. The simulation method is based on the quite commonly used ray tracing technique.
{"title":"Median path loss, fading and coverage comparison at 3.5GHz and 700MHz for mobile WiMax","authors":"M. Rizwan, S. Abbas","doi":"10.1109/INMIC.2008.4777747","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777747","url":null,"abstract":"This paper describes a microcellular type propagation environment model that is typical in the Defence Housing Authority in Pakistan. Broadband Access systems are being deployed in this environment. Propagation characteristics in this environment have been investigated in this paper for the typically deployed frequency of 3.5 GHZ. Median path loss, fading and coverage is being reported for propagation at 3.5 GHz band and has been compared with a new band that is being opened up for Broadband wireless access across the globe in the 700 MHz band. The simulation method is based on the quite commonly used ray tracing technique.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127960053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777780
E. Elahi, A. Naeem, I. Elahi
Estimating Direction of Arrival (DOA) of a signal in three dimensional space is a procedure which is difficult to perform in a reverberant and noisy environment, yet it demands high degree of precision. One of the most reliable techniques under reverberant conditions is Multi-Sensor Steered Response Power with Phase Transform filter (SRP-PHAT) but it is computationally exhaustive if performed using traditional calculus based techniques. So this paper proposes a different and computationally efficient approach to solve the DOA problem, one that is based on searching and optimization capabilities of Genetic Algorithms. In this paper, for the purpose of application of genetic algorithm, SRP-PHAT to estimate DOA is modeled as an optimization problem. To speed up the process of global convergence of genetic algorithm, this paper describes a procedure which can act as a precursor for the design and implementation of a parallel architecture for DOA estimation. To prove the efficacy of the solution, various performance curves have been included which show that the proposed solution is superior to traditional techniques and the last section describes the computational load of the proposed technique and compares it with two other conventionally employed techniques.
{"title":"A Genetic Algorithm based solution to three dimensional Direction of Arrival (DOA) problem","authors":"E. Elahi, A. Naeem, I. Elahi","doi":"10.1109/INMIC.2008.4777780","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777780","url":null,"abstract":"Estimating Direction of Arrival (DOA) of a signal in three dimensional space is a procedure which is difficult to perform in a reverberant and noisy environment, yet it demands high degree of precision. One of the most reliable techniques under reverberant conditions is Multi-Sensor Steered Response Power with Phase Transform filter (SRP-PHAT) but it is computationally exhaustive if performed using traditional calculus based techniques. So this paper proposes a different and computationally efficient approach to solve the DOA problem, one that is based on searching and optimization capabilities of Genetic Algorithms. In this paper, for the purpose of application of genetic algorithm, SRP-PHAT to estimate DOA is modeled as an optimization problem. To speed up the process of global convergence of genetic algorithm, this paper describes a procedure which can act as a precursor for the design and implementation of a parallel architecture for DOA estimation. To prove the efficacy of the solution, various performance curves have been included which show that the proposed solution is superior to traditional techniques and the last section describes the computational load of the proposed technique and compares it with two other conventionally employed techniques.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131498032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777709
Naveed Riaz
Model-based diagnosis (MBD) is a well known (AI) technique for localizing faulty components in physical systems. A prerequisite for the application of model based diagnosis is the representation of the physical system as a model. Developing models for fault localization in HDL designs has been an active research area in recent years. Whereas Verilog is considered the most widely used HDL, research on fault localization has mainly focused on the VHDL domain. The research presented herein reports on a novel logical model for Verilog designs that can be automatically derived from the source program and can be directly used by a model-based diagnosis engine for computing diagnoses. We also point out some notable semantic differences between VHDL and Verilog and discuss its implications on debugging model.
{"title":"Modeling Verilog designs using a value-based model","authors":"Naveed Riaz","doi":"10.1109/INMIC.2008.4777709","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777709","url":null,"abstract":"Model-based diagnosis (MBD) is a well known (AI) technique for localizing faulty components in physical systems. A prerequisite for the application of model based diagnosis is the representation of the physical system as a model. Developing models for fault localization in HDL designs has been an active research area in recent years. Whereas Verilog is considered the most widely used HDL, research on fault localization has mainly focused on the VHDL domain. The research presented herein reports on a novel logical model for Verilog designs that can be automatically derived from the source program and can be directly used by a model-based diagnosis engine for computing diagnoses. We also point out some notable semantic differences between VHDL and Verilog and discuss its implications on debugging model.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134060715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777767
M. I. Sarwar, W. Tanveer, I. Sarwar, W. Mahmood
Software maintainability has always been a significant factor in the success or failure of any software product. There are numerous ways to calculate software maintainability but none of them has been able to grab as much industrial acceptance as the maintainability index (MI). MI can be calculated with the help of various tools, however selection of an appropriate tool for specific application is a critical research issue. This indicates that there is a dire need to clearly identify behavior of MI tools used for calculating software maintainability for various software source code scenarios. For this purpose we have analyzed behaviors of various MI tools with different MI parameters using a variety of test scenarios. We have developed a set of benchmark MI parameters test-cases for available MI tools to compare their results on the basis of features they support. We then executed the test scenarios on selected proprietary and open-source MI tools and evaluated their strengths and weaknesses on the basis of test results. The results highlighted weaknesses of some of the MI tools and helped us in making recommendations for selection of appropriate tool for specific application having better ability to determine the maintainability of the software system in terms of ldquomaintainability indexrdquo.
{"title":"A comparative study of MI tools: Defining the Roadmap to MI tools standardization","authors":"M. I. Sarwar, W. Tanveer, I. Sarwar, W. Mahmood","doi":"10.1109/INMIC.2008.4777767","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777767","url":null,"abstract":"Software maintainability has always been a significant factor in the success or failure of any software product. There are numerous ways to calculate software maintainability but none of them has been able to grab as much industrial acceptance as the maintainability index (MI). MI can be calculated with the help of various tools, however selection of an appropriate tool for specific application is a critical research issue. This indicates that there is a dire need to clearly identify behavior of MI tools used for calculating software maintainability for various software source code scenarios. For this purpose we have analyzed behaviors of various MI tools with different MI parameters using a variety of test scenarios. We have developed a set of benchmark MI parameters test-cases for available MI tools to compare their results on the basis of features they support. We then executed the test scenarios on selected proprietary and open-source MI tools and evaluated their strengths and weaknesses on the basis of test results. The results highlighted weaknesses of some of the MI tools and helped us in making recommendations for selection of appropriate tool for specific application having better ability to determine the maintainability of the software system in terms of ldquomaintainability indexrdquo.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132620495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777699
H. Khoshkhoo, S. Sadeghi, R. Moini, M. Jabbari
A three-phase dynamic arc furnace model is presented to investigate the effect of flexible power cables oscillations on harmonic generation of an arc-furnace steel plant. In this model, the flexible cables are presented by a varying three-phase inductor bank connected in series to the arc furnace. The self and mutual inductances of the inductors are calculated at each time step, using the shape of the cables. The shape of each cable is, in turn, obtained using the arc-furnace current computed in the preceding time step. The simulation results show that the inclusion of the flexible power cables in the arc furnace model does not have a significant effect on the magnitudes of the plant generated harmonics. However, the cables oscillations can remarkably affect the level of unbalancy in the three-phase system.
{"title":"Effects of flexible power cables on harmonic generation of an arc furnace steel plant","authors":"H. Khoshkhoo, S. Sadeghi, R. Moini, M. Jabbari","doi":"10.1109/INMIC.2008.4777699","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777699","url":null,"abstract":"A three-phase dynamic arc furnace model is presented to investigate the effect of flexible power cables oscillations on harmonic generation of an arc-furnace steel plant. In this model, the flexible cables are presented by a varying three-phase inductor bank connected in series to the arc furnace. The self and mutual inductances of the inductors are calculated at each time step, using the shape of the cables. The shape of each cable is, in turn, obtained using the arc-furnace current computed in the preceding time step. The simulation results show that the inclusion of the flexible power cables in the arc furnace model does not have a significant effect on the magnitudes of the plant generated harmonics. However, the cables oscillations can remarkably affect the level of unbalancy in the three-phase system.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132088942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777741
M. Usama, M.K. Khan
With the large-scale research and development in space sciences, space technologies, and network communication technologies, there is a great demand of satellite imagery security system for providing secure storage and transmission of satellite imagery over internet and/or shared network environment. This brings new challenges to protect sensitive and critical satellite imagery from unauthorized access and illegal use in order to keep the storage and transmission process secure and reliable. Therefore there is strong need of satellite imagery encryption and decryption application for security. Satellite imagery security application (SISA) is an information security application developed for satellite imagery. The application supports new and modified version two most popular data encryption standards named as data encryption standard (DES) and advanced encryption standard (AES). This paper investigates the security and performance level of the new modified version DES and AES for satellite imagery. The method of application of DES and AES on the satellite imagery in each case is explained. The application provides conventional tools of measurement and analysis such as key sensitivity, statistical and performance analysis to determine the level of security, reliability and performance.
{"title":"Satellite Imagery Security Application (SISA)","authors":"M. Usama, M.K. Khan","doi":"10.1109/INMIC.2008.4777741","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777741","url":null,"abstract":"With the large-scale research and development in space sciences, space technologies, and network communication technologies, there is a great demand of satellite imagery security system for providing secure storage and transmission of satellite imagery over internet and/or shared network environment. This brings new challenges to protect sensitive and critical satellite imagery from unauthorized access and illegal use in order to keep the storage and transmission process secure and reliable. Therefore there is strong need of satellite imagery encryption and decryption application for security. Satellite imagery security application (SISA) is an information security application developed for satellite imagery. The application supports new and modified version two most popular data encryption standards named as data encryption standard (DES) and advanced encryption standard (AES). This paper investigates the security and performance level of the new modified version DES and AES for satellite imagery. The method of application of DES and AES on the satellite imagery in each case is explained. The application provides conventional tools of measurement and analysis such as key sensitivity, statistical and performance analysis to determine the level of security, reliability and performance.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777770
A. Ahmad, H. Basson, L. Deruelle, M. Bouneffa
The software evolution requires an exhaustive understanding of all the artifacts or components composing the software. In fact, any intended change may generate an impact propagated to the various software components through the different kind of relationships relating them. This situation is generally called the ripple effect and may cause several types of damages or side effects. In this paper, we focus on the potential flow of change impact propagation as provoked by the carried out change. For that purpose, we propose a structural model of software evolution (SMSE). This model is intended to represent and manage the different software artifacts and their relationships. The instantiated SMSE is used to built a knowledge base system providing, among other facilities, an assistance to the designer (or engineer) of software evolution for an a priori assessment of the change impact. The major aim of the system is to help a systematic analysis of the change impact and the identification of its propagation.
{"title":"Towards a better control of change impact propagation","authors":"A. Ahmad, H. Basson, L. Deruelle, M. Bouneffa","doi":"10.1109/INMIC.2008.4777770","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777770","url":null,"abstract":"The software evolution requires an exhaustive understanding of all the artifacts or components composing the software. In fact, any intended change may generate an impact propagated to the various software components through the different kind of relationships relating them. This situation is generally called the ripple effect and may cause several types of damages or side effects. In this paper, we focus on the potential flow of change impact propagation as provoked by the carried out change. For that purpose, we propose a structural model of software evolution (SMSE). This model is intended to represent and manage the different software artifacts and their relationships. The instantiated SMSE is used to built a knowledge base system providing, among other facilities, an assistance to the designer (or engineer) of software evolution for an a priori assessment of the change impact. The major aim of the system is to help a systematic analysis of the change impact and the identification of its propagation.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777765
Imran Asad Gul, Nils Sommer, Matthias Rohr, Andre van Hoom, Wilhelm Hasselbring
Software security has become an important requirement, particularly for systems that are publicly accessible through the Internet. Such systems can be equipped with intrusion detection systems to uncover security breaches. In this paper, we present a novel application-level intrusion detection approach. A normal behavior profile is created from application-internal control flow in terms of operation execution traces. Anomalous control flows indicative for intrusion attempts are detected by continuously monitoring and analyzing the software system. A case study demonstrates the intrusion detection approach's applicability in the context of a multi-user Java Web application.
{"title":"Evaluation of control flow traces in software applications for intrusion detection","authors":"Imran Asad Gul, Nils Sommer, Matthias Rohr, Andre van Hoom, Wilhelm Hasselbring","doi":"10.1109/INMIC.2008.4777765","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777765","url":null,"abstract":"Software security has become an important requirement, particularly for systems that are publicly accessible through the Internet. Such systems can be equipped with intrusion detection systems to uncover security breaches. In this paper, we present a novel application-level intrusion detection approach. A normal behavior profile is created from application-internal control flow in terms of operation execution traces. Anomalous control flows indicative for intrusion attempts are detected by continuously monitoring and analyzing the software system. A case study demonstrates the intrusion detection approach's applicability in the context of a multi-user Java Web application.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}