Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086664
A. Rebai, Kamel GUESMI, D. Gozim, B. Hemici
This paper deals with piezoelectric actuators control. A fractional order fuzzy PID controller is designed for this class of systems with the help of particle swarm optimization (PSO) algorithm. The controller parameters are defined as an optimization problem and the PSO is used to find their optimal values. The proposed approach validation and their performances evaluation are done through simulation.
{"title":"Design of an optimized fractional order fuzzy PID controller for a piezoelectric actuator","authors":"A. Rebai, Kamel GUESMI, D. Gozim, B. Hemici","doi":"10.1109/STA.2014.7086664","DOIUrl":"https://doi.org/10.1109/STA.2014.7086664","url":null,"abstract":"This paper deals with piezoelectric actuators control. A fractional order fuzzy PID controller is designed for this class of systems with the help of particle swarm optimization (PSO) algorithm. The controller parameters are defined as an optimization problem and the PSO is used to find their optimal values. The proposed approach validation and their performances evaluation are done through simulation.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127401070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086750
T. Bakir, B. Boussaid, R. Hamdaoui, M. N. Abdelkrim, C. Aubrun
In this paper we present a qualitative evaluation of generated residual signal using wavelet transform in purpose of fault diagnosis for wind turbine benchmark model. The fault detection is based on generating residual signal by comparing the real and an estimated behavior. The `Takagi-Sugeno' (TS) fuzzy identification and modeling is considered to approximate the non linearity presented in this system. Due to noise in the wind speed, the generated residual signal has to trade of the risk of false alarms to the risk of undetected faults. Occurrence of false alarms is largely dictated by the quality of the model of which the design of the Fault Detection and Isolation (FDI) system relies. Therefore, the proposed method using wavelet transform is considered to remedy the problem of false alarms. The treated signal of the residue with wavelet gives significant results which are validated with the wind turbine simulator.
{"title":"Qualitative diagnosis of wind turbine system based on wavelet transform","authors":"T. Bakir, B. Boussaid, R. Hamdaoui, M. N. Abdelkrim, C. Aubrun","doi":"10.1109/STA.2014.7086750","DOIUrl":"https://doi.org/10.1109/STA.2014.7086750","url":null,"abstract":"In this paper we present a qualitative evaluation of generated residual signal using wavelet transform in purpose of fault diagnosis for wind turbine benchmark model. The fault detection is based on generating residual signal by comparing the real and an estimated behavior. The `Takagi-Sugeno' (TS) fuzzy identification and modeling is considered to approximate the non linearity presented in this system. Due to noise in the wind speed, the generated residual signal has to trade of the risk of false alarms to the risk of undetected faults. Occurrence of false alarms is largely dictated by the quality of the model of which the design of the Fault Detection and Isolation (FDI) system relies. Therefore, the proposed method using wavelet transform is considered to remedy the problem of false alarms. The treated signal of the residue with wavelet gives significant results which are validated with the wind turbine simulator.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127129953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086790
M. Triki, M. Farza, Y. Koubaa
In the present paper, we suggest a high gain observer for a class of multi-output nonlinear systems with nonlinearly parameterized unknown inputs. This observer should enable to estimate both the whole state and the unknown inputs, simultaneously. Not only does the gain of the observer not require the resolution of any dynamical system, but it is also explicitly given. For the sake of simplicity, the observer tuning is reduced to the choice of a single design parameter. The paper also reports on the simulation results for the sake of highlighting the performance of the proposed observer.
{"title":"Unknown inputs observers for a class of non triangular nonlinear systems","authors":"M. Triki, M. Farza, Y. Koubaa","doi":"10.1109/STA.2014.7086790","DOIUrl":"https://doi.org/10.1109/STA.2014.7086790","url":null,"abstract":"In the present paper, we suggest a high gain observer for a class of multi-output nonlinear systems with nonlinearly parameterized unknown inputs. This observer should enable to estimate both the whole state and the unknown inputs, simultaneously. Not only does the gain of the observer not require the resolution of any dynamical system, but it is also explicitly given. For the sake of simplicity, the observer tuning is reduced to the choice of a single design parameter. The paper also reports on the simulation results for the sake of highlighting the performance of the proposed observer.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131382335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086734
L. Saidi, Jaouher Ben Ali, F. Fnaiech
Vibration signals are widely used in the health monitoring of rolling element bearings. A critical work of the bearing fault diagnosis is locating the optimum frequency band that contains faulty bearing signal, which is usually buried in the noise background. Now, envelope analysis is commonly used to obtain the bearing defect harmonics from the envelope signal spectrum analysis and has shown fine results in identifying incipient failures occurring in the different parts of a bearing (inner race, outer race, cage, as well as balls). However, a main step in implementing envelope analysis is to determine a frequency band that contains faulty bearing signal component with highest signal noise level. Conventionally, the choice of the band is made by manual spectrum comparison via identifying the resonance frequency where the largest change occurred. In This paper, we present a spectral kurtosis based method to determine optimum envelope analysis parameters including the filtering band and centre frequency through a short time Fourier transform. In the literature, spectral kurtosis is mainly presented as a tool used to detect non-stationary components in a signal. The results show that the maximum amplitude of the kurtogram (ways to compute the spectral kurtosis) provides the optimal parameters for band pass filter which allows both small outer race fault and large inner race fault to be determined from optimized envelope spectrum.
{"title":"The use of spectral kurtosis as a trend parameter for bearing faults diagnosis","authors":"L. Saidi, Jaouher Ben Ali, F. Fnaiech","doi":"10.1109/STA.2014.7086734","DOIUrl":"https://doi.org/10.1109/STA.2014.7086734","url":null,"abstract":"Vibration signals are widely used in the health monitoring of rolling element bearings. A critical work of the bearing fault diagnosis is locating the optimum frequency band that contains faulty bearing signal, which is usually buried in the noise background. Now, envelope analysis is commonly used to obtain the bearing defect harmonics from the envelope signal spectrum analysis and has shown fine results in identifying incipient failures occurring in the different parts of a bearing (inner race, outer race, cage, as well as balls). However, a main step in implementing envelope analysis is to determine a frequency band that contains faulty bearing signal component with highest signal noise level. Conventionally, the choice of the band is made by manual spectrum comparison via identifying the resonance frequency where the largest change occurred. In This paper, we present a spectral kurtosis based method to determine optimum envelope analysis parameters including the filtering band and centre frequency through a short time Fourier transform. In the literature, spectral kurtosis is mainly presented as a tool used to detect non-stationary components in a signal. The results show that the maximum amplitude of the kurtogram (ways to compute the spectral kurtosis) provides the optimal parameters for band pass filter which allows both small outer race fault and large inner race fault to be determined from optimized envelope spectrum.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086692
Belmeguenai Aissa, Derouiche Nadir, Med Ammar
This paper treats the protection of images. We are dealing with the problem of image encryption and decryption. The encryption scheme is done by using the stream cipher system based on the nonlinear combination generator. The proposed keystream generator consists of fourteen binary primitive nonlinear feedback shift registers (NLFSRs) and one Boolean function. The Boolean function combines the output sequences of the fourteen NLFSRs to produce the keystream. All feedback shift registers employed in the keystream generator are primitive and nonlinear. The proposed encryption scheme is simple and highly efficient. Security analysis covers key sensitivity analysis, key space analysis, correlation coefficient analysis, noise analysis, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack. Based on experiment results and the security analysis it can be concluded that the proposed encryption scheme is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack.
{"title":"An approach using stream cipher algorithm for image encryption and decryption","authors":"Belmeguenai Aissa, Derouiche Nadir, Med Ammar","doi":"10.1109/STA.2014.7086692","DOIUrl":"https://doi.org/10.1109/STA.2014.7086692","url":null,"abstract":"This paper treats the protection of images. We are dealing with the problem of image encryption and decryption. The encryption scheme is done by using the stream cipher system based on the nonlinear combination generator. The proposed keystream generator consists of fourteen binary primitive nonlinear feedback shift registers (NLFSRs) and one Boolean function. The Boolean function combines the output sequences of the fourteen NLFSRs to produce the keystream. All feedback shift registers employed in the keystream generator are primitive and nonlinear. The proposed encryption scheme is simple and highly efficient. Security analysis covers key sensitivity analysis, key space analysis, correlation coefficient analysis, noise analysis, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack. Based on experiment results and the security analysis it can be concluded that the proposed encryption scheme is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134083692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086796
Tammam Benmusa, M. Shater, Momen M. Al-Rawi, Rawad M. Swesi
The measurement and analysis of penetration loss into building plays an important role in calculating the indoor coverage in wireless communication networks. In order to get an empirical model for this loss, several measurements of BPL in different areas in the Libyan capital; Tripoli were undertaken. Actually, this work is the first real measurement of BPL in Libyan environment, and it is expected to be very helpful in planning and dimensioning wireless mobile network in this region. These measurements were taken for four different types of wireless communication networks, two of them are categorized as long range networks namely; Mobile Telephone Network (for Almadar company), which operates at 900 MHz and WiMAX network (for Libyan Telecom and Technology LTT company) which operates at 2500 MHz, the other two are categorized as the short range networks (Wi-Fi and Bluetooth) operate at 2.4GHz. The results for each network were summarized, discussed and presented in tables and several graphs.
{"title":"Practical investigation of building penetration loss in Tripoli area","authors":"Tammam Benmusa, M. Shater, Momen M. Al-Rawi, Rawad M. Swesi","doi":"10.1109/STA.2014.7086796","DOIUrl":"https://doi.org/10.1109/STA.2014.7086796","url":null,"abstract":"The measurement and analysis of penetration loss into building plays an important role in calculating the indoor coverage in wireless communication networks. In order to get an empirical model for this loss, several measurements of BPL in different areas in the Libyan capital; Tripoli were undertaken. Actually, this work is the first real measurement of BPL in Libyan environment, and it is expected to be very helpful in planning and dimensioning wireless mobile network in this region. These measurements were taken for four different types of wireless communication networks, two of them are categorized as long range networks namely; Mobile Telephone Network (for Almadar company), which operates at 900 MHz and WiMAX network (for Libyan Telecom and Technology LTT company) which operates at 2500 MHz, the other two are categorized as the short range networks (Wi-Fi and Bluetooth) operate at 2.4GHz. The results for each network were summarized, discussed and presented in tables and several graphs.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132404390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086720
Hanene Sahli, M. Diouani, M. Sayadi
Several responses in the form of serological tests ELISA (Enzyme Linked Immuno Sorbent Assay), IIF (Indirect Immuno Fluoresence) and DHST (Delayed Hyper Sensitivity Tests) can be used to detect leishmania parasite infection in dogs. In this paper, we propose a new method to select the most discriminative tests based on determinant criterion. So, the diagnosis of canine leishmaniasis (CanL) can be improved by reducing the number of features. Moreover, an artificial neural networks (the Multilayer Preceptron neural network) is applied to classify subjects into two groups: positive (sick) and negative (not sick). The correlation between the physical and the pathological state of subjects is specified with multiple attempts. These methods are obtained with considering chain of experiences that allow for fairly reliable and highly effective results which enable us to develop an efficient way to estimate the diagnosis of this disease. After many experiments, we notice that the best combination of the three studied tests is the DHST and IIF tests.
{"title":"A new approach based on the serological tests and the Delayed Hyper Sensitivity Tests for the diagnosis of canine leishmaniasis","authors":"Hanene Sahli, M. Diouani, M. Sayadi","doi":"10.1109/STA.2014.7086720","DOIUrl":"https://doi.org/10.1109/STA.2014.7086720","url":null,"abstract":"Several responses in the form of serological tests ELISA (Enzyme Linked Immuno Sorbent Assay), IIF (Indirect Immuno Fluoresence) and DHST (Delayed Hyper Sensitivity Tests) can be used to detect leishmania parasite infection in dogs. In this paper, we propose a new method to select the most discriminative tests based on determinant criterion. So, the diagnosis of canine leishmaniasis (CanL) can be improved by reducing the number of features. Moreover, an artificial neural networks (the Multilayer Preceptron neural network) is applied to classify subjects into two groups: positive (sick) and negative (not sick). The correlation between the physical and the pathological state of subjects is specified with multiple attempts. These methods are obtained with considering chain of experiences that allow for fairly reliable and highly effective results which enable us to develop an efficient way to estimate the diagnosis of this disease. After many experiments, we notice that the best combination of the three studied tests is the DHST and IIF tests.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086689
Taher Mekki, S. Triki, A. Kamoun
This paper presents a component oriented modeling environment for building hybrid dynamic models of physical system. The modeling environment is created using the Generic Modeling Environment (GME). The core of the modeling language itself is a hybrid extension of the bond graph modeling language. The advantages of an object-oriented approach to physical system modeling combined with the advanced features of GME foe managing model complexity are illustrated by building a library of thermofluid system components. A simulation model can be automatically generated from the physical system model using a model translator. As an example application we use the component library to build the model of a thermofluid system with autonomous hybrid behavior, and illustrate with a simulation example.
{"title":"Modeling and simulation of thermofluid system using Hybrid Bond Graph","authors":"Taher Mekki, S. Triki, A. Kamoun","doi":"10.1109/STA.2014.7086689","DOIUrl":"https://doi.org/10.1109/STA.2014.7086689","url":null,"abstract":"This paper presents a component oriented modeling environment for building hybrid dynamic models of physical system. The modeling environment is created using the Generic Modeling Environment (GME). The core of the modeling language itself is a hybrid extension of the bond graph modeling language. The advantages of an object-oriented approach to physical system modeling combined with the advanced features of GME foe managing model complexity are illustrated by building a library of thermofluid system components. A simulation model can be automatically generated from the physical system model using a model translator. As an example application we use the component library to build the model of a thermofluid system with autonomous hybrid behavior, and illustrate with a simulation example.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086668
A. Khelifa, Khaled Touafek, H. Benmoussa, I. Tabet, M. Adouane
There are some elements that are the basis of most solar heating of water: the sensor (s), storage tank, heat transfer medium and interconnecting tubes. The hybrid solar collector PVT captures sunlight and converts it into heat which is transferred to the storage tank by means of a fluid such as water or air. An expansion vessel is used in closed to accommodate slight variations in volume that occur when the fluid is heated and expands, a heat exchanger is required to transfer heat from the manifold with water to exit the system faucet. In this section we will study and will present the energy behavior of a hybrid photovoltaic thermal solar PVT in a complete energy system (Enforceability of heating water for habitat in southern Algeria) and is very important right now especially in the Sahara and semi arid (Ghardaia).
{"title":"Hot water system based on the hybrid solar collector photovoltaic/thermal PVT","authors":"A. Khelifa, Khaled Touafek, H. Benmoussa, I. Tabet, M. Adouane","doi":"10.1109/STA.2014.7086668","DOIUrl":"https://doi.org/10.1109/STA.2014.7086668","url":null,"abstract":"There are some elements that are the basis of most solar heating of water: the sensor (s), storage tank, heat transfer medium and interconnecting tubes. The hybrid solar collector PVT captures sunlight and converts it into heat which is transferred to the storage tank by means of a fluid such as water or air. An expansion vessel is used in closed to accommodate slight variations in volume that occur when the fluid is heated and expands, a heat exchanger is required to transfer heat from the manifold with water to exit the system faucet. In this section we will study and will present the energy behavior of a hybrid photovoltaic thermal solar PVT in a complete energy system (Enforceability of heating water for habitat in southern Algeria) and is very important right now especially in the Sahara and semi arid (Ghardaia).","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"79 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114402481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/STA.2014.7086754
S. Bouslimani, S. Drid, L. Chrifi-Alaoui, P. Bussy, M. Ouriagli, L. Delahoche
In this article, we present a study based on the application of the new approach of the vectors of Park in the two axes ropers to the detection of the defects of bars in the three-phase induction machines. In order to simulate the behavior of the motor with defect, we propose the modeling of the diagram multi windings of the induction motor allowing apprehending his behavior in presence or absence of failures. The simulated results suggest that this method is effective and accurate and can be widely used in the induction motor fault diagnosis.
{"title":"An extended Park's vector approach to detect broken bars faults in Induction Motor","authors":"S. Bouslimani, S. Drid, L. Chrifi-Alaoui, P. Bussy, M. Ouriagli, L. Delahoche","doi":"10.1109/STA.2014.7086754","DOIUrl":"https://doi.org/10.1109/STA.2014.7086754","url":null,"abstract":"In this article, we present a study based on the application of the new approach of the vectors of Park in the two axes ropers to the detection of the defects of bars in the three-phase induction machines. In order to simulate the behavior of the motor with defect, we propose the modeling of the diagram multi windings of the induction motor allowing apprehending his behavior in presence or absence of failures. The simulated results suggest that this method is effective and accurate and can be widely used in the induction motor fault diagnosis.","PeriodicalId":125957,"journal":{"name":"2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134125620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}