Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437961
Shilpa Mishra, S. Shukla, Nitin Verma, Ritu
Availability of renewable energy resources and their best utilization has now become most preferred research area among power and energy engineers. Due to the most promising features in terms of reliability and efficiency, wind energy can be kept in best corner among all green energy resources which are now being utilized for fulfilling electrical needs. The only negative point that degrades the performance of Wind Energy Conversion System (WECS) in terms of maximum utilization of available power is high variation in wind-velocity (ranging from 3 m/s to 15 m/s and above). Wind energy system has been widely researched so as to extract maximum active power at all possible wind speeds with least detrimental effects on overall performance of plant/system. Here sequential review on Maximum Power Point Tracking (MPPT) techniques is presented. Direct to concept approach is used to describe each method in a way that must be very useful for the beginners in this area. Proper comparison table and charts are used to summarize the work which makes readers more connected to the content. Criteria selected here for comparing different MPPT methods are efficiency, reliability, accuracy, ease in implementation, tracking speed and cost.
{"title":"Comprehensive review on Maximum Power Point Tracking techniques: Wind Energy","authors":"Shilpa Mishra, S. Shukla, Nitin Verma, Ritu","doi":"10.1109/CCINTELS.2015.7437961","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437961","url":null,"abstract":"Availability of renewable energy resources and their best utilization has now become most preferred research area among power and energy engineers. Due to the most promising features in terms of reliability and efficiency, wind energy can be kept in best corner among all green energy resources which are now being utilized for fulfilling electrical needs. The only negative point that degrades the performance of Wind Energy Conversion System (WECS) in terms of maximum utilization of available power is high variation in wind-velocity (ranging from 3 m/s to 15 m/s and above). Wind energy system has been widely researched so as to extract maximum active power at all possible wind speeds with least detrimental effects on overall performance of plant/system. Here sequential review on Maximum Power Point Tracking (MPPT) techniques is presented. Direct to concept approach is used to describe each method in a way that must be very useful for the beginners in this area. Proper comparison table and charts are used to summarize the work which makes readers more connected to the content. Criteria selected here for comparing different MPPT methods are efficiency, reliability, accuracy, ease in implementation, tracking speed and cost.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131413783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437914
Sudip Kumar Rajak, Sayantani Mondal, I. Ali
This paper represents a new method to classify human or non-human objects from the image and video sequences. A clear detection is essential for such kind of classification. The difficulties that arise during the classification of human being are clothing, illuminations, poses, shadows and shape variations. If the quality of video is not good enough then detection cannot be done perfectly. To avoid these difficulties, we use FCM and k-means based new thresholding technique to decide the threshold point for object detection. Detected object is human being or not is an important task in case of space, security purpose and visual surveillance. So, after the successful detection of object, we use golden ratio as an object classifier to classify it as human or non-human. It is a ratio related to human body parts, such as, height and width of a human body. This ratio also called as divine proportion.
{"title":"Detection of human being and non-human object from image and video sequences","authors":"Sudip Kumar Rajak, Sayantani Mondal, I. Ali","doi":"10.1109/CCINTELS.2015.7437914","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437914","url":null,"abstract":"This paper represents a new method to classify human or non-human objects from the image and video sequences. A clear detection is essential for such kind of classification. The difficulties that arise during the classification of human being are clothing, illuminations, poses, shadows and shape variations. If the quality of video is not good enough then detection cannot be done perfectly. To avoid these difficulties, we use FCM and k-means based new thresholding technique to decide the threshold point for object detection. Detected object is human being or not is an important task in case of space, security purpose and visual surveillance. So, after the successful detection of object, we use golden ratio as an object classifier to classify it as human or non-human. It is a ratio related to human body parts, such as, height and width of a human body. This ratio also called as divine proportion.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437910
Priyanka C. Nair, G. Radhakrishnan, Deepa Gupta, T. Sudarshan
Mobile robots are being used in various applications like space shuttles, intelligent home security, military applications or other service oriented applications where human intervention is limited. A robot has to understand its environment by analyzing the data to take the appropriate actions in the given environment. Mostly the data collected from the sensors on the robots are huge and continuous, making it impossible to store the entire data in main memory and hence allowing only single scan of data. Traditional clustering algorithms like k-means cannot be used in such environment as they require multiple scan of data. This paper presents an experimental study on the implementation of Stream KM++, a data stream clustering algorithm that effectively cluster these time series robotic image data within the memory restrictions under various conditions. Promising results are obtained from the various experiments carried out.
{"title":"Clustering of robotic environment using image data stream","authors":"Priyanka C. Nair, G. Radhakrishnan, Deepa Gupta, T. Sudarshan","doi":"10.1109/CCINTELS.2015.7437910","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437910","url":null,"abstract":"Mobile robots are being used in various applications like space shuttles, intelligent home security, military applications or other service oriented applications where human intervention is limited. A robot has to understand its environment by analyzing the data to take the appropriate actions in the given environment. Mostly the data collected from the sensors on the robots are huge and continuous, making it impossible to store the entire data in main memory and hence allowing only single scan of data. Traditional clustering algorithms like k-means cannot be used in such environment as they require multiple scan of data. This paper presents an experimental study on the implementation of Stream KM++, a data stream clustering algorithm that effectively cluster these time series robotic image data within the memory restrictions under various conditions. Promising results are obtained from the various experiments carried out.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437892
Chinmay Gordey, V. Deshmukh
This paper examines the problem of identification and localization of event sources in the sensor network. In real life applications the localization is a challenging task because of many constraints on a wireless sensors i.e. sensor node (also called as note) such as short range of communication, short range of sensing, very short amount of storage space and also limited computational capability. We propose a methodology by which we can make the localization task easier. This methodology uses the binary observations of sensor nodes and informs the location of event source to the sink node. Also the system should operate in presence of faults. This is called fault tolerance. The trustworthiness of wireless sensor networks (WSN) is influenced by faults that may cause because of various factors like disturbance, software and hardware defects, ecological harsh conditions, etc. The system proposed in this paper works well in presence of faults as we are masking the faults at the starting of localization phase.
{"title":"Identification and localization of event sources in WSN using binary data in fault tolerant way","authors":"Chinmay Gordey, V. Deshmukh","doi":"10.1109/CCINTELS.2015.7437892","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437892","url":null,"abstract":"This paper examines the problem of identification and localization of event sources in the sensor network. In real life applications the localization is a challenging task because of many constraints on a wireless sensors i.e. sensor node (also called as note) such as short range of communication, short range of sensing, very short amount of storage space and also limited computational capability. We propose a methodology by which we can make the localization task easier. This methodology uses the binary observations of sensor nodes and informs the location of event source to the sink node. Also the system should operate in presence of faults. This is called fault tolerance. The trustworthiness of wireless sensor networks (WSN) is influenced by faults that may cause because of various factors like disturbance, software and hardware defects, ecological harsh conditions, etc. The system proposed in this paper works well in presence of faults as we are masking the faults at the starting of localization phase.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437960
P. Mishra, M. Mishra, N. Saxena
Through LFC tie-line interchange power of the area within prescribed limit and scheduled frequency of the system can maintain constant. Generally, Integral (conventional) Controllers are used in Load Frequency Controllers but they are quite slow. In this paper, we have used the PID controller for two-area power system in place of conventional controller and by using various adaption techniques we are tuning controllers. In order to verify the performance of PID and conventional controller, comparative results of both controllers are also presented. Overshoot and settling time are better with PID controller. The result demonstrates the effectiveness of PID controller over conventional controller. Different techniques like Ziegler Nichols and Nonlinear Control Design technique are used for comparing the responses of conventional controllers with PID controllers.
{"title":"Tuning of generation participation depending upon load demand","authors":"P. Mishra, M. Mishra, N. Saxena","doi":"10.1109/CCINTELS.2015.7437960","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437960","url":null,"abstract":"Through LFC tie-line interchange power of the area within prescribed limit and scheduled frequency of the system can maintain constant. Generally, Integral (conventional) Controllers are used in Load Frequency Controllers but they are quite slow. In this paper, we have used the PID controller for two-area power system in place of conventional controller and by using various adaption techniques we are tuning controllers. In order to verify the performance of PID and conventional controller, comparative results of both controllers are also presented. Overshoot and settling time are better with PID controller. The result demonstrates the effectiveness of PID controller over conventional controller. Different techniques like Ziegler Nichols and Nonlinear Control Design technique are used for comparing the responses of conventional controllers with PID controllers.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437896
Abhishek Mishra, Ashutosh Gupta
Secure key management is the motivating factor for secret sharing. There are numerous practical situations when it is possible that a single secret key can unlock multiple files. Consider the case when this secret key is lost due to the computer crash or system does not boot, then it is nearly impossible to access those multiple files. In this paper, a probabilistic (2, n) SS scheme based on XOR operation is proposed for binary images. The scheme relies on random generation of matrices over which mathematical and boolean operations are performed to generate secrets. The experimental results shows that the scheme has satisfactory contrast, less prone to security attacks along with reasonable computation time.
{"title":"Probabilistic secret sharing scheme for binary images","authors":"Abhishek Mishra, Ashutosh Gupta","doi":"10.1109/CCINTELS.2015.7437896","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437896","url":null,"abstract":"Secure key management is the motivating factor for secret sharing. There are numerous practical situations when it is possible that a single secret key can unlock multiple files. Consider the case when this secret key is lost due to the computer crash or system does not boot, then it is nearly impossible to access those multiple files. In this paper, a probabilistic (2, n) SS scheme based on XOR operation is proposed for binary images. The scheme relies on random generation of matrices over which mathematical and boolean operations are performed to generate secrets. The experimental results shows that the scheme has satisfactory contrast, less prone to security attacks along with reasonable computation time.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"&NA; 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437923
Princy Saraswat, G. Parmar
In this paper, a comparative study of Differential Evolution (DE) and Simulated Annealing (SA) for the order reduction of large scale systems has been carried out. Order reduction is the most important field for analyzing and synthesizing the systems. In the present work, DE and SA along with dominant pole retention technique have been utilized for order reduction of system. The comparison provides the accuracy of techniques in terms of integral square error (ISE) along with time and frequency responses. Also, a comparative study of mentioned techniques with other existing techniques available in the literature has also been given in tabular form. Reduced order system approximates and preserves the stability of the original high order system.
{"title":"A comparative study of Differential Evolution and Simulated Annealing for order reduction of large scale systems","authors":"Princy Saraswat, G. Parmar","doi":"10.1109/CCINTELS.2015.7437923","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437923","url":null,"abstract":"In this paper, a comparative study of Differential Evolution (DE) and Simulated Annealing (SA) for the order reduction of large scale systems has been carried out. Order reduction is the most important field for analyzing and synthesizing the systems. In the present work, DE and SA along with dominant pole retention technique have been utilized for order reduction of system. The comparison provides the accuracy of techniques in terms of integral square error (ISE) along with time and frequency responses. Also, a comparative study of mentioned techniques with other existing techniques available in the literature has also been given in tabular form. Reduced order system approximates and preserves the stability of the original high order system.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126218258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437922
Princy Saraswat, G. Parmar
This brief considers the order reduction of transformer linear section model using combined advantages of Simulated Annealing (SA) and Dominant pole retention technique. SA is a local search method, inspired by the process of physical annealing associated with solids. SA technique in association with dominant pole retention technique shows its effectiveness in obtaining low order model of transformer such that reduced order model approximates the original higher order transformer model and maintains the stability of the original system. The SA optimization method is based on minimization of the integral square error (ISE) between the transient responses of original higher order and the reduced order transformer linear section model. The zeros of reduced order model are obtained using SA by minimizing the ISE between high order and low order models of transformer, while poles are determined by dominant pole retention technique. The algorithm has been illustrated by one transformer model available in the literature. The step and frequency responses of both low and high order transformer models have also been compared along with the transient response parameters and a comparative study of ISE with the other existing techniques has also been given in the tabular form.
{"title":"Model order reduction of transformer linear section model using Simulated Annealing","authors":"Princy Saraswat, G. Parmar","doi":"10.1109/CCINTELS.2015.7437922","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437922","url":null,"abstract":"This brief considers the order reduction of transformer linear section model using combined advantages of Simulated Annealing (SA) and Dominant pole retention technique. SA is a local search method, inspired by the process of physical annealing associated with solids. SA technique in association with dominant pole retention technique shows its effectiveness in obtaining low order model of transformer such that reduced order model approximates the original higher order transformer model and maintains the stability of the original system. The SA optimization method is based on minimization of the integral square error (ISE) between the transient responses of original higher order and the reduced order transformer linear section model. The zeros of reduced order model are obtained using SA by minimizing the ISE between high order and low order models of transformer, while poles are determined by dominant pole retention technique. The algorithm has been illustrated by one transformer model available in the literature. The step and frequency responses of both low and high order transformer models have also been compared along with the transient response parameters and a comparative study of ISE with the other existing techniques has also been given in the tabular form.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129597894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437875
Manisha Gupta, Vinita Mathur
A dual band CPW-fed Koch fractal antenna, suitable for WLAN and WiMAX operations, is proposed in this paper. The antenna has been designed by increasing the perimeters of right angled isosceles triangular shape patch by using self-similarity property. The proposed antenna is fed by a 50Ω Microstrip line and fabricated on a low-cost FR4 substrate having dimensions 40 (L) × 40 (W) × 1.59(H) mm3. The antenna shows acceptable gain with nearly omni-directional radiation pattern in the frequency band for wireless applications. In second iteration defect in ground is introduced for better gain.
{"title":"Koch fractal antenna using right angled isosceles triangular microstrip patch antenna structure for WiMAX","authors":"Manisha Gupta, Vinita Mathur","doi":"10.1109/CCINTELS.2015.7437875","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437875","url":null,"abstract":"A dual band CPW-fed Koch fractal antenna, suitable for WLAN and WiMAX operations, is proposed in this paper. The antenna has been designed by increasing the perimeters of right angled isosceles triangular shape patch by using self-similarity property. The proposed antenna is fed by a 50Ω Microstrip line and fabricated on a low-cost FR4 substrate having dimensions 40 (L) × 40 (W) × 1.59(H) mm3. The antenna shows acceptable gain with nearly omni-directional radiation pattern in the frequency band for wireless applications. In second iteration defect in ground is introduced for better gain.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122192632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/CCINTELS.2015.7437959
Purva Sharma, Ankush Tandon
Electricity market reconstituting relegates in power generation technologies and correspondence on the diminution of global greenhouse gas emission have paved the way for an increase in the use of generation. Holocene exploitation in the electric power and difficulty originate from construction and maintenance of large power plants have embossed a gravid deal of interest in distributed power generation. DG is one of the executable option for moderation of problem of load maturation, overloading of lines, timber of supply and reliability in term of exerting equipments maintenance intervals and to abbreviate line losses. Distributed generation is the technique where establishment of the power system as nearer as possible to the consumers and then compare it with the centralized power plants. But there are many difficulties and complexities in placement of DG in radial system, so to overcome these problems (i.e. active and reactive power loss, voltage profile, sizing and sitting of DG, reliability) researchers were used some biological (or) evolutionary algorithms( analytical method, numerical approach, meta-heuristic approach and hybrid approaches). These algorithms follow a strategy where design variables (location, size, type, no. of DG's) and load variables (constant power, variable power) must be considered according to the requirement. These algorithms were tested on a various bus system. This paper presents a brief review of techniques proposed for optimal placement of DG in radial distribution system and those techniques has been shown there effective results.
{"title":"Techniques for optimal placement of DG in radial distribution system: A review","authors":"Purva Sharma, Ankush Tandon","doi":"10.1109/CCINTELS.2015.7437959","DOIUrl":"https://doi.org/10.1109/CCINTELS.2015.7437959","url":null,"abstract":"Electricity market reconstituting relegates in power generation technologies and correspondence on the diminution of global greenhouse gas emission have paved the way for an increase in the use of generation. Holocene exploitation in the electric power and difficulty originate from construction and maintenance of large power plants have embossed a gravid deal of interest in distributed power generation. DG is one of the executable option for moderation of problem of load maturation, overloading of lines, timber of supply and reliability in term of exerting equipments maintenance intervals and to abbreviate line losses. Distributed generation is the technique where establishment of the power system as nearer as possible to the consumers and then compare it with the centralized power plants. But there are many difficulties and complexities in placement of DG in radial system, so to overcome these problems (i.e. active and reactive power loss, voltage profile, sizing and sitting of DG, reliability) researchers were used some biological (or) evolutionary algorithms( analytical method, numerical approach, meta-heuristic approach and hybrid approaches). These algorithms follow a strategy where design variables (location, size, type, no. of DG's) and load variables (constant power, variable power) must be considered according to the requirement. These algorithms were tested on a various bus system. This paper presents a brief review of techniques proposed for optimal placement of DG in radial distribution system and those techniques has been shown there effective results.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125036274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}