Pub Date : 2018-12-01DOI: 10.1109/SPC.2018.8704142
Harnani Hassan, F. Saad, Nor Fazlin, A. Aziz
Currently, most of waste management system is implemented using a conventional system. The organisation such as Alam Flora Sdn. Bhd manages the domestic waste by assigning the worker to collect the waste without identification system. This paper presents a development of waste monitoring and collecting system based on Internet-of-Thing (IoT). The hardware implementation for the system consist of NodeMCU (microcontroller board) connected to two ultrasonic sensors with Wifi module (ISM Band 900) attached to the board. In the system, these sensors are utilised to implement an automatic lid opener and to update the waste level condition for monitoring system. The developed system is designed to monitor the waste level (condition) in the bin (‘full bin’ or ‘not full’) via internet through mobile application (Apps). The developed Apps provides a real-time update of the waste level status for collection. The real-time update from the sensor is uploaded through the developed mobile Apps via URL to the database. Waste collector or end user need to access the update via mobile Apps for further action. In this project, the ultrasonic sensor sensitivity is tested on ‘flat’ and ‘non-flat’ waste type. The result showed that type of waste (‘flat’ or ‘non-flat’) with specific angle of reflection has influenced the sensor sensitivity to identify the waste level status. The developed system could be potentially utilised to improvise the conventional system waste collection to more effective system.
目前,大多数废物管理系统都是使用传统系统实施的。像Alam Flora Sdn这样的组织。Bhd管理生活垃圾的方式是指派工人收集垃圾,而没有识别系统。本文介绍了一种基于物联网(IoT)的垃圾监测收集系统的开发。该系统的硬件实现由NodeMCU(微控制器板)连接到两个超声波传感器,Wifi模块(ISM Band 900)连接到板上。在该系统中,这些传感器用于实现自动开盖器和更新废物水平状况,以供监测系统使用。开发的系统旨在通过移动应用程序通过互联网监测垃圾箱中的废物水平(状况)(“满箱”或“未满箱”)。开发的应用程序提供废物水平状态的实时更新,以便收集。传感器的实时更新通过开发的移动应用程序通过URL上传到数据库。废物收集者或最终用户需要通过移动应用程序访问更新,以便采取进一步行动。在这个项目中,超声波传感器的灵敏度测试了“平坦”和“非平坦”废物类型。结果表明,具有特定反射角的废物类型(“平坦”或“非平坦”)影响传感器识别废物水平状态的灵敏度。开发的系统可以潜在地将传统的废物收集系统改进为更有效的系统。
{"title":"Waste Monitoring System based on Internet-of-Thing (IoT)","authors":"Harnani Hassan, F. Saad, Nor Fazlin, A. Aziz","doi":"10.1109/SPC.2018.8704142","DOIUrl":"https://doi.org/10.1109/SPC.2018.8704142","url":null,"abstract":"Currently, most of waste management system is implemented using a conventional system. The organisation such as Alam Flora Sdn. Bhd manages the domestic waste by assigning the worker to collect the waste without identification system. This paper presents a development of waste monitoring and collecting system based on Internet-of-Thing (IoT). The hardware implementation for the system consist of NodeMCU (microcontroller board) connected to two ultrasonic sensors with Wifi module (ISM Band 900) attached to the board. In the system, these sensors are utilised to implement an automatic lid opener and to update the waste level condition for monitoring system. The developed system is designed to monitor the waste level (condition) in the bin (‘full bin’ or ‘not full’) via internet through mobile application (Apps). The developed Apps provides a real-time update of the waste level status for collection. The real-time update from the sensor is uploaded through the developed mobile Apps via URL to the database. Waste collector or end user need to access the update via mobile Apps for further action. In this project, the ultrasonic sensor sensitivity is tested on ‘flat’ and ‘non-flat’ waste type. The result showed that type of waste (‘flat’ or ‘non-flat’) with specific angle of reflection has influenced the sensor sensitivity to identify the waste level status. The developed system could be potentially utilised to improvise the conventional system waste collection to more effective system.","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123830863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/SPC.2018.8704150
A. Zourmand, T. Nong
This research shows the design of a fuzzy evaluation approach in an intelligent speech assessment system for Malay vowels. The suggested system is really suitable for the children patient can undertake assessment. The target client is 7 to 12 years Malay children. Hidden Markov Model is applied as a technique of speech recognition in the system. Clients are able to exercise and test on their own convenience time independently and the system is able to evaluate their pronunciation as well as the quality of their pronunciation. The fuzzy evaluation session can provide a feedback on the performance of each client vowel pronunciation. In order to have an accurate evaluation, three parameters are involved in fuzzy expert decision making system as inputs. The distance of the formant frequencies, log-probability of HMM and number of correct recognition by HMM play the main rule in vowel quality uttered by client which involved in decision making process of the proposed system. The result of project shows that, the accuracy of the proposed fuzzy expert evaluation system increase up to 89%.
{"title":"Fuzzy Evaluation System: Intelligent Speech Assessment System","authors":"A. Zourmand, T. Nong","doi":"10.1109/SPC.2018.8704150","DOIUrl":"https://doi.org/10.1109/SPC.2018.8704150","url":null,"abstract":"This research shows the design of a fuzzy evaluation approach in an intelligent speech assessment system for Malay vowels. The suggested system is really suitable for the children patient can undertake assessment. The target client is 7 to 12 years Malay children. Hidden Markov Model is applied as a technique of speech recognition in the system. Clients are able to exercise and test on their own convenience time independently and the system is able to evaluate their pronunciation as well as the quality of their pronunciation. The fuzzy evaluation session can provide a feedback on the performance of each client vowel pronunciation. In order to have an accurate evaluation, three parameters are involved in fuzzy expert decision making system as inputs. The distance of the formant frequencies, log-probability of HMM and number of correct recognition by HMM play the main rule in vowel quality uttered by client which involved in decision making process of the proposed system. The result of project shows that, the accuracy of the proposed fuzzy expert evaluation system increase up to 89%.","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126771947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/spc.2018.8704125
{"title":"ICSPC 2018 Author’s Index","authors":"","doi":"10.1109/spc.2018.8704125","DOIUrl":"https://doi.org/10.1109/spc.2018.8704125","url":null,"abstract":"","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127731241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/SPC.2018.8704140
S. Pranavanand, I. Elamvazuthi, S. Harivardhagini, A. R. Ram
This work details the development of both mathematical model and nonlinear controllers for Single Fluid Heat Transfer System (SFHTS). A prototype setup of SFHTS has been developed. Different controller that were tested on the simulated model has been tested on the prototype mode tool. SFHTS is a nonlinear system. This system has been modularized into Thermal Transfer Module and Level Control Module. Hitherto linear controllers were used to control the process. Intentional disturbances have been applied to the prototype model. A novel control scheme that is computationally ease and effective in perturbation rejection has been developed. Experimental results confirm that the novel controller developed is better in reaching the set point and negating the perturbation thereafter.
{"title":"Experimental Analysis of a Novel Control Scheme Developed for Single Fluid Heat Transfer System","authors":"S. Pranavanand, I. Elamvazuthi, S. Harivardhagini, A. R. Ram","doi":"10.1109/SPC.2018.8704140","DOIUrl":"https://doi.org/10.1109/SPC.2018.8704140","url":null,"abstract":"This work details the development of both mathematical model and nonlinear controllers for Single Fluid Heat Transfer System (SFHTS). A prototype setup of SFHTS has been developed. Different controller that were tested on the simulated model has been tested on the prototype mode tool. SFHTS is a nonlinear system. This system has been modularized into Thermal Transfer Module and Level Control Module. Hitherto linear controllers were used to control the process. Intentional disturbances have been applied to the prototype model. A novel control scheme that is computationally ease and effective in perturbation rejection has been developed. Experimental results confirm that the novel controller developed is better in reaching the set point and negating the perturbation thereafter.","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/SPC.2018.8704130
W. Yafooz, Z. Bakar, A. Mithun
An enormous quantity of textual documents is created from the advanced technological use concerning describing, intelligence, interconnection, and thousands of distinct authorizations and was expanding each moment of quotidian circumstances. The Clustering is an automated established process to organize the database on features. Outwardly implementing a clustering technique to textual data, a huge quantity of unstructured data is losing the capability of sharing knowledge. There are many tools and techniques proposed. This paper present and categorized the textual document clustering algorithms (approaches) into two types are classical and modern approaches. Both approaches are implemented to those textual data to obtain and consolidate knowledge from discharged to an extraordinary impression of a prepared document. The two important factors in clustering process are speed of clustering process and accuracy or purity of data clusters. This review paper can be benefits to many researchers who concern on textual document clustering, text mining and data scientist.
{"title":"Textual Document Clustering in Traditional and Modern Approaches (Review)","authors":"W. Yafooz, Z. Bakar, A. Mithun","doi":"10.1109/SPC.2018.8704130","DOIUrl":"https://doi.org/10.1109/SPC.2018.8704130","url":null,"abstract":"An enormous quantity of textual documents is created from the advanced technological use concerning describing, intelligence, interconnection, and thousands of distinct authorizations and was expanding each moment of quotidian circumstances. The Clustering is an automated established process to organize the database on features. Outwardly implementing a clustering technique to textual data, a huge quantity of unstructured data is losing the capability of sharing knowledge. There are many tools and techniques proposed. This paper present and categorized the textual document clustering algorithms (approaches) into two types are classical and modern approaches. Both approaches are implemented to those textual data to obtain and consolidate knowledge from discharged to an extraordinary impression of a prepared document. The two important factors in clustering process are speed of clustering process and accuracy or purity of data clusters. This review paper can be benefits to many researchers who concern on textual document clustering, text mining and data scientist.","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/spc.2018.8704151
{"title":"ICSPC 2018 Copyright Page","authors":"","doi":"10.1109/spc.2018.8704151","DOIUrl":"https://doi.org/10.1109/spc.2018.8704151","url":null,"abstract":"","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/SPC.2018.8704154
H. Jaafar, Z. Mohamed, L. Ramli, A. Abdullahi
This paper proposes an alternative feedforward command shaping for vibration control of a nonlinear double-pendulum overhead crane system. The proposed feedforward shaper is designed based on a model reference and without the need for the damping ratio and natural frequency of the crane system. The effectiveness of the shaper is studied using a laboratory overhead crane. Experimental studies show that the proposed shaper resulted in lower overall hook and payload oscillations under different cases of cable lengths as compared with multiple single-mode input shapers.
{"title":"Vibration Control of a Nonlinear Double-Pendulum Overhead Crane Using Feedforward Command Shaping","authors":"H. Jaafar, Z. Mohamed, L. Ramli, A. Abdullahi","doi":"10.1109/SPC.2018.8704154","DOIUrl":"https://doi.org/10.1109/SPC.2018.8704154","url":null,"abstract":"This paper proposes an alternative feedforward command shaping for vibration control of a nonlinear double-pendulum overhead crane system. The proposed feedforward shaper is designed based on a model reference and without the need for the damping ratio and natural frequency of the crane system. The effectiveness of the shaper is studied using a laboratory overhead crane. Experimental studies show that the proposed shaper resulted in lower overall hook and payload oscillations under different cases of cable lengths as compared with multiple single-mode input shapers.","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114953844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/SPC.2018.8704157
N. A. Othman, Muhammad Hariz Bin Abdul Rahman, A. S. A. Sani, Fakariah Hani Mohd Ali
Authentication has been advanced by implying advancement in security such as cryptography to protect password against data leaking and sniffing; captcha to prevent robot system; Secure Sockets Layer designed to protect users against phishing website and many other solution invented for different types of vulnerabilities. Although there are other methods suggested for preventing shoulder surfing (i.e. exposure of password to nearby observing-person), the techniques still have some drawback. Some of the proposed techniques also required high computational process with high range of possible answer. This paper proposed a shoulder-surfing-proof graphical based authentication with direction scheme that combines technique adapted from Passfaces scheme and a selection of direction. User is required to choose four faces and one direction to serve as the secret authentication. Besides shoulder surfing, the proposed method also caters security in data transmission storage as hashing is applied along the communication. This technique has been proven to demonstrate the robustness, security strength and the functionality advantages of the system. The result from the security testing shows that image based passwords is more secure because the possibility of the image to be guessed is very low.
{"title":"Directional Based Graphical Authentication Method with Shoulder Surfing Resistant","authors":"N. A. Othman, Muhammad Hariz Bin Abdul Rahman, A. S. A. Sani, Fakariah Hani Mohd Ali","doi":"10.1109/SPC.2018.8704157","DOIUrl":"https://doi.org/10.1109/SPC.2018.8704157","url":null,"abstract":"Authentication has been advanced by implying advancement in security such as cryptography to protect password against data leaking and sniffing; captcha to prevent robot system; Secure Sockets Layer designed to protect users against phishing website and many other solution invented for different types of vulnerabilities. Although there are other methods suggested for preventing shoulder surfing (i.e. exposure of password to nearby observing-person), the techniques still have some drawback. Some of the proposed techniques also required high computational process with high range of possible answer. This paper proposed a shoulder-surfing-proof graphical based authentication with direction scheme that combines technique adapted from Passfaces scheme and a selection of direction. User is required to choose four faces and one direction to serve as the secret authentication. Besides shoulder surfing, the proposed method also caters security in data transmission storage as hashing is applied along the communication. This technique has been proven to demonstrate the robustness, security strength and the functionality advantages of the system. The result from the security testing shows that image based passwords is more secure because the possibility of the image to be guessed is very low.","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129632376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/SPC.2018.8704147
Nurul Hanani Abdullah, R. Adnan, A. Samad, Fazlina Ahmat Ruslan
Lightning is one of extreme weather phenomenon in Malaysia. It is because Malaysia has high lightning and thunderstorm occurrences in yearly basis. In aviation industry, weather awareness is very important to ensure the passenger safety. Therefore, lightning forecasting is very important to warn people on lightning occurring nearby and give them an ample time to evacuate before the lightning happens. Thus, this paper proposed lightning forecasting using Artificial Neural Network (ANN) at Sultan Abdul Aziz Shah Airport Subang. The ANN model developed using Multilayer Perceptron Neural Network (MLPNN) structure and then the simulation result is compared with the actual values. Data used is meteorological data obtained from Meteorological Malaysian Services (MMS). Simulation is done using Matlab Neural Network Toolbox for training and testing process. Simulation results showed that MLPNN successfully predict the occurrence of lightning ahead of time in Sultan Abdul Aziz Shah Airport Subang.
{"title":"Lightning Forecasting Modelling Using Artificial Neural Network (ANN): Case Study Sultan Abdul Aziz Shah Airport or Skypark Subang","authors":"Nurul Hanani Abdullah, R. Adnan, A. Samad, Fazlina Ahmat Ruslan","doi":"10.1109/SPC.2018.8704147","DOIUrl":"https://doi.org/10.1109/SPC.2018.8704147","url":null,"abstract":"Lightning is one of extreme weather phenomenon in Malaysia. It is because Malaysia has high lightning and thunderstorm occurrences in yearly basis. In aviation industry, weather awareness is very important to ensure the passenger safety. Therefore, lightning forecasting is very important to warn people on lightning occurring nearby and give them an ample time to evacuate before the lightning happens. Thus, this paper proposed lightning forecasting using Artificial Neural Network (ANN) at Sultan Abdul Aziz Shah Airport Subang. The ANN model developed using Multilayer Perceptron Neural Network (MLPNN) structure and then the simulation result is compared with the actual values. Data used is meteorological data obtained from Meteorological Malaysian Services (MMS). Simulation is done using Matlab Neural Network Toolbox for training and testing process. Simulation results showed that MLPNN successfully predict the occurrence of lightning ahead of time in Sultan Abdul Aziz Shah Airport Subang.","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121164324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/SPC.2018.8704160
Omar Ismael Al-Sanjary, Ahmed Abdullah Ahmed, H. B. Ahmad, Musab A. M. Ali, M. N. Mohammed, Muhammad Irsyad Abdullah, Zurida Ishak
Digital video can be manipulated and edited easily because of the available robust video processing and editing software. In the current times, the digital video and digital image editing tools has contributed to the challenge in authenticating multimedia content in an accurate manner. It is now possible to modify, through adding and removing, pertinent evidence form a video recording without leaving a clue as to the tampering process. Even worse, some post-methods effects, which can insert and deleting object in order to mimic or hide a particular event in the frames of video, are also diffuse. Many endeavors have been focusing to detect like video copy-move manipulate to date; but, the accuracy rates are still far from satisfactory for improvement and the method do not locate the issue of region tampering detection and determine localization. Consequently, the study of this paper is aims to design and develop a new video copy-move forgery detection scheme with high accuracy based on optical flow methods.
{"title":"Deleting Object in Video Copy-Move Forgery Detection Based on Optical Flow Concept","authors":"Omar Ismael Al-Sanjary, Ahmed Abdullah Ahmed, H. B. Ahmad, Musab A. M. Ali, M. N. Mohammed, Muhammad Irsyad Abdullah, Zurida Ishak","doi":"10.1109/SPC.2018.8704160","DOIUrl":"https://doi.org/10.1109/SPC.2018.8704160","url":null,"abstract":"Digital video can be manipulated and edited easily because of the available robust video processing and editing software. In the current times, the digital video and digital image editing tools has contributed to the challenge in authenticating multimedia content in an accurate manner. It is now possible to modify, through adding and removing, pertinent evidence form a video recording without leaving a clue as to the tampering process. Even worse, some post-methods effects, which can insert and deleting object in order to mimic or hide a particular event in the frames of video, are also diffuse. Many endeavors have been focusing to detect like video copy-move manipulate to date; but, the accuracy rates are still far from satisfactory for improvement and the method do not locate the issue of region tampering detection and determine localization. Consequently, the study of this paper is aims to design and develop a new video copy-move forgery detection scheme with high accuracy based on optical flow methods.","PeriodicalId":432464,"journal":{"name":"2018 IEEE Conference on Systems, Process and Control (ICSPC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130967465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}