Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622971
V. Prevosto, J. Burghardt, Jens Gerlach, Kerstin Hartig, H. Pohl, Kim Völlinger
This paper presents the use of the Frama-C toolkit for the formal verification of a model of train-controlling software against the requirements of the CENELEC norm EN 50128. We also compare our formal approach with traditional unit testing.
{"title":"Formal specification and automated verification of railway software with Frama-C","authors":"V. Prevosto, J. Burghardt, Jens Gerlach, Kerstin Hartig, H. Pohl, Kim Völlinger","doi":"10.1109/INDIN.2013.6622971","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622971","url":null,"abstract":"This paper presents the use of the Frama-C toolkit for the formal verification of a model of train-controlling software against the requirements of the CENELEC norm EN 50128. We also compare our formal approach with traditional unit testing.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"57 1","pages":"710-715"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86545188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622902
Jiantao Yao, Guowang Wu, Yongsheng Zhao
For the real-time adjustment of the Satellite Integrated Assembly, Stewart platform-based mechanism is adopted. This paper presents the optimization design of the parallel adjustment platform for satellite integrated assembly and the analysis of the configuration is optimized. The actual working conditions and real limit of system size is considered when optimizing the configuration. Placing the moving platform to the limit postures when analysis the force. The contents of this paper possess theoretical significance and engineering value for the development of the parallel adjustment platform for satellite integrated assembly.
{"title":"Configuration optimization and analysis of the parallel adjustment platform for Satellite Integrated Assembly","authors":"Jiantao Yao, Guowang Wu, Yongsheng Zhao","doi":"10.1109/INDIN.2013.6622902","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622902","url":null,"abstract":"For the real-time adjustment of the Satellite Integrated Assembly, Stewart platform-based mechanism is adopted. This paper presents the optimization design of the parallel adjustment platform for satellite integrated assembly and the analysis of the configuration is optimized. The actual working conditions and real limit of system size is considered when optimizing the configuration. Placing the moving platform to the limit postures when analysis the force. The contents of this paper possess theoretical significance and engineering value for the development of the parallel adjustment platform for satellite integrated assembly.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"66 1","pages":"317-320"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87111730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622957
M. Magno, E. Popovici, Alessandro Bravin, Antonio Libri, M. Storace, L. Benini
The paper provides a framework to save energy and reduce the operative cost of some of today's industrial machinery. Low cost and low power wireless sensor networks is a novel approach to monitoring the tools in order to save energy and keep the tools monitored. Cutting tool wear degrades the product quality in manufacturing processes and also could have implications in health and safety of use. Monitoring tool wear value online is therefore needed to prevent degradation in machine quality. Unfortunately there is no direct way of measuring the tool wear online which is also very low cost. In this work is presented a low power and low cost accelerometer-based system for wear detection of bandsaw blade. The algorithm uses a simple data processing directly on board that can extract features and perform a classification on the state of the blade. Low power design of the node, on board processing and wake up radio capabilities reduce the wireless communication and the power consumption of the node significantly. Experimental results show the high accuracy, up to 100%, of the algorithm and the low power of the proposed approach.
{"title":"Low-power wireless accelerometer-based system for wear detection of bandsaw blades","authors":"M. Magno, E. Popovici, Alessandro Bravin, Antonio Libri, M. Storace, L. Benini","doi":"10.1109/INDIN.2013.6622957","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622957","url":null,"abstract":"The paper provides a framework to save energy and reduce the operative cost of some of today's industrial machinery. Low cost and low power wireless sensor networks is a novel approach to monitoring the tools in order to save energy and keep the tools monitored. Cutting tool wear degrades the product quality in manufacturing processes and also could have implications in health and safety of use. Monitoring tool wear value online is therefore needed to prevent degradation in machine quality. Unfortunately there is no direct way of measuring the tool wear online which is also very low cost. In this work is presented a low power and low cost accelerometer-based system for wear detection of bandsaw blade. The algorithm uses a simple data processing directly on board that can extract features and perform a classification on the state of the blade. Low power design of the node, on board processing and wake up radio capabilities reduce the wireless communication and the power consumption of the node significantly. Experimental results show the high accuracy, up to 100%, of the algorithm and the low power of the proposed approach.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"7 1","pages":"630-635"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85565466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622972
Stefan Gulan, S. Johr, R. Kretschmer, Stefan Rieger, M. Ditze
The graphical modelling languages UML and SysML, nowadays widely used in industry, integrate different modelling concepts and notations in one standardised framework. However, they lack a clearly defined, unambiguous semantics and thus their formal verification represents a challenge. On the other hand, current safety standards, including ISO 26262, demand such verification especially for safety-relevant systems. The literature proposes a plethora of different semantics and formalisms for UML/SysML. In this paper we compare and summarise existing work on the formalisation of behavioural UML and SysML models and their verification. Our goal is to foster a better understanding of the problems related to UML/SysML formalisation, and to aid people bridging the gap from high level graphical modelling to formal verification techniques.
{"title":"Graphical modelling meets formal methods","authors":"Stefan Gulan, S. Johr, R. Kretschmer, Stefan Rieger, M. Ditze","doi":"10.1109/INDIN.2013.6622972","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622972","url":null,"abstract":"The graphical modelling languages UML and SysML, nowadays widely used in industry, integrate different modelling concepts and notations in one standardised framework. However, they lack a clearly defined, unambiguous semantics and thus their formal verification represents a challenge. On the other hand, current safety standards, including ISO 26262, demand such verification especially for safety-relevant systems. The literature proposes a plethora of different semantics and formalisms for UML/SysML. In this paper we compare and summarise existing work on the formalisation of behavioural UML and SysML models and their verification. Our goal is to foster a better understanding of the problems related to UML/SysML formalisation, and to aid people bridging the gap from high level graphical modelling to formal verification techniques.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"6 3 1","pages":"716-721"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89164680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622919
S. Karnouskos, P. Silva, Dejan Ilić
Significant effort is invested towards creating innovative applications for the emerging Smart Grid. However, many of these efforts use the old modus operandi of the energy domain providers i.e. offer of a monolithic application residing on proprietary or provider-only data, with little thought about cross-application collaboration and information exchange. However, the future of Smart Grid applications resides on sophisticated multi-channel applications that can rely on multi-source data and Internet provided basic services that can be easily customized for the specific end-user groups. Such a web application for monitoring and managing a Smart Grid neighborhood, where real-time energy monitoring, prediction and management of energy trading takes place, has been realized and piloted. We present here some of the key functionalities, as well as an assessment of the application and its design decisions.
{"title":"Developing a web application for monitoring and management of Smart Grid neighborhoods","authors":"S. Karnouskos, P. Silva, Dejan Ilić","doi":"10.1109/INDIN.2013.6622919","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622919","url":null,"abstract":"Significant effort is invested towards creating innovative applications for the emerging Smart Grid. However, many of these efforts use the old modus operandi of the energy domain providers i.e. offer of a monolithic application residing on proprietary or provider-only data, with little thought about cross-application collaboration and information exchange. However, the future of Smart Grid applications resides on sophisticated multi-channel applications that can rely on multi-source data and Internet provided basic services that can be easily customized for the specific end-user groups. Such a web application for monitoring and managing a Smart Grid neighborhood, where real-time energy monitoring, prediction and management of energy trading takes place, has been realized and piloted. We present here some of the key functionalities, as well as an assessment of the application and its design decisions.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"6 2 1","pages":"408-413"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90413194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622883
Samer Hanoun, Burhan Khan, Michael Johnstone, S. Nahavandi, D. Creighton
Coal handling is a complex process involving different correlated and highly dependent operations such as selecting appropriate product types, planning stockpiles, scheduling stacking and reclaiming activities and managing train loads. Planning these operations manually is time consuming and can result in non-optimized schedules as future impact of decisions may not be appropriately considered. This paper addresses the operational scheduling of the continuous coal handling problem with multiple conflicting objectives. As the problem is NP-hard in nature, an effective heuristic is presented for planning stockpiles and scheduling resources to minimize delays in production and the coal age in the stockyard. A model of stockyard operations within a coal mine is described and the problem is formulated as a Bi-Objective Optimization Problem (BOOP). The algorithm efficacy is demonstrated on different real-life data scenarios. Computational results show that the solution algorithm is effective and the coal throughput is substantially impacted by the conflicting objectives. Together, the model and the proposed heuristic, can act as a decision support system for the stockyard planner to explore the effects of alternative decisions, such as balancing age and volume of stockpiles, and minimizing conflicts due to stacker and reclaimer movements.
{"title":"An effective heuristic for stockyard planning and machinery scheduling at a coal handling facility","authors":"Samer Hanoun, Burhan Khan, Michael Johnstone, S. Nahavandi, D. Creighton","doi":"10.1109/INDIN.2013.6622883","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622883","url":null,"abstract":"Coal handling is a complex process involving different correlated and highly dependent operations such as selecting appropriate product types, planning stockpiles, scheduling stacking and reclaiming activities and managing train loads. Planning these operations manually is time consuming and can result in non-optimized schedules as future impact of decisions may not be appropriately considered. This paper addresses the operational scheduling of the continuous coal handling problem with multiple conflicting objectives. As the problem is NP-hard in nature, an effective heuristic is presented for planning stockpiles and scheduling resources to minimize delays in production and the coal age in the stockyard. A model of stockyard operations within a coal mine is described and the problem is formulated as a Bi-Objective Optimization Problem (BOOP). The algorithm efficacy is demonstrated on different real-life data scenarios. Computational results show that the solution algorithm is effective and the coal throughput is substantially impacted by the conflicting objectives. Together, the model and the proposed heuristic, can act as a decision support system for the stockyard planner to explore the effects of alternative decisions, such as balancing age and volume of stockpiles, and minimizing conflicts due to stacker and reclaimer movements.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"84 1","pages":"206-211"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81176610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622951
M. Russell, S. Fischaber
Road sign recognition is a key component in autonomous vehicles and also has applications in driver assistance systems and road sign maintenance. Here an algorithm is presented using the Xilinx Zynq-7020 chip on a Zedboard to scan 1920×1080 images taken by an ON Semiconductor VITA-2000 sensor attached via the FMC slot. The PL section of the Zynq is used to perform essential image pre-processing functions and color based filtering of the image. Software classifies the shapes in the filtered image, and OpenCV's template matching function is used to identify the signs from a database of UK road signs. The system was designed in six weeks, and can process one frame in approximately 5 seconds. This is a promising start for a real-time System on Chip based approach to the problem of road sign recognition and also for using the Zynq platform for rapid deployment of these types of applications.
{"title":"OpenCV based road sign recognition on Zynq","authors":"M. Russell, S. Fischaber","doi":"10.1109/INDIN.2013.6622951","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622951","url":null,"abstract":"Road sign recognition is a key component in autonomous vehicles and also has applications in driver assistance systems and road sign maintenance. Here an algorithm is presented using the Xilinx Zynq-7020 chip on a Zedboard to scan 1920×1080 images taken by an ON Semiconductor VITA-2000 sensor attached via the FMC slot. The PL section of the Zynq is used to perform essential image pre-processing functions and color based filtering of the image. Software classifies the shapes in the filtered image, and OpenCV's template matching function is used to identify the signs from a database of UK road signs. The system was designed in six weeks, and can process one frame in approximately 5 seconds. This is a promising start for a real-time System on Chip based approach to the problem of road sign recognition and also for using the Zynq platform for rapid deployment of these types of applications.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"1 1","pages":"596-601"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77304278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622857
J. Miranda, R. Abrishambaf, T. Gomes, Paulo Goncalves, J. Cabral, A. Tavares, J. Monteiro
Wireless Sensor Networks are an emerging technology which has been recently adopted in many applications. Due to its wireless nature, the analysis of the radio propagation models plays an important role for performance evaluation in both theoretical and practical aspects. In this regards, path loss exponent is one of the most important parameter which has been considered widely in wireless communications analysis. There are several theoretical evaluations of path loss exponent for wireless sensor networks available in the literature. However there is a lack of experimental evaluation of both path loss exponent and the effect of shadowing. In this paper, three environments (free space, in building and industrial), where wireless sensor nodes are widely deployed, have been chosen in order to evaluate the experimental analysis. Path loss and path loss exponent are measured by means of Received Signal Strength Indicator (RSSI) and based on them, the standard deviation of shadowing effect is also calculated. All the measured parameters are compared with the theoretical analysis available in the literatures.
无线传感器网络是一项新兴的技术,近年来已被广泛应用。由于其无线特性,无线电传播模型的分析在理论和实践方面都对性能评估起着重要的作用。其中,路径损耗指数是无线通信分析中被广泛考虑的重要参数之一。文献中有几种关于无线传感器网络路径损耗指数的理论评估。然而,对于路径损耗指数和阴影效应的实验评估都缺乏。本文选择了无线传感器节点广泛部署的三种环境(自由空间,建筑和工业)来评估实验分析。采用接收信号强度指标(Received Signal Strength Indicator, RSSI)测量路径损耗和路径损耗指数,并以此为基础计算阴影效应的标准差。所有测量参数都与文献中可用的理论分析进行了比较。
{"title":"Path loss exponent analysis in Wireless Sensor Networks: Experimental evaluation","authors":"J. Miranda, R. Abrishambaf, T. Gomes, Paulo Goncalves, J. Cabral, A. Tavares, J. Monteiro","doi":"10.1109/INDIN.2013.6622857","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622857","url":null,"abstract":"Wireless Sensor Networks are an emerging technology which has been recently adopted in many applications. Due to its wireless nature, the analysis of the radio propagation models plays an important role for performance evaluation in both theoretical and practical aspects. In this regards, path loss exponent is one of the most important parameter which has been considered widely in wireless communications analysis. There are several theoretical evaluations of path loss exponent for wireless sensor networks available in the literature. However there is a lack of experimental evaluation of both path loss exponent and the effect of shadowing. In this paper, three environments (free space, in building and industrial), where wireless sensor nodes are widely deployed, have been chosen in order to evaluate the experimental analysis. Path loss and path loss exponent are measured by means of Received Signal Strength Indicator (RSSI) and based on them, the standard deviation of shadowing effect is also calculated. All the measured parameters are compared with the theoretical analysis available in the literatures.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"20 1","pages":"54-58"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79565015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622965
B. Czybik, Stefan Hausmann, S. Heiss, J. Jasperneite
Industrial automation systems become more and more open for vertical integration using standardized information technology from the office world and access to the field level via Internet (Internet of Things and Industry 4.0). To protect such open automation systems there is a growing demand for the availability of suitable security features. However, real-time communication protocols used in automation networks typically provide no security functionalities and automation networks are vulnerable to numerous threats. In order to protect open automation systems, at least the authenticity of transferred data should be ensured. Therefore, an analysis of algorithms suitable for authenticity protection of data transferred by real-time Ethernet communication systems is presented in this paper. This includes an analysis of these algorithms and measurement results for a typical embedded system used in industrial Ethernet devices.
{"title":"Performance evaluation of MAC algorithms for real-time Ethernet communication systems","authors":"B. Czybik, Stefan Hausmann, S. Heiss, J. Jasperneite","doi":"10.1109/INDIN.2013.6622965","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622965","url":null,"abstract":"Industrial automation systems become more and more open for vertical integration using standardized information technology from the office world and access to the field level via Internet (Internet of Things and Industry 4.0). To protect such open automation systems there is a growing demand for the availability of suitable security features. However, real-time communication protocols used in automation networks typically provide no security functionalities and automation networks are vulnerable to numerous threats. In order to protect open automation systems, at least the authenticity of transferred data should be ensured. Therefore, an analysis of algorithms suitable for authenticity protection of data transferred by real-time Ethernet communication systems is presented in this paper. This includes an analysis of these algorithms and measurement results for a typical embedded system used in industrial Ethernet devices.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"69 1","pages":"676-681"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78221330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-29DOI: 10.1109/INDIN.2013.6622858
Daniel Herchenbach, Wei Li, Matthias Breier
The dramatic increase of electronic waste requires automatic recycling, including technologies from machine vision. A framework for segmentation and classification of THC (through-hole components) mounted on PCBAs is presented, using both RGB and depth frames from the Kinect sensor by Microsoft. A segmentation approach, combining local and global features in a flexible manner, is shown to optimize a freely definable cost function globally. We interleave segmentation and classification as we form the final components using a simple, yet robust shape model.
{"title":"Segmentation and classification of THCs on PCBAs","authors":"Daniel Herchenbach, Wei Li, Matthias Breier","doi":"10.1109/INDIN.2013.6622858","DOIUrl":"https://doi.org/10.1109/INDIN.2013.6622858","url":null,"abstract":"The dramatic increase of electronic waste requires automatic recycling, including technologies from machine vision. A framework for segmentation and classification of THC (through-hole components) mounted on PCBAs is presented, using both RGB and depth frames from the Kinect sensor by Microsoft. A segmentation approach, combining local and global features in a flexible manner, is shown to optimize a freely definable cost function globally. We interleave segmentation and classification as we form the final components using a simple, yet robust shape model.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"2015 1","pages":"59-64"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74009099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}