Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6992971
M. Saravanan, V. Jyothi
Web Usage Mining can be described as the discovery and analysis of user access pattern through mining of log files and associated data from a particular websites. Huge Number of visitors interact daily with web sites around the world. Huge amount of data are being produced and these in order could be very helpful to the company in the field of compliant customer's behaviors'. The world wide web contains increasing amount of websites which in turn contain increasing number of web pages. When a user visits a new website, it has to go through large number of web pages to meet their necessities. Web usage mining is the procedure of removing useful information from server logs. Hence, this work discovers sequential patterns of web files using genetic algorithm. This approach can be used to analyze the recent visitor's trend and lead to the creation of repeated and most visited pages. The purpose of using genetic algorithm is to find optimal sequential web pages.
{"title":"A novel approach for sequential pattern mining by using genetic algorithm","authors":"M. Saravanan, V. Jyothi","doi":"10.1109/ICCICCT.2014.6992971","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992971","url":null,"abstract":"Web Usage Mining can be described as the discovery and analysis of user access pattern through mining of log files and associated data from a particular websites. Huge Number of visitors interact daily with web sites around the world. Huge amount of data are being produced and these in order could be very helpful to the company in the field of compliant customer's behaviors'. The world wide web contains increasing amount of websites which in turn contain increasing number of web pages. When a user visits a new website, it has to go through large number of web pages to meet their necessities. Web usage mining is the procedure of removing useful information from server logs. Hence, this work discovers sequential patterns of web files using genetic algorithm. This approach can be used to analyze the recent visitor's trend and lead to the creation of repeated and most visited pages. The purpose of using genetic algorithm is to find optimal sequential web pages.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"30 1","pages":"284-288"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82776544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993110
R. Rahul, R. Thilagavathy
The paper presents a novel low phase noise voltage-controlled ring oscillator designed in UMC 0.18μm technology. The proposed design contains nine stages of differential delay cells with multiple-pass loop architecture. Linear frequency - voltage characteristics are exhibited over a wide tuning range. The tuning range of nine-stage ring oscillator is 1.1-2.3 GHz. A phase noise of -108.13dBc/Hz was estimated at an offset of 1MHz from a center frequency of 1.8 GHz. The design uses a 1.8V supply and consumes a maximum power of 65mW while operating at 1.8GHz.
{"title":"A low phase noise CMOS voltage-controlled differential ring oscillator","authors":"R. Rahul, R. Thilagavathy","doi":"10.1109/ICCICCT.2014.6993110","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993110","url":null,"abstract":"The paper presents a novel low phase noise voltage-controlled ring oscillator designed in UMC 0.18μm technology. The proposed design contains nine stages of differential delay cells with multiple-pass loop architecture. Linear frequency - voltage characteristics are exhibited over a wide tuning range. The tuning range of nine-stage ring oscillator is 1.1-2.3 GHz. A phase noise of -108.13dBc/Hz was estimated at an offset of 1MHz from a center frequency of 1.8 GHz. The design uses a 1.8V supply and consumes a maximum power of 65mW while operating at 1.8GHz.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"8 1","pages":"1025-1028"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83642359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6992966
T. Manesh, M. Sha, K. Vivekanandan
Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.
在过去的十年里,随着互联网用户数量的急剧增加,在线分享数字同意书已经变得很普遍。有许多在线共享资源提供了巨大的存储空间。这些设施促使互联网用户上传和下载盗版软件、电影和其他类似的侵犯版权的数字资产。P2P协议在这些在线共享网站和资源的背后起着作用。该网络小组现在在全国各地非常活跃,追踪和欺诈性共享文件。因此,作为网络取证调查的一部分,有必要建立一种有效的机制来查找正在从特定机器上传或下载的实际内容。通常,P2P网站和服务在企业和教育机构被封锁,以避免共享不必要的数字资产,并增加互联网带宽。该技术基于网络取证技术,可对P2P Bit Torrent协议进行内容级观察,并生成恶意用户之间的原始恶意内容或会话,为其在法庭上的起诉提供依据。
{"title":"Forensic investigation framework for P2P protocol","authors":"T. Manesh, M. Sha, K. Vivekanandan","doi":"10.1109/ICCICCT.2014.6992966","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992966","url":null,"abstract":"Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"26 1","pages":"256-264"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89266524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993047
Rachit Sapra, Michael J. Mathew, S. Majumder
Robot motion planning in workspace suffers from issues like multiple Inverse Kinematics solutions and computationally expensive collision detection. The concept of Configuration Space was thus introduced in robotics to ease the problem of motion planning. This paper presents an approach to transform obstacles in the workspace to obstacles in the Configuration space for a 2 Degree of Freedom (DOF) R-R planar manipulator. The proposed algorithm uses a single primitive using which various convex and non-convex obstacles in the world can be transformed to their configuration space equivalent. The explicit construction of entire obstacle in configuration space is computationally expensive. Thus, only the boundaries of obstacle in configuration space have been generated by utilizing the properties of configuration space transforms. This approach can be generalized, with some modifications, to represent configuration space obstacles for robots with higher DOF. After reading this paper, the reader should be able to understand the need for configuration space in robotics, some of its essential properties and be able to construct one for planar manipulators.
{"title":"Efficient computation of configuration space transforms for collision-free motion planning","authors":"Rachit Sapra, Michael J. Mathew, S. Majumder","doi":"10.1109/ICCICCT.2014.6993047","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993047","url":null,"abstract":"Robot motion planning in workspace suffers from issues like multiple Inverse Kinematics solutions and computationally expensive collision detection. The concept of Configuration Space was thus introduced in robotics to ease the problem of motion planning. This paper presents an approach to transform obstacles in the workspace to obstacles in the Configuration space for a 2 Degree of Freedom (DOF) R-R planar manipulator. The proposed algorithm uses a single primitive using which various convex and non-convex obstacles in the world can be transformed to their configuration space equivalent. The explicit construction of entire obstacle in configuration space is computationally expensive. Thus, only the boundaries of obstacle in configuration space have been generated by utilizing the properties of configuration space transforms. This approach can be generalized, with some modifications, to represent configuration space obstacles for robots with higher DOF. After reading this paper, the reader should be able to understand the need for configuration space in robotics, some of its essential properties and be able to construct one for planar manipulators.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"684-689"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89646467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993059
Rahul Jain, P. Shetty, Satyanarayan Shenoy
This paper presents methodologies for design and experimental evaluation of both Proportional Integral and Derivative (PID) and Extended State Observer (ESO) controller for auto landing system. The process of auto landing can be experimentally described as second-order model for ESO controller. A PID controller and ESO controller is proposed to achieve the desired response for the autoland system. Computer simulations are performed to illustrate the performance of PID and ESO controller in comparison to each other. The applicability and usefulness of the proposed control scheme are well exemplified by conducting experiments on an aircraft model. Both simulations and experimental results reveal that the proposed PID and ESO scheme performs equally.
{"title":"Experimental evaluation of PID and ESO controller for instrument landing system","authors":"Rahul Jain, P. Shetty, Satyanarayan Shenoy","doi":"10.1109/ICCICCT.2014.6993059","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993059","url":null,"abstract":"This paper presents methodologies for design and experimental evaluation of both Proportional Integral and Derivative (PID) and Extended State Observer (ESO) controller for auto landing system. The process of auto landing can be experimentally described as second-order model for ESO controller. A PID controller and ESO controller is proposed to achieve the desired response for the autoland system. Computer simulations are performed to illustrate the performance of PID and ESO controller in comparison to each other. The applicability and usefulness of the proposed control scheme are well exemplified by conducting experiments on an aircraft model. Both simulations and experimental results reveal that the proposed PID and ESO scheme performs equally.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"24 1","pages":"751-757"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81867914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6992991
Rini Maria James, I. Mahalakshmi, M. Rangachar
Orthogonal Frequency Division Multiplexing (OFDM) is a digital transmission technique used both in wired and wireless communication systems to achieve higher data rates. The idea of OFDM is to split the total transmission bandwidth into a number of orthogonal subcarriers which are transmitted in parallel. In this paper the performance of OFDM baseband receiver is analyzed for various received signal impairments. The impairments considered includes phase offset, frequency offset and synchronization mismatches. Finally the quantization of these observations are carried out.
{"title":"OFDM baseband receiver performance analysis for various received signal impairments","authors":"Rini Maria James, I. Mahalakshmi, M. Rangachar","doi":"10.1109/ICCICCT.2014.6992991","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992991","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a digital transmission technique used both in wired and wireless communication systems to achieve higher data rates. The idea of OFDM is to split the total transmission bandwidth into a number of orthogonal subcarriers which are transmitted in parallel. In this paper the performance of OFDM baseband receiver is analyzed for various received signal impairments. The impairments considered includes phase offset, frequency offset and synchronization mismatches. Finally the quantization of these observations are carried out.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"22 1","pages":"382-387"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80387498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993001
T. Joseph, Ajith Ravindran
This paper deals with the design and evolution of different 4×4 bit DRAM cells. Performances of different volatile 4×4 DRAM cells are compared. The comparison is done on the basis of power, area and delay. The 4×4 Non-Volatile (NVDRAM 4T1D) cell is proposed. The performance of the NVDRAM is then examined. The schematic entry was done using Mentor Graphics Design architect and simulations are done using Mentor Graphics Eldo. The simulation results obtained with TSMC 0.18μm process technology at 1.8V.
{"title":"Implementation of non-volatile 4×4 4T1D DRAM cell in 0.18μm technology","authors":"T. Joseph, Ajith Ravindran","doi":"10.1109/ICCICCT.2014.6993001","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993001","url":null,"abstract":"This paper deals with the design and evolution of different 4×4 bit DRAM cells. Performances of different volatile 4×4 DRAM cells are compared. The comparison is done on the basis of power, area and delay. The 4×4 Non-Volatile (NVDRAM 4T1D) cell is proposed. The performance of the NVDRAM is then examined. The schematic entry was done using Mentor Graphics Design architect and simulations are done using Mentor Graphics Eldo. The simulation results obtained with TSMC 0.18μm process technology at 1.8V.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"507 1","pages":"435-439"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77348695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993182
N. R. Sreeprathab, X. F. Joseph
In the established Voltage source inverter (VSI) and Current source inverter (CSI), are customized to get a new technology called as Z Source inverter. This highly developed Z Source technology has a set of connections of LC with revision, and traditional pulse width modulated signal which is used with modifications. In order to interconnect the main circuit to the power source, the Z Source inverter is being employed, which holds the distinctive impedance system. So as to overcome the concept and hypothetical obstacles and boundaries present in VSI and CSI, gives a fresh power conversion model. In this paper various topologies of Z Source inverters are reviewed and discussed.
{"title":"A survey on Z-source inverter","authors":"N. R. Sreeprathab, X. F. Joseph","doi":"10.1109/ICCICCT.2014.6993182","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993182","url":null,"abstract":"In the established Voltage source inverter (VSI) and Current source inverter (CSI), are customized to get a new technology called as Z Source inverter. This highly developed Z Source technology has a set of connections of LC with revision, and traditional pulse width modulated signal which is used with modifications. In order to interconnect the main circuit to the power source, the Z Source inverter is being employed, which holds the distinctive impedance system. So as to overcome the concept and hypothetical obstacles and boundaries present in VSI and CSI, gives a fresh power conversion model. In this paper various topologies of Z Source inverters are reviewed and discussed.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"110 1","pages":"1406-1410"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78104541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993195
D. Sudhakar, M. D. Anand, P. Gopu, Yang Wang, Mohammadreza Shabgard, Hamed Kakolvand, Mirsadegh Seyedzavvar
Machining of super alloys, composite materials and some high strength hard to machine materials by using Electrical Discharge Machining (EDM) produces poor quality surface finish. Ultrasonic Assisted Electrical Discharge Machining (USEDM) is one of the advanced hybrid type unconventional machining processes is developed to overcome the above quality problems. The ultimate aim of this paper is to conduct a literature survey in USEDM operations used by researchers among different applications using various materials. Also took a deep review in different prediction and optimization techniques used by researchers to obtain the optimal input parameters setting for getting an optimal solution in machining area.
{"title":"A retrospective study based on the soft computing approach in combined Ultrasonic Assisted Electrical Discharge Machining","authors":"D. Sudhakar, M. D. Anand, P. Gopu, Yang Wang, Mohammadreza Shabgard, Hamed Kakolvand, Mirsadegh Seyedzavvar","doi":"10.1109/ICCICCT.2014.6993195","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993195","url":null,"abstract":"Machining of super alloys, composite materials and some high strength hard to machine materials by using Electrical Discharge Machining (EDM) produces poor quality surface finish. Ultrasonic Assisted Electrical Discharge Machining (USEDM) is one of the advanced hybrid type unconventional machining processes is developed to overcome the above quality problems. The ultimate aim of this paper is to conduct a literature survey in USEDM operations used by researchers among different applications using various materials. Also took a deep review in different prediction and optimization techniques used by researchers to obtain the optimal input parameters setting for getting an optimal solution in machining area.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"480 1","pages":"1487-1494"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75178852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993143
Naveen Motamarri, Munshi Nurul Islam, P. Apurbaranjan, S. Deepu, S. Prasantakumar
This paper presents the design and simulation of High gain Source degenerated Cascode LNA for Wi-max and W-CDMA applications at 3.5GHz. The design uses an enhanced cascade topology to attain improved forward gain and noise figure. Th is design includes lumped elements like inductor, capacitor and resistors to design input and output matching networks. The targeted narrow-band gain, impedance matching and noise figure are achieved at the 3.5GHz. Circuit has been designed Using standard UMC 0.18μm CMOS technology and simulated in the Cadence Spectre RF tool. Targeted narrowband gain, noise figure, are 25dB and 2dB respectively. The designed circuit exhibits narrow-band gain of 27.18 dB and noise figure of 1.7 dB with Input and output return loss of -17.57 dB and -29.21 dB respectively. Circuit operates from the supply voltage of 1.8V and draws a current of 6.39mA.
{"title":"A high-gain Source degenerative Cascode LNA for Wi-MAX and W-CDMA applications at 3.5GHz","authors":"Naveen Motamarri, Munshi Nurul Islam, P. Apurbaranjan, S. Deepu, S. Prasantakumar","doi":"10.1109/ICCICCT.2014.6993143","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993143","url":null,"abstract":"This paper presents the design and simulation of High gain Source degenerated Cascode LNA for Wi-max and W-CDMA applications at 3.5GHz. The design uses an enhanced cascade topology to attain improved forward gain and noise figure. Th is design includes lumped elements like inductor, capacitor and resistors to design input and output matching networks. The targeted narrow-band gain, impedance matching and noise figure are achieved at the 3.5GHz. Circuit has been designed Using standard UMC 0.18μm CMOS technology and simulated in the Cadence Spectre RF tool. Targeted narrowband gain, noise figure, are 25dB and 2dB respectively. The designed circuit exhibits narrow-band gain of 27.18 dB and noise figure of 1.7 dB with Input and output return loss of -17.57 dB and -29.21 dB respectively. Circuit operates from the supply voltage of 1.8V and draws a current of 6.39mA.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"95 1","pages":"1200-1204"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83402111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}