

Author: Yao Lina Chen Yueying Shi Li
Publisher: Inderscience Publishers
ISSN: 1746-6172
Source: International Journal of Modelling, Identification and Control, Vol.20, Iss.1, 2013-08, pp. : 82-88
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


By Al-Bayati Ahmad H. Wang Aiping Wang Hong
International Journal of Systems, Control and Communications, Vol. 5, Iss. 3-4, 2013-12 ,pp. :





