Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343473
Zheng Yuefeng, Du Huishi, Zhang Guijie, Gan Jing
Exam distinction can only reflect a course of the distinction between students. In order to find the main differentiating courses in the university curriculum, the paper proposes the concept of the course differentiation, focusing on the value of course discrimination, the classification method and the proportion of professional courses in selected courses. In order to obtain the value of course differentiation, a method of combining multi-classification and feature selection is proposed. First of all, the data sources of students' achievement are classified by traditional five-level, N-score, M-classification and unsupervised four methods. Then, using the wrapper feature selection method, the classification accuracy rate and the feature subset of each dataset are calculated by different classifiers. Finally, we found the connotation and extension of the course discrimination. Experiments show that the proposed method can find the maximum value of the course distinction and the corresponding classification method, the proportion of professional courses is much larger than the proportion of public courses. It achieves the curriculum and assessment of the distinction requirements.
{"title":"Research on the course discrimination based on multi-classification method and feature selection","authors":"Zheng Yuefeng, Du Huishi, Zhang Guijie, Gan Jing","doi":"10.1109/ICCSNT.2017.8343473","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343473","url":null,"abstract":"Exam distinction can only reflect a course of the distinction between students. In order to find the main differentiating courses in the university curriculum, the paper proposes the concept of the course differentiation, focusing on the value of course discrimination, the classification method and the proportion of professional courses in selected courses. In order to obtain the value of course differentiation, a method of combining multi-classification and feature selection is proposed. First of all, the data sources of students' achievement are classified by traditional five-level, N-score, M-classification and unsupervised four methods. Then, using the wrapper feature selection method, the classification accuracy rate and the feature subset of each dataset are calculated by different classifiers. Finally, we found the connotation and extension of the course discrimination. Experiments show that the proposed method can find the maximum value of the course distinction and the corresponding classification method, the proportion of professional courses is much larger than the proportion of public courses. It achieves the curriculum and assessment of the distinction requirements.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132951634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343716
Vu X Nguyen, Gaoxi Xiao
Most individuals, if not all, are active in various social networks. Opinion formation is an outcome of social interactions and information propagation occurring in such social systems. In this paper, we study on opinion formation on multiplex networks composed of two layers, each of which is a scale-free network, with a special focus on global consensus making in such networks. We impose a new rule of pair-wise interactions under inter-layer interplay termed as compromise following which two interacting nodes have a tendency to make a fair compromise in both senses of inter-and intra-layer interplay. It is found that in a duplex network composed of two identical layers, an increase in tolerance range in a layer declines the opinion diversity on the other layer and the two critical confidence bounds for achieving global consensus in both layers follow a one-sum rule; that is, each of the layers reaches a global consensus if the sum of two critical bounds on the two layers is approximately equal to 1, a double of critical bound on a single-layer network. However, in duplex networks of two non-identical layers with layer-layer coupling quantified by a link overlap parameter, the rule does not hold any longer. In this case, due to the larger portion of low-degree nodes in typical scale-free networks, a layer only can reach a complete consensus if its associated tolerance range is as large as nearly 0.5 even when the tolerance range on the other layer is utmost.
{"title":"Global consensus making on multiplex scale-free networks","authors":"Vu X Nguyen, Gaoxi Xiao","doi":"10.1109/ICCSNT.2017.8343716","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343716","url":null,"abstract":"Most individuals, if not all, are active in various social networks. Opinion formation is an outcome of social interactions and information propagation occurring in such social systems. In this paper, we study on opinion formation on multiplex networks composed of two layers, each of which is a scale-free network, with a special focus on global consensus making in such networks. We impose a new rule of pair-wise interactions under inter-layer interplay termed as compromise following which two interacting nodes have a tendency to make a fair compromise in both senses of inter-and intra-layer interplay. It is found that in a duplex network composed of two identical layers, an increase in tolerance range in a layer declines the opinion diversity on the other layer and the two critical confidence bounds for achieving global consensus in both layers follow a one-sum rule; that is, each of the layers reaches a global consensus if the sum of two critical bounds on the two layers is approximately equal to 1, a double of critical bound on a single-layer network. However, in duplex networks of two non-identical layers with layer-layer coupling quantified by a link overlap parameter, the rule does not hold any longer. In this case, due to the larger portion of low-degree nodes in typical scale-free networks, a layer only can reach a complete consensus if its associated tolerance range is as large as nearly 0.5 even when the tolerance range on the other layer is utmost.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343753
Wangping Xiong, Jianqiang Du, Bin Nie, Liping Huang, Xian Zhou
Digital Imaging and Communications in Medicine (DICOM) is an industry standard for the delivery of medical images and their information across a variety of devices, which standardizes the format of various medical images and supports both TCP / IP protocols. With the rapid development and popularization of network technology, it is required to communicate with PACS system through medical image browser and display PACS image and related information in medical image browser, so as to realize fast access of DICOM permanent object. This paper focuses on the main content and structure, which is related to DCM4CHEE system, by using PACS system based on message and service-oriented open source, such as DCM4CHEE, for the medical image browser and the server-side interaction. In this paper, DCM4CHEE system uses MYSQL as DICOM database and uses JBOSS as an application server to build a PACS system experiment. According to the basic needs of users and functional requirements, the system is divided into various functional modules, the design of its commonly used sub-system functions, the design of the basic functions of the system, according to the actual needs of research and study to make the overall design of the image file be browsed. The paper chooses Java as the development platform, carries on the inquiry into the image document and carries on the design and realization of it. The system has a good interactive interface, which can greatly enhance the users' experience.
{"title":"Research on DICOM file compression and offline storage platform","authors":"Wangping Xiong, Jianqiang Du, Bin Nie, Liping Huang, Xian Zhou","doi":"10.1109/ICCSNT.2017.8343753","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343753","url":null,"abstract":"Digital Imaging and Communications in Medicine (DICOM) is an industry standard for the delivery of medical images and their information across a variety of devices, which standardizes the format of various medical images and supports both TCP / IP protocols. With the rapid development and popularization of network technology, it is required to communicate with PACS system through medical image browser and display PACS image and related information in medical image browser, so as to realize fast access of DICOM permanent object. This paper focuses on the main content and structure, which is related to DCM4CHEE system, by using PACS system based on message and service-oriented open source, such as DCM4CHEE, for the medical image browser and the server-side interaction. In this paper, DCM4CHEE system uses MYSQL as DICOM database and uses JBOSS as an application server to build a PACS system experiment. According to the basic needs of users and functional requirements, the system is divided into various functional modules, the design of its commonly used sub-system functions, the design of the basic functions of the system, according to the actual needs of research and study to make the overall design of the image file be browsed. The paper chooses Java as the development platform, carries on the inquiry into the image document and carries on the design and realization of it. The system has a good interactive interface, which can greatly enhance the users' experience.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123692104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343469
Yan Xiao, Zongmin Cui, Jing Yu, Guangyong Gao, Cai-xue Zhou
This article discusses a system in detail. The design and implementation of an efficient subscription system is based on the PC. In a publishing subscription system, the subscription is represented by a Boolean expression. When the data is published by the master, the data owner publishes an event that corresponds to the data. When the data event matches the subscription Boolean expression, the data is sent to the user who subscribes to the data. Publishers publish data for this operation by using the conjunction index. The matching results are given automatically by the system. The system has a clean interface and simple operation. It is easy to maintain later.
{"title":"The research of efficient publishing of subscription system","authors":"Yan Xiao, Zongmin Cui, Jing Yu, Guangyong Gao, Cai-xue Zhou","doi":"10.1109/ICCSNT.2017.8343469","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343469","url":null,"abstract":"This article discusses a system in detail. The design and implementation of an efficient subscription system is based on the PC. In a publishing subscription system, the subscription is represented by a Boolean expression. When the data is published by the master, the data owner publishes an event that corresponds to the data. When the data event matches the subscription Boolean expression, the data is sent to the user who subscribes to the data. Publishers publish data for this operation by using the conjunction index. The matching results are given automatically by the system. The system has a clean interface and simple operation. It is easy to maintain later.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129630019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343745
Yuhua Fan
Despite progress in scene recognition tasks such as image classification and attribute detection, computers still be difficult to understand the scenes as a whole. Existing methods often ignore global spatial constructed pattern among different local semantic objects. This paper propose a method for discovering the Latent spatial structured patterns to describe the visual semantic characters of images to improve the performance of scene recognition tasks. Unlike the existing approaches that mainly rely on the discriminant visual feature cues, we learn the latent spatial structured pattern to model the interaction relationships by using the graph models, which consider semantics and their localization information. We first train the pLSA models to obtain the latent semantic topics. Then we construct the graph models to discover the latent spatial structure patterns with combing the character vector and localization cues. Meanwhile, we treat the edge in model as link-affinity matrix to describe the interaction relationships between semantics. The extensive experiments on public datasets have demonstrated that the suggested method can significantly boost the performance of scene classification tasks.
{"title":"Discovering latent spatial structured patterns using graph models for scene classification","authors":"Yuhua Fan","doi":"10.1109/ICCSNT.2017.8343745","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343745","url":null,"abstract":"Despite progress in scene recognition tasks such as image classification and attribute detection, computers still be difficult to understand the scenes as a whole. Existing methods often ignore global spatial constructed pattern among different local semantic objects. This paper propose a method for discovering the Latent spatial structured patterns to describe the visual semantic characters of images to improve the performance of scene recognition tasks. Unlike the existing approaches that mainly rely on the discriminant visual feature cues, we learn the latent spatial structured pattern to model the interaction relationships by using the graph models, which consider semantics and their localization information. We first train the pLSA models to obtain the latent semantic topics. Then we construct the graph models to discover the latent spatial structure patterns with combing the character vector and localization cues. Meanwhile, we treat the edge in model as link-affinity matrix to describe the interaction relationships between semantics. The extensive experiments on public datasets have demonstrated that the suggested method can significantly boost the performance of scene classification tasks.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129818117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343680
Songsong Chen, Dezhi Li, Mingyu Dong, Bin Yang, Changli Liu, Yi Sun, Bin Li
As the rapidly expanding of Demand Response and some other intelligent power usage business, the types of related equipment and systems increase sharply. The problem of connectivity between diversified systems needed to be solved urgently, and the vast need of consistency test in domestic was motivated. Started from the bottom logic of consistency test, combined with consistency test model of protocol specified in ISO/IEC-9646, as well as the black box test and some other specific test methods, overall design scheme about consistency test system was presented in this paper, with the characteristics of well universality. Meanwhile, the development tendency about consistency test was analyzed. This paper could provide some references for the consistency test of Demand Response technology field, and play a basic support role in the Demand Response business and some other relevant energy technology fields.
{"title":"Research on the overall design scheme of consistency test system","authors":"Songsong Chen, Dezhi Li, Mingyu Dong, Bin Yang, Changli Liu, Yi Sun, Bin Li","doi":"10.1109/ICCSNT.2017.8343680","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343680","url":null,"abstract":"As the rapidly expanding of Demand Response and some other intelligent power usage business, the types of related equipment and systems increase sharply. The problem of connectivity between diversified systems needed to be solved urgently, and the vast need of consistency test in domestic was motivated. Started from the bottom logic of consistency test, combined with consistency test model of protocol specified in ISO/IEC-9646, as well as the black box test and some other specific test methods, overall design scheme about consistency test system was presented in this paper, with the characteristics of well universality. Meanwhile, the development tendency about consistency test was analyzed. This paper could provide some references for the consistency test of Demand Response technology field, and play a basic support role in the Demand Response business and some other relevant energy technology fields.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343683
Ruibo Wang, Wen-zhe Zhang
Modern computer systems are suffering from various failures and are increasingly prone to error. This paper introduces a high efficient incremental checkpoint mechanism for fault tolerance. By leveraging the new hardware support for various page sizes, we make dynamic transformation between different sized pages and thus achieve the best balance of overhead between modification tracking and data dumping in incremental checkpoint. Experiments show that our new checkpoint mechanism could achieve an average speedup of 2.2x with the space overhead of 34% over traditional incremental checkpoint, showing great potential to be widely adopted.
{"title":"Efficient incremental checkpoint based on hybrid page","authors":"Ruibo Wang, Wen-zhe Zhang","doi":"10.1109/ICCSNT.2017.8343683","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343683","url":null,"abstract":"Modern computer systems are suffering from various failures and are increasingly prone to error. This paper introduces a high efficient incremental checkpoint mechanism for fault tolerance. By leveraging the new hardware support for various page sizes, we make dynamic transformation between different sized pages and thus achieve the best balance of overhead between modification tracking and data dumping in incremental checkpoint. Experiments show that our new checkpoint mechanism could achieve an average speedup of 2.2x with the space overhead of 34% over traditional incremental checkpoint, showing great potential to be widely adopted.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128166999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343726
K. Guo, Bangning Zhang, D. Guo
In this paper, the secure performance of a satellite terrestrial communication network in shadowed-Rician (SR) channel is investigated, a satellite, a terrestrial destination and multi-single-antenna terrestrial eavesdropper are considered. Co-operating eavesdropper's scheme is used in this paper. Specially, the exact closed-form expressions of the system performance are derived, which provide fast means to evaluate the effect of system parameters on the system performance. Finally, Monte Carlo simulation results are derived to verify the superiority of the correctness of the analytical results, which also demonstrate the effects of various parameters on the secrecy performance of the satellite terrestrial networks.
{"title":"Secure performance analysis of a satellite-terrestrial network with multi-eavesdroppers","authors":"K. Guo, Bangning Zhang, D. Guo","doi":"10.1109/ICCSNT.2017.8343726","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343726","url":null,"abstract":"In this paper, the secure performance of a satellite terrestrial communication network in shadowed-Rician (SR) channel is investigated, a satellite, a terrestrial destination and multi-single-antenna terrestrial eavesdropper are considered. Co-operating eavesdropper's scheme is used in this paper. Specially, the exact closed-form expressions of the system performance are derived, which provide fast means to evaluate the effect of system parameters on the system performance. Finally, Monte Carlo simulation results are derived to verify the superiority of the correctness of the analytical results, which also demonstrate the effects of various parameters on the secrecy performance of the satellite terrestrial networks.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128862344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343478
Wei Li, Zhen Su, Guojun Hong
In view of the nonlinear characteristics of dynamic model of dredging process, this paper adopts intelligent control algorithm such as pattern search and genetic algorithm to solve optimal control parameters, and obtains the optimal control strategy of dredging efficiency. Based on the combined application of database technology, LabVIEW, network communication and modern control technology, the optimization system of suction hopper dredger loading hopper is constructed. The system can be displayed to operators by man-machine interface, which provides a powerful technical support for the intelligent dredging of trailing suction dredger.
{"title":"Optimal design and applied research of a trailing suction hopper dredger loading system","authors":"Wei Li, Zhen Su, Guojun Hong","doi":"10.1109/ICCSNT.2017.8343478","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343478","url":null,"abstract":"In view of the nonlinear characteristics of dynamic model of dredging process, this paper adopts intelligent control algorithm such as pattern search and genetic algorithm to solve optimal control parameters, and obtains the optimal control strategy of dredging efficiency. Based on the combined application of database technology, LabVIEW, network communication and modern control technology, the optimization system of suction hopper dredger loading hopper is constructed. The system can be displayed to operators by man-machine interface, which provides a powerful technical support for the intelligent dredging of trailing suction dredger.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126099592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343685
Jiawen Liu, Huimei Yuan, Mingyang Li
With the continuous application of big data technology, machine learning is playing an increasingly important role in enterprise applications. User information, such as gender, age and educational level are the core factors for the research and application in the field of computer psychology, personalized search and social business promotion. This paper proposes a method for automatically inferring user information based on the search terms of users. We establish a multi task convolution neural network model based on word vectors. After the process of data cleaning, user search word segmentation, we use the word2vec to transform words into vector representation, and then build a multi task convolutional neural network model. This model is compared with other models based on word frequency, LDA methods. Experimental results show that our proposed multitasking based convolutional neural network approach works better than other methods.
{"title":"Hidden information recognition based on multitask convolution neural network","authors":"Jiawen Liu, Huimei Yuan, Mingyang Li","doi":"10.1109/ICCSNT.2017.8343685","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343685","url":null,"abstract":"With the continuous application of big data technology, machine learning is playing an increasingly important role in enterprise applications. User information, such as gender, age and educational level are the core factors for the research and application in the field of computer psychology, personalized search and social business promotion. This paper proposes a method for automatically inferring user information based on the search terms of users. We establish a multi task convolution neural network model based on word vectors. After the process of data cleaning, user search word segmentation, we use the word2vec to transform words into vector representation, and then build a multi task convolutional neural network model. This model is compared with other models based on word frequency, LDA methods. Experimental results show that our proposed multitasking based convolutional neural network approach works better than other methods.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"24 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113984365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}