Liyuan Zhou

ORCID: 0000-0001-9046-6098
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Natural Language Processing Techniques
  • Nursing Diagnosis and Documentation
  • Electronic Health Records Systems
  • Recommender Systems and Techniques
  • Human Mobility and Location-Based Analysis
  • Advanced Image and Video Retrieval Techniques
  • Domain Adaptation and Few-Shot Learning
  • Digital Marketing and Social Media
  • Embedded Systems Design Techniques
  • Video Surveillance and Tracking Methods
  • Parallel Computing and Optimization Techniques
  • Interpreting and Communication in Healthcare
  • Anomaly Detection Techniques and Applications
  • Advanced Text Analysis Techniques
  • Neural Networks and Applications
  • Sentiment Analysis and Opinion Mining
  • Speech Recognition and Synthesis
  • Biometric Identification and Security
  • Entrepreneurship Studies and Influences
  • Advanced Image Fusion Techniques
  • Face recognition and analysis
  • Authorship Attribution and Profiling
  • Machine Learning in Healthcare
  • E-commerce and Technology Innovations

Anhui University
2024

Tibet University
2021-2023

Shandong Institute of Business and Technology
2023

Australian National University
2015-2019

Health Sciences and Nutrition
2019

Data61
2014-2019

Commonwealth Scientific and Industrial Research Organisation
2016-2019

Changchun University of Technology
2018

Eastern Liaoning University
2018

Shanghai University of Engineering Science
2014-2017

Over a tenth of preventable adverse events in health care are caused by failures information flow. These tangible clinical handover; regardless good verbal handover, from two-thirds to all this is lost after 3-5 shifts if notes taken hand, or not at all. Speech recognition and extraction provide way fill out handover form for proofing sign-off.The objective the study was recorded spoken annotated verbatim transcriptions, evaluations support research written natural language processing...

10.2196/medinform.4321 article EN cc-by JMIR Medical Informatics 2015-04-27

In named entity recognition, we often don't have a large in-domain training corpus or knowledge base with adequate coverage to train model directly.In this paper, propose method where, given data in related domain similar (but not identical) (NE) types and small amount of data, use transfer learning learn domain-specific NE model.That is, the novelty task setup is that assume just mismatch, but also label mismatch.

10.18653/v1/d16-1087 article EN cc-by Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2016-01-01

Word embeddings -- distributed word representations that can be learned from unlabelled data have been shown to high utility in many natural language processing applications. In this paper, we perform an extrinsic evaluation of five popular embedding methods the context four sequence labelling tasks: POS-tagging, syntactic chunking, NER and MWE identification. A particular focus paper is analysing effects task-based updating representations. We show when using as features, few several...

10.48550/arxiv.1504.05319 preprint EN cc-by-nc-sa arXiv (Cornell University) 2015-01-01

Abstract Objective We study the use of speech recognition and information extraction to generate drafts Australian nursing-handover documents. Methods Speech correctness clinicians’ preferences were evaluated using 15 recorder–microphone combinations, six documents, three speakers, Dragon Medical 11, five survey/interview participants. Information evaluation used 260 six-class classification for each word, two annotators, CRF++ conditional random field toolkit. Results A noise-cancelling...

10.1136/amiajnl-2014-002868 article EN Journal of the American Medical Informatics Association 2014-10-21

Deep learning (DL) has been widely used to solve problems with success in speech recognition, visual object and detection for drug discovery genomics. Natural language processing achieved noticeable progress artificial intelligence. This gives an opportunity improve on the accuracy human-computer interaction of clinical informatics. However, due difference vocabularies context between a environment generic English, transplanting models directly from up-to-date methods real-world health care...

10.2196/11499 article EN cc-by JMIR Medical Informatics 2019-04-25

Nowadays, location based services (LBS) has become one of the most popular applications with rapid development mobile Internet technology. More and more research is focused on discovering required among massive information according to personalized behavior. In this paper, a collaborative filtering (CF) recommendation algorithm presented Location-aware Hidden Markov Model (LHMM). This approach includes three main stages. First, it clusters users by making pattern similarity calculation their...

10.4018/ijwsr.2017040103 article EN International Journal of Web Services Research 2017-04-01

Word embeddings -distributed word representations that can be learned from unlabelled data -have been shown to have high utility in many natural language processing applications.In this paper, we perform an extrinsic evaluation of four popular embedding methods the context sequence labelling tasks: part-of-speech tagging, syntactic chunking, named entity recognition, and multiword expression identification.A particular focus paper is analysing effects task-based updating representations.We...

10.18653/v1/k15-1009 article EN cc-by 2015-01-01

In named entity recognition, we often don't have a large in-domain training corpus or knowledge base with adequate coverage to train model directly. this paper, propose method where, given data in related domain similar (but not identical) (NE) types and small amount of data, use transfer learning learn domain-specific NE model. That is, the novelty task setup is that assume just mismatch, but also label mismatch.

10.48550/arxiv.1610.09914 preprint EN other-oa arXiv (Cornell University) 2016-01-01

Precision livestock management requires animal traceability and disease trajectory, for which discriminating between or re-identifying individual animals is of significant importance. Existing re-identification (re-ID) methods are mostly proposed persons vehicles, compared with extraordinarily more challenging to be re-identified because subtle visual differences individuals. In this paper, we focus on image-based re-ID yaks (Bos grunniens), indispensable in local husbandry economy...

10.1109/ijcb52358.2021.9484341 article EN 2021-07-20

Tibetan medicinal materials play a significant role in culture. However, some types of share similar shapes and colors, but possess different properties functions. The incorrect use such may lead to poisoning, delayed treatment, potentially severe consequences for patients. Historically, the identification ellipsoid-like herbaceous has relied on manual methods, including observation, touching, tasting, nasal smell, which heavily rely technicians' accumulated experience are prone errors. In...

10.3390/e25060847 article EN cc-by Entropy 2023-05-25

During clinical handover, clinicians exchange information about the patients and state of management. To improve care safety quality, both handover its documentation have been standardized. Speech recognition entity extraction provide a way to help health service providers follow these standards by implementing process as structured form, whose headings guide narrative, proofing sign-off automatically filled-out form. In this paper, we evaluate such systems. The form considers sections...

10.1145/2802558.2814646 article EN 2015-01-01

This paper describes our approach, called EPUTION, for the open trial of SemEval- 2018 Task 2, Multilingual Emoji Prediction. The task relates to using social media — more precisely, Twitter with its aim predict most likely associated emoji a tweet. Our solution this text classification problem explores idea transfer learning adapting classifier based on users’ tweeting history. experiments show that user-adaption method improves results by than 6 per cent macro-averaged F1. Thus, provides...

10.18653/v1/s18-1071 article EN cc-by 2018-01-01

Entrepreneurial network plays an important role in entrepreneurship activities. In recent years, entrepreneurial becomes hot spot the area of Entrepreneurship. With support "social theory", exchange theory" and cognitive research has been developed to micro-and macro-levels gradually. The purposes this paper is analyses last ten proposes framework network, deeply default existing research, then propose prospects about future. And we hope that Literature Review On Network will give some...

10.1109/iciii.2010.309 article EN 2010-11-01

An improved fruit fly optimization algorithm based on knowledge memory (KM-FOA) is proposed for solving continuous functions problems. It featured with mechanisms devised the concerned problems: (1) Direction vectors, a novel method, defined as knowledge. Each needs to learn and memorize direction most obvious concentration changes in search space iteratively; (2) we embedded vectors guide procedure of choosing food. Fruit swarm can optimize roads basis And this approach achieves goal...

10.1080/1206212x.2018.1479349 article EN International Journal of Computers and Applications 2018-07-03

With the expansion of mobile Internet, location-based services have become a hot spot inInternet industry.To improve accuracy and efficiency discovery, researchers in web recommendation area are still busy looking for method.In this paper, it proposes LCAMSP model (Location Context Awareness Mobile Service Prediction, LCAMSP) under Internet environment, aims to meet exact personal requirements users' current location preference.Then, similar grouping is also important thread predict...

10.14257/ijgdc.2014.7.6.12 article EN International Journal of Grid and Distributed Computing 2014-12-31

Yaks (Bos grunniens) are the most important domestic animals for people living at high altitudes. In order to implement precise livestock management yaks, it is of significant importance automatically identify, keep track of, and monitor yaks. Traditional animal identification methods such as ear tags, tattoos, RFID based suffer from problems like infection, maintenance cost, inefficiency or sensor failure. Existing biometric-based muzzle prints, iris patterns, retinal vascular patterns...

10.2139/ssrn.4124467 article EN SSRN Electronic Journal 2022-01-01

Automatic segmentation and overlapping bigrams are the most common methods for overcoming lack of explicit word boundaries in Chinese text. Past studies have compared their effectiveness, but findings been equivocal site search has little studied. We compare representatives two approaches using a 465,000 page crawl test queries applicable to university context. 503 pairs result sets were judged by 56 students.

10.1145/2838931.2838940 article EN 2015-11-23

A bstract N ow adays, location based services (LB S) has becom e one of the m ost popular applications w ith rapid developm ent obile Internet environm ent.M ore and research is focused on discovering required am ong assive inform ation according to personalized behavior.In this paper,a collaborative filtering (CF) recom endation algorithm presented Location-aw are H idden M arkov odel(LH ).This approach includes three ain stages.First,itclusters users by aking a pattern sim ilarity...

10.29268/iciot.2016.0001 article EN 2016-11-14
Coming Soon ...