Lasheng Yu
YOU?
Author Swipe
View article: Enhancing E-Learning Adaptability with Automated Learning Style Identification and Sentiment Analysis: A Hybrid Deep Learning Approach for Smart Education
Enhancing E-Learning Adaptability with Automated Learning Style Identification and Sentiment Analysis: A Hybrid Deep Learning Approach for Smart Education Open
In smart education, adaptive e-learning systems personalize the educational process by tailoring it to individual learning styles. Traditionally, identifying these styles relies on learners completing surveys and questionnaires, which can …
View article: AttentiveBugLocator: A Bug Localization Model using Attention-based Semantic Features and Information Retrieval
AttentiveBugLocator: A Bug Localization Model using Attention-based Semantic Features and Information Retrieval Open
In recent years, deep learning-based algorithms such as CNN, LSTM, and auto-encoders have been proposed to rank suspicious buggy files. Meanwhile, representational learning has served to be the best ap-proach to extract rich semantic featu…
View article: AttentiveBugLocator: A Bug Localization Model using Attention-based SemanticFeatures and Information Retrieval
AttentiveBugLocator: A Bug Localization Model using Attention-based SemanticFeatures and Information Retrieval Open
In recent years, deep learning-based algorithms such as CNN, LSTM, and autoencoders have been proposed to rank suspicious buggy files. Meanwhile,representational learning has served to be the best approach to extract rich semantic features…
View article: Deep Bug Reports Processing (DBRP): A Systematic Literature Review
Deep Bug Reports Processing (DBRP): A Systematic Literature Review Open
Many software projects utilize Bug Tracking System (BTS) to manage and process bug reports. Over the years, the number of bug report submissions has increased exponentially with some projects receiving as many as about a hundred submission…
View article: Study on Sentiment Classification Strategies Based on the Fuzzy Logic with Crow Search Algorithm
Study on Sentiment Classification Strategies Based on the Fuzzy Logic with Crow Search Algorithm Open
In recent times, sentiment analysis research has gained wide popularity. That situation is caused by the nature of online applications that allow users to express their opinions on events, services, or products through social media applica…
View article: A Clustering Knowledge Tracking Algorithm for Learners Based on Dynamic Key-Value Memory Network
A Clustering Knowledge Tracking Algorithm for Learners Based on Dynamic Key-Value Memory Network Open
In the existing classic deep knowledge tracking model, only the correctness of the student's historical question data is concerned, but the other characteristics of the student are not paid attention to. Human learning is a process of prac…
View article: Design and implementation of security system for smart home based on IOT technology
Design and implementation of security system for smart home based on IOT technology Open
In the world today, home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. This design adopts the idea of "Internet of Things close to life and easy to use" as a design concept, and builds…
View article: Research of Virtual Reality Technology in Home Design
Research of Virtual Reality Technology in Home Design Open
This paper mainly discusses the application of virtual reality technology in home design. Through virtual reality technology, we can have more realistic experience and switch freely in each space, so that customers can feel the future home…
View article: A Deep Hyper Siamese Network for Real-Time Object Tracking
A Deep Hyper Siamese Network for Real-Time Object Tracking Open
Siamese networks have drawn increasing interest in the field of visual object tracking due to their balance of precision and efficiency. However, Siamese trackers use relatively shallow backbone networks, such as AlexNet, and therefore do …
View article: Fall detection system based on BiLSTM neural network
Fall detection system based on BiLSTM neural network Open
The purpose of this article is to analyze the characteristics of human fall behavior to design a fall detection system. The existing fall detection algorithms have problems such as poor adaptability, single function and difficulty in proce…
View article: A Review of Evaluation and Selection of Open Source Software in Electronic Medical Record
A Review of Evaluation and Selection of Open Source Software in Electronic Medical Record Open
The valuation and choice of unsuitable open source software in electronic medical record (OSS-EMR) groups negatively affects the functions of organization and business processes. This study provides an insight into the assessment and choic…
View article: The Application of Virtual Reality Technology in Smart Hom
The Application of Virtual Reality Technology in Smart Hom Open
In recent years, smart home is a versatile system that includes visual intercom, home security, remote monitoring of home appliances, remote video surveillance, telemedicine diagnostics and care systems, online education systems and home m…
View article: A Sentiment Analysis Approach based on Arabic Social Media Platforms
A Sentiment Analysis Approach based on Arabic Social Media Platforms Open
Apart from the major outstanding research issues facing Arabic social media sentiment analysis which includes handling of vernacular Arabic, slang vocabulary and shorthand writings. There is also a lack of comprehensive framework for Arabi…
View article: A Random Walking Recommendation Algorithm Based on Conditional Restricted Boltzmann Machine in Trust Network
A Random Walking Recommendation Algorithm Based on Conditional Restricted Boltzmann Machine in Trust Network Open
In order to improve the accuracy of the recommendation system and solve the data sparsity problem, this paper proposes a random walking recommendation algorithm based on conditional restricted Boltzmann machine in trust network, namely CRB…
View article: Personal Recommendation Algorithm Combining Trust and Similarity based on Neural Network
Personal Recommendation Algorithm Combining Trust and Similarity based on Neural Network Open
Personal Recommendation Algorithm Combining Trust and Similarity based on Neural Network - written by La-Sheng Yu , Lei Zhang published on 2018/03/19 download full article with reference data and citations
View article: Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection
Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection Open
Network intrusion detection systems (NIDSs) provide a better solution to network security than other traditional network defense technologies, such as firewall systems. The success of NIDS is highly dependent on the performance of the algo…
View article: Research on visualization methods of online education data based on IDL and hadoop
Research on visualization methods of online education data based on IDL and hadoop Open
At present, with the rapid development of scientific research, big data is not limited to economic society, but also to change people's work and lifestyle at an alarming rate along, such as smart city, smart campus, and recommend system ar…
View article: Movies recommendation system using collaborative filtering and k-means
Movies recommendation system using collaborative filtering and k-means Open
Currently as a new technic of advertisement, we use sets of information such as movies, music and other form of technique to convince customers.Technology is developing so fast and dissemination of knowledge has increased, as well as the n…
View article: Analysis of User’s Behavior on Borrowed Book Record in National Central Library University of Laos
Analysis of User’s Behavior on Borrowed Book Record in National Central Library University of Laos Open
The purpose of this paper is to analyze the student's behavior of borrowing book in order to find out the frequent group of book items using association rule technique based on the data mining technologies.Data mining is a powerful tool fo…
View article: Securing Authentication Within Hadoop
Securing Authentication Within Hadoop Open
In this paper, we discuss authentication issues for Hadoop security in a cloud environment.The main focus is on security issues that are associated with authentication in Hadoop which is framework for storing data on large clusters of comm…