About
242
Publications
50,774
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,236
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
August 2014 - present
August 2010 - July 2014
June 2010 - July 2014
Publications
Publications (242)
Several machine learning and deep learning algorithms have been presented to detect the criminal behaviours in a smart grid environment in recent studies because of many successful results. However, most learning algorithms for the electricity theft detection have their pros and cons; hence, a critical research issue nowadays has been how to develo...
Explainable AI (XAI) has found numerous applications in computer vision. While image classification-based explainability techniques have garnered significant attention, their counterparts in semantic segmentation have been relatively neglected. Given the prevalent use of image segmentation, ranging from medical to industrial deployments, these tech...
Background/Aims: Despite the high efficacy of direct-acting antivirals (DAAs), approximately 1–3% of hepatitis C virus (HCV) patients fail to achieve a sustained virological response. We conducted a nationwide study to investigate risk factors associated with DAA treatment failure. Machine-learning algorithms have been applied to discriminate subje...
Fog computing aims to mitigate data communication delay by deploying fog nodes to provide servers in the proximity of users and offload resource-hungry tasks that would otherwise be sent to distant cloud servers. In this paper, we propose an effective fog device deployment algorithm based on a new metaheuristic algorithm–search economics–to solve t...
Enhancing the coverage area of the sensing range with the limiting resource is a critical problem in the wireless sensor network (WSN). Mobile sensors are patched coverage holes and they also have limited energy to move in large distances. Several recent studies indicated the metaheuristic algorithms can find an acceptable deployed solution in a re...
Most metaheuristic algorithms rely on a few searched solutions to guide later searches during the convergence process for a simple reason: the limited computing resource of a computer makes it impossible to retain all the searched solutions. This also reveals that each search of most metaheuristic algorithms is just like a ballpark guess. To help a...
Motivated by the observation that most neural architecture search (NAS) methods are time-consuming because a “training process” is required to evaluate each searched neural architecture, this paper presents an efficient NAS algorithm based on a promising metaheuristic algorithm named search economics (SE) and a new training-free estimator to evalua...
The traffic light cycle optimization problem (TLCOP) is certainly one of the most critical problems in a modern traffic management system because a “good solution” will be able to reduce the total waiting time of vehicles on roads of an entire city. In addition to heuristic algorithms, metaheuristic algorithms provide an alternative way for solving...
Fog computing aims to mitigate data communication delay by deploying fog nodes to provide servers in the proximity of users and offload resource-hungry tasks that would otherwise be sent to distant cloud servers. In this paper, we propose an effective fog device deployment algorithm based on a new metaheuristic algorithm–search economics–to solve t...
The development of an efficient detection mechanism to determine malicious network traffic has been a critical research topic in the field of network security in recent years. This study implemented an intrusion-detection system (IDS) based on a machine learning algorithm to periodically convert and analyze real network traffic in the campus enviro...
The unlimited possibilities of machine learning have been shown in several successful reports and applications. However, how to make sure that the searched results of a machine learning system are not tampered by anyone and how to prevent the other users in the same network environment from easily getting our private data are two critical research...
It is well known that the challenges of micro LED display have high efficiency in small pixel pitch, mass transfer vs monolithic technology, Yield, single panel full color, and uniformity correction. We demonstrate a micro LED display based on Complementary Metal‐O xide‐Semiconductor (CMOS) Backplane by using Dig ital modulation Technology. Existin...
We have developed a new full HD fast‐phase LCoS spatial light modulator (SLM) with color‐sequential function. Combining the optimization of liquid crystal materials with our digital driving technology, the response time can be achieved to less than 10 msec, which is expected suitable to be applied on the head‐up display (HUD) and other holographic...
The artificial intelligence (AI) and blockchain (BC) are obviously two promising research topics that will no doubt open up many business opportunities. Although there exists essential difference between AI and BC, some recent studies have attempted to put them into a single information system. Such integrations, of course, can be either AI for blo...
As one of the public transportation systems, metro is certainly an indispensable part in urban areas of a metropolis today. Several successful results have shown that deep learning technologies might provide an effective way to predict the number of passengers at a metro station. However, most information systems based on deep learning technologies...
It is well known that the properties of micro LED display have the higher contrast ratio, higher brightness, high reliability, and much faster response time than conventional LCD and OLED displays. We demonstrate a prove of concept (POC) pico‐projector prototype with a F/0.9 camera lens, and green micro LED panel, and digital driving board. The lum...
Digital Optics based on digital electro optics platform is the main concept of Jasper Display Corp. (JDC) to develop various applications. These applications are based on our X on CMOS technologies, for example, Liquid Crystal on CMOS is called LCoS. JDC support LCoS Spatial Light Modulator (SLM) for education kit (EDK), amplitude modulation kit (A...
Due to limited energy on sensor nodes, how to achieve a longer lifetime for the WSN has become an essential issue in recent years. Among them, an effective scheduling algorithm can also be regarded as an essential strategy to prolong the lifetime of the entire WSN. Different to most recent studies which only take into account the fixed sensing rang...
Developing an effective strategy for deploying base stations of a mobile communication environment has been a critical issue for years because it typically needs to take into account several conflict factors, such as coverage ratio and interference. Since 5G cellular services are expected to be commercially available in 2020, a “good deployment str...
Metaheuristic algorithms have been widely used as an effective and efficient way for solving various complex optimization problems; there is, however, plenty of room for improvement. In this research area, the two most important issues that greatly influence the final results of single-solution-based metaheuristic algorithms are in that: (1) some o...
Bus is certainly one of the most widely used public transportation systems in a modern city because it provides an inexpensive solution to public transportation users, such as commuters and tourists. Most people would like to avoid taking a crowded bus on the way. That is why forecasting the number of bus passengers has been a critical problem for...
As a critical research topic toward the new era of big data, how to develop a high-performance data analytics system has received significant research attention from different disciplines since the 2000s. In the literature, many recent works attempted to develop a high-performance data analytics system to handle the large amount of data (i.e., volu...
Countries around the world are nowadays actively promoting development in intelligent agriculture. Each of them must develop a specific plan tailored to environmental farming indices of each individual farm, and such information would be both important and sensitive. This is why information in intelligent agriculture requires protection from networ...
The traffic risks include malfunction of gears in the vehicle and some human misconducts while on the road. These misconducts of driver contain using the mobile phone, smoking, watching videos, reading books, and so forth. To prevent drivers from danger, in this paper, we will present an effective system to detect whether the drivers are doing thos...
Clustering is a traditional data mining problem that has attracted researchers from different disciplines because its solution can be applied to many useful problems in our daily life. Since the era of big data is coming, how to “reduce the computing time” of an “effective clustering algorithm” has been a promising research issue in recent years. T...
The influence of online social networks (OSN), which can be regarded as part of our life, is evident today. As expected, a great deal of useful information about the humans is hidden in the data, such as interpersonal relationship and personal preference. The influence maximization problem (IMP) is one of the well-known problems in this research do...
A health-care system gathers comprehensive physiological information and medical records, making its data more important than ever. For example, for years now, the National Health Insurance Administration (https://www.nhi.gov.tw/English/) of Taiwan has requested every doctor, whether in a medical center or private clinic, to upload the diagnosis re...
The internet of things (IoT), which provides a way to connect every “thing” via the internet to further develop a convenient environment, has been around for more than a decade. The trend of the development of IoT nowadays is to focus not only on its devices and systems but also on data analysis. The main reason is that data from sensors or systems...
Many elderly people have a hard time adapting to information technology (IT); for instance, many wearable devices have such rich functions that render them highly power‐consuming, creating operational difficulties for the elderly. The wearable devices must constantly be recharged, which is also an issue for disabled elderly people. Hence, this stud...
Digital Electro‐optics Platform is the main concept of Jasper Display Corp. (JDC) to develop various applications. These applications are based on our X‐on‐Silicon technologies, for example, X‐on‐Silicon technologies could be used on Liquid Crystal on Silicon (LCoS), Micro Light‐Emitting Diode on Silicon (pLEDoS), Organic Light‐Emitting Diode on Si...
Monitoring is an important concept in network management as it helps network operators to determine the behavior of a network and the status of its components. Traffic engineering, quality of service, and anomaly detection also depend on monitoring for decision making. Software-defined networking (SDN) is becoming increasingly popular for network p...
The possibilities of internet of things (IoT) are much clearer nowadays than last century because of the matured hardwares, systems, and platforms. The so-called service-to-interface assignment (SIA) is one of the promising problems of IoT system management because a “good solution” may be able to reduce the utilization cost of an IoT device. Altho...
Deploying cells in a 5G mobile communication environment has been a difficult optimization problem because many conflict factors, such as coverage ratio and interference, have to be taken into account at the same time. The hyper-dense deployment problem (HDDP) for the 5G environment has attracted the attention of researchers from different discipli...
A novel metaheuristic algorithm, called search economics for job-shop scheduling problem (SEJSP), is presented to solve the job-shop scheduling problem (JSP) in this paper. The most distinguishing feature of the proposed algorithm is that it attempts to guide the search process to the regions that are promising, based on the expected value that is...
The influence maximization problem (IMP) is one of the most well-known problems in the research domain of online social networks (OSN) that has attracted the attention of many researchers from different disciplines in recent years. One of the reasons is that the speed of information propagation in the OSN can be increased if we can find out users t...
Motivated by the observation that most methods for accelerating the generalized Lloyd algorithm (GLA) normally lack the capability to improve the quality of its end result and that most methods for improving the quality of the end result of GLA usually lack the capability to speed it up, an efficient and effective method is presented in this paper...
A high performance data analytics for internet of things (IoT) has been a promising research subject in recent years because traditional data mining algorithms may not be applicable to big data of IoT. One of the main reasons is that the data that need to be analyzed may exceed the storage size of a single machine. The computation cost of data anal...
More and more people enjoy the brand new experience an e-book brings to them, but the traditional e-book is plenty of room for improvement. One of the reasons is that the book has to be read page by page; thus, it is not easy to grasp the overall structure of such a book. As such, we propose a novel system based on the information retrieval technol...
Clustering is one of the most famous open problems of wireless sensor network (WSN) that has been studied for years because all the sensors in a WSN have only a limited amount of energy. As such, the so-called low-energy adaptive clustering hierarchy (LEACH) was presented to prolong the lifetime of a WSN. Although the original idea of LEACH is to k...
To provide a high performance internet of things (IoT) system by integrating cloud computing, data mining, and other intelligent methods to all the people has been a promising trend in recent years. However, the performance of such a system is restricted by several factors, namely, various user requirements, various types of appliances, enormous ne...
The purpose of this research is to generate a robust agent by combining bee colony optimization (BCO) and ELU-Ants for solving traveling salesman problem (TSP), called HABCO. The robust agents, called ant-bees, firstly are grouped into three types scout, follower, recruiter at each stages. Then, the bad agents are high probably discarded, while the...
The basic idea of low-energy adaptive clustering hierarchy (LEACH) is not to select a particular set of sensors out of all the sensors as the cluster heads to avoid the problem of running out their energy quickly. Unfortunately, it may end up selecting an unsuitable set of sensors as the cluster heads. Inspired by these observations, an effective h...