Yi-Bing Lin

Yi-Bing Lin
  • National Yang Ming Chiao Tung University

About

43
Publications
33,008
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,621
Citations
Current institution

Publications

Publications (43)
Article
The paddy agronomy in the Asia-pacific region has gained a prominent role in connection with the major rice production area in over the decades. The research aims to investigate the aerial computing techniques to improve the sky farming techniques. Recently, the enhancement of unmanned aerial vehicle (UAV) and Internet of Things (IoT) with Deep Lea...
Article
Full-text available
Rice is pivotal in global food security and Rice seeding detection in precision agriculture is essential for optimizing crop productivity and efficient resource use. Currently, the spatial distribution and detection of rice seeding are manually done, which is time-consuming. As technology advances, the rapid progress in precision agriculture calls...
Article
Full-text available
In the context of Industry 4.0, a wide range of sensors are extensively deployed to gather production and equipment operation data, while also connecting human workforce information through the industrial Internet of Things technology. This integration enables effective improvements in sustainable, human-centric, and resilient productivity by lever...
Article
Full-text available
Objective Successful application of deep machine learning could reduce time-consuming and labor-intensive clinical work of calculating the amount of radiographic bone loss (RBL) in diagnosing and treatment planning for periodontitis. This study aimed to test the accuracy of RBL classification by machine learning. Materials and methods A total of 2...
Article
Full-text available
Energy saving is one of the most important issues for Internet of Things (IoT). An intuitive way to save energy of IoT devices is to reduce the reporting frequency to the IoT server. However, to do so, the time-variant values are distorted, which may be influential to the measured results. In this paper, we take PM2.5 application as an example to d...
Article
When studying the vehicle routing problem, especially for on-time arrivals, the determination of travel time plays a decisive role in the optimization of logistics companies. Traffic Internet of Things (IoT) connects ubiquitous devices and collects data from various channels like traffic cameras, vehicle detectors, GPS, sensors, etc. that can be us...
Article
The new frontier research era and convergence of cognitive data science methods and models with reference to the Internet of Things (IoT) and big data systems have brought about various challenges in industrial systems that need to be addressed in the current scenario. Cognitive science will lead to a high level of fluidity to analytics. This speci...
Article
Full-text available
Traditional methods applied in electricity demand forecasting have been challenged by the course of dimensionality arisen with a growing number of distributed or decentralized energy systems are employing. Without manually operated data preprocessing, classic models are not well-calibrated for their robustness when dealing with the disruptive eleme...
Article
Full-text available
Big data systems for reinforcement learning have often exhibited problems (e.g., failures or errors) when their components involve stochastic nature with the continuous control actions of reliability and quality. The complexity of big data systems and their stochastic features raise the challenge of uncertainty. This article proposes a dynamic cohe...
Article
Mobile internet usage has exploded with the mass popularity of smartphones that offer more convenient and efficient ways of doing anything from watching movies, playing games, and streaming music. Understanding the patterns of data usage is thus essential for strategy-focused data-driven business analytics. However, data usage has unique stylized f...
Article
Full-text available
Many applications of wireless sensor network require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between ...
Article
Full-text available
Soft interference cancellers (SICs) have been proposed in the literature as a means for reducing the computational complexity of the so-called turbo equalization receiver architecture. Soft-input-soft output (SISO) equalization algorithms based on linear ...
Article
Full-text available
In Time Warp parallel simulation, a process executes every message as soon as it arrives. If a message with a smaller timestamp subsequently arrives, the process rolls back its state to the time of the earlier message and re-executes from that point.
Article
Recently there has been a great deal of interest in performance evaluation of parallel simulation. Most work is devoted to the time complexity and assumes that the amount of memory available for parallel simulation is unlimited. This paper studies the space complexity of parallel simulation. Our goal is to design an efficient memory management prot...
Article
A handover is required in wireless personal communications systems when a portable moves from one base station coverage area to another during the course of a conversation. In general, the handover should be completed while the portable is in the overlap region to be successful. This article considers several issues for handover management, handove...
Article
There has been rapid growth in the demand for mobile communications over the past few years. This has led to intensive research and development efforts for complex PCS (personal communication service) networks. Capacity planning and performance modeling is necessary to maintain a high quality of service to the mobile subscriber while minimizing cos...
Article
Full-text available
This paper studies the effect of re-dial in a personal communications services (PCS) network. The re-dialing problem for PCS is different from the plain old telephone service (POTS). When using POTS, if a customer receives a busy signal in making a call, or the call does not connect in a timely manner, the customer may make a re-dial call in an att...
Article
The demand for mobile communications over the past few years has grown at a rapid pace. This demand has led to intensive research and development efforts for complex PCS (personal communication service) networks. Capacity planning and performance modeling is necessary to maintain a high quality of service to the mobile subscriber while minimizing c...
Article
Bellcore Personal Access Communications System (PACS) provides the feature of using a single time-slot for two independent calls by the same user. This feature allows a simultaneous voice and data call from a single subscriber unit. This paper compares the performance of a PCS system with voice/data self-subrating (SSR) with a system without self-s...
Article
A new PCS hand-off scheme is proposed. This scheme provides for hand-off to radio ports on which there is no free channel by "sub-rating" an existing connection. With sub-rating, an occupied full-rate channel is temporarily divided into two half-rate channels: one to serve the existing call and the other to serve the hand-off request. The blocking...
Article
The emergence of multitier wireless access is being driven by the different compromises in technology required to provide wireless service in different environments. Three major tiers of wireless access are likely to emerge to providepersonal communications services (PCS): high-tier, low-tier, and unlicensed. Because of the service costs of the thr...
Conference Paper
In a personal communications services (PCS) network, heavy traffic areas may be covered by microcells which overlay with macrocells. We propose an analytic model to study the performance of the microcell/macrocell PCS architecture. Our model assumes that a PCS subscriber has a general residual time distribution in a microcell, and the macrocell res...
Article
This paper studies the effect of re-dial in a personal communications services (PCS) network. The re-dialing problem for PCS is different from the plain old telephone service (POTS). When using POTS, if a customer receives a busy signal in making a call, or the call does connect in a timely manner, the customer may make a re-dial call in an attempt...
Article
Registration/deregistration is required in a PCS network when a portable moves between registration areas. Several schemes were proposed to deregister a portable after it moves out of a registration area (RA). A simple scheme called implicit deregistration totally eliminates network traffic due to deregistration. However, this scheme may delete val...
Article
Full-text available
The forced termination probability (the probability that a hand-off call is blocked) is an important criterion in the performance evaluation of personal communication service (PCS) networks. The forced termination of an ongoing call is considered less desirable than blocking the initial access of a new call. The paper proposes analytic and simulati...
Conference Paper
There has been rapid growth an demand for mobile communications over the past few years that has led to intensive research and development of complex PCS (personal communication service) networks. Capacity planning and performance modeling are necessary to maintain a high quality of service to the mobile subscriber while minimizing the cost. Simula...
Conference Paper
A new PCS hand-off scheme is proposed. This scheme provides for hand-off to radio ports on which there is no free channel by “sub-rating” an existing connection. With sub-rating, an occupied full-rate channel is temporarily divided into two half-rate channels: one to serve the existing call and the other to serve the hand-off request. The blocking...
Conference Paper
Full-text available
The forced termination probability (the probability that a hand-off call is blocked) is an important criterion in the performance evaluation of the personal communication service (PCS) networks. The forced termination of an ongoing call is considered less desirable than blocking the initial access of a new call. The paper proposes analytic and simu...
Article
In Time Warp parallel simulation, the state of each process must be saved (checkpointed) regularly in case a rollback is necessary. Although most existing Time Warp implementations checkpoint after every state transition, this is not necessary, and the checkpoint interval is in reality a tuning parameter of the simulation. Lin and Lazowska[6] propo...
Article
Most parallel simulation algorithms (e.g., Chandy and Misra’s algorithm or the Time Warp algorithm) are based on a “space-division” approach. The parallelism of this approach is limited by the causality constraints. Another approach, the “time-division” approach, may provide more parallelism if the time domain is appropriately partitioned. We prese...
Article
The Time Warp “optimistic” approach is one of the most important parallel simulation protocols. Time Warp synchronizes processes via rollback. The original rollback mechanism called lazy cancellation has aroused great interest. This paper studies these rollback mechanisms. The general tradeoffs between aggressive and lazy cancellation are discussed...
Article
Lookahead is the ability of a process to predict its future behavior. The feasibility of implicit lookahead for non-FCFS stochastic queuing systems is demonstrated. Several lookahead exploiting techniques are proposed for round-robin (RR) system simulations. An algorithm that generates lookahead in O (1) time is described. Analytical models and exp...
Article
Full-text available
In Time Warp parallel simulation, a process executes every message as soon as it arrives. If a message with a smaller timestamp subsequently arrives, the process rolls back its state to the time of the earlier message and re-executes from that point. Clearly, the state of each process must be saved (checkpointed) regularly in case a rollback is nec...

Network

Cited By