
Yi-Bing Lin- National Yang Ming Chiao Tung University
Yi-Bing Lin
- National Yang Ming Chiao Tung University
About
43
Publications
33,008
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,621
Citations
Current institution
Publications
Publications (43)
The paddy agronomy in the Asia-pacific region has gained a prominent role in connection with the major rice production area in over the decades. The research aims to investigate the aerial computing techniques to improve the sky farming techniques. Recently, the enhancement of unmanned aerial vehicle (UAV) and Internet of Things (IoT) with Deep Lea...
Rice is pivotal in global food security and Rice seeding detection in precision agriculture is essential for optimizing crop productivity and efficient resource use. Currently, the spatial distribution and detection of rice seeding are manually done, which is time-consuming. As technology advances, the rapid progress in precision agriculture calls...
In the context of Industry 4.0, a wide range of sensors are extensively deployed to gather production and equipment operation data, while also connecting human workforce information through the industrial Internet of Things technology. This integration enables effective improvements in sustainable, human-centric, and resilient productivity by lever...
Objective
Successful application of deep machine learning could reduce time-consuming and labor-intensive clinical work of calculating the amount of radiographic bone loss (RBL) in diagnosing and treatment planning for periodontitis. This study aimed to test the accuracy of RBL classification by machine learning.
Materials and methods
A total of 2...
Energy saving is one of the most important issues for Internet of Things (IoT). An intuitive way to save energy of IoT devices is to reduce the reporting frequency to the IoT server. However, to do so, the time-variant values are distorted, which may be influential to the measured results. In this paper, we take PM2.5 application as an example to d...
When studying the vehicle routing problem, especially for on-time arrivals, the determination of travel time plays a decisive role in the optimization of logistics companies. Traffic Internet of Things (IoT) connects ubiquitous devices and collects data from various channels like traffic cameras, vehicle detectors, GPS, sensors, etc. that can be us...
The new frontier research era and convergence of cognitive data science methods and models with reference to the Internet of Things (IoT) and big data systems have brought about various challenges in industrial systems that need to be addressed in the current scenario. Cognitive science will lead to a high level of fluidity to analytics. This speci...
Traditional methods applied in electricity demand forecasting have been challenged by the course of dimensionality arisen with a growing number of distributed or decentralized energy systems are employing. Without manually operated data preprocessing, classic models are not well-calibrated for their robustness when dealing with the disruptive eleme...
Big data systems for reinforcement learning have often exhibited problems (e.g., failures or errors) when their components involve stochastic nature with the continuous control actions of reliability and quality. The complexity of big data systems and their stochastic features raise the challenge of uncertainty. This article proposes a dynamic cohe...
Mobile internet usage has exploded with the mass popularity of smartphones that offer more convenient and efficient ways of doing anything from watching movies, playing games, and streaming music. Understanding the patterns of data usage is thus essential for strategy-focused data-driven business analytics. However, data usage has unique stylized f...
Many applications of wireless sensor network require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between ...
Soft interference cancellers (SICs) have been proposed in the literature as a means for reducing the computational complexity of the so-called turbo equalization receiver architecture. Soft-input-soft output (SISO) equalization algorithms based on linear ...
In Time Warp parallel simulation, a process executes every message as soon as it arrives. If a message with a smaller timestamp subsequently arrives, the process rolls back its state to the time of the earlier message and re-executes from that point.
Recently there has been a great deal of interest in performance evaluation of parallel simulation. Most work is devoted to the time complexity and assumes that the amount of memory available for parallel simulation is unlimited. This paper studies the space complexity of parallel simulation. Our goal is to design an efficient memory management prot...
A handover is required in wireless personal communications systems
when a portable moves from one base station coverage area to another
during the course of a conversation. In general, the handover should be
completed while the portable is in the overlap region to be successful.
This article considers several issues for handover management, handove...
There has been rapid growth in the demand for mobile communications over the past few years. This has led to intensive research and development efforts for complex PCS (personal communication service) networks. Capacity planning and performance modeling is necessary to maintain a high quality of service to the mobile subscriber while minimizing cos...
This paper studies the effect of re-dial in a personal communications services (PCS) network. The re-dialing problem for PCS is different from the plain old telephone service (POTS). When using POTS, if a customer receives a busy signal in making a call, or the call does not connect in a timely manner, the customer may make a re-dial call in an att...
The demand for mobile communications over the past few years has grown at a rapid pace. This demand has led to intensive research and development efforts for complex PCS (personal communication service) networks. Capacity planning and performance modeling is necessary to maintain a high quality of service to the mobile subscriber while minimizing c...
Bellcore Personal Access Communications System (PACS) provides the feature of using a single time-slot for two independent calls by the same user. This feature allows a simultaneous voice and data call from a single subscriber unit. This paper compares the performance of a PCS system with voice/data self-subrating (SSR) with a system without self-s...
A new PCS hand-off scheme is proposed. This scheme provides for hand-off to radio ports on which there is no free channel by "sub-rating" an existing connection. With sub-rating, an occupied full-rate channel is temporarily divided into two half-rate channels: one to serve the existing call and the other to serve the hand-off request. The blocking...
The emergence of multitier wireless access is being driven by the different compromises in technology required to provide wireless service in different environments. Three major tiers of wireless access are likely to emerge to providepersonal communications services (PCS): high-tier, low-tier, and unlicensed. Because of the service costs of the thr...
In a personal communications services (PCS) network, heavy traffic
areas may be covered by microcells which overlay with macrocells. We
propose an analytic model to study the performance of the
microcell/macrocell PCS architecture. Our model assumes that a PCS
subscriber has a general residual time distribution in a microcell, and
the macrocell res...
This paper studies the effect of re-dial in a personal communications services (PCS) network. The re-dialing problem for PCS is different from the plain old telephone service (POTS). When using POTS, if a customer receives a busy signal in making a call, or the call does connect in a timely manner, the customer may make a re-dial call in an attempt...
Registration/deregistration is required in a PCS network when a
portable moves between registration areas. Several schemes were proposed
to deregister a portable after it moves out of a registration area (RA).
A simple scheme called implicit deregistration totally eliminates
network traffic due to deregistration. However, this scheme may delete
val...
The forced termination probability (the probability that a
hand-off call is blocked) is an important criterion in the performance
evaluation of personal communication service (PCS) networks. The forced
termination of an ongoing call is considered less desirable than
blocking the initial access of a new call. The paper proposes analytic
and simulati...
There has been rapid growth an demand for mobile communications
over the past few years that has led to intensive research and
development of complex PCS (personal communication service) networks.
Capacity planning and performance modeling are necessary to maintain a
high quality of service to the mobile subscriber while minimizing the
cost. Simula...
A new PCS hand-off scheme is proposed. This scheme provides for
hand-off to radio ports on which there is no free channel by
“sub-rating” an existing connection. With sub-rating, an
occupied full-rate channel is temporarily divided into two half-rate
channels: one to serve the existing call and the other to serve the
hand-off request. The blocking...
The forced termination probability (the probability that a
hand-off call is blocked) is an important criterion in the performance
evaluation of the personal communication service (PCS) networks. The
forced termination of an ongoing call is considered less desirable than
blocking the initial access of a new call. The paper proposes analytic
and simu...
In Time Warp parallel simulation, the state of each process must be saved (checkpointed) regularly in case a rollback is necessary. Although most existing Time Warp implementations checkpoint after every state transition, this is not necessary, and the checkpoint interval is in reality a tuning parameter of the simulation.
Lin and Lazowska[6] propo...
Most parallel simulation algorithms (e.g., Chandy and Misra’s algorithm or the Time Warp algorithm) are based on a “space-division” approach. The parallelism of this approach is limited by the causality constraints. Another approach, the “time-division” approach, may provide more parallelism if the time domain is appropriately partitioned. We prese...
The Time Warp “optimistic” approach is one of the most important parallel simulation protocols. Time Warp synchronizes processes via rollback. The original rollback mechanism called lazy cancellation has aroused great interest. This paper studies these rollback mechanisms. The general tradeoffs between aggressive and lazy cancellation are discussed...
Lookahead is the ability of a process to predict its future
behavior. The feasibility of implicit lookahead for non-FCFS stochastic
queuing systems is demonstrated. Several lookahead exploiting techniques
are proposed for round-robin (RR) system simulations. An algorithm that
generates lookahead in O (1) time is described. Analytical
models and exp...
In Time Warp parallel simulation, a process executes every message as soon as it arrives. If a message with a smaller timestamp subsequently arrives, the process rolls back its state to the time of the earlier message and re-executes from that point. Clearly, the state of each process must be saved (checkpointed) regularly in case a rollback is nec...