Skip to main content

and
  1. No Access

    Article

    Thermal runaway characteristics of 18650 lithium-ion batteries in various states of charge

    The lithium-ion battery (LIB) is a significantly and broadly used power storage system known for its high energy density and extended lifespan. However, it is vital to continue examining and addressing potenti...

    Yen-Wen Lai, Kuang-Hui Chi, Yi-Hong Chung in Journal of Thermal Analysis and Calorimetry (2024)

  2. No Access

    Chapter and Conference Paper

    A Deep Learning Application for Detecting Facade Tile Degradation

    Facade tiles of buildings are likely to weaken, crack, or fall off due to aging or out of natural causes such as temperature variations during daytime and nighttime and earthquakes. Tile spalling of tall buil...

    Po-Hsiang Shih, Kuang-Hui Chi in Human Systems Engineering and Design II (2020)

  3. No Access

    Article

    Mobile anchor-assisted localization over android

    While localization is essential to many applications, there are quantities of wireless nodes whose accurate locations remain unknown or hard to tell. As a remedy, this paper is leveraging a GPS-capable Android...

    Chao-Feng Lin, Kuang-Hui Chi, Yu-Yuan Hsu, Chun-Yi Liu in Wireless Networks (2017)

  4. No Access

    Article

    Load Distribution in Non-homogeneous Wireless Local Area Networks

    This paper presents an approach to distributing traffic among capability-varying access points (APs) in wireless Local Area Networks. Under consideration is a non-homogeneous environment where maximum transpor...

    Kuang-Hui Chi, Li-Hsing Yen in Wireless Personal Communications (2014)

  5. No Access

    Article

    A Fast Authentication Scheme for WiMAX–WLAN Vertical Handover

    In view that authentication has made a significant determinant in handover delay, this paper presents a fast authentication mechanism for mobile stations roaming within a WiMAX–WLAN interconnected environment....

    Kuei-Li Huang, Kuang-Hui Chi, Jui-Tang Wang in Wireless Personal Communications (2013)

  6. No Access

    Article

    Group-Based Authentication and Key Agreement

    This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). I...

    Yu-Wen Chen, Jui-Tang Wang, Kuang-Hui Chi in Wireless Personal Communications (2012)

  7. No Access

    Chapter and Conference Paper

    Multigroup Rekeying for a Wireless Network

    In the context of secure group communication, a shared secret key is generated anew for data protection whenever group membership changes. This paper presents an approach to fast rekeying in a wireless network...

    Kuang-Hui Chi, Ji-Han Jiang, Yu-Ching Hsu in Network-Based Information Systems (2007)