Jyh‐Cheng Chen

ORCID: 0000-0001-7562-6882
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Networks and Protocols
  • Advanced Wireless Network Optimization
  • Wireless Communication Networks Research
  • Advanced MIMO Systems Optimization
  • Software-Defined Networks and 5G
  • IoT and Edge/Fog Computing
  • Mobile Agent-Based Network Management
  • Mobile Ad Hoc Networks
  • Caching and Content Delivery
  • Network Traffic and Congestion Control
  • IoT Networks and Protocols
  • Cooperative Communication and Network Coding
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks
  • Electrochemical Analysis and Applications
  • Bluetooth and Wireless Communication Technologies
  • Cloud Computing and Resource Management
  • Indoor and Outdoor Localization Technologies
  • Telecommunications and Broadcasting Technologies
  • Green IT and Sustainability
  • Analytical Chemistry and Sensors
  • Advanced Optical Network Technologies
  • Peer-to-Peer Network Technologies
  • Advanced Authentication Protocols Security

National Yang Ming Chiao Tung University
2015-2024

Xidian University
2024

University of Maryland, College Park
2024

University of California, Riverside
2024

Association for Computing Machinery
2024

National Sun Yat-sen University
2018

Industrial Technology Research Institute
2017

National Tsing Hua University
2001-2010

National Chung Hsing University
1999-2007

Council of Agriculture
2006

In various scenarios, achieving security between IoT devices is challenging since the may have different dedicated communication standards and resource constraints as well applications. this article, we first provide requirements existing solutions for security. We then introduce a new reconfigurable framework based on edge computing, which utilizes near-user device, that is, agent, to support functions resources of all protocol layers including multiple applications an device. This designed...

10.1109/mnet.2018.1700284 article EN IEEE Network 2018-09-01

Energy efficiency is an important issue in mobile wireless networks since the battery life of terminals limited. Conservation power has been addressed using many techniques. This paper addresses energy medium access control (MAC) protocols for networks. The develops a framework to study consumption MAC protocol from transceiver usage perspective. then applied compare performance set that includes IEEE 802.11, energy-conserving (EC-MAC), PRMA, multiservices dynamic reservation-TDMA...

10.1109/infcom.1998.659649 article EN 2002-11-27

Environmental and security applications have generated major demands for effective field-deployable tools detecting nitroaromatic compounds, such as chloramphenicol (an antibiotic), parathion organophosphate nerve agent), TNT (2,4,6-trinitrotoluene, an explosive) in a fast, simple, sensitive, reliable, cost-effective manner. We report here single-run approach purpose. The reduction potential of different compounds was found to systematically shift with the substituent group at...

10.1021/ac060002n article EN Analytical Chemistry 2006-04-28

This article reviews wireless LAN security with a focus on the evolving new IEEE 802.11i standard. The major enhancements in encryption and authentication defined by are illustrated. In addition, newly introduced key management is discussed. Because incorporates 802.1X as its enhancement, consideration of roaming users depicted. Both intrasubnet intersubnet

10.1109/mwc.2005.1404570 article EN IEEE Wireless Communications 2005-02-01

Energy conservation is essential to wireless networks, particularly for third-generation (3G) and fourth-generation (4G) systems, because high-speed data transmissions would rapidly exhaust the energy of a mobile station. This paper presents details energy-saving mechanisms packet services in two major standards, namely, Third-Generation Partnership Project (3GPP) 2 (3GPP2). In addition qualitative comparison, analytic models quantitative comparison based on are provided. The proposed...

10.1109/tvt.2008.923687 article EN IEEE Transactions on Vehicular Technology 2009-01-01

Electrocatalytic oxidation of cysteine (CySH) at Nafion/lead ruthenate pyrochlore (Py) chemically modified electrodes was thoroughly studied. Electrochemical ac impedance spectroscopy analysis indicated the formation Py microparticles in interfacial galleries Nafion. Experiments with benchmark systems Fe(CN)63-/4- and Ru(bpy)2+/3+ reveal suppression Nafion's anionic character after situ precipitation Py. Michaleis−Menten-type kinetics rate determination step CyS−Py−RuVI → Py−RuIV + CyS−SCy...

10.1021/ac0010781 article EN Analytical Chemistry 2001-02-15

This paper presents two new methods that use local information alone to predict the resource demands of and determine reservation levels for future handoff calls in multimedia wireless IP networks. The proposed model instantaneous demand directly. differs from most existing derive modeling factors impact demands. As a result, allow to: (1) follow non-Poisson and/or nonstationary arrival processes; (2) have arbitrary per-call demands; (3) arbitrarily distributed call channel holding times....

10.1109/49.957308 article EN IEEE Journal on Selected Areas in Communications 2001-01-01

Receiver synchronization of continuous media streams is required to deal with delay differences and variations resulting from delivery over packet networks such as the Internet. This function commonly provided using per-stream playout buffers which introduce additional in order produce a schedule meets requirements. Packets arrive after their scheduled time are considered late discarded. In this paper, we present Concord algorithm, provides delay-sensitive solution for buffering. It records...

10.1109/6046.845013 article EN IEEE Transactions on Multimedia 2000-06-01

The Internet has experienced tremendous expansion in the past several years. Demands for IP multimedia services are emerging. third-generation (3G) wireless networks aim to support mobile users with numerous services. 3G standards organizations developing subsystems (IMS) achieve seamless integration between and networks. Moreover, collaboration IETF, 3GPP, 3GPP2 is essential development of IMS next-generation This article first provides an overview 3GPP illustrates requirements,...

10.1109/mcom.2008.4427242 article EN IEEE Communications Magazine 2008-01-01

10.1023/a:1019152506607 article EN Wireless Networks 2000-01-01

In this paper, we present a novel Wi-Fi-based pedestrian collision avoidance (PCA) system: WiSafe. Compared to vision-based and radar-based PCA systems, WiSafe has key advantage of Non-Line-of-Sight (NLOS). can assist drivers in discovering pedestrians NLOS blind spots, where the views are blocked by buildings, vehicles, or other obstacles. particular, it is very useful when driving poor visibility conditions such as at night, heavy rain, thick fog. save split seconds, which potentially...

10.1109/tvt.2016.2598786 article EN IEEE Transactions on Vehicular Technology 2016-08-10

Network Function Virtualization (NFV) enables mobile operators to virtualize their network entities as Virtualized Functions (VNFs), offering fine-grained on-demand capabilities. VNFs can be dynamically scale-in/out meet the performance desire and other dynamic behaviors. However, designing auto-scaling algorithm for desired characteristics with low operation cost latency, while considering existing capacity of legacy equipment, is not a trivial task. In this paper, we propose VNF Dynamic...

10.1109/glocom.2016.7841759 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

In 5G, multi-access edge computing enables the applications to be offloaded near-end servers for faster response. According 3GPP standards, users in 5G are separated into many types, e.g., vehicles, AR/VR, IoT devices, etc. Specifically, high-priority traffic can preempt resources guarantee service quality. However, even if a is transmitted with low priority, its latency requirement much lower than that 4G. Too strict and priority-based make resource configuration difficult on side....

10.1109/twc.2023.3248270 article EN IEEE Transactions on Wireless Communications 2023-03-01

10.1023/a:1019136102972 article EN Wireless Networks 1999-01-01

This article presents the technical details of Extensible Authentication Protocol (EAP) and IEEE 802.1x by using WIRE1x, an open-source implementation client (supplicant) various EAP-based authentication mechanisms. By a real implementation, EAP should be easily understood.

10.1109/mcom.2005.1561920 article EN IEEE Communications Magazine 2005-12-01

This paper presents an energy conservation scheme, Maximum Unavailability Interval (MUI), to improve the efficiency for Power Saving Class of Type II in IEEE 802.16e. By applying Chinese Remainder Theorem, proposed MUI is guaranteed find maximum Interval, during which transceiver can be powered down. We also propose new mathematical techniques reduce computational complexity when solving Theorem problem. Because reduced significantly, practically implemented real systems. The fully...

10.1109/tmc.2008.124 article EN IEEE Transactions on Mobile Computing 2008-09-17

Cellular network control procedures (e.g., mobility, idle-active transition to conserve energy) directly influence data plane behavior, impacting user-experienced delay. Recognizing this control-data interdependence, L25GC re-architects the 5G Core (5GC) network, and its processing, reduce latency of operations their impact on plane. Exploiting shared memory, eliminates message serialization HTTP processing overheads, while being 3GPP-standards compliant. We improve by factoring functions...

10.1145/3544216.3544267 article EN 2022-08-11

This paper describes the design and analysis of scheduling algorithm for energy conserving medium access control (EC-MAC), which is a low-power (MAC) protocol wireless mobile ATM networks. We evaluate algorithms that have been proposed traditional Based on structure EC-MAC characteristics channel, we propose new can deal with burst errors location-dependent errors. Most either wired or networks were analyzed homogeneous traffic multimedia services simplified models. analyze our more...

10.1109/6046.766739 article EN IEEE Transactions on Multimedia 1999-06-01

The paper provides the comparison between WCDMA and cdma2000 of impact an inactivity timer on energy consumption a mobile station. Both simulation analysis are utilized to investigate performance cdma2000. novel practical models proposed analyze quantify in case bursty streaming traffic. analytic verified extensively by simulation.

10.1109/wts.2004.1319545 article EN 2004-10-04

Mobile computers typically have limited energy for computing and communications due to short battery lifetimes. Encoding, decoding, transmission of video information require significant communication resources. Low power encoding decoding schemes been researched extensively. In this paper, we focus on processing encoded under low conditions. Such processing, while conserving power, attempts reduce deterioration quality.

10.1109/pimrc.1998.733524 article EN 2002-11-27

IEEE 802.11 wireless LANs have been widely deployed. How to efficiently balance the traffic loads among access points (APs), which will lead improved network utilization and higher quality of user experience, has become an important issue. A key challenge is how select AP use during handoff process in a way that achieve overall load network. The conventional approaches typically signal-to-noise ratio (SNR) as criterion without considering each AP. In this paper, we propose two effective new...

10.1109/glocom.2006.724 article EN Globecom 2006-11-01

Cognitive radio has received great attention recently for its ability to improve spectrum efficiency by letting secondary users access resource that is unoccupied primary users. However, cognitive also brings new challenges in the design of future wireless networks. In this paper, we investigate problem allocation Specifically, consider proportional fair scheduling relay Our formulation takes into account fluctuations usable resource, channel quality variations caused frequency selectivity,...

10.1109/jsac.2013.130313 article EN IEEE Journal on Selected Areas in Communications 2013-02-19

In Machine-to-Machine (M2M) communications, devices can automatically communicate with each other without any intervention by humans. However, LTE-A is primarily designed and optimized for Human-to-Human (H2H) communications. Even though has defined Machine-Type Communications (MTC), several parts are still undefined or follow the existing H2H standards. Specifically, paging mechanism in will substantially increase computational load signaling overhead of system when there many M2M devices....

10.1109/tmc.2016.2575835 article EN IEEE Transactions on Mobile Computing 2016-06-02
Coming Soon ...