Browsing by Author "Chai, CP"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item Open Access Automatic Sterilization Trash-Can with Application of UV-LED and Photocatalytic Oxidation(Northern Taiwan Journal, 2009-03-31) Chai, YH; Lee, HT; Chan, LY; Lin, YS; Chai, CPThe main purpose of this research work is to make the traditional trash-can not distribute odor and not be approached by mosquitoes and bacteria, and to modify other shortcomings. We are going to design a multi-purpose trash-can which can provide functions such as sterilization, deodorization, giving out fragrant, and so on. The photocatalytic oxidation, after absorbing ultraviolet-rays from the illumination light emitting diode (abbreviated as UV-LED), is able to use the principle similar to the plant's photosynthesis, but it sterilizes, restrains the bacterium, and deodorizes more effectively. Besides, we can choose at our own will to increase the quantity of the aromatic compound so as to provide the fragrance. After some garbage is thrown in, the time-controlling UV-LED turns on at the same time, and it brings the automatic deodorization and sterilization to work. The principles of raising the lid to deodorize itself, the sterilization trash-can, and the internal circuit design include: It uses the 110V AC alternating current) and then transformer, using 6V DC (direct current) to control infrared radiation to raise the cover of the system. The light catalyst spray motor and UV-LED use the same 5V DC, so it is quite power saving. After testing, we obtain that the sterilization efficiency is up to 99.99%, so the system has large practical value and market potential. In the future, we may apply the principle to other correlation products. At the motive of life quality promotion and environmental protection, we do research whose goal is to combine original mature technology with the creative product – automatic sterilization trash can with application of UV-LED and photocatalytic oxidation.Item Open Access Facebook Account Misuse Detection -- A Statistical Approach(2013-06-30) Chai, CPPrivacy of personal information on social networking websites has become an important issue, because when a social networking website account is used by a person other than the owner, all personal data stored on the website can be retrieved, no matter how the owner sets the privacy options. Therefore, this paper proposes a statistical approach with the use of Support Vector Machine (SVM) to detect whether the Facebook account user is the actual owner. By analyzing online browsing behavior features, it is found that the normal user tends to be more active and that the stealthy user prefers to read personal messages.Item Open Access Lightweight Mutual Authentication Scheme for Advanced Metering Infrastructure(2012-12-01) Chai, CP; Ruan, HM; Yang, YS; Fan, IA; Chuang, YH; Lei, CL; Huang, CY; Teng, CW; Shaw, YS; Liang, MAdvanced Metering Infrastructure (AMI) is drawing more attention due to various benefits which it brings. Compared with traditional power grid systems or advanced meter reading (AMR) systems, AMI systems possess capabilities to provide improved management and predictability of power utilization, to monitor and detect fault occurrences, and to conserve energy. However, behind the various benefits brought by AMI, there still exist plenty of security threats. The open network used by AMIs is an extremely convenient interface for malicious attackers or network hackers to damage the AMI systems. In the system of AMI, any action that gains access to the meter must pass the authentication. Existing authentication schemes either require on-line authentication or need to store lots of data on the meter. Therefore, this paper presents a lightweight mutual authentication scheme that can be performed off-line with a small amount of authentication data. The scheme was implemented with the One-Time Password (OTP) and hash functions.Item Open Access Security Threats in Advanced Metering Infrastructure(2011) Ruan, HM; Yang, YS; Fan, IA; Chai, CP; Huang, CY; Lei, CLAdvanced metering infrastructure (AMI) is drawing more and more attention due to various benefits which it brings. Compared to traditional power grid systems or advanced meter reading (AMR) systems, AMI systems possess capabilities to provide improved management and predictability of power utilization, to monitor and detect fault occurrences, and to conserve energy. However, behind the various benefits brought by AMI, there still exist plenty of security threats. The open network used by AMIs is an extremely convenient interface for malicious attackers or network hackers to damage the AMI systems; on the other hand, the immature hardware design for AMI devices might cause physical breach points.