Chen, Jong-Shin
17248  results:
Search for persons X
?
2

Real-time Human Movement Recognition and Interaction in Vir..:

, In: 2023 12th International Conference on Awareness Science and Technology (iCAST),
Yeh, ChunHsiu ; Shen, Wei-Cheng ; Ma, Chi-Wei... - p. 242-246 , 2023
 
?
3

Secrecy Rate Analysis for the Cooperative Communications:

, In: 2023 12th International Conference on Awareness Science and Technology (iCAST),
 
?
4

Secure Communication with Physical Layer Coding Scheme:

, In: 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan),
 
?
5

Enhancing Online Learning Monitoring with Novel Image Recog..:

, In: 2023 12th International Conference on Awareness Science and Technology (iCAST),
Yeh, ChunHsiu ; Shen, Wei-Cheng ; Chi, Hung-Yu.. - p. 340-345 , 2023
 
?
6

A Study on Situation Awareness Estimation for Network Secur..:

, In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE),
 
?
7

A Study of Learning Perception towards VR Technology:

, In: 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan),
Lai, Ah-Fur ; Yang, Cheng-Ying ; Lai, Ying-An. - p. 603-604 , 2023
 
?
9

Research on KNN-Based GNSS Coordinate Classification for Ep..:

, In: Communications in Computer and Information Science; New Trends in Computer Technologies and Applications,
Hsu, Chi-Yueh ; Kuo, Chun-Ming ; Hung, Ruo-Wei. - p. 493-500 , 2022
 
?
11

The Domination and Independent Domination Problems in Super..:

, In: Computational Science and Its Applications – ICCSA 2021; Lecture Notes in Computer Science,
 
?
12

A kNN Based Position Prediction Method for SNS Places:

, In: Intelligent Information and Database Systems; Lecture Notes in Computer Science,
Chen, Jong-Shin ; Huang, Huai-Yi ; Hsu, Chi-Yueh - p. 266-273 , 2020
 
?
14

An Efficient Geographical Place Mining Strategy for Social ..:

, In: 2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW),
 
?
15

An Efficient Facebook Place Information Extraction Strategy:

, In: Communications in Computer and Information Science; Mobile Internet Security,
 
1-15