default search action
Jeong-Uk Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j6]Yongjun Ren, Jin Wang, Xiujuan Feng, Geumran Youn, Jeong-Uk Kim:
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment. Clust. Comput. 22(Suppl 1): 1805-1814 (2019) - [j5]Jin Liu, Chenkai Gu, Jin Wang, Geumran Youn, Jeong-Uk Kim:
Multi-scale multi-class conditional generative adversarial network for handwritten character generation. J. Supercomput. 75(4): 1922-1940 (2019) - 2018
- [j4]Jin Liu, Li Lin, Haoliang Ren, Minghao Gu, Jin Wang, Geumran Youn, Jeong-Uk Kim:
Building neural network language model with POS-based negative sampling and stochastic conjugate gradient descent. Soft Comput. 22(20): 6705-6717 (2018) - 2017
- [c8]Jin Wang, Kai Wang, Yiquan Cao, Geumran Youn, Jeong-Uk Kim:
A RBF Neural Network Based Data Aggregation Algorithm for Wireless Sensor Networks. FSDM 2017: 428-433 - [c7]Jin Wang, Chunwei Ju, Huan Ji, Geumran Youn, Jeong-Uk Kim:
A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs. ICCCS (1) 2017: 430-437 - 2015
- [c6]Jin Wang, Dengzhi Liu, Kai Zhang, Xuedong Chen, Jeong-Uk Kim:
A novel real-time service architecture based on driver state detecting for improving road safety. ICCE-TW 2015: 53-54 - [c5]Jin Wang, Kai Zhang, Dengzhi Liu, Xuedong Chen, Jeong-Uk Kim:
A three-tiers service architecture based on outdoor monitoring for epilepsy patients. ICCE-TW 2015: 68-69 - [c4]Yunhua Gu, Xing Wang, Shu Shen, Jin Wang, Jeong-Uk Kim:
Analysis of data storage mechanism in NoSQL database MongoDB. ICCE-TW 2015: 70-71 - [c3]Yunhua Gu, Shu Shen, Jin Wang, Jeong-Uk Kim:
Application of NoSQL database MongoDB. ICCE-TW 2015: 158-159 - 2014
- [j3]Jin Wang, Bin Li, Feng Xia, Chang-Seob Kim, Jeong-Uk Kim:
An Energy Efficient Distance-Aware Routing Algorithm with Multiple Mobile Sinks for Wireless Sensor Networks. Sensors 14(8): 15163-15181 (2014) - 2013
- [c2]Jin Wang, Liwu Zuo, Zhongqi Zhang, Feng Xia, Jeong-Uk Kim:
Mobility Based Data Collection Algorithm for Wireless Sensor Networks. MSN 2013: 342-347 - 2012
- [j2]SooHwan Choi, Jeong-Uk Kim, Il-Yop Chung, Jong-Hoon Han:
Determination of Power-Quality Disturbances Using Teager Energy Operator and Kalman Filter Algorithms. Int. J. Fuzzy Log. Intell. Syst. 12(1): 42-46 (2012) - [c1]Jin Wang, Yue Yin, Jeong-Uk Kim, Sungyoung Lee, Chin-Feng Lai:
A Mobile-Sink Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks. CIT 2012: 678-683 - 2010
- [j1]Jin Wang, Jeong-Uk Kim, Lei Shu, Yu Niu, Sungyoung Lee:
A Distance-Based Energy Aware Routing Algorithm for Wireless Sensor Networks. Sensors 10(10): 9493-9511 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint