1 |
J. K. Ko, S. K. Hong, B. B. Park, and N. S. Kim, "Trends of Converging Smart Devices with IoT Technology", Electronic and Telecommunications Trends, Vol. 28, No. 4, pp. 79-84. 2013.
|
2 |
B. C. Kim, "A Internet of Things(IoT) based exploration robot design for remote control and monitoring", Journal of Digital Convergence, Vol. 13, No. 1, pp. 185-190, 2015.
DOI
|
3 |
H. D. Kim, S. W. Lee, and S. H. Lee, "Semiconductor Process and Equipment", Bukdo Publishing Co., Ltd, 2012.
|
4 |
Y. J. Park, H. R. Whang, "A Study on Optimal Operation Algorithm in Semiconductor Plasma Deposition Equipment", Korean Production & Operations Management Society, Vol. 24, No. 1, pp. 133-147, 2013.
|
5 |
I. C. Kwak, Y. S. Yang, B. H. Choi, and Y. M. Kim, "Analysis of Fluid Flow in the Linear Cell Source for Organic Semiconductor Thin Film Deposition", International Journal of Precision Engineering and Manufacturing, Vol. 26, No. 10, pp. 74-80, 2009.
|
6 |
Jenna Burrell, Tim Brooke, Richard Beckwith, "Vineyard Computing: Sensor Networks in Agricultural Production", Pervasive Computing, IEEE, Vol. 3, Issue 1, pp. 38-45, 2004.
DOI
|
7 |
Hangbae Chang, "A Study on Security Strategy in ICT Convergence Environment", The Jonrnal of Supercomputing, Vol. 1, No. 13, pp. 23-32, 2014.
|
8 |
Y. D. Kim, J. S. Kim, and H. S. Sung, "Semiconductor production process management", Hongneung Publishing Co., Ltd, 2014.
|
9 |
J. lee, B. Bagheri, and H. A. Kao, "A Cyber-Physical System architecture for Industry 4.0-based Manufacturing systems", Manufacturing Letters. Vol. 3, pp. 18-23, 2015.
DOI
|
10 |
A. Perrig, D. Song, R. Canetti, J. D. Tyger, and B. Briscoe, "Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction", RFC 4082, 2005.
|
11 |
Wireless Sensor Network Blog, "Valaram Offers an Affordable Remote Sensor and Monitoring Solution for Android Devices", 2013.
|
12 |
S. H. Son, S. I. Jun, "Load Balancing Policies for the Desktop Virtual Desktop Services Based on the Xen", Vol. 13, No. 1, pp. 55-64, 2008.
|
13 |
J. M. Yang, J. H. Kim, "A Study on the Enhancement of Network Survivability through Smart Sensor Technologies Convergence", Journal of Digital Convergence, Vol. 14, No. 8, pp. 269-276, 2016.
DOI
|
14 |
A. Riahi, et al., "A Systemic and Cognitive Approach for IoT Security", in Proc. Cont.rol Computing, Networking, and Communication, Vol. 15, No. 7, pp. 45-52, 2014.
|
15 |
J. O. Park, "A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment", Journal of Digital Convergence, Vol. 14, No. 10, pp. 295-302, 2016.
DOI
|