Skip to main content

The Improvement for Performance of Inter-VTS Data Exchange Format Protocol in VTS System

  • Conference paper
  • First Online:
Frontier and Innovation in Future Computing and Communications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 301))

  • 2121 Accesses

Abstract

This paper suggests the library which supports different parsers depending on applications in order to make up for the defects of open source. Using the library, systems have been developed to simulate the IEVF service on the wireless environment, and time and memory used for the V-145 protocol for each parser have been measured. Android-based smart phones were used to emulate the vessels, and Windows7-based desk tops were used to emulate the VTS service center.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A4A01013587).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Laxhammar E, Falkman G, Sviestins E (2009) Anomaly detection in sea treffic—a comparison of the gaussian mixture model and the kernel density estimator. In: ISIF 2009

    Google Scholar 

  2. Kawaguchi A et al (2009) Towards the development of intelligent navigation support systems gor group shipping and global marine traffic control. IET Intell Transp Syst 3(3):257–267

    Article  MathSciNet  Google Scholar 

  3. Lee BG, Han JW, Jo HS (2010) Design of situation awareness and aids to navigation structure of VTS for maritime safety. J Korea Inf Commun Soc 35(7):1073–1080

    Google Scholar 

  4. Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) APWeb workshops 2006. LNCS, vol 3842. Springer, Heidelberg, pp 741–748

    Google Scholar 

  5. Park N (2010) Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu R, Zhang Y, Liu B, Liu C (eds) ICICA 2010, vol 106., CCISSpringer, Heidelberg, pp 72–79

    Google Scholar 

  6. Park N (2011) Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. ICCCI 2011., LNCSSpringer, Heidelberg, pp 488–496

    Google Scholar 

  7. Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8(4):205–219

    Article  Google Scholar 

  8. Park N, Kim Y (2010) Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan J-S, Chen S-M, Nguyen NT (eds) ICCCI 2010, vol 6422., LNCS(LNAI)Springer, Heidelberg, pp 193–202

    Google Scholar 

  9. Park N, Song Y (2010) AONT encryption based application data management in mobile RFID environment. In: Pan J-S, Chen S-M, Nguyen NT (eds) ICCCI 2010, vol 6422., LNCS(LNAI)Springer, Heidelberg, pp 142–152

    Google Scholar 

  10. Park N (2011) Customized healthcare infrastructure using privacy weight level based on smart device. In: Lee G, Howard D, Ślęzak D (eds) Communications in computer and information science, vol 206. Springer, Heidelberg, pp 467–474

    Google Scholar 

  11. Park N (2011) Secure data access control scheme using type-based re-encryption in cloud environment. In: Katarzyniak R et al (eds) Studies in computational intelligence, vol 381. Springer, Heidelberg, pp 319–327

    Google Scholar 

  12. Park N, Song Y (2010) Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan G, Anil Kumar VS, Ming G, Liu Y, Li Y (eds) WASA 2010. LNCS, vol 6221. Springer, Heidelberg, pp 245–252

    Google Scholar 

  13. Park N (2010) The implementation of open embedded S/W platform for secure mobile RFID reader. J Korea Inf Commun Soc 35(5):785–793

    Google Scholar 

  14. Park N, Ko Y (2012) Computer education‘s teaching-learning methods using educational programming language based on STEAM education. In: Park J, Zomaya A, Yeo S et al (eds) NPC 2012, vol 7513. Springer, Heidelberg, pp 320–327

    Google Scholar 

  15. Ko Y, An J, Park N (2012) Development of computer, math, art convergence education lesson plans based on smart grid technology. In: Kim T, Stoica A, Fang W et al (eds) Computer applications for security, control and system engineering, vol 339. Springer, Heidelberg, pp 109–114

    Chapter  Google Scholar 

  16. Ko Y, Park N (2011) Experiment and verification of teaching fractal geometry concepts using a logo-based framework for elementary school children. In: Kim T, Adeli H, Slezak D et al (eds) Future generation information technology, vol 7105. Springer, Heidelberg, pp 257–267

    Chapter  Google Scholar 

  17. An J, Park N (2012) The effect of EPL programming based on CPS model for enhancing elementary school students’creativity. In: Park JJH, Jeong Y, Park SO et al (eds) Embedded and multimedia computing technology and service, vol 181. Springer, The Netherlands, pp 237–244

    Chapter  Google Scholar 

  18. An J, Park N (2011) Computer application in elementary education bases on fractal geometry theory using LOGO programming. In: Park JJ, Arabnia H, Chang H et al (eds) IT convergence and services, vol 107. Springer, The Netherlands, pp 241–249

    Chapter  Google Scholar 

  19. Kim Y, Park N (2012) Development and application of STEAM teaching model based on the rube goldberg‘s invention. In: Yeo S, Pan Y, Lee YS et al (eds) Computer science and its applications, vol 203. Springer, The Netherlands, pp 693–698

    Chapter  Google Scholar 

  20. Park N, Cho S, Kim B et al (2012) Security enhancement of user authentication scheme using IVEF in vessel traffic service system. In: Yeo S, Pan Y, Lee YS et al (eds) Computer science and its applications, vol 203. Springer, The Netherlands, pp 699–705

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Namje Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Park, N. (2014). The Improvement for Performance of Inter-VTS Data Exchange Format Protocol in VTS System. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_65

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8798-7_65

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8797-0

  • Online ISBN: 978-94-017-8798-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics