Abstract
This paper suggests the library which supports different parsers depending on applications in order to make up for the defects of open source. Using the library, systems have been developed to simulate the IEVF service on the wireless environment, and time and memory used for the V-145 protocol for each parser have been measured. Android-based smart phones were used to emulate the vessels, and Windows7-based desk tops were used to emulate the VTS service center.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A4A01013587).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Laxhammar E, Falkman G, Sviestins E (2009) Anomaly detection in sea treffic—a comparison of the gaussian mixture model and the kernel density estimator. In: ISIF 2009
Kawaguchi A et al (2009) Towards the development of intelligent navigation support systems gor group shipping and global marine traffic control. IET Intell Transp Syst 3(3):257–267
Lee BG, Han JW, Jo HS (2010) Design of situation awareness and aids to navigation structure of VTS for maritime safety. J Korea Inf Commun Soc 35(7):1073–1080
Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) APWeb workshops 2006. LNCS, vol 3842. Springer, Heidelberg, pp 741–748
Park N (2010) Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu R, Zhang Y, Liu B, Liu C (eds) ICICA 2010, vol 106., CCISSpringer, Heidelberg, pp 72–79
Park N (2011) Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. ICCCI 2011., LNCSSpringer, Heidelberg, pp 488–496
Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8(4):205–219
Park N, Kim Y (2010) Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan J-S, Chen S-M, Nguyen NT (eds) ICCCI 2010, vol 6422., LNCS(LNAI)Springer, Heidelberg, pp 193–202
Park N, Song Y (2010) AONT encryption based application data management in mobile RFID environment. In: Pan J-S, Chen S-M, Nguyen NT (eds) ICCCI 2010, vol 6422., LNCS(LNAI)Springer, Heidelberg, pp 142–152
Park N (2011) Customized healthcare infrastructure using privacy weight level based on smart device. In: Lee G, Howard D, Ślęzak D (eds) Communications in computer and information science, vol 206. Springer, Heidelberg, pp 467–474
Park N (2011) Secure data access control scheme using type-based re-encryption in cloud environment. In: Katarzyniak R et al (eds) Studies in computational intelligence, vol 381. Springer, Heidelberg, pp 319–327
Park N, Song Y (2010) Secure RFID application data management using all-or-nothing transform encryption. In: Pandurangan G, Anil Kumar VS, Ming G, Liu Y, Li Y (eds) WASA 2010. LNCS, vol 6221. Springer, Heidelberg, pp 245–252
Park N (2010) The implementation of open embedded S/W platform for secure mobile RFID reader. J Korea Inf Commun Soc 35(5):785–793
Park N, Ko Y (2012) Computer education‘s teaching-learning methods using educational programming language based on STEAM education. In: Park J, Zomaya A, Yeo S et al (eds) NPC 2012, vol 7513. Springer, Heidelberg, pp 320–327
Ko Y, An J, Park N (2012) Development of computer, math, art convergence education lesson plans based on smart grid technology. In: Kim T, Stoica A, Fang W et al (eds) Computer applications for security, control and system engineering, vol 339. Springer, Heidelberg, pp 109–114
Ko Y, Park N (2011) Experiment and verification of teaching fractal geometry concepts using a logo-based framework for elementary school children. In: Kim T, Adeli H, Slezak D et al (eds) Future generation information technology, vol 7105. Springer, Heidelberg, pp 257–267
An J, Park N (2012) The effect of EPL programming based on CPS model for enhancing elementary school students’creativity. In: Park JJH, Jeong Y, Park SO et al (eds) Embedded and multimedia computing technology and service, vol 181. Springer, The Netherlands, pp 237–244
An J, Park N (2011) Computer application in elementary education bases on fractal geometry theory using LOGO programming. In: Park JJ, Arabnia H, Chang H et al (eds) IT convergence and services, vol 107. Springer, The Netherlands, pp 241–249
Kim Y, Park N (2012) Development and application of STEAM teaching model based on the rube goldberg‘s invention. In: Yeo S, Pan Y, Lee YS et al (eds) Computer science and its applications, vol 203. Springer, The Netherlands, pp 693–698
Park N, Cho S, Kim B et al (2012) Security enhancement of user authentication scheme using IVEF in vessel traffic service system. In: Yeo S, Pan Y, Lee YS et al (eds) Computer science and its applications, vol 203. Springer, The Netherlands, pp 699–705
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Park, N. (2014). The Improvement for Performance of Inter-VTS Data Exchange Format Protocol in VTS System. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_65
Download citation
DOI: https://doi.org/10.1007/978-94-017-8798-7_65
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-8797-0
Online ISBN: 978-94-017-8798-7
eBook Packages: EngineeringEngineering (R0)