1 |
Choi, W. J. and Jun, S. H.(2020), "A Basic Study on Connected Ship Navigation System", Journal of Korean Navigation and Port Research, Vol. 44, No. 2, pp. 136-143.
|
2 |
Coldwell, T. G.(1983), "Marine traffic behaviour in restricted waters", The Journal of Navigation, Vol. 36, No. 3, pp. 430-444.
DOI
|
3 |
International Maritime Organization(2018), IMO takes first steps to address autonomous ships, https://www.imo.org/en/MediaCentre/PressBriefings/Pages/08-MSC-99-MASS-scoping.aspx.
|
4 |
International Maritime Organization(2021), Autonomous ships: regulatory scoping exercise completed, https://www.imo.org/en/MediaCentre/PressBriefings/pages/MASSRSE2021.aspx.
|
5 |
Jung, H., Chang, H. and Song, Y. E.(2019), "Trend of Autonomous Navigation Technology for Unmanned Ship", Journal of Institute of Control, Robotics and Systems, Vol. 25, No. 1, pp. 76-87.
DOI
|
6 |
Kim, D. H., Lee, S. M. and Kong, G. Y.(2013), "A Study on the Wireless Ship Motion Measurement System Using AHRS", Journal of Korean Navigation and Port Research, Vol. 37, No. 6, pp. 575-580.
DOI
|
7 |
Kim, J. and Jang, H. S.(2019), "Technology Trends and Preparation of Autonomous Ships", Journal of the society of naval architects of Korea, Vol. 56, No. 4, pp. 4-7.
|
8 |
Kim, J. H.(2019), "A Study on the Turning Ability of the KVLCC2 in Regular Wave Using MMG Model", Inha University, Master Dissertation.
|
9 |
Ko, K. S.(2022), "Study On Collision Avoidance Performance of a Ship in Waves", Seoul National University, Master Dissertation.
|
10 |
Szlapczynski, R. and Szlapczynska, J.(2017), "Review of ship safety domains: Models and applications", Ocean Engineering, Vol. 145, pp. 277-289.
DOI
|
11 |
Yasukawa, H. and Yoshimura, Y.(2015), "Introduction of MMG standard method for ship maneuvering predictions", Journal of Marine Science and Technology, Vol. 20, No. 1, pp. 37-52.
DOI
|
12 |
Yoo, J. W., Jo, Y. H. and Cha, Y. K.(2022), "Artificial Intelligence for Autonomous Ship: Potential Cyber Threats and Security", Journal of The Korea Institute of Information Security & Cryptology, Vol. 32, No. 2, pp. 447-463.
|