Apparatus and method for controlling vessel deviating from anchorage
    1.
    发明授权
    Apparatus and method for controlling vessel deviating from anchorage 有权
    用于控制偏离锚固装置的装置和方法

    公开(公告)号:US09261880B2

    公开(公告)日:2016-02-16

    申请号:US14330230

    申请日:2014-07-14

    IPC分类号: G05D1/02

    CPC分类号: G05D1/0208

    摘要: The present invention relates to an apparatus and method that control a vessel deviating from an anchorage using wide-range sensor-based spherical trigonometry. In the method, vessels anchored in an anchorage are monitored. The anchorage is defined as a group, and the group of the anchored vessels is managed. Leaving of a vessel, needing to deviate from the anchorage, from the group is controlled. If a vessel recognized as a vessel identical to one that left the group requests anchoring after a predetermined period of time has elapsed, the anchoring-requesting vessel is controlled.

    摘要翻译: 本发明涉及使用基于宽范围传感器的球面三角法来控制偏离锚固物的容器的装置和方法。 在该方法中,监测锚固在锚地中的船舶。 锚地被定义为一组,并且锚定的船只组被管理。 离开集装箱需要偏离锚地的船只被控制。 如果在经过预定时间段之后,被认定为与离开该组请求锚定的容器相同的容器的容器已经过去,则锚定请求容器被控制。

    Key generation apparatus and method based on machine learning

    公开(公告)号:US12095908B2

    公开(公告)日:2024-09-17

    申请号:US17518905

    申请日:2021-11-04

    摘要: Disclosed herein are a key generation apparatus and method based on machine learning. The key generation method includes generating, by first and second key generation apparatuses, first and second commit values, and uploading the first commit value and the second commit value to an external repository, training, by the first and second key generation apparatuses, a neural network so as to match weight values with each other, sharing, by the first and second key generation apparatuses, the first and second commit values with each other, comparing shared first and second commit values with uploaded commit values, and then verifying the commit values, and when verification of the commit values has succeeded, generating, by the first and second key generation apparatuses, hash values using the matched weight value, verifying whether the hash values are identical to each other, and generating a session secret key based on a result of verification.