• Title/Summary/Keyword: Trespassing

Search Result 27, Processing Time 0.025 seconds

Development of Individual Trespassing Detector for Building (개체 독립형 건축물 침입감지기 개발)

  • Kim, Myung-Ho
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.57 no.4
    • /
    • pp.400-403
    • /
    • 2008
  • In this work, an individual trespassing detector using a PIR sensor to detect infrared rays only between the range of $9.4{\sim}10.4{\mu}m$ radiated from the body is proposed. This detector using FIR sensor detects not insect or object but human body, It doesn't restrict the inhabitant's behavior because the filter of pm sensor is designed to have face angle and the detector only detects the window area. The existing wide angle filter, RIR sensor, detects $30^{\circ}$ angle while the face angle filter sensor on this paper detects $11^{\circ}$ angle with 3cm of face angle filter from 2m of detecting distance. In case of interruption of electric power, 250mAh of lithium-ion battery has worked for 10 hours consuming 22mA in normal state. Meanwhile, in case of interruption of electric power, 250mAh of battery has worked for 4 hours consuming 60mA in trespassing detecting state. Projector, receptor, controller and alarm are put on one PCB in order to make it convenient to install without any special installation skill.

The Linkage Between Issue Ownership Perception and Campaign Advertising: A Case Study of the 2012 Taiwan Presidential Election

  • Yu, Eric Chen-hua;Hsu, Pei-chen
    • Asian Journal for Public Opinion Research
    • /
    • v.7 no.1
    • /
    • pp.23-39
    • /
    • 2019
  • Assuming that a political party has a strong incentive to gain votes via issue setting as part of its campaign strategy, this study utilized a Web experimental survey to explore the extent to which three issue-related campaign advertising strategies - namely, issue ownership, issue convergence, and issue trespassing - affected voters' perceptions toward parties' issue-handling capabilities. Our empirical results show that issue ownership perceptions exist in Taiwan. In the 2012 Taiwan presidential election, as issue ownership advertisements may reinforce voters' beliefs regarding parties' issue-handling capabilities, issue trespassing advertising may improve a party's image on the disadvantageous issue dimension. At least our data shows that the Kuomintang's (KMT) advertisements have both effects.

An Optical Fiber Perimeter Guard System Using OTDRs (OTDR을 이용한 광섬유 외곽경비시스템에 관한 연구)

  • Chang, Jin-Hyeon;Lee, Yong-Cheol;Shin, Dong-Ho;Oh, Sang-Gun;Lee, Jong-Youn;Jung, Jin-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1236-1243
    • /
    • 2010
  • The perimeter defense system was created and its characteristics were evaluated. It was designed to utilize the fiber sensing device, namely OTDR(Optical Time Domain Reflectometer) which has been used for the maintenance of the optical communication network. An OTDR was constituted by a pulse laser with the nature of 1310nm, +15dBm for the observation of 400 meter optical fence. The high-speed 32-bit processor(S3C2440) has applied to MPU(Main Processor Unit) which helps to improve the performance of OTDR algorithms. Consequently, the maximum error was 0.84 meter on the performance test of the 10km monitoring and the pass criteria of ${\pm}1m$ satisfied in all the sections. The alarm delay time was under 3 sec after detecting the disorder. For the case of secondary trespassing after primary trespassing, the optical switch was installed in OTDR to monitor the secondary trespassing and to measure the multi-point detection. Therefore, this paper shows that the detections of secondary trespassing and multi-point is possible by means of optical switch.

Ginseng Poaching and Border Trespassing in Hunchun during the Qing Period (청대 훈춘의 인삼과 범월 )

  • Kim Seonmin
    • Journal of Ginseng Culture
    • /
    • v.5
    • /
    • pp.1-20
    • /
    • 2023
  • In 1749, during an incident near the Tumen River in Hunchun, six people, all Qing ginseng pickers, were killed by seven Korean soldiers from the Chosŏn garrison. The Chosŏn soldiers encountered the ginseng pickers on the border and agreed to exchange goods, but when they failed to receive the proper price for rice, the soldiers became angry and decided to attack the Qing ginseng pickers. The seven Korean criminals were executed a year and a half after the incident. The whole process regarding the arrest and investigation of the criminals, as well as the official exchanges between the Qing and Chosŏn governments, were recorded in detail in the Chosŏn document written in Chinese and the Qing documents written in Manchu. In dealing with this murder case, the Qing local officials focused on identifying the murdered victims, clarifying the victims' responsibilities, and disposing of their remaining belongings. On the other hand, the Chosŏn government focused on providing reports quickly to the Qing officials about the investigation of the criminals. In doing so, it tried to reduce the risk of any possible problems that the murder case on the border could cause in its relations with the Qing government. The relevant records on this murder case show various aspects of the Qing and Chosŏn relations, including the contacts between the people along the Tumen River, border trespassing, material exchanges, rules about ginseng picking, and border patrols. This case also reveals that the Qing and Chosŏn people from various classes had different relationships depending on their respective interests.

A Study on Conservation Plan of Peatland - A Case Study of Yang-San Peatland - (고층습지 관리계획을 위한 고찰 - 양산고층습지를 중심으로 -)

  • Yoon, Sung-Yoon;Ahn, Byung-Young
    • Journal of Wetlands Research
    • /
    • v.3 no.1
    • /
    • pp.29-38
    • /
    • 2001
  • We have studied the Yang-San peatland area to make a conservation plan. Since the peatland has its own unique ecosystem, which provides important resources in studying transformations of ecosystem, vegetation, weather, and many other things, it is not enough to emphasize the importance of preserving this area. Based on our investigation, we propose the followings to preserve the Yang-San peatland area and use in environmentally sustainable manner. First, it should be designated as a Wetland preservation area to make a conservation system between government and citizens. Second, a monitoring system is essential to observe the change of ecosystem and prohibit trespassing. Third, a comprehensive and precise investigation is in need how to restore the ecosystem. Fourth, an educational information about the ecosystem should be provided through pamphlets, postcards, visiting centers etc.

  • PDF

To Neutralize the Security Systems, Infringement Actions by the Administrator on the Computer Networks (시스템 보안을 무력화 시키는 전산관리자의 시스템 침해 행위 연구)

  • Roo, kyong-ha;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.165-168
    • /
    • 2012
  • In this paper, to remind ourselves that exist in the world what kind of security system is also difficult to defend a system with computerized access system representative of infringement that, Computerized personnel act of infringement cases, and thus the extent of the damage and the severity Revisited, Furthermore, technical measures beyond the limits of the technical security measures in line computerized rights management representative and for infringement prevention measures in Human Resource Management through its own alternative to find.

  • PDF

A Dangerous Situation Recognition System Using Human Behavior Analysis (인간 행동 분석을 이용한 위험 상황 인식 시스템 구현)

  • Park, Jun-Tae;Han, Kyu-Phil;Park, Yang-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.345-354
    • /
    • 2021
  • Recently, deep learning-based image recognition systems have been adopted to various surveillance environments, but most of them are still picture-type object recognition methods, which are insufficient for the long term temporal analysis and high-dimensional situation management. Therefore, we propose a method recognizing the specific dangerous situation generated by human in real-time, and utilizing deep learning-based object analysis techniques. The proposed method uses deep learning-based object detection and tracking algorithms in order to recognize the situations such as 'trespassing', 'loitering', and so on. In addition, human's joint pose data are extracted and analyzed for the emergent awareness function such as 'falling down' to notify not only in the security but also in the emergency environmental utilizations.

Design and Implementation of an Advanced Cattle Shed Management System using a Infrared Wireless Sensor nodes and Surveillance Camera (적외선 무선 센서 노드 및 무인감시카메라를 이용한 선진화된 축사 관리 시스템의 설계 및 구현)

  • Yoon, Min;Chang, Jae-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.22-34
    • /
    • 2012
  • In this paper, we design and implement an advanced cattle shed management system using a infrared wireless sensor nodes and surveillance camera. Our system provides three main capabilities, such as 24-hours cattle shed monitoring, trespassing detection, automatic control of cattle shed. For this, our system can monitor cattle shed as well as the condition of cows/bulls for 24 hours per day by using surveillance cameras. Our system also can detect intruders inside the cattle shed by using infrared wireless sensor nodes. In addition, our system can control the power of electric equipments in the cattle shed by using a power controller. Finally, we combine the three components into a system by using a smartphone application program and verify the effectiveness of our system by a testbed.

Moving Object Tracking System for Dock Safety Monitoring (선착장 안전 모니터링을 위한 이동 객체 추적 시스템)

  • Park, Mi-Jeong;Hong, Seong-Il;Yoo, Seung-Hyeok;Kim, Kyeong-Og;Song, Jong-Nam;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.8
    • /
    • pp.867-874
    • /
    • 2015
  • Hoist have been installed at wharfs or seashore in the center of fishing village fraternities. A Hoist is used in harbor loading and unloading fishing gear or seafoods and is a device to refloat fishing boats into a breakwater or land in case of typhoon or bad weather. In this paper, we propose image perception and moving objects tracking system that detects boat's damage, theft and trespassing occurred at the wharf. This system detects objects' motion in real time by using the motion templet and tracks to concentrate on a moving object(person, boat, etc.) by using a PTZ camera.

A Study on Security Methods Against Stalking Crime (스토킹 범죄의 현황과 대책)

  • Lee, Sang-Chol;Kim, Pyong-Soo
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.263-289
    • /
    • 2002
  • This study would focus on actual conditions of stalking, which are getting more serious, and security methods. In current society, there has been rapid change inprocess towards the information society from the industrial society. This aspect of change has brought out the wide range of social and pathological situations. Moreover, it has produced a number of new types of crime, which can not be analysed by the values of traditional ethics and morals. Currently, there have been the appearance of diverse types crime, however, the stalking can be regarded as a kind of new comer in the issue of contemporary crimes. The stalking has been focused on famous people and entertainers in the past, whereas more seriously, the range of victims has expanded to the general public in recent. In particular, the stalking is closely connected with sexual harrassment. The most of the stalking have happened between men and women. Therefore, it can be mentioned that shadowing, trespassing, threatening, watching and concealment in the first would move on harrassment and even murder. The stalking has been based on anonymity, following the information- oriented trend. Also, it shows its seriousness that the range of stalking victims has been expanded from limited people to the general public. Hence, all possible governmental and private resources need to be converged into the construction of social, legal and security methods for the protection and counterplan against the stalking.

  • PDF