• Title/Summary/Keyword: illegal

Search Result 1,448, Processing Time 0.028 seconds

Actual Results on the Control of Illegal Fishing in Adjacent Sea Area of Korea (한국 연근해 불법어업의 지도 단속 실태)

  • Lee, Sang-Jo;Kim, Jin-Kun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.10 no.2
    • /
    • pp.139-161
    • /
    • 1998
  • This thesis includes a study on the legal regulation, the system and formalities on the control of illegal fishing. And the author analyzed the details of the lists of illegal fishing controlled by fishing patrol vessels of Ministry of Maritime Affairs and Fisheries from 1994 to 1996 in adjacent sea area of Korea. The results are summarized as follows ; 1. The fishing patrol vessels controlled total 826 cases in 2,726 days of 292 voyages by 17 vessels in 1994, total 1,086 cases in 3,060 days of 333 voyages by 18 vessels in 1995 and total 933 cases in 3,126 days of 330 voyages by 19 vessels in 1996. 2. The fishing period of illegal fishing was generally concentrated from April to September. But year after year, illegal fishing was scattered throughout the year. 3. The most controlled sea area of illegal fishing was the south central sea area in the sea near Port of Tongyeong. The sea area occupied about 36~51% of totality and the controlled cases were gradually increased every year. The second was the south western sea area in the sea near Port of Yosu. The sea area occupied about 18-27% and the controlled cases were a little bit increased every year. The third was the south eastern sea area in the sea near Pusan. The sea area occupied about 13~23% and the controlled cases were gradually decreased year by year. 4. The most controlled kind of illegal fishing was the small size bottom trawl. This occupied about 81-95% of totality and the controlled cases were gradually increased year by year. The second was the medium size bottom trawl. This occupied about 4-7% and the controlled cases were gradually decreased year by year. The third was the trawl of the coastal sea, this occupied about 2~4% and the controlled cases were a little bit decreased every year. 5. The most controlled address of illegal fishing manager was Pusan city which occupied about 33-51% of totality. The second was Cheonnam which occupied about 24-29%. The third was Kyungnam which occupied about 16~35%. 6. The most controlled violation of regulations was Article 57 of the Fisheries Act which occupied about 56-64% of totality. The second was Article 23 of Protectorate for Fisheries Resources which occupied about 21-36%. And the controlled cases by it were gradually increased every year.

  • PDF

A vehicle detection and tracking algorithm for supervision of illegal parking (불법 주정차 차량 단속을 위한 차량 검지 및 추적 기법)

  • Kim, Seung-Kyun;Kim, Hyo-Kak;Zhang, Dongni;Park, Sang-Hee;Ko, Sung-Jea
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.232-240
    • /
    • 2009
  • This paper presents a robust vehicle detection and tracking algorithm for supervision of illegal parking. The proposed algorithm is composed of four parts. First, a vehicle detection algorithm is proposed using the improved codebook object detection algorithm to segment moving vehicles from the input sequence. Second, a preprocessing technique using the geometric characteristics of vehicles is employed to exclude non-vehicle objects. Then, the detected vehicles are tracked by an object tracker which incorporates histogram tracking method with Kalman filter. To make the tracking results more accurate, histogram tracking results are used as measurement data for Kalman filter. Finally, Real Stop Counter (RSC) is introduced for trustworthy and accurate performance of the stopped vehicle detection. Experimental results show that the proposed algorithm can track multiple vehicles simultaneously and detect stopped vehicles successfully in the complicated street environment.

  • PDF

Empirical Analysis on Economic Factors of Infringement on Ocean Sovereignty from Chinese fishing boats (중국어선 해양주권 침해의 경제적 요인에 관한 실증적 연구)

  • Oh, Sang-Jin;Choi, Kyoung-Hoon;Park, Gyei-Kark
    • Journal of Korea Port Economic Association
    • /
    • v.33 no.3
    • /
    • pp.69-90
    • /
    • 2017
  • Areas of marine activity have expanded into exclusive economic zones and the continental shelf since the United Nations Convention on the Law of the Sea(UNCLOS) in 1994, The signatory countries have been enforcing their maritime rights and competition in the international community has become intensified. Marine-related issues, including maritime sovereignty, has become an increasingly important issue with many national security and related studies following this trend. However, while there are many policy-related studies there remain few empirical studies. This paper conducted a study of illegal cases of Chinese fishing boats which are quite frequently for an empirical study on maritime sovereignty. This study conducted empirical analysis regarding factors relating to ocean sovereignty infringement by using correlation and multiple regression analysis. The result of observed increases in illegal Chinese fishing boats decreased the production of aquatic products, whish resulted in economic fishery losses to Korea households and inflation in the Korean economy.

Design and Implementation of Applet for Multi-Users File Access based on Java Card (자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현)

  • Kim, Bum-Sik
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.481-486
    • /
    • 2006
  • Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and Implementation the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition its application becomes possible in the system requiring multi-users certifications.

  • PDF

New surveillance concepts in food safety in meat producing animals: the advantage of high throughput 'omics' technologies - A review

  • Pfaffl, Michael W.;Riedmaier-Sprenzel, Irmgard
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.31 no.7
    • /
    • pp.1062-1071
    • /
    • 2018
  • The misuse of anabolic hormones or illegal drugs is a ubiquitous problem in animal husbandry and in food safety. The ban on growth promotants in food producing animals in the European Union is well controlled. However, application regimens that are difficult to detect persist, including newly designed anabolic drugs and complex hormone cocktails. Therefore identification of molecular endogenous biomarkers which are based on the physiological response after the illicit treatment has become a focus of detection methods. The analysis of the 'transcriptome' has been shown to have promise to discover the misuse of anabolic drugs, by indirect detection of their pharmacological action in organs or selected tissues. Various studies have measured gene expression changes after illegal drug or hormone application. So-called transcriptomic biomarkers were quantified at the mRNA and/or microRNA level by reverse transcription-quantitative polymerase chain reaction (RT-qPCR) technology or by more modern 'omics' and high throughput technologies including RNA-sequencing (RNA-Seq). With the addition of advanced bioinformatical approaches such as hierarchical clustering analysis or dynamic principal components analysis, a valid 'biomarker signature' can be established to discriminate between treated and untreated individuals. It has been shown in numerous animal and cell culture studies, that identification of treated animals is possible via our transcriptional biomarker approach. The high throughput sequencing approach is also capable of discovering new biomarker candidates and, in combination with quantitative RT-qPCR, validation and confirmation of biomarkers has been possible. These results from animal production and food safety studies demonstrate that analysis of the transcriptome has high potential as a new screening method using transcriptional 'biomarker signatures' based on the physiological response triggered by illegal substances.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.