An intruder detection system includes a leaky transmission path of a transmission side and a leaky transmission path of a receiving side, both of which has a plurality of leaky points existing in a direction to which the respective leaky transmission path extends, and the intruder detection system f
An intruder detection system includes a leaky transmission path of a transmission side and a leaky transmission path of a receiving side, both of which has a plurality of leaky points existing in a direction to which the respective leaky transmission path extends, and the intruder detection system further includes an intrusion location detection unit which detects an intrusion location of an intruder on the basis of each signal, which is received in a receiving circuit of the receiving side, affected by the leaky electric wave at each of the leaky points. The intruder detection system further includes a detection table which associates a detectable intrusion location with a detection area, and if intrusion location detection information of the intrusion location detection unit corresponds to a detection area of the detection table, a detection result is output.
대표청구항▼
What is claimed is: 1. An intruder detection system comprising: a leaky transmission path of a transmission side, the leaky transmission path of the transmission side having a plurality of leaky points existing in a direction to which the leaky transmission path of the transmission path extends; a
What is claimed is: 1. An intruder detection system comprising: a leaky transmission path of a transmission side, the leaky transmission path of the transmission side having a plurality of leaky points existing in a direction to which the leaky transmission path of the transmission path extends; a leaky transmission path of a receiving side that is provided together with the leaky transmission path of the transmission side and that receives a leaky electric wave from the leaky transmission path of the transmission side, the leaky transmission path of the receiving side having a plurality of leaky points existing in a direction to which the leaky transmission path of the receiving side extends, wherein the leaky transmission path of the transmission side and the leaky transmission path of the receiving side form a detectable region therebetween for detecting an intruder, the detectable region including a detection area in which detection of an intruder is necessary and a non-detection area in which detection of an intruder is not necessary; a receiving circuit that receives signals respectively corresponding to leaky electric waves at the leaky points of the receiving side; an intrusion location detection unit that detects an intrusion location of an intruder within the detectable region, on the basis of whether one of the signals received by the receiving circuit indicates a variation of a corresponding one of the leaky electric waves at a corresponding one of the leaky points from which the one of the signals is received by the receiving circuit, and that outputs intrusion location information indicating the detected intrusion location of the intruder; a storage unit having stored therein a detection table in which a plurality of detectable intrusion locations within the detectable region are respectively defined in association with one of the detection area of the detectable region and the non-detection area of the detectable region, wherein at least one of said plurality of detectable intrusion locations within the detectable region is defined in the detection table as being within the detection area of the detectable region, and at least one other one of said plurality of detectable intrusion locations within the detectable region is defined in the detection table as being within the non-detection area of the detectable region; a processing unit that compares the intrusion location indicated in the intrusion location information output from the intrusion location detection unit with said plurality of detectable intrusion locations defined in the detection table to determine whether one of an intruder and a non-intruder is present in the intrusion location indicated in the intrusion location information output from the intrusion location detection unit, wherein the processing unit determines that an intruder is present in the intrusion location indicated in the intrusion location information when the intrusion location corresponds to the at least one of said detectable intrusion locations which is defined in the detection table as being within the detection area of the detectable region, and determines that a non-intruder is present in the intrusion location indicated in the intrusion location information when the intrusion location corresponds to the at least one other one of said detectable instruction locations which is defined in the detection table as being within the non-detection area of the detectable region; and a detection result output unit that outputs a detection result indicating the presence of the intruder in the detection area of the detectable region, when the processing unit determines that the intruder is present in the intrusion location indicated in the intrusion location information output from the intrusion location detection unit. 2. The intruder detection system according to claim 1, wherein the storage area is configured to accommodate a change to the detection area in the detection table, and store the changed detection area in the detection table. 3. The intruder detection system according to claim 1, wherein, in the detection table, the detectable intrusion locations are respectively defined in the detection table with reference to a respective distance of the detectable intrusion locations from a predetermined reference point. 4. The intruder detection system according to claim 1, wherein the storage unit has stored therein a plurality of detection tables having respectively different defined associations as to whether the detectable intrusion locations are within the detection area and the non-detection area of the detectable region, and wherein the processing unit is configured to selectively use individual ones of the plurality of detection tables to determine the existence of an intruder and a non-intruder based on the intrusion location information output from the intrusion location detection unit. 5. The intruder detection system according to claim 1, wherein, in the detection table, the defined association between the detectable intrusion locations and the detection area is set in units of date and time, and in the case of the corresponding date and time, associative data between the detectable intrusion locations and the detection area is used in accordance with the corresponding date and time. 6. The intruder detection system according to claim 5, wherein the storage unit is configured to accommodate a change to the date and time, and store the changed date and time in the detection table. 7. The intruder detection system according to claim 1, wherein the detection result outputted from the detection result output unit indicates that an intruder is present, and the detection result includes information on the intrusion location of the intruder. 8. The intruder detection system according to claim 1, wherein, when the intrusion is detected, an alarm is different in accordance with the detection result or the detection area. 9. The intruder detection system according to claim 1, wherein, when the intrusion is detected, at least one of a security camera and a light is operated in the corresponding intrusion location. 10. The intruder detection system according to claim 9, wherein at least one of the security camera and the light are configured to rotate and, when the intrusion is detected, at least one of the security camera and the light provided in the corresponding intrusion location is rotatably operated. 11. The intruder detection system according to claim 1, wherein, the output of the detection result is locked in accordance with an identification signal for identifying a person who is allowed to access a desired intrusion detection region.
Gershberg David N. (Rockville MD) Lee Alex Y. (Arlington VA) Parker ; Jr. Clair F. (Fairfax VA), Doppler perimeter intrusion alarm system using a leaky waveguide.
Maki Melvin C. (Kanata CAX) Feller Walter J. (Kanata CAX) Adams Edward L. (Nepean CAX), Perimeter intrusion detection system with block ranging capabilities.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.