• Title/Summary/Keyword: PROPERTY RIGHT

Search Result 446, Processing Time 0.025 seconds

Imputation method for missing data based on measure of property (특성도를 이용한 결측치 대체방법)

  • Kim, Hyungju;Kim, Dongjae
    • The Korean Journal of Applied Statistics
    • /
    • v.30 no.3
    • /
    • pp.463-473
    • /
    • 2017
  • How to handle missing data is a main issue in clinical trials. We impute missing data based on missing data that follows a mechanism according to the intention-to-treat rule. However, using the right imputation method for missing data is very important because this supposition is unclear. We suggest a new imputation method for missing data using agreement and maintenance introduced by Kang and Kim (1997). We give an example and adapt a Monte Carlo simulation to compare the performance between the established method and the suggested method.

Future of International Space Law in the 21st Century: De Lege Ferenda (21세기 국제우주법의 과제)

  • Kim, Han-Teak
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.185-209
    • /
    • 2003
  • 이 논문은 21세기 우주개발로 인하여 제기되는 국제우주법의 장래 과제를 분석한 것이며 따라서 1967년 우주조약을 비롯한 기존의 5개 국제우주조약들과 '연성법'(soft law)으로서의 우주법인 5개의 UN결의들은 간략하게 소개하고 lex ferenda로서 제기되는 문제들을 중심으로 연구하였다. 21세기 국제우주법의 lex ferenda로 제기되는 문제는 다음과 같다. 첫째. 우주의 정의 및 경계획정문제와 지구정지궤도(GSO)의 성격과 활용의 문제가' 외기권 우주의 평화적 이용에 관한 위원회'(COPUOS)의 법률소위원회를 중심으로 어떻게 진행되고 있는가 하는 문제를 검토하였고, 둘째. 대기권 상공과 외기권 우주를 비행할 수 있는 새로운 우주운송수단으로 등장하고 있는 우주항공기(Aerospace Vehicle)가 기존의 항공법과 우주법의 관계에서 어떠한 법의 적용을 받아야 하는가의 문제를 검토하였다. 셋째. 그리고 통신위성을 이용하면서 발생하는 저작권법(copy right law) 및 지적재산권(intellectual property) 등의 문제 그리고 우주보험을 포함한 우주의 상업적 이용에서 발생하는 법규범의 문제를 검토하였고, 넷째. 우주활동으로 인해 발생하는 우주잔해(space debris)와 우주환경문제를 다루었다. 마지막으로 그리고 기타 국제우주법관련문제 특히 우주활동을 원활하게 수행하기 위한 '우주물체'(space objects)와 그와 관련된 용어들의 정확한 개념 정의를 명확하게 할 필요성과 우주의 상업적 이용과 우주의 오로지 평화적인 목적을 위하여 중요한 역할을 할 국제민간항공기구(ICAO)나 국제해사기구(IMO)와 같은 장래의 국제민간우주기구(International Civil Space Organization) 등의 설립문제를 검토하였다.

  • PDF

An LBX Interleaving Watermarking Method with Robustness against Image Removing Attack (영상제거 공격에 강인한 LBX 인터리빙 워터마킹 방법)

  • 고성식;김정화
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.6
    • /
    • pp.1-7
    • /
    • 2004
  • The rapid growth of digital media and communication networks has created an urgent need for self-contained data identification methods to create adequate intellectual property right(IPR) protection technology. In this paper we propose a new watermarking method that could embed the gray-scale watermark logo in low frequency coefficients of discrete wavelet transform(DWT) domain as the marking space by using our Linear Bit-eXpansion(LBX) interleaving of gray-scale watermark, to use lots of watermark information without distortion of watermarked image quality and particularly to be robust against attack which could remove a part of image. Experimental results demonstrated the high robustness in particular against attacks such as image cropping and rotation which could remove a part of image.

A Study on the coverage of e-commerce insurance (전자상거래 보험의 담보범위에 관한 고찰)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.27
    • /
    • pp.129-161
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

RINGS WITH REFLEXIVE IDEALS

  • Han, Juncheol;Park, Sangwon
    • East Asian mathematical journal
    • /
    • v.34 no.3
    • /
    • pp.305-316
    • /
    • 2018
  • Let R be a ring with identity. A right ideal ideal I of a ring R is called ref lexive (resp. completely ref lexive) if $aRb{\subseteq}I$ implies that $bRa{\subseteq}I$ (resp. if $ab{\subseteq}I$ implies that $ba{\subseteq}I$) for any $a,\;b{\in}R$. R is called ref lexive (resp. completely ref lexive) if the zero ideal of R is a reflexive ideal (resp. a completely reflexive ideal). Let K(R) (called the ref lexive radical of R) be the intersection of all reflexive ideals of R. In this paper, the following are investigated: (1) Some equivalent conditions on an reflexive ideal of a ring are obtained; (2) reflexive (resp. completely reflexive) property is Morita invariant; (3) For any ring R, we have $K(M_n(R))=M_n(K(R))$ where $M_n(R)$ is the ring of all n by n matrices over R; (4) For a ring R, we have $K(R)[x]{\subseteq}K(R[x])$; in particular, if R is quasi-Armendaritz, then R is reflexive if and only if R[x] is reflexive.

A Study on the Policy Solutions to Prevent Abuse of Patents : Focusing on Patent Ambush (특허권 남용예방을 위한 정책방안 연구 : 특허매복행위를 중심으로)

  • Jeong, Myoung-Sun
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.9-16
    • /
    • 2020
  • Recently, a patent holder of a technology that has been selected as a standard has caused considerable difficulties in enacting and using a patent technology standard as a patent ambush act that abuses the right. Major countries in the world are preparing legal grounds to prevent patent ambush, but in Korea, legal binding is very limited. Therefore, in this study, various proposals were attempted to prepare problems and policy solutions related to patent ambush in standard patents. In particular, we investigated issues and cases related to domestic and foreign ambush patents, it is considered that it is necessary to prepare a legally available device, clear standards for abuse of FRAND patent rights, and a patent compensation system to prevent patent ambushing.

The Overview Standard of Land Suitability Assesment (Assesment System II) (토지적성평가(평가체계II)의 검수방안에 대한 연구)

  • Jung, Young-Dong;Cho, Gyu-Jang
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.12 no.3 s.30
    • /
    • pp.33-41
    • /
    • 2004
  • Land Suitability Assessment System(LSAS) that was introduced to prevent unplanned development of the nation is divided by Assessment System I and II. Assessment System II can regulate the land use on the development that was defined in the 'National Land Planning and Use Act'. With it, Property right can be limited in the development of private sector and this lure the investor to fabricate the result of land suitability assessment. Because of it, if we can't prepare the overview standard, we couldn't accomplish our purpose that unplanned development prevention and efficient land use. With the suggestion of overview standard for the each factor used in LSAS and the analysis result of it, we presented ways to efficient support and the fixations of LSAS.

  • PDF

(r, Q) Policy for Operation of a Multipurpose Facility (단일 범용설비 운영을 위한 (r, Q) 정책)

  • ;Oh, Geun-Tae
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.17 no.3
    • /
    • pp.27-46
    • /
    • 1992
  • This paper considers an (r, Q) policy for operation of a multipurpose facility. It is assumed that whenever the inventory level falls below r, the model starts to produce the fixed amount of Q. The facility can be utilized for extra production during idle periods, that is, when the inventory level is still greater than r right after a main production operation is terminated or an extra production operation is finished. But, whenever the facility is in operation for an extra production, the operation can not be terminated for the main production even though the inventory level falls below r. In the model, the demand for the product is assumed to arrive according to a compound Poisson process and the processing time required to produce a product is assumed to follow an arbitary distribution. Similarly, the orders for the extra production is assumed to accur in a Poisson process are the extra production processing time is assumed to follow an arbitrary distribution. It is further assumed that unsatisfied demands are backordered and the expected comulative amount of demands is less than that of production during each production period. Under a cost structure which includes a setup/ production cost, a linear holding cost, a linear backorder cost, a linear extra production lost sale cost, and a linear extra production profit, an expression for the expected cost per unit time for a given (r, Q) policy is obtained, and using a convex property of the cost function, a procedure to find the optimal (r, Q) policy is presented.

  • PDF

Development of a Copyright Protection System for Computer Forensics (컴퓨터 포렌식을 위한 디지털 저작권 보호시스템 개발)

  • Lee, Wol-Young;Hwang, Chul
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.365-372
    • /
    • 2007
  • The information of world is most likely to be created as digital data. These digital productions need some legal protection mechanisms or techniques because users can illegally use them. Thus many researchers are developing various techniques. Currently most techniques are focusing on the physical and chemical methods like disk inspection for taking legal evidence about production infringement. This paper has developed a computer forensics-based copyrights protection system capable of detecting and notifying disobedience facts when user uses illegally a production. Furthermore if the user infringes continually the production the system stores the infringement facts to take the legal evidence by mapping to law for intellectual property right. The technique can protect data from digital evidence manipulation or destruction.

  • PDF

A Study on the Market Status and Issues of e-Commerce Insurance (전자상거래 보험의 시장현황 및 쟁점에 관한 고찰)

  • Shin, Gun-Hoon
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.27-51
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF