• Title/Summary/Keyword: Infringement rate

Search Result 29, Processing Time 0.024 seconds

A Study on the Type of Violations of Medical Law Regulations Which Restrict Opening a Medical (의료법상 의료기관 개설제한의 위반유형에 관한 연구)

  • Kim, Joon Rae
    • The Korean Society of Law and Medicine
    • /
    • v.15 no.2
    • /
    • pp.345-366
    • /
    • 2014
  • Because the health care or medical sector has such characteristics as publicity, professionality, and exclusivity, it cannot be left to the free market system. As a consequence, the state has restricted the establishment of medical institutions in order to protect the life and health of people. Also, the medical law has regulated to permit the establishment of medical institutions by only medical personnel and a few corporate bodies and to ban the establishment of medical institutions under disguised ownership as well as double opening of medical institutions by medical personnel. Nevertheless, there are still many cases that non-medical personnel have dominantly established medical institutions under disguised ownership of other medical personnel or nonprofit corporation. Because they are willing to recover their investment costs as soon as possible, these illegally established medical institutions are likely to make patients undergo unnecessary tests or to perform the excessive treatments and, as a result, are likely to cause infringement on the health and lives of the people. In addition, even if the misconduct is uncovered, the rate at which the costs already paid is very low and, as a result, the damages are straightly connected to the people's loss. On the other hand, there are also increasing number of cases that medical personnel or nonprofit corporations are establishing medical institutions against the medical law regulations. The examples of this illegality are also the double opening of medical institutions and the establishment of medical institutions under disguised ownership by medical personnel or nonprofit corporations. And the damages in these cases may not differ from those in the above cases. In this study, regarding medical law regulations restricting opening a medical institution, I will review the intent of those regulations, the type of violations and criminal punishments, and the possibility of recovery from unlawful profit by the National Health Insurance Act. And then, I would like to find a way for rational improvement of each.

  • PDF

A Study on the Crime Investigation of Anonymity-Driven Blockchain Forensics (익명 네트워크 기반 블록체인 범죄 수사방안 연구)

  • Han, Chae-Rim;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.45-55
    • /
    • 2023
  • With the widespread use of digital devices, anonymous communication technologies such as the dark web and deep web are becoming increasingly popular for criminal activity. Because these technologies leave little local data on the device, they are difficult to track using conventional crime investigation techniques. The United States and the United Kingdom have enacted laws and developed systems to address this issue, but South Korea has not yet taken any significant steps. This paper proposes a new blockchain-based crime investigation method that uses physical memory data analysis to track the behavior of anonymous network users. The proposed method minimizes infringement of basic rights by only collecting physical memory data from the device of the suspected user and storing the tracking information on a blockchain, which is tamper-proof and transparent. The paper evaluates the effectiveness of the proposed method using a simulation environment and finds that it can track the behavior of dark website users with a residual rate of 77.2%.

Patent Trend and Characteristics of Major Companies in the Field of Seismic Nodal System (탄성파 탐사 무선 수진기 특허동향 및 주요 기업의 기술 분석)

  • Park, Jung Kyu
    • Journal of the Korean Society of Mineral and Energy Resources Engineers
    • /
    • v.55 no.6
    • /
    • pp.635-648
    • /
    • 2018
  • This study analyzed patent trends of seismic nodal systems and the technical characteristics of core patents of three major companies, including Fairfield, Sercel, and Wireless Seismic, to examine the focus of technology development of each company. From the analysis, the patent application growth rate of seismic nodal systems has steadily increased since early to mid-2000s and has recently shown a higher growth rate. Over the same period, the patent application growth rate of the three major companies examined was higher than that of the global trend, and patent infringement cases was also examined to evaluate market competition in this field. Analysis of the technical characteristics of the three companies' 33 core patents showed that they are generally focused on seismic signal detection. Sub-technologies included improved reliability of data acquisition, data transmission efficiency, and overall operating of the seismic nodal system. New entrants in field of technology development or manufacturing of seismic nodal systems where the market is growing must closely analyze the contents of major companies' products and patents to prevent possible patent disputes or duplicate research.

Mechanism of aging and prevention (노화의 기전과 예방)

  • Kim, Jay Sik
    • IMMUNE NETWORK
    • /
    • v.1 no.2
    • /
    • pp.104-108
    • /
    • 2001
  • Aging is a senescence and defined as a normal physiologic and structural alterations in almost all organ systems with age. As Leonard Hayflick, one of the first gerontologists to propose a theory of biologic aging, indicated that a theory of aging or longevity satisfies the changes of above conditions to be universal, progressive, intrinsic and deleterious. Although a number of theories have been proposed, it is now clear that cell aging (cell senescence) is multifactorial. No single mechanism can account for the many varied manifestations of biological aging. Many theories have been proposed in attempt to understand and explain the process of aging. Aging is effected in individual by genetic factors, diet, social conditions, and the occurrence of age-related diseases as diabetes, hypertension, and arthritis. It involves an endogenous molecular program of cellular senescence as well as continuous exposure throughout life to adverse exogenous influences, leading to progressive infringement on the cell's survivability so called wear and tear. So we could say the basic mechanism of aging depends on the irreversible and universal processes at cellular and molecular level. The immediate cause of these changes is probably an interference in the function of cell's macromolecules-DNA, RNA, and cell proteins-and in the flow of information between these macromolecules. The crucial questions, unanswered at present, concerns what causes these changes in truth. Common theories of aging are able to classify as followings for the easy comprehension. 1. Biological, 1) molecular theories - a. error theory, b. programmed aging theory, c. somatic mutation theory, d. transcription theory, e. run-out-of program theory, 2) cellular theories - a. wear and tear theory, b. cross-link theory, c. clinker theory, d. free radical theory, e. waste product theory, 3) system level theory-a. immunologic/autoimmune theory, 4) others - a. telomere theory, b. rate of living theory, c. stress theory, etc. Prevention of aging is theoretically depending on the cause or theory of aging. However no single theory is available and no definite method of delaying the aging process is possible by this moment. The most popular action is anti-oxidant therapy using vitamin E and C, melatonin and DHEA, etc. Another proposal for the reverse of life-span is TCP-17 and IL-16 administration from the mouse bone marrow B cell line study for the immunoglobulin VDJ rearrangement with RAG-1 and RAG-2. Recently conclusional suggestion for the extending of maximum life-span thought to be the calory restriction.

  • PDF

A study on the Institutionalization of Speech-to-text Services for the Deaf People (난청인을 위한 문자통역서비스 제도화 연구)

  • Chun, Dong-Il;Seo, Jeong-Min
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.53-63
    • /
    • 2017
  • The purpose of this study is to look at the way that speech-to-text (STT) services are used at present, and to explore measures to institutionalize such services for ease of communication for the hearing impaired. The results of this study show the following: 1) 17.8% of those surveyed had experience of using STT services, with younger individuals showing a higher rate of use; and 2) In terms of organizations providing STT services, social welfare organizations followed by civic groups (18.3%) and public organizations (18.3%). The following institutional measures are needed for STT services. First, STT services should be actively promoted as one of the reasonable conveniences defined in the 'Act on the Prohibition of Discrimination Against Disabled Persons, Remedy Against Infringement of Their Rights, etc.' Second, STT services should be additionally listed as one of the clauses of the 'Act on Welfare of Persons with Disabilities'. In particular, establishing a communication system for those with hearing impairments should serve as a catalyst for integration with sign language interpretation and welfare services. If STT services for face-to-face contacts can be improved or further enhanced using ICT, it will not only open the way for a new influx of disabled workers to join vocational rehabilitation, but also help to improve quality of life for the hearing impaired.

A Study on the Classification Model of Overseas Infringing Websites based on Web Hierarchy Similarity Analysis using GNN (GNN을 이용한 웹사이트 Hierarchy 유사도 분석 기반 해외 침해 사이트 분류 모델 연구)

  • Ju-hyeon Seo;Sun-mo Yoo;Jong-hwa Park;Jin-joo Park;Tae-jin Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.47-54
    • /
    • 2023
  • The global popularity of K-content(Korean Wave) has led to a continuous increase in copyright infringement cases involving domestic works, not only within the country but also overseas. In response to this trend, there is active research on technologies for detecting illegal distribution sites of domestic copyrighted materials, with recent studies utilizing the characteristics of domestic illegal distribution sites that often include a significant number of advertising banners. However, the application of detection techniques similar to those used domestically is limited for overseas illegal distribution sites. These sites may not include advertising banners or may have significantly fewer ads compared to domestic sites, making the application of detection technologies used domestically challenging. In this study, we propose a detection technique based on the similarity comparison of links and text trees, leveraging the characteristic of including illegal sharing posts and images of copyrighted materials in a similar hierarchical structure. Additionally, to accurately compare the similarity of large-scale trees composed of a massive number of links, we utilize Graph Neural Network (GNN). The experiments conducted in this study demonstrated a high accuracy rate of over 95% in classifying regular sites and sites involved in the illegal distribution of copyrighted materials. Applying this algorithm to automate the detection of illegal distribution sites is expected to enable swift responses to copyright infringements.

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.

A study of the Patent-related Activities affecting the Early Stage Company Performance of Technology-based Start-ups (기술창업기업의 특허활동이 초기기업 성과에 미치는 영향에 대한 연구)

  • Lee, Hyeong-Mo;Kim, Myeong-Sook;Kim, Eung-Kyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.3
    • /
    • pp.45-53
    • /
    • 2012
  • This study is about the impact of a technology-based start-ups' patent-related activities on early stage company performance. Technology-based start-ups are closely related to the intellectual property rights, particularly patents that they aim the pursuit of new products or production methods and pioneer the introduction of market based on innovative technology, and that is a key role in such companies established and operating, hence the research of patent-related activities in technology-based start-ups has important implications. In most previous studies, the impact of the company's patent related activities on the performance of corporate management is determined by using quantitative patent indicators. Therefore, through this study, causal relationships leading to business performance through the development of new products, which includes technology performance and product performance, and the patent-related activities including the company's patented technology support activities, creating the right activities, infringement response activities, base activities validated as follows. First, the patent-related activities have a positive impact on technological and products achievements. In other words, the various activities involved in the acquisition and utilization of the patent have a positive impact on the performance of company's new product development, particularly developing new technologies or patent acquisition rate. Second, the technology have a positive impact on the performance of the products, not on the business performance. However, the empirical results shows that it has indirectly impacts on business performance through the product performance. Third, product performance have a positive impact on business performance. In conclusion, patent-related activities affects the performance of the company's management, and the maintenance of the company's business performance depends on the developing and selling product based on the customers needs, besides the technology performance such as the patents and the development of technology.

  • PDF

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.