• Title/Summary/Keyword: Intellectual Property Education

Search Result 73, Processing Time 0.03 seconds

A Qualitative Study on Design Copying of Fashion Industry (패션산업의 디자인 모방에 관한 연구)

  • Hong, Byung-Sook;Suk, Hyo-Jung;Lee, Eun-Jin
    • Fashion & Textile Research Journal
    • /
    • v.13 no.4
    • /
    • pp.560-571
    • /
    • 2011
  • Copying of designs has been condoned in the fashion industry. However, the industry argues that whether fashion design should be protected by law and what constitute design copying in fashion. This study has been performed by in-dept interviews with employees in the fashion industry. The study finds that respondents perceived copying of design to be some extent beneficial to the industry. While, they also observed that it has a negative effect on the industry due to indiscriminate copying. In regards to standard of drawing the line between copying and inspiration or modification, designers have subjective and discrepant standards. Fashion industry itself, consumer's biased preference, inefficient education and lack of legislation are significantly engaged in design copying.

Scene Text Detection Using Color-Based Binarization and Text Region Verification Using Support Vector Machine (색기반 이진화를 이용한 장면 텍스트 추출과 써포트 벡터머신을 이용한 텍스트 영역 검증)

  • Jang, Dae-Geun;Kim, Eui-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.161-163
    • /
    • 2007
  • 기존의 텍스트 추출을 위한 이진화 방법은 입력 이미지를 명도 이미지로 변환한 뒤 이진화 하는 방법을 사용하였다. 이러한 방법은 칼라 이미지에서는 극명히 구분되는 색이라 할지라도 명도 이미지로 변환하는 과정에서 같은 밝기를 같게 되는 경우(예를 들어, 배경은 붉은색, 텍스트는 초록색), 텍스트를 추출하는 데 어려움이 있다. 본 논문에서는 이러한 문제를 해결하기 위해 입력 이미지를 R, G, B로 분리하고 각각을 이진화 하여 텍스트를 추출하고 다해상도 웨이블릿(Wavelet) 변환을 이용하여 텍스트의 획 특징을 추출하여 추출된 특징들을 SVM(Support Vector Machine) 분류기로 검증하여 최종 텍스트 영역을 확정한다. 제안한 방법을 적용함으로써 명도 정보만으로는 추출하기 어려웠던 텍스트 영역을 효과적으로 추출하고 텍스트와 구별하기 어려운 영역을 획수준으로 검증할 수 있었다.

  • PDF

Vehicle Shadow Removal For Intelligent Traffic System

  • Jang, Dae-Geun;Kim, Eui-Jeong
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.3
    • /
    • pp.123-129
    • /
    • 2006
  • The limited number of roads and the increasing number of vehicles demand the automatic regulation of overspeed vehicles, illegal vehicles, and overloaded vehicles and the automatic charge calculation depending on the type of the vehicle. To meet such requirements, it is important to remove the shadow of the vehicle as processing and recognizing an image captured by a camera. The shadow of the vehicle is likely to cause misclassification of the vehicle type due to diverse errors and mistakes occurring when detecting geometrical properties of the vehicle. In case that shadows of two different vehicles are overlapped, not only the type of the vehicles may be misclassified but also it is difficult to accurately identify the type of the vehicles. In this paper, we propose a robust algorithm to remove the shadow of a vehicle by calculating the luminance, the chrominance, the gradient density of the cast shadow from information acquired using the image subtraction of the background, and to recognize the substantial vehicle figure. Even when it is hard to detect and split a target vehicle from its shadow as shadows of vehicles are attached to each other, our robust algorithm can detect the vehicle figure only. We implemented our system with a general camera and conducted experiments on various vehicles on general roads to find out our vehicle shade removal algorithm is efficient when detecting and recognizing vehicles.

Using Online IT-Industry Courses in Computer Sciences Specialists' Training

  • Yurchenko, Artem;Drushlyak, Marina;Sapozhnykov, Stanislav;Teplytska, Alina;Koroliova, Larysa;Semenikhina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.97-104
    • /
    • 2021
  • The authors provide characteristics of the open educational platforms, classification and quantitative analysis regarding the availability of IT courses, teaching language, thematic directions on the following platforms: Coursera, EdX, Udemy, MIT Open Course Ware, OpenLearn, Intuit, Prometheus, UoPeople, Open Learning Initiative, Open University of Maidan (OUM). The quantitative analysis results are structured and visualized by tables and diagrams. The authors propose to use open educational resources (teaching, learning or research materials that are in the public domain or released with an intellectual property license that allows free use, adaptation, and distribution) for organization of independent work; for organization of distance or correspondence training; for professional development of teachers; for possibility and expediency of author's methods dissemination in the development of their own courses and promoting them on open platforms. Post-project activities are considered in comparing the courses content of one thematic direction, as well as studying the experience of their attending on different platforms.

The Exploratory Study on Development of Interdisciplinary Technology Entrepreneurship Education Model (융합기반의 대학원 기술창업 교육모델 개발에 대한 탐색적 연구)

  • Choi, Jong-In;Byun, Young Jo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.119-128
    • /
    • 2013
  • Korean entrepreneurship education has been focused on the subject selection and curriculum based research according to the stage of entrepreneurship process. But problem is happen in the theory based lecture and unrealistic content of entrepreneurship education. Recent studies in technology entrepreneurship recommend integrated approaches to educating students to operate in this space integrated programs span disciplinary lines, but more important, they combine coursework on fundamental concepts and processes with real team-based projects on technology commercialization. At the core of TI:GER(R) is a three-course academic track that provides instruction in technology commercialization processes with a focus on intellectual property/technology law and business fundamentals. Technology, management, and law are the key success content of entrepreneurship education and we need the approach the integration of these factors.

  • PDF

A Study on the Space Programming by Considering Leisure Activity for Middle-aged in the House (예비 노인층의 주거 내 여가활동을 고려한 공간구성 계획에 관한 연구)

  • Kim, Jung-Yoon;Lee, Hyun-Soo
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2006.11a
    • /
    • pp.163-167
    • /
    • 2006
  • The purpose of this study is to find out the leisure activity for middle-aged from 45-65 living in the house. The survey had been conducted in 135 respondents with Questionnaire during September 25th to October 7th, 2006. Frequency, Cluster Analysis and Cross tabulation were obtained from the data using SPSS program. The Questionnaire consists of leisure activity and leisure location based on 3 properties of leisure. The results of this study are as follows. First, frequency the respondents is differed by demographic characteristics. Those who have higher level of education, subjective economic power and are younger were more active. Second, the leisure activity in the house is higher in passive on 1st, intellectual and emotional on 2nd, mass media and social activity on 3rd property. Respondents regard home as not a active space but a relax space. Third, the most preferred location in the house for leisure is living-room. Next, master-room and dinning-kichen are. Because of women who spend time more than men in living. Therefore, designing living space for elderly is considered various leisure type of residents.

  • PDF

Determinants of Technology Commercialization Ecosystem for Universities in Kazakhstan

  • ALIBEKOVA, Gulnaz;TLEPPAYEV, Arsen;MEDENI, Tunc D.;RUZANOV, Rashid
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.4
    • /
    • pp.271-279
    • /
    • 2019
  • The purpose of this study is to identify the barriers of university and industry cooperation and to develop recommendations for the internal ecosystem of technology commercialization. The research method used is a survey of three categories of experts from 9 universities of Almaty (researchers, technology transfer managers, spin-off-owners). Despite the strong efforts of the government of Kazakhstan in building innovation infrastructure, there is a low level of innovation activity, less than 5% of university inventions are transferred into the industry. The results of the expert survey showed that the main barriers for cooperation between university and industry are: lack of resources to build university-industry links, lack of time due to high teaching load, poor qualification of technology transfer managers and lack of networking with industry. Based on the results of the expert survey, it is proposed to develop the ecosystem for the commercialization of university-based technologies, for which the following economic activities are important: human resources, financing, intellectual property management system, and intermediary infrastructure. The results of this study can be applied in developing the strategies and policies for universities, public research organizations, as well as for national R&D and higher education policies.

A Study on the Policy Solutions to Prevent Abuse of Patents : Focusing on Patent Ambush (특허권 남용예방을 위한 정책방안 연구 : 특허매복행위를 중심으로)

  • Jeong, Myoung-Sun
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.9-16
    • /
    • 2020
  • Recently, a patent holder of a technology that has been selected as a standard has caused considerable difficulties in enacting and using a patent technology standard as a patent ambush act that abuses the right. Major countries in the world are preparing legal grounds to prevent patent ambush, but in Korea, legal binding is very limited. Therefore, in this study, various proposals were attempted to prepare problems and policy solutions related to patent ambush in standard patents. In particular, we investigated issues and cases related to domestic and foreign ambush patents, it is considered that it is necessary to prepare a legally available device, clear standards for abuse of FRAND patent rights, and a patent compensation system to prevent patent ambushing.

Online Publication System of Academic Research Paper:From the Viewpoint of Digital Goods in Case of Social Science Field (디지털상품 관점의 연구성과물 온라인 공표제도 - 사회과학 분야 학술연구성과를 중심으로 -)

  • Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.3-25
    • /
    • 2005
  • It is high time to prepare the online publication system of academic research paper. Online publications like digital research paper, e-Book, etc. are increased day by day as the information technology(IT) is developing continually. But, the legal aspect of publication system of academic research paper in Korea is not prepared yet. The purposes of this study are to examine the problems on the publication system of academic research paper in the context of digital goods and to frame a policy of legal proceedings in relation to the social science. The methodology used in this paper is theoretical analysis which is examining the case of academic research system and scientific journal in Korea. As a result of this study, following measures are suggested: (1) Legal provisions on the online publication system, that is, "Research Promotion Law of Korea" controlled by KRF(Korea Research Foundation) and MOE(Ministry of Education) should be revised. (2) Solution like software program and DB system proceeding the data on academic research paper should be prepared newly. (3) From the viewpoint of digital goods, both protecting the intellectual property right and settling the reliance upon online publication system should also be considered simultaneously.

  • PDF

Plagiarism Detection among Source Codes using Adaptive Methods

  • Lee, Yun-Jung;Lim, Jin-Su;Ji, Jeong-Hoon;Cho, Hwaun-Gue;Woo, Gyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1627-1648
    • /
    • 2012
  • We propose an adaptive method for detecting plagiarized pairs from a large set of source code. This method is adaptive in that it uses an adaptive algorithm and it provides an adaptive threshold for determining plagiarism. Conventional algorithms are based on greedy string tiling or on local alignments of two code strings. However, most of them are not adaptive; they do not consider the characteristics of the program set, thereby causing a problem for a program set in which all the programs are inherently similar. We propose adaptive local alignment-a variant of local alignment that uses an adaptive similarity matrix. Each entry of this matrix is the logarithm of the probabilities of the keywords based on their frequency in a given program set. We also propose an adaptive threshold based on the local outlier factor (LOF), which represents the likelihood of an entity being an outlier. Experimental results indicate that our method is more sensitive than JPlag, which uses greedy string tiling for detecting plagiarism-suspected code pairs. Further, the adaptive threshold based on the LOF is shown to be effective, and the detection performance shows high sensitivity with negligible loss of specificity, compared with that using a fixed threshold.