• Title/Summary/Keyword: Valuation System

Search Result 365, Processing Time 0.028 seconds

A study on Practical Countermeasures of Copyright Appraisal with the Amendment of Civil Procedure Act in 2016 (민사소송법 개정에 따른 저작권 감정 제도의 실무적 대응 방안)

  • Kim, Si Yeol
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2020
  • The March 29, 2016, amendment to the Civil Procedure Act introduced changes to the appraisal procedures, including new obligations for appraisers, changes in the modes of appraiser testimony, and questioning of appraisers through video conferencing, with all seemingly aimed at procedurally addressing the issues with appraisal in the context of court proceedings. The changes introduced by the amendment also affect the appraisal procedures for copyrights. In light of the above, this article examines how the amendment to the Civil Procedure Act affects the appraisal procedures for copyrights. Specific issues covered by this paper include: appointment of additional appraisers, prohibition of delegated appraisal, operation of the multiple appraisal system, disclosure of participating experts, proximity of the appraiser system, and congruence of areas of expertise.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.

Technology valuation utilizing crowd sourcing approach (크라우드 소싱 접근법을 활용한 기술가치 평가)

  • Choi, Jieun;Lee, Hwansoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.6
    • /
    • pp.403-412
    • /
    • 2016
  • As transaction and investment using technology are vitalized, the need for objective standards for the technology is increasing. Current technology value evaluation system is limited lacking reliability and objectivity. Besides the traditional evaluation methodology which are market approach, income approach and cost approach other diverse evaluation methodology such as real option method and royalty calculation method are being studied; however currently there are no dominant evaluation methodology in the market. Same value evaluation system cannot be applied between similar technologies because value of technology is relatively decided based on the target. Approaching through collective intelligence and crowd sourcing, in meaning of majority participant's decision can make objective and better result than handful of experts, suggest alternative to problems of such matter above. By grafting the four types of crowd sourcing model which are Wisdom, Voting, Funding and Creation, this paper will discuss the ways to enhance the objectivity of technology evaluation through direct evaluation utilizing expert group and the public's indirect evaluation.

The Recommendation of Controls for Hospital Information System Using CRAMM: Case Studies of Two Korean Hospitals

  • Moon, Song-Chul;Han, In-Goo;Lee, Sang-Jae
    • Korean Management Science Review
    • /
    • v.17 no.1
    • /
    • pp.145-158
    • /
    • 2000
  • The medical records of diagnostic and testing information include sensitive personal information that reveals some of the most intimate aspects of an individual's life. The hospital information system (HIS) operates in a state of high risk which may lead to the possible loss to the IS resources caused by various threats. This research addresses twofold : (1) to perform asset identification ad valuation and (2) to recommend countermeasures for secure HIS network using case studies This paper applied a risk management tool CRAMM (Central Computer and Tele-communications Agency's Risk Analysis and Management Method) to assess asset values and suggest countermeasures for the security of computerized medical information of two large hospitals in Korea. CRAMM countermeasures are recommended at the reference sites from the network security requirements of system utilized for the diagnosis and treatment of patients. The results of the study will enhance the awareness of IS risk management by IS managers.

  • PDF

Self-evaluation model for TQM activity

  • Osada, Hiroshi;Yamazaki, Masahiko
    • International Journal of Quality Innovation
    • /
    • v.1 no.1
    • /
    • pp.75-80
    • /
    • 2000
  • Objective evaluation is necessary for the company to know the level of its TQM activity and to improve it. This article proposes self-evaluation model for TQM activity through comparison study of the examination viewpoints for the Deming Prize with criteria of the Malcolm Baldridge National Quality Award. Proposed self-valuation model consists of three evaluation categories i.e. management system, management performance and survey/audit system. Evaluation on these categories is done for process and performance by using scoring method. This self-evaluation model is useful for checking the progress of TQM and make company recognize the strength and weakness of its TQM activity, namely, positioning analysis.

  • PDF

Technology Selection Method for Optimal Energy Storage (기술 특성치 스크리닝을 통한 최적 에너지저장 기술 선정 방법)

  • Seong Jegarl;Ji Hyun Lee;Hyunshil Kim;Jeseok Shin;Jihun Lim
    • New & Renewable Energy
    • /
    • v.19 no.1
    • /
    • pp.31-40
    • /
    • 2023
  • The expanding significance of energy storage (ES) technology is increasing the acceptability of power systems by augmenting renewable energy supply. To deploy such ES technologies, we must select the optimal technology that meets the requirements of the system and confirm the technical and economic feasibility of the business model based on it. Herein, we propose a method and tool for selecting the optimal ES technology suitable for meeting the requirements of the system, based on its performance characteristics. The method described in this study can be used to discover and apply various ES technologies and develop business models with excellent economic feasibility.

Framework Switching of Speaker Overlap Detection System (화자 겹침 검출 시스템의 프레임워크 전환 연구)

  • Kim, Hoinam;Park, Jisu;Cha, Shin;Son, Kyung A;Yun, Young-Sun;Park, Jeon Gue
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.101-113
    • /
    • 2021
  • In this paper, we introduce a speaker overlap system and look at the process of converting the existed system on the specific framework of artificial intelligence. Speaker overlap is when two or more speakers speak at the same time during a conversation, and can lead to performance degradation in the fields of speech recognition or speaker recognition, and a lot of research is being conducted because it can prevent performance degradation. Recently, as application of artificial intelligence is increasing, there is a demand for switching between artificial intelligence frameworks. However, when switching frameworks, performance degradation is observed due to the unique characteristics of each framework, making it difficult to switch frameworks. In this paper, the process of converting the speaker overlap detection system based on the Keras framework to the pytorch-based system is explained and considers components. As a result of the framework switching, the pytorch-based system showed better performance than the existing Keras-based speaker overlap detection system, so it can be said that it is valuable as a fundamental study on systematic framework conversion.

Study of Efficiency Test and Subjective Responses about Pendent Task Lighting System Using Phosphor Luminescent Film LED (광기여 필름 LED 팬던트 작업조명시스템 주관평가와 성능검증)

  • Cha, Kwang-Seok;Kim, Hway-Suh
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.23 no.3
    • /
    • pp.188-193
    • /
    • 2011
  • For a long time work or study, pendent task lighting system prepared with phosphor luminescent film LED was developed for eye protection and working efficiency improvement. Developed lighting system was used together with pendent and ambient lighting. Such as, we made comfortable lighting environment system. Evaluation for developed lighting system, that had proceeded to Mock-up test and subjective evaluation. Also It had proceeded that lighting environment analyzed and compatibility valuation of installation. In subjective evaluation, the students have expressed themselves satisfied to phosphor luminescent film LED lighting system. In Mock-up test, It is not problem to intensity of illumination, luminance and color temperature. Therefore, developed LED lighting system was installed at the Daegu apartment. It is having a P.O.E study progress to phosphor luminescent film LED lighting system.

Urban Forestry's Scientic System and it's Application to Urban Openspace (都市林學(Urban Forestry)의 學問的 體系와 都市綠地空間에 對한 適用 硏究)

  • Cho, Young-Hwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.18 no.3 s.39
    • /
    • pp.171-190
    • /
    • 1990
  • It is the purpose of this study to address how to manage the urban vegitation using the concept of Urban Forestry which is relatively new to Korea. When we consider the Urban Forestry as a science, We should understand it interdisciplinary subject which includes Forestry, Horticulture, Urban Planning, Landscape Design, Landuse Planning, Business and Humanities. It may say that people and tree are the fundermental components of Urban Forestry. So there are two ways of Urban Forestry Applications-How people care for trees and How trees care for People-. For the application, this study places the focus on the monetary valuation, tree inventory system and traditional forestry application to urban forest management. Pubic Relation, Communication, Ordinances and Budget are also mentioned as a part of Urban Forestry Policy. Monetary valuation of trees and forests is very important for the proper cognition of their real value. So that, they may be equated and weighed against conflicting uses which would cause to be removed or severely mutilated. A tree inventory system which is the essential part of urban tree management can provide the pertinent information about the present condition of urban tree resource. It may aid in reducing the subjectivity of tree management decisions and stimulate them to be made rapidly and can help reduce potential municipal liability by identifying serious problems in time for corrective maintenance practices to be applied for the maximize community benefits and minimimize public nuisances or hazards. Managers can derive the information from the inventory and use it for the various management plan. When we see the structure of tree inventory system as one of the data base management system, Computer is the best equipment for the efficient management plan. Public relation and communication is also important factors to care the people for urban vegetation management. Volunteer management system is a good example for the public relation and communication. Those skills are need to develop for using the priceless, valuable human resources. Budget holds the key to the execution of Urban Forestry. Good inventory can provide for efficient budgeting stratiges through it's scientific analysis for the way of maximum benefits and minimum costs. Forest can be play a vital role for the aesthetic improvement and recreation in the city. This study suggests that the traditional sivicultural application not only improve the quality of scenic beauty and recreation but also the products of timber. So it is more needed to study for strong and scientific application to urban forest management.

  • PDF

A Study on the Evaluation System for Bidders to According to the Best Value Bid System by Technology Proposal Method (기술제안방식의 최고가치낙찰제도 입찰자 평가체계에 관한 연구)

  • Yeo, Sang-Ku;Lee, Gun;Lee, Hyun-Chul;Go, Seong-Seok
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2009.04a
    • /
    • pp.211-216
    • /
    • 2009
  • Bidding systems in the domestic public construction work have been amended many times since the lowest-bidding system was implemented in 1951. However, this hasn't had much success. Competition in technical development among companies has declined as the contracts for buildings are given to company which submits the lowest price without considering traits of projects. In addition, as the construction market turns to the limitless competition system due to FTA(Free Trade Agreement), advanced techniques are needed to promote the national competitive power. Considering the needs of the times, Korean government announced that "Best Value Contract (Design-Bid-Build)" and "Bridging Contracts (Design-Build)" are included to 4 existing bidding systems in October 2007. Thus this study aims to suggest devised the evaluation criteria including major items for evaluating bidders, in order to establish and revitalize the best-value bid system successfully.

  • PDF