• Title/Summary/Keyword: copy paper

Search Result 502, Processing Time 0.027 seconds

Ethical considerations in publication of medical papers (의학논문 출판윤리)

  • Bae, Chong-Woo
    • Clinical and Experimental Pediatrics
    • /
    • v.51 no.5
    • /
    • pp.447-451
    • /
    • 2008
  • It is fair to say that there are many ethical issues concerning the publication of medical papers. To define the best practice in the ethics of scientific publishing and a proper understanding of appropriate reporting in medical papers, this review should be useful for authors dealing with ethical issues which involve the protection of human and animal rights, the protection of confidentiality and informed consent, fabrication, falsification, plagiarism, author and authorship, copy right transfer, duplicate publication, conflict of interest, and dealing with misconduct cases.

ON THE SOLUTIONS OF EQUATIONS OVER NILPOTENT GROUPS OF CLASS 2

  • Kim, Seong Kun
    • East Asian mathematical journal
    • /
    • v.29 no.3
    • /
    • pp.349-353
    • /
    • 2013
  • In this paper, we study equations over nilpotent groups of class 2. We show that there are some overgroups which contains solutions of equations with exponent sum 1 over nilpotent groups of class 2. As known, equations over a field has a solution in an extension field which contains a copy of the given field. But it is not easy to find that a solution of equations over groups. In many cases, even if equations over groups has a solution, the overgroup is not concrete but very Here we find the concrete overgroups in case of nilpotent groups.

An Efficient Multicast Addressing Scheme for the Self-Routing Multistage Networks

  • Kim, Hong-Ryul;Lim, Chae-Tak
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.3
    • /
    • pp.22-28
    • /
    • 1997
  • In this paper, we propose an efficient multicast addressing scheme for he self-routing multistage networks. Using only N-bit routing header an the simple hardware logic, the new scheme can efficiently provides all point-to-multipoint connections in single pass through the multistage copy networks. We also designed a hardware logic of switching element to implementation of multicasting in ATM switches are performed.

  • PDF

Customer Behavior Analysis on Mobile Advertisement

  • Koh, Bong-Sung;Lee, Seok-Won
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.1-8
    • /
    • 2006
  • The headline of advertisements holds the important position in advertisement recognition and receptivity. The mobile advertisements show an immediate reaction of customers because it is possible to do 'one-to-one communication'. And this makes the mobile advertisement as important as any kind of traditional marketing channel, like TV, Radio, Print. In this paper, we classified the headlines as several types and measured the effect of headline types.

  • PDF

Human Sensory of Perception Oriented Color Fuzzy Image Processing (인간의 감성을 고려한 칼라 Fuzzy 영상처리)

  • 박영현;김승우;우동민;박민용
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.3
    • /
    • pp.47-54
    • /
    • 1992
  • This paper presents an image processing method which emphasizes a certain perception feeling on a color image. A series of fuzzy image processing schemes are proposed, which transform an color image represented in the LCH coordinate system to the image with a certain perception feeling based on the rules and fuzzy inference. To obtain the rules, results of the sensory perception tests are applied to the quantification theory. The proposed schemes can be effectively utilized in the color copy system, since printed outputs possibly look better than originals.

  • PDF

Flexible top emission organic light emitting diode on paper substrate

  • Lee, Chan-Jae;Moon, Dae-Gyu;Han, Jeong-In;Choi, Sung-Hoon;Oh, Myung-Hwan
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2005.07b
    • /
    • pp.1390-1393
    • /
    • 2005
  • We fabricated an efficient top emission organic light emitting diode (FTEOLED) on paper substrates. For water proof and surface planarization, parylene of 5mm thick has been coated on copy paper substrate by vapor polymerization. As use this coating layer, fabrication of device was possible by photolithography and wet etching. Because paper is not transparent, we adapted top emission structure with transparent cathode and reflective anode. The FTOLED on paper showed the excellent electrical characteristic, $109cd/m^2$, 2.3cd/A at 10V.

  • PDF

A Study on DRM Model Using Electronic Cash System (전자화폐 시스템을 적용한 DRM 모델에 관한 연구)

  • Lee, Deok-Gyu;Oh, Hyung-Geun;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1107-1119
    • /
    • 2004
  • There is Electronic-cash system as important payment means in Electronic-commerce and the requirement of electronic cash is independence, transferability, divisibility etc. This is important requirement in DRM to provide contents as a same requirement to contents. Because contents itself can see that requirement of Electronic-cash can be transferred the control of to contents requirement as monetary concept. Can apply equally in reproduction and copy for contents, anonymity user's access etc, and several relations. In this paper, wish to put by value that is equal about Electronic-cash and contents, and apply concept of Electronic-cash through this and present DRM model after examine requirement of Electronic-cash and DRM's requirement. Concept used in this paper left copy use authority to use hierarchic tree structure and endowed anonymity for contents and anonymity about user for anonymous user. Finally, examines and compares and analyzes proposed existing methods.

  • PDF

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF