• Title/Summary/Keyword: intellectual property

Search Result 1,036, Processing Time 0.048 seconds

A Study on the Organization and Operation of the Inter-Korean Commercial Arbitration Committee in Gaeseong Complex (개성공단에서의 남북상사중재위원회 구성.운영에 관한 연구)

  • Kim, Kwang-Soo
    • Journal of Arbitration Studies
    • /
    • v.24 no.2
    • /
    • pp.3-31
    • /
    • 2014
  • As all aspects of international activity have kept growing in good transaction, transnational investments, joint ventures, and the licensing of intellectual property, it is inevitable for disputes to increase across national frontiers. International disputes can be settled by arbitration and ADR. In the situation presented in the paper, any dispute shall be finalized by arbitration and conciliation in the Gaeseong Industrial Complex. Inter-Korean Commercial Arbitration in the Gaeseong Industrial Complex has become the principal method of resolving disputes in trade, commerce, and investment in accordance with the "Agreement on South-North Commercial Dispute Settlement Procedures," "Agreement on Organization and Operation of Inter-Korean Commercial Arbitration Committee," and the Annexed Agreement on "Organization and Operation of Inter-Korean Commercial Arbitration Committee" (2013). But the follow-up measures of the said agreements have not been fulfilled. Some prerequisite measures of the Inter-Korean commercial arbitration must be satisfied. In order to proceed with arbitration and conciliation in the Gaeseong Industrial Complex, we need to ask the following: Does the status of an arbitrational matter? Should an agreement to arbitrate contain a choice of law clause? Should one provide for one arbitrator or three? How should the arbitrators be selected? What is the relation between party-appointed arbitrators and the presiding arbitrator (neutral arbitrator)? Do arbitrators compromise more than the litigation? Can conciliation be combined with arbitration? To execute the enactment of arbitration regulations, the contents of the Arbitration Rules of the Korean Commercial Arbitration Board (South) and the Korea International Trade Arbitration Committee (North), together with the Korean Arbitration Act and External Arbitration Act of North Korea and the UNCITRAL Model Arbitration Law and UNCITRAL l Arbitration Rules are reflected in the Rules. There are many aspects of the Inter-Korean Commercial Arbitration. It is essential to understand key elements; namely, the arbitration agreement, appointment of arbitrator, arbitral proceeding and arbitral award, and enforcement and setting aside of arbitral award. This research deals with five chapters. Chapter 1 provides the introduction. Chapter 2 deals with trade volume between South and North Korea and the kinds of dispute in Gaeseong. Chapter 3 addresses contents and follow-up measures of the agreement on the "South-North Commercial Dispute Settlement Procedures," "Agreement on Organization and Operation of Inter-Korean Commercial Arbitration Committee," and the Annexed Agreement on "Organization and Operation of Inter-Korean Commercial Arbitration Committee" (2013). Chapter 4 features the problems and tasks of the pertinent agreements. Chapter 5 gives the conclusion. Enabling parties to find an amicable solution to the dispute in the Gaeseong Industrial Complex can lead to a useful and appropriate framework either through direct negotiation or by resorting to conciliation or mediation in accordance with pertinent agreements and follow-up measures contained in the agreements.

  • PDF

Algorithms of the VLSI Layout Migration Software (반도체 자동 이식 알고리즘에 관한 연구)

  • Lee, Yun-Sik;Kim, Yong-Bae;Sin, Man-Cheol;Kim, Jun-Yeong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.10
    • /
    • pp.712-720
    • /
    • 2001
  • Algorithms from the research of the layout migration were proposed in the paper. These are automatic recognition algorithm for the VLSI devices from it, graph based construction algorithm to maintain the constraints, dependencies, and design rule between the devices, and high speed compaction algorithm to reduce size of the VLSI area and reuse the design with compacted size for the new technology. Also, this paper describes that why proposed algorithms are essential for the era of the SoC (System on a Chip), design reuse, and IP DB, which are the big concerns in these days. In addition to introduce our algorithms, the benchmark showed that our performance is superior by 27 times faster than that of the commercial one, and has better efficiency by 3 times in disk usage.

  • PDF

The Impact of Business Scope and Technological Innovation Capability on Firm Performance in SMEs (중소기업의 사업영역과 기술혁신역량이 경영성과에 미치는 영향에 관한 실증연구)

  • Lee, Byeong-Heon;Kim, Yeong-Geun
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2007.04a
    • /
    • pp.203-226
    • /
    • 2007
  • The purpose of this research is to analyze the impact of business scope and technological innovation capability(TIC) on firm performance in SMEs. Among the 1,077 SME sample data collected with the help of Korean Industrial Complex Corporation, 228 sample data from capital goods sectors had been selected and analyzed. Several mutiple regression models were developed to test the main and the interaction effects of two independent variables business scope and TIC on SME performance. The empirical analysis show that the number of product lines, one of the two scope variable measured, is positively correlated with the return on sales(ROS). Among the variable of TIC, the number of intellectual property rights(IPRs) is positively correlated with the sales growth rates of SMEs, which the ratio of engineers to total employees is positively correlated with the ROS of SMEs. The results also delineated some interaction effects of business scope and TIC on SME performance. There exists a positive interaction effect of the ratio of engineers to total employees and the number of product lines both on ROS and scales growth rate. The interaction of the number of customers and the number of IPRs positively effects on ROS, and also the interaction of the number of product lines and the number of IPRs are positively related with ROS. Findings of this research indicates that it is necessary for SMEs in capital goods sectors to accumulate technological innovation capability and to expand business scope to improve firm performance. Furthermore, the accumulation of internal TIC should accommodate with the expansion of business scope to gain an improved performance. Particularly, adequate technological innovation capability is required to address the need of expanded customers when enlarging the scope of customers.

  • PDF

Study on the Impact from the Concentration of Technological Innovation Activity to the Management Achievement : Focused in Listed ICT Companies (기술혁신 활동 집중도가 경영성과에 미치는 영향에 관한 연구: ICT 상장기업을 중점으로)

  • Ko, Young-kwon;Park, Jong-woo;Jo, Dong-hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.4
    • /
    • pp.347-358
    • /
    • 2016
  • ICT sector has been made a great deal of achievements for past 20 or more years in the aspects of the industrial promotion and the efficiency improvement under the strong leadership by the government for the informatization and still leads the Korean industries. However, the previous studies are mostly on how the quantitative growth of patents impacts a company's management achievements while being insufficient on the qualitative level. In this study, an analysis is attempted on the impact from the qualitative level of patents held by a ICT company leading Korean industry to its management achievements. In other words, if the concentration of technological innovation activities, a scale to measure the qualitative level of possessed patents is influential to the growth and the profit of a company is analyzed. The analysis result shows that the current time technological superiority index, RTA and the concentration index, CRn of the technological innovation activities significantly impact to the growth and the profit of company. This study demonstrates the positive impact from a highly qualitative level of patents to the growth and the profit of a company in ICT sector in the current circumstance of insufficient researches on the qualitative level of patents. Therefore, this study is expected to present a new start point for the future studies.

Plagiarism dispute Cases of Fashion Design and Undergraduate Students' Perceptions Regarding Plagiarism of Fashion Design (패션디자인의 표절 분쟁 사례와 대학생들의 패션디자인 표절에 대한 인식)

  • Kim, Jang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.480-489
    • /
    • 2020
  • Controversy and legal disputes over counterfeit fashion designs have recently arisen in the fashion industry. The purpose of this study is to examine cases of counterfeiting disputes over fashion designs, and how the perception of counterfeit fashion designs is fostered from the learner's point of view, suggesting implications for the counterfeiting problem. As a result of this study, first, counterfeiting disputes over fashion design started from a lack of utilization of the Design Protection Act and the ambiguity in counterfeit design criteria. Second, the negative perceptions of counterfeit designs were mainly about unethical behavior, inhibiting the growth of the fashion industry, and reducing consumers' willingness to buy the genuine article. Positive perceptions were mainly about the process of creation, the promotion of a developmental environment for the fashion industry, and the expansion of opportunities to promote new designs. The most common perception was the absence of clear criteria for judgments about counterfeiting. Third, the implications of the counterfeiting problem in fashion design require effective institutional improvement in the fashion industry, the establishment of standards to deal with counterfeiting, the development and practical introduction of education proposals regarding intellectual property rights, and changing the perception of counterfeiting in the fashion industry.

Study on the Design of S/PDIF BC which Can Operate without PLL (PLL없이 동작하는 S/PDIF IC 설계에 관한 연구)

  • Park Ju-Sung;Kim Suk-Chan;Kim Kyoung-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.1
    • /
    • pp.11-20
    • /
    • 2005
  • In this paper, we deal with the research about a S/PDIF (Sony Philips Digital Interface) receiver which can operate without PLL (Phase Locked Loop) circuits. Although a S/PDIF receiver is used in most audio devices and audio processors in these days. yet there are only few domestic researches about S/PDIF. Currently used commercial DACs (Digital-to-Analog Converters) which can decode S/PDIF signals, have a PLL circuit inside them. The PLL makes it possible to extract clock information from S/PDIF digital signal and to synchronize a clock signal with input signals. But the PLL circuit makes many diffculties in designing the SOC (System On Chips) of VLSIs (Vew Large Scale Integrated Ciruits) because it is an "analog circuit". We proposed a S/PDIF receiver which doesn't have PLL circuits and only has Pure digital circuits. The key idea of the proposed S/PDIF receiver. is to use the ratio between a 16 MHz basic input clock and S/PDIF signals. After having decoded hundreds thousands S/PDIF inputs, it went to prove that a S/PDIF receiver can be designed with pure digital circuits and without any analog circuits such as PLL circuits. We have confidence that the proposed S/PDIF receiver can be used as an IP (Intellectual Property) for the SOC design of the digital circuits.

A Study on Empirical Model for the Prevention and Protection of Technology Leakage through SME Profiling Analysis (중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구)

  • Yoo, In-Jin;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.171-191
    • /
    • 2018
  • Purpose Corporate technology leakage is not only monetary loss, but also has a negative impact on the corporate image and further deteriorates sustainable growth. In particular, since SMEs are highly dependent on core technologies compared to large corporations, loss of technology leakage threatens corporate survival. Therefore, it is important for SMEs to "prevent and protect technology leakage". With the recent development of data analysis technology and the opening of public data, it has become possible to discover and proactively detect companies with a high probability of technology leakage based on actual company data. In this study, we try to construct profiles of enterprises with and without technology leakage experience through profiling analysis using data mining techniques. Furthermore, based on this, we propose a classification model that distinguishes companies that are likely to leak technology. Design/methodology/approach This study tries to develop the empirical model for prevention and protection of technology leakage through profiling method which analyzes each SME from the viewpoint of individual. Based on the previous research, we tried to classify many characteristics of SMEs into six categories and to identify the factors influencing the technology leakage of SMEs from the enterprise point of view. Specifically, we divided the 29 SME characteristics into the following six categories: 'firm characteristics', 'organizational characteristics', 'technical characteristics', 'relational characteristics', 'financial characteristics', and 'enterprise core competencies'. Each characteristic was extracted from the questionnaire data of 'Survey of Small and Medium Enterprises Technology' carried out annually by the Government of the Republic of Korea. Since the number of SMEs with experience of technology leakage in questionnaire data was significantly smaller than the other, we made a 1: 1 correspondence with each sample through mixed sampling. We conducted profiling of companies with and without technology leakage experience using decision-tree technique for research data, and derived meaningful variables that can distinguish the two. Then, empirical model for prevention and protection of technology leakage was developed through discriminant analysis and logistic regression analysis. Findings Profiling analysis shows that technology novelty, enterprise technology group, number of intellectual property registrations, product life cycle, technology development infrastructure level(absence of dedicated organization), enterprise core competency(design) and enterprise core competency(process design) help us find SME's technology leakage. We developed the two empirical model for prevention and protection of technology leakage in SMEs using discriminant analysis and logistic regression analysis, and each hit ratio is 65%(discriminant analysis) and 67%(logistic regression analysis).

Information Hiding Technique in Smart Phone for the Implementation of GIS Web-Map Service (GIS 웹 맵 서비스 구현을 위한 스마트 폰에서의 정보은닉 기법)

  • Kim, Jin-Ho;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.710-721
    • /
    • 2010
  • Recently, for the advancement of embedded technology about mobile device, a new kind of service, mash-up is appeared. It is service or application combining multimedia content making tool or device and web-GIS(geographic information system) service in the mobile environment. This service can be ease to use for casual user and can apply in various ways. So, It is served in web 2.0 environment actively. But, in the mashup service, because generated multimedia contents linked with web map are new type of multimedia contents which include user's migration routes in the space such as GPS coordinates. Thus, there are no protection ways for intellectual property created by GIS web-map service users and user's privacy. In this paper, we proposed a location and user information hiding scheme for GIS web-map service. This scheme embeds location and user information into a picture that is taken by camera module on the mobile phone. It is not only protecting way for user's privacy but is also tracing way against illegal photographer who is peeping person through hidden camera. And than, we also realized proposed scheme on the mobile smart phone. For minimizing margin of error about location coordinate value against contents manipulating attacks, GPS information is embedded into chrominance signal of contents considering weight of each digit about binary type of GPS coordinate value. And for tracing illegal photographer, user information such as serial number of mobile phone, phone number and photographing date is embedded into frequency spectrum of contents luminance signal. In the experimental results, we confirmed that the error of extracted information against various image processing attacks is within reliable tolerance. And after file format translation attack, we extracted embedded information from the attacked contents without no damage. Using similarity between extracted one and original templete, we also extracted whole information from damaged chrominance signal of contents by various image processing attacks.

A Study on the Research Model for the Standardization of Software-Similarity-Appraisal Techniques (소프트웨어 복제도 감정기법의 표준화 모델에 관한 연구)

  • Bahng, Hyo-Keun;Cha, Tae-Own;Chung, Tai-Myoung
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.823-832
    • /
    • 2006
  • The Purpose of Similarity(Reproduction) Degree Appraisal is to determine the equality or similarity between two programs and it is a system that presents the technical grounds of judgment which is necessary to support the resolution of software intellectual property rights through expert eyes. The most important things in proceeding software appraisal are not to make too much of expert's own subjective judgment and to acquire the accurate-appraisal results. However, up to now standard research and development for its systematic techniques are not properly made out and as different expert as each one could approach in a thousand different ways, even the techniques for software appraisal types have not exactly been presented yet. Moreover, in the analyzing results of all the appraisal cases finished before, through a practical way, we blow that there are some damages on objectivity and accuracy in some parts of the appraisal results owing to the problems of existing appraisal procedures and techniques or lack of expert's professional knowledge. In this paper we present the model for the standardization of software-similarity-appraisal techniques and objective-evaluation methods for decreasing a tolerance that could make different results according to each expert in the same-evaluation points. Especially, it analyzes and evaluates the techniques from various points of view concerning the standard appraisal process, setting a range of appraisal, setting appraisal domains and items in detail, based on unit processes, setting the weight of each object to be appraised, and the degree of logical and physical similarity, based on effective solutions to practical problems of existing appraisal techniques and their objective and quantitative standardization. Consequently, we believe that the model for the standardization of software-similarity-appraisal techniques will minimizes the possibility of mistakes due to an expert's subjective judgment as well as it will offer a tool for improving objectivity and reliability of the appraisal results.

Hardware Design for JBIG2 Encoder on Embedded System (임베디드용 JBIG2 부호화기의 하드웨어 설계)

  • Seo, Seok-Yong;Ko, Hyung-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.182-192
    • /
    • 2010
  • This paper proposes the hardware IP design of JBIG2 encoder. In order to facilitate the next generation FAX after the standardization of JBIG2, major modules of JBIG2 encoder are designed and implemented, such as symbol extraction module, Huffman coder, MMR coder, and MQ coder. ImpulseC Codeveloper and Xilinx ISE/EDK program are used for the synthesis of VHDL code. To minimize the memory usage, 128 lines of input image are processed succesively instead of total image. The synthesized IPs are downloaded to Virtex-4 FX60 FPGA on ML410 development board. The four synthesized IPs utilize 36.7% of total slice of FPGA. Using Active-HDL tool, the generated IPs were verified showing normal operation. Compared with the software operation using microblaze cpu on ML410 board, the synthesized IPs are better in operation time. The improvement ratio of operation time between the synthesized IP and software is 17 times in case of symbol extraction IP, and 10 times in Huffman coder IP. MMR coder IP shows 6 times faster and MQ coder IP shows 2.2 times faster than software only operation. The synthesized H/W IP and S/W module cooperated to succeed in compressing the CCITT standard document.