Purpose: The goal of this paper is to present the design and performance of a position encoding circuit for $16{\times}16$ array of position sensitive multi-anode photomultiplier tube for small animal PET scanners. This circuit which reduces the number of readout channels from 256 to 4 channels is based on a charge division method utilizing a resistor array. Materials and Methods: The position encoding circuit was simulated with PSpice before fabrication. The position encoding circuit reads out the signals from H9500 flat panel PMTs (Hamamatsu Photonics K.K., Japan) on which $1.5{\times}1.5{\times}7.0\;mm^3$$L_{0.9}GSO$ ($Lu_{1.8}Gd_{0.2}SiO_{5}:Ce$) crystals were mounted. For coincidence detection, two different PET modules were used. One PET module consisted of a $29{\times}29\;L_{0.9}GSO$ crystal layer, and the other PET module two $28{\times}28$ and $29{\times}29\;L_{0.9}GSO$ crystal layers which have relative offsets by half a crystal pitch in x- and y-directions. The crystal mapping algorithm was also developed to identify crystals. Results: Each crystal was clearly visible in flood images. The crystal identification capability was enhanced further by changing the values of resistors near the edge of the resistor array. Energy resolutions of individual crystal were about 11.6%(SD 1.6). The flood images were segmented well with the proposed crystal mapping algorithm. Conclusion: The position encoding circuit resulted in a clear separation of crystals and sufficient energy resolutions with H9500 flat-panel PMT and $L_{0.9}GSO$ crystals. This circuit is good enough for use in small animal PET scanners.
The purpose of this study is to compare the differences of the career development and the occupational view between giftedness in computer science and normal students in elementary school, so the results of this study provide assistance to the teacher for the direction and guidance on the career education of the giftedness in computer science in elementary school. This survey is based on 82 giftedness in computer science and 167 normal elementary school students. The questionnaires used in the study contain questions asking regarding the career development and the occupational view. The results of this study were as follows : First, according to the consciousness analysis result about career, the giftedness in computer science choose to be scientific technicians, the normal students choose to be artists. The both groups get career information from their parents, but they usually don't get career counseling from teachers. The education of giftedness in computer science does not contribute to changing their dreams, while normal students have no interest in computer science. Second, according to the career development analysis result, in comparison with non-gifted students, the gifted in information science had more success in all domains of career development. Third, according to the occupational view analysis result, the information science gifted students had higher meaningful rate than the normal students. Intrinsic domain' had higher meaningful rate among the subordinate domains, there is no difference in 'extrinsic domain' and 'incidental domain' between the information science gifted students and the normal students. Fourth, according to the correlation analysis result of the career development and the occupational view, there is a positive correlation in all domains of them. The high they are in the career development, the more they have the certain occupational view. Likewise, if they have the certain occupational view, they will be more successful in career development. Based on the findings of this research, the directing and guidance on the career education of giftedness in computer science in elementary school is same as the followings. We should educate parents regarding information about career for students who are under the influence of parents greatly and indicate them to apply to their children appropriately. In addition, for making them to have the positive image of the computer science, teacher should provide more information about the area of information and form various curriculums to induce more interests about computer science. We need to strengthen the career education for guiding the gifted to assist them to establish their own goal and realize them how to study and choose their career in the future. In school education field, it must develop and manage the definite and empirical program, not the career development program which is focused on only entrance into advanced school, to boost self-realization ability and the suitable career education program based on the correct understanding on giftedness in computer science. For this, through steady trying and research, teachers should be eater to develop the career education for students. Also, we have to implement the internal stability career education program, so it will help students to be aware of their job and career; therefore, students will be able to plan and prepare for their career in this rapid changing world.
Journal of Institute of Control, Robotics and Systems
/
v.7
no.9
/
pp.717-722
/
2001
This paper presents a methodology on the backward path tracking control of a trailer type robot which consists of two parts: a tractor and a trailer. It is difficult to control the motion of a trailer vehicle since its dynamics is non-holonomic. Therefore, in this paper, the modeling and parameter estimation of the system using a real-coded genetic algorithm(RCGA) is proposed and a backward path tracking control algorithm is then obtained based on the linearized model. Experimental results verify the effectiveness of the proposed method.
This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.
Location management and message delivery protocol is fundamental to the further development of mobile agent systems in a multi-region mobile agent computing environment in order to control mobile agents and guarantee message delivery between them. However, previous works have some problems when they are applied to a multi-region mobile agent computing environment. First, the cost of location management and message delivery is increased relatively. Second, a tracking problem arises. finally, cloned mobile agents and parent-child mobile agents do not get dealt with respect to location management and message delivery. In this paper, we present a HB (Home-Blackboard) protocol, which is a new location management and message delivery protocol in a multi-region mobile agent computing environment. The HB protocol places a region server in each region and manages the location of mobile agents by using intra-region migration and inter-region migration. It also places a blackboard in each region server and delivers messages to mobile agents when a region server receives location update form them. The HB protocol can decrease the cost of location update and message passing and solve the tracking problem with low communication cost. Also, this protocol deals with the location management and message passing of cloned mobile agents and parent-child mobile agents, so that it can guarantee message delivery of these mobile agents and pass messages without passing duplicate messages.
Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.
Journal of the Korean Institute of Landscape Architecture
/
v.37
no.2
/
pp.47-61
/
2009
The purpose of this study was to understand the laws related to the safety management of children's play facilities(LRSMCPF) including the "Safety Supervision Law of Children's Play Facilities(SSLCPF)" and the "Quality Management and Industrial Products Safety Management Law(QMIPSAL)", in order to analyze the problems by 4 phases-development of products, landscape design, landscape construction and maintenance considering landscape project procedure-and to propose a revision of the laws. The results are as follows: 1. The various LRSMCPF, SSLCPF and QMIPSAL, as basic laws for the safety management of children's play facilities, were insufficient regarding the features of children's play facilities and play spaces, which are both comparatively varied and complex. 2. In development of products, the one-year duration of safety certification based on QMIPSAL was too short and the procedure for safety certification were redundant in both products and plants inspection, and export and import product inspection. 3. The field inspection of construction sites based on SSLCPF was repeated with quality control and a consultation of rules based on "Construction Technology Management Law". 4. There are not enough safety inspection organizations regarding children's play facilities to meet the demand of safety certification, safety inspection, and safety education in the near future. 5. For children's play safety, the establishment of a general safety management system for children's play connected with the phases is needed to ensure safe play equipment, to construct safe playgrounds, and to manage play facilities. The criteria, regulations, and procedure regarding safety certification and safety inspection of play facilities must be revised efficiently and standardized to a global level as well. To improve the system and contents of safety certification and inspection, authorization of safety inspection organizations based on landscape architecture is needed. Further study will be required to concretely analyze in detail the laws, enforcement decrees and rules, and ordinances that consider the practical experience of professional landscape architects, inspectors, and lawyers.
Cho, Yun Joo;Chae, Young;Wee, Man-Gyu;Jung, Sang Hak;Song, Hyeong Nam;Kim, Yun-Geum
Journal of the Korean Institute of Landscape Architecture
/
v.48
no.2
/
pp.10-19
/
2020
The park program can adeptly cope with the diversification of leisure needs in accordance with the changing times. The program also makes the relationship between the users and the park itself closer. For this reason, the Seoul Metropolitan Government has operated a variety of programs, beginning with the Botanical Class Program at the Namsan Outdoor Botanical Garden in 1997. The government additionally began to organize park programs by establishing the Park and Leisure Department and three Park Greenery Offices. However, research on park programs is mainly focused on park users. Therefore, this study intends to reveal the structure of the programs by studying the program operation. The specific purposes of this study are '1. Review the institutional characteristics that underlie the operation of the Park Program in Seoul by examining the relevant laws, the operation organizations, and the personnel composition, 2. Analyze the operation methods, such as procurement and the execution of the program, operation costs, and public-private cooperation methods, etc. 3. Analyze the composition and contents of the program from 2015 to 2017, and process and identify the relationship between the structure of the program operation and the program itself.' Summarizing the results obtained from the study, as far as the structure of the first program operation, the support laws were not systematic, but the operating organization was working to establish a system. The second characteristic of the operation is that most of the budget was funded by local governments, but the level of citizen involvement was low. Third, when we looked at the characteristics of the program, the number of programs increased, but they were focused on a specific theme and few programs actively used the park facilities. Based on the results, three tasks can be proposed. The first is that the 'Act on Parks and Green Spaces' should include the concepts and support for park programs. Second, there is a need to change from the ideas of the quantitative increase of programs to qualitative improvements. Lastly, it is necessary to reorganize the Green Seoul Bureau of the Seoul Metropolitan Government into a citizen-led and leisure-oriented organization to promote the park leisure culture. This study has significance, as it was conducted with a service provider, not a program user, unlike many previous park program-related studies. The results of this study will be able to contribute not only to the Seoul Metropolitan Government, but also to other local governments to suggest the direction of the management and the operation of the park for the consumer, and consequently, it will help prepare the long-term vision of parks as the closest leisure location for most citizens.
Objectives : This study was conducted to look over the current status of psychiatric consultation in a general hospital. Methods : We analyzed 664 medical records : 317 in 2002 and 347 in 1997, and compared the records of 1997 and 2002. Results 1) The average age of the patients increased from 45.9 years(1997) to 53.2 years of age (2002). Dividing the referred patients into 3 age-brackets as below 40, between 40 and 60, and above 60, the number of patients in the age group above 60 was significantly increased, more prominently in women. 2) Overall consultation rate was 2.29% in 2002 and 2.2% in 1997 .44.2% and 57.1% of the whole referrals were from the department of internal medicine in each year, and the department of rehabilitation medicine was leading in consultation rate in both years. 3) 'Mood disorders' and 'Substance related disorders' were the most frequent diagnoses in 2002 and 1997 respectively. 4) Use of psychotropic drugs was the most frequent recommendations of psychiatric consultation, in both years, and the most frequently prescribed drugs were anti-anxiety drugs in both years. The use of SSRI and atypical anti-psychotics were increased, while the use of typical anti-psychotics was decreased significantly in 2002. Conclusion : In 2002, compared with 1997, the average age of the patients was increased, and the consultation of the patients with the diagnosis of 'mood disorders' and 'cognitive disorders' was done more frequently than in 1997. The recommendation to use psychotropic drugs was well accepted, but the concern to diagnostic procedure was relatively low.
Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
/
v.5
no.3
/
pp.199-212
/
2007
If a type IP-2 transport package were to be subjected to a free drop test and a penetration test under the normal conditions of transport, it should prevent a loss or dispersal of the radioactive contents and a more than 20% increase in the maximum radiation level at any external surface of the package. In this paper, we suggested the analytic method to evaluate the structural safety of a type IP-2 transport package using a thick steel plate for a structure part and a bolt for tying a bolt. Using an analysis a loss or dispersal of the radioactive contents and a loss of shielding integrity were confirmed for two kinds of type IP-2 transport packages to transport radioactive waste drums from a waste facility to a temporary storage site in a nuclear power plant. Under the free drop condition the maximum average stress at the bolts and the maximum opening displacement of a lid were compared with the tensile stress of a bolt and the steps in a lid, which were made to avoid a streaming radiation in the shielding path, to evaluate a loss or dispersal of radioactive waste contents. Also a loss of shielding integrity was evaluated using the maximum decrease in a shielding thickness. To verify the impact dynamic analysis for free drop test condition and evaluate experimentally the safety of two kinds of type IP-2 transport packages, free drop tests were conducted with various drop directions. For the tests we examined the failure of bolts and the deformation of flange to evaluate a loss or dispersal of radioactive material and measured the shielding thickness using a ultrasonic thickness gauge to assess a loss of shielding integrity. The strains and accelerations acquired from tests were compared with those by analyses to verify the impact dynamic analysis. The analytic results were larger than the those of test so that the analysis showed the conservative results. Finally, we evaluated the safety of the type IP-2 transport package under the stacking test condition using a finite element analysis. Under the stacking test condition, the maximum Tresca stress of the shielding material was 1/3 of the yielding stress. Two kinds of a type IP-2 transport package were safe for the free drop test condition and the stacking test condition.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.