This paper suggests how to design a ZigBee-chip-based communication module to remotely measure radiation level. The suggested communication module consists of two control processors for the chip as generally required to configure a ZigBee system, and one chip module to configure a ZigBee RF device. The ZigBee-chip-based communication module for remote radiation measurement consists of a wireless communication controller; sensor and high-voltage generator; charger and power supply circuit; wired communication part; and RF circuit and antenna. The wireless communication controller is to control wireless communication for ZigBee and to measure radiation level remotely. The sensor and high-voltage generator generates 500 V in two consecutive series to amplify and filter pulses of radiation detected by G-M Tube. The charger and power supply circuit part is to charge lithium-ion battery and supply power to one-chip processors. The wired communication part serves as a RS-485/422 interface to enable USB interface and wired remote communication for interfacing with PC and debugging. RF circuit and antenna applies an RLC passive component for chip antenna to configure BALUN and antenna impedance matching circuit, allowing wireless communication. After configuring the ZigBee-chip-based communication module, tests were conducted to measure radiation level remotely: data were successfully transmitted in 10-meter and 100-meter distances, measuring radiation level in a remote condition. The communication module allows an environment where radiation level can be remotely measured in an economically beneficial way as it not only consumes less electricity but also costs less. By securing linearity of a radiation measuring device and by minimizing the device itself, it is possible to set up an environment where radiation can be measured in a reliable manner, and radiation level is monitored real-time.
As the amount of electronic documents increases rapidly with the growth of the Internet, a parallel search engine capable of handling a large number of documents are becoming ever important. To implement a parallel search engine, we need to partition the inverted index and search through the partitioned index in parallel. There are two methods of partitioning the inverted index: 1) document-identifier based partitioning and 2) keyword-identifier based partitioning. However, each method alone has the following drawbacks. The former is convenient in inserting documents and has high throughput, but has poor performance for top h query processing. The latter has good performance for top-k query processing, but is inconvenient in inserting documents and has low throughput. In this paper, we propose a hybrid partitioning method to compensate for the drawback of each method. We design and implement a parallel search engine that supports the hybrid partitioning method using the Odysseus DBMS tightly coupled with information retrieval capability. We first introduce the architecture of the parallel search engine-Odysseus/parallel-OOSQL. We then show the effectiveness of the proposed system through systematic experiments. The experimental results show that the query processing time of the document-identifier based partitioning method is approximately inversely proportional to the number of blocks in the partition of the inverted index. The results also show that the keyword-identifier based partitioning method has good performance in top-k query processing. The proposed parallel search engine can be optimized for performance by customizing the methods of partitioning the inverted index according to the application environment. The Odysseus/parallel OOSQL parallel search engine is capable of indexing, storing, and querying 100 million web documents per node or tens of billions of web documents for the entire system.
One of the roles of the Semantic Web services is to execute dynamic intra-organizational services including the integration and interoperation of business processes. Since different organizations design their processes differently, the retrieval of similar semantic business processes is necessary in order to support inter-organizational collaborations. Most approaches for finding services that have certain features and support certain business processes have relied on some type of logical reasoning and exact matching. This paper presents our approach of using imprecise matching for expanding results from an exact matching engine to query the OWL(Web Ontology Language) MIT Process Handbook. MIT Process Handbook is an electronic repository of best-practice business processes. The Handbook is intended to help people: (1) redesigning organizational processes, (2) inventing new processes, and (3) sharing ideas about organizational practices. In order to use the MIT Process Handbook for process retrieval experiments, we had to export it into an OWL-based format. We model the Process Handbook meta-model in OWL and export the processes in the Handbook as instances of the meta-model. Next, we need to find a sizable number of queries and their corresponding correct answers in the Process Handbook. Many previous studies devised artificial dataset composed of randomly generated numbers without real meaning and used subjective ratings for correct answers and similarity values between processes. To generate a semantic-preserving test data set, we create 20 variants for each target process that are syntactically different but semantically equivalent using mutation operators. These variants represent the correct answers of the target process. We devise diverse similarity algorithms based on values of process attributes and structures of business processes. We use simple similarity algorithms for text retrieval such as TF-IDF and Levenshtein edit distance to devise our approaches, and utilize tree edit distance measure because semantic processes are appeared to have a graph structure. Also, we design similarity algorithms considering similarity of process structure such as part process, goal, and exception. Since we can identify relationships between semantic process and its subcomponents, this information can be utilized for calculating similarities between processes. Dice's coefficient and Jaccard similarity measures are utilized to calculate portion of overlaps between processes in diverse ways. We perform retrieval experiments to compare the performance of the devised similarity algorithms. We measure the retrieval performance in terms of precision, recall and F measure? the harmonic mean of precision and recall. The tree edit distance shows the poorest performance in terms of all measures. TF-IDF and the method incorporating TF-IDF measure and Levenshtein edit distance show better performances than other devised methods. These two measures are focused on similarity between name and descriptions of process. In addition, we calculate rank correlation coefficient, Kendall's tau b, between the number of process mutations and ranking of similarity values among the mutation sets. In this experiment, similarity measures based on process structure, such as Dice's, Jaccard, and derivatives of these measures, show greater coefficient than measures based on values of process attributes. However, the Lev-TFIDF-JaccardAll measure considering process structure and attributes' values together shows reasonably better performances in these two experiments. For retrieving semantic process, we can think that it's better to consider diverse aspects of process similarity such as process structure and values of process attributes. We generate semantic process data and its dataset for retrieval experiment from MIT Process Handbook repository. We suggest imprecise query algorithms that expand retrieval results from exact matching engine such as SPARQL, and compare the retrieval performances of the similarity algorithms. For the limitations and future work, we need to perform experiments with other dataset from other domain. And, since there are many similarity values from diverse measures, we may find better ways to identify relevant processes by applying these values simultaneously.
Many countries throughout the world have enacted laws on terrorism in the light of the changes that time has brought to them, geographical features, cultural values, and environmental elements. Especially some advanced European nations prescribe the definition of terrorism, the purpose of terrorism, the behavior of terrorism, and the types of crimes related to terrorism and so on for the following reason that it is more vital for the authorities concerned to investigate and punish terrorists after the rise of terrorism. In this regard, this paper analyzes legislative countermoves against terrorists of advanced countries such as France, Germany, and England and through this sheds light on the need of future anti-terrorism bills. The legislative basic guidelines directly to manipulate future terrors based on theories derived from this study could be summarized as follows. In the first place, providing laws on direct investigative power and harsher punishment to those involved in terrorism is a prerequisite for social security and thus the presidential directive of the state anti-terrorism action guidelines just deals with administrative measures without any effective response to terrorism. Hence it is urgent to make anti-terrorism bill concerning investigation and punishment of terrorists. In the second place, it is associated with the objectives of terror. The expression "all sorts of" stated in Korean law is so quite unclear that it can not fulfill the required conditions for naming it "crime". Comprehending provisoes of the crime that meets the purpose of the terrorists is necessary in order to investigate and inflict punishment on them. Therefore, it is advisable to establish specific and precise principles such as political, social, ideological, and religious purpose of terrorists in the bill. In the third place, to meet the flow of times of technicalization, informatization, such provisoes as destruction of electronic data system, crimes related to nuclear materials, purchases of weapons by terrorists, tax administration for prohibition of sale, and arson should be considered in terror bill. In the fourth place, nonselective attack toward unspecified individuals has become a serious issue in our society. Terrorists leave poisonous foods or beverages to crowded place or dump toxic chemicals into river intentionally. Therefore more strict regulations must be included in terror bill to prevent possible terrorist attacks.
This paper is a study of the changing nature of software for virtual Cyborg self and the virtual body that occur in the game from a philosophical point of view. Looking broadly, the cyborg concept refers to the combination of man and machine. Specifically, there is a hardware cyborg organism to combine human and restoration of machine In addition, there is software cyborg by electronic the human brain of converting a virtual body. Virtual games are cases software-Cyborg applied. In the game , There seems to have characteristics of virtual body and ego that different from general cyborg meaning. To analyze the features, I applied the concept of software-cyborg of Hans morabek and the multiple selves in cyberspace properties of Kim Sun-Hee. generally, software cyborg cloning the brain type tended to invalidate the body due to the nature of the virtual world. But If you look at third-person's view and the game character that made from real actors, it is pursuing the realism of photographic images and it stressed the need for a virtual body in order to maintain the psychological identity of the player. And, The game player crosses the eight characters to choose while completing the mission. This is a big role in the reality ego leads to the desired final ending with the selection and experience to be experienced as self-replication to multiple. These cyber multi-ego looks for an active and positive features compared to the multi-ego in the real world and highlights the advantages of the software cyborg. Game The characteristics of the final result varies depending on the selection of the player. The life and death of a friend is determined by the relationship between the characters friendship. In this case, the virtual self is empirically through trial and error, moral, and try to select the desired setting the standard for intuitive and self own choice. Also It can be fused to the knowledge of multiple selves as one step is formed by a high spiritual introspection. This process is a positive interpretation of the world and their own forms of mental reflection through self-overcoming human, Nietzsche is said that the process is Wibeomenswi.
Journal of Korean Society of Archives and Records Management
/
v.3
no.1
/
pp.69-92
/
2003
Registration and description of records are important elements of processing which provide with the background information of production of records and business-related information. They also enable to search and use the records. In this paper, I examined the Korean registration and description system defined in the Public Records Management Act which directs the records creating agency to register records in creating offices and directs the "professional archives" to make "basic registrations" and "detailed registrations" of the records. In the analysis and comparison of two different registration and description systems with the known international standards of records and archives management, such as ISO15489 and ISAD(G), I intended to evaluate the Korean records and archives management system and suggested recommendations for the renovation of the Korean recordskeeping system. Despite we have unique office business procedures and the culture of officialdom, and despite we have developed our system based on the established business procedures and office culture, it would be preferable to adopt or follow the international standards and established best practices. After the comparative analysis, I recommended some innovations in the filed of registration and description. For instance, in the basic registration. we would better to install an item of "simple contents summary." We may also need the multiple-level description. The fonds level description and the series level description should be introduced to our archival automated management system. We need to establish a Korean standard of description adopting the rules of the ISAD(G) and ISAAR(CPF). Essential requirements for electronic records management, such as contextual and structural information, should be incorporated in the new standard. Documentation of records disposition also should be reinforced to guarantee the authenticity of records and to ensure control of the records. To implement the recommendations for the standard, we need to amend the Public Records Management Act and its Regulations and Rules. Also it is imperative to redesign the GARS integrated archival automated management system.
Proceedings of the Korean Institute of Navigation and Port Research Conference
/
2003.05a
/
pp.181-186
/
2003
The satellite navigation system is widely used for identifying a user's position regardless of weather or geographic conditions and also make effect on new technology of marine LBS(Location Based Service), which has the technology of geographic information such as the ENC. Generally, there are conceivable systems of marine LBS such as ECDIS, or ECS that use the ENC itself with powerful processor in installed type on ships bridge. Since the ENC is relatively heavy structure with dummy format for data transfer between different systems, we should reduce the ENC to small and compact size in order to use it in mobile platform. In this paper, we assumed that the mobile system like PDA, or Webpad can be used for small capability of mobile platform. However, the ENC should be updated periodically by update profile data produced by HO. If we would reduce the ENC without a consideration of update, we could not get newly updated data furthermore. As summary, we studied considerations for ENC reduction with update capability. It will make the ENC be useful in many mobile platforms for various applications.
Proceedings of the Korean Institute of Surface Engineering Conference
/
2000.11a
/
pp.3-4
/
2000
Many researchers are interested in the synthesis and characterization of carbon nitride and diamond-like carbon (DLq because they show excellent mechanical properties such as low friction and high wear resistance and excellent electrical properties such as controllable electical resistivity and good field electron emission. We have deposited amorphous carbon nitride (a-C:N) thin films and DLC thin films by shielded arc ion plating (SAIP) and evaluated the structural and tribological properties. The application of appropriate negative bias on substrates is effective to increase the film hardness and wear resistance. This paper reports on the deposition and tribological OLC films in relation to the substrate bias voltage (Vs). films are compared with those of the OLC films. A high purity sintered graphite target was mounted on a cathode as a carbon source. Nitrogen or argon was introduced into a deposition chamber through each mass flow controller. After the initiation of an arc plasma at 60 A and 1 Pa, the target surface was heated and evaporated by the plasma. Carbon atoms and clusters evaporated from the target were ionized partially and reacted with activated nitrogen species, and a carbon nitride film was deposited onto a Si (100) substrate when we used nitrogen as a reactant gas. The surface of the growing film also reacted with activated nitrogen species. Carbon macropartic1es (0.1 -100 maicro-m) evaporated from the target at the same time were not ionized and did not react fully with nitrogen species. These macroparticles interfered with the formation of the carbon nitride film. Therefore we set a shielding plate made of stainless steel between the target and the substrate to trap the macropartic1es. This shielding method is very effective to prepare smooth a-CN films. We, therefore, call this method "shielded arc ion plating (SAIP)". For the deposition of DLC films we used argon instead of nitrogen. Films of about 150 nm in thickness were deposited onto Si substrates. Their structures, chemical compositions and chemical bonding states were analyzed by using X-ray diffraction, Raman spectroscopy, X-ray photoelectron spectroscopy and infrared spectroscopy. Hardness of the films was measured with a nanointender interfaced with an atomic force microscope (AFM). A Berkovich-type diamond tip whose radius was less than 100 nm was used for the measurement. A force-displacement curve of each film was measured at a peak load force of 250 maicro-N. Load, hold and unload times for each indentation were 2.5, 0 and 2.5 s, respectively. Hardness of each film was determined from five force-displacement curves. Wear resistance of the films was analyzed as follows. First, each film surface was scanned with the diamond tip at a constant load force of 20 maicro-N. The tip scanning was repeated 30 times in a 1 urn-square region with 512 lines at a scanning rate of 2 um/ s. After this tip-scanning, the film surface was observed in the AFM mode at a constant force of 5 maicro-N with the same Berkovich-type tip. The hardness of a-CN films was less dependent on Vs. The hardness of the film deposited at Vs=O V in a nitrogen plasma was about 10 GPa and almost similar to that of Si. It slightly increased to 12 - 15 GPa when a bias voltage of -100 - -500 V was applied to the substrate with showing its maximum at Vs=-300 V. The film deposited at Vs=O V was least wear resistant which was consistent with its lowest hardness. The biased films became more wear resistant. Particularly the film deposited at Vs=-300 V showed remarkable wear resistance. Its wear depth was too shallow to be measured with AFM. On the other hand, the DLC film, deposited at Vs=-l00 V in an argon plasma, whose hardness was 35 GPa was obviously worn under the same wear test conditions. The a-C:N films show higher wear resistance than DLC films and are useful for wear resistant coatings on various mechanical and electronic parts.nic parts.
Recently, there is a substantial interest in implementing Business Process Management System(BPMS) among enterprises with the purpose of business process innovation. BPMS redesigns and coordinates business processes in terms of both automated steps and human involvement in order to maximize the value of both involved people and systems. The reason why BPMS is getting attention from top managers is that it has the possibility to optimize the business processes by cycling the process of modeling, execution, monitoring, evaluation, and redesigning work processes. Thus, it has created high expectations about not only productivity improvement but also business process innovation. However. having an innovative nature, which is used for process innovation, BPMS implementation has great potential to stir up employee resistance. The analysis and the discussion about the prevention of the resistance against IS(Information Systems) is important because IS change the way people work and also alter the power structure within the organization, in general. The purpose of this study is to investigate factors that have an impact on the effective adoption of BPMS at the enterprise level. To find out these factors, this study considers two characteristics of BPMS: First. BPMS shares some characteristics with other enterprise-wide IS such as ERP. Second, it has special BPMS-specific characteristics. Due to the lack of previous research on BPMS adoption, interviews were carried out with IT-consultants and CIOs who conducted BPMS projects previously to find out BPMS-specific features that would make BPMS unique when compared to other enterprise-wide IS. As a result, the monitoring function was chosen as the main BPMS-specific factor. Thus, this paper reviewed studies both on enterprise-wide IS adoptions, which applied Technology Acceptance Model (TAM) and secondly on computer based monitoring to find out factors that would influence the employees' perception on the monitoring function of BPMS. Based on the literature review, the study suggested three factors that would have an impact on the employee's perception of the monitoring function: fairness of enterprise evaluation system, fairness of the boss, and self-efficacy of their work. Three factors that would impact the enterprise-wide IS adoption were also set: the shared belief in the benefit of BPMS, training, and communication. Then, these factors were integrated with TAM. Structural equation modeling was used to test hypotheses, out factors that would impact the employees' perception on the monitoring function of BPMS. Based on the literature review the study suggested three factors that would have an impact on the employee's perception of the monitoring function: fairness of enterprise evaluation system, fairness of the boss, and self-efficacy of their work. Three factors that would impact the enterprise-wide IS adoption were also set: the shared belief in the benefit of BPMS, training, and communication. Then, these factors were integrated with TAM. Structural equation modeling was used to test hypotheses. The data analysis results showed that two among three monitoring function related factors - enterprise evaluation system and fairness of the boss - were significant. This implies that employees would worry less about the BPMS implementation as long as they perceive the monitoring results will be used fairly for their performance evaluation. However, employees' high self-efficacy on their job was not a significant factor in their perception of the usefulness of BPMS. This is related to cases that showed employees resisted against the information systems because they automated their works (Markus, 1983). One specific case was an electronic company, where the accounting department workers were requested to redefine their job because their working processes were automated due to BPMS implementation.
Due to the COVID-19 pandemic, the size of the e-commerce has been increased rapidly. This pandemic, which made contact-less communication culture in everyday life made the e-commerce market to be opened even to the consumers who would hesitate to purchase and pay by electronic device without any personal contacts and seeing or touching the real products. Consumers who have experienced the easy access and convenience of the online purchase would continue to take those advantages even after the pandemic. During this time of transformation, however, the size of information source for the consumers has become even shrunk into a flat screen and limited to visual only. To provide differentiated and competitive information on products, companies are adopting AR/VR and steaming technologies but the reviews from the honest users need to be recognized as important in that it is regarded as strong as the well refined product information provided by marketing professionals of the company and companies may obtain useful insight for product development, marketing and sales strategies. Then from the consumer's point of view, if the ratings of reviews are widely diverged how consumers would process the review information before purchase? Are non-converged ratings always unreliable and worthless? In this study, we analyzed how consumer's regulatory focus moderate the attitude to process the diverged information. This experiment was designed as a 2x2 factorial study to see how the variance of product review ratings (high vs. low) for cosmetics affects product attitudes by the consumers' regulatory focus (prevention focus vs. improvement focus). As a result of the study, it was found that prevention-focused consumers showed high product attitude when the review variance was low, whereas promotion-focused consumers showed high product attitude when the review variance was high. With such a study, this thesis can explain that even if a product with exactly the same average rating, the converged or diverged review can be interpreted differently by customer's regulatory focus. This paper has a theoretical contribution to elucidate the mechanism of consumer's information process when the information is not converged. In practice, as reviews and sales records of each product are accumulated, as an one of applied knowledge management types with big data, companies may develop and provide even reinforced customer experience by providing personalized and optimized products and review information.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.