Statement of problem: Recently, there have been increased esthetic needs for posterior dental restorations. The failure of posterior dental ceramic restoration are possible not only by the characters of the component materials but also by the type of food. Purpose: The research aim was to compare the in vitro fracture resistance of simulated first molar crowns fabricated using 4 dental ceramic systems, full-porcelain-occlusal-surfaced PFG, half-porcelain-occlusal-surfaced PFG, Empress 2, Ice Zirkon and selected Korean foods. Material and methods: Eighty axisymmetric crowns of each system were fabricated to fit a preparation with 1.5- to 2.0-mm occlusal reduction. The center of the occlusal surface on each of 15 specimens per ceramic system was axially loaded to fracture in a Instron 4465, and the maximum load(N) was recorded. Afterwards, selected Korean foods specimens(boiled crab, boiled chicken with bone, boiled beef rib, dried squid, dried anchovy, round candy, walnut shell) were prepared. 15 specimens per each food were placed under the Instron and the maximum fracture loads for them were recorded. The 95% confidence intervals of the characteristic failure load were compared between dental ceramic systems and Korean foods. Afterwards, on the basis of previous results, 14Hz cyclic load was applied on the 4 systems of dental ceramic restorations in MTS. The reults were analyzed by analysis of variance and Post Hoc tests. Results: 95% confidence intervals for mean of fracture load 1. full porcelain occlusal surfaced PFG Crown: 2599.3 to 2809.1 N 2. half porcelain occlusal surfaced PFG Crown: 3689.4 to 3819.8 N 3. Ice Zirkon Crown: 1501.2 to 1867.9 N 4. Empress 2 Crown: 803.2 to 1188.5 N 5. boiled crab: 294.1 to 367.9 N 6. boiled chicken with bone: 357.1 to 408.6 N 7. boiled beef rib: 4077.7 to 4356.0 N 8. dried squid: 147.5 to 190.5 N 9. dried anchovy: 35.6 to 46.5 N 10. round candy: 1900.5 to 2615.8 N 11. walnut shell: 85.7 to 373.1 N under cyclic load(14Hz) in MTS, fracture load and masticatory cycles are: 1. full porcelain occlusal surfaced PFG Crown fractured at 95% confidence intervals of 4796.8-9321.2 cycles under 2224.8 N(round candy)load, no fracture under smaller loads. 2. half porcelain occlusal surfaced PFG Crown fractured at 95% confidence intervals of 881705.1-1143565.7 cycles under 2224.8 N(round candy). no fracture under smaller loads. 3. Ice Zirkon Crown fractured at 95% confidence intervlas of 979993.0-1145773.4 cycles under 382.9 N(boiled chicken with bone). no fracture under smaller loads. 4. Empress 2 Crown fractured at 95% confidence intervals of 564.1-954.7 cycles under 382.9 N(boiled chicken with bone). no fracture under smaller loads. Conclusion: There was a significant difference in fracture resistance between experimental groups. Under single load, Korean foods than can cause fracture to the dental ceramic restorations are boiled beef rib and round candy. Even if there is no fracture under single load, cyclic dynamic load can fracture dental posterior ceramic crowns. Experimental data with 14 Hz dynamic cyclic load are obtained as follows. 1. PFG crown(full porcelain occlusion) was failed after mean 0.03 years under fracture load for round candy(2224.8 N). 2. PFG crown(half porcelain occlusion) was failed after mean 4.1 years under fracture load for round candy(2224.8 N). 3. Ice Zirkon crown was failed after mean 4.3 years under fracture load for boiled chicken with bone(382.9 N). 4. Empress 2 crown was failed after mean 0.003 years under fracture load for boiled chicken with bone(382.9 N).
Journal of Advanced Marine Engineering and Technology
/
v.40
no.3
/
pp.157-164
/
2016
In this study, researchers performed preliminary design and numerical analysis for a pilot-scale helium heating system intended to support full-scale construction for a sulfur-iodine (SI) cycle. The helium heat exchanger used a liquefied petroleum gas (LPG) combustor. Exhaust gas velocity at the heat exchanger outlet was approximately 40 m/s based on computational thermal and flow analysis. The maximum gas temperature was reached with six baffles in the design; lower gas temperatures were observed with four baffles. The amount of heat transfer was also higher with six baffles. Installation of additional baffles may reduce fuel costs because of the reduced LPG exhausted to the heat exchanger. However, additional baffles may also increase the pressure difference between the exchanger's inlet and outlet. Therefore, it is important to find the optimum number of baffles. Structural analysis, followed by thermal and flow analysis, indicated a 3.86 mm thermal expansion at the middle of the shell and tube type heat exchanger when both ends were supported. Structural analysis conditions included a helium flow rate of 3.729 mol/s and a helium outlet temperature of $910^{\circ}C$. An exhaust gas temperature of $1300^{\circ}C$ and an exhaust gas rate of 52 g/s were confirmed to achieve the helium outlet temperature of $910^{\circ}C$ with an exchanger inlet temperature of $135^{\circ}C$ in an LPG-fueled helium heating system.
Proceedings of the Korean Institute of Intelligent Systems Conference
/
1993.06a
/
pp.975-976
/
1993
This talk presents the overview of the author's research and development activities on fuzzy inference hardware. We involved it with two distinct approaches. The first approach is to use application specific integrated circuits (ASIC) technology. The fuzzy inference method is directly implemented in silicon. The second approach, which is in its preliminary stage, is to use more conventional microprocessor architecture. Here, we use a quantitative technique used by designer of reduced instruction set computer (RISC) to modify an architecture of a microprocessor. In the ASIC approach, we implemented the most widely used fuzzy inference mechanism directly on silicon. The mechanism is beaded on a max-min compositional rule of inference, and Mandami's method of fuzzy implication. The two VLSI fuzzy inference chips are designed, fabricated, and fully tested. Both used a full-custom CMOS technology. The second and more claborate chip was designed at the University of North Carolina(U C) in cooperation with MCNC. Both VLSI chips had muliple datapaths for rule digital fuzzy inference chips had multiple datapaths for rule evaluation, and they executed multiple fuzzy if-then rules in parallel. The AT & T chip is the first digital fuzzy inference chip in the world. It ran with a 20 MHz clock cycle and achieved an approximately 80.000 Fuzzy Logical inferences Per Second (FLIPS). It stored and executed 16 fuzzy if-then rules. Since it was designed as a proof of concept prototype chip, it had minimal amount of peripheral logic for system integration. UNC/MCNC chip consists of 688,131 transistors of which 476,160 are used for RAM memory. It ran with a 10 MHz clock cycle. The chip has a 3-staged pipeline and initiates a computation of new inference every 64 cycle. This chip achieved an approximately 160,000 FLIPS. The new architecture have the following important improvements from the AT & T chip: Programmable rule set memory (RAM). On-chip fuzzification operation by a table lookup method. On-chip defuzzification operation by a centroid method. Reconfigurable architecture for processing two rule formats. RAM/datapath redundancy for higher yield It can store and execute 51 if-then rule of the following format: IF A and B and C and D Then Do E, and Then Do F. With this format, the chip takes four inputs and produces two outputs. By software reconfiguration, it can store and execute 102 if-then rules of the following simpler format using the same datapath: IF A and B Then Do E. With this format the chip takes two inputs and produces one outputs. We have built two VME-bus board systems based on this chip for Oak Ridge National Laboratory (ORNL). The board is now installed in a robot at ORNL. Researchers uses this board for experiment in autonomous robot navigation. The Fuzzy Logic system board places the Fuzzy chip into a VMEbus environment. High level C language functions hide the operational details of the board from the applications programme . The programmer treats rule memories and fuzzification function memories as local structures passed as parameters to the C functions. ASIC fuzzy inference hardware is extremely fast, but they are limited in generality. Many aspects of the design are limited or fixed. We have proposed to designing a are limited or fixed. We have proposed to designing a fuzzy information processor as an application specific processor using a quantitative approach. The quantitative approach was developed by RISC designers. In effect, we are interested in evaluating the effectiveness of a specialized RISC processor for fuzzy information processing. As the first step, we measured the possible speed-up of a fuzzy inference program based on if-then rules by an introduction of specialized instructions, i.e., min and max instructions. The minimum and maximum operations are heavily used in fuzzy logic applications as fuzzy intersection and union. We performed measurements using a MIPS R3000 as a base micropro essor. The initial result is encouraging. We can achieve as high as a 2.5 increase in inference speed if the R3000 had min and max instructions. Also, they are useful for speeding up other fuzzy operations such as bounded product and bounded sum. The embedded processor's main task is to control some device or process. It usually runs a single or a embedded processer to create an embedded processor for fuzzy control is very effective. Table I shows the measured speed of the inference by a MIPS R3000 microprocessor, a fictitious MIPS R3000 microprocessor with min and max instructions, and a UNC/MCNC ASIC fuzzy inference chip. The software that used on microprocessors is a simulator of the ASIC chip. The first row is the computation time in seconds of 6000 inferences using 51 rules where each fuzzy set is represented by an array of 64 elements. The second row is the time required to perform a single inference. The last row is the fuzzy logical inferences per second (FLIPS) measured for ach device. There is a large gap in run time between the ASIC and software approaches even if we resort to a specialized fuzzy microprocessor. As for design time and cost, these two approaches represent two extremes. An ASIC approach is extremely expensive. It is, therefore, an important research topic to design a specialized computing architecture for fuzzy applications that falls between these two extremes both in run time and design time/cost. TABLEI INFERENCE TIME BY 51 RULES {{{{Time }}{{MIPS R3000 }}{{ASIC }}{{Regular }}{{With min/mix }}{{6000 inference 1 inference FLIPS }}{{125s 20.8ms 48 }}{{49s 8.2ms 122 }}{{0.0038s 6.4㎲ 156,250 }} }}
Kim, Hyeon-Joong;Kwon, Oh-Kyung;Cha, Dong-An;Kim, Yong-Chan
Transactions of the Korean Society of Mechanical Engineers B
/
v.35
no.12
/
pp.1285-1292
/
2011
The characteristics of a semiconductor chiller system with EEV have been experimentally studied. Three experiments on temperature changes (increase and decrease), load variation, and control precision were conducted to investigate the operating characteristics of the semiconductor chiller. The power consumption was 8.9 kW during increase in temperature. The required time was 37.5 min for CH1 and 39.5 min for CH2. Moreover, the time required for falling temperature was 26.5 min. The control precision for partial load operation was relatively low compared to that of a full load operation. In addition, the CH2 equipped with a step motor showed better control precision. The power consumed by the chiller for process cooling water was 1.8 kW, which was one-half of that consumed during the refrigeration cycle. The objective of this study is to provide an optimal control guideline for the semiconductor chiller design.
Journal of Korean Tunnelling and Underground Space Association
/
v.20
no.6
/
pp.1161-1175
/
2018
An unexpected event could be easily followed by a large secondary accident due to the limitation in sight of drivers in road tunnels. Therefore, a series of automated incident detection systems have been under operation, which, however, appear in very low detection rates due to very low image qualities on CCTVs in tunnels. In order to overcome that limit, deep learning based tunnel incident detection system was developed, which already showed high detection rates in November of 2017. However, since the object detection process could deal with only still images, moving direction and speed of moving vehicles could not be identified. Furthermore it was hard to detect stopping and reverse the status of moving vehicles. Therefore, apart from the object detection, an object tracking method has been introduced and combined with the detection algorithm to track the moving vehicles. Also, stopping-reverse discrimination algorithm was proposed, thereby implementing into the combined incident detection processes. Each performance on detection of stopping, reverse driving and fire incident state were evaluated with showing 100% detection rate. But the detection for 'person' object appears relatively low success rate to 78.5%. Nevertheless, it is believed that the enlarged richness of image big-data could dramatically enhance the detection capacity of the automatic incident detection system.
Kim, Seung-Jun;Ko, Young-Hun;Kim, Jung-Gyu;Seo, Man-Keun;Kim, Jong-Gwan
Tunnel and Underground Space
/
v.32
no.3
/
pp.194-202
/
2022
An increased number of cases have occurred in applying ICT technology in the resource development field due to factors such as safety, eco-friendliness, and low cost since the 2000s. In Korea, the 2nd mining master plan specified the significance of converging the full cycle of mining and ICT, while the 3rd mining master plan highlighted ICT and smart mining such as supporting the supply of an ICT mining device and introducing demonstrational smart mining. This study introduces the application of an ICT device and safety system operation in the Jangseong underground mine of Korea Cement Co., Ltd. Currently, Jangseong mine combines two different kinds of 3D equipment including the handheld 3D scanner and multi-station that provides both the measurement and 3D scanning to perform a 3D measurement of the mine. Taken from the 3D measurement of the mine, it is now possible to identify any hazardous areas and abnormalities in different directions and analyze the safety of the crown pillar between two stopes in different level. Besides, the real-time location tracking and communications system have established highly efficient rescue and evacuation plans to effectively deal with any accidents in the mine.
Child policy has focused on needy children with special emphasis on residual services but youth policy has implemented to promote capabilities of general adolescents by various activities. The fragmented implementation of child-youth policy by several ministries resulted in possible redundancy of target groups and insufficient service delivery system. Thus, the Ministry of Health, Welfare, and Family Affairs has pushed forward to integrate service delivery systems in child-youth policy after the former Ministry of Health and Welfare and the Government Youth Commission were integrated as part of a government reorganization plan. The purpose of this study is to review limitations of Lee Myung-bak government's plan to integrate child-youth policy and to make important suggestions for effective integration. Lee Myung-bak government's plan seeks to help children and adolescents prepare for the future and move forward with dreams and hope. However, this plan has fatal problems of overemphasizing the efficiency of finance without expansion of budget for children and adolescents. To achieve well-being tailored to one's life cycle, the full-scale expansion of budget is indispensible through the induction of the special fund or the special tax for children and adolescents. Fortunately, Lee Myung-bak government recognized child-youth policy as the social investment that would heighten national competitiveness in the long term, but there was insufficient child-youth policy infrastructure for new implementation. Therefore, Lee Myung-bak government needs a new design for integrated and universal child-youth policy that should take into account national human resource development plan and its economic development policy. The public responsibility for children and adolescents should be strengthened and, in addition, the network function in service delivery system should be complemented.
Journal of Korea Spatial Information System Society
/
v.11
no.1
/
pp.145-156
/
2009
Ubiquitous City(U-City) in Korea is not a fantastic wonderland but an on-going real phenomenon. Many researchers so far have mainly dealt with a rosy future where U-City would potentially promise the high Quality of Life and positive economic effects. However, a suspicion of unexpected disadvantages can be able to take place in the bright future of U-City : the running cost of U-City. Without full consideration of it, descendants living in the U-City in near future will suffer from the heavy burden in operating the U-City. Given this circumstantial background, the aim of this study is to indicate potential solutions to address a sustainable U-City controlled by the virtuous cycled mechanism toward a self-sufficient city, which will illuminate a new paradigm of the city history. Solutions were sought from the several viewpoints, which were behavioral and institutional aspects, developing profitable business models and core technologies applicable to U-City, and building self-owned networks. Based on this preliminary study, further efforts and devotion to seeking virtuous-cycled U-City model will contribute to bringing a prominent future of U-City whose belongings will be able to manage to enjoy better quality of life.
In this study, a DNA-launched reverse genetics system was developed from a type 2 porcine reproductive and respiratory syndrome virus (PRRSV) strain, KNU-12. The complete genome of 15,412 nucleotides was assembled as a single cDNA clone and placed under the eukaryotic CMV promoter. Upon transfection of BHK-tailless pCD163 cells with a full-length cDNA clone, viable and infectious type 2 progeny PRRSV were rescued. The reconstituted virus was found to maintain growth properties similar to those of the parental virus in porcine alveolar macrophage (PAM) cells. With the availability of this type 2 PRRSV infectious clone, we first explored the biological relevance of ORF5a in the PRRSV replication cycle. Therefore, we used a PRRSV reverse genetics system to generate an ORF5a knockout mutant clone by changing the ORF5a translation start codon and introducing a stop codon at the 7th codon of ORF5a. The ORF5a knockout mutant was found to exhibit a lack of infectivity in both BHK-tailless pCD163 and PAM-pCD163 cells, suggesting that inactivation of ORF5a expression is lethal for infectious virus production. In order to restore the ORF5a gene-deleted PRRSV, complementing cell lines were established to stably express the ORF5a protein of PRRSV. ORF5a-expressing cells were capable of supporting the production of the replicationdefective virus, indicating complementation of the impaired ORF5a gene function of PRRSV in trans.
Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
/
v.28
no.2
/
pp.89-95
/
2017
Background and Objectives : High-speed videolaryngoscopy (HSV) is the only technique that captures the true intra-cycle vibratory behavior of the vocal folds by capturing full images of the vocal folds. However, it has problems of no immediate feedback during examination, considerable waiting time for digital kymography (DKG), recording duration limited to a few seconds, and extreme demands for storage space. Herein, we demonstrate a new post-processing method that converts HSV images to two-dimensional digital kymography (2D-DKG) images, which adopts the algorithm of 2D videokymography (2D VKG). Materials and Methods : HSV system was used to capture images of vocal folds. HSV images were post-processed in Kay image-process software (KIPS), and conventional DKG images were retrieved. Custom-made post-processing system was used to convert HSV images to 2D-DKG images. The quantitative parameters of the post-processed 2D-DKG images was validated by comparing these parameters with those of the DKG images. Results : Serial HSV images for all phases of vocal fold vibratory movement are included. The images were converted by the scanning method using U-medical image-process software. Similar to conventional DKG, post-processed 2D DKG image from the HSV image can provide quantitative information on vocal fold mucosa vibration, including the various vibratory phases. Differences in amplitude symmetry index, phase symmetry index, open quotient, and close quotient between 2D-DKG and DKG were analyzed. There were no statistical differences between the quantitative parameters of vocal fold vibratory movement in 2D-DKG and DKG. Conclusion : The post-processing method of converting HSV images to 2D DKG images could provide clinical information and storage economy.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.