Jun-Myung Choi;Junhyuk Ha;Ranyeong Choi;Jun-Yeop Lee
Journal of Radiation Industry
/
v.18
no.3
/
pp.167-171
/
2024
Technetium-99 (99Tc) is recognized as a critical concern in the disposal of spent nuclear fuel due to its long half-life and remarkable stability, existing predominantly as TcO4- in the natural environment. The anionic form of technetium is highly soluble and mobile, posing significant environmental risks from the viewpoint of nuclear waste management. Thus, developing efficient and cost-effective sorbents for aqueous Tc(VII) is essential for mitigating relevant contamination. In the present work, the adsorption characteristics of Re(VII), a chemical analog of Tc(VII), were investigated using the clay mineral bentonite, modified with two different organic cations: hexadecylpyridinium (HDPy) and hexadecyltrimethylammonium (HDTMA). Sorption experiments were conducted at a liquid-to-solid ratio of 1 g/L with Re(VII) solutions prepared at concentrations from 10-4 mol/L to 10-6 mol/L. The sorption ratio and distribution coefficients were determined with samples collected at reaction times of 10, 50, 100, and 500 minutes after 0.45 ㎛ syringe filtration. In parallel, the modified bentonite samples were further analyzed using the X-ray diffraction (XRD) method to understand the adsorption mechanism of Re(VII) onto the target minerals. According to the quantification analysis results, a rapid equilibrium reaction of aqueous Re(VII) for all modified bentonite samples was identified. Moreover, near-complete adsorption of Re(VII) was observed when the bentonite was modified at 200-400% of its cation exchange capacity (CEC) for both organic cations. For cases of lower modification, the HDTMA-modified bentonite showed relatively higher adsorption efficiency compared with the one modified with HDPy. This result was inferred to be due to the difference in inter-layer spacing based on the characteristics of the organic cations. It is expected that the results obtained through this study will serve as a preliminary case for the synthesis of adsorbents for the retardation of highly mobile anionic radionuclides, such as I and Tc, in the natural environment.
In the field of fisheries, there is at the apex Central Federation of Fishery Cooperatives, established under the Fishery Cooperatives Law(1962), It is a multipurpose organization with a membership of 105 cooperatives, 87 regional cooperatives, 15 business-type cooperatives and 3 manufactures' cooperatives. Accordingly, this thesis examines the marketing of fishery cooperatives in Korea, and in particular considers the marketing channel strategy of fisheries products. No company can perform by itself all the activities involved in the production and distribution of its products and services to its final markets. It must work with other firms to get the job done. Thus marketing channel firms of the fisheries products include primarily the fishery cooperatives, the licensed In the field of fisheries, there is at the apex Central Federation of Fishery Cooperatives, established under the Fishery Cooperatives Law (1962). It is a multipurpose organization with a membership of 105 cooperatives, 87 regional cooperatives, 15 business-type cooperatives and 3 manufactures' cooperatives. Accordingly, this thesis examines the marketing of fishery cooperatives in Korea, and in particular considers the marketing channel strategy of fisheries products. No company can perform by itself all the activities involved in the production and distribution of its products and services to its final markets. It must work with other firms to get the job done. Thus marketing channel firms of the fisheries products include primarily the fishery cooperatives, the licensed dealers and the merchant middlemen. The goal of marketing is in matching of segments of supply and demand. Every producer seeks to the link the marketing channel firms that will help it accomplish its objective best. This thesis tries to attempt to improve the present Korean Fishery Cooperatives marketing activities. The purpose of the operation of fishery cooperatives is to guarantee the profits of fisherman as well as the interests of general consumers by eliminating the inordinate profits of middlemen and by narrowing other market margins. Fishery cooperatives marketing activity functions forming a self-helf organization for economic protection of producers themselves, and acting as a market reformational institution through its transaction by group. The following are the characteristics of fishery cooperatives marketing. \circled1 Fishery cooperatives is organized with an economic factor and a personnel factor. \circled2 Fishery cooperatives is non-profit organization. \circled3 The members of fishery cooperatives is independent constitution of economy, but they are closely connected with the cooperative. \circled4 Fishery cooperatives is a mutual aid organization. The objective of an efficient marketing strategy may be well described by the common saying provides the right product at the right time, the right place, and the right price. But it is quite true that the Korean Fishermen's Cooperative can be said to owe its development to the successful implementation of the marketing system. The use of the marketing system has resulted in the following marketing strategy. 1. The direct marketing system. \circled1 The cooperation between the fishery cooperatives and the other cooperative through the collection and delivery center. \circled2 The selling between the fishery cooperatives and the large scale retailers through the process industry. 2. The vertical marketing system. \circled1The fishermen's cooperative to be nominated by wholesaler in the terminal market. \circled2 Contracted vertical marketing system. \circled3 Abolition of selling by double auction in the landing and the terminal market. 3. The physical distribution system. \circled1 The need for adoption of cold chain system to connect production directly to consumption. \circled2 The need for more expansion of landing markets and terminal market facilities. Solutions to the problems of the Korean fishery are made possible through effective functioning of cooperative marketing activities of fishery products. The marketing concept of fishermen's cooperative lies in the satisfaction of consumer needs. According to the marketing concept fishermen's cooperative should try to satisfy customer's needs through a coodinated set of activities that allows the organization to achieve its goal. Providing satisfaction to customers is the major trust of the marketing concept. To do this, a business must find out what will satisfy customers. With this information the cooperative sells to the greatest possible number of customers through the most efficient sales and marketing channels. Economic rationality of fishermen's cooperative marketing lies in reduction of marketing cost and elimination of intermediate institutions. Cooperative marketing and direct marketing are both indispensable marketing factors for a new cooperative organization among the manu ways. The cooperation between the fishermen's cooperative and the others cooperative, and vertical marketing system are the most necessary ones. Propulsion of cooperative marketing system could not be successful without the support of the marketing instituion's help. Consequently, successful cooperative marketing ought to lead to the necessity not only for the improvement of marketing organization, but for the application of a new marketing concept in the fishermen's cooperative.
Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.
Carbonized rice hull, neutralized by dilute nitric acid, was evaluated possibility as a bed matrial for sanitary cultivation. The growth response of Chinese Cabbage, lettuce, and spinach on the carbonized rice hull supplemented with different kinds and concentrations of available nutrition solution was accessed. The ideal nitrogen concentration of nutrition solution was 126 mg/l. Both solutions of compound fertilizer and nutrition containing microelements showed no difference in growth and chemical components of vegetables. Therefore, compound fertilizer was thought to be better than nutrition owing to the convenience of handling in practice. The gravel was also evaluated as supporting material of carbonized rice hull. Because of lasting latent heat in gravel, the mixing treatment of carbonized rice hull and gravel(7~10cm in diam.) was efficient to the growth resulting in the highest dry weight per plant, but the heavy weight of gravel made the handling very difficult. Light carbonized rice hull showed the better plant growth and ease handling, compared to the mixture of soil and compost, and had enough supporting capacity. Therefore, carbonized rice hull was thought to be a desirable bed material for environmentally controlled cultivation.
Kim, Jeong-Hyun;Kang, Hee-Joo;Kim, Kyung-Tae;Kim, Hyun-Soo;Hwang, Seong-Hee;Kim, Yong-Chul;Kim, Pan-Gyi
Journal of Environmental Health Sciences
/
v.30
no.4
/
pp.329-343
/
2004
We conducted to investigate citizen's attitude to the treatment of food waste in Yongin city. The respondent of $41.81\%$ throws the food waste eliminate from home and store less than 1l in Yongin. When they dump the food waste, they speak out the inconvenience of damaged envelope by animals in case of home and store. This caused troubles for reason of sanitary. So a local autonomous entity must carefully consider of expand use specially designed container as like apartment house. They give an answer that the collecting time of food waste is suitable form dawn till morning. This answer shows the satisfaction of the period time to collect the food waste. They prefer to be appointed the exclusive place to collect food waste. The service interval of collect is suitable 1 time a day. They want to increase the number of washing of the collecting container. This is good method for sanitary condition, but the care of the period time to collect the food waste is more efficient than the care of the number of washing the collecting container. The care of the period time minimizes to incur the enmity of the people and to pollute in environment. The major of respondent handled the food waste after keeping the basket or a kit. This fact shows to us almost citizen doesn't feel the seriousness to remove the moisture of the food waste. Recently, many solutions which can be disposal efficiently are getting magnified and improved owing to increase utilities channel to loss in quantities and dry the food waste. We expect the reduction of food waste is solved getting easily step by step. The results of the awareness about the facility of food waste show citizen prefer recycling facility to the other facilities. If recycle facility and incineration facility are constructed, they were worried about bed smell. When some facility of the food waste is constructed, they have to maintain and to handle not to incur the enmity of the people. The spread rate of specially designed container already increased, the citizen set a high value on the use of specially designed container more than amount-rate vinyl envelope that people have used for several years. In the cost treatment about food waste, the major respondent answered the use cost of specially designed container is suitable price. So we can know the use charge is proper level. The majority of citizen more prefer autonomous plan which voluntary atmosphere creation and public information by mass media than levy system and rising treatment cost which forced plan. The citizens have pretty positive thinking of incineration, so the government needs more efforts for a public notice, which includes the incineration is no more than abandoned thing. Each of local self government has to sort the food waste and make kind of resource system related to collecting and carrying, constructing a suitable facility, proper disposal of the food waste and producing harmless in our surrounding in order to solve the invisible problems. To do above mentioned things, we have to analyze referred several problems till now. Also, to minimize the side effect, the government will have to improve through enforce the system.
Journal of Korean Home Economics Education Association
/
v.23
no.3
/
pp.69-90
/
2011
To develop the descriptive evaluation questionnaire with high validity and reliability on the Clothing and Textiles section of the middle school Technology & Hone Economics textbook, apply it to students and analyze its results. We made out a draft for descriptive evaluation questionnaire that was based upon the concrete establishment of the goal and the range of evaluation. We also made a rubric for scoring as well as sample answer-sheets. Finally, we completed a total of twenty three descriptive evaluation questions and we applied it to sixty five 2nd-grade students in two classes in a middle school. Descriptive evaluation questionnaire exhibited the relative high validity on each question. Moreover, three graders gave the same score on each question of descriptive evaluation, suggesting that descriptive evaluation questionnaire has the high inter-grader reliability and the strong correlation. But, low academic achievement was generally observed in the subjects. They had difficulty in describing their knowledge via their own language and drawing up accurate and detailed answers. They recognized the positive aspects of descriptive evaluation questionnaire, but they felt it uncomfortable due to study-burden and description itself. To overcome these limitations, it is required that students should experience various materials related to subject contents in classes as well as textbooks, concentrate themselves on finding solutions for problems, expand their scope, and practice describe them in advance. Therefore, the additional training for description evaluation questionnaire will be necessary for the more efficient and discriminative questionnaire. Also the questionnaire with high validity and reliability should be developed and the aggressive and voluntary participation of teachers will be needed.
The performance of the multiprocessor systems is limited by the several factors. The system performance is affected by the processor speed, memory delay, and interconnection network bandwidth/latency. By the evolution of semiconductor technology, off the shelf microprocessor speed breaks beyond GHz, and the processors can be scalable up to multiprocessor system by connecting through the interconnection networks. In this situation, the system performances are bound by the latencies and the bandwidth of the interconnection networks. SCI, Myrinet, and Gigabit Ethernet are widely adopted as a high-speed interconnection network links for the high performance cluster systems. Performance improvement of the interconnection network can be achieved by the bandwidth extension and the latency minimization. Speed up of the operation clock speed is a simple way to accomplish the bandwidth and latency betterment, while its physical distance makes the difficulties to attain the high frequency clock. Hence the system performance and scalability suffered from the interconnection network limitation. Duplicating the link of the interconnection network is one of the solutions to resolve the bottleneck of the scalable systems. Dual-ring SCI link structure is an example of the interconnection network improvement. In this paper, I propose a network topology and a transaction path algorism, which optimize the latency and the efficiency under the duplicated links. By the simulation results, the proposed structure shows 1.05 to 1.11 times better latency, and exhibits 1.42 to 2.1 times faster execution compared to the dual ring systems.
The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component based software development to promote application interaction and integration both within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web service repositories not only be well-structured but also provide efficient tools for developers to find reusable Web service components that meet their needs. As the potential of Web services for service-oriented computing is being widely recognized, the demand for effective Web service discovery mechanisms is concomitantly growing. A number of techniques for Web service discovery have been proposed, but the discovery challenge has not been satisfactorily addressed. Unfortunately, most existing solutions are either too rudimentary to be useful or too domain dependent to be generalizable. In this paper, we propose a Web service organizing framework that combines clustering techniques with string matching and leverages the semantics of the XML-based service specification in WSDL documents. We believe that this is one of the first attempts at applying data mining techniques in the Web service discovery domain. Our proposed approach has several appealing features : (1) It minimizes the requirement of prior knowledge from both service consumers and publishers; (2) It avoids exploiting domain dependent ontologies; and (3) It is able to visualize the semantic relationships among Web services. We have developed a prototype system based on the proposed framework using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web service registries. We report on some preliminary results demonstrating the efficacy of the proposed approach.
The Journal of Korean Institute of Communications and Information Sciences
/
v.29
no.5C
/
pp.664-672
/
2004
Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.
EPMA determined that Fe(Mn)-(oxy)hydroxides and well-crystallized Fe-(oxy)hydroxides and could contain a small amount of As $(0.3-11.0\;wt.\%\;and\;2.1-7.4\;wt.\%\;respectively)$. Amorphous crystalline Fe-(oxy) hydroxide assemblages were identified as the richest in As with $28-36\;wt.\%$. On the ternary $As_2O_5-SO_3-Fe_2O_3$ diagram, these materials were interpreted here as 'scorodite-like'. Dissolved As was attenuated by the adsorption on Fe-(oxy) hydroxides and Fe(Mn)-(oxy) hydroxides and/or the formation of an amorphous Fe-As phase (maybe scorodite: $FeAsO_4\cdot2H_2O$). Leaching tests were performed in order to find out leaching characteristics of As and Fe under acidic conditions. At the initial pHs 3 and 5, As contents dissolved from tailings of the cheongyang mine significantly increased after 7 days due to the oxidation of As-bearing secondary minerals (up to ca. $2.4\%$ of total), while As of Seobo mine-tailing samples was rarely released (ca. $0.0-0.1\%$ of total). Dissolution experiments at an initial pH 1 liberated a higher amount of As (ca. $1.1-4.2\%$ of total for Seobo tailings, $1.5-14.4\%$ of total for Cheongyang tailings). In addition, good correlation between As and Fe in leached solutions with tailings was observed. The kinetic problems could be the important factor which leads to increasing concentrations of As in the runoff water. Release of As from Cheongyang tailings can potentially pose adverse impact to surface and groundwater qualities in the surrounding environment, while precipitation of secondary minerals and the adsorption of As are efficient mechanisms for decreasing the mobilities of As in the surface environment of Seobo mine area.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.