Journal of the Korean Institute of Landscape Architecture
/
v.45
no.4
/
pp.104-117
/
2017
This study compares the results of landscape image analysis using text mining techniques and factor analysis for Lotte World Tower, which is the first atypical skyscraper building in Korea, and identifies landscape images of the site to determine possibilities of use. Lotte World Tower's landscape image has been extracted from text mining analysis focusing on adjectives such as 'new', 'transformational', 'unusual', 'novelty', 'impressive', and 'unique', and phrases such as in the process of change, people's active elements(caliber, outing, project, night view), media(newspaper, blog), and climate(weather, season). As a result of the factor analysis, factors affecting the landscape image of Lotte World Tower were symbolic, aesthetic, and formative. Identification, which is a morphological feature, has characteristics of scale and visibility but it is not statistically significant in preference. Rather, the psychological factors such as the symbolism with characteristics such as poison and specialty, harmony with the characteristics of the surrounding environment, and beautiful aesthetic characteristics were an influence on the landscape image. The common results of the two research methods show that psychological characteristics such as factors that can represent and represent the city affect the landscape image more greatly than the morphological and physical characteristics such as location and location of the building. In addition, the text mining technique can identify nouns and adjectives corresponding to the images that people see and feel, and confirms the relationship between the derived keywords, so that it can focus the process of forming the landscape image and further the image of the city. It would appear to be a suitable method to complement the limitation of landscape research. This study is meaningful in that it confirms the possibility that big data can be utilized in landscape analysis, which is one research field of landscape architecture, and is significant for understanding the information of a big data base and contribute to enlarging the landscape research area.
Hacking has raised many critical issues in the modern world, particularly because the size and cost of the damages caused by this disruptive activity have steadily increased. Accordingly, many significant studies have been conducted by behavioral scientists to understand hackers and their practices. Nonetheless, only qualitative methods, such as interviews, meta-studies, and media studies, have been employed in such studies because of hacker sampling limitations. Existing studies have determined that intrinsic motivation was the dominant factor influencing hackers, and that their techniques were mainly acquired from online hacking communities. However, such results have yet to be causally proven. This study attempted to identify the causal factors influencing the motivational and environmental factors encouraging hackers to learn hacking skills. To this end, hacker community members using the theory of planned behavior were observed to identify the causal factors of their learning of hacking skills. We selected a group of students who were developing their hacking skills. The survey was conducted over a two-week period in May 2015 with a total of 227 students as respondents. After list-wise deletion, 215 of the responses were deemed usable (94.7 percent). In summary, the hackers were aware that hacking skills are considered socially unethical, and their attitudes toward the learning of hacking skills were affected by both intrinsic and extrinsic motivations. In addition, the characteristics of the online hacking community affected their perceived behavioral control. This study introduced new concepts in the process of conducting a causal relationship analysis on a hacker sample. Moreover, this research expanded the discussion on the causal direction of subjective norms in unethical research, and empirically confirmed that both intrinsic and extrinsic motivations affect the learning of hacking skills. This study also made a practical contribution by raising the educational and policy response issues for ethical hackers and demonstrating the necessity to intensify the punishment for hacking.
This study was conducted to develope the new solid separating system which can be efficiently and economically removed the solid parts in high pollutants concentration of pig slurry. The pollutants concentration, BOD$_{5}$ , COD and SS of the slurry used in this study was 15,990($\pm$2,389)mg/l, 20,004($\pm$5,512)mg/l and 26,486($\pm$5,935)mg/l, respectively. After removal of solid part in slurry, the pollutants concentration, BOD$_{5}$, COD and SS was change into 5,617($\pm$690)mg/l, 5,553($\pm$633)mg/land 1,456($\pm$341)mg/l, respectively in the Fixed biological membrane tank. The reduction of the pollutants concentration of suspend liquid through membrane will be allowed to greatly improve the water purification by an Activated sludge method. This separating system consisted of a temporary storage, a circulating tank and a Fixed Biological membrane tank. A temporary storage which has a draining system of screw type and an aeration device played a tremendous role in draining the solid by filled an aeration of 0.3 l/min. A Fixed Biological membrane tank of which a styrofoam filled in a 2/3 volume as a Biological media was fixed by a stainless steel net (pore size : 0.5mm) to separate the liquid layer of influx in them. The separating system efficiency factors were the speed of screw motor, cycle number of slurries in a circulating tank and moisture contents of solid effluent through the screw path. Although the pollutants concentration was very variable in temporary storage, the final concentration of $BOD_5$ and SS, except COD of the suspended liquid in a Fixed biological membrane were not different regardless of cycle number of a circulating tank. Moisture contents of effluent from temporary storage was 73% under the speed 1 ppm of screw motor and 62% under the 1/4rpm of it.
Park H.;Kim J. Y.;Kim J. Y.;Lee J. H.;Park H. D.;Kim J. M.
Journal of Embryo Transfer
/
v.19
no.3
/
pp.245-255
/
2004
In recent years, an increasing number of studies on pig in vitro maturation(IVM) and in vitro fertilization(IVF) have been separated. the wide range of new technologies, including that in applied molecular genetics, has increased this interest. the production of viable porcine embryos in vitro is a prerequisites for the successful production of transgenic pigs to date. The efficiency of IVM/IVF techniques in the porcine is lower than that obtained in other species such as cattle and mouse. The several problems are generally thought to be the cause of poor results: the low rate of MPN formation derived from inadequate IVM of oocytes, the high incidence of polyspermy after IVF and cell blocking at 4 cell during embryos culture. For there reasons overcoming, many studies have been conducted to improve in vitro embryo-genic competence of oocytes. In the last several years, many maturation culture media have been evaluated and various exogenous factors such as hormones and grows factors have been tested to improve the efficiency of porcine in vitro system. In the study several antioxidants have been examined to improve in vitro fertilization and development of porcine oocytes. In this study, several antioxidants were examined to determine the effects on the development of oocytes to the cleavage, morula and blastocyst stage when added at the maturation(IVM) or in vitro fertilization(IVF) or in vitro culture(IVC) of porcine embryos. Porcine oocytes were matured, fertilized and embryos were cultured in defind conditioned medium in vitro with or without supplementation with the antioxidents of cysteine, catalase and glutathione. 1. Significant improvement of blastocyst rate (27.2% versus 15.4%, p<0.05) were achieved when catalase(500U/$m\ell$) were added to TCM-199 medium and morula rate(72.0% versus 53.9%, p<0.05) were significantly higher when glutathione(1.0mM/$m\ell$) were added to TCM-199 medium than those of control. 2. In mTBM medium for oocytes fertilization, the addition of cysteine, catalase and glutathione had no positive effect on embryonic development. glutathione had no positive effect on embryonic development. In conclusion, this study shows that addition of catalase, gluththione during IVM improved the rate of porcine embryo development.
Kim, Hyun;Cho, Young Moo;Han, Jae Yong;Choi, Sung Bok;Byun, Mi Jeong;Kim, Young Sin;Ko, Yeoung-Gyu;Seong, Hwan-Hoo;Kim, Sung Woo
Korean Journal of Poultry Science
/
v.41
no.4
/
pp.249-259
/
2014
Cryopreserving cells which are maintaining their viability are the very complex process. This study has been carried out in order to find the effects of cryopreservation steps and freezing media on the rates of viability of cryopreserved chicken primordial germ cells (PGCs). PGCs obtained from the germinal gonade of 5.5~6 day (stage 28) chick embryos of Korean Ogye (KO) and Commercial breeds (C), using the MACS method were suspended in a freezing medium containing a freezing and protecting agents (e.g. dimethyl sulfoxide (DMSO), ethylene glycol (EG) and propylene glycol (PG)). Gonads were harvested from stage 28 chick embryos and pooled in groups of 5, 10, 15, 20E embryos, contributing gonads to the cell suspension. The gonadal cells, including PGCs, were then frozen in 1 of the following cryoprotectant treatments : 2.5%, 5%, 10%, 15% and 0% cryoprotectant (DMSO, EG, PG) as a control. Effects of exposure to slow freezing and vitrification, with different concentrations of the cryoprotectant solution, were examined. After vitrification and slow freezing, survival rates of the frozen-thawed PGCs from the 10% EG plus FBS treatment were 85.63%, and 66.14% (p<0.05), respectively. The viability of PGCs after freeze-thawing was significantly higher for 10% EG plus FBS treatment than for 10% PG + FBS treatment (p<0.05) (85.63% vs 66.81%) by vitrification. This study established a method for preserving chicken PGCs that enables systematic storage and labeling of cryopreserved PGCs in liquid ($LN_2$) at a germplasm repository and ease of entry into a data base. In the future, the importance for this new technology is that poultry lines can be conserved while work is being conducted on improving the production of germline chimeras.
Journal of the Institute of Electronics Engineers of Korea TC
/
v.46
no.12
/
pp.108-116
/
2009
In this paper, we propose a Ethernet based audio distribution system with a new L1/L2 hybrid switching scheme, and evaluate its performance. The proposed scheme not only offers guaranteed low latency and jitter characteristics that are essentially required for the distribution of high-quality uncompressed audio traffic, and but also provide an efficient transmission of data traffic on the Ethernet environment. The audio distribution system with a proposed scheme consists of a master node and a number of relay nodes, and all nodes are mutually connected as a daisy-chain topology through up and downlinks. The master node generates an audio frame for each cycle of 125us, and the audio frame has 24 time slotted audio channels for carrying stereo 24 channels of 16-bit PCM sampled audio. On receiving the audio frame from its upstream node via the downlink, each intermediate node inserts its audio traffic to the reserved time slot for itself, then relays again to next node through its physical layer(L1) transmission - repeating. After reaching the end node, the audio frame is loopbacked through the uplink. On repeating through the uplink, each node makes a copy of audio slot that node has to receive, then play the audio. When the audio transmission is completed, each node works as a normal L2 switch, thus data frames are switched during the remaining period. For supporting this L1/L2 hybrid switching capability, we insert a glue logic for parsing and multiplexing audio and data frames at MII(Media Independent Interlace) between the physical and data link layers. The proposed scheme can provide a good delay performance and transmission efficiency than legacy Ethernet based audio distribution systems. For verifying the feasibility of the proposed L1/L2 hybrid switching scheme, we use OMNeT++ as a simulation tool with various parameters. From the simulation results, one can find that the proposed scheme can provides outstanding characteristics in terms of both jitter characteristic for audio traffic and transmission efficiency of data traffics.
Cho, Ky Young;Lee, Jung Ah;Cho, Sung Eun;Kim, Nam Hee;Lee, Jin A;Hong, Ki Sook;Lee, Hoan Jong;Kim, Kyung Hyo
Clinical and Experimental Pediatrics
/
v.50
no.2
/
pp.151-156
/
2007
Purpose : Streptococcus pneumoniae is a major etiologic agent for pneumonia, meningitis, otitis media, and sepsis among young children. Multi-drug resistant strains have raised great concern worldwide, thus the importance of prevention with vaccines has been emphasized. However, vaccines may force the appearance of pneumococcal infections by nonvaccine serotypes. Thus, distribution of pneumococcal serotypes should be monitored to estimate vaccine efficacy. We used a new and efficient multibead assay in determining pnemococcal serotypes. Methods : From January to February 2005, 643 children were recruited from ten day care centers to isolate pneumococci from their oropharynx. Pneumococcal serotyping was performed on 62 pneumococcal isolates from 60 children by multibead assay. This immunoassay required two sets of latex particles coated with pneumococcal polysaccharides and serotype-specific antibodies. Twenty four newly developed monoclonal antibodies specific for common serotypes and a pool of polyclonal rabbit sera for some of the less common serotypes were used. Results : The most prevalent pneumococcal serotypes were serotype 6A, 19A, 19F, 23F, and 11A/D/F which accounted more than 50 precent of all the 62 pneumococcal isolates. We found that multibead assay can be performed very rapidly and objectively. Conclusion : This multibead immunoassay was very useful in serotyping clinical isolates of S. pneumoniae because it was simple, reliable and fast.
Lee, Jee Young;Choi, Ui-Yoon;Lee, Soo Young;Lee, Ji-Young;Lee, Byong Chan;Hwang, Hui Sung;Mok, Hye Rin;Jeong, Dae Chul;Chung, Seung Yun;Kang, Jin Han
Clinical and Experimental Pediatrics
/
v.50
no.7
/
pp.622-628
/
2007
Purpose : While pediatric observation units (POU) have become a common practice in hospitals throughout developed countries, there has been no report about POUs in Korea so far. The aims of this study were to analyze our one-year's experience of the POU and to decide which disease entities are suitable for the POU. Methods : All children admitted from March 2006 to February 2007 to the POU at the Department of Pediatrics in Our Lady of Mercy Hospital were included in this study. Data were collected from retrospective reviews of their medical records. Results : There were a total of 1,076 POU admissions. Median age of patients was 2.4 years and median length of hospital stay 14.0 hours. The most common diagnoses were gastroenteritis (42.7%), pharyngotonsillitis (19.1%), bronchiolitis (7.8%), pneumonia (5.5%) and febrile seizure (5.2%). Overall, 7.5% of the POU patients required subsequent inpatient admissions due to hospital stays of longer than 48 hours. The disease entities that were most likely to require inpatient admission were pneumonia (17.0%), febrile seizure (12.5%) and asthma (11.5%). Diseases that allowed successful discharge from the POU were gastroenteritis (4.6%), upper respiratory tract infection (5.8%), such as otitis media and pharygnotonsillitis and seizure disorder (6.4%). Compared with the previous year when the POU was not in operation, there was a statistically significant reduction in the average length of hospital stays (from 4.69 to 3.75 days), as well as a rise in the bed turnover rate (from 78.8 to 98.2 patients/bed). Conclusion : Our study shows that the POU is efficient for the management of children with certain acute illnesses. Based on this study, we suggest that the POU be used as a new modality which links between the outpatient, inpatient, and emergency departments in the field of pediatrics in Korea.
Yoon, Younghan;Lim, Hyun Man;Kim, Weon Jae;Jung, Jin Hong;Park, Jae-Roh
Ecology and Resilient Infrastructure
/
v.3
no.4
/
pp.221-230
/
2016
Multi-functional floating wetland island (mFWI) was developed in order to prevent algal bloom and to improve water quality through several unit purification processes. A test bed was applied in the stagnant watershed in an urban area, from the summer to the winter season. For the advanced treatment, an artificial phosphorus adsorption/filtration medium was applied with micro-bubble generation, as well as water plants for nutrient removal. It appeared that the efficiency of chemical oxygen demand (COD) and total phosphorus (T-P) removal was higher in the warmer season (40.9%, 45.7%) than in the winter (15.9%, 20.0%), and the removal performance (suspended solid, chlorophyll a) in each process differs according to seasonal variation; micro-bubble performed better (33.1%, 39.2%) in the summer, and the P adsorption/filtration and water plants performed better (76.5%, 59.5%) in the winter season. From the results, it was understood that the mFWI performance was dependent upon the pollutant loads in different seasons and unit processes, and thus it requires continuous monitoring under various conditions to evaluate the functions. In addition, micro-bubbles helped prevent the formation of anaerobic zones in the lower part of the floating wetland. This resulted in the water circulation to form a new healthy aquatic ecosystem in the surrounding environment, which confirmed the positive influence of mFWI.
Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.