The solitary pulmonary nodule is considered as a round or ovoid lesion with sharp, circumscribed borders, surrounded by normal appearing lung parenchyme on all sides, and found on a simple chest X-ray without any particular symptoms or signs. There is a wide spectrum of pathologic conditions in the solitary pulmonary nodules prove to be malignant tumors, either primary or metastatic. Most Benign granulomas and other benign conditions can also be seen as solitary nodules. The resection of solitary malignant nodules results in a surprisingly high 5-year survival rate. On the contrary, most benign nodules do not need to be resected and a period of prolonged observation and nonsurgical management is usually indicated. Therefore, the best approach to the controversial management of solitary pulmonary nodules depends on finding factors affecting the probability of malignancy. In this article, clinical records and chest roentgenographies of 60 patients operated on over the past 8 years at the Department of Thoracic and Cardiovascular Surgery, Seoul National University Hospital were reviewed. There were 15 malignant nodules and 45 benign nodules and the prevalence of malignancy was 25%. The most common pathologic entity was tuberculoma [21 cases]. The mean age was 55.5*9.6 years in the malignant group, 45.8>12.5 years in the benign group and there was a significant statistical difference between the two groups [P < 0.05]. The malignant ratio in each age group increased with advancing age. The average smoking amount was 35.6*12.9 cigarettes per day in malignant smokers, 20.9* 12.0 cigarettes per day in benign smokers, and there was a significant statistical difference between the two groups [p< 0.05]. The malignant ratio also increased with the increasing smoking amount. Comparing the appearance of the nodule on chest films, 6 calcifications and 7 cavitations were found only in benign nodules, not in malignant nodules. Therefore, calcification and cavitation can be considered as preferential findings for benignity. Previous cancer history was also a significant factor deciding the prognosis of the nodule [p< 0.05]. The average diameter on chest X-ray was 3.07*0.82 cm in malignant nodules, 3.25*1.04 cm in benign nodules and there was no significant statistical difference between the two groups [p< 0.05]. The author used Bayes theorem to develop a simple method for combining individual clinical or radiological factors of patients with solitary nodules into an overall estimate of the probability that the nodule is malignant. In conclusion, patient age, smoking amount, appearance of nodule on chest film such as calcification and cavitation, and previous cancer history were found to be strongly associated with malignancy, but size of nodule was not associated with malignancy. Since these prognostic factors have been found retrospectively, prospective controlled studies are needed to determine whether these factors have really prognostic significance.
Journal of the Korean Society of Propulsion Engineers
/
v.4
no.4
/
pp.50-58
/
2000
Burning rate of the matrix propellant($r_{sb}$) and burning rate along the metal wire($r_w$) were measured and analyzed for the HTPB/AP/Al propellant embedded with Ag wire($\phi$0.15mm) according to weight % of RDX(0~20%). Variation of burning rate increment ratio($r_w$/$r_{sb}$) and pressure exponent(n) was studied for the nitramine propellant having 10% RDX embedded with three kinds of metal(Ag, Cu, and Ni-Cr) of which diameter range is between 0.1~0.6mm. Maximum burning rate increment ratio of the nitramine propellant embedded with Ag wire($\phi$0.1mm) was 5.94 at $20^{\cire}C$, 1000 psia, 16.4% faster than that of HTPB/AP propellant, it is because that autoignition temperature of the nitramine propellant was higher than that of HTPB/AP propellant. Standard deviation of absolute ($r_{wc}$/$r_{we}$)/$r_{we}$ calculated by using new empiracal equation composed of four dimensionless groups, is 6.11% less than that calculated by using original empirical equation composed of three dimensionless group. The new empiracal equation is derived from Buckingham pi theorem using the parameters such as thermal diffusivity, melting temperature. wire diameter, propellant sample diameter, frame temperature, autoignition temperature and matrix burning rate which influence on $r_w$.
In this paper, we analyzed the misconceptions and errors incurred during factorization learning. We also examined whether online individualization classes had a positive effect on students' mathematical achievement. The experiment was conducted for 4 weeks (16 times in total) on middle school juniors in rural areas of Gyeonggi Province, where the influence of private extra education was small. In the class, the 'Google Classroom' was used as a LMS, the video lecture was uploaded to YouTube, and the teacher interacted with the students through "Zoom" and "Facetalk". In the online class situation, students' assignments and test answers were checked in real time through 'Google Classroom', and immediate feedback was provided to the experimental class group's students. However, for the control group students, feedback was provided only to those who desired. A total of 7 achievement evaluations were conducted in the order of pre-test, formative evaluation (5 times), and post-test to confirm the change in students' ability improvement and achievement. Through the formative evaluation analysis, it was possible to grasp the types of errors and misconceptions that occured during the factorization process. Students' errors were divided into four types: theorem or definition distortion error, functional errors such as calculation, operation, and manipulation, errors that do not verify the solution, and no response. As a result of ANCOVA, the two groups did not show any difference from the 1st to 4th formative assessment. However, the 5th formative assessment and post-test showed statistically significant differences, confirming that online individualization classes contributed to improvemed achievement.
The Journal of the Convergence on Culture Technology
/
v.5
no.3
/
pp.197-202
/
2019
In the era of the fourth revolution, interest in content production using proven engines in the broadcasting sector, such as Vizrt, is growing. The new visual effects required in the 5G era are critical to content production training. Vizrt has a good production time utility and affordability for broadcast and media content. In this paper, we are going to use this to present a practical case of the theorem and application of the basic training course in the production of virtual content, and to present the basic training direction. In the introduction, the graphic algorithm analyzed and studied the characteristics and environmental factors of the Vizrt engine. In this paper, the production process was studied separately, and the work carried out through engine implementation was presented. The VS Studio Foundation was provided as a practical production case at each stage. The Vizrt engine operator process is important in graphic approach and application, and through the results of the lecture, the method of understanding and implementing algorithms for virtual reality perspective suitable for basic learning was studied. Based on practice, the research method of main theory was to create Vizrt contents specialized in 5G contents work in each sector and to implement graphic production in new areas from contents image. Through this study, we came to the conclusion of the basic training method through virtual reality content work based on Vizrt by practicing content creation according to the subject. It also proposes the effect of creating Vizrt content and the direction of building Vizrt basic training courses.
Journal of the Korea Institute of Information Security & Cryptology
/
v.19
no.6
/
pp.185-190
/
2009
As the use of RSA based on chinese remainder theorem(CRT-RSA) is being generalized, the security of CRT-RSA has been important. Since Bellcore researchers introduced the fault attacks on CRT-RSA, various countermeasures have been proposed. In 1999, Shamir firstly proposed a countermeasure using checking procedure. After Shamir's countermeasure was introduced, various countermeasures based on checking procedure have been proposed. However, Shamir's countermeasure was known to be vulnerable to the modified operand attack by Joey et al. in 2001, and the checking procedure was known to be vulnerable to the modified opcode attack by Yen et al. in 2003. Yen et al. proposed a new countermeasure without checking procedure, but their countermeasure was known to be also vulnerable to the modified operand attack by Yen and Kim in 2007. In this paper, we point out that pre, but countermeasures were vulnerable to the modified operand attack or the modified opcode attack.
Journal of Korean Society of Occupational and Environmental Hygiene
/
v.33
no.2
/
pp.156-170
/
2023
Objectives: This study conducted practical training to improve the proper usage of personal protective equipment(PPE), which greatly impacts workplace safety and health management. Personal protective equipment education was conducted through active participation, without theoretical modules, and aimed to identify the effects of repeated practical education and determine ways to increase participant satisfaction. Methods: Study data were analyzed using the IBM SPSS Statistics ver.29 software. First, participants' general characteristics were analyzed with frequency analysis. Second, the normality and equality of variances (Leven's test) were tested for the dependent variables prior to statistical analyses to determine the use of parametric tests. In general, normality is assumed when the sample size is 30 or more per the central limit theorem (Park et al., 2014). As our sample size of health management workers was 43, normality can be assumed. However, to ensure rigor of the study, we examined skewness and kurtosis. The results confirmed that the data were normally distributed. Third, the effects of repeated PPE training were analyzed using paired t-tests. Fourth, differences in satisfaction with PPE training according to the safety and health job position and safety and health certification were analyzed with t-test and Welch's t-test. For parameters that did not meet the assumption of equal variances, the Welch's t-test was performed. Results: Repeated PPE training improved the educational outcomes, and the improvements were significant in the 1st and 2nd respiratory PPE and safety and hygiene PPE training evaluations (p<.001). In terms of safety and health job position, repeated training led to improvements in educational outcomes, with significant improvements observed among supervisors and specialized health management institution workers in the 1st and 2nd training evaluations (p<.005). In terms of safety certification, repeated training led to improvements in educational outcomes, with significant improvements observed among both certified and non-certified individuals (p<.005). Regarding satisfaction with PPE training according to safety and health job positions, specialized health management institution workers showed greater satisfaction than supervisors, with significant differences in the satisfaction for expertise of lecture, work relevance, and lecturer's attitude (p<.001). Regarding satisfaction with PPE training according to safety and health certification, satisfaction was higher among certified individuals, with significant differences in satisfaction for work relevance and lecture attitude (p<.05) Conclusions: PPE education should be recommended to be provided as practical training. Repeated training can enhance educational outcomes for individuals with inadequate knowledge and understanding of PPE prior to education. For individuals with high levels of pre-existing knowledge and understanding of PPE, the results show that various training experiences should be provided to enhance their satisfaction. Therefore, it suggests that the workplace should actively seek educational media and methods to acquire expertise and skills in wearing personal protective equipment and improve the ability to use
A Milgrom-Roberts style signalling model of limit pricing is developed to analyze the possibility and the scope of limit pricing in general, noncooperative oligopolies. The model contains multiple incumbent firms facing a potential entrant and assumes an information asymmetry between incombents and the potential entrant about the market demand. There are two periods in the model. In period 1, n incumbent firms simultaneously and noncooperatively choose quantities. At the end of period 1, the potential entrant observes the market price and makes an entry decision. In period 2, depending on the entry decision of the entrant, n' or (n+1) firms choose quantities again before the game terminates. Since the choice of incumbent firms in period 1 depends on their information about demand, the market price in period 1 conveys information about the market demand. Thus, there is a systematic link between the market price and the profitability of entry. Using Bayes-Nash equilibrium as the solution concept, we find that there exist some demand conditions under which incumbent firms will limit price. In symmetric equilibria, incumbent firms each produce an output that is greater than the Cournot output and induce a price that is below the Cournot price. In doing so, each incumbent firm refrains from maximizing short-run profit and supplies a public good that is entry deterrence. The reason that entry is deterred by such a reduced price is that it conveys information about the demand of the industry that is unfavorable to the entrant. This establishes the possibility of limit pricing by noncooperative oligopolists in a setting that is fully rational, and also generalizes the result of Milgrom and Roberts to general oligopolies, confirming Bain's intuition. Limit pricing by incumbents explained above can be interpreted as a form of credible collusion in which each firm voluntarily deviates from myopic optimization in order to deter entry using their superior information. This type of implicit collusion differs from Folk-theorem type collusions in many ways and suggests that a collusion can be a credible one even in finite games as long as there is information asymmetry. Another important result is that as the number of incumbent firms approaches infinity, or as the industry approaches a competitive one, the probability that limit pricing occurs converges to zero and the probability of entry converges to that under complete information. This limit result confirms the intuition that as the number of agents sharing the same private information increases, the value of the private information decreases, and the probability that the information gets revealed increases. This limit result also supports the conventional belief that there is no entry problem in a competitive market. Considering the fact that limit pricing is generally believed to occur at an early stage of an industry and the fact that many industries in Korea are oligopolies in their infant stages, the theoretical results of this paper suggest that we should pay attention to the possibility of implicit collusion by incumbent firms aimed at deterring new entry using superior information. The long-term loss to the Korean economy from limit pricing can be very large if the industry in question is a part of the world market and the domestic potential entrant whose entry is deterred could .have developed into a competitor in the world market. In this case, the long-term loss to the Korean economy should include the lost opportunity in the world market in addition to the domestic long-run welfare loss.
The effect of setup uncertainties on CTV dose and the correlation between setup uncertainties and setup margin were evaluated by Monte Carlo based numerical simulation. Patient specific information of IMRT treatment plan for rectal cancer designed on the VARIAN Eclipse planning system was utilized for the Monte Carlo simulation program including the planned dose distribution and tumor volume information of a rectal cancer patient. The simulation program was developed for the purpose of the study on Linux environment using open source packages, GNU C++ and ROOT data analysis framework. All misalignments of patient setup were assumed to follow the central limit theorem. Thus systematic and random errors were generated according to the gaussian statistics with a given standard deviation as simulation input parameter. After the setup error simulations, the change of dose in CTV volume was analyzed with the simulation result. In order to verify the conventional margin recipe, the correlation between setup error and setup margin was compared with the margin formula developed on three dimensional conformal radiation therapy. The simulation was performed total 2,000 times for each simulation input of systematic and random errors independently. The size of standard deviation for generating patient setup errors was changed from 1 mm to 10 mm with 1 mm step. In case for the systematic error the minimum dose on CTV $D_{min}^{stat{\cdot}}$ was decreased from 100.4 to 72.50% and the mean dose $\bar{D}_{syst{\cdot}}$ was decreased from 100.45% to 97.88%. However the standard deviation of dose distribution in CTV volume was increased from 0.02% to 3.33%. The effect of random error gave the same result of a reduction of mean and minimum dose to CTV volume. It was found that the minimum dose on CTV volume $D_{min}^{rand{\cdot}}$ was reduced from 100.45% to 94.80% and the mean dose to CTV $\bar{D}_{rand{\cdot}}$ was decreased from 100.46% to 97.87%. Like systematic error, the standard deviation of CTV dose ${\Delta}D_{rand}$ was increased from 0.01% to 0.63%. After calculating a size of margin for each systematic and random error the "population ratio" was introduced and applied to verify margin recipe. It was found that the conventional margin formula satisfy margin object on IMRT treatment for rectal cancer. It is considered that the developed Monte-carlo based simulation program might be useful to study for patient setup error and dose coverage in CTV volume due to variations of margin size and setup error.
As opinion mining in big data applications has been highlighted, a lot of research on unstructured data has made. Lots of social media on the Internet generate unstructured or semi-structured data every second and they are often made by natural or human languages we use in daily life. Many words in human languages have multiple meanings or senses. In this result, it is very difficult for computers to extract useful information from these datasets. Traditional web search engines are usually based on keyword search, resulting in incorrect search results which are far from users' intentions. Even though a lot of progress in enhancing the performance of search engines has made over the last years in order to provide users with appropriate results, there is still so much to improve it. Word sense disambiguation can play a very important role in dealing with natural language processing and is considered as one of the most difficult problems in this area. Major approaches to word sense disambiguation can be classified as knowledge-base, supervised corpus-based, and unsupervised corpus-based approaches. This paper presents a method which automatically generates a corpus for word sense disambiguation by taking advantage of examples in existing dictionaries and avoids expensive sense tagging processes. It experiments the effectiveness of the method based on Naïve Bayes Model, which is one of supervised learning algorithms, by using Korean standard unabridged dictionary and Sejong Corpus. Korean standard unabridged dictionary has approximately 57,000 sentences. Sejong Corpus has about 790,000 sentences tagged with part-of-speech and senses all together. For the experiment of this study, Korean standard unabridged dictionary and Sejong Corpus were experimented as a combination and separate entities using cross validation. Only nouns, target subjects in word sense disambiguation, were selected. 93,522 word senses among 265,655 nouns and 56,914 sentences from related proverbs and examples were additionally combined in the corpus. Sejong Corpus was easily merged with Korean standard unabridged dictionary because Sejong Corpus was tagged based on sense indices defined by Korean standard unabridged dictionary. Sense vectors were formed after the merged corpus was created. Terms used in creating sense vectors were added in the named entity dictionary of Korean morphological analyzer. By using the extended named entity dictionary, term vectors were extracted from the input sentences and then term vectors for the sentences were created. Given the extracted term vector and the sense vector model made during the pre-processing stage, the sense-tagged terms were determined by the vector space model based word sense disambiguation. In addition, this study shows the effectiveness of merged corpus from examples in Korean standard unabridged dictionary and Sejong Corpus. The experiment shows the better results in precision and recall are found with the merged corpus. This study suggests it can practically enhance the performance of internet search engines and help us to understand more accurate meaning of a sentence in natural language processing pertinent to search engines, opinion mining, and text mining. Naïve Bayes classifier used in this study represents a supervised learning algorithm and uses Bayes theorem. Naïve Bayes classifier has an assumption that all senses are independent. Even though the assumption of Naïve Bayes classifier is not realistic and ignores the correlation between attributes, Naïve Bayes classifier is widely used because of its simplicity and in practice it is known to be very effective in many applications such as text classification and medical diagnosis. However, further research need to be carried out to consider all possible combinations and/or partial combinations of all senses in a sentence. Also, the effectiveness of word sense disambiguation may be improved if rhetorical structures or morphological dependencies between words are analyzed through syntactic analysis.
In the division of labor (or teamwork) in medicine, the responsibility of medical and nursing staff should be separated or distributed to justify negligent criminal offenses. The present work refers to the standards by which the due diligence and responsibility of the individual persons are to be determined and delimited. In this context, it has been proven that objective theory as a measure of due diligence is appropriate. From a moral point of view, when assessing due diligence, it makes sense to impose greater individual or higher performance demands on the perpetrator, but law and order require that due diligence should result from socially relevant human behavior. To give objective measure of negligence and to provide the highest level of personal responsibility, so that man can not be burdened too much responsibility and it is accordingly with an equality theorem. Afterwards some points are presented, which should be considered in a concrete fact in the determination of the medical negligence. Medical action has specific characteristics such as professionalism, discretionary and exclusive, unbalance of information. These characteristics distinguish medical actions from general negligence. The general level of knowledge, the urgency, working condition and working environment of the medical facility, duration of the professional practice, assessment of the medical activity are crucial in this context. As a standard of delineation of due diligence, I have used the permitted risk and the principle of trust. In the horizontal division of labor, the principle of trust applies. The principle of trust applies in principle in cases of division of labor interaction, when doctors in the same hospital exercise their own specific occupational field or everyone works in another hospital. However, this is not true for every case. In the vertical division of labor, the principle of trust does not apply and the senior physician can not trust the assistant doctors. In this case, the principle of trust is converted into a duty of supervision for assistant doctors by the senior physician. This supervision requirement could be used as a random check.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.