This study was conducted to investigate whether 1) photosynthetic pigments(chlorophylls and carotenoids) are formed in dodder plant(Cuscuta australis), 2) there are any characteristics in the pigment biosynthesis, compared to that of other normal plants, and 3) dodder responds to some herbicides having target site on chloroplast. 1. Chlorophyll content of dodder tendrill grown under a natural daylight was 9 times and 50 times lower than that of field bindweed stem and leaf, respectively. 2. The photosynthetic pigment contents varied in different tissues, being higher in a apical region than in a lower region of seedling or tendrill. Chlorophyll wasn't almost observed below the 4th internode from the upper. 3. Pigment contents were greatly dependent on light intensity so that there were 4 to 6 times difference among light conditions. When the shoot containning low pigment contents under natural light, was incubated in growth chamber with various light intensities, the pigment contents were increased by 3 times of initial contents at about 97${\mu}E$$m^{-2}s^{-1}$PAR. While the change in pigment contents was not observed at above 450${\mu}E$$m^{-2}s^{-1}$PAR 4. Exogenous supply of 5mM 5-aminolevulinic acid increased protochlorophyllide by 7 times and 1.4 times in the etiolated shoot from field bindweed rhizome and in dodder stem, respectively, showing that dodder relatively has a low response to 5-aminolevulinic acid. 5. Pigment loss was observed in the treatment of paraquat, norflurazon, oxyfluorfen and diuron, and protoporphyrin IX was accumulated by oxyfluorfen as in normal plants Based on above results, several chracteristics of pigment biosynthesis in dodder seem to be summerized as follows. Photosynthetic pigment biosynthesis in Cuscuta australis runs even in low level. The pigment contents is differentially distributed in different regions and their contents seem significantly to be controlled by light intensities. Especially, chloroplast rapidly tends to degenerate with the development of tissue. Some herbicides having target site on chloroplast induce damage to dodder stem but are unlikely to control it well in field, except paraquat, due to low chloroplast activity and parasitic mode of nutrition.
KIM Hyung Chul;KIM Dong Myung;LEE Dae In;PARK Chung Kil;KIM Hak Gyoon
Korean Journal of Fisheries and Aquatic Sciences
/
v.34
no.5
/
pp.457-464
/
2001
Algal growth potential (AGP) assay using Cochlodinium polykrikoides was conducted in Saryang Island coast where C. polykrikoides red tide occurred annually from July to October 1998. The effects of macro- and micro-nutrients on the growth of C. polykrikoides were specifically evaluated by the algal assay method. Two different types of growth response of C. polykikoides for the addition of nutrients were clearly obseued. For both before and after C. polykrikoides occurrence, the growth of C. polykikoides was significantly stimulated by the addition of either nitrate or ammonium of $50{\mu]M$ with phosphate of $5{\mu}M$. The addition of a single nutrient had no clear effect on the growth of C. polyhikoides and the addition of trace metals, vitamins, and EDTA etc. did not stimulate the algal growth, also. This result indicates that both N and P potentially limited the growth of C. polyhikoides in this period. However, during a bloom of C. polyhikoides, the growth was unlikely to be stimulated by the addition of both macro- and micro-nutrients. At that time the nutrient concentration of Saryang Island coast was $24.33{\mu}M$ for ammonium, $1.61{\mu}M$ for phosphate, and $0.58{\mu}M$ for nitrate, respectively. The concentrations of nutrients increased, on average, 8.2-fold for ammonium and 4.8-fold for phosphate, decreased 3.3-fold for nitrate compared to both before and after the red tide. This result shows that the growth of C. polykikoides was not limited by the nutrients during the bloom in September. Therefore, our results suggest that the C. polykrikoides red tide may outbreak especially when the water is fertilized due to the increased N and P.
This study monitored marine environments and ecological characteristics of phytoplankton in southern coastal waters during June to October in 2004-2006 and provided an information to how Cochlodinium blooms have occurred. A total of sampling sites was 16 (Dukyang bay, Goheung, Yeoja bay, Gamak bay, Gwangyang bay, Yeosu, and Namhae). Temperature ranged from $19^{\circ}C\;to\;29^{\circ}C$, which all of sampling in Yeoja bay was the highest temperature of $27^{\circ}C\;and\;29^{\circ}C$ during summer. On June, July, September, and October did not show a remarkable difference regardless of sampling sites. Yeoja and Gwangyang bays had 25-27 in salinity that was lower approximately 5-6 compared with other sampling sites. Chlorophyll had considerable fluctuations depending on sampling sites on July and October, in particular, Gwangyang bay was the highest value of $15{\mu}gl^{-1}$ that had five times as much as. Unlikely to temperature, salinity, and chlorophyll, transparency ranged from 2 m to 5 m regardless of sampling sites. Gwangyang bay was the highest DIN (Dissolved Inorganic Nitrogen) of $0.53mgl^{-1}$ on July and August that had ten times as much as, whereas DIP (Dissolved Inorganic Phosphorus) did not show a significant difference between sampling sites. On July, the correlation of DIN and chlorophyll was a negative that should extremely require DIN to grow phytoplankton, but was a positive liner on August. Mean cell number of phytoplankton reached to encounter a peak of 500 cells $ml^{-1}$ in July and August, which diatoms were dominant species and attained an abundance of >60% regardless of months. In August, the occurrence of dinoflagellates ranged from 20% to 30%. Skeletonema costatum, one of dominant speicies, was the highest occurrence to throughout sampling sites during 2004 to 2006. On the basis of cluster analysis for phytoplankton, they were distributed in all of sampling sites. Consequently, significant fluctuations of marine environments were shown in summer and S. costatum was regarded as the representive phytoplankton in southern coastal waters. In particular, the outbreaks of Cochlodinium polykrikoides have occurred in Dukyang bay, Gamak bay, Goheung, Yeosu, and Namhae, but Yeoja and Gwangyang bays did not occur. The distinguish characteristics of occurring sampling sites and non-occurring in Cochlodinium blooms based on this study was DIN that was enough to persistently grow and maintain them even a litter dissolved in water. This suggests that Cochlodinium red tide seems to be occur in off waters.
This study proposes a novel recommender system using the structural hole analysis to reflect qualitative and emotional information in recommendation process. Although collaborative filtering (CF) is known as the most popular recommendation algorithm, it has some limitations including scalability and sparsity problems. The scalability problem arises when the volume of users and items become quite large. It means that CF cannot scale up due to large computation time for finding neighbors from the user-item matrix as the number of users and items increases in real-world e-commerce sites. Sparsity is a common problem of most recommender systems due to the fact that users generally evaluate only a small portion of the whole items. In addition, the cold-start problem is the special case of the sparsity problem when users or items newly added to the system with no ratings at all. When the user's preference evaluation data is sparse, two users or items are unlikely to have common ratings, and finally, CF will predict ratings using a very limited number of similar users. Moreover, it may produces biased recommendations because similarity weights may be estimated using only a small portion of rating data. In this study, we suggest a novel limitation of the conventional CF. The limitation is that CF does not consider qualitative and emotional information about users in the recommendation process because it only utilizes user's preference scores of the user-item matrix. To address this novel limitation, this study proposes cluster-indexing CF model with the structural hole analysis for recommendations. In general, the structural hole means a location which connects two separate actors without any redundant connections in the network. The actor who occupies the structural hole can easily access to non-redundant, various and fresh information. Therefore, the actor who occupies the structural hole may be a important person in the focal network and he or she may be the representative person in the focal subgroup in the network. Thus, his or her characteristics may represent the general characteristics of the users in the focal subgroup. In this sense, we can distinguish friends and strangers of the focal user utilizing the structural hole analysis. This study uses the structural hole analysis to select structural holes in subgroups as an initial seeds for a cluster analysis. First, we gather data about users' preference ratings for items and their social network information. For gathering research data, we develop a data collection system. Then, we perform structural hole analysis and find structural holes of social network. Next, we use these structural holes as cluster centroids for the clustering algorithm. Finally, this study makes recommendations using CF within user's cluster, and compare the recommendation performances of comparative models. For implementing experiments of the proposed model, we composite the experimental results from two experiments. The first experiment is the structural hole analysis. For the first one, this study employs a software package for the analysis of social network data - UCINET version 6. The second one is for performing modified clustering, and CF using the result of the cluster analysis. We develop an experimental system using VBA (Visual Basic for Application) of Microsoft Excel 2007 for the second one. This study designs to analyzing clustering based on a novel similarity measure - Pearson correlation between user preference rating vectors for the modified clustering experiment. In addition, this study uses 'all-but-one' approach for the CF experiment. In order to validate the effectiveness of our proposed model, we apply three comparative types of CF models to the same dataset. The experimental results show that the proposed model outperforms the other comparative models. In especial, the proposed model significantly performs better than two comparative modes with the cluster analysis from the statistical significance test. However, the difference between the proposed model and the naive model does not have statistical significance.
This study seeks to analyze various aspects of women's fear of sexual crime committed against them within the Seoul metropolitan subway system, which takes center stage in public transportation today in Korea; that is, among different kinds of fear of crime, women's fear of sexual crime is empirically examined, and it is expected that the results of this study shall serve as an important basis for future policy-making, so that the fear of sexual crime against women in the subway system could be reduced. To the end, this study aims first, to investigate the real picture of women's using the subway and their attire, second, to look into the amount of information on such crime obtained and the level of its awareness, third, to analyze the characteristics of the fear of sexual crime in the subway system, and lastly, to empirically examine the relationship between women's regular women's regular attire/their level of information on such crime obtained and their fear of sexual crime. As a quantitative research method to discover facts, this study utilizes reality-analyztical and technical research methods, and for its final statistical analysis, uses questionnaire answered and returned by 509 women, out of a total of 520 female commuters on the Seoul metropolitan subway system who had originally been requested to participate in the survey. The result of this study demonstrates that the level of women's fear of sexual crime on the subway is relatively high. In detail, the higher their monthly income is, the more fearful women feel on the subway; it has also been found that women living in housing they own or in leased housing on deposits (Jeonse) fear sexual crime on the subway more than those living in the other forms of housing. However, the level of fear has been found to be low for those types of sexual crime judged to be relatively unlikely to be committed. Lastly the result of the relationship between women's regular attire/their level of information on such crime obtained and their fear of sexual crime is relatively high and very effective.
Kim, Tae-Sung;Yun, Mi-Jin;Cho, Arthur;Lee, Jong-Doo
Nuclear Medicine and Molecular Imaging
/
v.41
no.1
/
pp.22-29
/
2007
Purpose: Metastatic thyroid cancers with I-131 uptake have been known to show no increase of FDG uptake whereas those without I-131 uptake tend to demonstrate increased uptake on PET. In this study, we evaluated the degree of FDG uptake in primary thyroid cancers of papillary histology before surgery. Material & Methods: Forty FDG PET studies were performed on the patients who had papillary cancer proven by fine needle aspiration. The degree of FDG uptake was visually categorized as positive or negative (positive if the tumor showed discernible FDG; negative if the tumor didn't) and the peak standard uptake value (peak SUV) of the papillary thyroid cancer (PTC) were compared with the size of PTC. Results: The mean size of 26 PTC with positive FDG uptake was $1.9{\pm}1.4\;cm(0.5{\sim}5\;cm)$. In 13 PTC with negative FDG uptake, the mean size of those was $0.5{\pm}0.2\;cm\;(0.2{\sim}0.9\;cm)$. All PTC larger than 1cm ($2.5{\pm}1.4\;cm,\;1{\sim}5\;cm$) have positive FDG uptake (peak $SUV=6.4{\pm}5.7,\;1.7{\sim}22.7$). Among the micropapillary thyroid cancer (microPTC; PTC smaller than 1cm), 8 microPTC show positive FDG uptake(peak $SUV=2.9{\pm}1.3,\;1.7{\sim}5.5$), while 13 microPTC show negative finding(peak $SUV=1.3{\pm}0.2,\;1.1{\sim}1.7$). The size of microPTC with positive FDG uptake is significantly larger than that of microPTC with negative FDG uptake ($0.7{\pm}0.1\;cm$ vs $0.4{\pm}0.2\;cm$, p=0.01). Conclusion: All PTCs larger than 1cm show positive FDG uptake in our study. In other words, thyroid lesions larger than 1cm with negative FDG uptake are unlikely to be PTC. So far, only poorly differentiated thyroid cancers are known to show increased FDG uptake. Our results seem to be contradictory to what is known in the literature. Further study is needed to understand better the significance of increased FDG uptake in PTC in relation to expression of NIS and GLUT.
Specific protocols to increase the differentiation of neuronal cells from embryonic stem (ES) cells have been well established, such as retinoic acid induction and lineage selection of neuronal cells. For the neuropathological studies, ES-derived neurons (ES neurons) must show normal physiological characteristics related to cell death and survival and should be maintained in vitro for a sufficient time to show insults-specific cell death without spontaneous death. When mouse ES cells were plated onto astrocytes monolayer after retinoic acid induction, most ES cells differentiated into neuronal cells, which were confirmed by the presence of specific neuronal markers, and the cultures were viable for at least four weeks. When these cultures were examined for vulnerability to glutamate excitotoxicity, ES neurons were vulnerable to excitotoxic insults mediated by agonist-specific receptors. The vulnerability to excitotoxic death increased with developmental age of ES neurons in vitro. Specific receptors for Neurotrophin and GDNF family ligands were present in ES neurons. GDNF and NT-3 could modulate the survival and excitotoxic vulnerability of ES neurons. The vulnerability and resistance to toxic insults, which are essential requirements of model culture systems for neuropathological studies, make ES neurons to a useful model culture system. Especially ES cell are highly amenable to genetic modification unlikely to primary neuronal cells, which will give us a chance to answer more complicated neurophysiological questions. Recently there was an outstanding attempt to explore the cellular toxicity using human ES cells (Schrattenholz & Klemm, 2007) and it suggested that ES cells could be a new model system for neurophysiological studies soon and go further a large-scale screening system for pharmacological compounds in the future.
Recently the abusive calls on on-demand bonds have been a critical issue among many engineering and construction companies in Korea. On-demand bond is referred to as an independent guarantee in the sense that the guarantee is independent from its underlying contract although it was issued based on such underlying contract. For this reason, the issuing bank is not required to and/or entitled to look into whether there really is a breach of underlying contract in relation to the call on demand-bonds. Due to this kind of principle of independence, the applicant has to run the risk of the on demand bond being called by the beneficiary without due grounds. Only where the call proves to be fraudulent or abusive in a very clear way, the issuing bank would not be obligated to pay the bond proceeds for the call on on-demand bonds. In order to prevent the issuing bank from paying the proceeds under the on-demand bond, the applicant usually files with its competent court an application for injunction prohibiting the beneficiary from calling against the issuing bank. However, it is in practice difficult for the applicant to prove the beneficiary's call on the bond to be fraudulent since the courts in almost all the jurisdictions of advanced countries require very strict and objective evidences such as the documents which were signed by the owner (beneficiary) or any other third party like the engineer. There is another way of preventing the beneficiary from calling on the bond, which is often utilized especially in the United Kingdom or Western European countries such as Germany. Based upon the underlying contract, the contractor which is at the same time the applicant of on-demand bond requests the court to order the owner (the beneficiary) not to call on the bond. In this case, there apparently seems to be no reason why the court should apply the strict fraud rule to determine whether to grant an injunction in that the underlying legal relationship was created based on a construction contract rather than a bond. However, in most jurisdictions except for United Kingdom and Singapore, the court also applies the strict fraud rule on the ground that the parties promised to make the on-demand bond issued under the construction contract. This kind of injunction is highly unlikely to be utilized on the international level because it is very difficult in normal situations to establish the international jurisdiction towards the beneficiary which will be usually located outside the jurisdiction of the relevant court. This kind of injunction ordering the owner not to call on the bond can be rendered by the arbitrator as well even though the arbitrator has no coercive power for the owner to follow it. Normally there would be no arbitral tribunal existing at the time of the bond being called. In this case, the emergency arbitrator which most of the international arbitration rules such as ICC, LCIA and SIAC, etc. adopt can be utilized. Finally, the contractor can block the issuing bank from paying the bond proceeds by way of a provisional attachment in case where it also has rights to claim some unpaid interim payments or damages. This is the preservative measure under civil law system, which the lawyers from common law system are not familiar with. As explained in this article, it is very difficult to block the issuing bank from paying in response to the bond call by the beneficiary even if the call has no valid ground under the underlying construction contract. Therefore, it is necessary for the applicants who are normally engineering and construction companies to be prudent to make on-demand bonds issued. They need to take into account the creditability of the project owner as well as trustworthiness of the judiciary system of the country where the owner is domiciled.
Objective: The purpose of this study was to evaluate the correlation between the expression pattern of vascular endothelial growth factor (VEGF) in endometrium and the pathogenesis of endometriosis by investigating VEGF expression patterns and their difference between eutopic endometrium of patients with endometriosis and that of normal controls without endometriosis. Methods: Endometrial sections were obtained from 64 hysterectomy specimens from women under age of 40, who had undergone hysterectomies and had histological evidence of endometriosis, with stage 3 and 4 according to the revised American Society for Reproductive Medicine classification. As for controls, 37 sections were gained from women diagnosed as having cervical intraepithelial neoplasia (CIN) of the uterine cervix and without evidence of pelvic endometriosis or adenomyosis during their operation. The VEGF content was evaluated immunohistochemically in the eutopic endometrium from 64 patients with endometriosis and 37 normal controls. Histological semiquantitative score (H-score) was calculated and compared between study group and control group throughout the menstrual cycle. Results: There was no significant difference in the H-score of VEGF in the eutopic endometrium between patients with endometriosis and controls without endometriosis when compared according to the same phase of the cycle, although the H-score of the study group was significantly higher in the secretory phase than the proliferative phase. Conclusion: The VEGF expression in the eutopic endometrium of women with endometriosis was not different from that of women without endometriosis. This study suggests VEGF expression in eutopic endometrium is unlikely associated with the pathogenesis of endometriosis.
Purpose: To investigate the visual function with prescription swimming goggles. Methods: 15 university students (mean age: $22{\pm}1.54$ years) participated, with a mean distance refractive error of RE: S-1.67 D/C-0.40 D, LE: S-1.70D/C-0.37 D. Inclusion criteria were no ocular pathology, able to wear soft contact lenses to correct their refractive error to emmetropia and able to swim. Participants were fitted with contact lenses to correct all ametropia. Subjective evaluation for satisfaction of visual acuity, asthenopia and balance were also measured using a questionnaire while wearing swimming goggles with cylinder (C+1.50 D, Ax $90^{\circ}$) compared with plano sphere outside the swimming pool area. Visual acuity was assessed using the same ETDRS chart. The prescription swimming goggles powers were assessed in random order and ranged in power from S+3.00 D to S-3.00 D in 0.50 D steps. Results: Subjective evaluation was significantly worse for the swimming goggles with cylinder than for the plano powered goggles for all 3 questions, visual acuity, asthenopia and balance. Visual acuity were significantly affected by the different power of the swimming goggles (p<0.05), but there was no significant difference between the in-air in-clinic and underwater in-swimming pool measures (p=0.173). However, visual acuity measured in the clinic was significantly better than underwater for some swimming goggle powers (+3.00, +1.00, +0.50, 0, -1.00 and -2.00 D). Conclusions: Wearing swimming goggles underwater may degrade the visual acuity compared to within air but as the difference is less than 1 line of Snellen acuity, and it is unlikely to result in significant real-life effects. Having an incorrect cylinder correction was found to be detrimental resulting in lower score of satisfaction. Considering slippery floor of swimming pool area, it can be a potential risk factor. Therefore, it is important to correct any refractive error in addition to astigmatism for swimming goggle.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.