In this paper, we study the BESS of a standalone hybrid street light. The proposed BESS proposed a BESS with the function of efficiently charging irregularly generated power from two or more generators. AC generated by wind power is converted to DC using an AC / DC converter and then to a voltage that can charge the battery through the DC / DC converter. The lack of voltage and current, which is a disadvantage of the MPPT method used in solar power generation, is compensated by the DC value of wind power generation. The compensation method is to convert the DC generated from solar power into a voltage suitable for charging the battery through a DC / DC converter, and then connect the DC generated in wind power in parallel to compensate for the insufficient current to charge the battery in a short time. Allow this to begin. By securing the maximum charging time, the usage time of the stand-alone hybrid street light is huge. Experimental results show that the battery has a short charging time and can be efficiently applied to battery-dependent standalone hybrid street lights.
Sun power generation systems which use large capacity centralized inverters have loss of power generation due to cloud and building shadows, pollution, cell deterioration, etc. To minimize loss of power generation, decentralized solar power systems using multiple micro-inverters are being proposed as an alternative. A distributed solar power system consisting of a system-connected system uses power line communication to collect data from the micro-inverters. Power line communication has the advantage of using power lines without separate lines for data transmission, but in distributed solar power generation systems that use a large number of micro-inverters, the bit error rate is less reliable due to the phenomenon caused by limited transmission power, high load interference and noise, variable signal attenuation, and impedance characteristics. So we proposed wireless intelligent controller for micro-inverter that is used to build distributed solar power systems. and we design and implement that. Further, the proposed wireless intelligent controller for micro-inverter was used to establish a small-volume solar power plant to check its function and operation.
Recently, with the rise of environmental issues and the change of government policy (Renewable Energy 3020 Implementation Plan), a large amount of renewable energy such as solar and wind power is connected to the power system, and most of the renewable energy is concentrated in the power distribution network. This causes many problems with the voltage management and the protection coordination of the grid due to the its intermittent power generation. In order to effectively operate the distribution network, it is necessary to deploy more intelligent terminal devices in the field to measure the status of the distribution network and develop various operation functions such as visualization and big data analysis to support the power distribution system operators. In addition, the failover technology must be supported for the non-stop operation of the power distribution system. This paper proposes the system architecture of new power distribution management system to cope with high penetration of renewable energy. To verify the proposed system architecture, the functional unit test and performance measurement were performed.
This paper proposes an adaptive PCIe system for TI C66x DSPs. Conventionally, the PCIe system provided by the C66x is a system dependent on the structure in which the primary core writes an application to the DSP memory through the PCIe interface, then activate the secondary core. Due to the dependency between the cores, when developing a project using a PCIe interface, the remaining cores have to be programmed with a concern of the primary core used as the PCIe interface. Therefore, in order to de-couple the connections among the cores, an adaptive PCIe system is proposed, in the paper, in which the cores operate independently compared to the conventional system. Since the core used as the PCIe interface only runs PCIe related operations in the new system, the remaining cores can be fully utilized without concerning the connections with the core for PCIe interface. In order to verify the feasibility of the proposed adaptive PCIe system, the implementations of LTE-A down link, and IEEE 802.11ac are carried out using the evaluation board which includes a TMS320C6670 chip. Altogether, these results support that we demonstrated that the digital signal processing systems with the PCIe Interface can be developed more rapidly by applying the proposed system.
Patents are system to promote the development of industry by disclosing technology. The importance of recent patent is being emphasized. For this reason, companies apply for many patents. And they analyze the patent. Patent analysis helps to protect and foster their technology. Previously this method has been carried out by experts. Expert-based patent analysis, however, has the disadvantage of being time-consuming and expensive. Consequently, we try to solve this problems by developing prediction model. Therefore, this paper proposes a data-based patent analysis method using quantitative indicator and textual information. We confirmed the practical applicability of the proposed method through 1,831 autonomous vehicle patents. As a result, it was possible to confirmed that safety and lane detection related technologies are important.
The subject of the simultaneous measuring system of base pattern and deposition pattern is a new research topic on a defect inspection of OLED. In this paper, we propose a new OLED inspection method that simultaneously measures standard and deposition pattern images. This method reduces unnecessary processes and tac time during OLED inspection. For an additional reduction of the tac time during pattern measurement, the ROI was configured to measure only in the designated ROI area instead of measuring the entire area of an image. During the ROI set-up, the value of effective deposition pattern area is included so that if the deposition pattern is out of the ROI zone, it would be treated as a defect before measuring the size and center point of the pattern. As a result, the tac time and inspection process could be shortened. The proposed method also could be applied to the OLED manufacturing process. Production of OLED could be increased by reducing tac time and inspection process.
Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol.
This paper presents a SDR-based Long Term Evolution Advanced (LTE-A) Physical Downlink Shared Channel (PDSCH) decoder using a multicore Digital Signal Processor (DSP). For decoder implementation, multicore DSP TMS320C6670 is used, which provides various hardware accelerators such as turbo decoder, fast Fourier transformer and Bit Rate Coprocessors. The TMS320C6670 is a DSP specialized in implementing base station platforms and is not an optimized platform for implementing mobile terminal platform. Accordingly, in this paper, the hardware accelerator was changed to the terminal implementation to implement the LTE-A PDSCH decoder supporting the multi-antenna and the functions not provided by the hardware accelerator were implemented through core programming. Also pipeline using multicore was implemented to meet the transmission time interval. To confirm the feasibility of the proposed implementation, we verified the real-time decoding capability of the PDSCH decoder implemented using the LTE-A Reference Measurement Channel (RMC) waveform about transmission mode 2 and 3.
This paper presents a software design and implementation of software-defined radio based IEEE 802.11ac encoder using Texas Instruments TMS320C6670 digital signal processor (DSP) platform. In this paper, the implemented encoder has the capability of generating all the signals consisting of preamble field and data field under different modulation & coding scheme in the IEEE 802.11ac standard. Moreover, the flexibility in choosing different rate, bandwidth, or mode can also be achieved by software reconfiguration using the DSP. As a result, by utilizing the computing power provided by multi-cores as well as the FFT coprocessors in the DSP, the required maximum throughput 78Mbps can be fully reached within 4 ㎲ for each OFDM symbol in the case of 20MHz bandwidth of IEEE 802.11ac.
A patent contains detailed information of the developed technology and is published to the public. Thus, patents can be used to overcome the limitations of traditional technology trend research and prediction techniques. Recently, due to the advantages of patented analytical methodology, IP R&D is carried out worldwide. The patent is big data and has a huge amount, various domains, and structured and unstructured data characteristics. For this reason, there are many difficulties in collecting and researching patent information. Patent research generally writes the Search formula to collect patent documents from DB. The collected patent documents contain some noise patents that are irrelevant to the purpose of analysis, so they are removed. However, eliminating noise patents is a manual task of reading and classifying technology, which is time consuming and expensive. In this study, we propose a model that automatically classifies The Noise patent for efficient patent information research. The proposed method performs Patent Embedding using Word2Vec and generates Noise seed label. In addition, noise patent classification is performed using the Random forest. The experimental data is published and registered with the USPTO among the patents related to Ocean Surveillance & Tracking Network technology. As a result of experimenting with the proposed model, it showed 73% accuracy with the label actually given by experts.
The digital forensic analysis ensures the integrity of confiscated data by calculating hash values for seizure and search of digital evidence and receiving confirmation and signature from participants. However, evidence that is irrelevant to the alleged offense needs to be deleted even after seizure from the point of view of privacy. But the hash value is altered by deleting the irrelevant data from the image file, one will not be able to prove that the file is in the initial state when it was seized. Therefore, in this paper, a study was conducted to support the integrity of the digital evidence, even if some of the seized digital evidence was deleted or damaged during the seizure search. The hash value of each data is calculated and hash value of the combination of hash values are also calculated. Even if the unrelated evidence is deleted from the seized evidence regardless of file system such as FAT or NTFS, the suggested method presented a way to provide the integrity that proves there is no change in the evidence file.
This study aims to explore a plan for the educational application of K-MOOC brought into relief as a new education system and to draw a direction of improvement for increasing learners' satisfaction through the development and operation of the K-MOOC Course. The colleges produce and provide the MOOC Course as a counterplan through college innovation to respond to social changes due to the reduction of school-age population. Thus, this study selected the target courses for the operation of K-MOOC and proceeded with the development of a course, referring to the guidelines for the development and operation of the K-MOOC Course at the National Institute for Lifelong Education with the quantity for 14 weeks (About 50 minutes per week) for the period of the development of the course of about 5 months. The development of the course was made in the stages of design, development, inspection, and operation. The implications of the operation of K-MOOC obtained through this study are as follows: First, in order to increase the utilization of the MOOC Course, it is necessary to operate it in connection with the regular curriculum; second, it is necessary to have desirable communication to induce the interaction and academic motivation between the instructor and the learners; and third, it is necessary to analyze the relationship of the impact by each background factor through analyzing satisfaction with the lecture and continue to assure the quality of the course through understanding the learners' demands. For this purpose, it is important to experience new attempts directly and analyze the performance of education and the satisfaction of consumers and the instructor in detail, and it is necessary to construct a curriculum suitable for K-MOOC and seek an effective teaching method.
As the NCS(National Competency Standards) classification system continued to be developed and supplemented, NCS became widespread. Qualifications were redesigned to actively reflect industry demands, reduce the burden of redundant acquisition of unnecessary qualifications, and to evaluate objective capacities of the workforce. In addition to the learning modules to be developed in the future, previously developed NCS-based learning modules and lectures should be reorganized based on the new qualification design. In this paper, the Java programming subject designed based on NCS was redesigned according to SW new qualification design. Since the redesigned Java programming subjects consider the qualification design direction or qualification roadmap, not only can they be recognized as a test subject in qualification assessment through course evaluation, but also can be used as individual qualification data.
This paper is designed to examine the effectiveness of Computational Thinking and programming awareness by designing and applying programming classes using Havruta. In the present society, where the Fourth Industrial Revolution was in full swing, the capacity to be equipped has changed, and the education has been changed accordingly. Programming education is logically capable of thinking and improves comprehensive problem solving skills. This direction of programming education allows us to get ideas for solving problems based on computing thoughts and to create our own creative results. However, because they require the grammar of the programming language and many additional abilities, they are not easy for learners, and individual differences in competencies make learning less immersive and interesting. In this paper, to solve the problems of the uniform programming class, this study is designed and applied to the class applying the Jewish traditional teaching method, Havruta's teaching method, to find out the effect of computing thinking and programming perception.
In case of reading passport using a smart phone in contrast with a dedicated passport reading system, MRZ(Machine Readable Zone) character recognition can be hard when the character strokes were broken, touched or blurred according to the lighting condition, and the position and size of MRZ character lines were varied due to the camera distance and angle. In this paper, the effective recognition algorithm of the passport MRZ information using a combined neural network recognizer of CNN(Convolutional Neural Network) and ANN( Artificial Neural Network), is proposed under the various sized and skewed passport images. The MRZ line detection using connected component analysis algorithm and the skew correction using perspective transform algorithm are also designed in order to achieve effective character segmentation results. Each of the MRZ field recognition results is verified by using five check digits for deciding whether retrying the recognition process of passport MRZ information or not. After we implement the proposed recognition algorithm of passport MRZ information, the excellent recognition performance of the passport MRZ information was obtained in the experimental results for PC off-line mode and smart phone on-line mode.
The purpose of this study was to understand the influence of research of consumers' consumption values and toward usage attitude, usage intention and willingness to pay of modern people. The study is a consumer research about food delivery services which is rapidly grown up due to recent transformation on a modern dietary life. This study was based on the main survey had conducted from 23th May 2019 to 26th May 2019 by 336 consumers, aged 18 and older, who had experienced Food delivery services in the past. Statistical analysis was performed by using the IBM SPSS v.25.0. In summary, the results of this study are as follows. First, consumption values of food delivery services had a positive influence on usage attitude. Consumption values were catagorized in five sub-values: functional value, social value, emotional value, epistemic value, and conditional value, all of which were found to be significant in affecting on usage attitude. Second, usage attitude toward food delivery services had a positive influence on usage intention. Third, usage attitude toward food delivery services had a positive influence on willingness to pay. Fourth, usage intention of food delivery services had a positive influence on willingness to pay. The results of the study renders industrial and academic implications to the area of Food delivery services industry.
Based on the theory of planning behavior, the purpose of this study was to validate the path to consumers organic bakery product purchasing process, and moderating effect of price sensitivity. The improvement of national income and changes in diet due to economic growth began to increase consumption of organic and eco-friendly farm products, and thus products using organic materials began to be released in bakeries. Thus, it was necessary to understand consumer awareness and purchasing processes for organic bakery products. Specifically, the study examined the structural relations among purchase reasons, purchase motives, and purchase behavioral intention of organic bakery products. A survey was conducted in May 2019 from adults who had experience purchasing organic bakery products in Seoul metropolitan area, and 327 responses were used for data analysis. The findings of the study showed that consumers' interests in health, food safety, and environment had positive effects on their attitudes, subjective norm, and perceived behavioral control toward organic bakery products, while their interests in organic products did not have an effect on perceived behavioral control. There were significant differences in the purchasing process of organic bakery products according to their price sensitivity. The study suggests that the correct delivery of information on organic ingredients and the price policies available to many consumers will contribute to the revitalization of organic bakery products.
The purpose of this study is to analyze the adoption of Kakao Bank in terms of benefits (functional, social, experiential, economic benefits) and differentiated services (customization and service diversity) considering service types. Benefits are personal value consumers attach to the product or service attributes and, therefore, more important than attributes of service itself when using Kakao Bank in the internet based environment. Data was collected using an online and offline survey of 131 Kakao Bank users and analyzed the data using structural equation model (SEM). The results of empirical analysis using SmartPLS show that functional benefit, experiential benefit, and customization are significantly related to the user's satisfaction, but economic benefits, social benefit, and service variety are not. Customer's satisfaction are also showed significantly to be related to the all types of Kakao Bank usage(balance check, transfer, and other services). This study has the significance in that it examines the user's satisfaction and usage of Kakao Bank in terms of benefits and differentiated services while other studies analyzed banking services focusing on the attributes of banking channel itself.
The purpose of this study is to identify the maturity stages of venture firms through classification analysis, which is widely used as a big data technique. Venture companies should develop a competitive advantage in the market. And the maturity stage of a company can be classified into five stages. I will analyze a difference in the growth stage of venture firms between the survey response and the statistical classification methods. The firm growth level distinguished five stages and was divided into the period of start-up and declines. A classification method of big data uses popularly k-mean cluster analysis, hierarchical cluster analysis, artificial neural network, and decision tree analysis. I used variables that asset increase, capital increase, sales increase, operating profit increase, R&D investment increase, operation period and retirement number. The research results, each big data analysis technique showed a large difference of samples sized in the group. In particular, the decision tree and neural networks' methods were classified as three groups rather than five groups. The groups size of all classification analysis was all different by the big data analysis methods. Furthermore, according to the variables' selection and the sample size may be dissimilar results. Also, each classed group showed a number of competitive differences. The research implication is that an analysts need to interpret statistics through management theory in order to interpret classification of big data results correctly. In addition, the choice of classification analysis should be determined by considering not only management theory but also practical experience. Finally, the growth of venture firms needs to be examined by time-series analysis and closely monitored by individual firms. And, future research will need to include significant variables of the company's maturity stages.
Privacy paradox is a paradoxical behavior that provides personal information even though you are concerned about privacy. Social media users are also often concerned about their personal information exposure. It is even reluctant to describe personal information in profile. However, some users describe their personal information in detail on their profile, provide it freely when others request it, or post their own personal information. The survey was conducted using Google Docs centered on Facebook users. Structural equation model analysis was used for hypothesis testing. As an independent variable, we use personal information infringement experiences. As a mediator, we use privacy indifference, privacy concern, and the relationship with the act of providing personal information. Social media users have become increasingly aware of the fact that they can not distinguish between the real world and online world by strengthening their image and enhancing their image in the process of strengthening ties, sharing lots of information and enjoying themselves through various relationships. Therefore, despite the high degree of privacy indifference and high degree of privacy concern, the phenomenon of privacy paradox is also present in social media.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.