It establishes the nonlinear optics material recently on solid-state laser output side and from the infrared ray until is early has in the ultraviolet rays and the wavelength of broadband there makes be a possibility of getting the laser light which and in processing and measuring field it is widely used. Consequently, it used the pulse reiteration law from origination and nine as the fundamental wave direct plan it produced. intense it affixed the nonlinear optics material (KTP) in pulsed light and it got the green light. When inflicting a same energy in respectively reiteration mesh, intense interrelation of pulse light output and green light output between. It analyzed the conversion ratio which it follows in the mesh.
Polarography is a subclass of voltammetry where the working electrode is a dropping mercury electrode. More, I developed the experiment for raising up mercury electrode. In Voltammetry, information about an analyte is obtained by measuring the current as the potential is varied at oxidation-reduction reaction. A plot of current vs. potential in a polarography experiment shows the current oscillations correspoding to the drops of Hg falling from the capillary. The drops growth causes capacitive and faradic current. These changing current effects combined with experiments where the potential is continuously changed can result in noisy traces. The raising up type improved upon the method of dropping in hardware. In reduction of the noise, moving average smoothing method have been used. But the other procedure is introduced based on Fourier transformation. So FFT and IFFT engine was implemented and installed in my experiment. However, after experimentation, peak height as the measuring parameter gave a good linear relationship to concentration. The resolution of potential peaks of various kinds, using Zn and Cu as the example, was improved using the smoothing method.
Recently, the Main Memory DBMS is gradually being expanded by the appearance of a large capacity of a Main Memory System, the increase in business area where it requires a real time process, and the rise of the users' required level. The Main Memory DBMS, which is able to go through a large capacity data process of the disk-based DBMS and guarantees a high efficiency, has domestically developed and has been put to a practical use. This paper presents an examination of the applied technologies and the limits of Altibase system, which is Main Memory DBMS. Moreover, it evaluated and performed a comparative analysis on the performance level of the Main Memory DBMS and the disk-based DBMS based on the same application. After five trials of the experiment based on the operating application, it was confirmed that the performance level of the Main Memory DBMS is enhanced and is higher by 4.13 to 7.89 times than the disk-based DBMS.
This paper is about the architectures of an extensible and scalable home automation system which is based on instant messaging. The extensibility is the most important feature of the system because there are very diverse appliances at home and they can be added or replaced with other products frequently. For the extensibility, we propose façade architecture for communication, distributed agent architecture for the system, layered architecture for agents, and bridge architecture for wrapping existing facilities. Using these architectures, we reduce the system complexity and get the extensibility to add new products with least cost. Furthermore, we also introduce our prototype system and show that it is extensible.
Nowadays, according to rapid development of computing environments, information processing and analysis system are very interesting research area. As a viewpoint of data preparation-processing-analysis in knowledge technology, the goal of automated information system is to satisfy high reliability and confidence and to minimize of human-administrator intervention. In addition, we expect the system which can deal with problem and abnormal error effectively as a fault detection and fault tolerance. In this paper, we design a monitoring system as follows. A productive monitoring information from various systems has unstructured forms and characteristics and crawls informative data by conditions and gathering rules. For representing of monitering information which requested by administrator, running-status can be able to check dynamically and systematic like connection/closed status in real-time. Our proposed system can easily correct and processing for monitoring information from various type of server and support to make objective judgement and analysis of administrator under operative target of information system. We implement semi-realtime monitering system using AJAX technology for dynamic browsing of web information and information processing using XML and XPATH. We apply our system to SMS server for checking running status and the system shows that has high utility and reliability.
Many failures are due to incorrectly programmed transactions and data entry errors. System failure causes the loss or corruption of the contents of volatile storage. Although global processing protects data values to detect direct or indirect information effluence, security environments are very important in the recovery management of heterogeneous systems. Although transaction can't control system fault, the restart for the system can cause information effluence by low bandwith. From various faults, it is not easy to maintain the consistency and security of data. This paper proposes recovery management protocols to assure global multilevel secure one-copy quasi-serializability in security environments of heterogeneous systems with replicated data and proves its correctness. The proposed secure protocols guarantee the reliability and security of system when the system fault is happened.
PACS and Medical Image System use only high level metadata in retrieving desired image nowadays. In order to retrieve Medical Image Data more efficiently, it would be needed to retrieve similarity by utilizing low level metadata as well as keyword retrieval by high level metadata. Thus, In this paper presents that it has realized similarity retrieval by low level metadata on the basis of MPEG-7, and keyword retrieval by high level metadata of DICOM base. It would be also available to look into medical image data in various methods and read accurate image promptly for diagnosis and treatment by retrieval with integrating two metadata.
High-speed services and bulk transmission were available by the development of the network and communication technologies. Moreover various next-generation converged services are undergoing a change by various services. This paper presents improved real-time simulated traffic generation and verification schemes based on the actual traffic pattern analysis. For this, we analyzed traffic patterns of actual application system and generated simulated traffics. We also suggested scheme that verify similarity of simulated traffic and actual traffic.
In this paper, the implementation of creative engineering robot with MCU platform is described. This robot, as a platform of robot system to be used as creative engineering education, has to satisfy restrictions in many aspects in order to study algorithm and apply for the processor based function and pattern recognition application. Considering many restrictions of the mobile platform for creative robot system, we made this robot autonomous by using efficiently the LINUX embedded system. And we choose Marvell Monahan processor(PXA320) as MCU flatform, and used CentOS5.2 as an embedded OS that has the function of robustness and optimality. For flexibility and modularity, the platform has expansion ports. The results of experiment are described to show the pattern matching of creative engineering mobile robot with LINUX programming environments.
Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.
In the security environments of heterogeneous multidatabase systems, not only the existing local autonomy but also the security autonomy as a new constraint are required. From global aspects, transactions maintain consistent data value when they assure serializability. Also, secure properties must protect these transactions and data values to prevent direct or indirect information effluence. This paper proposes scheduling algorithm for global transactions to ensure multilevel secure one-copy quasi-serializability (MLS/1QSR) in security environments of multidatabase systems with replicated data and proves its correctness. The proposed algorithm does not violate security autonomy and globally guarantees MLS/1QSR without indirect information effluence in multidatabase systems.
In the paper, we designed an automatic security diagnostic evaluation System(SeDES) based on a security diagnostic evaluation model(SeDEM) for an organization's security assurance. The SeDEM evaluates a security level of an organization quantitatively by a security evaluation formula which is composed of security variables and security index as applying the statistical CAEL model for evaluate risk level of banks. The SeDES has a good expandability as changing security variables according to an organization scale, characteristics and so on. And it also has a excellent usage because it inputs only numeric data got from statistical technique to security index. We can understand more a security level correctly than the existent risk assessment system because it is possible to assess quantitatively with an security grade as well as score. analysis.
The recent interest in sensor networks has led to a number of routing schemes that use the limited resources available at sensor nodes more efficiently. These schemes typically try to find the minimum energy path to optimize energy usage at a node. Some schemes, however, are prone to unbalance of the traffic and energy. To solve this problem, we propose a novel solution: a gradient-field approach which takes account of the minimum cost data delivery, energy consumption balancing, and traffic equalization. We also modify the backoff-based cost field setup algorithm to establish our gradient-field based sensor network and give the algorithm. Simulation results show that the overhead of routing establishment obtained by our algorithm is much less than the one obtained by Flooding. What's more, our approach guarantees the basic Quality of Service (QoS) without extra spending.
This paper is proposed that in-output Digital module is acquired a vibration signal of a rotating machinery by Data Acquisition System. The module is designed to get ride of nose through low pass filter on the vibration signal from sensors and set the gain value for being able to sampling AC to DC, and also the sampled data by sampler and the conversed data by DIP/FPGA is supplied to the analyzer for analysis at a software tool. The DIP(Digital Signal Processor) of the Digital input/output Board makes Average voltage, Peak to Peak voltage, RMS(Root Mean Square) and Gap voltage, also FFT(Fast Fourier Transform) for rotating vibration diagnosis.
Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Password-based protocols for authenticated key exchange are designed to work even when user authentication is done via the use of passwords drawn from a small known set of values. There have been many protocols proposed over the years for password authenticated key exchange in the three-party scenario, in which two clients attempt to establish a secret key interacting with one same authentication server. However, little has been done for password authenticated key exchange in the more general and realistic four-party setting, where two clients trying to establish a secret key are registered with different authentication servers. In fact, the recent protocol by Yeh and Sun seems to be the only password authenticated key exchange protocol in the four-party setting. But, the Yeh-Sun protocol adopts the so called "hybrid model", in which each client needs not only to remember a password shared with the server but also to store and manage the server's public key. In some sense, this hybrid approach obviates the reason for considering password authenticated protocols in the first place; it is difficult for humans to securely manage long cryptographic keys. In this work, we introduce a key agreement protocol and a key distribution protocol, respectively, that requires each client only to remember a password shared with its authentication server.
While portable and wireless devices are pouring, a new network technology is needed as a breakthrough. The new network technology features large delays, intermittent connectivity, and absence of an end-to-end path from sources to destinations. A network which has one of those characteristics is called DTNs(Delay Tolerant Networks). The main 4 routing methods have been researched so far in extream environment. In this paper, we look into the reliability of DTMNs(Delay Tolerant Mobile Networks) in several different situations, and propose an algorithm that selects a positive routine by sending the only information of its position when making a connection to a detected node. We simulate the proposed algorithm here in DTN using ONE simulator. As a result, it shows that the algorithm reduces the number of message transmission each node.
There are many research for efficient, robust and invisible watermarking system that protects the digital contents like a image and animation according to growth of IT industry. First of all, frequency domain watermarking system like DWT(Descrete Wavelet Transform) is excellent because of minimum loss of original image and robustness of external attack. But, if we raise the insertion strength of watermark, then blazing of image occurs on existing DWT watermarking system and we should have a regular square image. In this study, we research the overflow check for preventing image from blazing and a robust and invisible watermarking algorithm. And we research a free-size DWT watermarking system using padding bytes, without a dependency of size.
In come cases, people differently respond on the same joke or thoughtless behavior - sometimes like it and laugh, another time feel annoyed or angry. This fact is explained that experiences which we had in the past are remembered by emotional memory, so they cause different responses. When people face similar situation or feel similar emotion, they evoke the emotion experienced in the past and the emotional memory affects current emotion. This paper suggested the mechanism of the emotional memory using SOM through the similarity between the emotional memory and SOM learning algorithm. It was assumed that the mechanism of the emotional memory has also the characteristics of association memory, long-term memory and short-term memory in its process of remembering emotional experience, which are known as the characteristics of the process of remembering factual experience. And then these characteristics were applied. The mechanism of the emotional memory designed like this was applied to toy hammer game and I measured the change in the power of toy hammer caused by differently responding on the same stimulus. The mechanism of the emotional memory suggest in above is expected to apply to the fields of game, robot engineering, because the mechanism can express various emotions on the same stimulus.
In this paper, an efficient multi-level successive elimination algorithm using the locality in block was proposed for motion estimation. If SAD(sum of absolute difference) is calculated from large absolute difference values to small absolute difference values, SAD is increased rapidly. So, partial distortion elimination in SAD calculation can be done very early. Hence, the computations of SAD calculation can be reduced. In this paper, an efficient algorithm to calculate SAD from large absolute difference values to small absolute difference values by using the locality in block. Experimental results show that the proposed algorithm is an efficient algorithm with 100% motion estimation accuracy for the motion estimation of motion vectors.
This paper suggests the system for searching and application is to be in combination between existing hair art area and Image/Video processing area. This proposed system usually saves various hair types into a database, then, users send images of their face over the internet by using WebCam. Finally, they can find the hair types for users. Hair cutting is technology that form draft to make hair style. Man cut must decide how in image of sinciput, image of side bean curd, after lower image must operate. Silhouette is produced as is different by change of this three places. Customer increases in the beauty salon and beauty salon chain being changed, research about beauty art is necessary point of time. In this treatise, our country of when swim and operate haircut about problem that happen sample survey and analysis.
The purpose of this study is to elicit influential factors on accepting IPTV services and define the casual relationship between the factors, and "user satisfaction", "re-use intention", "stranger recommendation intention", in an attempt to provide useful guidelines to IPTV carriers, contents providers and equipment makers for their forming IPTV service models and marketing strategies. For this end, the theoretical background of this study has been brought from relevant literature, and theoretical study models have been established by logical reasoning of the interrelation among diverse components. Then, the established models have been analyzed by using statistical packages "SPSS(12.0), LISREL(8.72)". Finally theoretical and practical significance and future study direction have been suggested. To make sure of effective validity of IPTV service adoption models above, empirical studies should be made continuously. And then vertical and horizontal studies at a specific point would show ever-changing causal relationship, helping to promote financial outcome of relevant companies and organizations.
The purpose of this paper is to identify the relationship among five factors of web design, e-satisfaction, e-loyalty, and customer defection and provide the implications of marketing strategies in online shopping. The research findings are as follows: first, ease of use of web design affects positively e-satisfaction more than the other factors except financial security. Second, e-satisfaction affects positively e-loyalty. Third, e-satisfaction does not affect customer defection. Fourth, informativeness, styling, ease of use, and trust of web design affect indirectly e-loyalty by mediating e-satisfaction. Therefore, because there is a good circular relationship among web design, e-satisfaction, and e-loyalty, it is very important to enhance web design for customers. When customers satisfy highly with the factors of web design, e-loyalty is higher and customer defection is lower. Further, in a curriculum of web design it is needed to reflect the findings of this paper.
With the growth of e-commerce banks make the best use of internet banking which can provide all sorts of financial services in cyber space and satisfy customers beyond traditional banking services which are cash reserve and loan based on retail. For survival of internet banking high quality of service should be provided to customers. For this, the attributes of service quality in internet banking should be identified first. The studies on scale of service quality in internet banking have been divided into two ways. While traditional way has focused on SERVQUAL, several researchers have developed scale of e-service quality. However, the dimension of e-service quality is applied from the traditional dimension of service quality. In this paper five dimensions of tangibles, reliability, responsiveness, assurance, and empathy based on SERVQUAL are used as scale of service quality in internet banking through reviewing previous studies. In addition, because service value is correlated to service quality, the dimensions of service quality can affect e-service value. The positive relationship among e-service value, customer satisfaction, and customer loyalty in online or offline service has been identified by previous studies. The purpose of this study is to identify the relationship among service quality, e-service value, customer satisfaction, and customer loyalty in internet banking. SPSS 12.0 is used to test validity and reliability of questionnaire items and correlation of variables and AMOS 4.0 is used to test the hypotheses. The results of this study show that the responsiveness, assurance, and empathy factors of service quality have a positive effect on service value and that the tangible and assurance factors have a positive effect on customer satisfaction. It also shows that e-service value affects positively customer satisfaction and loyalty. Customer satisfaction affects positively customer loyalty. Therefore, to enhance customer satisfaction and loyalty, service quality and value of internet banking should be improved through reinforcing customers' trust in internet service quality.
HSDPA(High Speed Downlink Packet Access) service has begun nationwide network service since the year 2007 and will be leading technology in mobile service technologies in domestic. But the ARPU(Average Revenue Per Use) from HSDPA has not increased, despite of increasing in subscribers with HSDPA service. It's important to understand why the incresing subscriber with hsdp didn't cause the increasing of its usage. The purpose of this study is to examine factors affecting the intention to adopt and to use HSDPA which refer to the new 3.5 generation communication service, and we are to analyze the relation between the two intentions based on previous studies about technology acceptance.
Nowadays, lots of software that have similar functions is being produced. Hence it is getting more important to select the best and suitable software for each individual or company. Moreover, there are few trustworthy materials regarding to the objective procedure and criteria for the best evaluation of the software quality. To overcome these problems, benchmarking has been carried out. However, benchmarking is also confronting the limit of quality evaluation verification due to the difficult of the objectification of the major test items. To solve these problems, some others try to evaluate the quality of software using objective criteria of evaluation based on ISO/IEC standards. Nevertheless, this method using these defined evaluation items and criteria may result in not very reliable outcome. Therefore, this paper offers the evaluation items reflected in the characteristics of each software in order to prove the validity of the proposed method. Moreover, the objective and quantitative criterion which analyzes and reflects the organization characteristics using AHP methodology is applied to the experiment and performance evaluation. Hence we expect that the proposed method provides the needs of the re-establishment of software quality evaluation criteria and the improvement of process in terms of management.
The purpose of this study is to identify the organizational characteristics that enhance CRM performances of a company dipend on firm's size. Based on a review of diverse definitions of CRM performance, this study examines the relationships among CRM performance measures and organizational characteristics. A questionnaire survey of 140 CRM managers of Korean companies was conducted to test the proposed research model, and a series of structural equation modeling identified the strong effects of organizational characteristics on CRM performance. This study confirmed that firm's size is very important element of CRM performance. And organizational members' resistance to change was found to have no effects on CRM performance.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.