KIPS Transactions on Computer and Communication Systems
/
v.11
no.2
/
pp.67-72
/
2022
Recently, various intelligent application services using artificial intelligence are being actively developed. In particular, research on artificial intelligence-based real-time prediction services is being actively conducted in the manufacturing industry, and the demand for artificial intelligence services that can detect and predict fire and odors is very high. However, most of the existing detection and prediction systems do not predict the occurrence of fires and odors, but rather provide detection services after occurrence. This is because AI-based prediction service technology is not applied in existing systems. In addition, fire prediction, odor detection and odor level prediction services are services with ultra-low delay characteristics. Therefore, in order to provide ultra-low-latency prediction service, edge computing technology is combined with artificial intelligence models, so that faster inference results can be applied to the field faster than the cloud is being developed. Therefore, in this paper, we propose an LSTM algorithm-based learning model that can be used for fire prediction and odor detection/prediction, which are most required in the manufacturing industry. In addition, the proposed learning model is designed to be implemented in edge devices, and it is proposed to receive real-time sensor data from the IoT terminal and apply this data to the inference model to predict fire and odor conditions in real time. The proposed model evaluated the prediction accuracy of the learning model through three performance indicators, and the evaluation result showed an average performance of over 90%.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.21
no.3
/
pp.18-29
/
2022
Recently, cooperative intelligent transport systems (C-ITS) testbeds have been deployed in great numbers, and advanced autonomous driving research using V2X communication technology has been conducted actively worldwide. In particular, the broadcasting services in their beginning days, giving warning messages, basic safety messages, traffic information, etc., gradually developed into advanced network services, such as platooning, remote driving, and sensor sharing, that need to perform real-time. In addition, technologies improving these advanced network services' throughput and latency are being developed on many fronts to support these services. Notably, this research analyzed the network latency requirements of the advanced network services to develop a remote driving service for the droid type low-speed robot based on the 3GPP C-V2X communication technology. Subsequently, this remote driving service's performance was evaluated using system modeling (that included the operator behavior) and simulation. This evaluation showed that a respective core and access network latency of less than 30 ms was required to meet more than 90 % of the remote driving service's performance requirements under the given test conditions.
An acoustic vector sensor can simultaneously receive vector quantities, such as particle velocity and acceleration, as well as acoustic pressure at one location, and thus it can be used as a single input multiple output receiver in underwater acoustic communication systems. On the other hand, vector signals received by a single vector sensor have different channel characteristics due to the azimuth angle between the source and receiver and the difference in propagation angle of multipath in each component, producing different communication performances. In this paper, we propose a channel parameter-based weighting method to improve the performance of an acoustic communication system using a single vector sensor. To verify the proposed method, we used communication data collected from the experiment conducted during the KOREX-17 (Korea Reverberation Experiment). For communication demodulation, block-based time reversal technique which is robust against time-varying channels were utilized. Finally, the communication results showed that the effectiveness of the channel parameter-based weighting method for the underwater communication system using a single vector sensor was verified.
KSCE Journal of Civil and Environmental Engineering Research
/
v.44
no.1
/
pp.49-62
/
2024
Reckless development of the underground by rapid urbanization causes inspection delay on replacement of existing structure and installation new facilities. However, frequent accidents occur due to deviation in construction design planned by inaccurate location information of underground structure. Meanwhile, the electrical resistivity survey, knowns as non-destructive method, is based on the difference in the electric potential of electrodes to measure the electrical resistance of ground. This method is significantly advanced with multi-electrode and deep learning for analyzing strata. However, there is no study to quantitatively assess change in electrical resistance according to geometric conditions of structures. This study evaluates changes in electrical resistance through geometric parameters of electrodes and structure. Firstly, electrical resistance numerical module is developed using generalized mesh occurring minimal errors between theoretical and numerical resistance values. Then, changes in resistances are quantitatively compared on geometric parameters including burial depth, diameter of structure, and distance electrode and structure under steady current condition. The results show that higher electrical resistance is measured for shallow depth, larger size, and proximity to the electrode. Additionally, electric potential and current density distributions are analyzed to discuss the measured electrical resistance around the terminal electrode and structure.
KSCE Journal of Civil and Environmental Engineering Research
/
v.44
no.4
/
pp.531-544
/
2024
The purpose of this study is to analyze traffic flow characteristics according to the market penetration rate (MPR) of autonomous vehicles (AV) on road sections where bus rapid transit (BRT) is actually operating. Furthermore, the maximum traffic volume was set through estimation of future traffic demand, and traffic flow characteristics were analyzed through traffic simulation for each scenario considering of a combination of BRT introduction and AV's MPR. To test statistical significance, Kruskal-Willis test and Jonckheere-Terpstra test were used to examine the impact of the market penetration rate of Autonomous vehicles on travel time and delay time etc. At the same time, the existence of the order relationship among travel time data according to the market penetration rate of autonomous vehicle was examined. As a result of the analysis, it was founded that the travel time significantly decreased as the MPR of AV increases in both intermittent flow and continuous flow environments. In particular, in the case of continuous flow, the law of increasing returns was satisfied in the effect of increasing travel speed and reducing travel time as the MPR of AV increases. The results of this study are expected to be used as a basic information for design plans for road reconstruction and space utilization after the commercialization of AV in the future.
Jang Chang-bok;Lee Moo-Hun;Cho Sung-Hoon;Choi Eui-In
The Journal of Korean Institute of Communications and Information Sciences
/
v.30
no.9B
/
pp.610-618
/
2005
As developed Internet and Computer Capability, Many Users take the many information through the network. So requirement of User that use to network was rapidly increased and become various. But it spend much time to accept user requirement on current network, so studied such as Active network for solved it. This Active node on Active network have the capability that stored and processed execution code aside from capability of forwarding packet on current network. So required execution code for executed packet arrived in active node, if execution code should not be in active node, have to take by request previous Action node and Code Server to it. But if this execution code take from previous active node and Code Server, bring to time delay by transport execution code and increased traffic of network and execution time. So, As used execution code stored in cache on active node, it need to increase execution time and decreased number of request. So, our paper suggest ANC caching technique that able to decrease number of execution code request and time of execution code by efficiently store execution code to active node. ANC caching technique may decrease the network traffic and execution time of code, to decrease request of execution code from previous active node.
Journal of the Institute of Electronics Engineers of Korea TC
/
v.46
no.12
/
pp.108-116
/
2009
In this paper, we propose a Ethernet based audio distribution system with a new L1/L2 hybrid switching scheme, and evaluate its performance. The proposed scheme not only offers guaranteed low latency and jitter characteristics that are essentially required for the distribution of high-quality uncompressed audio traffic, and but also provide an efficient transmission of data traffic on the Ethernet environment. The audio distribution system with a proposed scheme consists of a master node and a number of relay nodes, and all nodes are mutually connected as a daisy-chain topology through up and downlinks. The master node generates an audio frame for each cycle of 125us, and the audio frame has 24 time slotted audio channels for carrying stereo 24 channels of 16-bit PCM sampled audio. On receiving the audio frame from its upstream node via the downlink, each intermediate node inserts its audio traffic to the reserved time slot for itself, then relays again to next node through its physical layer(L1) transmission - repeating. After reaching the end node, the audio frame is loopbacked through the uplink. On repeating through the uplink, each node makes a copy of audio slot that node has to receive, then play the audio. When the audio transmission is completed, each node works as a normal L2 switch, thus data frames are switched during the remaining period. For supporting this L1/L2 hybrid switching capability, we insert a glue logic for parsing and multiplexing audio and data frames at MII(Media Independent Interlace) between the physical and data link layers. The proposed scheme can provide a good delay performance and transmission efficiency than legacy Ethernet based audio distribution systems. For verifying the feasibility of the proposed L1/L2 hybrid switching scheme, we use OMNeT++ as a simulation tool with various parameters. From the simulation results, one can find that the proposed scheme can provides outstanding characteristics in terms of both jitter characteristic for audio traffic and transmission efficiency of data traffics.
Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.
The timely procurement of military supplies is essential to maintain the military's operational capabilities, and contract work is the first step toward timely procurement. In addition, rapid signing of a contract enables consumers to set a leisurely delivery date and increases the possibility of budget execution, so it is essential to improve the contract process to prevent early execution of the budget and transfer or disuse. Recently, research using big data has been actively conducted in various fields, and process analysis using big data and process mining, an improvement technique, are also widely used in the private sector. However, the analysis of contract work in the military is limited to the level of individual analysis such as identifying the cause of each problem case of budget transfer and disuse contracts using the experience and fragmentary information of the person in charge. In order to improve the contract process, this study analyzed using the process mining technique with data on a total of 560 contract tasks directly contracted by the Department of Finance of the Air Force Logistics Command for about one year from November 2019. Process maps were derived by synthesizing distributed data, and process flow, execution time analysis, bottleneck analysis, and additional detailed analysis were conducted. As a result of the analysis, it was found that review/modification occurred repeatedly after request in a number of contracts. Repeated reviews/modifications have a significant impact on the delay in the number of days to complete the cost calculation, which has also been clearly revealed through bottleneck visualization. Review/modification occurs in more than 60% of the top 5 departments with many contract requests, and it usually occurs in the first half of the year when requests are concentrated, which means that a thorough review is required before requesting contracts from the required departments. In addition, the contract work of the Department of Finance was carried out in accordance with the procedures according to laws and regulations, but it was found that it was necessary to adjust the order of some tasks. This study is the first case of using process mining for the analysis of contract work in the military. Based on this, if further research is conducted to apply process mining to various tasks in the military, it is expected that the efficiency of various tasks can be derived.
Corporate rebranding has been evident in the qualitative corporate rebranding studies as an imposed organizational change that induces mixed reactions and ambivalent attitudes among consumers. Corporate rebranding for the established and familiar corporate brands leads to more ambivalent attitudes as these companies represent larger targets for disparaging information. Consumers are found to hold both positive and negative reactions toward companies and brands that they are familiar with. Nevertheless, the imposed change assumption and ambivalent attitude, in particular corporate rebranding, have never been widely explored in the quantitative corporate rebranding studies. This paper aims to provide a comprehensive empirical examination of the ambivalence towards rebrandingrebranded brand attitude-purchase intention relationships. The author proposes that corporate rebranding for familiar corporate brands is a double-edged sword that not only raises the expectation for better performance, but also induces conflicted and ambivalent attitudes among consumers. These consumers' ambivalent attitudes are influenced by both the parent brands-related and general attitude factors which further affect their rebranded brand attitude and purchase intention. A total of 156 useable questionnaires were collected from Malaysian working adults; and two established Malaysian airfreight operators were utilized as the focal parent brands. The study found a significant impact of prior parent brand attitudes on ambivalence towards rebranding (ATR). The parent brand attitudes served as anchors in influencing how new information was processed (Mazaheri et al., 2011; Sherif & Hovland, 1961) and closely related to behavioral intention (Prislin & Quellete, 1996). The ambivalent attitudes experienced were higher when individuals held both positive and negative reactions toward the parent brands. Consumers also held higher ambivalent attitudes when they preferred one of the parent brands; while disliked the other brand. The study also found significant relationships between the lead brand and the rebranded brand attitude; and between the partner brands and ATR. The familiar but controversial partner brand contributed significantly to the ambivalent attitudes experienced; while the more established lead brand had significant impact on the rebranded brand attitude. The lead and partner brands, though both familiar, represented different meanings to consumers. The author attributed these results to the prior parent brand attitudes, the skepticism and their general ambivalence toward the corporate rebranding. Both general attitude factors (i.e. skepticism and general ambivalence towards rebranding) were found to have significant positive impacts on ATR. Skeptical individuals questioned the possibility of a successful rebranding (Chang, 2011) and were more careful with their evaluations toward 'too god to be true' or 'made in heaven' pair of companies. The embedded general ambivalent attitudes that people held toward rebranding could be triggered from the associative network by the ambiguous situation (Prislin & Quellete, 1996). In addition, the ambivalent rebranded brand attitude was found to lower down purchase intention, supporting Hanze (2001), Lavine (2001) and van Harreveld et al. (2009)'s studies. Ambivalent individuals were found to prefer delay decision making by choosing around the mid-ranged points in 'willingness to buy' scale. The study provides several marketing implications. Ambivalence management is proven to be important to corporate rebranding to minimize the ambivalent attitudes experienced. This could be done by carefully controlling the parent brands-related and general attitude factors. The high ambivalent individuals are less confident with their own conflicted attitudes and are motivated to get rid of the psychological discomfort caused by these conflicted attitudes (Bell & Esses, 2002; Lau-Gesk, 2005; van Harreveld et al., 2009). They tend to process information more deeply (Jonas et al., 1997; Maio et al., 2000; Wood et al., 1985) and pay more attention to message that provides convincible arguments. Providing strong, favorable and convincible message is hence effective in alleviating consumers' ambivalent attitudes. In addition, brand name heuristic could be utilized because the rebranding strategy sends important signal to consumers about the changes that happen or going to happen. The ambivalent individuals will pay attention to both brand name heuristic and rebranding message in their effort to alleviate the psychological discomfort caused by ambivalent attitudes. The findings also provide insights to Malaysian and airline operators for a better planning and implementation of corporate rebranding exercise.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.