The purpose of this study was to investigate the effects of desensitization and flooding on the behavior of dogs during grooming, focusing on their response to the sound and skin stimulation while using a clipper. A total of 20 adult dogs over two years of age with complete personality formation were included in the study. Ten dogs, of which three were Bichons (average weight 5 kg), four were Poodles (average weight 5 kg), and three were Malteses (average weight 4 kg), were subjected to the desensitization process. The remaining 10 adult dogs were subjected to the flooding experiment, and were of the same breed and average weight as the adult dogs used in the desensitization process. The desensitization and the flooding were performed three times a day (approximately 1 min per session) for 10 days. For desensitization, statistical significance was observed only on the fifth day, when compared by breed (p<0.05). Overall, when compared by measurement day, the results of desensitization for Bichon, Poodle and Maltese dogs were statistically significant (p<0.05). The results for the Bichon, Poodle, and Maltese dogs that were subjected to flooding were found to be statistically significant (p<0.05). There was a significant difference in the results of the flooding on the second and ninth days (p<0.05); however, flooding had no effect on the other days (p>0.05). Desensitization using the clipper, a beauty tool, was faster than flooding in achieving stabilization. In conclusion, desensitization and flooding showed positive results on the stress relief and emotions of dogs during grooming, with respect to cosmetic fear response.
Park, Yun-Gwi;Son, Yeo-Jin;Moon, Sung-Hwan;Park, Soon-Jung
Journal of Animal Reproduction and Biotechnology
/
v.37
no.2
/
pp.67-79
/
2022
Currently, there is no treatment to reverse or cure heart failure caused by ischemic heart disease and myocardial infarction despite the remarkable advances in modern medicine. In addition, there is a lack of evidence regarding the existence of stem cells involved in the proliferation and regeneration of cardiomyocytes in adult hearts. As an alternative solution to overcome this problem, protocols for differentiating human pluripotent stem cell (hPSC) into cardiomyocyte have been established, which further led to the development of cell therapy in major leading countries in this field. Recently, clinical studies have confirmed the safety of hPSC-derived cardiac progenitor cells (CPCs). Although several institutions have shown progress in their research on cell therapy using hPSC-derived cardiomyocytes, the functions of cardiomyocytes used for transplantation remain to be those of immature cardiomyocytes, which poses a risk of graft-induced arrhythmias in the early stage of transplantation. Over the last decade, research aimed at achieving maturation of immature cardiomyocytes, showing same characteristics as those of mature cardiomyocytes, has been actively conducted using various approaches at leading research institutes worldwide. However, challenges remain in technological development for effective generation of mature cardiomyocytes with the same properties as those present in the adult hearts. Therefore, in this review, we provide an overview of the technological development status for maturation methods of hPSC-derived cardiomyocytes and present a direction for future development of maturation techniques.
Sarwar, Muhammad Nabeel;UlAmin, Riaz;Jabeen, Sidra
International Journal of Computer Science & Network Security
/
v.22
no.5
/
pp.294-302
/
2022
Detection of fake news is a complex and a challenging task. Generation of fake news is very hard to stop, only steps to control its circulation may help in minimizing its impacts. Humans tend to believe in misleading false information. Researcher started with social media sites to categorize in terms of real or fake news. False information misleads any individual or an organization that may cause of big failure and any financial loss. Automatic system for detection of false information circulating on social media is an emerging area of research. It is gaining attention of both industry and academia since US presidential elections 2016. Fake news has negative and severe effects on individuals and organizations elongating its hostile effects on the society. Prediction of fake news in timely manner is important. This research focuses on detection of fake news spreaders. In this context, overall, 6 models are developed during this research, trained and tested with dataset of PAN 2020. Four approaches N-gram based; user statistics-based models are trained with different values of hyper parameters. Extensive grid search with cross validation is applied in each machine learning model. In N-gram based models, out of numerous machine learning models this research focused on better results yielding algorithms, assessed by deep reading of state-of-the-art related work in the field. For better accuracy, author aimed at developing models using Random Forest, Logistic Regression, SVM, and XGBoost. All four machine learning algorithms were trained with cross validated grid search hyper parameters. Advantages of this research over previous work is user statistics-based model and then ensemble learning model. Which were designed in a way to help classifying Twitter users as fake news spreader or not with highest reliability. User statistical model used 17 features, on the basis of which it categorized a Twitter user as malicious. New dataset based on predictions of machine learning models was constructed. And then Three techniques of simple mean, logistic regression and random forest in combination with ensemble model is applied. Logistic regression combined in ensemble model gave best training and testing results, achieving an accuracy of 72%.
Small streams, despite their rich ecosystems, face challenges in vegetation assessment due to the limitations of traditional, time-consuming methods. This study presents a groundbreaking approach, combining unmanned aerial vehicles(UAVs), convolutional neural networks(CNNs), and the vegetation differential vegetation index (VDVI), to revolutionize both assessment and management of stream vegetation. Focusing on Idong Stream in South Korea (2.7 km long, 2.34 km2 basin area)with eight diverse revetment methods, we leveraged high-resolution RGB images captured by UAVs across five dates (July-December). These images trained a ResNeXt101 CNN model, achieving an impressive 89% accuracy in classifying vegetation cover(soil,water, and vegetation). This enabled detailed spatial and temporal analysis of vegetation distribution. Further, VDVI calculations on classified vegetation areas allowed assessment of vegetation vitality. Our key findings showcase the power of this approach:(a) TheCNN model generated highly accurate cover maps, facilitating precise monitoring of vegetation changes overtime and space. (b) August displayed the highest average VDVI(0.24), indicating peak vegetation growth crucial for stabilizing streambanks and resisting flow. (c) Different revetment methods impacted vegetation vitality. Fieldstone sections exhibited initial high vitality followed by decline due to leaf browning. Block-type sections and the control group showed a gradual decline after peak growth. Interestingly, the "H environment block" exhibited minimal change, suggesting potential benefits for specific ecological functions.(d) Despite initial differences, all sections converged in vegetation distribution trends after 15 years due to the influence of surrounding vegetation. This study demonstrates the immense potential of UAV-based remote sensing and CNNs for revolutionizing small-stream vegetation assessment and management. By providing high-resolution, temporally detailed data, this approach offers distinct advantages over traditional methods, ultimately benefiting both the environment and surrounding communities through informed decision-making for improved stream health and ecological conservation.
KSII Transactions on Internet and Information Systems (TIIS)
/
v.17
no.11
/
pp.3182-3203
/
2023
With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.
Objectives: Protecting people against financial hardship caused by illness stands as a fundamental obligation within healthcare systems and constitutes a pivotal component in achieving universal health coverage. The objective of this study was to analyze the prevalence and determinants of catastrophic health expenditures (CHE) in Iran, over the period of 2013 to 2019. Methods: Data were obtained from 7 annual national surveys conducted between 2013 and 2019 on the income and expenditures of Iranian households. The prevalence of CHE was determined using a threshold of 40% of household capacity to pay for healthcare. A binary logistic regression model was used to identify the determinants influencing CHE. Results: The prevalence of CHE increased from 3.60% in 2013 to 3.95% in 2019. In all the years analyzed, the extent of CHE occurrence among rural populations exceeded that of urban populations. Living in an urban area, having a higher wealth index, possessing health insurance coverage, and having employed family members, an employed household head, and a literate household head are all associated with a reduced likelihood of CHE (p<0.05). Conversely, the use of dental, outpatient, and inpatient care, and the presence of elderly members in the household, are associated with an increased probability of facing CHE (p<0.05). Conclusions: Throughout the study period, CHE consistently exceeded the 1% threshold designated in the national development plan. Continuous monitoring of CHE and its determinants at both household and health system levels is essential for the implementation of effective strategies aimed at enhancing financial protection.
Multi-wavelength variability is a staple of active galactic nuclei (AGN). Optical variability probes the nature of the central engine of AGN at smaller linear scales than conventional imaging and spectroscopic techniques. Previous studies have shown that optical variability is more prevalent at longer timescales and at shorter wavelengths. Intra-night variability can be explained through the damped random walk model but small samples and inhomogeneous data have made constraining this model hard. To understand the properties and physical mechanism of intra-night optical variability, we are performing the KMTNet Active Nuclei Variability Survey (KANVaS). Using KMTNet, we aim to study the intra-night variability of ~1000 AGN at a magnitude depth of ~19mag in R band over a total area of ${\sim}24deg^2$ on the sky. Test data in the COSMOS, XMM-LSS, and S82-2 fields was obtained over 4, 6, and 8 nights respectively during 2015, in B, V, R, and I bands. Each night was composed of 5-13 epoch with ~30 min cadence and 80-120 sec exposure times. As a pilot study, we analyzed data in the COSMOS field where we reach a magnitude depth of ~19.5 in R band (at S/N~100) with seeing varying between 1.5-2.0 arcsec. We used the Chandra-COSMOS catalog to identify 166 AGNs among 549 AGNs at B<23. We performed differential photometry between the selected AGN and nearby stars, achieving photometric uncertainty ~0.01mag. We employ various standard time-series analysis tools to identify variable AGN, including the chi-square test. Preliminarily results indicate that intra-night variability is found for ~17%, 17%, 8% and 7% of all X-ray selected AGN in the B, V, R, and I band, respectively. The majority of the identified variable AGN are classified as Type 1 AGN, with only a handful of Type 2 AGN showing evidence for variability. The work done so far confirms there are more variable AGN at shorter wavelengths and that intra-night variability most likely originates in the accretion disk of these objects. We will briefly discuss the quality of the data, challenges we encountered, solutions we employed for this work, and our updated future plans.
Journal of Korean Home Economics Education Association
/
v.10
no.2
/
pp.131-144
/
1998
The lack of characteristical understanding of the Home Economics Education will have difficulty in achieving the goal of the Home Economics Education. To allow the Home Economics Education class in school contribute toward the enhancement of the quality of life, it is inevitable to reinforce the recognition of the importance and necessity of the Home Economics Education and to newly propose a directional guidance forward the coming 21st century. The purpose of this study was to provide basic data for planners of the future Home Economics Education by surveying research administrators in charge of programming the overall school curriculum. This study was conducted under the following procedure to have the outcome as follows ; 1. Answers from respondents of age over 50 or careers over 16 years tended to grasp the goal of Home Economics Education in relation to the enhancement of quality of life rather than to the accumulation of knowledge, skill or capacity. 2. Of all the surveyed, 9.64% regarded Home Economics Education as an essential part of school education and the positive ratio was higher with younger respondents. 3. To the question asking if the high school Home Economics Education could have influence on one's capacity, 97.2% of the answerers said yes. The respondents with career under 15 year showed 100% of positive agreement in this matter and of age under 40 marked much higher ratio of 98.84% than the elders. 4. The overall recognition of the necessity for separate sections in Home Economics Education programmed in accordance with the 6th Revision of High School Curriculum displayed a considerably high ratio, with a little differences among age and job groups. The purpose of this study is to analyze and understand adolescents'culture, thereby to provide fundamental information for Preventive Education for Adolescents'Problems in Home Economic Education. 745 articles collected in computer communication service were used for the analysis. The data were analyzed by frequency and percentage using the SPSS/PC+computer program. The most important results of this study were as follows ; 1) Concerning 'Adolescent's Problems's, problems such as violence, homicide and robbery were treated with the greatest frequency. It was also analyzed that the older generations are highly inclined to understand adolescents'culture as a negative one, for example, 'delinquency'or 'immaturity'. 2) Although the area of 'Adolescents'Education'was treated most frequently reflecting the high educational concern in our society, the significant part of those articles were on wrongful educational administration. As much as 70.6% of the articles analyzed were on 'Education'and 'Problems'. Thereby it may be concluded that the other areas such as health, activities, worries, values and harmful environments ere treated respectively as only a 'subculture'or'fragmentary culture'. The articles containing correlations and interactions among them and certain alternative proposals were very rare. 3) The areas such as 'Worries and Counselling'and 'Health'were occupying only a small portion of the articles. The articles which were treating the practical worries and their resolutions were even rarer. 4) 'Values'of the adolescents tended to be viewed by the older generations very negatively. It was also found that the older generations gave the tendency to see the 'consumption culture'of the adolescents as a kind of 'counter culture'or'subculture'.
This study aimed to address the increasing demand for technologies preventing mushroom fly damage. By monitoring the annual occurrence patterns of pests over several years and accumulating data, we conducted an analysis to evaluate the efficacy of preventive measures applied before the surge in mushroom fly infestation, typically observed in May. For preemptive control, physical measures involved installing air curtains at cultivation facility entrances and placing sticky traps and insect traps around entry points to block external entry and reduce internal insect density. Additionally, we applied an organic agricultural material, Dalmatian chrysanthemum extract, weekly alongside chemical control measures. To assess the reduction in mushroom fly populations, yellow sticky traps (15×25 cm) were placed at three locations within the mushroom cultivation facility, and the occurrence patterns before and after implementing preventive measures were compared. Compared to conventional practices, the application of preventive techniques resulted in a significant reduction, with a 60% decrease from 15 levels of mushroom flies/m2 to 6 levels of mushroom flies/m2 in May and a 40% decrease from 10 levels of mushroom flies/m2 to 6 levels of mushroom flies/m2 in June. While achieving over 50% efficacy during the peak mushroom fly season with preventive measures, we identified complementary actions such as blocking external sources (gaps in cultivation facility doors) and maintaining cleanliness around cultivation facilities (proper disposal of spent substrate) for further improvement. Comprehensive analysis and safety studies, including correlation analysis with contaminants and pathogens, are recommended to ensure the widespread adoption of mushroom fly preventive techniques for safe and stable mushroom production in the agricultural sector.
This study seeks to shed light on the importance of "advancing administrative computer systems" for research administration efficiency, building upon prior literature, and aims at extending the scholarly discussion on the efficiency of research administration itself. To this end, two research questions were addressed. First, this research explores how research administrators perceive the advocated "advancement of administrative computer systems" in achieving research administration efficiency. Second, it investigates how external bureaucratic control affects burnout among administrative personnel engaged in research administration, and how burnout impacts the research-administration relationship, trust, and ultimately performance. The analysis of interviews and surveys yielded several results. For one, through the analysis of interviews conducted in the field of government-funded research institutions, it was found that "advancing computer systems" is met with practical concerns and skepticism, while also recognized as having the potential to contribute to the efficiency of research administration. Furthermore, it became evident that complex issues are intertwined. From a contrasting standpoint opposing computer advancement, the view that institutional regulations and cultural efficiency should take precedence over technology appears valid and raises a crucial point for consideration. On the other hand, regression analysis related to burnout shows empirical evidence that increased control by central government bureaucrats over administrative staff in government-funded research institutions leads to higher levels of burnout. Such elevated burnout is shown to have detrimental effects on trust between researchers and administrative personnel, as well as on overall performance. Through these discussions, we aim to stimulate academic and government interest in research administration efficiency.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.