Statement of problem: Loosening or fracture of the abutment screw is one of the common problems related to the dental implant. Generally, in order to make the screw joint stable, the preload generated by tightening torque needs to be increased within the elastic limit of the screw. However, additional tensile forces can produce the plastic deformation of abutment screw when functional loads are superimposed on preload stresses, and they can elicit loosening or fracture of the abutment screw. Therefore, it is necessary to find the optimum tightening torque that maximizes a fatigue life and simultaneously offer a reasonable degree of protection against loosening. Purpose: The purpose of this study was to present the influence of tightening torque on the implant-abutment screw joint stability with the 3 dimensional finite element analysis. Material and methods: In this study, the finite element model of the implant system with external butt joint connection was designed and verified by comparison with additional theoretical and experimental results. Four different amount of tightening torques(10, 20, 30 and 40 Ncm) and the external loading(250 N, $30^{\circ}$) were applied to the model, and the equivalent stress distributions and the gap distances were calculated according to each tightening torque and the result was analyzed. Results: Within the limitation of this study, the following results were drawn; 1) There was the proportional relation between the tightening torque and the preload. 2) In case of applying only the tightening torque, the maximum stress was found at the screw neck. 3) The maximum stress was also shown at the screw neck under the external loading condition. However in case of applying 10 Ncm tightening torque, it was found at the undersurface of the screw head. 4) The joint opening was observed under the external loading in case of applying 10 Ncm and 20 Ncm of tightening torque. 5) When the tightening torque was applied at 40 Ncm, under the external loading the maximum stress exceeded the allowable stress value of the titanium alloy. Conclusion: Implant abutment screw must have a proper tightening torque that will be able to maintain joint stability of fixture and abutment.
Journal of the korean academy of Pediatric Dentistry
/
v.31
no.4
/
pp.555-563
/
2004
The pH of beverages is known to be low and have, therefore, been implicated in the increasing incidence of erosion. Erosion is believed to be the predominant cause of teeth wear in children and young adults, although there will always be a contribution from attrition and abrasion. The aim of the present study was to evaluate the effect of yogurt on the progression of erosive demineralization in human enamel using demineralization model in vitro. In 4 yogurts, available on the market, pH, buffering capacity and the concentrations of calcium, phosphate and fluoride were determined. The buffering effect was determined by titration with NaOH. 50 milliliters of each drink was then titrated with 1M sodium hydroxide, added in 0.5 milliliters increments, until the pH reached about 7. Human deciduous enamel(n=40) samples were divided into four groups and exposed to 80ml of the yogurt for 30,60, 90 and 120min. Enamel surface microhardness(VHN) was examined before and after each exposure. 1. The average PH of fermented milk was 3.77 and this pH value was acidic enough to cause tooth erosion. 2. All of the fermented milks were found to be erosive(p<0.05) 3. The teeth exposed to the fermented milk all showed erosion like lesions and microhardness measurements showed that enamel surface hardness decreased proportionately with increased time of immersion in all tooth specimen groups. 4. After immersion for 30 and 60 minutes, reduction rate of microhardness values was not significantly different between the groups(p>0.05). However, after 90 and 120 minutes, reduction rate of each group was significantly different(p<0.05).
Kim, Ju-Hwan;Park, Kee-Sang;Song, Hai-Bum;Chun, Sang-Sik
Clinical and Experimental Reproductive Medicine
/
v.27
no.3
/
pp.235-243
/
2000
Objective: Our present studies were conducted to examine more effective isolating method of preantral follicles from mouse ovaries. Methods: ICR mice (3-6 weeks old) were sacrificed through cervical dislocation and their ovaries were removed and put into watch glasses containing Hams F-10 supplemented with 10% fetal bovine serum (FBS). Preantral follicles were isolated by three different methods; 1) enzymatical method and 2) mincing method, and 3) scraping method. Enzymatical method was carried out as following. Ovaries were bisected with a pair of fine 30G needles. Bisected ovaries were incubated at $37^{\circ}C$ and 5% $CO_2$ incubator in 2-well dish containing Hams F-10 supplemented with collagenase 600 lU/ml and DNAse 20 lU/ml. After 20 min., follicles were isolated by repeated pipetting. Isolated preantral follicles were collected, and the remnant of tissues was placed in incubator and previous procedure was repeated. Mincing method was carried out with a pair of fine 30G needles attached to 1 ml syringes and minced ovary. Scraping method was carried out with a pair of fine 30G needles and scratched to surface of ovary. The differences between isolating methods were analyzed using Student's t-test and Chi-square. Results were considered statistically significant when ${\rho}$ value was less than 0.05. Results: In handling time, mincing or scraping method ($28{\pm}3.42$ min or $16{\pm}1.58$ min) were significantly (p<0.00001) shorter than enzymatical method ($72{\pm}1.69$ min), and scraping method was significantly (p<0.01) shorter than mincing method. Total number of isolated follicles was significantly (p<0.0001) higher in enzymatical method ($49.8{\pm}3.91$) than in mincing or scraping method ($25.3{\pm}2.33$ or $20.5{\pm}1.75$). Isolated follicles in ${\leq}$90${\mu}m$ were significantly (p<0.005) higher in enzymatical method ($15{\pm}1.71$) than in mincing or scraping method ($7.8{\pm}0.98$ or $8.1{\pm}1.31$). In 91~130 ${\mu}m$, isolated follicles were significantly (p<0.0005) higher in enzymatical method ($33{\pm}3.27$) than in mincing or scraping method ($16.3{\pm}1.82$ or $10.7{\pm}1.38$). In ${\geq}$ 131 ${\mu}m$, isolated follicles were not significantly differences between all groups. In equal sizes, the rate of isolated follicles in ${\leq}$ 90 ${\mu}m$ was highest in scraping method (39.6% vs. enzymatical method: 30.1%, p<0.05; mincing method: 30.9%, p=0.11719, NS). Rate of follicles in $91{\sim}130$${\mu}m$ was significantly (p<0.05) lower in scraping method (52.7%) than in enzymatical or mincing method (66.3% or 64.5%). Rate of follicles in ${\geq}$131 ${\mu}m$ was highest in scraping method (8.3% vs. enzymatical or scraping method: 3.6%, p<0.05 or 4.6%, p=0.19053, NS). Conclusions: This study suggests that scraping method is simple and useful for isolation of preantral follicles, because this method reduced handling time and recovered enough follicles. The recovered rate of isolated follicles in diameter of 91 ~ 130 ${\mu}m$ was highest in all methods.
This study was conducted to investigate the contents of ginsenosides and physiochemical properties of Panax ginseng after 9 times steaming and drying treatment by using the new auto steamer which is more fast and simple than previous report. In the process of steaming and drying, the content of six major ginsenosides such as Rg1, Re, Rb1, Rc, Rb2 and Rd were gradually decreased. On the other hand, the content of seven minor ginsenosides includes Rh1, 20(S)-Rg2, 20(R)-Rg2, 20(S)-Rg3, 20(R)-Rg3, Rk1 and Rg5 were gradually increased. We observed the protopanxadiol ginsenosides such as Rb1, Rb2, Rc and Rd were converted into 20(S)-Rg3, 20(R)-Rg3, Rk1 and Rg5; similarly protopanxatriol ginsenosides of Rg1 and Re were converted into Rh1, 20(S)-Rg2 and 20(R)-Rg2. Based on the result of fresh ginseng, the contents of reducing sugar, acidic polysaccharide and total phenolic compounds were gradually increased and reached to maximum at 7 times repetitive steaming process of the fresh ginseng. Whereas DPPH radical scavenging activities were gradually decreased to 68% at 7 times steaming. New auto 9 repetitive steaming and drying process has similar production with original methods, but content of benzo(a)pyrene were not almost detected comparatively taking less time. The present results suggested that this method is best for the development of value-added ginseng industry related products.
Hwang, Chung Eun;Haque, Md. Azizul;Lee, Jin Hwan;Ahn, Min Ju;Lee, Hee Yul;Lee, Byong Won;Lee, Yu-Young;Lee, Choonwo;Kim, Byung Joo;Park, Ji-Yong;Sim, Eun-Yeong;Lee, Dong Hoon;Ko, Jong Min;Kim, Hyun Tae;Cho, Kye Man
Korean Journal of Microbiology
/
v.52
no.2
/
pp.202-211
/
2016
This study evaluated the changes of phytoestrogen contents and antioxidant activities of soybean-powder milk (SPM) prepared from yellow soybean during fermentation with Lactobacillus plantarum P1201. In consequence, the levels of total phenolic and isoflavone-aglycone contents, ABTS and DPPH radical-scavenging activities, and FRAP assay values increased, while isoflavone-glycoside contents decreased during fermentation. The highest levels of daidzein, glycitein, and genistein were present in the Daepung SPM at concentrations of 177.92, 20.64, and $106.14{\mu}g/g$, respectively after 60 h of fermentation. Moreover, Daepung SPM showed the highest DPPH radical-scavenging activity of 48.54%, an ABTS radical-scavenging activity of 99.25%, and a FRAP assay value of 0.84 at the end of fermentation. The fermented Daepung SPM possessed highest isoflavone aglycone contents and antioxidant activities, which can be utilized for the development of functional foods.
We have recently discovered that mycelium of Phellinus linteus, popular medical mushrooms in Korea, possess alcohol dehydrogenase and produce alcohol. In the present study, it was examined that the effect of fermented rice wine made by using mycelium of P. linteus (FLMP) on the expression of in-flammation-related proteins in both $HepG_2$ cells and rats. To examine the effect of FLMP on the morphology and expression of inflammatory proteins in $HepG_2$ cells, the cells were incubated with ethanol, and FLMP for 24 hours, and then analyzed by microscopic observation and Western blot and reverse transcription polymerase chain reaction (RT-PCR). While ethanol induced the morphological change accompanied with cell debris formation and scattering on $HepG_2$ cells, FLMP had no effect. The results of Western blot and RT-PCR analyses showed that the level of inducible nitric oxide synthase (iNOS), cyclooxygenase (COX)-1 and COX-2 was induced by ethanol, however, FLMP inhibited the expression of these proteins and its mRNAs. In the animal model, the value of flutamate oxaloacetate transaminase and glutamate pyruvate transaminase was significantly increased by administration with ethanol. But the group administrated with FLMP showed lower levels on the changes of these markers compared with ethanol-administrated group. Besides, the results of Western blot and RT-PCR analyses showed that the expression of inflammatory proteins such as iNOS, COX-1 and COX-2 was not affected by FLMP administration in rat liver. About histopathological and immunohistochemical observations, inflammatory loci were markedly decreased in the FLMP-administrated rat compared to ethanol-administrated rats and showed weaker COX-2 and iNOS jmmunoreactions. These results suggested that FLMP showed slight changes on the inflammatory proteins expression compared to ethanol and FLMP may be used as a functional alcoholic beverage.
Recently, the battlefield environment has changed from platform-centric warfare(PCW) which focuses on maneuvering forces into network-centric warfare(NCW) which is based on the connectivity of each asset through the warfare information system as information technology increases. In particular, C4I(Command, Control, Communication, Computer and Intelligence) system can be an important factor in achieving NCW. It is generally used to provide direction across distributed forces and status feedback from thoseforces. It can provide the important information, more quickly and in the correct format to the friendly units. And it can achieve the information superiority through SA(Situational Awareness). Most of the advanced countries have been developed and already applied these systems in military operations. Therefore, ROK forces also have been developing C4I systems such as KJCCS(Korea Joint Command Control System). And, ours are increasing the budgets in the establishment of warfare information systems. However, it is difficult to evaluate the C4I effectiveness properly by deficiency of methods. We need to develop a new combat effectiveness evaluation method that is suitable for NCW. Existing evaluation methods lay disproportionate emphasis on technical factors with leaving something to be desired in human factors. Therefore, it is necessary to consider technical and human factors to evaluate combat effectiveness. In this study, we proposed a new Combat Effectiveness evaluation algorithm called E-TechMan(A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System). This algorithm uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}\frac{V{\upsilon}I}{T}{\times}C$). Five factors considered in combat effectiveness evaluation are network power(M), movement velocity(v), information accuracy(I), command and control time(T) and collaboration level(C). Previous researches did not consider the value of the node and arc in evaluating the network power after the C4I system has been established. In addition, collaboration level which could be a major factor in combat effectiveness was not considered. E-TechMan algorithm is applied to JFOS-K(Joint Fire Operating System-Korea) system that can connect KJCCS of Korea armed forces with JADOCS(Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS(Joint Chiefs of Staff) level. We compared the result of evaluation of Combat Effectiveness by E-TechMan with those by other algorithms(e.g., C2 Theory, Newton's second Law). We can evaluate combat effectiveness more effectively and substantially by E-TechMan algorithm. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system. Part 2 will describe the changes of war paradigm and the previous combat effectiveness evaluation methods such as C2 theory while Part 3 will explain E-TechMan algorithm specifically. Part 4 will present the application to JFOS-K and analyze the result with other algorithms. Part 5 is the conclusions provided in the final part.
Journal of the Korean Institute of Traditional Landscape Architecture
/
v.36
no.1
/
pp.120-128
/
2018
The purpose of this study is to establish basic data for the continuous protection management policy of domestic natural world heritage and mixed world heritage, and to examine the present situation and characteristics of the protection management according to the World Heritage Convention on the World Heritage listed Huangshan. The results of this study are as follows. First, Huangshan began to be protected by the establishment of the Huangshan Construction Committee in 1933, and after the designation of national park in 1982, laws and regulations were established in the central ministries, And various projects related to utilization have been implemented. Secondly, the establishment of the boundary for protection was actively intervened by the central government, such as the reorganization of the boundary of Huangshan through the administrative district plan. In order to protect the ecological and landscape value as well as the cultural factor, And designated a heritage designated area. Third, the protection management of Huangshan was divided into four major stages. The first phase was divided into the period when administrative measures were taken to manage the protection of Huangshan. The second phase was designated as a national park in Huangshan. The third period was the time of the protection-oriented project according to the recommendation of the international organizations after the World Heritage listed. The fourth period was the expansion of the tourism industry for the continuous use of protection of Huangshan city, My preservation business was being implemented. Fourth, Huangshan is managed by the central government and the city government. Huangshan, which is a mixed heritage, is managed jointly by the Ministry of Cultural Heritage Administration and the Ministry of Natural Heritage Administration. The protection and management of Huangshan promoted the efficiency and expertise of the heritage-related work through the establishment of the administrative unit-specific management system, and the local governments were entrusted with the authority to implement the protection management policies that meet local characteristics. Fifth, the preservation area of Huangshan has been destroyed by the development policy centered on the mountain. In addition, according to the operation of accommodation facilities, there are problems such as sewage, garbage disposal, and environmental pollution caused by tourists, and the damage caused by pests and diseases in planted plantations around the area and changes in ecosystem due to the composition of cable cars. Sixth, for the continuous protection of Huangshan, strict regulations on new construction, extension and management of accommodation are required, and it is necessary to install facilities to limit and control the number of visitors.
We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.
Jeollabuk-do is bounded by the sea, and Mahan Baekje culture have been established around a wide plain. Also, in southeastern, it was closed by Gaya kingdom where iron culture was prosperous at that time, a variety of the handles of swords with round pommel is excavated at present. The handles of swords with round pommel is the best amount of excavated objects among the swords with round pommel and producted object for the time. It supposes them to become the foundation of making the decorated swords with round pommel. But, the handles of swords with round pommel that don't have a pattern in handle is indifferent to study because the production method is simple in spite of that the value of archaeological data is sufficient. Therefore, in this study, it examined changed production techniques with the change of times concerning the handles of swords with round pommel of Mahan Baekje Gaya period(before 6C) excavated from Jeollabukdo through using X-rays in order to clarify a variety of production techniques of the handles of swords with round pommel correctly in accordance with a period of production and excavated place. As a result, identified production techniques using X-rays of the handles of swords with round pommel excavated around remains of Mahan Baekje Gaya period shows that production progress improved in order of all-in-one shape, hammer welding shape of the handle of round pommel, and two in body formation in accordance with age. Especially, in two in body shape, it products the handle of round pommel separately, after that it welds the handle of swords and then links the sword blade like a riveting or bottleneck and so on. Despite of improved hammer welding technique, the reason why it didn't utilize is it regards as inlay or gilt will be damaged. And it is judged by using riveting or bottleneck. Also, it appears to techniques of metal craft such as decoration of the handle, decoration of point of sword, inlay, and silver-plating in the period of appearing two in body shape. As clarifying correctly, it provides fundamental database of scientific research about a study of production techniques of handle of swords with round pommel.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.