• Title/Summary/Keyword: Defender

Search Result 63, Processing Time 0.027 seconds

Investment Decision-making Behaviors and Profitability of the Hospital (병원의 투자결정행태와 수익성)

  • Lee, Chang-Eun;Hwang, In-Kyoung;Chung, Young-Il;Jung, Key-Sun
    • Korea Journal of Hospital Management
    • /
    • v.5 no.1
    • /
    • pp.156-175
    • /
    • 2000
  • This study was designed to find out the relations between the major investment decision-making behaviors and profitability of the hospital. A total of 57 hospitals were analyzed on this study. The major findings were as follows; 1. Among the types of the investment decision-making, major factors affecting the profitability were where the top management belongs among the defender, analyzer, prospector, and reactor type. Other factors were whether or not hospital analyzes which is more economical between the purchase by cash and lease of the medical equipment and whether or not hospital changes the decision before the actual investment. 2, Among the types of the investment decision-making, major factors affecting the financial structure and efficient operation of the assets were ranking of the priority and whether or not hospitals can get enough revenue and cash flow when hospitals have to borrow a big amount of fund from outside. 3. Among the financial indices regarding the financial stability, major factor affecting the profitability was fixed assets to long-tenn capital. Other factors affecting the financial structure and efficient operation of the assets were value added to medical equipment, normal profit to medical equipment, liability to total assets, current ratio, value added to payroll expenses. 4. Investment decision-making behaviors are partially influencing on the financial structure and efficient operation of the assets. However it was proved that the profitability was the most influencial factor than other factors related with the operation of the hospital. 5. To improve the irrational investment decision-making behaviors strategic management system should be introduced, and the top mamagement's investment decision-making style should be changed from reactor and analyser styles to prospector and reactor ones.

  • PDF

A Study on the Architectural Aspect of the Sutra Hall and the Promoters of the Rotating-sutra Case Cabinet of the Yeongguk Temple in the Koryo Dynasty (영국사(寧國寺) 대장전(大藏殿)과 전륜장(轉輪藏)의 조성주체와 건축특성)

  • Lee, Kyung-Mee
    • Journal of architectural history
    • /
    • v.20 no.5
    • /
    • pp.95-109
    • /
    • 2011
  • The building for the Sutra appeared as the Sutra-belief became popular in the early years of the Koryo Dynasty. According to the written documents, there were two types of apparatus to keep sutras, one by fixing the cabinet to the wall and the other by rotating the cabinet at the center of the hall. There are no remains. Recently, at the excavation of the site of the Yeongguk Temple (寧國寺) in the Chungcheong Prevince (영동군), a building which was presumed as the Sutra Hall was recovered at the side of the Main Hall. At the center of the building, of 6meters width and 6meters depth, there was a large stone which had a round trace which was presumed to supporting the rotating sutra-case cabinet. By examining the concerned situations, this building was concluded as the Sutra Hall of the temple. The Yeongguk Temple had a close relationship with the royal household. Budddhist monk Gwangji, son of the 16th King Yejong was lived at the Temple. the tomb of King's advisory priest Wongak was also erected at the Temple. Two monks were well known as the defender of the Sutra. The Sutra Hall of the Yeongguk Temple regarded as a significant example which showed us how the archtectural aspect of the Sutra Hall was shaped in the Koryo Dynasty. It could be said that revealing the architectural aspect of the Stura Hall will help revealing the Buddhist architecture of the Koryo Dynsty which is veiled in many field.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

A Study on the Simplified Estimating Method of Off-site Consequence Analysis by Concentration of Hydrochloric Acid (염산수용액의 농도별 간이 영향 평가 방법 연구)

  • Jung, Y.k.;Kim, B.;Heo, H.;Yoo, B.;Sin, C.;Yoon, Y.;Yoon, J.;Ma, B.
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.2
    • /
    • pp.52-58
    • /
    • 2017
  • One of the most important elements of the management of chemical accident is threat zone estimation of fires, explosions and toxic gas dispersion based on chemical releases. The threat zone estimation is going to be standard of emergency response for the first defender and base line data of off-site risk assesment (hereinafter referred to as "ORA") and risk management plan (hereinafter referred to as "RMP"). Generally, ALOHA form EPA(U.S.) and Kora(from KOREA MINISTRY OF ENVIRONMENT) has been used for the off-site consequence analysis in Korea. However it is hard to predict accurate consequences rapidly in case of emergency. Hydrochloric acid is a multipurpose raw material used in many industrial applications such as chemical, metal and food industries. It is usually treated in concentrations from 10 ~ 35 %, and release accident have occurred frequently. In this study, we have developed a simplified estimating method and equation to calculate threat zone easily in case of emergency due to release accident of hydrochloric acid.

Optimal Allocation Model of KDX for Missile Defense (미사일 방어를 위한 KDX 최적배치모형 연구)

  • Lee, Sang-Heon;Jeong, In-Cheol
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.69-77
    • /
    • 2006
  • In most positioning and allocation practices, many mathematical models are proposed in various fields. The set covering (SC) problem has many practical applications of modeling not only real world problem but also in military. As our air defense weapon systems are getting older and declining the performance, new plans far acquisition of high-tech air defense weapon system are being conducted. In this paper we established simulation model for optimal allocation of KDX which carries new missile defense weapon system by using partial set covering considering both attacker and defender side. By implementating simulation model, we assess the available scenarios and show the optimal pre-positioning of KDX and interceptor's allocation. Furthermore, we provide a variety of experiments and extensive scale sized situations for Korea Indigenous Missile Defense (KIMD) and support decision-making for efficient positioning of unit.

  • PDF

Analysis of Hydrodynamic Separators for Combined Sewer Overflows and Stromwater Runoff Control (합류식 하수관거 월류수 및 우수관거 유출수의 수리동력학적 오염부하저감장치의 분석)

  • Lee, Soo Young;Oh, Ji Hyun;Ryu, Seong Ho;Kwon, Bong Ki;Chung, Tai Hak
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.19 no.2
    • /
    • pp.117-124
    • /
    • 2005
  • Appropriate removal of pollutants from combined sewer overflows(CSOs) and stormwater runoff is of primary concern to watershed managers trying to meet water quality standards even under a wet weather condition. Harmful substances associated with particles besides TSS and BOD are subjected to removal prior to discharge into the natural waters. Effectiveness of five major hydrodynamic separation technologies, Vortechs, Downstream Defender including Storm King for CSOs control, CDS, Stormceptor, and IHS, were evaluated in this study. There is not sufficient information for accurate evaluation of the removal efficiency for the pollutants from the stormwater runoff and CSOs. Based upon limited engineering data, however, all technologies were found to be effective in separation of heavy particles and floating solids. Technologies utilizing screens seem to have advantage in the treatment capacity than the other technologies relied fully on hydrodynamic behavior. The IHS system seems to have a strong potential in application for control of CSOs because of unique hydrodynamic behavior as well as a flexibility in opening size of the screens. Size of the particulate matter in the CSOs and stormwater runoff is found to be the most important parameter in selection of the type of the hydrodynamic separators. There exists an upper limit in the solids removal efficiency of a hydrodynamic separator, which is strongly dependent upon the particle size distribution of the CSOs and stormwater runoff.

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

The Effect of Business Strategy on Stock Price Crash Risk

  • RYU, Haeyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.3
    • /
    • pp.43-49
    • /
    • 2021
  • Purpose: This study attempted to examine the risk of stock price plunge according to the firm's management strategy. Prospector firms value innovation and have high uncertainties due to rapid growth. There is a possibility of lowering the quality of financial reporting in order to meet market expectations while withstanding the uncertainty of the results. In addition, managers of prospector firms enter into compensation contracts based on stock prices, thus creating an incentive to withhold negative information disclosure to the market. Prospector firms' information opacity and delays in disclosure of negative information are likely to cause a sharp decline in share prices in the future. Research design, data and methodology: This study performed logistic analysis of KOSPI listed firms from 2014 to 2017. The independent variable is the strategic index, and is calculated by considering the six characteristics (R&D investment, efficiency, growth potential, marketing, organizational stability, capital intensity) of the firm. The higher the total score, the more it is a firm that takes a prospector strategy, and the lower the total score, the more it is a firm that pursues a defender strategy. In the case of the dependent variable, a value of 1 was assigned when there was a week that experienced a sharp decline in stock prices, and 0 when it was not. Results: It was found that the more firms adopting the prospector strategy, the higher the risk of a sharp decline in the stock price. This is interpreted as the reason that firms pursuing a prospector strategy do not disclose negative information by being conscious of market investors while carrying out venture projects. In other words, compensation contracts based on uncertainty in the outcome of prospector firms and stock prices increase the opacity of information and are likely to cause a sharp decline in share prices. Conclusions: This study's analysis of the impact of management strategy on the stock price plunge suggests that investors need to consider the strategy that firms take in allocating resources. Firms need to be cautious in examining the impact of a particular strategy on the capital markets and implementing that strategy.

The Effect of Business Strategy on Audit Hours (기업의 경영전략이 감사시간에 미치는 영향)

  • Lee, Yu-Sun;Do, Kee-Chul;Kim, Min-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.321-329
    • /
    • 2022
  • This study analyzes how companies of prospector type with inherent risks from new products and R&D costs affect audit hours, and further analyzes how they affect rank-specific audit hours. Samples were empirically analyzed using samples from 2018 to 2019 for KOSPI-listed and KOSDAQ-listed companies. As a result of the analysis, first, it was found that auditors were aware of the inherent risks of companies of prospector type and were striving to improve audit quality. Second, it was found that the corresponding degree of risk differs depending on the position and role in the audit team, so higher efforts were made in core positions with high risk levels. The results of this study are meaningful in verifying how the type of Business Strategies affects the audit efforts and resource input of auditors who are external parties, not internal factors such as financial reporting quality or tax avoidance. It also has important implications that a company's Business Strategies can be an significant factor to consider in preparing policies and systems for improving audit quality.

An Estimation Model for Defence Ability Using Big Data Analysis in Korea Baseball

  • Ju-Han Heo;Yong-Tae Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.119-126
    • /
    • 2023
  • In this paper, a new model was presented to objectively evaluate the defense ability of defenders in Korean professional baseball. In the proposed model, using Korean professional baseball game data from 2016 to 2019, a representative defender was selected for each team and defensive position to evaluate defensive ability. In order to evaluate the defense ability, a method of calculating the defense range for each position and dividing the calculated defense area was proposed. The defensive range for each position was calculated using the Convex Hull algorithm based on the point at which the defenders in the same position threw out the ball. The out conversion score and victory contribution score for both infielders and outfielders were calculated as basic scores using the defensive range for each position. In addition, double kill points for infielders and extra base points for outfielders were calculated separately and added together.