• Title/Summary/Keyword: Performance Risk

Search Result 2,561, Processing Time 0.033 seconds

Optimization of Support Vector Machines for Financial Forecasting (재무예측을 위한 Support Vector Machine의 최적화)

  • Kim, Kyoung-Jae;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.241-254
    • /
    • 2011
  • Financial time-series forecasting is one of the most important issues because it is essential for the risk management of financial institutions. Therefore, researchers have tried to forecast financial time-series using various data mining techniques such as regression, artificial neural networks, decision trees, k-nearest neighbor etc. Recently, support vector machines (SVMs) are popularly applied to this research area because they have advantages that they don't require huge training data and have low possibility of overfitting. However, a user must determine several design factors by heuristics in order to use SVM. For example, the selection of appropriate kernel function and its parameters and proper feature subset selection are major design factors of SVM. Other than these factors, the proper selection of instance subset may also improve the forecasting performance of SVM by eliminating irrelevant and distorting training instances. Nonetheless, there have been few studies that have applied instance selection to SVM, especially in the domain of stock market prediction. Instance selection tries to choose proper instance subsets from original training data. It may be considered as a method of knowledge refinement and it maintains the instance-base. This study proposes the novel instance selection algorithm for SVMs. The proposed technique in this study uses genetic algorithm (GA) to optimize instance selection process with parameter optimization simultaneously. We call the model as ISVM (SVM with Instance selection) in this study. Experiments on stock market data are implemented using ISVM. In this study, the GA searches for optimal or near-optimal values of kernel parameters and relevant instances for SVMs. This study needs two sets of parameters in chromosomes in GA setting : The codes for kernel parameters and for instance selection. For the controlling parameters of the GA search, the population size is set at 50 organisms and the value of the crossover rate is set at 0.7 while the mutation rate is 0.1. As the stopping condition, 50 generations are permitted. The application data used in this study consists of technical indicators and the direction of change in the daily Korea stock price index (KOSPI). The total number of samples is 2218 trading days. We separate the whole data into three subsets as training, test, hold-out data set. The number of data in each subset is 1056, 581, 581 respectively. This study compares ISVM to several comparative models including logistic regression (logit), backpropagation neural networks (ANN), nearest neighbor (1-NN), conventional SVM (SVM) and SVM with the optimized parameters (PSVM). In especial, PSVM uses optimized kernel parameters by the genetic algorithm. The experimental results show that ISVM outperforms 1-NN by 15.32%, ANN by 6.89%, Logit and SVM by 5.34%, and PSVM by 4.82% for the holdout data. For ISVM, only 556 data from 1056 original training data are used to produce the result. In addition, the two-sample test for proportions is used to examine whether ISVM significantly outperforms other comparative models. The results indicate that ISVM outperforms ANN and 1-NN at the 1% statistical significance level. In addition, ISVM performs better than Logit, SVM and PSVM at the 5% statistical significance level.

Study on economic effects of outsourcing of food materials on the hotel kitchen - Focus on cooking Western food in the first class hotel - (식재료 아웃소싱이 경제적 주방에 미치는 영향에 관한 연구 - 특1급호텔 양식조리를 중심으로 -)

  • 성태종
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.13 no.2
    • /
    • pp.45-69
    • /
    • 2002
  • This study is designed to examine feasibility and limitation of outsourcing in cooking Western food in a hotel, to interpret importance of outsourcing(eg. outside order, outside procurement, outside supply) in a broad sense in order to reinforce the core capacity in the cooking department, and to know whether the cooking human power is efficiently used and how much the chefs recognize outsourcing of food materials. As many companies conduct restructuring to cut down its size, the reduction of human power led the Western food cooking in the hotel to lower core capacities, lower quality, and lower efficiency. In addition, the sagging morale of chefs undermined creativity. To change from the traditional kitchen to an economic kitchen needs to look into importance of outsourcing, cognitive attitude of chefs, relation with outside suppliers. Here suggests performance of positive changes in the structure The study examined feasibility and limitation of outsourcing in the hotel kitchen as well as chefs' cognitive attitude toward outsourcing of food materials to reinforce core capabilities of the hotel kitchen. 1. Companies of outsourcing are selected according to variability of price conditions, flexibility of contract conditions, popularity of the outsourcing company, and reputation of the outsourcing company. 2. The importance of outsourcing in the Western food cooking is divided into 4 factors such as standard of selecting outsourcing companies, policies of cooking manu, quality of cooking, and quantity of cooking. 3. The most feasible section in outsourcing of food materials is a process of kneading flour for bread, which shows that many Western-food chefs expect to put higher possibility of outsourcing on the kneading. In other words, when it comes to confectionery and bakery, there are many outside expert processing companies supplying high quality products. In the order of outsourcing feasibility, sauce is followed by processed vegetable, garnish of main dish, and soup. The least feasible section in outsourcing of food materials is appetize. Appetize includes a concept of a improvised dish and needs speed. Due to its color, freshness, and sensibility of taste, the appetize plays a key role in the Western food cooking. 4. When outsourcing is taken in place, the highest risk is to lower the inner cooking skills. Therefore chefs in charge of the Western food sequently recognize both internal problems including storage of cooking skills, unstability of layoffs, and loss of cooperation between departments, and external problems including inferior goods, difficulty of differentiating manu, delay of delivery, and expiration date. It shows that most of the Western food chefs consider risks of the internal problems at first. 5. A effective outsourcing needs appropriate selection of outsourcing companies, maintenance of credibility, active communication, check and management of hygiene. However regardless of their position or career, chefs in charge of the Western food have the same cognitive attitude toward selecting successful outsourcing companies after the outsourcing system is enforced. The core of cooking, or a final stage in the full process of so-called artistic cooking, should be treated with insourcing. Reduction of several cooking processes resulted in shortened cooking time, increased efficiency, faster cooking, cutting the waiting-lines, and finally more room for customers. The outsourcing system can reduce or eliminate the following processes in cooking: buying various food materials, checking, storing, preparing, and processing. Especially in the Western food cooking department of a hotel, the outsourcing system should be enforced to make an economic kitchen and to efficiently manage it. Wow it's time to change from the traditional kitchen to an economic kitchen in the hotel cooking department. For that, the cooking department should become a small but strong organization by outsourcing except its core work.

  • PDF

Organizational Factors Facilitating the Internationalization of Korean Franchising Companies (해외진출 국내 프랜차이즈기업의 조직특성)

  • Lim, Young-Kun;Lee, Dong-Whuy;Kim, Hee-Jung
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.2
    • /
    • pp.40-52
    • /
    • 2009
  • Franchising is one of the fastest growing types of business. It is already popular and well-known in the U.S., and has been growing in many other countries including Korea. Furthermore, many Korean franchising companies have expanded their business overseas actively. According to the data by the Ministry of Industry and Resource, 82 companies out of a sample of 500 franchising companies are already operating in many foreign countries and 48% of them have started their foreign business since 2006. This clearly indicates the fast growing current trend of foreign operation by Korean franchising companies. In spite of the fast growing trend of foreign expansion in the industry, academic research on internationalization of franchising companies is extremely difficult to find. Accordingly, academic research on the issue is necessary and urgent in Korea. Among the various research questions on internationalization of franchising business, this study intends to investigate the difference in organizational factors between the franchising companies doing foreign operation and those doing business only domestically. More specifically, this research has the following purposes. First, considering the lack of theoretical basis of previous studies, resource-based theory and agency theory are employed as the theoretical bases. Second, this study explains the difference in internationalization based on organizational factors such as company size, history and growth rate. Third, the five hypotheses regarding the difference in organizational factors are presented and tested empirically, which is the first attempt in the area of this topic. Finally, the study attempts to clarify the conflicting implications among theories regarding some organizational factos such as growth rate. As the theoretical background, resource-based theory and agency theory are discussed. According to resource-based theory, a firm can grow continuously when it has competence and resource, and also the ability to develop them. The competence and resource can include capital, human resource, management skill, market information, ability to manage risk, etc. Meanwhile, agency theory views the relationship between franchisor and franchisee as an agency relationship. In agency theory, bonding capability and monitoring capability are the two key factors which promote internationalization of franchising companies. Based on the two theories, a conceptual model is designed. The model consists of two groups of variables. One is organizational factors including size, history, growth rate, price bonding and geographic dispersion. The other is whether a franchising company is operating overseas or not. We developed the following five research hypotheses basically describing the relationship between organizational factors and internationalization of franchising companies. H1: The size of franchising companies operating overseas is larger than that of franchising companies operating domestically. H2: The history of franchising companies operating overseas is longer than that of franchising companies operating domestically. H3: The growth rate of franchising companies operating overseas is higher than that of franchising companies operating domestically. H4: The price bonding of franchising companies operating overseas is higher than that of franchising companies operating domestically. H5: The geographic dispersion of franchising companies operating overseas is wider than that of franchising companies operating domestically. Data for the analyses are obtained from 2005 Korea Franchise Survey data co-generated by Ministry of Industry and Resource, GS1 Korea, and Korea Franchise Association. Out of 2,804 population companies, 2,489 companies are excluded for various reasons and 315 companies are selected as the final sample. Prior to hypotheses tests, validity and reliability of the measures of size, history, growth rate and price bonding are examined for further analyses. Geographic dispersion is not validated since it is measured using nominal data. A series of independent sample T-tests is used to find out whether there exists any significant difference between the companies internationalized and those operating only domestically for each organizational factor. Among the five factors, size and geographic dispersion show significant difference, growth rate and price bonding do not reveal any difference and, finally, history factor shows conflicting results in the difference depending on how to measure it.

    shows the summary statistics for hypotheses testing. In conclusion, the results show that the size and history, which are the key variables in resource-based theory, have a significant relationship with internationalization and that geographic area, which belongs to agency theory, also has a strong relationship with internationalization. The results support the findings of extant research and, therefore, prove the usefulness of resource-based theory and agency theory in explaining internationalization of franchising companies. However, growth rate and price-bonding do not show a clear difference between the two types of companies. Accordingly, these two factors need further attention in the future research. Although this study shows meaningful findings theoretically and practically, it has several limitations. First, only organizational factors are considered even if there are various environmental factors influencing franchising firm's internationalization. Second, only being internationalized or not is considered. That is, modes of entry and the size of foreign operations are not included in the study. Third, internationalization strategy is often determined based on the desire for business expansion and higher profitability and egoistical reasons of the CEOs. However, this type of factors belonging to behavioral science is not discussed in the study. Finally, organizational ecology perspective is usefully applicable in explaining the survival and performance of internationally operating companies. Accordingly, research propositions based on this perspective need to be developed and tested.

  • PDF
  • COMPUTER GAME PLAYING PATTERNS AND PSYCHOPATHOLOGY IN SCHOOL-AGE CHILDREN (학령기 아동의 컴퓨터게임 이용 양상과 정신병리)

    • Lim Seoung-Hu;Jeong Seoung-Shim;Park Jeone-Hwan;Kim Ji-Hae;Hong Sung-Do
      • Journal of the Korean Academy of Child and Adolescent Psychiatry
      • /
      • v.17 no.1
      • /
      • pp.19-26
      • /
      • 2006
    • Objectives : The object of this study was to examine computer game playing patterns and psychopathologies related to computer game addiction in school-age children. Methods : The subjects were 533 elementary school students (4th to 6th grade) in Kangdonggu, Seoul. We evaluated computer playing patterns of all subjects using computer game playing pattern questionnaire, and determined the risk group of computer game addiction by internet game addiction scale score. We evaluated subscale score of K-CBCL from parents of all subjects, and conducted correlation analysis and logistic regression analysis between computer game addiction and subscale score of K-CBCL. Results : In 488 responders, 10.2% of started playing computer game in preschool age, and 67.2% started at low grade of elementary school. The mean frequency of computer game play per week was 3.66 days. Mean time spent playing computer games per day was 1.89 hours. 'Simply for fun' was the most common reason far playing computer games (40.8%). Male subjects showed statistically significant differences in age of starting computer game, frequency of computer game play per week, reasons for playing computer game and computer game addiction scale scores. There were significant correlations between computer game addiction scale scores and academic performance, somatic complaints, attention problems, and internalizing problems in K-CBCL. But In logistic regression analysis, only attention problems among K-CBCL subscales showed significant predictability to computer game addiction. Conclusion : Upper grade elementary school students experienced computer game playing at the very early age, and spend much time in playing computer games. There were significant correlation and predictability between computer game addiction and attention problems.

    • PDF

    The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

    • Lee, Un-Kon
      • Asia pacific journal of information systems
      • /
      • v.24 no.3
      • /
      • pp.325-344
      • /
      • 2014
    • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.

    Diagnostic Performance of HPV E6/E7 mRNA and HPV DNA Assays for the Detection and Screening of Oncogenic Human Papillomavirus Infection among Woman with Cervical Lesions in China

    • Wang, Hye-young;Lee, Dongsup;Park, Sunyoung;Kim, Geehyuk;Kim, Sunghyun;Han, Lin;Yubo, Ren;Li, Yingxue;Park, Kwang Hwa;Lee, Hyeyoung
      • Asian Pacific Journal of Cancer Prevention
      • /
      • v.16 no.17
      • /
      • pp.7633-7640
      • /
      • 2015
    • Background: Human papillomavirus (HPV) is the most common sexually transmitted infection worldwide and it is responsible for most cases of cervical uterine cancer. Although HPV infections of the cervix do not always progress to cancer, 90% of cervical cancer cases have been found to be associated with high risk HPV (HR-HPV) infection. HPV DNA testing is widely used, along with Papanicolaou (Pap) testing, to screen for cervical abnormalities. However, there are no data on the prevalence of genotype-specific HPV infections assessed by measuring HPV E6/E7 mRNA in women representative of the Chinese population across a broad age range. Materials and Methods: In the present study, we compared the results with the CervicGen HPV RT-qDx assay, which detects 16 HR-HPV genotypes (Alpha-9: HPV 16, 31, 33, 35, 52, and 58; Alpha-7: HPV 18, 39, 45, 51, 59, and 68; and Alpha-5, 6: HPV 53, 56, 66, and 69), and the REBA HPV-ID assay, which detects 32 HPV genotypes based on the reverse blot hybridization assay (REBA) for the detection of oncogenic HPV infection according to cytological diagnosis. We also investigated the prevalence and genotype distribution of HPV infection with a total of 324 liquid-based cytology samples collected in western Shandong province, East China. Results: The overall HPV prevalences determined by HPV DNA and HPV E6/E7 mRNA assays in this study were 79.9% (259/324) and 55.6% (180/324), respectively. Although the positivity of HPV E6/E7 mRNA expression was significantly lower than HPV DNA positivity, the HPV E6/E7 mRNA assay showed greater specificity than the HPV DNA assay (88.6% vs. 48.1%) in normal cytology samples. The prevalence of Alpha-9 (HPV 16, 31, 33, 35, 52, and 58) HPV infection among these women accounted for up to 80.3% and 76.1% of the high-grade lesions detected in the HPV mRNA and DNA tests, respectively. The HR-HPV genotype distribution, based on HPV DNA and E6/E7 mRNA expression by age group in patients with cytologically confirmed lesions, was highest in women aged 40 to 49 years (35.9% for cytologically confirmed cases, Pearson correlation r value=0.993, p<0.001) for high-grade lesions. Among the oncogenic HR-HPV genotypes for all age groups, there was little difference in the distribution of HPV genotypes between the HPV DNA (HPV -16, 53, 18, 58, and 33) and HPV E6/E7 mRNA (HPV -16, 53, 33, 58, and 18) assays. HPV 16 was the most common HPV genotype among women with high-grade lesions. Conclusions: Our results suggest that the HPV E6/E7 mRNA assay can be a sensitive and specific tool for the screening and investigation of cervical cancer. Furthermore, it may provide useful information regarding the necessity for early cervical cancer screenings and the development of additional effective HPV vaccines, such as one for HPV 53 and 58. Additionally, gaining knowledge of HPV distribution may also inform us about ecological changes in HPV after the vaccination.

    A Study on the infringement of privacy of unmanned aircraft : Focusing on the analysis of legislation and US policy (무인항공기의 사생활 침해에 대한 법적 대응 : 미국 정책.입법안 분석을 중심으로)

    • Kim, Sun-Ihee
      • The Korean Journal of Air & Space Law and Policy
      • /
      • v.29 no.2
      • /
      • pp.135-161
      • /
      • 2014
    • An unmanned aerial vehicle (UAV), commonly known as a drone and also referred to as an unpiloted aerial vehicle and a remotely piloted aircraft (RPA) by the International Civil Aviation Organization (ICAO), is an aircraft without a human pilot aboard. ICAO classify unmanned aircraft into two types under Circular 328 AN/190. Unmanned aircraft, which is the core of the development of the aviation industry. However, there are also elements of the legal dispute. Unmanned aircraft are manufactured in small size, it is possible to shoot a record peripheral routes stored in high-performance cameras and sensors without the consent of the citizens, there is a risk of invasion of privacy. In addition, the occurrence of the people of invasion of privacy is expected to use of civilian unmanned aircraft. If the exposure of private life that people did not want for unmanned aircraft has occurred, may occur liability to the operator of unmanned aircraft, this is a factor to be taken into account for the development of unmanned aircraft industry. In the United States, which is currently led by the unmanned aircraft industry, policy related to unmanned aircraft, invasion of privacy is under development, is preparing an efficient measures making. Unmanned aircraft special law has not been enforced. So there is a need for legal measures based on infringement of privacy by the unmanned aircraft. US was presented Privacy Protection Act of unmanned aircraft (draft). However Korea has many laws have been enacted, to enact a new law, but will be able to harm the legal stability, there is a need for the enactment of laws for public safety of life. Although in force Personal Information Protection Law, unmanned aerospace, when the invasion of privacy occurs, it is difficult to apply the Personal Information Protection Law. So, it was presented a privacy protection bill with infringement of privacy of unmanned aircraft in the reference US legislation and the Personal Information Protection Act.

    Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

    • Yoon, Tae-Young
      • Korean Security Journal
      • /
      • no.26
      • /
      • pp.29-58
      • /
      • 2011
    • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

    • PDF

    Professionalism raising of the escort which leads an instance analysis (사례분석을 통한 경호 전문성 제고)

    • Yu, Hyung-Chang
      • Korean Security Journal
      • /
      • no.18
      • /
      • pp.73-99
      • /
      • 2009
    • There are three assassination and treatening cases in this thesis introduced as analysis data. They are shooting accidents of the U.S.A's President Reagun (1981,3.30), and the President Park Jeong Hee of South Korea(1974.8.15), assassination of the Prime Minister Lavin of Israel (1995.11.4) In March 30, 1981, there was an accident where criminal, Hinckley, fired ball cartridges right before the President Reagan got into the car to move to White House after completing the announcement of Hilton Hotel of Washington. As a result, the chest of president was shot and public information secretary and safeguard were wounded. In August, 15, pm 10:23, where the 29th 8.15 independent anniversay event was being celebrated by the people at the National theater in Jangchungdong, Seoul, the criminal Moon Sekwang fired ball cartridges, he failed to assassinate the President Park Jeong Hee of Korea, but shot the First lady Yuk Young Soo. She was wounded right part of head and died. In November 4, Saturday, pm 22:00 the Prime Minster Lavin had finished the supporting event of Middle Asia's Peace project and was taking on the car when he was killed by the criminal Amir's shooting, The accidents left very important lesson from the aspect of security analysis and it has been frequently used as a material for the education and training of safeguard organization. In Korea, as well as Presidential Security Service, national security departments have selected it as an important model for the subjects such as 'Security Analysis, 'Security Practice' and 'Security Methodology'. In the performance of security duty, security skill is the most important matter. Moreover, it has a close relationship with politics, society and culture. The purpose of this study is to analyze and reevaluate the case, which has been treated as a usual model from the aspect of security analysis, beyond its introduction. Attempted assassination of President Reagan was evaluated as a positive success example because of its rapid response of adjacent guards to evacuate Reagan, who is a guard target, within 10 seconds after the shot. When comparing it to President Kennedy Assassination of 1963, it was evaluated that guards were significantly specialized. In the study, however, it was possible to found many problems such as carelessness of guard, who is in charge of external area of event place, idle attitude for frequently used event place, confusion of wireless communication, risk of wireless security disclose, insufficient provision of compulsory record file, insufficient profiling of dangerous person and unsecured hospital and first-aid room.

    • PDF

    Analysis and Safety Assessment of Antioxidants Migrated from Polyethylene and Polypropylene Food Packaging Materials into Food Simulants (폴리에틸렌 및 폴리프로필렌 기구·용기·포장 유래 산화방지제 분석 및 안전성평가)

    • Choi, Heeju;Choi, Jae Chun;Bae, In-Ae;Park, Se-Jong;Kim, MeeKyung
      • Journal of Food Hygiene and Safety
      • /
      • v.32 no.5
      • /
      • pp.424-433
      • /
      • 2017
    • Antioxidants are used in the manufacturing of commercial food packages made of polyolefin plastic such as polyethylene and polypropylene for the purpose to delay the oxidation reaction of the polymer due to oxygen or traces of ozone in the atmosphere. Additives in plastics may be migrated from the packaging materials into foods, thereby presenting a potential health risk to the consumer. Therefore, it is necessary to determine migration level of antioxidants from food packaging materials to foodstuffs in order to take proactive management. In this study, we have developed a method for the analysis of 10 antioxidants, which are butylated hydroxyanisole (BHA), butylated hydroxytoluene (BHT), Cyanox 2246, 425 and 1790, Irgafos 168, and Irganox 1010, 1330, 3114 and 1076, migrated from the food packaging materials into four food simulants for aqueous, acidic, alcoholic and fatty foods. The antioxidants were determined by reversed-phase high-performance liquid chromatograph-ultraviolet detector with 276 nm after solid-phase extraction with a hydrophilic-lipophilic balance (HLB) cartridge or dilution with isopropanol. The analytical method showed a good linearity of coefficient ($R^2{\geq}0.99$), limits of detection (0.11~0.41 mg/L), and limits of quantification (0.34~1.24 mg/L). The recoveries of antioxidants spiked to four food simulants ranged from 71.3% to 109.4%. The migrated antioxidants in this study were within the safety levels that resulted from the safety assessment by the estimated daily intake to the tolerable daily intake.