RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Biochemical Composition of Muscle from Tanaka’s Eelpout Lycodes tanakae, Magistrate Armhook Squid Berryteuthis magister, and Ocean Sunfish Mola mola, Caught in the East Sea, Korea

        이두석,조현아,윤나영,김연계,임치원,심길보 한국수산과학회 2012 Fisheries and Aquatic Sciences Vol.15 No.2

        The biochemical composition of muscle from three deep-sea animals, Tanaka’s eelpout Lycodes tanakae magistrate armhook squid Berryteuthis magister, and ocean sunfish Mola mola caught in the East sea in South Korea was determined. The moisture (81.4-93.8 g/100 g), crude protein (5.0-15.6 g/100 g), crude lipid (0.1-1.5 g/100 g), and ash (1.0-1.1 g/100 g) contents of the two fishes were analyzed. The proximate composition of magistrate armhook squid was: moisture 84.0 g/100 g, crude protein 12.4 g/100 g,crude lipid 0.7 g/100 g, and ash 1.5 g/100 g. There was little difference in the proximate compositions of the three animals. The total amino acid contents of Tanaka’s eelpout, magistrate armhook squid, and ocean sunfish were 14.64, 10.75, 3.10-9.95 g/100g, respectively. High levels of glutamic acid, aspartic acid, lysine, leucine, and arginine were found, while low levels of histidine,glycine, and cysteine were detected in the animals. A survey of the free amino acid contents of the animals revealed large amounts of alanine and glycine. Significant differences were found in the fatty acid composition among the three species. Specially, different saturated fatty acids (17.14-40.49%) such as C16:0, and C18:0, monounsaturated fatty acids (19.19-46.88%) such as C16:1,and C18:1, and polyunsaturated fatty acids (35.41-57.08%) such as EPA, and DHA was identified. Our results suggest that each of these deep sea animals possesses nutritional value and should be considered as a foodstuff.

      • KCI등재

        직장암 절제술 후 문합부 누출에 대한 복강경 수술과 개복술의 비교연구

        이두석,육의곤,최성일,이두한,김도선,문홍영 대한대장항문학회 2007 Annals of Coloproctolgy Vol.23 No.5

        Purpose: This study is to compare the rate and pattern of anastomotic leakage (AL) for rectal cancer after laparoscopic vs. conventional open surgery at high and low rectal anastomosis and to evaluate whether the number of linear staples used for distal rectal resection is related to AL in laparoscopic group. Methods: One hundred ninety-seven patients who underwent a curative resection for rectal cancer between March 2002 and February 2006 were studied retrospectively (107 laparoscopic, 90 open). The proportions of patients with anastomosis above vs. below 5 cm from AV were not different between the laparoscopic and the open groups; (above/below: 54/53 and 41/49, respectively, P=0.57). The protective stoma rate, the overall rate of AL, the rate of AL according to the height of the anastomosis, and the number of distal linear staples were evaluated for both groups. Results: Clinical AL occurred in 11 of 107 patients (10.3%) for the laparoscopic group and in 5 of 90 patients (5.6%) for the open group. The rates of AL in patients without protective stoma were not significantly different for high rectal anastomosis (6.0% for laparoscopic vs. 2.6% for open, P= 0.63) and for low rectal anastomosis (25.8% for laparoscopic vs. 12.1% for open, P=0.21). The risk of AL was 4.9 times higher when 3 linear staples were used than when 2 linear staples were used in the laparoscopic group. Conclusions: There was no statistical difference in AL between the laparoscopic group and the open group. The rate of AL could be reduced by using fewer linear staples for distal rectal resection in the laparoscopic group.

      • KCI등재

        라빈수상 위해사건 분석을 통한 경호적 대응방안

        이두석 한국경호경비학회 2008 시큐리티연구 Vol.- No.15

        경호가 효율적이기 위해서는 단순히 눈앞에 보이는 위해를 방어하는 수준에서 벗어나, 위해의 빌미를 제공하는 원인에 대한 관심과 대응책 마련에 많은 노력을 경주해야 한다. 이러한 관점에서 1995년 11월 4일 밤, 중동에서의 평화 정착을 위해 동분서주하던 이스라엘의 라빈 수상이 암살당한 사건은 많은 경호적 교훈을 제공한다. 당시 라빈수상에 대한 암살 위협이 공공연히 자행되고 있었음을 감안하면, 이스라엘의 경호기관인 신베트의 대응은 정말로 무사안일하였다. 경호조직이나 경호관계자는 경호에 유용하고 경호활동을 지원할 수 있는 법과 제도를 정비하여 경호에 유익한 경호환경을 조성하여야 한다. 더불어 우호적인 공중을 확보하여 위기가 발생하였을 경우 대응할 수 있는 선택의 폭을 넓히고, 위기에 대응하는 경호조직의 신뢰도를 확보하여야 한다. 광범위한 정보네트워크를 구성하여 다양한 경호정보를 수집분석하고, 위협의 평가에 기초한 경호계획을 수립함으로써 효과적이고 효율적인 경호조치로 위해행위를 사전에 예방하여야 한다. 위해기도자는 위해대상자에 대한 철저한 연구와 치밀한 계획 수립으로 위해를 기도한다. 항상 수동적으로 대응할 수밖에 없는 경호로서는 보다 주도면밀하고 체계적인 경호조치로 범행의 성공기회를 최소화하여야 한다. 또한 항상 위기의식을 갖고 우발상황에 대비한 행동지침과 상황에 따른 시나리오가 준비되고, 부서간 역할 분담과 지휘체계가 확립되어 있어야 한다.

      • KCI등재

        위해범죄 사례분석을 통한 경호 효율화 방안

        이두석 한국치안행정학회 2010 한국치안행정논집 Vol.7 No.3

        보이지 않는 실제적이거나 가상의 적과 싸워야 되는 경호에는 위험 예측의 문제가 수반된다. 이 문제의 해결을 위해서는 과거의 경험과 더불어 축적된 통계자료가 요구된다. 따라서 위해의 위험에 대한 예측자료로, 본 연구에서는 국내에서 발생한 31건의 위해사례와 국외에서 발생한 169건의 위해사례를 포함한 총 200건의 위해사례를 조사 분석하여 확률적 근거로 제공함으로써, 미래의 위험에 대비할 수 있는 경호행위의 근거와 경호대책을 제시하였다. 경호는 보이지 않는 가상의 위해기도자의 공격의도를 사전에 포착하여 제거하거나, 위해기도자에게 공격기회를 제공하지 않거나, 위해기도자의 공격능력보다 우월한 방어능력으로 위해공격을 제압하는 과정이다. 위해기도자의 위해의도는 사전에 정보활동을 통해 무력화시키거나, 회피를 통해 무산시키거나, 강력한 경호태세로 분쇄시킬 수 있다. 또한 경호대상자의 활동상황이 적에게 노출되지 않도록 하기 위한 투철한 보안활동과 한 치의 틈도 보이지 않는 철저한 경호조치로 위해기도자에게 공격기회를 제공하지 않을 수 있다. 나아가 경호원은 항상 어떠한 위해기도자도 제압할 수 있는 육체적 능력과 전문성으로 무장하는데 게을러서는 안되고, 경호조직은 뛰어난 정보력과 제도적 뒷받침, 그리고 과학적 경호시스템으로 경호원의 경호활동을 지원해줌으로써 보이지 않는 위해기도에 대응해야 한다. Security which is to fight against practical or hypothetical enemies involves a problem of risk prediction. And risk prediction requires accumulated statistical data on security along with past security experiences. Accordingly, The purpose of this study is to suggest security measures and basis in preparation for future security risk, by providing statistical data resulted from the analysis of 200 assassination cases. A potential killer who has a particular intent to attack someone requires the ability and opportunity to attack. If the attacker doesn't find any causes, take any opportunity and have the ability to attack, the crime of assassination would not occur. Security is to remove and/or neutralize more than one of these three factors. Security is a process to remove or neutralize the potential attacker's intention in advance, not to allow the attacker any opportunity to attack, or to subdue the attacker in ability. The attacker's intention to do someone any harm can be neutralized by intelligence activities, disappointed by evading tactics, and frustrated by strong security readiness. And tight security measures which is not to let the enemy know about the target's activities would not allow any opportunity to attack. Moreover, security agents have to build up their physical strength to outperform the opponent and have specialized knowledge in security work. And a security organization has to support the security agents with a rich intelligence, institutional device and scientific security system. The most important thing in security is the knowledge and awareness of security. Now we have to remember the fact that 77% of the potential attackers delivered their intentions to attack to their targets in advance openly and/or secretly. So security agents have to expect what is not expected when not expected. To conclude, the key of successful security contains specific knowledge in security, awareness of crisis situations, and strong responsibility to fulfill given mission.

      • KCI등재

        경비위험 분석 및 관리의 최적화 방안에 관한 연구

        이두석 한국보안관리학회(구 한국경호경비학회) 2005 시큐리티연구 Vol.- No.10

        Risk management should be controlled systematically by effectively evaluating and suggesting countermeasures against the various risks which are followed by the change of the society and environment. These days, enterprise risk management became a new trend in the field. The first step in risk analysis is to recognize the risk factors, that is to verify the vulnerabilities of loss in the security facilities. The second step is to consider the probability of loss in assessing the risk factors. And the third step is to evaluate the criticality of loss. The security manager will determine the assessment grades and then the risk levels of each risk factor, on the basis of the result of risk analysis which includes the assessment of vulnerability, the provability of loss and the criticality. It is of great importance to put the result of risk analysis in mathematical statement for a scientific approach to risk management. Using the risk levels gained from the risk analysis, the security manager can develop a comprehensive and supplementary security plan. In planning the risk management measures to prepare against and minimize the loss, insurance is one of the best loss-prevention programs. However, insurance in and of itself is no longer able to meet the security challenges faced by major corporations. The security manager have to consider the cost-effectiveness, to suggest the productive risk management alternatives by using the security files which contains every information about the security matters. Also he/she have to reinforce the company regulations on security and safety, and to execute education repeatedly on security and risk management. Risk management makes the most efficient before-the-loss arrangement for and after-the-loss continuation of a business. So it is very much important to suggest a best cost-effective and realistic alternatives for optimizing risk management above all, and this function should by maintained and developed continuously and repeatedly.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼