3 resultados para special reason for granting leave to call evidence

em DRUM (Digital Repository at the University of Maryland)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Research demonstrates that parental involvement positively impacts student achievement and enhances targeted instruction. Notably, however, little research currently exists on how schools involve parents in Response to Intervention (RTI), a framework for implementing targeted, tiered, research-based instruction. The purpose of this study was to interview selected parents, teachers, RTI specialists, and principals in three Title I elementary schools in one school district, plus one district-level administrator, in order to examine how elementary schools currently involve parents in RTI prereferral interventions, and to understand the factors that might facilitate or challenge such parent involvement. I employed a comparative case study qualitative design with each elementary school as the main unit of analysis. I conducted individual, in-depth interviews that lasted approximately 45-60 minutes with a total of 33 participants across the three school sites, including 11 parents, 12 teachers, and six RTI specialists, three principals, and one district-level administrator. I also analyzed documents related to RTI processes that are available through websites and participants. I used Strauss and Corbin’s (1998) three-step scheme for thematic/grounded theory analysis, and Atlas.ti as the electronic tool for management and analysis. Analyses of the data revealed that personnel across the sites largely agreed on how they explain RTI to parents and notify parents of student progress. Parents mostly disagreed with these accounts, stating instead that they learn about RTI and their child’s progress by approaching teachers or their own children with questions, or by examining report cards and student work that comes home. Personnel and parents cited various challenges for involving parents in RTI. However, they all also agreed that teachers are accessible and willing to reach out to parents, and that teachers already face considerable workloads. It appears that no district- or school-wide plan guides parent involvement practices in RTI at any of the three schools. Finally, I present a discussion of findings; implications for teachers, RTI implementation leaders, and Title school leaders; study limitations; and possibilities for future research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The baiqi (Buddhist percussive instruments), also known as faqi (dharma instruments), are mentioned in the Chinese Buddhist scriptures under many different terms: jianzhi, jiandi, jianzhui, or jianchi. The original function of baiqi in earlier monastic life was to gather people or to call an assembly. With the completion of monasticism and monastic institutions, baiqi have become multifunctional in monasteries, and many baiqi instruments have been developed for different monastic applications. In contemporary Buddhist monasteries in Taiwan, baiqi are used, on the one hand, to mark the time throughout the day, signal the beginning and end of monastic daily activities, and regulate the monastic order; and on the other hand, baiqi are indispensable to the musical practices of all Buddhist rituals, where they are used to accompany fanbai (Buddhist liturgical chants) and to articulate the whole ritual process. This study investigates multiple facets of Buddhist baiqi in their performance practice, function, application, notation, and transmission, exploring the interaction between baiqi and fanbai, baiqi and the practitioner, baiqi and the monastic space, and baiqi and various Buddhist contexts. I draw upon ideas from performance theory as it concerns different disciplines, but I maintain a sharper focus on the musicological dimension of performance practice when analyzing, interpreting, and explaining the performance and music of baiqi in terms of the monastic lifestyle and its rituals. The study not only uncovers the musical system of baiqi, but also encapsulates various issues of performed identity, social interaction, performer/audience, associated behaviors, the musical construction of space, and transmission.