10 resultados para CPT VIOLATION
em Digital Commons at Florida International University
Resumo:
The purpose of this study was to assess the knowledge of public school administrators with respect to special education (ESE) law. The study used a sample of 220 public school administrators. A survey instrument was developed consisting of 19 demographic questions and 20 situational scenarios. The scenarios were based on ESE issues of discipline, due process (including IEP procedures), identification, evaluation, placement, and related services. The participants had to decide whether a violation of the ESE child's rights had occurred by marking: (a) Yes, (b) No, or (c) Undecided. An analysis of the scores and demographic information was done using a two-way analysis of variance, chi-square, and crosstabs after a 77% survey response rate.^ Research questions addressed the administrators' overall level of knowledge. Comparisons were made between principals and assistant principals and differences between the levels of schooling. Exploratory questions were concerned with ESE issues deemed problematic by administrators, effects of demographic variables on survey scores, and the listing of resources utilized by administrators to access ESE information.^ The study revealed: (a) a significant difference was found when comparing the number of ESE courses taken and the score on the survey, (b) the top five resources of ESE information were the region office, school ESE department chairs, ESE teachers, county workshops, and county inservices, (c) problematic areas included discipline, evaluation procedures, placement issues, and IEP due process concerns, (d) administrators as a group did not exhibit a satisfactory knowledge of ESE law with a mean score of 12 correct and 74% of responding administrators scoring in the unsatisfactory level (below 70%), (e) across school levels, elementary administrators scored significantly higher than high school administrators, and (f) a significant implication that assistant principals consistently scored higher than principals on each scenario with a significant difference at the high school level.^ The study reveals a vital need for administrators to receive additional preparation in order to possess a basic understanding of ESE school law and how it impacts their respective schools and school districts so that they might meet professional obligations and protect the rights of all individuals involved. Recommendations for this additional administrative preparation and further research topics were discussed. ^
Resumo:
This dissertation describes the findings and implications of a correlational analysis. Scores earned on the Computerized Placement Test (CPT), sentence skills, were compared to essay scores of advanced English as a Second Language (ESL) students. As the CPT is designed for native speakers of English, it was hypothesized that it could be an invalid or unreliable instrument for non-native speakers. Florida community college students are mandated to take the CPT to determine preparedness, as are students at many other U.S. and Canadian colleges. If incoming students score low on the CPT, they may be required to take up to three semesters of remedial coursework. It is essential that scores earned by non-native speakers of English accurately reflect their ability level. They constitute a large and growing body of non-traditional students enrolled at community colleges.^ The study was conducted at Miami-Dade Community College, Wolfson Campus, fall 1997. Participants included 106 advanced ESL students who took both the CPT sentence skills test and wrote final essay exams. The essay exams were holistically scored by trained readers. Also, the participants took the Placement Articulation Software Service (PASS) exam, an alternative form of the CPT. Scores on the CPT and essays were compared by means of a Pearson product-moment correlation to validate the CPT. Scores on the CPT and the PASS exam were compared in the same manner to verify reliability. A percentage of appropriate placements was determined by comparing essay scores to CPT cutoff score ranges. Finally, the instruments were evaluated by means of independent-samples t-tests for performance differences between gender, age, and first language groups.^ The results indicate that the CPT sentence skills test is a valid and reliable placement instrument for advanced- level ESL students who intend to pursue community college degrees. The correlations demonstrated a substantial relationship between CPT and essay scores and a marked relationship between CPT and PASS scores. Appropriate placements were made in 86% of the cases. Furthermore, the CPT was found to discriminate equally among the gender, age, and first language groups included in this study. ^
Resumo:
The purpose of this study was twofold. It was designed to determine (a) the efficacy of an intervention designed to increase the frequencies of appropriate study behaviors on the part of community college students who were preparing for academic mathematics activities and (b) whether any increase in appropriate study behavior frequency was accompanied by increased academic achievement in college preparatory mathematics classes. A total of 126 Miami Dade College students participated in this study. Two developmental (remedial) mathematics classes were randomly assigned as the experimental group, and two others were assigned as the control group. All students also took a College Survival (SLS) class. The Study Behavior Inventory (SBI) and the Computerized Placement Test (CPT) were administered to the four classes. The SBI was used as a pre- and post-test. The SLS curriculum and classroom time were the same for both groups. However, students in the treatment groups received instruction designed to increase the frequency of effective study behaviors associated with the three factors identified in the SBI, while the students in the control group participated in activities that did not emphasize study behaviors. A series of analysis of covariance procedures were used to analyze four hypotheses. The first three hypotheses proposed that students who were instructed in the use of appropriate study behaviors would score higher on the three factors of the Study Behavior Inventory than those who were not. The fourth hypothesis proposed that a greater proportion of mathematics students who were instructed in the use of appropriate study behaviors would receive a passing grade in their course than students who were in the control group. The four hypotheses were tested at the .05 level of significance. This study revealed that students who received instruction in appropriate study behaviors scored higher in the use of appropriate study behaviors and in mathematics achievement than students who did not. Additional research is needed to investigate whether these effects would persist over time, or be found in subjects other than mathematics.
Resumo:
In human society, people encounter various deontic conflicts every day. Deontic decisions are those that include moral, ethical, and normative aspects. Here, the concern is with deontic conflicts: decisions where all the alternatives lead to the violation of some norms. People think critically about these kinds of decisions. But, just ‘what’ they think about is not always clear. ^ People use certain estimating factors/criteria to balance the tradeoffs when they encounter deontic conflicts. It is unclear what subjective factors people use to make a deontic decision. An elicitation approach called the Open Factor Conjoint System is proposed, which applies an online elicitation methodology which is a combination of two well-know research methodologies: repertory grid and conjoint analysis. This new methodology is extended to be a web based application. It seeks to elicit additional relevant (subjective) factors from people, which affect deontic decisions. The relative importance and utility values are used for the development of a decision model to predict people’s decisions. ^ Fundamentally, this methodology was developed and intended to be applicable for a wide range of elicitation applications with minimal experimenter bias. Comparing with the traditional method, this online survey method reduces the limitation of time and space in data collection and this methodology can be applied in many fields. Two possible applications were addressed: robotic vehicles and the choice of medical treatment. In addition, this method can be applied to many research related disciplines in cross-cultural research due to its online ability with global capacity. ^
Resumo:
Hospitals and healthcare facilities in the United States are facing serious shortages of medical laboratory personnel, which, if not addressed, stand to negatively impact patient care. The problem is compounded by a reduction in the numbers of academic programs and resulting decrease in the number of graduates to keep up with the increase in industry demands. Given these challenges, the purpose of this study was to identify predictors of success for students in a selected 2-year Medical Laboratory Technology Associate in Science Degree Program. ^ This study examined five academic factors (College Placement Test Math and Reading scores, Cumulative GPA, Science GPA, and Professional [first semester laboratory courses] GPA) and, demographic data to see if any of these factors could predict program completion. The researcher examined academic records for a 10-year period (N =158). Using a retrospective model, the correlational analysis between the variables and completion revealed a significant relationship (p < .05) for CGPA, SGPA, CPT Math, and PGPA indicating that students with higher CGPA, SGPA, CPT Math, and PGPA were more likely to complete their degree in 2 years. Binary logistic regression analysis with the same academic variables revealed PGPA was the best predictor of program completion (p < .001). ^ Additionally, the findings in this study are consistent with the academic part of the Bean and Metzner Conceptual Model of Nontraditional Student Attrition which points to academic outcome variables such as GPA as affecting attrition. Thus, the findings in this study are important to students and educators in the field of Medical Laboratory Technology since PGPA is a predictor that can be used to provide early in-program intervention to the at-risk student, thus increasing the chances of successful timely completion.^
Resumo:
In the article - Discipline and Due Process in the Workplace – by Edwin B. Dean, Assistant Professor, the School of Hospitality Management at Florida International University, Assistant Professor Dean prefaces his article with the statement: “Disciplining employees is often necessary for the maintenance of an effective operation. The author discusses situations which require discipline and methods of handling employees, including the need for rules and due process.” In defining what constitutes appropriate discipline and what doesn’t, Dean says, “Fair play is the keystone to discipline in the workplace. Discrimination, caprice, favoritism, and erratic and inconsistent discipline can be costly and harmful to employee relations, and often are a violation of law.” Violation of law is a key phrase in this statement. The author offers a short primer on tact in regard to disciplining an employee. “Discipline must be tailored to the individual,” Dean offers a pearl of wisdom. “A frown for one can cause a tearful outbreak; another employee may need the proverbial two-by-four in order to get his attention.” This is a perceptive comment, indeed, and one in which most would concede but not all would follow. Dean presents a simple outline for steps in the disciplinary process by submitting this suggestion for your approval: “The steps in the disciplinary process begin perhaps with a friendly warning or word of advice. The key here is friendly,” Dean declares. “It could progress to an oral or written reprimand, followed by a disciplinary layoff, terminating in that equivalent of capital punishment, discharge.” Ouch [!]; in order from lenient to strident. Dean suggests these steps are necessary in order to maintain decorum in the workplace. Assistant Professor Dean references the Weingarter Rule. It is a rule that although significant, most employees, at least non-union employees, don’t know is in their quiver. “If an interview is likely to result in discipline, the employee is entitled to have a representative present, whether a union is involved or not,” the rule states. “The employer is not obligated to inform the employee of the rule, but he is obligated to honor the employee's request, if made,” Dean explains. Dean makes an interesting point by revealing that a termination often reflects as much on the institution as it does the employee suffering the termination. The author goes on to list several infractions that could warrant an employee disciplinary action, with possible approaches toward each. Dean also cautions against capricious disciplinary action; if not handled properly a discipline could and can result in a lawsuit against the institution itself.
Resumo:
Concurrent software executes multiple threads or processes to achieve high performance. However, concurrency results in a huge number of different system behaviors that are difficult to test and verify. The aim of this dissertation is to develop new methods and tools for modeling and analyzing concurrent software systems at design and code levels. This dissertation consists of several related results. First, a formal model of Mondex, an electronic purse system, is built using Petri nets from user requirements, which is formally verified using model checking. Second, Petri nets models are automatically mined from the event traces generated from scientific workflows. Third, partial order models are automatically extracted from some instrumented concurrent program execution, and potential atomicity violation bugs are automatically verified based on the partial order models using model checking. Our formal specification and verification of Mondex have contributed to the world wide effort in developing a verified software repository. Our method to mine Petri net models automatically from provenance offers a new approach to build scientific workflows. Our dynamic prediction tool, named McPatom, can predict several known bugs in real world systems including one that evades several other existing tools. McPatom is efficient and scalable as it takes advantage of the nature of atomicity violations and considers only a pair of threads and accesses to a single shared variable at one time. However, predictive tools need to consider the tradeoffs between precision and coverage. Based on McPatom, this dissertation presents two methods for improving the coverage and precision of atomicity violation predictions: 1) a post-prediction analysis method to increase coverage while ensuring precision; 2) a follow-up replaying method to further increase coverage. Both methods are implemented in a completely automatic tool.
Resumo:
This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible security policy and its relationship to the problem of maximum acyclic subgraph, which is proved to be NP-hard. Then we present a polynomial-time approximation algorithm and show that our result has approximation ratio for any integer with complexity .
Resumo:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. ^ We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. ^ We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. ^ We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). ^ In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.^
Resumo:
In human society, people encounter various deontic conflicts every day. Deontic decisions are those that include moral, ethical, and normative aspects. Here, the concern is with deontic conflicts: decisions where all the alternatives lead to the violation of some norms. People think critically about these kinds of decisions. But, just ‘what’ they think about is not always clear. People use certain estimating factors/criteria to balance the tradeoffs when they encounter deontic conflicts. It is unclear what subjective factors people use to make a deontic decision. An elicitation approach called the Open Factor Conjoint System is proposed, which applies an online elicitation methodology which is a combination of two well-know research methodologies: repertory grid and conjoint analysis. This new methodology is extended to be a web based application. It seeks to elicit additional relevant (subjective) factors from people, which affect deontic decisions. The relative importance and utility values are used for the development of a decision model to predict people’s decisions. Fundamentally, this methodology was developed and intended to be applicable for a wide range of elicitation applications with minimal experimenter bias. Comparing with the traditional method, this online survey method reduces the limitation of time and space in data collection and this methodology can be applied in many fields. Two possible applications were addressed: robotic vehicles and the choice of medical treatment. In addition, this method can be applied to many research related disciplines in cross-cultural research due to its online ability with global capacity.