795 resultados para restrictive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Decision-making in product quality is an indispensable stage in product development, in order to reduce product development risk. Based on the identification of the deficiencies of quality function deployment (QFD) and failure modes and effects analysis (FMEA), a novel decision-making method is presented that draws upon a knowledge network of failure scenarios. An ontological expression of failure scenarios is presented together with a framework of failure knowledge network (FKN). According to the roles of quality characteristics (QCs) in failure processing, QCs are set into three categories namely perceptible QCs, restrictive QCs, and controllable QCs, which present the monitor targets, control targets and improvement targets respectively for quality management. A mathematical model and algorithms based on the analytic network process (ANP) is introduced for calculating the priority of QCs with respect to different development scenarios. A case study is provided according to the proposed decision-making procedure based on FKN. This methodology is applied in the propeller design process to solve the problem of prioritising QCs. This paper provides a practical approach for decision-making in product quality. Copyright © 2011 Inderscience Enterprises Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Center for Epidemiologic Studies-Depression Scale (CES-D) is the most frequently used scale for measuring depressive symptomatology in caregiving research. The aim of this study is to test its construct structure and measurement equivalence between caregivers from two Spanish-speaking countries. Face-to-face interviews were carried out with 595 female dementia caregivers from Madrid, Spain, and from Coahuila, Mexico. The structure of the CES-D was analyzed using exploratory and confirmatory factor analysis (EFA and CFA, respectively). Measurement invariance across samples was analyzed comparing a baseline model with a more restrictive model. Significant differences between means were found for 7 items. The results of the EFA clearly supported a four-factor solution. The CFA for the whole sample with the four factors revealed high and statistically significant loading coefficients for all items (except item number 4). When equality constraints were imposed to test for the invariance between countries, the change in chi-square was significant, indicating that complete invariance could not be assumed. Significant between-countries differences were found for three of the four latent factor mean scores. Although the results provide general support for the original four-factor structure, caution should be exercised on reporting comparisons of depression scores between Spanish-speaking countries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Picky eating is a childhood behavior that vexes many parents and is a symptom in the newer diagnosis of Avoidant/Restrictive Food Intake Disorder (ARFID) in adults. Pressure to eat, a parental controlling feeding practice aimed at encouraging a child to eat more, is associated with picky eating and a number of other childhood eating concerns. Low intuitive eating, an insensitivity to internal hunger and satiety cues, is also associated with a number of problem eating behaviors in adulthood. Whether picky eating and pressure to eat are predictive of young adult eating behavior is relatively unstudied. Current adult intuitive eating and disordered eating behaviors were self-reported by 170 college students, along with childhood picky eating and pressure through retrospective self- and parent reports. Hierarchical regression analyses revealed that childhood parental pressure to eat, but not picky eating, predicted intuitive eating and disordered eating symptoms in college students. These findings suggest that parental pressure in childhood is associated with problematic eating patterns in young adulthood. Additional research is needed to understand the extent to which parental pressure is a reaction to or perhaps compounds the development of problematic eating behavior.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Since 1972, the Australian College of Optometry has worked in partnership with Vision Australia to provide multidisciplinary low-vision care at the Kooyong Low Vision Clinic. In 1999, Wolffsohn and Cochrane reported on the demographic characteristics of patients attending Kooyong. Sixteen years on, the aim of this study is to review the demographics of the Kooyong patient cohort and prescribing patterns. METHODS: Records of all new patients (n = 155) attending the Kooyong Low Vision Clinic for optometry services between April and September 2012 were retrospectively reviewed. RESULTS: Median age was 84.3 years (range 7.7 to 98.1 years) with 59 per cent female. The majority of patients presented with late-onset degenerative pathology, 49 per cent with a primary diagnosis of age-related macular degeneration. Many (47.1 per cent) lived with their families. Mean distance visual acuity was 0.57 ± 0.47 logMAR or approximately 6/24. The median spectacle-corrected near visual acuity was N8 (range N3 to worse than N80). Fifty patients (32.3 per cent) were prescribed new spectacles, 51 (32.9 per cent) low vision aids and five (8.3 per cent) were prescribed electronic magnification devices. Almost two-thirds (63.9 per cent) were referred for occupational therapy management and 12.3 per cent for orientation and mobility services. CONCLUSIONS: The profile of patients presenting for low-vision services at Kooyong is broadly similar to that identified in 1999. Outcomes appear to be similar, aside from an expected increase in electronic devices and technological solutions; however, the nature of services is changing, as treatments for ocular diseases advance and assistive technology develops and becomes more accessible. Alongside the aging population and age-related ocular disease being the predominant cause of low vision in Australia, the health-funding landscape is becoming more restrictive. The challenge for the future will be to provide timely, high-quality care in an economically efficient model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Grandfathering is currently the main principle for the initial allocation of tradable CO2 emission rights under the European cap-and-trade scheme. Furthermore, political feasibility often requires non-restrictive emission caps. Grandfathering under lax cap is unjust, biased and brings polluters unintended windfall profits. Still, in any post-Kyoto international CO2 regime, lax caps may be critical in coaxing binding emission targets out of more countries, especially those in the less-developed world. This paper argues that there is a certain quantity of emission rights between the initial and the optimal emissions, the grandfathering of which brings polluters zero windfall profits or zero windfall losses. Our theoretical concept of zero-windfall grandfathering can be used to demonstrate the windfall profits that have emerged at company level during the first EU trading period. It might thus encourage governments to embrace auctioning, and to combine it with grandfathering as a legitimate tool in the initial allocation of emission rights in later trading regimes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article explores the connections between migration and foreign combat, offering an improved definition of „foreign fighters,” and a general concept of foreign combatants’ behaviour as an anomalous form of migration. In contrast with the popular discourse and terrorism-related concerns about present-day Western European foreign fighters in Iraq and Syria (and their return to Europe) and Middle Eastern migrant refugees (and their arrival in Europe), the intention of this article is to offer a conceptually thorough consideration of the causal connections between movements of migration and the presence of foreign combatants in armed conflict, informed by a wide sample of cases. Such an assessment has to take place with a view to all forms of migration (including forced migration), all forms of foreign combat (not only foreign combat on the side of non-state actors as David Malet's oft-cited but overly restrictive definition would imply), and regions of the world beyond the Middle East and Islamic countries. Along these guiding lines, the article points out many comparatively rarely considered cases of foreign combat as well as the underestimated obstacles in the way of fighting abroad. Taking account of the latter allows refutation of a key implication of „new war theory” (its focus on „greed” as a motive of combatants), in light of the continued importance of cultural factors and ideological motives for participation in foreign combat.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation presents an analysis of the impacts of trade policy reforms in Sri Lanka. A Computable General Equilibrium (CGE) model is constructed with detailed description of the domestic production structure and foreign trade. The model is then used to investigate the effects of trade policy reforms on resource allocation and welfare.^ Prior to 1977, Sri Lanka maintained stringent control over its imports through rigid quantitative restrictions. A new economic policy reform package was introduced in 1977, and it shifted Sri Lanka's development strategy toward an export oriented policy regime. The shift of policy focus from a restrictive trade regime toward a more open trade regime is expected to have a significant impact on the volume of external trade, domestic production structure, allocation of resources, and social welfare.^ Simulations are carried out to assess the effects of three major policy reforms: (1) a devaluation of the Sri Lanka rupee, (2) a partial or a complete elimination of export duties, and (3) a devaluation-cum-removal of export duties.^ Simulation results indicate that the macroeconomic impact of a devaluation-cum-removal of export duties can be substantial. They also suggest that the resource-pull effects of a devaluation and a devaluation-cum-export duty removal policy are significant. However, the model shows that a devaluation combined with an export duty reduction is likely to be a superior strategy. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Database design is a difficult problem for non-expert designers. It is desirable to assist such designers during the problem solving process by means of a knowledge based (KB) system. A number of prototype KB systems have been proposed, however there are many shortcomings. Few have incorporated sufficient expertise in modeling relationships, particularly higher order relationships. There has been no empirical study that experimentally tested the effectiveness of any of these KB tools. Problem solving behavior of non-experts, whom the systems were intended to assist, has not been one of the bases for system design. In this project a consulting system for conceptual database design that addresses the above short comings was developed and empirically validated.^ The system incorporates (a) findings on why non-experts commit errors and (b) heuristics for modeling relationships. Two approaches to knowledge base implementation--system restrictiveness and decisional guidance--were used and compared in this project. The Restrictive approach is proscriptive and limits the designer's choices at various design phases by forcing him/her to follow a specific design path. The Guidance system approach which is less restrictive, provides context specific, informative and suggestive guidance throughout the design process. The main objectives of the study are to evaluate (1) whether the knowledge-based system is more effective than a system without the knowledge-base and (2) which knowledge implementation--restrictive or guidance--strategy is more effective. To evaluate the effectiveness of the knowledge base itself, the two systems were compared with a system that does not incorporate the expertise (Control).^ The experimental procedure involved the student subjects solving a task without using the system (pre-treatment task) and another task using one of the three systems (experimental task). The experimental task scores of those subjects who performed satisfactorily in the pre-treatment task were analyzed. Results are (1) The knowledge based approach to database design support lead to more accurate solutions than the control system; (2) No significant difference between the two KB approaches; (3) Guidance approach led to best performance; and (4) The subjects perceived the Restrictive system easier to use than the Guidance system. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, making them unfit for practical use. Also, problems essential to practical use, such as type inference and error reporting, have received little attention. This dissertation identified and solved major theoretical and practical hurdles to the application of secure information flow. ^ We adopted a minimalist approach to designing our language to ensure a simple lenient type system. We started out with a small simple imperative language and only added features that we deemed most important for practical use. One language feature we addressed is arrays. Due to the various leaking channels associated with array operations, arrays have received complicated and restrictive typing rules in other secure languages. We presented a novel approach for lenient array operations, which lead to simple and lenient typing of arrays. ^ Type inference is necessary because usually a user is only concerned with the security types for input/output variables of a program and would like to have all types for auxiliary variables inferred automatically. We presented a type inference algorithm B and proved its soundness and completeness. Moreover, algorithm B stays close to the program and the type system and therefore facilitates informative error reporting that is generated in a cascading fashion. Algorithm B and error reporting have been implemented and tested. ^ Lastly, we presented a novel framework for developing applications that ensure user information privacy. In this framework, core computations are defined as code modules that involve input/output data from multiple parties. Incrementally, secure flow policies are refined based on feedback from the type checking/inference. Core computations only interact with code modules from involved parties through well-defined interfaces. All code modules are digitally signed to ensure their authenticity and integrity. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

FDI is believed to be a conduit of new technologies between countries. The first chapter of this dissertation studies the advantages of outward FDI for the home country of multinationals conducting research and development abroad. We use patent citations as a proxy for technology spillovers and we bring empirical evidence that supports the hypothesis that a U.S. subsidiary conducting research and development overseas facilitates the flow of knowledge between its host and home countries.^ The second chapter examines the impact of intellectual property rights (IPR) reforms on the technology flows between the U.S. and host countries of U.S. affiliates. We again use patent citations to examine whether the diffusion of new technology between the host countries and the U.S. is accelerated by the reforms. Our results suggest that the reforms favor innovative efforts of domestic firms in the reforming countries rather than U.S. affiliates efforts. In other words, reforms mediate the technology flows from the U.S. to the reforming countries.^ The third chapter deals with another form of IPR, open source (OS) licenses. These differ in the conditions under which licensors and OS contributors are allowed to modify and redistribute the source code. We measure OS project quality by the speed with which programming bugs are fixed and test whether the license chosen by project leaders influences bug resolution rates. In initial regressions, we find a strong correlation between the hazard of bug resolution and the use of highly restrictive licenses. However, license choices are likely to be endogenous. We instrument license choice using (i) the human language in which contributors operate and (ii) the license choice of the project leaders for a previous project. We then find weak evidence that restrictive licenses adversely affect project success.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The number of students identified as having autism increased by 500% in the past 10 years (United States Government Accountability Office, 2005). All students with disabilities are required to be placed in least restrictive environments and to be given access to the general curriculum in the major subjects of math, reading, writing, and science as mandated by federal legislation such as the Individuals with Disabilities Education Act (IDEA, 2004) and No Child Left Behind (NCLB, 2001). As a result of this legislation, an increasing number of students with autism are being educated in inclusive classrooms. Most studies on general education access and curriculum modifications and/or instructional accommodations center on students with intellectual disabilities (e.g. Soukup, Wehmeyer, Bashinski, & Boviard, 2007; Wehmeyer, Lattin, Lapp-Rincker, & Agran, 2003). Wehmeyer et al. (2003) and Soukup et al. (2007) found included students with intellectual disabilities had more access to the general curriculum than mostly self-contained students. This meant included students were more likely to be working on the general curriculum as mandated by NCLB than those in only self-contained classrooms. This study builds and expands the research of Wehmeyer et al., as well as Soukup et al., by examining how students with autism are given access to the general curriculum through curriculum modifications and instructional accommodations used by general education teachers in three schools. This investigation focused on nine inclusive classrooms for students with autism using a parallel mixed methods design (Newman, Newman, & Newman, 2011). Classroom observations using both an IEP related checklist and field notes, teacher interviews, an archival document review of the Individual Education Plan (IEP) for the selected students with autism were performed. Findings of this study were organized by interview questions and subsequent coding categories. Quantitative data were organized in a nominal scale. Participants asserted that their middle school students with autism functioned well in their classrooms, occasionally exhibiting behavioral differences. Most instructional accommodations on IEPs were being implemented by participants, and participants often provided additional instructional accommodations not mandated by the IEP. The majority of participants credited county workshops for their knowledge of instructional accommodations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Black students, in general, are underserved academically (Darling-Hammond, 2000; Townsend, 2002) and overrepresented in special education (Donovan & Cross, 2002). Black students with disabilities are further overrepresented in more restrictive educational environments (Skiba, Poloni-Staudinger, Gallini, Simmons & Feggins-Azziz, 2006). Although the National Longitudinal Transition Study 2 (NLTS2) revealed that the academic performance of students with learning disabilities is positively related to the percentage of courses taken in the general education setting (Newman, 2006), the research specifically on placement of Black students with disabilities, particularly at the secondary level, as it relates to academic achievement is lacking. While previous studies have sought to determine which placement is better for students with disabilities, no study was found that specifically examined the impact of placement specific to Black students with specific learning disabilities (SLD) in urban settings (Fore, III, Hagan-Burke, Burke, Boon & Smith, 2008; Rea, McLaughlin & Walther-Thomas, 2002). This study examined educational placement, instructional best practices, and achievement gains of Black students with SLD in urban secondary settings using an ex post facto research design. Achievement, placement, and demographic data were collected and analyzed on approximately 314 Black eighth grade students with SLD. The Teacher Instructional Practices Survey was developed and used to collect and analyze data from the teachers of 78 of these students as it relates to instructional best practices. Results indicate no significant difference in reading but a significant difference in math gains of students served in inclusive settings as compared to resource settings with a small effect size. Also, no significant relationship was found between achievement gains and the reported use of instructional best practices. However, there was a relationship between educational placement and the use of instructional best practices. The results implied that there is a need for training with both general and special education teachers on instructional best practices for SWD and that there should be certain IEP team considerations when making placement decisions for this population of students with disabilities. It is recommended that future research in this area include classroom observations and factors other than test scores to measure growth in achievement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the article - Planning Buy-Sell Agreements In The Hospitality Industry - by John M. Tarras, Assistant Professor, School of Hotel, Restaurant and Institutional Management at Michigan State University, the author initially observes: “The vast majority of hospitality firms (restaurants, hotels, etc.) would be considered closely-held corporations. As such, they have unique planning problems compared to large, publicly-traded hospitality firms. One area of special concern to the closely-held hospitality firm is the planning and adoption of a buy-sell agreement.” The above thesis statement outlines the heart of the article; the buy-sell agreement in regard to smaller [closely held, as Tarras calls them] corporations. The theory is narrow and pro-active, spanning the gap between personal-to-corporate stock manipulations. “The primary purpose of a buy-sell agreement is to contribute to the orderly transfer of a shareholder's stock in a hospitality firm upon some future incident [typically retirement, withdrawal of a shareholder, disability, or death], as Tarras defines the concept. “The hospitality firm or the other shareholders would be committed to purchase the departing shareholder's stock at an agreed upon price and method, and to ensure that ample cash will be obtainable for such an impending sale. The buy-sell agreement provides a market for the shareholder or the shareholder's estate for the sale of otherwise illiquid stock,” the author further provides as canons of buy-sell agreements. In defining the buy-sell agreement with restrictive clauses, Tarras demonstrates, “…many closely-held hospitality firms desire to limit ownership to those individuals, either family or principal corporate employees, who are essential to the well-being of the firm.” Tarras says, another element of the buy-sell agreement is to furnish the departing shareholder with liquidity. “…there typically is some form of cash down payment with the remainder denoted by an interest-bearing promissory note [usually 5 to 15 years],” he informs. “The departing shareholders may require that the hospitality firm pledge the assets of the firm and that the remaining shareholders personally guarantee the promissory note.” “…the most frequent reason for establishing buy-sell agreements is for estate planning purposes,” Tarras says. There are tax advantages and liabilities for both the seller and buyer of stock via the buy-sell agreement, and the author enumerates many of these. One, big advantage of the buy-sell agreement is that it provides for the running of the company with a minimum of disruption through the stock-cash transition process, Tarras offers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prostitution scandals stigmatize workers for their entire lives, but the politician involved is marred for only one news cycle. “White knight” feminists shame women for sexually catering to the patriarchy but talk from a place of economic privilege. Religious organizations engage in misguided attempts to “save” women who use the industry as a job. Exploitive policies aimed at curtailing sex work hurt the individuals who wish to practice safe sex for their own protection. In the guise of aiding sex workers, or saving them from themselves, those that would advocate for more restrictive policies ignore the ramifications of what these laws would entail.