1 |
THE APPROXIMATION RULE: EXAMINING AN ALTERNATIVE TO THE “BEST INTEREST OF THE CHILD” CUSTODY STANDARDArcher, Elizabeth 28 February 2009 (has links)
While the Best Interest of the Child (BIOC) standard has been used since the 1970’s, alternatives such as the Approximation Rule have recently been proposed to remediate perceived weaknesses in BIOC. This study examines the applicability of the Approximation Rule using cross-sectional data collected from 517 children (age 10-18) of divorced parents using the Co-Parenting Behavior Questionnaire (CBQ). Data for all co-parenting and parenting variables (n = 517) were analyzed to determine relationships by time since divorce and custodial relationship. Physical custody was associated with significant differences in children’s’ ratings of both co-parenting and parenting effectiveness. Results for time since divorce revealed only one significant relationship with all divorcing parents showing significant decreases in ratings of inter-parent conflict over time with the most substantial reductions occurring 5 years after the separation. Findings were then used to measure the accuracy of the assumptions in both the Approximation Rule and in BIOC.
|
2 |
A Negotiable RSVP with Multiple Preemption for supporting Dynamic Bandwidth ReservationLin, Yen 29 July 2003 (has links)
In this Thesis, we propose a Negotiable RSVP with Multiple Preemption for supporting dynamic bandwidth reservation. With the properties of negotiation and preemption, we can re-allocate bandwidth to effectively increase the probability of successful reservations of flows with higher priority.
Different from RSVP, negotiable RSVP uses a priority mechanism with many parameters, such as upper-bound bandwidth and upper-bound priority. Negotiable RSVP transmits these parameters by sending Resv Messages such that every RSVP flow possesses individual priority levels. When the available bandwidth is not enough, the arriving new flows can negotiate with the existing reserved flows that have lower priorities. We then estimate the sum of the available bandwidth and the preemptive bandwidth from the reserved flows. If the sum satisfies the lower-bound bandwidth of the arriving new flow, the reservation is successful. At the best case, if the sum can meet its high-bound bandwidth, the system can reserve the high-bound bandwidth for the flow. However, if the sum is lower than its low-bound bandwidth, it will be rejected.
To demonstrate the efficiency and feasibility of negotiable RSVP, we build two simulation models, RSVP and Negotiable RSVP, respectively, and compare their simulation results. We have shown that negotiable RSVP can perform better than RSVP in many ways. For example, the probability of successful reservation and the number of reserved flows are significantly increased. We also implement the negotiable RSVP on FreeBSD platform, and measure the percentages of improvements through various experiments.
|
3 |
NCAA Division I Athletes Preferences for Coaching BehaviorsBarnes, Kelly A. 12 1900 (has links)
The purpose of this study was to determine whether coaching behavior preferences of NCAA Division I athletes differ as a function of gender and type of sport. The Coaching Behavior Questionnare (CBQ; Martin & Barnes, 1999) was administered to 195 NCAA Division I athletes. Gender and sport type were the independent variables and the participant's mean scores for the subscales on the CBQ were the dependent variables. Descriptive statistics revealed that, overall, NCAA Division I athletes prefer positive and instructional behaviors more than non-responses or negative behaviors. A 2 (gender) x 3 (type of sport) MANOVA and follow-up discriminant function analysis indicated that coaching behavior preferences differed as a function of gender and type of sport played. Thus, NCAA Division I coaches should consider both individual and situational characteristics when working with their athletes to achieve the desired outcome.
|
4 |
Comparison of Temperamental Rating Bilingually in Ukraine using Child Behavioral Questionnaire (CBQ): Short FormOstrovsky, Nelly 01 December 2013 (has links) (PDF)
The 2 goals of the present investigation were to 1) examine the reliability of the Children’s Behavior Questionnaire: Short Form (CBQ) in a sample of 4-7 year-old children from the Ukraine and 2) compare those children’s temperament profiles to a) one another when the form was administered in 2 different languages and b) their American counterparts from the CBQ standardization sample. Three waves of data were collected from the parents of 167 children residing in Kiev, Ukraine. Internal reliability analyses showed good internal consistency of the instrument. Comparative analyses conducted both within and between cultures showed similarities and differences across the 15 CBQ dimensions. The observed differences were in the predicted directions: Ukrainian children were rated higher than American children on dimensions reflecting negative affectivity. However, the language of the instrument was a mitigating factor. This finding supports the possibility that parental ethnotheories are embedded in specific languages.
|
5 |
Realizace internetové brány na Linuxu s pokročilým filtrováním / Establishment of the Linux internet gateway using advanced filteringMatocha, Tomáš January 2009 (has links)
The thesis Establishment of the Linux internet gateway using advanced filtering focuses on~the installation of~the Linux operating system on~the older computers, that functions as a gateway to connect clients in the internal network to the Internet. The thesis describes creation an advanced filter with using iptables. Shows some types of security against attacks from the Internet. The other chapters are discussed, advanced traffic control mechanism (such as a TC and a qdisc). The system queue, it is highly beneficial where it is necessary to hierarchically divide traffic between users. It describes types of queue and assembled configurations for clients in the internal network. Next chapter describes the DNS server caching-only type and application denyhosts, which increases the overall security system. Have your own DNS server is certified, especially if we want to reduce the data traffic. Last chapter describes the RADIUS server and its implementation using Apache and MySQL database. Furthermore, the configuration options are described and the examples of the particular configurations are provided. Finally, it presented a system for authentication through the RADIUS server. The thesis seeks to provide a~complex view of security and filtering.
|
Page generated in 0.0232 seconds