Suggested Topics within your search.
Suggested Topics within your search.
- Economic policy 24
- Economic conditions 15
- Economic development 11
- Policy sciences 11
- Government policy 7
- Moral and ethical aspects 7
- Political planning 7
- Public administration 7
- Social policy 7
- Social conditions 6
- Economic aspects 5
- Information technology 5
- Social aspects 5
- Environmental policy 4
- Political aspects 4
- Politics and government 4
- Agriculture 3
- Agriculture and state 3
- Cultural policy 3
- Cultural property 3
- Economic assistance 3
- Economics 3
- Globalization 3
- Historic preservation 3
- Income distribution 3
- Planning 3
- Social media 3
- Study and teaching 3
- Sustainable development 3
- Aging 2
-
7121
Complejizando el “retorno productivo”. Mujeres y hombres ante el regreso a Ecuador desde España
Published 2016-06-01“…These returning migrants are beneficiaries of the Cucayo subsidy provided by the Ecuadorian state in order to facilitate their self-employment. This public policy, managed by the National Secretary of Migration between 2008 and 2012, must be understood in the context of economic crisis in Spain and political economic and social institutional reforms in Ecuador. …”
Get full text
Article -
7122
Pouvoir et légitimité des figures de l’Etat au Chili de 1810 à 1861
Published 2008-07-01“…Three priorities were then chosen: guaranteeing the Peace inside the borders by furthering the revolted leaders and creating new military forces; developing the administrative structures thanks to the early adoption of a policy of rationalization; and elaborating some judiciary procedures. …”
Get full text
Article -
7123
Science et démocratie dans la gestion de la nature : des ethno-sociologues pris dans la modélisation d'accompagnement
Published 2008-11-01“…This paper aims to provide a framework for participatory and policy relevant research. .The reflection centers first on the place of social siences in the approach, the roles played by the researchers in the different contexts and the difficulties encountered, and continues on the relationship between society and nature.…”
Get full text
Article -
7124
A Review of Iran’s Manufacturing Structure in Political Documents
Published 2018-11-01“…This paper aims to formulate necessary policy instruments which strengthen Iran’s manufacturing activities. …”
Get full text
Article -
7125
Heterogeneous computing network resource management based on virtual network embedding
Published 2024-10-01“…Based on network virtualization (NV) technology, a heterogeneous cross-domain computing resource allocation method based on virtual network embedding (VNE) was proposed. Specifically, a policy network based on a deep reinforcement learning (DRL) model was constructed to accurately calculate candidate computing nodes and links for optimal resource allocation. …”
Get full text
Article -
7126
ADMINISTRATION OF ACADEMIC PROGRAMMES AS A FACTOR OF UNIVERSITY MODERNIZATION
Published 2016-12-01“…These are administrative policy and human resource management, information infrastructure, material incentives for different categories of employees, as well as cooperation with employers.…”
Get full text
Article -
7127
Lost in the Weeds?: A Comprehensive Guide to Florida’s Many Non-Native Plant Lists
Published 2019-09-01“…This 6-page document aims to inform the general public, land managers, researchers, local and state policy makers, and others who seek guidance in accessing regulatory and nonregulatory non-native plant lists in the state of Florida. …”
Get full text
Article -
7128
Using Big Data Fuzzy K-Means Clustering and Information Fusion Algorithm in English Teaching Ability Evaluation
Published 2021-01-01“…Firstly, the author uses the idea of K-means clustering to analyze the collected original error data, such as teacher level, teaching facility investment, and policy relevance level, removes the data that the algorithm considers unreliable, uses the remaining valid data to calculate the weighting factor of the modified fuzzy logic algorithm, and evaluates the weighted average with the node measurement data and gets the final fusion value. …”
Get full text
Article -
7129
Dynamical Behaviour and Chaotic Phenomena of HIV Infection through Fractional Calculus
Published 2022-01-01“…Most critical input parameters are highlighted through numerical simulations and suggested control intervention to the policy makers. Finally, we have shown the stability result and the convergence condition for the proposed numerical scheme.…”
Get full text
Article -
7130
État actionnaire et capitalisme de connivence au Maroc : le cas de la Caisse de dépôt et de gestion (CDG)
Published 2021-07-01“…Despite the resurgence of developmental aspirations with the Moroccanization policy in the 1970s, the CDG was quickly captured by Moroccan crony capitalism embedded in a hierarchical global economic system. …”
Get full text
Article -
7131
The biography of G.I. Blosfeld, the author of the first handbook on forensic medicine for lawyers
Published 2018-04-01“…Blosfeld (1797–1884), who was a famous scientist and headed the Department of Forensic Medicine, Medical Policy, History of Medicine, Hygiene, and Toxicology of the Kazan Imperial University from 1839 to 1864. …”
Get full text
Article -
7132
Des régions qui comptent – La reconfiguration néolibérale de la Belgique fédérale saisie par les finances publiques
Published 2018-12-01“…While the pubic investment policy is under stress, it is argued that the main answer provided so far (the increasing use of public-private partnerships – PPPs) tends to spur the marketization and (quasi-) privatization of public service in Belgium.…”
Get full text
Article -
7133
UAV deployment and caching scheme based on user preference prediction
Published 2020-06-01“…In order to design an efficient edge caching policy considering spatial heterogeneity and temporal fluctuations of users’ content requests,a proactive caching scheme was proposed with UAV’s deployment location design based on user preference prediction.Firstly,each user’s preference characteristics were predicted based on file similarity and user similarity,and the request time and user location were also predicted when a content request occurs.Thereafter,on the basis of the predicted geographical location,request time and user preference,each UAV’s deployment location and the corresponding content placement were determined by virtue of clustering method based on SOM and AGNES.Simulation results show that the proposed scheme outperforms other three comparison schemes in terms of hit ratio and transmission delay.Furthermore,the results also reveal that content preference is correlated with different user features by different weights.Accordingly,different impact weights should be matched with different user features.…”
Get full text
Article -
7134
Verstedeliking: Riglyne vir 'n kerklike bediening
Published 2022-09-01“…In all spheres of city life signs of God's Kingdom should be erected. Clear policy on urbanization was never found in S.A. and the socioeconomic powers dominated any political considerations. …”
Get full text
Article -
7135
Comparing the Performance of Logit and Probit Early Warning Systems for Currency Crises in Emerging Market Economies
Published 2016-06-01“…We fi nd that the logit and probit EWS out-of-sample performances are broadly similar, and that the EWS performance can be very sensitive both to the size of the estimation sample, and to the crisis defi nition employed. For macroeconomic policy purposes, we conclude that a currency crisis defi nition identifying more rather than less crisis episodes should be used, even if this may lead to the risk of issuing false alarms.…”
Get full text
Article -
7136
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
Published 2021-03-01“…To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outsourcing computing access control scheme in fog computing was proposed.The unanimous consent control by modular addition technique was used to construct an access control tree, and the computing operations of ecryption and decryption were outsourced to fog nodes in order to reduce user encryption and decryption overhead.Combined with the re-encryption mechanism, a group key binary tree was established at the fog node to re-encrypt the ciphertext so that user attribute can be updated flexibly.The security analysis shows that the proposed scheme is safe under the decision bilinear Diffie-Hellman hypothesis.Compared with other schemes, the results of simulation experiment prove that the time cost of user encryption and decryption in this scheme is lower and the efficiency of attribute update is higher.…”
Get full text
Article -
7137
Legislative Effectiveness: The legislative performance of house representatives of the 16th Philippine Congress
Published 2025-02-01“…The study concluded that the 16th Congress House of Representatives comprises policymakers who are averagely effective in pushing for policy preferences into the legislative process and to laws. …”
Get full text
Article -
7138
Le changement climatique et les propriétés du Conservatoire du littoral
Published 2015-02-01“…Leading a land policy for a better protection of coastal areas and conservation of the ecological balances, the “Conservatoire du littoral” is faced, in its owner's quality, to the problem of coastal risks management, in link with climate change. …”
Get full text
Article -
7139
The path to sustainable economies in the Middle East: Monitoring the spatial spillover effect of natural resources dependence and geopolitical risk
Published 2025-06-01“…Despite considerable attention given to the relationship between natural resource dependence, geopolitical risk and economic growth, existing literature often neglects the spatial transmission effects of geopolitical risk and policy dynamics from neighboring regions. Therefore, this study utilizes the Spatial Durbin Model (SDM) to analyze 14 Middle Eastern countries, examining the nature and magnitude of the spatial spillover effects among geopolitical risk, natural resource rents, and economic growth using annual data from 1990 to 2021. …”
Get full text
Article -
7140
Annual Energy Consumption Forecasting Based on PSOCA-GRNN Model
Published 2014-01-01“…Accurate energy consumption forecasting can provide reliable guidance for energy planners and policy makers, which can also recognize the economic and industrial development trends of a country. …”
Get full text
Article