Showing 7,121 - 7,140 results of 15,300 for search '"Policy"', query time: 0.10s Refine Results
  1. 7121

    Complejizando el “retorno productivo”. Mujeres y hombres ante el regreso a Ecuador desde España by Cristina Vega

    Published 2016-06-01
    “…These returning migrants are beneficiaries of the Cucayo subsidy provided by the Ecuadorian state in order to facilitate their self-employment. This public policy, managed by the National Secretary of Migration between 2008 and 2012, must be understood in the context of economic crisis in Spain and political economic and social institutional reforms in Ecuador. …”
    Get full text
    Article
  2. 7122

    Pouvoir et légitimité des figures de l’Etat au Chili de 1810 à 1861 by Nathalie Jammet

    Published 2008-07-01
    “…Three priorities were then chosen: guaranteeing the Peace inside the borders by furthering the revolted leaders and creating new military forces; developing the administrative structures thanks to the early adoption of a policy of rationalization; and elaborating some judiciary procedures. …”
    Get full text
    Article
  3. 7123

    Science et démocratie dans la gestion de la nature : des ethno-sociologues pris dans la modélisation d'accompagnement by Marie Charles, Frédérique Chlous-Ducharme, Elsa Faugère, Maurice Wintz

    Published 2008-11-01
    “…This paper aims to provide a framework for participatory and policy relevant research. .The reflection centers first on the place of social siences in the approach, the roles played by the researchers in the different contexts and the difficulties encountered, and continues on the relationship between society and nature.…”
    Get full text
    Article
  4. 7124

    A Review of Iran’s Manufacturing Structure in Political Documents by Afsaneh Shafiee

    Published 2018-11-01
    “…This paper aims to formulate necessary policy instruments which strengthen Iran’s manufacturing activities. …”
    Get full text
    Article
  5. 7125

    Heterogeneous computing network resource management based on virtual network embedding by YU Jinghang, ZHAO Yichen, WANG Ling, CHEN Xin, ZOU Haodong

    Published 2024-10-01
    “…Based on network virtualization (NV) technology, a heterogeneous cross-domain computing resource allocation method based on virtual network embedding (VNE) was proposed. Specifically, a policy network based on a deep reinforcement learning (DRL) model was constructed to accurately calculate candidate computing nodes and links for optimal resource allocation. …”
    Get full text
    Article
  6. 7126

    ADMINISTRATION OF ACADEMIC PROGRAMMES AS A FACTOR OF UNIVERSITY MODERNIZATION by Andrey P. Klemeshev, Irina Yu. Kuksa

    Published 2016-12-01
    “…These are administrative policy and human resource management, information infrastructure, material incentives for different categories of employees, as well as cooperation with employers.…”
    Get full text
    Article
  7. 7127

    Lost in the Weeds?: A Comprehensive Guide to Florida’s Many Non-Native Plant Lists by Deah Lieurance, Lyn A Gettys

    Published 2019-09-01
    “…This 6-page document aims to inform the general public, land managers, researchers, local and state policy makers, and others who seek guidance in accessing regulatory and nonregulatory non-native plant lists in the state of Florida. …”
    Get full text
    Article
  8. 7128

    Using Big Data Fuzzy K-Means Clustering and Information Fusion Algorithm in English Teaching Ability Evaluation by Chen Zhen

    Published 2021-01-01
    “…Firstly, the author uses the idea of K-means clustering to analyze the collected original error data, such as teacher level, teaching facility investment, and policy relevance level, removes the data that the algorithm considers unreliable, uses the remaining valid data to calculate the weighting factor of the modified fuzzy logic algorithm, and evaluates the weighted average with the node measurement data and gets the final fusion value. …”
    Get full text
    Article
  9. 7129

    Dynamical Behaviour and Chaotic Phenomena of HIV Infection through Fractional Calculus by Rashid Jan, Amin Khan, Salah Boulaaras, Sulima Ahmed Zubair

    Published 2022-01-01
    “…Most critical input parameters are highlighted through numerical simulations and suggested control intervention to the policy makers. Finally, we have shown the stability result and the convergence condition for the proposed numerical scheme.…”
    Get full text
    Article
  10. 7130

    État actionnaire et capitalisme de connivence au Maroc : le cas de la Caisse de dépôt et de gestion (CDG) by Mohamed Oubenal, Abdellatif Zeroual

    Published 2021-07-01
    “…Despite the resurgence of developmental aspirations with the Moroccanization policy in the 1970s, the CDG was quickly captured by Moroccan crony capitalism embedded in a hierarchical global economic system. …”
    Get full text
    Article
  11. 7131

    The biography of G.I. Blosfeld, the author of the first handbook on forensic medicine for lawyers by V.A. Spiridonov

    Published 2018-04-01
    “…Blosfeld (1797–1884), who was a famous scientist and headed the Department of Forensic Medicine, Medical Policy, History of Medicine, Hygiene, and Toxicology of the Kazan Imperial University from 1839 to 1864. …”
    Get full text
    Article
  12. 7132

    Des régions qui comptent – La reconfiguration néolibérale de la Belgique fédérale saisie par les finances publiques by Damien Piron

    Published 2018-12-01
    “…While the pubic investment policy is under stress, it is argued that the main answer provided so far (the increasing use of public-private partnerships – PPPs) tends to spur the marketization and (quasi-) privatization of public service in Belgium.…”
    Get full text
    Article
  13. 7133

    UAV deployment and caching scheme based on user preference prediction by Jiazhi REN, Hui TIAN, Shaoshuai FAN, Yuanzhuo LIN, Gaofeng NIE, Jilong LI

    Published 2020-06-01
    “…In order to design an efficient edge caching policy considering spatial heterogeneity and temporal fluctuations of users’ content requests,a proactive caching scheme was proposed with UAV’s deployment location design based on user preference prediction.Firstly,each user’s preference characteristics were predicted based on file similarity and user similarity,and the request time and user location were also predicted when a content request occurs.Thereafter,on the basis of the predicted geographical location,request time and user preference,each UAV’s deployment location and the corresponding content placement were determined by virtue of clustering method based on SOM and AGNES.Simulation results show that the proposed scheme outperforms other three comparison schemes in terms of hit ratio and transmission delay.Furthermore,the results also reveal that content preference is correlated with different user features by different weights.Accordingly,different impact weights should be matched with different user features.…”
    Get full text
    Article
  14. 7134

    Verstedeliking: Riglyne vir 'n kerklike bediening by B. du T. Jackson

    Published 2022-09-01
    “…In all spheres of city life signs of God's Kingdom should be erected. Clear policy on urbanization was never found in S.A. and the socioeconomic powers dominated any political considerations. …”
    Get full text
    Article
  15. 7135

    Comparing the Performance of Logit and Probit Early Warning Systems for Currency Crises in Emerging Market Economies by Fabio Comelli

    Published 2016-06-01
    “…We fi nd that the logit and probit EWS out-of-sample performances are broadly similar, and that the EWS performance can be very sensitive both to the size of the estimation sample, and to the crisis defi nition employed. For macroeconomic policy purposes, we conclude that a currency crisis defi nition identifying more rather than less crisis episodes should be used, even if this may lead to the risk of issuing false alarms.…”
    Get full text
    Article
  16. 7136

    Fine-grained attribute update and outsourcing computing access control scheme in fog computing by Ruizhong DU, Peiwen YAN, Yan LIU

    Published 2021-03-01
    “…To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute update, an fine-grained attribute update and outsourcing computing access control scheme in fog computing was proposed.The unanimous consent control by modular addition technique was used to construct an access control tree, and the computing operations of ecryption and decryption were outsourced to fog nodes in order to reduce user encryption and decryption overhead.Combined with the re-encryption mechanism, a group key binary tree was established at the fog node to re-encrypt the ciphertext so that user attribute can be updated flexibly.The security analysis shows that the proposed scheme is safe under the decision bilinear Diffie-Hellman hypothesis.Compared with other schemes, the results of simulation experiment prove that the time cost of user encryption and decryption in this scheme is lower and the efficiency of attribute update is higher.…”
    Get full text
    Article
  17. 7137

    Legislative Effectiveness: The legislative performance of house representatives of the 16th Philippine Congress by Joanna Marie Baroman

    Published 2025-02-01
    “…The study concluded that the 16th Congress House of Representatives comprises policymakers who are averagely effective in pushing for policy preferences into the legislative process and to laws. …”
    Get full text
    Article
  18. 7138

    Le changement climatique et les propriétés du Conservatoire du littoral by Élodie Doze

    Published 2015-02-01
    “…Leading a land policy for a better protection of coastal areas and conservation of the ecological balances, the “Conservatoire du littoral” is faced, in its owner's quality, to the problem of coastal risks management, in link with climate change. …”
    Get full text
    Article
  19. 7139

    The path to sustainable economies in the Middle East: Monitoring the spatial spillover effect of natural resources dependence and geopolitical risk by Mohammed Alnour, Emrah Kocak

    Published 2025-06-01
    “…Despite considerable attention given to the relationship between natural resource dependence, geopolitical risk and economic growth, existing literature often neglects the spatial transmission effects of geopolitical risk and policy dynamics from neighboring regions. Therefore, this study utilizes the Spatial Durbin Model (SDM) to analyze 14 Middle Eastern countries, examining the nature and magnitude of the spatial spillover effects among geopolitical risk, natural resource rents, and economic growth using annual data from 1990 to 2021. …”
    Get full text
    Article
  20. 7140

    Annual Energy Consumption Forecasting Based on PSOCA-GRNN Model by Huiru Zhao, Sen Guo

    Published 2014-01-01
    “…Accurate energy consumption forecasting can provide reliable guidance for energy planners and policy makers, which can also recognize the economic and industrial development trends of a country. …”
    Get full text
    Article