نتایج جستجو برای: policy analysis matrix
تعداد نتایج: 3297680 فیلتر نتایج به سال:
Large-scale, shared-memory multiprocessors have non-uniform memory access (NUMA) costs. The high communication cost dominates the source of matrix computations' execution. Memory contention and remote memory access are two major communication overheads on large-scale NUMA multiprocessors. However, previous experiments and discussions focus either on reducing the number of remote memory accesses...
The ability of nonexperimental estimators to match impact estimates derived from random assignment is examined using data from the evaluation of two interdistrict magnet schools. As in previous within-study comparisons, nonexperimental estimates differ from estimates based on random assignment when nonexperimental estimators are implemented without pretreatment measures of academic performance....
Recent years have seen advances in research and management practice in the area of pricing, and particularly in dynamic pricing and revenue management. At the same time, researchers and managers have made dramatic improvements in production and supply chain management. The interactions between pricing and production/supply chain performance, however, are not as well understood. Can a firm benef...
Background Retaining doctors in rural areas is a challenge in Bangladesh. In this study, we analyzed three rural retention policies: career development programs, compulsory services, and schools outside major cities – in terms of context, contents, actors, and processes. Methods Series of group discussions between policy-makers and researchers prompted the selection of policy areas, which wer...
Policy makers impose policies to improve economy circumstance in order to achieve economic goals. However, the consequence of these policies along with the intended goals will also influence expectations, fluctuations, etc., and cause changes in levels of uncertainty. The important role of the stock market in the economy, makes it important to examine its uncertainty and its interaction with mo...
Computer network security is the first line of defence to accomplish information assurance. The computer network is at risk without a well-designed and flawless implemented network security policy. The main problem is that network administrators are not able to verify the network security policy. Although further research has been carried out, it mainly concerns small specific parts of the over...
National prohibition of alcohol (1920-33)--the "noble experiment"--was undertaken to reduce crime and corruption, solve social problems, reduce the tax burden created by prisons and poorhouses, and improve health and hygiene in America. The results of that experiment clearly indicate that it was a miserable failure on all counts. The evidence affirms sound economic theory, which predicts that p...
In this paper, we characterize multiresolution analysis(MRA) Parseval frame multiwavelets in L^2(R^d) with matrix dilations of the form (D f )(x) = sqrt{2}f (Ax), where A is an arbitrary expanding dtimes d matrix with integer coefficients, such that |detA| =2. We study a class of generalized low pass matrix filters that allow us to define (and construct) the subclass of MRA tight frame multiwa...
transfer matrix method (tmm) has been applied to analyze characteristics of semiconductor laser optical amplifiers. the input signal is sinusoidal modulating wave and we do not assume the modulating bias signal as well. we have shown that the distoration arises from gain modulation at low modulation frequencies, but in microwave modulation frequencies, the gain takes an average value and the re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید