Showing 661 - 680 results of 813 for search 'modeling agency', query time: 0.07s Refine Results
  1. 661

    A policy framework for leveraging generative AI to address enduring challenges in clinical trials by Johnathon Edward Liddicoat, Gabriela Lenarczyk, Mateo Aboy, Timo Minssen, Sebastian Porsdam Mann

    Published 2025-01-01
    “…We introduce and propose the development of application-specific language models (ASLMs) for clinical trial design across three phases: ASLM development by regulatory agencies, customization by Health Technology Assessment bodies, and deployment to stakeholders. …”
    Get full text
    Article
  2. 662

    MODERN TRENDS OF DEVELOPMENT OF THE CONSULTING SERVICES MARKET by V. Zhukov

    Published 2017-11-01
    “…The associations of consultants and consulting agencies and their functions are considered. The tendencies of development of the world market of consulting services are revealed: attraction of various consultants; fight for qualified personnel; introduction of modern information technologies; orientation on the healthcare industry; formation of new models of counseling.…”
    Get full text
    Article
  3. 663

    Adverse Environmental Impact: A Consultant’s Perspective by Alan W. Wells, Thomas L. Englert

    Published 2002-01-01
    “…In our over 30 years of experience, we have applied most of the approaches suggested for addressing this issue, including biostatistical methods, trend analysis, time series methods, conditional mortality rate models, stock-recruitment models, equivalent adult models, and ecosystem models. …”
    Get full text
    Article
  4. 664

    Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols by Ang Yang, Junghyun Nam, Moonseong Kim, Kim-Kwang Raymond Choo

    Published 2014-01-01
    “…We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. …”
    Get full text
    Article
  5. 665

    International experience in mobilising mechanisms to combat organised crime by O. Kopan, V. Melnyk

    Published 2024-11-01
    “…The study outlined the content of the organisational foundations of the system of mobilisation of law enforcement agencies involved in the fight against organised crime. …”
    Get full text
    Article
  6. 666

    Importmodellen i norsk fengselsvesen by Inger Marie Fridhov, Torfinn Langelid

    Published 2017-11-01
    “…Professor Nils Christie was a primus motor for this reorganization of prison operations, and it was he who coined the phrase “the import model”. The following article describes the implementation of the import model from 1969 to the present and some of its consequences.…”
    Get full text
    Article
  7. 667

    Using data analytics to distinguish legitimate and illegitimate shell companies by Milind Tiwari, Adrian Gepp, Kuldeep Kumar

    Published 2025-03-01
    “…We found no prior study that developed such models to detect illicit shell companies using publicly available information as done with our models. …”
    Get full text
    Article
  8. 668

    Corporate Board Attributes, Shariah Board Attributes and Credit Rating: Evidence from Islamic Banks of Pakistan by Muhammad Mansoor, Nazima Ellahi, Qaiser Ali Malik

    Published 2021-02-01
    “…The study concludes that credit rating agencies in Pakistan i.e. PACRA and JC-VIS, and other international credit rating agencies including Fitch, Moody and Standard & Poor’s must consider Shariah governance attributes as key determinants while assigning long term and short term credit ratings to Islamic banks.…”
    Get full text
    Article
  9. 669

    Research and applications of intelligent public security information system based on big data by Dong-ke LI

    Published 2016-12-01
    “…The rapid development of big data push the big changes to every industries and government agencies.The concept of big data and security intelligent system framework was cleared.Then,the serious problems of the devel-opment of intelligent public security were analyzed,the novel work model of public security was also studied,and the new paths and method were pointed ont.Next,the intelligent information system for public security was built up,and the effectiveness of this system were evaluated.The system can efficiently meet the requirements of the current public security,and serve the national security with great significance.…”
    Get full text
    Article
  10. 670

    Detection of Surface Crack in Building Structures Using Image Processing Technique with an Improved Otsu Method for Image Thresholding by Nhat-Duc Hoang

    Published 2018-01-01
    “…Therefore, the constructed model can be a useful tool for building management agencies and construction engineers in the task of structure maintenance.…”
    Get full text
    Article
  11. 671

    Implementasi Kebijakan Pengelolaan dan Pengusahaan Sarang Burung Walet di Kota Pekanbaru by Rinaldy May Wendra, Teuku Afrizal, Eko Supriyono, Siauw Tiffani Setiono, Annisa Nurfitriani Fatimah

    Published 2020-07-01
    “…Analysis of policy implementation is seen through the Edward III model, which pays attention to the effectiveness of implementation in terms of communication, resources, disposition and bureaucratic structure. …”
    Get full text
    Article
  12. 672

    Systemic Risk in the Interbank Market with Overlapping Portfolios by Shanshan Jiang, Hong Fan

    Published 2019-01-01
    “…The model provides a tool for policy-makers and supervision agencies to prevent the systemic risk of banking system.…”
    Get full text
    Article
  13. 673

    Encouragement of the Personnel of the State Labor Service of Ukraine to Implement International Experience within Labor Protection Management by O. A. Lukianykhina, V. O. Lukianykhin, I. V. Kolesnyk, K. О. Khamlyka

    Published 2021-03-01
    “…The advantage of this model is the ability of inspections to delegate their powers from central authorities to local agencies. …”
    Get full text
    Article
  14. 674

    Privacy Protection Method for Vehicle Trajectory Based on VLPR Data by Hua Chen, Chen Xiong, Jia-meng Xie, Ming Cai

    Published 2020-01-01
    “…Meanwhile, a mathematical model is established to expound the privacy protection principle of the (m, n)-bucket model. …”
    Get full text
    Article
  15. 675

    Application Of ArtifiCial Intelligence in E-Governance: A Comparative Study of Supervised Machine Learning and Ensemble Learning Algorithms on Crime Prediction. by Niyonzima, Ivan, Muhaise, Hussein, Akankwasa, Aureri

    Published 2024
    “…Machine learning, a subfield of artificial intelligence, has been used by government agencies in developed countries in crime analysis and predictions. …”
    Get full text
    Article
  16. 676

    Environmental regulation, market power and low-carbon development of China's coal power industry chain —Based on both strategy and return perspectives by Jiaming Gao, Li Zhang

    Published 2025-03-01
    “…To study the behavioral strategies of government agencies and the coal power industry chain under environmental regulation, an evolutionary game model has been constructed. …”
    Get full text
    Article
  17. 677

    Integrating Social Rehabilitation into the Education System for Adolescent Drug Addicts: Legal Framework, Potential, and Challenges by Abdurrakhman Alhakim, Marthsian Yeksi Anakotta, Emiliya Febriyani, Winsherly Tan

    Published 2024-06-01
    “…Using normative legal research method and statutory approach, this research revealed numerous potentials and challenges in integrating social rehabilitation into the education system. A model consisting of normative reforms and practical framework of works is proposed to be applied by educational institutions and relevant government agencies. …”
    Get full text
    Article
  18. 678

    Multidimensional Performance Evaluation Using the Hybrid MCDM Method: A Case Study in the Turkish Non-Life Insurance Sector by Mehmet Zafer Taşcı

    Published 2024-06-01
    “…The validity and consistency of the results of the proposed decision model were tested using various sensitivity analyses.…”
    Get full text
    Article
  19. 679

    Confirmation bias in law enforcement and how debiasing interventions and mitigation strategies might help rebuild public trust: A thematic review by Segovia Richard Odin

    Published 2025-01-01
    “…For law enforcement agencies, implementing targeted training programs, de-biasing techniques, and decision-making models might improve equity and fairness concerning law enforcement practices. …”
    Get full text
    Article
  20. 680

    Determinants of Public Sector Innovation: The Example of Capacity Development in Public Procurement by Nils Otter, Mike Weber

    Published 2015-03-01
    “…The Triple-Helix-Model stresses the idea that a successful national system of innovation ought to incorporate the complexity of three social subsystems: private sector economy, governmental system and science. …”
    Get full text
    Article