Results 41 to 50 of about 6,263,660 (322)

Analysis on energy demand and CO2 emissions in China following the Energy Production and Consumption Revolution Strategy and China Dream target

open access: yesAdvances in Climate Change Research, 2018
A quantitative model was applied to analyze the energy demand and CO2 emissions in China following the Energy Production and Consumption Revolution Strategy (2016–2030) and long-term economic and social development target China Dream. Results showed that
Ji-Feng Li   +3 more
doaj   +1 more source

On the Optimality of the Whittle’s Index Policy for Minimizing the Age of Information [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2020
In this article, we consider the average age minimization problem where a central entity schedules $M$ users among the $N$ available users for transmission over unreliable channels. It is well-known that obtaining the optimal policy, in this case, is
Ali Maatouk   +3 more
semanticscholar   +1 more source

The strategic importance of information policy for the contemporary neoliberal state: The case of Open Government Data in the United Kingdom

open access: yesGovernment Information Quarterly, 2014
The article analyses the role of Open Government Data policy as part of the broader public policy agenda of the UK government. A thematic analysis of interview, observational and policy documentation is presented which suggests that since 2010 the Open ...
J. Bates
semanticscholar   +1 more source

General theoretical foundations of the study of the concept of «information security»

open access: yesАналітично-порівняльне правознавство
The article considers general theoretical approaches to understanding the concept of «information security». The study of the holistic concept of «information security» requires the use of a comprehensive approach to understanding the meaning of ...
M. V. Honcharov, A. V. Honcharov
doaj   +1 more source

Main composition of information security of the state

open access: yesAspekti Publìčnogo Upravlìnnâ, 2019
The article clarifies the main components of state information security. It has been established that the interests of any country depend to a large extent on the preservation of information security.
Anna Turchak
doaj   +1 more source

Adversarial Imitation Learning from Incomplete Demonstrations

open access: yes, 2019
Imitation learning targets deriving a mapping from states to actions, a.k.a. policy, from expert demonstrations. Existing methods for imitation learning typically require any actions in the demonstrations to be fully available, which is hard to ensure in
Ma, Xiaojuan, Sun, Mingfei
core   +1 more source

Self-Policing: Dissemination and Adoption of Police Eyewitness Policies in Virginia [PDF]

open access: yes, 2011
Professional policing organizations emphasize the importance of the adoption of sound police policies and procedures, but traditionally doing so has been left to individual agencies.
A. Persson   +6 more
core   +2 more sources

State Information Policy of Ukraine in the Conditions of a Full-Scale Military Invasion of Russian Federation: Social Mobilization Potential and Efficiency

open access: yesПолітичні дослідження
The article is devoted to determining the social mobilization potential of the state information policy of Ukraine in the conditions of a full-scale military invasion of the Russian Federation. The dependence of the state information policy of Ukraine on
Yurii Nikolaiets
doaj   +1 more source

Results of a Survey of Schoolchildren and Students of Professional Educational Organizations on the State, Preservation and Development of Native Languages of the Peoples of Russia

open access: yesPolylinguality and Transcultural Practices, 2020
The problem of language continuity in modern conditions has become particularly relevant for Russia, where the number of languages and dialects is directly related to ethnic diversity and is more than 270.
Tatyana V. Bolotina, Olga A. Danilova
doaj   +1 more source

Wireless powered relaying networks under imperfect channel state information: system performance and optimal policy for instantaneous rate

open access: yes, 2017
In this investigation, we consider wireless powered relaying systems, where energy is scavenged by a relay via radio frequency (RF) signals. We explore hybrid time switching-based and power splitting-based relaying protocol (HTPSR) and compare ...
D. Do   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy