نتایج جستجو برای: policy rule
تعداد نتایج: 409888 فیلتر نتایج به سال:
In many countries around the world, including Iran, obesity is reaching epidemic proportions. Doctors have recently taken, or expressed support for, an extreme ‘personal responsibility for health’ policy against obesity: refusing services to obese patients. This policy may initially seem to improve patients’ incentives to fight obesity. But turning access to medical services into a benefit depe...
It is more likely that the monetary policy in Iran is discretionary and not based on a rule or a target. Besides, what is clear is that there have been explicit targets for inflation and economic growth in all five-year development plans (except the fifth plan). However, the question is that do policy makers observe the targets of development plans? Using an adjusted New Keynesian DSGE model ...
This study aimed to examine the effects of monetary policy on macroeconomic variables with regard to the collateral constraint. For this purpose, a dynamic stochastic general equilibrium (DSGE) was developed for Iran’s economic status. Two scenarios were considered as to account for the behavior of the central bank. In the first scenario, the monetary rule is modeled according to the GDP gap an...
The Ramsey rule for the consumption rate of discount assumes a transfer of money of a (representative) agent at one point in time to the same agent at another point in time. Climate policy (implicitly) transfers money not just over time but also between agents. I propose three alternative modifications of the Ramsey rule to account for this. Taking the Ramsey rule as given, I derive an intuitiv...
A computing policy is a sequence of rules, where each rule consists of a predicate and a decision, and where each decision is either “accept” or “reject”. A policy P is said to accept (or reject, respectively) a request iif the decision of the first rule in P , that matches the request is “accept” (or “reject”, respectively). Examples of computing policies are firewalls, routing policies and so...
Firewalls are essential elements for security policy enforcement in modern networks. However, managing a filtering security policy, especially for enterprise networks, has become complex and error-prone. Filtering rules have to be carefully written and organized in order to correctly implement the security policy and avoid policy anomalies. In this paper, we present a set of techniques and algo...
Network node functions, such as QoS or the security functions of routers, are becoming increasingly complex, so programs, not only configuration parameters, are required to control network nodes. In a policy-based network, a policy is defined at a policy server as a set of rules that deployed at network nodes where it must be translated into an executable program or parameters. Thus, a policy m...
The paper discusses how current in ‡ation targeting should be modeled, and argues that it is better represented as a commitment to a targeting rule (a rule specifying operational objectives for monetary policy or a condition for the target variables), than as a commitment to a simple instrument rule (like a Taylor rule).
The paper discusses how current in ‡ation targeting should be modeled, and argues that it is better represented as a commitment to a targeting rule (a rule specifying operational objectives for monetary policy or a condition for the target variables), than as a commitment to a simple instrument rule (like a Taylor rule).
This paper proposes a general method for deriving an optimal monetary policy rule in the case of a dynamic linear rational-expectations model and a quadratic objective function for policy. A commitment to a rule of the type proposed results in a determinate equilibrium in which the responses to shocks are optimal. Furthermore, the optimality of the proposed policy rule is independent of the spe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید