نتایج جستجو برای: keywords incentive reversal

تعداد نتایج: 2024466  

Journal: :Pharmacology and Clinical Pharmacy Research 2020

Journal: :Journal of dramatic theory and criticism 2021

Journal: :Small Axe: A Caribbean Journal of Criticism 2022

This essay introduces a new featured section, to be published in Small Axe annually, that explores the critical vocabulary of field Caribbean studies.

2015
Isa Hafalir Antonio Miralles

We allocate agents to three kinds of hierarchical positions: top, medium, and low. No monetary transfers are allowed. We solve for the incentive-compatible (IC) mechanisms that maximize a family of weighted social welfares that includes utilitarian and Rawlsian welfares. When the market is tough (all agents bear positive risk of obtaining a low position in any IC and feasible mechanism), then t...

دادرس, صدیقه, دادمهر, وحید, مانیوانان, نالایان, کیم, کی هون,

In order to study Hall effect in pure and CNT doped YBCO polycrystalline samples, we have measured longitudinal and transverse voltages at the different magnetic field (0-9T) in the vortex state. We found a sign reversal for pure sample near 3T and double sign reversal of the Hall coefficient for CNT doped sample near 3 and 5T. It can be deduced that CNT doping caused strong flux pinning and H...

Journal: :English Text Construction 2012

Journal: :African Studies Review 2023

Abstract “Queer” is a relatively recent and somewhat controversial term in African studies. Yet it proving to be productive, not only for understanding subjectivities of sexuality gender, but also situating Africa’s position the larger economy knowledge. Otu van Klinken explore productive tensions between “queer” “Africa,” aim read Africa as queer from Africa. Thus, rather than imagining polar ...

2011
Charles Wang

This project is an extension of the Ad-hoc Walkie-Talkie project by UIUC PhD Lewis Tseng and my colleague UIUC undergraduate Pratch Piyawongwisa. Ad-hoc Walkie-Talkie is an application simulating walkie-talkie on top of an ad-hoc wireless network. A wireless sensor network comprises a number of sensor nodes, each of which has limited energy supply as well as intrinsic sensing and communicating ...

2014

Visual Cryptography (VC), proposed by Naor and Shamir, has numerous uses, including visual authentication and identification, image encryption and steganography for security purpose, and. In this paper Contrast the visual information based on pseudo randomization and pixel reversal using sigmoid function is also proposed. Keywords— Information hiding, Information Security, Halftone image, Visua...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید