• Aucun résultat trouvé

Educational programs in rural Nepal: Peer communication and information spillovers

N/A
N/A
Protected

Academic year: 2021

Partager "Educational programs in rural Nepal: Peer communication and information spillovers"

Copied!
28
0
0

Texte intégral

Loading

Figure

Table 1: Estimated Probit Coefficients Dependent variable: FPC adoption
Table 2 presents the results from the bivariate probit estimation. The two columns of (4) refer to the bivariate probit system estimated with the same set of regressors as in Table 1.
Table 2: Bivariate Probit Results
Table 2: Bivariate Probit Results (Continued) (4) (5) perceived FPC use 0.377 0.455 (0.559) (0.422) declared friends 0.156 -0.065 (0.609) (0.781) constant -1.802 -3.775 -2.122 -4.499 (0.035)* (0.000)** (0.048)* (0.000)** radio owned 1.172 1.233 (0.000)** (
+5

Références

Documents relatifs

The conference has been organized by the World Health Organization Regional Office for the Eastern Mediterranean, and the Pakistan Association of Medical Editors (PAME), in

F requency is the number of the forecasts issued by an analyst for the firm during the quarter of concern; Age (age of the forecast) is the number of days between the forecast issue

Nanopublications can be used to expose any data type whatsoever, in- cluding quantitative and qualitative data, experimental data as well as hypothe- ses, novel or legacy data and

The main claim of the talk is that our research in Information Systems Engineering has to adopt clearly the research paradigms used in classical engineering fields (mechanical,

Les deux m´ ethodes retenues dans le cadre de ce travail sont la m´ ethode spectrale it´ erative pour pr´ edire le comportement vibratoire de la transmission (carter inclus) ` a

Given the nearly total absence of empirical data about bird mortality as a result of roadside maintenance operations, we chose a modelling approach to estimate incidental

Keywords: Information retrieval, Named entity task, Transducer cascades,

Our journey in Wuala’s « social storage » allows us to conclude that the main beneficiary of the co- existence of P2P technology at the layer of safeguard and