نتایج جستجو برای: armed attack
تعداد نتایج: 92853 فیلتر نتایج به سال:
BACKGROUND Armed conflict potentially poses serious challenges to access and quality of maternal and reproductive health (MRH) services, resulting in increased maternal morbidity and mortality. The effects of armed conflict may vary from one setting to another, including the mechanisms/channels through which the conflict may lead to poor access to and quality of health services. This study aims...
unexpected extreme sudden traumatic stressor may cause post-traumatic stress disorder (ptsd). important traumatic events include war, violent personal assault ( e.g. , sexual assault, and physical attack), being taken hostage or kidnapped, confinement as a prisoner of war, torture, terrorist attack, severe car accidents, and natural disasters. in childhood age sexual abuse or witnessing serious...
Armed conflicts have changed in complexity and nature over the past few decades magnifying health challenges for children. Conflict impacts children's health in four important ways. First, conflict‐driven displacement increases child death and injury, mainly through increased susceptibility to infectious disease from unsanitary living conditions. A case study on Southern Sudan illustrates that ...
We consider the framework of stochastic multi-armed bandit problems and study the possibilities and limitations of forecasters that perform an on-line exploration of the arms. These forecasters are assessed in terms of their simple regret, a regret notion that captures the fact that exploration is only constrained by the number of available rounds (not necessarily known in advance), in contrast...
This paper is about the study of Multi–Armed Bandit (MAB) approaches for pricing applications, where a seller needs to identify the selling price for a particular kind of item that maximizes her/his profit without knowing the buyer demand. We propose modifications to the popular Upper Confidence Bound (UCB) bandit algorithm exploiting two peculiarities of pricing applications: 1) as the selling...
Anti-HER2/neu antibody therapy has been reported to mediate tumor regression of HER2/ neu(+) tumors. Here we demonstrated the expression of HER2 in a wide range of human melanoma cells including a primary culture and seven cell lines, and we further investigated whether HER2 could be served as a target for T cell mediated immunotherapy of human melanoma. Specific cytolytic activity of activated...
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید