نتایج جستجو برای: armed attack
تعداد نتایج: 92853 فیلتر نتایج به سال:
The history of our world today cannot be constructed without reckoning with the frequency of armed conflicts in many parts of the globe. Armed conflicts and wars have unfortunately assumed an important part of human existence. This paper conc nonetheless had from earliest times become the scourge of humanity. Ranging from loss of lives and property, internal displacement of people, the flow of ...
Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the ...
The max k-armed bandit problem is a recently-introduced online optimization problem with practical applications to heuristic search. Given a set of k slot machines, each yielding payoff from a fixed (but unknown) distribution, we wish to allocate trials to the machines so as to maximize the maximum payoff received over a series of n trials. Previous work on the max k-armed bandit problem has as...
In this paper we propose a multi-armed bandit inspired, pool based active learning algorithm for the problem of binary classification. By carefully constructing an analogy between active learning and multi-armed bandits, we utilize ideas such as lower confidence bounds, and self-concordant regularization from the multi-armed bandit literature to design our proposed algorithm. Our algorithm is a...
An experimental study was performed to investigate the effects of the body angle of attack on the tail surface pressure distribution for a half body-tail combination in subsonic flow. The results show, in small deflection angle regions, that the tail deflection has the same effect on the surface pressure as the body angle of attack. However at moderate to high deflections, the flowfiled caused ...
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
objective: preventing communicable diseases in the armed forces (af) of a country is considered as a national interest and has a great importance. there are limited data on the efficacy of vaccination of the navy personnel. this study was designed to evaluate both the safety and the immunogenicity of a recombinant hepatitis b (hb) vaccine made by pasteur institute of iran (ipi-rhb), in this tar...
UNLABELLED Traumatic experiences have dire consequences for the mental health of young persons. Despite high rates of traumatic experiences in some African cities, there are no reports for Nigerian youth. OBJECTIVE To investigate the pattern of traumatic events and their association with depressive symptoms among youth in Southwest Nigeria. METHODS This is a descriptive cross-sectional stud...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید