نتایج جستجو برای: armed attack

تعداد نتایج: 92853  

Journal: :international journal of political science 0

this article presents the key insights about the environment and security links in the context of the persian gulf region. this research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the persian gulf region. environmental security challenges are human security, sustainable development and regional cooperation in the persi...

Journal: :Karbala international journal of modern science 2022

Organisations and governments constantly face potential security attacks. However, the need for next-generation cyber defence has become even more urgent in a day age when attack surfaces that hackers can exploit have grown at an alarming rate with increase number of devices are connected to Internet. As such, relies on predictive analysis is proactive than existing technologies rely intrusion ...

2015
A. V. Kolnogorov

The asymptotic minimax theorem for Bernoully twoarmed bandit problem states that the minimax risk has the order N as N → ∞, where N is the control horizon, and provides lower and upper estimates. It can be easily extended to normal two-armed bandit. For normal two-armed bandit, we generalize the asymptotic minimax theorem as follows: the minimax risk is approximately equal to 0.637N as N →∞. Ke...

2012

‘Non-state armed groups’ refers to groups who retain the potential to deploy arms for political, economic and ideological objectives, which in practice are often translated into an open challenge to the authority of the state. In principle, non-state armed groups and political parties/movements are perceived as two opposite models of approach to democratic political processes. However, given th...

2013
Ronald J. Swatzyna Vijayan K. Pillai

The objective of this study is to empirically test the effects of disasters which include natural as well as human made disasters such as armed conflict on women's reproductive health in developing countries. Data from 128 developing countries are used. It was found that average number of deaths from natural disasters and armed conflict in the East Asia and Pacific region was not significantly ...

In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

Journal: :CoRR 2017
Uma Roy Ashwath Thirmulai Joe Zurier

We introduce a novel variant of the multi-armed bandit problem, in which bandits are streamed one at a time to the player, and at each point, the player can either choose to pull the current bandit or move on to the next bandit. Once a player has moved on from a bandit, they may never visit it again, which is a crucial difference between our problem and classic multi-armed bandit problems. In t...

Journal: :Lecture Notes in Computer Science 2023

Detection of adversarial examples has been a hot topic in the last years due to its importance for safely deploying machine learning algorithms critical applications. However, detection methods are generally validated by assuming single implicitly known attack strategy, which does not necessarily account real-life threats. Indeed, this can lead an overoptimistic assessment detectors’ performanc...

2010
Jean Guillaume Forand

In standard models of experimentation, the costs of project development consist of (i) the direct cost of running trials as well as (ii) the implicit opportunity cost of leaving alternative projects idle. Another natural type of experimentation cost, the cost of holding on to the option of developing a currently inactive project, has not been studied. In a (multi-armed bandit) model of experime...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید