نتایج جستجو برای: armed attack

تعداد نتایج: 92853  

Journal: :Biology letters 2007
Emmanuel de Merode Kes Hillman Smith Katherine Homewood Richard Pettifor Marcus Rowcliffe Guy Cowlishaw

What determines the vulnerability of protected areas, a fundamental component of biodiversity conservation, to political instability and warfare? We investigated the efficacy of park protection at Garamba National Park (Democratic Republic of Congo) before, during and after a period of armed conflict. Previous analysis has shown that bushmeat hunting in the park increased fivefold during the co...

Journal: :Prehospital and disaster medicine 2009
Geoff Loane Jennifer Leaning Sara Schomig Alexander van Tulleken Kelli O'Laughlin

The concept of protecting civilians in armed conflict is enshrined in international humanitarian law and widely acknowledged in humanitarian norms. Making this concept operational in humanitarian service delivery is a challenge. Yet, there are many ways in which humanitarian workers could learn from local people about underlying tensions in their community and with these new insights adjust ser...

2010
Tyler Lu Dávid Pál Martin Pál

We study contextual multi-armed bandit problems where the context comes from a metric space and the payoff satisfies a Lipschitz condition with respect to the metric. Abstractly, a contextual multi-armed bandit problem models a situation where, in a sequence of independent trials, an online algorithm chooses, based on a given context (side information), an action from a set of possible actions ...

2017
Yizao Wang Jean-Yves Audibert Rémi Munos

We consider multi-armed bandit problems where the number of arms is larger than the possible number of experiments. We make a stochastic assumption on the mean-reward of a new selected arm which characterizes its probability of being a near-optimal arm. Our assumption is weaker than in previous works. We describe algorithms based on upper-confidence-bounds applied to a restricted set of randoml...

2016
Michael G. Wessells

Worldwide, children suffer a diverse and toxic array of effects of armed conflict, which increasingly are protracted and intermixed with problems such as terrorism. To support war-affected children, it is necessary to understand how children have been affected by war and to use appropriate conceptual analyses to inform the design of effective interventions. This paper introduces 2 thematic Spec...

Journal: :Naše More (Dubrovnik) 2023

International maritime security is of paramount importance to the sector, particularly seafarers. The perception and have evolved are subject ongoing analysis. concept closely linked potential threats that may pose a danger crews, ships, or cargoes they carry. These also change over time. Different types can different implications for security. Currently, greatest world merchant fleet come from...

Journal: :Indonesian Comparative Law Review 2022

The Papuan Armed Criminal Group (KKB) has been a hereditary problem for the Indonesian government. Their demand to secede from Republic of Indonesia was main reason why this group formed. Because Government not responded demands KKB, it led carry out acts terror against society in Papua. One cases that have recently attracted media attention is KKB’s attack killed several workers Beoga, Puncak ...

Journal: :Vìsnik 2023

The issue of administrative and legal support the regime martial law was considered. Scientific views on such categories as "legal provision" "administrative-legal in various spheres social relations have been studied. concept "administrative law" is key features are established, namely: specified carried out by special entities whose powers defined legislation; regulated norms law; implemented...

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید