نتایج جستجو برای: armed attack
تعداد نتایج: 92853 فیلتر نتایج به سال:
What determines the vulnerability of protected areas, a fundamental component of biodiversity conservation, to political instability and warfare? We investigated the efficacy of park protection at Garamba National Park (Democratic Republic of Congo) before, during and after a period of armed conflict. Previous analysis has shown that bushmeat hunting in the park increased fivefold during the co...
The concept of protecting civilians in armed conflict is enshrined in international humanitarian law and widely acknowledged in humanitarian norms. Making this concept operational in humanitarian service delivery is a challenge. Yet, there are many ways in which humanitarian workers could learn from local people about underlying tensions in their community and with these new insights adjust ser...
We study contextual multi-armed bandit problems where the context comes from a metric space and the payoff satisfies a Lipschitz condition with respect to the metric. Abstractly, a contextual multi-armed bandit problem models a situation where, in a sequence of independent trials, an online algorithm chooses, based on a given context (side information), an action from a set of possible actions ...
We consider multi-armed bandit problems where the number of arms is larger than the possible number of experiments. We make a stochastic assumption on the mean-reward of a new selected arm which characterizes its probability of being a near-optimal arm. Our assumption is weaker than in previous works. We describe algorithms based on upper-confidence-bounds applied to a restricted set of randoml...
Worldwide, children suffer a diverse and toxic array of effects of armed conflict, which increasingly are protracted and intermixed with problems such as terrorism. To support war-affected children, it is necessary to understand how children have been affected by war and to use appropriate conceptual analyses to inform the design of effective interventions. This paper introduces 2 thematic Spec...
International maritime security is of paramount importance to the sector, particularly seafarers. The perception and have evolved are subject ongoing analysis. concept closely linked potential threats that may pose a danger crews, ships, or cargoes they carry. These also change over time. Different types can different implications for security. Currently, greatest world merchant fleet come from...
The Papuan Armed Criminal Group (KKB) has been a hereditary problem for the Indonesian government. Their demand to secede from Republic of Indonesia was main reason why this group formed. Because Government not responded demands KKB, it led carry out acts terror against society in Papua. One cases that have recently attracted media attention is KKB’s attack killed several workers Beoga, Puncak ...
The issue of administrative and legal support the regime martial law was considered. Scientific views on such categories as "legal provision" "administrative-legal in various spheres social relations have been studied. concept "administrative law" is key features are established, namely: specified carried out by special entities whose powers defined legislation; regulated norms law; implemented...
sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید