Showing 21 - 40 results of 40 for search '"bandits"', query time: 0.04s Refine Results
  1. 21

    EVALUATING THREATS OF ARMED BANDITRY ON HUMAN AND FOOD SECURITY IN SHIRORO LOCAL GOVERNMENT AREA OF NIGER STATE, NIGERIA by DR MUSA EMMANUEL UMARU, DR ALIYU MOHAMMED BELLO, DR CHARLES O. OKWUWA

    Published 2023-12-01
    “… Growing apprehension has emerged in the northern regions of Nigeria regarding the escalating activities of bandits. Consequently, this investigation was conducted to assess the impact of banditry on both human and food security in the Shiroro Local Government Area of Niger State. …”
    Get full text
    Article
  2. 22

    1941 (pre-war half-year period): changes in the NKVD structure of the Ukrainian Soviet Socialist Republic by V. A. Grechenko

    Published 2018-11-01
    “…Transformations were also associated to the establishment of the Main Office for Combating Banditism and relevant departments and field offices. …”
    Get full text
    Article
  3. 23

    Emiliano Zapata ou la photographie au service de la construction d’une icône by Marion Gautreau

    Published 2012-06-01
    “…By studying the figure of Emiliano Zapata, this article recounts the trajectory which converted a Revolutionary often considered by the ruling classes as a bandit into a hero, and later into an icon. Through the analysis of the publication of Zapata’s photographs in the Mexican illustrated press and the study of some specific portraits, we try to decode the double iconic process: the historical figure and the one in the portraits.…”
    Get full text
    Article
  4. 24

    O ícone e o palhaço ou Quando Mazzaropi encena Lampião by Cristina Duarte-Simoes

    Published 2012-06-01
    “…The representation of the famous bandit was constantly present within Brazilian cinematography, since the creation of O Cangaceiro (Lima Barreto, 1953, production Vera Cruz), which gave birth to the gender known as “film of the Nordeste’s banditry”. …”
    Get full text
    Article
  5. 25

    Jamming-resilient algorithm for underwater cognitive acoustic networks by Zixiang Wang, Fan Zhen, Senlin Zhang, Meiqin Liu, Qunfei Zhang

    Published 2017-08-01
    “…In this article, we propose an online learning anti-jamming algorithm called multi-armed bandit–based acoustic channel access algorithm to achieve the jamming-resilient cognitive acoustic communication. …”
    Get full text
    Article
  6. 26

    Interference coexistence between wireless meter reading system in 470~510 MHz band and adjacent systems by Ruichen XU, Ji FANG, Hao DU, Xiaobo WANG

    Published 2017-01-01
    “…Current RF specification restrains the wireless meter reading system (WMRS) working in 470~510 MHz band.It is incapable of meeting new communication speed and coverage requirements of power network.Under the premise of ensuring that prior used communication systems in adjacent band work without interference,how to modify the related RF specification to improve communication ability of WMRS is one of the problems to be solved at present.Firstly,the domestic frequency spectrum allocation in 450~566 MHz band was analyzed.Then,based on RF parameters of 3 kinds of WMRS from State Grid and deterministic computation and ray tracing simulation method,the interference coexistence between the WMRS and adjacent communication systems,which including broadcast television system,CDMA450 system,railway train dispatching system and FDD-LTE system was studied.At last,some suggestions for revision of relevant RF specifications were obtained.…”
    Get full text
    Article
  7. 27

    Data quality optimized online task allocation method for mobile crowdsensing by Wei ZHANG, Zhuo LI, Xin CHEN

    Published 2020-12-01
    “…Optimization of the perceived quality and the recruitment of user are two important issues of mobile crowdsensing.As the amount of data increases rapidly,perceived data becomes redundant,and perceived quality is at risk of decreasing.A mechanism of task assignment based on the perceptive quality optimization was proposed to improve the perceived quality under the condition of full coverage.The clustering algorithm was used to evaluate the truth value of the task and quantify the quality of the user data.Based on Thompson sampling algorithm and greedy algorithm,a user recruitment strategy was designed and implemented to optimize the perceived quality on the basis of ensuring the spatial coverage of the task.The performance of Thompson based user recruit (TSUR) algorithm was simulated and analyzed that compared with the existing algorithms of BBTA and basic user recruitment (BUR).Experiments show that in the same area,compared with bandit-based task assignment (BBTA) algorithm and BUR algorithm,the quality of the cumulative sensing data was improved by 16% and 20%,and the spatial coverage was improved by 30% and 22%.…”
    Get full text
    Article
  8. 28

    On a Unique Solution of the Stochastic Functional Equation Arising in Gambling Theory and Human Learning Process by Ali Turab, Awad A. Bakery, O. M. Kalthum S. K. Mohamed, Wajahat Ali

    Published 2022-01-01
    “…Here, we analyze a specific type of human learning process related to gambling in which a subject inserts a poker chip to operate a two-armed bandit device and then presses one of the two keys. …”
    Get full text
    Article
  9. 29

    Social observation differentially affects prosocial learning of selfish and prosocial people by Yuri Kim, Kun Il Kim, Hackjin Kim

    Published 2025-02-01
    “…A total of 102 participants were randomly assigned to either the observation or control group while performing a two-armed bandit task under self- and other-reward conditions, and their behavioral outcomes were analyzed using a reinforcement learning computational model. …”
    Get full text
    Article
  10. 30

    Time-slot allocation algorithm for LEO satellite beam hopping based on non-stationary MAB by Min LIN, Pengcheng KAN, Bai ZHAO, Ming CHENG, Lyuxi YANG

    Published 2023-08-01
    “…Aiming at the problem of inadequate adaptation to dynamic changes in cell services in the resource allocation algorithm for hopping beams in low earth orbit (LEO) satellite systems, a time-slot allocation algorithm for LEO satellite beam hopping based on a non-stationary multi-armed bandit (MAB) was proposed.Firstly, the joint optimization problem of slot allocation and beam grading matching was established, with the minimization of the system’s second-order differential capacity as the optimization objective.Secondly, due to the non-convexity and difficulty in direct solution of this problem, a beam grading combination scheme generation algorithm was proposed based on the concept of effective cells and effective critical cells, which generated all possible beam grading combination schemes.Next, a dynamic slot allocation scheme based on the non-stationary MAB model was proposed, and joint optimization of slot allocation and beam grading matching was completed under the optimal beam grading combination scheme.Finally, the computer simulation results show that the average redundancy of the proposed algorithm is less than 20% in the case of multiple cell service distributions.In addition, compared with other schemes, the proposed algorithm can control the average beam revisit time to about 300 ms while maintaining high system throughput.…”
    Get full text
    Article
  11. 31

    A Novel Hyper-Heuristic Algorithm with Soft and Hard Constraints for Causal Discovery Using a Linear Structural Equation Model by Yinglong Dang, Xiaoguang Gao, Zidong Wang

    Published 2025-01-01
    “…In this paper, we propose a fitness-rate-rank-based multiarmed bandit (FRRMAB) hyper-heuristic that integrates soft and hard constraints into the DAG learning process. …”
    Get full text
    Article
  12. 32

    Biologically plausible gated recurrent neural networks for working memory and learning-to-learn. by Alexandra R van den Berg, Pieter R Roelfsema, Sander M Bohte

    Published 2024-01-01
    “…Moreover, we show that RECOLLECT can learn-to-learn an effective policy on a reversal bandit task. Finally, we show that the solutions acquired by RECOLLECT resemble how animals learn similar tasks.…”
    Get full text
    Article
  13. 33

    Game-based resource allocation in heterogeneous downlink CR-NOMA network without subchannel sharing by Deepa Das, Rajendra Kumar Khadanga, Deepak Kumar Rout, Md. Minarul Islam, Taha Selim Ustun

    Published 2025-01-01
    “…We frame this joint optimization of SU cluster formation and power allocation as a cooperative multi-armed bandit game. Through extensive simulations, we demonstrate the effectiveness of our proposed methods. …”
    Get full text
    Article
  14. 34

    Evolutionary Hyperheuristics for Location-Routing Problem with Simultaneous Pickup and Delivery by Yanwei Zhao, Longlong Leng, Jingling Zhang, Chunmiao Zhang, Wanliang Wang

    Published 2020-01-01
    “…Meanwhile, random permutation (RP), tabu search (TS), and fitness rate rank-based multiarmed bandit (FRR-MAB) are also introduced as baselines for comparisons. …”
    Get full text
    Article
  15. 35

    When to stop social learning from a predecessor in an information-foraging task by Hidezo Suganuma, Aoi Naito, Kentaro Katahira, Tatsuya Kameda

    Published 2025-01-01
    “…Participants worked on a 30-armed bandit task for 100 trials. For the first 15 trials, participants simply observed the choices of a demonstrator who had accumulated more knowledge about the environment and passively received rewards from the demonstrator's choices. …”
    Get full text
    Article
  16. 36

    An Active Inference Model of the Optimism Bias by Elizabeth L. Fisher, Christopher J. Whyte, Jakob Hohwy

    Published 2025-01-01
    “…Finally, we show how optimism affects action in a modified two-armed bandit task. Our model and the simulations it affords provide a computational basis for understanding how optimism bias may emerge, how it may be expressed in standard tasks used to assess optimism, and how it affects agents’ decision-making and actions; in combination, this provides a basis for future research on optimism as a mental health intervention.…”
    Get full text
    Article
  17. 37

    BORDER MANAGEMENT, ARMED BANDITRY AND TERRORISM MITIGATION IN NIGERIA by ODE AGI OKO

    Published 2024-08-01
    “…The study is concluded by recommending among others;  that the country should in fact evolve a sustainable border management, and social security system which will discourage public office holders from engaging in corrupt practices of sponsoring of banditry, kidnapping, e.t.c as economic gains, and with good information network sharing techniques, and by providing gainful employment opportunities to the citizenry of which will curb, reduce or eradicate the social habits of armed bandit, cross-border security challenge and mores as enshrined in the work. …”
    Get full text
    Article
  18. 38

    UAV-Assisted Space-Air-Ground Integrated Networks: A Technical Review of Recent Learning Algorithms by Atefeh Hajijamali Arani, Peng Hu, Yeying Zhu

    Published 2024-01-01
    “…We consider possible reward functions and discuss the state-of-the-art algorithms for optimizing the reward functions, including Q-learning, deep Q-learning, multi-armed bandit, particle swarm optimization, and satisfaction-based learning algorithms. …”
    Get full text
    Article
  19. 39

    Changes in the policy of the MIA of the USR SSR regarding the Ukrainian national liberation movement in march-june 1953 by V. A. Grechenko

    Published 2024-03-01
    “…As a result of the armed confrontation with the OUN in the western regions of Ukraine in the period from 1944 to 1953, 153,259 people were killed, 103,003 people were arrested, 65,895 families, a total of 203,737 people, were evicted from the western regions of the Ukrainian SSR as “bandit aids”. P. Meshik managed to stay in the position of Minister of Internal Affairs for only three months, and many of his plans, which were, to a certain extent, reformist in nature, were not destined to be implemented.…”
    Get full text
    Article
  20. 40

    User-Centric Radio Access Technology Selection: A Survey of Game Theory Models and Multi-Agent Learning Algorithms by Giuseppe Caso, Ozgu Alay, Guido Carlo Ferrante, Luca De Nardis, Maria-Gabriella Di Benedetto, Anna Brunstrom

    Published 2021-01-01
    “…Regarding GT, the review focuses on non-cooperative models, because of their widespread use in RAT selection; as for MAL, a large number of algorithms are described, ranging from game-theoretic to reinforcement learning (RL) schemes, and also including most recent approaches, such as deep RL (DRL) and multi-armed bandit (MAB). Models and algorithms are analyzed by comparatively reviewing relevant literature. …”
    Get full text
    Article