Showing 1 - 20 results of 25 for search '"bandits"', query time: 0.04s Refine Results
  1. 1

    Thompson Sampling for Non-Stationary Bandit Problems by Han Qi, Fei Guo, Li Zhu

    Published 2025-01-01
    Subjects: “…multi-armed bandits…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Channel Selection Based on Trust and Multiarmed Bandit in Multiuser, Multichannel Cognitive Radio Networks by Fanzi Zeng, Xinwang Shen

    Published 2014-01-01
    “…This scheme formulates the channel selection as the multiarmed bandit problem, where cognitive radio users are compared to the players and channels to the arms. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    ASSESSMENT OF SECURITY OPERATIONS ON TACKLING BANDITRY FOR SUSTAINABLE NATIONAL DEVELOPMENT IN NORTH-WESTERN NIGERIA by ABDULRAHMAN BARAU YUSUF

    Published 2024-01-01
    “…The activities of the bandits in the study area also led to so many security challenges in the region which has caused a lot of sets back in all aspect. …”
    Get full text
    Article
  8. 8

    On Quantum Natural Policy Gradients by Andre Sequeira, Luis Paulo Santos, Luis Soares Barbosa

    Published 2024-01-01
    “…While previous studies have highlighted the effectiveness of PQC-based policies preconditioned with the quantum FIM in contextual bandits, its impact in broader reinforcement learning contexts, such as Markov decision processes, is less clear. …”
    Get full text
    Article
  9. 9

    Analyzes of the effects and security function social capital in sustainable rural border areas the villages of the central city of Saravan by Javad Bazrafshan, Mehrshad Toulabi Nejad

    Published 2016-06-01
    “…Memorizing of patterns such a way that increases language, preservation of culture and religion, reducing drug use among youth, reduce the amount of conflict is between the people and so on. the lowest impact related to later economy. findings also show that dimension politico-military security partnership, trust and of cohesion between peoples and cooperation between police forces and and border guard to increase the political participation of the people, ethnic and sectarian narrow the gap, reducing illegal traffic in neighboring countries, increased cooperation with military forces in the fight against bandits and smugglers and maintain security and order is sent.…”
    Get full text
    Article
  10. 10

    Dva příběhy z kriminálního podsvětí – padělatelé peněz na hradě Žampachu a přepadání Židů v roce 1542 by František Šebek

    Published 2010-07-01
    “…Both attacks were made by a group of 50-60 bandits (the statements list the names of almost 35 people from 15 localities). …”
    Get full text
    Article
  11. 11

    Appartenenze ed esclusioni by Frederica Paletti

    Published 2021-11-01
    “… From the second half of the 16th century onwards, Venice ordered the cities of its mainland dominions (Terraferma) to adopt substantial legislation and to create special magistrates aimed at countering the dangers posed by »disruptors of the quiet and peaceful life«: foreigners, beggars, pauperes, vagrants and bandits. The provisions of the decrees Venice sent to the Terraferma inevitably intertwined with the ius proprium already in force in the individual civitates. …”
    Get full text
    Article
  12. 12

    INTERROGATING THE EFFECTS OF ARMED BANDITRY ON THE SOCIO-ECONOMIC DEVELOPMENT OF NIGERIA’S NORTH-CENTRAL REGION (2015-2022) by YUSUFU Ahmed Audu, ODAUDU Alfred Idachaba, ILEVBARE Igheoise Trust

    Published 2023-09-01
    “…Attacks orchestrated by these armed bandits have continued to escalate, especially since 2015 when the Buhari administration came into power with attendant consequences of loss of human lives, destruction of property, displacement of persons, loss of livelihoods and disruption of socio-economic activities. …”
    Get full text
    Article
  13. 13

    EVALUATING THREATS OF ARMED BANDITRY ON HUMAN AND FOOD SECURITY IN SHIRORO LOCAL GOVERNMENT AREA OF NIGER STATE, NIGERIA by DR MUSA EMMANUEL UMARU, DR ALIYU MOHAMMED BELLO, DR CHARLES O. OKWUWA

    Published 2023-12-01
    “… Growing apprehension has emerged in the northern regions of Nigeria regarding the escalating activities of bandits. Consequently, this investigation was conducted to assess the impact of banditry on both human and food security in the Shiroro Local Government Area of Niger State. …”
    Get full text
    Article
  14. 14

    1941 (pre-war half-year period): changes in the NKVD structure of the Ukrainian Soviet Socialist Republic by V. A. Grechenko

    Published 2018-11-01
    “…Transformations were also associated to the establishment of the Main Office for Combating Banditism and relevant departments and field offices. …”
    Get full text
    Article
  15. 15

    Jamming-resilient algorithm for underwater cognitive acoustic networks by Zixiang Wang, Fan Zhen, Senlin Zhang, Meiqin Liu, Qunfei Zhang

    Published 2017-08-01
    “…In this article, we propose an online learning anti-jamming algorithm called multi-armed bandit–based acoustic channel access algorithm to achieve the jamming-resilient cognitive acoustic communication. …”
    Get full text
    Article
  16. 16

    On a Unique Solution of the Stochastic Functional Equation Arising in Gambling Theory and Human Learning Process by Ali Turab, Awad A. Bakery, O. M. Kalthum S. K. Mohamed, Wajahat Ali

    Published 2022-01-01
    “…Here, we analyze a specific type of human learning process related to gambling in which a subject inserts a poker chip to operate a two-armed bandit device and then presses one of the two keys. …”
    Get full text
    Article
  17. 17

    Social observation differentially affects prosocial learning of selfish and prosocial people by Yuri Kim, Kun Il Kim, Hackjin Kim

    Published 2025-02-01
    “…A total of 102 participants were randomly assigned to either the observation or control group while performing a two-armed bandit task under self- and other-reward conditions, and their behavioral outcomes were analyzed using a reinforcement learning computational model. …”
    Get full text
    Article
  18. 18

    A Novel Hyper-Heuristic Algorithm with Soft and Hard Constraints for Causal Discovery Using a Linear Structural Equation Model by Yinglong Dang, Xiaoguang Gao, Zidong Wang

    Published 2025-01-01
    “…In this paper, we propose a fitness-rate-rank-based multiarmed bandit (FRRMAB) hyper-heuristic that integrates soft and hard constraints into the DAG learning process. …”
    Get full text
    Article
  19. 19

    Game-based resource allocation in heterogeneous downlink CR-NOMA network without subchannel sharing by Deepa Das, Rajendra Kumar Khadanga, Deepak Kumar Rout, Md. Minarul Islam, Taha Selim Ustun

    Published 2025-01-01
    “…We frame this joint optimization of SU cluster formation and power allocation as a cooperative multi-armed bandit game. Through extensive simulations, we demonstrate the effectiveness of our proposed methods. …”
    Get full text
    Article
  20. 20

    Evolutionary Hyperheuristics for Location-Routing Problem with Simultaneous Pickup and Delivery by Yanwei Zhao, Longlong Leng, Jingling Zhang, Chunmiao Zhang, Wanliang Wang

    Published 2020-01-01
    “…Meanwhile, random permutation (RP), tabu search (TS), and fitness rate rank-based multiarmed bandit (FRR-MAB) are also introduced as baselines for comparisons. …”
    Get full text
    Article