Academic literature on the topic 'Defender II'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Defender II.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Defender II"

1

Fang, F., A. X. Jiang, and M. Tambe. "Protecting Moving Targets with Multiple Mobile Resources." Journal of Artificial Intelligence Research 48 (November 17, 2013): 583–634. http://dx.doi.org/10.1613/jair.4027.

Full text
Abstract:
In recent years, Stackelberg Security Games have been successfully applied to solve resource allocation and scheduling problems in several security domains. However, previous work has mostly assumed that the targets are stationary relative to the defender and the attacker, leading to discrete game models with finite numbers of pure strategies. This paper in contrast focuses on protecting mobile targets that leads to a continuous set of strategies for the players. The problem is motivated by several real-world domains including protecting ferries with escort boats and protecting refugee supply lines. Our contributions include: (i) A new game model for multiple mobile defender resources and moving targets with a discretized strategy space for the defender and a continuous strategy space for the attacker. (ii) An efficient linear-programming-based solution that uses a compact representation for the defender's mixed strategy, while accurately modeling the attacker's continuous strategy using a novel sub-interval analysis method. (iii) Discussion and analysis of multiple heuristic methods for equilibrium refinement to improve robustness of defender's mixed strategy. (iv) Discussion of approaches to sample actual defender schedules from the defender's mixed strategy. (iv) Detailed experimental analysis of our algorithms in the ferry protection domain.
APA, Harvard, Vancouver, ISO, and other styles
2

Yunoshev, S. V., and M. Yu Zhirova. "THE EXPERIENCE OF REGULATION OF POWERS OF A DEFENSE LAWYER ACCORDING TO THE STATUTE OF CRIMINAL PROCEDURE OF 1864 AND THE RF CODE OF CRIMINAL PROCEDURE." Vektor nauki Tol’attinskogo gosudarstvennogo universiteta. Seria Uridicheskie nauki, no. 1 (2021): 69–76. http://dx.doi.org/10.18323/2220-7457-2021-1-69-76.

Full text
Abstract:
The paper considers the issue of the improvement of the defender’s procedural status in the current criminal procedure. The authors analyze the respective statements of the Statute of Criminal Procedure of 1864. The study states that one of the significant results of the Great judicial reform of Emperor Alexander II was the introduction of professional advocacy. However, the defender’s status established by the Statute distinguished itself by the unprecedented development, vesting a defender with powers absent in the previous legislation. The paper analyzes the particular procedural powers of a defender concerning an optimal model of their regulation. The study shows that, in general, the statements of the RF Code Criminal Procedure have moved so far forward compared to the similar Statute statements, especially concerning the access of a defender to the stage of a pre-trial investigation. However, it appears that to solve many problematic aspects of the current status of a defender, the experience of corresponding procedural regulation in the Statute can be a target to improve this status. In particular, the authors focus on the fact that, according to the Statute norms, a defender was less limited in the right to copy data and the materials of a criminal case. The study substantiates that a defender in the pre-revolutionary period had much more opportunities to offer evidence to a court; particularly, it concerned the proof of witness. According to the Statute statements, the parties were procedurally equal in the right to refer to special knowledge, which is absent in the current criminal procedure. The paper states that at the moment, the defender’s right to gather evidence has some significant gaps and limitations compared to the similar right during the term of the Statute.
APA, Harvard, Vancouver, ISO, and other styles
3

Fondevilla, Gustavo, and Rodrigo Meneses Reyes. "Is cheaper better? Public and private lawyers before criminal courts in Mexico City." International Journal of Law in Context 12, no. 1 (February 23, 2016): 63–80. http://dx.doi.org/10.1017/s1744552315000361.

Full text
Abstract:
AbstractThis paper aims to conduct a descriptive analysis of a total of 2,172 semi-structured interviews with sentenced inmates in Mexico City during 2002–2008 in order to explain how public legal defence works, how this service is evaluated by the inmates who took part in the interviews, and how the traditional division between public and private services constitutes an important distinction in the way in which criminals interact with, and are processed by, the legal system. Our findings suggest that, in the case of Mexico City: (i) to be tried by a public defender not only implies that the person accused holds a bigger chance of getting a softer sentence than those defended by private lawyers; but also, (ii) that the population will have a better perception of the justice process.
APA, Harvard, Vancouver, ISO, and other styles
4

McQuoid–Mason, David. "LEGAL AID IN NIGERIA: USING NATIONAL YOUTH SERVICE CORPS PUBLIC DEFENDERS TO EXPAND THE SERVICES OF THE LEGAL AID COUNCIL." Journal of African Law 47, no. 1 (April 2003): 107–16. http://dx.doi.org/10.1017/s0221855303002001.

Full text
Abstract:
At the National Consultative Forum on Transforming the Administration of Justice System in Nigeria, convened by the Federal Minister of Justice and the Federal Attorney-General in November 2001, it was decided to draft a National Action Plan on Justice Sector Reform in Nigeria and to produce a Justice Vision document. The Ministry of Justice and the Attorney-General's office identified the need to examine ways of (a) upholding the Constitution and the rule of law; (b) promoting justice, fairness and human dignity; and (c) incorporating and expanding community participation in the administration of justice. The Legal Aid Council of Nigeria could contribute to this process by establishing a public defender network using law graduates in the National Youth Service Corps (NYSC). It may be possible to use the NYSC scheme to expand dramatically the current level of legal aid in Nigeria by employing the services of NYSC law graduates more extensively as public defenders. In order to consider the feasibility of such a programme the following factors will be considered: (i) the availability of lawyers and law graduates; (ii) the duties imposed by the Nigerian Constitution; (iii) the function of the Legal Aid Council; (iv) the operation of the Legal Aid Council; (v) the provision of legal aid services by the Legal Aid Council; and (vi) the cost of establishing a structured NYSC public defender programme.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yu, John Daniel Eshleman, and Jared S. Soileau. "Business Strategy and Auditor Reporting." AUDITING: A Journal of Practice & Theory 36, no. 2 (September 1, 2016): 63–86. http://dx.doi.org/10.2308/ajpt-51574.

Full text
Abstract:
SUMMARY This study examines whether a firm's business strategy influences auditor reporting. We rely on the organizational literature to develop our prediction that firms utilizing the innovative “prospector” strategy will be more likely than firms utilizing the cost-leadership “defender” strategy to receive both going concern and material weakness opinions. Our empirical evidence supports this prediction. Specifically, we find that, among a sample of financially troubled firms, prospectors are significantly more likely than defenders to receive a going concern opinion. We then analyze a sample of clients who subsequently filed for bankruptcy and find that auditors are less likely to issue going concern opinions to prospector clients. This indicates that auditors commit more Type II errors when auditing prospector clients. We also find that prospectors are significantly more likely than defenders to receive a material weakness opinion. Taken together, the evidence suggests that business strategy is a significant determinant of both going concern and material weakness auditor reporting. JEL Classifications: M41; M42; L10. Data Availability: All data are available from public sources identified in the text.
APA, Harvard, Vancouver, ISO, and other styles
6

Romero, Sérgio Luiz Gusmão Gimenes. "Antagonismo de classes no canto II da Ilíada: Tersites e a economia da guerra." Revista Investigações 31, no. 1 (December 29, 2018): 1. http://dx.doi.org/10.51359/2175-294x.2018.237842.

Full text
Abstract:
Este artigo apresenta uma reflexão crítica acerca do canto II da Ilíada, especificamente os versos 198 a 226, centrados na personagem Tersites. Esse trecho é alvo de polêmica teórica acerca de tratar-se o conflito entre o referido soldado e os chefes da armada como um embate entre classes sociais distintas. A partir de uma perspectiva materialista histórica, propomo-nos a defender uma abordagem do embate pelo viés de classe e de luta de classes sociais como cerne de sua dinâmica.
APA, Harvard, Vancouver, ISO, and other styles
7

Rodrigues, Malcom Guimarães. "A EXPERIÊNCIA DA CARNE NA GENEALOGIA FOUCAULTIANA DA SUBJETIVIDADE." Síntese: Revista de Filosofia 47, no. 147 (March 31, 2020): 123. http://dx.doi.org/10.20911/21769389v47n147p123/2020.

Full text
Abstract:
Nosso objetivo é interrogar em quais condições Foucault se depara com a noção de experiência da carne e defender a centralidade desta noção em sua genealogia da subjetividade. Pretendemos concluir que tal experiência, tal como o filósofo a compreende, pressupõe a análise de um conjunto de acontecimentos e de um conjunto de exercícios espirituais nos séculos II, III e IV.
APA, Harvard, Vancouver, ISO, and other styles
8

Hobuss, João. "O QUE NOS DEFINE? ARISTÓTELES E A PSICOLOGIA DO AGENTE MORAL." Revista Dissertatio de Filosofia 41 (July 1, 2015): 305. http://dx.doi.org/10.15210/dissertatio.v41i0.8512.

Full text
Abstract:
Este texto busca apresentar duas teses absolutamente incompatíveis acerca do caráter. (i) uma delas, denominada situacionista, baseada em investigações da psicologia moral contemporânea, sustenta que não há traços robustos que nos definam, que não há a ideia mesma de caráter, e que que todas as ações são determinadas pelas circunstâncias. Outra (ii) apresenta uma visão dura acerca do caráter a partir da ética aristotélica, sustentando que há algo que nos define, o caráter, e que uma vez adquirido, torna-se incontornável. Por fim, o artigo indicará que há passagens na ética de Aristóteles que permitem defender uma leitura alternativa para (i) e (ii).
APA, Harvard, Vancouver, ISO, and other styles
9

Sanchez, Wagner Lopes. "Igreja Católica e liberdade religiosa: a renovação desencadeada pelo Concílio Vaticano II." REVER - Revista de Estudos da Religião 17, no. 3 (December 24, 2017): 123. http://dx.doi.org/10.23925/1677-1222.2017vol17i3a8.

Full text
Abstract:
O artigo apresenta o processo de mudança vivido pela Igreja Católica no que diz respeito ao tema da liberdade religiosa. Com o advento da modernidade, a defesa da liberdade religiosa questionou a posição hegemônica da Igreja Católica. A Igreja Católica reagiu à ideia de liberdade religiosa e às consequências daí decorrentes. O Concílio Vaticano II, dentro do espírito do aggiornamento desencadeado por João XXIII, promoveu uma mudança de paradigma que levou a instituição a valorizar e defender a liberdade religiosa. O artigo parte do pressuposto de que a modernidade levou a Igreja Católica a reconhecer que a realidade do pluralismo religioso e da liberdade religiosa são condições históricas necessárias para o exercício de sua missão no mundo.
APA, Harvard, Vancouver, ISO, and other styles
10

Miszewski, Dariusz. "Slavic idea in political thought of underground Poland during World War II." Review of Nationalities 7, no. 1 (December 1, 2017): 67–118. http://dx.doi.org/10.1515/pn-2017-0003.

Full text
Abstract:
Abstract After the German invasion in 1941, the USSR declared to be the defender of the Slavic nations occupied by Germany. It did not defend their allies, Czechoslovakia and Yugoslavia, against the Germans in the 1938-1941. In alliance with Germans it attacked Poland in 1939. Soviets used the Slavic idea to organize armed resistance in occupied nations. After the war, the Soviet Union intended to make them politically and militarily dependent. The Polish government rejected participation in the Soviet Slavic bloc. In the Polish political emigration and in the occupied country the Slavic idea was really popular, but as an anti-Soviet idea. Poland not the Soviet Union was expected to become the head of Slavic countries in Central and South-Eastern Europe.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Defender II"

1

Hammett, Jessica Mary. "Representations of community in Second World War civil defence." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/67159/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rowe, Philip. "'We shall defend our island' : investigating a forgotten militarised landscape." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/374724/.

Full text
Abstract:
The outmanoeuvring of Allied forces in May 1940 led to the eventual evacuation of the BEF from the continent in June 1940. Fearing an invasion, GHQ Home Forces set about the rapid re-militarisation of the UK to oppose, arguably, the first very real threat to this country’s sovereignty since the Norman conquest of 1066 AD. Constructing a series of anti-invasion defences throughout the countryside, a network of defensive fieldworks and concrete gun emplacements were erected, with linear stop lines forming part of the overall stratagem for a countrywide defence in depth. Examining one particular linear stop line, GHQ Line Green, despite previous research into its archaeological route through the landscape several questions still remain unanswered - Did the proposed wartime route for the stop line match the documented archaeology? Did the defensive fieldworks conform to 1940 WO specifications, or were they similar in design to the linear fieldworks of the First World War? Did GHQ Line Green dismiss the defensive ‘folly’ notion of the Maginot Line by being strategically sited in the Bristol hinterland? A prepared battlefield that never faced the unpredictable test of conflict, evidence offered by original cartographic, archaeological and GIS ‘Fields-of- Fire’ analysis concluded that the GHQ Line Green was strategically placed in the landscape. In ideal conditions GHQ Line Green could have had limited success in slowing down an invasion force. This dismisses the notion that the stop line was a defensive ‘folly’. With its origins found to lay in First World War fortifications, the research undertaken for this thesis will further our understanding of an often forgotten Second World War landscape.
APA, Harvard, Vancouver, ISO, and other styles
3

Camacho, Michael. "Thomistic Personalism: An Investigation, Explication, and Defense." Thesis, Boston College, 2009. http://hdl.handle.net/2345/666.

Full text
Abstract:
Thesis advisor: Marina B. McCoy
Thesis advisor: Peter Kreeft
An in-depth study of Karol Wojtyła's creative synthesis of medieval and modern thought, in which he brings together 1) traditional Thomistic metaphysics and anthropology and 2) the insights of contemporary phenomenology, in order to understand the reality of man as person in his integral totality
Thesis (BA) — Boston College, 2009
Submitted to: Boston College. College of Arts and Sciences
Discipline: College Honors Program
Discipline: Philosophy
APA, Harvard, Vancouver, ISO, and other styles
4

Jackson, Peter Darron. "French military intelligence and Nazi Germany, 1936-1939." Thesis, University of Cambridge, 1995. https://www.repository.cam.ac.uk/handle/1810/273043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Woolven, Robin. "Civil defence in London 1935-1945 : the formation and implementation of the policy for, and the performance of, the A.R.P. (later C.D.) services in London." Thesis, King's College London (University of London), 2002. https://kclpure.kcl.ac.uk/portal/en/theses/civil-defence-in-london-19351945--the-formation-and-implementation-of-the-policy-for-and-the-performance-of-the-arp-later-cd-services-in-london(2c2aecb9-4a3f-44f4-8c38-2ff2330bc66c).html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brooks, Amy. "“I’m Doin’ It for Defense”: Messages of American Popular Song to Women during World War II." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1383909020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kane, Eryn M. "The Guardians of Civilization: Neo-Republican Motherhood in Post-World War II America, 1945-1963." Ohio University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1366640052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Withington, Thomas Jeavons. "Bomber Command's electronic warfare policy and suppression of enemy air defence posture during the Second World War." Thesis, University of Birmingham, 2018. http://etheses.bham.ac.uk//id/eprint/8076/.

Full text
Abstract:
This thesis will examine the Electronic Warfare [EW] policies and subsequent Suppression of Enemy Air Defence [SEAD] postures of the Royal Air Force’s Bomber Command during the Second World War. It examines how EW was applied to the Luftwaffe (German Air Force) Integrated Air Defence System [IADS] so as to reduce Bomber Command aircraft losses, and determines whether EW policies were drafted in a proactive and/or reactive fashion vis-à-vis the Luftwaffe IADS. The thesis applies air power theory regarding the levels and methods of application by which SEAD was brought to bear against the IADS as a result of these EW policies. Ultimately, the thesis will argue that Bomber Command enacted both proactive and reactive EW policies at the Campaign and Localised SEAD levels using a combination of Manoeuvrist, Mass and Stealth/Surprise approaches.
APA, Harvard, Vancouver, ISO, and other styles
9

Wegmueller, Hans. "Civil-military relations in low-intensity conflict: Switzerland's territorial defense during World War II." Thesis, Monterey, California. Naval Postgraduate School, 1994. http://hdl.handle.net/10945/28028.

Full text
Abstract:
Switzerland's experience in the Second Wolrd War differs markedly from that of any other European nation and offers a unique historical oppurtunity to study civil-military relations in a democratic environment under the strain of a long-lasting existential threat. Entirely on its own and surrounded by and extremely aggressive enemy block, Switzerland has to struggle in that hazy, difficult-to-define situation between war and peace, which in modern terms would be referred to as "low intensity conflict". Thus military and civilian authorites were literally forced to think in terms of modern national security policy and to adopt a holistic security philosophy. It becamse apparent that the disproportionate role of the military component did not measure up to the threat and was at odds with a modern, overall security policy. The results were not limited to the serious, practically insoluble conflicts between millitary and civilian authorities, the preparedness and the dissuasive power of the army itself was thus called into question. The historical experience showed clearly that modern territorial defense requires first and foremost a balance between the individual components of security policy carefully adapted to the political, economic, and psychological realities of the nation. The military component, on the other hand, can only fulfill its mission if it can concentrate the personnel and material resources at its disposal on it original task of military defense; in the terminology of World War II, the army is responsible for "warfare", not "national defense"
APA, Harvard, Vancouver, ISO, and other styles
10

Pomponi, Renata Alma. "Control of manufacturing processes with MRP II : benefits and barriers in the defense aerospace industry." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/11167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Defender II"

1

Pindel, Kazimierz. Obrona terytorialna w II Rzeczypospolitej. Warszawa: Wydawn. Bellona, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stachula, Adolf. Obrona powietrzna II Rzeczypospolitej. Słupsk: Pomorska Akademia Pedagogiczna w Słupsku, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

AA command: Britain's anti-aircraft defences of World War II. London: Methuen, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krohn, Axel. Europäische Sicherheit II. Hamburg: Institut für Friedensforschung und Sicherheitspolitik an der Universität Hamburg, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thompson, Augusto F. G. O advogado de defesa II. Rio de Janeiro: Forense, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

W, Kaufmann H., ed. Fortress France: The Maginot Line and French defenses in World War II. Westport, Connecticut: Praeger Security International, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kaufmann, H. W., Tomasz Idzikowski, and J. E. Kaufmann. Fortress France: The Maginot Line and French Defenses in World War II. Westport, Connecticut: Praeger Security International, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

History, Center of Military, ed. Defenses of the Americas: The U.S. Army campaigns of World War II. Washington, DC: [U.S. Army Center of Military History], 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fjell festning, i krig or fred. Bergen: Eide, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Muñoz, Alicia Cámara. Fortificación y ciudad en los reinos de Felipe II. Madrid: Nerea, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Defender II"

1

Pricopie, Remus. "Why IAU?" In The Promise of Higher Education, 63–69. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67245-4_10.

Full text
Abstract:
AbstractWe all know that evaluation is a sophisticated science. However, when we talk about celebrating 70 years of the International Association of Universities (IAU), the word “sophisticated” gets an even deeper meaning. How do we evaluate the activity of a global organization, founded in 1950 by UNESCO, whose mission it is to be the voice of universities worldwide and the main defender of the two fundamental academic values: (i) academic freedom and (ii) university autonomy? Naturally, an anniversary is always an occasion to look back, just as it is natural to look ahead.
APA, Harvard, Vancouver, ISO, and other styles
2

Manadhata, Pratyusa K. "Game Theoretic Approaches to Attack Surface Shifting." In Moving Target Defense II, 1–13. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jain, Manish, Bo An, and Milind Tambe. "Security Games Applied to Real-World: Research Contributions and Challenges." In Moving Target Defense II, 15–39. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bilar, Daniel, George Cybenko, and John Murphy. "Adversarial Dynamics: The Conficker Case Study." In Moving Target Defense II, 41–71. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gonzalez, Cleotilde. "From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity." In Moving Target Defense II, 73–86. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Torrieri, Don, Sencun Zhu, and Sushil Jajodia. "Cyber Maneuver Against External Adversaries and Compromised Nodes." In Moving Target Defense II, 87–96. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yackoski, Justin, Harry Bullen, Xiang Yu, and Jason Li. "Applying Self-Shielding Dynamics to the Network Architecture." In Moving Target Defense II, 97–115. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goues, Claire Le, Anh Nguyen-Tuong, Hao Chen, Jack W. Davidson, Stephanie Forrest, Jason D. Hiser, John C. Knight, and Matthew Van Gundy. "Moving Target Defenses in the Helix Self-Regenerative Architecture." In Moving Target Defense II, 117–49. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jackson, Todd, Andrei Homescu, Stephen Crane, Per Larsen, Stefan Brunthaler, and Michael Franz. "Diversifying the Software Stack Using Randomized NOP Insertion." In Moving Target Defense II, 151–73. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pappas, Vasilis, Michalis Polychronakis, and Angelos D. Keromytis. "Practical Software Diversification Using In-Place Code Randomization." In Moving Target Defense II, 175–202. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Defender II"

1

Gimenez, Jucelino. "VGD É O BICHO!" In II Congresso Brasileiro de Ciências Biológicas On-line. Revista Multidisciplinar Educação e Meio Ambiente, 2021. http://dx.doi.org/10.51189/rema/1648.

Full text
Abstract:
Introdução: VGD É O BICHO, é um projeto de extensão do Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso - campus Várzea Grande para colaborar com os movimentos organizados e com o governo do Estado de Mato Grosso. Objetivo: Têm por objetivo promover ações voltadas à preservação, à conservação e ao socorro dos Biomas que compõem o Estado de Mato Grosso, atrelado ao voluntariado. O projeto teve a motivação nos diversos incêndios que assolaram o Pantanal Mato-grossense no decorrer do ano de 2020, e que levaram os animais desse bioma à situação de vulnerabilidade no que diz respeito à alimentação, para além dos vários animais feridos durante os incêndios. Os incêndios, além de causar ferimentos, trouxe a escassez dos frutos e folhas que eram a base alimentar desses animais. Material e método: O Governo de Mato Grosso, por meio do Posto de Atendimento Especializado a Animais Silvestres do Pantanal orienta e promove várias ações para minimizar as perdas sofridas pelos incêndios, dentre elas o trabalho voluntário. Este projeto VGD È O BICHO foi inspirado pela Movimento Organizado “É o BichoMT”, que implantou um entreposto de coleta de doações de frutas, verduras, ovos, no bairro do Porto da cidade de Cuiabá. O É O BICHO MT implantou vários pontos de coleta na cidade e ainda conta com doações do CEASA MT e até mesmo uma vaquinha eletrônica. Os servidores do IFMT Campus Várzea Grande, assim como outros do campus Bela Vista e Octayde, se associam ao Projeto É O BICHOMT no voluntariado, aproveitando a oportunidade para defender nosso Bioma Pantanal e mostrar a força e a importância do voluntariado e da sustentabilidade. Conclusão: Nesse sentido, este projeto consistirá em levar alimentos ao Pantanal, com os servidores do IFMT, convidando alunos para a participarem da operação.
APA, Harvard, Vancouver, ISO, and other styles
2

Shi, Zheyuan Ryan, Ziye Tang, Long Tran-Thanh, Rohit Singh, and Fei Fang. "Designing the Game to Play: Optimizing Payoff Structure in Security Games." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/71.

Full text
Abstract:
We study Stackelberg Security Games where the defender, in addition to allocating defensive resources to protect targets from the attacker, can strategically manipulate the attacker’s payoff under budget constraints in weighted L^p-norm form regarding the amount of change. For the case of weighted L^1-norm constraint, we present (i) a mixed integer linear program-based algorithm with approximation guarantee; (ii) a branch-and-bound based algorithm with improved efficiency achieved by effective pruning; (iii) a polynomial time approximation scheme for a special but practical class of problems. In addition, we show that problems under budget constraints in L^0 and weighted L^\infty-norm form can be solved in polynomial time.
APA, Harvard, Vancouver, ISO, and other styles
3

Serreli, Giovanni. "La seconda metà del XVI secolo: un punto di svolta nell’organizzazione difensiva del Regno di Sardegna." In FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11404.

Full text
Abstract:
The second half of the sixteenth century: a turning point in the organization of the Kingdom of Sardinia defenseIn the second half of the sixteenth century, in accordance with the centralization and reorganization of the administrative and military apparatus desired by Philip II in the States of the Iberian Monarchy, military defense was reorganized in the Kingdom of Sardinia, against the threatened Franc-Turkish invasion of the Island. Until that time, in fact, the defense of the Kingdom was based only on the modernization of the main Royal Cities fortifications. The inspiring principle of this strategy was the medieval one: to defend the Kingdom, it would have been enough to defend the Royal Cities of Cagliari and Alghero. Instead, starting from the Parliament wanted in 1558 by Philip II and summoned by the viceroy Alvaro de Madrigal, attention is also paid to the defense of the coastal perimeter of the whole island. In this Parliament, convened with the sole purpose of providing for the defense of the Kingdom against the looming Franc-Turkish threat, the foundations are laid for the reorganization of the administrative apparatus of the Kingdom, limiting the centrifugal tendencies of local feudalism; but above all, they are laid the foundations for the creation of a homogeneous defense system, abandoning the extemporaneous initiatives taken up to that time. By the end of the century, reports for the construction of a static defense system will be commissioned and the Royal Administration of Towers will be established, with the task of building, arming and maintaining the static defense system.
APA, Harvard, Vancouver, ISO, and other styles
4

Faibarn, W. D. M. "The British defence requirement for satellites." In IEE Colloquium on Military Satellite Communications II. IEE, 1997. http://dx.doi.org/10.1049/ic:19971064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sworder, David D., John E. Boyd, and R. G. Hutchins. "Map-enhanced tracking II." In Defense and Security Symposium, edited by Oliver E. Drummond. SPIE, 2006. http://dx.doi.org/10.1117/12.663536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Session 5A Privacy, security, DOS and defences II." In Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004). IEEE, 2004. http://dx.doi.org/10.1109/icon.2004.1409204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Munkeby, Steve H., and John R. Spofford. "UGV/Demo II Program: status through Demo C and Demo II preparations." In Aerospace/Defense Sensing and Controls, edited by Scott A. Speigle. SPIE, 1996. http://dx.doi.org/10.1117/12.241074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mahler, Ronald. "On multitarget pairwise-Markov models, II." In SPIE Defense + Security, edited by Ivan Kadar. SPIE, 2017. http://dx.doi.org/10.1117/12.2262787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Klipstein, P. C., E. Avnon, D. Azulai, Y. Benny, R. Fraenkel, A. Glozman, E. Hojman, et al. "Type II superlattice technology for LWIR detectors." In SPIE Defense + Security, edited by Bjørn F. Andresen, Gabor F. Fulop, Charles M. Hanson, John L. Miller, and Paul R. Norton. SPIE, 2016. http://dx.doi.org/10.1117/12.2222776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ting, David Z., Alexander Soibel, Arezou Khoshakhlagh, Linda Höglund, Sam A. Keo, Sir B. Rafol, Cory J. Hill, et al. "Antimonide type-II superlattice barrier infrared detectors." In SPIE Defense + Security, edited by Bjørn F. Andresen, Gabor F. Fulop, Charles M. Hanson, John L. Miller, and Paul R. Norton. SPIE, 2017. http://dx.doi.org/10.1117/12.2266263.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Defender II"

1

Lindgren, John C. Advanced Distributed Simulation Technology II (ADST II) Extended Air Defense Testbed (EADTB). Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada363420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Odeen, Philip A., and William G. Howard. Defense Science Board Task Force on Logistics Transformation - Phase II. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada385885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wall, Alan R. Theater Missile Defense in World War II - Some Operational Art Considerations. Fort Belvoir, VA: Defense Technical Information Center, February 1999. http://dx.doi.org/10.21236/ada363065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

DEPARTMENT OF DEFENSE WASHINGTON DC. Department of Defense Annual Statement of Assurance, Volume II for Fiscal Year 1996. Fort Belvoir, VA: Defense Technical Information Center, December 1996. http://dx.doi.org/10.21236/ada328127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

DEFENSE SCIENCE BOARD WASHINGTON DC. Report of the Defense Science Board Task Force on Enabling Joint Force Capabilities - Phase II. Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada428786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anderson, Lowell B., Jerome Bracken, and Marilyn C. Bracken. Review of Department of Defense Education Activity (DODEA) Schools. Volume II: Quantitative Analysis of Educational Quality. Fort Belvoir, VA: Defense Technical Information Center, October 2000. http://dx.doi.org/10.21236/ada385886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Longe, Timothy, R. Chuang, D. Johnston, C. Brand, and Gary McKown. Fort Holabird Defense Investigative Service (DIS), Base Realignment and Closure (BRAC) Cleanup Plan (BCP), Version II. Fort Belvoir, VA: Defense Technical Information Center, December 1998. http://dx.doi.org/10.21236/ada467428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wright, Larry. Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II. Fort Belvoir, VA: Defense Technical Information Center, March 2001. http://dx.doi.org/10.21236/ada385282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

DEFENSE SCIENCE BOARD WASHINGTON DC. Protecting the Homeland Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II. Fort Belvoir, VA: Defense Technical Information Center, March 2001. http://dx.doi.org/10.21236/ada399019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hermann, Robert, and Larry Welch. The Defense Science Board 1997 Summer Study Task Force on DoD Responses to Transnational Threats. Volume II. Force Protection Report. Fort Belvoir, VA: Defense Technical Information Center, October 1997. http://dx.doi.org/10.21236/ada338911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography