To see the other types of publications on this topic, follow the link: Time banditry.

Journal articles on the topic 'Time banditry'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Time banditry.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Brock Baskin, Meagan E., Victoria McKee, and M. Ronald Buckley. "Time Banditry and Impression Management Behavior." Journal of Leadership & Organizational Studies 24, no. 1 (2016): 39–54. http://dx.doi.org/10.1177/1548051816661479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mahmood, Neamat Ali. "Theft and Banditry in Iraq during the reign of the Ottomans from the lens of the Travelers." Twejer 4, no. 1 (2021): 1157–92. http://dx.doi.org/10.31918/twejer.2141.26.

Full text
Abstract:
Travelers’ books are considered one of the most reliable historical sources for recognizing and the descriptions of those cities they passed through. And also, they are significant references for determining theft and banditry in the last decade of new history. This research is a modest attempt to track impressions of foreign travelers who traveled to Iraqi cities in modern era whether from road routes or river. Registering theft and banditry misbehaviour in the ruling time of Ottoman Empire while they visited Iraqi cities. It is worth mentioning, most of the travelers took notes about their commercial caravans who exposed to robbery and looting and even killing by thieves and bandits, whether the caravans were big, medium or small in size. Furthermore, they noted the associated factors to the phenomenon in regard to the privacy and distinguished one place to another. Key words: travelers, theft, bandits, Arab Bedouins, Kurds, Iraq, the Ottomans.
APA, Harvard, Vancouver, ISO, and other styles
3

Martin, Laura E., Meagan E. Brock, M. Ronald Buckley, and David J. Ketchen. "Time banditry: Examining the purloining of time in organizations." Human Resource Management Review 20, no. 1 (2010): 26–34. http://dx.doi.org/10.1016/j.hrmr.2009.03.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brock, Meagan E., Laura E. Martin, and M. Ronald Buckley. "Time Theft in Organizations: The development of the Time Banditry Questionnaire." International Journal of Selection and Assessment 21, no. 3 (2013): 309–21. http://dx.doi.org/10.1111/ijsa.12040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

MYRHOROD, Violetta, and Oksana VOLODINA. "Banditry (article 257 of the Criminal Code of Ukraine), robbery (article 187 of the Criminal Code of Ukraine), extortion (article 189 of the Criminal Code of Ukraine) and problems of the relationship between these crimes." Economics. Finances. Law, no. 5/2 (May 26, 2021): 13–17. http://dx.doi.org/10.37634/efp.2021.5(2).2.

Full text
Abstract:
This paper examines the relationship between banditry, robbery committed by an organized, armed group of people and extortion, and the main normative sources of domestic legislation. In addition, official statistics provided to the Prosecutor General's Office of Ukraine were examined to assess the prevalence and risk of banditry. The author analyzes the features of the corpus delicti, their qualifications, and problematic issues in the application of this knowledge in the practice of law enforcement and judicial authorities. The articles cover certain aspects of robbery, such as burglary and violence or the threat of intrusion. Particular attention is paid to the main features of the gang, namely: the number of subjects of the crime; stability; armament; the general purpose of the group members; way of committing a crime. Parallels were drawn between banditry and robbery, especially in terms of armaments, distribution of tasks between accomplices, their relationship, subordination and provision of a plan for further criminal activity. In distinguishing between robbery and extortion, a characteristic difference was established in the time limits of violence or the threat of its use: in robbery, they are aimed at taking possession of property immediately at the time of their use; in extortion: actions that involve violence or the threat of its use, aimed at obtaining property, as well as the requirement to transfer property, combined with the threat to use violence against the victim or his close relatives in the future. Also the actions which are offered for qualification in actions of the person of signs of investigated structures of crimes are defined. The types of damage caused to victims are analyzed. Based on the study, the author concludes that banditry, robbery and extortion are different in their criminal law nature of crimes, which have their own unique features and differ significantly in the objects of encroachment, the objective parties, somewhat coinciding only object composition and subjective side.
APA, Harvard, Vancouver, ISO, and other styles
6

Brock Baskin, Meagan E., and Victoria McKee. "Employee perceptions of climate as an antecedent of time banditry in the workplace." International Journal of Selection and Assessment 27, no. 1 (2019): 83–89. http://dx.doi.org/10.1111/ijsa.12236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kamali```, Mohammad Hashim. "Terrorism, Banditry and Hirabah: Advancing New Shariah Perspectives." ICR Journal 8, no. 1 (2017): 11–34. http://dx.doi.org/10.52282/icr.v8i1.210.

Full text
Abstract:
Hirabah is the nearest Shariah legal concept to terrorism. Modern technological change, however, has altered the nature of this crime so much that corresponding adjustments in the law of hirabah are inevitable. Remote control devices, precision device-timing, vastly destructive weapons, and even suicide bombings were not considered by early Muslim jurists in their scholastic articulations of hirabah. The Qur’anic conception of this crime, on the other hand, is broad enough to accommodate the needed adjustments, and which is what this article attempts to do – in other words, to reconnect the fiqh of hirabah to its Qur’anic origins. This is necessary as, in its global reach, the scourge of contemporary terrorism has greatly pained and anguished, not only Muslims, but humanity at large. The nature of the phenomenon before us demands suitable Shariah responses. To facilitate this, we have attempted to comprehend contemporary terrorism in its own terms. The discussion therefore begins by defining terrorism and hirabah. A review of the principal Qur’anic verse on hirabah is presented at the outset and then followed by a review and analysis of the fiqh of hirabah in the expositions of the leading schools of Islamic law. Being one of the prescribed hudud crimes, the Qur’an provides a four-fold punishment for hirabah, but while also opening the prospect of repentance and pardon for its perpetrators under certain conditions, and which Muslim scholars have elaborated upon in their deliberations. Yet what they have said in this regard has naturally been bound by the conditions of their own environment and time. This has involved elements of interpretation and speculative ijtihad. In our own attempt to bridge the gap between the fiqhi conception of hirabah and contemporary terrorism, we look into contemporary opinion and research on this phenomenon so as to encapsulate its salient new features. Terrorism has been overshadowed, to some extent, by the clamour generated by the so called ‘clash of civilisations,’ by Islamophobia and by confrontational politics, at the expense of reflective Shariah responses to issues. Muslim scholars have provided some through the issuance of fatwa and scholarly opinion, which we also review in a separate section below. The article ends with a conclusion and set of actionable policy recommendations.
APA, Harvard, Vancouver, ISO, and other styles
8

Brown, Nathan. "Brigands and State Building: The Invention of Banditry in Modern Egypt." Comparative Studies in Society and History 32, no. 2 (1990): 258–81. http://dx.doi.org/10.1017/s0010417500016480.

Full text
Abstract:
A late nineteenth-century epidemic of banditry seems to have swept through the Egyptian countryside, at least according to the writings and actions of influential Egyptians at that time. Contemporary newspapers recounted daily episodes in which gangs composed of between six and sixty or seventy members raided large estates, robbed travelling merchants, and organized local protection rackets. The threat to public security drew the greatest attention in the decade following the British occupation of Egypt in 1882.
APA, Harvard, Vancouver, ISO, and other styles
9

Freeman, Ashley Thomas. "Bushrangers, itinerant teachers and constructing educational policy in 1860s New South Wales." History of Education Review 48, no. 1 (2019): 15–30. http://dx.doi.org/10.1108/her-12-2017-0027.

Full text
Abstract:
Purpose The purpose of this paper is to examine how rural outlaws, known in the Australian context as bushrangers, impacted on the introduction of itinerant teaching in sparsely settled areas under the Council of Education in the colony of New South Wales. In July 1867 the evolving process for establishing half-time schools was suddenly disrupted when itinerant teaching diverged down an unexpected and uncharted path. As a result the first two itinerant teachers were appointed and taught in an irregular manner that differed significantly from regulation and convention. The catalyst was a series of events arising from bushranging that was prevalent in the Braidwood area in the mid-1860s. Design/methodology/approach The paper draws on archival sources, particularly sources within State Archives and Records NSW, further contemporary sources such as reports and newspapers; and on secondary sources. Findings The paper reveals the circumstances which led to the implementation of an unanticipated form of itinerant teaching in the “Jingeras”; the impact of rural banditry or bushranging, on the nature and conduct of these early half-time schools; and the processes of policy formation involved. Originality/value This study is the first to explore the causes behind the marked deviation from the intended form and conduct of half-time schools that occurred in the Braidwood area of 1860s New South Wales. It provides a detailed account of how schooling was employed to counter rural banditry, or bushranging, in the Jingeras and provided significant insight into the education policy formation processes of the time.
APA, Harvard, Vancouver, ISO, and other styles
10

Otekunrin, Olutosin A. "Is Africa Ready for the SDG 2 (Zero Hunger) Target by 2030?" Current Agriculture Research Journal 9, no. 1 (2021): 01–03. http://dx.doi.org/10.12944/carj.9.1.01.

Full text
Abstract:
In recent time, the prevalence of hunger, malnutrition and food insecurity have increased in most African countries as the continent continued to experience rising number of people that are undernourished. This paper reveals the progress of African region in pursuit of SDG 2 target by 2030 considering both the global and Africa SDG threshold (rating) in 2019. The SDG2 target achievement in Africa is facing serious obstacles such as high level of poverty, unemployment, social exclusion, corruption, banditry, kidnapping, conflicts, and terrorism. With enormous challenges confronting Africa, can SDG 2 target be achieved in the continent by 2030?
APA, Harvard, Vancouver, ISO, and other styles
11

HUBBELL, ANDREW. "A VIEW OF THE SLAVE TRADE FROM THE MARGIN: SOUROUDOUGOU IN THE LATE NINETEENTH-CENTURY SLAVE TRADE OF THE NIGER BEND." Journal of African History 42, no. 1 (2001): 25–47. http://dx.doi.org/10.1017/s0021853700007805.

Full text
Abstract:
The region of Souroudougou played a dynamic role in the regional slave trade of the western Niger Bend during the nineteenth century, supplying slaves to neighboring states. A number of mechanisms, termed here ‘indirect linkages’, connected sources of slaves in Souroudougou to the broader regional slave trade. These took the form of commercial activity by Muslim mercantile groups, banditry and alliances formed between neighboring states and local power brokers in Souroudougou. At the same time, the growing slave trade triggered important internal processes of change in the local social landscape, termed here the ‘espace de compétition’. In particular, heightened individual and group competition transformed established codes of behavior and social networks.
APA, Harvard, Vancouver, ISO, and other styles
12

Özer, Songül. "The Effect of Career Plateau on Time Banditry: An Application in a Five-Star City Hotel in Turkey." Journal of Tourism and Gastronomy Studies 9, no. 1 (2021): 131–44. http://dx.doi.org/10.21325/jotags.2021.781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Brooks, Jeffrey. "How Tolstoevskii Pleased Readers and Rewrote a Russian Myth." Slavic Review 64, no. 3 (2005): 538–59. http://dx.doi.org/10.2307/3650141.

Full text
Abstract:
Jeffrey Brooks argues that Fedor Dostoevskii and Lev Tolstoi drew on and recast a particularly Russian mythology of doomed rebellion in order to explore issues of free will, self-fulfillment, and redemption. The literary giants employed narrative structures similar to popular formulas. They imagined their work and even their lives in terms of an opposition between freedom and order, echoing themes of Aleksandr Pushkin and Nikolai Gogol'. By linking Tolstoi and Dostoevskii to mythologies of banditry, Brooks illuminates the interaction between high and low cultures. He locates their work in the context of social and cultural transformations of the liberal postreform era, showing how readers' expectations changed in a fluid society. Readers increasingly wanted freedom to triumph over the myth's earlier doom, but censors remained vigilant. He shows how Tolstoi and Dostoevskii satisfied both censors and readers by framing tales of adventure and romance with moralistic beginnings and endings conforming to the format of the long serial novel. The formulaic sandwich that frustrated the censors was used with similar effect by N. I. Pastukhov, author of Russia's first modern popular novel, The Bandit Churkin, which was serialized in Moskovskii listok in the early 1880s. Brooks affirms the mastery of Tolstoi and Dostoevskii that transcends time and place, but shows the roots of their work in Russian preoccupations with freedom and order.
APA, Harvard, Vancouver, ISO, and other styles
14

Onon, Temujin. "A Brief Biography of Urgunge Onon." Inner Asia 2, no. 1 (2000): 3–7. http://dx.doi.org/10.1163/146481700793647922.

Full text
Abstract:
AbstractUrgunge, of the Onon clan of Daur Mongols was born on the eleventh day of the eleventh lunar month 1919 in a village in north-eastern Inner Mongolia. His people hunted and farmed in a remote area near the Manchurian border and had retained some ancient Mongolian customs and a spoken dialect long-since lost by the majority of Mongols. During his youth he enjoyed participating in the traditional Mongolian pursuits of wrestling, horse riding and hunting but also, almost mysteriously, acquired an intuitive understanding of shamanic rituals and practices which were still surviving in his native area at that time. He himself considered that shamanism had a profound influence on the Mongols at the time of Chinggis and was an important factor in their military and political success. It was this shamanism which continued to influence his personal philosophy throughout his adult life. As a young teenager he experienced the suffering caused by war and banditry which were endemic in Manchuria at that time and was himself captured and held hostage by bandits. Following his release his family were able to send him to a Japanese-sponsored boarding school – a rare educational opportunity for ordinary rural people at that time. The school was near Tsitsihar and he was soon introduced to life in an industrialised and commercial environment. Having become proficient in Japanese he did well enough at school to be selected to attend university in Japan where he gained a diploma in political science from Toyo University in Tokyo in 1944. The years spent in Japan during World War II were difficult for all the Mongolian students there but it was in Japan that he first became fascinated by the West, and America in particular, from watching films and newsreels.
APA, Harvard, Vancouver, ISO, and other styles
15

Sidelev, Viktor V. "PROVING THE ATTRIBUTE OF ARMAMENT ON THE PRIMARY AND FURTHER RACKETEERING INVESTIGATION STAGES." Russian investigator 10 (October 8, 2020): 13–16. http://dx.doi.org/10.18572/1812-3783-2020-10-13-16.

Full text
Abstract:
In practice, the qualification “banditry” is given by the preliminary investigation bodies on the basis of a carefully conducted investigation and is actually the result of a complex and time-consuming work on collecting, analyzing and systematizing evidence of the guilt of specific individuals in committing a number of serious and especially serious crimes as part of a stable, armed organized group. One of the key signs of a gang is the sign of armament, which depends on the degree of proof of the overall final qualification of the actions of an organized criminal group. This article deals with issues related to the organization of investigation of crimes committed as part of gangs in the part relating to the planning of investigative and procedural actions to prove the sign of armament.
APA, Harvard, Vancouver, ISO, and other styles
16

Blumell, Lincoln H. "Beware of Bandits!" Journeys 8, no. 1 (2007): 1–20. http://dx.doi.org/10.3167/jys.2007.081201.

Full text
Abstract:
This paper considers the perils of travel by focusing on banditry, a conspicuous, yet oft-neglected, feature of the Roman Empire. Appearing at different times and at various locations it was thoroughly entrenched in Roman society and affected both the rich and poor alike. But the primary victim of banditry and the one to whom it posed the greatest threat was the ancient traveller since brigands tended to operate mostly along roads and rural highways in search of prey. The very real danger brigands posed to the ancient traveller can be detected from a number of diverse sources including tombstones on which was inscribed 'killed by bandits'. While the government took some measures to curb and even stamp out banditry, given the administrative and policing handicaps inherent in the Empire it remained fairly widespread.
APA, Harvard, Vancouver, ISO, and other styles
17

Ajodo-Adebanjoko, Angela. "Rural Banditry in Northwest Nigeria Amidst a Global Pandemic: A Gender Perspective." Political Crossroads 24, no. 1 (2020): 59–78. http://dx.doi.org/10.7459/pc/24.1.05.

Full text
Abstract:
Rural banditry in Nigeria’s northwest in recent years has made the zone a hotbed of violence. What started as localized disputes in the agro-pastoral sector in 2010 has today metamorphosed into an intractable crisis posing a major threat to national and regional security. Banditry in the zone is characterized by large scale killings, abductions, raids on communities, rape of women and girls and displacement of people and is exacerbated by collapse of governance and absence of law and order, injustice, porous borders and proliferation of Small and Light Weapons (SALWs) among others. In the midst of the coronavirus pandemic, banditry continues to take devastating tolls on its victims, especially women who are the most vulnerable in times of crisis. Women and girls face a double challenge of gender-based violence perpetrated by bandits and intimate partners during the global health crisis. The pervasiveness, intensity and intractability of banditry in the midst of the coronavirus pandemic is worrisome as it could make worse existing gender inequalities such as rape, transactional sex, child marriages, increase in the number of out-of-school girls and the practice of purdah. To address the conflict, a multi-approach involving all stakeholders in the conflict is recommended.
APA, Harvard, Vancouver, ISO, and other styles
18

Kuroki, Yuko, Liyuan Xu, Atsushi Miyauchi, Junya Honda, and Masashi Sugiyama. "Polynomial-Time Algorithms for Multiple-Arm Identification with Full-Bandit Feedback." Neural Computation 32, no. 9 (2020): 1733–73. http://dx.doi.org/10.1162/neco_a_01299.

Full text
Abstract:
We study the problem of stochastic multiple-arm identification, where an agent sequentially explores a size-[Formula: see text] subset of arms (also known as a super arm) from given [Formula: see text] arms and tries to identify the best super arm. Most work so far has considered the semi-bandit setting, where the agent can observe the reward of each pulled arm or assumed each arm can be queried at each round. However, in real-world applications, it is costly or sometimes impossible to observe a reward of individual arms. In this study, we tackle the full-bandit setting, where only a noisy observation of the total sum of a super arm is given at each pull. Although our problem can be regarded as an instance of the best arm identification in linear bandits, a naive approach based on linear bandits is computationally infeasible since the number of super arms [Formula: see text] is exponential. To cope with this problem, we first design a polynomial-time approximation algorithm for a 0-1 quadratic programming problem arising in confidence ellipsoid maximization. Based on our approximation algorithm, we propose a bandit algorithm whose computation time is [Formula: see text](log [Formula: see text]), thereby achieving an exponential speedup over linear bandit algorithms. We provide a sample complexity upper bound that is still worst-case optimal. Finally, we conduct experiments on large-scale data sets with more than 10[Formula: see text] super arms, demonstrating the superiority of our algorithms in terms of both the computation time and the sample complexity.
APA, Harvard, Vancouver, ISO, and other styles
19

Hill, Christopher V. "Philosophy and Reality in Riparian South Asia: British Famine Policy and Migration in Colonial North India." Modern Asian Studies 25, no. 2 (1991): 263–79. http://dx.doi.org/10.1017/s0026749x00010672.

Full text
Abstract:
The assumption of the passive peasant in Indian history has been existent at least since the time of Max Weber, and continues to return, phoenix-like in its appearance, every few decades. Its importance, however, lies in the responses the generality spawns. Morris D. Morris refuted Max Weber's thesis, detailed in The Religions of India, in 1967, while Barrington Moore, Jr.'s Social Origins of Dictatorship and Democracy was aptly rebutted by Kathleen Gough in 1974. Since then, the concept of the rational peasant, particularly during colonial times, has undergone a metamorphosis. Various modes of peasant dynamics have been amply demonstrated in recent works, stepping into the realms of peasant rebellion, desertion, banditry, and the like. Of particular import, in terms of peasant consciousness, has been the rise of the ‘Subaltern School’ of study. Beginning with Ranajit Guha's seminal work, Elementary Aspects of Peasant Insurgency in Colonial India, and continuing with volumes of articles by a variety of authors, the Subaltern Studies group has attempted, in their own words, to offer an alternative to historical writing ‘that fails to acknowledge, far less interpret, the contributions made by the people on their own, that is independently of the elite.…’ These scholars thus use the term subaltern for those social groups which they believe have been ignored through the course of history.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhou, Huozhi, Lingda Wang, Lav Varshney, and Ee-Peng Lim. "A Near-Optimal Change-Detection Based Algorithm for Piecewise-Stationary Combinatorial Semi-Bandits." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 6933–40. http://dx.doi.org/10.1609/aaai.v34i04.6176.

Full text
Abstract:
We investigate the piecewise-stationary combinatorial semi-bandit problem. Compared to the original combinatorial semi-bandit problem, our setting assumes the reward distributions of base arms may change in a piecewise-stationary manner at unknown time steps. We propose an algorithm, GLR-CUCB, which incorporates an efficient combinatorial semi-bandit algorithm, CUCB, with an almost parameter-free change-point detector, the Generalized Likelihood Ratio Test (GLRT). Our analysis shows that the regret of GLR-CUCB is upper bounded by O(√NKT log T), where N is the number of piecewise-stationary segments, K is the number of base arms, and T is the number of time steps. As a complement, we also derive a nearly matching regret lower bound on the order of Ω(√NKT), for both piecewise-stationary multi-armed bandits and combinatorial semi-bandits, using information-theoretic techniques and judiciously constructed piecewise-stationary bandit instances. Our lower bound is tighter than the best available regret lower bound, which is Ω(√T). Numerical experiments on both synthetic and real-world datasets demonstrate the superiority of GLR-CUCB compared to other state-of-the-art algorithms.
APA, Harvard, Vancouver, ISO, and other styles
21

Showler, Allan T., and Michel Lecoq. "Incidence and Ramifications of Armed Conflict in Countries with Major Desert Locust Breeding Areas." Agronomy 11, no. 1 (2021): 114. http://dx.doi.org/10.3390/agronomy11010114.

Full text
Abstract:
Despite many areas of progress in recent years, desert locust surveillance and control is impaired by many obstacles, the most intractable of which is insecurity. Insecurity involves rebellions, insurgencies, civil and international war, banditry, terrorism, and minefields. Obstruction of desert locust operations in breeding areas by ongoing armed conflict and landmines constitutes “direct” insecurity. “Indirect” insecurity, although less obvious, is arguably more broadly deleterious by debilitating government function and diverting funds, personnel, and equipment from desert locust management. Indirect “active” insecurity is armed conflict and civil unrest that is occurring at the same time as a desert locust episode, but not in the breeding areas. Indirect “inactive” insecurity refers to the after-effects of insecurity, including weak funding because of prior inattention to capacity maintenance during times of direct and indirect active insecurity, disabled or militarily-appropriated vehicles and other resources, destruction of infrastructure, and deployment of mines. We provide examples of direct and indirect insecurity across 35 years, from 1986 through May 2020, in 13 African and Asian countries (Chad, Eritrea, Ethiopia, India, Mali, Mauritania, Niger, Pakistan, Saudi Arabia, Somalia, Sudan, Western Sahara, and Yemen) with desert locust breeding areas to illustrate the complexity, pervasiveness, and chronic occurrence of insecurity. The upsurge of 2020 is used to show how direct insecurity still contributes to the genesis and expansion of desert locust episodes. Possible mitigation of direct insecurity effects on some desert locust operations is discussed.
APA, Harvard, Vancouver, ISO, and other styles
22

Showler, Allan T., and Michel Lecoq. "Incidence and Ramifications of Armed Conflict in Countries with Major Desert Locust Breeding Areas." Agronomy 11, no. 1 (2021): 114. http://dx.doi.org/10.3390/agronomy11010114.

Full text
Abstract:
Despite many areas of progress in recent years, desert locust surveillance and control is impaired by many obstacles, the most intractable of which is insecurity. Insecurity involves rebellions, insurgencies, civil and international war, banditry, terrorism, and minefields. Obstruction of desert locust operations in breeding areas by ongoing armed conflict and landmines constitutes “direct” insecurity. “Indirect” insecurity, although less obvious, is arguably more broadly deleterious by debilitating government function and diverting funds, personnel, and equipment from desert locust management. Indirect “active” insecurity is armed conflict and civil unrest that is occurring at the same time as a desert locust episode, but not in the breeding areas. Indirect “inactive” insecurity refers to the after-effects of insecurity, including weak funding because of prior inattention to capacity maintenance during times of direct and indirect active insecurity, disabled or militarily-appropriated vehicles and other resources, destruction of infrastructure, and deployment of mines. We provide examples of direct and indirect insecurity across 35 years, from 1986 through May 2020, in 13 African and Asian countries (Chad, Eritrea, Ethiopia, India, Mali, Mauritania, Niger, Pakistan, Saudi Arabia, Somalia, Sudan, Western Sahara, and Yemen) with desert locust breeding areas to illustrate the complexity, pervasiveness, and chronic occurrence of insecurity. The upsurge of 2020 is used to show how direct insecurity still contributes to the genesis and expansion of desert locust episodes. Possible mitigation of direct insecurity effects on some desert locust operations is discussed.
APA, Harvard, Vancouver, ISO, and other styles
23

Rozenblatt, Daphne. "Scientific expertise and the politics of emotions in the 1902 trial of Giuseppe Musolino." History of the Human Sciences 30, no. 3 (2017): 25–49. http://dx.doi.org/10.1177/0952695117702083.

Full text
Abstract:
In 1902, the Calabrian brigand Giuseppe Musolino was tried on several counts of murder and many crimes of lesser magnitude. While the tale of the brigand’s 1898 false conviction, imprisonment, escape and then revenge sparked a national debate about the political and cultural meaning of brigandage, the trial came to focus on Musolino’s emotional state at the time of his crimes. Was he a cold-blooded and calculating killer who manipulated southerners into believing he was a folk hero? Or was he an angry, passionate and insane murderer victimized by his own feelings? Both jurists and scientists weighed in to determine his culpability. By turning a political question of banditry or brigandage into a psychological question of morbid or criminal emotions, the trial politicized the criminal character. This article examines the perspectives on emotions that shaped Musolino’s trial, and how psychiatric knowledge came to challenge legal notions of insanity and culpability. It argues that the determination of emotions as motives served to de-legitimize the rationale and political motives of the defendant, in turn politicizing his emotions and character. At the same time, the cause of Musolino’s crime and his culpability represented the failures of national unification and the ongoing tensions between the North and South of Italy. The introduction of psychiatric expertise into the criminal court pushed judgement and punishment to examine increasingly who a person was as opposed to what that person had done. The court’s definition of who a person ‘was’, was a matter of how that person felt.
APA, Harvard, Vancouver, ISO, and other styles
24

Groshevaya, Viktoriya K. "THE ACTIVITIES OF THE DONBASS CRIMINAL STAFF EMPLOYEES TO COMBAT CRIME ON RAILWAY TRANSPORT IN THE 1940S." Vestnik of Kostroma State University, no. 3 (2020): 213–20. http://dx.doi.org/10.34216/1998-0817-2020-26-3-213-220.

Full text
Abstract:
The article is devoted to the features of activity of criminal investigators of the Donbass for railway crime control in the 1940s. In the first years of the Soviet power there were no dramatic changes in railway crime development. However, in the years before World War II criminal activity in railway transport intensified significantly. Operational employees of the railway militia became to be responsible for the results of the fight against specific types of crimes, mainly against the most dangerous of them. In turn this required them to study in more depth the nature and dynamics of crime, as well as improve preventive and operational-search activities. Wherein special attention was paid to improving the quality of the intelligence work of the transport police and the timely removal of the criminal element penetrating the transport. Significant efforts were made in organising a system of counteraction to banditry, reflecting various aspects of the fight against organised crime. During the World War II in the Donbass territory the main task facing employees of the internal affairs bodies in transport was to combat sabotage and attacks on trains and also other crimes related to inventory theft offences. At the same time, the tactics of the operational units of the criminal investigation department of the transport militia were formed and laid.
APA, Harvard, Vancouver, ISO, and other styles
25

Ontañón, Santiago. "Combinatorial Multi-armed Bandits for Real-Time Strategy Games." Journal of Artificial Intelligence Research 58 (March 29, 2017): 665–702. http://dx.doi.org/10.1613/jair.5398.

Full text
Abstract:
Games with large branching factors pose a significant challenge for game tree search algorithms. In this paper, we address this problem with a sampling strategy for Monte Carlo Tree Search (MCTS) algorithms called "naive sampling", based on a variant of the Multi-armed Bandit problem called "Combinatorial Multi-armed Bandits" (CMAB). We analyze the theoretical properties of several variants of naive sampling, and empirically compare it against the other existing strategies in the literature for CMABs. We then evaluate these strategies in the context of real-time strategy (RTS) games, a genre of computer games characterized by their very large branching factors. Our results show that as the branching factor grows, naive sampling outperforms the other sampling strategies.
APA, Harvard, Vancouver, ISO, and other styles
26

Lipley, Nick. "Time bandits." Emergency Nurse 11, no. 6 (2003): 5. http://dx.doi.org/10.7748/en.11.6.5.s8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Zayas-Cabán, Gabriel, Stefanus Jasin, and Guihua Wang. "An asymptotically optimal heuristic for general nonstationary finite-horizon restless multi-armed, multi-action bandits." Advances in Applied Probability 51, no. 03 (2019): 745–72. http://dx.doi.org/10.1017/apr.2019.29.

Full text
Abstract:
AbstractWe propose an asymptotically optimal heuristic, which we term randomized assignment control (RAC) for a restless multi-armed bandit problem with discrete-time and finite states. It is constructed using a linear programming relaxation of the original stochastic control formulation. In contrast to most of the existing literature, we consider a finite-horizon problem with multiple actions and time-dependent (i.e. nonstationary) upper bound on the number of bandits that can be activated at each time period; indeed, our analysis can also be applied in the setting with nonstationary transition matrix and nonstationary cost function. The asymptotic setting is obtained by letting the number of bandits and other related parameters grow to infinity. Our main contribution is that the asymptotic optimality of RAC in this general setting does not require indexability properties or the usual stability conditions of the underlying Markov chain (e.g. unichain) or fluid approximation (e.g. global stable attractor). Moreover, our multi-action setting is not restricted to the usual dominant action concept. Finally, we show that RAC is also asymptotically optimal for a dynamic population, where bandits can randomly arrive and depart the system.
APA, Harvard, Vancouver, ISO, and other styles
28

Oswal, Urvashi, Aniruddha Bhargava, and Robert Nowak. "Linear Bandits with Feature Feedback." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 5331–38. http://dx.doi.org/10.1609/aaai.v34i04.5980.

Full text
Abstract:
This paper explores a new form of the linear bandit problem in which the algorithm receives the usual stochastic rewards as well as stochastic feedback about which features are relevant to the rewards, the latter feedback being the novel aspect. The focus of this paper is the development of new theory and algorithms for linear bandits with feature feedback which can achieve regret over time horizon T that scales like k√T, without prior knowledge of which features are relevant nor the number k of relevant features. In comparison, the regret of traditional linear bandits is d√T, where d is the total number of (relevant and irrelevant) features, so the improvement can be dramatic if k ≪ d. The computational complexity of the algorithm is proportional to k rather than d, making it much more suitable for real-world applications compared to traditional linear bandits. We demonstrate the performance of the algorithm with synthetic and real human-labeled data.
APA, Harvard, Vancouver, ISO, and other styles
29

Caro, Felipe, and Onesun Steve Yoo. "INDEXABILITY OF BANDIT PROBLEMS WITH RESPONSE DELAYS." Probability in the Engineering and Informational Sciences 24, no. 3 (2010): 349–74. http://dx.doi.org/10.1017/s0269964810000021.

Full text
Abstract:
This article considers an important class of discrete time restless bandits, given by the discounted multiarmed bandit problems with response delays. The delays in each period are independent random variables, in which the delayed responses do not cross over. For a bandit arm in this class, we use a coupling argument to show that in each state there is a unique subsidy that equates the pulling and nonpulling actions (i.e., the bandit satisfies the indexibility criterion introduced by Whittle (1988). The result allows for infinite or finite horizon and holds for arbitrary delay lengths and infinite state spaces. We compute the resulting marginal productivity indexes (MPI) for the Beta-Bernoulli Bayesian learning model, formulate and compute a tractable upper bound, and compare the suboptimality gap of the MPI policy to those of other heuristics derived from different closed-form indexes. The MPI policy performs near optimally and provides a theoretical justification for the use of the other heuristics.
APA, Harvard, Vancouver, ISO, and other styles
30

Ifversen, Jan. "Time Bandits, Historians, and Concepts of Bad Times." Contributions to the History of Concepts 12, no. 2 (2017): 1–11. http://dx.doi.org/10.3167/choc.2017.120201.

Full text
Abstract:
Within the history of concepts, the conceptualization of time is central. Historical actors rely on their experiences for orientation in the present, and they produce expectations about the future. To imagine their horizons of expectation they need concepts about the future. When the future becomes difficult to conceive of for a variety of reasons, they take refuge in concepts describing unruly and uncertain times such as crisis or chaos. Times when the future is completely out of reach because the present seems unbearable might be termed catastrophic. Also, historians in general make use of temporal concepts to narrate their histories. They are like time bandits that manipulate time. Following last year’s conference organized by the History of Concepts Group on key concepts in times of crisis, this article takes issue with the discussion of concepts describing bad times within conceptual history.
APA, Harvard, Vancouver, ISO, and other styles
31

Odusote, Abiodun. "Africa: A Continent on the Edge, from Skewed Elections to Illiberal Democracies." International Journal of Social Science Research 7, no. 1 (2019): 58. http://dx.doi.org/10.5296/ijssr.v7i1.14669.

Full text
Abstract:
The conduct of regular elections at pre-determined time is a hallmark of liberal democracy. Most African countries now conduct regular elections. However, it is generally agreed that liberal democracy is not measured only by the conduct of elections but by a consistent commitment to certain democratic and constitutional ethos. The practice of liberal democracy is a commitment to the rule of law, free, fair and credible elections, transparency and good governance among others. In Africa today, it is generally agreed that despite majority of the countries achieving democracies, bad governance, lack of development, inequalities, exacerbation of internal conflicts, and human suffering are pervasive. Scholars have argued that African countries have generally not enjoyed complete freedom despite the periodic conduct of seeming elections in many African countries. The practice of democracy in Africa has been characterized by hooliganism, banditry and citizen frustrations, leading some commentators and scholars to question the suitability of liberal democratic norms within the African space, while some other scholars advance arguments for the justification of hybrid regimes as a variant of democracy suited for the African space. This research therefore seeks to interrogate the factors exacerbating hybrid regimes in Africa, examines the suitability or otherwise of hybrid governments in Africa, the implications of hybrid regimes for constitutional development, inclusive development and further seek the reconciliation of formal democratic practices with substantive democratic practices in Africa. Enquires will be made on how democratic institutions can synergize with democratic government to deliver the dividends of democracy to the people, how democracy can impact the people and how democracy can deliver good governance and create commonwealth for the citizenry. This paper acknowledges the difficulties of seeking a uniform constitutional template that promotes liberal democracies across African states. However, this paper suggests basic constitutional democratic baseline that has the potential of meeting the fundamental aspirations of the African people.
APA, Harvard, Vancouver, ISO, and other styles
32

Zhadan, Aleksandr V. "NKVD bodies of Khabarovsk Krai during the final stage of World War II and the first post-war period (June–December 1945)." Historia provinciae – the journal of regional history 5, no. 1 (2021): 183–216. http://dx.doi.org/10.23859/2587-8344-2021-5-1-5.

Full text
Abstract:
The article is devoted to the currently little-studied topic which is the influence of the political and socio-economic processes of the final stage of the World War II on the activities of the Khabarovsk Krai NKVD organs. The study was based on the archival documents related to the work of the NKVD organs of the Far East in the second half of 1945. The collections of documents stored in the departmental archive and information center of the Ministry of Internal Affairs of Khabarovsk Krai constituted the source base of the research. Most of the archival sources used by the author are being introduced into scientific circulation for the first time. The techniques of historical criminological analysis were applied in the process of research. The author considered the peculiarities of the transition of law enforcement agencies of Khabarovsk Krai to work under martial law connected with the events of the Soviet-Japanese war; structural transformations of the first post-war period, including the formation of new territorial bodies in South Sakhalin; activities in combating crime and protecting public order. It is concluded that the geopolitical events in the region and the internal social processes of the period under study demanded that the NKVD of Khabarovsk Krai not only strengthen the traditional activities to combat crime and protect law and order but also organize work in a number of new areas. The study of archival documents showed that the internal affairs bodies paid considerable attention to the organization of civil defense and the protection of population from possible attacks by Japanese aircraft during that period. Assessing the effectiveness of the activities of the territorial bodies of the Khabarovsk Krai NKVD in the period between June and December of 1945, the author concludes that despite a number of difficulties which were largely caused by the problems connected with personnel and logistics, the internal affairs bodies managed to ensure public safety and law and order in the front-line region and to prevent criminal excesses (outbreaks of banditry, group escapes or prisoner riots, etc.) and sabotage at strategically important facilities.
APA, Harvard, Vancouver, ISO, and other styles
33

Perrie, Maureen. "The Concept of a ‘Peasant War’ in Soviet and Western Historiography of the ‘Troubles’ in Early 17th-Century and Early 20th-Century Russia." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 4. Istorija. Regionovedenie. Mezhdunarodnye otnoshenija, no. 2 (April 2019): 36–43. http://dx.doi.org/10.15688/jvolsu4.2019.2.4.

Full text
Abstract:
The concept of ‘peasant wars’ in 17th- and 18th-century Russia was borrowed by Soviet historians from Friedrich Engels’ work on the Peasant War in Germany. The four peasant wars of the early modern period were identified as the uprisings led by Ivan Bolotnikov (1606-1607), Sten’ka Razin (1667-1671), Kondratiy Bulavin (1707-1708) and Emel’ian Pugachev (1773-1775). Following a debate in the journal Voprosy istorii in 1958-1961, the ‘first peasant war’ was generally considered to encompass the period c.1603-1614 rather than simply 1606- 1607. This approach recognised the continuities in the events of the early 17th century, and it meant that the chronological span of the ‘first peasant war’ was virtually identical to that of the older concept of the ‘Time of Troubles’. By the 1970s the term, ‘civil wars of the feudal period’ (based on a quotation from Lenin) was sometimes used to define ‘peasant wars’. It was recognised by Soviet historians that these civil wars were very complex in their social composition, and that the insurgents did not exclusively (or even primarily) comprise peasants, with Cossacks playing a particularly significant role. Nevertheless the general character of the uprisings was seen as ‘anti-feudal’. From the 1980s, however, R.G. Skrynnikov and A.L. Stanislavskiy discarded the view that the events of the ‘Time of Troubles’ constituted an anti-feudal peasant war. They preferred the term ‘civil war’, and stressed vertical rather than horizontal divisions between the two armed camps. Western historians, with the notable exception of the American historian Paul Avrich, generally rejected the application of the term ‘peasant wars’ to the Russian uprisings of the early modern period, regarding them as primarily Cossack-led revolts. From the 1960s, however, Western scholars such as Teodor Shanin (following the American anthropologist Eric Wolf) began to use the term ‘peasant wars’ in relation to the role played by peasants in 20th-century revolutionary events such as those in Russia and China. Some of these Western historians, including Avrich and Wolf, used the term not only for peasant actions in the Russian revolutions of 1905 and 1917, but also for peasant rebellions against the new Bolshevik regime (such as the Makhnovshchina and the Antonovshchina) that Soviet scholars considered to be counter-revolutionary banditry. The author argues that, in relation to the ‘Time of Troubles’ in early 20th-century Russia, the term ‘peasant war’ is not entirely suitable to describe peasant actions against the agrarian relations of the old regime in 1905 and 1917, since these were generally orderly and non-violent. The term is more appropriate for the anti-Bolshevik uprisings of armed peasant bands in 1918-1921, as suggested by the British historian Orlando Figes.
APA, Harvard, Vancouver, ISO, and other styles
34

Khezeli, Kia, and Eilyan Bitar. "Safe Linear Stochastic Bandits." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 06 (2020): 10202–9. http://dx.doi.org/10.1609/aaai.v34i06.6581.

Full text
Abstract:
We introduce the safe linear stochastic bandit framework—a generalization of linear stochastic bandits—where, in each stage, the learner is required to select an arm with an expected reward that is no less than a predetermined (safe) threshold with high probability. We assume that the learner initially has knowledge of an arm that is known to be safe, but not necessarily optimal. Leveraging on this assumption, we introduce a learning algorithm that systematically combines known safe arms with exploratory arms to safely expand the set of safe arms over time, while facilitating safe greedy exploitation in subsequent stages. In addition to ensuring the satisfaction of the safety constraint at every stage of play, the proposed algorithm is shown to exhibit an expected regret that is no more than O(√T log(T)) after T stages of play.
APA, Harvard, Vancouver, ISO, and other styles
35

Wu, Xianyi, and Xian Zhou. "Open Bandit Processes with Uncountable States and Time-Backward Effects." Journal of Applied Probability 50, no. 02 (2013): 388–402. http://dx.doi.org/10.1017/s0021900200013437.

Full text
Abstract:
Bandit processes and the Gittins index have provided powerful and elegant theory and tools for the optimization of allocating limited resources to competitive demands. In this paper we extend the Gittins theory to more general branching bandit processes, also referred to as open bandit processes, that allow uncountable states and backward times. We establish the optimality of the Gittins index policy with uncountably many states, which is useful in such problems as dynamic scheduling with continuous random processing times. We also allow negative time durations for discounting a reward to account for the present value of the reward that was received before the present time, which we refer to as time-backward effects. This could model the situation of offering bonus rewards for completing jobs above expectation. Moreover, we discover that a common belief on the optimality of the Gittins index in the generalized bandit problem is not always true without additional conditions, and provide a counterexample. We further apply our theory of open bandit processes with time-backward effects to prove the optimality of the Gittins index in the generalized bandit problem under a sufficient condition.
APA, Harvard, Vancouver, ISO, and other styles
36

Wu, Xianyi, and Xian Zhou. "Open Bandit Processes with Uncountable States and Time-Backward Effects." Journal of Applied Probability 50, no. 2 (2013): 388–402. http://dx.doi.org/10.1239/jap/1371648948.

Full text
Abstract:
Bandit processes and the Gittins index have provided powerful and elegant theory and tools for the optimization of allocating limited resources to competitive demands. In this paper we extend the Gittins theory to more general branching bandit processes, also referred to as open bandit processes, that allow uncountable states and backward times. We establish the optimality of the Gittins index policy with uncountably many states, which is useful in such problems as dynamic scheduling with continuous random processing times. We also allow negative time durations for discounting a reward to account for the present value of the reward that was received before the present time, which we refer to as time-backward effects. This could model the situation of offering bonus rewards for completing jobs above expectation. Moreover, we discover that a common belief on the optimality of the Gittins index in the generalized bandit problem is not always true without additional conditions, and provide a counterexample. We further apply our theory of open bandit processes with time-backward effects to prove the optimality of the Gittins index in the generalized bandit problem under a sufficient condition.
APA, Harvard, Vancouver, ISO, and other styles
37

Nobari, Sadegh. "DBA: Dynamic Multi-Armed Bandit Algorithm." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9869–70. http://dx.doi.org/10.1609/aaai.v33i01.33019869.

Full text
Abstract:
We introduce Dynamic Bandit Algorithm (DBA), a practical solution to improve the shortcoming of the pervasively employed reinforcement learning algorithm called Multi-Arm Bandit, aka Bandit. Bandit makes real-time decisions based on the prior observations. However, Bandit is heavily biased to the priors that it cannot quickly adapt itself to a trend that is interchanging. As a result, Bandit cannot, quickly enough, make profitable decisions when the trend is changing. Unlike Bandit, DBA focuses on quickly adapting itself to detect these trends early enough. Furthermore, DBA remains as almost as light as Bandit in terms of computations. Therefore, DBA can be easily deployed in production as a light process similar to The Bandit. We demonstrate how critical and beneficial is the main focus of DBA, i.e. the ability to quickly finding the most profitable option in real-time, over its stateof-the-art competitors. Our experiments are augmented with a visualization mechanism that explains the profitability of the decisions made by each algorithm in each step by animations. Finally we observe that DBA can substantially outperform the original Bandit by close to 3 times for a set Key Performance Indicator (KPI) in a case of having 3 arms.
APA, Harvard, Vancouver, ISO, and other styles
38

Villar, Sofía S. "INDEXABILITY AND OPTIMAL INDEX POLICIES FOR A CLASS OF REINITIALISING RESTLESS BANDITS." Probability in the Engineering and Informational Sciences 30, no. 1 (2015): 1–23. http://dx.doi.org/10.1017/s026996481500025x.

Full text
Abstract:
Motivated by a class of Partially Observable Markov Decision Processes with application in surveillance systems in which a set of imperfectly observed state processes is to be inferred from a subset of available observations through a Bayesian approach, we formulate and analyze a special family of multi-armed restless bandit problems. We consider the problem of finding an optimal policy for observing the processes that maximizes the total expected net rewards over an infinite time horizon subject to the resource availability. From the Lagrangian relaxation of the original problem, an index policy can be derived, as long as the existence of the Whittle index is ensured. We demonstrate that such a class of reinitializing bandits in which the projects' state deteriorates while active and resets to its initial state when passive until its completion possesses the structural property of indexability and we further show how to compute the index in closed form. In general, the Whittle index rule for restless bandit problems does not achieve optimality. However, we show that the proposed Whittle index rule is optimal for the problem under study in the case of stochastically heterogenous arms under the expected total criterion, and it is further recovered by a simple tractable rule referred to as the 1-limited Round Robin rule. Moreover, we illustrate the significant suboptimality of other widely used heuristic: the Myopic index rule, by computing in closed form its suboptimality gap. We present numerical studies which illustrate for the more general instances the performance advantages of the Whittle index rule over other simple heuristics.
APA, Harvard, Vancouver, ISO, and other styles
39

Sánchez Benito, José María. "Bandas armadas en los campos de la Corona de Castilla (siglos XIII-XV)Armed bands in the countryside of the Kingdom of Castile." Vínculos de Historia. Revista del Departamento de Historia de la Universidad de Castilla-La Mancha, no. 5 (May 23, 2016): 54. http://dx.doi.org/10.18239/vdh.v0i5.202.

Full text
Abstract:
RESUMEN No es difícil constatar que la presencia de bandas armadas en los campos castellanos fue bastante frecuente a lo largo de los siglos XIII-XV. Profundizando un poco más se observa –también con relativa facilidad– que los objetivos que tenían no quedaban solamente en el robo o el secuestro. Por el contrario, tales bandas, aunque diversas, se insertaban perfectamente en la conflictividad política de la época y en el entramado de la sociedad feudal. Tal es el objeto de estudio de este artículo, en cuyas páginas proponemos indagar en la variedad que presentan estos grupos para poner de manifiesto sus características, objetivos y causas. De este modo comprobaremos que la violencia depredadora que practicaban estaba a menudo orientada por los poderes de la época, a cuyas pautas e intereses servían. A tal fin comenzaré tratando acerca de golfines y almogávares a fines del siglo XIII, cuya peripecia nos permitirá una primera reflexión acerca de los factores que rodean la práctica del bandidaje. Después avanzaremos cronológicamente hacia el siglo XV, siempre atentos a las agrupaciones que, adecuadamente organizadas, tenían capacidad para llevar a cabo delitos graves en despoblado y al contexto en el cual surgían. PALABRAS CLAVE: bandas armadas, Castilla, golfines, nobleza, violencia ABSTRACT It is not difficult to show that the presence of armed bands in the Castilian countryside was quite frequent throughout the XIII-XV centuries. If we go more deeply, we can observe, with relative ease, that their purpose was not only thefts and kidnapping. On the contrary, although varied in their nature, they were fully involved in the political tensions of that period as well as in the framework of the feudal society. This is the study objective of this article. Consequently, we propose to inquire into the wide range of these groups with the aim of making their characteristics, objectives and causes clear. In this way we will confirm that their violence was often guided by the powers of the time and that they served their rules and interests. To this end, we will start by looking at golfines and almogávares of the end of the XIII century. Their behavior will allow us to make an initial reflection about the factors that surround the practice of banditry. Then we will continue chronologically to the XV century, always focused on properly organized groupings that had the capacity to carry out serious offenses in deserted areas and the context in which they arose. KEY WORDS: armed bands, Kingdom of Castile, golfines, nobility, violence
APA, Harvard, Vancouver, ISO, and other styles
40

Botte, Roger. "Révolte, Pouvoir, Religion: Les Hubbu du Fūta-Jalon (Guinée)." Journal of African History 29, no. 3 (1988): 391–413. http://dx.doi.org/10.1017/s0021853700030553.

Full text
Abstract:
In the middle of the nineteenth century, in Futa Jalon, the popular revolt of the Hubbu brutally revealed the underlying weaknesses of the most powerful state of its time in the region. A marabout of the Qādiriyya, Alfā Mamadu Dyuhe, took upon himself the leadership of the oppressed, the discontented, and the minority groups. The Hubbu survived for forty years, until exterminated by Samori in 1884, but the article concentrates on the movement from its inception in 1845 to the death of its founder in 1854, at the pinnacle of his success, in possession of the Futa state capital, Timbo. The Futa state, product of an Islamic revolution in the eighteenth century, had lost the fervour of its Fulbe founders in the endless contest for the position of Almamy between the rival lineages of Alfāyā and Soriyā. Based upon the jihād against paganism, upon the taxation of the conquered, and upon the slavery of more than half its population, it was rendered doubly oppressive by the political struggle for the rewards of power at all levels down to that of village headman, and doubly weak in consequence. The nomadic Fulbe, particularly angered by their treatment, were notably responsive to the preaching of Alfā Mamadu against the decadence and injustice of the rulers; so too were the Malinke of the eastern province of Fōduye-Haji. It was the breakdown of this large region into smaller and smaller chieftaincies, increasing the patronage of the reigning Almamy by multiplying the number of official predators, that created the special conditions for the Hubbu revolt. First the representations of Timbo, then the Alfāyā and the Soriyā themselves, were routed by the holy man and his increasingly numerous following. The religious leadership which had inspired the rising, however, faltered after Alfā Mamadu's death. The Hubbu, from hubb, ‘love’, the key word in the Arabic chant that bound them into a religious fraternity, failed to carry through their revolution, and instead became a community of refugees living by banditry. More important to their failure than the reform of the Futa state, undertaken by the Almamys at the insistence of their own clerics, was the fundamental inability of the movement, so characteristic of other popular revolts, to see the new society they wished to bring into existence as in any way different from the old. Slavery, for instance, was not abolished, despite the numbers of ex-slaves in the Hubbu ranks. Their failure was a failure of imagination.
APA, Harvard, Vancouver, ISO, and other styles
41

Eplett, W. J. R. "Continuous-time allocation indices and their discrete-time approximation." Advances in Applied Probability 18, no. 03 (1986): 724–46. http://dx.doi.org/10.1017/s0001867800016049.

Full text
Abstract:
The theory of allocation indices for defining the optimal policy in multi-armed bandit problems developed by Gittins is presented in the continuous-time case where the projects (or ‘arms’) are strong Markov processes. Complications peculiar to the continuous-time case are discussed. This motivates investigation of whether approximation of the continuous-time problems by discrete-time versions provides a valid technique with convergent allocation indices and optimal expected rewards. Conditions are presented under which the convergence holds.
APA, Harvard, Vancouver, ISO, and other styles
42

Eplett, W. J. R. "Continuous-time allocation indices and their discrete-time approximation." Advances in Applied Probability 18, no. 3 (1986): 724–46. http://dx.doi.org/10.2307/1427185.

Full text
Abstract:
The theory of allocation indices for defining the optimal policy in multi-armed bandit problems developed by Gittins is presented in the continuous-time case where the projects (or ‘arms’) are strong Markov processes. Complications peculiar to the continuous-time case are discussed. This motivates investigation of whether approximation of the continuous-time problems by discrete-time versions provides a valid technique with convergent allocation indices and optimal expected rewards. Conditions are presented under which the convergence holds.
APA, Harvard, Vancouver, ISO, and other styles
43

Choudhury, Ranjit Raja. "Black holes, time bandits and the gentleman's code." Systems Research 10, no. 3 (2007): 209–10. http://dx.doi.org/10.1002/sres.3850100325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kaspi, Haya, and Avishai Mandelbaum. "Multi-armed bandits in discrete and continuous time." Annals of Applied Probability 8, no. 4 (1998): 1270–90. http://dx.doi.org/10.1214/aoap/1028903380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Costa, Ana Clara Gomes. "Existência e inexistência de um corpo negro violável; Existence and non-existence of a violable black body; Existencia y inexistencia de un cuerpo negro violable." Comunicação & Sociedade 40, no. 3 (2018): 217. http://dx.doi.org/10.15603/2175-7755/cs.v40n3p217-240.

Full text
Abstract:
O corpo, como primeira instância das formas de existência e inexistência, é marcado por relações de poder e processos de exclusão. Há a determinação, pela lógica dominante e pela ordem normativa, de um corpo de direitos e de um corpo que pode ser violado. O corpo negro é, nesse sentido, estigmatizado e relacionado a uma imagem negativa, que o associa à marginalidade, à suspeição e ao banditismo. Os processos comunicativos do dia-a-dia promovem uma política de negação do corpo negro e, ao mesmo tempo, fixam lugares que ele pode ocupar. Para incorporá-lo ao corpo social normativo, o corpo negro, é submetido a processos de branqueamento. Tais processos corroboram para a reafirmação do racismo e das hierarquias sociorraciais presentes na realidade brasileira. Se o corpo negro não se localiza nos lugares fixados que lhes são permitidos, ele é negado e pode ser violado. The body, as the first instance of the forms of existence and non-existence, is marked by power relations and processes of exclusion. There is the determination, by the dominant logic and the normative order, of a body of rights and of a body that can be violated. The black body is, in this sense, stigmatized and related to a negative image, which associates it with marginality, suspicion and banditry. The day-to-day communicative processes promote a policy of denial of the black body and, at the same time, fix places that it can occupy. To incorporate it into the normative social body, the black body is subjected to bleaching processes. These processes corroborate the reaffirmation of racism and of the socio-racial hierarchies present in the Brazilian reality. If the black body is not located in the fixed places that are allowed to them, it is denied and can be violated. El cuerpo, como primera instancia de las formas de existencia e inexistencia, está marcado por relaciones de poder y procesos de exclusión. Hay la determinación, por la lógica dominante y por el orden normativo, de un cuerpo de derechos y de un cuerpo que puede ser violado. El cuerpo negro es, en ese sentido, estigmatizado y relacionado con una imagen negativa, que lo asocia a la marginalidad, a la sospecha y al bandidaje. Los procesos comunicativos del día a día promueven una política de negación del cuerpo negro y, al mismo tiempo, fijan lugares que él puede ocupar. Para incorporarlo al cuerpo social normativo, el cuerpo negro, es sometido a procesos de blanqueamiento. Tales procesos corroboran para la reafirmación del racismo y de las jerarquías sociorraciales presentes en la realidad brasileña. Si el cuerpo negro no se localiza en los lugares fijados que se les permite, es negado y puede ser violado.
APA, Harvard, Vancouver, ISO, and other styles
46

Cuvelier, Thibaut, Richard Combes, and Eric Gourdin. "Statistically Efficient, Polynomial-Time Algorithms for Combinatorial Semi-Bandits." Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, no. 1 (2021): 1–31. http://dx.doi.org/10.1145/3447387.

Full text
Abstract:
We consider combinatorial semi-bandits over a set of arms X \subset \0,1\ ^d where rewards are uncorrelated across items. For this problem, the algorithm ESCB yields the smallest known regret bound R(T) = O( d (łn m)^2 (łn T) / Δ_\min ) after T rounds, where m = \max_x \in X 1^\top x. However, ESCB it has computational complexity O(|X|), which is typically exponential in d, and cannot be used in large dimensions. We propose the first algorithm that is both computationally and statistically efficient for this problem with regret R(T) = O( d (łn m)^2 (łn T) / Δ_\min ) and computational asymptotic complexity O(δ_T^-1 poly(d)), where δ_T is a function which vanishes arbitrarily slowly. Our approach involves carefully designing AESCB, an approximate version of ESCB with the same regret guarantees. We show that, whenever budgeted linear maximization over X can be solved up to a given approximation ratio, AESCB is implementable in polynomial time O(δ_T^-1 poly(d)) by repeatedly maximizing a linear function over X subject to a linear budget constraint, and showing how to solve these maximization problems efficiently.
APA, Harvard, Vancouver, ISO, and other styles
47

Reiher, Jim. "Violent language – a clue to the historical occasion of James." Evangelical Quarterly 85, no. 3 (2013): 228–45. http://dx.doi.org/10.1163/27725472-08503003.

Full text
Abstract:
The epistle of James is often seen to be nothing more than a New Testament book of proverbial sayings to live the Christian life by. Form criticism over the last century has reduced James to a collection of pearls randomly strung together in no particular order and with no overarching specific theme or purpose. This paper challenges that view and offers the reader an alternative way of seeing James. It is argued that James wrote in days of social turmoil and injustice, when social banditry groups were growing in Palestine. The very vocabulary used (and illustrations made) adds weight to the thesis that James was written during violent times. James wrote in a context where even Jewish Christians were being tempted to join these pre-zealot banditry groups. Indeed some had joined and were participating in violent reprisals against the perpetrators of injustices. James is furious. He calls on Jewish Christians to live like Christ: to be non-violent, peacemakers, practical in their help for those who are suffering, patient, and prayerful. He categorically rejects the idea that Christians can use the ways of the world (violence, warring, theft) in their response to poverty and injustice.
APA, Harvard, Vancouver, ISO, and other styles
48

Tanaka, Teruo. "Continuous time two-armed bandit problems with fractional rewards." Journal of Information and Optimization Sciences 33, no. 6 (2012): 637–44. http://dx.doi.org/10.1080/02522667.2012.10700164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Shettleworth, Sara J., and Catherine M. S. Plowright. "Time horizons of pigeons on a two-armed bandit." Animal Behaviour 37 (April 1989): 610–23. http://dx.doi.org/10.1016/0003-3472(89)90040-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Dam, Caspar ten. "Brutalities in Anti‑Imperial Revolts." Politeja 12, no. 8 (31/2) (2015): 199–37. http://dx.doi.org/10.12797/politeja.12.2015.31_2.13.

Full text
Abstract:
In order to understand and resolve internal armed conflicts one must comprehend why and how people revolt, and under what conditions they brutalise i.e. increasingly resort to terrorism, banditry, brigandry, “gangsterism” and other forms of violence that violate contemporary local and/or present‑day international norms that I believe are, in the final analysis, all based on the principles of conscience, empathy and honour. Contemporary “global” or regional norms distinct from those of the rebelling community, and the norms of the regime community and/or colonial power, are also considered. My pessimistically formulated and thereby quite testable brutalisation theory combines theorising elements of disciplines ranging from cultural anthropology to military psychology, so as to better explain rebellions or any armed conflicts and their morally corrosive effects. The theory’s main variables are: violence‑values (my composite term) on proper and improper violence; conflict‑inducing motivations, in particular grievances, avarices, interests and ideologies, that bring about i.e. cause or trigger the conflict; combat‑stresses like fear, fatigue and rage resulting from or leading to traumas (and hypothetically to brutalities as well); and conflict‑induced motivations, in particular grievances, avarices, interest and ideologies, that happen by, through and during the conflict. The present paper is an exploratory introduction to an ambitious research project, succinctly titled “Brutalisation in Anti‑Imperial Revolts”, with advice and support from Professor Tomasz Polanski. The paper addresses the project’s relevance and its epistemological and methodological challenges. The project seeks to explain rebellion, banditry and other forms of violence that may or may not be inherently brutal. It seeks to ascertain the causes and degrees of any brutalisations i.e. increasing violations of norms during rebellions by peripheral, marginalised ethnic (indigenous) communities against their overlords in classical, medieval and “modern” (industrial) times. It introduces seven selected cases of “peripheral‑ethnic revolts” by indigenous communities – as (semi‑) state actors, non‑state actors or both (yet possessing at least residual ruling capabilities) – against Imperial powers across the ages, with a special focus on banditry, “brigandry” (brigandage), guerrilla and other forms of irregular warfare. The first stage of the research will analyse and compare the causes i.e. motivations and involved norms, sorts of violence and degrees of brutalisation in these seven cases.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!