Search results for "Adversary"

showing 9 items of 29 documents

Deportation vs. Sanctuary: The Rationalities, Technologies, and Subjects of Finnish Sanctuary Practices

1969


  Evangelical Lutheran parishes and their representatives have provided sanctuaries for asylum seekers for forty years in Finland.Yet this activity became widely publicly recognized only after the Finnish Ecumenical Council released the “Church as Sanctuary” document in 2007.The parishes are assisted by many civic organizations (e.g.women’s organizations, Free Movement Network, Amnesty International, and Finnish Refugee Council) in providing sanctuary.They share the same opponent: the state’s strict asylum policy.The various parties involved in Finnish sanctuary incidents can be divided into two groups using the terminology of the Foucaldian analytics of pastoral power: a state pastor…

SubjectivitySociology and Political ScienceRefugeeGeography Planning and DevelopmentOpposition (politics)AdversaryTerminologyDeportationSovereigntylcsh:HT51-1595LawPolitical Science and International Relationslcsh:Communities. Classes. RacesSociologyDemographyAmnestyRefuge: Canada's Journal on Refugees
researchProduct

Decodificando la esencia del mal, o del terror a la muerte del hijo

2011

Durante muchos años filósofos y teólogos se han cuestionado sobre la cuestión de la caída. Es innumerable la bibliografía sobre el tema como así también las propias dudas sobre la omnipresencia y sabiduría de un Dios que implícitamente o no permite la presencia del pecado por medio de su propia creación. El mito fundador de querubín Lucifer no sólo simboliza la relación entre el hombre y la traición sino también el amor filial entre el padre y su creación las cuales concilian la negación cultural de la muerte de la progenie o generaciones más jóvenes. Utilizando la teoría antropológica de los dones de M. Mauss, el presente trabajo teórico intentará explicar el origen mítico del mal dentro d…

biologylcsh:GN1-890Judaismlcsh:Geography. Anthropology. Recreationlcsh:AnthropologyGeneral Social SciencesAdversarybiology.organism_classificationChristianitylcsh:GLawPremiseSociologyTheologyRivalryLuciferRevista Mad
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct

The good, the bad and the ugly: images of the foreigner in contemporary criminal law

2018

Since the end of the Second World War, the criminal law of Western states has tried to legitimate itself, in basically democratic-republican terms, as primarily addressed towards citizens. During approximately the last 20 years, however, new dimensions of criminal law have emerged, which refer paradigmatically (not to the citizen, but) to the foreigner and subject him/her to worse legal treatment than that which is considered legitimate when either citizens or ‘good’ foreigners are concerned. Next to the ideal-type of the citizen criminal law (also applicable, by assimilation, to the ‘good’ foreigner) a criminal law for ‘ugly’ mass-foreigners (crimmigration) and one for ‘bad’ foreigners (en…

citizenshipcrimmirgationmedia_common.quotation_subjectdiritto penaleSubject (philosophy)expulsioncittadinanzaenemy criminal lawArgumentPolitical sciencecultural defenceCitizenshipcriminal lawGeneral Environmental Sciencemedia_commonespulsioneautoritàWorld War IIsocial exclusionscriminanti culturaliAdversaryesclusione socialeLawCriminal lawGeneral Earth and Planetary Sciencesdiritto penale del nemicoSocial exclusionForm of the GoodcrimmigrationauthoritySettore IUS/17 - Diritto PenaleInternational Journal of Migration and Border Studies
researchProduct

Towards digital cognitive clones for the decision-makers: adversarial training experiments

2021

Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…

cybersecurityComputer scienceProcess (engineering)päätöksentukijärjestelmätneuroverkot02 engineering and technologytekoälyAdversarial machine learningAdversarial systemHuman–computer interactionComponent (UML)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceGenerative Adversarial NetworksCloning (programming)ohjausjärjestelmät020206 networking & telecommunicationsAdversaryIndustry 4.0koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingClone (computing)Procedia Computer Science
researchProduct

The Critical Role of Morale in Ukraine’s Fight against the Russian Invasion

2020

The role of morale, also known as esprit de corps, in a high technology environment of the 21st century warfare, is poorly understood. The purpose of the study is to seek evidence for the proposition that the Ukraine’s population and military forces morale has neutralized the asymmetric difference in the military force of the two countries. The academic and practical implications have the potential to refocus military practice. An exploratory qualitative research method using theoretical sampling was used in this study. The study finds significant evidence for high morale as a balancing factor in the asymmetric differences of Russia and Ukraine, which explains Ukraine’s success against grea…

education.field_of_study05 social sciencesPopulation050301 educationTheoretical samplingPropositionAdversaryVDP::Samfunnsvitenskap: 200::Statsvitenskap og organisasjonsteori: 240Political science0502 economics and businessPositive economicseducation0503 educationPractical implications050203 business & managementQualitative research
researchProduct

Technical, tactical and spatial indicators related to goal scoring in European elite soccer

2020

The aim of this study was to describe the technical, tactical and spatial indicators related to goal scoring in elite European soccer, considering the type of defence and the positioning of the opponent. For the analysis, 8 tactical dimensions related to the final actions in 380 sequences that led to goal during the UEFA Champions League were evaluated by observational methodology. 75.9% of the goals were scored from open play and 24.1% were scored from set pieces. Collective actions produced 51.6% of the total goals while individual actions produced 10.5% of goals. Regarding the penultimate action, crosses were more frequent against organized defences, while passes in behind the defence, o…

sports performanceApplied psychologyscoring opportunitiesPhysical Therapy Sports Therapy and Rehabilitationmatch analysisLeague03 medical and health sciences0302 clinical medicineNotational analysisassociation footballEducación Física y Deportivalcsh:Sports medicineObservational methodologySports performance030229 sport sciencesAdversaryCircumstantial evidenceAssociation footballMatch analysisMatch analysisScoring opportunitiesEliteNotational analysisnotational analysisPsychologylcsh:RC1200-1245030217 neurology & neurosurgeryJournal of Human Sport and Exercise
researchProduct

'REOFUT' as an Observation Tool for Tactical Analysis on Offensive Performance in Soccer: Mixed Method Perspective

2019

Performance analysis in complex sports like soccer requires the study of the influence of the interaction between both teams during the game on final performance. The mixed methods approach involves the collection, analysis, and interpretation of qualitative and quantitative data for the same purpose and within the framework of the same study. To build certain observation tools, mixed methods are necessary in order to take advantage of integration between qualitative and quantitative elements. The aim of this study was to develop a new no standard observation tool to analyze soccer offensive performance considering not only the observed team but also some aspects of the opponent behavior, a…

systematic observationProcess managementmixed methodstacticslcsh:BF1-990050105 experimental psychology03 medical and health sciences0302 clinical medicineCohen's kappaoffensive processSoccerPsychologySport strategy0501 psychology and cognitive sciencesperformance analysisGeneral PsychologyOriginal ResearchEsportsEstratègia esportivagoal scoring opportunities05 social sciencesOffensiveAdversarysoccerUnit of analysislcsh:PsychologyFutbolObservation (Psychology)Psychology030217 neurology & neurosurgeryObservació (Psicologia)
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct