Results for 'Arvind Sharma'

94 found
Order:
  1. The case for introducing the study of religion in India.Arvind Sharma - 2016 - Argument: Biannual Philosophical Journal 6 (1):21-29.
    The author o ers a brief report of introducing the study of religion in India since 194 While doing so he refers to the Constitution of India, so-called Nehruvian Consensus, the Kothari Commission which made an important distinction between ‘religious education’ and ‘educa- tion about religion’, as well as several other bodies responsible for national policy on education, which gave a unique shape of Indian secularism.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Translation: Shri Arvind Ka Shiksha Darshan.K. K. Sharma, Saroj Sobti, Ramesh Kumar Parwa, Suresh Kumar & Desh Raj Sirswal - 2010 - Ambala Cantt.: Centre for Sri Aurobindo Studies.
    Download  
     
    Export citation  
     
    Bookmark  
  3. The Mystic and the Politician. [REVIEW]Blattberg Charles - 2013 - The Literary Review of Canada 21 (8):25-26.
    A review of Arvind Sharma's Gandhi: A Spiritual Biography (New Haven: Yale University Press, 2013).
    Download  
     
    Export citation  
     
    Bookmark  
  4.  51
    The Rise of Learning Cloud Technologies: Empowering the Digital Transformation.Akula Arvind Kumar - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (8):14671-14679.
    This comprehensive article explores the convergence of cloud computing and Java technologies, highlighting their synergistic relationship in modern software development. It examines key concepts in cloud computing, including virtualization, microservices architecture, CI/CD practices, and serverless computing. The article also discusses various cloud service models (SaaS, PaaS, and IaaS), their applications, and essential tools and technologies for cloud development. A financial institution's infrastructure modernization case study illustrates the practical implementation of these concepts, demonstrating how cloud technologies and Java can enhance agility, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. The Vindication of Tarka as a Pramāṇa in Jaina Philosophy.Arvind Jaiswal - 2019 - Śramaṇa 69 (1):61-68.
    This paper encapsulates the debate as to whether or not tarka is an additional source of knowledge. In this regard, Jaina thinkers opine that they are, unlike Buddhists and Nyāya thinkers, an additional source of knowledge, for what we come to know through tarka is not known through any other means of knowledge. En route, Jaina’s understanding of tarka is put forth, thereafter their criticism of others’ understanding is supplied. Eventually, some recent discussions over this debate are intimated that seem (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. तादात्म्य की काल-निर्णय आधृत समस्या.Arvind Jaiswal - 2017 - Anuśīlana 75:139-144.
    Download  
     
    Export citation  
     
    Bookmark  
  7. क्या प्रमाणित सत्य विश्वास प्रमा है?Arvind Jaiswal - manuscript
    गेटिअर के शोध-पत्र "Is Justified Treu Belief Knowledge" जो कि ANALYSIS में 1963 में प्रकाशित हुआ था उसका यह हिन्दी अनुवाद है। .
    Download  
     
    Export citation  
     
    Bookmark  
  8.  22
    The Role of Artificial Intelligence in Enhancing Automated Threat Hunting 1Mr.Sidharth Sharma.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-6.
    An increasing number of enterprises are using artificial intelligence (AI) to improve their cyber security and threat intelligence. AI is a type of AI that generates new data independently of preexisting data or expert knowledge. One emerging cyberthreat to systems that has been increasing is adversarial attacks. By generating fictitious accounts and transactions, adversarial attacks can interfere with and take advantage of decentralized apps that operate on the Ethereum network. Because fraudulent materials (such as accounts and transactions) used as malicious (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Short report on initial political polarization/argument visualization study.Simon Cullen & Vidushi Sharma - manuscript
    This document provides a brief report on initial research into how argument presentation affects susceptibility to confirmation bias as well as feelings toward political opponents.
    Download  
     
    Export citation  
     
    Bookmark  
  10. From Pluralistic Normative Principles to Autonomous-Agent Rules.Beverley Townsend, Colin Paterson, T. T. Arvind, Gabriel Nemirovsky, Radu Calinescu, Ana Cavalcanti, Ibrahim Habli & Alan Thomas - 2022 - Minds and Machines 1 (4):1-33.
    With recent advancements in systems engineering and artificial intelligence, autonomous agents are increasingly being called upon to execute tasks that have normative relevance. These are tasks that directly—and potentially adversely—affect human well-being and demand of the agent a degree of normative-sensitivity and -compliance. Such norms and normative principles are typically of a social, legal, ethical, empathetic, or cultural nature. Whereas norms of this type are often framed in the abstract, or as high-level principles, addressing normative concerns in concrete applications of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  36
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  12.  48
    THE GROWING THREAT OF DEEPFAKES: IMPLICATIONS FOR SECURITY AND PRIVACY.Sharma Sidharth - 2020 - Journal of Artificial Intelligence and Cyber Security (Jaics) 4 (1):24-29.
    Deep fakes, a technology enabling the creation of highly realistic fake images and videos through face-swapping, have sparked significant attention due to their potential for misuse. This paper explores the technologies behind deep fakes and categorizes them into four types: deep fake pornography, political campaigns, commercial uses, and creative content. The authors discuss the ethical and regulatory challenges associated with each category. Initially, deep fakes were used maliciously, such as in revenge porn and political manipulation, which led to widespread fear. (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  13.  45
    Detecting and Mitigating The Spread of Misinformation By AI-Generated Content.Sharma Sidharth - 2015 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Misinformation has been a persistent and detrimental phenomenon in our society in many ways, including individuals' physical health and economic security. With the advent of short video platforms and associated applications, dissemination of multi-modal misinformation, including images, texts, audios, and videos, have increased these issues. The advent of generative AI models such as ChatGPT and Stable Diffusion has further enhanced the complexity, providing give rise to Artificial Intelligence Generated Content (AIGC) and posing new challenges in the detection and mitigation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  39
    QUANTUM-ENHANCED ENCRYPTION TECHNIQUES FOR CLOUD DATA PROTECTION.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):15-20.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a lattice-based encryption mechanism. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  15.  38
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic traffic (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  16.  40
    POST-QUANTUM CRYPTOGRAPHY: PREPARING FOR A QUANTUM COMPUTING ERA.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-6.
    The rapid advancement of quantum computing poses a significant threat to classical cryptographic systems, particularly those based on RSA, ECC, and other public-key algorithms. With Shor’s algorithm capable of efficiently factoring large numbers and breaking current encryption standards, the transition to postquantum cryptography (PQC) has become a global priority. This paper explores the impact of quantum computing on cryptographic security, the need for quantum-resistant cryptographic algorithms, and ongoing standardization efforts led by organizations such as NIST. We analyze various post-quantum cryptographic (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  17.  19
    Post-Quantum Cryptography: Readying Security for the Quantum Computing Revolution.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research (Ijsmir) 2 (1):1-5.
    The rapid advancement of quantum computing poses a significant threat to classical cryptographic systems, particularly those based on RSA, ECC, and other public-key algorithms. With Shor’s algorithm capable of efficiently factoring large numbers and breaking current encryption standards, the transition to postquantum cryptography (PQC) has become a global priority. This paper explores the impact of quantum computing on cryptographic security, the need for quantum-resistant cryptographic algorithms, and ongoing standardization efforts led by organizations such as NIST. We analyze various post-quantum cryptographic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  51
    RANSOMWARE TRENDS AND EFFECTIVE MITIGATION TECHNIQUES IN 2018.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-5.
    : Ransomware remains one of the most significant cybersecurity threats, evolving rapidly with new attack vectors, encryption techniques, and extortion models. As we enter 2018, ransomware attacks have become more sophisticated, leveraging artificial intelligence (AI), automation, and emerging technologies to bypass traditional security measures. This paper analyzes the latest ransomware trends, including targeted attacks on critical infrastructure, Ransomware-as-a-Service (RaaS), and double/triple extortion tactics. Additionally, it explores advanced mitigation techniques such as AI-driven anomaly detection, zero-trust architectures, blockchain-based security solutions, and proactive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  17
    Data Loss Prevention (DLP) Strategies for Cloud-Hosted Applications.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    The assessment of cloud data loss prevention and encryption was the main emphasis of the current study. Cloud computing, another name for cloud-based technologies, boosts organizational effectiveness for appropriate data management procedures. By improving data visualization, cloud-based data loss or leakage prevention (DLP) helps businesses comprehend the risks and problems associated with appropriate data management. This study demonstrated how to handle data with encryption. The growth of company processes and the effective management of all activities through data management can benefit (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  35
    MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine learning techniques (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  21.  27
    Strengthening Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-663.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network traffic, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  30
    Homomorphic Encryption: Enabling Secure Cloud Data Processing.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):260-264.
    Homomorphic encryption is a transformative cryptographic technique that enables secure cloud data processing by allowing computations on encrypted data without requiring decryption. Unlike traditional encryption methods, which protect data only at rest and in transit, homomorphic encryption ensures end-to-end security, even during computation. This capability is particularly vital for industries that rely on cloud computing while handling sensitive information, such as finance, healthcare, and government sectors. However, despite its strong security guarantees, the widespread adoption of homomorphic encryption remains limited due (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  4
    Ethics and Accountability Frameworks for AI Systems.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-5.
    t. Intense discussions concerning the hazards and ethical ramifications of artificial intelligence were sparked by its introduction and broad societal adoption. Traditional discriminative machine learning carries hazards that are frequently different from these risks. A scoping review on the ethics of artificial intelligence, with a focus on big language models and text-to-image models, was carried out in order to compile the recent discourse and map its normative notions. Enforcing accountability, responsibility, and adherence to moral and legal standards will become more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  30
    Zero Trust Architecture: A Key Component of Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-208.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (AI), (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  28
    Multi-Cloud Environments: Reducing Security Risks in Distributed Architectures.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5 (1):1-6.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  83
    Advancements and Applications of Generative Artificial Intelligence and show the Experimental Evidence on the Productivity Effects using Generative Artificial Intelligence.Sharma Sakshi - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology (Ijmrset) 6 (3):657-664.
    We investigate the productivity impacts of a generative artificial intelligence technology—specifically, the assistive chatbot ChatGPT—within the realm of mid-level professional writing tasks. In a preregistered online experiment, we assigned occupation-specific, incentivized writing tasks to 444 college-educated professionals, with half of the participants randomly exposed to ChatGPT. Our findings reveal that ChatGPT significantly enhances average productivity: the time taken to complete tasks decreases by 0.8 standard deviations, and output quality improves by 0.4 standard deviations. Additionally, the use of ChatGPT reduces inequality (...)
    Download  
     
    Export citation  
     
    Bookmark   83 citations  
  27.  37
    The Rising Threat of Deepfakes: Security and Privacy Implications.Sharma Sidharth - 2020 - Journal of Artificial Intelligence and Cyber Security (Jaics) 4 (1):1-6.
    Deep fakes, a technology enabling the creation of highly realistic fake images and videos through face-swapping, have sparked significant attention due to their potential for misuse. This paper explores the technologies behind deep fakes and categorizes them into four types: deep fake pornography, political campaigns, commercial uses, and creative content. The authors discuss the ethical and regulatory challenges associated with each category. Initially, deep fakes were used maliciously, such as in revenge porn and political manipulation, which led to widespread fear. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  68
    Assessment of Web Services based on SOAP and REST Principles using Different Metrics for Mobile Environment and Multimedia Conference.Sharma Sakshi - 2023 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 12 (8):1701-1709.
    This article presents a comprehensive assessment of web services based on SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) principles, focusing on their application in mobile environments and multimedia conference scenarios. As web services enable seamless communication and data exchange across diverse systems, understanding their performance characteristics in different contexts is crucial. SOAP, with its protocol-driven approach and emphasis on security and reliability, and REST, known for its simplicity, scalability, and efficiency, are evaluated using key performance metrics such (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  29.  84
    A Large-Scale Empirical Study Identifying Practitioners' Perspectives on Challenges in Docker Development: Analysis using Stack Overflow.Sharma Sakshi - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (2):1104-1111.
    This study investigates Docker-related topics and challenges through an analysis of Stack Overflow posts to identify prevalent issues and trends in Docker development. By leveraging both tag-based and content-based filtering methods, we compiled a comprehensive dataset of Docker discussions. Latent Dirichlet Allocation (LDA) topic modeling was employed to categorize these discussions, revealing that Application Development is the predominant focus, encompassing areas such as Framework Management, Coding Issues, Data Transfer, and Dockerspecific frameworks. This dominant category reflects developers' substantial interest in leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   95 citations  
  30.  18
    Quantum-Enhanced Encryption Methods for Securing Cloud Data.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-5.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a lattice-based encryption mechanism. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  76
    Design and Implementation of a Pattern-based J2EE Application Development Environment.Sharma Sakshi - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 11 (1):190-200.
    This paper presents the design and implementation of a pattern-based J2EE application development environment aimed at streamlining the development process, enhancing code quality, and improving maintainability. We begin with an exploration of the fundamental principles of J2EE and the role of design patterns in software engineering. This is followed by a detailed discussion on the selection and application of various design patterns specifically tailored for J2EE, such as Singleton, Factory, Data Access Object (DAO), and Model-View-Controller (MVC).
    Download  
     
    Export citation  
     
    Bookmark   70 citations  
  32.  80
    Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications.Sharma Sakshi - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (12):12220-12226.
    Traditional project risk management techniques are becoming less and less effective in the age of Industry 4.0, which is defined by sophisticated automation, data interchange, and cyber-physical systems. It suggests a new framework that improves risk detection, assessment, and mitigation techniques by utilising technology like artificial intelligence (AI), big data analytics, and the Internet of Things (IoT). This paper illustrates how Industry 4.0 is revolutionising risk management procedures by looking at actual case studies and industry implementations. The framework offers practical (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  33.  46
    Deep Learning-Based Speech Emotion Recognition.Sharma Karan - 2022 - International Journal of Multidisciplinary and Scientific Emerging Research 10 (2):715-718.
    Speech Emotion Recognition (SER) is an essential component in human-computer interaction, enabling systems to understand and respond to human emotions. Traditional emotion recognition methods often rely on handcrafted features, which can be limited in capturing the full complexity of emotional cues. In contrast, deep learning approaches, particularly convolutional neural networks (CNNs), recurrent neural networks (RNNs), and long short-term memory (LSTM) networks, offer more robust solutions by automatically learning hierarchical features from raw audio data. This paper reviews recent advancements in deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Diversity and Conservation Status of Fishes Inhabiting Chittaura Jheel, Bahraich, U.P.D. K. Yadav & A. K. Sharma - 2021 - Bulletin of Pure and Applied Sciences 40 (2):298-303.
    A study was carried out from October, 2020 to September, 2021to investigate the diversity of fishes and the conservation status of Chittaura Jheel (Bahraich), Uttar Pradesh. During the study period, 38 fish species belonging to 28 genera, 14 families and 7 orders have been identified. The order Cypriniformes was found the dominated order with 15 species(39.47%) followed by Siluriformes 10 species (26.31%), Perciformes 4 species (10.52%), Ophiocephaliformes 4 species (10.52%), Synbranchiformes2 species (5.26%), Osteoglossiformes 2 species (5.26%) and Clupiformes 1 species (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  65
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (AI), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  57
    The Role of Homomorphic Encryption in Secure Cloud Data Processing.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):260-265.
    Homomorphic encryption is a transformative cryptographic technique that enables secure cloud data processing by allowing computations on encrypted data without requiring decryption. Unlike traditional encryption methods, which protect data only at rest and in transit, homomorphic encryption ensures end-to-end security, even during computation. This capability is particularly vital for industries that rely on cloud computing while handling sensitive information, such as finance, healthcare, and government sectors. However, despite its strong security guarantees, the widespread adoption of homomorphic encryption remains limited due (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  37
    Improving Generative AI Models for Secure and Private Data Synthesis.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):210-215.
    Generative Adversarial Networks (GANs) have demonstrated significant potential in generating synthetic data for various applications, including those involving sensitive information like healthcare and finance. However, two major issues arise when GANs are applied to sensitive datasets: (i) the model may memorize training samples, compromising the privacy of individuals, especially when the data includes personally identifiable information (PII), and (ii) there is a lack of control over the specificity of the generated samples, which limits their utility for tailored use-cases. To address (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  37
    Improving Generative AI Models for Secure and Private Data Synthesis.Sharma Sidharth - 2015 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Generative Adversarial Networks (GANs) have demonstrated significant potential in generating synthetic data for various applications, including those involving sensitive information like healthcare and finance. However, two major issues arise when GANs are applied to sensitive datasets: (i) the model may memorize training samples, compromising the privacy of individuals, especially when the data includes personally identifiable information (PII), and (ii) there is a lack of control over the specificity of the generated samples, which limits their utility for tailored usecases. To address (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  36
    The Role of AI in Automated Threat Hunting.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-10.
    An increasing number of enterprises are using artificial intelligence (AI) to improve their cyber security and threat intelligence. AI is a type of AI that generates new data independently of preexisting data or expert knowledge. One emerging cyberthreat to systems that has been increasing is adversarial attacks. By generating fictitious accounts and transactions, adversarial attacks can interfere with and take advantage of decentralized apps that operate on the Ethereum network. Because fraudulent materials (such as accounts and transactions) used as malicious (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  31
    Privacy-Enhanced Generative AI for Healthcare Synthetic Data Creation.Sharma Sidharth - 2015 - International Journal o Fengineering Innovations and Managementstrategies, 1 (1):1-5.
    The exponential growth of healthcare data, along with its sensitive nature, has necessitated the development of innovative solutions for protecting patient privacy. Generative AI techniques, such as Generative Adversarial Networks (GANs), have shown promise in creating synthetic healthcare data that mirrors real-world patterns while preserving confidentiality. This paper proposes a privacy-enhanced generative AI framework for the creation of synthetic healthcare data. By incorporating differential privacy and federated learning, the system aims to enhance privacy while maintaining data utility for healthcare research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  27
    Optimized Cooling Solutions for Hybrid Electric Vehicle Powertrains.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research (Ijsmir) 2 (1):1-5.
    Hybrid Electric Vehicles (HEVs) have gained significant popularity due to their reduced environmental impact and fuel efficiency. However, the complex integration of electrical and mechanical systems in HEVs presents significant cooling challenges. A robust cooling system is essential to maintain optimal performance and extend the lifespan of powertrains and battery systems. This paper explores the development of an advanced cooling system designed specifically for HEV powertrains, leveraging modern technologies such as heat exchangers, liquid cooling, and smart thermal management systems. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  25
    Privacy-Preserving Generative AI for Secure Healthcare Synthetic Data Generation.Sharma Sidharth - 2015 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-3.
    The exponential growth of healthcare data, along with its sensitive nature, has necessitated the development of innovative solutions for protecting patient privacy. Generative AI techniques, such as Generative Adversarial Networks (GANs), have shown promise in creating synthetic healthcare data that mirrors real-world patterns while preserving confidentiality. This paper proposes a privacy-enhanced generative AI framework for the creation of synthetic healthcare data. By incorporating differential privacy and federated learning, the system aims to enhance privacy while maintaining data utility for healthcare research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  25
    Real-Time Malware Detection Using Machine Learning Algorithms.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-8.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine learning techniques (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Oxidative Cleavage of Alpha Amino Acids ℓ–Glycine and ℓ–Valine By1,3-Dichloro-5,5-Dimethylhydantoin in Medium of Aqueous Acetic Acid Medium.Shweta Neeraj, Arvind Prasad Dwivedi & S. S. Parihar - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (10):27-31.
    Abstract: 1,3-dichloro-5,5-dimethylhydantoin (DCDMH) hydrolysed of this compounds leads to the formation of active positive halogen species like HOCl and H2O+Cl. The H2O+Cl in non-polar or less polar media, extensively used as a chlorinating and oxidizing agents in organic substrate. The rate of reaction is enhanced by the increasing [H+] and percentage of acetic acid. The main product of the oxidation is corresponding aldehydes. The thermodynamic parameters for the oxidation have been computed in the show step mechanism. The observed rate law (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Kundalini Yoga & Gayathri Mantra in Valmiki Ramayana.Seshendra Sharma Mr - manuscript
    Valmiki , The Sage of 5th century B.C wrote The Ramayana not to narrate the story of Rama in an absorbing style. Though the epic poem presents Rama’s Journey of life in enchanting poetry , the story and the enchanting poetry are sugar coating or honey to the organic medicine called Kundalini Yoga. Maharshi Valmiki wrote the Ramayana to spread / propagate Kundalini Yoga among the masses. Thus the soul of The Ramayana is Kundalini Yoga / Sri Vidya. Valmiki embedded (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Heidegger Being and Time, Sein und Zeit (1927): An Index.Daniel Fidel Ferrer & Ritu Sharma - 2016 - archive.org.
    Heidegger Being and Time, Sein und Zeit (1927): An Index -/- By -/- Daniel Fidel Ferrer -/- and -/- Ritu Sharma -/- 1. Heidegger, Martin, -- 1889-1976. 2. Heidegger, Martin, -- 1889-1976 -- Concordances. 3. Heidegger, Martin, -- 1889-1976 -- Indexes. 4). Metaphysics. 5). Philosophy, German. 6). Heidegger, Martin; -- Wörterbuch. 7). Sein und Zeit. English. 8). Ontology. 9). Space and time. 10). Being and Time [Sein und Zeit]. I. Ferrer, Daniel Fidel, 1952-. II. Sharma, Ritu. -/- Pages (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  45
    Examination of Anomaly Process Detection Using Negative Selection Algorithm and Classification Techniques.Sharma Sakshi - 2020 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 9 (6):2526-2534.
    The examination of anomaly process detection using negative selection algorithms and classification techniques focuses on enhancing the ability to identify deviations from expected patterns within complex data sets. Negative selection algorithms, inspired by biological immune systems, offer a novel approach to anomaly detection by efficiently distinguishing between normal and anomalous data points. When combined with various classification techniques, these algorithms can improve the accuracy and robustness of anomaly detection systems. This abstract explores the integration of negative selection algorithms with traditional (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  48.  33
    DATA LOSS PREVENTION (DLP) STRATEGIES IN CLOUD-HOSTED APPLICATIONS.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-8.
    The assessment of cloud data loss prevention and encryption was the main emphasis of the current study. Cloud computing, another name for cloud-based technologies, boosts organizational effectiveness for appropriate data management procedures. By improving data visualization, cloud-based data loss or leakage prevention (DLP) helps businesses comprehend the risks and problems associated with appropriate data management. This study demonstrated how to handle data with encryption. The growth of company processes and the effective management of all activities through data management can benefit (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  49. Factor Affecting Customer Service in Supply Chain Management of Small and Medium Enterprises: An Empirical Study of Jammu Region.Sanjeev Lalhotra & Prof B. C. Sharma - 2014 - SOCRATES 2 (JUNE 2014):149-165.
    Factor Affecting Customer Service in Supply Chain Management of Small and Medium Enterprises: An Empirical Study of Jammu Region -/- Author / Authors : Sanjeev Lalhotra and Prof. B.C Sharma Page no.149-165 Discipline : Applied Economics/ Management/ Commerce Script/language : Roman/English Category : Research paper Keywords: Customer services, Supply Chain Management, Small and Medium Enterprises.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Phaedo 100B3-9.Ravi Sharma - 2015 - Mnemosyne 68 (3):393-412.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 94