Results for 'Mithun Bantwal Rao'

28 found
Order:
  1. Interval Valued Neutrosophic Soft Topological Spaces.Anjan Mukherjee, Mithun Datta & Florentin Smarandache - 2014 - Neutrosophic Sets and Systems 6:18-27.
    In this paper we introduce the concept of interval valued neutrosophic soft topological space together with interval valued neutrosophic soft finer and interval valued neutrosophic soft coarser topology. We also define interval valued neutrosophic interior and closer of an interval valued neutrosophic soft set. Some theorems and examples are cites. Interval valued neutrosophic soft subspace topology are studied. Some examples and theorems regarding this concept are presented.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Cooperative Solutions to Exploration Tasks Under Speed and Budget Constraints.Karishma Lnu & Shrisha Rao - 2023 - Journal of Simulation 17 (6):676--687.
    We present a multi-agent system where agents can cooperate to solve a system of dependent tasks, with agents having the capability to explore a solution space, make inferences, as well as query for information under a limited budget. Re-exploration of the solution space takes place by an agent when an older solution expires and is thus able to adapt to dynamic changes in the environment. We investigate the effects of task dependencies, with highly-dependent graph G_40 (a well-known program graph that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Ethics, Prosperity, and Society: Moral Evaluation Using Virtue Ethics and Utilitarianism.Aditya Hegde, Vibhav Agarwal & Shrisha Rao - 2020 - 29th International Joint Conference on Artificial Intelligence and the 17th Pacific Rim International Conference on Artificial Intelligence (IJCAI-PRICAI 2020).
    Modelling ethics is critical to understanding and analysing social phenomena. However, prior literature either incorporates ethics into agent strategies or uses it for evaluation of agent behaviour. This work proposes a framework that models both, ethical decision making as well as evaluation using virtue ethics and utilitarianism. In an iteration, agents can use either the classical Continuous Prisoner's Dilemma or a new type of interaction called moral interaction, where agents donate or steal from other agents. We introduce moral interactions to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Bridging eastern and western perspectives on consciousness: Comment.K. Ramakrishna Rao - 2002 - Journal of Consciousness Studies 9 (11):63-68.
    Download  
     
    Export citation  
     
    Bookmark  
  5. Egocentric Bias and Doubt in Cognitive Agents.Nanda Kishore Sreenivas & Shrisha Rao - forthcoming - 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), Montreal, Canada, May 2019.
    Modeling social interactions based on individual behavior has always been an area of interest, but prior literature generally presumes rational behavior. Thus, such models may miss out on capturing the effects of biases humans are susceptible to. This work presents a method to model egocentric bias, the real-life tendency to emphasize one's own opinion heavily when presented with multiple opinions. We use a symmetric distribution, centered at an agent's own opinion, as opposed to the Bounded Confidence (BC) model used in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big challenge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced Persistent Threats (APTs), Automated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. MITIGATING NETWORK THREATS: INTEGRATING THREAT MODELING IN NEXT-GENERATION FIREWALL ARCHITECTURE.Sanagana Durga Prasada Rao - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-209.
    In the face of increasingly sophisticated cyber threats, traditional reactive network security measures are insufficient. This paper explores the integration of threat modeling into next-generation firewall (NGFW) architecture as a proactive strategy to enhance network defenses. Threat modeling involves systematically identifying potential threats and vulnerabilities, allowing organizations to anticipate and mitigate risks before exploitation. NGFWs, with their advanced capabilities such as deep packet inspection, intrusion prevention systems, and application awareness, can leverage threat modeling to analyze traffic patterns and prioritize responses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. PREVENTING INSIDER THREATS IN CLOUD ENVIRONMENTS: ANOMALY DETECTION AND BEHAVIORAL ANALYSIS APPROACHES.Sanagana Durga Prasada Rao - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):225-232.
    Insider threats pose a significant risk to cloud environments, where traditional security measures may fall short. This manuscript delves into the use of anomaly detection and behavioral analysis to mitigate these risks. We explore the unique challenges of cloud security, examine current methodologies, and provide practical insights into implementing effective insider threat detection mechanisms. By integrating these advanced techniques, organizations can enhance their security posture and protect sensitive data in the cloud. In today's digital age, the fusion of cybersecurity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  11. THE SYNERGY OF CYBERSECURITY AND NETWORK ARCHITECTURE: A HOLISTIC APPROACH TO RESILIENCE.Sanagana Durga Prasada Rao - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):218-224.
    In the digital age, the convergence of cybersecurity and network architecture has become pivotal in ensuring organizational resilience. This manuscript explores the intertwined relationship between these two domains, emphasizing a holistic approach to safeguarding information systems. By integrating robust network design principles with advanced cybersecurity measures, organizations can build resilient infrastructures capable of withstanding sophisticated cyber threats. This paper delves into the theoretical foundations, practical implementations, and future directions for achieving synergy between cybersecurity and network architecture.
    Download  
     
    Export citation  
     
    Bookmark  
  12. Design and Evaluation of a Wireless Electronic Health Records System for Field Care in Mass Casualty Settings.David Kirsh, L. A. Lenert, W. G. Griswold, C. Buono, J. Lyon, R. Rao & T. C. Chan - 2011 - Journal of the American Medical Informatic Association 18 (6):842-852.
    There is growing interest in the use of technology to enhance the tracking and quality of clinical information available for patients in disaster settings. This paper describes the design and evaluation of the Wireless Internet Information System for Medical Response in Disasters (WIISARD).
    Download  
     
    Export citation  
     
    Bookmark  
  13.  92
    Modelling prejudice and its effect on societal prosperity.Deep Inder Mohan, Arjun Verma & Shrisha Rao - 2023 - Journal of Simulation 17 (6):647--657.
    Existing studies of the multi-group dynamics of prejudiced societies focus on the social- psychological knowledge behind the relevant processes. We instead create a multi-agent framework that simulates the propagation of prejudice and measures its tangible impact on prosperity. Levels of prosperity are tracked for individuals as well as larger social structures including groups and factions. We model social interactions using the Continuous Prisoner's Dilemma (CPD) and a new agent type called a prejudiced agent. Our simulations show that even modeling prejudice (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Artificial Leviathan: Exploring Social Evolution of LLM Agents Through the Lens of Hobbesian Social Contract Theory.Gordon Dai, Weijia Zhang, Jinhan Li, Siqi Yang, Chidera Ibe, Srihas Rao, Arthur Caetano & Misha Sra - manuscript
    The emergence of Large Language Models (LLMs) and advancements in Artificial Intelligence (AI) offer an opportunity for computational social science research at scale. Building upon prior explorations of LLM agent design, our work introduces a simulated agent society where complex social relationships dynamically form and evolve over time. Agents are imbued with psychological drives and placed in a sandbox survival environment. We conduct an evaluation of the agent society through the lens of Thomas Hobbes's seminal Social Contract Theory (SCT). We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Constructing a hermeneutics of re-cognition: accessing Raja Rao’s corpus.Subhasis Chattopadhyay - manuscript
    Lisa Zunshine stayed at Hotel Laxmi Park at Bishnupur, I do not know whether that hotel exists now or not. I sparred with Rukmani Bhaya Nair at an international literary meet at Dehradun in 2017 and I have that video. In this hurriedly written essay for an FDP conducted by a Central University in India in collaboration with a College in New Delhi, I point out the need to distinguish between philosophy and darśana while accessing the corpus of Raja Rao. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Derivation of the Cramer-Rao Bound.Ryan Reece - manuscript
    I give a pedagogical derivation of the Cramer-Rao Bound, which gives a lower bound on the variance of estimators used in statistical point estimation, commonly used to give numerical estimates of the systematic uncertainties in a measurement.
    Download  
     
    Export citation  
     
    Bookmark  
  17.  98
    Thiếu thốn tài chính đang là rào cản trong công cuộc chống khủng hoảng khí hậu.Phú Kiên Cường Nghiêm - manuscript
    Ông Ban Ki-moon, cựu Tổng thư ký Liên hợp quốc hiện đang đóng vai trò Chủ tịch Global Center on Adaptation (GCA), mới có xác nhận tại Africa Climate Summit diễn ra ở Nairobi, về nguy cơ tình trạng thiếu thốn tài chính sẽ ngăn cản những tiến bộ tiếp theo, thậm chí đe dọa cả những kết quả tích cực về bảo tồn sinh thái đã đạt được, tại Châu Phi.
    Download  
     
    Export citation  
     
    Bookmark  
  18. Thiếu thốn tài chính đang là rào cản trong công cuộc chống khủng hoảng khí hậu tại châu Phi.Phú Kiên Cường Nghiêm - 2023 - Kinh Tế Và Dự Báo 27021.
    Châu Phi hiện được đánh giá là chịu tác động tiêu cực nặng nhất của cuộc khủng hoảng khí hậu, nhưng chỉ được phân bổ 3% tổng lượng tài chính thích ứng khí hậu, tài chính cần thiết để thiết kế chuyển đổi, thích ứng phương thức hoạt động kinh tế.
    Download  
     
    Export citation  
     
    Bookmark  
  19.  93
    Madeleine Albright, Fascismul. Un avertisment, Editura RAO, București, 2019. [REVIEW]Ovidiu Gherasim-Proca - 2023 - Analele Ştiinţifice Ale Universităţii „Alexandru Ioan Cuza” Din Iaşi. Ştiinţe Politice 18:89-95.
    În ciuda faptului că nu contribuie la ordonarea cunoașterii actuale despre fascism, ci dimpotrivă, creează confuzie, lucrarea Madeleinei Albright are unele merite incontestabile. Primul dintre ele este capacitatea de a simplifica, într-o naraţiune scurtă, ușor de parcurs, ideile și faptele liderilor fasciști interbelici. Începând cu capitolul al doilea și până la cel de-al cincilea, istorisirea ar putea să fie folosită ca un foarte accesibil, viu și instructiv rezumat istoric pentru studenţi. Cu certitudine, experienţa profesorală a autoarei în învăţământul politic american (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Collected Papers (on various scientific topics), Volume XII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This twelfth volume of Collected Papers includes 86 papers comprising 976 pages on Neutrosophics Theory and Applications, published between 2013-2021 in the international journal and book series “Neutrosophic Sets and Systems” by the author alone or in collaboration with the following 112 co-authors (alphabetically ordered) from 21 countries: Abdel Nasser H. Zaied, Muhammad Akram, Bobin Albert, S. A. Alblowi, S. Anitha, Guennoun Asmae, Assia Bakali, Ayman M. Manie, Abdul Sami Awan, Azeddine Elhassouny, Erick González-Caballero, D. Dafik, Mithun Datta, Arindam (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Tiến sĩ Vương Quân Hoàng: Chống “ngộ độc” nguồn lực.Trinh Nguyễn - 2013 - Thanh Niên 2013 (1):1-6.
    Nhiều người vẫn cho thiếu đầu tư là một rào cản phát triển xã hội. TS kinh tế Vương Quân Hoàng lo ngại “ngộ độc” nguồn lực hơn.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Collected Papers (Neutrosophics and other topics), Volume XIV.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This fourteenth volume of Collected Papers is an eclectic tome of 87 papers in Neutrosophics and other fields, such as mathematics, fuzzy sets, intuitionistic fuzzy sets, picture fuzzy sets, information fusion, robotics, statistics, or extenics, comprising 936 pages, published between 2008-2022 in different scientific journals or currently in press, by the author alone or in collaboration with the following 99 co-authors (alphabetically ordered) from 26 countries: Ahmed B. Al-Nafee, Adesina Abdul Akeem Agboola, Akbar Rezaei, Shariful Alam, Marina Alonso, Fran Andujar, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Collected Papers (on Neutrosophic Theory and Applications), Volume VIII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This eighth volume of Collected Papers includes 75 papers comprising 973 pages on (theoretic and applied) neutrosophics, written between 2010-2022 by the author alone or in collaboration with the following 102 co-authors (alphabetically ordered) from 24 countries: Mohamed Abdel-Basset, Abduallah Gamal, Firoz Ahmad, Ahmad Yusuf Adhami, Ahmed B. Al-Nafee, Ali Hassan, Mumtaz Ali, Akbar Rezaei, Assia Bakali, Ayoub Bahnasse, Azeddine Elhassouny, Durga Banerjee, Romualdas Bausys, Mircea Boșcoianu, Traian Alexandru Buda, Bui Cong Cuong, Emilia Calefariu, Ahmet Çevik, Chang Su Kim, Victor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Shodasi : Secrets of the Ramayana.Seshendra Sharma & Sharma Seshendra - 2015 - Hyderabad : India: Saatyaki S/o Seshendra Sharma.
    Ramayan Through Kundalini Yoga Shodasi is an ideal read for Sanskrit-literate readers who are open to eclectic yogarthas and connotative meanings -------- So you thought Vyasa was before Valmiki, Mahabharat was before Ramayan, Rama a Vishnu avatar, and tantrism distinct from vedism? Think again. In Shodasi: Secrets of the Ramayana, Telugu poet Seshendra Sharma re-reads the Ramayan to come up with a number of new conclusions. Much of the book sets out to prove that Ramayan was written before the Mahabharat. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Tiến bộ công nghệ, AI: Kỷ nguyên số và an ninh thông tin quốc gia.Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - manuscript
    Sự tiến bộ nhanh chóng của các nền tảng Công nghệ Thông tin (CNTT) và ngôn ngữ lập trình đã làm thay đổi hình thái vận động và phát triển của xã hội loài người. Không gian mạng và các tiện ích đi kèm ngày càng được mở rộng, dẫn đến sự chuyển dịch dần từ đời sống trong thế giới thực sang đời sống trong thế giới ảo (còn gọi là không gian mạng hay không gian số). Sự mở (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Một số vấn đề an ninh thông tin trọng yếu trong kỷ nguyên AI.Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - 2024 - Cổng Thông Tin Điện Tử Học Viện Cảnh Sát Nhân Dân.
    Sự tiến bộ nhanh chóng của các nền tảng Công nghệ Thông tin (CNTT) và ngôn ngữ lập trình đã làm thay đổi hình thái vận động và phát triển của xã hội loài người. Không gian mạng và các tiện ích đi kèm ngày càng được mở rộng, dẫn đến sự chuyển dịch dần từ đời sống trong thế giới thực sang đời sống trong thế giới ảo (còn gọi là không gian mạng hay không gian số). Trong bối (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Một số vấn đề an ninh thông tin trọng yếu trong kỷ nguyên AI (Phần 1: Tiến bộ công nghệ - Thách thức).Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - 2024 - Hội Đồng Lý Luận Trung Ương.
    Sự tiến bộ nhanh chóng của các nền tảng Công nghệ Thông tin (CNTT) và ngôn ngữ lập trình đã làm thay đổi hình thái vận động và phát triển của xã hội loài người. Không gian mạng và các tiện ích đi kèm ngày càng được mở rộng, dẫn đến sự chuyển dịch dần từ đời sống trong thế giới thực sang đời sống trong thế giới ảo (còn gọi là không gian mạng hay không gian số). Sự mở (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Một số vấn đề an ninh thông tin trọng yếu trong kỷ nguyên AI (Phần 2: Con người - Xã hội).Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - 2024 - Hội Đồng Lý Luận Trung Ương.
    Sự tiến bộ nhanh chóng của các nền tảng Công nghệ Thông tin (CNTT) và ngôn ngữ lập trình đã làm thay đổi hình thái vận động và phát triển của xã hội loài người. Không gian mạng và các tiện ích đi kèm ngày càng được mở rộng, dẫn đến sự chuyển dịch dần từ đời sống trong thế giới thực sang đời sống trong thế giới ảo (còn gọi là không gian mạng hay không gian số). Sự mở (...)
    Download  
     
    Export citation  
     
    Bookmark