Results for 'Rajiv P. Sharma'

981 found
Order:
  1. Diversity and Conservation Status of Fishes Inhabiting Chittaura Jheel, Bahraich, U.P.D. K. Yadav & A. K. Sharma - 2021 - Bulletin of Pure and Applied Sciences 40 (2):298-303.
    A study was carried out from October, 2020 to September, 2021to investigate the diversity of fishes and the conservation status of Chittaura Jheel (Bahraich), Uttar Pradesh. During the study period, 38 fish species belonging to 28 genera, 14 families and 7 orders have been identified. The order Cypriniformes was found the dominated order with 15 species(39.47%) followed by Siluriformes 10 species (26.31%), Perciformes 4 species (10.52%), Ophiocephaliformes 4 species (10.52%), Synbranchiformes2 species (5.26%), Osteoglossiformes 2 species (5.26%) and Clupiformes 1 species (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Fisiologia do Ciclo Estral dos Animais Domésticos.Emanuel Isaque Cordeiro da Silva -
    FISIOLOGIA DO CICLO ESTRAL DOS ANIMAIS -/- Departamento de Zootecnia – UFRPE Embrapa Semiárido e IPA -/- • _____OBJETIVO -/- O cio ou estro é a fase reprodutiva dos animais, onde as fêmeas apresentam receptividade sexual seguida de ovulação. Para tanto, é necessário entender a fisiologia do estro para a realização do manejo reprodutivo dos animais. Em geral, as fêmeas manifestam comportamentos fora do comum quando estão ciclando, tais comportamentos devem ser observados para que não percam o pico de ovulação (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  3. Comportamento Sexual dos Animais Domésticos.Emanuel Isaque Cordeiro Da Silva -
    COMPORTAMENTO SEXUAL DOS ANIMAIS OBJETIVO O estudante explicará a conduta sexual de fêmeas e machos de diferentes espécies domésticas para detectar a fase de receptividade sexual, com a finalidade de programar de maneira adequada a monta ou a inseminação artificial. A observação da conduta sexual dos animais é indispensável para o sucesso da estação reprodutiva em uma determinada propriedade. Logo, o estudante obterá o alicerce necessário sobre os pontos teóricos e práticos a serem observados para a seleção dos animais aptos (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. Adição de minerais na ração e sua influência nos índices reprodutivos em ruminantes.R. E. S. C. GALVÃO - 2024 - Dissertation, Instituto Federal de Educação, Ciência e Tecnologia de Pernambuco - Ifpe Campus Belo Jardim
    Os minerais possuem uma influência direta em diversos processos fisiológicos no organismo animal e, mesmo com tamanha importância, por vezes são negligenciados pelos produtores para seu fornecimento para os animais. Este estudo teve como objetivo avaliar o desempenho reprodutivo de rebanhos de bovinos, caprinos e ovinos em 8 propriedades rurais nas cidades de Sanharó, Pesqueira, Arcoverde, Belo Jardim e São Bento do Una através da adição de suplemento mineral e mistura múltipla aos animais de forma a atender suas necessidades básicas (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Shodasi : Secrets of the Ramayana.Seshendra Sharma & Sharma Seshendra - 2015 - Hyderabad : India: Saatyaki S/o Seshendra Sharma.
    Ramayan Through Kundalini Yoga Shodasi is an ideal read for Sanskrit-literate readers who are open to eclectic yogarthas and connotative meanings -------- So you thought Vyasa was before Valmiki, Mahabharat was before Ramayan, Rama a Vishnu avatar, and tantrism distinct from vedism? Think again. In Shodasi: Secrets of the Ramayana, Telugu poet Seshendra Sharma re-reads the Ramayan to come up with a number of new conclusions. Much of the book sets out to prove that Ramayan was written before the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Translation: Shri Arvind Ka Shiksha Darshan.K. K. Sharma, Saroj Sobti, Ramesh Kumar Parwa, Suresh Kumar & Desh Raj Sirswal - 2010 - Ambala Cantt.: Centre for Sri Aurobindo Studies.
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Essence of Matter, Essay 2, Draft Version 1.0.Rajiv R. Pande - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  8. The case for introducing the study of religion in India.Arvind Sharma - 2016 - Argument: Biannual Philosophical Journal 6 (1):21-29.
    The author o ers a brief report of introducing the study of religion in India since 194 While doing so he refers to the Constitution of India, so-called Nehruvian Consensus, the Kothari Commission which made an important distinction between ‘religious education’ and ‘educa- tion about religion’, as well as several other bodies responsible for national policy on education, which gave a unique shape of Indian secularism.
    Download  
     
    Export citation  
     
    Bookmark  
  9. Experimental research to Optimize Process Parameters in Machining of Non Conducting Material with hybrid non conconventional machining.Vikrant Sharma & Sunil Kumar - 2017 - International Journal of Trend in Scientific Research and Development 1 (4):107-116.
    Among all non conventional micro machining, electrochemical discharge machining ECDM is having high quality of material removal rate with zero residual stress. This machining has been accepted as a highly modern technology in micromachining. In this paper an effort has been done on micro drilling of glass using electrochemical discharge machining ECDM . A fixed tool and a step down transformer have been used to support the steady machining to increase the accuracy of work piece. The input parameters used in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. A Critical Review of McTaggart's "The Unreality of Time".Rajiv Pande - manuscript
    The intention of this critical review of McTaggart’s 1908 paper is to bring about a distinction between Time and Motion . This distinction is crucial to our understanding of both time as well as motion because so far they have ben treated by all as one and the same. McTaggart, by at least recognizing two different “series” which he calls the A-series and the B-series, has given us a starting point to further understand this distinction. In the process of establishing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  67
    Advancements and Applications of Generative Artificial Intelligence and show the Experimental Evidence on the Productivity Effects using Generative Artificial Intelligence.Sharma Sakshi - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology (Ijmrset) 6 (3):657-664.
    We investigate the productivity impacts of a generative artificial intelligence technology—specifically, the assistive chatbot ChatGPT—within the realm of mid-level professional writing tasks. In a preregistered online experiment, we assigned occupation-specific, incentivized writing tasks to 444 college-educated professionals, with half of the participants randomly exposed to ChatGPT. Our findings reveal that ChatGPT significantly enhances average productivity: the time taken to complete tasks decreases by 0.8 standard deviations, and output quality improves by 0.4 standard deviations. Additionally, the use of ChatGPT reduces inequality (...)
    Download  
     
    Export citation  
     
    Bookmark   82 citations  
  12.  56
    Assessment of Web Services based on SOAP and REST Principles using Different Metrics for Mobile Environment and Multimedia Conference.Sharma Sakshi - 2023 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 12 (8):1701-1709.
    This article presents a comprehensive assessment of web services based on SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) principles, focusing on their application in mobile environments and multimedia conference scenarios. As web services enable seamless communication and data exchange across diverse systems, understanding their performance characteristics in different contexts is crucial. SOAP, with its protocol-driven approach and emphasis on security and reliability, and REST, known for its simplicity, scalability, and efficiency, are evaluated using key performance metrics such (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  13.  61
    A Large-Scale Empirical Study Identifying Practitioners' Perspectives on Challenges in Docker Development: Analysis using Stack Overflow.Sharma Sakshi - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (2):1104-1111.
    This study investigates Docker-related topics and challenges through an analysis of Stack Overflow posts to identify prevalent issues and trends in Docker development. By leveraging both tag-based and content-based filtering methods, we compiled a comprehensive dataset of Docker discussions. Latent Dirichlet Allocation (LDA) topic modeling was employed to categorize these discussions, revealing that Application Development is the predominant focus, encompassing areas such as Framework Management, Coding Issues, Data Transfer, and Dockerspecific frameworks. This dominant category reflects developers' substantial interest in leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   94 citations  
  14. TRUTH – A Conversation between P F Strawson and Gareth Evans (1973).P. F. Strawson & Gareth Evans - manuscript
    This is a transcript of a conversation between P F Strawson and Gareth Evans in 1973, filmed for The Open University. Under the title 'Truth', Strawson and Evans discuss the question as to whether the distinction between genuinely fact-stating uses of language and other uses can be grounded on a theory of truth, especially a 'thin' notion of truth in the tradition of F P Ramsey.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  60
    Design and Implementation of a Pattern-based J2EE Application Development Environment.Sharma Sakshi - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 11 (1):190-200.
    This paper presents the design and implementation of a pattern-based J2EE application development environment aimed at streamlining the development process, enhancing code quality, and improving maintainability. We begin with an exploration of the fundamental principles of J2EE and the role of design patterns in software engineering. This is followed by a detailed discussion on the selection and application of various design patterns specifically tailored for J2EE, such as Singleton, Factory, Data Access Object (DAO), and Model-View-Controller (MVC).
    Download  
     
    Export citation  
     
    Bookmark   70 citations  
  16.  69
    Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications.Sharma Sakshi - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (12):12220-12226.
    Traditional project risk management techniques are becoming less and less effective in the age of Industry 4.0, which is defined by sophisticated automation, data interchange, and cyber-physical systems. It suggests a new framework that improves risk detection, assessment, and mitigation techniques by utilising technology like artificial intelligence (AI), big data analytics, and the Internet of Things (IoT). This paper illustrates how Industry 4.0 is revolutionising risk management procedures by looking at actual case studies and industry implementations. The framework offers practical (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  17.  20
    Deep Learning-Based Speech Emotion Recognition.Sharma Karan - 2022 - International Journal of Multidisciplinary and Scientific Emerging Research 10 (2):715-718.
    Speech Emotion Recognition (SER) is an essential component in human-computer interaction, enabling systems to understand and respond to human emotions. Traditional emotion recognition methods often rely on handcrafted features, which can be limited in capturing the full complexity of emotional cues. In contrast, deep learning approaches, particularly convolutional neural networks (CNNs), recurrent neural networks (RNNs), and long short-term memory (LSTM) networks, offer more robust solutions by automatically learning hierarchical features from raw audio data. This paper reviews recent advancements in deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  40
    Examination of Anomaly Process Detection Using Negative Selection Algorithm and Classification Techniques.Sharma Sakshi - 2020 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 9 (6):2526-2534.
    The examination of anomaly process detection using negative selection algorithms and classification techniques focuses on enhancing the ability to identify deviations from expected patterns within complex data sets. Negative selection algorithms, inspired by biological immune systems, offer a novel approach to anomaly detection by efficiently distinguishing between normal and anomalous data points. When combined with various classification techniques, these algorithms can improve the accuracy and robustness of anomaly detection systems. This abstract explores the integration of negative selection algorithms with traditional (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  19. Phaedo 100B3-9.Ravi Sharma - 2015 - Mnemosyne 68 (3):393-412.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. , step by step free seo.Rajendra Sharma - manuscript
    You can search on internet for free SEO tips. But there language is very difficult. There technical word is not easily understandable for new website developer. If you will follow the tips we will give you guarantee that your site can get good rank.http://www.aboutevery.com/step-by-step-free-seo-process.html -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  21.  95
    Husserl’s Phenomenology: A Feminist and Lacanian Reappraisal.Dhriti Sharma - manuscript
    Husserl's Phenomenology: A Lacanian and Feminist Reappraisal -/- This study undertakes a comprehensive critique of Edmund Husserl's phenomenology, highlighting its limitations and omissions. Through Lacanian psychoanalysis, feminist perspectives, and intersubjective theories, this analysis challenges Husserl's notions of bracketing, reduction, and absolute givenness. Key concerns include the neglect of unconscious dynamics, symbolic structures, embodied experience, and cultural contexts. Critics such as Zizek, Sartre, Quine, and Rorty are engaged in addressing issues of solipsism, truth, and ideology. This evaluation underscores the need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Kundalini Yoga & Gayathri Mantra in Valmiki Ramayana.Seshendra Sharma Mr - manuscript
    Valmiki , The Sage of 5th century B.C wrote The Ramayana not to narrate the story of Rama in an absorbing style. Though the epic poem presents Rama’s Journey of life in enchanting poetry , the story and the enchanting poetry are sugar coating or honey to the organic medicine called Kundalini Yoga. Maharshi Valmiki wrote the Ramayana to spread / propagate Kundalini Yoga among the masses. Thus the soul of The Ramayana is Kundalini Yoga / Sri Vidya. Valmiki embedded (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Vaigyanik Shiksha: Samajik Sarokaron ka Sandarbh.Manish Sharma - 2022 - Samantar 23 (02):31-34.
    इस पर्चे में मैंने विज्ञान के विकास को आधुनिकता की पृष्टभूमि में मानव-मुक्ति के लक्ष्य की दशा व दिशा के सन्दर्भ में आलोचनात्मक विश्लेषण पद्धति से समझने का प्रयास किया है। इस कार्य के लिए मैंने पेपर में चार प्रमुख बिंदुओं को उढाया है। -/- पहला बिंदु विज्ञान की मूल्य निरपेक्षता (Value neutrality) को लेकर है जिसके तहत मैंने पूँजी के साथ विज्ञान के संबंध को समझने का प्रयास किया है। -/- दूसरे बिंदु में विज्ञान शिक्षा और सामाजिक सरोकार के (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Inquiring Universal Religion in the Times of Consumer Mythology.Manish Sharma - 2022 - Rabindra Bharati Journal of Philosophy 23 (09):17-24.
    Human beings as self-conscious, aesthetic, sympathetic, and empathetic beings develop various ways to live in this world. They continue to aspire for a better version of themselves and their lives. In this process, they developed certain ethical norms, social practices, and ways to perceive and understand this world. These qualities become the basis for proactive steps of spirituality which in turn become the foundation of religion. In human history, religion has helped individuals to fulfill various human needs irrespective of their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Exploring the Concept of Self in Shrimad Bhagwat Gita for Developing Environmental Consciousness.Manish Sharma - 2021 - Gurukul Patrika 73 (02):96-107.
    In the contemporary era, we identify ourselves based on what we consume or what we possess. Besides, various advertisements, celebrities, and other influential personalities encourage and make us believe that we can make a new identity by consuming a specific brand, or relating to a particular institution or connecting with an extraordinary group, etc. Hence, we tend to identify ourselves with consumer goods. In such conditions, Srimad Bhagwat Gita becomes significantly relevant to look for alternative way of life. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Identifying Philosophical Themes to Develop a Holistic Model for Education in the Twenty First Century.Manish Sharma - 2017 - Innovative Research Thoughts 3 (08):142-154. Translated by Manish Sharma.
    Twenty first century is posing unprecedented challenges for the human existence and development. This era has witnessed awesome economic & technological growth, increased connectedness but great poverty, malnutrition, anxiety, mental stress and environmental degradation. Thus, this time depicts great contradiction, uncertainty, and risk. Accordingly, in this era a holistic education system has to deal with the challenges such as population growth, terrorism, environmental degradation, hegemony of machines, mental stress, cultivating creativity, bridging the skill and wisdom gap, and expanding human potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. An Assessment of Idealism In light of Indian Philosophy (भारतीय दर्शन में प्रत्ययवाद की गत्यात्मक दृष्टि).Shruti Sharma - 2021 - Insight - an International Multilingual Journal for Arts and Humanities 1 (5 july 2021):135-143.
    The viewpoint of the Indian way of thinking is a greater amount of inborn as opposed to outward. Which gives more worth to current realities. In any event, to know the idea of fundamental reality, human insight first needs to know the idea of the outside world. It specifies are additionally predominant in Upanishads, where it has been expressed that faculties are more extraneous while knowing the external world. This research paper particularly centers around the idealist viewpoint with uncommon reference (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Short report on initial political polarization/argument visualization study.Simon Cullen & Vidushi Sharma - manuscript
    This document provides a brief report on initial research into how argument presentation affects susceptibility to confirmation bias as well as feelings toward political opponents.
    Download  
     
    Export citation  
     
    Bookmark  
  29. PHYTOCHEMICAL COMPOSITION AND IN VITRO ANTIOXIDANT ACTIVITIES OF THE GENUS CITRUS PEEL EXTRACTS: A SYSTEMATIC REVIEW.Deeksha Parmar, Deeksha Sharma, Mohit Pant & Siddhartha Dan - 2020 - International Research Journal of Modernization in Engineering Technology and Science 2 (9):953-961.
    India is the leading producer of fruits worldwide. The major problem after citrus fruits consumption is their peel that are hazardous to our environment and mainly regarded as a solid waste however, they are rich sources of fibres, large amount of Vitamin C, phenolics and flavonoids which are best agents of antioxidant. In this paper, we have discussed about the orange peel waste which has many beneficial roles in our daily life. Citrus peel has the highest number of Phytochemicals such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The essence of result-driven categorization.Kartik Sharma - manuscript
    This paper attempts to argue that it is categorization, not generalization, that is more valuable by examining essence, interest, ontology, rationalism, and truth. While generalization is invariably oversimplified, categorization gives an exact insight with a fine grain into the entities by referring to their intrinsic properties. Categorization supplies an ordered, transparent form for knowledge through a rationalist approach, thereby arriving at clearer and more accurate representations of reality. The importance of categorization lies in its philosophical contribution to differentiating things in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Realist Ennui and the Base Rate Fallacy.P. D. Magnus & Craig Callender - 2004 - Philosophy of Science 71 (3):320-338.
    The no-miracles argument and the pessimistic induction are arguably the main considerations for and against scientific realism. Recently these arguments have been accused of embodying a familiar, seductive fallacy. In each case, we are tricked by a base rate fallacy, one much-discussed in the psychological literature. In this paper we consider this accusation and use it as an explanation for why the two most prominent `wholesale' arguments in the literature seem irresolvable. Framed probabilistically, we can see very clearly why realists (...)
    Download  
     
    Export citation  
     
    Bookmark   125 citations  
  32. Music & Politics.John Hutnyk & Sanjay Sharma - 2000 - Theory, Culture and Society 17 (3):55-63.
    This is an introduction to the section on Music and Politics including a description of the context of these essays, their individual contributions and their thematic interrelations.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Encountering Asceticism: A Hindu nun in Jogan vis-à-vis a Buddhist monk in Trishagni.Shikha Sharma - 2020 - Journal of Visual Anthropology 33 (5).
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  46
    Advanced Threat Detection Using AI-Driven Anomaly Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models can identify deviations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Traditional Guided Lab Activities in the Physics Laboratory of Engineering Institutions in Kathmandu District of Nepal.Pankaj Sharma Ghimire & Krishna Shrestha - 2023 - Universal Journal of Educational Research 2 (4):325-333.
    Laboratory activities play a crucial role in the conceptual understanding of the theoretical aspects of physics. Traditional guided lab activities emphasize a teacher-centric pedagogical approach in which learners are merely passive recipients of the content knowledge as delivered by the teacher. The authors in their professional journey at engineering institutions were also guided by the traditional laboratory approach in the teaching and learning process inside the physics laboratory. During our professional journey at engineering institutions, we felt that students had difficulty (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  41
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network traffic, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  39
    Blockchain for Enhanced Security in Distributed CyberPhysical Systems Using Practical Byzantine Fault Tolerance (PBFT) Techniques.Sharma Sidharth - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (12):1-8.
    Distributed Cyber-Physical Systems (DCPS) are increasingly vulnerable to security threats due to their complex, interconnected nature. Traditional security mechanisms struggle to ensure trust, integrity, and resilience against malicious attacks and system failures. Blockchain technology, with its decentralized and immutable ledger, offers a promising solution to enhance security in DCPS. This paper explores the integration of blockchain with Practical Byzantine Fault Tolerance (BFT) to address security challenges in DCPS. PBFT consensus mechanisms enable systems to function reliably even in the presence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Heidegger Being and Time, Sein und Zeit (1927): An Index.Daniel Fidel Ferrer & Ritu Sharma - 2016 - archive.org.
    Heidegger Being and Time, Sein und Zeit (1927): An Index -/- By -/- Daniel Fidel Ferrer -/- and -/- Ritu Sharma -/- 1. Heidegger, Martin, -- 1889-1976. 2. Heidegger, Martin, -- 1889-1976 -- Concordances. 3. Heidegger, Martin, -- 1889-1976 -- Indexes. 4). Metaphysics. 5). Philosophy, German. 6). Heidegger, Martin; -- Wörterbuch. 7). Sein und Zeit. English. 8). Ontology. 9). Space and time. 10). Being and Time [Sein und Zeit]. I. Ferrer, Daniel Fidel, 1952-. II. Sharma, Ritu. -/- Pages (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. New Foundations for Imperative Logic: Pure Imperative Inference.P. B. M. Vranas - 2011 - Mind 120 (478):369-446.
    Imperatives cannot be true, but they can be obeyed or binding: `Surrender!' is obeyed if you surrender and is binding if you have a reason to surrender. A pure declarative argument — whose premisses and conclusion are declaratives — is valid exactly if, necessarily, its conclusion is true if the conjunction of its premisses is true; similarly, I suggest, a pure imperative argument — whose premisses and conclusion are imperatives — is obedience-valid (alternatively: bindingness-valid) exactly if, necessarily, its conclusion is (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  40. Factor Affecting Customer Service in Supply Chain Management of Small and Medium Enterprises: An Empirical Study of Jammu Region.Sanjeev Lalhotra & Prof B. C. Sharma - 2014 - SOCRATES 2 (JUNE 2014):149-165.
    Factor Affecting Customer Service in Supply Chain Management of Small and Medium Enterprises: An Empirical Study of Jammu Region -/- Author / Authors : Sanjeev Lalhotra and Prof. B.C Sharma Page no.149-165 Discipline : Applied Economics/ Management/ Commerce Script/language : Roman/English Category : Research paper Keywords: Customer services, Supply Chain Management, Small and Medium Enterprises.
    Download  
     
    Export citation  
     
    Bookmark  
  41. Putting Consciousness First: Replies to Critics.P. Goff - 2021 - Journal of Consciousness Studies 28 (9-10):289-328.
    In this paper, I reply to 18 of the essays on panpsychism in this issue. Along the way, I sketch out what a post-Galilean science of consciousness, one in which consciousness is taken to be a fundamental feature of reality, might look like.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  42.  43
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (AI), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Simulating Termination Analyzer H is Not Fooled by Pathological Input P.P. Olcott - manuscript
    The notion of a simulating termination analyzer is examined at the concrete level of pairs of C functions. This is similar to AProVE: Non-Termination Witnesses for C Programs. The termination status decision is made on the basis of the dynamic behavior of the input. This paper explores what happens when a simulating termination analyzer is applied to an input that calls itself.
    Download  
     
    Export citation  
     
    Bookmark  
  44.  37
    The Role of Homomorphic Encryption in Secure Cloud Data Processing.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):260-265.
    Homomorphic encryption is a transformative cryptographic technique that enables secure cloud data processing by allowing computations on encrypted data without requiring decryption. Unlike traditional encryption methods, which protect data only at rest and in transit, homomorphic encryption ensures end-to-end security, even during computation. This capability is particularly vital for industries that rely on cloud computing while handling sensitive information, such as finance, healthcare, and government sectors. However, despite its strong security guarantees, the widespread adoption of homomorphic encryption remains limited due (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  33
    RANSOMWARE TRENDS AND EFFECTIVE MITIGATION TECHNIQUES IN 2018.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-5.
    : Ransomware remains one of the most significant cybersecurity threats, evolving rapidly with new attack vectors, encryption techniques, and extortion models. As we enter 2018, ransomware attacks have become more sophisticated, leveraging artificial intelligence (AI), automation, and emerging technologies to bypass traditional security measures. This paper analyzes the latest ransomware trends, including targeted attacks on critical infrastructure, Ransomware-as-a-Service (RaaS), and double/triple extortion tactics. Additionally, it explores advanced mitigation techniques such as AI-driven anomaly detection, zero-trust architectures, blockchain-based security solutions, and proactive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  30
    Improving Generative AI Models for Secure and Private Data Synthesis.Sharma Sidharth - 2015 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Generative Adversarial Networks (GANs) have demonstrated significant potential in generating synthetic data for various applications, including those involving sensitive information like healthcare and finance. However, two major issues arise when GANs are applied to sensitive datasets: (i) the model may memorize training samples, compromising the privacy of individuals, especially when the data includes personally identifiable information (PII), and (ii) there is a lack of control over the specificity of the generated samples, which limits their utility for tailored usecases. To address (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  29
    Detecting and Mitigating The Spread of Misinformation By AI-Generated Content.Sharma Sidharth - 2015 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Misinformation has been a persistent and detrimental phenomenon in our society in many ways, including individuals' physical health and economic security. With the advent of short video platforms and associated applications, dissemination of multi-modal misinformation, including images, texts, audios, and videos, have increased these issues. The advent of generative AI models such as ChatGPT and Stable Diffusion has further enhanced the complexity, providing give rise to Artificial Intelligence Generated Content (AIGC) and posing new challenges in the detection and mitigation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  29
    QUANTUM-ENHANCED ENCRYPTION TECHNIQUES FOR CLOUD DATA PROTECTION.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):15-20.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a lattice-based encryption mechanism. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  28
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic traffic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  27
    Improving Generative AI Models for Secure and Private Data Synthesis.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):210-215.
    Generative Adversarial Networks (GANs) have demonstrated significant potential in generating synthetic data for various applications, including those involving sensitive information like healthcare and finance. However, two major issues arise when GANs are applied to sensitive datasets: (i) the model may memorize training samples, compromising the privacy of individuals, especially when the data includes personally identifiable information (PII), and (ii) there is a lack of control over the specificity of the generated samples, which limits their utility for tailored use-cases. To address (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 981