Results for 'Ravi Sharma'

100 found
Order:
  1. Phaedo 100B3-9.Ravi Sharma - 2015 - Mnemosyne 68 (3):393-412.
    The paper examines a puzzling sequence of verb tenses at Phaedo 100b3-9. It rejects the idea, almost universal among commentators, that the puzzle is to be solved by construing the first verbal expression as if it were equivalent to a future. The paper then offers another solution and explores its implications for understanding the broader philosophical context of the passage. What emerges is that the new solution provides a valuable clue to figuring out what precisely Socrates has in mind when (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. The Importance of Being Erroneous.Nils Kürbis - 2021 - Australasian Philosophical Review 2 (3):155-166.
    This is a commentary on MM McCabe's "First Chop your logos... Socrates and the sophists on language, logic, and development". In her paper MM analyses Plato's Euthydemos, in which Plato tackles the problem of falsity in a way that takes into account the speaker and complements the Sophist's discussion of what is said. The dialogue looks as if it is merely a demonstration of the silly consequences of eristic combat. And so it is. But a main point of MM's paper (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  3. Moral Principles as Generics.Ravi Thakral - 2024 - Journal of the American Philosophical Association 10 (2):205-224.
    I argue that moral principles involve the same sort of generalization as ordinary yet elusive generic generalizations in natural language such as ‘Tigers are striped’ or ‘Peppers are spicy’. A notable advantage of the generic view is that it simultaneously allows for pessimism and optimism about the role and status of moral principles in our lives. It provides a new perspective on the nature of moral principles on which principles are not apt for determining the moral status of particular actions (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. Advancements and Applications of Generative Artificial Intelligence and show the Experimental Evidence on the Productivity Effects using Generative Artificial Intelligence.Sharma Sakshi - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology (Ijmrset) 6 (3):657-664.
    We investigate the productivity impacts of a generative artificial intelligence technology—specifically, the assistive chatbot ChatGPT—within the realm of mid-level professional writing tasks. In a preregistered online experiment, we assigned occupation-specific, incentivized writing tasks to 444 college-educated professionals, with half of the participants randomly exposed to ChatGPT. Our findings reveal that ChatGPT significantly enhances average productivity: the time taken to complete tasks decreases by 0.8 standard deviations, and output quality improves by 0.4 standard deviations. Additionally, the use of ChatGPT reduces inequality (...)
    Download  
     
    Export citation  
     
    Bookmark   84 citations  
  5. Generics and Weak Necessity.Ravi Thakral - 2018 - Inquiry: An Interdisciplinary Journal of Philosophy:1-28.
    A prevailing thought is that generics have a covert modal operator at logical form. I claim that if this is right, the covert generic modality is a weak necessity modal. In this paper, I pr...
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  6. Design and Implementation of a Pattern-based J2EE Application Development Environment.Sharma Sakshi - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 11 (1):190-200.
    This paper presents the design and implementation of a pattern-based J2EE application development environment aimed at streamlining the development process, enhancing code quality, and improving maintainability. We begin with an exploration of the fundamental principles of J2EE and the role of design patterns in software engineering. This is followed by a detailed discussion on the selection and application of various design patterns specifically tailored for J2EE, such as Singleton, Factory, Data Access Object (DAO), and Model-View-Controller (MVC).
    Download  
     
    Export citation  
     
    Bookmark   71 citations  
  7.  59
    Farmsmart: Expert Recommendations, Disease Prediction, and Farmer Market using Machine Learning and Deep Learning.Digvijay Patil Dr Ravi Prakash, Mayuresh Pisat, Atharv Reddy - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    FarmSmart is an integrated digital agriculture platform that seeks to empower farmers with data-driven, intelligent decision-making. It brings together six must-have modules such as crop recommendation, fertilizer recommendation, crop disease forecasting, farmer-to-farmer marketplace, live commodity price tracking, and multilingual conversational chatbot into one integrated, easy-to-use solution, specifically designed for rural environments. With the combined strength of machine learning, computer vision, natural language processing, and realtime APIs of government data, FarmSmart is a holistic end-to-end solution for enabling farmers right through the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Inner Light Perception as a Quantum Phenomenon-Addressing the Questions of Physical and Critical Realisms, Information and Reduction.Ravi Prakash & Michele Caponigro - unknown
    Subjectivity or the problem of ‘qualia’ tends to make the accessibility and comprehension of psychological events intangible especially for scientific exploration. The issue becomes even more complicated but interesting when one turns towards mystical experiences. Such experiences are different from other psychological phenomena in the sense that they don’t occur to every one, so are difficult to comprehend even for their qualifications of existence. We conducted a qualitative study on one such experience of inner-light perception. This is a common experience (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  70
    Examination of Anomaly Process Detection Using Negative Selection Algorithm and Classification Techniques.Sharma Sakshi - 2020 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 9 (6):2526-2534.
    The examination of anomaly process detection using negative selection algorithms and classification techniques focuses on enhancing the ability to identify deviations from expected patterns within complex data sets. Negative selection algorithms, inspired by biological immune systems, offer a novel approach to anomaly detection by efficiently distinguishing between normal and anomalous data points. When combined with various classification techniques, these algorithms can improve the accuracy and robustness of anomaly detection systems. This abstract explores the integration of negative selection algorithms with traditional (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  10. Fitting Things Together: Coherence and the Demands of Structural Rationality, written by Alex Worsnip.Ravi Thakral - 2024 - Journal of Moral Philosophy 21 (5-6).
    Download  
     
    Export citation  
     
    Bookmark  
  11.  65
    Edge Computing and Its Role in Strengthening Cloud Security.Thakur Siddharth Ravi - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (5).
    As the adoption of cloud computing continues to grow, so do the concerns about the security of sensitive data and applications. Cloud environments are often seen as vulnerable to cyber-attacks due to their centralized nature and exposure to the internet. Edge computing, a distributed computing paradigm that brings computation and data storage closer to the data source, is emerging as a solution to enhance cloud security. By processing data closer to the edge of the network, edge computing reduces the reliance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Theory of Multiple thinking environments.Ravi Singh - manuscript
    Theory of multiple thinking environments As there is a physical environment, there exists a psychological environment that governs many psychological processes including our thinking. This psychological environment is unique to each person and is framed in the initial few years since the child is born and represents the native environment of that person. This psychological environment is a collection of all those elements responsible for it to become a source of thought and maintain that thought for its life cycle. (In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  54
    A Robust Machine Learning Pipeline for Chronic Kidney Disease Prediction using Outlier Detection, Feature Selection, and Adam Optimization.Ravi Ravi Kumar - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):5475-5487.
    Data mining technology for healthcare purposes transforms basic medical information into useful insights which helps doctors predict diseases along with diagnosing patients while tailoring personalized treatment plans. A successful healthcare analytics process requires a complete data pipeline which includes data preprocessing followed by extraction then selection after optimization until classification. Data preprocessing implements the Z-Score Method together with Isolation Forest along with Interquartile Range (IQR) Method to detect outliers which would potentially harm model performance. The Principal Component Analysis (PCA) serves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  53
    A Robust Machine Learning Pipeline for Chronic Kidney Disease Prediction using Outlier Detection, Feature Selection, and Adam Optimization.Kumar Ravi Ravi - 2025 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 14 (4):5475-5487.
    Data mining technology for healthcare purposes transforms basic medical information into useful insights which helps doctors predict diseases along with diagnosing patients while tailoring personalized treatment plans. A successful healthcare analytics process requires a complete data pipeline which includes data preprocessing followed by extraction then selection after optimization until classification. Data preprocessing implements the Z-Score Method together with Isolation Forest along with Interquartile Range (IQR) Method to detect outliers which would potentially harm model performance. The Principal Component Analysis (PCA) serves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  66
    Enhancing Supply Chain Resilience through Emerging Technologies: A Holistic Approach to Digital Transformation.Vadigicherla Madhusudan Sharma - 2024 - International Journal for Research in Applied Science and Engineering Technology 12 (9):1319-1329.
    This article investigates the critical role of domain knowledge in enhancing the effectiveness and accuracy of data analysis across various industries. Through a comprehensive examination of case studies in finance, healthcare, and retail sectors, we demonstrate how industry-specific expertise significantly improves data interpretation, metric selection, and the derivation of actionable insights. The article highlights the synergistic relationship between technical, analytical skills and a deep understanding of industry contexts, revealing that domain experts are better positioned to identify meaningful patterns, develop accurate (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  16. Multi-Cloud Environments: Reducing Security Risks in Distributed Architectures.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5 (1):1-6.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  17. The Rising Threat of Deepfakes: Security and Privacy Implications.Sharma Sidharth - 2020 - Journal of Artificial Intelligence and Cyber Security (Jaics) 4 (1):1-6.
    Deep fakes, a technology enabling the creation of highly realistic fake images and videos through face-swapping, have sparked significant attention due to their potential for misuse. This paper explores the technologies behind deep fakes and categorizes them into four types: deep fake pornography, political campaigns, commercial uses, and creative content. The authors discuss the ethical and regulatory challenges associated with each category. Initially, deep fakes were used maliciously, such as in revenge porn and political manipulation, which led to widespread fear. (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  18. COVID-19 Pandemic: Evidences from Clinical Studies.Ravi Shankar Singh, Abhishek Kumar Singh, Kamla Kant Shukla & Amit Kumar Tripathi - 2020 - Journal of Community and Public Health Nursing 6 (4):251.
    The public health crisis is started with emergence of new coronavirus on 11 February 2020 which triggered as coronavirus disease-2019 (COVID-19) pandemics. The causative agent in COVID-19 is made up of positively wrapped single-stranded RNA viruses ~ 30 kb in size. The epidemiology, clinical features, pathophysiology, and mode of transmission have been documented well in many studies, with additional clinical trials are running for several antiviral agents. The spreading potential of COVID-19 is faster than its two previous families, the severe (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  96
    Quantum-Enhanced Encryption Methods for Securing Cloud Data.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-5.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a lattice-based encryption mechanism. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  20.  79
    Enhancing Security of Cloud-Native Microservices with Service Mesh Technologies.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1.
    : As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  21. MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  22. Husserl’s Phenomenology: A Feminist and Lacanian Reappraisal.Dhriti Sharma - manuscript
    Husserl's Phenomenology: A Lacanian and Feminist Reappraisal -/- This study undertakes a comprehensive critique of Edmund Husserl's phenomenology, highlighting its limitations and omissions. Through Lacanian psychoanalysis, feminist perspectives, and intersubjective theories, this analysis challenges Husserl's notions of bracketing, reduction, and absolute givenness. Key concerns include the neglect of unconscious dynamics, symbolic structures, embodied experience, and cultural contexts. Critics such as Zizek, Sartre, Quine, and Rorty are engaged in addressing issues of solipsism, truth, and ideology. This evaluation underscores the need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Post-Quantum Cryptography: Readying Security for the Quantum Computing Revolution.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research (Ijsmir) 2 (1):1-5.
    The rapid advancement of quantum computing poses a significant threat to classical cryptographic systems, particularly those based on RSA, ECC, and other public-key algorithms. With Shor’s algorithm capable of efficiently factoring large numbers and breaking current encryption standards, the transition to postquantum cryptography (PQC) has become a global priority. This paper explores the impact of quantum computing on cryptographic security, the need for quantum-resistant cryptographic algorithms, and ongoing standardization efforts led by organizations such as NIST. We analyze various post-quantum cryptographic (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  24. Real-Time Malware Detection Using Machine Learning Algorithms.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-8.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine learning techniques (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  25.  92
    Optimized Cooling Solutions for Hybrid Electric Vehicle Powertrains.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research (Ijsmir) 2 (1):1-5.
    Hybrid Electric Vehicles (HEVs) have gained significant popularity due to their reduced environmental impact and fuel efficiency. However, the complex integration of electrical and mechanical systems in HEVs presents significant cooling challenges. A robust cooling system is essential to maintain optimal performance and extend the lifespan of powertrains and battery systems. This paper explores the development of an advanced cooling system designed specifically for HEV powertrains, leveraging modern technologies such as heat exchangers, liquid cooling, and smart thermal management systems. The (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  26. DATA LOSS PREVENTION (DLP) STRATEGIES IN CLOUD-HOSTED APPLICATIONS.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-8.
    The assessment of cloud data loss prevention and encryption was the main emphasis of the current study. Cloud computing, another name for cloud-based technologies, boosts organizational effectiveness for appropriate data management procedures. By improving data visualization, cloud-based data loss or leakage prevention (DLP) helps businesses comprehend the risks and problems associated with appropriate data management. This study demonstrated how to handle data with encryption. The growth of company processes and the effective management of all activities through data management can benefit (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  27.  78
    Access Control Frameworks for Secure Hybrid Cloud Deployments.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-7.
    Hybrid cloud environments combine private and public cloud infrastructures to optimize security, scalability, and cost-effectiveness. However, ensuring secure access control in such environments remains a critical challenge due to dynamic workloads, multi-tenancy, and cross-cloud authentication complexities. This paper explores access control models tailored for secure hybrid cloud deployment, focusing on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and emerging Zero Trust principles. We analyze their effectiveness in mitigating unauthorized access, privilege escalation, and insider threats. Additionally, a novel hybrid model (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  28. Vaigyanik Shiksha: Samajik Sarokaron ka Sandarbh.Manish Sharma - 2022 - Samantar 23 (02):31-34.
    इस पर्चे में मैंने विज्ञान के विकास को आधुनिकता की पृष्टभूमि में मानव-मुक्ति के लक्ष्य की दशा व दिशा के सन्दर्भ में आलोचनात्मक विश्लेषण पद्धति से समझने का प्रयास किया है। इस कार्य के लिए मैंने पेपर में चार प्रमुख बिंदुओं को उढाया है। -/- पहला बिंदु विज्ञान की मूल्य निरपेक्षता (Value neutrality) को लेकर है जिसके तहत मैंने पूँजी के साथ विज्ञान के संबंध को समझने का प्रयास किया है। -/- दूसरे बिंदु में विज्ञान शिक्षा और सामाजिक सरोकार के (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Inquiring Universal Religion in the Times of Consumer Mythology.Manish Sharma - 2022 - Rabindra Bharati Journal of Philosophy 23 (09):17-24.
    Human beings as self-conscious, aesthetic, sympathetic, and empathetic beings develop various ways to live in this world. They continue to aspire for a better version of themselves and their lives. In this process, they developed certain ethical norms, social practices, and ways to perceive and understand this world. These qualities become the basis for proactive steps of spirituality which in turn become the foundation of religion. In human history, religion has helped individuals to fulfill various human needs irrespective of their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Exploring the Concept of Self in Shrimad Bhagwat Gita for Developing Environmental Consciousness.Manish Sharma - 2021 - Gurukul Patrika 73 (02):96-107.
    In the contemporary era, we identify ourselves based on what we consume or what we possess. Besides, various advertisements, celebrities, and other influential personalities encourage and make us believe that we can make a new identity by consuming a specific brand, or relating to a particular institution or connecting with an extraordinary group, etc. Hence, we tend to identify ourselves with consumer goods. In such conditions, Srimad Bhagwat Gita becomes significantly relevant to look for alternative way of life. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. THE GROWING THREAT OF DEEPFAKES: IMPLICATIONS FOR SECURITY AND PRIVACY.Sharma Sidharth - 2020 - Journal of Artificial Intelligence and Cyber Security (Jaics) 4 (1):24-29.
    Deep fakes, a technology enabling the creation of highly realistic fake images and videos through face-swapping, have sparked significant attention due to their potential for misuse. This paper explores the technologies behind deep fakes and categorizes them into four types: deep fake pornography, political campaigns, commercial uses, and creative content. The authors discuss the ethical and regulatory challenges associated with each category. Initially, deep fakes were used maliciously, such as in revenge porn and political manipulation, which led to widespread fear. (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  32. Identifying Philosophical Themes to Develop a Holistic Model for Education in the Twenty First Century.Manish Sharma - 2017 - Innovative Research Thoughts 3 (08):142-154. Translated by Manish Sharma.
    Twenty first century is posing unprecedented challenges for the human existence and development. This era has witnessed awesome economic & technological growth, increased connectedness but great poverty, malnutrition, anxiety, mental stress and environmental degradation. Thus, this time depicts great contradiction, uncertainty, and risk. Accordingly, in this era a holistic education system has to deal with the challenges such as population growth, terrorism, environmental degradation, hegemony of machines, mental stress, cultivating creativity, bridging the skill and wisdom gap, and expanding human potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  74
    Transforming Pension Service Request Processing with Secure, Scalable, and AI-Powered Azure Cloud Technologies.Akshay Sharma & Satish Kabade - 2024 - International Journal of Scientific Research in Science, Engineering and Technology 11 (1).
    Pension service institutions are quickly going digital as they cope with increased service requirements, the demands of regulatory compliance, and challenges posed by cybersecurity. Legacy pension management systems usually have limited scope, are inefficient, and do not provide security on-premise infrastructure (Gartner, 2023). These aspects result in inefficiencies that create delays in processing pensions, an increase in the risk of fraud, and escalated operational costs (Ponemon Institute, 2023). The most critical aspect regarding pension transactions involves the secure, efficient, and scalable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  80
    QUANTUM-ENHANCED ENCRYPTION TECHNIQUES FOR CLOUD DATA PROTECTION.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):15-20.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a lattice-based encryption mechanism. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  35.  89
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic traffic (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  36. POST-QUANTUM CRYPTOGRAPHY: PREPARING FOR A QUANTUM COMPUTING ERA.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-6.
    The rapid advancement of quantum computing poses a significant threat to classical cryptographic systems, particularly those based on RSA, ECC, and other public-key algorithms. With Shor’s algorithm capable of efficiently factoring large numbers and breaking current encryption standards, the transition to postquantum cryptography (PQC) has become a global priority. This paper explores the impact of quantum computing on cryptographic security, the need for quantum-resistant cryptographic algorithms, and ongoing standardization efforts led by organizations such as NIST. We analyze various post-quantum cryptographic (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  37. The essence of result-driven categorization.Kartik Sharma - manuscript
    This paper attempts to argue that it is categorization, not generalization, that is more valuable by examining essence, interest, ontology, rationalism, and truth. While generalization is invariably oversimplified, categorization gives an exact insight with a fine grain into the entities by referring to their intrinsic properties. Categorization supplies an ordered, transparent form for knowledge through a rationalist approach, thereby arriving at clearer and more accurate representations of reality. The importance of categorization lies in its philosophical contribution to differentiating things in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine learning techniques (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  39. ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):7-12.
    Hybrid cloud environments combine private and public cloud infrastructures to optimize security, scalability, and cost-effectiveness. However, ensuring secure access control in such environments remains a critical challenge due to dynamic workloads, multi-tenancy, and cross-cloud authentication complexities. This paper explores access control models tailored for secure hybrid cloud deployment, focusing on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and emerging Zero Trust principles. We analyze their effectiveness in mitigating unauthorized access, privilege escalation, and insider threats. Additionally, a novel hybrid model (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  40. Factor Affecting Customer Service in Supply Chain Management of Small and Medium Enterprises: An Empirical Study of Jammu Region.Sanjeev Lalhotra & Prof B. C. Sharma - 2014 - SOCRATES 2 (2):149-165.
    Factor Affecting Customer Service in Supply Chain Management of Small and Medium Enterprises: An Empirical Study of Jammu Region -/- Author / Authors : Sanjeev Lalhotra and Prof. B.C Sharma Page no.149-165 Discipline : Applied Economics/ Management/ Commerce Script/language : Roman/English Category : Research paper Keywords: Customer services, Supply Chain Management, Small and Medium Enterprises.
    Download  
     
    Export citation  
     
    Bookmark  
  41.  93
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify potential (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  42. Cybersecurity Approaches for IoT Devices in Smart City Infrastructures.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-5.
    : The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  43.  72
    Data Loss Prevention (DLP) Strategies for Cloud-Hosted Applications.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    The assessment of cloud data loss prevention and encryption was the main emphasis of the current study. Cloud computing, another name for cloud-based technologies, boosts organizational effectiveness for appropriate data management procedures. By improving data visualization, cloud-based data loss or leakage prevention (DLP) helps businesses comprehend the risks and problems associated with appropriate data management. This study demonstrated how to handle data with encryption. The growth of company processes and the effective management of all activities through data management can benefit (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  44.  62
    Cloud-Native Observability Framework for Real-Time Monitoring in Large-Scale Insurance Systems.Sharma Anand - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (5).
    This work is a robust cloud native observability framework for monitor large scale real time of insurance systems. The improved system transparency, performance and fault diagnosis that is brought in by the integration of distributed tracing, log aggregation and metrics is proposed in this architecture. Experimental validation shows its effectiveness towards improving reliability and scalability while keeping operational efficiency in place in those environments built on microservices.
    Download  
     
    Export citation  
     
    Bookmark  
  45. Assessing Teachers' Competencies Related to Environment- sensitive Issues: Insights for Future Training and Professional Development.Anjali Sharma, Ranjana Sharma & Ramesh Chandra Nagda - 2025 - International Journal of Multidisciplinary Educational Research and Innovation 3 (2):1-12.
    The escalating global environmental issues highlight a significant deficiency in teacher education concerning pre-service teachers' competencies in addressing environment sensitive issues. In educational settings, contemporary techniques predominantly focus on attitudes, neglecting crucial elements such as environmental knowledge and skills. The present study aims to create and validate a standardized assessment scale, the Environmental Knowledge, Attitude, and Skill (EKAS) Scale, to comprehensively assess pre service teachers' competencies regarding environmental issues. Data were collected from 378 third-year pre-service teachers in science and social (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  46
    Bridging Communication Gaps: Sign Language Recognition with Deep Learning.Harshal Chaudhari AkhileshK. Sharma, Barbhudhe, Sarthak Sangale, Sakshi Wakchaure, Yash Shelake - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    Sign Language recongnition is getting more and more attention of the researchers due to its widespread applicability in many fileds. Conversation between both the deaf and the general population is becoming exceedingly challenging, and there is no reputable translator accessible in society to aid. This program enables real- time voice and signal language translation, in distinctive : 1. Recognizing male or female signals 2. Establishing a system learning model for interpreting image-to-text data. 3. Seeking innovative terms Four. 4. Constructing Sentences.5. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Reconnecting Humanity and Nature: A Philosophical Exposition of Arne Naess.Shruti Sharma - 2025 - Sandarshan 41:105-114.
    This paper expounds a philosophical approach aimed at the reconsideration of the relationship of human beings to nature, via Naess, who remains one of the interlocutors in the field of environmental ethics and founder of Deep Ecology. The tortuous pathway human-nature relations communication is explained, showing how ancient civilizations, Greeks included, recognised nature with respect and understood it as a harmonious and interrelated order. Yet with the emergence of Cartesian dualism at the dawn of modernity, nature becomes objectified, which piles (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Convergence of Mahatma Gandhi's Ecological Wisdom and The Principles of Deep Ecology for Sustainable Development.Shruti Sharma - 2025 - Shodha Pravaha 15 (1):29-36.
    As the world grapples with an escalating ecological crisis, there is a growing realization of the need to rethink the very relation between humankind and the natural environment. This paper explores how Mahatma Gandhi's ecological thought meets the philosophy of deep ecology and how these together might inform more holistic approaches to sustainable development. Gandhi's philosophical framework, which is founded upon principles of nonviolence, simplicity, and a decentralized approach to community organization, presaged numerous fundamental aspects of the deep ecology movement. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Encountering Asceticism: A Hindu nun in Jogan vis-à-vis a Buddhist monk in Trishagni.Shikha Sharma - 2020 - Journal of Visual Anthropology 33 (5).
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Diversity and Conservation Status of Fishes Inhabiting Chittaura Jheel, Bahraich, U.P.D. K. Yadav & A. K. Sharma - 2021 - Bulletin of Pure and Applied Sciences 40 (2):298-303.
    A study was carried out from October, 2020 to September, 2021to investigate the diversity of fishes and the conservation status of Chittaura Jheel (Bahraich), Uttar Pradesh. During the study period, 38 fish species belonging to 28 genera, 14 families and 7 orders have been identified. The order Cypriniformes was found the dominated order with 15 species(39.47%) followed by Siluriformes 10 species (26.31%), Perciformes 4 species (10.52%), Ophiocephaliformes 4 species (10.52%), Synbranchiformes2 species (5.26%), Osteoglossiformes 2 species (5.26%) and Clupiformes 1 species (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 100