Results for 'Ravi Sharma'

86 found
Order:
  1. Phaedo 100B3-9.Ravi Sharma - 2015 - Mnemosyne 68 (3):393-412.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. The Importance of Being Erroneous.Nils Kürbis - 2021 - Australasian Philosophical Review 2 (3):155-166.
    This is a commentary on MM McCabe's "First Chop your logos... Socrates and the sophists on language, logic, and development". In her paper MM analyses Plato's Euthydemos, in which Plato tackles the problem of falsity in a way that takes into account the speaker and complements the Sophist's discussion of what is said. The dialogue looks as if it is merely a demonstration of the silly consequences of eristic combat. And so it is. But a main point of MM's paper (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  3. Moral Principles as Generics.Ravi Thakral - 2024 - Journal of the American Philosophical Association 10 (2):205-224.
    I argue that moral principles involve the same sort of generalization as ordinary yet elusive generic generalizations in natural language such as ‘Tigers are striped’ or ‘Peppers are spicy’. A notable advantage of the generic view is that it simultaneously allows for pessimism and optimism about the role and status of moral principles in our lives. It provides a new perspective on the nature of moral principles on which principles are not apt for determining the moral status of particular actions (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Generics and Weak Necessity.Ravi Thakral - 2018 - Inquiry: An Interdisciplinary Journal of Philosophy:1-28.
    A prevailing thought is that generics have a covert modal operator at logical form. I claim that if this is right, the covert generic modality is a weak necessity modal. In this paper, I pr...
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  5. Shodasi : Secrets of the Ramayana.Seshendra Sharma & Sharma Seshendra - 2015 - Hyderabad : India: Saatyaki S/o Seshendra Sharma.
    Ramayan Through Kundalini Yoga Shodasi is an ideal read for Sanskrit-literate readers who are open to eclectic yogarthas and connotative meanings -------- So you thought Vyasa was before Valmiki, Mahabharat was before Ramayan, Rama a Vishnu avatar, and tantrism distinct from vedism? Think again. In Shodasi: Secrets of the Ramayana, Telugu poet Seshendra Sharma re-reads the Ramayan to come up with a number of new conclusions. Much of the book sets out to prove that Ramayan was written before the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Inner Light Perception as a Quantum Phenomenon-Addressing the Questions of Physical and Critical Realisms, Information and Reduction.Ravi Prakash & Michele Caponigro - unknown
    Subjectivity or the problem of ‘qualia’ tends to make the accessibility and comprehension of psychological events intangible especially for scientific exploration. The issue becomes even more complicated but interesting when one turns towards mystical experiences. Such experiences are different from other psychological phenomena in the sense that they don’t occur to every one, so are difficult to comprehend even for their qualifications of existence. We conducted a qualitative study on one such experience of inner-light perception. This is a common experience (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Translation: Shri Arvind Ka Shiksha Darshan.K. K. Sharma, Saroj Sobti, Ramesh Kumar Parwa, Suresh Kumar & Desh Raj Sirswal - 2010 - Ambala Cantt.: Centre for Sri Aurobindo Studies.
    Download  
     
    Export citation  
     
    Bookmark  
  8. COVID-19 Pandemic: Evidences from Clinical Studies.Ravi Shankar Singh, Abhishek Kumar Singh, Kamla Kant Shukla & Amit Kumar Tripathi - 2020 - Journal of Community and Public Health Nursing 6 (4):251.
    The public health crisis is started with emergence of new coronavirus on 11 February 2020 which triggered as coronavirus disease-2019 (COVID-19) pandemics. The causative agent in COVID-19 is made up of positively wrapped single-stranded RNA viruses ~ 30 kb in size. The epidemiology, clinical features, pathophysiology, and mode of transmission have been documented well in many studies, with additional clinical trials are running for several antiviral agents. The spreading potential of COVID-19 is faster than its two previous families, the severe (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  78
    Proctored Exam System for Hackathon Candidate Shortlisting.V. V. Ravi Teja - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (3):1-12.
    The 'Proctored Exam System for Hackathon Candidate Shortlisting' is an advanced solution designed to streamline and secure the candidate evaluation process for national and international hackathons. This system includes a secure login page, comprehensive instructions for candidates, a quiz interface with real- time webcam monitoring, and a dynamic results page. By facilitating remote exams, it ensures integrity and fairness, enhancing trust among participants and organizers. The system's proctoring features monitor candidate activity to prevent any unfair practices, making the selection process (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. The case for introducing the study of religion in India.Arvind Sharma - 2016 - Argument: Biannual Philosophical Journal 6 (1):21-29.
    The author o ers a brief report of introducing the study of religion in India since 194 While doing so he refers to the Constitution of India, so-called Nehruvian Consensus, the Kothari Commission which made an important distinction between ‘religious education’ and ‘educa- tion about religion’, as well as several other bodies responsible for national policy on education, which gave a unique shape of Indian secularism.
    Download  
     
    Export citation  
     
    Bookmark  
  11. Experimental research to Optimize Process Parameters in Machining of Non Conducting Material with hybrid non conconventional machining.Vikrant Sharma & Sunil Kumar - 2017 - International Journal of Trend in Scientific Research and Development 1 (4):107-116.
    Among all non conventional micro machining, electrochemical discharge machining ECDM is having high quality of material removal rate with zero residual stress. This machining has been accepted as a highly modern technology in micromachining. In this paper an effort has been done on micro drilling of glass using electrochemical discharge machining ECDM . A fixed tool and a step down transformer have been used to support the steady machining to increase the accuracy of work piece. The input parameters used in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  67
    Advancements and Applications of Generative Artificial Intelligence and show the Experimental Evidence on the Productivity Effects using Generative Artificial Intelligence.Sharma Sakshi - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology (Ijmrset) 6 (3):657-664.
    We investigate the productivity impacts of a generative artificial intelligence technology—specifically, the assistive chatbot ChatGPT—within the realm of mid-level professional writing tasks. In a preregistered online experiment, we assigned occupation-specific, incentivized writing tasks to 444 college-educated professionals, with half of the participants randomly exposed to ChatGPT. Our findings reveal that ChatGPT significantly enhances average productivity: the time taken to complete tasks decreases by 0.8 standard deviations, and output quality improves by 0.4 standard deviations. Additionally, the use of ChatGPT reduces inequality (...)
    Download  
     
    Export citation  
     
    Bookmark   82 citations  
  13.  56
    Assessment of Web Services based on SOAP and REST Principles using Different Metrics for Mobile Environment and Multimedia Conference.Sharma Sakshi - 2023 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 12 (8):1701-1709.
    This article presents a comprehensive assessment of web services based on SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) principles, focusing on their application in mobile environments and multimedia conference scenarios. As web services enable seamless communication and data exchange across diverse systems, understanding their performance characteristics in different contexts is crucial. SOAP, with its protocol-driven approach and emphasis on security and reliability, and REST, known for its simplicity, scalability, and efficiency, are evaluated using key performance metrics such (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  14.  61
    A Large-Scale Empirical Study Identifying Practitioners' Perspectives on Challenges in Docker Development: Analysis using Stack Overflow.Sharma Sakshi - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (2):1104-1111.
    This study investigates Docker-related topics and challenges through an analysis of Stack Overflow posts to identify prevalent issues and trends in Docker development. By leveraging both tag-based and content-based filtering methods, we compiled a comprehensive dataset of Docker discussions. Latent Dirichlet Allocation (LDA) topic modeling was employed to categorize these discussions, revealing that Application Development is the predominant focus, encompassing areas such as Framework Management, Coding Issues, Data Transfer, and Dockerspecific frameworks. This dominant category reflects developers' substantial interest in leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   94 citations  
  15.  60
    Design and Implementation of a Pattern-based J2EE Application Development Environment.Sharma Sakshi - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 11 (1):190-200.
    This paper presents the design and implementation of a pattern-based J2EE application development environment aimed at streamlining the development process, enhancing code quality, and improving maintainability. We begin with an exploration of the fundamental principles of J2EE and the role of design patterns in software engineering. This is followed by a detailed discussion on the selection and application of various design patterns specifically tailored for J2EE, such as Singleton, Factory, Data Access Object (DAO), and Model-View-Controller (MVC).
    Download  
     
    Export citation  
     
    Bookmark   70 citations  
  16.  69
    Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications.Sharma Sakshi - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (12):12220-12226.
    Traditional project risk management techniques are becoming less and less effective in the age of Industry 4.0, which is defined by sophisticated automation, data interchange, and cyber-physical systems. It suggests a new framework that improves risk detection, assessment, and mitigation techniques by utilising technology like artificial intelligence (AI), big data analytics, and the Internet of Things (IoT). This paper illustrates how Industry 4.0 is revolutionising risk management procedures by looking at actual case studies and industry implementations. The framework offers practical (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  17. Fitting Things Together: Coherence and the Demands of Structural Rationality, written by Alex Worsnip. [REVIEW]Ravi Thakral - 2024 - Journal of Moral Philosophy 21 (5-6).
    Download  
     
    Export citation  
     
    Bookmark  
  18.  40
    Examination of Anomaly Process Detection Using Negative Selection Algorithm and Classification Techniques.Sharma Sakshi - 2020 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 9 (6):2526-2534.
    The examination of anomaly process detection using negative selection algorithms and classification techniques focuses on enhancing the ability to identify deviations from expected patterns within complex data sets. Negative selection algorithms, inspired by biological immune systems, offer a novel approach to anomaly detection by efficiently distinguishing between normal and anomalous data points. When combined with various classification techniques, these algorithms can improve the accuracy and robustness of anomaly detection systems. This abstract explores the integration of negative selection algorithms with traditional (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  19. Theory of Multiple thinking environments.Ravi Singh - manuscript
    Theory of multiple thinking environments As there is a physical environment, there exists a psychological environment that governs many psychological processes including our thinking. This psychological environment is unique to each person and is framed in the initial few years since the child is born and represents the native environment of that person. This psychological environment is a collection of all those elements responsible for it to become a source of thought and maintain that thought for its life cycle. (In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  20
    Deep Learning-Based Speech Emotion Recognition.Sharma Karan - 2022 - International Journal of Multidisciplinary and Scientific Emerging Research 10 (2):715-718.
    Speech Emotion Recognition (SER) is an essential component in human-computer interaction, enabling systems to understand and respond to human emotions. Traditional emotion recognition methods often rely on handcrafted features, which can be limited in capturing the full complexity of emotional cues. In contrast, deep learning approaches, particularly convolutional neural networks (CNNs), recurrent neural networks (RNNs), and long short-term memory (LSTM) networks, offer more robust solutions by automatically learning hierarchical features from raw audio data. This paper reviews recent advancements in deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. ‘You do it like this!’: Bare Impersonals as Indefinite Singular Generics.James Ravi Kirkpatrick & Joshua Knobe - forthcoming - Inquiry: An Interdisciplinary Journal of Philosophy.
    Sentences with impersonal pronouns, like 'You do it like this', seem to make both statistical and prescriptive claims, that a certain way of behaving is common and that it is prescriptively good. We argue that these kinds of sentences are closely related to another kind of sentence, namely, indefinite singular generics, like 'A person does it like this'. We propose that there is a single underlying mechanism that allows both kinds of sentences to express mixed statistical/prescriptive readings. We then provide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Interpretations of Quantum Mechanics and Emptiness.Michele Caponigro & Ravi Prakash - 2009 - NeuroQuantology Journal, June 2009 7 (2):198-203.
    The underlying physical reality is a central notion in the interpretations of quantum mechanics. The a priori physical reality notion affects the corresponding interpretation. This paper explore the possibility to establish a relationship between philosophical concept of physical reality in Nagarjuna's epistemology (emptiness) and the picture of underlying physical reality in Einstein, Rovelli and Zeilinger positions. This analysis brings us to conclude that the notion of property of a quantum object is untenable. We can only speak about relational property of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. , step by step free seo.Rajendra Sharma - manuscript
    You can search on internet for free SEO tips. But there language is very difficult. There technical word is not easily understandable for new website developer. If you will follow the tips we will give you guarantee that your site can get good rank.http://www.aboutevery.com/step-by-step-free-seo-process.html -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  24. Diversity and Conservation Status of Fishes Inhabiting Chittaura Jheel, Bahraich, U.P.D. K. Yadav & A. K. Sharma - 2021 - Bulletin of Pure and Applied Sciences 40 (2):298-303.
    A study was carried out from October, 2020 to September, 2021to investigate the diversity of fishes and the conservation status of Chittaura Jheel (Bahraich), Uttar Pradesh. During the study period, 38 fish species belonging to 28 genera, 14 families and 7 orders have been identified. The order Cypriniformes was found the dominated order with 15 species(39.47%) followed by Siluriformes 10 species (26.31%), Perciformes 4 species (10.52%), Ophiocephaliformes 4 species (10.52%), Synbranchiformes2 species (5.26%), Osteoglossiformes 2 species (5.26%) and Clupiformes 1 species (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  24
    MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  95
    Husserl’s Phenomenology: A Feminist and Lacanian Reappraisal.Dhriti Sharma - manuscript
    Husserl's Phenomenology: A Lacanian and Feminist Reappraisal -/- This study undertakes a comprehensive critique of Edmund Husserl's phenomenology, highlighting its limitations and omissions. Through Lacanian psychoanalysis, feminist perspectives, and intersubjective theories, this analysis challenges Husserl's notions of bracketing, reduction, and absolute givenness. Key concerns include the neglect of unconscious dynamics, symbolic structures, embodied experience, and cultural contexts. Critics such as Zizek, Sartre, Quine, and Rorty are engaged in addressing issues of solipsism, truth, and ideology. This evaluation underscores the need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  26
    THE GROWING THREAT OF DEEPFAKES: IMPLICATIONS FOR SECURITY AND PRIVACY.Sharma Sidharth - 2020 - Journal of Artificial Intelligence and Cyber Security (Jaics) 4 (1):24-29.
    Deep fakes, a technology enabling the creation of highly realistic fake images and videos through face-swapping, have sparked significant attention due to their potential for misuse. This paper explores the technologies behind deep fakes and categorizes them into four types: deep fake pornography, political campaigns, commercial uses, and creative content. The authors discuss the ethical and regulatory challenges associated with each category. Initially, deep fakes were used maliciously, such as in revenge porn and political manipulation, which led to widespread fear. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  29
    QUANTUM-ENHANCED ENCRYPTION TECHNIQUES FOR CLOUD DATA PROTECTION.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):15-20.
    The convergence of cloud computing, blockchain technology, and the emerging era of quantum computing presents significant challenges for data security. This research tackles these growing vulnerabilities by introducing a comprehensive security framework that integrates Quantum Key Distribution (QKD), CRYSTALS-Kyber, and Zero-Knowledge Proofs (ZKPs) to protect data in cloud-based blockchain systems. The primary goal is to safeguard information against quantum threats through QKD, a quantum-secure cryptographic protocol. To enhance resilience against quantum attacks, the framework employs CRYSTALSKyber, a lattice-based encryption mechanism. Additionally, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  23
    DATA LOSS PREVENTION (DLP) STRATEGIES IN CLOUD-HOSTED APPLICATIONS.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-8.
    The assessment of cloud data loss prevention and encryption was the main emphasis of the current study. Cloud computing, another name for cloud-based technologies, boosts organizational effectiveness for appropriate data management procedures. By improving data visualization, cloud-based data loss or leakage prevention (DLP) helps businesses comprehend the risks and problems associated with appropriate data management. This study demonstrated how to handle data with encryption. The growth of company processes and the effective management of all activities through data management can benefit (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  28
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic traffic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  27
    POST-QUANTUM CRYPTOGRAPHY: PREPARING FOR A QUANTUM COMPUTING ERA.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-6.
    The rapid advancement of quantum computing poses a significant threat to classical cryptographic systems, particularly those based on RSA, ECC, and other public-key algorithms. With Shor’s algorithm capable of efficiently factoring large numbers and breaking current encryption standards, the transition to postquantum cryptography (PQC) has become a global priority. This paper explores the impact of quantum computing on cryptographic security, the need for quantum-resistant cryptographic algorithms, and ongoing standardization efforts led by organizations such as NIST. We analyze various post-quantum cryptographic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  25
    MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine learning techniques (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  23
    ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):7-12.
    Hybrid cloud environments combine private and public cloud infrastructures to optimize security, scalability, and cost-effectiveness. However, ensuring secure access control in such environments remains a critical challenge due to dynamic workloads, multi-tenancy, and cross-cloud authentication complexities. This paper explores access control models tailored for secure hybrid cloud deployment, focusing on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and emerging Zero Trust principles. We analyze their effectiveness in mitigating unauthorized access, privilege escalation, and insider threats. Additionally, a novel hybrid model (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  22
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  32
    Edutech For All: Bridging Gaps in Inclusive Learning.Ravi Prasad Dasu Vaman - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-10.
    This project addresses the critical need for improved compliance, governance, and conduct in the educational ecosystem for specially-abled students. While educational institutions have made progress toward inclusivity, many still lack effective frameworks to fully support these students' needs. This study assesses the current landscape by reviewing policies, analyzing institutional practices, and gathering insights from educators, administrators, and advocacy groups. Key findings indicate gaps in policy adherence, insufficient training for staff, and inconsistencies in governance models that prevent effective support for specially-abled (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Kundalini Yoga & Gayathri Mantra in Valmiki Ramayana.Seshendra Sharma Mr - manuscript
    Valmiki , The Sage of 5th century B.C wrote The Ramayana not to narrate the story of Rama in an absorbing style. Though the epic poem presents Rama’s Journey of life in enchanting poetry , the story and the enchanting poetry are sugar coating or honey to the organic medicine called Kundalini Yoga. Maharshi Valmiki wrote the Ramayana to spread / propagate Kundalini Yoga among the masses. Thus the soul of The Ramayana is Kundalini Yoga / Sri Vidya. Valmiki embedded (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. FACTORS INFLUENCING E-CRM IN AIRLINES IN J& K.Jyoti Sharma - 2014 - SOCRATES 2 (1):134-145.
    Today every organization is acting in a dynamic environment and in a world characterised by turbulent change and fierce competition due to technological advancement and the knowledge based economy, an organization must always ready to adapt and transform themselves so as to be able to confront the shifting needs of the new environment, more demanding customers, smarter workers, anticipating ability to changes, accelerating the development of new products, processes and services, changing technologies and customer expectations, businesses have realised the importance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Vaigyanik Shiksha: Samajik Sarokaron ka Sandarbh.Manish Sharma - 2022 - Samantar 23 (02):31-34.
    इस पर्चे में मैंने विज्ञान के विकास को आधुनिकता की पृष्टभूमि में मानव-मुक्ति के लक्ष्य की दशा व दिशा के सन्दर्भ में आलोचनात्मक विश्लेषण पद्धति से समझने का प्रयास किया है। इस कार्य के लिए मैंने पेपर में चार प्रमुख बिंदुओं को उढाया है। -/- पहला बिंदु विज्ञान की मूल्य निरपेक्षता (Value neutrality) को लेकर है जिसके तहत मैंने पूँजी के साथ विज्ञान के संबंध को समझने का प्रयास किया है। -/- दूसरे बिंदु में विज्ञान शिक्षा और सामाजिक सरोकार के (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Inquiring Universal Religion in the Times of Consumer Mythology.Manish Sharma - 2022 - Rabindra Bharati Journal of Philosophy 23 (09):17-24.
    Human beings as self-conscious, aesthetic, sympathetic, and empathetic beings develop various ways to live in this world. They continue to aspire for a better version of themselves and their lives. In this process, they developed certain ethical norms, social practices, and ways to perceive and understand this world. These qualities become the basis for proactive steps of spirituality which in turn become the foundation of religion. In human history, religion has helped individuals to fulfill various human needs irrespective of their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Exploring the Concept of Self in Shrimad Bhagwat Gita for Developing Environmental Consciousness.Manish Sharma - 2021 - Gurukul Patrika 73 (02):96-107.
    In the contemporary era, we identify ourselves based on what we consume or what we possess. Besides, various advertisements, celebrities, and other influential personalities encourage and make us believe that we can make a new identity by consuming a specific brand, or relating to a particular institution or connecting with an extraordinary group, etc. Hence, we tend to identify ourselves with consumer goods. In such conditions, Srimad Bhagwat Gita becomes significantly relevant to look for alternative way of life. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Identifying Philosophical Themes to Develop a Holistic Model for Education in the Twenty First Century.Manish Sharma - 2017 - Innovative Research Thoughts 3 (08):142-154. Translated by Manish Sharma.
    Twenty first century is posing unprecedented challenges for the human existence and development. This era has witnessed awesome economic & technological growth, increased connectedness but great poverty, malnutrition, anxiety, mental stress and environmental degradation. Thus, this time depicts great contradiction, uncertainty, and risk. Accordingly, in this era a holistic education system has to deal with the challenges such as population growth, terrorism, environmental degradation, hegemony of machines, mental stress, cultivating creativity, bridging the skill and wisdom gap, and expanding human potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Generic Excluded Middle.James Ravi Kirkpatrick - 2023 - Philosophers' Imprint.
    There is a standard quantificational view of generic sentences according to which they have a tripartite logical form involving a phonologically null generic operator called 'Gen'. Recently, a number of theorists have questioned the standard view and revived a competing proposal according to which generics involve the predication of properties to kinds. This paper offers a novel argument against the kind-predication approach on the basis of the invalidity of Generic Excluded Middle, a principle according to which any sentence of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Commentaries on David Hodgson's "a plain person's free will".Graham Cairns-Smith, Thomas W. Clark, Ravi Gomatam, Robert H. Kane, Nicholas Maxwell, J. J. C. Smart, Sean A. Spence & Henry P. Stapp - 2005 - Journal of Consciousness Studies 12 (1):20-75.
    REMARKS ON EVOLUTION AND TIME-SCALES, Graham Cairns-Smith; HODGSON'S BLACK BOX, Thomas Clark; DO HODGSON'S PROPOSITIONS UNIQUELY CHARACTERIZE FREE WILL?, Ravi Gomatam; WHAT SHOULD WE RETAIN FROM A PLAIN PERSON'S CONCEPT OF FREE WILL?, Gilberto Gomes; ISOLATING DISPARATE CHALLENGES TO HODGSON'S ACCOUNT OF FREE WILL, Liberty Jaswal; FREE AGENCY AND LAWS OF NATURE, Robert Kane; SCIENCE VERSUS REALIZATION OF VALUE, NOT DETERMINISM VERSUS CHOICE, Nicholas Maxwell; COMMENTS ON HODGSON, J.J.C. Smart; THE VIEW FROM WITHIN, Sean Spence; COMMENTARY ON HODGSON, Henry (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Credit Risk Modeling Using Default Models: A Review.George Jumbe & Ravi Gor - 2022 - IOSR Journal of Economics and Finance 13 (3):28-39.
    Credit risk, also known as default risk, is the likelihood of a corporation losing money if a business partner defaults. If the liabilities are not met under the terms of the contract, the firm may default, resulting in the loss of the company. There is no clear way to distinguish between organizations that will default and those that will not prior to default. We can only make probabilistic estimations of the risk of default at best. There are two types of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. An Assessment of Idealism In light of Indian Philosophy (भारतीय दर्शन में प्रत्ययवाद की गत्यात्मक दृष्टि).Shruti Sharma - 2021 - Insight - an International Multilingual Journal for Arts and Humanities 1 (5 july 2021):135-143.
    The viewpoint of the Indian way of thinking is a greater amount of inborn as opposed to outward. Which gives more worth to current realities. In any event, to know the idea of fundamental reality, human insight first needs to know the idea of the outside world. It specifies are additionally predominant in Upanishads, where it has been expressed that faculties are more extraneous while knowing the external world. This research paper particularly centers around the idealist viewpoint with uncommon reference (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. The essence of result-driven categorization.Kartik Sharma - manuscript
    This paper attempts to argue that it is categorization, not generalization, that is more valuable by examining essence, interest, ontology, rationalism, and truth. While generalization is invariably oversimplified, categorization gives an exact insight with a fine grain into the entities by referring to their intrinsic properties. Categorization supplies an ordered, transparent form for knowledge through a rationalist approach, thereby arriving at clearer and more accurate representations of reality. The importance of categorization lies in its philosophical contribution to differentiating things in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Heidegger Being and Time, Sein und Zeit (1927): An Index.Daniel Fidel Ferrer & Ritu Sharma - 2016 - archive.org.
    Heidegger Being and Time, Sein und Zeit (1927): An Index -/- By -/- Daniel Fidel Ferrer -/- and -/- Ritu Sharma -/- 1. Heidegger, Martin, -- 1889-1976. 2. Heidegger, Martin, -- 1889-1976 -- Concordances. 3. Heidegger, Martin, -- 1889-1976 -- Indexes. 4). Metaphysics. 5). Philosophy, German. 6). Heidegger, Martin; -- Wörterbuch. 7). Sein und Zeit. English. 8). Ontology. 9). Space and time. 10). Being and Time [Sein und Zeit]. I. Ferrer, Daniel Fidel, 1952-. II. Sharma, Ritu. -/- Pages (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Short report on initial political polarization/argument visualization study.Simon Cullen & Vidushi Sharma - manuscript
    This document provides a brief report on initial research into how argument presentation affects susceptibility to confirmation bias as well as feelings toward political opponents.
    Download  
     
    Export citation  
     
    Bookmark  
  49.  24
    Harnessing Guidewire Claim Center for Optimized Claim Management: A Blueprint for Efficiency and Customer Satisfaction.Ravi Teja Madhala Sateesh Reddy Adavelli - 2019 - International Journal of Innovative Research in Science, Engineering and Technology 8 (11):11466-11479.
    In today’s fast moving insurance environment, efficient claim management is a vital business practice to improve operational effectiveness and provide an exceptional customer experience. Based on the first notice of loss (FNOL), Guidewire Claim Center, the leading claims management platform, gives insurers the thorough, scalable, and customizable option to accelerate the claims process from FNOL to final resolution. In this paper, we explore how insurers adapt Guidewire Claim Center to enable effective utilization of Guidewire Claim Center to optimize and transform (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. PHYTOCHEMICAL COMPOSITION AND IN VITRO ANTIOXIDANT ACTIVITIES OF THE GENUS CITRUS PEEL EXTRACTS: A SYSTEMATIC REVIEW.Deeksha Parmar, Deeksha Sharma, Mohit Pant & Siddhartha Dan - 2020 - International Research Journal of Modernization in Engineering Technology and Science 2 (9):953-961.
    India is the leading producer of fruits worldwide. The major problem after citrus fruits consumption is their peel that are hazardous to our environment and mainly regarded as a solid waste however, they are rich sources of fibres, large amount of Vitamin C, phenolics and flavonoids which are best agents of antioxidant. In this paper, we have discussed about the orange peel waste which has many beneficial roles in our daily life. Citrus peel has the highest number of Phytochemicals such (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 86