true state
Recently Published Documents


TOTAL DOCUMENTS

148
(FIVE YEARS 37)

H-INDEX

14
(FIVE YEARS 2)

Author(s):  
E.KAVITHA

The Siddhars are the ones who know the true state of Enbor. They believe that lord is the true form. These are called meditation yoga without looking out for him the Siddhars are the ones who find the way inside the body and worship. The Siddhars have sung to eradicate the stereotypes that exist in the Society and give advice to the people out of concern for social welfare. At first they suffered and plowed into it, and beyond it they found pleasure. The pleasure that comes from suffering is the best. The vision of pleasure first and then suffering is the worst, the Siddhas are the ones who know themselves completely. There are three divisions of Siddhars namely Kaya siddhar, Gnana Siddhar and Sanmarka Siddhar.


2022 ◽  
Vol 354 ◽  
pp. 00021
Author(s):  
Liliana Roman ◽  
Mircea Georgescu

Jiu Valley is currently the only national mining basin capable of producing pit coal. Romania has undergone an extensive industrial restructuring in the last 30 years, including mining, which has led to job losses, generated economic-social and environmental effects that have severely affected the quality of life of the inhabitants of mining communities. As a consequence, the Mining Strategy of Romania 2017 - 2035 was elaborated. The paper analyses the objectives, measures and actions provided in the strategy related to the exploitation of pit coal, putting, face to face, the true state of the mines and the inhabitants of Jiu Valley. 4 years after the elaboration of the Strategy, it is clear that it has not yet come to life: mines are still being closed, there is no clear vision for the sustainable development of mining communities, the mine closure process, the greening of post-closure areas is difficult or not at all, research (e.g. capture of methane from coal), development and innovation are not stimulated, the operation of coal-fired power plants is endangered, with major implications on the supply of inhabitants with heating and of domestic hot water -resulting in major discomfort for locals.


2021 ◽  
Vol 13 (22) ◽  
pp. 12791
Author(s):  
Jie Wang ◽  
Biyu Peng ◽  
Xiaohua Xia ◽  
Zhu Ma

Focusing on the rapid rise of China’s housing prices in recent years, in this paper, we construct a model using the cheap talk game that centers on how information receivers in a market make inferences about the true state of the information based on the cost-free signals they receive and then make decisions based on these inferences, which in turn affect market equilibrium. By constructing a cheap talk game model of house prices, we examine the correlation between market expectations, economic fundamentals, and individual housing purchase decisions. Then, we conduct an empirical analysis using the dynamic GMM method based on the panel data of 35 large and medium-sized cities in China. The analysis reveals that: (1) when the whole of society expects housing prices to rise, housing prices will rise regardless of the true state of economic fundamentals; (2) when information on economic fundamentals is accurate and reliable, home buyers tend to make purchase decisions based on such information, thus maximizing the utility of society as a whole; but when information on economic fundamentals is unreliable, home buyers tend to make purchase decisions according to their own housing price expectations, which is not conducive to the optimization of the utility of society as a whole; (3) the empirical results also reveal that expectations are a non-negligible factor in the rise of housing prices, and the coefficient of expectations exceeds that of each economic fundamental; this demonstrates the investment-driven attribute of the housing market in China. At the same time, economic fundamentals have a definite effect on housing prices, which implies that the rise of housing prices in China is supported by objective conditions.


Author(s):  
Karthiga B ◽  
Rekha M

Virtual brain research is accelerating thedevelopment of inexpensive real-time Brain Computer Interface (BCI). Hardware improvements that increase the capability of Virtual brain analyse and Brain Computer wearable sensors have made possible several new software frameworks for developers to use and create applications combining BCI and IoT. In this paper, we complete a survey on BCI in IoT from various perspectives; including Electroencephalogram (EEG) based BCI models, machine learning, and current active platforms. Based on our investigations, the main findings of this survey highlights three major development trends of BCI, which are EEG, IoT, and cloud computing. Using this it is completely useful for finding the true state of whether the brain is alive or dead. If it is alive, then the activity of the brain is monitored and stored. Through this anyone can come to conclusion that whether the action done is legal or illegal. And this has an advantage for 2 scenarios. First is for AUTISM affected people and secondly Forgery in asset documents. And if any changes in the status of the brain then it will be send to the specific person in their relation using SMS & Email id.


2021 ◽  
Vol 7 ◽  
pp. e545
Author(s):  
Daniyal Alghazzawi ◽  
Ghadah Aldabbagh ◽  
Abdullah Saad AL-Malaise AL-Ghamdi

The development of the Internet of Things (IoT) expands to an ultra-large-scale, which provides numerous services across different domains and environments. The use of middleware eases application development by providing the necessary functional capability. This paper presents a new form of middleware for controlling smart devices installed in an intelligent environment. This new form of middleware functioned seamlessly with any manufacturer API or bespoke controller program. It acts as an all-encompassing top layer of middleware in an intelligent environment control system capable of handling numerous different types of devices simultaneously. This protected de-synchronization of data stored in clone devices. It showed that in this middleware, the clone devices were regularly synchronized with their original master such as locally stored representations were continuously updated with the known true state values.


2021 ◽  
Vol 2 (4) ◽  
Author(s):  
Antonis Loizou ◽  
Jacqueline Christmas

AbstractVideo of the ocean surface is used as a means for estimating the sea state. Time series of pixel intensity values are given as input to a method that uses the Kalman filter and the least squares approximate solution for estimating the uncalibrated video amplitude spectrum. A method is proposed for scaling this spectrum to metres with the use of an empirical model of the ocean. The significant wave height is estimated from the calibrated video amplitude spectrum. The results are tested against two sets of video data, and buoy measurements in both cases are solely used for indicating the true state. For significant wave height values between 0.5 and 3.6 m, the maximum observed value of root mean square error is 0.37 m and of mean absolute percentage error 16%.


2021 ◽  
Vol 9 (2) ◽  
pp. 180
Author(s):  
Anri Yani

The data analysis tool used is an interview that describes an object of research in its true state. This study aims to explore facts which are then described with guidelines on the question items in observation, interviews and field documentation. Data collection techniques using observation, interviews, documentation, and literature. The results of the analysis show that the handling of outgoing cargo starting from acceptance, weighing goods, making documents (documentation, marking, labeling & x-tray cargo, storage, build-up and loading, is smooth, but there are several things that must be considered, namely every year. Outgoing cargo increases the number of employees and employees must pay more attention to the existing SOP in order to minimize the obstacles that will occur. It is hoped that this research can become a better input for the handling of outgoing cargo to the smooth operation of outgoing cargo handling.


Author(s):  
Timo Henckel ◽  
Gordon D. Menzies ◽  
Peter G. Moffatt ◽  
Daniel J. Zizzo

AbstractWe present an experiment where subjects sequentially receive signals about the true state of the world and need to form beliefs about which one is true, with payoffs related to reported beliefs. We attempt to control for risk aversion using the Offerman et al. (Rev Econ Stud 76(4):1461–1489, 2009) technique. Against the baseline of Bayesian updating, we test for belief adjustment underreaction and overreaction and model the decision making process of the agent as a double hurdle model where agents with inferential expectations first decide whether to adjust their beliefs and then, if so, decide by how much. We also test the effects of increased inattention and complexity on belief updating. We find evidence for periods of belief inertia interspersed with belief adjustment. This is due to a combination of random belief adjustment; state-dependent belief adjustment, with many subjects requiring considerable evidence to change their beliefs; and quasi-Bayesian belief adjustment, with aggregate insufficient belief adjustment when a belief change does occur. Inattention, like complexity, makes subjects less likely to adjust their stated beliefs, while inattention additionally discourages full adjustment.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kenneth Albert Saban ◽  
Stephen Rau ◽  
Charles A. Wood

Purpose Information security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness Model that was developed to examine how SME executives’ perceptions of security importance, implementation challenges and external influences impact their awareness and commitment to security preparedness. Design/methodology/approach Funded by the Department of Justice, a national survey of SME executives’ perceptions of information security preparedness was conducted. Using PLS-SEM, the survey responses were used to test the proposed Information Security Preparedness Model. Findings The results indicate that as perceptions of security importance and external influences increase, SME executives’ awareness and commitment to information security also increases. In addition, as implementation challenges increase, awareness and commitment to information security decreases. Finally, as security importance and awareness and commitment to information security increases, executives’ perception of security preparedness also increases. Research limitations/implications Executive perceptions of information security were measured and not the actual level of security. Further research that examines the agreement between executive perceptions and the true state of information security within the organization is warranted. Originality/value Prior information security studies using Roger’s (1975, 1983) Protection Motivation Theory have produced mixed results. This paper develops and tests the Information Security Preparedness Model to more fully explain SME executive’s perceptions of information security.


Sign in / Sign up

Export Citation Format

Share Document