1,303 research outputs found

    A critical review of fundamental principles of Ayurveda

    Get PDF
    The fundamental principle holds a strong ground in Ayurveda. Every medical stream has its own science in which its matter is developed, evolved and explained. From creation of living to issues of health, disease and its treatment these fundamental principles are the root. These can be enumerated as Tridosha, Panchamahabhuta, Prakriti, Ojas, Dhatu, Mala, Agni, Manas, Atma etc. They are most unique and original approach to the material creation and it has all scope to incorporate the modern development in the elemental physics. The aim of Ayurveda is to maintain the proper equilibrium of dosa, dhatus, and mala constituent in order to preserve health in a healthy person and cure a disease in a diseased person.The presence of cognition as well as the absence of cognition is an indication of the mind. In the presence of senses with senses object and soul the man does not perceive a thing in the absence of mind that is to say that senses are unable to grasp the object in the absence of Manas. The term Ojas has been used in Ayurveda for the factor which prevents decay and degeneratioif the body and provides strength and support against a disease. Concept of Agni which incorporates all activities and factors responsible for digestion and metabolism in the living organism as known today, knowledge to these fundamental principles is a key to health and diseases .Maintenances of health depend on good and sound knowledge of these. Detail will be given in full paper. Keywords: Ayurveda, health, dosa, Agni, min

    Factors influence OSH acceptance in Kencana Torsco Sdn Bhd, Sitiawan, Perak

    Get PDF
    This research paper presents the success factor in the acceptance towards Occupational Safety and Health (OSH). OSH acceptance among human being can be varies among us and be influenced with certain factors. However, the study is to identify which factors that influences most in the success of Safety and Health in an organization. There are many sectors in Malaysia that are actually not really fully complying towards our Occupational safety and Health Act (OSHA) 1994 that can lead to many serious workplace incident and fatality as well. OSH is big terms that represent the company’s backbone. The weak and strength of OSH in an organization will define the strength and weak the organization will be. Furthermore, OSH cannot move alone by itself, therefore the success of OSH at a workplace can be seen if there is two parties make the same approach and responsibilities that enable the OSH become more effective. This is all about management commitment and employees acceptance and support towards OSH. Therefore the objective of this paper is to find out what are the needs to improve OSH in the organization that are influenced by human facto

    Economic value of water in agriculture: comparative analysis of a water-scarce and water-rich region in India

    Get PDF
    Water productivityEconomic evaluationCrop productionIrrigated farmingWater costsWellsLivestockMilk production

    Social costs and benefits of micro irrigation system adoption in canal commands: a study from IGNP command area of Bikaner in Rajasthan

    Get PDF
    Irrigation systemsDrip irrigationSprinkler irrigationCrop productionWater productivityLivestockCost benefit analysis

    AN AUTHENTICATED, SECURE VIRTUALIZATION MANAGEMENT SYSTEM IN CLOUD COMPUTING

    Get PDF
    Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, virtualization†is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.Â

    Assessment of Genetic Diversity in Wild Raspberry (Rubus ellipticus Smith) Native to North-Western Himalayan Region

    Get PDF
    Nature and magnitude of genetic diversity was assessed in 170 wild raspberry genotypes based on eight quantitative characteristics, viz., fruit weight, fruit length, fruit breadth, TSS, acidity, reducing sugars, non-reducing sugars and Vitamin C. A survey was conducted in three north-western Himalayan states of Himachal Pradesh, Jammu&Kashmir and Uttarakhand. The species was found to be distributed between 760 and 1950m AMSL, 30°10'159" to 33°04'693"N and 74°44'076" to 78°25'681"E. The non-hierarchical cluster analysis resulted in 12 clusters of genotypes. The cluster pattern did not exhibit any interrelation between geographical isolation and genetic diversity. Of the 170 genotypes, 31 fell in Cluster XII, 27 in Cluster V, 19 in Cluster I, 17 in Cluster IX, 16 in Cluster VIII, 15 in Cluster XI, 13 in Cluster II, 12 in Cluster VII, 10 in Cluster III, six in Cluster X, three in Cluster VI and one genotype in Cluster IV. Genotypes falling under Clusters III, VI , VI can be used as parents in hybridization programmes for improving important traits like TSS, fruit weight and acidity respectively

    Visual Storytelling: A Generative Adversarial Networks (GANs) and Graph Embedding Framework

    Get PDF
    Visual storytelling is a powerful educational tool, using image sequences to convey complex ideas and establish emotional connections with the audience. A study at the Chinese University of Hong Kong found that 92.7% of students prefer visual storytelling through animation over text alone [21]. Our approach integrates dual coding and propositional theory to generate visual representations of text, such as graphs and images, thereby enhancing students' memory retention and visualization skills. We use Generative Adversarial Networks (GANs) with graph data to generate images while preserving semantic consistency across objects, encompassing their attributes and relationships. By incorporating graph embedding, which includes node and relation embedding, we further enhance the semantic consistency of the generated high-quality images, improving the effectiveness of visual storytelling in education

    Diesel price hikes and farmer distress: the myth and the reality

    Get PDF
    FuelsDiesel oilPricesFarmers attitudesPumpingCostsGroundwater irrigationWellsOwnershipEconomic impactWater productivityFarm incomeMilk production
    • …
    corecore