70 research outputs found

    A CLINICAL STUDY ON THE EFFECT OF VIRECANA KARMA WITH TRIVRUTADI MODAKA IN THE MANAGEMENT OF TAMAKA SVASA (BRONCHIAL ASTHMA)

    Get PDF
    Tamaka svasa is a Vatakaphaja vyadhi, originating from Pittasthana and manifested through Pranavaha Srotas. Vata get obstructed by Kapha dosha and travels into Pratiloma gati (opposite direction) and in turn causes Svasa (Dyspnoea). Its clinical features resembles with Bronchial asthma. Objectives: The study was carried out to assess the role of Virecana karma in the management of Tamaka svasa with Trivrutadi Modaka. Materials and methods: The clinical study was conducted at Dr.B.R.K.R.Govt. Ayurvedic Hospital and Research Centre, Erragadda, Hyderabad. 30 patients of either sex fulfilling the clinical criteria for diagnosis of Tamaka svasa (bronchial asthma) were selected in accordance with following inclusion & exclusion criteria. Murchita Tilataila was given for Snehapana and the Virecana yoga was Trivrutadi Modaka. The result was assessed at every 15 days. Subjective and objective parameters were analyzed before and after the treatment. Results: There was moderate relief in 23 Patients (76.66%), Marked relief in 4 Patients (13.33%) and 3 Patients (10.00%) showed mild relief, Complete remission was not found. Conclusion: Virecana karma (Purgative Therapy) has given maximum effect to pacify the almost entire range of signs and symptoms associated with the disease and by reducing its frequency, severity, emergency drug usage and there by providing quality life to the patients

    Secure Routing Protocols Comparison Analysis Between RNBR, SAA, A-UPK

    Get PDF
    The advent of wireless communications and the development of mobile devices have made great strides in the development of roaming communications. The MANET mobile network was developed with the ability for mobile devices to quickly self-configure and extend wireless coverage without infrastructure support. Security is one of the most important areas of research and plays a vital role in determining the success of personal and commercial telephone systems.Therefore, this study focuses on systematically examining MANET security and accountability issues and analyzing the performance of solutions proposed by three different design approaches to security systems.First, it provides an approach for identifying trusted nodes employing the proposed RNBR method for secure routing.it provides a Self-Assured Assessment (SAA) method to estimate node stability. Its main goal is to contribute to a self-assessment-based reliability assessment mechanism that provides a reliable and reliable pathway.it provides a new authentication method to prevent forgery attacks. It supports authentication mechanisms to prevent RF attacks and ensure secure routing development.The main Objective of this paper is compare to packet delivery Ratio ,Control Overhead, Packet Drop Ratio in different secure RNBR,SAA,A-UPK Routing Protocols in MANETS

    Dependence of Physical Parameters of Compound Semiconductors on Refractive Index

    Get PDF
    Interesting relationships have been found between refractive index, plasmon energy, electronic polarisability, bond length, microhardness, bulk modulus, force constants and lattice energy. An attempt has been made for the first time to correlate only one physical parameter with others. The calculated values are in good agreement with the experimental values as well as with the values reported in the literature. Refractive index data is the only one parameter required to estimate all the above parameters

    Torus knots and mirror symmetry

    Full text link
    We propose a spectral curve describing torus knots and links in the B-model. In particular, the application of the topological recursion to this curve generates all their colored HOMFLY invariants. The curve is obtained by exploiting the full Sl(2, Z) symmetry of the spectral curve of the resolved conifold, and should be regarded as the mirror of the topological D-brane associated to torus knots in the large N Gopakumar-Vafa duality. Moreover, we derive the curve as the large N limit of the matrix model computing torus knot invariants.Comment: 30 pages + appendix, 3 figure

    S-duality as a beta-deformed Fourier transform

    Full text link
    An attempt is made to formulate Gaiotto's S-duality relations in an explicit quantitative form. Formally the problem is that of evaluation of the Racah coefficients for the Virasoro algebra, and we approach it with the help of the matrix model representation of the AGT-related conformal blocks and Nekrasov functions. In the Seiberg-Witten limit, this S-duality reduces to the Legendre transformation. In the simplest case, its lifting to the level of Nekrasov functions is just the Fourier transform, while corrections are related to the beta-deformation. We calculate them with the help of the matrix model approach and observe that they vanish for beta=1. Explicit evaluation of the same corrections from the U_q(sl(2)) infinite-dimensional representation formulas due to B.Ponsot and J.Teshner remains an open problem.Comment: 21 page

    Logistics, traceability in food supply chain management

    No full text
    The food sector is crucial in providing the basic needs to sustain a range of human behaviors and activities. Supply chain is one of the important IoT application areas. IoT solutions support the monitoring, analysis, and management of the food sector in real-time. Through the application of IoT, the routing process of food products is greatly improved. The system is composed of a set of connected nodes that form a network of sensor nodes with the integration of RFID and IoT technology. The RFID tags associated with the food products enable the detection of the location, temperature and other parameters of the food products. The IoT platform provides real-time tracking and monitoring of the food products from the source to the destination. The task of the Food supply chain is to promote efficiency, transparency so that suppliers, clients, and partners may receive crucial information about the travel history movement along with quality of their products. Traceability plays a critical component for ensuring food safety, protecting public health, and providing assurance that food is free from contamination. By tracking the movement of food through the supply chain, businesses can ensure that food is sourced from approved suppliers
    corecore