70 research outputs found
A CLINICAL STUDY ON THE EFFECT OF VIRECANA KARMA WITH TRIVRUTADI MODAKA IN THE MANAGEMENT OF TAMAKA SVASA (BRONCHIAL ASTHMA)
Tamaka svasa is a Vatakaphaja vyadhi, originating from Pittasthana and manifested through Pranavaha Srotas. Vata get obstructed by Kapha dosha and travels into Pratiloma gati (opposite direction) and in turn causes Svasa (Dyspnoea). Its clinical features resembles with Bronchial asthma. Objectives: The study was carried out to assess the role of Virecana karma in the management of Tamaka svasa with Trivrutadi Modaka. Materials and methods: The clinical study was conducted at Dr.B.R.K.R.Govt. Ayurvedic Hospital and Research Centre, Erragadda, Hyderabad. 30 patients of either sex fulfilling the clinical criteria for diagnosis of Tamaka svasa (bronchial asthma) were selected in accordance with following inclusion & exclusion criteria. Murchita Tilataila was given for Snehapana and the Virecana yoga was Trivrutadi Modaka. The result was assessed at every 15 days. Subjective and objective parameters were analyzed before and after the treatment. Results: There was moderate relief in 23 Patients (76.66%), Marked relief in 4 Patients (13.33%) and 3 Patients (10.00%) showed mild relief, Complete remission was not found. Conclusion: Virecana karma (Purgative Therapy) has given maximum effect to pacify the almost entire range of signs and symptoms associated with the disease and by reducing its frequency, severity, emergency drug usage and there by providing quality life to the patients
Secure Routing Protocols Comparison Analysis Between RNBR, SAA, A-UPK
The advent of wireless communications and the development of mobile devices have made great strides in the development of roaming communications. The MANET mobile network was developed with the ability for mobile devices to quickly self-configure and extend wireless coverage without infrastructure support. Security is one of the most important areas of research and plays a vital role in determining the success of personal and commercial telephone systems.Therefore, this study focuses on systematically examining MANET security and accountability issues and analyzing the performance of solutions proposed by three different design approaches to security systems.First, it provides an approach for identifying trusted nodes employing the proposed RNBR method for secure routing.it provides a Self-Assured Assessment (SAA) method to estimate node stability. Its main goal is to contribute to a self-assessment-based reliability assessment mechanism that provides a reliable and reliable pathway.it provides a new authentication method to prevent forgery attacks. It supports authentication mechanisms to prevent RF attacks and ensure secure routing development.The main Objective of this paper is compare to packet delivery Ratio ,Control Overhead, Packet Drop Ratio in different secure RNBR,SAA,A-UPK Routing Protocols in MANETS
Dependence of Physical Parameters of Compound Semiconductors on Refractive Index
Interesting relationships have been found between refractive index, plasmon energy, electronic polarisability, bond length, microhardness, bulk modulus, force constants and lattice energy. An attempt has been made for the first time to correlate only one physical parameter with others. The calculated values are in good agreement with the experimental values as well as with the values reported in the literature. Refractive index data is the only one parameter required to estimate all the above parameters
Torus knots and mirror symmetry
We propose a spectral curve describing torus knots and links in the B-model.
In particular, the application of the topological recursion to this curve
generates all their colored HOMFLY invariants. The curve is obtained by
exploiting the full Sl(2, Z) symmetry of the spectral curve of the resolved
conifold, and should be regarded as the mirror of the topological D-brane
associated to torus knots in the large N Gopakumar-Vafa duality. Moreover, we
derive the curve as the large N limit of the matrix model computing torus knot
invariants.Comment: 30 pages + appendix, 3 figure
S-duality as a beta-deformed Fourier transform
An attempt is made to formulate Gaiotto's S-duality relations in an explicit
quantitative form. Formally the problem is that of evaluation of the Racah
coefficients for the Virasoro algebra, and we approach it with the help of the
matrix model representation of the AGT-related conformal blocks and Nekrasov
functions. In the Seiberg-Witten limit, this S-duality reduces to the Legendre
transformation. In the simplest case, its lifting to the level of Nekrasov
functions is just the Fourier transform, while corrections are related to the
beta-deformation. We calculate them with the help of the matrix model approach
and observe that they vanish for beta=1. Explicit evaluation of the same
corrections from the U_q(sl(2)) infinite-dimensional representation formulas
due to B.Ponsot and J.Teshner remains an open problem.Comment: 21 page
Logistics, traceability in food supply chain management
The food sector is crucial in providing the basic needs to sustain a range of human behaviors and activities. Supply chain is one of the important IoT application areas. IoT solutions support the monitoring, analysis, and management of the food sector in real-time. Through the application of IoT, the routing process of food products is greatly improved. The system is composed of a set of connected nodes that form a network of sensor nodes with the integration of RFID and IoT technology. The RFID tags associated with the food products enable the detection of the location, temperature and other parameters of the food products. The IoT platform provides real-time tracking and monitoring of the food products from the source to the destination. The task of the Food supply chain is to promote efficiency, transparency so that suppliers, clients, and partners may receive crucial information about the travel history movement along with quality of their products. Traceability plays a critical component for ensuring food safety, protecting public health, and providing assurance that food is free from contamination. By tracking the movement of food through the supply chain, businesses can ensure that food is sourced from approved suppliers
- …