http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Identification of Fungus-infected Tomato Seeds Based on Full-Field Optical Coherence Tomography
Bharti,윤태일,이병하 한국광학회 2019 Current Optics and Photonics Vol.3 No.6
The morphological changes of anthracnose (fungus) -infected tomato seeds have been studied to identify the infection and characterize its effect. Full-field optical coherence tomography (FF-OCT) has been utilized as a nondestructive but efficient modality for visualizing the effects of fungal infection. The cross-sectional images extracted from a stack of en face FF-OCT images showed significant changes with infection in the seed structure. First of all, the seed coat disappeared with the infection. The thickness of the seed coat of a healthy seed was measured as 28.2 µm, with a standard deviation of 1.2 µm. However, for infected seeds the gap between surface and endosperm was not appreciably observed. In addition, the measurements confirmed that the dryness of seeds did not affect the internal seed structure. The reconstructed three-dimensional (3D) image revealed that the permeability of the seed coat, which plays the vital role of protecting the seed, is also affected by the infection. These results suggest that FF-OCT has good potential for the identification of fungus-infected tomato seeds, and for many other tasks in agriculture.
Herding in Fast Moving Consumer Group Sector: Equity Market Asymmetry and Crisis
BHARTI, Bharti,KUMAR, Ashish Korea Distribution Science Association 2020 The Journal of Asian Finance, Economics and Busine Vol.7 No.9
This study empirically examines herd behavior for fast moving consumer goods (FMCG) sector stocks under varied market return conditions and the period during the global financial crisis and its aftermath. We examine the sample of stocks trading on the Nifty FMCG Index of the Indian equity market from January 2008 up to December 2018 using the dispersion measure of cross sectional absolute deviation and examine its relationship with the market return to explore herd phenomenon. Quantile regression estimate is used and the results of the study validate rational asset pricing models as the sector does not display herding. In contrast, anti-herd behavior at lower and median quantile values is observed. A possible reason can be the non-cyclical nature of the industry where investors rely more on the fundamentals rather than crowd chasing. We also findthe absence of herd phenomenon during the market asymmetries of bull and bear phases, extreme movements, the period of the global financial crisis, and afterward. We further examine herding under the impact of the information technology (IT) industry and conclude that significant return movements in IT sector impact dispersions in the FMCG industry. Also, there is a co-varying risk between the two sectors confirming the spillover in an integrated market.
Water quality of an Indian tributary affected by various industrial effluents- a case study
Bharti, Bharti,Jangwan, J.S.,Kumar, Amrish,Kumar, Vivek Techno-Press 2020 Advances in environmental research Vol.9 No.1
Industrialization and urbanization are modern need and trends. Such trends affect the natural ecosystem of rivers. Indian rivers face such problems in a high ratio. The aim of this study is to investigate the cause and amount of pollution in a tributary river Krishni. Pre-monsoon sampling of Krishni river water was performed as per APHA standard. Water samples were collected from different sites of Krishni river. Physiochemical parameters as well as trace elements concentrations have been analysed and results were compared with BIS-2012, WHO-2017 and EPA-2001 recommendations. The presence of high BOD, COD, TDS and others physiochemical parameters along with heavy metals reveals that tributary is highly polluted owing to industrial and domestic discharge either directly or through drains. High values of these parameters are harmful for the ecological health of the river because it makes survival of aquatic flora and fauna at risk. On the basis of the results obtained by the present study, it was concluded that level of the pollution in river Krishni is at alarming phase, where if strong action for the rejuvenation of river not takes place, river becomes a dead pool.
Research Advancements in Porcine Derived Mesenchymal Stem Cells
Bharti, Dinesh,Shivakumar, Sharath Belame,Subbarao, Raghavendra Baregundi,Rho, Gyu-Jin Bentham Science Publishers 2016 Current stem cell research & therapy Vol.11 No.1
<P>In the present era of stem cell biology, various animals such as Mouse, Bovine, Rabbit and Porcine have been tested for the efficiency of their mesenchymal stem cells (MSCs) before their actual use for stem cell based application in humans. Among them pigs have many similarities to humans in the form of organ size, physiology and their functioning, therefore they have been considered as a valuable model system for <I>in vitro</I> studies and preclinical assessments. Easy assessability, few ethical issues, successful MSC isolation from different origins like bone marrow, skin, umbilical cord blood, Wharton’s jelly, endometrium, amniotic fluid and peripheral blood make porcine a good model for stem cell therapy. Porcine derived MSCs (pMSCs) have shown greater <I>in vitro</I> differentiation and transdifferention potential towards mesenchymal lineages and specialized lineages such as cardiomyocytes, neurons, hepatocytes and pancreatic beta cells. Immunomodulatory and low immunogenic profiles as shown by autologous and heterologous MSCs proves them safe and appropriate models for xenotransplantation purposes. Furthermore, tissue engineered stem cell constructs can be of immense importance in relation to various osteochondral defects which are difficult to treat otherwise. Using pMSCs successful treatment of various disorders like Parkinson’s disease, cardiac ischemia, hepatic failure, has been reported by many studies. Here, in this review we highlight current research findings in the area of porcine mesenchymal stem cells dealing with their isolation methods, differentiation ability, transplantation applications and their therapeutic potential towards various diseases.</P>
From papyrus leaves to bioprinting and virtual reality: history and innovation in anatomy
Bharti Bisht,Ashley Hope,Manash K. Paul 대한해부학회 2019 Anatomy & Cell Biology Vol.52 No.3
The human quest to master the anatomy and physiology of living systems started as early as 1600 BC, with documents from the Greeks, Indians, and Romans presenting the earliest systematic studies and advances. Following the fall of the Roman Empire, the progress slowed until the Renaissance renewed scientific interest in anatomy and physiology, ushering in an era of spectacular advances. Alongside the discoveries of modern science, innovations in media such as printing, photography and color reproduction, improved the accuracy of communicating science. Techniques for noninvasively viewing the human body, such as magnetic resonance imaging, opened up new ways of exploring and understanding anatomy, physiology, and disease pathogenesis. Advances in three-dimensional (3D)-technologies, including computer graphics and animation are directly linked to many advances in medicine and surgery. Anatomy education has come a long way from papyrus leaf inscriptions to computerized 3D modeling, holographic representation, and virtual reality-based software. The future presents unlimited options for studying and understanding anatomy as Google glasses, bioprinting, virtual reality, and allied technologies transform the world into a classroom. This review summarizes the journey of mankind to master anatomy and physiology.
A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
( Bharti Nagpal ),( Naresh Chauhan ),( Nanhay Singh ) 한국정보처리학회 2017 Journal of information processing systems Vol.13 No.4
The Structured Query Language (SQL) Injection continues to be one of greatest security risks in the world according to the Open Web Application Security Project`s (OWASP) [1] Top 10 Security vulnerabilities 2013. The ease of exploitability and severe impact puts this attack at the top. As the countermeasures become more sophisticated, SOL Injection Attacks also continue to evolve, thus thwarting the attempt to eliminate this attack completely. The vulnerable data is a source of worry for government and financial institutions. In this paper, a detailed survey of different types of SQL Injection and proposed methods and theories are presented, along with various tools and their efficiency in intercepting and preventing SQL attacks.
A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks
( Bharti Sharma ),( Ravinder Singh Bhatia ),( Awadhesh Kumar Singh ) 한국정보처리학회 2014 Journal of information processing systems Vol.10 No.1
Resource sharing is a major advantage of distributed computing. However, a distributed computing system may have some physical or virtual resource that may be accessible by a single process at a time. The mutual exclusion issue is to ensure that no more than one process at a time is allowed to access some shared resource. The article proposes a token-based mutual exclusion algorithm for the clustered mobile ad hoc networks (MANETs). The mechanism that is adapted to handle token passing at the inter-cluster level is different from that at the intra-cluster level. It makes our algorithm message efficient and thus suitable for MANETs. In the interest of efficiency, we implemented a centralized token passing scheme at the intra-cluster level. The centralized schemes are inherently failure prone. Thus, we have presented an intracluster token passing scheme that is able to tolerate a failure. In order to enhance reliability, we applied a distributed token circulation scheme at the inter-cluster level. More importantly, the message complexity of the proposed algorithm is independent of N, which is the total number of nodes in the system. Also, under a heavy load, it turns out to be inversely proportional to n, which is the (average) number of nodes per each cluster. We substantiated our claim with the correctness proof, complexity analysis, and simulation results. In the end, we present a simple approach to make our protocol fault tolerant.