Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Identification of QTLs for Yield and Associated Traits in F2 Population of Rice

    Rohini Bhat1,*, Anil Kumar Singh2, Muntazir Mushtaq3, Romesh Kumar Salgotra2, Manmohan Sharma2, Basharat Ahmad Bhat4, Umer Basu5, Ibrahim Al-Ashkar 6, Mohammad Anwar Hossain7,*, Akihiro Ueda8, Ayman El Sabagh9

    Phyton-International Journal of Experimental Botany, Vol.91, No.11, pp. 2439-2459, 2022, DOI:10.32604/phyton.2022.020100 - 12 July 2022

    Abstract Identification of quantitative trait loci (QTLs) controlling yield and yield-related traits in rice was performed in the F2 mapping population derived from parental rice genotypes DHMAS and K343. A total of 30 QTLs governing nine different traits were identified using the composite interval mapping (CIM) method. Four QTLs were mapped for number of tillers per plant on chromosomes 1 (2 QTLs), 2 and 3; three QTLs for panicle number per plant on chromosomes 1 (2 QTLs) and 3; four QTLs for plant height on chromosomes 2, 4, 5 and 6; one QTL for spikelet density on… More >

  • Open Access

    Vulnerability Analysis of MEGA Encryption Mechanism

    Qingbing Ji1,2,*, Zhihong Rao1,2, Lvlin Ni2, Wei Zhao2, Jing Fu3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 817-829, 2022, DOI:10.32604/cmc.2022.026949 - 18 May 2022

    Abstract MEGA is an end-to-end encrypted cloud storage platform controlled by users. Moreover, the communication between MEGA client and server is carried out under the protection of Transport Layer Security (TLS) encryption, it is difficult to intercept the key data packets in the process of MEGA registration, login, file data upload, and download. These characteristics of MEGA have brought great difficulties to its forensics. This paper presents a method to attack MEGA to provide an effective method for MEGA’s forensics. By debugging the open-source code of MEGA and analyzing the security white paper published, this paper More >

  • Open Access

    ARTICLE

    Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol

    Waseem Ullah Khan*, Safdar Nawaz Khan Marwat, Salman Ahmed

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1297-1313, 2022, DOI:10.32604/csse.2022.024018 - 09 May 2022

    Abstract The Internet of Things (IoTs) is apace growing, billions of IoT devices are connected to the Internet which communicate and exchange data among each other. Applications of IoT can be found in many fields of engineering and sciences such as healthcare, traffic, agriculture, oil and gas industries, and logistics. In logistics, the products which are to be transported may be sensitive and perishable, and require controlled environment. Most of the commercially available logistic containers are not integrated with IoT devices to provide controlled environment parameters inside the container and to transmit data to a remote… More >

  • Open Access

    ARTICLE

    Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS

    B. Arunkumar*, G. Kousalya

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 179-190, 2022, DOI:10.32604/csse.2022.018166 - 26 August 2021

    Abstract In the current circumstance, e-commerce through an online banking system plays a significant role. Customers may either buy goods from E-Commerce websites or use online banking to move money to other accounts. When a user participates in these types of behaviors, their sensitive information is sent to an untrustworthy network. As a consequence, when transmitting data from an internal browser to an external E-commerce web server using the cryptographic protocol SSL/TLS, the E-commerce web server ensures the security of the user’s data. The user should be pleased with the confidentiality, authentication, and authenticity properties of More >

  • Open Access

    ARTICLE

    TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators

    Zhengqiu Weng1,2, Timing Chen1,*, Tiantian Zhu1, Hang Dong1, Dan Zhou1, Osama Alfarraj3

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 105-119, 2021, DOI:10.32604/csse.2021.015074 - 05 February 2021

    Abstract Internet traffic encryption is a very common traffic protection method. Most internet traffic is protected by the encryption protocol called transport layer security (TLS). Although traffic encryption can ensure the security of communication, it also enables malware to hide its information and avoid being detected. At present, most of the malicious traffic detection methods are aimed at the unencrypted ones. There are some problems in the detection of encrypted traffic, such as high false positive rate, difficulty in feature extraction, and insufficient practicability. The accuracy and effectiveness of existing methods need to be improved. In… More >

  • Open Access

    ARTICLE

    Grapevine Phenological Quantitative Trait SSR Genotyping Using High-Throughput HRM-PCR Analysis

    Murad Awad1, Photini V. Mylona2, Alexios N. Polidoros1,*

    Phyton-International Journal of Experimental Botany, Vol.89, No.4, pp. 905-923, 2020, DOI:10.32604/phyton.2020.011235 - 09 November 2020

    Abstract Discrimination among grapevine varieties based on quantitative traits, such as flowering, veraison and ripening dates is crucial for variety selection in the context of climate change and in breeding programs. These traits are under complex genetic control for which 6 linked SSR loci (VVS2, VVIn16, VMC7G3, VrZAG29, VMC5G7, and VVIB23) have been identified. Using these markers in HRM-PCR analysis, we assessed genetic diversity among a large collection of 192 grapevine varieties. The grapevine germplasm used encompasses the majority of Greek vineyard with 181 varieties, 3 prominent foreign varieties and 11 varieties of Palestinian origin. The… More >

  • Open Access

    ARTICLE

    Quantitative trait loci associated with water deficit tolerance in Arabidopsis thaliana (L.) Heynh.

    Gutiérrez-Díez A1, GE Salinas-García1, L Iracheta-Donjuan2, JA Torres-Castillo1, N Mayek-Pérez3

    Phyton-International Journal of Experimental Botany, Vol.82, pp. 203-208, 2013, DOI:10.32604/phyton.2013.82.203

    Abstract Gene and quantitative trait loci (QTLs) localization in a model species allow to know their organization in the genome, and the possibility for the isolation and cloning of genes with agronomic importance. Seventy-three recombinant inbred lines (RILs) derived from the cross of Arabidopsis thaliana (L.) Heynh. ecotypes Columbia (Col) x Landsberg erecta (Ler) were grown in a greenhouse under contrasting soil moisture conditions (irrigated and water deficits). During their growth, some phenological (days to flowering) and plant growth traits (plant height, and number of nodes and leaves per plant) were measured. Significant differences for plant height More >

Displaying 1-10 on page 1 of 7. Per Page