Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    VvAGAMOUS Affect Development of Four Different Grape Species Ovary

    Pengfei Zhang1,#, Yuqin Zhang1,#, Qifeng Zhao2, Tiequan Niu1, Pengfei Wen1,*, Jinjun Liang1,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.4, pp. 1125-1138, 2023, DOI:10.32604/phyton.2023.026227 - 06 January 2023

    Abstract Grape pistil has an important influence on fruit size and quality. However, there were few studies on grape ovary, and the development process of the ovary is still unclear. Therefore, in this paper, four different grape varieties with different lengths of small inflorescences, namely ‘Musct Hambourg’ grape (Vitis vinifera), ‘Concord’ grape (Vitis labrusca), ‘ShanPuTao’ grape (Vitis amurensis) and ‘GongNiang2Hao’ grape (Vitis amurensis × Vitis vinifera) were used as test materials. Four varieties ovary were significant differences by means of stereomicroscope, paraffin section. The expression of ovary determining gene VvAGAMOUS (VvAG) and its development related genes VvCRABS CLAW (VvCRC) and VvAGAMOUS-LIKE 11  (VvAGL11) with similar functions… More >

  • Open Access

    ARTICLE

    Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective

    Abdullah Alharbi1, Masood Ahmad2, Wael Alosaimi1, Hashem Alyami3, Alka Agrawal2, Rajeev Kumar4,*, Abdul Wahid5, Raees Ahmad Khan2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 557-567, 2022, DOI:10.32604/csse.2022.020843 - 25 October 2021

    Abstract Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuity. High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability. Hence, there is a need to bridge the gap between security and durability of the… More >

  • Open Access

    ARTICLE

    Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment

    Mohd Nadeem1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Adil Hussain Seh1, Suhel Ahmad Khan4, Alka Agrawal1, Raees Ahmad Khan1,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 61-82, 2022, DOI:10.32604/iasc.2022.019624 - 03 September 2021

    Abstract Present day healthcare sector is frequently victimized by the intruders. Healthcare data industry has borne the brunt of the highest number of data breach episodes in the last few years. The key reason for this is attributed to the sensitivity of healthcare data and the high costs entailed in trading the data over the dark web. Hence, usable-security evaluation of healthcare information systems is the need of hour so as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. Usable-security assessment will help the software designers and developers to prioritize… More >

  • Open Access

    ARTICLE

    Selection and Optimization of Software Development Life Cycles Using a Genetic Algorithm

    Fatimah O. Albalawi, Mashael S. Maashi*

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 39-52, 2021, DOI:10.32604/iasc.2021.015657 - 17 March 2021

    Abstract In the software field, a large number of projects fail, and billions of dollars are spent on these failed projects. Many software projects are also produced with poor quality or they do not exactly meet customers’ expectations. Moreover, these projects may exceed project budget and/or time. The complexity of managing software development projects and the poor selection of software development life cycle (SDLC) models are among the top reasons for such failure. Various SDLC models are available, but no model is considered the best or worst. In this work, we propose a new methodology that… More >

Displaying 1-10 on page 1 of 4. Per Page