Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Multi-Environmental Genetic Analysis of Grain Size Traits Based on Chromosome Segment Substitution Line in Rice (Oryza sativa L.)

    Yujia Leng1,#, Shuilian Wang1,2,3,#, Ruoan Wang2,#, Tao Tao1, Shuwen Jia1,2, Tao Song2,3, Lina Xu1,2, Xiuling Cai1,2, Sukui Jin1,2,*, Jiping Gao1,2,4,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.5, pp. 943-958, 2022, DOI:10.32604/phyton.2022.018707

    Abstract Grain size traits are critical agronomic traits which directly determine grain yield, but the genetic bases of these traits are still not well understood. In this study, a total of 154 chromosome segment substitution lines (CSSLs) population derived from a cross between a japonica variety Koshihikari and an indica variety Nona Bokra was used to investigate grain length (GL), grain width (GW), length-width ratio (LWR), grain perimeter (GP), grain area (GA), and thousand grain weight (TGW) under four environments. QTL mapping analysis of six grain size traits was performed by QTL IciMapping 4.2 with an inclusive composite interval mapping (ICIM)… More >

  • Open Access

    ARTICLE

    Construction of Key-dependent S-box for Secure Cloud Storage

    A. Indumathi*, G. Sumathi

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1509-1524, 2022, DOI:10.32604/iasc.2022.022743

    Abstract As cloud storage systems have developed and been applied in complex environments, their data security has become more prevalent in recent years. The issue has been approached through many models. Data is encrypted and stored in these models. One of the most widely used encryption methods is the Advanced Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a significant part in imparting the job of confusion. The security of the entire cryptosystem depends on its nonlinearity. In this work, a robust and secure S-box is constructed using a novel method, i.e., fingerprint features-based permutation function. Two stages are… More >

  • Open Access

    ARTICLE

    A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers

    Arkan Kh Shakr Sabonchi*, Bahriye Akay

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 87-106, 2021, DOI:10.32604/csse.2021.05365

    Abstract This paper presents state-of-art cryptanalysis studies on attacks of the substitution and transposition ciphers using various metaheuristic algorithms. Traditional cryptanalysis methods employ an exhaustive search, which is computationally expensive. Therefore, metaheuristics have attracted the interest of researchers in the cryptanalysis field. Metaheuristic algorithms are known for improving the search for the optimum solution and include Genetic Algorithm, Simulated Annealing, Tabu Search, Particle Swarm Optimization, Differential Evolution, Ant Colony, the Artificial Bee Colony, Cuckoo Search, and Firefly algorithms. The most important part of these various applications is deciding the fitness function to guide the search. This review presents how these algorithms… More >

  • Open Access

    ARTICLE

    Will Coal Price Fluctuations Affect Renewable Energy Substitution and Carbon Emission? A Computable General Equilibrium-Based Study of China

    Wenhui Zhao1, Yibo Yin1,*, Lu Mao2, Konglu Zhong3, Guanghui Yuan4, Hai Huang5, Yige Yang6

    Energy Engineering, Vol.118, No.4, pp. 1009-1026, 2021, DOI:10.32604/EE.2021.014650

    Abstract Changes in the energy price system will determine the direction of evolution of the energy industry structure. As a country where coal is the dominant energy source, what is the effect of coal price fluctuations on China’s industry development costs and energy consumption structure? To investigate this problem, this paper utilized an economy–energy–environment computable general equilibrium model. In this study, four aspects were analyzed: Energy supply side, proportion of renewable energy consumption, macroeconomy, and changes in CO2 emissions. The results of this study show that an increase of 10%–20% in coal prices contributes to a shift into using renewable energy,… More >

  • Open Access

    ERRATUM

    Erratum: Ancient Materials and Substitution Materials Used in Thai Historical Masonry Structure Preservation

    Natthanan Wonganan, Chainarong Athisakul*, Peerasit Mahasuwanchai, Weerachart Tangchirapat, Raktipong Sahamitmongkol, Sutat Leelataviwat

    Journal of Renewable Materials, Vol.9, No.10, pp. 1821-1821, 2021, DOI:10.32604/jrm.2021.017452

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Rapid Identification of a Candidate Gene Related to Fiber Strength Using a Superior Chromosome Segment Substitution Line from Gossypium hirsutum × Gossypium barbadense via Bulked Segregant RNA-Sequencing

    Qi Zhang1,#, Pengtao Li2,#, Aiying Liu1, Shaoqi Li1, Quanwei Lu2, Qun Ge1, Junwen Li1, Wankui Gong1, Xiaoying Deng1, Haihong Shang1,3, Yuzhen Shi1,*, Youlu Yuan1,3,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.3, pp. 837-858, 2021, DOI:10.32604/phyton.2021.014437

    Abstract Cotton is the most widely cultivated commercial crop producing natural fiber around the world. As a critical trait for fiber quality, fiber strength principally determined during the secondary wall thickening period. Based on the developed BC5F3:5 CSSLs (chromosome segment substitution lines) from Gossypium hirsutum CCRI36 × G. barbadense Hai 1, the superior MBI9915 was chosen to construct the secondary segregated population BC7F2 with its recurrent parent CCRI36, which was subsequently subjected to Bulk segregant RNA-sequencing (BSR-seq) for rapid identification of candidate genes related to fiber strength. A total of 4 fiber-transcriptome libraries were separately constructed and sequenced, including two parents… More >

  • Open Access

    ARTICLE

    Ancient Materials and Substitution Materials Used in Thai Historical Masonry Structure Preservation

    Natthanan Wonganan, Chainarong Athisakul*, Peerasit Mahasuwanchai, Weerachart Tangchirapat, Raktipong Sahamitmongkol, Sutat Leelataviwat

    Journal of Renewable Materials, Vol.9, No.2, pp. 179-204, 2021, DOI:10.32604/jrm.2021.013134

    Abstract The historical structures of Thailand are some of the most fascinating ancient sites in Asia. Their architectures reveal past cultures, traditions, knowledge, and expertise. Masonry materials are the major materials used to construct the historical structures in Thailand. One of the essential problem of Thai historical structure preservation is a shortage of engineering properties data for the structural stability assessment. Moreover, the in-depth engineering properties and the suitable substitution materials for Thai historical preservation are rarely found. Therefore, the engineering properties of the ancient masonry materials have to be explored together with the development of suitable substitute materials. This paper… More >

  • Open Access

    ARTICLE

    Dynamic Expression Analysis and Introgressive Gene Identification of Fiber Length Using Chromosome Segment Substitution Lines from G. hirsutum × G. barbadense

    Pengtao Li1,2,#,*, Quanwei Lu1,#, Xianghui Xiao3, Rui Yang3, Xixi Duan1

    Phyton-International Journal of Experimental Botany, Vol.90, No.1, pp. 129-144, 2021, DOI:10.32604/phyton.2021.012928

    Abstract Fiber length is a critical trait that principally determines cotton spinning quality, while Upland cotton as the most widely cultivated Gossypium species around the world subjects to the relatively ordinary fiber performance. Chromosome segment substitution lines (CSSLs) have been introduced in cotton breeding to take full advantages of superior fiber quality and high yield from Sea Island and Upland cotton, respectively, which serve as ideal materials for elucidating the genetic mechanism of complex quantitative traits. Here, three CSSLs derived from CCRI45 (G. hirsutum) × Hai1 (G. barbadense), two superior (MBI7561 and MBI7747) and one (MBI7285) with ordinary fiber-quality, were subjected… More >

  • Open Access

    ARTICLE

    A Novel Approach to Steganography: Enhanced Least Significant Bit Substitution Algorithm Integrated with Self-Determining Encryption Feature

    Resul Das1,∗, Muhammet Baykara1, Gurkan Tuna2

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 23-32, 2019, DOI:10.32604/csse.2019.34.023

    Abstract One of the most well-known and used algorithms for Steganography is Least Significant Bit (LSB) substitution. Although LSB has several advantages such as simplicity, efficiency, and easy-to-do implementation, it has some distinct disadvantages such as it openness to miscellaneous attacks. In this study, we aim to improve the traditional LSB algorithm by eliminating its main disadvantage, being easy to detect, and this way propose an enhanced LSB algorithm called E-LSB. We mainly aim to minimize differences which are due to encryption and image hiding steps in LSB algorithm and make it more difficult to notice that some text has been… More >

  • Open Access

    ARTICLE

    A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique

    Shahid Rahman1, Fahad Masood2, Wajid Ullah Khan2, Niamat Ullah1, Fazal Qudus Khan3, Georgios Tsaramirsis3, Sadeeq Jan4, *, Majid Ashraf5

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 31-61, 2020, DOI:10.32604/cmc.2020.09186

    Abstract Steganography aims to hide the messages from unauthorized persons for various purposes, e.g., military correspondence, financial transaction data. Securing the data during transmission is of utmost importance these days. The confidentiality, integrity, and availability of the data are at risk because of the emerging technologies and complexity in software applications, and therefore, there is a need to secure such systems and data. There are various methodologies to deal with security issues when utilizing an open system like the Internet. This research proposes a new technique in steganography within RGB shading space to achieve enhanced security compared with existing systems. We… More >

Displaying 11-20 on page 2 of 24. Per Page