Learn More
The transition from dormancy to germination in seeds is a key physiological process during the lifecycle of plants. Abscisic acid (ABA) is the sole plant hormone known to maintain seed dormancy; it acts through a gene expression network involving the transcription factor ABSCISIC ACID INSENSITIVE 3 (ABI3). However, whether other phytohormone pathways(More)
—With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID protocols use a central database to store the RFID tag data. The RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database(More)
Plants must effectively defend against biotic and abiotic stresses to survive in nature. However, this defense is costly and is often accompanied by significant growth inhibition. How plants coordinate the fluctuating growth-defense dynamics is not well understood and remains a fundamental question. Jasmonate (JA) and gibberellic acid (GA) are important(More)
The key regulator of salicylic acid (SA)-mediated resistance, NPR1, is functionally conserved in diverse plant species, including rice (Oryza sativa L.). Investigation in depth is needed to provide an understanding of NPR1-mediated resistance and a practical strategy for the improvement of disease resistance in the model crop rice. The rice genome contains(More)
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which(More)
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of the system. This paper presents SybilDefender, a sybil defense mechanism that leverages the network topologies to defend against sybil attacks in social networks. Based on performing(More)
With the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection to users. Most recent RFID protocols use a central database to store the RFID tag data. An RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns(More)
BACKGROUND Infection of poultry with influenza A subtype H7 viruses occurs worldwide, but the introduction of this subtype to humans in Asia has not been observed previously. In March 2013, three urban residents of Shanghai or Anhui, China, presented with rapidly progressing lower respiratory tract infections and were found to be infected with a novel(More)
BACKGROUND The first identified cases of avian influenza A(H7N9) virus infection in humans occurred in China during February and March 2013. We analyzed data obtained from field investigations to describe the epidemiologic characteristics of H7N9 cases in China identified as of December 1, 2013. METHODS Field investigations were conducted for each(More)