Learn More
Grain-filling, an important trait that contributes greatly to grain weight, is regulated by quantitative trait loci and is associated with crop domestication syndrome. However, the genes and underlying molecular mechanisms controlling crop grain-filling remain elusive. Here we report the isolation and functional analysis of the rice GIF1 (GRAIN INCOMPLETE(More)
The transition from dormancy to germination in seeds is a key physiological process during the lifecycle of plants. Abscisic acid (ABA) is the sole plant hormone known to maintain seed dormancy; it acts through a gene expression network involving the transcription factor ABSCISIC ACID INSENSITIVE 3 (ABI3). However, whether other phytohormone pathways(More)
—With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID protocols use a central database to store the RFID tag data. The RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database(More)
Plants must effectively defend against biotic and abiotic stresses to survive in nature. However, this defense is costly and is often accompanied by significant growth inhibition. How plants coordinate the fluctuating growth-defense dynamics is not well understood and remains a fundamental question. Jasmonate (JA) and gibberellic acid (GA) are important(More)
The key regulator of salicylic acid (SA)-mediated resistance, NPR1, is functionally conserved in diverse plant species, including rice (Oryza sativa L.). Investigation in depth is needed to provide an understanding of NPR1-mediated resistance and a practical strategy for the improvement of disease resistance in the model crop rice. The rice genome contains(More)
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. Our approach accurately monitors a set of tags without collecting IDs from them. It differs from traditional research which(More)
With the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection to users. Most recent RFID protocols use a central database to store the RFID tag data. An RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns(More)
We develop distributed algorithms for self-organizing sensor networks that respond to directing a target through a region. The sensor network models the danger levels sensed across its area and has the ability to adapt to changes. It represents the dangerous areas as obstacles. A protocol that combines the artificial potential field of the sensors with the(More)
—In a dynamic spectrum access (DSA) network, communication rendezvous is the first step for two secondary users to be able to communicate with each other. In this step, the pair of secondary users meet on the same channel, over which they negotiate on the communication parameters, to establish the communication link. This paper presents ETCH, Efficient(More)