detection resistant
Recently Published Documents


TOTAL DOCUMENTS

11
(FIVE YEARS 0)

H-INDEX

4
(FIVE YEARS 0)

2018 ◽  
Vol 14 (2) ◽  
pp. 38-45
Author(s):  
Anfall Mohammed Juma ◽  
◽  
Talfan Anad Ahmed ◽  
Ammar Ahmed Sultan ◽  
Abbas Abod Farhan

2016 ◽  
Vol 61 ◽  
pp. 162-180 ◽  
Author(s):  
Jorge Maestre Vidal ◽  
Ana Lucila Sandoval Orozco ◽  
Luis Javier García Villalba

2011 ◽  
Vol 50 (No. 2) ◽  
pp. 59-64 ◽  
Author(s):  
S. Skupinová ◽  
P. Vejl ◽  
P. Sedlák ◽  
M. Bardová ◽  
L. Srbek ◽  
...  

CAPS (Cleaved Amplified Polymorphic Sequence) method and standard infection tests were used for the study of tomatoes (Lycopersicon esculentum L.) resistance against the root-knot nematode (Meloidogyne incognita Kofoit and White). The CAPS method was used to determine genotypic constitution of M<sub>i</sub> gene in ten Czech and four foreign varieties of tomatoes. Similarly were verified one hundred and twenty individuals of F<sub>2</sub> segregated progeny of Nema variety and the same number of F<sub>2</sub> progeny of Petopride variety. A comparison of results of infection test with results of molecular-genetic analyse of DNA showed 100% congruence in detection resistant (susceptible respectively) genotypes. Result of <sup>2</sup> test confirmed in the level of mathematical expectation P&nbsp; (0.5, 0.7) congruence between actually obtained and theoretical segregation ratios. The CAPS method can be recommended for fast and precise determination of resistance or susceptibility of tomato plants against the root-knot nematodes. The goal of the method is the possibility of detection of genotypic constitution of M<sub>i</sub> gene that can significantly accelerate the process of creation of new resistant varieties.


2011 ◽  
Vol 474-476 ◽  
pp. 1865-1868
Author(s):  
Hong Wang ◽  
Shi Min Wei

A public watermark detection scheme using verifiable secret sharing is proposed. It removes the expensive zero-knowledge interactive proofs and replaces the traditional trusted third party with a group of proxies. Moreover, the scheme is secure against sensitivity attacks and very efficient in terms of computation cost, the number of rounds and bandwidth required in the communications.


2011 ◽  
Vol 55 (6) ◽  
pp. 1217-1228 ◽  
Author(s):  
Robert J. Walls ◽  
Kush Kothari ◽  
Matthew Wright

Sign in / Sign up

Export Citation Format

Share Document