期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Characteristics of Resistance to Rice Sheath Blight of Zhongda 2,a Transgenic Rice Line as Modified by Gene “RC24” 被引量:2
1
作者 YUANHong-xu XuXin-ping +2 位作者 zhangjian-zhong GuoJian-fu LIBao-jian 《Rice science》 SCIE 2004年第4期177-180,共4页
The transgenic rice, Zhongda 2, which was genetically modified from an indica rice line Zhuxian B by rice chitinase gene (RC24), had high resistance to rice sheath blight (Rhizoctonia solan!) in laboratory and a two-y... The transgenic rice, Zhongda 2, which was genetically modified from an indica rice line Zhuxian B by rice chitinase gene (RC24), had high resistance to rice sheath blight (Rhizoctonia solan!) in laboratory and a two-year field experiment. The pathogen could invade sheath of Zhongda 2 and induce symptoms of the disease. No difference was noted in time of penetration or incubation period between Zhongda 2 and non-transgenic rice control, Zhuxian B, but the hyphae lysate could be observed earlier than control. Its resistance expressed as to inhibit the growth of mycelium in host tissue. Fis from Zhongda 2(4) crossed with other five non-transgenic rice lines showed higher resistance than donor non-transgenic parents, but the resistance was different along with the different maternal parents. 展开更多
关键词 transgenic rice chitinase gene rice sheath blight RESISTANCE
下载PDF
An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters 被引量:1
2
作者 XIEShu-cui zhangjian-zhong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第3期17-21,共5页
In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid sha... In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid shareholders can not only identify the impersonation of anadversary, but also detect cheating of some valid shareholders . In particular one honestshareholder is able to detect cheating of other participants forming a collection, and theinformation rate of the scheme is higher than that of others. 展开更多
关键词 secret sharing authentication codes threshold scheme CHEATING
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部