This research aims to create a model for measuring the supply chain management performance and sustainability of community product in the mountainous region of northern Thailand in order to improve performance activit...
详细信息
Arabidopsis thaliana is an important and long-established model species for plant molecular biology,genetics,epigenetics,and ***,the latest version of reference genome still contains a significant number of missing **...
详细信息
Arabidopsis thaliana is an important and long-established model species for plant molecular biology,genetics,epigenetics,and ***,the latest version of reference genome still contains a significant number of missing ***,we reported a high-quality and almost complete Col-0 genome assembly with two gaps(named Col-XJTU)by combining the Oxford Nanopore Technologies ultra-long reads,Pacific Biosciences high-fidelity long reads,and Hi-C *** total genome assembly size is 133,725,193 bp,introducing 14.6 Mb of novel sequences compared to the TAIR10.1 reference *** five chromosomes of the Col-XJTU assembly are highly accurate with consensus quality(QV)scores>60(ranging from 62 to 68),which are higher than those of the TAIR10.1 reference(ranging from 45 to 52).We completely resolved chromosome(Chr)3 and Chr5 in a telomere-to-telomere ***4 was completely resolved except the nucleolar organizing regions,which comprise long repetitive DNA *** Chrl centromere(CEN1),reportedly around 9 Mb in length,is particularly challenging to assemble due to the presence of tens of thousands of CEN180 satellite *** the cutting-edge sequencing data and novel computational approaches,we assembled a 3.8-Mb-long CEN1 and a 3.5-Mb-long *** also investigated the structure and epigenetics of *** clusters of CEN180 monomers were detected,and the centromere-specific histone H3-like protein(CENH3)exhibited a strong preference for CEN180 Cluster ***,we observed hypomethylation patterns in CENH3-enriched *** believe that this high-quality genome assembly,Col-XJTU,would serve as a valuable reference to better understand the global pattern of centromeric polymorphisms,as well as the genetic and epigenetic features in plants.
Recent years have witnessed the emerging trend of extensions in modern Integrated Development Environments (IDEs) like Visual Studio Code (VSCode) that significantly enhance developer productivity. Especially, popular...
详细信息
Radio Frequency (RF) energy harvesting has been employed to power wireless devices. Nevertheless, RF energy harvesting encounters restrictions regarding the quantity of power it can harvest depending on signal accessi...
详细信息
The increasing prevalence of hearing impairment across diverse age demographics, particularly in elderly populations, highlights the need for early diagnosis and ongoing therapy. Traditional audiology screening techni...
详细信息
After the epidemic spread around the globe, particularly in underdeveloped nations in poor countries, the World Health organization (WHO) deemed the Novel Corona Virus (Covid-19) to be a dangerous virus in order to pr...
详细信息
Within the context of intelligent manufacturing, industrial robots have a pivotal function. Nonetheless, extended operational periods cause a decline in their absolute positioning accuracy, preventing them from meetin...
详细信息
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocol...
详细信息
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocols are proposed to secure public cloud computing. However, therapid development of high-speed internet and organizations’ race to developquantum computers is a nightmare for existing authentication schemes. Thesetraditional authentication protocols are based on factorization or discretelogarithm problems. As a result, traditional authentication protocols arevulnerable in the quantum computing era. Therefore, in this article, we haveproposed an authentication protocol based on the lattice technique for publiccloud computing to resist quantum attacks and prevent all known traditionalsecurity attacks. The proposed lattice-based authentication protocolis provably secure under the Real-Or-Random (ROR) model. At the sametime, the result obtained during the experiments proved that our protocol islightweight compared to the existing lattice-based authentication protocols,as listed in the performance analysis section. The comparative analysis showsthat the protocol is suitable for practical implementation in a quantum-basedenvironment.
The structure of porous polymer materials with high specific surface area can be designed in advance, and be functionalized by modification to realize their application in specific fields. To expand the application of...
详细信息
Computer science has been revolutionized by artificial intelligence (AI), which has opened up new paths for data analysis, modelling, and prediction. ChatGPT, a language model based on deep neural networks, has shown ...
详细信息
暂无评论