3,183 research outputs found

    Research Notes : Inheritance of a male-sterile mutant from irradiated Essex soybeans

    Get PDF
    In 1976, a plant was selected from the M3 generation of some \u27Essex\u27 soybeans that had been irradiated with neutrons and grown at the Eastern Virginia Research Station, Warsaw. The plant had a green stem and reduced seed set. The progeny row grown the following year had all normal appearing plants

    Research notes: A second gene for resistance to peanut mottle virus in soybean

    Get PDF
    Soybean (Glycine max [L.] Merr.) was first reported as a natural host of peanut mottle virus (PMV) in 1972 by research workers in Georgia (Kuhn et al., 1972). PMV on soybean has since been reported in Virginia, South Carolina, Australia, and East Africa (Demski and Kuhn, 1977). Boerma and Kuhn (1976) reported resistance to PMV in soybeans to be conditioned by a completely dominant allele at a single locus. The objective of this study was to determine if there are other genes and/or alleles that might condition resistance to PMV

    Research Notes : Observations of polyembryony and polyploidy in ms1 and ms2 male-sterile soybean populations

    Get PDF
    Several reports of polyembryony and polyploidy in the progeny of ms1 male-sterile soybeans have been made. Kenworthy et al. (1973) found 4% of 3485 seeds contained twin seedlings. Three triploids and one haploid were found among the twins

    Research Notes: Reaction to peanut mottle virus in plant introductions of Maturity Groups 00 through IV

    Get PDF
    The results of screening the soybean plant introductions in Maturity Groups II, III, and IV have been reported by Shipe et al. (1979) . The results of evaluating the earlier maturity groups are reported here. Plant introductions that became available after 1976 have not been screened

    How political parties adjust to fixed voter opinions

    Full text link
    We propose a new version of the spatial model of voting. Platforms of five parties are evolving in a two-dimensional landscape of political issues so as to get maximal numbers of voters. For a Gaussian landscape the evolution leads to a spatially symmetric state, where the platform centers form a pentagon around the Gaussian peak. For a bimodal landscape the platforms located at different peaks get different numbers of voters.Comment: 8 pages, 3 figures. Accepted in Int. J. Modern Phys.

    3D modelling of enhanced surface emission using surface roughening

    Get PDF

    From cyber-security deception to manipulation and gratification through gamification

    Get PDF
    Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3]. Changes in mindsets have also been witnessed, a couple of years ago the cyber-security industry only blamed users for their mistakes often depicted as the number one reason behind security breaches. Nowadays, companies are empowering users, modifying their perception of being the weak link, into being the center-piece of the network design [4]. Users are by definition "in control" and therefore a cyber-security asset. Researchers have focused on the gamification of cyber- security elements, helping users to learn and understand the concepts of attacks and threats, allowing them to become the first line of defense to report anoma- lies [5]. However, over the past years numerous infrastructures have suffered from malicious intent, data breaches, and crypto-ransomeware, clearly showing the technical "know-how" of hackers and their ability to bypass any security in place, demonstrating that no infrastructure, software or device can be consid- ered secure. Researchers concentrated on the gamification, learning and teaching theory of cyber-security to end-users in numerous fields through various techniques and scenarios to raise cyber-situational awareness [2][1]. However, they overlooked the users’ ability to gather information on these attacks. In this paper, we argue that there is an endemic issue in the the understanding of hacking practices leading to vulnerable devices, software and architectures. We therefore propose a transparent gamification platform for hackers. The platform is designed with hacker user-interaction and deception in mind enabling researchers to gather data on the techniques and practices of hackers. To this end, we developed a fully extendable gamification architecture allowing researchers to deploy virtualised hosts on the internet. Each virtualised hosts contains a specific vulnerability (i.e. web application, software, etc). Each vulnerability is connected to a game engine, an interaction engine and a scoring engine

    Towards Verifying Nonlinear Integer Arithmetic

    Full text link
    We eliminate a key roadblock to efficient verification of nonlinear integer arithmetic using CDCL SAT solvers, by showing how to construct short resolution proofs for many properties of the most widely used multiplier circuits. Such short proofs were conjectured not to exist. More precisely, we give n^{O(1)} size regular resolution proofs for arbitrary degree 2 identities on array, diagonal, and Booth multipliers and quasipolynomial- n^{O(\log n)} size proofs for these identities on Wallace tree multipliers.Comment: Expanded and simplified with improved result

    Research Notes : Inheritance of pubescence color and reactions to three viruses in the cross York x Lee 68

    Get PDF
    Three viruses are prevalent on soybean in the peanut producing counties of Virginia. These are peanut mottle virus (PMV), peanut stunt virus (PSV) and soybean mosaic virus (SMV). Each may cause extensive yield losses among susceptible soybean cultivars under certain conditions

    Research Notes : A new gene for peanut mottle virus resistance in soybean

    Get PDF
    Boerma and Kuhn (1976) established that \u27Dorman\u27 and \u27CNS\u27 each contain a single dominant gene conditioning resistance to peanut mottle virus (PMV). The gene was labelled Rpv, but it was not demonstrated that the genes in the cultivars were allelic. Shipe et al. (1979) also demonstrated the presence of single dominant genes for PMV resistance in each of \u27Arksoy\u27, \u27PI 89784\u27 and \u27PI 219789\u27, but made no tests for allelic relationships
    corecore