13,585 research outputs found

    A Valid Measure to Eliminate the Influence of Polysaccharides and Polyphenols in Recalcitrant Longan (Dimocarpus longan L.) During DNA Isolation

    Get PDF
    Large amounts of polysaccharides, polyphenols, tannins, proteins, and other secondary metabolites in recalcitrant longan leaves make it difficult to obtain high quality genomic DNA during extraction. To obtain good quality of nucleic acids from local longan leaves and for its downstream applications, a new protocol was developed. It consists of rapid isolation of stable nuclei, which hinders covalent interactions with phenolics, followed by DNA extraction. The yield and quality of the resulting DNA were satisfactory and suitable for PCR analysis and digestion with a restriction enzyme. Here, a valid combination measure (β-mercaptoethanol, PVP40 and PVPP were used at different stages) was created to eliminate the influence of polysaccharides and polyphenols in recalcitrant longan during DNA extraction, which will facilitate the development of molecular quantitative genetics of longan.Keywords: Longan, Extraction Buffer, DNA Isolation, PCR Product

    The Least-core and Nucleolus of Path Cooperative Games

    Full text link
    Cooperative games provide an appropriate framework for fair and stable profit distribution in multiagent systems. In this paper, we study the algorithmic issues on path cooperative games that arise from the situations where some commodity flows through a network. In these games, a coalition of edges or vertices is successful if it enables a path from the source to the sink in the network, and lose otherwise. Based on dual theory of linear programming and the relationship with flow games, we provide the characterizations on the CS-core, least-core and nucleolus of path cooperative games. Furthermore, we show that the least-core and nucleolus are polynomially solvable for path cooperative games defined on both directed and undirected network

    Quantum secret sharing between m-party and n-party with six states

    Full text link
    We propose a quantum secret sharing scheme between mm-party and nn-party using three conjugate bases, i.e. six states. A sequence of single photons, each of which is prepared in one of the six states, is used directly to encode classical information in the quantum secret sharing process. In this scheme, each of all mm members in group 1 choose randomly their own secret key individually and independently, and then directly encode their respective secret information on the states of single photons via unitary operations, then the last one (the mmth member of group 1) sends 1/n1/n of the resulting qubits to each of group 2. By measuring their respective qubits, all members in group 2 share the secret information shared by all members in group 1. The secret message shared by group 1 and group 2 in such a way that neither subset of each group nor the union of a subset of group 1 and a subset of group 2 can extract the secret message, but each whole group (all the members of each group) can. The scheme is asymptotically 100% in efficiency. It makes the Trojan horse attack with a multi-photon signal, the fake-signal attack with EPR pairs, the attack with single photons, and the attack with invisible photons to be nullification. We show that it is secure and has an advantage over the one based on two conjugate bases. We also give the upper bounds of the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states. This protocol is feasible with present-day technique.Comment: 7 page

    Seasonal changes in icefish diel feeding patterns in Lake Chaohu, a large shallow eutrophic lake of China

    Get PDF
    Seasonal changes in the diel feeding patterns of the zooplanktivorous icefish (Neosalanx taihuensis), which is an endemic species of China, were studied in the large, shallow eutrophic Lake Chaohu of China during the autumn of 2002 and summer of 2003. The results of the diel feeding rhythm indicate that icefish is a visual particulate feeder. There were large differences in diet composition and the selection indices of certain prey by icefish. In general, icefish fed more on calanoids than on cyclopoids, and fed more on larger cladocerans (i.e., Daphnia, Moina, Leptodora) than smaller cladocerans (i.e., Bosmina, Ceriodaphnia). Icefish is highly selective of individual food items, with prey selection also being dependent on fish size. There was no significant difference in the prey selection between male and female icefish. This study provides the first report of diel feeding rhythm in icefish, and is the first comparative study on prey selection between male and female icefish

    Quantum master equation scheme of time-dependent density functional theory to time-dependent transport in nano-electronic devices

    Full text link
    In this work a practical scheme is developed for the first-principles study of time-dependent quantum transport. The basic idea is to combine the transport master-equation with the well-known time-dependent density functional theory. The key ingredients of this paper include: (i) the partitioning-free initial condition and the consideration of the time-dependent bias voltages which base our treatment on the Runge-Gross existence theorem; (ii) the non-Markovian master equation for the reduced (many-body) central system (i.e. the device); and (iii) the construction of Kohn-Sham master equation for the reduced single-particle density matrix, where a number of auxiliary functions are introduced and their equations of motion (EOM) are established based on the technique of spectral decomposition. As a result, starting with a well-defined initial state, the time-dependent transport current can be calculated simultaneously along the propagation of the Kohn-Sham master equation and the EOM of the auxiliary functions.Comment: 9 pages, no figure

    Study on the feasibility of reforming budgetary accounting system in China

    Get PDF
    2004-2005 > Academic research: refereed > Publication in refereed journalVersion of RecordPublishe

    Nonorthogonal decoy-state Quantum Key Distribution

    Full text link
    In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and heavy loss in transmission line. Decoy states method and nonorthogonal encoding protocol are two important weapons to combat these effects. Here, we combine these two methods and propose a efficient method that can substantially improve the performance of QKD. We find a 79 km increase in transmission distance over the prior record using decoy states method.Comment: 4 pages, 1 figure; Revtex4, submitted to PR
    corecore