14,017 research outputs found
A Valid Measure to Eliminate the Influence of Polysaccharides and Polyphenols in Recalcitrant Longan (Dimocarpus longan L.) During DNA Isolation
Large amounts of polysaccharides, polyphenols, tannins, proteins, and other secondary metabolites in recalcitrant longan leaves make it difficult to obtain high quality genomic DNA during extraction. To obtain good quality of nucleic acids from local longan leaves and for its downstream applications, a new protocol was developed. It consists of rapid isolation of stable nuclei, which hinders covalent interactions with phenolics, followed by DNA extraction. The yield and quality of the resulting DNA were satisfactory and suitable for PCR analysis and digestion with a restriction enzyme. Here, a valid combination measure (β-mercaptoethanol, PVP40 and PVPP were used at different stages) was created to eliminate the influence of polysaccharides and polyphenols in recalcitrant longan during DNA extraction, which will facilitate the development of molecular quantitative genetics of longan.Keywords: Longan, Extraction Buffer, DNA Isolation, PCR Product
The Least-core and Nucleolus of Path Cooperative Games
Cooperative games provide an appropriate framework for fair and stable profit
distribution in multiagent systems. In this paper, we study the algorithmic
issues on path cooperative games that arise from the situations where some
commodity flows through a network. In these games, a coalition of edges or
vertices is successful if it enables a path from the source to the sink in the
network, and lose otherwise. Based on dual theory of linear programming and the
relationship with flow games, we provide the characterizations on the CS-core,
least-core and nucleolus of path cooperative games. Furthermore, we show that
the least-core and nucleolus are polynomially solvable for path cooperative
games defined on both directed and undirected network
Quantum secret sharing between m-party and n-party with six states
We propose a quantum secret sharing scheme between -party and -party
using three conjugate bases, i.e. six states. A sequence of single photons,
each of which is prepared in one of the six states, is used directly to encode
classical information in the quantum secret sharing process. In this scheme,
each of all members in group 1 choose randomly their own secret key
individually and independently, and then directly encode their respective
secret information on the states of single photons via unitary operations, then
the last one (the th member of group 1) sends of the resulting qubits
to each of group 2. By measuring their respective qubits, all members in group
2 share the secret information shared by all members in group 1. The secret
message shared by group 1 and group 2 in such a way that neither subset of each
group nor the union of a subset of group 1 and a subset of group 2 can extract
the secret message, but each whole group (all the members of each group) can.
The scheme is asymptotically 100% in efficiency. It makes the Trojan horse
attack with a multi-photon signal, the fake-signal attack with EPR pairs, the
attack with single photons, and the attack with invisible photons to be
nullification. We show that it is secure and has an advantage over the one
based on two conjugate bases. We also give the upper bounds of the average
success probabilities for dishonest agent eavesdropping encryption using the
fake-signal attack with any two-particle entangled states. This protocol is
feasible with present-day technique.Comment: 7 page
Seasonal changes in icefish diel feeding patterns in Lake Chaohu, a large shallow eutrophic lake of China
Seasonal changes in the diel feeding patterns of the zooplanktivorous icefish (Neosalanx taihuensis), which is an endemic species of China, were studied in the large, shallow eutrophic Lake Chaohu of China during the autumn of 2002 and summer of 2003. The results of the diel feeding rhythm indicate that icefish is a visual particulate feeder. There were large differences in diet composition and the selection indices of certain prey by icefish. In general, icefish fed more on calanoids than on cyclopoids, and fed more on larger cladocerans (i.e., Daphnia, Moina, Leptodora) than smaller cladocerans (i.e., Bosmina, Ceriodaphnia). Icefish is highly selective of individual food items, with prey selection also being dependent on fish size. There was no significant difference in the prey selection between male and female icefish. This study provides the first report of diel feeding rhythm in icefish, and is the first comparative study on prey selection between male and female icefish
Quantum master equation scheme of time-dependent density functional theory to time-dependent transport in nano-electronic devices
In this work a practical scheme is developed for the first-principles study
of time-dependent quantum transport. The basic idea is to combine the transport
master-equation with the well-known time-dependent density functional theory.
The key ingredients of this paper include: (i) the partitioning-free initial
condition and the consideration of the time-dependent bias voltages which base
our treatment on the Runge-Gross existence theorem; (ii) the non-Markovian
master equation for the reduced (many-body) central system (i.e. the device);
and (iii) the construction of Kohn-Sham master equation for the reduced
single-particle density matrix, where a number of auxiliary functions are
introduced and their equations of motion (EOM) are established based on the
technique of spectral decomposition. As a result, starting with a well-defined
initial state, the time-dependent transport current can be calculated
simultaneously along the propagation of the Kohn-Sham master equation and the
EOM of the auxiliary functions.Comment: 9 pages, no figure
Study on the feasibility of reforming budgetary accounting system in China
2004-2005 > Academic research: refereed > Publication in refereed journalVersion of RecordPublishe
Shock Diffraction by Convex Cornered Wedges for the Nonlinear Wave System
We are concerned with rigorous mathematical analysis of shock diffraction by
two-dimensional convex cornered wedges in compressible fluid flow governed by
the nonlinear wave system. This shock diffraction problem can be formulated as
a boundary value problem for second-order nonlinear partial differential
equations of mixed elliptic-hyperbolic type in an unbounded domain. It can be
further reformulated as a free boundary problem for nonlinear degenerate
elliptic equations of second order. We establish a first global theory of
existence and regularity for this shock diffraction problem. In particular, we
establish that the optimal regularity for the solution is across the
degenerate sonic boundary. To achieve this, we develop several mathematical
ideas and techniques, which are also useful for other related problems
involving similar analytical difficulties.Comment: 50 pages;7 figure
- …