CONSTANS (CO) plays a central role in photoperiodic flowering control of plants. However, much remains unknown about the function of the CO gene family in soybean and the molecular mechanisms underlying short-day photoperiodic flowering of soybean. We identified 26 CO homologs (GmCOLs) in the soybean genome, many of them previously unreported. Phylogenic analysis classified GmCOLs into three clades conserved among flowering plants. Two homeologous pairs in Clade I, GmCOL1a/GmCOL1b and GmCOL2a/GmCOL2b, showed the highest sequence similarity to Arabidopsis CO. The mRNA abundance of GmCOL1a and GmCOL1b exhibited a strong diurnal rhythm under flowering-inductive short days and peaked at dawn, which coincided with the rise of GmFT5a expression. In contrast, the mRNA abundance of GmCOL2a and GmCOL2b was extremely low. Our transgenic study demonstrated that GmCOL1a, GmCOL1b, GmCOL2a and GmCOL2b fully complemented the late flowering effect of the co-1 mutant in Arabidopsis. Together, these results indicate that GmCOL1a and GmCOL1b are potential inducers of flowering in soybean. Our data also indicate rapid regulatory divergence between GmCOL1a/GmCOL1b and GmCOL2a/GmCOL2b but conservation of their protein function. Dynamic evolution of GmCOL regulatory mechanisms may underlie the evolution of photoperiodic signaling in soybean.
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast proliferation in many areas such as wearable devices, smart sensors and home appliances. IoT devices are characterized by their connectivity, pervasiveness and limited processing capability. The number of IoT devices in the world is increasing rapidly and it is expected that there will be 50 billion devices connected to the Internet by the end of the year 2020. This explosion of IoT devices, which can be easily increased compared to desktop computers, has led to a spike in IoT-based cyber-attack incidents. To alleviate this challenge, there is a requirement to develop new techniques for detecting attacks initiated from compromised IoT devices. Machine and deep learning techniques are in this context the most appropriate detective control approach against attacks generated from IoT devices. This study aims to present a comprehensive review of IoT systems-related technologies, protocols, architecture and threats emerging from compromised IoT devices along with providing an overview of intrusion detection models. This work also covers the analysis of various machine learning and deep learning-based techniques suitable to detect IoT systems related to cyber-attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.