Consensus genetic structuring and typological value of markers using multiple co-inertia analysis
نویسندگان
چکیده
منابع مشابه
Multiple Co-inertia Analysis of Multiple OMICS Data using omicade4
Multivariate approaches have been applied successfully in the analysis of high throughput ”omics”data. Principal component analysis (PCA) has been shown to be useful in exploratory analysis of linear trends in biological data [1]. Culhane and colleagues employed a two table coupling method (co-inertia analysis, CIA) to examine covariant gene expression patterns between microarray datasets from ...
متن کاملon the relationship between using discourse markers and the quality of expository and argumentative academic writing of iranian english majors
the aim of the present study was to investigate the frequency and the type of discourse markers used in the argumentative and expository writings of iranian efl learners and the differences between these text features in the two essay genres. the study also aimed at examining the influence of the use of discourse markers on the participants’ writing quality. to this end the discourse markers us...
15 صفحه اولGenetic analysis of castor (Ricinus communis L.) using ISSR markers
Castor (Ricinus communis L.) is one of the most ancient medicinal oil crops in the world. It has been vastly distributed in different parts of Iran. In the present study, the inter simple sequence repeat (ISSR) markers were used to evaluate the molecular genetic diversity among and within 12 castor accessions collected from 7 regions of Iran. Totally, 16 ISSR primers amplified 166 loci...
متن کاملGenetic Analysis of Nigerian Indigenous Goat Populations Using Microsattelite Markers
This study was conducted to determine the genetic relationships among and population history of four Nigerian indigenous goat populations. A total of 200 goats from three breeds namely Sahel (60), Red Sokoto (60), West-African dwarf (60) and Kano Brown, a strain (20), were used for the study. Tissue samples were collected from the ear of animals using an Allflex® ear punch tissue sample collect...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Genetics Selection Evolution
سال: 2007
ISSN: 0999-193X,1297-9686
DOI: 10.1051/gse:2007021