Genetic Association Studies among Growth Attributes of Jatropha Hybrid Genetic Resources
نویسندگان
چکیده
منابع مشابه
Genetic association studies.
To the Editor: I am delighted to see that Arteriosclerosis, Thrombosis, and Vascular Biology has taken the lead in initiating an open discussion about genetic association studies in such a prominent manner. As correctly pointed out in the editorial by Dr Hegele,1 the number of publications has exponentially increased in the last decade. Despite the intrinsic problems with this approach, this ex...
متن کاملGenetic association studies.
With the completion of the HapMap project1 and the development of technology that allows the examination of 1 million genetic polymorphisms at once, genetic association studies are becoming more comprehensive. This article first provides a brief overview of the rationale for genetic association studies; it then discusses the primary features differentiating genetic from standard association stu...
متن کاملGenetic association studies.
The widespread availability of DNA from large population studies, the development of rapid throughput genotyping assays, and the identification of numerous polymorphisms in genes of interest make it easier to perform genetic association studies in humans. We consider these studies appropriate areas of research in relation to atherosclerosis, thrombosis, and vascular biology. In this issue, Drs ...
متن کاملGenetic Variability, Character Association and Path Analysis in Jatropha curcas
Sixteen Jatropha curcas genotypes collected from four states were grown in randomized block design and evaluated for 12 characters. The genotypes showed significant differences in most component traits and seed yield, excepting primary branches/plant, fruits/bunch and seeds/fruit. The genotypes Utkal nursery, Phule1, IST 1, Jodhpur1 and Chhatrapati had above average (>84.7 g) seed yield/plant. ...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Plant Breeding and Genetics
سال: 2011
ISSN: 1819-3595
DOI: 10.3923/ijpbg.2011.159.167