Measuring genetic stability in bacteria of potential use in genetic engineering
نویسندگان
چکیده
منابع مشابه
phylogeography and genetic diversity of the lesser mouse- eared bat (myotis blythii) in iran
in current study, 63 samples of bat populations collected from differ regions were used for evaluating the geographic variations. twenty cranial and dental characters for traditional morphometric and landmarks method on the ventral, dorsal skull and mandible for geometry morphometric studies were used. statistical analyses of traditional morphometric and geometry morphometric data indicated low...
Genetic engineering of phytochrome biosynthesis in bacteria.
The bilin prosthetic groups of the phytochrome photoreceptors and the light-harvesting phycobiliprotein antennae arise from the oxygen-dependent ring opening of heme. Two ferredoxin-dependent enzymes contribute to this conversion: a heme oxygenase and a bilin reductase with discrete double-bond specificity. Using a dual plasmid system, one expressing a truncated cyanobacterial apophytochrome 1,...
متن کاملFunction of Religious Capital in the Acceptance of Genetic Engineering
Religions and religious schools have always been one of the main and fundamental factors in the creation and development of civilizations or their destruction. With the establishment of a religious government in Iran; based on the values of the Islamic Revolution, more attention was paid for science and technology. Iran is now praised for its continued growth in scientific publications during t...
متن کاملGenetic Stability of Micropropagated Plantlets in Date Palm
Randomly amplified polymorphic DNA (RAPD) markers were used to analyze genetic stability of the somatic embryogenesis-derived regenerants (R1-6) and mother plant in Iranian date palm (Phoenix dactylifera L.) cultivar Khanizi. Total genomic DNA extracted from in vitro fresh leaves of regenerated plants and mother plant was amplified using 10-mer oligonucleotide Fermantas primers. Four primers of...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied and Environmental Microbiology
سال: 1987
ISSN: 0099-2240,1098-5336
DOI: 10.1128/aem.53.1.105-109.1987