Abstracts. Mod Pathol 2000;13:17A,19A,22A,24A,25A,27A.

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computing Mod Without Mod

Encryption algorithms are designed to be difficult to break without knowledge of the secrets or keys. To achieve this, the algorithms require the keys to be large, with some algorithms having a recommend size of 2048-bits or more. However most modern processors only support computation on 64-bits at a time. Therefore standard operations with large numbers are more complicated to implement. One ...

متن کامل

Microsoft Word - 2012-Khalifa-Plant Pathol

The pathogenicity properties of Potato virus Y (PVY; genus Potyvirus, family Potyviridae) isolates collected in naturally-infected pepper (Capsicum annuum) fields in Tunisia were evaluated against recessive resistance alleles at the pvr2 locus of pepper. Two pathotypes were observed. Pathotype (0,1,3) isolates were able to infect plants carrying the susceptibility allele pvr2, together with pvr...

متن کامل

Mod 2 and Mod 5 Icosahedral Representations

We shall call a simple abelian variety A/Q modular if it is isogenous (over Q) to a factor of the Jacobian of a modular curve. In this paper we shall call a representation ρ̄ : GQ→GL2(F̄l) modular if there is a modular abelian variety A/Q, a number field F/Q of degree equal to dimA, an embedding OF ↪→ End(A/Q) and a homomorphism θ : OF→F̄l such that ρ̄ is equivalent to the action of GQ on the ker θ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Modern Pathology

سال: 2000

ISSN: 0893-3952,1530-0285

DOI: 10.1038/modpathol.3880167