منابع مشابه
Interview With Michael Bevan: The Arabidopsis Genome is Sequenced, What Next?
Professor Michael Bevan is at the John Innes Centre, Norwich, UK, where he is Head of the Cell and Developmental Biology Department. He was the co-ordinator of the European Union Arabidopsis Genome Sequencing Consortium, which contributed to the sequence and analysis of the complete Arabidopsis genome that was published late last year. He is the co-ordinator of the EC funded EXOTIC program and ...
متن کاملGenome-Wide Survey of Pseudogenes in 80 Fully Re-sequenced Arabidopsis thaliana Accessions
Pseudogenes (Ψs), including processed and non-processed Ψs, are ubiquitous genetic elements derived from originally functional genes in all studied genomes within the three kingdoms of life. However, systematic surveys of non-processed Ψs utilizing genomic information from multiple samples within a species are still rare. Here a systematic comparative analysis was conducted of Ψs within 80 full...
متن کاملDistribution of 1000 sequenced T-DNA tags in the Arabidopsis genome.
Induction of knockout mutations by T-DNA insertion mutagenesis is widely used in studies of plant gene functions. To assess the efficiency of this genetic approach, we have sequenced PCR amplified junctions of 1000 T-DNA insertions and analysed their distribution in the Arabidopsis genome. Map positions of 973 tags could be determined unequivocally, indicating that the majority of T-DNA inserti...
متن کاملRice blast fungus sequenced
Rice (Oryza sativa L.) is a major staple food crop for half of the world’s population. The International Rice Research Institute, Philippines, estimates that in order to feed the growing global population, rice production must increase by another one-third by the year 2020. Magnaporthe grisea (anamorph, Pyricularia oryzae) causes rice blast disease (Figure 1) and is the most destructive pathoge...
متن کاملAlgorithm- sequenced access control
A new concept called algorithm-sequenced access control is modellcd, whose central idea is that the access rights for a subject change with time, according to an access algorithm. A computing system that supports this type of access control is then described. Security for the system security modules themselves is provided by a combination of cryptographic and hardware tools. The result is a mod...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Biotechnology
سال: 2001
ISSN: 1087-0156,1546-1696
DOI: 10.1038/83580