Characterization of two Egyptian native chicken breeds using genetic and immunological parameters

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Characterization of genetic diversity and gene mapping in two Swedish local chicken breeds

The aim of this paper is to study genetic diversity in the two Swedish local chicken breeds Bohuslän-Dals svarthöna and Hedemorahöna. The now living birds of both of these breeds (about 500 for Bohuslän-Dals svarthöna and 2600 for Hedemorahöna) originate from small relicts of earlier larger populations. An additional aim was to make an attempt to map loci associated with a trait that are segreg...

متن کامل

Assessing genetic diversity of Vietnamese local chicken breeds using microsatellites.

This study aimed to assess genetic diversity within and between nine Vietnamese local chicken breeds and two Chinese breeds included for comparison. Genotyping 29 microsatellites revealed high diversity of both Vietnamese and Chinese breeds. Cluster analysis using the STRUCTURE software suggested six clusters as the most likely grouping of the 11 breeds studied. These groups encompassed four ho...

متن کامل

investigation genetic diversity native chicken of khuzestan using microsatellite markers

the variation within a population of 100 pieces of native chicken from 5 regions of khuzestan province (abadan, dezful, shushtar, ahvaz, izeh) were analyzed by using 6 microsatellite markers, in the present study. the dna was extracted by using salting out method from blood samples collected. the pcr reactions for all locuses were performed and it was found that all of them are highly polymorph...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Biotechnology in Animal Husbandry

سال: 2011

ISSN: 1450-9156,2217-7140

DOI: 10.2298/bah1101001r