Gene Maps of Monotremes (Mammalian Subclass Prototheria)
نویسندگان
چکیده
منابع مشابه
Electroreception in monotremes
subject of special fascination ever since their first description was greeted by Western scientists with great scepticism (Home, 1802). Many thought that the platypus was a clever hoax perpetrated by careful attachment of a duck-bill and webbed feet to the skin of a mammal (Griffiths, 1998). Perhaps a greater mystery concerned the ability of a platypus to catch half its body mass of benthic inv...
متن کاملEnergy Homeostasis in Monotremes
In 1803, the French anatomist Étienne Geoffroy Saint-Hilaire decided that the newly described echidna and platypus should be placed in a separate order, the monotremes, intermediate between reptiles and mammals. The first physiological observations showed monotremes had low body temperatures and metabolic rates, and the consensus was that they were at a stage of physiological development interm...
متن کاملCloning and characterization of MAP2191 gene, a mammalian cell entry antigen of Mycobacterium avium subspecies paratuberculosis
The aim of this study is to identify, clone and express a Mycobacterium avium subsp. paratuberculosis specific immunogenic antigen candidate, in order to develop better reagents for diagnosis and vaccines for the protection of the host. Therefore, MAP2191 gene (a member of MAPmce5 operon) from MAP, was isolated and characterized by Bioinformatics tools and <e...
متن کاملComparison of the Lipophosphoglycan 3 Gene of the Lizard and Mammalian Leishmania: A Homology Modeling
Background: Lipophosphoglycan 3 (LPG3) is required for the LPG assembly, a well known virulent molecule. In this study, the LPG3 gene of the lizard and mammalian Leishmania species were cloned and sequenced. A three-dimensional structure (3D) for the target sequence was also predicted by comparative (homology) modeling. Materials and Methods: An optimization PCR amplification was performed o...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ILAR Journal
سال: 1998
ISSN: 1084-2020
DOI: 10.1093/ilar.39.2-3.225