Genetic Analysis of Tumour Suppression

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Genetic suppression.

Genetic suppression has provided a very powerful tool for analyzing C. elegans. Suppression experiments are facilitated by the ability to handle very large numbers of individuals and to apply powerful selections. Because the animal grows as a self-fertilizing diploid, both dominant and recessive suppressors can be recovered. Many different kinds of suppression have been reported. These are disc...

متن کامل

Autophagy in tumour suppression and promotion.

Autophagy, a well-described cellular mechanism for lysosomal degradation of cytoplasmic content, has emerged as a tumour suppression pathway. Recent evidence indicates that the tumour suppressor function of autophagy is mediated by scavenging of damaged oxidative organelles, thereby preventing accumulation of toxic oxygen radicals that would cause genome instability. Paradoxically, however, in ...

متن کامل

‏‎suppression of coke formation in thermal cracking by coke inhibitors‎‏

‏‎the main purpose of this research was to:1.develop a coking model for thermal cracking of naphtha.2.study coke inhibition methods using different coke inhibitors.developing a coking model in naphtha cracking reactors requires a suitable model of the thermal cracking reactor based on a reliable kinetic model.to obtain reliable results all these models shall be solved simultaneously.for this pu...

15 صفحه اول

woman-defined identity: analysis of selected poems of adrienne rich

the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Clinical Pathology

سال: 1990

ISSN: 0021-9746

DOI: 10.1136/jcp.43.2.175-b