GENETIC INTERPRETATION OF CHIASMATA IN DELPHINIUM
نویسندگان
چکیده
منابع مشابه
Toxic Alkaloid Concentrations in Delphinium nuttallianum, Delphinium andersonii, and Delphinium geyeri in the Intermountain Region
Low larkspurs (Delphinium nuttalliunum Pritz., Delphinium andersonii Gray) and plains larkspur (Delphinium geyeri Greene) often poison cattle grazing on western North American rangelands. The dominant toxic alkaloid in larkspur is methyllycaconitine (MLA); other very toxic alkaloids in low and plains larkspurs are nudicauline and geyerline. Toxic alkaloid concentrations in larkspur near or abov...
متن کاملphylogeography and genetic diversity of the lesser mouse- eared bat (myotis blythii) in iran
in current study, 63 samples of bat populations collected from differ regions were used for evaluating the geographic variations. twenty cranial and dental characters for traditional morphometric and landmarks method on the ventral, dorsal skull and mandible for geometry morphometric studies were used. statistical analyses of traditional morphometric and geometry morphometric data indicated low...
Delphinium L. Subgen. Delphinium: origin and evolutionary trends
BLANCHE, C. (1990) Delphinium L. subgen. Delphinium: origin and evolutionary trends. Collect. Bot. (Barcelona), 19: 75-95. The advanced features of Delphinium L. subgen. Delphinium (annual taxa) are compared with those of subgen. Delphinastrum (DC.) Wang and subgen. Oligophyllon Dimitrova (perennial taxa). Flower morphology shows a functional interchange between lateral petals and upper petals,...
متن کاملDiterpenoid Alkaloids from Delphinium ajacis
Five new diterpenoid alkaloids, ajacisines A–E (1–5), were isolated from Delphinium ajacis, along with seven known alkaloids (6–12). On the basis of their spectral data (IR, UV, HR‐ESI‐MS, 1D and 2D NMR) and chemical properties, the structures of compounds 1–12 were identified. All isolated compounds were evaluated for their in vitro antiviral activities against respiratory syncytial virus, and...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Genetics
سال: 1963
ISSN: 1943-2631
DOI: 10.1093/genetics/48.3.329