Investigating the Association of Genetic Admixture and Donor/Recipient Genetic Disparity with Transplant Outcomes
نویسندگان
چکیده
منابع مشابه
phylogeography and genetic diversity of the lesser mouse- eared bat (myotis blythii) in iran
in current study, 63 samples of bat populations collected from differ regions were used for evaluating the geographic variations. twenty cranial and dental characters for traditional morphometric and landmarks method on the ventral, dorsal skull and mandible for geometry morphometric studies were used. statistical analyses of traditional morphometric and geometry morphometric data indicated low...
the evaluation of language related engagment and task related engagment with the purpose of investigating the effect of metatalk and task typology
abstract while task-based instruction is considered as the most effective way to learn a language in the related literature, it is oversimplified on various grounds. different variables may affect how students are engaged with not only the language but also with the task itself. the present study was conducted to investigate language and task related engagement on the basis of the task typolog...
15 صفحه اولthe study of aaag repeat polymorphism in promoter of errg gene and its association with the risk of breast cancer in isfahan region
چکیده: سرطان پستان دومین عامل مرگ مرتبط با سرطان در خانم ها است. از آنجا که سرطان پستان یک تومور وابسته به هورمون است، می تواند توسط وضعیت هورمون های استروئیدی شامل استروژن و پروژسترون تنظیم شود. استروژن نقش مهمی در توسعه و پیشرفت سرطان پستان ایفا می کند و تاثیر خود را روی بیان ژن های هدف از طریق گیرنده های استروژن اعمال می کند. اما گروه دیگری از گیرنده های هسته ای به نام گیرنده های مرتبط به ا...
15 صفحه اولthe past hospitalization and its association with suicide attempts and ideation in patients with mdd and comparison with bmd (depressed type) group
چکیده ندارد.
automatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Biology of Blood and Marrow Transplantation
سال: 2017
ISSN: 1083-8791
DOI: 10.1016/j.bbmt.2017.02.019