Molecular Identification of Begomovirus Infecting Angled Luffa
نویسندگان
چکیده
منابع مشابه
Characterization of Tomato yellow spot virus, a novel tomato-infecting begomovirus in Brazil
The objective of this work was the biological and molecular characterization of a begomovirus detected in São Joaquim de Bicas, Minas Gerais, Brazil, named TGV-[Bi2], by determining its host range, complete nucleotide sequence and phylogenetic relationships with other begomoviruses. Biological characterization consisted of a host range study using either sap inoculation or particle bombardment ...
متن کاملComplete Sequence of a New Bipartite Begomovirus Infecting Cotton Plants in Brazil
Begomoviruses are plant viruses responsible for severe losses in important crops, such as beans, cassavas, tomatoes, and cotton, around the world. Here, we report the first full-genome sequence of a bipartite begomovirus species collected from cotton plants in Brazil.
متن کاملMolecular Identification of Potyviruses Infecting Bulbous Ornamentals by the Analysis of Coat Protein (CP) Sequences
Potyviruses (genus Potyvirus, family Potyviridae) are transmitted by aphids in a non-persistent manner and cause significant losses in many crops including bulbous ornamentals. Host range, symptoms, physical and biochemical properties of many potyviruses in bulbous ornamentals are reported, but, especially for viruses infecting ornamentals of minor economical importance, sequence data are still...
متن کاملMolecular identification of Ganoderma lucidum from Iran
Medicinal mushroom Ganoderma lucidum has been used in East Asia for centuries in order to prevent and treat a variety of diseases such as hepatitis, immunological disorders and cancers. In fact, this fungus contains a vast source of polysaccharides, proteins and secondary metabolites with anti-tumor and immuno-modulatory properties. Up to now, a variety of drug metabolites extracted from G. luc...
متن کاملPseudo-Cryptanalysis of Luffa
In this paper, we present the pseudo-collision, pseudo-second-preimage and pseudo-preimage attacks on the SHA-3 candidate algorithm Luffa. The pseudocollisions and pseudo-second-preimages can be found easily by computing the inverse of the message injection function at the beginning of Luffa. We explain in details the pseudo-preimage attacks. For Luffa-224/256, given the hash value, only 2 iter...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Perlindungan Tanaman Indonesia
سال: 2020
ISSN: 2548-4788,1410-1637
DOI: 10.22146/jpti.31073