Monarch butterfly orientation: missing pieces of a magnificent puzzle
نویسندگان
چکیده
منابع مشابه
Monarch butterfly orientation: missing pieces of a magnificent puzzle
From late August to early September, millions of adult monarch butterflies of the eastern North American population cease reproducing, become highly gregarious and begin migrating southwards. By mid-October, they migrate through central Texas into Mexico where they follow the Sierra Madre Oriental across the Tropic of Cancer. They then shift direction westwards towards the Transverse Neovolcani...
متن کامل1918 Influenza, a Puzzle with Missing Pieces
hanks and Brundage offer thought-provoking hypotheses about infl uenza pathogenesis during the catastrophic 1918–1919 pandemic (1). Although we neither agree nor disagree with their views, its central hypothesis of T-cell–mediated immunopathogenesis begs examination of past events in light of modern immunologic and virologic understanding. We also emphasize that effects of the pandemic virus sh...
متن کاملMissing Pieces in the NF-κB Puzzle
stimulate the migration and maturation of lymphocytes. Furthermore, NF-B is central for the overall immune response through its ability to activate genes coding for and cyclin D1, that are critical for apoptotic processes (Karin and Lin, 2002). regulation is the IB kinase (IKK) complex. This review is focused on recent progress as well as unanswered intriguing and outstanding questions that a...
متن کاملSearching for missing pieces of the sex-determination puzzle.
Little is known of the mechanisms whereby the mammalian indifferent gonad develops into a testis or ovary. In XY individuals, Sry, the mammalian testis-determining gene, is expressed in the pre-Sertoli cells, which then differentiate into Sertoli cells. Other cell types, which include the germ cells, the steroidogenic cells and the connective tissue cells, must then be instructed to develop in ...
متن کاملSecurity in Untrusted Code Environments: Missing Pieces of the Puzzle
Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies, component-based security architectures such as Java and .NET still fail to provide several essential f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Experimental Biology
سال: 1996
ISSN: 1477-9145,0022-0949
DOI: 10.1242/jeb.199.1.93