Spermatogenesis - Methods and protocols

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Liver Stem Cells - Methods and Protocols

The brief and concise preface written by Prof. Takahiro Ochiya is particularly well addressed to scholars belonging to different scientific fields: cellular and molecular biology, liver and cancer biology, tissue engineering and stem cell therapy. By a few lines prof Ochiya is telling us that we are getting exciting results, at the lab and the preclinical level, in treating liver injuries thank...

متن کامل

Language, Semantics, and Methods for Cryptographic Protocols

In this report we present a process language for security protocols together with an operational semantics and an alternative semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. This Petri-net semantics has a strong relation to both Paulson’s inductive set o...

متن کامل

RNA: methods and protocols — a new series

This month, Silence launches a new series on methods and protocols to study silencing pathways and analyze nucleic acids and proteins.

متن کامل

Retrospective and Introspective Think-Aloud Protocols in Translation Quality Assessment: A Qual-Quan Mixed Methods Research

A major concern in Translation Studies (TS) has been on what really goes on in the translators’ head while they are translating (not what researchers claim is going on). Among the techniques utilized in studying such cognitive processes and systems, think-aloud protocols (TAPs) have been widely em- ployed. As a content analysis study, this Qual-Quan mixed methods...

متن کامل

Language, Semantics, and Methods for Security Protocols

Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can reveal. The last few years have seen the emergence of successful intensional, event-based, formal appr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: European Journal of Histochemistry

سال: 2013

ISSN: 2038-8306,1121-760X

DOI: 10.4081/ejh.2013.br13