A simple wax-embedding method for isolation of aphid hemolymph for detection of luteoviruses in the hemocoel.

نویسندگان

  • Sijun Liu
  • Bryony C Bonning
  • W Allen Miller
چکیده

A protocol for isolating hemolymph from viruliferous aphids has been developed. This method uses warm melted wax to immobilize the aphid. Following removal of a hind leg, the hemolymph can be collected readily. Flushing with RNase-free water allows for collection of sufficient hemolymph for RNA extraction from individual aphids. The extracted RNA was successfully used for detection of barley yellow dwarf virus (BYDV) and pea enation mosaic virus (PEMV) from individual viruliferous Rhopalosiphum padi and Acyrthosiphon pisum aphids, respectively. A TaqMan real-time RT-PCR protocol for quantitation of PEMV in the hemolymph of individual aphids was developed. The wax-embedding hemolymph collection technique provides a useful tool for studying molecular interactions between persistent and circulative plant viruses and their insect vectors.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Method For DNA Extraction From Paraffin Wax Embedded Tissues For PCR Amplification Of Human And Viral DNA

  Background and Objective: Formalin-fixed paraffin-embedded tissues are a valuable source of DNA for molecular studies. We designed and optimized an efficient procedure for DNA extraction from formalin-fixed paraffin embedded tissues. Materials and Methods: Seventy three blocks of cervical paraffin-embedded tissues were investigated. DNA was extracted using 45 minutes boiling in alkaline sol...

متن کامل

Phishing website detection using weighted feature line embedding

The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...

متن کامل

The Cellular Immune Response of the Pea Aphid to Foreign Intrusion and Symbiotic Challenge

Recent studies suggest that the pea aphid (Acyrthosiphon pisum) has low immune defenses. However, its immune components are largely undescribed, and notably, extensive characterization of circulating cells has been missing. Here, we report characterization of five cell categories in hemolymph of adults of the LL01 pea aphid clone, devoid of secondary symbionts (SS): prohemocytes, plasmatocytes,...

متن کامل

Detecting Overlapping Communities in Social Networks using Deep Learning

In network analysis, a community is typically considered of as a group of nodes with a great density of edges among themselves and a low density of edges relative to other network parts. Detecting a community structure is important in any network analysis task, especially for revealing patterns between specified nodes. There is a variety of approaches presented in the literature for overlapping...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of virological methods

دوره 132 1-2  شماره 

صفحات  -

تاریخ انتشار 2006