نتایج جستجو برای: tree shrew
تعداد نتایج: 171600 فیلتر نتایج به سال:
Abstract Genetically engineered chymosin from the tree shrew ( Tupaia belangeri chinensis ) has been obtained and partially characterized for first time. The target enzyme was produced in Escherichia coli , strain BL21(DE3). It shown that recombinant coagulates cow milk Bos taurus ). total specific milk-clotting activity of 0.7–5.3 IMCU/mL 8.8–16.6 IMCU/mg. nonspecific proteolytic relation to b...
To investigate the distribution, shape and stainability of the ACTH cells from human, baboon, monkey, cat, dog, rat, mouse, hamster, guinea pig, white-toothed shrew, house musk shrew and mole pituitaries, adjacent tissue sections were immunostained with anti-porcine ACTH1-39 serum and with PAS-ironhematoxylin respectively. Mammalian ACTH cells display two separate morphological appearances :1) ...
Phylogenetical positions of Sorex specimens unassigned to species from Cheju Island, Korea, and S. caecutiens from southern Korean Peninsula were investigated based on full nucleotide sequences (1,140 bp) of the mitochondrial cytochrome b gene, comparing specimens of the S. caecutiens/shinto group from locations throughout its range. In the phylogenetic tree obtained, S. caecutiens were separat...
The northern short-tailed shrew is rare among mammals for its ultrasonic clicks.
Molecular phylogenetic relationships of moles, shrew moles, and desmans from the new and old worlds.
A Rich variety of anatomical and physiological specializations has enabled members of the family Talpidae (moles, shrew moles, and desmans) to exploit a diverse range of habitats: terrestrial, semi-aquatic, aquatic/fossorial, semi-fossorial, and fossorial. While numerous morphological and biochemical studies pertaining to the origin and radiation of the Talpidae have been completed, phylogeneti...
The shrew or pulsing DDoS (Distributed Denial-of-Service) attacks, also known as RoQ (Reduction of Quality) attacks, are stealthy, periodic, and low-rate in volume. The shrew attacks could be even more detrimental to network resources than the flooding type of DDoS attacks. Shrew attacks appear periodically in low volume, thereby damaging the victim servers for a long time without being detecte...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید