• No results found

Construction of Eukaryotic Expression Vectors Encoding CFP-10 and ESAT-6 Genes and Their Potential in Lymphocyte Proliferation

N/A
N/A
Protected

Academic year: 2020

Share "Construction of Eukaryotic Expression Vectors Encoding CFP-10 and ESAT-6 Genes and Their Potential in Lymphocyte Proliferation"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Table 1. Primers used in this study. Enzyme restriction sites are underlined. Gene Sequence
Fig. 2. Agarose gel electrophoresis of ESAT-6 and CFP-10 RT-PCR products. Lanes 1 and 2: ESAT-6 (290 bp), lanes 3 and 4: CFP-10 (300 bp), lane M100: 100-bp DNA ladder (Fermentas)
Fig. 3.  The comparison of MMT assay results in mice groups in two inoculations (first: I & second: II)

References

Related documents

Mi, P., & Wang, X.[4] Proposed a distributed heuristic channel assignment method where each and every APs evaluate the load of nonoverlapping channels

and HVT encode homologs of gga-miR-121 , a host miRNA that has been shown to target mRNAs involved in cell cycle regulation. MDV-1 also encodes mdv1-miR-M4 , which has the same

The main principle is to capture video streams from a webcam which is delivered to the computer where the images are processed in OpenCV and then the desired

five.2 Stanford NLP parser A herbal language parser is a software that accomplish the grammatical shape of sentences as an example, which agencies of words become (as

After this study, the strength evaluation equations of multi-ply bellows were examined based on EJMA Standard and the results by the simplified method by Tsukimori (2014) and

representations and to assess whether evidence obtained from the studies supported or refuted the assertion that utilizing multiple representations in mathematics teaching

Table C.1 Type I error and power for continuous trait local burden kernel test, weighted by minor allele frequency, with c = ( 0, 0.25, 0.5 ) over various causal variant scenarios

In the data encryption process, the data owner encrypt the data before uploading to the cloud; if the data user sends through a access request to the owner, then the owner