• No results found

Virus derived transgenes expressing hairpin RNA give immunity to Tobacco mosaic virus and Cucumber mosaic virus

N/A
N/A
Protected

Academic year: 2020

Share "Virus derived transgenes expressing hairpin RNA give immunity to Tobacco mosaic virus and Cucumber mosaic virus"

Copied!
11
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1 (A) Schematic map of the T-DNA region of pBIN-CMVΔRep(i/r) and (B) Diagram of self-complementary (hairpin)RNA produced by pBIN-CMVΔRep(i/r)
Table 1 Testing of T0 and T1 transgenic plants for TMV or CMV resistance
Figure 2 (A, B) Reaction of Tand new emergent leaves were collected at 25 days after inoculation for ELISA
Figure 3 Southern blot analyses of Twith a radioactively labeled TMV(B)2 and T4 transgenic plants expressing hairpin RNA of TMV partial MP (A) or CMV partial Rep
+4

References

Related documents

ence in axis ratios of the greatest ellipsoid that fits inside the structure and that contains the point of interest, and ranges from − 1 for strongly oblate (discus-shaped)

It is clear from our work that using GPUs can greatly accelerate computation of RNA secondary structure partition functions, allowing calculation of base-pair probabilities for

The content, delivery and evaluation of READ was informed by: (i) studies of patients ’ experiences of discrimination;(ii) studies of stigma and discrimination among

Starting from the 9th week of development, the beginning of the fetal period, the fibers of the lateral pterygoid muscle completely change the position from

A non-rhetorical question for advancing Left research and politics, then: does Global North left-national identity present dangers that differ in kind from those of other

In conclusion, beneficiaries‟ perception of funds sustainability by the Lagos State Contributory Pension Scheme is significantly predicted by fund governance,

Three different positions of masculinity with certain beliefs on the gender order and acceptance of violence within marriage were identified: the traditionalist, the pragmatist, and

Hence, in order to further understand the investigation process of cybercrimes in Malaysia, this paper will briefly discuss the process of investigating cybercrimes under the