首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39篇
  免费   6篇
  2023年   1篇
  2022年   1篇
  2021年   1篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2015年   3篇
  2014年   1篇
  2013年   2篇
  2012年   2篇
  2011年   5篇
  2010年   2篇
  2008年   1篇
  2007年   2篇
  2006年   1篇
  2004年   4篇
  2003年   4篇
  2002年   2篇
  2001年   3篇
  1994年   1篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1979年   1篇
  1966年   1篇
排序方式: 共有45条查询结果,搜索用时 15 毫秒
1.
Spontaneous and double-strand break (DSB)-induced gene conversion was examined in alleles of the Saccharomyces cerevisiae ura3 gene containing nine phenotypically silent markers and an HO nuclease recognition site. Conversions of these alleles, carried on ARS1/CEN4 plasmids, involved interactions with heteroalleles on chromosome V and were stimulated by DSBs created at HO sites. Crossovers that integrate plasmids into chromosomes were not detected since the resultant dicentric chromosomes would be lethal. Converted alleles in shuttle plasmids were easily transferred to Escherichia coli and analyzed for marker conversion, facilitating the characterization of more than 400 independent products from five crosses. This analysis revealed several new features of gene conversions. The average length of DSB-induced conversion tracts was 200 to 300 bp, although about 20% were very short (less than 53 bp). About 20% of spontaneous tracts also were also less than 53 bp, but spontaneous tracts were on average about 40% longer than DSB-induced tracts. Most tracts were continuous, but 3% had discontinuous conversion patterns, indicating that extensive heteroduplex DNA is formed during at least this fraction of events. Mismatches in heteroduplex DNA were repaired in both directions, and repair tracts as short as 44 bp were observed. Surprisingly, most DSB-induced gene conversion tracts were unidirectional and exhibited a reversible polarity that depended on the locations of DSBs and frameshift mutations in recipient and donor alleles.  相似文献   
2.
David W. Kikuchi  William L. Allen  Kevin Arbuckle  Thomas G. Aubier  Emmanuelle S. Briolat  Emily R. Burdfield-Steel  Karen L. Cheney  Klára Daňková  Marianne Elias  Liisa Hämäläinen  Marie E. Herberstein  Thomas J. Hossie  Mathieu Joron  Krushnamegh Kunte  Brian C. Leavell  Carita Lindstedt  Ugo Lorioux-Chevalier  Melanie McClure  Callum F. McLellan  Iliana Medina  Viraj Nawge  Erika Páez  Arka Pal  Stano Pekár  Olivier Penacchio  Jan Raška  Tom Reader  Bibiana Rojas  Katja H. Rönkä  Daniela C. Rößler  Candy Rowe  Hannah M. Rowland  Arlety Roy  Kaitlin A. Schaal  Thomas N. Sherratt  John Skelhorn  Hannah R. Smart  Ted Stankowich  Amanda M. Stefan  Kyle Summers  Christopher H. Taylor  Rose Thorogood  Kate Umbers  Anne E. Winters  Justin Yeager  Alice Exnerová 《Journal of evolutionary biology》2023,36(7):975-991
Prey seldom rely on a single type of antipredator defence, often using multiple defences to avoid predation. In many cases, selection in different contexts may favour the evolution of multiple defences in a prey. However, a prey may use multiple defences to protect itself during a single predator encounter. Such “defence portfolios” that defend prey against a single instance of predation are distributed across and within successive stages of the predation sequence (encounter, detection, identification, approach (attack), subjugation and consumption). We contend that at present, our understanding of defence portfolio evolution is incomplete, and seen from the fragmentary perspective of specific sensory systems (e.g., visual) or specific types of defences (especially aposematism). In this review, we aim to build a comprehensive framework for conceptualizing the evolution of multiple prey defences, beginning with hypotheses for the evolution of multiple defences in general, and defence portfolios in particular. We then examine idealized models of resource trade-offs and functional interactions between traits, along with evidence supporting them. We find that defence portfolios are constrained by resource allocation to other aspects of life history, as well as functional incompatibilities between different defences. We also find that selection is likely to favour combinations of defences that have synergistic effects on predator behaviour and prey survival. Next, we examine specific aspects of prey ecology, genetics and development, and predator cognition that modify the predictions of current hypotheses or introduce competing hypotheses. We outline schema for gathering data on the distribution of prey defences across species and geography, determining how multiple defences are produced, and testing the proximate mechanisms by which multiple prey defences impact predator behaviour. Adopting these approaches will strengthen our understanding of multiple defensive strategies.  相似文献   
3.
The International Journal of Life Cycle Assessment - The current global interest in circular economy (CE) opens an opportunity to make society’s consumption and production patterns more...  相似文献   
4.
Lateral root formation, the primary way plants increase their root mass, displays developmental plasticity in response to environmental changes. The aberrant lateral root formation (alf)4-1 mutation blocks the initiation of lateral roots, thus greatly altering root system architecture. We have positionally cloned the ALF4 gene and have further characterized its phenotype. The encoded ALF4 protein is conserved among plants and has no similarities to proteins from other kingdoms. The gene is present in a single copy in Arabidopsis. Using translational reporters for ALF4 gene expression, we have determined that the ALF4 protein is nuclear localized and that the gene is expressed in most plant tissues; however, ALF4 expression and ALF4's subcellular location are not regulated by auxin. These findings taken together with further genetic and phenotypic characterization of the alf4-1 mutant suggest that ALF4 functions independent from auxin signaling and instead functions in maintaining the pericycle in the mitotically competent state needed for lateral root formation. Our results provide genetic evidence that the pericycle shares properties with meristems and that this tissue plays a central role in creating the developmental plasticity needed for root system development.  相似文献   
5.
We developed a procedure to isolate DNA from dried corncobs. This DNA was amplified successfully by PCR, producing well-defined bands in response to specific primers. The SSR patterns between cob and leaf DNA of the same inbred line were found to be identical, indicating that the DNA in the cob cells had not degraded during senescence.  相似文献   
6.
This video demonstrates a technique to establish the presence of a normally functioning olfactory system in a mouse. The test helps determine whether the mouse can discriminate between non-social odors and social odors, whether the mouse habituates to a repeatedly presented odor, and whether the mouse demonstrates dishabituation when presented with a novel odor. Since many social behavior tests measure the experimental animal’s response to a familiar or novel mouse, false positives can be avoided by establishing that the animals can detect and discriminate between social odors. There are similar considerations in learning tests such as fear conditioning that use odor to create a novel environment or olfactory cues as an associative stimulus. Deficits in the olfactory system would impair the ability to distinguish between contexts and to form an association with an olfactory cue during fear conditioning. In the odor habitation/dishabituation test, the mouse is repeatedly presented with several odors. Each odor is presented three times for two minutes. The investigator records the sniffing time directed towards the odor as the measurement of olfactory responsiveness. A typical mouse shows a decrease in response to the odor over repeated presentations (habituation). The experimenter then presents a novel odor that elicits increased sniffing towards the new odor (dishabituation). After repeated presentation of the novel odor the animal again shows habituation. This protocol involves the presentation of water, two or more non-social odors, and two social odors. In addition to reducing experimental confounds, this test can provide information on the function of the olfactory systems of new knockout, knock-in, and conditional knockout mouse lines.  相似文献   
7.
8.
Based on the theoretical understanding of the in vivo lysosomotropism, by adjusting the pka of basic nitrogen containing cathepsin S inhibitors, a set of compounds with pka 6-8 were identified to have excellent cell based Lip10 activity, yet avoiding undesired sequestration in spleen.  相似文献   
9.
El Emam K  Jonker E  Arbuckle L  Malin B 《PloS one》2011,6(12):e28071
BackgroundPrivacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods.ConclusionsThe current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods.  相似文献   
10.
The reproductive success of the round goby (Neogobius melanostomus), an invasive fish, may be mediated by the use of pheromones. We hypothesized that reproductive male (RM) round gobies release sex pheromone to which reproductive females (RF) respond. In this study, we compared behavioural and electrophysiological responses of reproductive and non-reproductive female round gobies to conspeci fic males. Results of behavioural experiments in the laboratory showed that RF spent significantly more time near the source of the male odour compared with odours from control water. However, RF did not distinguish between odours from non-reproductive male (non-RM) water and control water. Non-reproductive females (non-RF) were not attracted to odours released from RM or non-RM water. Results of electro-olfactogram (EOG) responses showed that both RF and non-RF discriminated between HPLC fractionated RM and non-RM odours. However, the EOG responses of RF were about eight-fold higher than non-RF exposed to RM odours. These findings confirm that RM round gobies release a pheromone signal that attracts RF. The results of this research may be useful in developing control strategy using natural pheromones to disrupt the reproductive behaviour of the invasive round goby and to curtail its effects on native species. An erratum to this article is available at .  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号