Results 71 to 80 of about 1,314,622 (283)

Isolation and characterization of mesenchymal stem cells derived from bovine Wharton's jelly and their potential for use in cloning by nuclear transfer

open access: yesCiência Rural
: Wharton's jelly is a source of mesenchymal stem cells (MSCs) that had not yet been tested for bovine embryo production by nuclear transfer (NT). Thus, the objective of this study was to isolate, characterize and test MSCs derived from Wharton's jelly ...
Carolina Gonzales da Silva   +7 more
doaj   +1 more source

Optical Quantum Cloning - a Review [PDF]

open access: yesProgress in Optics, vol. 49, Edt. E. Wolf (Elsevier, 2006), p. 455., 2005
After a brief introduction to the quantum no-cloning theorem and its link with the linearity and causality of quantum mechanics, the concept of quantum cloning machines is sketched, following, whenever possible, the chronology of the main results. The important classes of quantum cloning machines are reviewed, in particular state-independent and state ...
arxiv  

A Machine Learning Based Framework for Code Clone Validation [PDF]

open access: yesarXiv, 2020
A code clone is a pair of code fragments, within or between software systems that are similar. Since code clones often negatively impact the maintainability of a software system, several code clone detection techniques and tools have been proposed and studied over the last decade.
arxiv  

IVA cloning: A single-tube universal cloning system exploiting bacterial In Vivo Assembly

open access: yesScientific Reports, 2016
In vivo homologous recombination holds the potential for optimal molecular cloning, however, current strategies require specialised bacterial strains or laborious protocols. Here, we exploit a recA-independent recombination pathway, present in widespread
J. García-Nafría, J. Watson, I. Greger
semanticscholar   +1 more source

Rescue and vegetative propagation of Eremanthus erythropappus (DC.) MacLeish in natural stand [PDF]

open access: yesBrazilian Journal of Biology
The native stands of ‘candeia’ (Eremanthus erythropappus) have been explored through management plans due to the economic potential of essential oil.
A. L. C. Fonseca   +4 more
doaj   +2 more sources

An ensemble learning approach for software semantic clone detection [PDF]

open access: yesarXiv, 2020
Code clone is a serious problem in software and has the potential to software defects, maintenance overhead, and licensing violations. Therefore, clone detection is important for reducing maintenance effort and improving code quality during software evolution.
arxiv  

The Identity of Clones

open access: yesThe Journal of Medicine and Philosophy, 1999
A common concern with respect to cloning is based on the belief that cloning produces identical individuals. This is a fundamental misunderstanding of what type of identity-relation cloning involves. The concept "identity" is ambiguous, and the statement that cloning produces "identical" individuals is not meaningful unless the notion of identity is ...
openaire   +4 more sources

A Twenty Year Association with Pteridines - Chemistry, Biochemistry and Molecular Biology

open access: yesPteridines, 1998
The author has summarised the science in his published works which contained chemistry. biochemistry and molecular biology related to pteridines as a dedication to Professor Wolfgang Pfleiderer on the occasion of his seventieth birthday.
Armarego Wilfred L. F.
doaj   +1 more source

Toward therapeutic cloning and regenerative biology research forum: To clone or not to clone [PDF]

open access: yesReproductive Biology and Endocrinology, 2003
Creating exact copies (clones) of an individual has long been a made-to-believe story in various cultures throughout mankind history. However, the report of successfully creating a genetic clone of an adult animal from a differentiated somatic cell completely shocked the world.
openaire   +4 more sources

Improved Method of Detection Falsification Results the Digital Image in Conditions of Attacks [PDF]

open access: yesProblems of the Regional Energetics, 2016
The modern level of information technologies development has led to unheard ease embodiments hitherto unauthorized modifications of digital content. At the moment, very important question is the effective expert examination of authenticity of digital ...
Kobozeva A.A., Grigorenko S.N.
doaj  

Home - About - Disclaimer - Privacy