“Balanced” karyotypes in six abnormal offspring of balanced reciprocal translocation normal carrier parents

1995 ◽  
Vol 55 (1) ◽  
pp. 47-52 ◽  
Author(s):  
Sharon L. Wenger ◽  
Mark W. Steele ◽  
Leslie Y. Boone ◽  
Sharen G. Lenkey ◽  
James H. Cummins ◽  
...  
1984 ◽  
Vol 44 (2) ◽  
pp. 219-224 ◽  
Author(s):  
Ursula Mittwoch ◽  
Shantha Mahadevaiah ◽  
Leslie A. Setterfield

SUMMARYTwo male-sterile chromosome anomalies, the insertion Is(7; 1)40H and the tertiary trisomy, Ts(512)31H, were found to be associated with reduced ovarian volumes in immature females. Together with the reciprocal translocation, T(11; 19)42H, in which this effect was described previously, reduced ovaries have been found in all three male-sterile chromosome anomalies investigated so far, suggesting that ovarian involvement is likely to be common in these conditions. Assuming that the smaller ovarian size reflects a reduction in the number of oocytes, it is suggested that male-sterile chromosome anomalies may exert basically similar deleterious effects on meiotic germ cells in males and females, the difference in outcome being due to cell-physiological differences between spermatocytes and oocytes and to the small number of surviving oocytes required for fertility in females.


1992 ◽  
Vol 52 (3) ◽  
pp. 367-370 ◽  
Author(s):  
K. Anamthawat-Jonsson ◽  
S.E. Long ◽  
P.K. Basrur ◽  
S. Adalsteinsson

1983 ◽  
Vol 10 (2) ◽  
pp. 125-131 ◽  
Author(s):  
Kristina Vermaelen ◽  
Jean-Louis Michaux ◽  
Andries Louwagie ◽  
Herman Van Den Berghe

Euphytica ◽  
2012 ◽  
Vol 185 (1) ◽  
pp. 119-122
Author(s):  
A. Farré ◽  
A. Visioni ◽  
I. Lacasa-Benito ◽  
L. Cistué ◽  
J. Jansen ◽  
...  

2013 ◽  
Vol 443 ◽  
pp. 425-429
Author(s):  
Jing Shuang Lu ◽  
Chun Mei Du ◽  
Xin Guo ◽  
Lei Zhang

This essay describes a new radio encryption technique among communication equipments, that is embed confidential information in normal carrier by using digital watermarking to achieve the purpose of protecting confidential information and confusing illegal interceptors. Meanwhile it also gives embed watermarking based on integration and Detection Algorithm.


2006 ◽  
Vol 140A (10) ◽  
pp. 1111-1113 ◽  
Author(s):  
W.T. Keng ◽  
L. Harewood ◽  
E. Grace ◽  
C. Paxton ◽  
W.W.K. Lam ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document