Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
The purpose of Ribozyme Protocols is to provide a helpful compilation of protocols that will be of use- DEGREESnot only to those with some experience of ribozymes- DEGREESbut also to those wishing to use ribozymes for the first time. Although it is usually impossible to cover every aspect of a scientific field, I believe this book approaches that ideal and should help all readers perform meaningful experiments using ribozymes. To design ribozymes, one must consider whether the target site will be accessible; this task can be facilitated by using computer programs that pre dict the folding of the target RNA. Such programs are detailed in Chapters 2 and 3. If the chosen target is an RNA virus that can mutate rapidly, it makes sense to consider those parts of the genome that are least likely to change during viral replication. An example of how this can be done is described in Chapter 4. Although computer analysis may be a useful starting point to select tar get sites, there seems, at the moment, to be no guarantee that any particular chosen site will be efficiently cleaved. Some workers have deliberately bypassed this problem by using libraries of ribozyme sequences and by select ing those that actually hybridize to and/or cleave the target; these methods are described in Chapters 5
The purpose of Ribozyme Protocols is to provide a helpful compilation of protocols that will be of use-^not only to those with some experience of ribozymes-^but also to those wishing to use ribozymes for the first time. Although it is usually impossible to cover every aspect of a scientific field, I believe this book approaches that ideal and should help all readers perform meaningful experiments using ribozymes. To design ribozymes, one must consider whether the target site will be accessible; this task can be facilitated by using computer programs that pre dict the folding of the target RNA. Such programs are detailed in Chapters 2 and 3. If the chosen target is an RNA virus that can mutate rapidly, it makes sense to consider those parts of the genome that are least likely to change during viral replication. An example of how this can be done is described in Chapter 4. Although computer analysis may be a useful starting point to select tar get sites, there seems, at the moment, to be no guarantee that any particular chosen site will be efficiently cleaved. Some workers have deliberately bypassed this problem by using libraries of ribozyme sequences and by select ing those that actually hybridize to and/or cleave the target; these methods are described in Chapters 5 and 6.
This scarce antiquarian book is a selection from Kessinger Publishing's Legacy Reprint Series. Due to its age, it may contain imperfections such as marks, notations, marginalia and flawed pages. Because we believe this work is culturally important, we have made it available as part of our commitment to protecting, preserving, and promoting the world's literature. Kessinger Publishing is the place to find hundreds of thousands of rare and hard-to-find books with something of interest for everyone
This scarce antiquarian book is a selection from Kessinger Publishing's Legacy Reprint Series. Due to its age, it may contain imperfections such as marks, notations, marginalia and flawed pages. Because we believe this work is culturally important, we have made it available as part of our commitment to protecting, preserving, and promoting the world's literature. Kessinger Publishing is the place to find hundreds of thousands of rare and hard-to-find books with something of interest for everyone!
|
You may like...
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, …
Blu-ray disc
(1)
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger
Blu-ray disc
(1)
R76 Discovery Miles 760
|