Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Chase Cunningham"'
Publikováno v:
Frontiers in Microbiology, Vol 14 (2023)
IntroductionHomologous recombination is an effective way to generate recombinant viruses for vaccine research such as pseudorabies virus (PRV) and adenovirus. Its efficiency can be affected by the integrity of viral genome and the linearization sites
Externí odkaz:
https://doaj.org/article/189b4d92d5a14f83a40efabbd3fc9150
Autor:
Lihua Wang, Shijiang Mi, Rachel Madera, Llilianne Ganges, Manuel V. Borca, Jingqiang Ren, Chase Cunningham, Ada G. Cino-Ozuna, Hongwei Li, Changchun Tu, Wenjie Gong, Jishu Shi
Publikováno v:
BMC Veterinary Research, Vol 16, Iss 1, Pp 1-8 (2020)
Abstract Background Virus neutralization test (VNT) is widely used for serological survey of classical swine fever (CSF) and efficacy evaluation of CSF vaccines. However, VNT is a time consuming procedure that requires cell culture and live virus man
Externí odkaz:
https://doaj.org/article/48bcd8c7e4b9401aa21143e3f299113c
Autor:
Changchun Tu, Jingqiang Ren, Rachel Madera, Lihua Wang, Chase Cunningham, Wenjie Gong, Ada G. Cino-Ozuna, Hongwei Li, Manuel V. Borca, Jishu Shi, Llilianne Ganges, Shijiang Mi
Publikováno v:
BMC Veterinary Research, Vol 16, Iss 1, Pp 1-8 (2020)
IRTA Pubpro. Open Digital Archive
Institut de Recerca i Tecnologia Agroalimentàries (IRTA)
BMC Veterinary Research
IRTA Pubpro. Open Digital Archive
Institut de Recerca i Tecnologia Agroalimentàries (IRTA)
BMC Veterinary Research
Background Virus neutralization test (VNT) is widely used for serological survey of classical swine fever (CSF) and efficacy evaluation of CSF vaccines. However, VNT is a time consuming procedure that requires cell culture and live virus manipulation
Autor:
Chase Cunningham
Step Aside, Mediocre Leaders: Learn What NOT To Do! Ditch the fluff and sugarcoating and learn how to lead the way your people deserve. In How NOT To Lead, Dr. Chase Cunningham, a seasoned cybersecurity heavyweight and Retired Navy Chief, doesn't giv
Autor:
Dr. Chase Cunningham
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy base