The banding patterns were scored based on the presence (1) or absence (0) in each SSR markers’ allele. These polymorphism data were used to classify the accessions by Ward’s hierarchical clustering method in JMP software (v. 7.0.2; SAS Institute, Inc., Cary, NC, USA).
Polymorphism Analysis of Rice Accessions
The banding patterns were scored based on the presence (1) or absence (0) in each SSR markers’ allele. These polymorphism data were used to classify the accessions by Ward’s hierarchical clustering method in JMP software (v. 7.0.2; SAS Institute, Inc., Cary, NC, USA).
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Corresponding Organization :
Other organizations : National Agriculture and Food Research Organization, Genetic Resources Center, Forestry Research Institute, Tohoku University, Hirosaki University, Research Institute for Humanity and Nature, Kyoto Prefectural University, Japan International Research Center for Agricultural Sciences
Variable analysis
- CTAB method for DNA extraction from young leaves of individual plants
- Polymorphism data of 67 SSR markers distributed among the 12 chromosomes
- PCR reaction mixture (1 μL sterile H2O, 1.5 μL of forward and reverse primers (each 2 μM), 7.5 μL of 2× Quick Taq HS Dye Mix, and 5 μL DNA concentrated to about 5 to 10 ng/μL)
- PCR amplification conditions (94°C for 2 min, followed by 40 cycles of 30 s at 94°C, 30 s at 55°C and 1 min at 68°C)
- Electrophoresis conditions (2% agarose gel in 1× TAE buffer at 150 V for 90 or 120 min)
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!