Genetic Structure of Mongolic-Speaking Kalmyks
نویسندگان
چکیده
منابع مشابه
Genetic structure of Mongolic-speaking Kalmyks.
Genetic polymorphisms of blood groups ABO and RH D, serum proteins HP, TF, and GC, and red cell enzymes ACP1, PGM1, ESD, GLO1, and SOD-A have been reported for three tribes (Torguts, Derbets, and Buzavs) of the Volga's Kalmyk-Oyrats. The Kalmyks exhibit genetic markers that are characteristic of Central Asian populations, namely, high allelic frequencies for ABO*B, TF*C2, GC*IF, ESD*2, and GLO1...
متن کاملGenetic evidence for the Mongolian ancestry of Kalmyks.
The Kalmyks are an ethnic group along the lower Volga River in Russia who are thought to have migrated there from Mongolia about 300 years ago. To investigate their origins, we studied mtDNA and Y-chromosome variation in 99 Kalmyks. Both mtDNA HV1 sequences and Y-chromosome SNP haplogroups indicate a close relationship of Kalmyks with Mongolians. In addition, genetic diversity for both mtDNA an...
متن کاملDevelopment of syllable structure in Azeri-speaking children
Introduction: the length and complexity of syllable structure in the utterances of the children increases with age.Given the important and determining role of syllable in the speech process, performance of developmental studies on syllable acquisition in children are essential. The aim of the present study was to investigate the development and acquisition of syllable structure and the distribu...
متن کاملChinese-speaking adults' understanding of argument structure
Syntactic constructions roughly correspond to sentence meanings. Previous research has shown that Chinese children can associate an SVO construction with a causative event at age 2, but do not always map an SV construction to a noncausative event even after reaching 5 years of age. The latter results may be attributed to the fact that Chinese allows argument-dropping (Jiang & Haryu, 2010). This...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Human Biology
سال: 2001
ISSN: 1534-6617
DOI: 10.1353/hub.2001.0079