منابع مشابه
Genetic traces of ancient demography.
Patterns of gene differences among humans contain information about the demographic history of our species. Haploid loci like mitochondrial DNA and the nonrecombining part of the Y chromosome show a pattern indicating expansion from a population of only several thousand during the late middle or early upper Pleistocene. Nuclear short tandem repeat loci also show evidence of this expansion. Both...
متن کاملGenetic traces of mankind’s migrations
United colours: Some may fear immigration as a novel phenomenon endangering established cultural and ethnic units, but research has shown that humans have always migrated and mixed. A recent global study suggests that more than 94% of individuals have significantly mixed ancestry. The picture shows a scene from the Cowley Road Carnival at Oxford, UK. (Photo: Michael Gross.) Migration is one of ...
متن کاملAncient Traces of Tailless Retropseudogenes in Therian Genomes
Transposable elements, once described by Barbara McClintock as controlling genetic units, not only occupy the largest part of our genome but are also a prominent moving force of genomic plasticity and innovation. They usually replicate and reintegrate into genomes silently, sometimes causing malfunctions or misregulations, but occasionally millions of years later, a few may evolve into new func...
متن کاملGenetic analyses from ancient DNA.
About 20 years ago, DNA sequences were separately described from the quagga (a type of zebra) and an ancient Egyptian individual. What made these DNA sequences exceptional was that they were derived from 140- and 2400-year-old specimens. However, ancient DNA research, defined broadly as the retrieval of DNA sequences from museum specimens, archaeological finds, fossil remains, and other unusual...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the National Academy of Sciences
سال: 1998
ISSN: 0027-8424,1091-6490
DOI: 10.1073/pnas.95.4.1961