Multilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated disease penetrances. A theoretical justification of the above model is provided. Furthermore, we introduce a hypothesis test for haplotype inheritance patterns which underpin this model. The performance of the proposed approach is evaluated by simulations and real data analysis. The results show that the proposed approach outperforms an existing multiple testing method.
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on
... Show MoreThe search aims to clarify pollution to negative effects on environment and to an increasing in the dangerous polluted materials that discharged out these factories. To make active procedures in order to limit the environmental pollution.
The search problem came from an assumption which has the researched factory is suffering from the lack of applying the international specification ( ISO 14004 ). The research problem assimilated by these questions:
- What is the level or organization in thinking of environmental system according to ISO 14004 .
- What are the requirements used in researched factor
ABSTRACT Background: Generally, the facial esthetics depends on the esthetic appearance of the maxillary anterior teeth. The purposes of this study were to analyse the macro-aesthetic appearance of the face and the micro-aesthetic appearance of the maxillary anterior teeth to establish the normative values for class I normal occlusion and to detect possible gender differences. Materials and methods: The sample consisted of 120 Iraqi adults (60 males and 60 females) aged (18-23) years. Each individual was clinically examined, then with cephalostat based head position, extraoral and intraoral photographs were taken for each subject. The facial and dental measurements were measured using AutoCad program 2014. Descriptive statistics was obtaine
... Show MoreBackground: Rheumatoid arthritis (RA) is a chronic and systemic autoimmune disease that is characterized by severe synovial inflammation, cartilage erosion, bone loss, and generalized vasculopathy. Although the immunologic mechanism of RA is still unclear, it is now thought to be a primarily Th17-driven disease. Along with other factors, IL-23 stimulates the expansion of Th17 cells from naive CD4+ T cells.
Objective: The objective of this study is to assess the circulating levels of interleukin (IL)-23 in rheumatoid arthritis (RA) and determine the correlation between plasma/serum IL-23 levels and disease activity. So, we performed a systematic review with meta-analysis comparing
... Show MoreBackground Obstructing dentinal tubules is a valuable approach for managing dentin hypersensitivity. Although various agents promote dentin remineralization, direct comparisons between theobromine, bioactive glass (BAG), and nano-hydroxyapatite (Nano-HAP) under simulated oral conditions remain limited. To fill this gap, this in vitro study aimed to evaluate and compare the effectiveness of these three treatments on exposed cervical dentin. The assessment focused on their chemical, morphological, and mechanical effects on dentin. Materials and methods Forty-eight human dentin slabs were obtained from the cervical portions of twelve sound premolar teeth. Baseline Raman spectroscopy and VMH tests were done to exclude outliers. All specimens we
... Show MoreSelf control is the perception of the individual of his duty at, the capacity of self testing in systematic durations and the ability of individuate to control his behavior, The control will be spontaneous when the individual will have a special ideas about the correct or incorrect behavior and choosing his way according it.
The present study airs at:
1- building and measuring self control and balancing among means among university students according to gender and specialization.
To achieve the above mention aim, the two researchers built a scale of self control depending on some theories and applying it on a sample consists of (400) male and female students in Baghdad university studying in scientific and human fields. The two
The research aims to prepare a report by the external auditor (Federal Office of Financial Supervision) for the control environment it is includes financial control, commitment and performance of the North Oil Company (extractive) according to the causes of pollution. The research problem it is not the Federal Office of Financial Supervision preparation a report on the things the environment include the prevent or reduction failure the administration of the causes of the pollution caused by oil mining industry by both bad planning or operational or related to efficient human resources as well as of technology to use and resulting from non-compliance local laws and instructions, as well as the inefficiency of spending on environme
... Show MoreThis paper presents the motion programming and control of omni-directional mobile robot through the process of building and programming a small robotic platform with secondary design criteria of modularity and simplified control. This is accomplished by combining the positive aspects of several different robotics platform ideas. The platform is shaped like an equilateral triangle with a servo motor, sensors, and omni-wheel, controlled by a PIC microcontroller.
In this work the kinematics, inverse kinematics and dynamic module for the platform is derived. Two search algorithms (the wall-following search and the “most-open-area” search) is designed, tested, and analyzed experimentally.