Preferred Language
Articles
/
yxccCJABVTCNdQwCGoKt
Mixture model-based association analysis with case-control data in genome wide association studies
...Show More Authors
Abstract<p>Multilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated disease penetrances. A theoretical justification of the above model is provided. Furthermore, we introduce a hypothesis test for haplotype inheritance patterns which underpin this model. The performance of the proposed approach is evaluated by simulations and real data analysis. The results show that the proposed approach outperforms an existing multiple testing method.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Economic Analysis for Construction in Ibn Khalduon s’ Muqaddimah
...Show More Authors

The specialist researcher  fined the relations between economic ideas with economic facts in his theory which called humanity building it is appeared clearly ( in Ibn Khalduons’ Muqaddimah) in a clothe of economic  social  phenomenon's as a systematical analysis in all fifty chapters of al Muqaddimah ,therefore this paper deal with  Ibn Khalduon economic thoughts as important says which describe the society building in its economic subjective  and  examine the relationship between The dissert and the city within economic says which are cover  the social analysis ,and determinate   the analysis objects  which clearly in this dualism  model ,between the state and economic bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Psychological analysis of the drawings of prisoners in the Kurdistan
...Show More Authors

The goal of current research to identify the implications of intellectual and psychological drawings of women in prison in Sulaimaniya province through her paint and collected through cooperation with the creativity of the development organization of women in Sulaimaniya, consisted search of five chapters, the first chapter contains the goals of the research and its problem and its significance in addition to its limits and determine the terminology, while the second chapter included the theoretical framework and the literature on the subject of the search, and in the third quarter where he explained the researchers research methodology and procedures, either in the fourth quarter may offer researchers graphics prisoners and then read th

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Analysis of Adipokines and some Steroid Hormones in Myocardial Infarction
...Show More Authors

The most common cause of death is cardiovascular disease (CVD), with ischemic heart disease being the most notable type.  There is a propensity to raise the sensitivity of methods in contemporary laboratory for diagnosing of CVD, and assessing key as CVD bio-indicators. The urgent task is to seek for different indicators as a hopeful tool for early detection and monitoring of myocardial infarction in blood samples only. This study comprised 117 Volunteers, recorded with both genders in the age range of 32-64 years old. The volunteers were categorized into two groups: 67patients of myocardial infarction, other group embraced 50 healthy individuals. The samples of blood were collected and directed for biochemical analysis to evaluate estr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
5 year-analysis of reported dog bites in Baghdad city
...Show More Authors

Background: Animal bites in humans are an important public health problem. Most of these bites are dog bites. Dog bites in humans are a complex problem embracing public health and animal welfare, both in developed and developing nations. .
Al-kindy Col Med J Vol.8 No.2 2012 P: 151
Objectives: in order to estimate the magnitude of the problem and to understand the epidemiological characteristics of dog bite victims registered in Baghdad city regarding their age, sex, number of registered dog bite victims per month and year along the studied period ( 2006-2010) and also to sniff out any seasonal variation in dog bite attacks .
Methods: A across-sectional study was carried out during January (2011), in the Anti-Rabies clinic of (Pa

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
The Analysis of Errors Made by Iraqi Students in Writing
...Show More Authors

Writing plays an effective role in developing one's thinking and
enhancing Learning. It is, in fact, a means of widening one's own views about
the world for the numerous uses that it can serve (Samuel, 1988:28).
In regard to the unquestionable significance of writing in the teaching –
Learning process, the traditional approach seems to be far from being able to
put such significance into practice. Traditionalists give priority to formulating
students' ideas before using prescribed rhetorical framework and then
submitting the written product for grading. Emphasis is, therefore, limited to the
prewriting stage where a certain topic is explored, and the role of the teacher is
confined to assigning the topic and

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Seismic Analysis of Floating Stone Columns in Soft Clayey Soil
...Show More Authors

The response of floating stone columns of different lengths to diameter ratio (L/D = 0, 2, 4, 6, 8, and 10) ratios exposed to earthquake excitations is well modeled in this paper. Such stone column behavior is essential in the case of lateral displacement under an earthquake through the soft clay soil. ABAQUS software was used to simulate the behavior of stone columns in soft clayey soil using an axisymmetric finite element model. The behavior of stone column material has been modeled with a Drucker-Prager model. The soft soil material was modeled by the Mohr-Coulomb failure criterion assuming an elastic-perfectly plastic behavior. The floating stone columns were subjected to the El Centro earthquake, which had a magnitude of 7.1 an

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Performance Analysis of OLSR Protocol in Mobile Ad Hoc Networks
...Show More Authors

Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the  Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co

... Show More
View Publication Preview PDF
Crossref (30)
Crossref
Publication Date
Thu Jan 26 2017
Journal Name
Separation Science And Technology
Schiff bases and their complexes: Recent progress in thermal analysis
...Show More Authors

Schiff bases are versatile compounds synthesized from the condensation of primary amino compounds with aldehydes or ketones. The high thermal of many Schiff base and their complexes were useful attributes for their application as catalysts in reactions involving at high temperatures. This thermal behavior of Schiff bases and their complexes was evaluated by TGA/DTG and DTA curves with 10 mass losses related to dehydration and decomposition. This review summarizes the developments in the last decade for thermal analysis of Schiff bases. Therefore, synthesis of Schiff bases and their complexes are reviewe

View Publication Preview PDF
Scopus (70)
Crossref (60)
Scopus Clarivate Crossref
Publication Date
Tue Jan 18 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Performance Analysis of OLSR Protocol in Mobile Ad Hoc Networks
...Show More Authors

Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the  Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co

... Show More
Scopus (54)
Crossref (31)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More