Multilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated disease penetrances. A theoretical justification of the above model is provided. Furthermore, we introduce a hypothesis test for haplotype inheritance patterns which underpin this model. The performance of the proposed approach is evaluated by simulations and real data analysis. The results show that the proposed approach outperforms an existing multiple testing method.
The specialist researcher fined the relations between economic ideas with economic facts in his theory which called humanity building it is appeared clearly ( in Ibn Khalduons’ Muqaddimah) in a clothe of economic social phenomenon's as a systematical analysis in all fifty chapters of al Muqaddimah ,therefore this paper deal with Ibn Khalduon economic thoughts as important says which describe the society building in its economic subjective and examine the relationship between The dissert and the city within economic says which are cover the social analysis ,and determinate the analysis objects which clearly in this dualism model ,between the state and economic bas
... Show MoreThe goal of current research to identify the implications of intellectual and psychological drawings of women in prison in Sulaimaniya province through her paint and collected through cooperation with the creativity of the development organization of women in Sulaimaniya, consisted search of five chapters, the first chapter contains the goals of the research and its problem and its significance in addition to its limits and determine the terminology, while the second chapter included the theoretical framework and the literature on the subject of the search, and in the third quarter where he explained the researchers research methodology and procedures, either in the fourth quarter may offer researchers graphics prisoners and then read th
... Show MoreThe most common cause of death is cardiovascular disease (CVD), with ischemic heart disease being the most notable type. There is a propensity to raise the sensitivity of methods in contemporary laboratory for diagnosing of CVD, and assessing key as CVD bio-indicators. The urgent task is to seek for different indicators as a hopeful tool for early detection and monitoring of myocardial infarction in blood samples only. This study comprised 117 Volunteers, recorded with both genders in the age range of 32-64 years old. The volunteers were categorized into two groups: 67patients of myocardial infarction, other group embraced 50 healthy individuals. The samples of blood were collected and directed for biochemical analysis to evaluate estr
... Show MoreBackground: Animal bites in humans are an important public health problem. Most of these bites are dog bites. Dog bites in humans are a complex problem embracing public health and animal welfare, both in developed and developing nations. .
Al-kindy Col Med J Vol.8 No.2 2012 P: 151
Objectives: in order to estimate the magnitude of the problem and to understand the epidemiological characteristics of dog bite victims registered in Baghdad city regarding their age, sex, number of registered dog bite victims per month and year along the studied period ( 2006-2010) and also to sniff out any seasonal variation in dog bite attacks .
Methods: A across-sectional study was carried out during January (2011), in the Anti-Rabies clinic of (Pa
Writing plays an effective role in developing one's thinking and
enhancing Learning. It is, in fact, a means of widening one's own views about
the world for the numerous uses that it can serve (Samuel, 1988:28).
In regard to the unquestionable significance of writing in the teaching –
Learning process, the traditional approach seems to be far from being able to
put such significance into practice. Traditionalists give priority to formulating
students' ideas before using prescribed rhetorical framework and then
submitting the written product for grading. Emphasis is, therefore, limited to the
prewriting stage where a certain topic is explored, and the role of the teacher is
confined to assigning the topic and
The response of floating stone columns of different lengths to diameter ratio (L/D = 0, 2, 4, 6, 8, and 10) ratios exposed to earthquake excitations is well modeled in this paper. Such stone column behavior is essential in the case of lateral displacement under an earthquake through the soft clay soil. ABAQUS software was used to simulate the behavior of stone columns in soft clayey soil using an axisymmetric finite element model. The behavior of stone column material has been modeled with a Drucker-Prager model. The soft soil material was modeled by the Mohr-Coulomb failure criterion assuming an elastic-perfectly plastic behavior. The floating stone columns were subjected to the El Centro earthquake, which had a magnitude of 7.1 an
... Show MoreOptimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreSchiff bases are versatile compounds synthesized from the condensation of primary amino compounds with aldehydes or ketones. The high thermal of many Schiff base and their complexes were useful attributes for their application as catalysts in reactions involving at high temperatures. This thermal behavior of Schiff bases and their complexes was evaluated by TGA/DTG and DTA curves with 10 mass losses related to dehydration and decomposition. This review summarizes the developments in the last decade for thermal analysis of Schiff bases. Therefore, synthesis of Schiff bases and their complexes are reviewe
Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More