Preferred Language
Articles
/
yRcXCJABVTCNdQwCVoIV
Search for risk haplotype segments with GWAS data by use of finite mixture models
...Show More Authors

The region-based association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease. Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls. To tackle the problem of the sparse distribution, a two-stage approach was proposed in literature: In the first stage, haplotypes are computationally inferred from genotypes, followed by a haplotype coclassification. In the second stage, the association analysis is performed on the inferred haplotype groups. If a haplotype is unevenly distributed between the case and control samples, this haplotype is labeled as a risk haplotype. Unfortunately, the in-silico reconstruction of haplotypes might produce a proportion of false haplotypes which hamper the detection of rare but true haplotypes. Here, to address the issue, we propose an alternative approach: In Stage 1, we cluster genotypes instead of inferred haplotypes and estimate the risk genotypes based on a finite mixture model. In Stage 2, we infer risk haplotypes from risk genotypes inferred from the previous stage. To estimate the finite mixture model, we propose an EM algorithm with a novel data partition-based initialization. The performance of the proposed procedure is assessed by simulation studies and a real data analysis. Compared to the existing multiple Z-test procedure, we find that the power of genome-wide association studies can be increased by using the proposed procedure.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 24 2021
Journal Name
Indonesian Journal Of Chemistry
Molecular Imprinted of Nylon 6 for Selective Separation of Procaine by Solid-Phase Extraction
...Show More Authors

The study is based on the selective binding ability of the drug compound procaine (PRO) on a surface imprinted with nylon 6 (N6) polymer. Physical characterization of the polymer template was performed by X-ray diffraction and DSC thermal analysis. The imprinted polymer showed a high adsorption capacity to trap procaine (237 µg/g) and excellent recognition ability with an imprinted factor equal to 3.2. The method was applied to an extraction column simulating a solid-phase extraction to separate the drug compound in the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate more than the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate of more t

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
The Optimum Conditions for Production of Soya Peptone by Acidic Hydrolysis of Soya Proteins
...Show More Authors

     This study was carried out to obtain the optimum conditions necessary for the process of soya protein hydrolysis by using hydrochloric acid (as a chemical catalyst) instead of the papain enzyme (as a biological catalyst), for the production of soya peptone. These conditions are implemented to test the effect of the variables of the process of hydrolysis on the nature and quality of the product.

        The production of soya peptone was studied for their importance in the process of preparing and producing the culture media used in medical and microbiological laboratories.

      The process of production of soya peptone includes four main

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The use of water resources in light of the challenges of water security in Iraq
...Show More Authors

Iraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall.  This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Advanced Pharmaceutical Technology & Research
Use of factorial design in formulation and evaluation of intrarectal in situ gel of sumatriptan
...Show More Authors

View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Constructed Wetland Units Filled with Waterworks Sludge for Remediating of Wastewater Contaminated with Congo Red Dye
...Show More Authors

The disposal of textile effluents to the surface water bodies represents the critical issue especially these effluents can have negative impacts on such bodies due to the presence of dyes in their composition. Biological remediation methods like constructed wetlands are more cost-effective and environmental friendly technique in comparison with traditional methods. The ability of vertical subsurface flow constructed wetlands units for treating of simulated wastewater polluted with Congo red dye has been studied in this work. The units were packed with waterworks sludge bed that either be unplanted or planted with Phragmites australis and Typha domingensis. The efficacy of present units was evaluated by monitoring of DO, Temperature, COD

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Performance evaluation of policies and programs accordance with guide prepared by a dutch court of audit and the board of supreme audit (case study in wasit state company for textile industries)
...Show More Authors

Abstract\

preparation process of performance evaluation in organizations is of extreme importance, and under development in organizations and the opening of markets and technological developments in the industry and heightened competition among industrial organizations imposed systems are built for performance give a clear picture about performance and competition,  And centered research problem in answering the following questions: Is performance evaluation system is available in Wasit State Company for Textile Industries(Research sample ), This research aims to assess the performance of policies and programs in the company, according to guide performance evaluation of programs and policies prepared by the Dutch Cou

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Geological Journal
Structural Interpretation of Yamama and Naokelekan Formations in Tuba Oil Field Using 2D Seismic Data
...Show More Authors

This research includes structure interpretation of the Yamama Formation (Lower Cretaceous) and the Naokelekan Formation (Jurassic) using 2D seismic reflection data of the Tuba oil field region, Basrah, southern Iraq. The two reflectors (Yamama and Naokelekan) were defined and picked as peak and tough depending on the 2D seismic reflection interpretation process, based on the synthetic seismogram and well log data. In order to obtain structural settings, these horizons were followed over all the regions. Two-way travel-time maps, depth maps, and velocity maps have been produced for top Yamama and top Naokelekan formations. The study concluded that certain longitudinal enclosures reflect anticlines in the east and west of the study ar

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Proceedings Of The 5th International Conference On Information Systems Security And Privacy
Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Data In Brief
Chemical and structural data of (1, 2, 3-triazol-4-yl) pyridine-containing coordination compounds
...Show More Authors

The data presented in this paper are related to the research article entitled “Novel dichloro(bis{2-[1-(4-methylphenyl)-1H-1,2,3-triazol-4-yl-κN3 ]pyridine-κN})metal(II) coordination compounds of seven transition metals (Mn, Fe, Co, Ni, Cu, Zn and Cd)” (Conradie et al., 2018) [1]. This paper presents characterization and structural data of the 2-(1-(4-methyl-phenyl)-1H-1,2,3-triazol-1-yl)pyridine ligand (L2 ) (Tawfiq et al., 2014) [2] as well as seven dichloro(bis{2- [1-(4-methylphenyl)-1H-1,2,3-triazol-4-yl-κN3 ]pyridine-κN})metal (II) coordination compounds, [M(L2 )2Cl2], all containing the same ligand but coordinated to different metal ions. The data illustrate the shift in IR, UV/VIS, and NMR (for diamagnetic complexes) peaks wh

... Show More
Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref