Multilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated disease penetrances. A theoretical justification of the above model is provided. Furthermore, we introduce a hypothesis test for haplotype inheritance patterns which underpin this model. The performance of the proposed approach is evaluated by simulations and real data analysis. The results show that the proposed approach outperforms an existing multiple testing method.
Background: Incorporation of chemical additives has long been a technique used to improve properties of the gypsum products. The purpose of this work was to study the effects of adding a combination of gum Arabic and calcium hydroxide to a type III dental stone and type IV improved die stone with different proportion. The effect on water/powder ratio, and surface hardness was determined. Material and method: Both material stone and die stone were blended with two proportion of additives so that each material was mixed twice but with different proportion of gum Arabic (0.1% and 0.2%) and calcium hydroxide (0.5 % and 0.3%). Data for hardness were subjected to two-way analysis of variance. Results: The results revealed that the chemical additi
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThe physicochemical behaviour of dodecyltrimethylammonium bromide (DTAB) in water and ethanol-water mixture in the presence and absence of ZnSO4 were studied by measuring the conductivity at 298.15 K. The pre-micellar (S1) and post-micellar slopes (S2) were obtained and calculated the degree of dissociation (α) and the critical micelle concentration (cmc). With an increase in ethanol content, the cmc and α of DTAB increased whereas, in the presence of ZnSO4, the cmc and α decreased. By using cmc and α, thermodynamic properties as the standard free energy of micellization ( ) were evaluated. With an increase in ethanol content, the negative values of are decreased indicating less spont
... Show MoreDiazotization reaction between 1-(2,4,6-Trihydroxy-phenyl)-ethanone and diazonium salts was carried out resulting in ligand 4-(3-Acetyl-2,4,6-trihydroxy-phenylazo)-N-(5-methyl-isoxazol-3-yl)-benzenesulfonamide, this in turn reacted with the next metal ions (V4+ , Cr3+ , Mn2+ and Cu2+) forming stable complexes with unique geometries such as (Octahedral for both Cr3+ , Mn2+ and Cu2+ ,squar pyramidal for V4+). The creation of such complexes was detected by employing spectroscopic means involving ultraviolet-visible which proved the obtained geometries, fourier transfer proved the formation of azo group and and the coordination with metal ion through it. Pyrolysis (TGA & DSC) studies proved the coordination of water residues with me
... Show MoreNew metal ions complexes of tridentate ligand (1-((dicyclohexylamino) methyl)-3-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrzol-4-ylimino) indolin-2-one) have been synthesized and characterized by chemical-physical analysis. The ligand acts as a tridentate for the complexation reaction with all metal ions. The new complexes, possessing the general formula [M(L)Cl]Cl where M=[Ni(II), Cu(II), Zn(II), Pd(II), Cd(II), Pt(IV) and Hg(II) ] ,show tetrahedral geometry. All complexes ,except Pd(II) complex which has a square planar geometry and Pt(IV) which show an octahedral geometry. The geometry of the prepared compounds has been proposed in another method theoretically by using one of the calculation molecular programs (Hype
... Show More