Exploring case–control genetic association tests using phase diagrams
نویسندگان
چکیده
منابع مشابه
Exploring case-control genetic association tests using phase diagrams
BACKGROUND By a new concept called "phase diagram", we compare two commonly used genotype-based tests for case-control genetic analysis, one is a Cochran-Armitage trend test (CAT test at x=0.5, or CAT0.5) and another (called MAX2) is the maximization of two Chi-square test results: one from the two-by-two genotype count table that combines the baseline homozygotes and heterozygotes, and another...
متن کاملTests for genetic association using family data.
We use likelihood-based score statistics to test for association between a disease and a diallelic polymorphism, based on data from arbitrary types of nuclear families. The Nonfounder statistic extends the transmission disequilibrium test (TDT) to accommodate affected and unaffected offspring, missing parental genotypes, phenotypes more general than qualitative traits, such as censored survival...
متن کاملEntropy based genetic association tests and gene-gene interaction tests.
In the past few years, several entropy-based tests have been proposed for testing either single SNP association or gene-gene interaction. These tests are mainly based on Shannon entropy and have higher statistical power when compared to standard χ2 tests. In this paper, we extend some of these tests using a more generalized entropy definition, Rényi entropy, where Shannon entropy is a special c...
متن کاملDetecting Genetic Association in Case-control Studies Using Similarity-based Association Tests
Although traditional case-control studies may be subject to bias caused by population stratification, alternative methods that are robust to population stratification such as family-based association designs may be less powerful due to overmatching between cases and controls. Furthermore, case-control studies have the advantages of easy sample collection. Recently, several statistical methods h...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computational Biology and Chemistry
سال: 2008
ISSN: 1476-9271
DOI: 10.1016/j.compbiolchem.2008.07.025