scholarly journals Detecting Rare Mutations with Heterogeneous Effects Using a Family-Based Genetic Random Field Method

Genetics ◽  
2018 ◽  
Vol 210 (2) ◽  
pp. 463-476 ◽  
Author(s):  
Ming Li ◽  
Zihuai He ◽  
Xiaoran Tong ◽  
John S. Witte ◽  
Qing Lu
2016 ◽  
Vol 40 (4) ◽  
pp. 341-351 ◽  
Author(s):  
Ming Li ◽  
Jingyun Li ◽  
Zihuai He ◽  
Qing Lu ◽  
John S. Witte ◽  
...  

2013 ◽  
Vol 24 (5) ◽  
pp. 1051-1060 ◽  
Author(s):  
Fei CHEN ◽  
Yi-Qun LIU ◽  
Chao WEI ◽  
Yun-Liang ZHANG ◽  
Min ZHANG ◽  
...  

2014 ◽  
Vol 38 (3) ◽  
pp. 242-253 ◽  
Author(s):  
Ming Li ◽  
Zihuai He ◽  
Min Zhang ◽  
Xiaowei Zhan ◽  
Changshuai Wei ◽  
...  

Wear ◽  
1988 ◽  
Vol 127 (1) ◽  
pp. 53-63
Author(s):  
N.K. Myshkin ◽  
N.F. Semeniuk ◽  
G.S. Kalda

Author(s):  
Catherine M. Tangen ◽  
Marian L. Neuhouser ◽  
Janet L. Stanford

Prostate cancer is the most common solid tumor and the second leading cause of cancer-related mortality in American men. Worldwide, prostate cancer ranks second and fifth as a cause of cancer and cancer deaths, respectively. Despite the international burden of disease due to prostate cancer, its etiology is unclear in most cases. Established risk factors include age, race/ancestry, and family history of the disease. Prostate cancer has a strong heritable component, and genome-wide association studies have identified over 110 common risk-associated genetic variants. Family-based sequencing studies have also found rare mutations (e.g., HOXB13) that contribute to prostate cancer susceptibility. Numerous environmental and lifestyle factors (e.g., obesity, diet) have been examined in relation to prostate cancer incidence, but few modifiable exposures have been consistently associated with risk. Some of the variability in results may be related to etiological heterogeneity, with different causes underlying the development of distinct disease subgroups.


Author(s):  
Xingzhi Chang ◽  
Wei Liu ◽  
Chuan Zhu ◽  
Xiaohua Zou ◽  
Guan Gui

Existing block-level defect detection method in patterned fabric causes a large number of false detections due to the lack of edge information. To solve this problem, in this paper, we propose a bilayer Markov random field (BMRF) method for inspecting defects in patterned fabric. First, the proposed method reduces samples of the original fabric image to obtain the constraint layer, which can locate the defective block roughly. Second, we interpolate samples into the image to supplement the local information to improve and optimize the imperfect boundary, to obtain a more detailed data layer. Moreover, this paper proposes a new potential function, which considers the differential characteristics of the image blocks in the same layer and the transition probability between different layers. Finally, this paper utilizes a parameter estimation method based on the expectation maximization to solve the parameters of the BMRF method. The proposed BMRF method is evaluated on databases of star-, box- and dot-patterned fabrics. By comparing the resultant and ground-truth images, the recall rate of the proposed method in the three patterned fabrics is 95.32%, 89.29% and 93.28%, respectively, which is comparable to the existing methods.


Author(s):  
Zhangli Hu ◽  
Xiaoping Du

In many engineering applications, both random and interval variables exist. Some of the random variables may also vary over time. As a result, the reliability of a component not only decreases with time but also resides in an interval. Evaluating the time-dependent reliability bounds is a challenging task because of the intensive computational demand. This research develops a method that treats a time-dependent random response as a random field with respect to both intervals and time. Consequently, random field methodologies can be used to estimate the worse-case time-dependent reliability. The method employs the first-order reliability method, which results in a Gaussian random field for the response with respect to intervals and time. The Kriging method and Monte Carlo simulation are then used to estimate the worse-case reliability without calling the original limit-state function. Good efficiency and accuracy are demonstrated through examples.


Sign in / Sign up

Export Citation Format

Share Document