We merged raw intensities data (*.idat) files of cases and controls and carried out joint calling, to reduce batch effects. Clustering and genotyping were performed using GenomeStudio software 2011.1 (Illumina, 2011). Quality control procedures were performed, including filtering by call rate, mismatch between observed and reported gender and possible gender abnormalities as described in Wang et al.56 (link), and tri-allelic and ambiguous (AT/CG) SNPs were removed. Overall, a total of 2,015,750 SNPs were used in our downstream analyses.
Genotyping from Bloodspots and Saliva
We merged raw intensities data (*.idat) files of cases and controls and carried out joint calling, to reduce batch effects. Clustering and genotyping were performed using GenomeStudio software 2011.1 (Illumina, 2011). Quality control procedures were performed, including filtering by call rate, mismatch between observed and reported gender and possible gender abnormalities as described in Wang et al.56 (link), and tri-allelic and ambiguous (AT/CG) SNPs were removed. Overall, a total of 2,015,750 SNPs were used in our downstream analyses.
Corresponding Organization :
Other organizations : University of California, San Francisco, Stanford University, Inova Health System, Johns Hopkins University, Cincinnati Children's Hospital Medical Center, Brigham and Women's Hospital
Variable analysis
- Genotyping method (HumanOmni2.5-4 v1 BeadChip)
- Genotypes of study participants
- Genotyping methodology (same HumanOmni2.5-4 v1 BeadChip used for cases and controls)
- Batch effects (merged raw intensities data and performed joint calling)
- Call rate, gender mismatch, and tri-allelic/ambiguous SNPs (quality control procedures)
- Positive control: Not specified
- Negative control: Not specified
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!