-
Personalised Drug Identifier for Cancer Treatment with Transformers using Auxiliary Information
Authors:
Aishwarya Jayagopal,
Hansheng Xue,
Ziyang He,
Robert J. Walsh,
Krishna Kumar Hariprasannan,
David Shao Peng Tan,
Tuan Zea Tan,
Jason J. Pitt,
Anand D. Jeyasekharan,
Vaibhav Rajan
Abstract:
Cancer remains a global challenge due to its growing clinical and economic burden. Its uniquely personal manifestation, which makes treatment difficult, has fuelled the quest for personalized treatment strategies. Thus, genomic profiling is increasingly becoming part of clinical diagnostic panels. Effective use of such panels requires accurate drug response prediction (DRP) models, which are chall…
▽ More
Cancer remains a global challenge due to its growing clinical and economic burden. Its uniquely personal manifestation, which makes treatment difficult, has fuelled the quest for personalized treatment strategies. Thus, genomic profiling is increasingly becoming part of clinical diagnostic panels. Effective use of such panels requires accurate drug response prediction (DRP) models, which are challenging to build due to limited labelled patient data. Previous methods to address this problem have used various forms of transfer learning. However, they do not explicitly model the variable length sequential structure of the list of mutations in such diagnostic panels. Further, they do not utilize auxiliary information (like patient survival) for model training. We address these limitations through a novel transformer based method, which surpasses the performance of state-of-the-art DRP models on benchmark data. We also present the design of a treatment recommendation system (TRS), which is currently deployed at the National University Hospital, Singapore and is being evaluated in a clinical trial.
△ Less
Submitted 16 February, 2024;
originally announced February 2024.
-
Can justice be fair when it is blind? How social network structures can promote or prevent the evolution of despotism
Authors:
Cedric Perret,
Simon T. Powers,
Jeremy Pitt,
Emma Hart
Abstract:
Hierarchy is an efficient way for a group to organize, but often goes along with inequality that benefits leaders. To control despotic behaviour, followers can assess leaders decisions by aggregating their own and their neighbours experience, and in response challenge despotic leaders. But in hierarchical social networks, this interactional justice can be limited by (i) the high influence of a sma…
▽ More
Hierarchy is an efficient way for a group to organize, but often goes along with inequality that benefits leaders. To control despotic behaviour, followers can assess leaders decisions by aggregating their own and their neighbours experience, and in response challenge despotic leaders. But in hierarchical social networks, this interactional justice can be limited by (i) the high influence of a small clique who are treated better, and (ii) the low connectedness of followers. Here we study how the connectedness of a social network affects the co-evolution of despotism in leaders and tolerance to despotism in followers. We simulate the evolution of a population of agents, where the influence of an agent is its number of social links. Whether a leader remains in power is controlled by the overall satisfaction of group members, as determined by their joint assessment of the leaders behaviour. We demonstrate that centralization of a social network around a highly influential clique greatly increases the level of despotism. This is because the clique is more satisfied, and their higher influence spreads their positive opinion of the leader throughout the network. Finally, our results suggest that increasing the connectedness of followers limits despotism while maintaining hierarchy.
△ Less
Submitted 28 June, 2018;
originally announced June 2018.
-
Statistical Detection of Potentially Fabricated Data
Authors:
Joel H Pitt,
Helene Z Hill
Abstract:
Scientific fraud is an increasingly vexing problem. Many current programs for fraud detection focus on image manipulation, while techniques for detection based on anomalous patterns that may be discoverable in the underlying numerical data get much less attention, even though these techniques are often easy to apply. We employed three such techniques in a case study in which we considered data set…
▽ More
Scientific fraud is an increasingly vexing problem. Many current programs for fraud detection focus on image manipulation, while techniques for detection based on anomalous patterns that may be discoverable in the underlying numerical data get much less attention, even though these techniques are often easy to apply. We employed three such techniques in a case study in which we considered data sets from several hundred experiments. We compared patterns in the data sets from one research teaching specialist (RTS), to those of 9 other members of the same laboratory and from 3 outside laboratories. Application of two conventional statistical tests and a newly developed test for anomalous patterns in the triplicate data commonly produced in such research to various data sets reported by the RTS resulted in repeated rejection of the hypotheses (often at p-levels well below 0.001) that anomalous patterns in his data may have occurred by chance. This analysis emphasizes the importance of access to raw data that form the bases of publications, reports and grant applications in order to evaluate the correctness of the conclusions, as well as the utility of methods for detecting anomalous, especially fabricated, numerical results.
△ Less
Submitted 21 November, 2013;
originally announced November 2013.