Explaining clinical decisions by extracting regularity patterns

نویسندگان

  • Concha Bielza
  • Juan A. Fernández del Pozo
  • Peter J. F. Lucas
چکیده

When solving clinical decision-making problems with modern graphical decision-theoretic models such as influence diagrams, we obtain decision tables with optimal decision alternatives describing the best course of action for a given patient or group of patients. For real-life clinical problems, these tables are often extremely large. This is an obstacle to understand their content. KBM2L lists are structures that minimize memory storage requirements for these tables, and, at the same time, improve their knowledge organization. The resulting improved knowledge organization can be interpreted as explanations of the decision-table content. In this paper, we explore the use of KBM2L lists in analyzing and explaining optimal treatment selection in patients with non-Hodgkin lymphoma of the stomach using an expert-designed influence diagram as an experimental vehicle. The selection of the appropriate treatment for non-Hodgkin lymphoma of the stomach is, as for many other types of cancer, difficult, mainly because of the uncertainties involved in the decision-making process. In this paper we look at an expert-designed clinical influence diagram as a representation of a body of clinical knowledge. This diagram can be analyzed and explained using KBM2L lists. It is shown that the resulting lists provide high-level explanations of optimal treatments for the disease. These explanations are useful for finding relationships between groups of variables and treatments. It is demonstrated that these lists can act as a basis for gaining a deeper understanding of the underlying clinical problem. © 2007 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Choosing fast and slow: explaining differences between hedonic and utilitarian choices

This paper examines the psychological differences between hedonic and utilitarian patterns of preference behavior. Instead of using latent variables like self-control and emotion to explain these differences, we show that they emerge as natural consequences of solving two different, but related problems within an inductive framework of preference learning. We show that hedonic decisions involve...

متن کامل

Explaining Courage in Ethical Decision-making by Nursing Managers: A Qualitative Content Analysis

Introduction: Ethical decision-making by nursing managers is influenced by various essential factors, such as courage, without which it is impossible to act on them. Objective: This study aimed to explore the experiences of nursing managers about courage in ethical decision-making. Materials and Methods: The current study was conducted in Iran by a qualitative content analysis approach in 201...

متن کامل

Possibility of Extracting Rules That Govern Behavior and Decisions of OPEC Member Countries Using the GMDH Method

OPEC acts as a crude oil balancing producer and is an important player in the global energy equations. It is therefore important for us to identify the norms that govern OPEC’s behavior in different time periods. Understanding these norms will help us to explain and forecast the future decisions of this influential organization on the crude market. We use information about 20 factors that impac...

متن کامل

Optimal algorithms regularity in images for extracting spatial

Kahng, A.B. and G. Robins, Optimal algorithms for extracting spatial regularity in images, Pattern Recognition Letters 12 (1991) 757-764. Finding spatial regularity in images is important in military applications (e.g., finding rows of landmines), texture analysis, and other areas. We give an optimal ®(n 2) algorithm for finding all maximal equally-spaced cnllinear subsets within a pointset in ...

متن کامل

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Decision Support Systems

دوره 44  شماره 

صفحات  -

تاریخ انتشار 2008