Matching Items (25)
141463-Thumbnail Image.png
Description

Five immunocompetent C57BL/6-cBrd/cBrd/Cr (albino C57BL/6) mice were injected with GL261-luc2 cells, a cell line sharing characteristics of human glioblastoma multiforme (GBM). The mice were imaged using magnetic resonance (MR) at five separate time points to characterize growth and development of the tumor. After 25 days, the final tumor volumes of

Five immunocompetent C57BL/6-cBrd/cBrd/Cr (albino C57BL/6) mice were injected with GL261-luc2 cells, a cell line sharing characteristics of human glioblastoma multiforme (GBM). The mice were imaged using magnetic resonance (MR) at five separate time points to characterize growth and development of the tumor. After 25 days, the final tumor volumes of the mice varied from 12 mm3 to 62 mm3, even though mice were inoculated from the same tumor cell line under carefully controlled conditions. We generated hypotheses to explore large variances in final tumor size and tested them with our simple reaction-diffusion model in both a 3-dimensional (3D) finite difference method and a 2-dimensional (2D) level set method. The parameters obtained from a best-fit procedure, designed to yield simulated tumors as close as possible to the observed ones, vary by an order of magnitude between the three mice analyzed in detail. These differences may reflect morphological and biological variability in tumor growth, as well as errors in the mathematical model, perhaps from an oversimplification of the tumor dynamics or nonidentifiability of parameters. Our results generate parameters that match other experimental in vitro and in vivo measurements. Additionally, we calculate wave speed, which matches with other rat and human measurements.

ContributorsRutter, Erica (Author) / Stepien, Tracy (Author) / Anderies, Barrett (Author) / Plasencia, Jonathan (Author) / Woolf, Eric C. (Author) / Scheck, Adrienne C. (Author) / Turner, Gregory H. (Author) / Liu, Qingwei (Author) / Frakes, David (Author) / Kodibagkar, Vikram (Author) / Kuang, Yang (Author) / Preul, Mark C. (Author) / Kostelich, Eric (Author) / College of Liberal Arts and Sciences (Contributor)
Created2017-05-31
168323-Thumbnail Image.png
Description
Transorbital surgery has gained recent notoriety due to its incorporation into endoscopic skull base surgery. The body of published literature on the field is cadaveric and observation. The pre-clinical studies are focused on the use of the endoscope only. Furthermore the methodology utilised in the published literature is inconsistent and

Transorbital surgery has gained recent notoriety due to its incorporation into endoscopic skull base surgery. The body of published literature on the field is cadaveric and observation. The pre-clinical studies are focused on the use of the endoscope only. Furthermore the methodology utilised in the published literature is inconsistent and does not embody the optimal principles of scientific experimentation. This body of work evaluates a minimally invasive novel surgical corridor - the transorbital approach - its validity in neurosurgical practice, as well as both qualitatively and quantitatively assessing available technological advances in a robust experimental fashion. While the endoscope is an established means of visualisation used in clinical transorbital surgery, the microscope has never been assessed with respect to the transorbital approach. This question is investigated here and the anatomical and surgical benefits and limitations of microscopic visualisation demonstrated. The comparative studies provide increased knowledge on specifics pertinent to neurosurgeons and other skull base specialists when planning pre-operatively, such as pathology location, involved anatomical structures, instrument maneuvrability and the advantages and disadvantages of the distinct visualisation technologies. This is all with the intention of selecting the most suitable surgical approach and technology, specific to the patient, pathology and anatomy, so as to perform the best surgical procedure. The research findings illustrated in this body of work are diverse, reproducible and applicable. The transorbital surgical corridor has substantive potential for access to the anterior cranial fossa and specific surgical target structures. The neuroquantitative metrics investigated confirm the utility and benefits specific to the respective visualisation technologies i.e. the endoscope and microscope. The most appropriate setting wherein the approach should be used is also discussed. The transorbital corridor has impressive potential, can utilise all available technological advances, promotes multi-disciplinary co-operation and learning amongst clinicians and ultimately, is a means of improving operative patient care.
ContributorsHoulihan, Lena Mary (Author) / Preul, Mark C. (Thesis advisor) / Vernon, Brent (Thesis advisor) / O' Sullivan, Michael G.J. (Committee member) / Lawton, Michael T. (Committee member) / Santarelli, Griffin (Committee member) / Smith, Brian (Committee member) / Arizona State University (Publisher)
Created2021
187847-Thumbnail Image.png
Description
A description of numerical and analytical work pertaining to models that describe the growth and progression of glioblastoma multiforme (GBM), an aggressive form of primary brain cancer. Two reaction-diffusion models are used: the Fisher-Kolmogorov-Petrovsky-Piskunov equation and a 2-population model that divides the tumor into actively proliferating and quiescent (or necrotic)

A description of numerical and analytical work pertaining to models that describe the growth and progression of glioblastoma multiforme (GBM), an aggressive form of primary brain cancer. Two reaction-diffusion models are used: the Fisher-Kolmogorov-Petrovsky-Piskunov equation and a 2-population model that divides the tumor into actively proliferating and quiescent (or necrotic) cells. The numerical portion of this work (chapter 2) focuses on simulating GBM expansion in patients undergoing treatment for recurrence of tumor following initial surgery. The models are simulated on 3-dimensional brain geometries derived from magnetic resonance imaging (MRI) scans provided by the Barrow Neurological Institute. The study consists of 17 clinical time intervals across 10 patients that have been followed in detail, each of whom shows significant progression of tumor over a period of 1 to 3 months on sequential follow up scans. A Taguchi sampling design is implemented to estimate the variability of the predicted tumors to using 144 different choices of model parameters. In 9 cases, model parameters can be identified such that the simulated tumor contains at least 40 percent of the volume of the observed tumor. In the analytical portion of the paper (chapters 3 and 4), a positively invariant region for our 2-population model is identified. Then, a rigorous derivation of the critical patch size associated with the model is performed. The critical patch (KISS) size is the minimum habitat size needed for a population to survive in a region. Habitats larger than the critical patch size allow a population to persist, while smaller habitats lead to extinction. The critical patch size of the 2-population model is consistent with that of the Fisher-Kolmogorov-Petrovsky-Piskunov equation, one of the first reaction-diffusion models proposed for GBM. The critical patch size may indicate that GBM tumors have a minimum size depending on the location in the brain. A theoretical relationship between the size of a GBM tumor at steady-state and its maximum cell density is also derived, which has potential applications for patient-specific parameter estimation based on magnetic resonance imaging data.
ContributorsHarris, Duane C. (Author) / Kuang, Yang (Thesis advisor) / Kostelich, Eric J. (Thesis advisor) / Preul, Mark C. (Committee member) / Crook, Sharon (Committee member) / Gardner, Carl (Committee member) / Arizona State University (Publisher)
Created2023
129561-Thumbnail Image.png
Description

Extreme events, a type of collective behavior in complex networked dynamical systems, often can have catastrophic consequences. To develop effective strategies to control extreme events is of fundamental importance and practical interest. Utilizing transportation dynamics on complex networks as a prototypical setting, we find that making the network “mobile” can

Extreme events, a type of collective behavior in complex networked dynamical systems, often can have catastrophic consequences. To develop effective strategies to control extreme events is of fundamental importance and practical interest. Utilizing transportation dynamics on complex networks as a prototypical setting, we find that making the network “mobile” can effectively suppress extreme events. A striking, resonance-like phenomenon is uncovered, where an optimal degree of mobility exists for which the probability of extreme events is minimized. We derive an analytic theory to understand the mechanism of control at a detailed and quantitative level, and validate the theory numerically. Implications of our finding to current areas such as cybersecurity are discussed.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2014-08-18
129524-Thumbnail Image.png
Description

The relation between flux and fluctuation is fundamental to complex physical systems that support and transport flows. A recently obtained law predicts monotonous enhancement of fluctuation as the average flux is increased, which in principle is valid but only for large systems. For realistic complex systems of small sizes, this

The relation between flux and fluctuation is fundamental to complex physical systems that support and transport flows. A recently obtained law predicts monotonous enhancement of fluctuation as the average flux is increased, which in principle is valid but only for large systems. For realistic complex systems of small sizes, this law breaks down when both the average flux and fluctuation become large. Here we demonstrate the failure of this law in small systems using real data and model complex networked systems, derive analytically a modified flux-fluctuation law, and validate it through computations of a large number of complex networked systems. Our law is more general in that its predictions agree with numerics and it reduces naturally to the previous law in the limit of large system size, leading to new insights into the flow dynamics in small-size complex systems with significant implications for the statistical and scaling behaviors of small systems, a topic of great recent interest.

ContributorsHuang, Zi-Gang (Author) / Dong, Jia-Qi (Author) / Huang, Liang (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2014-10-27
129477-Thumbnail Image.png
Description

Evolutionary dynamical models for cyclic competitions of three species (e.g., rock, paper, and scissors, or RPS) provide a paradigm, at the microscopic level of individual interactions, to address many issues in coexistence and biodiversity. Real ecosystems often involve competitions among more than three species. By extending the RPS game model

Evolutionary dynamical models for cyclic competitions of three species (e.g., rock, paper, and scissors, or RPS) provide a paradigm, at the microscopic level of individual interactions, to address many issues in coexistence and biodiversity. Real ecosystems often involve competitions among more than three species. By extending the RPS game model to five (rock-paper-scissors-lizard-Spock, or RPSLS) mobile species, we uncover a fundamental type of mesoscopic interactions among subgroups of species. In particular, competitions at the microscopic level lead to the emergence of various local groups in different regions of the space, each involving three species. It is the interactions among the groups that fundamentally determine how many species can coexist. In fact, as the mobility is increased from zero, two transitions can occur: one from a five- to a three-species coexistence state and another from the latter to a uniform, single-species state. We develop a mean-field theory to show that, in order to understand the first transition, group interactions at the mesoscopic scale must be taken into account. Our findings suggest, more broadly, the importance of mesoscopic interactions in coexistence of great many species.

ContributorsCheng, Hongyan (Author) / Yao, Nan (Author) / Huang, Zi-Gang (Author) / Park, Junpyo (Author) / Do, Younghae (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2014-12-15
129347-Thumbnail Image.png
Description

Dynamical systems based on the minority game (MG) have been a paradigm for gaining significant insights into a variety of social and biological behaviors. Recently, a grouping phenomenon has been unveiled in MG systems of multiple resources (strategies) in which the strategies spontaneously break into an even number of groups,

Dynamical systems based on the minority game (MG) have been a paradigm for gaining significant insights into a variety of social and biological behaviors. Recently, a grouping phenomenon has been unveiled in MG systems of multiple resources (strategies) in which the strategies spontaneously break into an even number of groups, each exhibiting an identical oscillation pattern in the attendance of game players. Here we report our finding of spontaneous breakup of resources into three groups, each exhibiting period-three oscillations. An analysis is developed to understand the emergence of the striking phenomenon of triple grouping and period-three oscillations. In the presence of random disturbances, the triple-group/period-three state becomes transient, and we obtain explicit formula for the average transient lifetime using two methods of approximation. Our finding indicates that, period-three oscillation, regarded as one of the most fundamental behaviors in smooth nonlinear dynamical systems, can also occur in much more complex, evolutionary-game dynamical systems. Our result also provides a plausible insight for the occurrence of triple grouping observed, for example, in the U.S. housing market.

ContributorsDong, Jia-Qi (Author) / Huang, Zi-Gang (Author) / Huang, Liang (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2014-12-23
129372-Thumbnail Image.png
Description

Understanding the dynamics of human movements is key to issues of significant current interest such as behavioral prediction, recommendation, and control of epidemic spreading. We collect and analyze big data sets of human movements in both cyberspace (through browsing of websites) and physical space (through mobile towers) and find a

Understanding the dynamics of human movements is key to issues of significant current interest such as behavioral prediction, recommendation, and control of epidemic spreading. We collect and analyze big data sets of human movements in both cyberspace (through browsing of websites) and physical space (through mobile towers) and find a superlinear scaling relation between the mean frequency of visit〈f〉and its fluctuation σ : σ ∼〈f⟩β with β ≈ 1.2. The probability distribution of the visiting frequency is found to be a stretched exponential function. We develop a model incorporating two essential ingredients, preferential return and exploration, and show that these are necessary for generating the scaling relation extracted from real data. A striking finding is that human movements in cyberspace and physical space are strongly correlated, indicating a distinctive behavioral identifying characteristic and implying that the behaviors in one space can be used to predict those in the other.

ContributorsZhao, Zhidan (Author) / Huang, Zi-Gang (Author) / Huang, Liang (Author) / Liu, Huan (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2014-11-12
128558-Thumbnail Image.png
Description

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied

Resource allocation takes place in various types of real-world complex systems such as urban traffic, social services institutions, economical and ecosystems. Mathematically, the dynamical process of resource allocation can be modeled as minority games. Spontaneous evolution of the resource allocation dynamics, however, often leads to a harmful herding behavior accompanied by strong fluctuations in which a large majority of agents crowd temporarily for a few resources, leaving many others unused. Developing effective control methods to suppress and eliminate herding is an important but open problem. Here we develop a pinning control method, that the fluctuations of the system consist of intrinsic and systematic components allows us to design a control scheme with separated control variables. A striking finding is the universal existence of an optimal pinning fraction to minimize the variance of the system, regardless of the pinning patterns and the network topology. We carry out a generally applicable theory to explain the emergence of optimal pinning and to predict the dependence of the optimal pinning fraction on the network topology. Our work represents a general framework to deal with the broader problem of controlling collective dynamics in complex systems with potential applications in social, economical and political systems.

ContributorsZhang, Ji-Qiang (Author) / Huang, Zi-Gang (Author) / Wu, Zhi-Xi (Author) / Su, Riqi (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2016-02-17
Description

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Xu, Shouhuai (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-05-20