Protecting Patient Privacy in Genomic Analysis
|
|
- Lambert Baker
- 5 years ago
- Views:
Transcription
1 Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh
2 Rare Disease Diagnosis What gene causes a specific (rare) disease? Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes
3 Gene Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] ABG ZZZ3 Each patient has a vector v where v i = if patient has a rare variant in gene i Patients with Kabuki Syndrome Goal: Identify gene with most variants across all patients Each patient has a list of 2-4 rare variants over 2, genes
4 Gene Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] ABG ZZZ3 Each patient has a vector v where v i = if patient has a rare variant in gene i Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Goal: Identify gene with most variants across all patients Works well for Mendelian (monogenic) diseases (estimated to affect % of individuals)
5 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Trusted Party Patients often in geographically-diverse locations Question: Can we perform this computation without seeing complete patient genomes?
6 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] r x r Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Patients secret share their data with two non-colluding hospitals
7 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] MPC Protocol Hospitals run a multiparty computation (MPC) protocol on pooled inputs Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Patients secret share their data with two non-colluding hospitals
8 Rare Disease Diagnosis MPC Protocol Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Top variants (sorted): KMT2D, COL6A, FLNB Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Known cause of disease
9 Rare Disease Diagnosis MPC Protocol Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Top variants (sorted): KMT2D, COL6A, FLNB Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Other variants that the patients possess are kept hidden
10 Gene Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] General techniques apply to many different scenarios for diagnosing Mendelian diseases ABG ZZZ3 Identify patients with the same rare functional mutation at two different hospitals Patients with Kabuki Syndrome Identify causal gene for a rare disease given a small patient cohort Identify rare functional variants that are present in the child but in neither of the parents
11 Gene Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] General techniques apply to many different scenarios for diagnosing Mendelian diseases ABG ZZZ3 Simple Identify frequency-based patients with the algorithms, same but rare techniques functional mutation enabled at two us different to discover hospitals a previously unidentified pathogenic variant Patients with Kabuki Syndrome Identify causal gene for a rare disease given a small patient cohort Identify rare functional variants that are present in the child but in neither of the parents
12 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Experimental benchmarks for identifying causal gene in small disease cohort Simulated two non-colluding entities with server on East Coast and on West Coast 3.7 s 62.2 MB 5.8 s 72.7 MB 9.6 s 4. MB 5 Number of Patients End-to-End Time Communication
13 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Experimental benchmarks for identifying causal gene in small disease cohort Simulated two non-colluding entities with server on East Coast and on West Coast 3.7 s 62.2 MB 5.8 s 72.7 MB 9.6 s 4. MB 5 Number of Patients End-to-End Time Communication For many rare disease diagnosis scenarios, disease cohort size can be very small (e.g., 5- patients)
14 Secure Genome Computation MPC Protocol Modern cryptographic tools enable useful computations while protecting the privacy of individual genomes
15 Secure Genome Computation MPC Protocol Techniques apply to general computations over private data Modern cryptographic tools enable useful computations while protecting the privacy of individual genomes
16 Yao s Protocol for Two-Party Computation
17 Yao s Protocol for Two-Party Computation [Yao82] Private inputs Security guarantee: everything the parties learn can be inferred from the output and their individual inputs Classic protocol for two-party computation
18 Yao s Protocol for Two-Party Computation [Yao82] Private inputs Party garbler Party 2 evaluator Party Party 2 Party Party 2 Step : Model computation as a Boolean circuit AND AND NAND Output
19 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 Party AND Each key is associated with a possible wire value NAND Output Party 2 AND Garbler chooses two different encryption keys for every wire in the circuit
20 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 AND Idea: Encrypt the output key (for the output wire) with the two input keys (for the input wires) Inputs Party Party 2 Output Garbler constructs a garbled truth table for each gate in the circuit
21 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Inputs Party Party 2 Output Garbler constructs a garbled truth table for each gate in the circuit
22 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Key for party s input Key for party 2 s input Key for output wire Inputs Party Party 2 Output Garbler constructs a garbled truth table for each gate in the circuit
23 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Inputs Party Party 2 Output () Enc k, Enc 2 (out) k, k () Enc k, Enc 2 (out) k, k Enc k (), Enc k 2, k (out) Garbler constructs a garbled truth table for each gate in the circuit
24 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Enc k (), Enc k 2, k (out) Garbled truth table randomly permuted Enc k (), Enc k 2, k (out) Enc k (), Enc k 2, k (out) Garbler constructs a garbled truth table for each gate in the circuit
25 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Enc k (), Enc k 2, k (out) Garbled truth table randomly permuted Enc k (), Enc k 2, k (out) Enc k (), Enc k 2, k (out) Invariant: Given just a single key for each input wire, evaluator can learn a single key for the output wire 2 k k Garbler constructs a garbled truth table for each gate in the circuit
26 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Garbled truth table randomly permuted Invariant: Given just a single key for each input wire, evaluator can learn a single key for the output wire k k 2
27 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Garbled truth table randomly permuted k out Invariant: Given just a single key for each input wire, evaluator can learn a single key for the output wire k out is just a symmetric key does not reveal what the output bit is k k 2
28 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 Party AND NAND Party 2 AND Invariant: Given just a single key for each input wire and a garbled table, evaluator can learn a single key for the output wire
29 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 Party Party 2 AND AND NAND Invariant: Given just a single key for each input wire and a garbled table, evaluator can learn a single key for the output wire
30 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 Party Party 2 AND AND NAND Include decoding table to map output keys to output values Invariant: Given just a single key for each input wire and a garbled table, evaluator can learn a single key for the output wire
31 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) garbled tables keys for Party s inputs garbler evaluator Question: how does evaluator obtain keys for its input? Garbler can send garbled truth tables and keys for its inputs
32 Yao s Protocol for Two-Party Computation [Yao82] Step 3: Evaluator uses oblivious transfer to obtain keys for its input For each wire corresponding to evaluator s input, the garbler has two keys For each input wire, evaluator wants to obtain key corresponding to its input value garbler 2-round protocol evaluator At the end of the oblivious transfer protocol, garbler learns nothing about which key evaluator obtains, and evaluator learns exactly one of the two keys
33 Yao s Protocol for Two-Party Computation [Yao82] Two-round protocol for secure two-party communication OT message for keys corresponding to input wires Keys communicated using OT (garbler does not know which keys are transmitted) garbler evaluator Many improvements are possible to achieve better performance Evaluator uses keys to evaluate circuit gate-by-gate
34 Yao s Protocol for Two-Party Computation [Yao82] Two-round protocol for secure two-party communication OT message for keys corresponding to input wires Keys communicated using OT (garbler does not know which keys are transmitted) garbler evaluator Many improvements are possible to achieve better performance Protocol is very efficient; communication is the bottleneck
35 Gene The Story So Far Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] General techniques apply to many different scenarios for diagnosing Mendelian diseases ABG ZZZ3 Patients with Kabuki Syndrome Simple frequency-based filters are useful for rare Identify causal gene for a rare disease given a small patient cohort Identify patients with the same rare functional mutation at two different hospitals disease diagnosis and can be efficiently evaluated in a privacy-preserving manner Identify rare functional variants that are present in the child but in neither of the parents
36 But What About More Complex Diseases? Cho-W-Berger [Nature Biotechnology 28] Control group (healthy) Genome-wide association studies (GWAS): Identify genetic variants most correlated with a particular disease (or particular phenotype) Oftentimes, focused on identifying complex interactions between many variants Case group (affected)
37 But What About More Complex Diseases? Each patient has a vector of SNPs (variations in specific locations in genome 3 types) Disease status Cho-W-Berger [Nature Biotechnology 28] Goal: identify SNPs that are most correlated with disease status Healthy individuals Patients with lung cancer
38 But What About More Complex Diseases? Each patient has a vector of SNPs (variations in specific locations in genome 3 types) Disease status Cho-W-Berger [Nature Biotechnology 28] Goal: identify SNPs that are most correlated with disease status Healthy individuals Patients with lung cancer Unlike Mendelian diseases, we are looking for many associations (e.g., several hundred)
39 But What About More Complex Diseases? 5, SNPs Disease status Cho-W-Berger [Nature Biotechnology 28] , individuals Healthy individuals Patients with lung cancer
40 But What About More Complex Diseases? 5, SNPs Disease status Cho-W-Berger [Nature Biotechnology 28] , individuals Challenge: in real GWAS studies, we need to correct for populationlevel differences between groups
41 Arithmetic Computations on Shared Data GWAS computations most naturally expressed as arithmetic computations (e.g., matrix operations) Party Party 2 Party Party 2 AND AND NAND Output Recall: to apply Yao s protocol, must first represent computation as a Boolean circuit Can introduce significant overhead for arithmetic computations!
42 Arithmetic Computations on Shared Data r x r Patients secret share their data with two non-colluding hospitals Approach: directly compute on secret-shared data
43 Arithmetic Computations on Shared Data r r 2 v r v 2 r v v 2 v 2 v 2 2 All operations done over a ring (Z p ) v v v + v 2 = v 3 - v 2 + v 2 2 = v 2
44 Arithmetic Computations on Shared Data r r 2 Observation: each party v r v 2 r can locally compute on their shares to obtain a share of the sum 2-7 v v 2 v 2 v v v 2 v + v 2 = v + v 2 v 2 + v 2 2 = v + v
45 Arithmetic Computations on Shared Data r r 2 Observation: each party v r v 2 r can locally compute on their shares to obtain a share of the sum 2-7 v v 2 v 2 v For computing products on shared values (e.g., matrix-vector products, inner products, etc.), we can use a single-round interactive protocol [Bea9] v v 2 v + v 2 = v + v 2 v 2 + v 2 2 = v + v
46 What About More Complex Diseases? Cho-W-Berger [Nature Biotechnology 28] MPC Protocol Approach: directly compute on secret-shared data This work: first end-to-end GWAS protocol (with population correction) Based on computing on secretshared inputs For 25K individuals, computation completes in about 3 days: feasible for performing large-scale scientific studies
47 Secure Genome Computation MPC Protocol Modern cryptographic tools enable useful computations while protecting the privacy of individual genomes
48 Secure Genome Computation Many other techniques (with different tradeoffs): Homomorphic encryption (computing on encrypted data) [Zhang et al., 25; Lauter et al., 25, ] Differential privacy (adding noise to protect privacy) [Simmons et al., 26; Simmons-Berger, 26, ] Intel SGX (leveraging secure hardware) [Chen et al., 27; Wang et al., 26; Chen et al., 26, ] [ Not an exhaustive list! ] Modern cryptographic tools enable useful computations while protecting the privacy of individual genomes
49 Secure Genome Computation MPC Protocol Project Website: Thank you!
Protecting Patient Privacy in Genomic Analysis
Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh
More informationConstraining Pseudorandom Functions Privately
Constraining Pseudorandom Functions Privately David Wu Stanford University Joint work with Dan Boneh and Kevin Lewi Pseudorandom Functions (PRFs) [GGM84] : Pseudorandom Funs, Random, Constrained PRFs [BW13,
More informationConstrained Keys for Invertible Pseudorandom Functions. Dan Boneh, Sam Kim, and David J. Wu Stanford University
Constrained Keys for Invertible Pseudorandom Functions Dan Boneh, Sam Kim, and David J. Wu Stanford University Pseudorandom Functions (PRFs) [GGM84] k R K Pseudorandom f R Funs[X, Y] Random F: K X Y x
More informationFriendFinder: A Privacy Aware Grid Based Location Service
FriendFinder: A Privacy Aware Grid Based Location Service Ove Andersen Laurynas Siksnys Jeppe R. Thomsen Aalborg University Department of Computer Science Selma Lagerløfs Vej 300, DK-9220 Aalborg Ø Denmark
More informationSecure Grouping and Aggregation with MapReduce
1/27 Secure Grouping and Aggregation with MapReduce Radu Ciucanu Matthieu Giraud Pascal Lafourcade Lihua Ye 28 July 2018 SECRYPT, Porto 2/27 Example of Grouping and Aggregation Name Department Salary Alice
More informationReview Questions in Introductory Knowledge... 37
Table of Contents Preface..... 17 About the Authors... 19 How This Book is Organized... 20 Who Should Buy This Book?... 20 Where to Find Answers to Review Questions and Exercises... 20 How to Report Errata...
More informationSupplementary Figure 1
Supplementary Figure 1 An example of the gene-term-disease network automatically generated by Phenolyzer web server for 'autism'. The largest word represents the user s input term, Autism. The pink round
More informationCS2220 Introduction to Computational Biology
CS2220 Introduction to Computational Biology WEEK 8: GENOME-WIDE ASSOCIATION STUDIES (GWAS) 1 Dr. Mengling FENG Institute for Infocomm Research Massachusetts Institute of Technology mfeng@mit.edu PLANS
More informationSparse Coding in Sparse Winner Networks
Sparse Coding in Sparse Winner Networks Janusz A. Starzyk 1, Yinyin Liu 1, David Vogel 2 1 School of Electrical Engineering & Computer Science Ohio University, Athens, OH 45701 {starzyk, yliu}@bobcat.ent.ohiou.edu
More informationTIMELY: RTT-based Congestion Control for the Datacenter
TIMELY: RTT-based Congestion Control for the Datacenter Radhika Mittal*(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi*(Microsoft), Amin Vahdat, Yaogong Wang, David
More informationTIMELY: RTT-based Congestion Control for the Datacenter
TIMELY: RTT-based Congestion Control for the Datacenter Authors: Radhika Mittal(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi(Microsoft), Amin Vahdat, Yaogong
More informationChapter 3 Software Packages to Install How to Set Up Python Eclipse How to Set Up Eclipse... 42
Table of Contents Preface..... 21 About the Authors... 23 Acknowledgments... 24 How This Book is Organized... 24 Who Should Buy This Book?... 24 Where to Find Answers to Review Questions and Exercises...
More informationECE 2300 Digital Logic & Computer Organization
ECE 23 Digital Logic & Computer Organization Spring 27 Combinational Logic Minimization Lecture 3: Announcements Lab 2 is on CMS Tutorial B: CAD tool installation HW will be released tonight Rescheduled
More informationRolls,E.T. (2016) Cerebral Cortex: Principles of Operation. Oxford University Press.
Digital Signal Processing and the Brain Is the brain a digital signal processor? Digital vs continuous signals Digital signals involve streams of binary encoded numbers The brain uses digital, all or none,
More informationIdentifying the Zygosity Status of Twins Using Bayes Network and Estimation- Maximization Methodology
Identifying the Zygosity Status of Twins Using Bayes Network and Estimation- Maximization Methodology Yicun Ni (ID#: 9064804041), Jin Ruan (ID#: 9070059457), Ying Zhang (ID#: 9070063723) Abstract As the
More informationAssignment Question Paper I
Subject : - Discrete Mathematics Maximum Marks : 30 1. Define Harmonic Mean (H.M.) of two given numbers relation between A.M.,G.M. &H.M.? 2. How we can represent the set & notation, define types of sets?
More informationBGI Cognitive Genomics Lab: Informed Consent to Participate in GWAS
BGI Cognitive Genomics Lab: Informed Consent to Participate in GWAS Please read this document carefully before deciding whether to participate in this study. What Am I Agreeing To? By participating in
More informationThe Knapsack Problem
Spring 2010 Chris Christensen HNR 304 The Knapsack Problem In 1978, Merkel and Hellman published a public-key encryption system based upon the knapsack problem ("Hiding information and signatures in trapdoor
More informationInternational Journal of Research in Science and Technology. (IJRST) 2018, Vol. No. 8, Issue No. IV, Oct-Dec e-issn: , p-issn: X
CLOUD FILE SHARING AND DATA SECURITY THREATS EXPLORING THE EMPLOYABILITY OF GRAPH-BASED UNSUPERVISED LEARNING IN DETECTING AND SAFEGUARDING CLOUD FILES Harshit Yadav Student, Bal Bharati Public School,
More informationChapter 8 Multioperand Addition
Chapter 8 Multioperand Addition Using Two-Operand Adders Carry-Save Adders Wallace and Dadda Trees Parallel Counters Generalized Parallel Counters Adding Multiple Signed Numbers Ch 8. Multioperand Addition
More informationLarge-scale identity-by-descent mapping discovers rare haplotypes of large effect. Suyash Shringarpure 23andMe, Inc. ASHG 2017
Large-scale identity-by-descent mapping discovers rare haplotypes of large effect Suyash Shringarpure 23andMe, Inc. ASHG 2017 1 Why care about rare variants of large effect? Months from randomization 2
More informationBigomics : Challenges and promises in large scale sequencing projects
Bigomics : Challenges and promises in large scale sequencing projects Theodore M. Wong Ken Yocum MSST 2014 2010 Illumina, Inc. All rights reserved. Illumina, illuminadx, Solexa, Making Sense Out of Life,
More informationStephan Kleber, Rens W. van der Heijden, Henning Kopp, Frank Kargl Terrorist Fraud resistance of DBPs employing PUFs
Stephan Kleber, Rens W. van der Heijden, Henning Kopp, Frank Kargl 12.03.2015 Terrorist Fraud resistance of DBPs employing PUFs NetSys 2015 2 Terrorist Fraud resistance of DBPs employing PUFs S. Kleber,
More informationNew Enhancements: GWAS Workflows with SVS
New Enhancements: GWAS Workflows with SVS August 9 th, 2017 Gabe Rudy VP Product & Engineering 20 most promising Biotech Technology Providers Top 10 Analytics Solution Providers Hype Cycle for Life sciences
More informationECE 2300 Digital Logic & Computer Organization
ECE 23 Digital Logic & Computer Organization Spring 28 Combinational Logic Minimization Lecture 3: Announcements Lab 2 is on CMS Tutorial B: CAD tool installation HW will be released tonight Rescheduled
More informationReleasing SNP Data and GWAS Results with Guaranteed Privacy Protection
integrating Data for Analysis, Anonymization, and SHaring Releasing SNP Data and GWAS Results with Guaranteed Privacy Protection Xiaoqian Jiang, PhD and Shuang Wang, PhD Overview Introduction idash healthcare
More informationBig Data Anonymisation Techniques
Big Data Anonymisation Techniues BIG DATA is Useful Analysis and publication of large datasets are essential to research and business Very useful to: predict flu improve transportation, Logistic improve
More informationUNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014
UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014 Exam policy: This exam allows two one-page, two-sided cheat sheets (i.e. 4 sides); No other materials. Time: 2 hours. Be sure to write
More informationLesson 6 Learning II Anders Lyhne Christensen, D6.05, INTRODUCTION TO AUTONOMOUS MOBILE ROBOTS
Lesson 6 Learning II Anders Lyhne Christensen, D6.05, anders.christensen@iscte.pt INTRODUCTION TO AUTONOMOUS MOBILE ROBOTS First: Quick Background in Neural Nets Some of earliest work in neural networks
More informationWhite Paper Estimating Complex Phenotype Prevalence Using Predictive Models
White Paper 23-12 Estimating Complex Phenotype Prevalence Using Predictive Models Authors: Nicholas A. Furlotte Aaron Kleinman Robin Smith David Hinds Created: September 25 th, 2015 September 25th, 2015
More informationPrevious Example. New. Tradition
Experimental Design Previous Example New Tradition Goal? New Tradition =? Challenges Internal validity How to guarantee what you have observed is true? External validity How to guarantee what you have
More informationHaplotype allelic classes in the lactase persistence locus
Haplotype allelic classes in the lactase persistence locus Robert Cedergren Colloquium november 3 rd 28 Julie Hussin 1,2, Philippe Nadeau 1,2, Jean-François Lefebvre 2 and Damian Labuda 1-3 1 Bioinformatics
More informationIntroduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018
Introduction to Machine Learning Katherine Heller Deep Learning Summer School 2018 Outline Kinds of machine learning Linear regression Regularization Bayesian methods Logistic Regression Why we do this
More informationRobotic Dancing: Exploring Agents that use a Stratified Perceive- Decide-Act Cycle of Interaction
Robotic Dancing: Exploring Agents that use a Stratified Perceive- Decide-Act Cycle of Interaction James Benze and Jennifer Seitzer Department of Computer Science University of Dayton, Dayton, OH 45469-2160
More informationTADA: Analyzing De Novo, Transmission and Case-Control Sequencing Data
TADA: Analyzing De Novo, Transmission and Case-Control Sequencing Data Each person inherits mutations from parents, some of which may predispose the person to certain diseases. Meanwhile, new mutations
More informationAND BIOMEDICAL SYSTEMS Rahul Sarpeshkar
ULTRA-LOW-POWER LOW BIO-INSPIRED INSPIRED AND BIOMEDICAL SYSTEMS Rahul Sarpeshkar Research Lab of Electronics Massachusetts Institute of Technology Electrical Engineering and Computer Science FOE Talk
More informationSupport for Cognitive Science Experiments
Support for Cognitive Science Experiments CogSketch as Research Instrument Corpus of stimuli for people Corpus of formally represented stimuli Cognitive Simulation Compare results on variety of tasks Gathering
More informationRare Variant Burden Tests. Biostatistics 666
Rare Variant Burden Tests Biostatistics 666 Last Lecture Analysis of Short Read Sequence Data Low pass sequencing approaches Modeling haplotype sharing between individuals allows accurate variant calls
More informationPreparing More Effective Liquid State Machines Using Hebbian Learning
2006 International Joint Conference on Neural Networks Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-21, 2006 Preparing More Effective Liquid State Machines Using Hebbian Learning
More informationAn Artificial Neural Network Architecture Based on Context Transformations in Cortical Minicolumns
An Artificial Neural Network Architecture Based on Context Transformations in Cortical Minicolumns 1. Introduction Vasily Morzhakov, Alexey Redozubov morzhakovva@gmail.com, galdrd@gmail.com Abstract Cortical
More informationBST227 Introduction to Statistical Genetics. Lecture 4: Introduction to linkage and association analysis
BST227 Introduction to Statistical Genetics Lecture 4: Introduction to linkage and association analysis 1 Housekeeping Homework #1 due today Homework #2 posted (due Monday) Lab at 5:30PM today (FXB G13)
More informationThe Foundations of Personalized Medicine
The Foundations of Personalized Medicine Jeremy M. Berg Pittsburgh Foundation Professor and Director, Institute for Personalized Medicine University of Pittsburgh Personalized Medicine Physicians have
More informationHHS Public Access Author manuscript Hum Mutat. Author manuscript; available in PMC 2016 April 16.
GeneMatcher: A Matching Tool for Connecting Investigators with an Interest in the Same Gene Nara Sobreira 1,*, François Schiettecatte 2, David Valle 1, and Ada Hamosh 1 1 Institute of Genetic Medicine,
More informationAgents and Environments
Agents and Environments Berlin Chen 2004 Reference: 1. S. Russell and P. Norvig. Artificial Intelligence: A Modern Approach. Chapter 2 AI 2004 Berlin Chen 1 What is an Agent An agent interacts with its
More informationEXIT Chart. Prof. Francis C.M. Lau. Department of Electronic and Information Engineering Hong Kong Polytechnic University
EXIT Chart Prof. Francis C.M. Lau Department of Electronic and Information Engineering Hong Kong Polytechnic University EXIT Chart EXtrinsic Information Transfer (EXIT) Chart Use for the analysis of iterative
More informationTest Equipment Depot Washington Street Melrose, MA TestEquipmentDepot.com
Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 TestEquipmentDepot.com Table of Contents Table of Contents... iii Preface... viii Getting Started... 9 0.1 Breadboard... 9 0.2
More informationProfile-cast: Behavior-Aware Mobile Networking
Profile-cast: Behavior-Aware Mobile etworking Wei-jen Hsu, Dept. of CISE, U of Florida Debojyoti Dutta, Cisco Sytems, Inc. Ahmed Helmy, Dept. of CISE, U of Florida 6/10/2008 Presentation for WCC, 2008
More informationCoded Code-Division Multiple Access (CDMA) The combination of forward error control (FEC) coding with code-division multiple-access (CDMA).
Coded Code-Division Multiple Access (CDMA) The combination of forward error control (FEC) coding with code-division multiple-access (CDMA). Optimal Processing: Maximum Likehood (ML) decoding applied to
More informationWhat is the inheritance pattern (e.g., autosomal, sex-linked, dominant, recessive, etc.)?
Module I: Introduction to the disease Give a brief introduction to the disease, considering the following: the symptoms that define the syndrome, the range of phenotypes exhibited by individuals with the
More informationSUPPLEMENTARY INFORMATION
doi:1.138/nature1216 Supplementary Methods M.1 Definition and properties of dimensionality Consider an experiment with a discrete set of c different experimental conditions, corresponding to all distinct
More informationThe Color Consensus Mechanism Beige Paper: Color Prism
The Color Consensus Mechanism Beige Paper: Color Prism Version 0.9-1 November 24, 2018 The Color Platform Team 1.0 Purpose The purpose of this paper is to explain the Color Consensus Mechanism at length
More informationThe Simulacrum. What is it, how is it created, how does it work? Michael Eden on behalf of Sally Vernon & Cong Chen NAACCR 21 st June 2017
The Simulacrum What is it, how is it created, how does it work? Michael Eden on behalf of Sally Vernon & Cong Chen NAACCR 21 st June 2017 sally.vernon@phe.gov.uk & cong.chen@phe.gov.uk 1 Overview What
More informationA resource for doctors. An opportunity for patients.
A resource for doctors. An opportunity for patients. A way for experts to work together to provide the best treatment for patients around the world. Our understanding of cancer is constantly growing, making
More informationCopy Number Variations and Association Mapping Advanced Topics in Computa8onal Genomics
Copy Number Variations and Association Mapping 02-715 Advanced Topics in Computa8onal Genomics SNP and CNV Genotyping SNP genotyping assumes two copy numbers at each locus (i.e., no CNVs) CNV genotyping
More informationLaboratory. Mendelian Genetics
Laboratory 9 Mendelian Genetics Biology 171L FA17 Lab 9: Mendelian Genetics Student Learning Outcomes 1. Predict the phenotypic and genotypic ratios of a monohybrid cross. 2. Determine whether a gene is
More informationDeep Learning for Computer Vision
Deep Learning for Computer Vision Lecture 12: Time Sequence Data, Recurrent Neural Networks (RNNs), Long Short-Term Memories (s), and Image Captioning Peter Belhumeur Computer Science Columbia University
More informationThe storage and recall of memories in the hippocampo-cortical system. Supplementary material. Edmund T Rolls
The storage and recall of memories in the hippocampo-cortical system Supplementary material Edmund T Rolls Oxford Centre for Computational Neuroscience, Oxford, England and University of Warwick, Department
More informationLearning and Adaptive Behavior, Part II
Learning and Adaptive Behavior, Part II April 12, 2007 The man who sets out to carry a cat by its tail learns something that will always be useful and which will never grow dim or doubtful. -- Mark Twain
More informationExtended Abstract prepared for the Integrating Genetics in the Social Sciences Meeting 2014
Understanding the role of social and economic factors in GCTA heritability estimates David H Rehkopf, Stanford University School of Medicine, Division of General Medical Disciplines 1265 Welch Road, MSOB
More informationDATE 2006 Session 5B: Timing and Noise Analysis
DATE 2006 Session 5B: Timing and Noise Analysis Bus Stuttering : An Encoding Technique To Reduce Inductive Noise In Off-Chip Data Transmission Authors: Brock J. LaMeres, Agilent Technologies Sunil P. Khatri,
More informationComparison of Gene Set Analysis with Various Score Transformations to Test the Significance of Sets of Genes
Comparison of Gene Set Analysis with Various Score Transformations to Test the Significance of Sets of Genes Ivan Arreola and Dr. David Han Department of Management of Science and Statistics, University
More informationSNJB College of Engineering Department of Computer Engineering
1. Intel s programmable device (8253) facilitates the generation of accurate time delays. a) counter b) timer c) both a & b d) none of these 2. The programmable timer device (8253) contains three independent
More informationSupplementary Methods
Supplementary Methods Short Read Preprocessing Reads are preprocessed differently according to how they will be used: detection of the variant in the tumor, discovery of an artifact in the normal or for
More informationMicrophone Input LED Display T-shirt
Microphone Input LED Display T-shirt Team 50 John Ryan Hamilton and Anthony Dust ECE 445 Project Proposal Spring 2017 TA: Yuchen He 1 Introduction 1.2 Objective According to the World Health Organization,
More informationIntroduction to linkage and family based designs to study the genetic epidemiology of complex traits. Harold Snieder
Introduction to linkage and family based designs to study the genetic epidemiology of complex traits Harold Snieder Overview of presentation Designs: population vs. family based Mendelian vs. complex diseases/traits
More informationIRB USE ONLY Approval Date: September 10, 2013 Expiration Date: September 10, 2014
Approval : September 10, 2013 Expiration : September 10, 2014 DESCRIPTION: The goal of Assisted Reproductive Technology (ART) is to help infertile couples to become pregnant. During treatment, some cellular
More informationMultiplex target enrichment using DNA indexing for ultra-high throughput variant detection
Multiplex target enrichment using DNA indexing for ultra-high throughput variant detection Dr Elaine Kenny Neuropsychiatric Genetics Research Group Institute of Molecular Medicine Trinity College Dublin
More informationPrinciples of phylogenetic analysis
Principles of phylogenetic analysis Arne Holst-Jensen, NVI, Norway. Fusarium course, Ås, Norway, June 22 nd 2008 Distance based methods Compare C OTUs and characters X A + D = Pairwise: A and B; X characters
More informationBST227: Introduction to Statistical Genetics
BST227: Introduction to Statistical Genetics Lecture 11: Heritability from summary statistics & epigenetic enrichments Guest Lecturer: Caleb Lareau Success of GWAS EBI Human GWAS Catalog As of this morning
More informationNature Methods: doi: /nmeth.3115
Supplementary Figure 1 Analysis of DNA methylation in a cancer cohort based on Infinium 450K data. RnBeads was used to rediscover a clinically distinct subgroup of glioblastoma patients characterized by
More informationDeep Learning Analytics for Predicting Prognosis of Acute Myeloid Leukemia with Cytogenetics, Age, and Mutations
Deep Learning Analytics for Predicting Prognosis of Acute Myeloid Leukemia with Cytogenetics, Age, and Mutations Andy Nguyen, M.D., M.S. Medical Director, Hematopathology, Hematology and Coagulation Laboratory,
More informationGolden Helix s End-to-End Solution for Clinical Labs
Golden Helix s End-to-End Solution for Clinical Labs Steven Hystad - Field Application Scientist Nathan Fortier Senior Software Engineer 20 most promising Biotech Technology Providers Top 10 Analytics
More informationPredicting Breast Cancer Survival Using Treatment and Patient Factors
Predicting Breast Cancer Survival Using Treatment and Patient Factors William Chen wchen808@stanford.edu Henry Wang hwang9@stanford.edu 1. Introduction Breast cancer is the leading type of cancer in women
More informationDetection of copy number variations in PCR-enriched targeted sequencing data
Detection of copy number variations in PCR-enriched targeted sequencing data German Demidov Parseq Lab, Saint-Petersburg University of Russian Academy of Sciences, current: Center for Genomic Regulation
More informationQuantifying location privacy
Sébastien Gambs Quantifying location privacy 1 Quantifying location privacy Sébastien Gambs Université de Rennes 1 - INRIA sgambs@irisa.fr 10 September 2013 Sébastien Gambs Quantifying location privacy
More informationChapter 1. Introduction
Chapter 1 Introduction Artificial neural networks are mathematical inventions inspired by observations made in the study of biological systems, though loosely based on the actual biology. An artificial
More informationApproximate ML Detection Based on MMSE for MIMO Systems
PIERS ONLINE, VOL. 3, NO. 4, 2007 475 Approximate ML Detection Based on MMSE for MIMO Systems Fan Wang 1, Yong Xiong 2, and Xiumei Yang 2 1 The Electromagnetics Academy at Zhejiang University, Zhejiang
More informationEdge Detection Techniques Based On Soft Computing
International Journal for Science and Emerging ISSN No. (Online):2250-3641 Technologies with Latest Trends 7(1): 21-25 (2013) ISSN No. (Print): 2277-8136 Edge Detection Techniques Based On Soft Computing
More informationCustomer case study Genome-wide variation Impact of Human Variation on Disease. Sample to Insight
Customer case study Genome-wide variation Impact of Human Variation on Disease Sample to Insight Rajini Haraksingh aims for a broad understanding of the complexities of human variation. Along the way,
More informationSeeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma. February 04, Tao Chen. Sining Wang.
Seeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma February 04, 2019 Tao Chen Wan Wang Sining Wang Lei Chen University of Waterloo University of Waterloo
More informationOne slide on research question Literature review: structured; holes you will fill in Your research design
Topics Ahead Week 10-11: Experimental design; Running experiment Week 12: Survey Design; ANOVA Week 13: Correlation and Regression; Non Parametric Statistics Week 14: Computational Methods; Simulation;
More informationEvaluating Classifiers for Disease Gene Discovery
Evaluating Classifiers for Disease Gene Discovery Kino Coursey Lon Turnbull khc0021@unt.edu lt0013@unt.edu Abstract Identification of genes involved in human hereditary disease is an important bioinfomatics
More informationCOMP9444 Neural Networks and Deep Learning 5. Convolutional Networks
COMP9444 Neural Networks and Deep Learning 5. Convolutional Networks Textbook, Sections 6.2.2, 6.3, 7.9, 7.11-7.13, 9.1-9.5 COMP9444 17s2 Convolutional Networks 1 Outline Geometry of Hidden Unit Activations
More informationGenetics and Genomics in Medicine Chapter 8 Questions
Genetics and Genomics in Medicine Chapter 8 Questions Linkage Analysis Question Question 8.1 Affected members of the pedigree above have an autosomal dominant disorder, and cytogenetic analyses using conventional
More informationEstimation of Breast Density and Feature Extraction of Mammographic Images
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 11 April 2016 ISSN (online): 2349-6010 Estimation of Breast Density and Feature Extraction of Mammographic Images
More informationCurrent Directions in Mediation Analysis David P. MacKinnon 1 and Amanda J. Fairchild 2
CURRENT DIRECTIONS IN PSYCHOLOGICAL SCIENCE Current Directions in Mediation Analysis David P. MacKinnon 1 and Amanda J. Fairchild 2 1 Arizona State University and 2 University of South Carolina ABSTRACT
More informationA New Approach For an Improved Multiple Brain Lesion Segmentation
A New Approach For an Improved Multiple Brain Lesion Segmentation Prof. Shanthi Mahesh 1, Karthik Bharadwaj N 2, Suhas A Bhyratae 3, Karthik Raju V 4, Karthik M N 5 Department of ISE, Atria Institute of
More informationHost Genomics of HIV-1
4 th International Workshop on HIV & Aging Host Genomics of HIV-1 Paul McLaren École Polytechnique Fédérale de Lausanne - EPFL Lausanne, Switzerland paul.mclaren@epfl.ch Complex trait genetics Phenotypic
More informationInternational Journal of Scientific & Engineering Research Volume 4, Issue 2, February ISSN THINKING CIRCUIT
International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 THINKING CIRCUIT Mr.Mukesh Raju Bangar Intern at Govt. Dental College and hospital, Nagpur Email: Mukeshbangar008@gmail.com
More informationSouth Asian Journal of Engineering and Technology Vol.3, No.9 (2017) 17 22
South Asian Journal of Engineering and Technology Vol.3, No.9 (07) 7 Detection of malignant and benign Tumors by ANN Classification Method K. Gandhimathi, Abirami.K, Nandhini.B Idhaya Engineering College
More informationLyme Disease and Tick Surveillance in British Columbia
Lyme Disease and Tick Surveillance in British Columbia Muhammad Morshed, PhD, SCCM Program Head, Zoonotic Diseases & Emerging Pathogens BCCDC Public Health Microbiology and Reference Laboratory Provincial
More informationMultichannel Classification of Single EEG Trials with Independent Component Analysis
In J. Wang et a]. (Eds.), Advances in Neural Networks-ISNN 2006, Part 111: 54 1-547. Berlin: Springer. Multichannel Classification of Single EEG Trials with Independent Component Analysis Dik Kin Wong,
More informationSummary of presentation
The use of HIV-1 gene sequence data to detect ARV drug resistance mutations and RegaDB database. Tulio de Oliveira Africa Centre for Health and Population Studies, Nelson R Mandela School of Medicine,
More informationHighly Accurate Brain Stroke Diagnostic System and Generative Lesion Model. Junghwan Cho, Ph.D. CAIDE Systems, Inc. Deep Learning R&D Team
Highly Accurate Brain Stroke Diagnostic System and Generative Lesion Model Junghwan Cho, Ph.D. CAIDE Systems, Inc. Deep Learning R&D Team Established in September, 2016 at 110 Canal st. Lowell, MA 01852,
More informationResearch Methods in Forest Sciences: Learning Diary. Yoko Lu December Research process
Research Methods in Forest Sciences: Learning Diary Yoko Lu 285122 9 December 2016 1. Research process It is important to pursue and apply knowledge and understand the world under both natural and social
More information38 Int'l Conf. Bioinformatics and Computational Biology BIOCOMP'16
38 Int'l Conf. Bioinformatics and Computational Biology BIOCOMP'16 PGAR: ASD Candidate Gene Prioritization System Using Expression Patterns Steven Cogill and Liangjiang Wang Department of Genetics and
More informationarxiv: v4 [cs.cr] 21 Aug 2018
LOGAN: Membership Inference Attacks Against Generative Models Jamie Hayes, Luca Melis, George Danezis, and Emiliano De Cristofaro University College London {j.hayes, l.melis, g.danezis, e.decristofaro}@cs.ucl.ac.uk
More informationIN SILICO EVALUATION OF DNA-POOLED ALLELOTYPING VERSUS INDIVIDUAL GENOTYPING FOR GENOME-WIDE ASSOCIATION STUDIES OF COMPLEX DISEASE.
IN SILICO EVALUATION OF DNA-POOLED ALLELOTYPING VERSUS INDIVIDUAL GENOTYPING FOR GENOME-WIDE ASSOCIATION STUDIES OF COMPLEX DISEASE By Siddharth Pratap Thesis Submitted to the Faculty of the Graduate School
More informationUsing the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview
Using the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview Millions of people. Strong collaborations. Privacy first. Jeffrey Brown,
More informationERA: Architectures for Inference
ERA: Architectures for Inference Dan Hammerstrom Electrical And Computer Engineering 7/28/09 1 Intelligent Computing In spite of the transistor bounty of Moore s law, there is a large class of problems
More information