Protecting Patient Privacy in Genomic Analysis

Size: px
Start display at page:

Download "Protecting Patient Privacy in Genomic Analysis"

Transcription

1 Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh

2 Rare Disease Diagnosis What gene causes a specific (rare) disease? Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes

3 Gene Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] ABG ZZZ3 Each patient has a vector v where v i = if patient has a rare variant in gene i Patients with Kabuki Syndrome Goal: Identify gene with most variants across all patients Each patient has a list of 2-4 rare variants over 2, genes

4 Gene Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] ABG ZZZ3 Each patient has a vector v where v i = if patient has a rare variant in gene i Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Goal: Identify gene with most variants across all patients Works well for Mendelian (monogenic) diseases (estimated to affect % of individuals)

5 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Trusted Party Patients often in geographically-diverse locations Question: Can we perform this computation without seeing complete patient genomes?

6 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] r x r Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Patients secret share their data with two non-colluding hospitals

7 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] MPC Protocol Hospitals run a multiparty computation (MPC) protocol on pooled inputs Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Patients secret share their data with two non-colluding hospitals

8 Rare Disease Diagnosis MPC Protocol Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Top variants (sorted): KMT2D, COL6A, FLNB Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Known cause of disease

9 Rare Disease Diagnosis MPC Protocol Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Top variants (sorted): KMT2D, COL6A, FLNB Patients with Kabuki Syndrome Each patient has a list of 2-4 rare variants over 2, genes Other variants that the patients possess are kept hidden

10 Gene Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] General techniques apply to many different scenarios for diagnosing Mendelian diseases ABG ZZZ3 Identify patients with the same rare functional mutation at two different hospitals Patients with Kabuki Syndrome Identify causal gene for a rare disease given a small patient cohort Identify rare functional variants that are present in the child but in neither of the parents

11 Gene Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] General techniques apply to many different scenarios for diagnosing Mendelian diseases ABG ZZZ3 Simple Identify frequency-based patients with the algorithms, same but rare techniques functional mutation enabled at two us different to discover hospitals a previously unidentified pathogenic variant Patients with Kabuki Syndrome Identify causal gene for a rare disease given a small patient cohort Identify rare functional variants that are present in the child but in neither of the parents

12 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Experimental benchmarks for identifying causal gene in small disease cohort Simulated two non-colluding entities with server on East Coast and on West Coast 3.7 s 62.2 MB 5.8 s 72.7 MB 9.6 s 4. MB 5 Number of Patients End-to-End Time Communication

13 Rare Disease Diagnosis Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] Experimental benchmarks for identifying causal gene in small disease cohort Simulated two non-colluding entities with server on East Coast and on West Coast 3.7 s 62.2 MB 5.8 s 72.7 MB 9.6 s 4. MB 5 Number of Patients End-to-End Time Communication For many rare disease diagnosis scenarios, disease cohort size can be very small (e.g., 5- patients)

14 Secure Genome Computation MPC Protocol Modern cryptographic tools enable useful computations while protecting the privacy of individual genomes

15 Secure Genome Computation MPC Protocol Techniques apply to general computations over private data Modern cryptographic tools enable useful computations while protecting the privacy of individual genomes

16 Yao s Protocol for Two-Party Computation

17 Yao s Protocol for Two-Party Computation [Yao82] Private inputs Security guarantee: everything the parties learn can be inferred from the output and their individual inputs Classic protocol for two-party computation

18 Yao s Protocol for Two-Party Computation [Yao82] Private inputs Party garbler Party 2 evaluator Party Party 2 Party Party 2 Step : Model computation as a Boolean circuit AND AND NAND Output

19 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 Party AND Each key is associated with a possible wire value NAND Output Party 2 AND Garbler chooses two different encryption keys for every wire in the circuit

20 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 AND Idea: Encrypt the output key (for the output wire) with the two input keys (for the input wires) Inputs Party Party 2 Output Garbler constructs a garbled truth table for each gate in the circuit

21 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Inputs Party Party 2 Output Garbler constructs a garbled truth table for each gate in the circuit

22 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Key for party s input Key for party 2 s input Key for output wire Inputs Party Party 2 Output Garbler constructs a garbled truth table for each gate in the circuit

23 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Inputs Party Party 2 Output () Enc k, Enc 2 (out) k, k () Enc k, Enc 2 (out) k, k Enc k (), Enc k 2, k (out) Garbler constructs a garbled truth table for each gate in the circuit

24 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Enc k (), Enc k 2, k (out) Garbled truth table randomly permuted Enc k (), Enc k 2, k (out) Enc k (), Enc k 2, k (out) Garbler constructs a garbled truth table for each gate in the circuit

25 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Enc k (), Enc k 2, k (out) Garbled truth table randomly permuted Enc k (), Enc k 2, k (out) Enc k (), Enc k 2, k (out) Invariant: Given just a single key for each input wire, evaluator can learn a single key for the output wire 2 k k Garbler constructs a garbled truth table for each gate in the circuit

26 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Garbled truth table randomly permuted Invariant: Given just a single key for each input wire, evaluator can learn a single key for the output wire k k 2

27 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Enc k (), Enc k 2, k (out) Garbled truth table randomly permuted k out Invariant: Given just a single key for each input wire, evaluator can learn a single key for the output wire k out is just a symmetric key does not reveal what the output bit is k k 2

28 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 Party AND NAND Party 2 AND Invariant: Given just a single key for each input wire and a garbled table, evaluator can learn a single key for the output wire

29 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 Party Party 2 AND AND NAND Invariant: Given just a single key for each input wire and a garbled table, evaluator can learn a single key for the output wire

30 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) Party Party 2 Party Party 2 AND AND NAND Include decoding table to map output keys to output values Invariant: Given just a single key for each input wire and a garbled table, evaluator can learn a single key for the output wire

31 Yao s Protocol for Two-Party Computation [Yao82] Step 2: Garbler encrypts the circuit (i.e., garbles the circuit) garbled tables keys for Party s inputs garbler evaluator Question: how does evaluator obtain keys for its input? Garbler can send garbled truth tables and keys for its inputs

32 Yao s Protocol for Two-Party Computation [Yao82] Step 3: Evaluator uses oblivious transfer to obtain keys for its input For each wire corresponding to evaluator s input, the garbler has two keys For each input wire, evaluator wants to obtain key corresponding to its input value garbler 2-round protocol evaluator At the end of the oblivious transfer protocol, garbler learns nothing about which key evaluator obtains, and evaluator learns exactly one of the two keys

33 Yao s Protocol for Two-Party Computation [Yao82] Two-round protocol for secure two-party communication OT message for keys corresponding to input wires Keys communicated using OT (garbler does not know which keys are transmitted) garbler evaluator Many improvements are possible to achieve better performance Evaluator uses keys to evaluate circuit gate-by-gate

34 Yao s Protocol for Two-Party Computation [Yao82] Two-round protocol for secure two-party communication OT message for keys corresponding to input wires Keys communicated using OT (garbler does not know which keys are transmitted) garbler evaluator Many improvements are possible to achieve better performance Protocol is very efficient; communication is the bottleneck

35 Gene The Story So Far Jagadeesh-W-Birgmeier-Boneh-Bejerano [Science 27] General techniques apply to many different scenarios for diagnosing Mendelian diseases ABG ZZZ3 Patients with Kabuki Syndrome Simple frequency-based filters are useful for rare Identify causal gene for a rare disease given a small patient cohort Identify patients with the same rare functional mutation at two different hospitals disease diagnosis and can be efficiently evaluated in a privacy-preserving manner Identify rare functional variants that are present in the child but in neither of the parents

36 But What About More Complex Diseases? Cho-W-Berger [Nature Biotechnology 28] Control group (healthy) Genome-wide association studies (GWAS): Identify genetic variants most correlated with a particular disease (or particular phenotype) Oftentimes, focused on identifying complex interactions between many variants Case group (affected)

37 But What About More Complex Diseases? Each patient has a vector of SNPs (variations in specific locations in genome 3 types) Disease status Cho-W-Berger [Nature Biotechnology 28] Goal: identify SNPs that are most correlated with disease status Healthy individuals Patients with lung cancer

38 But What About More Complex Diseases? Each patient has a vector of SNPs (variations in specific locations in genome 3 types) Disease status Cho-W-Berger [Nature Biotechnology 28] Goal: identify SNPs that are most correlated with disease status Healthy individuals Patients with lung cancer Unlike Mendelian diseases, we are looking for many associations (e.g., several hundred)

39 But What About More Complex Diseases? 5, SNPs Disease status Cho-W-Berger [Nature Biotechnology 28] , individuals Healthy individuals Patients with lung cancer

40 But What About More Complex Diseases? 5, SNPs Disease status Cho-W-Berger [Nature Biotechnology 28] , individuals Challenge: in real GWAS studies, we need to correct for populationlevel differences between groups

41 Arithmetic Computations on Shared Data GWAS computations most naturally expressed as arithmetic computations (e.g., matrix operations) Party Party 2 Party Party 2 AND AND NAND Output Recall: to apply Yao s protocol, must first represent computation as a Boolean circuit Can introduce significant overhead for arithmetic computations!

42 Arithmetic Computations on Shared Data r x r Patients secret share their data with two non-colluding hospitals Approach: directly compute on secret-shared data

43 Arithmetic Computations on Shared Data r r 2 v r v 2 r v v 2 v 2 v 2 2 All operations done over a ring (Z p ) v v v + v 2 = v 3 - v 2 + v 2 2 = v 2

44 Arithmetic Computations on Shared Data r r 2 Observation: each party v r v 2 r can locally compute on their shares to obtain a share of the sum 2-7 v v 2 v 2 v v v 2 v + v 2 = v + v 2 v 2 + v 2 2 = v + v

45 Arithmetic Computations on Shared Data r r 2 Observation: each party v r v 2 r can locally compute on their shares to obtain a share of the sum 2-7 v v 2 v 2 v For computing products on shared values (e.g., matrix-vector products, inner products, etc.), we can use a single-round interactive protocol [Bea9] v v 2 v + v 2 = v + v 2 v 2 + v 2 2 = v + v

46 What About More Complex Diseases? Cho-W-Berger [Nature Biotechnology 28] MPC Protocol Approach: directly compute on secret-shared data This work: first end-to-end GWAS protocol (with population correction) Based on computing on secretshared inputs For 25K individuals, computation completes in about 3 days: feasible for performing large-scale scientific studies

47 Secure Genome Computation MPC Protocol Modern cryptographic tools enable useful computations while protecting the privacy of individual genomes

48 Secure Genome Computation Many other techniques (with different tradeoffs): Homomorphic encryption (computing on encrypted data) [Zhang et al., 25; Lauter et al., 25, ] Differential privacy (adding noise to protect privacy) [Simmons et al., 26; Simmons-Berger, 26, ] Intel SGX (leveraging secure hardware) [Chen et al., 27; Wang et al., 26; Chen et al., 26, ] [ Not an exhaustive list! ] Modern cryptographic tools enable useful computations while protecting the privacy of individual genomes

49 Secure Genome Computation MPC Protocol Project Website: Thank you!

Protecting Patient Privacy in Genomic Analysis

Protecting Patient Privacy in Genomic Analysis Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh

More information

Constraining Pseudorandom Functions Privately

Constraining Pseudorandom Functions Privately Constraining Pseudorandom Functions Privately David Wu Stanford University Joint work with Dan Boneh and Kevin Lewi Pseudorandom Functions (PRFs) [GGM84] : Pseudorandom Funs, Random, Constrained PRFs [BW13,

More information

Constrained Keys for Invertible Pseudorandom Functions. Dan Boneh, Sam Kim, and David J. Wu Stanford University

Constrained Keys for Invertible Pseudorandom Functions. Dan Boneh, Sam Kim, and David J. Wu Stanford University Constrained Keys for Invertible Pseudorandom Functions Dan Boneh, Sam Kim, and David J. Wu Stanford University Pseudorandom Functions (PRFs) [GGM84] k R K Pseudorandom f R Funs[X, Y] Random F: K X Y x

More information

FriendFinder: A Privacy Aware Grid Based Location Service

FriendFinder: A Privacy Aware Grid Based Location Service FriendFinder: A Privacy Aware Grid Based Location Service Ove Andersen Laurynas Siksnys Jeppe R. Thomsen Aalborg University Department of Computer Science Selma Lagerløfs Vej 300, DK-9220 Aalborg Ø Denmark

More information

Secure Grouping and Aggregation with MapReduce

Secure Grouping and Aggregation with MapReduce 1/27 Secure Grouping and Aggregation with MapReduce Radu Ciucanu Matthieu Giraud Pascal Lafourcade Lihua Ye 28 July 2018 SECRYPT, Porto 2/27 Example of Grouping and Aggregation Name Department Salary Alice

More information

Review Questions in Introductory Knowledge... 37

Review Questions in Introductory Knowledge... 37 Table of Contents Preface..... 17 About the Authors... 19 How This Book is Organized... 20 Who Should Buy This Book?... 20 Where to Find Answers to Review Questions and Exercises... 20 How to Report Errata...

More information

Supplementary Figure 1

Supplementary Figure 1 Supplementary Figure 1 An example of the gene-term-disease network automatically generated by Phenolyzer web server for 'autism'. The largest word represents the user s input term, Autism. The pink round

More information

CS2220 Introduction to Computational Biology

CS2220 Introduction to Computational Biology CS2220 Introduction to Computational Biology WEEK 8: GENOME-WIDE ASSOCIATION STUDIES (GWAS) 1 Dr. Mengling FENG Institute for Infocomm Research Massachusetts Institute of Technology mfeng@mit.edu PLANS

More information

Sparse Coding in Sparse Winner Networks

Sparse Coding in Sparse Winner Networks Sparse Coding in Sparse Winner Networks Janusz A. Starzyk 1, Yinyin Liu 1, David Vogel 2 1 School of Electrical Engineering & Computer Science Ohio University, Athens, OH 45701 {starzyk, yliu}@bobcat.ent.ohiou.edu

More information

TIMELY: RTT-based Congestion Control for the Datacenter

TIMELY: RTT-based Congestion Control for the Datacenter TIMELY: RTT-based Congestion Control for the Datacenter Radhika Mittal*(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi*(Microsoft), Amin Vahdat, Yaogong Wang, David

More information

TIMELY: RTT-based Congestion Control for the Datacenter

TIMELY: RTT-based Congestion Control for the Datacenter TIMELY: RTT-based Congestion Control for the Datacenter Authors: Radhika Mittal(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi(Microsoft), Amin Vahdat, Yaogong

More information

Chapter 3 Software Packages to Install How to Set Up Python Eclipse How to Set Up Eclipse... 42

Chapter 3 Software Packages to Install How to Set Up Python Eclipse How to Set Up Eclipse... 42 Table of Contents Preface..... 21 About the Authors... 23 Acknowledgments... 24 How This Book is Organized... 24 Who Should Buy This Book?... 24 Where to Find Answers to Review Questions and Exercises...

More information

ECE 2300 Digital Logic & Computer Organization

ECE 2300 Digital Logic & Computer Organization ECE 23 Digital Logic & Computer Organization Spring 27 Combinational Logic Minimization Lecture 3: Announcements Lab 2 is on CMS Tutorial B: CAD tool installation HW will be released tonight Rescheduled

More information

Rolls,E.T. (2016) Cerebral Cortex: Principles of Operation. Oxford University Press.

Rolls,E.T. (2016) Cerebral Cortex: Principles of Operation. Oxford University Press. Digital Signal Processing and the Brain Is the brain a digital signal processor? Digital vs continuous signals Digital signals involve streams of binary encoded numbers The brain uses digital, all or none,

More information

Identifying the Zygosity Status of Twins Using Bayes Network and Estimation- Maximization Methodology

Identifying the Zygosity Status of Twins Using Bayes Network and Estimation- Maximization Methodology Identifying the Zygosity Status of Twins Using Bayes Network and Estimation- Maximization Methodology Yicun Ni (ID#: 9064804041), Jin Ruan (ID#: 9070059457), Ying Zhang (ID#: 9070063723) Abstract As the

More information

Assignment Question Paper I

Assignment Question Paper I Subject : - Discrete Mathematics Maximum Marks : 30 1. Define Harmonic Mean (H.M.) of two given numbers relation between A.M.,G.M. &H.M.? 2. How we can represent the set & notation, define types of sets?

More information

BGI Cognitive Genomics Lab: Informed Consent to Participate in GWAS

BGI Cognitive Genomics Lab: Informed Consent to Participate in GWAS BGI Cognitive Genomics Lab: Informed Consent to Participate in GWAS Please read this document carefully before deciding whether to participate in this study. What Am I Agreeing To? By participating in

More information

The Knapsack Problem

The Knapsack Problem Spring 2010 Chris Christensen HNR 304 The Knapsack Problem In 1978, Merkel and Hellman published a public-key encryption system based upon the knapsack problem ("Hiding information and signatures in trapdoor

More information

International Journal of Research in Science and Technology. (IJRST) 2018, Vol. No. 8, Issue No. IV, Oct-Dec e-issn: , p-issn: X

International Journal of Research in Science and Technology. (IJRST) 2018, Vol. No. 8, Issue No. IV, Oct-Dec e-issn: , p-issn: X CLOUD FILE SHARING AND DATA SECURITY THREATS EXPLORING THE EMPLOYABILITY OF GRAPH-BASED UNSUPERVISED LEARNING IN DETECTING AND SAFEGUARDING CLOUD FILES Harshit Yadav Student, Bal Bharati Public School,

More information

Chapter 8 Multioperand Addition

Chapter 8 Multioperand Addition Chapter 8 Multioperand Addition Using Two-Operand Adders Carry-Save Adders Wallace and Dadda Trees Parallel Counters Generalized Parallel Counters Adding Multiple Signed Numbers Ch 8. Multioperand Addition

More information

Large-scale identity-by-descent mapping discovers rare haplotypes of large effect. Suyash Shringarpure 23andMe, Inc. ASHG 2017

Large-scale identity-by-descent mapping discovers rare haplotypes of large effect. Suyash Shringarpure 23andMe, Inc. ASHG 2017 Large-scale identity-by-descent mapping discovers rare haplotypes of large effect Suyash Shringarpure 23andMe, Inc. ASHG 2017 1 Why care about rare variants of large effect? Months from randomization 2

More information

Bigomics : Challenges and promises in large scale sequencing projects

Bigomics : Challenges and promises in large scale sequencing projects Bigomics : Challenges and promises in large scale sequencing projects Theodore M. Wong Ken Yocum MSST 2014 2010 Illumina, Inc. All rights reserved. Illumina, illuminadx, Solexa, Making Sense Out of Life,

More information

Stephan Kleber, Rens W. van der Heijden, Henning Kopp, Frank Kargl Terrorist Fraud resistance of DBPs employing PUFs

Stephan Kleber, Rens W. van der Heijden, Henning Kopp, Frank Kargl Terrorist Fraud resistance of DBPs employing PUFs Stephan Kleber, Rens W. van der Heijden, Henning Kopp, Frank Kargl 12.03.2015 Terrorist Fraud resistance of DBPs employing PUFs NetSys 2015 2 Terrorist Fraud resistance of DBPs employing PUFs S. Kleber,

More information

New Enhancements: GWAS Workflows with SVS

New Enhancements: GWAS Workflows with SVS New Enhancements: GWAS Workflows with SVS August 9 th, 2017 Gabe Rudy VP Product & Engineering 20 most promising Biotech Technology Providers Top 10 Analytics Solution Providers Hype Cycle for Life sciences

More information

ECE 2300 Digital Logic & Computer Organization

ECE 2300 Digital Logic & Computer Organization ECE 23 Digital Logic & Computer Organization Spring 28 Combinational Logic Minimization Lecture 3: Announcements Lab 2 is on CMS Tutorial B: CAD tool installation HW will be released tonight Rescheduled

More information

Releasing SNP Data and GWAS Results with Guaranteed Privacy Protection

Releasing SNP Data and GWAS Results with Guaranteed Privacy Protection integrating Data for Analysis, Anonymization, and SHaring Releasing SNP Data and GWAS Results with Guaranteed Privacy Protection Xiaoqian Jiang, PhD and Shuang Wang, PhD Overview Introduction idash healthcare

More information

Big Data Anonymisation Techniques

Big Data Anonymisation Techniques Big Data Anonymisation Techniues BIG DATA is Useful Analysis and publication of large datasets are essential to research and business Very useful to: predict flu improve transportation, Logistic improve

More information

UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014

UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014 UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014 Exam policy: This exam allows two one-page, two-sided cheat sheets (i.e. 4 sides); No other materials. Time: 2 hours. Be sure to write

More information

Lesson 6 Learning II Anders Lyhne Christensen, D6.05, INTRODUCTION TO AUTONOMOUS MOBILE ROBOTS

Lesson 6 Learning II Anders Lyhne Christensen, D6.05, INTRODUCTION TO AUTONOMOUS MOBILE ROBOTS Lesson 6 Learning II Anders Lyhne Christensen, D6.05, anders.christensen@iscte.pt INTRODUCTION TO AUTONOMOUS MOBILE ROBOTS First: Quick Background in Neural Nets Some of earliest work in neural networks

More information

White Paper Estimating Complex Phenotype Prevalence Using Predictive Models

White Paper Estimating Complex Phenotype Prevalence Using Predictive Models White Paper 23-12 Estimating Complex Phenotype Prevalence Using Predictive Models Authors: Nicholas A. Furlotte Aaron Kleinman Robin Smith David Hinds Created: September 25 th, 2015 September 25th, 2015

More information

Previous Example. New. Tradition

Previous Example. New. Tradition Experimental Design Previous Example New Tradition Goal? New Tradition =? Challenges Internal validity How to guarantee what you have observed is true? External validity How to guarantee what you have

More information

Haplotype allelic classes in the lactase persistence locus

Haplotype allelic classes in the lactase persistence locus Haplotype allelic classes in the lactase persistence locus Robert Cedergren Colloquium november 3 rd 28 Julie Hussin 1,2, Philippe Nadeau 1,2, Jean-François Lefebvre 2 and Damian Labuda 1-3 1 Bioinformatics

More information

Introduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018

Introduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018 Introduction to Machine Learning Katherine Heller Deep Learning Summer School 2018 Outline Kinds of machine learning Linear regression Regularization Bayesian methods Logistic Regression Why we do this

More information

Robotic Dancing: Exploring Agents that use a Stratified Perceive- Decide-Act Cycle of Interaction

Robotic Dancing: Exploring Agents that use a Stratified Perceive- Decide-Act Cycle of Interaction Robotic Dancing: Exploring Agents that use a Stratified Perceive- Decide-Act Cycle of Interaction James Benze and Jennifer Seitzer Department of Computer Science University of Dayton, Dayton, OH 45469-2160

More information

TADA: Analyzing De Novo, Transmission and Case-Control Sequencing Data

TADA: Analyzing De Novo, Transmission and Case-Control Sequencing Data TADA: Analyzing De Novo, Transmission and Case-Control Sequencing Data Each person inherits mutations from parents, some of which may predispose the person to certain diseases. Meanwhile, new mutations

More information

AND BIOMEDICAL SYSTEMS Rahul Sarpeshkar

AND BIOMEDICAL SYSTEMS Rahul Sarpeshkar ULTRA-LOW-POWER LOW BIO-INSPIRED INSPIRED AND BIOMEDICAL SYSTEMS Rahul Sarpeshkar Research Lab of Electronics Massachusetts Institute of Technology Electrical Engineering and Computer Science FOE Talk

More information

Support for Cognitive Science Experiments

Support for Cognitive Science Experiments Support for Cognitive Science Experiments CogSketch as Research Instrument Corpus of stimuli for people Corpus of formally represented stimuli Cognitive Simulation Compare results on variety of tasks Gathering

More information

Rare Variant Burden Tests. Biostatistics 666

Rare Variant Burden Tests. Biostatistics 666 Rare Variant Burden Tests Biostatistics 666 Last Lecture Analysis of Short Read Sequence Data Low pass sequencing approaches Modeling haplotype sharing between individuals allows accurate variant calls

More information

Preparing More Effective Liquid State Machines Using Hebbian Learning

Preparing More Effective Liquid State Machines Using Hebbian Learning 2006 International Joint Conference on Neural Networks Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-21, 2006 Preparing More Effective Liquid State Machines Using Hebbian Learning

More information

An Artificial Neural Network Architecture Based on Context Transformations in Cortical Minicolumns

An Artificial Neural Network Architecture Based on Context Transformations in Cortical Minicolumns An Artificial Neural Network Architecture Based on Context Transformations in Cortical Minicolumns 1. Introduction Vasily Morzhakov, Alexey Redozubov morzhakovva@gmail.com, galdrd@gmail.com Abstract Cortical

More information

BST227 Introduction to Statistical Genetics. Lecture 4: Introduction to linkage and association analysis

BST227 Introduction to Statistical Genetics. Lecture 4: Introduction to linkage and association analysis BST227 Introduction to Statistical Genetics Lecture 4: Introduction to linkage and association analysis 1 Housekeeping Homework #1 due today Homework #2 posted (due Monday) Lab at 5:30PM today (FXB G13)

More information

The Foundations of Personalized Medicine

The Foundations of Personalized Medicine The Foundations of Personalized Medicine Jeremy M. Berg Pittsburgh Foundation Professor and Director, Institute for Personalized Medicine University of Pittsburgh Personalized Medicine Physicians have

More information

HHS Public Access Author manuscript Hum Mutat. Author manuscript; available in PMC 2016 April 16.

HHS Public Access Author manuscript Hum Mutat. Author manuscript; available in PMC 2016 April 16. GeneMatcher: A Matching Tool for Connecting Investigators with an Interest in the Same Gene Nara Sobreira 1,*, François Schiettecatte 2, David Valle 1, and Ada Hamosh 1 1 Institute of Genetic Medicine,

More information

Agents and Environments

Agents and Environments Agents and Environments Berlin Chen 2004 Reference: 1. S. Russell and P. Norvig. Artificial Intelligence: A Modern Approach. Chapter 2 AI 2004 Berlin Chen 1 What is an Agent An agent interacts with its

More information

EXIT Chart. Prof. Francis C.M. Lau. Department of Electronic and Information Engineering Hong Kong Polytechnic University

EXIT Chart. Prof. Francis C.M. Lau. Department of Electronic and Information Engineering Hong Kong Polytechnic University EXIT Chart Prof. Francis C.M. Lau Department of Electronic and Information Engineering Hong Kong Polytechnic University EXIT Chart EXtrinsic Information Transfer (EXIT) Chart Use for the analysis of iterative

More information

Test Equipment Depot Washington Street Melrose, MA TestEquipmentDepot.com

Test Equipment Depot Washington Street Melrose, MA TestEquipmentDepot.com Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 TestEquipmentDepot.com Table of Contents Table of Contents... iii Preface... viii Getting Started... 9 0.1 Breadboard... 9 0.2

More information

Profile-cast: Behavior-Aware Mobile Networking

Profile-cast: Behavior-Aware Mobile Networking Profile-cast: Behavior-Aware Mobile etworking Wei-jen Hsu, Dept. of CISE, U of Florida Debojyoti Dutta, Cisco Sytems, Inc. Ahmed Helmy, Dept. of CISE, U of Florida 6/10/2008 Presentation for WCC, 2008

More information

Coded Code-Division Multiple Access (CDMA) The combination of forward error control (FEC) coding with code-division multiple-access (CDMA).

Coded Code-Division Multiple Access (CDMA) The combination of forward error control (FEC) coding with code-division multiple-access (CDMA). Coded Code-Division Multiple Access (CDMA) The combination of forward error control (FEC) coding with code-division multiple-access (CDMA). Optimal Processing: Maximum Likehood (ML) decoding applied to

More information

What is the inheritance pattern (e.g., autosomal, sex-linked, dominant, recessive, etc.)?

What is the inheritance pattern (e.g., autosomal, sex-linked, dominant, recessive, etc.)? Module I: Introduction to the disease Give a brief introduction to the disease, considering the following: the symptoms that define the syndrome, the range of phenotypes exhibited by individuals with the

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION doi:1.138/nature1216 Supplementary Methods M.1 Definition and properties of dimensionality Consider an experiment with a discrete set of c different experimental conditions, corresponding to all distinct

More information

The Color Consensus Mechanism Beige Paper: Color Prism

The Color Consensus Mechanism Beige Paper: Color Prism The Color Consensus Mechanism Beige Paper: Color Prism Version 0.9-1 November 24, 2018 The Color Platform Team 1.0 Purpose The purpose of this paper is to explain the Color Consensus Mechanism at length

More information

The Simulacrum. What is it, how is it created, how does it work? Michael Eden on behalf of Sally Vernon & Cong Chen NAACCR 21 st June 2017

The Simulacrum. What is it, how is it created, how does it work? Michael Eden on behalf of Sally Vernon & Cong Chen NAACCR 21 st June 2017 The Simulacrum What is it, how is it created, how does it work? Michael Eden on behalf of Sally Vernon & Cong Chen NAACCR 21 st June 2017 sally.vernon@phe.gov.uk & cong.chen@phe.gov.uk 1 Overview What

More information

A resource for doctors. An opportunity for patients.

A resource for doctors. An opportunity for patients. A resource for doctors. An opportunity for patients. A way for experts to work together to provide the best treatment for patients around the world. Our understanding of cancer is constantly growing, making

More information

Copy Number Variations and Association Mapping Advanced Topics in Computa8onal Genomics

Copy Number Variations and Association Mapping Advanced Topics in Computa8onal Genomics Copy Number Variations and Association Mapping 02-715 Advanced Topics in Computa8onal Genomics SNP and CNV Genotyping SNP genotyping assumes two copy numbers at each locus (i.e., no CNVs) CNV genotyping

More information

Laboratory. Mendelian Genetics

Laboratory. Mendelian Genetics Laboratory 9 Mendelian Genetics Biology 171L FA17 Lab 9: Mendelian Genetics Student Learning Outcomes 1. Predict the phenotypic and genotypic ratios of a monohybrid cross. 2. Determine whether a gene is

More information

Deep Learning for Computer Vision

Deep Learning for Computer Vision Deep Learning for Computer Vision Lecture 12: Time Sequence Data, Recurrent Neural Networks (RNNs), Long Short-Term Memories (s), and Image Captioning Peter Belhumeur Computer Science Columbia University

More information

The storage and recall of memories in the hippocampo-cortical system. Supplementary material. Edmund T Rolls

The storage and recall of memories in the hippocampo-cortical system. Supplementary material. Edmund T Rolls The storage and recall of memories in the hippocampo-cortical system Supplementary material Edmund T Rolls Oxford Centre for Computational Neuroscience, Oxford, England and University of Warwick, Department

More information

Learning and Adaptive Behavior, Part II

Learning and Adaptive Behavior, Part II Learning and Adaptive Behavior, Part II April 12, 2007 The man who sets out to carry a cat by its tail learns something that will always be useful and which will never grow dim or doubtful. -- Mark Twain

More information

Extended Abstract prepared for the Integrating Genetics in the Social Sciences Meeting 2014

Extended Abstract prepared for the Integrating Genetics in the Social Sciences Meeting 2014 Understanding the role of social and economic factors in GCTA heritability estimates David H Rehkopf, Stanford University School of Medicine, Division of General Medical Disciplines 1265 Welch Road, MSOB

More information

DATE 2006 Session 5B: Timing and Noise Analysis

DATE 2006 Session 5B: Timing and Noise Analysis DATE 2006 Session 5B: Timing and Noise Analysis Bus Stuttering : An Encoding Technique To Reduce Inductive Noise In Off-Chip Data Transmission Authors: Brock J. LaMeres, Agilent Technologies Sunil P. Khatri,

More information

Comparison of Gene Set Analysis with Various Score Transformations to Test the Significance of Sets of Genes

Comparison of Gene Set Analysis with Various Score Transformations to Test the Significance of Sets of Genes Comparison of Gene Set Analysis with Various Score Transformations to Test the Significance of Sets of Genes Ivan Arreola and Dr. David Han Department of Management of Science and Statistics, University

More information

SNJB College of Engineering Department of Computer Engineering

SNJB College of Engineering Department of Computer Engineering 1. Intel s programmable device (8253) facilitates the generation of accurate time delays. a) counter b) timer c) both a & b d) none of these 2. The programmable timer device (8253) contains three independent

More information

Supplementary Methods

Supplementary Methods Supplementary Methods Short Read Preprocessing Reads are preprocessed differently according to how they will be used: detection of the variant in the tumor, discovery of an artifact in the normal or for

More information

Microphone Input LED Display T-shirt

Microphone Input LED Display T-shirt Microphone Input LED Display T-shirt Team 50 John Ryan Hamilton and Anthony Dust ECE 445 Project Proposal Spring 2017 TA: Yuchen He 1 Introduction 1.2 Objective According to the World Health Organization,

More information

Introduction to linkage and family based designs to study the genetic epidemiology of complex traits. Harold Snieder

Introduction to linkage and family based designs to study the genetic epidemiology of complex traits. Harold Snieder Introduction to linkage and family based designs to study the genetic epidemiology of complex traits Harold Snieder Overview of presentation Designs: population vs. family based Mendelian vs. complex diseases/traits

More information

IRB USE ONLY Approval Date: September 10, 2013 Expiration Date: September 10, 2014

IRB USE ONLY Approval Date: September 10, 2013 Expiration Date: September 10, 2014 Approval : September 10, 2013 Expiration : September 10, 2014 DESCRIPTION: The goal of Assisted Reproductive Technology (ART) is to help infertile couples to become pregnant. During treatment, some cellular

More information

Multiplex target enrichment using DNA indexing for ultra-high throughput variant detection

Multiplex target enrichment using DNA indexing for ultra-high throughput variant detection Multiplex target enrichment using DNA indexing for ultra-high throughput variant detection Dr Elaine Kenny Neuropsychiatric Genetics Research Group Institute of Molecular Medicine Trinity College Dublin

More information

Principles of phylogenetic analysis

Principles of phylogenetic analysis Principles of phylogenetic analysis Arne Holst-Jensen, NVI, Norway. Fusarium course, Ås, Norway, June 22 nd 2008 Distance based methods Compare C OTUs and characters X A + D = Pairwise: A and B; X characters

More information

BST227: Introduction to Statistical Genetics

BST227: Introduction to Statistical Genetics BST227: Introduction to Statistical Genetics Lecture 11: Heritability from summary statistics & epigenetic enrichments Guest Lecturer: Caleb Lareau Success of GWAS EBI Human GWAS Catalog As of this morning

More information

Nature Methods: doi: /nmeth.3115

Nature Methods: doi: /nmeth.3115 Supplementary Figure 1 Analysis of DNA methylation in a cancer cohort based on Infinium 450K data. RnBeads was used to rediscover a clinically distinct subgroup of glioblastoma patients characterized by

More information

Deep Learning Analytics for Predicting Prognosis of Acute Myeloid Leukemia with Cytogenetics, Age, and Mutations

Deep Learning Analytics for Predicting Prognosis of Acute Myeloid Leukemia with Cytogenetics, Age, and Mutations Deep Learning Analytics for Predicting Prognosis of Acute Myeloid Leukemia with Cytogenetics, Age, and Mutations Andy Nguyen, M.D., M.S. Medical Director, Hematopathology, Hematology and Coagulation Laboratory,

More information

Golden Helix s End-to-End Solution for Clinical Labs

Golden Helix s End-to-End Solution for Clinical Labs Golden Helix s End-to-End Solution for Clinical Labs Steven Hystad - Field Application Scientist Nathan Fortier Senior Software Engineer 20 most promising Biotech Technology Providers Top 10 Analytics

More information

Predicting Breast Cancer Survival Using Treatment and Patient Factors

Predicting Breast Cancer Survival Using Treatment and Patient Factors Predicting Breast Cancer Survival Using Treatment and Patient Factors William Chen wchen808@stanford.edu Henry Wang hwang9@stanford.edu 1. Introduction Breast cancer is the leading type of cancer in women

More information

Detection of copy number variations in PCR-enriched targeted sequencing data

Detection of copy number variations in PCR-enriched targeted sequencing data Detection of copy number variations in PCR-enriched targeted sequencing data German Demidov Parseq Lab, Saint-Petersburg University of Russian Academy of Sciences, current: Center for Genomic Regulation

More information

Quantifying location privacy

Quantifying location privacy Sébastien Gambs Quantifying location privacy 1 Quantifying location privacy Sébastien Gambs Université de Rennes 1 - INRIA sgambs@irisa.fr 10 September 2013 Sébastien Gambs Quantifying location privacy

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction Artificial neural networks are mathematical inventions inspired by observations made in the study of biological systems, though loosely based on the actual biology. An artificial

More information

Approximate ML Detection Based on MMSE for MIMO Systems

Approximate ML Detection Based on MMSE for MIMO Systems PIERS ONLINE, VOL. 3, NO. 4, 2007 475 Approximate ML Detection Based on MMSE for MIMO Systems Fan Wang 1, Yong Xiong 2, and Xiumei Yang 2 1 The Electromagnetics Academy at Zhejiang University, Zhejiang

More information

Edge Detection Techniques Based On Soft Computing

Edge Detection Techniques Based On Soft Computing International Journal for Science and Emerging ISSN No. (Online):2250-3641 Technologies with Latest Trends 7(1): 21-25 (2013) ISSN No. (Print): 2277-8136 Edge Detection Techniques Based On Soft Computing

More information

Customer case study Genome-wide variation Impact of Human Variation on Disease. Sample to Insight

Customer case study Genome-wide variation Impact of Human Variation on Disease. Sample to Insight Customer case study Genome-wide variation Impact of Human Variation on Disease Sample to Insight Rajini Haraksingh aims for a broad understanding of the complexities of human variation. Along the way,

More information

Seeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma. February 04, Tao Chen. Sining Wang.

Seeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma. February 04, Tao Chen. Sining Wang. Seeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma February 04, 2019 Tao Chen Wan Wang Sining Wang Lei Chen University of Waterloo University of Waterloo

More information

One slide on research question Literature review: structured; holes you will fill in Your research design

One slide on research question Literature review: structured; holes you will fill in Your research design Topics Ahead Week 10-11: Experimental design; Running experiment Week 12: Survey Design; ANOVA Week 13: Correlation and Regression; Non Parametric Statistics Week 14: Computational Methods; Simulation;

More information

Evaluating Classifiers for Disease Gene Discovery

Evaluating Classifiers for Disease Gene Discovery Evaluating Classifiers for Disease Gene Discovery Kino Coursey Lon Turnbull khc0021@unt.edu lt0013@unt.edu Abstract Identification of genes involved in human hereditary disease is an important bioinfomatics

More information

COMP9444 Neural Networks and Deep Learning 5. Convolutional Networks

COMP9444 Neural Networks and Deep Learning 5. Convolutional Networks COMP9444 Neural Networks and Deep Learning 5. Convolutional Networks Textbook, Sections 6.2.2, 6.3, 7.9, 7.11-7.13, 9.1-9.5 COMP9444 17s2 Convolutional Networks 1 Outline Geometry of Hidden Unit Activations

More information

Genetics and Genomics in Medicine Chapter 8 Questions

Genetics and Genomics in Medicine Chapter 8 Questions Genetics and Genomics in Medicine Chapter 8 Questions Linkage Analysis Question Question 8.1 Affected members of the pedigree above have an autosomal dominant disorder, and cytogenetic analyses using conventional

More information

Estimation of Breast Density and Feature Extraction of Mammographic Images

Estimation of Breast Density and Feature Extraction of Mammographic Images IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 11 April 2016 ISSN (online): 2349-6010 Estimation of Breast Density and Feature Extraction of Mammographic Images

More information

Current Directions in Mediation Analysis David P. MacKinnon 1 and Amanda J. Fairchild 2

Current Directions in Mediation Analysis David P. MacKinnon 1 and Amanda J. Fairchild 2 CURRENT DIRECTIONS IN PSYCHOLOGICAL SCIENCE Current Directions in Mediation Analysis David P. MacKinnon 1 and Amanda J. Fairchild 2 1 Arizona State University and 2 University of South Carolina ABSTRACT

More information

A New Approach For an Improved Multiple Brain Lesion Segmentation

A New Approach For an Improved Multiple Brain Lesion Segmentation A New Approach For an Improved Multiple Brain Lesion Segmentation Prof. Shanthi Mahesh 1, Karthik Bharadwaj N 2, Suhas A Bhyratae 3, Karthik Raju V 4, Karthik M N 5 Department of ISE, Atria Institute of

More information

Host Genomics of HIV-1

Host Genomics of HIV-1 4 th International Workshop on HIV & Aging Host Genomics of HIV-1 Paul McLaren École Polytechnique Fédérale de Lausanne - EPFL Lausanne, Switzerland paul.mclaren@epfl.ch Complex trait genetics Phenotypic

More information

International Journal of Scientific & Engineering Research Volume 4, Issue 2, February ISSN THINKING CIRCUIT

International Journal of Scientific & Engineering Research Volume 4, Issue 2, February ISSN THINKING CIRCUIT International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 THINKING CIRCUIT Mr.Mukesh Raju Bangar Intern at Govt. Dental College and hospital, Nagpur Email: Mukeshbangar008@gmail.com

More information

South Asian Journal of Engineering and Technology Vol.3, No.9 (2017) 17 22

South Asian Journal of Engineering and Technology Vol.3, No.9 (2017) 17 22 South Asian Journal of Engineering and Technology Vol.3, No.9 (07) 7 Detection of malignant and benign Tumors by ANN Classification Method K. Gandhimathi, Abirami.K, Nandhini.B Idhaya Engineering College

More information

Lyme Disease and Tick Surveillance in British Columbia

Lyme Disease and Tick Surveillance in British Columbia Lyme Disease and Tick Surveillance in British Columbia Muhammad Morshed, PhD, SCCM Program Head, Zoonotic Diseases & Emerging Pathogens BCCDC Public Health Microbiology and Reference Laboratory Provincial

More information

Multichannel Classification of Single EEG Trials with Independent Component Analysis

Multichannel Classification of Single EEG Trials with Independent Component Analysis In J. Wang et a]. (Eds.), Advances in Neural Networks-ISNN 2006, Part 111: 54 1-547. Berlin: Springer. Multichannel Classification of Single EEG Trials with Independent Component Analysis Dik Kin Wong,

More information

Summary of presentation

Summary of presentation The use of HIV-1 gene sequence data to detect ARV drug resistance mutations and RegaDB database. Tulio de Oliveira Africa Centre for Health and Population Studies, Nelson R Mandela School of Medicine,

More information

Highly Accurate Brain Stroke Diagnostic System and Generative Lesion Model. Junghwan Cho, Ph.D. CAIDE Systems, Inc. Deep Learning R&D Team

Highly Accurate Brain Stroke Diagnostic System and Generative Lesion Model. Junghwan Cho, Ph.D. CAIDE Systems, Inc. Deep Learning R&D Team Highly Accurate Brain Stroke Diagnostic System and Generative Lesion Model Junghwan Cho, Ph.D. CAIDE Systems, Inc. Deep Learning R&D Team Established in September, 2016 at 110 Canal st. Lowell, MA 01852,

More information

Research Methods in Forest Sciences: Learning Diary. Yoko Lu December Research process

Research Methods in Forest Sciences: Learning Diary. Yoko Lu December Research process Research Methods in Forest Sciences: Learning Diary Yoko Lu 285122 9 December 2016 1. Research process It is important to pursue and apply knowledge and understand the world under both natural and social

More information

38 Int'l Conf. Bioinformatics and Computational Biology BIOCOMP'16

38 Int'l Conf. Bioinformatics and Computational Biology BIOCOMP'16 38 Int'l Conf. Bioinformatics and Computational Biology BIOCOMP'16 PGAR: ASD Candidate Gene Prioritization System Using Expression Patterns Steven Cogill and Liangjiang Wang Department of Genetics and

More information

arxiv: v4 [cs.cr] 21 Aug 2018

arxiv: v4 [cs.cr] 21 Aug 2018 LOGAN: Membership Inference Attacks Against Generative Models Jamie Hayes, Luca Melis, George Danezis, and Emiliano De Cristofaro University College London {j.hayes, l.melis, g.danezis, e.decristofaro}@cs.ucl.ac.uk

More information

IN SILICO EVALUATION OF DNA-POOLED ALLELOTYPING VERSUS INDIVIDUAL GENOTYPING FOR GENOME-WIDE ASSOCIATION STUDIES OF COMPLEX DISEASE.

IN SILICO EVALUATION OF DNA-POOLED ALLELOTYPING VERSUS INDIVIDUAL GENOTYPING FOR GENOME-WIDE ASSOCIATION STUDIES OF COMPLEX DISEASE. IN SILICO EVALUATION OF DNA-POOLED ALLELOTYPING VERSUS INDIVIDUAL GENOTYPING FOR GENOME-WIDE ASSOCIATION STUDIES OF COMPLEX DISEASE By Siddharth Pratap Thesis Submitted to the Faculty of the Graduate School

More information

Using the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview

Using the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview Using the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview Millions of people. Strong collaborations. Privacy first. Jeffrey Brown,

More information

ERA: Architectures for Inference

ERA: Architectures for Inference ERA: Architectures for Inference Dan Hammerstrom Electrical And Computer Engineering 7/28/09 1 Intelligent Computing In spite of the transistor bounty of Moore s law, there is a large class of problems

More information