A Novel Analytical Population Tumor Control Probability Model Includes Cell Density and Volume Variations: Application to Canine Brain Tumor.

Int J Radiat Oncol Biol Phys

Department of Physics, University of Zurich, Zurich, Switzerland; Radiotherapy Hirslanden, Rain 32, Aarau, Switzerland.

Published: August 2021

Purpose: Tumor control probability (TCP) models based on Poisson statistics characterize the distribution of surviving clonogens. Thus enabling the calculation of TCP for individuals. To mathematically describe clinically observed survival data of patient cohorts it is necessary to extend the Poisson TCP model. This is typically done by either incorporating variations of model parameters or by using an empirical logistic model. The purpose of this work is the development of an analytical population TCP model by mechanistic extension of the Possion model.

Methods And Materials: The frequency distribution of gross tumor volumes was used to incorporate tumor volume variations into the TCP model. Additionally the tumor cell density variation was incorporated. Both versions of the population TCP model were fitted to clinical data and compared to existing literature.

Results: It was shown that clinically observed brain tumor volumes of dogs undergoing radiotherapy are distributed according to an exponential distribution. The average gross tumor volume size was 3.37 cm. Fitting the population TCP model including the volume variation using linear-quadratic and track-event model yieldedα=0.36Gya, β=0.045Gy, a=0.9yr, T=5.0d,and p=.36Gy, q=0.48Gy, a=0.80yr, T=3.0d, respectively. Fitting the population TCP model including both the volume and cell density variation yielded α=0.43Gy, β=0.0537Gy, a=2.0yr, T=3.0d, σ=2.5,and p=.43Gy, q=0.55Gy, a=2.0yr, T=2.0d, σ=3.0,respectively.

Conclusions: Two sets of radiobiological parameters were obtained which can be used for quantifying the TCP for radiation therapy of brain tumors in dogs. We established a mechanistic link between the poisson statistics based individual TCP model and the logistic TCP model. This link can be used to determine the radiobiological parameters of patient specific TCP models from published fits of logistic models to cohorts of patients.

Download full-text PDF

Source
http://dx.doi.org/10.1016/j.ijrobp.2021.03.021DOI Listing

Publication Analysis

Top Keywords

tcp model
32
population tcp
16
model
12
cell density
12
tcp
12
analytical population
8
tumor
8
tumor control
8
control probability
8
volume variations
8

Similar Publications

We study topological charge pumping (TCP) in the Rice-Mele (RM) model with irreciprocal hopping. The non-Hermiticity gives rise to interesting pumping physics, owing to the presence of skin effect and exceptional points. In the static one-dimensional (1D) RM model, we find two independent tuning knobs that can drive the topological transition, namely, non-Hermitian parameter $\gamma$ and system size $N$.

View Article and Find Full Text PDF

The Comprehensive Proarrhythmia Assay (CiPA) evaluates drug-induced torsade de pointes (TdP) risk, with qNet commonly used to classify drugs into low-, intermediate-, and high-risk categories. While most studies focus on single-drug effects, 2-drug fixed-dose combination (FDC) therapy is widely used for cardiovascular disease management. We aimed to develop the CiPA-based methodology to predict adverse effects of FDC therapy.

View Article and Find Full Text PDF

Android malware detection remains a critical issue for mobile security. Cybercriminals target Android since it is the most popular smartphone operating system (OS). Malware detection, analysis, and classification have become diverse research areas.

View Article and Find Full Text PDF

The growing prevalence of cybersecurity threats is a significant concern for railway systems, which rely on an extensive network of onboard and trackside sensors. These threats have the potential to compromise the safety of railway operations and the integrity of the railway infrastructure itself. This paper aims to examine the current cybersecurity measures in use, identify the key vulnerabilities that they address, and propose solutions for enhancing the security of railway infrastructures.

View Article and Find Full Text PDF

The rapid integration of Internet of Things (IoT) systems in various sectors has escalated security risks due to sophisticated multilayer attacks that compromise multiple security layers and lead to significant data loss, personal information theft, financial losses etc. Existing research on multilayer IoT attacks exhibits gaps in real-world applicability, due to reliance on outdated datasets with a limited focus on adaptive, dynamic approaches to address multilayer vulnerabilities. Additionally, the complete reliance on automated processes without integrating human expertise in feature selection and weighting processes may affect the reliability of detection models.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!