SlideShare une entreprise Scribd logo
1  sur  15
ANTICANCER THIAZOLIDINONES DESIGN:
Mining of 60-Cell Lines Experimental Data
Oleg Devinyak, Roman Lesyk
Uzhgorod National University
Danylo Halytsky Lviv National Medical Univeristy
2
BACKGROUND
NCI-60 DTP Human Tumor Cell Line Screen
non-active
Conc:
10-5
M
active
First Stage
Second Stage
Conc:
10-5
M
3
PROBLEMS
1. Have the same dose results of this two
stages enough statistical similarity to be
treated together in future QSAR
modelling?
2. Where is a rational border between
active and inactive compounds?
3. Is there different mechanisms of
antitumor action associated with
investigated compounds?
4
SAME DOSE RESULTS
ANALYSIS
HYPOTHESIS: Same dose results are
homogenous
Conclusion 1. This results can be combined
together to increase overall data amount.
Conclusion 2. Deviation in the results for same
compounds is an error of the experiment
Conclusion 3. This experimental error is a minimal
error for any QSAR model based on this data
5
Null hypothesis: deviations in the results
for same compounds is a normally
distributed random sample with zero
mean and unknown variance.
SAME DOSE RESULTS
ANALYSIS
60 cell lines
results for
73 pairs of
compounds
Student’s t-test
41 cell lines –
null hypothesis is rejected
19 cell lines –
fail to reject null hypothesis
6
SAME DOSE RESULTS
ANALYSIS
7
SAME DOSE RESULTS
ANALYSIS
8
RATIONAL BORDER BETWEEN
ACTIVITY AND INACTIVITY
9
A SEARCH FOR DIFFERENT
ANTITUMOR MECHANISMS
Principal component analysis
Principal Components PC1 PC2 PC3 PC4 PC5 PC6 PC7 PC8 PC9 PC10
Explained variance,
%
67,48 3,40 2,28 2,08 1,92 1,86 1,72 1,64 1,42 1,24
Decrease in explained
variance, %
64.08 1.19 0.20 0.17 0.05 0.14 0.08 0.22 0.19 0.07
10
A SEARCH FOR DIFFERENT
ANTITUMOR MECHANISMS
Self-organizing maps
11
A SEARCH FOR DIFFERENT
ANTITUMOR MECHANISMS
Self-organizing maps
∑ −−= )100( ii GIIA
,
12
SENSITIVITY PATTERNS
Most sensitive lines
NCI-H460 MDA-MB-231/ATCC
М14 SK-MEL-5
13
SENSITIVITY PATTERNS
Most insensitive lines
HOP-62 OVCAR-5
SK-OV-3 SNB-19
14
SUMMARY
• The homogeneity of NCI DTP results obtained
from different testing stages is rejected
• About 4% of testing results are extreme errors
• Rational border between active and non-
active compunds is introduced
• Two independent and one mixed mechanisms
of 4-thiazolidinones antitumor activity are
identified
• Some selectivity linked with different modes of
action for separate cell lines is highlighted
15
THANK YOU FOR
ATTENTION!

Contenu connexe

Similaire à ANTICANCER THIAZOLIDINONES DESIGN: Mining of 60-Cell Lines Experimental Data

Exploring Compound Combinations in High Throughput Settings: Going Beyond 1D ...
Exploring Compound Combinations in High Throughput Settings: Going Beyond 1D ...Exploring Compound Combinations in High Throughput Settings: Going Beyond 1D ...
Exploring Compound Combinations in High Throughput Settings: Going Beyond 1D ...Rajarshi Guha
 
Navigating through disease maps
Navigating through disease mapsNavigating through disease maps
Navigating through disease mapsJoaquin Dopazo
 
dual-event machine learning models to accelerate drug discovery
dual-event machine learning models to accelerate drug discoverydual-event machine learning models to accelerate drug discovery
dual-event machine learning models to accelerate drug discoverySean Ekins
 
Using Computational Toxicology to Enable Risk-Based Chemical Safety Decision ...
Using Computational Toxicology to Enable Risk-Based Chemical Safety Decision ...Using Computational Toxicology to Enable Risk-Based Chemical Safety Decision ...
Using Computational Toxicology to Enable Risk-Based Chemical Safety Decision ...U.S. EPA Office of Research and Development
 
AAPS 2015_W3081_Biomarker Screening Poster_Russell
AAPS 2015_W3081_Biomarker Screening Poster_RussellAAPS 2015_W3081_Biomarker Screening Poster_Russell
AAPS 2015_W3081_Biomarker Screening Poster_RussellLawrence Hwang
 
Slides for st judes
Slides for st judesSlides for st judes
Slides for st judesSean Ekins
 
Notes for macc
Notes for maccNotes for macc
Notes for macco_devinyak
 
Genomica - Microarreglos de DNA
Genomica - Microarreglos de DNAGenomica - Microarreglos de DNA
Genomica - Microarreglos de DNAUlises Urzua
 
Collaborative Database and Computational Models for Tuberculosis Drug Discovery
Collaborative Database and Computational Models for Tuberculosis Drug DiscoveryCollaborative Database and Computational Models for Tuberculosis Drug Discovery
Collaborative Database and Computational Models for Tuberculosis Drug DiscoverySean Ekins
 
Array_nmeth.3507
Array_nmeth.3507Array_nmeth.3507
Array_nmeth.3507Aana Hahn
 
Deep learning methods applied to physicochemical and toxicological endpoints
Deep learning methods applied to physicochemical and toxicological endpointsDeep learning methods applied to physicochemical and toxicological endpoints
Deep learning methods applied to physicochemical and toxicological endpointsValery Tkachenko
 
Bigger Data to Increase Drug Discovery
Bigger Data to Increase Drug DiscoveryBigger Data to Increase Drug Discovery
Bigger Data to Increase Drug DiscoverySean Ekins
 
a brief introduction to epistasis detection
a brief introduction to epistasis detectiona brief introduction to epistasis detection
a brief introduction to epistasis detectionHyun-hwan Jeong
 
Towards Precision Medicine: Tute Genomics, a cloud-based application for anal...
Towards Precision Medicine: Tute Genomics, a cloud-based application for anal...Towards Precision Medicine: Tute Genomics, a cloud-based application for anal...
Towards Precision Medicine: Tute Genomics, a cloud-based application for anal...Reid Robison
 
FunGen JC Presentation - Mostafavi et al. (2019)
FunGen JC Presentation - Mostafavi et al. (2019)FunGen JC Presentation - Mostafavi et al. (2019)
FunGen JC Presentation - Mostafavi et al. (2019)BrianSchilder
 
Selection and application of ssDNA aptamers to detect active TB from sputum s...
Selection and application of ssDNA aptamers to detect active TB from sputum s...Selection and application of ssDNA aptamers to detect active TB from sputum s...
Selection and application of ssDNA aptamers to detect active TB from sputum s...Saw Yi
 
Applying cheminformatics and bioinformatics approaches to neglected tropical ...
Applying cheminformatics and bioinformatics approaches to neglected tropical ...Applying cheminformatics and bioinformatics approaches to neglected tropical ...
Applying cheminformatics and bioinformatics approaches to neglected tropical ...Sean Ekins
 
6-8-2015 AACC Poster HIV p24 S-PLEX - Stengelin_final
6-8-2015 AACC Poster HIV p24 S-PLEX - Stengelin_final6-8-2015 AACC Poster HIV p24 S-PLEX - Stengelin_final
6-8-2015 AACC Poster HIV p24 S-PLEX - Stengelin_finalLawrence Hwang
 
AAPS 2015_M1028_U-PLEX Feasibility Poster_Russell
AAPS 2015_M1028_U-PLEX Feasibility Poster_RussellAAPS 2015_M1028_U-PLEX Feasibility Poster_Russell
AAPS 2015_M1028_U-PLEX Feasibility Poster_RussellLawrence Hwang
 
Unc slides on computational toxicology
Unc slides on computational toxicologyUnc slides on computational toxicology
Unc slides on computational toxicologySean Ekins
 

Similaire à ANTICANCER THIAZOLIDINONES DESIGN: Mining of 60-Cell Lines Experimental Data (20)

Exploring Compound Combinations in High Throughput Settings: Going Beyond 1D ...
Exploring Compound Combinations in High Throughput Settings: Going Beyond 1D ...Exploring Compound Combinations in High Throughput Settings: Going Beyond 1D ...
Exploring Compound Combinations in High Throughput Settings: Going Beyond 1D ...
 
Navigating through disease maps
Navigating through disease mapsNavigating through disease maps
Navigating through disease maps
 
dual-event machine learning models to accelerate drug discovery
dual-event machine learning models to accelerate drug discoverydual-event machine learning models to accelerate drug discovery
dual-event machine learning models to accelerate drug discovery
 
Using Computational Toxicology to Enable Risk-Based Chemical Safety Decision ...
Using Computational Toxicology to Enable Risk-Based Chemical Safety Decision ...Using Computational Toxicology to Enable Risk-Based Chemical Safety Decision ...
Using Computational Toxicology to Enable Risk-Based Chemical Safety Decision ...
 
AAPS 2015_W3081_Biomarker Screening Poster_Russell
AAPS 2015_W3081_Biomarker Screening Poster_RussellAAPS 2015_W3081_Biomarker Screening Poster_Russell
AAPS 2015_W3081_Biomarker Screening Poster_Russell
 
Slides for st judes
Slides for st judesSlides for st judes
Slides for st judes
 
Notes for macc
Notes for maccNotes for macc
Notes for macc
 
Genomica - Microarreglos de DNA
Genomica - Microarreglos de DNAGenomica - Microarreglos de DNA
Genomica - Microarreglos de DNA
 
Collaborative Database and Computational Models for Tuberculosis Drug Discovery
Collaborative Database and Computational Models for Tuberculosis Drug DiscoveryCollaborative Database and Computational Models for Tuberculosis Drug Discovery
Collaborative Database and Computational Models for Tuberculosis Drug Discovery
 
Array_nmeth.3507
Array_nmeth.3507Array_nmeth.3507
Array_nmeth.3507
 
Deep learning methods applied to physicochemical and toxicological endpoints
Deep learning methods applied to physicochemical and toxicological endpointsDeep learning methods applied to physicochemical and toxicological endpoints
Deep learning methods applied to physicochemical and toxicological endpoints
 
Bigger Data to Increase Drug Discovery
Bigger Data to Increase Drug DiscoveryBigger Data to Increase Drug Discovery
Bigger Data to Increase Drug Discovery
 
a brief introduction to epistasis detection
a brief introduction to epistasis detectiona brief introduction to epistasis detection
a brief introduction to epistasis detection
 
Towards Precision Medicine: Tute Genomics, a cloud-based application for anal...
Towards Precision Medicine: Tute Genomics, a cloud-based application for anal...Towards Precision Medicine: Tute Genomics, a cloud-based application for anal...
Towards Precision Medicine: Tute Genomics, a cloud-based application for anal...
 
FunGen JC Presentation - Mostafavi et al. (2019)
FunGen JC Presentation - Mostafavi et al. (2019)FunGen JC Presentation - Mostafavi et al. (2019)
FunGen JC Presentation - Mostafavi et al. (2019)
 
Selection and application of ssDNA aptamers to detect active TB from sputum s...
Selection and application of ssDNA aptamers to detect active TB from sputum s...Selection and application of ssDNA aptamers to detect active TB from sputum s...
Selection and application of ssDNA aptamers to detect active TB from sputum s...
 
Applying cheminformatics and bioinformatics approaches to neglected tropical ...
Applying cheminformatics and bioinformatics approaches to neglected tropical ...Applying cheminformatics and bioinformatics approaches to neglected tropical ...
Applying cheminformatics and bioinformatics approaches to neglected tropical ...
 
6-8-2015 AACC Poster HIV p24 S-PLEX - Stengelin_final
6-8-2015 AACC Poster HIV p24 S-PLEX - Stengelin_final6-8-2015 AACC Poster HIV p24 S-PLEX - Stengelin_final
6-8-2015 AACC Poster HIV p24 S-PLEX - Stengelin_final
 
AAPS 2015_M1028_U-PLEX Feasibility Poster_Russell
AAPS 2015_M1028_U-PLEX Feasibility Poster_RussellAAPS 2015_M1028_U-PLEX Feasibility Poster_Russell
AAPS 2015_M1028_U-PLEX Feasibility Poster_Russell
 
Unc slides on computational toxicology
Unc slides on computational toxicologyUnc slides on computational toxicology
Unc slides on computational toxicology
 

Dernier

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 

Dernier (20)

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 

ANTICANCER THIAZOLIDINONES DESIGN: Mining of 60-Cell Lines Experimental Data

  • 1. ANTICANCER THIAZOLIDINONES DESIGN: Mining of 60-Cell Lines Experimental Data Oleg Devinyak, Roman Lesyk Uzhgorod National University Danylo Halytsky Lviv National Medical Univeristy
  • 2. 2 BACKGROUND NCI-60 DTP Human Tumor Cell Line Screen non-active Conc: 10-5 M active First Stage Second Stage Conc: 10-5 M
  • 3. 3 PROBLEMS 1. Have the same dose results of this two stages enough statistical similarity to be treated together in future QSAR modelling? 2. Where is a rational border between active and inactive compounds? 3. Is there different mechanisms of antitumor action associated with investigated compounds?
  • 4. 4 SAME DOSE RESULTS ANALYSIS HYPOTHESIS: Same dose results are homogenous Conclusion 1. This results can be combined together to increase overall data amount. Conclusion 2. Deviation in the results for same compounds is an error of the experiment Conclusion 3. This experimental error is a minimal error for any QSAR model based on this data
  • 5. 5 Null hypothesis: deviations in the results for same compounds is a normally distributed random sample with zero mean and unknown variance. SAME DOSE RESULTS ANALYSIS 60 cell lines results for 73 pairs of compounds Student’s t-test 41 cell lines – null hypothesis is rejected 19 cell lines – fail to reject null hypothesis
  • 9. 9 A SEARCH FOR DIFFERENT ANTITUMOR MECHANISMS Principal component analysis Principal Components PC1 PC2 PC3 PC4 PC5 PC6 PC7 PC8 PC9 PC10 Explained variance, % 67,48 3,40 2,28 2,08 1,92 1,86 1,72 1,64 1,42 1,24 Decrease in explained variance, % 64.08 1.19 0.20 0.17 0.05 0.14 0.08 0.22 0.19 0.07
  • 10. 10 A SEARCH FOR DIFFERENT ANTITUMOR MECHANISMS Self-organizing maps
  • 11. 11 A SEARCH FOR DIFFERENT ANTITUMOR MECHANISMS Self-organizing maps ∑ −−= )100( ii GIIA ,
  • 12. 12 SENSITIVITY PATTERNS Most sensitive lines NCI-H460 MDA-MB-231/ATCC М14 SK-MEL-5
  • 13. 13 SENSITIVITY PATTERNS Most insensitive lines HOP-62 OVCAR-5 SK-OV-3 SNB-19
  • 14. 14 SUMMARY • The homogeneity of NCI DTP results obtained from different testing stages is rejected • About 4% of testing results are extreme errors • Rational border between active and non- active compunds is introduced • Two independent and one mixed mechanisms of 4-thiazolidinones antitumor activity are identified • Some selectivity linked with different modes of action for separate cell lines is highlighted