Next Article in Journal
Ballistic-Diffusive Model for Heat Transport in Superlattices and the Minimum Effective Heat Conductivity
Next Article in Special Issue
Optimizing Variational Graph Autoencoder for Community Detection with Dual Optimization
Previous Article in Journal
Criticality in Pareto Optimal Grammars?
Previous Article in Special Issue
Complex Network Construction of Univariate Chaotic Time Series Based on Maximum Mean Discrepancy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Properties of the Vascular Networks in Malignant Tumors

by
Juan Carlos Chimal-Eguía
1,*,
Erandi Castillo-Montiel
2 and
Ricardo T. Paez-Hernández
3
1
Centro de Investigación en Computación del Instituto Politécnico Nacional, Av. Miguel Othon de Mendizabal s/n. Col. La Escalera, Ciudad de México CP 07738, Mexico
2
Department of Técnologias WEB, Instituto Politécnico Nacional (IPN) - Centro Nacional de Cálculo (CENAC), Av. Luis Enrique Erro S/N, Unidad Profesional Adolfo López Mateos, Zacatenco, Gustavo A. Madero, Ciudad de México CP 07738, Mexico
3
Área de Física de Procesos Irreversibles, Departamento de Ciencias Básicas, Universidad Autónoma Metropolitana, U-Azcapotzalco, Av. San Pablo 180, Col.Reynosa, Ciudad de México CP 02200, Mexico
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(2), 166; https://doi.org/10.3390/e22020166
Submission received: 4 December 2019 / Revised: 22 January 2020 / Accepted: 28 January 2020 / Published: 31 January 2020
(This article belongs to the Special Issue Computation in Complex Networks)

Abstract

:
This work presents an analysis for real and synthetic angiogenic networks using a tomography image that obtains a portrait of a vascular network. After the image conversion into a binary format it is possible to measure various network properties, which includes the average path length, the clustering coefficient, the degree distribution and the fractal dimension. When comparing the observed properties with that produced by the Invasion Percolation algorithm (IPA), we observe that there exist differences between the properties obtained by the real and the synthetic networks produced by the IPA algorithm. Taking into account the former, a new algorithm which models the expansion of an angiogenic network through randomly heuristic rules is proposed. When comparing this new algorithm with the real networks it is observed that now both share some properties. Once creating synthetic networks, we prove the robustness of the network by subjecting the original angiogenic and the synthetic networks to the removal of the most connected nodes, and see to what extent the properties changed. Using this concept of robustness, in a very naive fashion it is possible to launch a hypothetical proposal for a therapeutic treatment based on the robustness of the network.

1. Introduction

The development of cancer has thereby concentrated on an approach which is center around the genetic events which allow cells to escape from growth control and become cancerous. However, even if cancer cells have been generated and can evolve to accumulate more mutations, these cancer cells might not be able to grow beyond a very small size.
One of the most important factors in this respect is the blood supply which provides cancer cells with oxygen, nutrients and necessities required for survival. When the growth of tumoral cells is high enough to consume all supplies in a specific organ or tissue, the tumor stops its growth in order to induce the generation of new blood supply to sustain its growth; this process is called angiogenesis.
Whether a new blood supply can be formed or not appears to be determined by the balance between angiogenesis inhibitors and promoters. When angiogenic cell lines emerge they can shift the balance away from inhibition and in favor of promotion. This induces blood vessels to grow towards the tumor and this process leads to the complete vascularization of the tumor, i.e., a vascular network [1].
Our understanding about the role of angiogenesis in the development of cancers has advanced significantly since the studies of Judah Folkman [2]. Many of these studies have been focused mainly on the understanding of the cells at molecular level. To fully understand the behaviour of an organism, organ or even a single cell, we need to fully comprehend the collective behaviour of the whole system. Recently, the analysis of the behaviours of the biological systems or their emergent properties, that are not apparent from the examination of only a few isolated interactions alone, have emerged as new insights in the study of the systems in biology.
For instance, the use of fractal geometry [3] can describe the pathological structure of tumors, and give us some insights into the mechanisms of tumor growth and angiogenesis, that complement those obtained by modern molecular methods. Another good example is the comparative analysis of the transcription gene regulatory networks of the E. Coli and S. Cervisae made by Santillan et al. [4], or the interesting work made by Abdollahi et al. [5]. In both articles, the authors noticed how the network properties of the gene networks revealed some interesting data from an evolutionary point of view.
These among many others [6,7,8,9], are good examples of how emergent properties could help us understand the behaviour of biological systems. In particular, the use of network theory is important because it allows the description of a network structure using graph concepts. Furthermore, the observed network topology gives clues about the evolution, structure, which helps us elucidate the dynamics of hundreds of interacting components [10,11,12,13].
In this work, we present an analysis of two angiogenic networks in patients with Hepato-Cellular Carcinoma (HCC). We used a tomography image (obtained from the National Institute of Nutrition of México INNSZ) in order to obtain the vascular network. After the conversion of the image into a binary skeletonized form, we measured some of the network properties; the performed measurements includes the average path length, the clustering coefficient, the degree distribution, and the fractal dimension.
The observed properties of the tumor vasculature as a whole closely correspond to those produced by a new algorithm of random growth process known as Angiogenesis Random Growth Algorithm (ARGA). ARGA models the expansion of an angiogenic network through randomly heuristic rules. We test the network robustness by subjecting the original angiogenic and the synthetic networks produced by ARGA to the removal of the most connected nodes and seeing to what extent the properties changed (in particular the clustering coefficient). Taking into account this robustness, we proposed a hypothetic therapeutic treatment based on the network robustness.
The paper is organized as follows: In Section 2 we present the analysis of the angiogenic network, after converting into a binary skeletonized form from a tomography image and then analyzed its network properties. Section 3 presents a robustness study of the real network compared with those processed by a new algorithm called ARGA. Finally, Section 4 gives some concluding remarks.

2. Analysis of the Angiogenic Network

Angiogenesis is an important natural process that takes into account the growth of new blood vessels that occur in the body, both in health and disease. Angiogenesis is now recognized as one of the critical events required for tumor progression [14], where cancerous growth is dependent on vascular induction and the development of a new vascular supply.
The idea of targeting angiogenesis to inhibit tumor growth was proposed more than three decades ago, and since then, several approaches to block or disrupt tumor angiogenesis have been explored. However, all of these have been focused on the understanding of the molecular behaviour, and only a few in other properties that are not apparent from the molecular point of view.
For instance, some authors have declared: “Angiogenesis in tumors leads to tumor vessels with multiple functional and structural abnormalities. Tumors consist of a chaotic, poorly organized vasculature, with tortuous, irregular shape, and leaky vessels that are often unable to support efficient blood flow and leading to an aberrant vascular system” [15,16]. Furthermore, is it possible to consider that the tumor angiogenesis leads to a poorly organized vasculature without another measurement that the observation in situ. In our opinion, the answer to this question should be supported by some structural analysis. In this context we proposed the following analysis in order to have more elements that show if the vasculature network created by the tumor has this chaotic image, or has some structural elements that are not apparent only from observation that make them in some sense efficient to their purposes.

2.1. Creating the Network from a Image Tomography

The first step in our analysis is to obtain the vascular network from a tomography image. In mathematical terms a network is represented by a graph, which is a pair of sets G = ( P , E ) , where P is a set of nodes (or vertices or points) P 1 , P 2 , , P n and E is a set of edges (or links or lines) that connect two elements of P. Graphs are usually represented as a set of dots, each corresponding to a node, two of these dots being joined by a line if the corresponding nodes are connected.
From the department of radiology of the National Institute of Medical Sciences “Salvador Zuviran” (INNSZ) of Mexico City, we obtained images used by the INNSZ in order to diagnose the development of the malignant tumors of four patients with Hepato-Cellular Carcinoma (HCC) (see Table 1).
The progress in the development of the disease of these patients in the INNSZ is made by a computerized tomogram. This tomograph is not only dedicated to diagnosis of the angiogenesis process, but also other cancerous diseases such as the detection of gliomas, etc. The images taken by the tomogram have a resolution of 960 by 1260 pixels. These images are stored in DICOM format, and using the MedimaIView software we can manipulated it to obtain BMP images with a resolution of 960 by 1240 pixels (8 bits for pixel). From the BMP image we obtain different images with different sizes. In our study we obtained four sizes 32 by 32 pixels, 64 by 64 pixels 128 by 128 pixels and 256 by 256 pixels.
Once the image is obtained in a BMP format we proceed to make a digital processing of the image to obtain a binary skeletonized image. The procedure is as follows [17]:
  • Pre-Processing
    The tomographic images were subjected to a pre-processing stage to obtain the tumor vascular network. Using a representation of the image in 2-D, the first step was to display the image into a gray scale, where each pixel uses an individual value that represents its luminescence, and thus, have greater ease in handling the image. All the tomography images given by the INNSZ were very noisy, making it difficult to identify the blood vessels, so it was decided to make an improvement in the image by adjusting the contrast automatically.
    The representation of an image in an 2-D array is given by the intensity values f ( x , y ) at each image pixel. The arrangement has M rows and N columns, where ( x , y ) are discrete coordinates. We used for convenience integer values for discrete coordinates. Then we have for each coordinate x = 0 , 1 , 2 , , M 1 and y = 0 , 1 , 2 , , N 1 . In a matrix representation obtaining
    f ( x , y ) = f ( 0 , 0 ) f ( 0 , 1 ) f ( 0 , N 1 ) f ( M 1 , 0 f ( M 1 , 1 ) f ( M 1 , N 1 )
    The gray scale adjustment consists of multiplying each RGB component by three constants defined by: α , β and γ . Subsequently, the intensity obtained in each channel is averaged.
    This process subtracts all the color information contained in each pixel and gives a separation of 255 levels between black and white.These three constants are obtained as the separation between the RGB and the black channels as:
    • α : Division between the red and black. (0.2989)
    • β : Division between the green and black. (0.5870)
    • γ : Division between the blue and black. (0.1140)
    Now to obtain the equivalent gray scale value for each pixel we use the following equation:
    I = α * R + β * G + γ * B
    We shall now proceed to the brightness adjustment as the last part of the stage of pre-processing algorithm. Brightness is the percentage of luminescence or darkness of a color. It is possible to go from 0 % which means black, up to 100% which means white. Mathematically, the operation corresponding to the brightness adjustment is: M + B = C , where M corresponds to the image matrix, C corresponds to the adjusted image M, and p is the parameter adjusting brightness whose standard ranges from −100 to 100.
  • Segmentation
    Now proceed to the image segmentation stage in which we obtain the angiogenic network by extracting most of the blood vessels that are connected within the image and store them in a new image. To achieve this we use a threshold which cleaves the image into two classes of objects: blood vessels and background image. Otsu’s method [18] calculates this threshold automatically in the following way: in order to find the value of a threshold T, for which the variance σ B 2 ( T ) between two regions C 0 and C 1 (considering only two regions) is maximum (i.e., the point where the two classes are separated), we use following the equation:
    σ B 2 ( T ) = [ m G P 1 ( T ) m ( T ) ] 2 P 1 ( T ) [ 1 P 1 ( T ) ]
    where, m G is the average gray level of the entire image and P 1 ( T ) is the occurrence probability into the region.
    To separate the blood vessels from the background, the general idea was to label each region of contiguous pixels with a different value, and with this value one can obtain the number of objects in the image which depends on the adjacency used.
  • Obtaining the skeletonized binary form
    Skeletonization of an image makes possible the classification, recognition and simplification of the objects within it, and one of its most important applications is that skeletonization reduces the structural form of an image to a graph. The skeleton tries to represent the shape of an object with a relatively small number of pixels and the position, orientation and length of the skeleton lines correspond to those equivalent to the original image.
    Once the vascular network is segmented we proceed to represent the image network with a relatively smaller number of pixels using the skeleton of the original image. This process generates a binary image which is stored in an array of 0 s and 1 s , where the value of 1 corresponds to the image skeleton, while the value of 0 will be considered the image background.
    The region skeleton can be defined by the transform of the Median Axis Transformation (MAT) proposed by Blum et al. [19]. To define the MAT for each point p in R (the region), we seek if the point p is a close neighbor to B (edges of the region R).
    If p has more than one closed neighbor, it is said to belong to the median axis (i.e., it belongs to the skeleton) of R. It is important to notice that the concept of proximity depends on the definition of distance used. All the procedure is shown in Figure 1.
    It is worthwhile to mention that the skeletonized binary form is a 2D representation of the vascular network, this means that we only have 8 possible neighbors with respect to one single node. This apparently limitation can be overcome considering a 3D model and developing the same steps as those mentioned above. In recent years there have appear other models trying to resemble this process [20,21,22].
Once the skeletonized binary form has been obtained, we proceed to get the graph of the vascular network as follows: we postulate that every image pixel represents a single cell or point into a binary matrix. In order to form the network, it is proposed that every cell occupied (value of one) represents a node into the network. If any of these cells have other adjacent cells with value of one, i.e., occupied, it is possible that nodes are connected with their neighbors, so we assigned an edge between these two nodes, creating in this way the edges of the network, as shown in Figure 2.

2.2. Structure of the Network

We have built from a tomography image a complex network defined as a graph. With this in mind, we can measure some properties related to the complex network just created and try to understand the system behavior as a whole. Motivated by these ideas and considering that many biological networks share properties of the small world networks, we proceed to perform four measurements [17,23], namely,
  • Clustering Coefficient: A common property of complex networks is the cliques that it forms. This inherent tendency to cluster is quantified by the clustering coefficient. Let us analyze briefly the concept; if we focus on a selected node i in the network, having k i edges which connect it to other k i nodes. If the nearest neighbours of the original node were part of a clique, there would be k i ( k i 1 ) / 2 edges between them. The ratio between the number E i of edges that actually exist between these k i nodes and the total number k i ( k i 1 ) / 2 gives the value of the node clustering coefficient i, as;
    C i = 2 E i k i ( k i 1 )
    The clustering coefficient of the whole network is the average of all individual C i .
  • Degree Distribution: The way in which the degree of the nodes is distributed is characterized by the distribution function P ( k ) , which is the probability that a randomly selected node has exactly k edges. For complex networks there are three types of important distributions, which determine different structures or topology of them, namely; Poisson Distribution, Exponential Distribution and Scale-Free Distribution.
    Networks that have a power-type distribution are called scale-free distributions or Power Law distributions. These networks arise in the context of network growth, in which each new node connects preferably to the nodes that are connected to the largest number of nodes in the network. Scale-free networks are also networks of the small world, because they have a coefficient of Clustering larger than a random network and the average of the shortest distance increases logarithmically with the number of nodes N, for this Distribution the probability density function is given by: P ( k ) = C k α [1].
  • Average path length: If we consider a unweighted graph G with the set of edges E and let d ( e 1 , e 2 ) , where e 1 and e 2 , e 1 , e 2 E denote the shortest distance between e 1 and e 2 . Then, the average path length l G is defined as;
    l G = 1 n ( n 1 ) i , j d ( e i , e j )
    where n is the number of vertices of G.
  • Fractal dimension: The fractal dimension is a statistical quantity that gives an indication of how completely a fractal appears to fill space, as one zooms down to finer scales. In order to obtain the fractal dimension we use the box counting method, this method of counting is used to determine the fractal dimension of an irregular object. It consists of covering the object with a grid and counting how many boxes of the grid contain parts of the object. This process is repeated, several times using boxes with sides equal to 1/2 of the size of the previous box [24]. The fractal dimension d is then the slope that is obtained from graphing L o g N ( r ) vs L o g ( 1 / r ) in an equivalent way, the negative of the gradient of graphing L o g N ( r ) vs L o g ( r ) ;
    d = Δ l o g N ( r ) Δ l o g ( r )
Taking into account the aforementioned properties, it is possible to perform these measurements over the binary skeletonized forms obtained from the images of four different patients. We report our results in Table 2.
Figure 3 depicts the skeletonized binary form and the degree distribution for the patient A, as an example of the network that we obtain for this special case.

2.3. Robustness Analysis

Angiogenesis is an important natural process that takes into account the growth of new blood vessels that occur in the body, both in healthy and ill hosts. Angiogenesis is now recognized as one of the critical events required for tumor progression [14]. In other words, cancerous growth is dependent on vascular induction and the development of new vascular supplies.
The idea of targeting angiogenesis to inhibit tumor growth was proposed more than three decades ago, and since then, several approaches to block or disrupt tumor angiogenesis have been explored. However, all of these have been focused on the understanding of the molecular behaviour, and only a few in other properties that are not apparent from the molecular point of view.
Recent studies suggest that a network’s connectivity pattern determines its robustness to external perturbations, such as removal of nodes or links [24]. To test this, we measured the effects of directed attacks and random failures on network organization. These measures were carried out as follows:
  • A given fraction of the vascular network nodes was eliminated from the original network. The nodes to be removed were either chosen as the most connected (directed attacks), or at random (random failures).
  • The network’s emerging was evaluated by calculating their structural properties, namely, the average path length, the clustering coefficient and the degree distribution.
  • The whole process was repeated for several fractions of removed nodes.
In Table 3 and Table 4 we showed the results of the robustness analysis for the real networks for the four patients taken from both directed (Table 3) and at random (Table 4) attacks.
Table 4 shows that for both patients (patient A and B), when we carried a direct attack, the statistical properties were lost after we eliminated nodes with five connections, i.e., the average path length become higher and the clustering coefficient lower, compared with the original. Our calculations also reveal that random removal nodes (see Table 3) have almost the same effect as in the direct attack when removing almost 15% from all the nodes.

3. Computational Modeling of Angiogenic Networks

3.1. Invasion Percolation Algorithm

Some years ago, Baish et al. [3] introduced an algorithm called Invasion Percolation in order to show that the fractal dimensions observed in tumor vasculature closely correspond to those produced by a statistical growth process known as Invasion Percolation [25]. In a more technical sense, Invasion Percolation is an algorithm that models the expansion of a network through a medium with randomly distributed heterogeneities. The resulting network always expands into the weakest available sites, yielding structures with voids on a wide range of length scales and pathways that are tortuous over many scales.
The Invasion-Percolation model is motivated by the problem of a fluid to be dispersed in a porous medium. This principle may be applied to any type of invasion process in which the path shows fluid passage resistance [25]. The porous medium may be represented as a network of pores which are connected between the pores. In an ideal medium the network can be viewed as a matrix in which the cells and their neighborhoods represent the pores and the connections between them. It is assigned random numbers to each cells in order to represent the pore size. The simulation of the fluid path through the pores consists of a series of discrete jumps, where each discrete step will be that offering less resistance (low random number). The Invasion-Percolation model involves a single time, in which the jump is generated in the matrix and provides a unique way to traverse the porous medium.
To show how the Invasion-Percolation algorithm works, we performed several experiments in which some networks were generated with this algorithm. Figure 4a depicts a single example of the synthetic network created by the Invasion-Percolation algorithm, for this case we have used a size of the matrix of 128 × 128 cells. Likewise, Figure 4b shows the distribution of nodes generated by the algorithm, in which it is observed how the distributions does not resembles to that obtained using the patient data (see for example Figure 3b for patient B).
The pseudo-code for Percolation is presented as follows:
Entropy 22 00166 i001
As was mentioned previously, the design of the Invasion Percolation algorithm intents to mimic or model the vasculature shown in real tumors. So, in order to have a trustworthy algorithm that could simulate angiogenic networks, we suggest that it is necessary that the Invasion Percolation algorithm could reproduce some of the properties shown in our angiogenic networks. For this purpose, all the synthetic networks produced by the Invasion Percolation were subjected to a structural analysis (i.e., measuring the average path length, the clustering coefficient and the degree of distribution) and a geometry analysis (i.e., measuring its fractal dimension), both previously proposed for studying real networks. The results obtained are presented in Table 5, which shows the study was made using synthetic networks. It is worthwhile to mention that in order to obtain Table 5 we have run our algorithm around five hundred times for different sizes of the matrix (32 × 32, 64 × 64, 128 × 128, 256 × 256 cells) to obtain as many as possible synthetic networks to work with.
A detailed analysis of Figure 4 and Table 5, it is shown that the Invasion-Percolation algorithm did not share the structural and geometrical properties shown by those obtained from real networks obtained in patients (see for instance, Table 2 and Figure 3). So, in our opinion the Invasion Percolation algorithm should be transformed in order to share the properties aforementioned. In order to address this point it was necessary to design a new algorithm in which we incorporated some strategies to better simulate not only the fractal properties shown by Baish [3], but also the structural properties revealed by the structural analysis made in real networks.

3.2. A New Algorithm Called Arga (Angiogenesis Random Growth Algorithm)

A new algorithm for the generation of angiogenic networks complying with the characteristics of structure and geometry of the modeled network obtained from tomographic images is proposed.
The new algorithm is motivated by the changes that could occur in the medium and responsible for the division of blood vessels. Its aim is to find a pathway through the medium, giving priority to the front feed (from left to right of the matrix) [25].
Similar to the Invasion-Percolation algorithm for network formation an ideal medium is assumed, i.e., it is homogeneous and symmetric. This medium will be represented by a matrix of size n x n and ideally when a change happened in the medium, this will be reflected in a change in the formation behaviour of the synthetic network. However, it is impossible to know these changes in situ. We will simulate these changes using a random variable which varies in time.
Basically, the pseudo-code for ARGA is presented as follows:
Entropy 22 00166 i002
To show how the ARGA algorithm works, we performed several experiments in which some networks were generated with this algorithm. Figure 5a depicts a single example of the synthetic network created by the ARGA algorithm, for this case we have used a size of the matrix of 128 × 128 cells. Likewise, Figure 5b shows the distribution of nodes generated by the algorithm, in which it is observed how the distributions resembles in a better way to those obtained using the patient data (see for example Figure 3b for patient B).
Once we have our algorithm running, we developed hundreds of simulations (it is worthwhile to mention that in order to obtain Table 6 we have run our algorithm around five hundred times for different sizes of the matrix (32 × 32, 64 × 64, 128 × 128, 256 × 256 cells)) to obtain as many as possible synthetic networks to work with. All these synthetic networks produced by ARGA were subjected to a structural analysis (i.e., measuring the average path length, the clustering coefficient and the degree of distribution) and a geometry analysis (i.e., measuring its fractal dimension), both previously proposed for studying real networks. The results obtained are presented in Table 6, using these synthetic networks, the table only shows the average values and the standard deviation obtained for all the synthetic networks.

3.3. Robustness Analysis for the Arga Algorithm

Below are the results obtained from the robustness analysis made to the synthetic networks produced by the ARGA algorithm, using the previous cuts of size (32 × 32, 64 × 64, 128 × 128 and 256 × 256 cells). As explained in Section 2.3 (for the real networks case), the robustness analysis was carried out by attacking the networks, randomly and in directed way, and then characterized them using the proposed structure and geometry analyzes. The full results of the robustness analysis for the case of the networks created by the ARGA algorithm can be seen in Table 7 and Table 8. In these we have shown the results of the robustness analysis for the synthetic networks for four different sizes taken from both directed (Table 7) and random (Table 8) attacks.

4. Concluding Remarks

An analysis has been carried out on the vascular angiogenic network on four patients with Hepato-Cellular Carcinoma (HCC). This analysis consisted of measuring a number of statistical properties of a vascular network obtained from four digital tomographies and digitalized until a binary skeletonized scheme is obtained. From this, we generated a network of nodes and edges which represent the original angiogenetic vascular network. Some interesting observations arising from these measurements are:
  • The clustering coefficient in all 16 generated networks is less than 0.4 . This indicates that they were well connected networks.
  • The degree distribution in all the networks have an exponential tail with the distribution exponent, between 0.6 and 1.1 .
  • The average path length is small in all the networks being between 0.009 and 0.071 .
  • The fractal dimension is found to be around 1.4 .
Many authors have considered that: “Tumor consists of a chaotic, poorly organized vasculature, with tortuous, irregularly shape, and leaky vessels that are often unable to support efficient blood flow and leading to an aberrant vascular system”. From our observations the above consideration is incorrect because we have shown that there is a well connected network (high clustering coefficient); besides, the network has an efficient communication. This is reflected in a small average path length. So, when observing in situ a poorly organized shape, it does not take into account that there are good structural properties that offer support for various dynamical processes, i.e., it is thought that the network topology plays a crucial role, which supports an efficient blood flow among other dynamical properties.
The high interest in scale-free networks in literature might give the impression that all complex networks in nature have power-law degree distributions. It is true for several complex networks of highest interest in the scientific community, such as the World Wide Web, social networks among others, that in all of them the degree distribution has a power-law tail. However, some other networks such as neural and power grid showed exponential degree distributions in literature, and these are called evolving networks [3]. In our case, we have exponential distributions for all the vascular angiogenic networks generated. This means having and evolving a network with aging effects and growth constraints that leads to this exponential decay.
A study of the robustness of the generated angiogenic vascular network has been carried out. We studied the robustness of the network analyzing the connectivity pattern subjected to external perturbations, such as the removal of nodes or links. To test this, the effects of directed attacks and random failures on the network organization were measured.
This study shows that both patients (patient A and B), when we carried a direct attack, their statistical properties were lost after we eliminated nodes with five connections, i.e., the average path length become higher and the clustering coefficient lower, compared with the original. Our calculations also reveal that random removal nodes have almost the same effect as in the direct attack when removing almost 15% from all the nodes.
Taking into account a new kind of algorithm (ARGA) it was shown that this algorithm simulates in a better way the growth of the vascular network than the Invasion-Percolation algorithm. This is clear because with this algorithm it was possible to reproduce, in a better way, the structural and geometric measurements for the real network than with the Invasion-Percolation algorithm. Some interesting observations arising from these measurements (see Table 6) are:
  • The clustering coefficient in all the generated networks is less than 0.3 . This indicate that they were well connected networks, as in the case of real data.
  • The degree distribution in all the networks have an exponential tail with the distribution exponent, between 2.9 and 3.78 .
  • The average path length is small in all the synthetic networks being between 0.03 and 0.09 , as in the case of real data.
  • The fractal dimension is found to be around 1.4 , as in the case of real data.
Furthermore, both algorithms were subjected to a variety of direct attacks and random failures and, for the ARGA algorithm the same effect as in the patients A and B was observed, i.e., all the statistical properties were lost in the same manner as the real networks (see Table 7 and Table 8). However, the Invasion Percolation did not share the behaviour (the experiments are not included in this article) of real networks as the ARGA algorithm did for the case of direct and random attacks. This indicates that in order to simulate in a better way real networks the use of the ARGA algorithm will produce synthetic networks more similar to the real ones.
Taking into account the considerations of the last two paragraphs, and based on the statistical properties of the network, some possible therapies could be suggested. We think that more clinical research related to the structure and robustness of the vascular network for the angiogenic process could be done in order to prove the latter hypothesis.

Author Contributions

Conceptualization, J.C.C.-E.; Investigation, J.C.C.-E., E.C.-M. and R.T.P.-H.; Software, E.C.-M.; Validation, R.T.P.-H.; Writing—original draft, J.C.C.-E. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by “Consejo Nacional de Ciencia y Tecnología” (CONACyT), “Comisión de Operación y Fomento de Actividades Académicas del Instituto Politécnico Nacional” (COFAA-IPN, project number 20196225) and “Estimulos al Desempeño de los Investigadores del Instituto Politécnico Nacional”(EDI-IPN).

Acknowledgments

The authors wish to thanks “Consejo Nacional de Ciencia y Tecnología” (CONACyT), “Comisión de Operación y Fomento de Actividades Académicas del Instituto Politécnico Nacional” (COFAA-IPN, project number 20196225) and “Estimulos al Desempeño de los Investigadores del Instituto Politécnico Nacional” (EDI-IPN) for the support given for this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wodarz, D.; Komarova, N. Computational Biology of Cancer: Lecture Notes and Mathematical Modeling; World Scientific: Singapore, 2005. [Google Scholar]
  2. Folkman, J. Tumor angiogenesis: Therapeutic implications. N. Engl. J. Med. 1971, 285, 1182–1186. [Google Scholar] [PubMed]
  3. Baish, J.W.; Jain, R.K. Fractals and cancer. Cancer Res. 2000, 60, 3683–3688. [Google Scholar] [PubMed]
  4. Guzmán-Vargas, L.; Santillán, M. Comparative analysis of the transcription-factor gene regulatory networks of E. coli and S. cerevisiae. BMC Syst. Biol. 2008, 2, 13. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Abdollahi, A.; Schwager, C.; Kleeff, J.; Esposito, I.; Domhan, S.; Peschke, P.; Hauser, K.; Hahnfeldt, P.; Hlatky, L.; Debus, J.; et al. Transcriptional network governing the angiogenic switch in human pancreatic cancer. Proc. Natl. Acad. Sci. USA 2007, 104, 12890–12895. [Google Scholar] [CrossRef] [Green Version]
  6. Vogelstein, B.; Kinzler, K.W. The Genetic Basis of Human Cancer; McGraw-Hill: New York, NY, USA, 2002. [Google Scholar]
  7. Moolgavkar, S.H.; Knudson, A.G. Mutation and Cancer: A Model for Human Carcinogenesis 2. JNCI J. Natl. Cancer Inst. 1981, 66, 1037–1052. [Google Scholar] [CrossRef]
  8. Preziosi, L. Cancer Modelling and Simulation; CRC Press: Boca Raton, FL, USA, 2003. [Google Scholar]
  9. Gatenby, R.A.; Gawlinski, E.T. The glycolytic phenotype in carcinogenesis and tumor invasion. Cancer Res. 2003, 63, 3847–3854. [Google Scholar]
  10. Balazsi, G.; Barabási, A.L.; Oltvai, Z. Topological units of environmental signal processing in the transcriptional regulatory network of Escherichia coli. Proc. Natl. Acad. Sci. USA 2005, 102, 7841–7846. [Google Scholar] [CrossRef] [Green Version]
  11. Dobrin, R.; Beg, Q.K.; Barabási, A.L.; Oltvai, Z.N. Aggregation of topological motifs in the Escherichia coli transcriptional regulatory network. BMC Bioinform. 2004, 5, 10. [Google Scholar] [CrossRef] [Green Version]
  12. Guelzim, N.; Bottani, S.; Bourgine, P.; Képès, F. Topological and causal structure of the yeast transcriptional regulatory network. Nat. Genet. 2002, 31, 60. [Google Scholar] [CrossRef]
  13. Albert, R.; Jeong, H.; Barabási, A.L. Error and attack tolerance of complex networks. Nature 2000, 406, 378–382. [Google Scholar] [CrossRef] [Green Version]
  14. Hanahan, D.; Weinberg, R.A. The hallmarks of cancer. Cell 2000, 100, 57–70. [Google Scholar] [CrossRef] [Green Version]
  15. Jain, R.K. Molecular regulation of vessel maturation. Nat. Med. 2003, 9, 685–693. [Google Scholar] [CrossRef] [PubMed]
  16. Morikawa, S.; Baluk, P.; Kaidoh, T.; Haskell, A.; Jain, R.K.; McDonald, D.M. Abnormalities in pericytes on blood vessels and endothelial sprouts in tumors. Am. J. Pathol. 2002, 160, 985–1000. [Google Scholar] [CrossRef] [Green Version]
  17. Castillo Montiel, E. Estudio de Neoplasias Malignas Utilizando Dinámica No Lineal. Ph.D. Thesis, Instituto Politécnico Nacional, Centro de Investigación en Computación, Ciudad de México, Mexico, 2009. [Google Scholar]
  18. Otsu, N. A threshold selection method from gray-level histograms. IEEE Trans. Syst. Man Cybern. 1979, 9, 62–66. [Google Scholar] [CrossRef] [Green Version]
  19. Blum, H. A transformation for extracting new descriptors of shape. Models Percept. Speech Vis. Form 1967, 19, 362–380. [Google Scholar]
  20. Stephanou, A.; McDougall, S.R.; Anderson, A.R.; Chaplain, M.A. Mathematical modelling of flow in 2D and 3D vascular networks: Applications to anti-angiogenic and chemotherapeutic drug strategies. Math. Comput. Model. 2005, 41, 1137–1156. [Google Scholar] [CrossRef]
  21. Macklin, P.; McDougall, S.; Anderson, A.R.; Chaplain, M.A.; Cristini, V.; Lowengrub, J. Multiscale modelling and nonlinear simulation of vascular tumour growth. J. Math. Biol. 2009, 58, 765–798. [Google Scholar] [CrossRef] [Green Version]
  22. Dawson, T.H. Modeling of vascular networks. J. Exp. Biol. 2005, 208, 1687–1694. [Google Scholar] [CrossRef] [Green Version]
  23. Newman, M.E. The structure and function of complex networks. SIAM Rev. 2003, 45, 167–256. [Google Scholar] [CrossRef] [Green Version]
  24. Albert, R.; Barabási, A.L. Statistical mechanics of complex networks. Rev. Mod. Phys. 2002, 74, 47. [Google Scholar] [CrossRef] [Green Version]
  25. Wilkinson, D.; Willemsen, J.F. Invasion percolation: A new form of percolation theory. J. Phys. A Math. Gen. 1983, 16, 3365. [Google Scholar] [CrossRef]
Figure 1. Step by Step of the digital processing make to the BMP image to obtain a binary skeletonized form: (a) image in gray scale, (b) Image in binary form, (c) Segmentation procedure, (d) Skeletonized binary form.
Figure 1. Step by Step of the digital processing make to the BMP image to obtain a binary skeletonized form: (a) image in gray scale, (b) Image in binary form, (c) Segmentation procedure, (d) Skeletonized binary form.
Entropy 22 00166 g001
Figure 2. Modeling the complex network (a) binary skeletonized form. (b) Zoom of one part of the skeletonized binary form pixel by pixel (c) Network obtained after the assignation of nodes and edges to each pixel.
Figure 2. Modeling the complex network (a) binary skeletonized form. (b) Zoom of one part of the skeletonized binary form pixel by pixel (c) Network obtained after the assignation of nodes and edges to each pixel.
Entropy 22 00166 g002
Figure 3. (a) Example of the Binary skeletonized form for patient B. (b) Degree distribution obtained from patient B.
Figure 3. (a) Example of the Binary skeletonized form for patient B. (b) Degree distribution obtained from patient B.
Entropy 22 00166 g003
Figure 4. Example of the network generated by Invasion-Percolation algorithm. (a) Network generated by the algorithm. (b) Distribution of nodes generated by the same algorithm.
Figure 4. Example of the network generated by Invasion-Percolation algorithm. (a) Network generated by the algorithm. (b) Distribution of nodes generated by the same algorithm.
Entropy 22 00166 g004
Figure 5. Example of a single network (with a size of 128 × 128 cells) generated by ARGA algorithm. (a) Network generated by the algorithm. (b) Distribution of nodes generated by the same algorithm
Figure 5. Example of a single network (with a size of 128 × 128 cells) generated by ARGA algorithm. (a) Network generated by the algorithm. (b) Distribution of nodes generated by the same algorithm
Entropy 22 00166 g005
Table 1. Characteristics of the four patients studied in the INNSZ, all with Hepato-Cellular Carcinoma (HCC).
Table 1. Characteristics of the four patients studied in the INNSZ, all with Hepato-Cellular Carcinoma (HCC).
Patient Sex Age Date
AFemale4423 November 2007
BMale575 February 2008
CFemale6330 October 2007
DFemale558 March 2007
Table 2. General structural properties of the four networks. For each network we have indicated the number of nodes (size), the average degree k, the clustering coefficient C, the average path length l, the fractal dimension D and the distribution exponent α (this exponent was calculated taking into account a power law distribution).
Table 2. General structural properties of the four networks. For each network we have indicated the number of nodes (size), the average degree k, the clustering coefficient C, the average path length l, the fractal dimension D and the distribution exponent α (this exponent was calculated taking into account a power law distribution).
Image Size kClD α
A (32 × 32)9820.1690.0611.3043.256
A (64 × 64)34030.2790.0351.3953.034
A (128 × 128)63020.2310.0201.3574.0624
A (256 × 256)230120.2260.0101.4094.334
B (32 × 32)7920.1220.0661.2783.302
B (64 × 64)23420.2010.0361.3324.168
B (128 × 128)124820.1800.0091.4704.481
B (256 × 256)224720.1870.0091.3964.222
C (32 × 32)11120.1560.0631.3422.552
C (64 × 64)21120.1520.0291.3013.507
C (128 × 128)98720.2140.0151.4252.703
C (256 × 256)357020.2300.0091.4942.907
D (32 × 32)10320.2510.0711.3223.101
D (64 × 64)42820.2070.0261.4633.320
D (128 × 128)89420.2040.0141.3903.921
D (256 × 256)126020.1690.0101.2914.250
Table 3. Robustness analysis for two networks using a random attack. For each network we have indicated the number of nodes (N), and the number of nodes eliminated randomly ( E N ), beginning with 1% of the nodes (corresponding to the first row of each patient). It is worthwhile to note that 1% corresponds, in the first case, to 3 disconnected nodes; however, when we disconnect these 3 nodes other adjacent nodes are also disconnected, giving 6 in total disconnected nodes. We did the same for 5%, 10% and finally 15%, the average degree k, the average length l, the clustering coefficient C, the fractal dimension D and the exponent of the distribution α . In all the attacks we used images of 64 by 64 pixels.
Table 3. Robustness analysis for two networks using a random attack. For each network we have indicated the number of nodes (N), and the number of nodes eliminated randomly ( E N ), beginning with 1% of the nodes (corresponding to the first row of each patient). It is worthwhile to note that 1% corresponds, in the first case, to 3 disconnected nodes; however, when we disconnect these 3 nodes other adjacent nodes are also disconnected, giving 6 in total disconnected nodes. We did the same for 5%, 10% and finally 15%, the average degree k, the average length l, the clustering coefficient C, the fractal dimension D and the exponent of the distribution α . In all the attacks we used images of 64 by 64 pixels.
PATIENT AN EN klCD α
340630.03390.2791.3900.740
3401820.0390.2621.3870.687
3403520.0510.2671.3260.704
3405230.1220.3031.1440.550
PATIENT B N EN k l C D α
234320.0450.1881.3960.944
2341320.0360.1871.2721.074
2342420.0770.2271.0830.626
2343620.2180.25410.548
Table 4. Robustness analysis for two networks using a direct attack. For each network we have indicated the number of nodes (N), and the number of nodes eliminated ( E N ), beginning with the nodes with 7 connections (this corresponds to the first row of each patient and in parenthesis are the remaining nodes), then the nodes with 6 (corresponding to the second row) and so on, the average degree k, the average length l, the clustering coefficient C, the fractal dimension D and the exponent of the distribution α . In all the attacks we used images of 64 by 64 pixels.
Table 4. Robustness analysis for two networks using a direct attack. For each network we have indicated the number of nodes (N), and the number of nodes eliminated ( E N ), beginning with the nodes with 7 connections (this corresponds to the first row of each patient and in parenthesis are the remaining nodes), then the nodes with 6 (corresponding to the second row) and so on, the average degree k, the average length l, the clustering coefficient C, the fractal dimension D and the exponent of the distribution α . In all the attacks we used images of 64 by 64 pixels.
PATIENT AN EN klCD α
3406 (334)20.030.2621.3920.7984
34019 (315)20.0360.2171.3911.0072
34021 (294)20.0480.2261.2370.78551
34064 (230)20.0600.1181.0891.292
PATIENT B N EN k l C D α
234120.0360.1971.3321.008
234120.0360.1981.3321.223
234720.03640.1641.3260.870
2342830.1100.14410.778
Table 5. General structural properties for networks created by the Invasion-Percolation algorithm for different matrix sizes. After several simulations (we only have reported the average values for each measure) for each size, we have indicated the average number of nodes (average size) N, the average degree k, the average clustering coefficient C, the average path length l and the average of the fractal dimension D, also we have added the standard deviation (in parenthesis) for each size and for each measure.
Table 5. General structural properties for networks created by the Invasion-Percolation algorithm for different matrix sizes. After several simulations (we only have reported the average values for each measure) for each size, we have indicated the average number of nodes (average size) N, the average degree k, the average clustering coefficient C, the average path length l and the average of the fractal dimension D, also we have added the standard deviation (in parenthesis) for each size and for each measure.
Matrix NZClD
32 × 32310 (79.14)40.49 (0.02)0.007 (0.008)1.64 (0.092)
64 × 64837 (235.3)40.44 (0.14)0.08 (0.014)1.62 (0.07)
128 × 1284373 (1515.95)40.477 (0.007)0.018 (0.002)1.72 (0.07)
256 × 25616441 (5876)40.47 (0.006)0.009 (0.0019)1.75 (0.075)
Table 6. General structural properties for networks created by the ARGA algorithm for different matrix sizes. For each size we have indicated the average number of nodes (average size) N, the average degree k, the average clustering coefficient C, the average path length l, the average of the fractal dimension D and the average exponent of the distribution α (this exponent was calculated taking into account a Poisson distribution), also we have added the standard deviation (in parenthesis) for each size and for each measure.
Table 6. General structural properties for networks created by the ARGA algorithm for different matrix sizes. For each size we have indicated the average number of nodes (average size) N, the average degree k, the average clustering coefficient C, the average path length l, the average of the fractal dimension D and the average exponent of the distribution α (this exponent was calculated taking into account a Poisson distribution), also we have added the standard deviation (in parenthesis) for each size and for each measure.
Matrix NZClD α
32 × 32110 (16.2)30.26 (0.08)0.032 (0.001)1.32 (0.125)2.92 (0.67)
64 × 64458 (174.8)30.27 (0.04)0.03 (0.004)1.48 (0.09)3.094 (0.51)
128 × 1281772 (490.31)30.27 (0.025)0.08 (0.002)1.56 (0.06)3.8 (0.48)
256 × 2568522 (3961)30.295 (0.02)0.09 (0.001)1.6 (0.08)3.78 (0.61)
Table 7. Robustness analysis for synthetic networks using a random attack. For each network we have indicated the number of nodes (N), the number of nodes eliminated randomly ( E N ) beginning with 1% of the nodes (corresponding to the first row to the size of the network), for 5%, 10% and finally 15% respectively, the average degree k, the average length l, the clustering coefficient C and the fractal dimension D.
Table 7. Robustness analysis for synthetic networks using a random attack. For each network we have indicated the number of nodes (N), the number of nodes eliminated randomly ( E N ) beginning with 1% of the nodes (corresponding to the first row to the size of the network), for 5%, 10% and finally 15% respectively, the average degree k, the average length l, the clustering coefficient C and the fractal dimension D.
Size (32 × 32 cells)N EN klCD
1%108130.08390.37541.4235
5%108720.08190.38701.415
10%1081220.07370.36061.3853
15%1081830.10300.35451.2682
Size (64 × 64 cells) N EN k l C D
1%483630.04120.33451.4860
5%4832530.04090.33521.402
10%4834930.04560.31851.450
15%4837330.3460.35801.340
Size (128 × 128 cells) N EN k l C D
1%14633220.0170.27081.5544
5%146383720.0260.27671.3553
10%146391120.02980.26681.378
15%1463121620.03190.27801.19
Size (256 × 256 cells) N EN k l C D
1%4231190420.0090.24431.4980
5%423161720.00940.25921.5412
10%4231206020.00640.27571.4808
15%4231376720.0110.27321.200
Table 8. Robustness analysis for the synthetic networks using a direct attack. For each network we have indicated the number of nodes (N), the number of nodes eliminated ( E N ) beginning with the nodes with 7 connections (this corresponds to the first row), then the nodes with 6 (corresponding to the second row) and so on, the average degree k, the average length l, the clustering coefficient C and the fractal dimension D.
Table 8. Robustness analysis for the synthetic networks using a direct attack. For each network we have indicated the number of nodes (N), the number of nodes eliminated ( E N ) beginning with the nodes with 7 connections (this corresponds to the first row), then the nodes with 6 (corresponding to the second row) and so on, the average degree k, the average length l, the clustering coefficient C and the fractal dimension D.
Size (32 × 32 cells)N EN klCD
7108030.08390.37541.4253
6108720.070200.27991.409
5108620.08070.3131.411
41082120.07580.17601.557
Size (64 × 64 cells) N EN k l C D
7483530.04110.32481.4867
64832620.038340.30161.4763
54834820.03340.27091.4685
448312620.10230.10311.05
Size (128 × 128 cells) N EN k l C D
71463420.01800.26141.5592
614632120.01770.24721.5577
514635920.01680.23101.5540
41463135420.03560.0681.1899
Size (256 × 256 cells) N EN k l C D
742311420.01050.25911.5716
642319620.01020.24391.5697
5423132920.00930.22601.5610
44231397120.0220.22391.03

Share and Cite

MDPI and ACS Style

Chimal-Eguía, J.C.; Castillo-Montiel, E.; Paez-Hernández, R.T. Properties of the Vascular Networks in Malignant Tumors. Entropy 2020, 22, 166. https://doi.org/10.3390/e22020166

AMA Style

Chimal-Eguía JC, Castillo-Montiel E, Paez-Hernández RT. Properties of the Vascular Networks in Malignant Tumors. Entropy. 2020; 22(2):166. https://doi.org/10.3390/e22020166

Chicago/Turabian Style

Chimal-Eguía, Juan Carlos, Erandi Castillo-Montiel, and Ricardo T. Paez-Hernández. 2020. "Properties of the Vascular Networks in Malignant Tumors" Entropy 22, no. 2: 166. https://doi.org/10.3390/e22020166

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop