CTIVA: Censored time interval variable analysis

Insoo Kim, Junhee Seok, Yoojoong Kim

    Research output: Contribution to journalArticlepeer-review

    Abstract

    Traditionally, datasets with multiple censored time-to-events have not been utilized in multivariate analysis because of their high level of complexity. In this paper, we propose the Censored Time Interval Analysis (CTIVA) method to address this issue. It estimates the joint probability distribution of actual event times in the censored dataset by implementing a statistical probability density estimation technique on the dataset. Based on the acquired event time, CTIVA investigates variables correlated with the interval time of events via statistical tests. The proposed method handles both categorical and continuous variables simultaneously—thus, it is suitable for application on real-world censored time-to-event datasets, which include both categorical and continuous variables. CTIVA outperforms traditional censored time-to-event data handling methods by 5% on simulation data. The average area under the curve (AUC) of the proposed method on the simulation dataset exceeds 0.9 under various conditions. Further, CTIVA yields novel results on National Sample Cohort Demo (NSCD) and proteasome inhibitor bortezomib dataset, a real-world censored time-to-event dataset of medical history of beneficiaries provided by the National Health Insurance Sharing Service (NHISS) and National Center for Biotechnology Information (NCBI). We believe that the development of CTIVA is a milestone in the investigation of variables correlated with interval time of events in presence of censoring.

    Original languageEnglish
    Article numbere0294513
    JournalPloS one
    Volume18
    Issue number11 November
    DOIs
    Publication statusPublished - 2023 Nov

    Bibliographical note

    Publisher Copyright:
    © 2023 Kim et al.

    ASJC Scopus subject areas

    • General

    Fingerprint

    Dive into the research topics of 'CTIVA: Censored time interval variable analysis'. Together they form a unique fingerprint.

    Cite this