Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

1 Introduction

A clinical practice guideline (CPG) codifies the evidence-based best practice in prescribing the most appropriate disease-specific therapy to patients, subject to available patient data and possible diagnoses [16]. Since the scope of each guideline is limited to a single disease, the evidence-based management of a comorbid patient according to the recommendations concurrently coming from multiple CPGs is difficult and can result in inconsistent and potentially harmful therapies. Often the derivation of a combined therapy directly from the guidelines (even for properly diagnosed comorbid conditions) is incorrect due to adverse interactions between the treatments associated with individual therapies. These interactions manifest directly as contradictory recommendations (e.g., use of steroids is recommended by one CPG and prohibited by the other), or they may correspond to drug-drug or drug-disease adverse interactions resulting in actions that cannot be taken concurrently.

As a matter of fact, concurrent application of two or more CPGs is challenging – it requires designing a sophisticated mechanism for identifying and eliminating potential redundancy in the tests or procedures, identifying contradictions (direct adverse interactions), and for managing discordance (indirect, drug-drug or drug-disease interactions) [17]. As such, it is believed that executing multiple CPGs concurrently requires a new, “combinatorial, logical, or semantic” methodological approach [2].

Our previous research [7, 8, 19] proposes such an approach by introducing and formally defining logical models of CPGs and developing a mitigation algorithm that operates on these models. The algorithm relies on secondary clinical knowledge (i.e., knowledge that goes beyond the primary knowledge encoded in CPGs and that comes from domain experts, textbooks, or repositories of clinical evidence) that is encoded as interaction and revision operators. The operators characterize adverse interactions associated with the concurrent application of CPGs and describe revisions to logical models required to address these interactions. The algorithm employs the constraint logic programming (CLP) paradigm to efficiently solve the logical models, where a solution represents a combined therapy free of adverse interactions.

In the research described here, we move further towards developing a general framework for mitigation by enriching the representation of CPGs using first-order logic (FOL) theories and relying on theorem proving and model finding techniques to process these theories. This expansion is dictated by the following limitations of our previous research:

  • Restricted expressive power of the CLP-based approach that does not allow for explicit representation of properties of objects (e.g., a dosage associated with a specific CPG action) and relationships between objects (e.g., precedence between CPG actions),

  • Limited interpretability of solutions returned by CLP solvers and consequently the need to assign real-world semantics to truth-value assignment of the propositional symbols in the CLP-based model.

FOL significantly improves the expressiveness of our approach by introducing predicates to represent properties and relationships in the domain (in fact, relationships are only first-order definable). Moreover, predicates impose semantics on solutions, facilitating their interpretation from a clinical perspective.

This paper is organized as follows. We start with a brief review of related work. Then, we present the foundations of FOL, theorem proving and model finding that are relevant to our research. Next, we describe the proposed framework – we start with the underlying FOL theories and then present an overview of the mitigation process. We proceed with a simple clinical example that illustrates the application of the framework. Finally, we provide conclusions and directions for our future research.

2 Related Work

Peleg in her recent methodological review [12] divided the research on computer-interpretable CPGs into eight themes: (1) modeling, (2) acquisition and specification, (3) integration in combination with electronic patient record, (4) validation and verification, (5) execution, (6) exception handling, (7) maintenance, and finally (8) sharing. According to such categorization, our research discussed here belongs to the validation and verification theme. This theme is further subdivided into three problems: (1) checking for internal consistency and existence of anomalies, (2) checking for existence of desired properties and (3) checking for the inconsistencies between multiple CPGs applied to a comorbid patient.

The first problem from the above list was addressed for example in [1], where the authors proposed a knowledge-based detection method for checking the consistency of a CPG represented in ASBRU. The second problem was described in [14], where model checking was applied for authoring and verification of CPGs represented in UML. Moreover, in [18] theorem proving techniques were used to check whether a guideline for managing jaundice in newborns complies with certain properties. Finally, [13] described a comprehensive framework employing ontological domain knowledge and abductive reasoning to evaluate the completeness and appropriateness of a CPG, and to assess the compliance of physician’s actions with this CPG.

The research related to the last verification problem is still in its relatively early stages despite its clinical importance. Proposed solutions vary from manual interventions, where human experts verify and combine multiple CPGs using a specialized editing tool [15], through semi-automatic approaches, where experts resolve automatically discovered conflicts [3], to fully automatic techniques [4, 5]. In [4] the authors proposed an approach that operates on ontological models of CPGs and applies ontology merging techniques to combine these models so that medical, work-flow, institutional and temporal constraints are satisfied. A different approach was described in [5], where individual CPGs are merged according to the combination rules that capture possible drug-drug interactions and prescribe ways of avoiding them.

3 Background

3.1 Foundations of FOL

The formal language of FOL relies on logical and non-logical symbols. The logical symbols (connectives, quantifiers, variables) are those that have a fixed meaning in a language. The non-logical symbols are those that have an application-dependent meaning (e.g., symbols needed to represent a CPG in FOL) and they are further categorized into function symbols and predicate symbols. Each non-logical symbol has an arity, indicating how many arguments it requires. A function symbol with arity 0 is called a constant and a predicate symbol with arity 0 is called a propositional symbol.

FOL allows for two types of syntactic expressions: terms (made of variables, constants and functions) and formulas (composed of terms, predicates and connectives). Formulas with variables bounded by quantifiers and formulas without variables (i.e., grounded formulas) are called sentences. A FOL theory \(\mathcal {D}\) is a collection of sentences.

An interpretation \(\mathcal {I}\) (sometimes called a structure) in FOL is defined as triple:

$$\begin{aligned} \mathcal {I}=\left\langle \mathcal {I}_{domain}, \mathcal {I}_{predicate}, \mathcal {I}_{function}\right\rangle , \end{aligned}$$
(1)

where

  • \(\mathcal {I}_{domain}\) is any nonempty set of objects under consideration called the domain of the interpretation,

  • \(\mathcal {I}_{predicate}\) is a set of interpretation mappings over \(\mathcal {I}_{domain}\),

  • \(\mathcal {I}_{function}\) is a set of functions over \(\mathcal {I}_{function}\).

Mappings from \(\mathcal {I}_{predicate}\) assign meaning to the predicate symbols as follows: for every predicate symbol \(P\) of arity \(n\), \(\mathcal {I}[P] \in \mathcal {I}_{predicate}\) is an \(n\)-ary relation over \(\mathcal {I}_{domain}\), that is \(\mathcal {I}[P]\subseteq I_{domain} \times \ldots \times I_{domain}\).

Mappings from \(\mathcal {I}_{function}\) assign meaning to the function symbols as follows: for every function symbol \(F\) of arity \(n\), \(\mathcal {I}[F] \in \mathcal {I}_{function}\) is an \(n\)-ary function over \(\mathcal {I}_{domain}\), that is \(\mathcal {I}[F] \in \left[ \mathcal {I}_{domain} \times \ldots \times \mathcal {I}_{domain} \rightarrow \mathcal {I}_{domain}\right] \).

Given an interpretation \(\mathcal {I}\), we can check which sentences of a FOL theory \(\mathcal {D}\) are true and which are false according to this interpretation. If a sentence \(\phi \in \mathcal {D}\) is true given \(\mathcal {I}\), then we write it formally as \(\mathcal {I} ~\models _m~ \phi \). Moreover, if \(\mathcal {I}\) satisfies all sentences in \(\mathcal {D}\), then it is called a model for theory \(\mathcal {D}\) and formally it is denoted as \(\mathcal {I} ~\models _m~ \mathcal {D}\).

3.2 Theorem Proving and Model Finding

There are three fundamental questions that are associated with FOL theories:

  1. 1.

    Is a given theory consistent?

  2. 2.

    What is a model for a consistent theory?

  3. 3.

    What are logical consequences (implications) of a consistent theory?

A FOL theory \(\mathcal {D}\) is consistent (or satisfiable), iff there exists at least one model of this theory. The question on the consistency of \(\mathcal {D}\) can be answered using theorem proving [11] that employs automatic reasoning (the resolution method) to construct a proof for \(\mathcal {D}\). However, theorem proving techniques provide only a binary answer to the consistency question and no model is directly returned, even if it exists (i.e., when the answer is positive). In order to answer the question about a model for a consistent theory, one needs to use model finding techniques that can be considered as a special case of solving the constraint satisfaction problem [20], where possible interpretations are generated until a model is found.

The question about logical consequences is translated into checking if a FOL theory \(\mathcal {D}\) entails sentence \(\phi \) (or \(\phi \) is a logical consequence of \(\mathcal {D}\)). Formally, we say \(\mathcal {D}\) entails \(\phi \), written as \(\mathcal {D} ~\models ~ \phi \), iff, for every interpretation \(\mathcal {I}\) such that \(\mathcal {I} ~\models _m~ \mathcal {D}\), we have \(\mathcal {I} ~\models _m~ \phi \). In other words, we say \(\mathcal {D}\) entails \(\phi \) (or \(\phi \) can be deduced from \(\mathcal {D}\)), if \(\phi \) is satisfied by all models for \(\mathcal {D}\).

The entailment \(\mathcal {D} ~\models ~ \phi \) can be translated into checking whether a new theory \(\mathcal {D} \cup \{\lnot \phi \}\) is not consistent. This means that theorem proving techniques can equivalently be used to check for logical entailments of a theory \(\mathcal {D}\).

4 Methodology

Using FOL in a framework for the mitigation of concurrently applied CPGs relies on four key components that are listed below and described in the following sections:

  1. 1.

    A vocabulary used to construct the FOL theory describing a particular mitigation problem (further referred to as to combined mitigation theory),

  2. 2.

    A combined mitigation theory composed of individual theories that describe various aspects of the mitigation problem,

  3. 3.

    A set of operators that encode the secondary knowledge needed to identify and address adverse interactions associated with the combined mitigation theory,

  4. 4.

    A mitigation algorithm that controls the application of operators to the combined mitigation theory.

4.1 Vocabulary

Following our previous work, we assume a CPG is represented as an actionable graph (AG) [19]. An AG is a directed graph composed of three types of nodes context, action, and decision, and arcs that represent transitions between nodes. A context node defines an entry point and indicates the disease associated with the CPG, an action node indicates a clinical action that needs to be executed, and a decision node indicates a selection from several alternative choices and allows for conditional branching.

Table 1. Defined predicates

The vocabulary of our FOL-based approach is composed of constants (denoted with upper case letters), variables (denoted with lower case letters) and predicates. The predicates used in the mitigation problem are listed in Table 1. We note there is no predicate corresponding to a context node, as information embedded in this node is provided by the predicate \(disease(d)\).

4.2 Combined Mitigation Theory

We use the vocabulary to construct a combined mitigation theory. Formally, this combined theory \(\mathcal {D}_{comb}\) is defined as a triple:

$$\begin{aligned} \mathcal {D}_{comb} = \left\langle \mathcal {D}_{common}, \mathcal {D}_{cpg}, \mathcal {D}_{pi}\right\rangle , \end{aligned}$$
(2)

where:

  • \(\mathcal {D}_{common}\) is a theory that axiomatizes the universal characteristics of CPGs as part of the FOL representation. It is the common (shared and reusable) component of all mitigation theories and it contains the following axioms (for brevity we limit the list to the most relevant ones):

    • \(\forall x,y~directPrec(x, y) \Rightarrow prec(x, y)\) – association between precedence and direct precedence,

    • \(\forall x,y,z~prec(x,y) \wedge prec(y,z) \Rightarrow prec(x,z)\) – transitivity of precedence,

    • \(\forall x, y,~prec(x,y) \wedge prec(y,x) \Rightarrow x = y\) – antisymmetry of precedence,

    • \(\forall x~node(x) \Rightarrow (action(x) \wedge \lnot decision(x)) \vee (\lnot action(x) \wedge decision(x))\) – ensures that a node cannot be simultaneously an action and decision node,

    • \(\forall x,n~dosage(x,n) \Rightarrow action(x)\) – ensures that only an action node can be characterized with medication dosage,

    • \(\forall x,v~value(x,v) \Rightarrow decision(x)\) – ensures that only a decision node can be characterized by a value,

    • \(\forall d~diagnosed(d) \Rightarrow disease(d)\) – ensures that the diagnosed disease is the same as the disease to be managed.

  • \(\mathcal {D}_{cpg}\) is a union of theories, each theory representing a single AG (and thus the underlying CPG) that are being applied to a comorbid patient:

    $$\begin{aligned} \mathcal {D}_{cpg} = \mathcal {D}_{cpg}^{d_1} \cup \mathcal {D}_{cpg}^{d_2} \cup \ldots \cup \mathcal {D}_{cpg}^{d_k}, \end{aligned}$$
    (3)

    where \(\mathcal {D}_{cpg}^{d_i}\) is the theory that describes the AG associated with disease \(d_i\) by enlisting all nodes and paths, giving information about precedence between nodes and providing information on dosages associated with selected action nodes. Because of axioms in \(\mathcal {D}_{common}\) it is sufficient to define only direct precedence between nodes (\(directPrec\) predicate) – precedence between nodes represented with the \(prec\) predicate is derived automatically,

  • \(\mathcal {D}_{pi}\) is the theory that describes available patient information. It contains sentences representing patient data, including results of tests and examinations, and indicating already prescribed therapies and procedures.

4.3 Interaction and Revision Operators

Interaction and revision operators were introduced in our previous research [19]. Here we reformulate them to account for the FOL-based representation and to enhance their capabilities (e.g., a revision operator may specify multiple operations – details provided below). An interaction operator \(IO^k\) encodes knowledge about indirect adverse interactions (usually drug-drug or drug-disease) and formally it is defined as:

$$\begin{aligned} IO^k=\left\langle \alpha ^k \right\rangle , \end{aligned}$$
(4)

where \(\alpha ^k\) is a sentence (constructed with the vocabulary described in Sect. 4.1) describing a specific indirect interaction. Checking whether \(IO^k\) is applicable to \(\mathcal {D}_{comb}\) (or in other words, if the interaction represented by \(IO^k\) occurs in \(\mathcal {D}_{comb}\)) is an entailment problem \(\mathcal {D}_{comb} ~\models ~ \alpha ^k\).

A revision operator encodes knowledge about the revisions that need to be introduced to the theory \(\mathcal {D}_{cpg}\) in order to address encountered interactions (both direct and indirect). In layman terms, it describes changes that need to be introduced to concurrently applied CPGs. Formally, a revision operator \(RO^k\) is defined as:

$$\begin{aligned} RO^k=\left\langle \beta ^k,Op^k \right\rangle , \end{aligned}$$
(5)

where \(\beta ^k\) is a logical sentence that defines the applicability of the operator to the theory \(\mathcal {D}_{cpg}\), and \(Op^k\) describes the revisions introduced by \(RO^k\). In particular, \(Op^k\) is a set of \(n\) pairs of formulas \(\left\langle \phi _i^k,\psi _i^k \right\rangle \) (\(i=1 \ldots n\)) that define single operations within the operator. As already stated, these operations are applied only to \(\mathcal {D}_{cpg}\), so other components of \(\mathcal {D}_{comb}\) are protected from unwanted revisions. For example, \(\mathcal {D}_{pi}\) is never modified thus patient information is never inadvertently changed. The pairs of formulas are interpreted as follows (\(\emptyset \) indicates an empty formula):

  • \(\left\langle \phi _i^k, \emptyset \right\rangle \) means that \(\phi _i^k\) is removed from any sentence in \(\mathcal {D}_{cpg}\) where it appears,

  • \(\left\langle \emptyset , \psi _i^k \right\rangle \) means that \(\psi _i^k\) is added as a new sentence to \(\mathcal {D}_{cpg}\),

  • \(\left\langle \phi _i^k, \psi _i^k \right\rangle \) means that \(\phi _i^k\) is replaced by \(\psi _i^k\) in any sentence in \(\mathcal {D}_{cpg}\) where it appears.

It is possible to use unbounded variables in \(\phi _i^k\) and \(\psi _i^k\) and these are interpreted as “wildcards” that are bound to a constant specific to a patient encounter when revisions are being introduced. For example, one can define an operation that increases the dosage of a medication by a given amount. Moreover, checking the applicability of \(RO^k\) to \(\mathcal {D}_{comb}\) is analogous to checking the applicability of \(IO^k\) and translates into the entailment problem \(\mathcal {D}_{comb} ~\models ~ \beta ^k\). In case of direct interactions this entailment problem is simplified – details are given in the next section.

4.4 Mitigation Algorithm

The algorithm consists of two phases and it is outlined in Fig. 1. The first phase involves mitigating direct adverse interactions. Their identification translates into checking the consistency of the \(\mathcal {D}_{comb}\) theory (note that in order to check for consistency and entailment we need to create a temporary theory that is a union of all three components in \(\mathcal {D}_{comb}\)). If the theory is consistent, then it indicates there are no direct interactions and the algorithm passes to the second phase. Otherwise, the theory \(\mathcal {D}_{comb}\) (specifically its \(\mathcal {D}_{cpg}\) component) needs to be revised using applicable revision operators.

Since \(\mathcal {D}_{comb}\) is inconsistent, entailment cannot be used to find applicable revision operators, as entailment problems can only be formulated over a consistent theory. Instead, we use the following procedure. First, we identify actions shared across individual theories (i.e., theories representing single CPGs) in \(\mathcal {D}_{comb}\). Then, for each shared action \(x_s\) we check whether execution of this action and its negation are entailed by individual theories (i.e., \(\mathcal {D}_{cpg}^{d_i} ~\models ~ executed(x_s)\) and \(\mathcal {D}_{cpg}^{d_j} ~\models ~ \lnot executed(x_s)\)). Such entailments indicate inconsistency caused by \(x_s\). Finally, we identify applicable \(RO^k\) by solving a simplified entailment problem: \(executed(x_s) ~\models ~ \beta ^k\). The algorithm may stop here, reporting a failure to indicate that \(\mathcal {D}_{comb}\) is still inconsistent, if it has failed to address the encountered direct interaction.

Fig. 1.
figure 1

Outline of the mitigation algorithm.

The second phase identifies and addresses indirect adverse interactions. It starts by identifying applicable interaction operators (for an operator \(IO^k\) this translates to checking the entailment \(\mathcal {D}_{comb} ~\models ~ \alpha ^k\)). If there is no applicable operator, then this means that there are no indirect interactions or they have been already addressed, and the algorithm finds a model for \(\mathcal {D}_{comb}\). This model is equivalent to a solution in the CLP-based mitigation framework, and using its \(\mathcal {I}_{predicate}\) component it is possible to construct a combined therapy for a patient. This combined therapy highlights the clinical actions to be taken (\(executed\) and \(dosage\) predicates) along with the order in which they should be carried out (\(prec\) predicates), and includes the assumptions made about the patient’s state (\(value\) predicates). Note that the combined therapy contains only these predicates that have not been provided as part of \(\mathcal {D}_{pi}\), thus it is focused on future (suggested) actions and possible (assumed) patient state.

On the other hand, if direct interactions exist (there is at least one \(IO^k\) applicable to \(\mathcal {D}_{comb}\)), the algorithm attempts to revise \(\mathcal {D}_{comb}\) using applicable revision operators, where checking applicability of an operator \(RO^k\) is formulated as an entailment problem (\(\mathcal {D}_{comb} ~\models ~ \beta ^k\)). In our previous research we assumed that an interaction had to be addressed by a single applicable revision operator. In this framework we relax this assumption and allow for more complex adverse interactions that may need to be mitigated by multiple revision operators. There is an additional explicit check if \(\mathcal {D}_{comb}\) has been revised to avoid indefinite loops if there is no applicable \(RO^k\). If the revised \(\mathcal {D}_{comb}\) is consistent, then the algorithm checks again for an applicable \(IO^k\), otherwise it fails. This loop is repeated until there are no more applicable interaction operators.

The implementation of the mitigation algorithm involves a number of software tools that were developed for FOL theories. In this research we are using Prover9 [19] to check consistency of all theories and to execute the entailment required for the identification and use of the operators. Moreover, we are using a model finding technique implemented in Mace4 [6] that returns a model on top of a theory that has been verified as a consistent one. The performance of Prover9 was verified on a set of benchmark FOL problems and compared to other solvers in [10]. The results show it was among two best performing solvers and for most of the considered problems the proofs were generated in seconds when running on a personal computer. The running times we observed in our tests were comparable or even shorter, thus they are negligible with regards to the patient management process. Moreover, the mitigation algorithm and its implementation are not bound to Prover9 and Mace4, thus they can be easily replaced by more efficient solvers, if performance becomes an issue.

5 Illustrative Example

In this section we illustrate our proposed FOL-based mitigation framework using the simple clinical case also used in [19]. The purpose of using the same example is to show how the methodology proposed here extends our earlier research. According to this example, a patient, who is treated for a duodenal ulcer (DU), experiences an episode of transient ischemic attack (TIA). AGs used in this example are derived from the guidelines published by the National Institute for Health and Clinical Excellence, UK (NICE) [9] and they have been simplified to include only the relevant action and decision nodes.

Fig. 2.
figure 2

Actionable graph for DU (\(AG_{DU}\)).

Fig. 3.
figure 3

Actionable graph for TIA (\(AG_{TIA}\)).

Fig. 4.
figure 4

The \(D_{cpg}^{DU}\) theory representing the CPG for DU.

5.1 Actionable Graphs

Figures 2 and 3 present AGs for DU and TIA simplified guidelines respectively. In these figures the context nodes are indicated with circles, decision nodes are indicated with diamonds, and action nodes with rectangles. The figures also label constants associated with specific nodes and constants corresponding to alternative choices – they are given in square brackets after node and choice descriptions. For example, the HP constant is associated with the “H.pylori” decision node (checking for the presence of helicobacter pylori). There are two alternative choices at this decision node positive and negative. They are represented as P and N constants respectively.

Fig. 5.
figure 5

The \(D_{cpg}^{TIA}\) theory representing the CPG for TIA.

Fig. 6.
figure 6

Interaction and revision operators.

5.2 Theories

The AGs are converted into the respective theories, \(\mathcal {D}_{cpg}^{DU}\) for DU and \(\mathcal {D}_{cpg}^{TIA}\) for TIA, illustrated in Figs. 4 and 5. As can be seen, this representation captures precedence relationships and attaches semantics to each node. All paths in the corresponding AG are described using a single sentence (a disjunction of conjunctions, where each conjunction corresponds to a single path). Each path contains formulas with the negated \(executed\) predicate to indicate these actions are not executed for a given path.

5.3 Operators

Interaction and revision operators associated with clinical scenarios discussed below are given in Fig. 6 (for clarity only most relevant operations within revision operators are presented). Their interpretation is as follows:

  • \(IO^1\) represents a drug-disease interaction (the increased risk of bleeding) that occurs when a DU patient is given aspirin (A) without a proton-pump inhibitor (PPI).

  • \(RO^1\) is applicable to a patient diagnosed with DU who has been prescribed aspirin (A) without a proton-pump inhibitor (PPI), and has not been prescribed dipyridamole (D). In such case, the patient is taken off of aspirin and prescribed clopidogrel (CL).

  • \(RO^2\) is applicable to a patient diagnosed with DU who has been prescribed aspirin (A) without a proton-pump inhibitor (PPI), and also has been prescribed dipyridamole (D). In such case, the patient is prescribed a proton-pump inhibitor (PPI) and dosage of aspirin (A) is reduced by 50 milligrams (mg).

5.4 Scenario 1: No Adverse Interactions

In this scenario we assume a patient suffering from DU who has tested positive for H.pylori (HP) and is undergoing eradication therapy (ET), on presentation to the emergency department with TIA symptoms has tested negative for hypoglycemia (HG) and the result of FAST test (FAST) is negative. The theory \(\mathcal {D}_{pi}\) describing this patient is given in Fig. 7.

Fig. 7.
figure 7

The \(\mathcal {D}_{pi}\) describing the patient information in Scenario 1.

We create a theory \(\mathcal {D}_{comb}\) to describe this specific patient encounter, where \(\mathcal {D}_{cpg}\) are the union of \(\mathcal {D}_{cpg}^{DU}\) and \(\mathcal {D}_{cpg}^{TIA}\) discussed in Sect. 5.2.

The mitigation algorithm begins by applying theorem proving technique and checking if \(\mathcal {D}_{comb}\) is consistent. Since the theory is consistent, the algorithm infers that no direct interactions exist. At this stage the mitigation algorithm proceeds to the second phase and checks for the existence of an indirect interaction. It starts with \(IO^1\) by formulating the entailment problem \(\mathcal {D}_{comb} ~\models ~ \alpha ^1\). Because \(\alpha ^1\) is not entailed by \(\mathcal {D}_{comb}\) (i.e., there exists at least one model, where \(\alpha ^1\) is not satisfied), there are no indirect interactions present in the theory and the mitigation algorithm uses model finding techniques to find a model for the theory \(\mathcal {D}_{comb}\). One such model is found and used to create a combined therapy given in Fig. 8 (for brevity we omitted the \(prec\) predicates).

Fig. 8.
figure 8

Combined therapy created for Scenario 1.

According to the combined therapy the patient should be prescribed a proton-pump inhibitor (\(executed(PPI)\)) and since the result of the endoscopy (UE) is not known (neither \(value(UE, H)\) nor \(value(UE, NH)\) is included in \(\mathcal {D}_{pi}\)), the combined therapy assumes a healed ulcer (\(value(UE, H)\)) and suggests self-care (\(executed(SC)\)) for DU and a referral to a primary care specialist for TIA (\(executed(PCS)\)). Such a combined therapy is returned by the mitigation algorithm and presented to the physician along with the known patient state (\(\mathcal {D}_{pi}\)). The physician evaluates the therapy by checking the appropriateness of assumptions made, such as the assumption of a healed ulcer in this particular scenario. If she deems some of these assumptions to be inappropriate, new patient information needs to be collected and the mitigation algorithm needs to be invoked again to generate a new combined therapy.

5.5 Scenario 2: Adverse Interactions Present

In this scenario we consider a patient suffering from DU, who has tested negative for H.pylori (HP) and positive for Zollinger-Ellison syndrome (ZES), and who on presentation to the emergency department with TIA symptoms has tested negative for hypoglycemia (HG), passed FAST test, has had neurological symptoms (NS) resolved, and for whom the risk of stroke (RST) has been evaluated as elevated. The theory \(\mathcal {D}_{pi}\) describing this patient is given in Fig. 9.

Fig. 9.
figure 9

The \(\mathcal {D}_{pi}\) describing the patient information in Scenario 2.

Similarly to the previous scenario, \(\mathcal {D}_{comb}\) is consistent and as such no direct interactions exist. To check for the existence of an indirect interaction we consider \(IO^1\) and formulate the entailment problem \(\mathcal {D}_{comb} ~\models ~ \alpha ^1\). This time \(\alpha ^1\) is entailed by \(\mathcal {D}_{comb}\) (it is satisfied by each model of \(\mathcal {D}_{comb}\)) indicating that an indirect interaction exists.

Following the steps of the mitigation algorithm, we resolve an indirect interaction by selecting a relevant revision operator to revise \(\mathcal {D}_{cpg}\). A relevant operator is found by iterating over available revision operators and formulating the entailment problem \(\mathcal {D}_{cpg} ~\models ~ \beta ^k\) for each revision operator \(RO^k\). In this scenario, for \(RO^1\) \(\beta ^1\) is not entailed by \(\mathcal {D}_{comb}\) as there exists at least one model that does not satisfy \(\beta ^1\). This indicates that \(RO^1\) is not a relevant revision operator. Next, the algorithm considers \(RO^2\) and formulates the entailment problem \(\mathcal {D}_{comb} ~\models ~ \beta ^2\). Now \(\beta ^2\) is entailed by \(\mathcal {D}_{comb}\) and \(RO^2\) is considered a relevant revision operator.

Fig. 10.
figure 10

Combined therapy created for Scenario 2 (underlined entries have been introduced by the revision operator).

The algorithm revises \(\mathcal {D}_{comb}\) by modifying \(\mathcal {D}_{cpg}\) according to the operations \(Op^2\) defined in \(RO^2\). These operations introduce a proton pump inhibitor (in fact \(\lnot executed\) \((PPI)\) is replaced by \(executed(PPI)\) to avoid direct interaction) and reduce the dosage of aspirin by 50 mg to 250 mg (replacing \(dosage(A,\) \(300)\) with \(dosage(A, 250)\)). After making these revisions, the mitigation algorithm checks if the revised \(\mathcal {D}_{comb}\) is consistent. Since it is, the algorithm finds a model for the revised \(\mathcal {D}_{comb}\) that includes the modified \(\mathcal {D}_{cpg}\). This model is used to derive the combined therapy given in Fig. 10 (again the \(prec\) predicates are excluded for brevity).

According to the combined therapy, the patient is prescribed PPI (\(executed(PPI)\)) and referred to a specialist for DU (\(executed(RS)\)). Also the therapy prescribes aspirin (\(executed(A)\)) with the dosage adjusted to 250 mg (\(dosage(A, 250)\)), prescribes dipyridamole (\(executed(D)\)) with the dosage set to 75 mg (\(dosage(D, 75)\)), and schedules an outpatient neurological consult for TIA (executed(NC)). As in the previous scenario, such combined therapy is presented for evaluation to the physician who may invoke the algorithm again once additional patient information becomes available.

6 Conclusions

We believe that FOL allows for a more flexible representation by including predicates to represent properties of domain objects, temporal relationships, and flexibly quantified sentences. In this paper we presented how using FOL theories allows us to augment the expressiveness of representation in order to capture intrinsic characteristics of the CPGs and combined therapies, and thus provides for a more complete mitigation framework. Using a simple clinical example we demonstrated the semantic interpretability of the models and combined therapies. In our earlier CLP-based framework we had to manually interpret the solutions, distinguishing between action and decision steps, and constructing temporal relationships to impose order in which steps should be taken. The new framework discussed here addresses all these shortcomings.

Presented new framework allows us to deal with such “hard” issues associated with CPGs as, for example, loops. This improved expressiveness comes at the cost of limited comprehensibility by non-experts. However, considering that we envisage the proposed framework to be embedded within a larger clinical decision support system that will present results of mitigation in a user-friendly way, a modeling complexity should not be an issue because actual model will not be seen/presented to a clinician. Only development of the operators will require direct involvement of a clinician, and this process will be guided by a knowledge transfer specialist.

For future research, we are working on a different representation of paths in \(\mathcal {D}_{cpg}^{d_i}\), so disjunctions of conjunctions can be avoided, and on more sophisticated search methods employed by the mitigation algorithm to identify suitable revision operators. Considering that the ultimate goal of our research is to develop a generalized framework of mitigation, we are also studying different clinical situations involving comorbid patients to extract the full set of properties of CPGs that hold across mitigation scenarios.