-
Can Foundational Large Language Models Assist with Conducting Pharmaceuticals Manufacturing Investigations?
Authors:
Hossein Salami,
Brandye Smith-Goettler,
Vijay Yadav
Abstract:
General purpose Large Language Models (LLM) such as the Generative Pretrained Transformer (GPT) and Large Language Model Meta AI (LLaMA) have attracted much attention in recent years. There is strong evidence that these models can perform remarkably well in various natural language processing tasks. However, how to leverage them to approach domain-specific use cases and drive value remains an open…
▽ More
General purpose Large Language Models (LLM) such as the Generative Pretrained Transformer (GPT) and Large Language Model Meta AI (LLaMA) have attracted much attention in recent years. There is strong evidence that these models can perform remarkably well in various natural language processing tasks. However, how to leverage them to approach domain-specific use cases and drive value remains an open question. In this work, we focus on a specific use case, pharmaceutical manufacturing investigations, and propose that leveraging historical records of manufacturing incidents and deviations in an organization can be beneficial for addressing and closing new cases, or de-risking new manufacturing campaigns. Using a small but diverse dataset of real manufacturing deviations selected from different product lines, we evaluate and quantify the power of three general purpose LLMs (GPT-3.5, GPT-4, and Claude-2) in performing tasks related to the above goal. In particular, (1) the ability of LLMs in automating the process of extracting specific information such as root cause of a case from unstructured data, as well as (2) the possibility of identifying similar or related deviations by performing semantic search on the database of historical records are examined. While our results point to the high accuracy of GPT-4 and Claude-2 in the information extraction task, we discuss cases of complex interplay between the apparent reasoning and hallucination behavior of LLMs as a risk factor. Furthermore, we show that semantic search on vector embedding of deviation descriptions can be used to identify similar records, such as those with a similar type of defect, with a high level of accuracy. We discuss further improvements to enhance the accuracy of similar record identification.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Belief Control Strategies for Interactions over Weakly-Connected Graphs
Authors:
Hawraa Salami,
Bicheng Ying,
Ali H. Sayed
Abstract:
In diffusion social learning over weakly-connected graphs, it has been shown recently that influential agents shape the beliefs of non-influential agents. This paper analyzes this mechanism more closely and addresses two main questions. First, the article examines how much freedom influential agents have in controlling the beliefs of the receiving agents, namely, whether receiving agents can be dr…
▽ More
In diffusion social learning over weakly-connected graphs, it has been shown recently that influential agents shape the beliefs of non-influential agents. This paper analyzes this mechanism more closely and addresses two main questions. First, the article examines how much freedom influential agents have in controlling the beliefs of the receiving agents, namely, whether receiving agents can be driven to arbitrary beliefs and whether the network structure limits the scope of control by the influential agents. Second, even if there is a limit to what influential agents can accomplish, this article develops mechanisms by which they can lead receiving agents to adopt certain beliefs. These questions raise interesting possibilities about belief control over networked agents. Once addressed, one ends up with design procedures that allow influential agents to drive other agents to endorse particular beliefs regardless of their local observations or convictions. The theoretical findings are illustrated by means of examples.
△ Less
Submitted 5 November, 2018; v1 submitted 16 January, 2018;
originally announced January 2018.
-
Social Learning over Weakly-Connected Graphs
Authors:
Hawraa Salami,
Bicheng Ying,
Ali H. Sayed
Abstract:
In this paper, we study diffusion social learning over weakly-connected graphs. We show that the asymmetric flow of information hinders the learning abilities of certain agents regardless of their local observations. Under some circumstances that we clarify in this work, a scenario of total influence (or "mind-control") arises where a set of influential agents ends up sha** the beliefs of non-in…
▽ More
In this paper, we study diffusion social learning over weakly-connected graphs. We show that the asymmetric flow of information hinders the learning abilities of certain agents regardless of their local observations. Under some circumstances that we clarify in this work, a scenario of total influence (or "mind-control") arises where a set of influential agents ends up sha** the beliefs of non-influential agents. We derive useful closed-form expressions that characterize this influence, and which can be used to motivate design problems to control it. We provide simulation examples to illustrate the results.
△ Less
Submitted 6 January, 2017; v1 submitted 13 September, 2016;
originally announced September 2016.
-
A framework for reuse of multi-view UML artifacts
Authors:
Hamza Onoruoiza Salami,
Moataz Ahmed
Abstract:
Software is typically modeled from different viewpoints such as structural view, behavioral view and functional view. Few existing works can be considered as applying multi-view retrieval approaches. A number of important issues regarding map** of entities during multi-view retrieval of UML models is identified in this study. In response, we describe a framework for reusing UML artifacts, and di…
▽ More
Software is typically modeled from different viewpoints such as structural view, behavioral view and functional view. Few existing works can be considered as applying multi-view retrieval approaches. A number of important issues regarding map** of entities during multi-view retrieval of UML models is identified in this study. In response, we describe a framework for reusing UML artifacts, and discuss how our retrieval approach tackles the identified issues.
△ Less
Submitted 2 February, 2014;
originally announced February 2014.
-
UML Artifacts Reuse: State of the Art
Authors:
Hamza Onoruoiza Salami,
Moataz A. Ahmed
Abstract:
The benefits that can be derived from reusing software include accelerated development, reduced cost, reduced risk and effective use of specialists. Reuse of software artifacts during the initial stages of software development increases reuse benefits, because it allows subsequent reuse of later stage artifacts derived from earlier artifacts. UML is the de facto modeling language used by software…
▽ More
The benefits that can be derived from reusing software include accelerated development, reduced cost, reduced risk and effective use of specialists. Reuse of software artifacts during the initial stages of software development increases reuse benefits, because it allows subsequent reuse of later stage artifacts derived from earlier artifacts. UML is the de facto modeling language used by software developers during the initial stages of software development such as requirements engineering, architectural and detailed design. This survey analyzes previous works on UML artifacts reuse. The analysis considers four perspectives: retrieval method, artifact support, tool support and experiments performed. As an outcome of the analysis, some suggestions for future work on UML artifacts reuse are also provided
△ Less
Submitted 2 February, 2014;
originally announced February 2014.