Sajid Khan

23
Bioinformatics Computing Department Bioinformatics Government Post Graduate Collage , Mandain Abbottabad. Sajid Khan

description

Sajid Khan . Overview. BI-302 Bioinformatics Computing-I 3+1 Prerequisite: Programming Fundamentals Specific objectives of the course: - PowerPoint PPT Presentation

Transcript of Sajid Khan

Page 1: Sajid Khan

Bioinformatics Computing

Department Bioinformatics

Government Post Graduate Collage ,

Mandain Abbottabad.

Sajid Khan

Page 2: Sajid Khan

OverviewBI-302 Bioinformatics Computing-I 3+1 Prerequisite: Programming Fundamentals Specific objectives of the course: This course aims to introduce the concepts of data

representation, searching, security and ownership. Develop techniques for pattern matching, recognition and their applications in bioinformatics.

Course Outline: Databases: Data management, networks, geographical

scope, communications models, transmissions technology, protocols, bandwidth, topology, hardware, contents, security, ownership, implementation, Search engines. Search process, search engine technology, searching and information theory, computational methods, knowledge management, data, sequence and structure visualization, data mining methods and technology, pattern recognition and discovery, pattern matching, dot matrix analysis, substitution matrices, dynamic programming, Scripting.

Page 3: Sajid Khan

Overview

Lab Outline: Simulation of various bioinformatics

entities, application of various bioinformatics methods, scripting languages python, perl and PHP, and their applications in Bioinformatics.

Recommended Books: Latest editions of following books 1. “Bioinformatics Computing” Bryan

Borgeron, Pearson Education. 2. “Methods in Biotechnology and

ioengineering”, Vyas S.P. and Kohli D.V.

Page 4: Sajid Khan

Overview of Lecture Introduction Bioinformatics

Bioinformatics Computing The Killer Application Issues of Personalized Drugs

Parallel Universes Turing Machine/Model Information Theory Central Dogma Process of RNA synthesis

RNA-Protein Codon Transcription Wheel. From Data to Knowledge

Page 5: Sajid Khan

Chapter 1. The Central Dogma

Page 6: Sajid Khan

Bioinformatics Computing

Bioinformatics is a science that involves collecting, manipulating, analyzing, and transmitting huge quantities of data, and uses computers whenever appropriate.

Bioinformatics Computing combines practical insight for assessing bioinformatics technologies, practical guidance for using them effectively, and intelligent context for understanding their rapidly evolving roles.

Page 7: Sajid Khan

The Killer Application

The most commonly cited "killer app" of biotech is personalized medicine just-in-time delivery of medications (popularly called designer drugs") tailored to the patient's condition.

Page 8: Sajid Khan

Issues of Personalized Drugs

High throughput screening

The use of affordable, computer-enabled microarray technology to determine the patient's genetic profile. The issue here is affordability, in that microarrays costs tens of thousands of dollars.

Medically relevant information gathering

Databases on gene expression, medical relevance of signs and symptoms, optimum therapy for given diseases, and references for the patient and clinician must be readily available.

Custom drug synthesis

The just-in-time synthesis of patient-specific drugs, based on the patient's medical condition and genetic profile, presents major technical as well as political, social, and legal hurdles.

Page 9: Sajid Khan

Parallel Universes

One of the major challenges faced by bioinformatacists is keeping up with the latest techniques and discoveries in both molecular biology and computing.

Two key events in the late 1920s were Alexander Fleming's discovery of penicillin and Vannevar Bush's Product Integraph, a mechanical analog computer that could solve simple equations.

In the 1930s, Alan Turing, the British mathematician, devised his Turing model, upon which all modern discrete computing is based.

Page 10: Sajid Khan

Turing Machine/Model

The Turing model defines the fundamental properties of a computing system: a finite program, a large database, and a deterministic, step-by-step mode of computation.

The Turing Machine, which can simulate any computing system, consists of three basic elements: a control unit, a tape, and a read-write head. The read-write head moves along the tape and transmits information to and from the control unit.

Page 11: Sajid Khan

Information Theory

Shannon's model of a communications system includes five components: an information source, a transmitter, the medium, a receiver, and a destination. The amount of information that can be transferred from information source to destination is a function of the strength of the signal relative to that of the noise generated by the noise source.

Page 12: Sajid Khan

Central Dogma

The Central Dogma of Molecular Biology. DNA is transcribed to messenger RNA in the cell nucleus, which is in turn translated to protein in the cytoplasm. The Central Dogma, shown here from a structural perspective, can also be depicted from an information flow perspective.

Page 13: Sajid Khan

PROCESS OF RNA SYNTHESIS

Messenger RNA (mRNA) Synthesis. DNA is transcribed to nuclear RNA (nRNA) this is in turn processed to mature mRNA in thenucleus. Maturation involves discarding the junk nucleotide sequences(introns) that interrupt the sequences that will eventually be involved intranslation (exons).

Page 14: Sajid Khan

RNA-Protein Codon Transcription Wheel.

The 64 possible codons represent the 20 common amino acids, as well as one start (ATG) and three stop (TAG, TAA and TGA) markers. Redundancies normally occur in the last nucleotide of the three-letter alphabet.

Page 15: Sajid Khan

From Data to Knowledge

In viewing the Central Dogma as an information flow process, it's useful to distinguish between data, knowledge, and metadata. For our purposes, the following definitions and concepts apply:Data are numbers or other identifiers derived from observation, experiment, or calculation.Information is data in context a collection of data and associated explanations, interpretations, and other material concerning a particular object, event, or process.Metadata is data about the context in which information is used, such as descriptive summaries and high-level categorization of data and information.

Page 16: Sajid Khan

From Data to Knowledge

Data (from direct observation)Patient Age: 5. Physical Exam Findings: Freckling in the armpits and masses on and just below the surface of the skin. Information (from a molecular disease database)Neurofibromatosis is a genetic disorder causing tumors to form on nerve tissue anywhere in the body. The pattern of inheritance is autosomal dominant.Metadata (from an online publications database)The incidence of neurofibromatosis is about one out of every 2,500 people worldwide. It is associated with difficulty seeing, hearing, and in some cases (NF2), with paralysis and early death. In contrast, type 1 (NF1) is more of a cosmetic disorder.

Page 17: Sajid Khan

From Data to Knowledge

Visualization of NF2 Gene on Chromosome 22. As it would appear through National Center for Biological Information's Web-based Map View program, the NF2 gene appears at position 22q12 on chromosome 22.

Information (from an online molecular disease database)The NF2 gene has been mapped to chromosome 22 and is thought to be a so-called "tumor suppressor gene."Metadata (from an online publication database)The pattern of inheritance is autosomal dominant, caused by a spontaneous mutation in the egg or sperm before fertilization.

Page 18: Sajid Khan

Convergence

In automated gene sequencing, purified genomic or complementary DNA is first fragmented by restriction enzymes, and these fragments are separated by size on a gel. This is followed by isolating single fragments and using the Sanger chain-termination method to sequence each fragment individually with chain-terminating ddNTS (dideoxy nucleoside triphosphates) labeled withfluorochromes according to the base present. For example, a green fluorochome is typically used forAdenine (A), red for Tyrosine (T), blue for Cytosine (C), and yellow for Guanine (G).

Page 19: Sajid Khan

Boolean Operators

The AND and OR logic operators form the basis of digital computer operations. Digital Computer Physical Architecture (left) versus Abstraction (right). Process control applications emphasize input/output hardware (left), which corresponds to the peripherals abstraction (right).

Page 20: Sajid Khan

Archiving

Just as the transfer of data from DNA to RNA to protein relies on an information infrastructure, data archives rely on an information technology (IT) infrastructure. This IT infrastructure includes network and database technologies as well as standard vocabularies to store and access information.

Numerical ProcessingComputers are recognized foremost for their computational or numerical-processing capabilities. In bioinformatics, applications for numerical-processing techniques range from sequence analysis, microarray data analysis, and site prediction to gene finding, protein structure prediction, and phylogenetic analysis.

Rules-based systems

IF First Codon = "T" AND Second Codon = "A"AND (Third Codon = "A" OR Third Codon ="G")THEN Codon = "Stop"

Page 21: Sajid Khan

Artificial Neural Network

This machine-learning technologyrelies on tightly interconnected input, hidden, and output layers to map input patterns to output patterns. One of many possible truth tables (right) illustrates the mapping of input to output patterns. Learning is signified by the thickness of lines joining nodes, and node values are indicated by color (white = 0 and black = 1). Hidden nodes can take on values between 0 and 1.

Page 22: Sajid Khan

Communications

CommunicationsAs a communications system, the computer is like an asynchronous communications medium, typified by server-based e-mail.

From a data-management perspective, computers are increasingly used as asynchronous communications devices.

The difference between e-mail and a typical biological database is that contribution to biological databases such as GenBank are meant for others, but the identity of the recipients is unknown and largely unknowable by the sender.

The communications of sequencing and protein structure information is hindered because of the lack of a standard format for creating and storing gene data, even within companies. Several contenders for the standard include Gene Expression Markup Language (GEML), based on the eXtensible Markup Language (XML), and Microarray Markup Language (MAML). The latter is based on collaboration between the National Center for Biotechnology Information, Stanford University, and the European Bioinformatics Institute.

Page 23: Sajid Khan

Thank You

Contact : gpgcm_bc ( Yahoo Group )