SlideShare a Scribd company logo
1 of 2
Download to read offline
ImmuMatrix
Business Situation

Immumterix does analysis of DNA sequences and the immune system using               Client Profile
multiple lab techniques. They needed to use computational techniques to analyze
DNA through methods like high throughput analysis. They would analyze the DNA       Immumetrix is an early
sequence and would represent each element through ASCII values. By studying         stage biotech company at
the DNA sequence thoroughly, they were able to understand human DNA through         Palo Alto. Their focus is
various algorithms. What they needed was sequence alignment analysis and            on DNA in the immune
similarity searches in biological databases. Each sample would contain              system and they work on
approximately 400 MB to 1 GB of data and would need customization based on          health related projects
the data collected. The need was to coordinate with the scientists from             such as non-invasive
Immumetrix in order to understand the complexities and align the analytical         monitoring of organ
algorithm accordingly. The objective of the project was to analyze the DNA data     transplant rejection. More
and provide outputs in CSV and graphical formats.                                   details about them at
                                                                                    www.immumetrix.com
Solution Approach

Immumetrix needed an application that would analyze the matches in the DNA
sequences and produce the output of these analysis as charts. The studying of
DNA and matching of certain sequences helped to identify if anti bodies were
present and hence judge the possibility of certain types of diseases.

Compassites did an initial data analysis of the data that was currently in the
system. We did multiple reads of barcodes, isotypes and primers. We aligned
sequences using concepts such as local alignment and dynamic programming.
Some of the processing revealed details such as ‘primary antibody repertoire’ and
the amino acid usage.

The tool built by Compassites was on the cloud. We created an Excel file where the
scientists had to simply add their data in a DropBox. The application would go
onto read this Excel sheet and get to know what data had to be processed. Post
processing, the results of the analysis was dumped back into the DropBox folder.




You can read more           Reach out to us at     Via email
about Compassites at        +91 - 80- 4203 2572    info@compassitesinc.com
www.compassitesinc.com      +91 - 80- 6500 2371
The algorithms of Immumetrix were written in C++ and Python. The application created by Compassites generated
charts using the Python MatPlotLib library. Compassites used Gearman for parallel processing of the data.



Technology Used

C++, Python, PHP, HipHop PHP, Biopython, Matplotlib, Gearman and pdftk



Benefits & Results

   The early system used to take a week to do the processing of the data. The current system does it in a few hours.



   With the new system, a lot of processes can be done parallelly instead of in serial order.

   Compassites helped to improvise the code and the algorithms in order to make them run faster.

   Initially there were a lot of manual tasks to be done in order to run each program. Now a lot of the tasks are
    automated.

   Since the application is on the cloud, Immumetrix is also paying "by use" and is not having to pay for physical
    hardware and servers at their location.




Bangalore Center                                       Pune Center
"Gaayatthri Chambers", #948, 24th Main Rd,2nd Phase,   608 - Kapil Zenith Building, Near Chandani Chowk,
 J.P.Nagar, Bangalore - 560078 Karnataka, India        Off Bangalore - Mumbai bypass, Bavdhan, Pune - 411021
Phone: +91 -80 42032572                                Maharashtra, India Phone:+91-20-6500 2371

More Related Content

What's hot

12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...Walid Maalej
 
PhD Projects in System Cybernetics Research Guidance
PhD Projects in System Cybernetics Research GuidancePhD Projects in System Cybernetics Research Guidance
PhD Projects in System Cybernetics Research GuidancePhD Services
 
Matlab Projects for IT Students
Matlab Projects for IT StudentsMatlab Projects for IT Students
Matlab Projects for IT StudentsPhdtopiccom
 
MATLAB Projects for Computer Science Research Topics
MATLAB Projects for Computer Science Research TopicsMATLAB Projects for Computer Science Research Topics
MATLAB Projects for Computer Science Research TopicsMatlab Simulation
 
Help with Matlab Research Guidance
Help with Matlab Research GuidanceHelp with Matlab Research Guidance
Help with Matlab Research GuidanceMatlab Simulation
 
Hunlan Lin_resume
Hunlan Lin_resumeHunlan Lin_resume
Hunlan Lin_resumehunlan lin
 
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Anomaly Detection using Deep Auto-Encoders | Gianmario SpacagnaAnomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Anomaly Detection using Deep Auto-Encoders | Gianmario SpacagnaData Science Milan
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection khawla Osama
 
Artificial Intelligence for Automating Data Analysis
Artificial Intelligence for Automating Data AnalysisArtificial Intelligence for Automating Data Analysis
Artificial Intelligence for Automating Data AnalysisManuel Martín
 

What's hot (13)

12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
 
PhD Projects in System Cybernetics Research Guidance
PhD Projects in System Cybernetics Research GuidancePhD Projects in System Cybernetics Research Guidance
PhD Projects in System Cybernetics Research Guidance
 
Matlab Projects for IT Students
Matlab Projects for IT StudentsMatlab Projects for IT Students
Matlab Projects for IT Students
 
Res_010717
Res_010717Res_010717
Res_010717
 
MATLAB Projects for Computer Science Research Topics
MATLAB Projects for Computer Science Research TopicsMATLAB Projects for Computer Science Research Topics
MATLAB Projects for Computer Science Research Topics
 
Help with Matlab Research Guidance
Help with Matlab Research GuidanceHelp with Matlab Research Guidance
Help with Matlab Research Guidance
 
Hunlan Lin_resume
Hunlan Lin_resumeHunlan Lin_resume
Hunlan Lin_resume
 
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Anomaly Detection using Deep Auto-Encoders | Gianmario SpacagnaAnomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection   Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection
 
Debugging AI
Debugging AIDebugging AI
Debugging AI
 
Santhosh_Resume Current
Santhosh_Resume CurrentSanthosh_Resume Current
Santhosh_Resume Current
 
Data Fusion Poster
Data Fusion PosterData Fusion Poster
Data Fusion Poster
 
Artificial Intelligence for Automating Data Analysis
Artificial Intelligence for Automating Data AnalysisArtificial Intelligence for Automating Data Analysis
Artificial Intelligence for Automating Data Analysis
 

Viewers also liked (11)

The kSORT assay to detect renal transplant patients at risk for acute rejecti...
The kSORT assay to detect renal transplant patients at risk for acute rejecti...The kSORT assay to detect renal transplant patients at risk for acute rejecti...
The kSORT assay to detect renal transplant patients at risk for acute rejecti...
 
WPA
WPAWPA
WPA
 
Transformanz
TransformanzTransformanz
Transformanz
 
Zyme
ZymeZyme
Zyme
 
Payback
PaybackPayback
Payback
 
Seedling
SeedlingSeedling
Seedling
 
Acrowit
AcrowitAcrowit
Acrowit
 
Jiffle
JiffleJiffle
Jiffle
 
Nri touch
Nri touchNri touch
Nri touch
 
Organ-i World Transplant Congress Soild Organ Rejection Test (k-SORT)
Organ-i World Transplant Congress Soild Organ Rejection Test (k-SORT)Organ-i World Transplant Congress Soild Organ Rejection Test (k-SORT)
Organ-i World Transplant Congress Soild Organ Rejection Test (k-SORT)
 
Early diagnosis of graft rejection in renal transplantation
Early diagnosis of graft rejection in renal transplantationEarly diagnosis of graft rejection in renal transplantation
Early diagnosis of graft rejection in renal transplantation
 

Similar to Immumetrix

rpaper
rpaperrpaper
rpaperimu409
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda Chiramba
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxSubhrajyotiPayra
 
Top Cited Articles International Journal of Computer Science, Engineering and...
Top Cited Articles International Journal of Computer Science, Engineering and...Top Cited Articles International Journal of Computer Science, Engineering and...
Top Cited Articles International Journal of Computer Science, Engineering and...IJCSEA Journal
 
Smart Assistant for Blind Humans using Rashberry PI
Smart Assistant for Blind Humans using Rashberry PISmart Assistant for Blind Humans using Rashberry PI
Smart Assistant for Blind Humans using Rashberry PIijtsrd
 
Machine_Learning_with_MATLAB_Seminar_Latest.pdf
Machine_Learning_with_MATLAB_Seminar_Latest.pdfMachine_Learning_with_MATLAB_Seminar_Latest.pdf
Machine_Learning_with_MATLAB_Seminar_Latest.pdfCarlos Paredes
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsVijay Karan
 
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...IRJET Journal
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataDr. Amarjeet Singh
 
Aplications for machine learning in IoT
Aplications for machine learning in IoTAplications for machine learning in IoT
Aplications for machine learning in IoTYashesh Shroff
 
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET Journal
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsVijay Karan
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONIJCIRAS Journal
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...IJCSEIT Journal
 
Technologies in Support of Big Data Ethics
Technologies in Support of Big Data EthicsTechnologies in Support of Big Data Ethics
Technologies in Support of Big Data EthicsMark Underwood
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET Journal
 
Alphabet Recognition System Based on Artifical Neural Network
Alphabet Recognition System Based on Artifical Neural NetworkAlphabet Recognition System Based on Artifical Neural Network
Alphabet Recognition System Based on Artifical Neural Networkijtsrd
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learningdataalcott
 

Similar to Immumetrix (20)

rpaper
rpaperrpaper
rpaper
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptx
 
Top Cited Articles International Journal of Computer Science, Engineering and...
Top Cited Articles International Journal of Computer Science, Engineering and...Top Cited Articles International Journal of Computer Science, Engineering and...
Top Cited Articles International Journal of Computer Science, Engineering and...
 
Smart Assistant for Blind Humans using Rashberry PI
Smart Assistant for Blind Humans using Rashberry PISmart Assistant for Blind Humans using Rashberry PI
Smart Assistant for Blind Humans using Rashberry PI
 
Machine_Learning_with_MATLAB_Seminar_Latest.pdf
Machine_Learning_with_MATLAB_Seminar_Latest.pdfMachine_Learning_with_MATLAB_Seminar_Latest.pdf
Machine_Learning_with_MATLAB_Seminar_Latest.pdf
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
 
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
 
Privacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling DataPrivacy Preserving Mining in Code Profiling Data
Privacy Preserving Mining in Code Profiling Data
 
Aplications for machine learning in IoT
Aplications for machine learning in IoTAplications for machine learning in IoT
Aplications for machine learning in IoT
 
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
 
Technologies in Support of Big Data Ethics
Technologies in Support of Big Data EthicsTechnologies in Support of Big Data Ethics
Technologies in Support of Big Data Ethics
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
 
Alphabet Recognition System Based on Artifical Neural Network
Alphabet Recognition System Based on Artifical Neural NetworkAlphabet Recognition System Based on Artifical Neural Network
Alphabet Recognition System Based on Artifical Neural Network
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learning
 

More from Compassites Software Solutions (8)

iCharts
iChartsiCharts
iCharts
 
Hydratech
HydratechHydratech
Hydratech
 
Graymatics
GraymaticsGraymatics
Graymatics
 
Creatlive
CreatliveCreatlive
Creatlive
 
Beverages
BeveragesBeverages
Beverages
 
Authentix
AuthentixAuthentix
Authentix
 
9 Lenses
9 Lenses9 Lenses
9 Lenses
 
Compassites Is Hiring
Compassites Is HiringCompassites Is Hiring
Compassites Is Hiring
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Immumetrix

  • 1. ImmuMatrix Business Situation Immumterix does analysis of DNA sequences and the immune system using Client Profile multiple lab techniques. They needed to use computational techniques to analyze DNA through methods like high throughput analysis. They would analyze the DNA Immumetrix is an early sequence and would represent each element through ASCII values. By studying stage biotech company at the DNA sequence thoroughly, they were able to understand human DNA through Palo Alto. Their focus is various algorithms. What they needed was sequence alignment analysis and on DNA in the immune similarity searches in biological databases. Each sample would contain system and they work on approximately 400 MB to 1 GB of data and would need customization based on health related projects the data collected. The need was to coordinate with the scientists from such as non-invasive Immumetrix in order to understand the complexities and align the analytical monitoring of organ algorithm accordingly. The objective of the project was to analyze the DNA data transplant rejection. More and provide outputs in CSV and graphical formats. details about them at www.immumetrix.com Solution Approach Immumetrix needed an application that would analyze the matches in the DNA sequences and produce the output of these analysis as charts. The studying of DNA and matching of certain sequences helped to identify if anti bodies were present and hence judge the possibility of certain types of diseases. Compassites did an initial data analysis of the data that was currently in the system. We did multiple reads of barcodes, isotypes and primers. We aligned sequences using concepts such as local alignment and dynamic programming. Some of the processing revealed details such as ‘primary antibody repertoire’ and the amino acid usage. The tool built by Compassites was on the cloud. We created an Excel file where the scientists had to simply add their data in a DropBox. The application would go onto read this Excel sheet and get to know what data had to be processed. Post processing, the results of the analysis was dumped back into the DropBox folder. You can read more Reach out to us at Via email about Compassites at +91 - 80- 4203 2572 info@compassitesinc.com www.compassitesinc.com +91 - 80- 6500 2371
  • 2. The algorithms of Immumetrix were written in C++ and Python. The application created by Compassites generated charts using the Python MatPlotLib library. Compassites used Gearman for parallel processing of the data. Technology Used C++, Python, PHP, HipHop PHP, Biopython, Matplotlib, Gearman and pdftk Benefits & Results  The early system used to take a week to do the processing of the data. The current system does it in a few hours.  With the new system, a lot of processes can be done parallelly instead of in serial order.  Compassites helped to improvise the code and the algorithms in order to make them run faster.  Initially there were a lot of manual tasks to be done in order to run each program. Now a lot of the tasks are automated.  Since the application is on the cloud, Immumetrix is also paying "by use" and is not having to pay for physical hardware and servers at their location. Bangalore Center Pune Center "Gaayatthri Chambers", #948, 24th Main Rd,2nd Phase, 608 - Kapil Zenith Building, Near Chandani Chowk, J.P.Nagar, Bangalore - 560078 Karnataka, India Off Bangalore - Mumbai bypass, Bavdhan, Pune - 411021 Phone: +91 -80 42032572 Maharashtra, India Phone:+91-20-6500 2371