SlideShare a Scribd company logo
The Effect of Cloud
Computing in Next
Generation Sequencing
By : Supeshala Madushani
144116F
Introduction
 At present, DNA sequencing methods have been widely emerged
and they are collectively known as next generation sequencing
methods.
 Next generation sequencing has the ability to dramatically accelerate
biological researches by analyzing genomes cheaply and quickly
rather than requiring significant production-scale efforts.
 This results in the production of huge sequence datasets.
 Meanwhile, cloud computing has become a prominent technology in
many more areas.
Problem Addressed
 The production of large data sets in next generation sequencing
leads to an additional computational challenges in data mining and
sequence analysis.
 This represents a significant overburden so that high quality
sequencing techniques must be considered.
Focus: Analyzed the existing literature and find next generation
sequencing methods, its applications, cloud computing and its
applications in biological systems and the effect of cloud computing in
next generation sequencing.
Background
Fact 1: In 2003, successfully completed the sequencing of human genome
project.
Fact 2: Sanger sequencing technology used to sequence the human
genome.
Fact 2: It required over a decade to deliver the final draft.
Fact 3: In contrast, using next generation sequencing an entire genome can
be sequenced within a single day.
Focus of Research
Next Generation
Sequencing Methods
Cloud Computing
Effects of cloud
computing in next
generation
sequencing
Understand the
features of cloud
computing and its
applications in
biological systems
Understand existing
next generation
sequencing methods
and applications
Next Generation Sequencing Methods
1. First Generation Sequencing
Sanger Sequencing
2. Second Generation Sequencing
Roche 454 System
AB SOLiD System
Illumina Genome Analyzer
3. Third Generation Sequencing
Heliscope TM Single Molecule Sequencer
Single Molecule Real Time Sequencer
Progress So Far:
First Generation Sequencing
• Fact 1: In 1975, Sanger introduced the concept of DNA sequencing.
• Fact 2: Later on, published a rapid method for determining sequences in DNA
by prime synthesis with DNA polymerase enzyme.
• Fact 3: In 1977, two landmark articles for DNA sequencing were published.
1. The Frederick Sanger’s enzymatic dydeoxy DNA sequencing technique based on the
chain terminating method.
2. Allam Maxam and Walter Gilbert’s chemical degradation DNA sequencing
technique.
Next Generation Sequencing
Fact 1: In 2000, Jonathan founded 454 Life Sciences, which further developed
the first commercially available NGS platform, the GS 20.
Fact 2: The developed technique was successfully validated by combining
single-molecule emulsion PCR with pyrosequencing.
• In general, the principle of pyrosequencing technique is based on the
“sequencing by synthesis”.
• It differs from Sanger sequencing because, it depends on the detection of
pyrophosphate release on nucleotide incorporation, rather than chain
termination with dideoxynucleotides.
Second Generation Sequencing
• The second generation HT-NGS platforms can generate about five hundred
million bases of raw sequence (Roche) to billions of bases in a single run.
• The second generation NGS platforms are based on template preparation,
massively parallel clonal amplification and sequencing and alignment of
short reads.
• There are three widely used NGS platforms.
1. Roche/ 454 system
2. ABI SOLiD system
3. Illumina genome analyzer
Second Generation Sequencing
Roche/ 454 System
• Emulsion PCR
• One DNA fragment per
bead
• Pyro sequencing
• Read length 400-500
ABI SOLiD System
• Emulsion PCR
• One DNA fragment per
bead
• Sequencing by ligation
• Read length ~50
Illumina System
• Solid amplification
• One DNA fragment per
cluster
• Sequencing synthesis
• Read length ~100
Comparison of second generation techniques
Using second generation techniques for DNA
Sequencing
Progress So Far:
 The principle was based on the emulsion PCR amplification of the DNA
fragments, to make the light signal strong enough for reliable base detection
by the cameras.
 Problem: It may introduce base sequence errors or favor of certain
sequences over others, thus changing the relative frequency and abundance
of various DNA fragments that existed before amplification.
SOLUTION: Determine the sequence directly from a single DNA
molecule, without the need for PCR amplification.
Third generation NGS Platforms
• The sequencing from a single DNA molecule is known as “third generation
NGS sequencing”.
• Progress So Far:
• Heliscope TM Single Molecule Sequencer
• Single Molecule Real Time Sequencer
• Nanopore DNA Sequencing
Comparison of Second and Third Generation
Techniques
Applications of Next Generation Sequencing
1. Full-genome resequencing or more targeted discovery of mutations or
polymorphisms.
2. Mapping of structural rearrangements, which may include copy number
variation, balanced translocation breakpoints and chromosomal inversions.
3. RNA-sequencing, analogous to expressed sequence tags or serial analysis of
gene expression.
4. Large- scale analysis of DNA methylation, by deep sequencing of bisulfite-
treated DNA.
5. Genome wide mapping of DNA-protein interactions, by deep sequencing of
DNA fragments.
Cloud Computing
Fact 1: Clouds can be categorized into three types based on the availability of
the data center.
• Public clouds- clouds owned and operated by third parties aiming at
individual client satisfaction by providing services at lower cost.
• Private clouds- clouds that are owned and operated by enterprises for their
own use and benefits.
• Hybrid clouds- the combination of both public and private clouds.
Cloud Computing
Fact 2: The services provided under cloud computing can be categorized into
three groups.
Software as a service (SaaS): software is served on demand to the clients.
Multiple users are serviced using single software without investing in
licenses.
Platform as a service(PaaS): A working platform is provided as a service by
encapsulating the required software and working environment to the
provider.
Infrastructure as a service(IaaS): provides computing capabilities and basic
storage over the network.
Applications of Cloud Computing in Biological
Systems
1. Genome Analysis and SNP detection
2. Comparative genomics
3. Genome informatics
4. Metagenomics
Cloud Computing in Next Generation Sequencing
Literature:
There are cloud computing frameworks which can be used in next generation
sequencing methods.
 Hadoop- This is a framework developed to process high volume of data by
running a huge number of machines which run in simultaneously in a
cluster and various bigdata cloud computing platforms are evolved to
reserve and examine tremendous amount of data cost effectively.
 MapReduce- This is a software framework implemented by Google with
the intention of processing big data.
 Hbase- This framework is modeled on Google’s BigTable database and it is
considered as a dominant Hadoop associated project.
Cloud Computing in Next Generation
Sequencing
 Crossbow uses Hadoop in order to calculate and to analyze the entire
genome re-sequencing data and for SNP genotyping from short reads.
 Contrail uses Hadoop for the purposes of de novo assembly from short
sequencing reads without the requirement of using a reference genome.
 Myrna uses Bowtie, another ultrafast short read alignment for the purposes
of evaluating dissimilar gene expressions from large RNA sequence
datasets. While operating on cluster, Myrna uses Hadoop and also Myrna is
employed in the cloud utilizing Amazon Elastic MapReduce.
Cloud Computing in Next Generation
Sequencing
 Use of virtual machines:
• A recent cloud computing invention is virtual machines (VMs).
• They are programs that perform parallel processing to overcome
differences between several platforms and VM technology has been used
in bioinformatics.
• CLoVR has been developed for analyzing bacterial NGS data.
The Effect of Cloud Computing in Next
Generation Sequencing
Conclusion:
• Handling huge datasets that generated in next generation sequencing is
crucial.
• Cloud computing can be used in next generation techniques.
Suggestion:
• Cloud enable frameworks such as Hadoop, MapReduce and HBase could be
used in next generation sequencing methods to facilitate NGS analytics that
allow users to rapidly interrogate vast data sets.
• Develop CLoVR platform for analyzing DNA sequences.
Thank you!

More Related Content

What's hot

Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
IEEEFINALYEARPROJECTS
 
ENSEIRB - Advanced Project
ENSEIRB - Advanced ProjectENSEIRB - Advanced Project
ENSEIRB - Advanced Project
Arnaud Lempereur
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Review
iosrjce
 
Group Communication Techniques in Overlay Networks
Group Communication Techniques in Overlay NetworksGroup Communication Techniques in Overlay Networks
Group Communication Techniques in Overlay Networks
Knut-Helge Vik
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
Multicasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnMulticasting routing protocol_for_wsn
Multicasting routing protocol_for_wsn
Gr Patel
 
Vampire attacks
Vampire attacksVampire attacks
Vampire attacks
Augustin Jose
 
Pres_FORENSECURE
Pres_FORENSECUREPres_FORENSECURE
Pres_FORENSECURE
Robert Waziak Jr.
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
Iaetsd Iaetsd
 
Deep learning fundamentals workshop
Deep learning fundamentals workshopDeep learning fundamentals workshop
Deep learning fundamentals workshop
Satnam Singh
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
IOSR Journals
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
IDES Editor
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
IJRAT
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
International Journal of Innovation Engineering and Science Research
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
Shiwangi Thakur
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
Ramesh Patriotic
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 

What's hot (17)

Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
ENSEIRB - Advanced Project
ENSEIRB - Advanced ProjectENSEIRB - Advanced Project
ENSEIRB - Advanced Project
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Review
 
Group Communication Techniques in Overlay Networks
Group Communication Techniques in Overlay NetworksGroup Communication Techniques in Overlay Networks
Group Communication Techniques in Overlay Networks
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Multicasting routing protocol_for_wsn
Multicasting routing protocol_for_wsnMulticasting routing protocol_for_wsn
Multicasting routing protocol_for_wsn
 
Vampire attacks
Vampire attacksVampire attacks
Vampire attacks
 
Pres_FORENSECURE
Pres_FORENSECUREPres_FORENSECURE
Pres_FORENSECURE
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 
Deep learning fundamentals workshop
Deep learning fundamentals workshopDeep learning fundamentals workshop
Deep learning fundamentals workshop
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 

Similar to The effect of cloud computing in next generation

Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
Mayukh Maitra
 
Seq 301116
Seq 301116Seq 301116
Chapter 5 applications of neural networks
Chapter 5           applications of neural networksChapter 5           applications of neural networks
Chapter 5 applications of neural networks
Punit Saini
 
Cloud bioinformatics 2
Cloud bioinformatics 2Cloud bioinformatics 2
Cloud bioinformatics 2
ARPUTHA SELVARAJ A
 
Introduction to Next-Generation Sequencing (NGS) Technology
Introduction to Next-Generation Sequencing (NGS) TechnologyIntroduction to Next-Generation Sequencing (NGS) Technology
Introduction to Next-Generation Sequencing (NGS) Technology
QIAGEN
 
Next generation sequencing methods (final edit)
Next generation sequencing methods (final edit)Next generation sequencing methods (final edit)
Next generation sequencing methods (final edit)
Mrinal Vashisth
 
Next Generation Sequencing
Next Generation SequencingNext Generation Sequencing
Next Generation Sequencing
shinycthomas
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
Rdna
RdnaRdna
DNA based computer : present & future
DNA based computer : present & futureDNA based computer : present & future
DNA based computer : present & future
Kinjal Mondal
 
NRNB Annual Report 2017
NRNB Annual Report 2017NRNB Annual Report 2017
NRNB Annual Report 2017
Alexander Pico
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
IRJET Journal
 
Deep Learning Neural Networks in the Cloud
Deep Learning Neural Networks in the CloudDeep Learning Neural Networks in the Cloud
Deep Learning Neural Networks in the Cloud
IJAEMSJORNAL
 
MPSS.pptx
MPSS.pptxMPSS.pptx
MPSS.pptx
Sakshi Vaishnav
 
Microbial physiology in genomic era
Microbial physiology in genomic eraMicrobial physiology in genomic era
Microbial physiology in genomic era
The Women University Multan
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
ChandniA5
 
NRNB Annual Report 2016: Overall
NRNB Annual Report 2016: OverallNRNB Annual Report 2016: Overall
NRNB Annual Report 2016: Overall
Alexander Pico
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 

Similar to The effect of cloud computing in next generation (20)

Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
 
Seq 301116
Seq 301116Seq 301116
Seq 301116
 
Chapter 5 applications of neural networks
Chapter 5           applications of neural networksChapter 5           applications of neural networks
Chapter 5 applications of neural networks
 
Cloud bioinformatics 2
Cloud bioinformatics 2Cloud bioinformatics 2
Cloud bioinformatics 2
 
Introduction to Next-Generation Sequencing (NGS) Technology
Introduction to Next-Generation Sequencing (NGS) TechnologyIntroduction to Next-Generation Sequencing (NGS) Technology
Introduction to Next-Generation Sequencing (NGS) Technology
 
Next generation sequencing methods (final edit)
Next generation sequencing methods (final edit)Next generation sequencing methods (final edit)
Next generation sequencing methods (final edit)
 
Next Generation Sequencing
Next Generation SequencingNext Generation Sequencing
Next Generation Sequencing
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
Rdna
RdnaRdna
Rdna
 
DNA based computer : present & future
DNA based computer : present & futureDNA based computer : present & future
DNA based computer : present & future
 
NRNB Annual Report 2017
NRNB Annual Report 2017NRNB Annual Report 2017
NRNB Annual Report 2017
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
Deep Learning Neural Networks in the Cloud
Deep Learning Neural Networks in the CloudDeep Learning Neural Networks in the Cloud
Deep Learning Neural Networks in the Cloud
 
MPSS.pptx
MPSS.pptxMPSS.pptx
MPSS.pptx
 
Microbial physiology in genomic era
Microbial physiology in genomic eraMicrobial physiology in genomic era
Microbial physiology in genomic era
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
 
NRNB Annual Report 2016: Overall
NRNB Annual Report 2016: OverallNRNB Annual Report 2016: Overall
NRNB Annual Report 2016: Overall
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

The effect of cloud computing in next generation

  • 1. The Effect of Cloud Computing in Next Generation Sequencing By : Supeshala Madushani 144116F
  • 2. Introduction  At present, DNA sequencing methods have been widely emerged and they are collectively known as next generation sequencing methods.  Next generation sequencing has the ability to dramatically accelerate biological researches by analyzing genomes cheaply and quickly rather than requiring significant production-scale efforts.  This results in the production of huge sequence datasets.  Meanwhile, cloud computing has become a prominent technology in many more areas.
  • 3. Problem Addressed  The production of large data sets in next generation sequencing leads to an additional computational challenges in data mining and sequence analysis.  This represents a significant overburden so that high quality sequencing techniques must be considered. Focus: Analyzed the existing literature and find next generation sequencing methods, its applications, cloud computing and its applications in biological systems and the effect of cloud computing in next generation sequencing.
  • 4. Background Fact 1: In 2003, successfully completed the sequencing of human genome project. Fact 2: Sanger sequencing technology used to sequence the human genome. Fact 2: It required over a decade to deliver the final draft. Fact 3: In contrast, using next generation sequencing an entire genome can be sequenced within a single day.
  • 5. Focus of Research Next Generation Sequencing Methods Cloud Computing Effects of cloud computing in next generation sequencing Understand the features of cloud computing and its applications in biological systems Understand existing next generation sequencing methods and applications
  • 6. Next Generation Sequencing Methods 1. First Generation Sequencing Sanger Sequencing 2. Second Generation Sequencing Roche 454 System AB SOLiD System Illumina Genome Analyzer 3. Third Generation Sequencing Heliscope TM Single Molecule Sequencer Single Molecule Real Time Sequencer Progress So Far:
  • 7. First Generation Sequencing • Fact 1: In 1975, Sanger introduced the concept of DNA sequencing. • Fact 2: Later on, published a rapid method for determining sequences in DNA by prime synthesis with DNA polymerase enzyme. • Fact 3: In 1977, two landmark articles for DNA sequencing were published. 1. The Frederick Sanger’s enzymatic dydeoxy DNA sequencing technique based on the chain terminating method. 2. Allam Maxam and Walter Gilbert’s chemical degradation DNA sequencing technique.
  • 8. Next Generation Sequencing Fact 1: In 2000, Jonathan founded 454 Life Sciences, which further developed the first commercially available NGS platform, the GS 20. Fact 2: The developed technique was successfully validated by combining single-molecule emulsion PCR with pyrosequencing. • In general, the principle of pyrosequencing technique is based on the “sequencing by synthesis”. • It differs from Sanger sequencing because, it depends on the detection of pyrophosphate release on nucleotide incorporation, rather than chain termination with dideoxynucleotides.
  • 9. Second Generation Sequencing • The second generation HT-NGS platforms can generate about five hundred million bases of raw sequence (Roche) to billions of bases in a single run. • The second generation NGS platforms are based on template preparation, massively parallel clonal amplification and sequencing and alignment of short reads. • There are three widely used NGS platforms. 1. Roche/ 454 system 2. ABI SOLiD system 3. Illumina genome analyzer
  • 10. Second Generation Sequencing Roche/ 454 System • Emulsion PCR • One DNA fragment per bead • Pyro sequencing • Read length 400-500 ABI SOLiD System • Emulsion PCR • One DNA fragment per bead • Sequencing by ligation • Read length ~50 Illumina System • Solid amplification • One DNA fragment per cluster • Sequencing synthesis • Read length ~100
  • 11. Comparison of second generation techniques
  • 12. Using second generation techniques for DNA Sequencing Progress So Far:  The principle was based on the emulsion PCR amplification of the DNA fragments, to make the light signal strong enough for reliable base detection by the cameras.  Problem: It may introduce base sequence errors or favor of certain sequences over others, thus changing the relative frequency and abundance of various DNA fragments that existed before amplification. SOLUTION: Determine the sequence directly from a single DNA molecule, without the need for PCR amplification.
  • 13. Third generation NGS Platforms • The sequencing from a single DNA molecule is known as “third generation NGS sequencing”. • Progress So Far: • Heliscope TM Single Molecule Sequencer • Single Molecule Real Time Sequencer • Nanopore DNA Sequencing
  • 14. Comparison of Second and Third Generation Techniques
  • 15. Applications of Next Generation Sequencing 1. Full-genome resequencing or more targeted discovery of mutations or polymorphisms. 2. Mapping of structural rearrangements, which may include copy number variation, balanced translocation breakpoints and chromosomal inversions. 3. RNA-sequencing, analogous to expressed sequence tags or serial analysis of gene expression. 4. Large- scale analysis of DNA methylation, by deep sequencing of bisulfite- treated DNA. 5. Genome wide mapping of DNA-protein interactions, by deep sequencing of DNA fragments.
  • 16. Cloud Computing Fact 1: Clouds can be categorized into three types based on the availability of the data center. • Public clouds- clouds owned and operated by third parties aiming at individual client satisfaction by providing services at lower cost. • Private clouds- clouds that are owned and operated by enterprises for their own use and benefits. • Hybrid clouds- the combination of both public and private clouds.
  • 17. Cloud Computing Fact 2: The services provided under cloud computing can be categorized into three groups. Software as a service (SaaS): software is served on demand to the clients. Multiple users are serviced using single software without investing in licenses. Platform as a service(PaaS): A working platform is provided as a service by encapsulating the required software and working environment to the provider. Infrastructure as a service(IaaS): provides computing capabilities and basic storage over the network.
  • 18. Applications of Cloud Computing in Biological Systems 1. Genome Analysis and SNP detection 2. Comparative genomics 3. Genome informatics 4. Metagenomics
  • 19. Cloud Computing in Next Generation Sequencing Literature: There are cloud computing frameworks which can be used in next generation sequencing methods.  Hadoop- This is a framework developed to process high volume of data by running a huge number of machines which run in simultaneously in a cluster and various bigdata cloud computing platforms are evolved to reserve and examine tremendous amount of data cost effectively.  MapReduce- This is a software framework implemented by Google with the intention of processing big data.  Hbase- This framework is modeled on Google’s BigTable database and it is considered as a dominant Hadoop associated project.
  • 20. Cloud Computing in Next Generation Sequencing  Crossbow uses Hadoop in order to calculate and to analyze the entire genome re-sequencing data and for SNP genotyping from short reads.  Contrail uses Hadoop for the purposes of de novo assembly from short sequencing reads without the requirement of using a reference genome.  Myrna uses Bowtie, another ultrafast short read alignment for the purposes of evaluating dissimilar gene expressions from large RNA sequence datasets. While operating on cluster, Myrna uses Hadoop and also Myrna is employed in the cloud utilizing Amazon Elastic MapReduce.
  • 21. Cloud Computing in Next Generation Sequencing  Use of virtual machines: • A recent cloud computing invention is virtual machines (VMs). • They are programs that perform parallel processing to overcome differences between several platforms and VM technology has been used in bioinformatics. • CLoVR has been developed for analyzing bacterial NGS data.
  • 22. The Effect of Cloud Computing in Next Generation Sequencing Conclusion: • Handling huge datasets that generated in next generation sequencing is crucial. • Cloud computing can be used in next generation techniques. Suggestion: • Cloud enable frameworks such as Hadoop, MapReduce and HBase could be used in next generation sequencing methods to facilitate NGS analytics that allow users to rapidly interrogate vast data sets. • Develop CLoVR platform for analyzing DNA sequences.