PRIVATE SECURITY AND PROTECTION (TURKISH) | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
MBG4059 | Computational Methods in Bioinformatics | Spring Fall |
3 | 0 | 3 | 6 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Non-Departmental Elective |
Course Level: | Associate (Short Cycle) |
Mode of Delivery: | Face to face |
Course Coordinator : | Dr. Öğr. Üyesi ELIZABETH HEMOND |
Course Objectives: | The goal of this course is to provide an understanding of the fundamental computational methods used in bioinformatics and the set of algorithms that have important applications both inside and outside of the bioinformatics field. |
The students who have succeeded in this course; 1. Recognize the fundamental models of computation useful in modeling nucleic acid and protein sequences. 2. Design and implement algorithms useful for analyzing various molecular biology data. 3. Discuss Genetic Algorithm and its applications in bioinformatics. 4. Discuss Greedy Algorithms and its applications in bioinformatics. 5. Discuss Gibbs sampling and its applications in bioinformatics. 6. Recognize Expectation Maximization and its applications in bioinformatics. 7. Recognize Hidden Markov models and its applications in bioinformatics. 8. Define Bayesian networks and its applications in bioinformatics. 9. Define graphs and its applications in bioinformatics. |
This course will provide a broad and thorough background in computational methods and algorithms that are widely used in bioinformatics applications. Various existing methods will be critically described and the strengths and limitations of each will be discussed. |
Week | Subject | Related Preparation |
1) | A brief introduction to computational complexity and algorithm design techniques | |
2) | Exact sequence search algorithms | |
3) | Rabin-Karp algorithm, pattern matching, suffix trees | |
4) | Elements of dynamic programming, Manhattan tourist problem, k-band algorithm | |
5) | Approximate string matching, divide and conquer algorithms | |
6) | Branch and bound search | |
7) | Genetic Algorithm | |
8) | Greedy Algorithms | |
9) | Gibbs sampling | |
10) | Expectation Maximization | |
11) | Hidden Markov models | |
12) | Bayesian networks | |
13) | Graphs | |
14) | Review |
Course Notes / Textbooks: | Haftalık ders notları iletilecektir. Weekly course notes will be provided. |
References: | An Introduction to Bioinformatics Algorithms (Computational Molecular Biology), Neil Jones and Pavel Pevzner, MIT Press, 2004. |
Semester Requirements | Number of Activities | Level of Contribution |
Homework Assignments | 2 | % 10 |
Project | 1 | % 15 |
Midterms | 1 | % 25 |
Final | 1 | % 50 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 35 | |
PERCENTAGE OF FINAL WORK | % 65 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 14 | 6 | 84 |
Presentations / Seminar | 5 | 4 | 20 |
Midterms | 1 | 2 | 2 |
Final | 1 | 2 | 2 |
Total Workload | 150 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Upon the completion of the program, the students will be able to; Utilize the theoretical information they have acquired in private security sector | |
2) | Develop the skill of working in a team cooperatively | |
3) | Develop the skill of identifying and analyzing the vocational problems of private security and resolving them effectively. | |
4) | Develop the behavioral consciousness of occupational ethics and sense of responsibility | |
5) | Develop an awareness for life long learning and physical progress | |
6) | Develop the skill of having information about daily problems and developments about private security. | |
7) | Comprehend the laws and regulations of the sector. | |
8) | Develop the skill of effective communication. | |
9) | Develop the skill of adopting the security technologies. | |
10) | Develop the skill of planning and practicing vocational processes. | |
11) | Develop the skill of having entrepreneurship personality | |
12) | Develop the skill of communicating in the private security sector in a foreign language. |