• Tidak ada hasil yang ditemukan

Signal Processing Methods for Genomic Sequence Analysis

N/A
N/A
Protected

Academic year: 2024

Membagikan "Signal Processing Methods for Genomic Sequence Analysis"

Copied!
196
0
0

Teks penuh

The first part of the thesis focuses on signal processing methods that can be used for the analysis of RNA sequences. The primary focus of the thesis lies in the application of signal processing concepts to the analysis of genomic sequence data.

Discrete Fourier transform (DFT)

In Section 1.1 we briefly describe the discrete Fourier transform (DFT) that can be used to isolate the signal component with certain periodicity. In Section 1.4 we review some fundamentals in genomics, and in Section 1.5 we briefly describe the concept of RNA secondary structures.

Figure 1.1: DFTs of periodic signals. (Top) Magnitude plot of the DFT of a signal with a period T = 3
Figure 1.1: DFTs of periodic signals. (Top) Magnitude plot of the DFT of a signal with a period T = 3

Markov chain

The Markov chains are used in Chapter 6, where they are used to represent the base sequences within CpG islands and those outside CpG islands. It is demonstrated that they can be effectively used to distinguish CpG islands from the non-CpG island regions.

Hidden Markov model (HMM)

T is the transition probability matrix, E is the emission probability matrix, and π is the initial state distribution of the model. This algorithm can iteratively find the parameters that reach a local maximum of the observation probability of the training sequences.

Figure 1.4: Illustration of the doubly embedded stochastic process in HMMs. The stochastic process consists of an observable symbol sequence and a hidden state sequence.
Figure 1.4: Illustration of the doubly embedded stochastic process in HMMs. The stochastic process consists of an observable symbol sequence and a hidden state sequence.

Review of some fundamentals in genomics

DNA and RNA

A single strand of DNA consists of many nucleotides linked together to form a long chain. Generally, a single DNA strand forms a double helix with another single DNA strand via hydrogen bonding between the bases.

Figure 1.6: Illustration of a nucleotide and a DNA strand.
Figure 1.6: Illustration of a nucleotide and a DNA strand.

Protein synthesis

  • Transcription
  • Translation

As the contents of DNA are copied into RNA, a thymine (T) in the original DNA sequence is replaced by a uracil (U) in the RNA being synthesized. Most protein-coding genes in eukaryotes consist of two types of regions called exons and introns (see Figure 1.10).3 The introns are removed from the pre-mRNA and the remaining exons are spliced ​​together to form amRNA (messenger RNA). . .

Figure 1.9: The central dogma of molecular biology states that the genetic information flows from DNA to RNA to protein.
Figure 1.9: The central dogma of molecular biology states that the genetic information flows from DNA to RNA to protein.

RNA secondary structure

Secondary structures with intersecting interactions, where there exist base pairs at (i, j) and (k, `) that

Outline of the thesis

  • Context-sensitive hidden Markov models (Chapter 2)
  • RNA sequence analysis using context-sensitive HMMs (Chapter 3)
  • Profile context-sensitive hidden Markov models (Chapter 4)
  • Predicting protein-coding genes using digital filters (Chapter 5)
  • Identification of CpG islands using filter banks (Chapter 6)

In Section 2.3, we introduce the concept of context-sensitive HMM (CSHMM), which is an exposition of HMM that can be used to represent long-range correlations between distant symbols. In Section 2.4.1, we briefly describe how we can implement a dynamic programming algorithm that can be used to find the optimal state sequence that maximizes the probability of an observation sequence, based on a given CSHMM.

HMMs and transformational grammars

Transformational grammars

These are regular grammars, context-free grammars, context-sensitive grammars, and unconstrained grammars, in order of decreasing constraints on production rules. As the diagram shows, ordinary grammars are the simplest of the four and have the most restricted production rules.

Figure 2.1: The Chomsky hierarchy of transformational grammars nested according to the restric- restric-tions on the allowed production rules.
Figure 2.1: The Chomsky hierarchy of transformational grammars nested according to the restric- restric-tions on the allowed production rules.

Palindrome language

Context-sensitive hidden Markov models

Basic elements of a csHMM

  • Hidden states
  • Observation symbols
  • Transition probabilities
  • Emission probabilities

As shown in (2.3), the number of pairwise emission states is the same as the number of context-sensitive states. The data stored in the memory affects the emission probabilities and the transition probabilities of Cn in the future.

Figure 2.3: The states P n and C n associated with a stack Z n .
Figure 2.3: The states P n and C n associated with a stack Z n .

Constructing a csHMM

Virv ∈ C the emission probability depends on bothesi =of the contextZn, so it is defined as. 2.6). In the case that the emission probability depends only on a single symbol xpen the memoryZn (e.g. if Zn . uses a stack, xpm can be the symbol on top of the stack), the emission probability in (2.6) can simply be ase(x |v) be written , xp).

Finding the most probable path

  • Alignment of csHMM
  • Computing the log-probability of the optimal path
  • Trace-back
  • Computational complexity

Finally, let us define γ(i, j, v, w) as the log-likelihood of the optimal path among all subpathssi. Therefore, the log-likelihood of the most likely path, where si = Pn and sj = Cn form a pair, can be calculated as follows.

Figure 2.5: An example of a simple context-sensitive HMM.
Figure 2.5: An example of a simple context-sensitive HMM.

Computing the probability of an observed sequence

Scoring of csHMM

The csHMM scoring algorithm can be thought of as a variant of the alignment algorithm where the maxoperators are replaced by sums. The computational complexity of this algorithm is the same as the alignment algorithm shown in (2.9).

The outside algorithm

As shown in (v) of the iteration step, we first calculate the product β(i, j+ 1, v, u) and the transition probabilities t(w, u) and the emission probabilities of the symbol xj in states j = w and add the product to over. When the iteration step is finished, the final step of the outer algorithm also yields the probabilityP(x|Θ), like the scoring algorithm in Section 2.5.1.

Figure 2.11: Illustration of the iteration step of the outside algorithm. (a) Case (ii)
Figure 2.11: Illustration of the iteration step of the outside algorithm. (a) Case (ii)

Estimating the model parameters

ˆt(v, w) = Expected number of transitions from=Cntow∈ En Expected number of transitions from=Cnto any state inEn. ˆt(v, w) = Expected number of transitions from=Cntow∈ Fn Expected number of transitions from=Cnto any state inFn.

Experimental results

To test the parameter reestimation algorithm, we first generated 200 symbol strings based on the model in Figure 2.13. We then randomly initialized the transition and emission probabilities of the model and ran the algorithm in Section 2.6 to optimize the model parameters.

Table 2.4: Estimated emission probabilities e(x|v) after 10 iterations.
Table 2.4: Estimated emission probabilities e(x|v) after 10 iterations.

Discussions

  • Emission of multiple symbols
  • Modeling crossing correlations
  • Comparison with other variants of HMM
  • Comparison with other stochastic grammars

The PMC assumes that the pair of random variables (xi, si) is a Markov chain. Since HMMs correspond to stochastic regular grammar (SRG), csHMM can be seen as an extension of SRG with specific context-sensitive production rules.

Figure 2.16: (a) A csHMM that results in crossing interactions. (b) An example of a generated symbol sequence
Figure 2.16: (a) A csHMM that results in crossing interactions. (b) An example of a generated symbol sequence

Conclusion

In Section 3.4, we show how the context-sensitive HMMs (csHMMs) introduced in Chapter 2 can be applied to RNA homology searches. Experimental results are given in Section 3.4.3 to demonstrate the performance of the csHMM-based search method.

RNA secondary structure

In Section 3.2, we show that RNA secondary structures play an important role in the execution of ncRNA functions, and therefore many ncRNAs have well-conserved secondary structures. In Section 3.4.1, we first give several examples of csHMMs representing different RNA secondary structures.

Figure 3.1: Two common mechanisms of riboswitches in bacteria. (a) Translation control
Figure 3.1: Two common mechanisms of riboswitches in bacteria. (a) Translation control

Searching for homologous RNAs

Sequence-based homology search

Most of the search methods that have been used to find homologous protein-coding genes are based on sequence similarity. Because profile-HMMs can effectively describe the different probabilities of symbols at different locations and easily handle additional insertions and deletions at any location, they have been widely used in several applications such as identification of protein-coding genes [58] and sequence alignment [25]. .

Statistical model for RNA sequences

From this perspective, we can understand base pairing in an RNA secondary structure in terms of the pairwise correlations between distant bases in the RNA primary sequence. In the next section, we show how csHMMs can be used to represent RNA secondary structures and find homologous RNAs.

Figure 3.4: Compensatory mutations give rise to strong pairwise correlations in the primary se- se-quence of an RNA.
Figure 3.4: Compensatory mutations give rise to strong pairwise correlations in the primary se- se-quence of an RNA.

Database search using csHMMs

Modeling RNA secondary structures

Note that x represents a base in the RNA sequence, which takes one of the four values ​​A, C, G, and U. As shown in Figure 3.7 (b), the cloverleaf structure can be modeled using four pairs of (Pn, Cn), where a separate stack is dedicated to each state pair.

Figure 3.5: (a) A typical stem-loop. The nodes represent the bases in the RNA, and the dotted lines indicate the interactions between bases that form complementary base pairs
Figure 3.5: (a) A typical stem-loop. The nodes represent the bases in the RNA, and the dotted lines indicate the interactions between bases that form complementary base pairs

Database search algorithm

Sidenyi must form a pair with yjas shown in Figure 3.9 (a) by the dotted line, the pairwise emission states and the corresponding context-sensitive states inside yi+1. Therefore, γ(j, d, v, w) can be computed by expanding γ(j−1, d−1, v, u) to the right by one symbol, as described in step (vi) of the algorithm.

Figure 3.8: Two different update schemes. (a) When using the variable γ(i, d, v, w). (b) When using the variable γ(j, d, v, w).
Figure 3.8: Two different update schemes. (a) When using the variable γ(i, d, v, w). (b) When using the variable γ(j, d, v, w).

Predicting iron response elements

The search results of the csHMM-based IRE finder are shown in the third column. In the fourth sequence (accession number: J04755), the predicted locus of the csHMM-based method was identical to the locus stored in the Rfam database.

Figure 3.12: The consensus secondary structures of the iron response elements (IREs).
Figure 3.12: The consensus secondary structures of the iron response elements (IREs).

Identification of RNAs with alternative folding

Modeling alternative structures

Instead of modeling the overall correlations in the RNA sequence by a single model, we can use multiple csH-MMs to represent the respective correlations arising from each of the alternative RNA secondary structures. For example, we can use a csHMM to describe the correlations resulting from "structure 1" (shown in Figure 3.15 (b)) and use another csHMM to describe the correlations that arise.

Figure 3.14: An antiswitch regulator. (a) Secondary structure of the antiswitch in the absence of lig- lig-and
Figure 3.14: An antiswitch regulator. (a) Secondary structure of the antiswitch in the absence of lig- lig-and

Experimental results

Given a new RNA sequence, we can annotate it based on the two csHMMs using an efficient polynomial-time algorithm (introduced in Appendix B [128]. As we can see in Figure 3.17, sequences with alternative structures (depicted by black diamonds) well separated from sequences with either "structure 1" or "structure 2," or unstructured sequences.

Figure 3.16: (a) The csHMM that represents structure 1. (b) The csHMM that represents structure 2.
Figure 3.16: (a) The csHMM that represents structure 1. (b) The csHMM that represents structure 2.

Beyond homology search: Identifying novel ncRNAs

A common strategy of many general-purpose ncRNA gene finders – such as QRNA[88], ddbRNA [21], MSARI[18], and RNAz[119] – can be summarized as follows [71 ]. Recently, RNAz has been used to perform a comparative screening of several vertebrate genomes and predicted more than 30,000 putative ncRNA genes in the human genome [120].

Conclusion

In Section 4.5, we propose a practical method that can make a profile csHMM-based database search significantly faster. The basic idea of ​​the proposed method is described in Section 4.5.1, and its technical details are given in Section 4.5.2.

Profile context-sensitve HMM

Model construction

  • Constructing an ungapped model
  • Representing insertions and deletions
  • Constructing a profile-csHMM from an RNA sequence alignment . 95

The match statusMk represents the case where a base in the observed RNA sequence matches the kth base in the consensus RNA sequence. Note that the first and fourth bases in the consensus sequence form a base pair.

Figure 4.2: Constructing a profile-csHMM from an RNA multiple sequence alignment. (a) An alignment of five RNA sequences
Figure 4.2: Constructing a profile-csHMM from an RNA multiple sequence alignment. (a) An alignment of five RNA sequences

Optimal alignment of profile-csHMM

  • Initialization
  • Adjoining subsequences
  • Adjoining order
  • Termination
  • Trace-back
  • Computational complexity

If

Figure 4.4: (a) An RNA sequence with no structural annotation. (b) Optimal state sequence of the observed RNA sequence in the given profile-csHMM
Figure 4.4: (a) An RNA sequence with no structural annotation. (b) Optimal state sequence of the observed RNA sequence in the given profile-csHMM

Structural alignment of RNA pseudoknots

  • Building an alignment tool using the profile-csHMM
  • Restricting the search region
  • Examples of structural alignments
  • Experimental results

In implementing the SCA algorithm, we have introduced a parameter D, which is the length of the search region to find the matching bases in the sequence alignment. The prediction performance of the proposed method is not strongly dependent on the sequence similarity.

Figure 4.6: Matching bases in an RNA sequence alignment. (a) The maximum distance between the matching bases is two
Figure 4.6: Matching bases in an RNA sequence alignment. (a) The maximum distance between the matching bases is two

Fast search using prescreening filters

  • Searching for similar sequences
  • Constructing the prescreening filter
  • No degradation in the prediction accuracy
  • Experimental results

Based on the parameters of the original profile csHMM defined above, we choose the parameters of the prescreening filter as follows. Second, the profile HMM transition score is selected for a state-to-state transition as follows.

Figure 4.10: Illustration of the proposed algorithm.
Figure 4.10: Illustration of the proposed algorithm.

Conclusion

The indicator sequence for each of the four bases (A, C, G, T), which is defined in section 5.3.1, can be used for this purpose. In Section 5.3.2, we review the concept of the DNA spectrogram that can be used to isolate period-3 components.

Period-3 patterns in protein-coding regions

Finding genes from the DNA spectrum

Indicator Sequence

According to this definition, the indicator sequencesxB(n) for the four bases B∈{A, C, G, T} can be defined as follows.

Using DFT for detecting the period-3 patterns

Such behaviors have been demonstrated in many papers [3, 106], although the peak strength is highly dependent on the respective gene. It is important to make the Size window large enough so that the peak due to the periodicity dominates the noisy background.

Relation to digital filtering

In the coding regions, we expect xB(n) to contain a period-3 pattern, so most of its energy is concentrated in the passband of H(z). The output yB(n) will be large in the coding regions due to the period-3 component.

Figure 5.1: The magnitude response of the sliding window w(n).
Figure 5.1: The magnitude response of the sliding window w(n).

IIR antinotch filters

Designing antinotch filters

In this case, the pole and zero of the filterG(z) are very close to each other, as illustrated in Figure 5.3. This is demonstrated in Figure 5.4, which shows the magnitude response of the filterG(z) for two different values ​​ofR.

Fig. 5. Poles andzeros of the notch filter GðzÞ andthe allpass filter AðzÞ:
Fig. 5. Poles andzeros of the notch filter GðzÞ andthe allpass filter AðzÞ:

Implementation of the antinotch filter using a lattice structure

Even though the IIR antinotch method has been found to work well, with a slight increase in the number of multipliers we can design filters with much better stopband attenuation. IfG(z) is a good notch filter as shown in Figure 5.4, the power complementary filterH(z) becomes a good notch filter, as we can see in Figure 5.5.

Experimental results

Multistage filters

Designing a multistage filter

To see how this works, let us consider a narrowband low-pass filterH1(z) as shown in Figure 5.8 (a). To eliminate the unwanted passband at ω= 0, we cascade H1(z3) with a high-pass filterH2(z), which is shown in Figure 5.8 (c).

Low complexity implementation

The multiphase idea is similar in principle to the so-called IFIR method introduced by Neuvo et al. It should be noted that H1ðzÞ can be implemented using the allpass decomposition method [11], which allows the third-order elliptic filter to be written in the form.

Fig. 10 shows an example. Here H 1 ðzÞ is a thirdorder elliptic filter andH 2 ðzÞ is chosen to have two zeros at o ¼ 0; that is,
Fig. 10 shows an example. Here H 1 ðzÞ is a thirdorder elliptic filter andH 2 ðzÞ is chosen to have two zeros at o ¼ 0; that is,

Experimental results

Conclusion

Analysis of the human genome shows that all housekeeping genes (that is, genes expressed in all cells throughout the body that produce proteins necessary for basic maintenance and cellular functions) and 40% of tissue-specific genes are CpG-linked. islands [61]. In Section 6.2, we review some common CpG island prediction methods that have been proposed in the literature.

Fig. 11. Top plot: the DFT basedspectrum S½N=3 for gene F56F11.4 in the C-elegans chromosome III.
Fig. 11. Top plot: the DFT basedspectrum S½N=3 for gene F56F11.4 in the C-elegans chromosome III.

Identification of CpG islands

Markov chains

This allows us to determine whether the given DNA segment belongs to a CpG island or not. Similarly, the probability of observing this sequence given that it belongs to a non-CpG island region is

Experimental results

We can see that there are many unwanted zero crossings due to the fluctuations of S(n). We can see that the region around the base location has 3000 positive values, although it does not belong to the CpG island.

Figure 6.1: (Top) CpG island prediction result obtained by the conventional Markov chain method.
Figure 6.1: (Top) CpG island prediction result obtained by the conventional Markov chain method.

Identifying CpG islands using a bank of IIR lowpass filters

Filtering the log-likelihood ratios using a filter bank

Choosing the k(n) filter in this way results in the weighted average of (n), where newer entries are given greater weights than older ones.

Experimental results

Another interesting point we can notice in Figure 6.4 is the fact that the shaded region slightly bends to the right as it grows. So there is a trade-off between filter response and output stability.

Figure 6.3: Contour plot of the outputs S k (n) . The red band in the middle clearly indicates the existence of a CpG island.
Figure 6.3: Contour plot of the outputs S k (n) . The red band in the middle clearly indicates the existence of a CpG island.

Predicting the transition points between different regions

  • Rectangular window
  • Exponentially decaying window

If we allow the length of the portion of the window that overlaps with the second region, the expectation of (n) can be written as Based on the transition probabilities in Table 6.1 and Table 6.2, we obtain the plot of delay ∗ as a function of αAs shown in Figure 6.7.

Figure 6.5: A rectangular window of length L located around the transition point.
Figure 6.5: A rectangular window of length L located around the transition point.

Conclusion

First, we can consider using the corresponding pairwise emission states to generate the "a's" in the header section. In the following sections, we describe the simplified algorithms that can be used with these sequences.

Figure 6.7: The delay k ∗ corresponding to the value α k .
Figure 6.7: The delay k ∗ corresponding to the value α k .

Computing the log-probability of the optimal path

The proposed algorithm starts from the inside of the observation sequence and proceeds to the outward direction to find the optimal path iteratively. This informs us about the symbol that was emitted by Pn and therefore we can adjust the probability of the corresponding state according to this value.

Trace-back

It should be noted that every time there is an interaction between siands, they are considered simultaneously as shown in (ii) and (iii) of the iteration step. It is not difficult to see that the computational complexity of the alignment algorithm is O(L2M3), which is much better than O(ML) of the exhaustive search, and also smaller than the complexity O(L3M3) of the more general alignment algorithm described in Section 2.4.

Simplified scoring algorithm

  • The DFT of a periodic signal with a period T = 3 buried in Gaussian noise. We can
  • Example of a state transition diagram that represents a Markov chain with two distinct
  • Illustration of the doubly embedded stochastic process in HMMs. The stochastic pro-
  • Example of a state transition diagram that represents a hidden Markov model with
  • Illustration of a nucleotide and a DNA strand
  • Illustration of a DNA double helix
  • Example of a DNA double helix that has been straightened out for simplicity
  • The central dogma of molecular biology states that the genetic information flows from
  • Illustration of a typical protein synthesis process
  • The genetic code
  • Two examples of RNAs with secondary structures. The primary sequence of each
  • The Chomsky hierarchy of transformational grammars nested according to the restric-
  • The states P n and C n associated with a stack Z n
  • An example of a context-sensitive HMM that generates only palindromes
  • An example of a simple context-sensitive HMM
  • Examples of interactions in a symbol string. The dotted lines indicate the pairwise de-
  • Illustration of the iteration step of the algorithm
  • Illustration of the iteration step of the algorithm for the case when s i = P n and s j = C n . 43
  • Illustration of the iteration step of the outside algorithm. (a) Case (ii). (b) Case (iii). (c)
  • Illustration of the iteration step of the outside algorithm. (a) Case (v). (b) Case (vi). (c)
  • An example of a context-sensitive HMM
  • The arithmetic mean (top) and the geometric mean (bottom) after each iteration
  • An example sequence that can be generated by the modified model of Figure 2.4
  • An illustration of the basic concept of the algorithm that can be used when there exist
  • The csHMM in the Chomsky hierarchy
  • Ungapped alignment between two RNA sequences. (a) An RNA with a stem-loop
  • Compensatory mutations give rise to strong pairwise correlations in the primary se-
  • Two different update schemes. (a) When using the variable γ(i, d, v, w) . (b) When
  • Illustration of step (v)
  • Illustration of step (vi)
  • Illustration of step (vii)
  • The consensus secondary structures of the iron response elements (IREs)
  • A csHMM that represents the IREs
  • An antiswitch regulator. (a) Secondary structure of the antiswitch in the absence of
  • Poles and zeros of the notch filter G(z) and the allpass filter A(z)
  • Magnitude response of the notch filter G(z) for two values of R
  • Magnitude response of the antinotch filter H (z) for two values of R
  • Implementation of the antinotch filter H (z) = V (z)/X(z) using a lattice structure
  • Exon prediction results for the gene F56F11.4 in the C. elegans chromosome III. (Top)
  • Designing a bandpass filter based on multistage filtering. (a) Magnitude response of
  • Multistage filtering
  • Magnitude response of the filters used in the multistage design method. (a) Lowpass
  • Exon prediction results for the gene F56F11.4 in the C. elegans chromosome III. (Top)
  • A bank of M lowpass filters with different bandwidths
  • Contour plot of the outputs S k (n). The red band in the middle clearly indicates the
  • Two level contour plot of the outputs S k (n). The level curve is located at zero, sepa-
  • A rectangular window of length L located around the transition point
  • An exponentially decaying window located around the transition point
  • The delay k ∗ corresponding to the value α k
  • The Chomsky hierarchy of transformational grammars
  • Computational complexity of the csHMM alignment algorithm
  • Emission probabilities e(x|v)
  • Estimated emission probabilities e(x|v) after 10 iterations
  • The database search result for finding IREs
  • Prediction results of the proposed method for several RNA families with pseudoknot
  • CPU time for aligning two sequences in each RNA family. The experiments have been
  • Prediction results of the proposed method using randomly mutated RNA sequences. 112
  • Transition probabilities in the non-CpG island region

Proceedings of the IEEE International Workshop on Genomic Signal Processing and Statistics (GENSIPS), Raleigh, NC, October 2002. Vaidyanthan, “Optimal alignment algorithm for context-sensitive hidden Markov models,” Proceedings of the 30th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Philadelphia, March 2005.

Figure B.2: Illustration of the iteration step of the simplified scoring algorithm.
Figure B.2: Illustration of the iteration step of the simplified scoring algorithm.

Referensi

Dokumen terkait