+ All Categories
Home > Documents > 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc ›...

2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc ›...

Date post: 03-Jul-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
40
Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 1 2007 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE April 1-5, 2007, Honolulu, Hawaii, USA Hilton Hawaiian Village Beach Resort & Spa, Waikiki 2007 IEEE Symposium on Computational Intelligence on Computational Biology and Bioinformatics (CIBCB 2007) Tutorial Signal and Motif Detection in Genomic Sequences Jagath C. Rajapakse, Ph.D BioInformatics Research Centre Nanyang Technological University, Singapore Copyright 2007 Jagath C. Rajapakse Central Dogma of Molecular Biology DNA transcription pre-mRNA splicing mRNA translation Protein cell cytoplasm
Transcript
Page 1: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 1

2007 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCEApril 1-5, 2007, Honolulu, Hawaii, USA

Hilton Hawaiian Village Beach Resort & Spa, Waikiki

2007 IEEE Symposium on Computational Intelligence on Computational Biology and Bioinformatics (CIBCB 2007)

Tutorial

Signal and Motif Detection in Genomic Sequences

Jagath C. Rajapakse, Ph.D

BioInformatics Research CentreNanyang Technological University, Singapore

Copyright 2007 Jagath C. Rajapakse

Central Dogma of Molecular Biology

DNA

transcription

pre-mRNA

splicing

mRNA

translation

Protein

cell cytoplasm

Page 2: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 2

Transcription: DNA→nRNA (pre-mRNA)

Splicing: nRNA→mRNA

Page 3: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 3

Translation: mRNA→protein

F

L

I

MV

S

P

T

A

Y

H

Q

N

K

D

E

C

WR

G

AT

E

LR

S

stop

Stages in eukaryotic gene expression

From nobelprize.org

TIS

Page 4: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 4

Signal and Motif Detection

Signals

• Splice Sites (SS)

• Transcription Start Sites (TSS)

• Translation Initiation Sites (TIS)

Promoters

Motifs

General Scheme of Signal Detection

TCTTTGGAAGCCAAGATGAsignal sequence

Feature extraction, encoding

Prediction, feature integration

Page 5: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 5

Markov Chain Models

A region of DNA can be represented by Markov chain model.

In a k-order Markov chain, The nucleotide at site i depends k previous nucleotides.

The features extracted by a Markov chain of order k at site i is represented by a vector Pi(si) = ( P(si|si-1,…,si-k) : si ∈A,C,G,T ).

i-1

si si+1 si+2si-1

i i+1 i+2

Pi( si) Pi+1( si+1)

Neural Networks

Consider a neural network with n input nodes and m hidden nodes.

The prediction y of a neural network receiving input x = (x1, x2, … xn)

wk and wkj, where k = 1, 2, …m, and j = 1, 2, … n represent weights connected to the output neuron and hidden neurons, respectively.

Page 6: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 6

Higher-Order Markov ModelsConsider a sequence s = ( s1, s2, … sn )

Higher-order conditional dependencies can be approximated by interpolation

where ak are real coefficients such that and gk(.) represents the relationships of different-order contextual nucleotide interactions that, for instance, can be chosen to be a sigmoid function dependent on the frequency of last k symbols (Ohler et al., 1999)

By replacing conditional probabilities with probabilities conditioned by a less number of elements, and by using chain rule, the likelihood of the sequence is given by

where coefficients c and d are non-negative integer coefficients.

That is, the nonlinear relationships amongst variables in the sequence is represented favorably by a polynomial of sufficient order.

Page 7: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 7

Higher-Order Markov Models with Neural Networks

If the features are given to a neural network as inputs, the output

approximates an higher-order polynomial of input features, determined by the number of hidden units.

Training:

Phase 1: estimate the Markov chains’ parametersParameters of kth order Markov chain are estimated, according to

Phase 2: train the component neural networksThe training sequences are applied and the Markovian probabilities are

used as inputs to the network.The neural networks are trained independently by using an online error

backpropagation algorithm.

Page 8: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 8

K-gramsk consecutive letters

k = 1, 2, 3, 4, 5, …Window size vs. fixed positionUp-stream, downstream vs. any where in windowIn-frame vs. any frame

For each value of k, there are 4k * 3 * 2 k-grams.For k = 1, 2, 3, 4, 5, we have

4 + 24 + 96 + 384 + 1536 + 6144 = 8188 features!

This is too many for most CI algorithms.The counts of k-grams along the sequence should be obtained.

Amino Acid K-grams Discovered by Entropy

Copyright © 2003 Limsoon Wong

Page 9: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 9

Sample k-grams Selected by CFS

Position –3

in-frame upstream ATG

in-frame downstream TAA, TAG, TGA, CTG, GAC, GAG, and GCC

Kozak consensusLeaky scanning

Stop codon

Codon bias?

Splice sites

acceptor site donor site

Page 10: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 10

Representation of splice sites

Splice site detection with neural networks and Markov encodingRajapakse & Ho, 2005, IEEE TCBB

UpstreamMarkov chain

model

SignalMarkov chain

model

DownstreamMarkov chain

model

Neural network

Encodingprocess

Encodingprocess

Encodin

g

process

DNAsequence

Prediction

Page 11: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 11

Markov models surrounding splice sites:

If the signal, upstream, downstream segment models are denoted by MS, MU, MD, respectively, whose parameters are given by

PiU(si) = Pi(si|si-1, si-1, MU), second-order Markov property

PiS (si) = Pi(si|si-1, MS), first-order Markov property

PiD (si) = Pi(si|si-1, si-1, MD), second-order Markov property

where:MS = Pi

S(s) |s ∈ΣDNA, i=1,2,…,lSMU = Pi

U(s) |s ∈ΣDNA, i=1,2,…,lUMD = Pi

D(s) |s ∈ΣDNA, i=1,2,…,lD

Features input to the neural network:

Incorporate the homology of potential splice sites into the neural networkLearn the compositional contrasts of coding and non-coding regionsAccounts for higher-order interactions among the nucleotides.

Page 12: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 12

Accuracy measures

Sensitivity =No. of correct positive predictions

No. of positives

=TP

TP + FN

wrt positives

Specificity =No. of correct negative predictions

No. of negatives

=TN

TN + FP

wrt positives

( ) ( ))()()()( FNTNFPTPFPTNFNTP

FPFNTNTPCC+×+×+×+

×−×=

Correlation Coefficient

Experiments NN269 dataset (Reese et al., 1997)

269 human genesTraining set:

1116 true acceptor sites and 1116 true donor sites4672 false acceptor sites and 4140 false donor sites

Testing set:208 true acceptor sites and 208 true donor sites881 false acceptor sites and 782 false donor sites

GS1115 dataset (Pertea et al., 2001)1115 human genes5733 true acceptor sites and 5733 true donor sites650099 false acceptor sites and 478983 false donor sites

Page 13: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 13

Page 14: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 14

Transcription Start Site (TSS)

TATA

+1

PromoterProximalElement

Enhancer

Enhancer

EnhancerIntron

Exon

-30-200+10~50 Kb-10~-50 Kb

Representation and biological properties of TSS

TATA-box, a binding site usually found at –25 bp upstream of TSSs, is the most conserved sequence motif.

Inr is a weaker signal than TATA-box

TSS signals are more complex than splice site signals.

DNA sequence

1 - TSS

Inr Segment11-14

-10-40 TATA-box Segment

Page 15: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 15

NNPP (TSS Recognition)

NNPP2.1use 3 time-delayed ANNsrecognize TATA-box, Initiator, and their mutual distance

Makes about 1 prediction per 550 nt at 0.75 sensitivity

Promoter 2.0 (TSS Recognition)

Promoter 2.0use ANN recognize 4 signals commonly present in eukaryotic promoters: TATA-box, Initiator, GC-box, CCAAT-box, and their mutual distances

Page 16: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 16

TSS detection with Neural Networks and Markov Encoding

-40

+11

-14

-10

TSScandidate +1

TATAMarkov chain

model

TATA “+” InrMarkov chain

model

InrMarkov chain

model

TATAneural network

TATA “+” Inrneural network

Encodingprocess

Encodingprocess

Encodingprocess Inr

neural network

Votingscheme

DNAsequence

Prediction

Enhanced Markov Encoding

In the orthogonal encoding method, a nucleotide s is encoded by a block of four digits bs, e.g. bA = (1,0,0,0), bC = (0,1,0,0), bG = (0,0,1,0), bT = (0,0,0,1).

The Markov encoding model combines the outputs from Markov chainmodel and the orthogonal encoding, e.g.:1. Input sequence ( s1, …, sl )2. Calculate the outputs of the Markov chain model

(P1(s1), P2(s2),…, Pl(sl))3. Calculate 4* l units (bs1,bs2,…,bsl) using the orthogonal encoding4. Output a vector of 4 * l units (cs1,cs2,…,csl) where csi = Pi(si)bsi.

Page 17: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 17

Inputs to Neural Network

Experiments

>HUMCYC1A CDS 1 Intron 1 GTGAGCGCTGGGCCGGGCCCCGGCCTCCGCGCGGCCCCGCATCTCCGTGAAGGTCACGGC GGGGAGGCTGCGGGCGCGGGCCTGGGCAGCGCGGAAGCGGTACCGGCCACCCAGCGTCC CCGGTCCCAGCTGCCTGCCGACCTTGAGCTGGTGGGATCAGGGCTGGGCGCCCACCTCTCC GAACGGCAGAGAGCCCGTCCCCAGCGTGGGGGTTGGCGGGACGGGCTAGCTGCCGTGGCG GGGCTGGGGCTTTCCCGAATGGCGCGCCCAGGACGGCTCTTGCGGCTGGCTGTCCAAACT

Data set (Reese, 2001)5800 sequences extracted from EDP release 50300 bp long; 250 bp upstream and 50 bp downstream565 true promoters, 890 CDS and 4345 intron sequences

Page 18: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 18

Letter ‘-’indicates that NNPP 2.1 was unable to report its correlation coefficient at 90% true positives

10

20

30

40

50

60

70

80

0 5 10 151-specificity

Sen

sitiv

ity

NNPPPresent method

Comparison of correlation coefficients, average over five-fold cross validated sets

CTGGACCCTCGGACCCCACCACCATGGAAGGGGGCTCCGAGCTGCTCT

Translation Initiation Site (TIS)

+53

upstream segment downstream segment

-50 +1

coding regionnon-coding region(un-translated region)

+4

Page 19: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 19

Surrounding features of TIS

Highly conserved positions (e.g. +4, -3, Kozak et al.)

The compositional differences between coding downstream region and non-coding upstream region

Periodic properties (codon distributions) in the downstream region

The present of stop codon in the downstream region

The ribosome scanning rule

Hatzigeorgiou’s DIANA-TIS

Get local TIS score of ATG and -7 to +5 bases flanking

Get coding potential of 60 in-frame bases up-stream and down-stream

Get coding score by subtracting down-stream from up-stream

ATG may be TIS if product of two scores is > 0.2

Choose the 1st one

Page 20: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 20

TIS detection with Neural Networks and Markov Encoding

Encoding

process

-50

+53

-1

+4

UpstreamMarkov chain

model

DownstreamMarkov chain

model

Downstreamprotein coding

model

Upstreamneural network

Consensusneural network

Encodingprocess

Encodingprocess

Encodingprocess Downstream

neural network

Votingscheme

Upstream

segment

Dow

nstreamsegm

ent

DNAsequence

PredictionTIScandidate

ATG

Features input to Upstream and Consensus networks

TGCA

DNA sequence A G T A T C A T T A C C

TGCA

P(si|si-1,si-2,…,si-k)

1 i lMarkov chainmodel

Neural network

Input layer

G G

Page 21: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 21

Features input to Downstream Network

Coding differential

Conservative replacements of amino acids through evolution

Minimum length of a protein

Protein encoding model:

The protein encoding model converts the DNA sequence into a vector of 38 units, representing features of amino acids:1. Replace each amino acid in corresponding protein sequence by one

of six exchange symbols (conserved through evolution).2. Count all overlapping occurrences of any two consecutive elements

(di-exchange symbols) in the resulting sequence3. Use the first 36 units to summarize the sequence, each unit gives

the normalized frequency of the corresponding di-element.4. Set the unit 37 to a value 1 if the in-frame stop codon is absent

within 100 nucleotides downstream of the TIS or a value 0, otherwise

5. Set the unit 38 to a value 0 if the stop codon occurs in every reading frame within 200 nucleotides downstream of the TIS or a value 1, otherwise.

Page 22: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 22

Experiments

Data set (Pedersen and Nielsen, 1997)3312 vertebrate DNA sequences13503 ATG sites3312 true TiSs and 10063 false TISs2077 false TISs, that are upstream of true TISs

Three-fold cross validation

299 HSU30473.1 CAT U30473 Eukaryotae; mitochondrial eukaryotes; Metazoa; Chordata; Vertebrata; Eutheria; Primates; Catarrhini; Hominidae; Homo. Homo sapiens TCCCCATGACAGCGACTGATGAAGAATTTCAATAGAAAGCTGCTACTTCAGAAAATAAGATCATTTGCTGCGAATGGAGA 80 ACATCTCAGGCAGCCCTGATGCTCCACCGGCTCTGGGCATCACCAGCGGCCCCAGGGAAAAAGAAAGAAATGGGAAACAG 160 CATGAAATCCACCCCTGCGCCTGCCGAGAGGCCCCTGCCCAACCCGGAGGGACTGGATAGCGACTTCCTTGCCGTGCTAA 240 GTGACTACCCGTCTCCTGACATCAGCCCCCCGATATTCCGCCGAGGGGAGAAACTGCGT ................................................................................ 80 .....................................................................iEEEEEEEEEE 160 EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE 240 EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE

Wong’s method was equipped with the ribosome scanning model.

The present method used a majority voting scheme and the ribosome scanning model.

Hatzigeorgiou’s method used a different data set (programs or the datasets areunavailable).

Page 23: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 23

Dragon Promoter Finder

-200 to +50window size

Model selected based on desired sensitivity

Copyright © 2003 Limsoon Wong

Each model has two submodels based on GC content

GC-rich submodel

GC-poor submodel

(C+G) =#C + #GWindow Size

Copyright © 2003 Limsoon Wong

Page 24: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 24

Data Analysis Within Submodel

K-gram (k = 5) positional weight matrix

σp

σe

σi

Copyright © 2003 Limsoon Wong

Promoter, Exon, Intron Sensors

These sensors are positional weight matrices of k-grams, k = 5 (akapentamers)

They are calculated as σ below using promoter, exon, intron data respectively

Pentamer at ith

position in input

jth pentamer atith position in training window

Frequency of jthpentamer at ith positionin training window

Window size

σ

Copyright © 2003 Limsoon Wong

Page 25: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 25

Data Preprocessing & ANN

Tuning parameters

tanh(x) =ex − e-x

ex + e-x

sIE

sI

sE tanh(net)

Simple feedforward ANN trained by the Bayesian regularisation method

wi

net = Σ si * wi

Tunedthreshold

Copyright © 2003 Limsoon Wong

Accuracy Comparisons

without C+G submodels

with C+G submodels

Copyright © 2003 Limsoon Wong

Page 26: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 26

Grail’s Promoter Prediction Module

Makes about 1 prediction per 230000 nt at 0.66 sensitivity

LVQ Networks for TATA Recognition

Achieves 0.33 sensitivity at 47 FP on Fickett & Hatzigeorgiou 1997

Page 27: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 27

Sequence Motifs:A motif is a conserved pattern found in two or more biological sequences (such as DNA, RNA, or protein sequences), that has a specific biological function or structure.

Examples:TF binding sites in DNA, Ribosome binding sites in RNA, protein sequences with common functions or conserved pieces of structure

We look for motifs in(1) gene families: a set of genes controlled by a common transcription factor or common environmental stimulus (e.g., constructed by microarray experiments)(2) protein families: structurally conserved patterns

Motif Representations:

(1) Consensus modeling: involves comparing multiple, similar sequences to determine the general motifE.g.: TGACGCA, TGACCCA, and AGACGCA; in position one, T out-number A; and position G outnumbers C, so the consensus is given by most probable nucleotides: i.e., TGACGCA

(2) Degenerate modeling: involves inventing nucleotides/amino acids that represent probability values of presence, instead. E.g.: TGACGCA, TGACCCA, and AGACGCA; first nucleotide is either an A or T; thus, represented by hypothetical nucleotide, W (or T with prob. 2/3 and A with prob. 1/3) and in position 5 with X (G with prob. 2/3 and C with prob. 1/3); Consensus: WGACXCA

3. Probability Weight Matrix (PWM) is used to represent the nucleotide content in each position with probabilities.

Page 28: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 28

Profile Analysis

The method involves building profiles (also referred to as weight matrices, templates, or position specific scoring matrices) for motifs or a given set of sequence families.

Profile analysis uses the fact that certain positions in a family are more conserved than other positions and allows substitutions less readily in these conserved positions.

The aim of the profile analysis is often to determine if a givensequence belongs to a particular sequence family or is a particular motif. The profile analysis that follows restricts to protein families, but is applicable to DNA sequences.

Steps of the profile analysis:1. Align the sequences in the family2. Create a profile, using the alignment3. Test new sequences against the profile

Assume no gaps in the alignment and look at the alignment of msequences of W positions, (xi1, xi2, … xiW) where i = 1, … m :

where xij∈Ω denotes the amino acid at j th position of i th sequence.

mWmmm

W

W

xxxx

xxxxxxxx

……

…………

321

2232221

1131211

Page 29: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 29

We build the profile Px,j, x∈ Ω and j=1,2,…W as

where fxj is the percentage of column j containing amino acid x and bx is the percentage of amino acid x in the background distribution. The background can be computed , for example, from a large sequence database, or from a genome, or from some particular protein family.

Intuitively, Pxj is the propensity for amino acid x in the j th position of the alignment.

Often, it is assumed that in the background, the elements are equally distributed; in such case the profile matrix Px,j becomes the positional weight matrix (PWM).

. allfor , Ω∈= xbf

Px

xjxj

Example:

In order to compute a score of presence of an amino acid, usually the log is used:

scorexj = log (Pxj), for x∈ Ω and j=1,2,…W .

…………

1

321

321

4 3 2 1 acid Aminoposition

F

AWVVV

AWAAA

PFPPPPVPPPPAW

Page 30: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 30

Example: consider for the following alignment (W=4),LEVKLDIRLEIKLDVE

Assume that all amino acids are equally likely in the background. The weight matrix of the motif could be computed by

The weight matrix representing the family of sequences of the motif of length 4 containing in the set of sub-sequences is given by P x,j |Ω|xW

;...1020/14/2;10

20/14/2;20

20/14/4

221 ====== EDL PPP

To use a profile to score for the presence of a motif in a given subsequence,1. Slide a window of width W over the new sequence2. The sum of the scores of each position in the window gives the overall score for the subsequence. Score giving the likelihood of a motif to begin at i.

Example: consider the new sequence, LEVEER,For earlier profile:Score at first site = scoreL1 + scoreE2 + scoreV3 + scoreE4Score at second site = scoreE1 + scoreV2 + scoreE3 + scoreE4Score at third site = scoreV1 + scoreE2 + ScoreE3 + ScoreR4

If the total score is higher than a threshold, the subsequence in the window is considered to be a member of the family or have the motif. The higher the score, more confident the presence of the motif at that location is.

,1

score logi j

W

i x jj

P+

=

= ∑

Page 31: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 31

Profile method could be justified from log-odds perspective. In particular, when scoring a subsequence, it assumes that each position is independent and estimated:

The probabilities of numerator are estimated from frequencies ofeach amino acid being in that position of alignment. Probabilities in the denominator are estimated from background frequencies.

Note: An extension to above formula is required to handle zero frequency cases. If amino acid does not occur in a column, Pxj is zero and the score is undefined. A pseudo-count is used to deal with this:

where ε is usually a small value (ε < 1.0).

⎟⎟⎠

⎞⎜⎜⎝

⎛)familynot |esubsequenc(

)family|esubsequenc(logP

P

Genebankin acidaminooffraction 20

position in acid amino of #

xm

jx

Pxjε

ε+

+

=

Expectation Maximization (EM) ApproachGiven a set of aligned sequences, it is straightforward to construct a positional weight matrix (PWM) characterizing a motif of interest.

How can we construct the profile if the sequences are not aligned? In a typical case, we don’t know what the motif looks like. Then, we use Expectation Maximization (EM) algorithm:

Page 32: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 32

EM is a family of algorithms for learning probabilistic models in problems that involve hidden states. In motif recognition, the hidden states are where the motif starts in training sequences:

Motif is represented by positional weight matrix (PWM) of probabilities p = px,j |Ω| x W where px,j represents the probability of the character x ∈Ω in column j. It is assumed to have a fixed width W.

Example: a DNA motif with W = 3 has a PWM of 1 2 3

A 0.1 0.5 0.2 Note that p = C 0.4 0.2 0.1

G 0.3 0.1 0.6T 0.2 0.2 0.1

∑Ω∈

=x

jx jp allfor ,1,

We also represent the background (i.e., outside the motif) by the probability of each character in the background by a column matrix:

p0 = px,0 |Ω| x 1

where px,0 represents the probability of character x in the background.

Example:0

A 0.26p0 = C 0.24

G 0.23T 0.27

Page 33: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 33

The hidden states of the model are the places where the motif start. Let’s define the matrix Z = Zi,j mxL-W+1 where the element Zi,j represents the probability that the motif starts in position j of the sequence i.

L is the sequence length and m is the number of sequences.

Example: Given 3 DNA sequences of length L = 6, where W=3:

Note that

0.1 0.2 0.4 0.3 seq3 0.3 0.1 0.2 0.4 seq2

0.6 0.2 0.1 0.1 seq1 4 3 2 1

=Z

11

1, =∑

+−

=

WL

jjiZ

EM Approach to Motif DetectionGiven: length parameter W, a training set of m sequences set initial values for pdo

re-estimate Z from p (E-step)re-estimate p from Z (M-step)

until change in p < δReturn: p, Z

E-step estimates the most probable locations of the motifs M-step estimates the new motif configuration.The convergence is achieved when the change (the entropy) of themotif falls below a threshold.

Or the likelihood of the sequences, given the motif, exceeds a particular threshold.

∑∑Ω∈ =

−=x

W

jjxjx pppH

1,, log)(

Page 34: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 34

Suppose, given m number of sequences of length L, we are looking for a motif of length W : xi = (xi,1, xi,2, … xi,L), i=1, 2, … m.The probability of a training sequence having the motif starting at position j:

where Zij = 1 indicates that the motif starts at position j in sequence i.E-Step: estimating Z at the iteration t:

Further,

∏∏∏+=

−+

=+−

===

L

Wjkx

Wj

jkjkx

j

kxjii kikiki

pppZP 0,

1

1,

1

10,0, ,,,

),,1|( ppx

motif theofstart likely equally an assuming, ),,1|(

),,1|(

)1(),,1|(

)1(),,1|(

),|,1(

),|,1(),,|1(

1

10,

0,

1

1,0,

,0,

1

10,

0,0,,

+−

=

+−

=

+−

=

=

==

==

===

=

====

WL

k

ttkii

ttjii

WL

kki

ttkii

jitt

jii

WL

k

ttiki

ttijitt

ijit

ji

ZP

ZP

ZPZP

ZPZP

ZP

ZPZPZ

ppx

ppx

ppx

ppx

ppx

ppxppx

.2,... 1, allfor ,0.11

1, miZ

WL

jji ==∑

+−

=

M-step: calculating p’s from Z:

Recall p x,k represents the probability that character x in position k in the motif; values for position 0 represents the background.

For the motif:

s.frequencie zero with thedeal tocounts-pseudo theindicates and dataset. in the characters ofnumber total theindicates where

withapplicable is for equation above the,backgroundfor

frequency, thewhere

. allfor ,)(

1,0,

1,

1

,1,,

,

,1,

1,

k

x

W

jjxxx

tkx

i

wL

xxj

tjikx

xkkx

kkxtkx

xn

nnn

p

Zn

xn

np

kji

ε

εε

∑ ∑

=

+

+−

==

Ω∈′′

+

−=

=

Ω∈+

+=

−+

Page 35: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 35

The EM algorithm converges to a local maximum in the likelihood of the data given the model:

Usually converges in a small number of iterationsSensitive to initial starting point (i.e. initial values of p)

Example 1: Given the above probability vectors for background and the motif, find the positions of the motifs (Z matrix) for the following alignment and then the new profile matrix for the motif:

A C A G CA G G C AT C A G T

∏=

=m

iiPP

100 ),|(),|( ppxppx

⎥⎥⎥

⎢⎢⎢

⎡=

==

====

====

====

====

====

====

====

====

====

007.0940.0053.0228.0651.0121.0008.0964.0028.0

wise,-row valuesabove thegnormalizin ,,...2,1i allfor ,1 Since

000065.01.0x1.0x1.0.24x0x27.0),,1|(0087.027.0x6.0x5.0.4x0x27.0),,1|(00049.027.0x23.0x2.0.2x0x2.0),,1|(0007.02.0x2.0x3.0.23x0x26.0),,1|(0002.026.0x1.0x1.0.3x0x26.0),,1|(00037.026.0x24.0x6.0.1x0x1.0),,1|(

000062.01.0x1.0x1.0x24.0x26.0),,1|(0075.024.0x6.0x5.0x4.0x26.0),,1|(00022.024.0x23.0x2.0x2.0x1.0),,1|(

,

3,2,1,0,0,03,33

0,3,2,1,0,02,33

0,0,3,2,1,01,33

3,2,1,0,0,03,22

0,3,2,1,0,02,22

0,0,3,2,1,01,22

3,2,1,0,0,03,11

0,3,2,1,0,02,11

0,0,3,2,1,01,11

Z

mZ

pppppZxPpppppZxPpppppZxPpppppZxPpppppZxPpppppZxPpppppZxPpppppZxPpppppZxP

jji

TGACT

TGACT

TGACT

ACGGA

ACGGA

ACGGA

CGACA

CGACA

CGACA

pppppppppppppppppp

Page 36: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 36

∑−=

=+==++==+=

=++==+++==+=

=====

=++==+==+++=

∑ ∑=

+∑

+==

===

===

===

=

=

+−

==

Ω∈

−+

W

jjxxx

CCC

GGG

TTT

AAA

m

i

WL

xxjjikx

xkx

kxkx

nnn

ZZnZZZnZZn

ZZZnZZZZnZZn

ZnnZn

ZZZnZZnZZZZn

Zn

nn

p

ZZZTGACT

ZZZACGGA

ZZZCGACA

kji

1,0,

2,23,13,1,33,21,12,2,32,11,

2,31,22,13,3,32,21,23,12,3,22,21,

3,33,2,1,31,

1,33,21,13,2,32,12,3,31,23,11,11,

1

1

|1,,

,

,,

3,32,31,3

3,22,21,2

3,12,11,1

,backgroundfor

;659.0;309.0;964.0

;025.2;787.0;879.0

;007.0;0;053.0

;309.0;904.1;164.0

; motif, for the where

41

1, By taking

007.0940.0053.0

228.0651.0121.0

008.0964.0028.0

1,

ε

MEME (Multiple EM Elicitation) Approach (Bailey, 1994)

MEME enhances the basic EM approach in the following ways:-- trying many starting points-- not assuming that there is exactly one motif occurrence in every sequence-- allowing multiple motifs to be learned-- incorporating Dirichlet prior distributions

Starting points in MEME:For every distinct subsequence of length W in the training set:-- derive an initial p matrix from this subsequence-- run EM for 1 iteration

Choose the motif model (i.e., p matrix) with highest likelihoodRun EM for convergence.

Page 37: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 37

Using subsequences as starting points for EM:Set values corresponding to letters in the subsequence, say qSet other values to (1-q)/(|Ω|-1)

Example: for the sequence TAT with q = 0.5:

1 2 3A 0.17 0.5 0.17C 0.17 0.17 0.17

p = G 0.17 0.17 0.17T 0.5 0.17 0.5

ZOOPS ModelThe approach so far we discussed assumes that each sequence has exactly one motif occurrence per sequence: that is the OOPS model.The ZOOPS model assumes zero or one occurrences per sequence.

E-step in the ZOOPS model:We need to consider another alternative: the i th sequence doesn’t contain the motif.Another variable (and its relative) is added:λ: the prior probability that any position in a sequence is thestart of a motifγ = (L-W+1)λ: prior probability of a sequence containing a motif

Page 38: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 38

M-step in the ZOOPS model:Update p same as beforeUpdate λ and γ as follows

Average of Zi,j across all sequences, and positions.

+−

=

+−

=

=

=+−=

==

1

1,

1

10,0

0,,

:occurrence motif acontain t doesn'sequence that theindicate to0 s that take variablerandom a is here

),,1|()1)(,,0|(

),,1|(: ofn computatio

WL

jjii

i

WL

k

tttkii

tttii

tttjiit

ji

ZQ

Q

ZPQP

ZPZ

Z

λγ

λ

ppxppx

ppx

∑ ∑=

+−

=

++

+−=

+−=

m

i

WL

j

tji

tt Z

WLmWL 1

1

1,

11

)1(1

1γλ

TCM model

The TCM (two-component mixture model) assumes zero or more occurrences per sequence.

The TCM model treats each length W subsequence independently. If xi,j denotes the subsequence starting at site j of sequence i, the likelihood of such a subsequence is given by

e;start thert doesn' motif a assuming,),,0|(

there;starts motif a assuming,),,1|(

1

0,0,,

1

1,0,,

∏−+

=

−+

=+−

==

==

Wj

jkxjiji

Wj

jkjkxjiji

ik

ik

pZP

pZP

ppx

ppx

Page 39: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 39

E-step in the TCM model:

M-step is same as in the ZOOPS model.

TCM model describes sequences with multiple occurrences of the same motif.

tttjiji

tttjiji

tttjijit

ji ZPZXPZXP

Zλλ

λ),,1|()1)(,,0|(

),,1|(

0,,0,,

0,,, ppxpp

pp=+−=

==

Finding Multiple Motifs

Basic idea: discount the likelihood that a new motif starts in a given position if the motif would overlap with a previously learned one (a greedy method).

When re-estimating Zi,j, multiply by P(Vi,j = 1) where

Vij is estimated using Zij values from previous passes of motif finding.

⎩⎨⎧

= −+

otherwise.0,

],[in motifs previous no ,1 1,,,

wjijiji

xxV

Page 40: 2007 IEEE Symposium on Computational Intelligence on ... › cmte › cis › mtsc › ieeecis... · Leaky scanning Stop codon Codon bias? Splice sites acceptor site donor site. ...

Copyright 2007 Jagath C. Rajapakse. All Rights Reserved. 40

REFERENCESJ. C. Rajapakse and L. S. Ho, “Markov encoding for detecting signals in genomic sequences,” IEEE Transactions on Computational Biology and Bioinformatics, Vol. 2, No. 2, pp. 131-142, April-June 2005.

L. Wong et al., “Using feature generation and feature selection for accurate prediction of translation initiation sites”, GIW 13:192--200, 2002

A. Zien et al., “Engineering support vector machine kernels that recognize translation initiation sites”, Bioinformatics 16:799--807, 2000

A. G. Hatzigeorgiou, “Translation initiation start prediction in human cDNAswith high accuracy”, Bioinformatics 18:343--350, 2002

V. B. Bajic et al., “Dragon Promoter Finder: Recognition of vertebrate RNA polymerase II promoters”, Bioinformatics 18:198--199, 2002.

M. G. Reese, “Application of a time-delay neural network to promoter annotation in the D. melanogaster genome”, Comp. & Chem. 26:51--56, 2001

A. G. Pedersen et al., “The biology of eukaryotic promoter prediction---a review”, Comp. & Chem. 23:191--207, 1999

S. Knudsen, “Promoter 2.0 for the recognition of Pol II promoter sequences”, Bioinformatics 15:356--361, 1999.

H. Wang, “Statistical pattern recognition based on LVQ ANN: Application toTATA-box motif”, M.Tech Thesis, Technikon Natal, South Africa

A. G. Pedersen, H. Nielsen, “Neural network prediction of translation initiation sites in eukaryotes”, ISMB 5:226--233, 1997

J. W. Fickett, A. G. Hatzigeorgiou, “Eukaryotic promoter recognition”, Gen. Res. 7:861--878, 1997

T. L. Bailey and C. Elkan, “The value of prior knowledge in discovering motifs with MEME,” ISMB, pp. 21-29, 1995


Recommended