Skip to main content
  • Research article
  • Open access
  • Published:

In silico segmentations of lentivirus envelope sequences

Abstract

Background

The gene encoding the envelope of lentiviruses exhibits a considerable plasticity, particularly the region which encodes the surface (SU) glycoprotein. Interestingly, mutations do not appear uniformly along the sequence of SU, but they are clustered in restricted areas, called variable (V) regions, which are interspersed with relatively more stable regions, called constant (C) regions. We look for specific signatures of C/V regions, using hidden Markov models constructed with SU sequences of the equine, human, small ruminant and simian lentiviruses.

Results

Our models yield clear and accurate delimitations of the C/V regions, when the test set and the training set were made up of sequences of the same lentivirus, but also when they were made up of sequences of different lentiviruses. Interestingly, the models predicted the different regions of lentiviruses such as the bovine and feline lentiviruses, not used in the training set. Models based on composite training sets produce accurate segmentations of sequences of all these lentiviruses.

Conclusion

Our results suggest that each C/V region has a specific statistical oligonucleotide composition, and that the C (respectively V) regions of one of these lentiviruses are statistically more similar to the C (respectively V) regions of the other lentiviruses, than to the V (respectively C) regions of the same lentivirus.

Background

Retroviruses are RNA viruses infecting vertebrates and many non vertebrates. Virus particles are spherical and surrounded by an envelope. Their viral replication is dependent of the RT (Reverse Transcriptase), a viral RNA-dependent DNA-polymerase. The lentivirus genus is part of the retrovirus family. Lentiviruses infect animals and humans and cause slowly progressing diseases. Among the lentivirus genus, HIV-1 and HIV-2 (Human Immunodeficiency Virus type 1 and 2) infect humans, EIAV (Equine Infectious Anemia Virus) infects equids, SRLV (Small Ruminant LentiVirus) infects goats and sheep, SIV (Simian Immunodeficiency Virus) infects non primate monkeys, BIV (Bovine Immunodeficiency Virus) infects bovines and FIV (Feline Immunodeficiency Virus) infects felines.

The considerable plasticity of the genome of lentiviruses is quite obvious in the env gene, encoding the envelope, particularly in the region encoding the surface (SU) glycoprotein forming spikes. Causes of this plasticity are, among other factors, the low fidelity of the viral reverse transcriptase (RT) during the retrotranscription of the viral RNA genome into DNA, the lack of proofreading activity of the RT, the high level of virus replication, and some recombination events in co-infected cells [1–4].

Interestingly, SU mutations do not appear uniformly along the env gene, but are clustered in restricted and specific areas defined as variable (V) regions flanked by constant (C) regions. On average, and depending on the lentivirus considered, from 10 % to 35 % of the amino-acids in SU vary between isolates, and more than 70 % of these variable amino-acids are located in V regions. Such C/V segmentations hold for all the lentiviruses [5–11].

It is unclear whether the accumulation of mutations in V regions is mainly due to locally high intrinsic mutation rates, or if mutations occur at similar rates at every SU sites with subsequent selection mechanisms eliminating most variants from the C regions. In any case, the plasticity of these genomes allows them to escape immune control very efficiently, while keeping their identity. Most of amino acids encoded by the V regions are on the outside of SU, while the amino acids encoded by the C regions are in the internal part. In this respect, one should note that the replication acts on one-dimensional molecules, at a moment when most of the information about their three-dimensional conformation seems unavailable. In other words, if the intrinsic mutation rates are indeed different in C regions and in V regions, this might be due to some specific signals encoded by the nucleotide (linear) viral sequence itself, possibly corresponding to interactions with the RT. To test this hypothesis, we developed a mathematical model based on lentivirus sequences, as simple and robust as possible, able to localize and to characterize their C/V segmentation of the SU region. Our approach was based on HMMs (hidden Markov models). These models are tailored to describe heterogeneous sequences, since they basically break down a given sequence into a succession of locally homogeneous subsequences. HMMs were initially introduced in the context of speech recognition [12] and they are now major tools of the analysis of genomic and proteomic sequences [13–19]. In sequence analysis, each of the subsequences called a region, is described by the value of a Markov chain, called the hidden state, taken from a finite collection of values. Each state is characterized by its own statistical composition in nucleotides or in amino-acids. The succession of states itself is ruled by a master Markov chain, called the hidden chain.

Our main findings are as follows. Using SU sequences of EIAV, HIV, SRLV or SIV to train the HMMs, we obtained clear and accurate delimitations of the C and V regions of these lentiviruses. This suggests that the statistical composition of the C regions is markedly different from the statistical composition of the V regions. Additionally, we developed combined models, based on EIAV, HIV, SIV and SRLV sequences. These were able to predict simultaneously the C and V regions of every lentivirus in the collection above. Our combined models also predicted the C/V segmentation of other lentiviruses which were not used in the training sets: BIV and FIV. This indicates that the C and V regions are statistically distinct and that the V regions of all the lentiviruses share common statistical signatures.

Results

C/V segmentations of EIAV

We first tried to differentiate the C and V regions of the EIAV SU, using HMMs with N = 2 hidden states, for different orders m. The parameters of the models were estimated on training sets of 94 nucleotide sequences, by the EM algorithm. We used various training sets, dividing at random our complete set of sequences into two equal parts (1:1), the training and the test sets. Then, none of the various HMMs was able to identify the C and V regions of the EIAV SU. We obtained hidden states sequences which oscillated and repeatedly jumped from one hidden state to the other (data not shown). Hence, this method was not reliable to identify homogeneous regions corresponding to the C and V regions of the EIAV SU.

By contrast, fixed EM, as described in section Methods, yielded a clear delimitation of the known C and V regions on the whole test set, for HMMs of different order. For example, HMM of order m = 2 allowed us to predict most of the V regions on nucleotide sequences. HMMs of higher orders (m ≥ 3) gave even more accurate prediction. To evaluate the fit quality and to select the best model among the candidates, we used the Akaike information criterion (AIC) [20]. This criterion is defined by

AIC = -2log(L) + 2n,

where L is the likelihood of the candidate model and n the number of free parameters. AIC is based on the Kullback-Leibler distance between different distributions of sequences (for this notion, see our section below on Separation of the EIAV C/V regions) and is designed to achieve a balance between fit quality and number of parameters corresponding to the model with the lowest AIC. The best model to predict the C and V regions on nucleotide sequences of the EIAV SU was of order m = 6, according to the AIC criterion (Table 1). However, for m = 5, the fit of the predicted C and V regions with the segmentations deduced from alignments was almost perfect (Figure 1A) and minimized the risk of overfitting the data.

Figure 1
figure 1

Regions predicted by the hidden Markov models on the nucleotide sequence of EIAV SU. The graphic displays the regions predicted by our mathematical model (—). The schematic organization of EIAV SU, with the position of the 8 variable regions V1 to V8 (hatched boxes) and of the 9 constant regions (—), as defined by classical amino-acid multiple alignments, is represented under the graphic. (A) HMM of order 5 with 2 hidden states, trained on the variable (V) and constant (C) regions. (B) HMM of order 5 with 9 hidden states, trained on the 8 V regions and on the reunion of the C regions.

Table 1 Modeling of the C and V regions of the EIAV SU.

To differentiate the variable regions V1 to V8 and the C regions, we then used HMMs with N = 9 states on nucleotide sequences. Thus, we trained one hidden state with each variable region and one hidden state with the constant regions as a whole, and we estimated the parameters of a HMM of different orders by the fixed EM algorithm. The best model is of order m = 5 (Table 1). This yields a precise delimitation of the C and V regions on nucleotide sequences, each V region showing a distinct signal (Figure 1B). Estimating the parameters of the models with the direct counting methods gave similar results.

Finally, HMMs with N = 2 or N = 9 hidden states, able to locate the C and V regions on deduced amino-acid sequences, were trained by the fixed EM algorithm and the direct counting method. We obtained accurate predictions of the C and V regions on the test sequences, with every training method, using a HMM of order m = 1 (Figures 2A and 2B).

Figure 2
figure 2

Regions predicted by the hidden Markov models on the deduced amino-acid sequence of EIAV SU. The graphic displays the regions predicted by our mathematical model (—). The schematic organization of EIAV SU with the position of the 8 variable regions V1 to V8 (hatched boxes) and of the 9 constant regions (—), as defined by classical amino-acid multiple alignments, is represented under the graphic. (A) First order HMM with 2 hidden states, trained on the V and C regions. (B) First order HMM with 9 hidden states, trained on the 8 V regions and on the reunion of the C regions. (C) First order HMM with 9 hidden states tested on an artificial sequence, where 15 amino-acids of the V7 sequence are inserted into the constant region C2 located between V1 and V2.

The reconstructed sequences of the hidden states did not oscillate between the different hidden states as in the models based on the EM algorithm. The transition matrix obtained without prior information on the length of the regions allowed to identify long homogeneous regions and to compare them to the C and V regions previously defined.

At this point, we developed models with an unique C region. This C region do not fit a real region but represent an average of all the constant regions. There is no guarantee a priori that the constant regions are grouped together and can be modeled by an unique state. However, the C region introduced in our models allowed to predict all the constant regions with an amazing accuracy.

Tests of the models of EIAV C/V regions

Since our models were able to predict the C and V regions on both deduced amino-acid and nucleotide sequences of EIAV SU, we put them under trial in several directions. First, we checked that the models were not overfitted, keeping in mind that pseudo-counts were introduced to limit the overfitting problem. We checked whether the models were not overly specific of the training data, and whether it was possible to make them encompass new data tests. To perform such tests, the models were trained using nucleotide or amino-acid sequences sharing a minimal amount of motifs with the test sequences. For example, we trained the models on virus sequences, which were present at the beginning of the disease induced in horses by EIAV, and we tested them on virus sequences at later stages of the disease [6]. Because of the variations due to viral replication during the time course of the EIAV infection, the training and test sequences displayed 7.8 % (± 1.3) of divergence at the amino-acid level. In particular, the test and training sequences displayed 43.8 % (± 20.2) of divergence in the third V region (V3). Despite this important level of divergence between the training and test sequences, the models correctly predicted the C and V regions, notably V3.

To check that the models were not simply following the order and positions of the V regions along the sequence, we also assembled artificial sequences with a greater number of V regions than in the real ones. For instance, we inserted a copy of 15 amino-acids, taken from V7, into C2. The models which were trained with the fixed EM algorithm on the original sequences, managed to predict perfectly the additional V region of these modified sequences (Figure 2C).

Combined C/V models

Models based on EIAV sequences were unable to predict C and V regions of HIV, SIV or SRLV SU sequences (Figure 3). Hence, we developed a new specific model for each lentivirus. We trained models of order m = 1 on deduced amino-acid sequences and models of order m = 5 on nucleotide sequences, on 78 HIV sequences, 45 SIV sequences and 51 SRLV sequences respectively, using either the fixed EM algorithm or the direct counting methods. These new models, specific to each lentivirus, were indeed able to predict the C and V regions of test sequences of the corresponding virus, but failed to predict the C and V regions of the other lentiviruses. On the contrary, a combined HMM of order m = 1 with N = 2 hidden states, trained on a composite training set of EIAV, HIV, SIV and SRLV deduced amino-acid sequences, was powerful enough to localize accurately the V regions of test sequences of EIAV (V1 to V8), HIV (V1 to V4), and SIV or SRLV (V1 to V5). Rather to our surprise, the model also discriminated V1 and V2 of HIV, although these two regions were given as a unique region V1/V2 in the training set (Figure 4). The C and V regions of EIAV, HIV, SIV and SRLV were also predicted with great accuracy by HMMs of order m = 5 with N = 2 hidden states, trained on the corresponding nucleotide sequences. Finally, the combined models, trained on EIAV, HIV, SIV and SRLV sequences, were able to predict C and V regions of two lentiviruses which were not used to train them, namely BIV and FIV (Figure 4).

Figure 3
figure 3

Regions predicted on HIV sequences by hidden Markov models trained on EIAV sequences. The graphic displays the regions predicted on the HIV-1 HXB2 sequence by our mathematical models (—). The schematic organization of HIV SU with the position of the variable regions (hatched boxes) and of the constant regions (—), as defined by classical amino-acid alignments, is represented under the graphic. (A) HMM of order 5 with 2 hidden states trained on nucleotide sequences of EIAV SU. (B) First order HMM with 2 hidden states trained on deduced amino-acid sequences of EIAV SU.

Figure 4
figure 4

Regions predicted by the combined hidden Markov model trained on EIAV, HIV, SIV, and SRLV SU. The graphs display the regions predicted by the first order combined HMM, on sequences of EIAV, HIV, SIV, SRLV, BIV and FIV SU. The schematic organization of SU with the position of the variable regions (hatched boxes) and of the constant regions (—), as defined by classical amino-acid alignments, is represented under the graphics.

Separation of the EIAV C/V regions

The models developed in our study allow us to differentiate the C and V regions of EIAV and to distinguish each of the 8 variable regions. This indicates that the C and V regions have distinct statistical composition and that the 8 variable regions are statistically distinct too. A classical method to quantify the differences between the Markov chains which represent the C and V regions of EIAV, is to consider the relative entropy, also named Kullback-Leibler divergence, between these models, see [21–26]. The relative entropy of two Markov chains is given by

H ( P | Q ) = ∑ i , j π ( i ) P ( i , j ) log P ( i , j ) Q ( i , j ) , MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacqWGibascqGGOaakcqWGqbaucqGG8baFcqWGrbqucqGGPaqkcqGH9aqpdaaeqbqaaGGaciab=b8aWjabcIcaOiabdMgaPjabcMcaPiabdcfaqjabcIcaOiabdMgaPjabcYcaSiabdQgaQjabcMcaPiGbcYgaSjabc+gaVjabcEgaNnaalaaabaGaemiuaaLaeiikaGIaemyAaKMaeiilaWIaemOAaOMaeiykaKcabaGaemyuaeLaeiikaGIaemyAaKMaeiilaWIaemOAaOMaeiykaKcaaaWcbaGaemyAaKMaeiilaWIaemOAaOgabeqdcqGHris5aOGaeiilaWcaaa@5750@

where P and Q are the transition matrix of the two Markov chains and π the invariant distribution associated to P. We used a symmetrized form of the relative entropy, defined as

δ(P,Q) = H(P|Q) + H(Q|P).

The computation of the symmetrized relative entropy between the Markov chains modeling the 9 constant regions and the 8 variable regions of EIAV (see Table 2) indicates that the different C (respectively V) regions are closer to the global C (respectively V) region than to any of the V (respectively C) regions. Furthermore, the V regions are closer to each other than to any of the C regions.

Table 2 Symmetrized relative entropy between the C/V regions of EIAV.

To quantify this overall feeling, we first used the symmetrized relative entropy δ to study the distances between the C and V regions, representing them by a dendogram. Note that δ is not a true metric because it does not satisfy the triangle inequality. However, one can visualize the distances between the different regions by an unrooted tree, computed by the program Kitch (Phylip 3.5c) using the distance matrix previously estimated (Figure 5). The dendogram shows a distinct separation between a first group, made of the C regions, and a second group, made of the V regions. This confirms the fact that the C and V regions of EIAV differ in their statistical composition.

Figure 5
figure 5

Graphic representation of the distances between the C and V regions of EIAV. A distance matrix between the C and V regions is computed with the symmetrised form of the relative entropy. A dendogram was evaluated with the Kitsch (Phylip 3.5c) program with the default parameters and drawn with the "Unrooted" software [41].

To further quantify this separation between the C and V regions, we built an asymptotic statistical test for the empirical transition matrices of two different regions, based on the following considerations. Assuming in general that q 1 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIXaqmaeqaaaGccaGLcmaaaaa@2FFF@ and q 2 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIYaGmaeqaaaGccaGLcmaaaaa@3001@ are empirical transition matrices of the same Markov chain with theoretical transition matrix q, based on two independent sequences of length L of the Markov chain, one can show that LH( q 1 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIXaqmaeqaaaGccaGLcmaaaaa@2FFF@ , q 2 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIYaGmaeqaaaGccaGLcmaaaaa@3001@ ) is asymptotically χ2-distributed with D(q) degrees of freedom, where D(q) denotes the "dimension" of the Markov chain, that is, D(q) is the number of nonzero coefficients in q minus the number of states [see Additional file 1]. When every transition has positive probability and q has size M, D(q) = M2 - M. In particular,

E(H( q 1 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIXaqmaeqaaaGccaGLcmaaaaa@2FFF@ , q 2 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIYaGmaeqaaaGccaGLcmaaaaa@3001@ )) ~ D(q)/L.

In the still more general case when q 1 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIXaqmaeqaaaGccaGLcmaaaaa@2FFF@ and q 2 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIYaGmaeqaaaGccaGLcmaaaaa@3001@ are based on independent sequences of unequal lengthes L1 and L2 respectively, a similar result holds, namely that ℓ H( q 1 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIXaqmaeqaaaGccaGLcmaaaaa@2FFF@ , q 2 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIYaGmaeqaaaGccaGLcmaaaaa@3001@ ) is asymptotically χ2-distributed with D(q) degrees of freedom, where ℓ denotes the harmonic mean of L1 and L2, defined by the relation

2 â„“ = 1 L 1 + 1 L 2 . MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaWcaaqaaiabikdaYaqaaiabloriSbaacqGH9aqpdaWcaaqaaiabigdaXaqaaiabdYeamnaaBaaaleaacqaIXaqmaeqaaaaakiabgUcaRmaalaaabaGaeGymaedabaGaemitaW0aaSbaaSqaaiabikdaYaqabaaaaOGaeiOla4caaa@383B@

Using the symmetrized entropy δ, one sees that the distribution of 1 2 ℓ δ ( q 1 ^ , q 2 ^ ) MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaWcaaqaaiabigdaXaqaaiabikdaYaaacqWItecBiiGacqWF0oazcqGGOaakdaqiaaqaaiabdghaXnaaBaaaleaacqaIXaqmaeqaaaGccaGLcmaacqGGSaaldaqiaaqaaiabdghaXnaaBaaaleaacqaIYaGmaeqaaaGccaGLcmaacqGGPaqkaaa@3AB5@ is asymptotically χ2 with D(q) degrees of freedom, and in particular,

E(δ( q 1 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIXaqmaeqaaaGccaGLcmaaaaa@2FFF@ , q 2 ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaqiaaqaaiabdghaXnaaBaaaleaacqaIYaGmaeqaaaGccaGLcmaaaaa@3001@ )) ~ 2D(q)/ℓ.

Using this result, one can perform χ2 tests of equality between the C and V regions of EIAV. This yields p-values very close to zero. The biggest p-value is obtained for the two variable regions V1 and V2 and is 4·10-17. Since the p-values are so small, one can conclude that the Markov chains previously defined to model the C and V regions of EIAV do not reflect the same statistical composition in words of amino acids. Hence, each of the 9 constant regions and the 8 variable regions has a specific signature.

Discussion

We report that HMMs are able to predict the C/V segmentations of various lentiviruses, based only on their deduced amino-acid sequences or their nucleotide sequences, with an amazing accuracy and a great robustness.

We would like to stress the fact that our algorithms identify the V regions without any comparison by alignment with known sequences. The models developed in this study are not based on computations of divergences between sequences. Furthermore, the lengths of the regions exhibit great variability, and the numbers of regions themselves may be, and indeed are sometimes, different from one sequence to another. These, and the various tests presented in section Results, prove that the models do not rely on the relative positions of the regions, nor on their lengths, to identify C/V segmentations of the sequences. On the contrary, they have to rely only on some statistical differences between the compositions in words of nucleotides or amino-acids of length 1 + m, where m is the order of the model.

More detailed consequences of the performances of the models are as follows. First, all the C regions can be suitably modeled by a unique state. This proves that they have similar statistical properties. The V regions can be modeled either by one state or by several states. This suggests that V regions share common properties, when compared to C regions, and, at the same time, that each V region has its own statistical profile.

To highlight similarities and differences between data, a classical statistical method is based on Principal Components Analysis (PCA). Knowing that first order HMMs were able to differentiate between the C and V regions on deduced amino-acid sequences of EIAV SU and used only frequencies of words of two amino-acids, we performed a PCA of the 9 constant regions and the 8 variable regions of EIAV, using the frequencies of 20 Ă— 20 = 400 words of two amino-acids as variables. Figure 6 shows a projection of the C and V regions of EIAV onto the plane defined by the two first principal axes. One sees that, contrary to our method based on HMMs, PCA does not allow to separate the EIAV regions into two groups, whether these groups correspond to the C regions and the V regions or not. With PCA, all the regions seem to have nearly the same statistical composition in words of two amino-acids, although it is not the case. Thus our method, based on HMMs, is able to reveal rather subtle differences between the group of V regions and the group of C regions.

Figure 6
figure 6

Principal Components Analysis of the C/V regions of EIAV. Plot of the two first axes of the principal components analysis of the composition in words of two amino-acids of the constant C1 to C9 and variable V1 to V8 regions of EIAV.

It may be of interest to note that a model, trained on EIAV sequences only, failed to identify the C and V regions of other lentiviruses, and conversely. Hence, the genetic compositions of the env genes of these different lentiviruses are distinct. However, the C and V regions of EIAV, HIV, SIV and SRLV do share some properties which are similar enough, so as to be recognized by a unique HMM, trained on a combined pool of EIAV, HIV, SIV and SRLV SU sequences. This combined model also predicts the C/V segmentation of BIV and FIV, whose sequences were not used to train the model. This supports the conclusion that the statistical compositions in words of nucleotides or amino-acids of the envelope genes of all these lentiviruses share some common features.

Models of order m = 5 on nucleotide sequences, based on the frequencies of words of length 6, predict with an amazing accuracy the C/V segmentations. These words correspond to one or two complete codons. This length is also compatible with the number of nucleotides that are in the neighborhood of the palm of RT during the retrotranscription [27–29]. This suggests that some mechanism of inaccurate nucleotide substitution, possibly due to sequence-specific variations and in interaction with the side chains of the RT protein, might modify the speed and/or the precision of the passage along the portion of the RNA chain which the RT copies.

Conclusion

The constant and variable regions of the lentiviruses EIAV, HIV, SLRV, SIV, BIV, and FIV can be identified by rather crude mathematical models based on HMMs. We attempt at present to extract the nature of the statistical signals which allow to distinguish between these regions. In this spirit, it has been reported that the retroviral G → A hypermutation occurs mainly in specific dinucleotide contexts, like GpG and GpA [30, 31]. Hence, one of our objectives now is to compare to known contexts of mutation the nucleotide words which are, as the present study shows, statistically characteristic of the variable regions of these lentiviruses.

The most interesting contribution of the combined models based on nucleotide or deduced amino-acid sequences of different lentiviruses is the rapid identification of the C and V regions on newly identified lentivirus sequences without the requirement to alignment. This should be especially useful for highly divergent sequences.

HMMs are usually used to identify homogeneous segments in long sequences. In this study, we showed that HMMs are powerful tools able to identify very short segments in sequences of just few hundred nucleotides. We are considering to generalize our method to study small motifs in short sequences.

Methods

Biological data

This section describes the sets of SU nucleotide sequences, used to train and to test the models (Table 3). When the set of sequences for a virus was sufficiently large, like for EIAV or HIV, we chose to break down it into two equal parts and to use half of the sequences to train the models and half to test the models. When the number of available sequences of a virus is more limited, we chose to use 3/4 of the sequences for the traning set in order to have enougth data to estimate the parameters of the models.

Table 3 GenBank accession numbers of the sequences used in this study.
  • EIAV: 187 sequences [6, 9, 32–35].

Training set: 94 sequences. Test set: 93 sequences.

According to the regions described in [6], we considered 8 variable regions (V1 to V8) and 9 constant regions (C1 to C9).

  • HIV: 155 HIV-1 sequences. The panel is composed of the HIV-1 HXB2 sequence and representative sequences from the following subtypes: A (21 sequences), B (27 sequences), C (26 sequences), D (18 sequences), E (19 sequences), F (3 sequences), G (21 sequences), H (2 sequences), and 17 sequences of recombinant forms.

Training set: 78 sequences. Test set: 77 sequences.

Variable regions V1 to V5 are as defined in [7]. However, V1 and V2 are considered as a unique variable region V1/V2, since these variable regions are separated by a small constant region composed of only a few nucleotides.

  • SIV: 61 sequences. Training set: 45 sequences. Test set: 15 sequences.

Variable regions V1 to V5 are as defined in [5].

  • SRLV: 68 sequences. Training set: 51 sequences. Test set: 17 sequences.

Variable regions V1 to V5 are as defined in [8].

  • BIV: 13 sequences. Test set: 13 sequences.

We compared the predicted regions with the variable regions V1 to V6 previously defined in [10].

  • FIV: 16 sequences. Test set: 16 sequences.

We compared the predicted regions with the variable regions V1 to V5 previously defined in [11].

Hidden Markov models

We recalled in the introduction that HMMs involve pairs of random processes, called respectively the hidden process and the observed process. In our context, the hidden process (S i )1 ≤ i ≤ Ldescribes the succession of homogeneous regions along a sequence of length L. For every i, S i belongs to a given finite set of size N and is called the hidden state at position i. The observed process (X i )1 ≤ i ≤ Ldescribes the nucleotide sequence or the deduced amino-acid sequence. For every i, X i belongs to a given finite alphabet X MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBamrtHrhAL1wy0L2yHvtyaeHbnfgDOvwBHrxAJfwnaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaWaaeGaeaaakeaaimaacqWFxepwaaa@384F@ of size M and is called the observation at position i. For instance, M := 4 and X MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBamrtHrhAL1wy0L2yHvtyaeHbnfgDOvwBHrxAJfwnaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaWaaeGaeaaakeaaimaacqWFxepwaaa@384F@ : = {A, C, G, T} for nucleotide sequences, and M := 20 for deduced amino-acid sequences.

We use HMMs of type M1Mm, hence the hidden process is a first order Markov chain. That is, the value S i at position i depends probabilistically on the value Si - 1at position i - 1. The transition matrix T is defined as

T(s'|s) := P(S i = s'|Si-1= s),

for every states s and s', that is, T(s'|s) denotes the probability that S i = s', conditionally on the fact that Si - 1= s. In turn, conditionally on the state process, the observed process is an inhomogeneous Markov chain of order m whose transition probabilities at position i depend only on S i . The emission matrix B is defined as

B(x |s,x1, ..., x m ) := P(X i = x | Xi - 1= x1,..., Xi-m= x m , S i = s),

for every state s and every observations x, x1, ..., x m . In words, the state at a given position depends on the state at the previous position, and the observation at a given position depends on the state at the same position and on the m previous observations.

Hence, the full model is specified by the pair of matrices (T, B) and by some initial distributions.

Parameter estimation

The estimation of the best model (T, B) for a given training set of sequences is usually based on maximum likelihood methods. Assume first that the segmentation of the observed sequences is available, that is, that one knows the state sequences. Then, the parameters of the model can be estimated with direct counting methods. For every states s and s', one sets

T ^ ( s ′ | s ) : = N ( s s ′ ) N ( s ) , MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGubavgaqcaiabcIcaOiqbdohaZzaafaGaeiiFaWNaem4CamNaeiykaKIaeiOoaOJaeyypa0ZaaSaaaeaacqWGobGtcqGGOaakcqWGZbWCcuWGZbWCgaqbaiabcMcaPaqaaiabd6eaojabcIcaOiabdohaZjabcMcaPaaacqGGSaalaaa@4102@

where N(s), respectively N(ss'), denotes the number of times the letter s, respectively the word ss', appears in the state sequence, that is,

N ( s ) : = ∑ i = 1 L 1 { S i = s } , N ( s s ′ ) : = ∑ i = 1 L − 1 1 { S i = s , S i + 1 = s ′ } . MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=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@660C@

Likewise, for every observations x, x1, ..., x m , and every state s, one sets

B ^ ( x | s , x 1 , ... , x m ) : = N ( x m ⋯ x 1 x | s ) N ( x m ⋯ x 1 ∗ | s ) , MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGcbGqgaqcaiabcIcaOiabdIha4jabcYha8jabdohaZjabcYcaSiabdIha4naaBaaaleaacqaIXaqmaeqaaOGaeiilaWIaeiOla4IaeiOla4IaeiOla4IaeiilaWIaemiEaG3aaSbaaSqaaiabd2gaTbqabaGccqGGPaqkcqGG6aGocqGH9aqpdaWcaaqaaiabd6eaojabcIcaOiabdIha4naaBaaaleaacqWGTbqBaeqaaOGaeS47IWKaemiEaG3aaSbaaSqaaiabigdaXaqabaGccqWG4baEcqGG8baFcqWGZbWCcqGGPaqkaeaacqWGobGtcqGGOaakcqWG4baEdaWgaaWcbaGaemyBa0gabeaakiabl+UimjabdIha4naaBaaaleaacqaIXaqmaeqaaOGaey4fIOIaeiiFaWNaem4CamNaeiykaKcaaiabcYcaSaaa@5F04@

with

N ( x m ⋯ x 1 ∗ | s ) : = ∑ z ∈ X N ( x m ⋯ x 1 z | s ) . MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacqWGobGtcqGGOaakcqWG4baEdaWgaaWcbaGaemyBa0gabeaakiabl+UimjabdIha4naaBaaaleaacqaIXaqmaeqaaOGaey4fIOIaeiiFaWNaem4CamNaeiykaKIaeiOoaOJaeyypa0ZaaabuaeaacqWGobGtcqGGOaakcqWG4baEdaWgaaWcbaGaemyBa0gabeaakiabl+UimjabdIha4naaBaaaleaacqaIXaqmaeqaaOGaemOEaONaeiiFaWNaem4CamNaeiykaKcaleaacqWG6bGEcqGHiiIZt0uy0HwzTfgDPnwy1egaryqtHrhAL1wy0L2yHvdaiqaacqWFxepwaeqaniabggHiLdGccqGGUaGlaaa@5D98@

Here N(x m ... x1z|s) is the number of times the word x m ... x1z appears in the observation sequence while the state is s at the position of the observation x, that is,

N ( x m ⋯ x 1 z | s ) : = ∑ i = m + 1 L 1 { X i − m = x i − m , X i − 1 = x i − 1 , X i = z , S i = s } . MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=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@6E8E@

As is well known, maximum likelihood estimators are sensitive to overfitting. To avoid such problems, we added constant pseudo-counts n0 to every N(s), N(ss') and N(x m ... x1z|s), equal to n0 := 1.

Reconstruction algorithms

When the segmentation of the training sequences is not available, the maximum likelihood estimators ( T ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGubavgaqcaaaa@2DED@ , B ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGcbGqgaqcaaaa@2DC9@ ) of (T, B) cannot be directly computed. But there exists several algorithms which estimate iteratively the parameters of the models with no foreknowledge of either the observation process or the state process. The most classical one is the expectation-maximization (EM) algorithm, introduced by [36]. In the context of hidden Markov chains, this algorithm is known as the Baum-Welch algorithm, see [13, 37] for a detailed description of the algorithm, and [12]. To compute maximum likelihood estimates of the parameters, this algorithm alternates E-steps and M-steps until convergence. During each E-step, the algorithm estimates the missing data (the hidden states sequence), computing the most likely state sequence with respect to the current value of the parameters, obtained through the preceding M-step. During each M-step, the algorithm maximizes the transition and emission probabilities, using the state sequence computed during the preceding E-step. There is no guarantee that the EM algorithm should produce a sequence (T n , B n )n ≥ 0of models which converges to ( T ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGubavgaqcaaaa@2DED@ , B ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGcbGqgaqcaaaa@2DC9@ ). Indeed, starting from an unspecified initial point (T0, B0), the algorithm can get stuck in one of many local maxima of the likelihood. But there exists a neighborhood of ( T ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGubavgaqcaaaa@2DED@ , B ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGcbGqgaqcaaaa@2DC9@ ), such that, for any (T0, B0) in this neighborhood, (T n , B n )n ≥ 0indeed converges to ( T ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGubavgaqcaaaa@2DED@ , B ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGcbGqgaqcaaaa@2DC9@ ) ([38, 39]). To introduce some information about the composition of the different regions, we also define and use a new algorithm based on the EM algorithm and on direct counting methods. The details of this new algorithm are as follows. The emission matrix B, corresponding to the transition probabilities between observations for each state, is defined by counting on training sequences. Then one estimates iteratively the state transition probabilities of the T matrix with the EM algorithm, keeping every emission probabilities at their calculated value. The M-step of the EM algorithm is modified, to omit the usual maximization of the emission probabilities. Then, the E-step and the maximization of the transition probabilities are performed as in the classical EM algorithm. We call this new algorithm fixed EM algorithm (which stands for EM algorithm with fixed emission probabilities). In details, the fixed EM algorithm produces a sequence (T n , B n )n ≥ 0of models as follows.

Step Initiation

The transition probabilities T0 are initialized using random values. The emission matrix B0 is defined by counting on training sequences as follows:

B 0 ( x | s , x 1 , ... , x m ) : = N ( x m ⋯ x 1 x | s ) N ( x m ⋯ x 1 ∗ | s ) , MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=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@6018@

with the same notations than in the section "Parameter estimation".

Step Estimation (E)

Computation of the probability Pk, â„“of every successives states k and â„“ in S, under the current value (T n , B n ).

Pk,â„“= P(S i = k, Si+1= â„“|x1, ..., x L , (T n , B n )).

This probability can be computed using the forward and backward variables f k (i) and b k (i) defined by:

f k (i) = P(x1, ..., x i , S i = k),

and

b k (i) = P(xi+1, ..., x n | S i = k, xi-m+1, ..., x i ).

We have:

P k , ℓ = f k ( i ) ⋅ T n ( k , ℓ ) ⋅ B n ( ℓ , x i − m + 1 : i , x i + 1 ) ⋅ b ℓ ( i + 1 ) ∑ k ∈ S f k ( n ) , MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=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uaeqaniabggHiLdGccqGGOaakcqWGUbGBcqGGPaqkaaGaeiilaWcaaa@7BC5@

Step Maximization (M)

Computation of (Tn+1, Bn+1), through the formulas

T n + 1 ( k , ℓ ) = t ( k , ℓ ) ∑ s ∈ S t ( k , s ) , MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacqWGubavdaWgaaWcbaGaemOBa4Maey4kaSIaeGymaedabeaakiabcIcaOiabdUgaRjabcYcaSiabloriSjabcMcaPiabg2da9maalaaabaGaemiDaqNaeiikaGIaem4AaSMaeiilaWIaeS4eHWMaeiykaKcabaWaaabeaeaacqWG0baDcqGGOaakcqWGRbWAcqGGSaalcqWGZbWCcqGGPaqkaSqaaiabdohaZjabgIGioprtHrhAL1wy0L2yHvtyaeHbnfgDOvwBHrxAJfwnaGabaiab=jr8tbqab0GaeyyeIuoaaaGccqGGSaalaaa@563E@

where

t ( k , ℓ ) = ∑ i = 1 n − 1 f k ( i ) ⋅ T n ( k , ℓ ) ⋅ B n ( ℓ , x i − m + 1 : i , x i + 1 ) ⋅ b ℓ ( i + 1 ) , MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=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@6FFA@

and

Bn+1= B0.

Step End

The steps E and M are executed alternatively until convergence.

The fixed EM algorithm converges to the maximum likelihood estimators ( T ˜ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGubavgaacaaaa@2DEC@ , B ˜ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGcbGqgaacaaaa@2DC8@ ) conditioned by the emission matrix B. The model ( T ˜ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGubavgaacaaaa@2DEC@ , B ˜ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGcbGqgaacaaaa@2DC8@ ) yields a lower likelihood than the model ( T ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGubavgaqcaaaa@2DED@ , B ^ MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacuWGcbGqgaqcaaaa@2DC9@ ) obtained with the EM algorithm. Experimentally, on EIAV sequences, we observe that the convergence of fixed EM occurs 10 times faster than the convergence of the EM algorithm. We defined the fixed EM algorithm to introduce some information about the number N of types of regions and the statistical composition in words of nucleotides or amino-acids of these regions. On the contrary, we introduced no information about the order or the position of the regions along the sequence.

In both EM and fixed EM algorithms, to reconstruct the hidden states sequence and to identify the predicted C and V regions, one determines the sequence of the most probable hidden states, that is, one computes at each position i of the sequence the likelihood of the different hidden states (S i = s) conditionally on the observed sequence and one selects the state with the highest likelihood. The likelihood of the hidden states for each position is computed using the classical forward-backward algorithm, described by [40].

References

  1. Coffin JM: Genetic variation in AIDS viruses. Cell 1986, 46: 1–4. 10.1016/0092-8674(86)90851-2

    Article  CAS  PubMed  Google Scholar 

  2. Preston BD: Reverse transcriptase fidelity and HIV-1 variation. Science 1997, 275(5297):228–229. 10.1126/science.275.5297.228

    Article  CAS  PubMed  Google Scholar 

  3. Preston BD, Poiesz BJ, Loeb LA: Fidelity of HIV-1 reverse transcriptase. Science 1988, 242(4882):1168–1171. 10.1126/science.2460924

    Article  CAS  PubMed  Google Scholar 

  4. Roberts JD, Bebenek K, Kunkel TA: The accuracy of reverse transcriptase from HIV-1. Science 1988, 242(4882):1171–1173. 10.1126/science.2460925

    Article  CAS  PubMed  Google Scholar 

  5. Burns DP, Collignon C, Desrosiers RC: Simian immunodeficiency virus mutants resistant to serum neutralization arise during persistent infection of rhesus monkeys. Journal of Virology 1993, 67(7):4104–4113.

    PubMed Central  CAS  PubMed  Google Scholar 

  6. Leroux C, Issel CI, Montelaro RC: Novel and dynamic evolution of equine infectious anemia virus genomic quasispecies associated with sequential disease episode in an experimentally infected pony. Journal of Virology 1997, 71(12):9627–9639.

    PubMed Central  CAS  PubMed  Google Scholar 

  7. Modrow S, Hahn BH, Shaw GM, Gallo RC, Wong-Staal F, Wolf H: Computer-assisted analysis of envelope protein sequences of seven human immunodeficiency virus isolates: prediction of antigenic epitopes in conserved and variable regions. Journal of Virology 1987, 61(2):570–578.

    PubMed Central  CAS  PubMed  Google Scholar 

  8. Valas S, Benoit C, Baudry C, Perrin G, Mamoun RZ: Variability and immunogenicity of caprine arthritis-encephalitis virus surface glycoprotein. Journal of virology 2000, 74(13):6178–6185. 10.1128/JVI.74.13.6178-6185.2000

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  9. Zheng YH, Sentsui H, Nakaya T, Kono Y, Ikuta K: In vivo dynamics of Equine Infectious Anemia Viruses emerging during febrile episodes : Insertions/duplications at the principal neutralizing domain. Journal of Virology 1997, 71(7):5031–5039.

    PubMed Central  CAS  PubMed  Google Scholar 

  10. Suarez DL, Whetstone CA: Identification of hypervariable and conserved regions in the surface envelope gene in the bovine lentivirus. Virology 1995, 212(2):728–733. 10.1006/viro.1995.1532

    Article  CAS  PubMed  Google Scholar 

  11. Pancino G, Fossati I, Chappey C, Castelot S, Hurtrel B, Moraillon A, Klatzmann D, Sonigo P: Structure and variations of feline immunodeficiency virus envelope glycoproteins. Virology 1993, 192(2):659–662. 10.1006/viro.1993.1083

    Article  CAS  PubMed  Google Scholar 

  12. Rabiner LR: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 1989, 77(2):257–286. 10.1109/5.18626

    Article  Google Scholar 

  13. Churchill GA: Stochastic models for heterogeneous DNA sequences. Bulletin of Mathematical Biology 1989, 51: 79–94.

    Article  CAS  PubMed  Google Scholar 

  14. Krogh A: A hidden Markov model that finds genes in E. coli DNA. Nucleic Acids Research 1994, 22(22):4768–4778. 10.1093/nar/22.22.4768

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  15. Krogh A, Brown M, Mian IS, Sjölander K, Haussler D: Hidden Markov models in computational biology: Applications to protein modeling. Journal of Molecular Biology 1994, 235: 1501–1531. 10.1006/jmbi.1994.1104

    Article  CAS  PubMed  Google Scholar 

  16. Krogh A, Larsson B, Von Heijne G, Sonnhammer ELL: Predicting transmembrane protein topology with a Hidden Markov Model: application to complete genomes. Journal of Molecular Biology 2001, 305(3):567–580. 10.1006/jmbi.2000.4315

    Article  CAS  PubMed  Google Scholar 

  17. Nicolas P, Bize L, Muri F, Hoebeke M, Rodolphe F, Ehrlich SD, Prum B, Bessières P: Mining Bacilius subtilis chromosome heterogeneities using hidden Markov models. Nucleic Acids Research 2002, 30(6):1418–1426. 10.1093/nar/30.6.1418

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  18. Peshin L, Gelfand MS: Segmentation of yeast DNA using hidden Markov models. Bioinformatics 1999, 15(12):980–986. 10.1093/bioinformatics/15.12.980

    Article  Google Scholar 

  19. Salzberg SL, Delcher AL, Kasif S, White O: Microbial gene identification using interpolated Markov models. Nucleid Acids Research 1998, 26(2):544–548. 10.1093/nar/26.2.544

    Article  CAS  Google Scholar 

  20. Akaike H: A new look at the statistical model identification. IEEE Transactions on Automatic Control 1974, 19: 716–723. 10.1109/TAC.1974.1100705

    Article  Google Scholar 

  21. Billingsley P: Statistical methods in Markov chains. The Annals of Mathematical Statistics 1961, 32: 12–40.

    Article  Google Scholar 

  22. Miller GA: Note on the bias of information estimates. In Information Theory in Psychology: Problems and Methods. Edited by: Quastler H,. Glencoe ,Illinois: The Free Press; 1955:95–100.

    Google Scholar 

  23. Johnson D, Sinanovic S: Symmetrizing the Kullback-Leibler distance.[http://citeseer.ist.psu.edu/johnson01symmetrizing.html]

  24. Victor JD: Asymptotic Bias in Information Estimates and the Exponential (Bell) Polynomials. Neural Computation 2000, 12: 2797–2804. 10.1162/089976600300014728

    Article  CAS  PubMed  Google Scholar 

  25. Paninski L: Estimation of entropy and mutual information. Neural Computation 2003, 15: 1191–1253. 10.1162/089976603321780272

    Article  Google Scholar 

  26. Pritchard G, Scott DJ: The eigenvalues of the empirical transition matrix of a Markov chain. Journal of Applied Probability 2004, 41A: 347–360. 10.1239/jap/1082552210

    Article  Google Scholar 

  27. Beard WA, Bebenek K, Darden TA, Li L, Prasad R, Kunkel TA, Wilson SH: Vertical-scanning mutagenesis of a critical tryptophan in the minor groove binding track of HIV-1 reverse transcriptase. Molecular nature of polymerase-nucleic acid interactions. Journal of Biological Chemistry 1998, 273(46):30435–30442. 10.1074/jbc.273.46.30435

    Article  CAS  PubMed  Google Scholar 

  28. Bebenek K, Beard WA, Darden TA, Li L, Prasad R, Luton BA, Gorenstein DG, Wilson SH, Kunkel TA: A minor groove binding track in reverse transcriptase. Nature structural Biology 1997, 4(3):194–197. 10.1038/nsb0397-194

    Article  CAS  PubMed  Google Scholar 

  29. Kohlstaedt LA, Wang J, Friedman JM, Rice PA, Steitz TA: Crystal structure at 3.5 A resolution of HIV-1 reverse transcriptase complexed with an inhibitor. Science 1992, 256(5065):1783–1790. 10.1126/science.1377403

    Article  CAS  PubMed  Google Scholar 

  30. Vartanian JP, Meyerhans A, Sala M, Wain-Hobson S: G→A hypermutation of the human immunodeficiency virus type 1 genome: evidence for dCTP pool imbalance during reverse transcription. Proceedings of the National Academy of Sciences 1994, 91(8):3092–3096. 10.1073/pnas.91.8.3092

    Article  CAS  Google Scholar 

  31. Wain-Hobson S, Sonigo P, Guyader M, Gazit A, Henry M: Erratic G→A hypermutation within a complete caprine arthritis-encephalitis virus (CAEV) provirus. Virology 1995, 209(2):297–303. 10.1006/viro.1995.1261

    Article  CAS  PubMed  Google Scholar 

  32. Craigo JK, Leroux C, Howe L, Steckbeck JD, Cook SJ, Issel RG, Charles I, Montelaro : Transient immune suppression of inapparent carriers infected with a principal neutralizing domain-deficient equine infectious anaemia virus induces neutralizing antibodies and lowers steady-state virus replication. Journal of General Virology 2002, 83: 1353–1359.

    Article  CAS  PubMed  Google Scholar 

  33. Leroux C, Craigo JK, Issel CI, Montelaro RC: Equine Infectious Anemia Virus genomic evolution in progressor and nonprogressor ponies. Journal of Virology 2001, 75(10):4570–4583. 10.1128/JVI.75.10.4570-4583.2001

    Article  PubMed Central  CAS  PubMed  Google Scholar 

  34. Zheng YH, Sentsui H, Kono Y, Ikuta K: Mutations occurring during serial passage of Japanese equine infectious anemia virus in primary horse macrophages. Virus Research 2000, 68: 93–98. 10.1016/S0168-1702(00)00147-7

    Article  CAS  PubMed  Google Scholar 

  35. Zheng YH, Nakaya T, Sentsui H, Kameoka M, Kishi M, Hagiwara K, Takahashi H, Kono Y, Ikuta K: Insertions, duplications and substitutions in restricted gp90 regions of equine infectious anaemia virus during febrile episodes in an experimentally infected horse. Journal of General Virology 1997, 78: 807–820.

    Article  CAS  PubMed  Google Scholar 

  36. Dempster A, Laird N, Rubin D: Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society 1997, 39: 1–38.

    Google Scholar 

  37. Durbin R, Eddy S, Krogh A, Mitchison G: Biological sequence analysis. Cambridge University Press; 1998.

    Book  Google Scholar 

  38. Wu C: On the convergence properties of the EM algorithm. The Annals of Statistics 1983, 11: 95–103.

    Article  Google Scholar 

  39. Muri F: Comparaison d'algorithmes d'identification de chaînes de Markov cachées et application à la détection de régions homogènes dans les séquences d'ADN. PhD thesis. University Paris V; 1997.

    Google Scholar 

  40. Baum LE, Petrie T, Soules G, Weiss N: A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. The Annals of Mathematical Statistics 1970, 41: 164–171.

    Article  Google Scholar 

  41. Unrooted[http://pbil.univ-lyon1.fr/software/unrooted.html]

Download references

Acknowledgements

ABQ is the recipient of an INRA fellowship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Caroline Leroux.

Additional information

Authors' contributions

ABQ developed the methods, performed the in silico experiments and drafted the manuscript under the supervision of CL and DP. DP conceived the statistical test described in the appendix. CL and DP conceived, designed and coordinated the project, assured its supervision, participated in the interpretation of data and helped to draft the manuscript. All authors read and approved the final manuscript.

Electronic supplementary material

12859_2006_1471_MOESM1_ESM.pdf

Additional file 1: On the discrimination of Markov chains through their empirical transition matrices. The Additional file 1 describes an asymptotic statistical test to discriminate Markov chains through their empirical transition matrices. (PDF 85 KB)

Authors’ original submitted files for images

Rights and permissions

Open Access This article is published under license to BioMed Central Ltd. This is an Open Access article is distributed under the terms of the Creative Commons Attribution License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Boissin-Quillon, A., Piau, D. & Leroux, C. In silico segmentations of lentivirus envelope sequences. BMC Bioinformatics 8, 99 (2007). https://doi.org/10.1186/1471-2105-8-99

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1471-2105-8-99

Keywords