 Research
 Open Access
Parallel short sequence assembly of transcriptomes
 Benjamin G Jackson^{1}Email author,
 Patrick S Schnable^{2} and
 Srinivas Aluru^{1}
https://doi.org/10.1186/1471210510S1S14
© Jackson et al; licensee BioMed Central Ltd. 2009
 Published: 30 January 2009
Abstract
Background
The de novo assembly of genomes and transcriptomes from short sequences is a challenging problem. Because of the high coverage needed to assemble short sequences as well as the overhead of modeling the assembly problem as a graph problem, the methods for short sequence assembly are often validated using data from BACs or small sized prokaryotic genomes.
Results
We present a parallel method for transcriptome assembly from large short sequence data sets. Our solution uses a rigorous graph theoretic framework and tames the computational and space complexity using parallel computers. First, we construct a distributed bidirected graph that captures overlap information. Next, we compact all chains in this graph to determine long unique contigs using undirected parallel list ranking, a problem for which we present an algorithm. Finally, we process this compacted distributed graph to resolve unique regions that are separated by repeats, exploiting the naturally occurring coverage variations arising from differential expression.
Conclusion
We demonstrate the validity of our method using a synthetic high coverage data set generated from the predicted coding regions of Zea mays. We assemble 925 million sequences consisting of 40 billion nucleotides in a few minutes on a 1024 processor Blue Gene/L. Our method is the first fully distributed method for assembling a nonhierarchical short sequence data set and can scale to large problem sizes.
Keywords
 List Ranking
 Graph Reduction
 Communication Round
 Marked Node
 Clone Pair
Background
Introduction
The development of highthroughput short sequencing technologies, such as the Illumina Solexa and Applied Biosystems Solid systems, has sparked renewed interest in sequence assembly. The promise of inexpensive short reads has opened the door to the possibilities of resequencing individuals and sequencing more organisms at lower cost.
An important problem in short sequence assembly is de novo genome reconstruction. For genomes with high repeat content, this task is already difficult with the much longer Sanger reads [1]. For accurate assembly of short sequences, many have proposed using more rigorous graph models rather than to the overlapbased greedy heuristics often utilized for Sanger reads. Graph models of particular interest include De Bruijn graphs and string graphs in either directed or bidirected forms.
As graph models of assembly are compute and memory intensive, and the coverage needed with short read technologies is large, it is difficult to validate the proposed methods on large eukaryotic genomes. Pevzner et al. [2] originally tested the EULER assembler using bacterial genomes. Myers [3], Medvedev et al. [4], and Hernadez et al. [5] also demonstrate their methods on prokaryotes. Zerbino et al. [6], Warren et al. [7] and Dohm et al. [8] validated their methods using single BACs.
Butler et al. [9] computed an assembly of 39 million bases in 2 days using a database and a workstation with 64 gigabytes of RAM. They use a modified directed string graph model for assembly, and require clone pairs of three different lengths to achieve the result. Their paper, while presenting a sequential method, does demonstrate that the de novo assembly of long genomes using very short shotgun sequences is possible.
Sundquist et al. [10] propose the SHRAP hierarchical short sequence protocol and method for assembling hierarchical data in parallel. The hierarchical nature of their problem results in a natural decomposition into smaller problems that can be distributed, which is fundamentally different from the problem of assembling shotgun data in parallel, which we present here.
In this paper, we present a method for assembling the transcriptome of an organism from short reads derived from unnormalized expression libraries. We follow Myers' and Medvedev's lead [3, 11] and model the assembly problem as that of finding a tour of a bidirected string graph, which we consider a natural model. Importantly, we address the challenges of constructing and manipulating this graph using multiprocessor computers. In addition to speeding up the assembly process, the main benefit of using such machines is the large amount of memory available for the manipulation of the graph for large problems.
Our method is a fully distributed parallel method that can process high coverage data sets and quickly reconstruct the underlying sequences. First, we construct the distributed bidirected string graph. Once the graph has been constructed, we identify and compact chains within the graph, which correspond to unique long contigs. The final step of the algorithm is to process the graph in such a way that we can reduce the edges, and, correspondingly, increase the length of each edge, or the length of each contig in the assembly. In this manipulation, we make novel use of the variation in sequence coverage of the transcriptome naturally arising due to differential expression. Coverage has been used in assembly methods before, particularly in transforming the assembly problem to that of network flow [3]. However, instead of using uniform coverage as do these methods, our method leverages non uniform coverage.
We analyze the error in Solexa data and then use this analysis to generate synthetic data for the maize (Zea mays) transcriptome. We then use a parallel implementation of our method to assemble 40 billion bases in a few minutes on a 1024 node Blue Gene/L computer. We validate the method by aligning our assembled contigs back to the reference genome.
Model of parallel computation
To ensure practical applicability, we use the distributed memory model of parallel computation. Each processor has access to its local memory, and remote memory access is achieved through communication over an interconnection network. The runtime of an algorithm is characterized by the parallel computation time and communication time. We use the permutation network model, in which each processor can simultaneously send/receive a message of m bytes provided no two source/destination processors have the same id. The communication complexity is then measured by the number of such communication rounds, and the total volume of parallel communication. The former accounts for the number of times the expensive latency cost is paid, while the latter accounts for the cost of network routing.
Let p denote the number of processors. We make use of the regular alltoall communication primitive, in which each processor sends a distinct message of O($\frac{n}{{p}^{2}}$) bytes to every other processor (i.e., one communication round with O($\frac{n}{p}$) parallel communication volume). A manytomany communication is similar, except that each processor sends and receives variable sized chunks of data. A bounded manytomany communication can be made to behave as a regular alltoall communication with total size r + s, where s is the total number of elements sent by any processor and r is the maximum number of elements received by any processor [12].
When we refer to an element in an array sending a message to another element in an array, we implicitly mean that each processor will collect all such messages and send and receive them using a manytomany communication before routing them to their final array destination.
Parallel sorting is an important subroutine in our method, and the best algorithm for parallel sort on distributed memory machines that achieves a good final distribution of the sorted values is regular sample sort [13]. A regular sample sort uses a constant number of bounded manytomany communications and O ($\frac{n}{p}$) local computation for integer sort, and O ($\frac{n}{p}\mathrm{log}\frac{n}{p}$) local computation time for comparison sort.
A primary concern in the development of parallel algorithms is to demonstrate that the algorithm scales well as the number of processors increases. This allows one to handle larger problem sizes by using larger machines without compromising on time to solution. Perfect speedup is characterized as linear speedup with number of processors.
The bidirected graph model
In a bidirected graph G = {V,E}, each edge has two directions, one associated with each incident node. For each ordered pair of nodes (u,v) there are four possible connecting edges: u▷▷v, u◁◁v, u◁▷v, and u▷▷v. Edges are represented by tuples <u, v, d_{ u }, d_{ v }>, with d_{ u }, d_{ v }∈ {▷, ◁}. For each unordered pair of nodes {u, v} exactly two such tuples exist, one for each of the ordered pairs (u, v) and (v, u), respectively. Accordingly, we represent the bidirected graph as a distributed tuple list, two tuples per edge.
In this representation, sorting tuples by node labels will distribute edges such that all edges adjacent to a given node reside in the same processor. Alternatively, sorting tuples by a canonical representation (for example considering the smaller node ID followed by the larger node ID) will move both tuples corresponding to an edge to the same processor.
In the bidirected De Bruijn graph, each node u corresponds to a kmolecule present in some input sequence. We label its two strands by u^{+} and u^{}. If two such molecules u and v contain a k  1 length overlap, they can do so in four possible ways, each of which directly corresponds to the types of edges in a bidirected graph.

Case I: The (k  1)length suffix of u^{+} is a prefix of v^{+}. This is denoted u▷▷v.

Case II: The (k  1)length suffix of u^{} is a prefix of v^{}. This is denoted u◁◁v.

Case III: The (k  1)length suffix of u^{} is a prefix of v^{+}. This is denoted u◁▷v.

Case IV: The (k  1)length suffix of u^{+} is a prefix of v^{}. This is denoted u▷◁v.
The bidirected De Bruijn graph can be easily converted into a bidirected string graph, with two character labels on each edge, c_{ u }and c_{ v }where c_{ u }corresponds to the next character on the DNA molecule when traveling away from u along the edge, and c_{ v }corresponds to the next character on the DNA molecule when traveling away from v along the edge. This data is added to the edge tuple, resulting in tuples of the form ⟨u, v, d_{ u }, d_{ v }, c_{ u }, c_{ v }⟩.
A valid path in a bidirected graph is any ordered sequence of tuples ⟨e_{1}, e_{2}, ... e_{ x }⟩, where e_{ i }= ⟨u_{ i }, v_{ i }, ${d}_{{u}_{i}}$, ${\mathcal{d}}_{{v}_{i}}$⟩, such that v_{ i }= u_{i+1}and ${d}_{{v}_{i}}\ne {d}_{{u}_{i+1}}$ for all consecutive tuples e_{ i }and e_{i+1}in the path.
Conceptually, what it means to travel along an edge that "changes direction" is to align the positive strand in node u to the negative strand in node v. To travel along an edge that maintains its direction is to align the positive to positive. One advantage of this model is that a single tour of the graph is used to construct both strands of the double stranded DNA simultaneously. Another advantage is that the number of nodes in the graph is reduced by half when compared to a directed graph model.
Methods
Parallel graph construction
We are given m sequences of total length n, sampled from a genome of total length g, distributed among p processors such that there are $\frac{n}{p}$ bases per processor. We wish to construct a bidirected string graph with O(g) edges and nodes, distributed among processors such that each processor knows all edges adjacent to O ($\frac{g}{p}$) nodes. For a detailed description and analysis of graph construction, as well as refinements to the basic algorithm presented here, see Jackson et al. [14].
We represent each kmolecule in the input sequence as a base 4 number (in 2k bits) using its lexicographically larger stand. These representatives can then be sorted in parallel, with identical elements merged into one. Due to the 4letter DNA alphabet, a kmolecule u could overlap with at most 8 kmolecules v. We construct the messages to be sent to hypothetical molecules v that could be attached to u, such that for all such molecules, either v will send a message to u or u will send a message to v.
The messages are constructed for each of the three ways in which u can overlap with v. We construct each message such that it can be sent to the representative of v (we target the hypothetical positive strand). For each message, we construct a tuple ⟨id, dest, type, char⟩, where id is the node id of u, dest is the representative of v, type is the type of the message, which will inform the type of edge to draw in the graph, and char is the character to be associated with the edge when moving from u to v. Each hypothetical edge in the bidirected De Bruijn graph is thus represented by exactly one message.
For each message ⟨id, dest, type, char⟩ received by kmolecule v, we generate two tuples. The resulting tuple list is sorted and any duplicates are removed, resulting in a distributed tuple list representation of the graph.
Using a linear time radix sort, parallel graph construction is achieved in O ($\frac{n}{p}$) parallel compute time, O(1) communication rounds, and O ($\frac{n}{p}$) parallel communication volume.
Dealing with error
Pevzner et al. [2] and Dohm et al. [8] deal with erroneous sequences by editing those that have suspicious kmers. The idea is that, given high coverage, errors will manifest themselves in the sequences as kmers that occur only once. This is because as long as error is not systematic, the likelihood of seeing the same error twice at the same position is low. If a sequence containing a suspicious kmer can be uniquely edited into a valid sequence, then the editing is done; if not, the sequence is discarded.
This approach, being a preprocessing step, can be used in conjunction with any assembly method to greatly reduce error in input sequences, and many recent works on assembly have advocated its use. We can use the same concept to identify error at a later stage in the method, by removing the offending kmers from the bidirected De Bruijn graph.
Parallel identification of unique contigs
The bidirected graph generated in the previous section will likely have many long chains, each corresponding to sequences that can be unambiguously assembled into a single contig. These chains are then connected in a more interesting topology that must be further analyzed. Will will compact these chains (forming a single edge in the graph for each chain) using undirected list ranking.
Weighted undirected list ranking problem
For the undirected list ranking problem, we are given a set of weighted, undirected lists of total length n as an array of tuples ℒ[u] = ⟨A_{1}, W_{1}, A_{2}, W_{2}⟩ of size n, where u.A_{1} and u.A_{2} hold pointers to the two nodes adjacent to node u, and u.W_{1} and u.W_{2} hold the corresponding weights. If u is an endpoint, then either u.A_{1} or u.A_{2} will point to u. If u is the sole element of a list, then both u.A_{1} and u.A_{2} will point to u. If u.A_{ i }= v, then either v.A_{1} = u or v.A_{2} = u. If u.A_{ i }= v and v.A_{ j }= u, then u.W_{ i }= v.W_{ j }.
For the undirected list ranking problem, we wish to compute the tuple $\mathcal{R}$[u] = ⟨R_{1}, E_{1}, R_{2}, E_{2}⟩. u.R_{1} is the rank of u relative to u.E_{1}, the list endpoint in the direction of u.A_{1}. u.R_{2} and u.E_{2} are respectively defined in the direction of u.A_{2}.
List ranking transformation
 1.
Sort all tuples with the smaller node id as the primary key and the larger node id as the secondary key. This results in both tuples for a given edge coming together in the sorted order.
 2.
If necessary, shift boundary tuples to guarantee that no edge is split between processors.
 3.
Give each pair of tuples a unique ID in the range 1 to E.
 4.
Sort all tuples with the first node id as the primary key and the second node id as the secondary key. This results in all tuples for a given node coming together in the sorted order.
 5.
If necessary, shift boundary tuples to guarantee that all tuples with the same first node id are on the same processor.
 6.
For each set of tuples ${\mathcal{A}}_{u}$ sharing the first node id u:
 (a)
If ${\mathcal{A}}_{u}$ = {x, y} and x.d_{ u }≠ y.d_{ u }(there is a valid path through this node in the graph), then set x.adj ← y.ID and y.adj ← x.ID.
 (b)
Otherwise, for all tuples x ∈ ${\mathcal{A}}_{u}$ set x.adj ← x.id.
 7.
Sort all tuples with the smaller node id as the primary key and the larger node id as the secondary key. Shift boundary tuples as necessary.
 8.
For each pair of tuples x and y corresponding to the same edge, set ℒ[id] ← ⟨x.adj, 1, y.adj, 1⟩.
The runtime of the transformation is dominated by a constant number of parallel sort operations.
Parallel list ranking
The undirected list ranking problem is a modification of the traditional list ranking problem, which has been extensively studied on parallel computers. The sparse ruling set algorithm achieves the best run time on large data sets with a large number of processors [15], and we have accordingly designed a modified version of the sparse ruling set algorithm for undirected lists.
The sparse ruling set algorithm is a recursive algorithm on a weighted list (each edge is associated with a weight or distance). In the base case, the lists are gathered to one processor and solved using a serial list ranking algorithm, in linear time.
For the inductive case of the algorithm, we wish to achieve the following objectives. First, we wish to mark some subset of nodes which include all endpoints and some other nodes. Second, we wish to find the distance between each unmarked node and its two closest marked nodes. Finally, we wish to find the distance between adjacent marked nodes.
We will now formally describe an in place recursive algorithm. The algorithm communicates messages with four components: ℳ = ⟨t, s, m, r⟩, where t is the target of the message, m is the id of the originating marked node, s is the source of the message, and r is the distance to the originating marked node.
 1.
Mark nodes: For each node u that is unmarked (u.i = l), mark u (u.i ← l + 1) under the following conditions:

u is an end point.

with some probability ρ.
 2.
Construct messages: For each node u that is a marked node, construct messages to be sent to the neighbors of u: ⟨u.A_{1}, u, u, u.W_{1}⟩ and ⟨u.A_{2}, u, u, u.W_{2}⟩
 3.
Propagate messages: While there exist some messages to send:
 (a)
Send and receive all messages. This is a manytomany communication.
 (b)
For each message ℳ received with target t, we can get the origin of the message by comparing s with t.A_{1} and t.A_{2}. We will assume that s = t.A_{1}; the other case is handled similarly.

If t is a marked node then set the new adjacencies and weights for the recursive problem: t.A_{1} ← m and t.W_{1} ← r.

If t is an unmarked node then:
○ Record the originating marked node and the distance to it: t.E_{1} ← m and t.R_{1} ← r.
 4.
Recursion: At this point, the recursive problem has been initialized. If n_{l+1}<T proceed with the base case. Otherwise recurse with l ← l + 1.
 5.
Recursive Result: When the recursion is complete, all marked nodes will have $\mathcal{R}$[u] computed.
 6.
Compute $\mathcal{R}$[u] for all unmarked nodes: For each u with u.i = l:
 (a)
Get flanking nodes: For flanking nodes: v ← u.E_{1} and w ← u.E_{2}, gather $\mathcal{R}$[v] and $\mathcal{R}$[w] if v and w are not local. Notice that v and w are marked.
 (b)
Calculate $\mathcal{R}$[u]: It must be the case that either v.E_{1} = w.E_{1} or v.E_{1} = w.E_{2}. We will consider the first case, as the second case is handled similarly.

If (v.R_{1}< w.R_{1}) then set $\mathcal{R}$[u] ← ⟨u.R_{1} + v.R_{1},v.E_{1},w.R_{2}  u.R_{2},v.E_{2}⟩.

If (v.R_{1}> w.R_{1}) then set $\mathcal{R}$[u] ← ⟨v.R_{1}  u.R_{1},v.E_{2},w.R_{2} + u.R_{2},v.E_{1}⟩.
The base case of the algorithm requires gathering all remaining n' marked nodes to a single processor to be ranked. To do so, we must map the pointers in the original array of size n to the new array of size n'. We construct an additional array that maps from the domain of n' to the domain of n. Once this array is gathered to a single processor, an inverted mapping is created. This inverted mapping is used to map the adjacency pointers, which index into the global domain, to the smaller domain.
Runtime analysis
The number of rounds of message passing in Step 3 is given by the longest distance between two marked nodes. As each node is randomly marked, this distance is bounded by 3p ln(n_{ l }) with high probability [16]. Therefore, the expected number of communication rounds is O(log(n_{ l })). The communication volume over these O(log(n_{ l })) rounds is O ($\frac{{n}_{l}}{p}$). Because n_{ l }is expected to exponentially decrease in O(log n) recursive calls, the the total expected runtime of undirected list ranking is given by O ($\frac{n}{p}$) parallel compute time, O(log^{2} n) communication rounds, and O ($\frac{n}{p}$) parallel communication volume.
Compacted graph construction
After solving the list ranking transformation, we will set id and adj for tuples x and y as follows:

if $\mathcal{R}$[id].E_{1} ≤ $\mathcal{R}$[id].E_{2}:
○ x.id ← y.id ← $\mathcal{R}$[id].E_{1}
○ x.adj ← y.adj ← $\mathcal{R}$[id].R_{1}

if $\mathcal{R}$[id].E_{1} > $\mathcal{R}$[id].E_{2}:
○ x.id ← y.id ← $\mathcal{R}$[id].E_{2}
○ x.adj ← y.adj ← $\mathcal{R}$[id].R_{2}
The id component of each edge tuple corresponds to the chain id, and the adj component of each edge tuple corresponds to the chain position. By sorting the tuples using these two fields as the primary key and the secondary key respectively, we can order all tuples according to their chain membership and position. If we shift boundary elements such that all elements with the same id are on the same processor, all tuples belonging to the same chain will be local to a processor. From these sorted tuples, we will construct our compacted graph representation.
First, we must store chains, each chain consisting of a sequence of bases. Each base in the chain is represented by a tuple ⟨b_{1}, b_{2}, id, pos⟩, where b_{1},b_{2} ∈ {A, C,G,T}. This representation arises naturally from the tuples in the sorted order described above, and in fact the transformation to this representation only removes redundant and unnecessary information.
In addition to the chains, we also construct a distributed tuple list that models the compacted string graph. Each tuple is of the form ⟨u, v, d_{ u }, d_{ v }, cov, ch _id, ch _dir⟩, with u the first endpoint, v the second endpoint, d_{ u }the direction of the arrowhead at u, d_{ v }the direction of the arrowhead at v, cov the average coverage on that edge, ch_id the identifier of the chain that labels this edge, and ch_dir = {forward, reverse} corresponding to which strand of the chain should be read when moving from u to v.
The tuples for the compacted graph can be easily constructed by scanning the original graph tuples in the sorted order described above. For every chain starting with tuple ⟨u, v, d_{ u }, d_{ v }, c_{ u }, c_{ v }, id, 0⟩ and ending with tuple ⟨x, y, d_{ x }, d_{ y }, c_{ x }, c_{ y }, id, adj⟩, we construct tuples ⟨u, y, d_{ u }, d_{ y }, cov, id, forward⟩ and ⟨y, u, d_{ y }, d_{ u }, cov, id, reverse⟩. Assume that the coverage information for each can be calcualted as the average coverage of all positions along the chain.
Graph reduction
At this point of graph processing, much of the repeat structure of the genome will be hidden in the graph, and as a result the length of all chains will be less than g. We wish to perform a sequence of reductions that will simultaneously simplify the graph while expanding the length of all chains to approach the size of g. We do this by performing graph manipulations centered at some nodes.
Consider the set of tuples ${\mathcal{A}}_{u}$ = {t_{1}, t_{2}, ... t_{ k }} all sharing the first node id u. These tuples correspond to edges incident to u in the graph. We can partition ${\mathcal{A}}_{u}$ into two sets ${\mathcal{I}}_{u}$ and ${\mathcal{O}}_{u}$, where t_{ i }∈ ${\mathcal{I}}_{u}$ if and only if t_{ i }.d_{ u }= ◁, while t_{ j }∈ ${\mathcal{O}}_{u}$ if and only if t_{ j }.d_{ u }= ▷. Thus, conceptually when traversing the graph, if we enter the node u along an edge that corresponds to a tuple in ${\mathcal{I}}_{u}$, we must exit the node in an edge that corresponds to a tuple in ${\mathcal{O}}_{u}$, and vice versa. This means that for each t_{ i }∈ ${\mathcal{I}}_{u}$ there are ${\mathcal{O}}_{u}$ possible continuations, and for each t_{ j }∈ ${\mathcal{O}}_{u}$ there are ${\mathcal{I}}_{u}$ possible continuations. Our goal is to reduce these possibilities.
First, we will choose some ${{\mathcal{I}}^{\prime}}_{u}\subseteq {\mathcal{I}}_{u}$ to remove from ${\mathcal{I}}_{u}$. Next, for each t_{ i }∈ ${{\mathcal{I}}^{\prime}}_{u}$, we define a subset ${{\mathcal{O}}^{\prime}}_{u}\subseteq {\mathcal{O}}_{u}$. These are the nodes from ${\mathcal{O}}_{u}$ that we wish to remain connected to t_{ i }. We then can define ${{\mathcal{O}}^{\prime}}_{u}={\cup}_{i}{\mathcal{O}}_{u}^{i}$ as the set of edges to remove from ${\mathcal{O}}_{u}$.
When we remove graph edges corresponding to ${{\mathcal{I}}^{\prime}}_{u}$ and ${{\mathcal{O}}^{\prime}}_{u}$, we will replace them with the following edges. For each t_{ i }= ⟨u, v, d_{ u }, d_{ v }, ...⟩ ∈ ${{\mathcal{I}}^{\prime}}_{u}$ and t_{ j }= ⟨u, w, d_{ u }, d_{ w }, ...⟩ ∈ ${\mathcal{O}}_{u}^{i}$, construct new edge with tuples ⟨v, w, d_{ v }, d_{ w }, ...⟩ and ⟨w, v, d_{ w }, d_{ v }, ...⟩. We will also update the chain associated with these new edges to be the concatenation of the corresponding chains for the deleted edges. We call this sequence of operations a graph reduction centered on node u.
The actual choice of ${{\mathcal{I}}^{\prime}}_{u}$ and ${{\mathcal{O}}^{\prime}}_{u}$ result from the following rules:
Rule 1: Y to V reduction
Rule 2: Loop reduction
We show an example of this rule being applied in Fig. 3.b. A loop node is a node in which ${\mathcal{I}}_{u}$ = {⟨u, v, ◁, d_{ v }, ...⟩, ⟨<u, u, ◁, ▷, ...⟩} and ${\mathcal{O}}_{u}$ = {⟨u, w, ▷, d_{ w }, ...⟩, ⟨u, u, ▷, ◁, ...⟩. There exists exactly one valid traversal of the graph at a loop node u: enter u, take the loop, and then exit u. As in the previous rule, we remove all edges adjacent to u, but this time we replace these adjacencies with a single edge. As shown in Fig. 3.b, the resulting chain is the concatenation of three chains (labeled x, y, and z in the figure).
These two rules were also described by Medvedev et al. [11]. Their iterative application to the graph results in a graph that Medvedev termed the conflict graph, consisting entirely of nodes that fall under two classeseither ${\mathcal{A}}_{u}$ = 1 or ${\mathcal{I}}_{u}$ > 1 and ${\mathcal{O}}_{u}$ > 1.
Rule 3: Coverage matching
We show an example of this rule being applied in Fig. 3.c. We will make use of the special nature of transcriptome data to match incoming tuples with outgoing tuples. Consider an incoming tuple t_{ i }and outgoing tuple t_{ j }. If cov_{ i } cov_{ j } <T, where T is some threshold, then we term t_{ i }and t_{ j }compatible. If t_{ i }is only compatible with t_{ j }and t_{ j }is only compatible with t_{ i }, then we term them uniquely compatible. We now define ${{\mathcal{I}}^{\prime}}_{u}$ to be that set of all tuples t_{ i }in ${\mathcal{I}}_{u}$ that have a uniquely compatible tuple t_{ j }in ${\mathcal{O}}_{u}$ and define ${\mathcal{O}}_{u}^{i}$ = {t_{ j }}.
We have introduced this rule for the specific problem of transcriptome assembly. Through this rule we leverage the coverage information inherent in the graph to reduce the number of possible traversals of the graph.
Parallel graph reduction
We wish to perform the described graph reduction in parallel. In general, we will proceed in a series of iterations. In each iteration we will identify nodes that center reductions and carry out those reductions in parallel.
The first step is to find nodes that will center reductions. We can identify all nodes obeying one or more of our reduction rules in parallel because our rules require only local adjacency information, which is available on a single processor if we sort tuples by the first node ID. However, we cannot concurrently carry out reductions on all of these nodes, because if nodes u and v both center reductions, and u and v are adjacent in the graph, the operations they wish to perform will be incompatible. This is because node u might want to remove itself from the graph, while node v might wish to make a new edge with u as an endpoint.
 1.
Mark all nodes white.
 2.
For each node u identified as centering a reduction:
 (a)
Mark u black.
 (b)
Send messages to all nodes adjacent to u.
 (c)
For each black node v adjacent to u, if u.id > v.id, mark u white.
 1.
Delete(u,v): Deletes two tuples.
 2.
Insert(u, v, d_{ u }, d_{ v }, cov, ch_id, ch_dir): Creates two tuples for the new edge.
 3.
Update (ch_id_{ old }, ch_id, of f set, flip): Updates chain identified by ch_id_{ old }: sets the identifier to ch_id, adds of f set to the molecule positions, and possibly flips the orientation of the chain by reversing the order.
 4.
Duplicate (ch_id_{ old }, ch_id, of f set, flip): Copies the chain and then updates it.
 1.
Find all reduction nodes in the graph.
 2.
Find an independent set of such nodes using the heuristic described above.
 3.
For all nodes in the independent set, create messages for updating the graph, and distribute these messages using a many to many communication.
 4.
Process in parallel the graph manipulation messages. This can be done using a single scan of the distributed tuple array.
 5.
Process in parallel the chain manipulation messages. This can be done using two scans of distributed tuple array.
 6.
Resort the graph and chain tuples to maintain sorted order.
 7.
If some reduction in the graph has occurred, continue with Step 1.
Runtime analysis
Steps 1, 2, 3, and 4 take O ($\frac{n}{p}$) local computation, where n is the number of nodes in the graph, and a constant number of communication rounds. Steps 5 and 6 take O ($\frac{g}{p}$) local computation and a constant number of communication rounds with O ($\frac{g}{p}$) communication volume, where g is the size of genome. Because in practice the size the graph is much less than the size of the genome the running time of each iteration is O ($\frac{g}{p}$), the communication volume is O ($\frac{g}{p}$), and the number of communication rounds is O(1).
Because the time taken for Step 6 dominates the runtime and is independent of the number of chains being processed, we see benefit in trying to limit the number of iterations. Still, we use a heuristic rule to find an independent set of reduction nodes that works well in practice, and empirically we observe the number of iterations to be on the order of log(n). More importantly, the resulting program was able to process large inputs in a matter of seconds using this rule. Whether using the parallel randomized algorithm [18] to find a maximal independent set significantly reduces the number of iterations and improves the runtime is an open question.
Writing the contigs
Once we have constructed the graph, compacted the chains, and finished graph reduction, we can output the contigs by traversing the final chains. The starting point for traversal will dictate which of the two strands of DNA will be written. From each chain in the graph, we can output a strand of DNA with (l + k  1) nucleotides, where l is the length of the chain (See Fig. 1). This is because the strand of DNA read when traversing one strand is offset (k1) positions from the strand read from reading in the other direction. This means that after reading l nucleotides from the chain in the one direction as s, and reading (k  1) nucleotides in the opposite direction as e, the full sequence read can be written as se', where e' is the complementary strand of e.
Results and Discussion
Synthetic data
The Q values are integers in the range [40, 40], with Q = 40 ↔ p = 0, Q = 0 ↔ p = .5 and Q = 40 ↔ p = 1. To measure the goodness of a base call, we look at the difference between the highest Q value and the second highest Q value. We want this difference to be significant to consider the call to be valid. For our analysis we chose to consider a difference greater than 10 between the maximum Q value and second highest Q value to be significant. This corresponds to an underlying probability difference of between .4 and .5.
To adequately generate synthetic data, we are interested in three questions about the Illumina sequence quality: 1) What is the probability that the base call is bad at a particular position (between 1 and 36)? 2) What is the probability that a base call is bad at a particular position, given no bad base calls in a previous position? 3) What is the probability that a base call is bad at a particular position, given some bad base call in a previous position?
We generated synthetic data from the genic regions of maize, predicted using FGENESH v.2.6 (using the monocots matrix) on the previously assembled maize genomic islands [1]. We used 61,428 gene structures to generate simulated high coverage transcriptome data. Each gene was sampled at a random coverage between 50× and 1000× using read lengths of 30 to 50 base pairs, resulting in a data set of 925 million reads and 40 billion bases. As discussed in the results section, we assume an adequate preprocessing of the sequences will remove nearly all errors.
Performance results
Performance results. Runtime in seconds for the transcriptome data set with approximately 40 billion bases. p indicates the number of processors. The last column is the total runtime of all phases, not including file input.
P  Read Data  Construct Graph  Compact Graph  Reduce Graph  Total 

64  516.47  73.06  81.17  256.8  411.03 
128  364.20  40.70  43.17  107.68  191.55 
256  189.94  22.63  24.17  59.27  106.07 
512  195.04  13.37  15.42  33.23  62.02 
1024  168.26  8.08  11.64  20.13  39.85 
As can be seen in the table, stages that are not I/O bound achieved a respectable 6:63X speedup when increasing the number of processors from 64 to 512. The reduction in incremental performance towards higher values of p is a natural reflection of the problem size becoming smaller per processor. The poor I/O performance is due to the lack of a parallel I/O interconnect on the system tested. As the number of processors increases, the serial interconnect becomes saturated as more processors concurrently read from disk. Disregarding I/O, the assembly of 40 billion bases finished in about 40 seconds using 1024 nodes. Even including serial I/O, the assembly ran in a few minutes.
Validation and analysis
Effect of k on graph size. Effect of varying k on graph size.
K  Unique kmers  Num Edges  Compacted Edges  Reduced Edges 

20  20,537,274  20,658,206  451,718  338,121 
25  20,717,553  20,741,818  205,858  149,018 
30  20,758,869  20,764,256  154,965  114,028 
For k = 30 there were approximately two contigs per reference gene. For validation, we used the BLAST tool to align the assembled contigs to the reference. We postprocessed the BLAST results to verify that each contig fully aligned to some predicted gene in the reference. Our analysis showed that 92% of the contigs correctly aligned back to the reference. The remaining contigs are mostly the result of overcollapsing edges during graph manipulation. Improving this result is an area of ongoing research.
We also measured how well contigs of length 500 or greater covered the reference sequence. This measure is similar to the n 50 measure usually used for assessing the quality of a genome assembly, however in our case only a subset of the reference genes will have lengths greater than n. We found that approximately 38% of the applicable reference was covered by contigs with length greater than 500. The maximum length contig was 4017. The maximum length contig in the reference was 5704.
Conclusion
We presented a parallel method for the assembly of unpaired short reads, using a distributed bidirected string graph. In doing so, we address the challenge of effectively manipulating large distributed graphs on parallel computers. We also present a method for making use of variable coverage to resolve conflicts that arise due to repeats. We produce a de novo assembly of the Zea mays transcriptome, using synthetically generated sequences derived from it. Our method is very fast, producing an assembly of 925 million reads (40 billion nucleotides) in a few minutes. Our final assembly consists of an average of two contigs per predicted gene for this complex plant genome. De novo assembly of a genome using short reads will almost certainly require the integration of clone pairs into the proposed method. We are currently working on developing a parallel method for de novo genome assembly incorporating clone pair information.
Declarations
Acknowledgements
We thank Chad Brewbaker, Scott Emrich, Xiao Yang, and Jaroslaw Zola for their input and feedback. This project was supported in part by the National Science Foundation under CNS0521568, DBI0527192, and CCF0431140, and by the Plant Sciences Institute Innovative Research Grants program. This article was invited to be published as part of the supplemental issue of the 2009 Asia Pacific Bioinformatics Conference.
This article has been published as part of BMC Bioinformatics Volume 10 Supplement 1, 2009: Proceedings of The Seventh Asia Pacific Bioinformatics Conference (APBC) 2009. The full contents of the supplement are available online at http://www.biomedcentral.com/14712105/10?issue=S1
Authors’ Affiliations
References
 Emrich S, Aluru S, Fu Y, Wen T, Narayanan M, Guo L, Ashlock D, Schnable P: A Strategy for Assembling the Maize (Zea mays L.) Genome. Bioinformatics 2004, 20: 140–147.View ArticlePubMedGoogle Scholar
 Pevzner P, Tang H, Waterman M: Fragment assembly with doublebarreled data. Proceedings of the National Academy of Sciences 2001, 98(17):9748–9753.View ArticleGoogle Scholar
 Myers E: The fragment assembly string graph. Bioinformatics 2005, 21: ii79ii85.PubMedGoogle Scholar
 Medvedev P, Brudno M: Ab Initio Whole Genome Shotgun Assembly with Mated Short Reads. Lecture Notes in Computer Science 2008, 4955: 50–64.View ArticleGoogle Scholar
 Hernandez D, Francois P, Farinelli L, Osteras M, Schrenzel J: De novo bacterial genome sequencing: Millions of very short reads assembled on a desktop computer. Genome Research 2008, 18: 802–809.PubMed CentralView ArticlePubMedGoogle Scholar
 Zerbino D, Birney E: Velvet: Algorithms for De Novo Short Read Assembly Using De Bruijn Graphs. Genome Research 2008.Google Scholar
 Warren R, Sutton G, Jones S, Holt R: Assembling millions of short DNA sequences using SSAKE. Bioinformatics 2007, 23: 500–501.View ArticlePubMedGoogle Scholar
 Dohm J, Lottaz C, Borodina T, Himmelbauer H: SHARCGS, a fast and highly accurate shortread assembly algorithm for de novo genomic sequencing. Genome Research 1997, 17: 1697–1706.View ArticleGoogle Scholar
 Butler J, MacCallum I, Kleber M, Shlyakhter I, Belmonte M, Lander E, Nusbaum C, Jaffe D: ALLPATHS: De novo assembly of wholegenome shotgun microreads. Genome Research 2008, 18: 810–820.PubMed CentralView ArticlePubMedGoogle Scholar
 Sundquist A, Ronaghi M, Tang H, Pevzner P, Batzoglou S: WholeGenome Sequencing and Assembly with HighThroughput, Short Read Technologies. PLoS ONE 2007, 2: e484.PubMed CentralView ArticlePubMedGoogle Scholar
 Medvedev P, Georgiou K, Myers G, Brudno M: Computability of Models for Sequence Assembly. Lecture Notes in Computer Science 2007, 4645: 289–301.View ArticleGoogle Scholar
 Shankar R, Ranka S: Random Data Accesses on a CoarseGrained Parallel Machine. II. OnetoMany and ManytoOne Mappings. Journal of Parallel and Distributed Computing 1997, 44: 24–34.View ArticleGoogle Scholar
 Helman D, Ja'Ja' J, Bader D: A new deterministic parallel sorting algorithm with an experimental evaluation. Journal of Experimental Algorithms 1998, 3: 4.View ArticleGoogle Scholar
 Jackson B, Aluru S: Parallel Construction of Bidirected String Graphs for Genome Assembly. Proceedings of the International Conference on Parallel Processsing 2008, 346–353.Google Scholar
 Sibeyn J, Guillaume F, Seidel T: Practical Parallel List Ranking. Journal of Parallel and Distributed Computing 1999, 56: 156–180.View ArticleGoogle Scholar
 Dehne FKHA, Song SW: Randomized Parallel List Ranking for Distributed Memory Multiprocessors. Asian Computing Science Conference 1996, 1–10.Google Scholar
 Karp R: Reducibility Among Combinatorial Problems. In Complexity and Computer Computations Edited by: Miller R, Thatcher J. 1972, 85–103.View ArticleGoogle Scholar
 Motwani R, Raghavan P: Randomized Algorithms. New York, NY, USA: Cambridge Press; 1995.View ArticleGoogle Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.