Skip to main content
  • Methodology Article
  • Open access
  • Published:

Swellix: a computational tool to explore RNA conformational space

Abstract

Background

The sequence of nucleotides in an RNA determines the possible base pairs for an RNA fold and thus also determines the overall shape and function of an RNA. The Swellix program presented here combines a helix abstraction with a combinatorial approach to the RNA folding problem in order to compute all possible non-pseudoknotted RNA structures for RNA sequences. The Swellix program builds on the Crumple program and can include experimental constraints on global RNA structures such as the minimum number and lengths of helices from crystallography, cryoelectron microscopy, or in vivo crosslinking and chemical probing methods.

Results

The conceptual advance in Swellix is to count helices and generate all possible combinations of helices rather than counting and combining base pairs. Swellix bundles similar helices and includes improvements in memory use and efficient parallelization. Biological applications of Swellix are demonstrated by computing the reduction in conformational space and entropy due to naturally modified nucleotides in tRNA sequences and by motif searches in Human Endogenous Retroviral (HERV) RNA sequences. The Swellix motif search reveals occurrences of protein and drug binding motifs in the HERV RNA ensemble that do not occur in minimum free energy or centroid predicted structures.

Conclusions

Swellix presents significant improvements over Crumple in terms of efficiency and memory use. The efficient parallelization of Swellix enables the computation of sequences as long as 418 nucleotides with sufficient experimental constraints. Thus, Swellix provides a practical alternative to free energy minimization tools when multiple structures, kinetically determined structures, or complex RNA-RNA and RNA-protein interactions are present in an RNA folding problem.

Background

Approximately 80% of the human genome is transcribed into an RNA sequence, although only 2% of the genome codes for proteins [1]. This discovery reveals the abundance of noncoding RNA with as yet undetermined function. The flood of RNA sequence information from next generation high-throughput sequencing technology and the explosion of discoveries for non-coding RNA create an enormous need for RNA structure prediction tools. RNA structure prediction methods facilitate interpretation of sequence data to inform biological structure and generate testable hypotheses for function. RNA structure prediction tools form a key component in many genome-wide RNA analysis pipelines [2,3,4,5]. Many of these new RNA discoveries reveal RNA sequences with multiple functional folds or partially unfolded RNA [2, 4, 6, 7]. For example, one study estimates that 20% of RNA in human cells have multiple folds based on the existence of conflicting pairing constraints measured by in vivo crosslinking [2]. Thus, there is a need for tools that efficiently and thoroughly explore the conformational landscape of an RNA sequence. This paper presents a new computational method, Swellix, that computes efficiently all possible non-pseudoknotted structures for an RNA sequence by counting helices rather than base pairs. Swellix also counts RNA motif frequency, and thus provides insight into possible functional interactions that may not be present in low-energy structure predictions.

The RNA folding problem is defined by base pairing rules for Watson-Crick and GU pairs. An RNA secondary structure consists of a set of base pairs, noncanonical pairs, and non-paired nucleotides (Fig. 1). A minimum number of 3 nucleotides is required for an RNA to fold back on itself and form a new helix. Each nucleotide may pair only once, and the pairs are nested, ie pseudoknots that cross previous pairs are not directly allowed. Thus, the RNA folding problem can be viewed as a maximum pair matching problem with complexity of O(N3), where N is the number of nucleotides. The number of possible structures is approximately 1.8N [8]. The Nussinov algorithm approaches the RNA folding problem by finding the maximum scoring structure, or set of base paired nucleotides [9, 10]. The most common scoring function is based on thermodynamic parameters [11, 12] and free energy minimization [13]. The thermodynamic database is continually being updated and expanded [11, 12, 14]. The free energy minimization approach assumes that the lowest free energy structure is the most likely functional fold for the RNA sequence. This assumption, however, does not account for co-transcriptional RNA folding, kinetically determined RNA folds, potential RNA tertiary structure interactions, or RNA-protein interactions. Sampling suboptimal folds [15], computing base pair probabilities [16], and computing centroid structures [17] provides a broader view of the RNA conformational landscape than a single minimum free energy (MFE) structure but continue to use a thermodynamic-based scoring function. Additional experimental constraints can be combined with free-energy minimization in order to better predict functional RNA folds [12]. Recent advances focus on predicting RNA structures with 2 or 3 functional folds, but still rely on thermodynamic scoring functions [7].

Fig. 1
figure 1

RNA Folding Problem. The sequence is the ordered list of A, C, G, and U nucleotides. The secondary structure is the set of Watson-Crick CG and AU base pairs. GU pairs may also be included. The RNA folding problem consists of how to best predict secondary structure (and ultimately three-dimensional structure and function) from sequence. For example, the sequence of a 14mer RNA oligonucleotide can fold into 119 secondary structures [21]. Two different hairpin secondary structures are shown graphically and in dot-parentheses notation. In dot-parentheses notation, dots represent unpaired nucleotides, and parentheses represent paired nucleotides. In the graph, unpaired nucleotides are red and paired nucleotides are blue. Vertical gray lines connect nucleotides in sequence and horizontal gray lines connect nucleotides in base pairs

The first approach to complete enumeration of RNA structures after the discovery of tRNA crystal structures took more than 3 days and led to the general misconception that it is not possible or practical to completely enumerate all the possible RNA secondary structures [18]. Utilizing free energy constraints to reduce the conformational space, the Wuchty algorithm computes a complete set of structures within a given energy window of the MFE structure [19, 20]. The Crumple algorithm used a different approach and modern supercomputing resources to compute all possible structures and then apply filters based on experimental data [21, 22]. Thermodynamic stability may be one criterion in the scoring function, but is not necessarily part of the scoring function. Crumple can include data from pairing constraints in phylogenetic analysis, SELEX experiments, or chemical and enzymatic probing experiments, as well as thermodynamic parameters. Crumple and the Sliding Windows and Assembly application of Crumple can incorporate constraints on the minimum number and length of helices from crystallography or cryoelectron microscopy data. Pairing constraints are the most powerful for reducing conformational space [21]. Crumple and even efficient parallelization of Crumple were limited by sequence length and long run times, however. The new Swellix program builds on the Crumple algorithm and is now able to compute all possible non-pseudoknotted structures for RNA sequences up to 418 nucleotides with sufficient helix constraints within 2 days with an XE6 node of the Blue Waters supercomputer, thus making many functional noncoding RNAs accessible to thorough analysis of conformational space. For example, the average length is 435 nucleotides for the 5,391,569 RNA sequences in the RFam database 12.1 [23].

The main conceptual advance in Swellix is to combine all possible helices rather than combine all possible base pairs in the generation of RNA structures. This helix abstraction is further developed by bundling together similar helices that exist in the same region of RNA sequence. The use of abstract representations for RNA helices has previously been applied to free energy minimization approaches [24], but has not been applied previously to complete enumeration methods. In addition, improvements in memory use, computational efficiency, and effective parallelization strategies at several points in the algorithm further enable the Swellix algorithm to generate all possible non-pseudknotted folds for an RNA sequence and provide a count of functional RNA motif occurrence. This approach provides an alternative to standard RNA structure prediction methods when the assumptions of a free energy minimization approach may not hold true.

Methods

Swellix program

Swellix builds on the Crumple software [21, 25, 26]. Crumple focuses on individual base pairs and possible combinations thereof. Swellix considers helices as discrete components instead of base pairs. The Swellix algorithm is iteratively recursive and based on the core Crumple algorithm. However, there are multiple mechanisms that Swellix uses which differentiate the two algorithms. Swellix can be deconstructed into five major pieces (Fig. 2):

  1. 1.

    Constructing the Pair Table

  2. 2.

    Constructing the Component List

  3. 3.

    Constructing the Interval Look-up Table

  4. 4.

    Constructing the Bundle List

  5. 5.

    Iteratively Recursive Combinatorics (Make Jump Tree)

    Fig. 2
    figure 2

    Flowchart of Swellix RNA Folding Program. The steps of the swellix program are shown in a flowchart. The bundling and make jump tree recursion were parallelized to improve run times

Parts one through four serve solely to speed up the recursive step. These are tables constructed to reduce the number of operations needed when checking if a valid helix exists within an interval. The bundling step serves to group similar structures together and reduce the size of the linked list that is sent to the recursive step. The iteratively recursive combinatorics step in Swellix is based on the algorithm in Crumple and has improvements in memory use and parallelization.

Constructing pair table

The input is an RNA sequence, or a string of A, C, G, and U that represent the 4 nucleotides in RNA. All pair-wise matching results of the entire RNA string are tabulated on a look-up table to speed up the extremely repetitive comparison procedure. The pairing rules are based on Watson-Crick (A-U and C-G) and wobble (G-U) base-pairing criteria. The data structure is a 2D integer array, where only the upper triangle region is used. The pseudo code is provided in supporting materials with time complexity O(n2), where n is the RNA sequence length.

Make component list

This phase features one of the key distinctions from the Crumple algorithm. Instead of iterating through the O(n2) process to identify the identical helices inside slightly different intervals I’s, in this phase, Swellix explores all qualified helices that will possibly be used in the entire runtime and documents them in an array of linked lists. Each array index i represents the nucleotide at the i th position of the input RNA sequence. Each node in the linked list extending from array cell i represents one component (ie, a helix) that begins at the i th nucleotide. In other words, the 5′-end outermost nucleotide of a helix is labeled the “type” of that component. Continuing with that terminology, the i th array cell represents the component type i, and all nodes of the linked list from the i th array cell share the same type (starting nucleotide).

The pseudo code is shown in the supporting materials, with the time complexity of O(Ln2) for n > > L, where L is the prescribed minimum helix length based on the experimental constraints. There are two points to making the component list. First, k_1 and k_2 indices, iterating through the entire RNA sequence, mark the boundary of a candidate helix. i, j are the helix pair indices making the k_3 stepwise matching checks starting from k_1 and k_2, respectively. Second, at the conditional statement ‘if(i, j) can be paired’, the pair table is called. The runtime saving for each if statement implementation is small, but the collective benefit is substantial.

Make interval look-up table

In the array of the component list, not all array cells (component types) have corresponding components, ie., some cells are empty. For some long RNA sequences with many experimental constraints, most of the array cells will be empty. To facilitate the Make Jump Tree process, it is worthwhile to tabulate the bounds for each interval so that the scanning process inside each interval may skip the empty array cells. The pseudo code is listed in supplemental material with the time complexity of O(mn2), where m is the number of components in the component list. The runtime saving of each empty-cell skip is tiny, but the collective benefit is substantial.

Make bundle list

In order to reduce the input for the Make Jump Tree phase and to facilitate identification of distinctly different structures in the output, a bundle of similar helices can be grouped together in one single representative structure. For example, if the following three substructures occurred in a span of 15 nucleotides,. ((((…..)))).,. ((.((….))))., and. ((..((…))))., then only one helix would be selected as the representative helix for the bundle, in this case. ((((……))))., the helix with the most stacked pairs. The Make Jump Tree phase is the most computation-intensive part of the entire program, which inherits the core spirit of the Crumple algorithm. It demands time for recursion implementations and disk space to store the solution structures. Thus, any reduction in the input for the Make Jump Tree phase will reduce computational time.

The bundling step bypasses all recursion branches which are guaranteed to resemble the representative structure and therefore saves significant time and space. For two helices to be regarded as similar, we proposed this criterion: the distance from 5′ end to 3′ end must not exceed the length of 4 L + 2 hp – 1, where L is the minimum helix length and hp. is the minimum hairpin loop length, both of which are determined by experimental considerations. There are two reasons for defining similar helices in this manner:

a) From a computational perspective, 4 L + 2 hp. is the minimum length to fit in two adjacent helices. Performing similar helices reduction for 4 L + 2 hp. size or larger allows the possibility of treating two adjacent helices “similar” with one helix inside the same interval, which is apparently incorrect. The 4 L +2 hp. −1 limit does not allow formation of a multibranch loop in the interval.

b) The wider the span of the interval, the less similar the largest and smallest helices within the inside the same interval will be. Therefore, there must be a fine line somewhere as the cutoff.

For a given interval of size 4 L + 2 hp. – 1 or less, all helices which fit in that sequence space are called similar and are grouped in the same bundle. All helices of the same bundle can be replaced by a representative helix. This representative is selected from the bundle, based on first the helix span and secondly on the degree of saturation, ie the representative helix has the most possible base pairs.

Through this reduction, the total number of solution structures will be greatly reduced and therefore more manageable and analyzable. In addition, a reference list will be provided to contain all possible alternative helices of the same bundle. Note that it is possible for a small size helix to belong to more than one bundle, since bundles can overlap each other, and therefore it is possible that the overlap length is large enough to fit in a small helix. The bundle list implementation is optional. Its pseudo code is included in supporting materials and shows a time complexity of O(m2) where m is the number of components.

Make jump tree

This phase is the most resource-intensive part of the entire program. All the previous steps have been optimized to improve the efficiency of Make Jump Tree. The core implementation of Make Jump Tree inherits the spirit of the Crumple algorithm. Therefore, it has exponential time complexity. Fortunately, with the effective incorporation of experimental constraints, the exponential coefficient can be scaled down and allow computations on longer RNA sequences.

In the beginning of the function, the interval is examined (Refer to the pseudocode in supporting information). If there is no interval on queue and if it is at the root of recursion (recursion level 0), the entire RNA sequence length is regarded as the interval. For a given interval, components from the component list will be checked one at a time to fit into the interval. If it fits, this component will be inserted into the current structure either as a new helix or to replace a certain old helix. Two new intervals will also be made inside and behind the new helix. The bound of the new inside interval is the inner edges of the new helix. The boundary of the new behind interval is the 3′ end outer edge of the new helix and the 3′ end inner edge of the helix containing the new helix. Then the make_recursion function call is made, and another recursion round begins.

The theoretical time complexity is O(nm) for the worst case where n is the length of the sequence and m is the number of components or bundles. In practice, most of the RNA sequences are rather well-randomized, and therefore the average time complexity is close to O(asqrt(m)), where 1 < a < 3, depending on the experimental constraints and m is the number of components.

The supporting functions that ensure completeness and no duplication of structures add complexity to the code. The descriptions of Restore_Interval and Duplication Prevention, which are part of the Make Jump Tree step, are described next.

Restore interval

For most of the time, whenever an interval is examined, it should be discarded to prevent duplication. However, in some cases, the behind intervals should be conditionally kept after examination and reused later. Fig. 3 illustrates its importance. Solution structures a~f are all correct and necessary, but without the restore interval mechanism, solution structures e. and f. will be missing, because the behind interval (B section) will be examined only once and then discarded.

Fig. 3
figure 3

Restore Interval. All secondary structures a-f are valid when single base pairs are allowed. Structures e and f are examples when the behind interval (B) should be conditionally retained. For example, if the B interval was not conditionally retained after evaluating structure b, then structure e would not be generated

Duplication prevention

The duplication prevention step includes the 2 L – 1 & qLr rules, where L is the minimum length of helix, q is the quotient, and r is the remainder. The first rule states that for a given minimum length of helix, in the case where the minimum helix size and larger are generated, the upper limit of expansion is 2 L-1 in order to prevent duplication because any component of the length 2 L can be replaced by two helices of length L. The second rule is the variant of the general linear equation a = q*d + r, where a, q, d and r are all natural numbers; a is any random number; d is divider; q is quotient; and r is remainder. The qLr rule states that for a helix of any length, a, there must be a way to build it with the helix length of L, L + 1, L + 2... 2 L-2, 2 L-1 (note the 2 L-1 rule limit) without duplication or deletion of structures in the output. So the expression is a = q * L + k, or more precisely, a = (q – 1) * L + (L + k), where k is 0, 1, 2, …, L-1 (note k is remainder).

Note that in Swellix, helix length constraints like a minimum helix length of 2, which effectively eliminates any single, isolated, unstacked pairs, will produce a smaller output set than an algorithm such as Crumple. For Swellix, these length constraints are enforced in the first step when it is analyzing the sequence for possible components, ie individual helices. With Crumple, however, these length constraints will not be enforced until a full possible structure has been assembled with base pairs. At this point, the program looks for violations. For example, if a minimum helix length of 2 is applied, the output of Crumple and Swellix may differ as shown in Fig. 4. With Swellix, helices A and B in the first structure never make it past the initial step by being added to the set of components for consideration because they are not at least 2 base pairs long. Thus, Swellix efficiently eliminates single, isolated, unstacked pairs that do not occur in natural RNA structures. In addition, this adds to the reduction of the size of the component set that will be considered combinatorically.

Fig. 4
figure 4

Acceptable Base Pairs in Crumple and Swellix. The top structure highlights an example when Swellix would not allow a structure if a minimum helix length of two is a constraint. This constraint effectively removes single, isolated, unstacked pairs, also known as “lonely pairs”

Parallelization

Bundling and the recursive “jump tree” algorithm do not scale well with input size. The bundling process has the effect of, given an n-nucleotide sequence, processing n-many subsequences before beginning the standard recursion. This negative performance impact is magnified by factors such as sequence length and runtime options like minimum helix length constraints. Bundling was identified as a parallelization candidate due to the data-independence of those n-many subsequences to be processed. Bundling and the recursive jump tree are similar in that they both have high potential for parallelization. They are unique in the type of parallelization necessary for efficient scaling.

The nature of the bundling algorithm can be abstracted as such: for n nucleotides in a sequence, there will be n units of work in the bundling step. Each unit of work consists of running a slightly modified version of Crumple on some substring of the RNA input sequence. The results from these computations are consolidated and used to improve the speed of Swellix’s recursion. For each of these substrings from the input sequence, only the data in one substring is required for its respective computation. Since each “unit” of work is completely separate from the others, we chose to parallelize the bundling stage by dividing the “units” equally among our pool of MPI (Message Passing Interface) processing elements. The end result is akin to an OpenMP parallel for loop: each MPI core uses its own rank, the world size, and the length of the RNA sequence to calculate at what index to start, and how many iterations of the loop to process.

For Make Jump Tree, parallelization is more complex. The same strategy used for bundling could be used here, but the recursion is much more imbalanced than bundling. In an effort to achieve the most balanced compute load as possible, we chose to implement a dynamic load balancing algorithm for the recursive parallelization. This parallelization relies on each node having a copy of the component list. Then each node creates an array of pointers to each component for rapid access instead of iterating through a linked list.

Phase 1 of the parallelization strategy can be described as a coarse master/worker paradigm. The master node begins a loop from 0 to n (n = # components) in which it probes the MPI network for work requests from idle nodes. When it detects such a request, the master sends its current loop index to the node, indicating which index in the component array the worker node should use for a new recursion. Immediately after the master sends the n th index, it sends another message to all nodes in the MPI pool indicating that Phase 1 is complete. During phase 1, the worker nodes begin their procedure by sending a work request message to the master node. Then, they pause execution to wait for some response. If they receive a response with an array index, then the worker accesses the component array at that index and begins a recursion using the same function call that serial Swellix uses normally. Once a recursion is complete, the worker again requests work and waits for a response. Upon receipt of the phase 1 completion message, a worker node simply continues to the data consolidation stage where it will send the information it generated back to the master node for display.

During phase 2, a version of Dijkstra’s token rings that were applied to parallelization of the Crumple algorithm were used again [21, 27, 28]. If a node is busy in its recursion tree, then it regularly probes for a “work requested” message. If the node detects a work request message, then it breaks off a branch of its tree and sends the information required to continue down that branch over to the node who requested work. If a node detects a request for work and isn’t ready to send work, the node should pass the message around the “ring” of processors. After the detection that all nodes are finished, a kill signal is passed around indicating that the processor nodes can finish the recursive portion and display the results.

Computational resources

Early- to mid-stage development was done on University of Oklahoma resources including both the Boomer and Schooner Linux cluster supercomputers. For the Boomer computations, the compute nodes used contained the following hardware: 2 Intel Xeon E5–2650 “Sandy Bridge” 8-core 2.0 GHz processors with 32 GB of RAM. The compute nodes that we used on Schooner have the following specifications: 2 Intel Xeon E5–2650v3 “Haswell” 10-core 2.3 GHz processors with 32 GB of RAM.

Late-stage development took place almost exclusively on the Blue Waters supercomputer through the Blue Waters Project and Shodor Education Foundation’s Blue Waters Student Internship Program. The typical compute node used on Blue Waters was the XE6 node: 2 AMD 6276 Interlagos 16-core (“integer” core) 2.45 GHz processors with 64 GB of RAM.

Results and discussion

Swellix performance

Swellix enables longer RNA sequences to be computed and analyzed. Swellix with a minimum helix length of one is nearly identical to Crumple. The performance analysis in Fig. 5 shows a comparison between Swellix with minimum helix length of 2 and Crumple with “no lonely pairs”, ie no isolated, single, unstacked pairs. The test consists of 10 trials, each with 50 unique, randomly generated sequences of length 1–50. Each sequence in a trial was 1 nucleotide longer than the previous. This produced a total of 10 data points for each sequence length 1–50, and these data points were averaged for a resulting value of runtime versus sequence length. With out bundling, Swellix performs nearly the same as Crumple from 1 to 35 nucleotides. At this point, Swellix and its additional computational procedures and improvements in efficient memory use greatly speed up runtime while Crumple begins to slow down with apparently exponential trend. The completeness and accuracy of Swellix was checked by comparing the Swellix output for minimum helix length of 1 with Crumple output. Table 1 provides additional benchmarks for run times for biological sequences of different lengths using the Swellix program on the Schooner computer. As observed in the column of run times without bundling in Table 1, Swellix runtimes with a minimum helix length of 2 do not begin to grow exponentially in run time until approximately 70 nucleotides.

Table 1 Swellix Run Times for RNA Sequences
Fig. 5
figure 5

Comparison of Crumple and Swellix Times for RNA of Different Sequence Lengths. The graph of run-time versus sequence length shows how the run time for Crumple grows exponentially after 35 nucleotides. Crumple is run with no lonely pairs (blue diamonds) and Swellix is run with a minimum helix length of two (red squares). Each run time is the average of 10 repetitions of the calculation

The abstract helix representation in bundling further improves the ability of Swellix to compute longer sequences in a reasonable time. In order to test whether bundling of similar helices was the prime contributing factor to Swellix’s performance compared to Crumple, sequences of increasing lengths were used: 14, 28, 42, 50, 71, 74, and finally 76 nucleotides. The first three sequences are artificial sequences used for general testing and development. The “14-mer” is 5’GCUCUAAAAGAGAG3’ and was designed to produce a set of structures that contain an example of each possible kind of soft constraint for DMS-modified adenines. The 28- and 42-mer are 2 and 3 concatamers of the 14-mer sequence. The longest sequence is a tRNA sequence, yeast phenylalanine tRNA (crystal structure PDB #1EHZ). As shown in Table 1, the Bundling feature reduces the size of the input which gets passed to the recursive portion of Swellix. Note that the bundled structures can be “unbundled” and thus this computational improvement doesn’t come at the cost of solution completeness. This input size reduction inherently also reduces output size, and it follows that the runtime would also be decreased.

As a computational exercise several tRNA, pRNA, and group I intron sequences were folded on the Blue Waters computer using the parallelized bundling option. The minimum helix length was varied from 2 to 10. Table 2 shows the results of this exercise for the tRNA 1EHZ sequence. This exercise revealed a “sweet spot” in the bundling computations. For very short sequences, the bundling computation added time. For very long minimum helix lengths, the length of the sequence to be analyzed according to the 4 L + 2 hp – 1 rule and the computations to create the bundles add increasing amounts of time. The best balance for the benefits of bundling occur with a minimum helix length of 4 or 5. Table 3 shows the results of folding sequences up to 247 nucleotides with a minimum helix length of 5. The fast run times for longer sequences demonstrate that complete enumeration is possible given sufficient experimental constraints. Table 4 shows the parallelization of tRNA and three HERV RNA sequences up to 418 nucleotides with minimum helix lengths ranging from 2 to 6 on the Blue Waters computer. A comparison of the serial and parallel run times provides an estimate of the parallelization efficiency, which has complex dependencies on sequence length, number of bundled components, and minimum helix length. The highest ratios of sequential to parallel run times occur in cases with a large number of bundled components and a short minimum helix length. Although a minimum helix length of 2 is practical and reasonable assumption for biological sequences without further experimental data, additional experimental constraints can be generated from in vivo chemical probing of paired nucleotides, ie the PARIS (psoralen analysis of RNA interactions and structures) method [2], or cryoelectron microscopy [26, 29]. Both the PARIS method and cryoelectron microscopy are revealing an increasing number of RNA with multiple conformations and multiple folds. Thus, Swellix will be a complementary tool to analyze RNA sequences with multiple folds .

Table 2 Effect of Helix Constraints on Bundling of a 76-mer tRNA
Table 3 Swellix Computations of Longer RNA Sequences
Table 4 Comparison of Serial and Parallel Runtimes for Longer RNA Sequences

Swellix analysis of the effects of naturally chemically modified nucleotides in tRNA

One of the roles of modified nucleotides in tRNA is to reduce conformational space and prevent misfolding [30]. Swellix was used to quantify the reduction in conformational space for individual modifications and the collective effect of modifications in 17 tRNA sequences. 17 sequences (Additional file 1: Table S1) were selected from the tRNA database [31]. Each sequence contains 76 nucleotides and varying numbers of total modified nucleotides that interfere with Watson-Crick base pairing. For example, given a sequence with a total of 9 chemically modified nucleotides that prevented Watson-Crick base pairing, 10 variants of the sequence were created. The first variant would instruct Swellix to fold the sequence without constraints as if there were no modified nucleotides. The next would enforce the first modified nucleotide not to pair, and so on until the final variant enforced constraints on all the chemically modified nucleotides. The order of constraint enforcement depended on the distance from the 5′ end. The first modification to be enforced was the 5′-most modification and the last was the one closest to the 3′ end. With these variants created, we ran them all in serial Swellix with bundling on and with a minimum helix length of 2 on the Boomer computer. The longest computation took ~11.12 h, with the average runtime being ~1.18 h. In parallelized Swellix, tRNA computations run in less than a minute on the Blue Waters computer (Tables 3 and 4).

Fig. 6 demonstrates the relationship between reductions in output size versus the number of enforced constraints for naturally chemically modified nucleotides. Notably, the trend isn’t linear. Subsequent enforced modifications don’t necessarily cause the same amount of folding reduction as their predecessors. Overall, the most significant reduction in number of possible folds occurs with the first constraint for modified nucleotides. The quantification of the reduction in the number of possible folds enables an estimate of the entropic benefits of naturally chemically modified nucleotides. The estimate of the entropic benefit can be calculated using the Second Law of Thermodynamics (Eq. 1)

$$ \mathrm{S}=\mathrm{k}\ \ln\ \mathrm{W} $$

where S is entropy, k is Boltzman’s constant, and W is the number of possible RNA folds. Thus, comparing the number of possible tRNA folds for 16 unmodified sequences versus the fully modified sequences, the average entropic difference in the tRNA folding reaction is −3.9 ± 0.4 J/molK per modified nucleotide. The average entropy reduction for the first modified nucleotide is −4.9 ± 1.9 J/molK. The maximum entropic benefit for the most modified sequence, a tryptophan tRNA from Triticum aestivum, is −73.2 J/molK. Thus, our computations confirm and quantify one role for naturally modified nucleotides in reducing conformational space for RNA folding.

Fig. 6
figure 6

Effect of tRNA Modifications on Conformational Space. This graph shows the percentage reduction in the number of conformations as a function of the number of constraints applied to naturally chemically modified nucleotides for 17 tRNA sequences. The percentage reduction in folding space is calculated from the total number of possible structures computed for the sequence with and without constraining naturally chemically modified nucleotides to be single stranded. All tRNA sequences were computed with bundling and a minimum helix length of 2 on the Boomer computer

The above example illustrates how chemical modifications in natural RNA limit folding space. One further application of the Swellix program in the field of synthetic biology would be to estimate the optimal location in a sequence to restrict folding with a nucleotide unable to pair. When designing RNA sequences, incorporation of chemically modified nucleotides are one method to direct folding and restrict folding space in particular ways or regions of the sequence. Thus Swellix may also facilitate rational design of sequences with engineered folds.

Swellix analysis of protein and drug binding motifs in HERV RNA

The shortest Human Endogenous Retroviral RNA (HERV) sequence is 141 nucleotides (Genbank # AY944072.1). Folding this HERV RNA using the parallelized Swellix on the Blue Waters computer generated 643 components and 12,518,055,094 bundled structures in an average time of 23,951 s. Swellix does not save all the generated structures, but a motif search can be completed for each structure before it is discarded. A search for known RNA motifs [32,33,34,35,36,37] from HIV and Hepatitis viral RNA yielded the results shown in Table 5. Although these protein and drug binding motifs do not appear in the minimum free energy structure, suboptimal structures, or centroid structures predicted by Vienna [38] or RNAStructure [39] programs (Fig. 7), the motif occurrence can be as high as 4.5%. Thus, Swellix can search the entire conformational ensemble to identify motifs that might otherwise be overlooked. The thermodynamic-based predictions do not yield any structures with high base pair probabilities, and the MFE structure occurrence is only 1.17% of the ensemble. This HERV sequence does not have one thermodynamically dominant predicted structure, and thus Swellix is an alternative approach to RNA folding that can provide new insights, such as revealing the presence of motifs that bind therapeutics.

Table 5 Motif Searches in Swellix Analysis of HERV RNA
Fig. 7
figure 7

HERV Minimum Free Energy and Centroid Structures. The minimum free energy structure (MFE) and centroid structure for the 141-nucleotide HERV sequence (Genbank # AY944072.1)are shown. Base pairs are colored according to base pair probabilities computed with thermodynamic parameters using the Vienna Program [38]. The same sequence folded using the RNAStructure program generates an MFE structure and 6 additional suboptimal structures, none of which contain the motifs in Table 5

Conclusion

Swellix effectively combines helix abstraction with a combinatorial approach to RNA structure determination in order to efficiently compute all possible non-pseudoknotted structures for an RNA sequence. Swellix can analyze an RNA up to 418 nucleotides on the Blue Waters Supercomputer, and thus demonstrates that computer time and nodes are the only limits to a combinatorial approach to the RNA folding problem. The current capabilities of modern supercomputers and efficient tools such as Swellix make combinatorially complete searches of RNA conformational space a realistic option and dispel the myth of impossible RNA computations. Swellix is capable of incorporating unique constraints, such as the minimum number and length of helices, from crystallography or cryoelectron microscopy experiments. The possible biological applications for Swellix are demonstrated by computing the entropic benefits of reducing conformational space with modified nucleotides in tRNA folding and motif abundance in HERV RNA folding. Swellix reveals protein and drug binding motifs that occur in the entire ensemble but do not occur in the predicted minimum free energy or centroid structures. Thus, Swellix provides an alternative approach to RNA structure analysis when the assumptions of free energy minimization do not apply or when multiple conformations are present.

Abbreviations

HERV:

Human endogenous retroviral RNA

MPI:

Message passing interface

References

  1. Encode Project Consortium. A user's guide to the encyclopedia of DNA elements (ENCODE). PLoS Biol. 2011;9(4):e1001046.

    Article  Google Scholar 

  2. Lu Z, Zhang QC, Lee B, Flynn RA, Smith MA, Robinson JT, Davidovich C, Gooding AR, Goodrich KJ, Mattick JS, et al. RNA duplex map in living cells reveals higher-order Transcriptome structure. Cell. 2016;165(5):1267–79.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  3. Ding Y, Tang Y, Kwok CK, Zhang Y, Bevilacqua PC, Assmann SM. In vivo genome-wide profiling of RNA secondary structure reveals novel regulatory features. Nature. 2014;505(7485):696–700.

    Article  CAS  PubMed  Google Scholar 

  4. Rouskin S, Zubradt M, Washietl S, Kellis M, Weissman JS. Genome-wide probing of RNA structure reveals active unfolding of mRNA structures in vivo. Nature. 2014;505(7485):701–5.

    Article  CAS  PubMed  Google Scholar 

  5. Wu Y, Shi B, Ding X, Liu T, Hu X, Yip KY, Yang ZR, Mathews DH, Lu ZJ. Improved prediction of RNA secondary structure by integrating the free energy model with restraints derived from experimental probing data. Nucl. Acids Res. 2015;43(15):7247–59.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  6. Rivas E, Clements J, Eddy SR. A statistical test for conserved RNA structure shows lack of evidence for structure in lncRNAs. Nature Meth. 2017;14(1):45–8.

    Article  CAS  Google Scholar 

  7. Kutchko KM, Sanders W, Ziehr B, Phillips G, Solem A, Halvorsen M, Weeks KM, Moorman N, Laederach A. Multiple conformations are a conserved and regulatory feature of the RB1 5′ UTR. RNA. 2015;21(7):1274–85.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  8. Zuker M, Sankoff D. RNA secondary structures and their prediction. Bull Math Biol. 1984;46:591–621.

    Article  CAS  Google Scholar 

  9. Nussinov R, Jacobson A. Fast algorithm for predicting the secondary structure of single-stranded RNA. Proc Natl Acad Sci U S A. 1980;77:6309–13.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  10. Nussinov R, Pieczenik G, Griggs J, Kleitman D. Algorithms for loop matchings. SIAM J Appl Math. 1978;35:68–82.

    Article  Google Scholar 

  11. Turner DH, Mathews DH. NNDB: the nearest neighbor parameter database for predicting stability of nucleic acid secondary structure. Nucl. Acids Res. 2009;38:D280–2.

    Article  PubMed  PubMed Central  Google Scholar 

  12. Mathews DH, Disney MD, Childs JL, Schroeder SJ, Zuker M, Turner DH. Incorporating chemical modification constraints into a dynamic programming algorithm for prediction of RNA secondary structure. Proc Natl Acad Sci U S A. 2004;101:7287–92.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  13. Zuker M, Stiegler P. Optimal computer folding of large RNA sequences using thermodynamics and auxiliary information. Nucl Acids Res. 1981;9:133–48.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  14. Phan A, Mailey K, Saeki J, Gu X, Schroeder SJ. Advancing viral RNA structure prediction: measuring the thermodynamics of pyrimidine-rich internal loops. RNA. 2017;23(5):770–81.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  15. Zuker M. On finding all suboptimal foldings of an RNA molecule. Science. 1989;244:48–52.

    Article  CAS  PubMed  Google Scholar 

  16. McCaskill J. The equilibrium partition function and base pair binding probabilities for RNA secondary structure. Biopolymers. 1990;29:1105–19.

    Article  CAS  PubMed  Google Scholar 

  17. Ding Y, Chan C, Lawrence C. A statistical sampling algorithm for RNA secondary structure prediction. Nucl. Acids Res. 2004;31:7280–301.

    Article  Google Scholar 

  18. Pipas J, McMahon J. Methods for predicting RNA secondary structure. Proc Natl Acad Sci U S A. 1975;72:2017–21.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  19. Wuchty S, Fontana W, Hofacker IL, Schuster P. Complete suboptimal folding of RNA and the stability of secondary structures. Biopolymers. 1999;49:145–65.

    Article  CAS  PubMed  Google Scholar 

  20. Stone JW, Bleckley S, Lavelle S, Schroeder SJ. A parallel implementation of the Wuchty algorithm with additional experimental filters to more thoroughly explore RNA conformational space. PLoS One. 2015;10:e0117217.

  21. Bleckley S, Stone JW, Schroeder SJ. Crumple: a method for complete enumeration of all possible Pseudoknot-free RNA secondary structures. PLoS One. 2012;7:e52414.

  22. Guerra I, Schroeder SJ. Crumple: an efficient tool to explore thoroughly the RNA folding landscape. Meth. Molec. Biol. 2016;1490:1–14.

    Article  Google Scholar 

  23. Nawrocki EP, Burge SW, Bateman A, Daub J, Eberhardt RY, Eddy SR, Floden EW, Gardner PP, Jones TA, Tate J, et al. Rfam 12.0: updates to the RNA families database. Nucl. Acids Res. 2015;43(Database issue):D130–7.

    Article  CAS  PubMed  Google Scholar 

  24. Huang J, Backofen R, Voss B. Abstract folding space analysis based on helices. RNA. 2012;18(12):2135–47.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  25. Schroeder SJ, Stone JW, Bleckley S, Gibbons T, Mathews DM. Ensemble of Secondary Structures for Encapsidated satellite tobacco mosaic virus RNA consistent with chemical probing and crystallography constraints. Biophys J. 2011;101:167–75.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  26. Bleckley S, Schroeder SJ. Incorporating global features of RNA motifs in predictions for an Ensemble of Secondary Structures for Encapsidated MS2 Bacteriophage RNA. RNA. 2012;18:1309–18.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  27. Dijkstra EW, Scholten CS. Termination detection for diffusing computations. Inf Proc Letters. 1980;11:1–4.

    Article  Google Scholar 

  28. Dinan J, Olivier S, Sabin G, Prins J, Sadayappan P, Tseng CW. Dynamic load balancing of unbalanced computations using message passing. In: Proc of 8th IEEE Intl workshop on parallel and distributed scientific and engineering computing (PDSEC-07). Long Beach: IEEE; 2007.

  29. Frank J. Advances in the field of single-particle cryo-electron microscopy over the last decade. Nature Prot. 2017;12(2):209–12.

    Article  CAS  Google Scholar 

  30. Vare VY, Eruysal ER, Narendran A, Sarachan KL, Agris PF. Chemical and conformational diversity of modified nucleosides affects tRNA structure and function. Biomol. Ther. 2017;7(1):E29.

  31. Juhling F, Morl M, Hartmann Sprinzl M, Stadler PF, Putz J. tRNAdb 2009: compilation of tRNA sequences and tRNA genes. Nucl Acids Res. 2009;37:D159-62.

  32. Hermann T. Small molecules targeting viral RNA. WiRES RNA. 2016;7(6):726–43.

    Article  CAS  PubMed  Google Scholar 

  33. Al-Hashimi H, Pitt SW, Majumdar A, Xu W, Patel D. Mg2+−induced variation in the conformation and dynamics of HIV-1 TAR RNA probed using NMR residual dipolar couplings. J Mol Biol. 2003;329:867–73.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  34. Borkar AN, Bardaro MF Jr, Camilloni C, Aprile FA, Varani G, Vendruscolo M. Structure of a low-population binding intermediate in protein-RNA recognition. Proc Natl Acad Sci U S A. 2016;113(26):7171–6.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  35. Eichhorn CD, Chug R, Feigon J. hLARP7 C-terminal domain contains an xRRM that binds the 3′ hairpin of 7SK RNA. Nucl Acids Res. 2016;44:9977–89.

    CAS  PubMed  PubMed Central  Google Scholar 

  36. Bai Y, Tambe A, Zhou K, Doudna JA. RNA-guided assembly of rev-RRE nuclear export complexes. elife. 2014;3:e03656.

    Article  PubMed  PubMed Central  Google Scholar 

  37. Heus HA, Pardi A. Structural features that give rise to the unusal stability of RNA hairpins containing GNRA loops. Science. 1991;253:113–24.

    Article  Google Scholar 

  38. Hofacker IL. Energy-directed RNA structure prediction. Meth. Molec. Biol. 2014;1097:71–84.

    Article  CAS  Google Scholar 

  39. Xu ZZ, Mathews DH. Experiment-assisted secondary structure prediction with RNAstructure. Meth Molec Biol. 2016;1490:163–76.

    Article  Google Scholar 

  40. Udekwu I, Darfeuille F, Vogel J, Reimegard J, Holmqvist E, Wagner EGH. Hfq-dependent regulation of OmpA synthesis is mediated by an antisense RNA. Genes Dev. 2005;19:2355–66.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  41. Rudinger-Thirion J, Lescure A, Paulus C, Frugier M. Misfolded human tRNA isodecoder binds and neutralizes a 3′ UTR-embedded Alu element. Proc Natl Acad Sci U S A. 2011;108(40):E794–802.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  42. Schroeder SJ. Advances in RNA structure prediction from sequence: new tools for generating hypotheses about viral RNA structure-function relationships. J Virol. 2009;83:6326–34.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  43. Shi H, Moore PB. The crystal structure of yeast phenylalanine tRNA at 1.93 a resolution: a classic structure revisited. RNA. 2000;6(8):1091–105.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  44. Bailey S, Wichitwechkarn J, Johnson D, Reilly BE, Anderson DL, Bodley JW. Phylogenetic analysis and secondary structure of Bacillus Subtilis Bacteriophage RNA required for DNA packaging. J Biol Chem. 1990;265:22365–70.

    CAS  PubMed  Google Scholar 

  45. Tanner M, Cech T. Activity and thermostability of the small self-splicing group I intron in the pre-tRNA(lle) of the purple bacterium Azoarcus. RNA. 1996;2(1):74–83.

    CAS  PubMed  PubMed Central  Google Scholar 

  46. Wildschutte JH, Williams ZH, Montesion M, Subramanian RP, Kidd JM, Coffin JM. Discovery of unfixed endogenous retrovirus insertions in diverse human populations. Proc Natl Acad Sci U S A. 2016;113(16):E2326–34.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

  47. Yang J, Bogerd H, Le SY, Cullen BR. The human endogenous retrovirus K rev response element coincides with a predicted RNA folding region. RNA. 2000;6(11):1551–64.

    Article  CAS  PubMed  PubMed Central  Google Scholar 

Download references

Acknowledgements

This research was facilitated by the resources and staff at the Oklahoma supercomputing Center for Education and Research (OSCER) and the Blue Waters Student Internship Program. Thus, the authors greatly appreciate the advice and support of Dr. Henry Neeman and Dr. Aaron Weeden. The authors also thank Samuel Bleckley, Jonathan Stone, Isaac Sung, Ivan Guerra, Kimberly Ughamadhu and other members of the STMV computational team and the OU Supercomputing Club.

Funding

This research is part of the Blue Waters sustained-petascale computing project, which is supported by the National Science Foundation (awards OCI-0725070 and ACI-1238993) and the state of Illinois. Blue Waters is a joint effort of the University of Illinois at Urbana-Champaign and its National Center for Supercomputing Applications. This research was also supported by grants from the National Science Foundation (NSFCAREER grant no. 0844913), the Oklahoma Center for the Advancement of Science and Technology (HR13–206), and the HARC Center: HIV Accessory and Regulatory Complexes (NIH P50GM082250).

Availability of data and materials

All sequences used and source code for this manuscript is freely available at https://github.com/SchroederLabOU/swellix.

Author information

Authors and Affiliations

Authors

Contributions

NS and JWL wrote and tested Swellix code. SJS designed experiments. NS and SJS wrote the manuscript. All authors analyzed the computational results and approved the final manuscript.

Corresponding author

Correspondence to Susan J. Schroeder.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Competing interests

The authors declare that they have no competing interests.

Additional file

Additional file 1:

Supporting Information. Supporting Information includes the pseudocode and readme file for the Swellix program and Table S1, a table of tRNA sequences and modifications. (PDF 86 kb)

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sloat, N., Liu, JW. & Schroeder, S.J. Swellix: a computational tool to explore RNA conformational space. BMC Bioinformatics 18, 504 (2017). https://doi.org/10.1186/s12859-017-1910-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s12859-017-1910-7

Keywords