3.2.3 TAD calling algorithms
Last updated
Last updated
Directionality Index (Dixon et al. (2012))
- Full DI plot (Riccardo et al.(2018))
Arrowhead (Rao et al.(2014))
TADbit (Serra et. al(2017))
TADtree (Weinreb et. al (2016))
In the 2014 distinguished paper A 3D Map of the Human Genome at Kilobase Resolution Reveals Principles of Chromatin Looping, the author has explained why finding TAD segmentation from the contact map is a tricky work:
This is due to experimental factors:such as noise and inadequate coverage. It is also because of the intrinsic difficulty of the problem: the decline in contact frequency at domain edges can be subtle, and the very rapid decline in contact probability observed as one moves away from the diagonal of a contact map is a major confound for most approaches.
In this chapter, we'll especially focus on the domain and boundary calling methods described in previous work.
Figure1. Heat map of the contact matrix of Rao et al.9 GM12878 replicate H (chr1:153,000,000–155,500,000) at 40-kb resolution. Identified TADs are framed in different colors for the various methods. Obs, observed counts. Figure by Forcato, M, et al. Nature Methods 14.7(2017):679.
The regions at the periphery of the topological domains are highly biased in their interaction frequencies. In other words, the most upstream portion of a topological domain is highly biased towards interacting downstream, and the downstream portion of a topological domain is highly biased towards interacting upstream. DI measures the tendency of a locus to interact with upstream vs. downstream sites. This is useful for identifying domains because the upstream boundary of a domain should prefer to interact with downstream loci, and vice-versa.
The directionality index is calculated in equation 1, where A is the number of reads that map from a given 40kb bin to the upstream 2Mb, B is the number of reads that map from the same 40kb bin to the downstream 2Mb notice that these parameters are choose arbitrarily, lack a principled strategy of choosing algorithmic parameters., and E, the expected number of reads under the null hypothesis, is equal to (A + B)/2.
This is consistent with Chi-sqaure nul hypothesis.
This method considers the directionality index as an observation and believe that the “true” hidden directionality bias (DB) can be determined using a hidden Markov model (HMM).
Figure2. Observations: DI, hidden state: 3 states as "Upstream Bias", "Downstream Bias" or "No Bias". Figure by Dixon, Jesse R., et al. Nature 485.7398 (2012): 376.
The probability of observing DI as Y’s [Y1,Y2..Yn], is conditioned on the hidden true directionality biases as Q’s [Q1,Q2..Qn] and the mixtures of gaussians as M’s [M1,M2..Mn]:
where C encodes the mixture weights for each state i.
Then EM algorithms was applied to compute maximum likelihood estimates and the parameter estimates of transition and emission (characterized by mean, covariance and weights). The posterior marginals were then estimated using the Forward-backward algorithm ( for each chr, 1 to 20 mixtures and chose the mixture with best goodness of fit using the AIC criterion).
Domains and boundaries are then inferred from the results of the HMM state calls throughout the genome. A domain is initiated at the beginning of a single downstream biased state(it do not have upstream information) and end at a upstream biased state. The algorithms also defined unorganized chromatin to be these regions that are > 400kb, and the topological boundaries to be less than 400kb.
In HiCTool analysis pipeline, based on the notion of DI and utilized HMM to infer the true DI (the HMM model detail can be referred here), HiCtool then provided the comparison between DI from observed data and the inferred one from HMM.
The observed DI is used to calculate the “true” DI using a Hidden Markov Model. Topological domain coordinates are then calculated using the shifts of the HMM biased states according to Dixon et al.. A domain is initiated at the beginning of a single downstream biased HMM state and it is continuous throughout any consecutive downstream biased state; the domain will then end when the last in a series of upstream biased states is reached.
In order to call sub-TADs from ultra-high resolution Hi-C data sets, arrowhead has been proposed as a heuristic algorithm to detect the corners of the domains to locate the boundaries of TADs. The name was got from the transformed matrix:
Figure3.Transformation replaces domains with an arrowhead-shaped motif pointing toward the domain’s upper-left corner (example in yellow). Arrowheads are then identified using dynamic programming. Figure by Rao, Suhass. P., et al. Cell 159.7(2014):1665-1680.
The matrix transformation is defined as:
where M is the normalized contact matrix, A is arrowhead matrix.
How to understand the transformation intuitively?
I guess the best way to understand the transformation matrix is this:
TADbit (github) is a complete python library to deal with 3C-based data with all steps to analyze, from mapping, binning matrices, normalizing, identifying TAD enven to building the 3D model.
However, here we'll mainly focus on the TAD calling or say border detection algorithms that is implemented in the library.
Modeling vector data:
where a and b are TAD dependent constants and wij is the normalization factor for the cell at coordinates (i,j) of the Hi-C contact matrix. The breakpoint detection algorithm was firsted used in time series analysis, here we consider each column slice of the Hi-C matrix as a series vector. Each cell of this slice belongs to one of three categories:
contacts between the TAD and all upstream loci
intraTAD contacts
contacts between the TAD and all downstream loci
Breakpoint dectection algorithm:
After we get slices of the matrix data, the algorithm proceeds every slice in two phases:
The log-likelihood of every slice (defined by a start and end position) is computed.
the search of possible struture of each slice is carried out by a dynamic programming method.
The border robust level. the likelihood of each TAD border in the optimal segmentation is penalized by a value equal to the expected gain in log-likelihood for adding a TAD border after the optimum is reached, and the dynamic programming segmentation is restarted.
Reviewed by another paper (Forcato et. al(2017)): TADbit and Armatus had the highest sensitivity in recovering TAD boundaries, although TADbit displayed a higher precision (low FDR) at all noise levels.
TADtree is the first published method that can detect TADs and sub-TADs simultaneously (subTADs have been thought to vary between cell types and change the gene regulation). TADtree can detect nested hierarchies of TADs based on the empirical observation that within TADs, the enrichment of contacts over background grows linearly with the distance between bins, but at a rate that depends on the TAD length.
TADtree algorithm finding the TAD forest using a dynamic programming algorithm to maximize an objective function. Before we go through the framework and some details, few features of this method should be notice:
The number of trees N in a forest is defined by users.
The algorithm will return an approximate optimal fit but not necessarialy the right model.
a) background contact frequency
Just as other methods, first we usually have a way to measure the background contact strength. Here the background function giving the mean contact frequency for bins at each distance d:
b) modeling TADs and sub-TADs
The most distinguished feature that the paper found is that subTADs usually have a higher \delta. \delta is positive indicates the contact enrichment increases with increasing distance between bins, hence the subTADs is has a higher rate of increase in contact frequency with distance.
c) boundary index (BI)
Previous studies have illustrate that the boundaries mark a shift in interaction preference. 1D Test statistic called the BI that measures local shifts in interaction preference.
To generate an optimal result, the algorithm is trying to maximize the following objection function:
If we define the , and expected model is , then the transformed M matrix is .
Consider the behavior of this transformation when a domain is present in M* between locus a and locus b (i.e., there is a square of enriched contact frequency whose vertices lie at , , , and ). will be strongly positive if and only if locus i-d is inside the domain (i.e., in the range [a,b]) and locus i+d is not. will be strongly negative when locus i+d is inside the domain and locus i-d is not. If both loci are inside the domain, or both loci are outside the domain, will be close to zero.
TADbit employs a breakpoint detection algorithm that returns the optimal segmentation of the chromosome under BIC-penalized likelihood. The number of interactions between bin and separated by length is assumed to have a Possion distribution with parameter:
if denotes the log-likelihood of the optimal segmentation of the slice (s,e) into k sub-slices, then where the minimum is taken over all the values of h. This formula allows computing the optimal segmentation recursively.
The time complexity of this alg is where is the maxium TAD size.
Modeling TADs and subTADs, this model would be the core of this method which defines the features and criteria to distinguish TADs and it's hierarchical structure. For each TAD D, it can be described with four parameters: . Specifying an TAD in interval . The expected contact frequency is:
This is a linear function about the variable with slope and intercept .
The BI measures the shift in contacts around an interval i. Moreover, this normalized BI is Z-score and a TAD forest has its own , details can be refered in the original paper. Based on BI, TADtree defined what is valid boundaries.
such that (TAD forest has N TADs), and each is locally fitted and has valid boundaries. This problem is futhured solved with dynamic programming method.