Identification of Defective Viral Genomes Using NGS Data on HIVE

Identification of Defective Viral Genomes Using NGS Data on HIVE

Identification of Defective Viral Genomes using NGS Data on HIVE Konstantinos Karagiannis [email protected] FDA/CBER/OBE/HIVE 02/22/2021 Disclaimer This presentation reflects the views of the author and should not be construed to represent FDA’s views or policies What is a DVG? Wild-type DVG Genomes unable to Defective complete a full a) Viral replication Genomes cycle a) Mutation b) b) Deletions c) Copy-back/snap-back c) Copy-back DVG Generation mechanisms • Stochastic mistakes Error prone viral RNA polymerase • Genomic variations (single AA mutation in SeV’s nucleoprotein) • Variants of structural proteins (PPXY domain of LCMV) • Template switching (intra or inter-genomic) Effects of DVGs M Vignuzzi & C.B. López, . Defective viral genomes are key drivers of the virus-host interaction. 2019 June 03, Nature Microbiology DVG and HIV • Types of DVG • Mutations • Deletions • Present at all stages of HIV-1 infection • Replication-incompetent or competent • Silent pool • Persistent seropositivity • In CD4+ memory cells 17y H. Imamichi et al. Defective HIV-1 proviruses produce viral proteins. 2020 Feb 18, PNAS DVG in SARS-CoV-2 • Defective RNAs / subgenomic RNA D. Kim et al. The Architecture of SARS-CoV-2 Transcriptme. 2020 May 14, Cell H. Doddapaneni et al. Oligonucleotide Capture Sequencing of the SARS- CoV-2 Genome and SubgenomicFragments from COVID-19 Individuals. 2020 Dec 11, bioRxiv RNA viruses with described DVGs Virus Type of DVG Known DVG functions Virus Type of DVG Known DVG functions nsRNA viruses psRNA viruses Arenaviridae Arteriviridae Lymphocytic choriomeningitis Interference/modulate Porcine reproductive and respiratory Deletion Deletion UN mammarenavirus virulence/persistence syndrome virus Filoviridae Equine arteritis virus Deletion Interference Ebola virus Deletion /copy-back Persistence Closteroviridae Orthomyxoviridae Citrus tristeza virus Deletion UN Interference/IFN- Coronaviridae Influenza virus Deletion induction/persistence/modulate virulence Berne virus Deletion Interference Paramyxoviridae Bovine coronavirus Deletion UN Human parainfluenza virus 3 Deletion /copy-back Interference Infectious bronchitis virus Deletion UN Parainfluenza virus 5 Deletion/copy-back IFN-induction Mouse hepatitis virus Deletion Interference/persistence Interference/IFN- Transmissible gastroenteritis virus Deletion Interference Measles virus Deletion/copy-back induction/persistence/modulate virulence Flaviviridae Mumps virus Persistence/modulate virulence Dengue virus Deletion Persistence Interference/IFN-induction/immune Japanese encephalitis virus Persistence Sendai virus Deletion/copy-back stimulation/persistence/modulate Hepatitis C virus Deletion Persistence virulence Murray Valley encephalitis virus Deletion Persistence Peribunyaviridae Tick-borne encephalitis virus Deletion Modulate virulence Bunyamwera virus Deletion Interference West Nile virus Deletion Interference/persistence Phenuiviridae Nepoviridae Rift Valley Fever virus (RVFV) Deletion Interference/modulate virulence Tomato black ring virus Deletion Interference Toscana virus Deletion Interference Nodaviridae Pneumoviridae Flock House virus Deletion Modulate virulence Human metapneumovirus Copy-back IFN-induction Picornaviridae Human respiratory syncytial virus Deletion/copy-back Interference/IFN-induction/persistence Encephalomyocarditis virus Deletion Interference Rhabdoviridae Foot-and-mouth disease virus Deletion Interference Interference/IFN- Vesicular stomatitis virus Deletion/copy-back Mengo virus Deletion Interference induction/persistence/modulate virulence Polio virus Deletion Modulate virulence Rabies virus Deletion Interference/persistence Togaviridae Tospoviridae Rubella virus Persistence Tomato spotted wilt virus Deletion Modulate virulence Semliki Forest virus Deletion Interference/modulate virulence dsRNA viruses Sindbis virus Deletion Interference/IFN-induction Birnaviridae Tombusviridae Infectious necrotic pancreatic virus UN Persistence Cucumber necrosis virus Deletion Modulate virulence Partitiviridae Tomato bushy stunt virus Deletion Interference/modulate virulence Rosellinia necatrix virus Deletion Interference Turnip crinkle virus Deletion Interference/modulate virulence Reoviridae Retroviruses Type 3 reovirus Deletion Interference Retroviridae Deletion UN Wound tumor virus Human immunodeficiency virus 1 Deletion/ hypermutation/frame shift Persistence DVG-profiler All reads All pairwise combinations HTS reads Assign Sort breakpoints Detect Maximum breakpoints Align against score path reference Highest Hits from Yes alignment Group same read Hits score pair breakpoints All hits overlapping? No Sorted Sum of 2 the Filter hits by alignment scores read DVG-profiler T. Bosma K. Karagiannis et al. Identification and quantification of defective virus genomes in high throughput sequencing data using DVG-profiler, a novel post-sequence alignment processing algorithm. 2019 May 17, PLOS ONE DVG-profiler: Annotations DVG profiler: Junction types short read First Last bp Deletion 3’ copy-back 5’ copy-back Insertion Stable junction calling Experimental confirmation Performance assessment Reproducibility bp Copy short read - bp back = Minimum aligned length = Read length In/ dels DI-tector • Uses artificial split reads and BWA • Complexity increases with the read length • Available only as end-to-end G. Beauclairet al. DI-tector: defective interfering viral genomes’ detector for next-generation sequencing data . 2018 Oct 24, RNA Comparison DI-tector and DVG profiler In silico samples: Sensitivity concentrations: Name Type Breakpoint Reinitiation point Delta Length (b) Dataset Composition Av. Depth of Prevalence (%) REF Reference n/a n/a n/a 15384 Coverage DVG1 5’ cb 13363 14924 561 2483 SED1 REF/DVG3 6500.26/3.53 99.95 / DVG2 5’ cb 13257 14191 934 3322 0.05 SED2 DVG3 3’ cb 520 2312 1792 2832 REF/DVG3 6500.26/3.53 99.46 / 0.054 DVG4 3’ cb 5585 5686 101 11271 SED3 REF/DVG3 6500.26/353.31 94.85 / 5.15 DVG5 Deletion 522 5587 5065 10320 SED4 REF/DVG3 6500.26/3531.07 64.80 / 35.20 DVG6 Deletion 521 542 21 15364 SED5 REF/DVG3 6500.26/35310.73 15.55 / 84.45 DVG7 Insertion 2311 2292 19 15404 DVG8 Insertion 5686 5586 100 15485 Abundance prediction accuracy Wall clock time Performance in all 9 DVGs mixture 7000 8 6000 7 25 5000 6 20 5 4000 15 4 3000 Time (s) Divergence - 3 JS 10 2000 2 5 1 1000 0 0 0 SED1 SED2 SED3 SED4 SED5 DVG-profiler DI-tector SED1 SED2 SED3 SED4 SED5 SPD DVG-profiler DI-tector TP FP DVG-profiler DI-tector Tutorial – Reads in HIVE https://hive.biochemistry.gwu.edu/dna.cgi?cmd=main Tutorial – Align Reads against reference https://hive.biochemistry.gwu.edu/dna.cgi?cmd=main Tutorial – From Alignments to DVG profiler https://hive.biochemistry.gwu.edu/dna.cgi?cmd=main Tutorial – DVG profiler paramters 1 2 1) Maximum distance bp 2) Maximum overlap bp https://hive.biochemistry.gwu.edu/dna.cgi?cmd=main Tutorial – DVG profiler results https://hive.biochemistry.gwu.edu/dna.cgi?cmd=main # of hits 2D peak detection 14308 14307 14306 Detected Junctions 18000 14305 16000 14304 14000 11434 11435 11436 11437 11438 11439 11440 12000 10000 8000 # of hits 6000 Genomic position Genomic 4000 2000 0 1 2001 4001 6001 8001 10001 12001 14001 16001 18001 Genomic position # of hits (grouped) 14308 14307 14306 14305 14304 11434 11435 11436 11437 11438 11439 11440 Tutorial – DVG profiler results refined https://hive.biochemistry.gwu.edu/dna.cgi?cmd=main Identifying junctions is the first step • Nested events RT-PCR detected deletions in cpRNAs • DVGs mutations and quasispecies Quasispecies 4*10-4 errors / nucleotide / round of replication Highly diverse populations, mutant clouds, swarms Quasispecies Quasispecies is a mathematical model by Manfred Eigen1 = : type sequence from parent sequence − : offspring with mutation rate : death rate of sequence ( = 0 = and = 1 ) ∀ ∀ ≠ Problem definition Quasispecies Spectrum Reconstruction (QSR) means: • the set of sequence consensuses and • the relative frequency of each sequence in the sample HexaHedron algorithm Alignment length to window half length Window profile Pos A C G T Ins Del start 1 50 1 0 0 0 0 2 0 0 65 0 0 1 3 0 82 1 0 0 0 start end 4 0 67 0 64 0 0 Sliding window 5 0 44 0 86 0 0 6 1 0 99 0 0 0 7 76 0 41 0 0 0 end 8 0 32 41 47 0 1 9 104 0 4 0 0 1 10 0 11 0 80 1 0 11 0 56 0 17 0 0 overlap 12 64 0 0 0 0 0 13 0 1 48 0 0 0 14 0 0 0 39 0 0 K. Karagiannis et al. Separation and assembly of deep sequencing data into discrete sub-population genomes. 2017 Nov 17, NAR HexaHedron algorithm AGCCTGA|CATTAGT Window1 AGCTCGG|TACCAGT Window2 AGCCCGA|GATCAGT Window3 : Readn+1 CATTAGTAGTCAAC Hamming similarity normalized by Sørensen–Dice index ( , ) Exceptions: = ( , ) • During bifurcation ∩ ∩ 2 • Paired end read with , = + assigned mate ∩ K. Karagiannis et al. Separation and assembly of deep sequencing data into discrete sub-population genomes. 2017 Nov 17, NAR HexaHedron algorithm • Sankey diagram + Flow diagram Energy between processes – Constant width – No axis information • Nephosome / Graph Genome • Width corresponds to the depth of the coverage • Trajectories from left to right 30 K. Karagiannis et al. Separation and assembly of deep sequencing data into discrete sub-population genomes. 2017 Nov 17, NAR Empirical sample (Mumpsvax) • DB of genomic sequences of 54 strains of mumps • Alignment produced 688,000 hits • Predicted frequencies : 93.18% and 6.82%. Consistent with previous estimate based on quantitative PCR (95%-5%) • Consensus sequences of these two sub-strains were

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    46 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us