Next Article in Journal
Draining the Pleural Space: Lymphatic Vessels Facing the Most Challenging Task
Next Article in Special Issue
Ensemble Deep-Learning-Enabled Clinical Decision Support System for Breast Cancer Diagnosis and Classification on Ultrasound Images
Previous Article in Journal
Hemophagocytic Lymphohistiocytosis Gene Variants in Multisystem Inflammatory Syndrome in Children
Previous Article in Special Issue
Agent-Based Modeling of Autosomal Recessive Deafness 1A (DFNB1A) Prevalence with Regard to Intensity of Selection Pressure in Isolated Human Population
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

PWM2Vec: An Efficient Embedding Approach for Viral Host Specification from Coronavirus Spike Sequences

Department of Computer Science, Georgia State University, Atlanta, GA 30303, USA
*
Author to whom correspondence should be addressed.
Biology 2022, 11(3), 418; https://doi.org/10.3390/biology11030418
Submission received: 4 January 2022 / Revised: 24 February 2022 / Accepted: 7 March 2022 / Published: 9 March 2022
(This article belongs to the Special Issue Advanced Computational Models for Clinical Decision Support)

Abstract

:

Simple Summary

The family of coronaviruses comprises a diverse set of strains and variants which cause diseases from the common cold to COVID-19. Moreover, they infect a wide array of hosts from bats, camels, birds, to humans. Studying coronaviruses through the lens of host specificity provides a unique perspective to understanding the evolution, diversity and dynamics of this family. In particular, this can reveal groups of different hosts infected by similar strains, giving clues on strains which were more likely to have evolved to jump from one host to another. In this work, we frame host specificity as a classification task, in designing a very compact numerical representation of the spike sequences of different coronaviruses. Based on this numerical representation, classification methods are able to detect the target host with high accuracy. Such an approach can used to efficiently scale to large volumes of sequences, in order to unveil trends in the host specificity of different coronavirus strains.

Abstract

The study of host specificity has important connections to the question about the origin of SARS-CoV-2 in humans which led to the COVID-19 pandemic—an important open question. There are speculations that bats are a possible origin. Likewise, there are many closely related (corona)viruses, such as SARS, which was found to be transmitted through civets. The study of the different hosts which can be potential carriers and transmitters of deadly viruses to humans is crucial to understanding, mitigating, and preventing current and future pandemics. In coronaviruses, the surface (S) protein, or spike protein, is important in determining host specificity, since it is the point of contact between the virus and the host cell membrane. In this paper, we classify the hosts of over five thousand coronaviruses from their spike protein sequences, segregating them into clusters of distinct hosts among birds, bats, camels, swine, humans, and weasels, to name a few. We propose a feature embedding based on the well-known position weight matrix (PWM), which we call PWM2Vec, and we use it to generate feature vectors from the spike protein sequences of these coronaviruses. While our embedding is inspired by the success of PWMs in biological applications, such as determining protein function and identifying transcription factor binding sites, we are the first (to the best of our knowledge) to use PWMs from viral sequences to generate fixed-length feature vector representations, and use them in the context of host classification. The results on real world data show that when using PWM2Vec, machine learning classifiers are able to perform comparably to the baseline models in terms of predictive performance and runtime—in some cases, the performance is better. We also measure the importance of different amino acids using information gain to show the amino acids which are important for predicting the host of a given coronavirus. Finally, we perform some statistical analyses on these results to show that our embedding is more compact than the embeddings of the baseline models.

1. Introduction

The coronavirus (COVID-19) pandemic is caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). The pandemic has put millions of people at risk in numerous countries worldwide and caused an unprecedented public health crisis [1]. Although the origin of COVID-19 (SARS-CoV-2) in humans is still unknown, there are many theories that it could have been transferred to humans from bats [2]. Likewise, several related coronaviruses (CoVs) have been transmitted from other animals, such as SARS (SARS-CoV) from civets (civets are closely related to cats [3]), and MERS (MERS-CoV) from dromedary camels [4]. SARS-CoV-2, and other CoVs, belong to the family coronaviridae (of order nidovirales [5]), which is a large family of diverse enveloped, positive-sense single-stranded genomic RNA (+ssRNA) viruses that can bring about respiratory diseases in humans and animals [6]. They are grouped into five genera, namely, alphacoronavirus, betacoronavirus, gammacoronavirus, alphaletovirus, and deltacoronavirus. They infect a range of hosts such as humans, palm civets, bats, dogs, and monkeys, among others [7]. The alphacoronaviruses and betacoronaviruses mostly infect mammals, and the gammacoronaviruses mostly infect birds. The deltacoronaviruses infect both birds and mammals [8].
SARS-CoV-2 is the seventh member of the coronavirus family known to affect humans, and the other six are severe acute respiratory syndrome-CoV (SARS-CoV), HCoVs-NL63, HCoVs-OC43, HCoVs-HKU1, HCoVs-229E, and middle east respiratory syndrome-CoV (MERS-CoV) [9]. SARS-CoV-2 is similar to SARS-CoV, which led to the SARS epidemic in 2003, causing more than 8400 cases and approximately 800 deaths [10]. Compared to the known SARS-CoV virus, the novel SARS-CoV-2 has a lower mortality rate but a higher human-to-human transmission rate. Similarly, SARS-CoV-2 can have an adverse impact on the human body. It is highly infectious and is a matter of significant concern, since it can not only damage the respiratory system, gastrointestinal system, heart, and central nervous system, but also may lead to multi-organ failure, and eventually, death [11,12].
Monitoring zoonotic diseases and host specificity are integral to understanding disease dynamics. Sixty percent of known infectious diseases in humans and 75% of all emerging diseases are zoonotic, as reported by the United Nations Environment Program (UNEP) and the International Livestock Research Institute (ILRI) [13]. The study of the COVID-19 pandemic is of great significance, not only because it can help healthcare institutions to cope with the ongoing epidemic, but also because it allows researchers to learn more fundamentals about the family coronaviridae, which can provide new knowledge for the prevention of potential pandemics in the future. CoVs are widespread among birds and mammals and can be causes of zoonoses. A zoonosis is defined as any disease or infection that is naturally transmissible from vertebrate animals to humans by the World Health Organization, and COVID-19 has been classified as a zoonotic disease [14]. One important step to learning about zoonoses and understanding the current pandemic better is finding out how human infections began for SARS-CoV-2. CoVs can lead to various diseases in domestic animals, including dogs, swine, chickens, and cats. Although the origin of COVID-19 in humans is still unknown, genetic analysis results show that it is highly possible that SARS-CoV-2 originates from bats and utilizes the pangolin as an intermediate host [15,16,17].
The CoVs have an envelope membrane that is associated with five structural proteins, namely, the surface (S) protein, or spike protein, haemagglutinin-esterase protein (HE), membrane protein (M), envelope protein (E), and the nucleocapsid protein (N) [18]; see Figure 1. The spike protein is responsible for the binding and fusion between the virus and the host cell receptors, and also the infected host cells and adjacent uninfected cells [19]. The spike protein is further subdivided into two subunits, S1 and S2. The S2 subunit is then again further subdivided into five domains, namely, the fusion peptide (FP), two heptad-repeat regions (HR1 and HR2), the transmembrane domain (TM), and the cytoplasmic tail (CT), all of which play a key role in mediating the viral cell membrane fusion and entry [20,21]. Hence, the spike proteins of different CoVs largely determine their ranges of host specificity. Changes in spike protein sequences are reportedly sufficient to change tissue and species tropism and viral virulence [7,22,23]. The S protein is a trimeric transmembrane protein with a protrusion, or spike, on the viral surface, which is the key for binding to and entry into host cells. It is composed of the receptor binding domain or S1 subunit and an S2 subunit that harbor sequences for viral fusion to the cell membrane [7,22,23]. Due to their importance, using the specificity of spike proteins offers an approach to classifying the potential hosts of CoVs.
A common way to classify and understand the dynamics of viruses is to construct a phylogenetic tree of evolution using the sequencing data of the virus [24,25]. After the COVID-19 pandemic breakout, databases such as GISAID [26] collected a large number of sequence data of SARS-CoV-2 from researchers and clinicians worldwide, which can be used for phylogenetic tree inference. Many methods have been developed and applied for constructing phylogenetic trees, including the most similar supertree algorithm (MSSA) method [27], the MRP method [28], and the approximate maximum likelihood (ML) supertree method [29,30]. Upon similar methods, the state-of-the-art Nextstrain [24] and IQTREE2 [25] have been developed. However, these methods of building a phylogenetic tree for CoVs require high computational complexity, and the vast volume of sequence data can cause a scalability issue for phylogeny-based approaches [31]. For example, Nextstrain [24] is able to construct trees on thousands of sequences, whereas IQTREE2 [25] is able to scale to tens of thousands of sequences. There are currently millions of sequences available on GISAID alone—clearly viable alternatives are necessary. Here we study machine learning clustering and classification as an alternative to phylogenetic tree building.
Some efforts have been made to study the coronavirus host data [32] by using the one-hot embedding (OHE) approach to get fixed length feature embeddings for the spike sequence. OHE provides good predictions, but it has drawbacks, such as the high dimensionality of the feature vectors produced. Furthermore, the columns of the OHE-based vector have a linear relationship, which means that one variable can be easily predicted using the other variables. This behavior can cause parallelism and multicollinearity (when multiple features are correlated with each other) in high dimensions. The authors of [33,34] used the coronavirus spike sequences to classify different variants of COVID-19 using k-mer-based frequency vectors. Researchers have performed clustering on the COVID-19 spike sequences using the same k-mer-based frequency vector generation approach [35,36]. Although their approaches are effective in terms of predictive performance, the dimensionality of the feature vector representation is still high, which can create a very well-known problem in machine learning: the curse of dimensionality. Moreover, for each k-mer, it is necessary to find the appropriate bin dedicated to a specific k-mer (“bin matching”) which can be expensive in terms of computational cost.
Another possible solution, which is what we propose here, is the use of the position weight matrix (PWM), sometimes also called a position-specific weight matrix (PSWM) or position-specific scoring matrix (PSSM) [37]. It is a good representation of motifs in biological sequences. A motif is a nucleotide or amino acid sequence pattern that is widespread and has or is conjectured to have some biological significance. The PWM applies entropy and relative entropy towards identifying transcription factor binding sites (TFBSs), for example. A PWM contains information about the frequencies of nucleotides for each position in the form of weights. These log-odds or log-probability weights are used for computing the binding affinity score.
The PWM can be used to distinguish the binding sites from the sequence, a well-known method for de novo motif sequence finding. If we do not know about a possible motif in a given sequence, there are methods such as expectation maximization (EM) and Gibbs sampling, which uses the PWM. Inspired by this application, we computed an absolute score from the PWM while scanning the sequence for “motifs” (here k-mers) using a sliding window (of size k, see Figure 2) and computed the absolute score. We can find relevant information on the motifs based on the score calculated from the PWM. The higher the score, the more relevant the k-mer is.
In this paper, we propose an approach called PWM2Vec, a basic implementation of the position weight matrix (PWM) to generate a feature vector representation of a coronavirus spike sequence. Given a spike sequence, we first extract k-mers. From the k-mers, we generate the PWM (see Figure 3). After that, we assign a score to each k-mer by using the PWM to design a feature embedding and apply machine learning methods such as classification and clustering in this feature embedding. While this is inspired by methods for finding motifs (e.g., TF-promoter binding sites), our goal is to obtain a numerical representation of these k-mers generated from each sequence.
Our contributions in this paper are as follows:
  • We propose an approach to generate a fixed-length numerical representation of a spike sequence using a PWM. The generated feature vectors could be used as input to any machine learning algorithm for tasks such as classification and clustering.
  • Our proposed feature embedding approach contains more compact information and gives better results than the baselines in terms of classification and clustering.
  • Our feature vector contains fewer dimensions than k-mer and one-hot encoding-based feature vectors (≈20-fold fewer dimensions than one-hot encoding and ≈4-fold fewer dimensions than k-mer-based embedding), which improves the runtimes for classification and clustering algorithms.
  • We performed statistical analysis on the data and show the importance of different positions of amino acids that play key roles in the classification of different hosts. We validated the compactness of our proposed embedding from an orthogonal point of view.
The rest of the paper is organized as follows: Section 2 contains the previous work related to sequence classification, in general, and coronavirus spike sequence classification in particular. Section 3 contains the details about our proposed alignment-free method for spike sequence classification. Section 4 contains the experimental setup, dataset collection, and dataset statistics details. The results for our proposed method are given in Section 5. Finally, we conclude our paper in Section 6.

2. Related Work

Several machine learning approaches based on k-mers have been proposed in the literature for classification and clustering tasks [33,35,38,39]. More specifically, there are many classical algorithms for sequence classification [40,41]. Although these methods have been proven to be useful in some studies, it is not clear if they can be used in the context of coronavirus data. Furthermore, another major problem with all those methods is the high computational complexity of the algorithms (because of the high dimensional representation of the data), which can result in higher runtimes for the underlying classification algorithms.
Position weight matrix (PWM)-based approaches have been successfully applied for diverse sequence analysis, motif predictions, and identification studies. Several popular software applications and Web servers have been built based on the implementations of PWMs, e.g., the PWMscan software package [42] and PSI-BLAST [43]. Furthermore, many other advanced algorithms have been implemented to optimize PWM-based techniques: examples include MEME (multiple EM for motif elicitation) [44], based on expectation maximization (EM), and the Gibbs Sampler [45] for de novo motif discovery, which uses Gibbs sampling algorithms [46,47]. The MEME EM algorithm basically finds an initial motif and repeatedly uses EM steps to improve motifs until the PWM values do not improve further [44,48]. Furthermore, the BaMM (Bayesian Markov model) algorithm was built based on the Markov algorithm to model correlations among nucleotides at other positions—since the PWM cannot, because the method assumes probabilities at different sites are independent of each other [47]. The PWM method continues to be applied and extended. Log2PWMs is a simple implementation of PWMs extended to enable conversion or reconstruction of a PWM representation from a sequence logo [49].
The PWM is also used for the binding specificity of a transcription factor (TF) [50]. It can be used to scan a sequence for the presence of DNA words, which are comparatively more similar to the PWM than to the background [51,52]. Authors in [53] evaluated the Bayesian network and a support vector machine (SVM) on four different TF binding site-based datasets, and analyzed their performances using PWM. Authors in [54] developed a tree-based PWM algorithm to simulate the interaction between TF and its binding sites accurately. A new di-nucleotide PWM approach is proposed in [55] that outperforms the conventional mono-nucleotide PWM method. Moreover, the research done in [56] proposes an improved position weight matrix (IPWM) method to recognize prokaryotic promoters based on an entropy measurement. Using hepatitis C virus (HCV) nucleotide sequences, the authors of [57] designed a global PWM for the genotypes of HCV genomes. Then, using the PWM, signatures were selected from the 5’ NCR, CORE, E1, and NS5B regions of the HCV genome. The predictive power of the selected signatures was then evaluated for predicting the most common HCV genotypes and subtypes.
Aside from DNA analysis, the PWM can also be applied to amino acid sequences. Authors in [58] developed an approach involving the position-specific scoring matrix (PSSM), another name for PWM, to predict protein–protein interactions between protein sequences. First, each protein is transformed into a PSSM, and then the PSSMs are adapted to detect distantly related proteins, the quaternary structural attributes of the proteins, and the proteins’ folding patterns. The research of in [59] proposes a PWM-based algorithm to predict signal peptide sequences and their cleavage positions in the amino acid sequences of bacteria and eukaryotes. Authors in [60] developed a PWM-based method for protein function prediction and proposed an argument for why the PWM and associated features have great potential for protein sequence analysis. Although the above methods are successful in their respective domains, they do not provide general means of designing a feature embedding for the underlying sequence, which contains rich information about the sequence and can be used as input to various machine learning algorithms.
The design of efficient feature vector-based representations has been studied in many domains, such as graph analytics [61,62], smart grid [63,64], electromyography (EMG) [65], clinical data analysis [66], network security [67], and text classification [68]. After the spread of COVID-19, efforts have been made to study the behavior of the virus using machine learning approaches. Several methods have been proposed recently for the classification of spike sequences. Authors in [33,69] used k-mers along with a kernel-based approach to classify SARS-COV-2 spike sequences. Authors in [32] proposed the use of one-hot encoding to classify the viral hosts of coronaviridae using spike sequences only. Although they were able to achieve higher predictive performance, some researchers in [33] showed that the k-mer-based approach performs better than the one-hot based approach, since it preserves sequence order information more effectively. Efficient clustering of spike sequences was performed in [35].

3. Proposed Approach

This section proposes an approach, PWM2Vec, to generate a fixed-length numerical feature embedding from coronavirus spike sequences for host specification. We also discuss the baseline approaches, specifically one-hot embedding (OHE) [32,34] and k-mer-based feature embedding [33,34]. We perform feature selection using ridge regression [70] on the resulting embedding before applying machine learning (ML) algorithms. This helps to reduce the dimensionality of the embedding, and hence the training time of the downstream ML algorithms.

3.1. One-Hot Embedding (OHE)

Machine learning algorithms require the input to be in a numerical format. It is necessary to process the (spike protein) sequence data into some numerical representation to apply these algorithms. One-hot embedding (OHE) [32] is a typical approach for obtaining a fixed-length numerical representation from sequence data. Considering an alphabet Σ , which contains the characters (amino acids) of the spike protein sequence, we need to map each character of Σ to a numerical (binary 0–1 vector) representation. We have 20 unique amino acids in the protein sequence data, namely, “ACDEFGHIKLMNPQRSTVWY.” We designed a feature vector for each amino acid. Each symbol has a length of 20 and has a value of 1 corresponding to the position of the character in the alphabet, and 0 for all other places in the alphabet. For example, amino acid Cysteine (C) is encoded as 001 0 . We then concatenated the numerical representations of all characters of each protein sequence into a single binary feature vector of this spike sequence. In our coronavirus spike protein sequence dataset, after multiple alignments, the length of each spike sequence was found to be 3498. Therefore, the length of each binary vector computed using OHE would be 3498 × 20 = 69,960.

3.2. k-mer-Based Frequency Vectors

One of the significant drawbacks of OHE is the high dimensionality of the resulting set of feature vectors. Another problem with OHE is that some (sequential) ordering information on the sequence’s characters (amino acids) is not preserved. An approach that addresses both of these problems is to use sub-strings (also called mers) of length k, i.e., k-mers. From a sequence, k-mers are generated by applying a sliding window of size k over the sequences (see Figure 2). Given a sequence of length N, the total number of k-mers that could be generated is as follows:
Total k - mers = ( N k ) + 1 .
In our experiments to generate k-mer-based frequency vectors, we used k = 3 (as done in [33,34]).
After generating the k-mers, we created a feature vector Φ (a frequency vector), which contains the frequency (count) of each k-mer occurring in the sequence [33,34]. Given some sequence σ with alphabet Σ , the length of feature vector Φ k ( σ ) will be | Σ | k . Since we are working with spike protein (amino acid) sequences and taking k = 3 in our experiments, the feature vector length we used is 20 3 = 8000 . This feature vector can be used as input for various ML algorithms. Note that generating sub-strings with a sliding window preserves some (sequential) ordering information on the characters (amino acids) of the (spike protein) sequences, which counters one of the drawbacks of the OHE approach. However, still, to get the frequency count for k-mers, we had a high computational cost for bin matching, especially for worst-case searches. Furthermore, the dimensionality of the frequency vectors is still high.

3.3. PWM2Vec

Even though the problem of the high dimensionality of the vectors generated in the OHE approach is somewhat mitigated in the k-mers approach, the dimensionality of the frequency vectors generated in the k-mers approach remains quite high—further improvements can certainly be made. Furthermore, if we can reduce the computational cost for bin matching, that would be a huge improvement in computational cost. To address these problems, we propose PWM2Vec, an approach for generating a fixed-length numerical feature vector based on the concept of the position-weight matrix [71].
While our approach is inspired by the value of the PWM for finding motifs in (e.g., protein) sequences, we used it in a slightly different way in this study. We built a PWM from the k-mers of our sequence, and our feature vector was the score of each k-mer from this PWM. This allowed us to take advantage of k-mers—their ability to capture locality information while also capturing the importance of the position of each amino acid in the sequence (information that is lost in computing the k-mer frequency vector). Combining these pieces of information in this way allows us to devise a compact and general feature embedding that can be used in many downstream ML tasks.
Our approach for feature vector generation, PWM2Vec, is summarized in Figure 3. It follows the steps (a–h) explained below. Figure 3a Given the input spike protein sequence shown in Figure 3b, we first extracted the k-mers (we used k = 9 in the experiments, which was decided using a standard validation set approach [72]). As in Figure 3c, we then generated a position frequency matrix, which contains the frequency count for each character at each position. Note that, in the example, since the (amino acid) sequence is composed of four characters, there are four possible characters at any position. At position 1, for example, in all five k-mers, there are two B characters, and so the frequency count of B at position 1 is two. In our experiments, since we had 20 unique amino acids in our spike protein sequence dataset, our PFMs had 20 rows and k = 9 columns. Figure 3d Next, we normalized the PFM matrix and created a position probability matrix (PPM) containing the probability of each (amino acid) character at each position. For example, the probability of B in the k-mers at position 1 is the following:
frequency count total count = 2 / 5 = 0.4
It is possible that the frequency (hence probability in the PPM) of a character at a certain position is 0. To avoid 0 values at any position in the matrix while calculating the probability, we added a Laplace estimator (also called pseudocount) to each value in the position probability matrix, as shown in Figure 3e. We used a pseudocount of 0.1 in our experiments [73]. We then computed a position weight matrix (PWM) from the adjusted probability matrix. We made the PWM by computing the log likelihood of each amino acid character c, i.e., c A , C , , Y , appearing at each position i according to
W c , i = log 2 p ( c , i ) p ( c ) { where   c A , B , C Z ( b a s e s ) }
Note that this likelihood was taken under the assumption that the expected frequency of each amino acid is the same (i.e., p ( c ) = 1 / | Σ | ) because we have 20 amino acids ( p ( c ) = 1 / 20 = 0.05 ). Figure 3f shows the computed position weight matrix (PWM). Note that a more nuanced calculation of p ( c ) specific to amino acid c could be performed, based on the number of codons n ( c ) in c, e.g., p ( c ) = n ( c ) / 61 , where 61 is the number of sense codons. Here, n ( c ) = 1 for M and W; 3 for I; 4 for V, P, T, A, and G; 6 for R, L, and S; and 2 for everything else. This, however, carries with it assumption that the four bases coding the nucleotide sequence from which this amino acid sequence originated appear with equal probability. Since we are unsure about such assumptions, and moreover, when testing out this calculation, the results did not change much, we adopted the standard definition of p ( c ) = 1 / 20 . In the future, when we scale this approach to millions of sequences, we will test this empirically to see if there is a separation at this larger scale between these to ways of calculating p ( c ) . This could indicate factors about the sequences, such as GC-enrichment.
After getting the PWM, we used it to compute the absolute scores for each individual k-mer generated from the sequence (see Figure 3g for an example). It is the sum of the scores of the bases for the index. The score for k-mer (BFDBEDDFF) is shown in Figure 4. The highlighted values in the matrices are summed up to give an absolute score for the k-mer, which sums up to 28.28 .
Finally, the scores of all the 9-mers are concatenated to get the final feature vector for the given sequence (see Figure 3h for an example). This whole process is repeated for each sequence.
Given a k-mer and a PWM, the score for that k-mer can be computed as given in Figure 4. The final length of PWM2Vec based feature vector is 3490, which is equal to the number of k-mers in each spike sequence.

3.4. Feature Selection Method

We use ridge regression (RR) as the feature selection approach, which is commonly used for estimating parameters, thereby addressing collinearity in multiple linear regression model problems [74,75]. This method uses a bias to boost the performance of the model by improving the variance and making the slope more horizontal. This is useful when we need to find out which of the independent attributes are not needed. This gives us the option of removing such columns (attributes) and bringing the slope to zero. The expression for performing ridge regression is the following:
m i n ( sum of square residuals + α × slope 2 )
where α × s l o p e 2 is a penalty term. For learning the optimal ridge regression line, we use 5 fold cross validation.
After performing RR in OHE, the total number of selected attributes was 22 , 322 ; for the k-mers approach it was 7088; and 1616 features were selected for the PWM2Vec-based approach.

4. Experimental Setup

This section describes the setup we used for the experiments, followed by the dataset statistics. We also give a visual representation of the data using t-SNE plots. All experiments were conducted using an Intel(R) Xeon(R) CPU E7-4850 v4 @ 2.40 GHz having Windows 10 64 bit OS with 32 GB memory. We implemented our algorithm in Python, and the code is available online for reproducibility (https://github.com/sarwanpasha/PWM2Vec, accessed on 8 March 2022). Our pre-processed data are also available at this link. For classification, we used support vector machine (SVM), naive Bayes (NB), multiple linear regression (MLP), k-nearest neighbors (KNN), random forest (RF), logistic regression (LR), and decision tree (DT). To compute results, we used the 5-fold cross validation approach. We divided the data randomly into training (70%) and testing (30%) sets. For the training data, we used 5-fold cross validation to optimize the parameters (divided the data into 5 equal parts, using 4 parts for training and 1 part for validation) and then tested the performance on the 30 % of unseen test data. We repeated this process 5 times (five training–test splits; then we used 5-fold cross validation to tune parameters and compute results on unseen test set) and report the average and standard deviation results.

4.1. Evaluation Metrics

To measure the performances of the classifiers, we used average accuracy, precision, recall, weighted, macro F1, and receiver operating characteristic curve “ROC” area under the curve “AUC” (one-vs.-rest approach) using the macro average. We also measured the training time (in seconds) for each classifier.
For clustering, we used the simple k-means algorithm and used 3 internal clustering quality metrics, namely, the silhouette coefficient, the Calinski–Harabasz score, and the Davies–Bouldin score to measure the performances of the clusters. We also show the runtimes for k-means for different embedding methods.

4.1.1. Silhouette Coefficient

The silhouette coefficient [76] is used for interpretation and validation of consistency within clusters of data. A clustering algorithm having well-defined (comparatively pure) clusters will have a higher silhouette coefficient value. The silhouette coefficient (SC) is computed as follows:
S C = y x m a x { y , x }
where x is the average distance between a sample and all other points in the data belonging to the same class, and y is the average distance between sample x and all other data points in the next nearest cluster.

4.1.2. Calinski–Harabasz Score

The Calinski–Harabasz score [77] is used to measure the quality of a clustering algorithm based on the mean between-clusters’ sum of squares. A clustering algorithm with well-defined clusters will have a higher Calinski–Harabasz score. The Calinski–Harabasz score is defined as the ratio of the between-clusters dispersion (the sum of distances squared) mean and the within-clusters dispersion. More formally, given a dataset D of size n D that has been clustered into j clusters, we used the following expression to compute Calinski–Harabasz (CH) score:
C H = t r ( B j ) t r ( W j ) × ( n D j ) ( j 1 )
where t r ( B j ) is the trace of the between cluster dispersion matrix and t r ( W j ) is the trace of the within-group dispersion matrix.

4.1.3. Davies–Bouldin Score

The Davies–Bouldin (DB) score [78] of a clustering C is defined as follows:
D B ( C ) = 1 | C | i = 1 | C | m a x j | C | , j i D i j
where D i j is the ratio of the “within-to-between cluster distances” of the ith and jth clusters. For each cluster, we computed the worst case ratio ( D i j ) of a within-to-between cluster distance between it and any other cluster, and then took the mean. Therefore, by minimizing the DB score, we could make sure that different clusters were separate from each other (a smaller value is better).

4.2. Dataset Collection and Statistics

The spike protein sequences of CoVs for all hosts used in this analysis were retrieved (on 21 September 2021) from the NIAD Virus Pathogen Database and Analysis Resource (ViPR) [79] and GISAID [26]. A total of 5568 complete protein sequence were collected (3358 from ViPR and 2210 from GISAID); we later dropped 10 that were not attributable to any host detail. The distribution of the dataset across the different host types (grouped by family) is shown in Table 1, which contains information about the 21 host types that we collected from the annotation of the sequences. We also divided the viral sequences themselves into genera and subgenera to see which category a specific coronavirus belongs to. Figure 5 and Figure 6 contain distributions of viral genera and subgenera, respectively. The multiple sequence alignment (MSA) for the sequence dataset was conducted using the Mafft alignment software with default parameter settings which automatically select the appropriate strategy according to the sequence data size. In our case, the gap opening penalty op was 1.53 and the gap extension penalty ep was 0.123 [80]. Given that our dataset was already sufficiently large and contained a number of unknown or identified amino acids, we were constrained to use the minimum accuracy parameter of Mafft MSA to allow the alignment to complete in a reasonable amount of time. Attempts to set more stringent parameters (op and ep) in order to improve this alignment resulted in runtimes >24 h. Since this is already the case when performing multiple alignments of even  5000 sequences, anything substantially larger is out of reach.

4.3. Data Visualization

In order to see if there is any natural (hidden) clustering in the data, we used the t-distributed stochastic neighbor embedding (t-SNE) [81] approach, which maps input sequences to 2D real vectors. The t-SNE plots for different embedding methods are shown in Figure 7, Figure 8 and Figure 9: t-SNE plots for OHE, k-mers, and PWM2Vec, respectively. We can observe that although with PWM2Vec, more information is included in lower-dimensional feature vectors, the proposed embedding approach was able to preserve the structure of data similarly to OHE and k-mers.

5. Results and Discussion

In this section, we present our results for PWM2Vec and compare its performance with the baseline one-hot embedding (OHE) and the more recent k-mer-based embedding approach, which has shown to be an improvement over OHE [33,34]. For classification, we also show the results for the feature selection method (ridge regression) for all embedding approaches. We also show the runtimes with different numbers of sequences for the best-performing classification algorithm. Finally, we show some statistical analysis on the data and on the feature vectors computed using different approaches.

5.1. Classification Results

Table 2 shows the average results for various embedding methods with various classification methods without performing any feature selection on the feature vectors. The standard deviations for 5-fold cross validation are shown in Table 3. We can see that RF with PWM2Vec is consistently performing better than other embedding methods (in some cases, the performance gain for PWM2Vec is on the third significant digit). Furthermore, the NB classifier with PWM2Vec was much better than other approaches in terms of training runtime. This behavior shows that PWM2Vec is not only better in terms of predictive performance but is also better in terms of runtime.
Table 4 contains averages of the classification results after applying ridge regression to different feature embedding approaches. The standard deviation values are shown in Table 5. We can again see that RF with PWM2Vec outperformed other embedding methods for the majority of the metrics, and NB with PWM2Vec was the best in terms of runtime.

Effect on Runtime

To evaluate the effect on runtime of the sequences, we used the best performing classifier (random forest) and used different embedding methods to perform classifications with increasing numbers of sequences. Figure 10 shows the runtimes for (a) OHE vs. PWM2Vec and (b) k-mers vs. PWM2Vec. In both cases, we can see that PWM2Vec is better in terms of runtime as we increase the number of sequences (on the x-axis).

5.2. Clustering Results

For clustering, we used the same feature embeddings that we used for the classification task. To get the optimal number of clusters, we used the elbow method [35]. This method, for different numbers of clusters (ranging from 2 to 30), performed clustering to see the trade-off between the runtime and the sum of squared error (distortion score). The optimal number of clusters selected was nine (see Figure 11).
For the purposes of clustering, we used the simple k-means algorithm. The results of clustering on different embedding methods are shown in Table 6. We can see that PWM2Vec was better in terms of silhouette coefficient and runtime, whereas the k-mer-based approach was better in terms of Calinski–Harabasz score and Davies–Bouldin score.

5.3. Statistical Analysis

To measure the importance of amino acids corresponding to the class label, we used the information gain (IG). The IG is defined as follows:
I G ( C l a s s , p o s i t i o n ) = H ( C l a s s ) H ( C l a s s | p o s i t i o n )
H = i C l a s s p i log p i
where H is the entropy, and p i is the probability of class i. Figure 12 shows the IG values for different amino acids corresponding to the class labels (hosts). We can see that some amino acids have higher IG values, which means that they play an important role in the prediction of hosts. Here, we can conclude that many amino acids contribute to the host specification, and less to SARS-CoV-2 variant specification [33], which was expected since the genomic variability within the family Coronaviridae should be much higher. The IG values for all amino acids are also available online for further analysis (https://github.com/sarwanpasha/PWM2Vec/tree/main/IG%20values, accessed on 8 March 2022).
When inspecting the IG values and how they are distributed more closely, in the range from 0 to 1.30 with a mean ( μ ) of 0.373 and a standard deviation ( σ ) of 0.438, we can see that 29 positions are more than 2 σ from this mean. In inspecting how these 29 high IG positions are distributed along the length of the amino acid sequence, we see that they range from 734 to 3443, with a median position 1458, and μ ± σ = 1610 ± 747 . Since the average Coronaviridae spike sequence of our dataset has length 1500 , this means that these high IG values tend to concentrate in the latter half of the spike sequence, which corresponds to the S2 subunit of the spike protein. In the case of SARS-CoV-2, the most studied of the Coronaviridae, the S2 subunit is composed of five domains, namely, the fusion peptide (FP), two heptad-repeat regions (HR1 and HR2), the transmembrane domain (TM), and the cytoplasmic tail (CT), and they are responsible for mediating viral cell membrane fusion and entry [20]. Each unit of this S2 subunit has been shown to play a key role in spike protein fusion activities [20,21]. Since the typical Coronaviridae sequence has a similar structure (see, e.g., https://www.uniprot.org/uniprot/P11224, accessed on 8 March 2022), it is believed that the typical S2 subunit carries out similar functions. The fact that these S2 subunits play important roles could indicate why such a range of positions have high IG values. A more complete study of this in terms of details of peptide structure would be an interesting future study.
Since information gain does not give us the negative (or opposite) contribution of an attribute (feature) corresponding to the class label (host names), we used other statistical measures, such as Spearman correlation [82], to further evaluate the contributions of features in the PWM2Vec-based feature vector. The Spearman correlation is computed using the following expression:
ρ = 1 6 d i 2 n ( n 2 1 )
where ρ is the Spearman’s rank correlation coefficient, d i is the difference between the two ranks of each observation, and n is the total number of observations.
The Spearman correlation and corresponding p-values for PWM2Vec are given in Figure 13. We can observe that most of the features contribute towards the prediction of different hosts. Table 7 contains the comparisons of correlation values computed using Spearman correlation for the different embedding methods. Here, we can observe that for a lower dimensional and more compact approach for feature embedding (PWM2Vec), the fraction of features having correlation values greater than the threshold (i.e., 0.3 and 0.3 ) is greater than that fraction generated by OHE, and is comparable with those given for k-mers (sometimes better also). This behavior shows that by using PWM2Vec, we were able to preserve more information in a smaller feature vector and improve the runtimes of underlying ML algorithms while giving better (sometimes comparable) predictive performance.

6. Conclusions

We proposed an approach called PWM2Vec to generate feature vector representations for the host preferences of different coronaviruses using spike sequences only, which can be used as input for different machine learning algorithms, such as classification and clustering. We show that our approach is not only efficient for generating feature vectors as compared to the popular method based on k-mers, but has comparable prediction accuracies and a much shorter training runtime. This behavior was also observed after applying the feature selection algorithm. We also provided some statistical analysis on the data and feature vectors to show the importance of attributes towards the prediction of class labels (hosts). This statistical analysis provided validation, from an independent point of view (in terms of the fraction of features statistically correlated to the label), of the compactness of our PWM2Vec embedding, compared to the baselines. In the future, we will focus on collecting more data to evaluate the scalability of PWM2Vec. Using unsupervised methods for dimensionality reduction is another future extension of this work. We would also like to use deep learning models such as LSTM and GRU for classification purposes in the future. The application of this to larger families of viruses could also be another interesting future direction. Using information gain and correlations (e.g., Spearman correlation) to study the structure of spike protein is another interesting future direction.

Author Contributions

Conceptualization, S.A.; Data curation, S.A., B.B., P.C., R.T.P. and M.P.; Investigation, P.C.; Methodology, S.A.; Project administration, S.A. and M.P.; Software, S.A.; Supervision, M.P.; Validation, S.A., P.C. and M.P.; Visualization, R.T.P.; Writing—original draft, S.A., B.B., P.C., R.T.P. and Y.Z.; Writing—review & editing, S.A., B.B., P.C., R.T.P., Y.Z. and M.P. All authors have read and agreed to the published version of the manuscript.

Funding

S.A. was supported by a Georgia State University (GSU) Molecular Basis of Disease (MBD) fellowship, B.B. was supported by the Chemistry department at GSU, and M.P. was supported by a GSU/department of Computer Science startup grant.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data for this study were obtained from the public databases Virus Pathogen Database and Analysis Resource (ViPR) (https://www.viprbrc.org/) and the Global Initiative on Sharing All Influenza Data (GISAID) (https://www.gisaid.org/) on 21 September 2021. Codes and pipelines for reproducing the results can be found at https://github.com/sarwanpasha/PWM2Vec (accessed on 8 March 2022).

Acknowledgments

We would like to thank an anonymous reviewer for comments which have improved this manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Majumder, J.; Minko, T. Recent Developments on Therapeutic and Diagnostic Approaches for COVID-19. AAPS J. 2021, 23, 14. [Google Scholar] [CrossRef] [PubMed]
  2. Zhou, P.; Yang, X.L.; Wang, X.G.; Hu, B.; Zhang, L.; Zhang, W.; Si, H.R.; Zhu, Y.; Li, B.; Huang, C.L.; et al. A pneumonia outbreak associated with a new coronavirus of probable bat origin. Nature 2020, 579, 270–273. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Johnson, W.E.; Eizirik, E.; Pecon-Slattery, J.; Murphy, W.J.; Antunes, A.; Teeling, E.; O’Brien, S.J. The Late Miocene Radiation of Modern Felidae: A Genetic Assessment. Science 2006, 311, 73–77. [Google Scholar] [CrossRef] [Green Version]
  4. Reusken, C.; BL, B.H.; MP, M.K. Dromedary camels and Middle East respiratory syndrome: MERS coronavirus in the ship of the desert. Ned. Tijdschr. Geneeskd. 2014, 158, A7806. [Google Scholar] [PubMed]
  5. King, A.M.; Adams, M.J.; Carstens, E.B.; Lefkowitz, E.J. (Eds.) Order—Nidovirales. In Virus Taxonomy; Elsevier: London, UK, 2012; pp. 784–794. [Google Scholar]
  6. Yüce, M.; Filiztekin, E.; Özkaya, K.G. COVID-19 diagnosis—A review of current methods. Biosens. Bioelectron. 2021, 172, 112752. [Google Scholar] [CrossRef]
  7. Li, W.; Wong, S.K.; Li, F.; Kuhn, J.H.; Huang, I.C.; Choe, H.; Farzan, M. Animal origins of the severe acute respiratory syndrome coronavirus: Insight from ACE2-S-protein interactions. J. Virol. 2006, 80, 4211–4219. [Google Scholar] [CrossRef] [Green Version]
  8. Li, F. Structure, function, and evolution of coronavirus spike proteins. Annu. Rev. Virol. 2016, 3, 237–261. [Google Scholar] [CrossRef] [Green Version]
  9. Mungroo, M.R.; Khan, N.A.; Siddiqui, R. The increasing importance of the novel Coronavirus. Hosp. Pract. 2021, 49, 1–11. [Google Scholar] [CrossRef]
  10. Satija, N.; Lal, S.K. The molecular biology of SARS coronavirus. Ann. N. Y. Acad. Sci. 2007, 1102, 26. [Google Scholar] [CrossRef]
  11. Li, C.; Ji, F.; Wang, L.; Wang, L.; Hao, J.; Dai, M.; Liu, Y.; Pan, X.; Fu, J.; Li, L.; et al. Asymptomatic and human-to-human transmission of SARS-CoV-2 in a 2-family cluster, Xuzhou, China. Emerg. Infect. Dis. 2020, 26, 1626. [Google Scholar] [CrossRef]
  12. Guan, W.J.; Ni, Z.Y.; Hu, Y.; Liang, W.H.; Ou, C.Q.; He, J.X.; Liu, L.; Shan, H.; Lei, C.L.; Hui, D.S.; et al. Clinical characteristics of coronavirus disease 2019 in China. N. Engl. J. Med. 2020, 382, 1708–1720. [Google Scholar] [CrossRef] [PubMed]
  13. Delia Grace Randolph. Preventing the Next Pandemic—Zoonotic Diseases and How to Break the Chain of Transmission Report United Nations. 2020. Available online: https://www.unep.org/resources/report/preventing-future-zoonotic-disease-outbreaks-protecting-environment-animals-and (accessed on 6 July 2020).
  14. Haider, N.; Rothman-Ostrow, P.; Osman, A.Y.; Arruda, L.B.; Macfarlane-Berry, L.; Elton, L.; Thomason, M.J.; Yeboah-Manu, D.; Ansumana, R.; Kapata, N.; et al. COVID-19—Zoonosis or emerging infectious disease? Front. Public Health 2020, 8, 763. [Google Scholar] [CrossRef] [PubMed]
  15. Salian, V.S.; Wright, J.A.; Vedell, P.T.; Nair, S.; Li, C.; Kandimalla, M.; Tang, X.; Carmona Porquera, E.M.; Kalari, K.R.; Kandimalla, K.K. COVID-19 transmission, current treatment, and future therapeutic strategies. Mol. Pharm. 2021, 18, 754–771. [Google Scholar] [CrossRef] [PubMed]
  16. Han, G.Z. Pangolins harbor SARS-CoV-2-related coronaviruses. Trends Microbiol. 2020, 28, 515–517. [Google Scholar] [CrossRef]
  17. Li, L.; Wang, X.; Hua, Y.; Liu, P.; Zhou, J.; Chen, J.; An, F.; Hou, F.; Huang, W.; Chen, J. Epidemiological Study of Betacoronaviruses in Captive Malayan Pangolins. Front. Microbiol. 2021, 12, 398. [Google Scholar] [CrossRef]
  18. Umakanthan, S.; Sahu, P.; Ranade, A.V.; Bukelo, M.M.; Rao, J.S.; Abrahao–Machado, L.F.; Dahal, S.; Kumar, H.; Dhananjaya, K. Origin, transmission, diagnosis and management of coronavirus disease 2019 (COVID-19). Postgrad. Med. J. 2020, 96, 753–758. [Google Scholar]
  19. Rosales-Mendoza, S.; Márquez-Escobar, V.A.; González-Ortega, O.; Nieto-Gómez, R.; Arévalo-Villalobos, J.I. What does plant-based vaccine technology offer to the fight against COVID-19? Vaccines 2020, 8, 183. [Google Scholar] [CrossRef] [Green Version]
  20. Huang, Y.; Yang, C.; Xu, X.f.; Xu, W.; Liu, S.w. Structural and functional properties of SARS-CoV-2 spike protein: Potential antivirus drug development for COVID-19. Acta Pharmacol. Sin. 2020, 41, 1141–1149. [Google Scholar] [CrossRef]
  21. Wang, Q.; Zhang, Y.; Wu, L.; Niu, S.; Song, C.; Zhang, Z.; Lu, G.; Qiao, C.; Hu, Y.; Yuen, K.Y.; et al. Structural and functional basis of SARS-CoV-2 entry by using human ACE2. Cell 2020, 181, 894–904. [Google Scholar] [CrossRef]
  22. Kuo, L.; Godeke, G.J.; Raamsman, M.J.; Masters, P.S.; Rottier, P.J. Retargeting of coronavirus by substitution of the spike glycoprotein ectodomain: Crossing the host cell species barrier. J. Virol. 2000, 74, 1393–1406. [Google Scholar] [CrossRef] [Green Version]
  23. Casais, R.; Dove, B.; Cavanagh, D.; Britton, P. Recombinant avian infectious bronchitis virus expressing a heterologous spike gene demonstrates that the spike protein is a determinant of cell tropism. J. Virol. 2003, 77, 9084–9089. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Hadfield, J.; Megill, C.; Bell, S.; Huddleston, J.; Potter, B.; Callender, C.; Sagulenko, P.; Bedford, T.; Neher, R. Nextstrain: Real-time tracking of pathogen evolution. Bioinformatics 2018, 34, 4121–4123. [Google Scholar] [CrossRef] [PubMed]
  25. Minh, B.Q.; Schmidt, H.A.; Chernomor, O.; Schrempf, D.; Woodhams, M.D.; von Haeseler, A.; Lanfear, R. IQ-TREE 2: New Models and Efficient Methods for Phylogenetic Inference in the Genomic Era. Mol. Biol. Evol. 2020, 37, 1530–1534. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  26. GISAID Website. 2021. Available online: https://www.gisaid.org/ (accessed on 29 December 2021).
  27. Creevey, C.J.; Fitzpatrick, D.A.; Philip, G.K.; Kinsella, R.J.; O’Connell, M.J.; Pentony, M.M.; Travers, S.A.; Wilkinson, M.; McInerney, J.O. Does a tree–like phylogeny only exist at the tips in the prokaryotes? Proc. R. Soc. Lond. Ser. B Biol. Sci. 2004, 271, 2551–2558. [Google Scholar] [CrossRef] [Green Version]
  28. Baum, B.R. Combining trees as a way of combining data sets for phylogenetic inference, and the desirability of combining gene trees. Taxon 1992, 41, 3–10. [Google Scholar] [CrossRef]
  29. Akanni, W.A.; Creevey, C.J.; Wilkinson, M.; Pisani, D. LU St: A tool for approximated maximum likelihood supertree reconstruction. BMC Bioinform. 2014, 15, 183. [Google Scholar] [CrossRef] [Green Version]
  30. Li, T.; Liu, D.; Yang, Y.; Guo, J.; Feng, Y.; Zhang, X.; Cheng, S.; Feng, J. Phylogenetic supertree reveals detailed evolution of SARS-CoV-2. Sci. Rep. 2020, 10, 22366. [Google Scholar] [CrossRef]
  31. Melnyk, A.; Mohebbi, F.; Knyazev, S.; Sahoo, B.; Hosseini, R.; Skums, P.; Zelikovsky, A.; Patterson, M. From Alpha to Zeta: Identifying variants and subtypes of SARS-CoV-2 via clustering. J. Comput. Biol. 2021, 28, 1113–1129. [Google Scholar] [CrossRef]
  32. Kuzmin, K.; Adeniyi, A.E.; DaSouza, A.K., Jr.; Lim, D.; Nguyen, H.; Molina, N.R.; Xiong, L.; Weber, I.T.; Harrison, R.W. Machine learning methods accurately predict host specificity of coronaviruses based on spike sequences alone. Biochem. Biophys. Res. Commun. 2020, 533, 553–558. [Google Scholar] [CrossRef]
  33. Ali, S.; Sahoo, B.; Ullah, N.; Zelikovskiy, A.; Patterson, M.; Khan, I. A k-mer based approach for SARS-CoV-2 variant identification. In Proceedings of the International Symposium on Bioinformatics Research and Applications, Shenzhen, China, 26–28 November 2021; pp. 153–164. [Google Scholar]
  34. Ali, S.; Patterson, M. Spike2vec: An efficient and scalable embedding approach for COVID-19 spike sequences. In Proceedings of the IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021; pp. 1533–1540. [Google Scholar]
  35. Ali, S.; Tamkanat-E-Ali.; Khan, M.A.; Khan, I.; Patterson, M. Effective and scalable clustering of SARS-CoV-2 sequences. In International Conference on Big Data Research (ICBDR); ACM: New York, NY, USA, 2021. [Google Scholar]
  36. Tayebi, Z.; Ali, S.; Patterson, M. Robust Representation and Efficient Feature Selection Allows for Effective Clustering of SARS-CoV-2 Variants. Algorithms 2021, 14, 348. [Google Scholar] [CrossRef]
  37. Storato, D.; Comin, M. K2Mem: Discovering Discriminative K-mers from Sequencing Data for Metagenomic Reads Classification. IEEE/ACM Trans. Comput. Biol. Bioinform. 2022, 19, 220–229. [Google Scholar] [CrossRef] [PubMed]
  38. Solis-Reyes, S.; Avino, M.; Poon, A.; Kari, L. An open-source k-mer based machine learning tool for fast and accurate subtyping of HIV-1 genomes. PLoS ONE 2018, 13, e0206409. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  39. Queyrel, M.; Prifti, E.; Templier, A.; Zucker, J.D. Towards end-to-end disease prediction from raw metagenomic data. bioRxiv 2020. [Google Scholar] [CrossRef]
  40. Wood, D.; Salzberg, S. Kraken: Ultrafast metagenomic sequence classification using exact alignments. Genome Biol. 2014, 15, R46. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  41. Kawulok, J.; Deorowicz, S. CoMeta: Classification of Metagenomes Using k-mers. PLoS ONE 2015, 10, e0121453. [Google Scholar] [CrossRef] [Green Version]
  42. Ambrosini, G.; Groux, R.; Bucher, P. PWMScan: A fast tool for scanning entire genomes with a position-specific weight matrix. Bioinformatics 2018, 34, 2483–2484. [Google Scholar] [CrossRef] [Green Version]
  43. Bhagwat, M.; Aravind, L. Psi-blast tutorial. In Comparative Genomics; Springer: Berlin/Heidelberg, Germany, 2007; pp. 177–186. [Google Scholar]
  44. Bailey, T.L.; Elkan, C. Fitting a mixture model by expectation maximization to discover motifs in bipolymers. Proc. Int. Conf. Intell. Syst. Mol. Biol. 1994, 2, 28–36. [Google Scholar]
  45. Lawrence, C.E.; Altschul, S.F.; Boguski, M.S.; Liu, J.S.; Neuwald, A.F.; Wootton, J.C. Detecting subtle sequence signals: A Gibbs sampling strategy for multiple alignment. Science 1993, 262, 208–214. [Google Scholar] [CrossRef] [Green Version]
  46. Xia, X. Position weight matrix, gibbs sampler, and the associated significance tests in motif characterization and prediction. Scientifica 2012, 2012, 917540. [Google Scholar] [CrossRef] [Green Version]
  47. Hashim, F.A.; Mabrouk, M.S.; Al-Atabany, W. Review of different sequence motif finding algorithms. Avicenna J. Med. Biotechnol. 2019, 11, 130. [Google Scholar]
  48. Sinha, S.; Tompa, M. YMF: A program for discovery of novel transcription factor binding sites by statistical overrepresentation. Nucleic Acids Res. 2003, 31, 3586–3588. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  49. Gao, Z.; Liu, L.; Ruan, J. Logo2PWM: A tool to convert sequence logo to position weight matrix. BMC Genom. 2017, 18, 47–54. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  50. Yang, J.; Ramsey, S.A. A DNA shape-based regulatory score improves position-weight matrix-based recognition of transcription factor binding sites. Bioinformatics 2015, 31, 3445–3450. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  51. Stormo, G.D. DNA binding sites: Representation and discovery. Bioinformatics 2000, 16, 16–23. [Google Scholar] [CrossRef]
  52. Boeva, V. Analysis of genomic sequence motifs for deciphering transcription factor binding and transcriptional regulation in eukaryotic cells. Front. Genet. 2016, 7, 24. [Google Scholar] [CrossRef] [Green Version]
  53. Wright, H.; Cohen, A.; Sönmez, K.; Yochum, G.; McWeeney, S. Occupancy classification of position weight matrix-inferred transcription factor binding sites. PLoS ONE 2011, 6, e26160. [Google Scholar] [CrossRef] [Green Version]
  54. Bi, Y.; Kim, H.; Gupta, R.; Davuluri, R.V. Tree-based position weight matrix approach to model transcription factor binding site profiles. PLoS ONE 2011, 6, e24210. [Google Scholar] [CrossRef] [Green Version]
  55. Nandi, S.; Ioshikhes, I. Optimizing the GATA-3 position weight matrix to improve the identification of novel binding sites. BMC Genom. 2012, 13, 416. [Google Scholar] [CrossRef] [Green Version]
  56. Wu, Q.; Wang, J.; Yan, H. An improved position weight matrix method based on an entropy measure for the recognition of prokaryotic promoters. Int. J. Data Min. Bioinform. 2011, 5, 22–37. [Google Scholar] [CrossRef]
  57. Qiu, P.; Cai, X.Y.; Ding, W.; Zhang, Q.; Norris, E.D.; Greene, J.R. HCV genotyping using statistical classification approach. J. Biomed. Sci. 2009, 16, 62. [Google Scholar] [CrossRef] [Green Version]
  58. Wang, Y.B.; You, Z.H.; Li, X.; Jiang, T.H.; Chen, X.; Zhou, X.; Wang, L. Predicting protein–protein interactions from protein sequences by a stacked sparse autoencoder deep neural network. Mol. Biosyst. 2017, 13, 1336–1344. [Google Scholar] [CrossRef] [PubMed]
  59. Hiller, K.; Grote, A.; Scheer, M.; Münch, R.; Jahn, D. PrediSi: Prediction of signal peptides and their cleavage positions. Nucleic Acids Res. 2004, 32, W375–W379. [Google Scholar] [CrossRef] [PubMed]
  60. cheol Jeong, J.; Lin, X.; Chen, X.W. On position-specific scoring matrix for protein function prediction. IEEE/ACM Trans. Comput. Biol. Bioinform. 2010, 8, 308–315. [Google Scholar] [CrossRef] [PubMed]
  61. Ali, S.; Shakeel, M.H.; Khan, I.; Faizullah, S.; Khan, M.A. Predicting attributes of nodes using network structure. ACM Trans. Intell. Syst. Technol. (TIST) 2021, 12, 1–23. [Google Scholar] [CrossRef]
  62. Ahmad, M.; Ali, S.; Tariq, J.; Khan, I.; Shabbir, M.; Zaman, A. Combinatorial trace method for network immunization. Inf. Sci. 2020, 519, 215–228. [Google Scholar] [CrossRef] [Green Version]
  63. Ali, S.; Mansoor, H.; Arshad, N.; Khan, I. Short term load forecasting using smart meter data. In Proceedings of the International Conference on Future Energy Systems, Phoenix, AZ, USA, 25–28 June 2019; pp. 419–421. [Google Scholar]
  64. Ali, S.; Mansoor, H.; Khan, I.; Arshad, N.; Khan, M.A.; Faizullah, S. Short-term load forecasting using AMI data. arXiv 2019, arXiv:1912.12479. [Google Scholar]
  65. Ullah, A.; Ali, S.; Khan, I.; Khan, M.A.; Faizullah, S. Effect of Analysis Window and Feature Selection on Classification of Hand Movements Using EMG Signal. In SAI Intelligent Systems Conference (IntelliSys); Springer: Heidelberg, Germany, 2020; pp. 400–415. [Google Scholar]
  66. Ali, S.; Zhou, Y.; Patterson, M. Efficient Analysis of COVID-19 Clinical Data using Machine Learning Models. arXiv 2021, arXiv:2110.09606. [Google Scholar]
  67. Ali, S.; Alvi, M.K.; Faizullah, S.; Khan, M.A.; Alshanqiti, A.; Khan, I. Detecting ddos attack on sdn due to vulnerabilities in openflow. In Proceedings of the 2019 International Conference on Advances in the Emerging Computing Technologies (AECT), Al Madinah Al Munawwarah, Saudi Arabia, 10 February 2020; pp. 1–6. [Google Scholar]
  68. Shakeel, M.H.; Faizullah, S.; Alghamidi, T.; Khan, I. Language independent sentiment analysis. In Proceedings of the 2019 International Conference on Advances in the Emerging Computing Technologies (AECT), Al Madinah Al Munawwarah, Saudi Arabia, 10 February 2020; pp. 1–5. [Google Scholar]
  69. Ali, S.; Bello, B.; Patterson, M. Classifying COVID-19 Spike Sequences from Geographic Location Using Deep Learning. arXiv 2021, arXiv:2110.00809. [Google Scholar]
  70. Hoerl, A.E.; Kannard, R.W.; Baldwin, K.F. Ridge regression: Some simulations. Commun. Stat.-Theory Methods 1975, 4, 105–123. [Google Scholar] [CrossRef]
  71. Stormo, G.D.; Schneider, T.D.; Gold, L.; Ehrenfeucht, A. Use of the ‘Perceptron’ algorithm to distinguish translational initiation sites in E. coli. Nucleic Acids Res. 1982, 10, 2997–3011. [Google Scholar] [CrossRef] [Green Version]
  72. Devijver, P.; Kittler, J. Pattern Recognition: A Statistical Approach; Prentice-Hall: London, UK, 1982; pp. 1–448. [Google Scholar]
  73. Nishida, K.; Frith, M.C.; Nakai, K. Pseudocounts for transcription factor binding sites. Nucleic Acids Res. 2009, 37, 939–944. [Google Scholar] [CrossRef] [PubMed]
  74. McDonald, G.C. Ridge regression. Wiley Interdiscip. Rev. Comput. Stat. 2009, 1, 93–100. [Google Scholar] [CrossRef]
  75. Ali, S.; Ciccolella, S.; Lucarella, L.; Vedova, G.D.; Patterson, M. Simpler and faster development of tumor phylogeny pipelines. J. Comput. Biol. 2021, 28, 1142–1155. [Google Scholar] [CrossRef] [PubMed]
  76. Rousseeuw, P.J. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 1987, 20, 53–65. [Google Scholar] [CrossRef] [Green Version]
  77. Caliński, T.; Harabasz, J. A dendrite method for cluster analysis. Commun. Stat.-Theory Methods 1974, 3, 1–27. [Google Scholar] [CrossRef]
  78. Davies, D.L.; Bouldin, D.W. A cluster separation measure. IEEE Trans. Pattern Anal. Mach. Intell. 1979, PAMI-1, 224–227. [Google Scholar] [CrossRef]
  79. Pickett, B.E.; Sadat, E.L.; Zhang, Y.; Noronha, J.M.; Squires, R.B.; Hunt, V.; Liu, M.; Kumar, S.; Zaremba, S.; Gu, Z.; et al. ViPR: An open bioinformatics database and analysis resource for virology research. Nucleic Acids Res. 2012, 40, D593–D598. [Google Scholar] [CrossRef]
  80. Rozewicki, J.; Li, S.; Amada, K.M.; Standley, D.M.; Katoh, K. MAFFT-DASH: Integrated protein sequence and structural alignment. Nucleic Acids Res. 2019, 47, W5–W10. [Google Scholar] [CrossRef]
  81. Van der M., L.; Hinton, G. Visualizing data using t-SNE. J. Mach. Learn. Res. (JMLR) 2008, 9, 2579–2605. [Google Scholar]
  82. Myers, L.; Sirois, M.J. Spearman correlation coefficients, differences between. Encycl. Stat. Sci. 2004, 12. [Google Scholar] [CrossRef]
Figure 1. The genome of a coronavirus ranges from 26 to 32 kb in length [5], each of them coding for two non-structural and four structural proteins. The non-structural proteins are coded in ORF1ab, which contains the RNA-dependent RNA polymerase gene (RdRp). The structural genes include spike (S), envelope (E), membrane (M), and nucleocapsid (N). The S gene region encodes the spike protein, which is responsible for attaching the virus to receptors on the host cell membrane.
Figure 1. The genome of a coronavirus ranges from 26 to 32 kb in length [5], each of them coding for two non-structural and four structural proteins. The non-structural proteins are coded in ORF1ab, which contains the RNA-dependent RNA polymerase gene (RdRp). The structural genes include spike (S), envelope (E), membrane (M), and nucleocapsid (N). The S gene region encodes the spike protein, which is responsible for attaching the virus to receptors on the host cell membrane.
Biology 11 00418 g001
Figure 2. Generating 3-mers ( k = 3 ) from a spike protein sequence using a sliding window. Since this sequence has length 13, the total number of k-mers generated is 13 − 3 + 1 = 11 (Equation (1)).
Figure 2. Generating 3-mers ( k = 3 ) from a spike protein sequence using a sliding window. Since this sequence has length 13, the total number of k-mers generated is 13 − 3 + 1 = 11 (Equation (1)).
Biology 11 00418 g002
Figure 3. Building a feature vector for classification models by computing the position weight matrix (PWM) from the k-mers of a sequence.
Figure 3. Building a feature vector for classification models by computing the position weight matrix (PWM) from the k-mers of a sequence.
Biology 11 00418 g003
Figure 4. Computing the score from the PWM using a sliding window on a sequence for a 9-m.
Figure 4. Computing the score from the PWM using a sliding window on a sequence for a 9-m.
Biology 11 00418 g004
Figure 5. Pie chart for the distribution of different genera in the dataset.
Figure 5. Pie chart for the distribution of different genera in the dataset.
Biology 11 00418 g005
Figure 6. Pie chart for the distribution of different subgenera in the dataset.
Figure 6. Pie chart for the distribution of different subgenera in the dataset.
Biology 11 00418 g006
Figure 7. t-SNE plots for one-hot encoding.
Figure 7. t-SNE plots for one-hot encoding.
Biology 11 00418 g007
Figure 8. t-SNE plots for k-mers.
Figure 8. t-SNE plots for k-mers.
Biology 11 00418 g008
Figure 9. t-SNE plots for PWM2Vec.
Figure 9. t-SNE plots for PWM2Vec.
Biology 11 00418 g009
Figure 10. Runtime comparison for different embedding methods with increasing numbers of sequences using the random forest classifier (best performing classifier). The figure is best seen in color.
Figure 10. Runtime comparison for different embedding methods with increasing numbers of sequences using the random forest classifier (best performing classifier). The figure is best seen in color.
Biology 11 00418 g010
Figure 11. The elbow method for optimal number of clusters.
Figure 11. The elbow method for optimal number of clusters.
Biology 11 00418 g011
Figure 12. Information gain for each amino acid position with respect to hosts.
Figure 12. Information gain for each amino acid position with respect to hosts.
Biology 11 00418 g012
Figure 13. Spearman correlation for PWM2Vec.
Figure 13. Spearman correlation for PWM2Vec.
Biology 11 00418 g013
Table 1. Dataset statistics for 5558 coronavirus hosts.
Table 1. Dataset statistics for 5558 coronavirus hosts.
Host Name# of SequencesHost Name# of Sequences
Humans1813Rats26
Environment1034Pangolins21
Weasel994Hedgehog15
Swine558Dolphin7
Birds374Equine5
Camels297Fish2
Bats153Unknown2
Cats123Python2
Bovines88Monkey2
Dogs40Cattle1
Turtle1
Table 2. Performance comparison (average results for 5-fold cross validation) for different embedding methods and different classifiers without using any feature selection approach. Best values are shown in bold.
Table 2. Performance comparison (average results for 5-fold cross validation) for different embedding methods and different classifiers without using any feature selection approach. Best values are shown in bold.
Acc.Prec.RecallF1 (Weig.)F1 (Macro)ROC AUCTrain Time (S)
SVM0.810.820.810.810.690.82389.128
NB0.680.810.680.660.650.8056.741
MLP0.760.750.760.740.430.70390.289
OHEKNN0.790.780.790.780.540.7716.211
RF0.830.830.820.820.660.82151.911
LR0.820.830.830.820.700.8348.786
DT0.820.830.820.810.630.8021.581
SVM0.800.810.800.810.640.8252.384
NB0.640.760.660.650.470.739.031
MLP0.810.820.810.810.520.7744.982
k-mersKNN0.810.800.810.790.550.752.917
RF0.820.830.830.810.630.8117.252
LR0.820.840.810.820.680.8248.826
DT0.810.820.810.800.640.814.096
SVM0.800.810.800.810.710.8540.55
NB0.460.700.460.400.470.761.56
MLP0.800.810.810.790.570.7817.28
PWM2VecKNN0.820.810.820.810.580.792.86
RF0.850.850.850.840.720.845.44
LR0.820.820.820.820.710.8443.35
DT0.810.810.820.810.660.833.46
Table 3. Performance comparison (standard deviation results for 5-fold cross validation) for different embedding methods and different classifiers without using any feature selection approach.
Table 3. Performance comparison (standard deviation results for 5-fold cross validation) for different embedding methods and different classifiers without using any feature selection approach.
Acc.Prec.RecallF1 (Weig.)F1 (Macro)ROC AUC
SVM0.00930.01050.00970.01030.03890.0292
NB0.01560.01440.01550.01770.02550.0202
MLP0.00240.00640.00260.00420.04930.0300
OHEKNN0.01210.01150.01260.01330.05580.0270
RF0.01950.00950.01150.01170.05820.0262
LR0.00830.00480.00840.00930.03070.0236
DT0.01790.01620.01760.01850.05360.0298
SVM0.00950.01010.00910.01020.03750.0235
NB0.01320.01640.01250.01260.02630.0245
MLP0.00120.00630.00290.00350.04650.0339
k-mersKNN0.01180.01910.01350.01730.05940.0227
RF0.01350.00630.01160.01930.05410.0235
LR0.00630.00250.00430.00160.03250.0269
DT0.01320.01350.01650.01420.05190.0148
SVM0.00250.01650.00430.01250.03430.0232
NB0.01430.01420.01560.01750.02510.0204
MLP0.00560.00540.00270.00750.04750.0303
PWM2VecKNN0.01250.01740.01930.01240.05680.0210
RF0.01850.00350.01650.01430.05650.0296
LR0.00430.00570.00930.00150.03570.0253
DT0.01360.01930.01560.01650.05420.0235
Table 4. Performance comparison (average results for 5-fold cross validation) for different embedding methods and different classifiers using ridge regression as the feature selection approach. Best values are shown in bold.
Table 4. Performance comparison (average results for 5-fold cross validation) for different embedding methods and different classifiers using ridge regression as the feature selection approach. Best values are shown in bold.
Acc.Prec.RecallF1 (Weig.)F1 (Macro)ROC AUCTrain Time (s)
SVM0.830.830.830.820.670.8163.992
NB0.630.750.630.610.530.779.436
MLP0.820.820.820.800.510.7564.636
OHEKNN0.780.780.780.780.610.812.730
RF0.830.830.830.820.590.8122.423
LR0.830.820.830.830.650.8426.094
DT0.830.830.830.820.600.836.316
SVM0.810.810.810.810.730.8730.877
NB0.670.780.670.670.640.834.012
MLP0.830.830.830.830.580.8126.280
k-mersKNN0.800.800.800.800.690.831.601
RF0.820.820.810.820.730.876.786
LR0.820.820.810.820.790.8839.501
DT0.830.830.830.830.700.882.429
SVM0.780.790.780.780.750.8924.53
NB0.410.640.410.400.380.680.94
MLP0.810.810.810.800.670.829.85
PWM2VecKNN0.800.800.800.790.620.801.55
RF0.840.840.840.850.800.865.06
LR0.800.810.800.800.660.9021.76
DT0.800.800.800.800.640.822.00
Table 5. Performance comparison (standard deviation results for 5-fold cross validation) for different embedding methods and different classifiers using ridge regression as the feature selection approach.
Table 5. Performance comparison (standard deviation results for 5-fold cross validation) for different embedding methods and different classifiers using ridge regression as the feature selection approach.
Acc.Prec.RecallF1 (Weig.)F1 (Macro)ROC AUC
SVM0.00990.01080.00970.00910.04810.0232
NB0.02350.02320.02310.01380.04310.0270
MLP0.01470.01460.01430.01540.05440.0252
OHEKNN0.01220.01320.01210.01240.05670.0267
RF0.00900.01080.00980.00990.06900.0242
LR0.00750.00850.00730.00840.04320.0258
DT0.01180.01350.01130.01280.05380.0278
SVM0.00920.01060.00920.00870.04920.0237
NB0.02300.02450.02310.01350.04390.0277
MLP0.01370.01330.01360.01410.05520.0259
k-mersKNN0.01300.01410.01310.01300.06140.0289
RF0.00960.01170.00930.01060.06840.0249
LR0.00750.00830.00790.00850.04380.0242
DT0.01280.01470.01270.01390.05820.0274
SVM0.00960.00960.00970.00940.05400.0261
NB0.02050.02560.02050.01470.03820.0295
MLP0.01500.01080.01560.01520.06560.0313
PWM2VecKNN0.01450.01640.01440.01510.06660.0312
RF0.01120.01310.01130.01210.07730.0288
LR0.00810.00920.00870.00930.04030.0282
DT0.01490.01690.01500.01620.05650.0311
Table 6. Internal clustering quality metrics for k-means. Best values are show in bold.
Table 6. Internal clustering quality metrics for k-means. Best values are show in bold.
Evaluation Metrics
MethodsSilhouette CoefficientCalinski–Harabasz ScoreDavies–Bouldin ScoreRuntime (s)
OHE0.6312210.3431.354177.54
k-mers0.73514,296.170.53436.57
PWM2Vec0.7502563.5471.31423.67
Table 7. Correlation values for different embedding approaches computed using Spearman correlation. We show the count (No.) and fraction (frac.) of feature values greater than or less than the threshold (0.3 or −0.3). The fractions were computed by taking the size of the embedding as the denominator (69,900 for OHE, 8000 for k-mers, and 3490 for PWM2Vec).
Table 7. Correlation values for different embedding approaches computed using Spearman correlation. We show the count (No.) and fraction (frac.) of feature values greater than or less than the threshold (0.3 or −0.3). The fractions were computed by taking the size of the embedding as the denominator (69,900 for OHE, 8000 for k-mers, and 3490 for PWM2Vec).
Spearman Correlation
>0.3<−0.3
MethodsNo.Frac.No.Frac.
OHE6640.0079710.011
k-mers5570.0407050.050
PWM2Vec4190.120330.009
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ali, S.; Bello, B.; Chourasia, P.; Punathil, R.T.; Zhou, Y.; Patterson, M. PWM2Vec: An Efficient Embedding Approach for Viral Host Specification from Coronavirus Spike Sequences. Biology 2022, 11, 418. https://doi.org/10.3390/biology11030418

AMA Style

Ali S, Bello B, Chourasia P, Punathil RT, Zhou Y, Patterson M. PWM2Vec: An Efficient Embedding Approach for Viral Host Specification from Coronavirus Spike Sequences. Biology. 2022; 11(3):418. https://doi.org/10.3390/biology11030418

Chicago/Turabian Style

Ali, Sarwan, Babatunde Bello, Prakash Chourasia, Ria Thazhe Punathil, Yijing Zhou, and Murray Patterson. 2022. "PWM2Vec: An Efficient Embedding Approach for Viral Host Specification from Coronavirus Spike Sequences" Biology 11, no. 3: 418. https://doi.org/10.3390/biology11030418

APA Style

Ali, S., Bello, B., Chourasia, P., Punathil, R. T., Zhou, Y., & Patterson, M. (2022). PWM2Vec: An Efficient Embedding Approach for Viral Host Specification from Coronavirus Spike Sequences. Biology, 11(3), 418. https://doi.org/10.3390/biology11030418

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop