Abstract
A network is scale-free if its connectivity density function is proportional to a power-law distribution. It has been suggested that scale-free networks may provide an explanation for the robustness observed in certain physical and biological phenomena, since the presence of a few highly connected hub nodes and a large number of small-degree nodes may provide alternate paths between any two nodes on average—such robustness has been suggested in studies of metabolic networks, gene interaction networks and protein folding. A theoretical justification for why many networks appear to be scale-free has been provided by Barabási and Albert, who argue that expanding networks, in which new nodes are preferentially attached to highly connected nodes, tend to be scale-free. In this paper, we provide the first efficient algorithm to compute the connectivity density function for the ensemble of all homopolymer secondary structures of a user-specified length—a highly nontrivial result, since the exponential size of such networks precludes their enumeration. Since existent power-law fitting software, such as powerlaw, cannot be used to determine a power-law fit for our exponentially large RNA connectivity data, we also implement efficient code to compute the maximum likelihood estimate for the power-law scaling factor and associated Kolmogorov–Smirnov p value. Hypothesis tests strongly indicate that homopolymer RNA secondary structure networks are not scale-free; moreover, this appears to be the case for real (non-homopolymer) RNA networks.
Similar content being viewed by others
1 Introduction
The connectivity (or degree) of a node v in a network (or undirected graph) is the number of nodes (or neighbors) of s, connected to v by an edge. A network is said to be scale-free if its connectivity function N(k), which represents the number of nodes having degree k, satisfies the property that \(N(a\cdot k) = b\cdot N(x)\), the unique solution of which is a power-law distribution, which by definition satisfies \(N(k) \propto {k^{-\alpha }}\) for some scaling factor \(\alpha >1\) (Newman 2006). Scale-free networks contain a few nodes of high degree and a large number of nodes of small degree, hence may provide a reasonable model to explain the robustnessFootnote 1 often manifested in biological networks—such robustness or resilience must, of course, be present for life to exist.
Barabasi and Albert (1999) analyzed the emergence of scaling in random networks, and showed that two properties, previously not considered in graph theory, were responsible for the power-law scaling observed in real networks: (1) networks are not static, but grow over time, (2) during network growth, a highly connected node tends to acquire even more connections—the latter concept is known as preferential attachment. In Barabasi and Albert (1999), it was argued that preferential attachment of new nodes implies that the degree N(k) with which a node in the network interacts with k other nodes decays as a power-law, following \(N(k) \propto k^{-\alpha }\), for \(\alpha >1\). This argument provides a plausible explanation for why diverse biological and physical networks appear to be scale-free. Indeed, various publications have suggested that the the following biological networks are scale-free: protein–protein interaction networks (Ito et al. 2000; Schwikowski et al. 2000), metabolic networks (Ma and Zeng 2003), gene interaction networks (Tong et al. 2004), yeast co-expression networks (Van Noort et al. 2004), and protein folding networks (Bowman and Pande 2010).
How scale-free are biological networks?
The validity of a power-law fit for previously studied biological networks was first called into question in Khanin and Wit (2006), where 10 published data sets of biological interaction networks were shown not to be fit by a power-law distribution, despite published claims to the contrary. Estimating an optimal power-law scaling factor by maximum likelihood and using \(\chi ^2\) goodness-of-fit tests, it was shown in Khanin and Wit (2006) that not a single one of the 10 interaction networks had a nonzero probability of being drawn from a power-law distribution; nevertheless, some of the interaction networks could be fit by a truncated power-law distribution. The data analyzed by the authors included data from protein–protein interaction networks (Ito et al. 2000; Schwikowski et al. 2000), gene interaction networks determined by synthetic lethal interactions (Tong et al. 2004), metabolic interaction networks (Ma and Zeng 2003), etc.
In Clauset et al. (2009), 24 real-world data sets were analyzed from a variety of disciplines, each of which had been conjectured to follow a power-law distribution. Estimating an optimal power-law scaling factor by maximum likelihood and using goodness-of-fit tests based on likelihood ratios and on the Kolmogorov–Smirnov statistic for non-normal data, it was shown in Clauset et al. (2009) that some of the conjectured power-law distributions were consistent with claims in the literature, while others were not. For instance, Clauset et al. (2009) found sufficient statistical evidence to reject claims of scale-free behavior for earthquake intensity and metabolic degree networks, while there was insufficient evidence to reject such claims for networks of protein interaction, Internet, and species per genus.
It is possible to come to opposite conclusions, depending on whether \(\chi ^2\) or Kolmogorov–Smirnov (KS) statistics are used to test the hypothesis whether a network is scale-free, i.e. follows a (possibly truncated) power-law distribution. Indeed, Khanin and Wit (2006) obtained a p value of \(<10^{-4}\) for \(\chi ^2\) goodness-of-fit for a truncated power-law distribution for the protein–protein interaction data from Ito et al. (2000), while Clauset et al. (2009) obtained a p value of 0.31 for KS goodness-of-fit for a truncated power-law for the same data.
In this paper, we introduce the first efficient algorithm to compute the exact number of homopolymer RNA secondary structures having k neighboring structures, for each value of k, that can be reached by adding or deleting one base pair. Since there are exponentially many secondary structures, our \(O(n^5)\) time and \(O(n^3)\) space algorithm uses dynamic programming. By applying the Kolmogorov–Smirnov test, we then show that homopolymer RNA secondary structure networks are not scale-free. We also provide evidence that the same is true for real RNA networks. Prior to this paper, only fragmentary results were possible by exhaustively enumerating all secondary structures having free energy within a certain range obove the minimum free energy (Wuchty 2003).
Our work investigates properties of the ensemble of RNA secondary structures, considered as a network, and so extends results of Clote (2015), which described a cubic time dynamic programming algorithm to compute the expected network degree. The RNA connectivity algorithm described in Sect. 2.3 is completely unrelated to that of Clote (2015), and allows one to compute all finite moments, including mean, variance, skew, etc.
The plan of the remaining paper is as follows. Section 2 presents a brief summary of basic definitions, followed by a description of an efficient dynamic programming algorithm to determine the absolute [resp. relative] frequencies N(k) [resp. p(k)] for secondary structure connectivity of a given homopolymer, which allows non-canonical base pairs. Section 3 presents the statistical methods used to both fit RNA connnectivity data to a power-law distribution and to perform a goodness-of-fit test using Kolmogorov–Smirnov distance. Section 4 shows that RNA networks are not scale-free, by performing (computationally efficient) Kolmogorov–Smirnov bootstrapping tests. Section 5 presents concluding remarks, while the Appendix presents data that suggests that RNA networks satisfy a type of preferential attachment. The rigorous proof that RNA networks satisfy modified form of preferential attachment is suppressed for reasons of space, but is available in the preprint (Clote 2018).
2 Computing degree frequency
Section 2.1 presents basic definitions and notation used; Sect. 2.2 presents an algorithm to compute the frequency of each degree less than K in the ensemble of all secondary structures with run time \(O(K^2 n^4)\) and memory requirements \(O(K n^3)\). Section 2.3 presents a more efficient algorithm, with run time \(O(K^2 n^3)\) and memory requirements \(O(K n^2)\), for the special case of a homopolymer, in which all possible non-canonical base pairs are permitted. We implemented both algorithms in Python, cross-checked for identical results, and call the resulting code RNAdensity. Since this paper is a theoretical contribution on network properties, we focus only on homopolymers and do not present the details necessary to extend the algorithm of Sect. 2.2 to non-homopolymer RNA, where base pairs are required to be Watson–Crick or GU wobble pairs—such an algorithm is possible to develop, using ideas of Sect. 2.2; however, since the resulting complexity is formidible, with \(O(n^9)\) time and \(O(n^7)\) space requirements, and since there are no obvious applications, we do not pursue such an extension.
2.1 Preliminaries
A secondary structure for a length nhomopolymer is a set s of base pairs (i, j), such that (1) there exist at least \(\theta \) unpaired bases in every hairpin, where \(\theta \) is usually taken to be 3, though sometimes 1 in the literature, (2) there are no basd triples, so for \((i,j), (k,\ell ) \in s\), if \(\{ i,j \} \cap \{k,\ell \} \ne \emptyset \), then \(i=k\) and \(j=\ell \), (3) there do not exist base pairs \((i,j), (k,\ell ) \in s\), such that \(i<k<j<\ell \); i.e. a secondary structure is a type of outerplanar graph, where each base pair \((i,j) \in s\) satisfies \(j-i>\theta \). The free energy of a homopolymer secondary structure s is defined to be \(-1\) times the number |s| of base pairs in s [Nussinov–Jacobson energy model (Nussinov and Jacobson 1980)]. Since entropic effects are ignored, this is not a real free energy; however it allows us to use the standard notation “MFE” for ‘minimum free energy’. Note that the MFE structure for a length n homopolymer has \(\lfloor \frac{n-\theta }{2} \rfloor \) many base pairs.
For a given RNA sequence, consider the exponentially large network of all its secondary structures, where an undirected edge exists between any two structures s and t, whose base-pair distance equals one—in other words, for which t is obtained from s by either removing or adding one base pair. The connectivity (or degree) of a node, or structure, s is defined to be the number of secondary structures obtained by deleting or adding one base pair to s—this corresponds to the so-called \(MS_1\) move set (Flamm et al. 2000). At the end of the paper, we briefly consider the \(MS_2\) move set, where the degree of a structure s is defined to be the number of secondary structures obtained by adding, deleting or shifting one base pair (Bayegan and Clote 2015). The \(MS_1\) [resp. \(MS_2\)] connectivity of the MFE structure for a homopolymer of length n is \(\lfloor \frac{n-\theta }{2} \rfloor \) [resp. \(\lceil \frac{n-\theta }{2} \rceil \)]. ConnectivityN(k) is defined to be the absolute frequency of degree k, i.e. the number of secondary structures having exactly k neighbors, that can be obtained by either adding or removing a single base pair. The degree densityp(k) is defined to be the probability density function (PDF) or relative frequency of k, i.e. the proportion \(p(k) = \frac{N(k)}{Z}\) of all secondary structures having k neighbors, where Z denotes the total number of secondary structures for a given homopolymer. A network is defined to be scale-free, provided its degree frequency N(k) is proportional to a power-law, i.e. \(N(k) \propto k^{-\alpha }\) where \(\alpha >1\) is the scaling factor.
2.2 Computing the degree density
In this section, we describe a novel dynamic programming algorithm to compute the \(MS_1\)degree densityp(k) for the network of secondary structures for a homopolymer of length n. Note first that the empty structure \(s_{\emptyset }\) of length n has
many neighbors, each obtained by adding a base pair. Indeed,
Using a simple induction argument, Eq. (1) implies that for all values of n, the maximum possible degree, \(\text{ maxDegree }(n)\), of a secondary structure for the length n homopolymer is \(\frac{(n-\theta )(n-\theta -1)}{2}\)
Let N(i, j) denote the number of secondary structures on interval [i, j], computed the following simple recurrence relation from Stein and Waterman (1978): for \(1\le i\le j \le i+\theta \le n\), set \(N(i,j)=1\), and for \(i+\theta +1 \le j \le n\) set
or more simply
Although Eq. (2) requires \(O(n^3)\) time and \(O(n^2)\) space, it can trivially be extended to compute the number of secondary structures for an arbitary RNA sequence \(a_1,\ldots ,a_n\), where base pairs are either Watson–Crick or wobble pairs. If no such extension is necessary, then the recurrence relation Eq. (3), first given in Stein and Waterman (1978), requires \(O(n^2)\) time and O(n) space, hence is more efficient by a factor of n. In a similar fashion, the recurrence relations (5–12) and pseudocode in Sect. 2.2 are given in a form that allows an extension (not given here) to the general case of computing the degree density for the ensemble of secondary structures of a given RNA sequence \(a_1,\ldots ,a_n\). The top-level pseudocode given in Algorithm 1 requires \(O(n^6)\) time and \(O(n^4)\) storage; however, in the next section, we improve this by a factor of n, both in time and space requirements.
Suppose that every hairpin loop is required to have at least \(\theta \ge 1\) unpaired positions; i.e. if (i, j) is a base pair, then \(i+\theta +1 \le j\). As described in the Eqs. (5–12) for Base Cases A–D, let Z(i, j, k, h, v) denote the number of secondary structures on the interval [i, j], for \(1 \le i \le j \le n\) for the homopolymer model, that have exactly k neighbors, and for which there are exactly h unpaired positions (or holes) in \([i,j-\theta -1]\), and for which there are exactly \(v \in [0,\theta +1]\) visible positions among \(j-\theta ,j-\theta +1,\ldots ,j\). Concretely, this means that either(i)\(v=\theta +1\) and the rightmost \(\theta +1\) positions in the interval [i, j] are all unpaired, or(ii) that \(0 \le v < \theta +1\), and that position \(j-v\) is paired to some \(r \in [i,j-v-\theta -1]\). In base case D and inductive case D below, we will treat the two possible subcases of (i), in which the rightmost \(\theta +1\) positions are unpaired – namely, the subcase (i)\(_a\) in which \(j-\theta \) is unpaired (hence the rightmost \(j-\theta +1\) positions are unpaired), and the subcase (i)\(_b\) in which position \(j-\theta \) is paired with some \(r \in [i,j-v-\theta -1]\).
Let \(Z^*(i,j,k)\) denote the number of secondary structures on the interval [i, j] that have exactly k neighbors with respect to the \(MS_1\) move set (i.e. have degree k), so that
Recalling from Eq. (1) that \(\text{ maxDegree }(n) = \frac{(n-\theta )(n-\theta -1)}{2}\), for any \(1 \le i\le j \le n\), we clearly have that
In the sequel, we describe Base Cases A–D, which initialize the arrays Z(i, j, k, h, v) and \(Z^*(i,j,k)\), followed by Inductive Cases A–D, which treat the corresponding updates within the for-loops of the following pseudocode. Since arrays \(Z,Z^*\) are initially set to zero, all updates to the arrays will be performed by adding a value val to the current value held in the array, so we will write \(Z(i,j,k,h,v) \mathrel {+}=\text{ val }\) and \(Z^*(i,j,k) \mathrel {+}=\text{ val }\), which is a standard abbreviation for the assignments \(Z(i,j,k,h,v) = Z(i,j,k,h,v)+\text{ val }\) and \(Z^*(i,j,k) = Z^*(i,j,k)+\text{ val }\). Explatory comments in the pseudocode are indicated by a double-slash. In Algorithm 1, assume a positive integer input of n to indicate a length n homopolymer.
In line 1, arrays \(Z,Z^*\) are initialized to zero, then Base Cases A–D are applied; lines 2–9 then treat the Inductive Cases A–D. In this dynamic programming (DP) algorithm, the idea is to define \(Z,Z^*\) for all intervals [i, j] where \(d=j-i\), after having computed and stored the values for \(Z,Z^*\) for all intervals [i, j] where \(j-i=d-1\). All secondary structures of the interval [i, j] can be partitioned into structures having exactly degree k (i.e. k\(MS_1\) neighbors, in which k structures that can be obtained by either adding or removing a single base pair). To support an inductive argument, in proceeding from interval [i, j] to \([i,j+1]\), we need additionally to determine the number of structures having degree k, which have a certain number h of positions that are visible (external to every base pair), which can be paired with the last position \(j+1\). Note that the position \(j-\theta \) can not be base-paired with j in [i, j]; however, \(j-\theta \)can be base-paired with j in \([i,j+1]\). Thus in addition to keeping track of the number h of holes (positions in \(i,\ldots ,j-\theta -1\) that are external to all base pairs, hence can be paired with j), we introduce the variable v to keep track of the number of visible positions in \(j-\theta ,\ldots ,j\). This explains our need for the function Z(i, j, k, h, v) as defined in the Eqs. (5–12) for Base Cases A–D. We now proceed to the details, where for ease of the reader, some definitions are repeated.
Let \(\theta =3\) denote the minimum number of unpaired positions required to be present in a hairpin loop. For a length n homopolymer, let \(1 \le i \le j \le n\), \(0 \le k \le {{n-\theta } \atopwithdelims ()2}\), \(0 \le h \le j-i-\theta \), \(0 \le v \le \theta +1\). Recall that Z(i, j, k, h, v) denotes the number of secondary structures on the interval [i, j], for \(1 \le i \le j \le n\) for the homopolymer model, that have exactly k neighbors, and for which there are exactly h unpaired positions (or holes) in \([i,j-\theta -1]\), and for which there are exactly \(v \in [0,\theta +1]\) visible positions among \(j-\theta ,j-\theta +1,\ldots ,j\). For \(0 \le v \le \theta \), this means that position \(j-v\) is base-paired to some \(r \in [i,j-v-\theta -1]\) while positions \(j-v,j-v+1,\ldots ,j\) are not base-paired to any position in [i, j]. When \(v=\theta +1\), this means simply that the rightmost \(\theta +1\) positions in the interval [i, j] are all unpaired.
Recall as well our definition that \(Z^*(i,j,k) = \sum _h \sum _v Z(i,j,k,h,v)\). We begin by initializing \(Z(i,j,k,h,v)=0\) for all values in corresponding ranges. Letting N(i, j) denote the number of secondary structures on [i, j] for the homopolymer model, as computed by Eq. (2), the following recurrences describe an algorithm that requires \(O(K \cdot n^3)\) storage and \(O(K^2 \cdot n^4)\) time to compute the probability \(Prob[ \mathrm{deg}(s) = k] = \frac{Z^*(1,n,k)}{N(1,n)}\) that a (uniformly chosen) random secondary structure has degree k for \(0 \le k \le K\), where K is a user-defined constant bounded above by \(\text{ maxDegree }(n) = \frac{(n-\theta )(n-\theta -1)}{2}\).
Base Case A considers all structures on [i, j], as depicted in Fig. 1, that are too small to have any base pairs, hence which have degree zero.
Base Case A: For \(j-i \le \theta \), define
Base Case B considers all structures on [i, j], as depicted in Fig. 2, that have only base pair (i, j), since other potential base pairs would contain fewer than \(\theta \) unpaired bases. The degree of such structures is 1, since only one base pair can be removed, and no base pairs can be added. Moreover, no position in [i, j] is external to the base pair (i, j), so visibility parameters \(h=0,v=0\). The arrow in Fig. 2 indicates that the sole neighbor is the empty structure, obtained by removing the base pair (i, j).
Base Case B: For \(j-i = \theta +1\) and (i, j) is a base pair, define
Base Case C considers the converse situation, consisting of the empty structure on [i, j] where \(j-i = \theta +1\), whose sole neighbor is the structure consisting of base pair (i, j). The arrow is meant to indicate that the structure on the right is the only neighbor of that on the left, as depicted in Fig. 3. Since the size of the empty structure on [i, j] is \(\theta +2\) and every position in [i, j] is visible (external to every base pair), \(h=1\) and \(v=\theta +1\). the dotted rectangle in Fig. 3 indicates the \(\theta +1\) unpaired positions at the right extremity as counted by \(v=\theta +1\).
Base Case C: For \(j-i = \theta +1\) and (i, j) not base-paired, define
Base Case D considers the empty structure on [i, j] where \(j-i>\theta +1\). The empty structure is the only structure having degree maxDegree\((i,j) = \frac{(j-i-\theta +1)(j-i-\theta )}{2}\), since maxDegree(i, j) many base pairs can be added to the empty structure. In Fig. 4, the dotted rectangle indicates the \(\theta +1\) rightmost unpaired positions, corresponding to visibility parameter \(v=\theta +1\), while dotted circles indicate the \(h = j-i-\theta \) holes, i.e. unpaired positions that could be paired with the rightmost position j.
Base Case D: For all \((j-i+1) > \theta +2\), the empty structure, as indicated by \(h+v=j-i+1\) (so \(h=j-i-\theta \) and \(v=\theta +1\)), has degree maxDegree(i, j) as defined by Eq. 1, where
Inductive Case A considers the case where left and right extremities i, j form the base pair (i, j), where \(j-i>\theta +1\). No position in [i, j] is visible (external to all base pairs), so visibility parameters \(h=0=v\). Recalling the definition of \(Z^*(i,j,k)\) from Eq. 4, we have the following.
Inductive Case A: For \(j-i > \theta +1\) and (i, j) base-paired in [i, j],
From this point on, we use the operator \(\mathrel {+}=\), so that the previous equation would be written as \(Z(i,j,k,0,0) \mathrel {+}=Z^*(i+1,j-1,k-1)\) (see Fig. 5).
Inductive Case B considers the case where last position j base-pairs with the r, where \(i<r<j-\theta \). The value \(r=i\) has already been considered in Inductive Case A, and values \(r=j-\theta +1,\ldots ,j-1\) cannot base-pair to j, since the corresponding hairpin loop would constain less than \(\theta \) unpaired positions. This situation is depicted in Fig. 6, where there are h holes (positions in \([i,j-\theta -1]\) that are external to all base pairs) and no visible positions in \([j-\theta ,j]\).
Inductive Case B: For \(j-i > \theta +1\) and (r, j) base-paired in [i, j] for some \(i<r<j-\theta \),
When implemented, this requires a check that \(h-w \ge 0\).
For each value \(v \in \{1,\ldots ,\theta +1\}\), inductive Case C(v) considers the case where position \(r \in [i,j-v-\theta -1]\) forms a base pair with position \(j-v\). The value \(v=0\) is not considered here, since it was already considered in Inductive Cases A,B. Note that a structure s of the format has k neighbors, provided the restriction of s to \([i,r-1]\) has \(k_1\) neighbors, and the restriction of s to \([r+1,j-1]\) has \(k_2\) neighbors, where \(k_1+k_2+vh+1=k\). The term vh is due to the fact that since base pair \((r,j-v)\) ensures that all holes are located in \([i,r-1]\), hence located at more than \(\theta +1\) distance from all visible positions in \([j-v+1,j]\), a neighbor of s can be obtained by adding a base pair from any hole to any visible suffix position—there are vh many such possible base pairs that can be added. Finally, the last term \(+1\) is present, since one neighbor of s can obtained by removing base pair \((r,j-v)\). This explains the summation indices and summation terms in Eq. (11). Figure 7 depicts a typical structure considered in case C(v).
Inductive Case C(v), for\(v \in \{1,2,\ldots ,\theta +1\}\): For \(j-i > \theta +1\) and \((r,j-v)\) base-paired in [i, j], for some \(i<r<j-v-\theta \), where \(j-v+1,\ldots ,j\) are unpaired in [i, j],
The first term \(Z^*(2,j-1-v,k-1-vh)\) handles the subcase where \(r=1\), so that \((1,j-v)\) is a base pair, while the second term handles the subcase where \(r>1\). Note that when implemented, this requires a test that \(h-w\ge 0\).
Case D considers the case where there are h holes, and positions \(j-\theta -1,\ldots ,j\) are unpaired, so that \(v=\theta +1\). Note that \(v=\theta +1\) implies only that \(j-\theta ,\ldots ,j\) are unpaired, so Case D includes the addition requirement that position \(j-\theta -1\) is unpaired. Structures s satisfying Case D can be partitioned into subcases where the restriction of s to \([i,j-\theta -1]\) has \(h-w\) holes in \([i,(j-\theta -1)-(\theta +1)] = [i,j-2\theta -2]\), and \(1 \le w \le \theta +1\) visible positions in \([j-2\theta -1,j-\theta -1]\). Note that \((h-w)+w=h\), accounting for the h holes in structure s in \([i,j-\theta -1]\), and that it is essential that \(w\ge 1\), since the case \(w=0\) was considered in Case \(C(\theta +1)\).
The term \(\frac{w(w+1)}{2}\) is due to the fact that the rightmost position \(j-\theta -1\) in the restriction of s to \([i,j-\theta -1]\) can base-pair with position j, but not with \(j-1\), etc. since this would violate the requirement of at least \(\theta \) unpaired bases in a hairpin loop. Similarly, the second rightmost position \(j-\theta -2\) in the restriction of s to \([i,j-\theta -1]\) can base-pair with positions j and \(j-1\), but not with \(j-2\), etc.; as well, the third rightmost position \(j-\theta -3\) can base-pair with positions j, \(j-1\) and \(j-2\), but not with \(j-3\), etc. The number of neighbors of s produced in this fashion is thus \(\sum _{i=1}^w i = \frac{w(w+1)}{2}\). Finally, the term \((\theta +1)(h-w)\) is due to the fact that each of the \(h-w\) holes in the restriction of s to \([i,j-\theta -1]\) can base-pair to each of the \((\theta +1)\) positions in \([j-\theta ,j]\).
The argument just given shows the following. Let s be a structure that satisfies conditions of Case D with h holes and \(v=\theta +1\) visible positions, and suppose that the restriction of s to \([i,j-\theta -1]\) has \(h-w\) holes and w visible positions. Then s has k neighbors provided that the restriction of s to \([i,j-\theta -1]\) has \(k-\frac{w(w+1)}{2} - (\theta +1)(h-w)\) neighbors on interval \([i,j-\theta -1]\). The Eq. (12) now follows.
Inductive Case D: For \(j-i > \theta +1\) and \(j-\theta -1,j-\theta ,\ldots ,j\) unpaired in [i, j], and \(1 \le h < j-\theta -i\),
As in Case C(v), when implemented, this requires a test that \(h-w\ge 0\) (see Fig. 8).
Our implementation of Eqs. (5–12) has been cross-checked with exhaustive enumeration; moreover, we always have that \(\sum _{k} Z^*(i,j,k) = N(i,j)\), so the degree density is correctly computed.
2.3 Faster algorithm in the homopolymer case
The algorithm described in Sect. 2.2 requires \(O(K^2n^4)\) time and \(O(Kn^3)\) space, where K is a user-specified degree bound \(K \le \frac{(n-\theta )(n-\theta -1)}{2}\). By minor changes, that algorithm can be modified to compute the degree density function \(p(k) = \frac{Z^*(1,n,k)}{N(1,n)}\) for any given RNA sequence \(a_1,\ldots ,a_n\). In the case of a homopolymer, any two positions are allowed to base-pair (regardless of whether the base pair is a Watson–Crick or wobble pair), provided only that every hairpin loop contains at least \(\theta \) unpaired positions. For homopolymers, we have a faster algorithm that requires \(O(K^2 n^3)\) time and \(O(Kn^2)\) space. Since nucleotide identity is unimportant, instead of Z(i, j, k, h, v), we describe the function \({{{\widehat{Z}}}} (m,k,h,v)\), where m corresponds to the length \(j-i+1\) of interval [i, j].
We begin by initializing \({{{\widehat{Z}}}} (m,k,h,v)=0\) for all \(1 \le m \le n\), \(0 \le k \le \frac{(m-\theta )(m-\theta -1)}{2}\), \(0 \le h \le m-2\), and \(0 \le v \le \theta +1\). If \(h<0\), we assume that \({{{\widehat{Z}}}} (m,k,h,v)=0\).
Base Case A: For \(1 \le m \le \theta +1\), define
Base Case B: For \(m = \theta +2\), define
Base Case C: For \(m = \theta +2\), define
Base Case D: For all \(m > \theta +2\), define
Inductive Case A: For \(m > \theta +2\) and \(1 \le k \le \frac{(m-\theta )(m-\theta -1)}{2}\), define
Inductive Case B: For \(m > \theta +2\), \(1 \le k < \frac{(m-\theta )(m-\theta -1)}{2}\), and \(0 \le h \le m-\theta -1\), define
When implemented, this requires a check that \(h-w \ge 0\).
Inductive Case C(v): For \(v \in \{1,2,\ldots ,\theta +1\}\) and \(m > \theta +2\), define
Inductive Case D: For \(m > \theta +2\), \(1 \le k < \frac{(m-\theta )(m-\theta -1)}{2}\), and \(1 \le h < m-\theta -1\),
Note that h is strictly less than \(m-\theta -1\), since the case \(h=m-\theta -1\) occurs only when additionally \(v=\theta +1\), which only arises in the empty structure. The general case for the empty structure was handled in Base Case D. When implemented, this requires a check that \(h-w \ge 0\).
3 Statistical methods
Current software for probability distribution fitting of connectivity data, such as Matlab™, Mathematica™, R and powerlaw (Alstott et al. 2014), appear to require an input file containing the connectivity of each node in the network. In the case of RNA secondary structures, this is only possible for very small sequence length. To analyze connectivity data computed by the algorithm of Sect. 2.3, we had to implement code to compute the maximum likelihood estimation for scaling factor \(\alpha \) in a power-law fit, the optimal degree \(k_{min}\) beyond which connectivity data is fit by a power-law, and the associated p value for Kolmogorov–Smirnov goodness-of-fit, as described in Clauset et al. (2009). We call the resulting code RNApowerlaw. This section explains those details.
Recall the definition of the zeta function
We use both the generalized zeta function (22), as well as the truncated generalized zeta function (23), defined respectively by
Given a data set \(D = \{x_1,\ldots ,x_n\}\) of positive integers in the range \([k_0,k_1]\), the likelihood \(L(D|\alpha )\) that the data fits a truncated power-law with scaling factor \(\alpha \) and range \([k_0,k_1]\) is defined by
Rather than sampling individual RNA secondary structures to estimate the connectivity of the secondary structure network for a given homopolymer, the algorithms from Sects. 2.2 and 2.3 directly compute the exact number N(k) of secondary structures having degree k, for all k within a certain range. It follows that the likelihood \(L(D|\alpha )\) that secondary structure connectivity fits a power-law with scaling factor \(\alpha \) is given by
hence the log likelihood is is given by
The parameter \({\widehat{\alpha }}\) which maximizes the log likelihood is determined by applying SciPy function minimize (with Nelder-Mead method) to the negative log likelihood, starting from initial estimate \(\alpha _0\), taken from equation (3.7) of Clauset et al. (2009)
which in our notation yields
In results and tables of this paper, we often write the maximum likelihood estimate (MLE) \({\widehat{\alpha }}\) simply as \(\alpha \).
We compute the Kolmogorov–Smirnov (KS) p value, following (Clauset et al. 2009), as follows. Given observed relative frequency distribution D and a power-law fit P with scaling factor \(\alpha \), the KS distance is defined to be the maximum, taken over all \(k \in [k_0,k_1]\) of the absolute difference between the cumulative distribution function (CDF) for the data evaluated at k, and the CDF for the power-law, evaluated at k
where \(C_a\) and \(C_f\) are the actual and fitted cumulative density functions, respectively. The KS p value for the fit of data D by power-law P with scaling factor \(\alpha \), is determined by (1) sampling a large number (\(N=1000\)) of synthetic data sets \(D_i\) from a true power-law distribution with scaling factor \(\alpha \), (2) computing the KS distance between each synthetic data set \(D_i\) and its power law fit with MLE scaling factor \(\alpha _i\), (3) reporting the proportion of KS distances that exceed the KS distance between the original observed data set and its power-law fit with scaling factor \(\alpha \).
Following (Clauset et al. 2009), \(k_{\mathrm{min}}\) is chosen to be that degree \(k_0\), such that the KS distance for the optimal power-law fit is smallest. In contrast, \(k_{max}\) is always taken to be the maximum degree in the input data. Our computation of p value for goodness-of-fit follows Sect. 4.1 of Clauset et al. (2009), with the exception that we not generate any synthetic data for values \(k< k_{max}\), since the MLE scaling factor \(\alpha \) is determined for the (normalized) distribution of data values in the interval \([k_{min}, k_{max}]\), a convention followed in Alstott et al. (2014). We have implemented Python code to compute \(\alpha _0\), \(\alpha \), \(k_{min}\), KS distance, p value, etc. as described above. In Sect. 4, we compare results of our code with that from powerlaw (Alstott et al. 2014) for very small homopolymers. Though our code does not do lognormal fits, this is performed by powerlaw, where the density function for the lognormal distribution with parameters \(\mu ,\sigma \) is defined by
In computing the p value for power-law goodness-of-fit using Kolmogorov–Smirnov statistics, it is necessary to sample synthetic data from a (discrete) power-law distribution with scaling factor \(\alpha \), a particular type of multinomial distribution. Given an arbitrary multinomial distribution with probability \(p_i\) for each \(1\le i \le m\), it is straightforward to create M synthetic data sets, each containing N sampled values, in time O(mNM); however, since \(M=1000\) and N is the (exponentially large) number of all secondary structures having degrees in \([k_{min}, k_{max}]\), the usual sequential method would require prohibitive run time. Instead, we implemented the much faster conditional method (Malefaki and Iliopoulos 2007). Our goal is to sample from a multinomial distribution given by
where \(m = k_{max}-k_{min}+1\) is the number of degrees in the synthetic data, and in the sample set of size N there are \(x_i\) many occurrences of degree \(k_{min}+i\). To do this, we sample \(X_1\) from the binomial distribution of N coin tosses with heads probability \(p_1\), then \(X_2\) from the binomial distribution of \(N-x_1\) coin tosses with heads probability \(\frac{p_2}{1-p_1}\), then \(X_3\) from the binomial distribution of \(N-x_1-x_2\) coin tosses with heads probability \(\frac{p_2}{1-p_1-p_2}\), etc. where each \(x_i\) is determined with the function binom from Python Scipy.stats.
4 Results
Below, we use the algorithms described in previous sections to compute RNA secondary structure connectivity, determine optimal scaling factor \(\alpha \) and minimum degree \(k_{min}\) for a power-law fit, then perform Kolmogorov–Smirnov bootstrapping to determine the goodness-of-fit for parameters \(\alpha ,k_{min}\). In Appendix A, we show that preferential attachment appears to hold for the network of RNA structures, at least for our definition of preferential attachment.
4.1 Analysis of RNA networks using RNAdensity and RNApowerlaw
The algorithm RNAdensity described in Sect. 2.3 was used to compute absolute and relative degree frequencies for the following cases: (1) homopolymers of length \(n=10,12,\ldots ,40\) with \(\theta =3\) for maximum possible degree upper bound \(K= \frac{(n-\theta )(n-\theta -1)}{2}\), (2) homopolymers of length \(n=30,35,\ldots ,150\) with \(\theta =3\), where degree upper bound \(K=2n\) for \(n\in [30,100]\) and \(K=n+30\) for \(n \in [105,150]\), (3) homopolymers of length \(n=30,35,\ldots ,150\) with \(\theta =1\), where degree upper bound \(K=2n\) for \(n\in [30,100]\) and \(K=n+30\) for \(n \in [105,150]\). For small homopolymers of length at most 30, optima values for \(k_{min}\), power-law scaling factor \(\alpha \), Kolmogorov–Smirnov distance were determined using software powerlawpowerlaw (Alstott et al. 2014) as well as RNApowerlaw from Sect. 3. Table 1 summarizes these results, which show the agreement between powerlaw and RNApowerlaw. Moreover, both both programs indicate that formal hypothesis testing rejects the null hypothesis that a power-law distribution fits connectivity data; indeed, powerlaw determines a negative log odds ratio R for the logarithm of power-law likelihood over lognormal likelihood, indicating a better fit for the lognormal distribution, and RNApowerlaw determines small p values for Kolmogorov–Smirnov goodness-of-fit of a power-law distribution. Figure 9a shows connectivity density function for a 100-mer, with overlaid Poisson and lognormal distributions—since Erdös-Rényi random graphs have a Poisson degree distribution (Albert and Barabási 2002), it follows that RNA secondary structure networks are strikingly different than random graphs. Figure 9b shows a portion of the power-law fit for degrees in \([k_{min}, k_{max}]\), where scaling factor \(\alpha \approx 7.876\) and \(k_{min}=83\). Although maximum degree probability at \(k_{{peak}}\) is less than 0.05 for the raw data, the connectivity density for \([k_{min}, k_{max}]\) is normalized, which explains why the degree probability for \(k_{min}\) is \(\approx 0.08\). Visual inspection might suggest an excellent fit for the power-law distribution; however, a Kolmogorov–Smirnov p value of \(\approx 0\) indicates that the distribution is not power-law. The seemingly good power-law fit for RNA connectivity data, suggested by visual inspection, however motivated our initial investigation of preferential attachment.
Since powerlaw requires input files of (individually observed) connectivity degrees, when creating Table 1, we could not run powerlaw for homopolymer length greater than 28, for which latter the input file contained 50, 642, 017 values. A potentially attractive alternative is to generate input files consisting of \(N \cdot p(k)\) many occurrences of the value k, where \(N=10^2,10^3,\ldots ,10^7\) denotes the total number of samples, and where relative frequency p(k) is the proportion of structures having degree k. However, Table 2 shows that neither scaling factor \(\alpha \) nor \(k_{min}\) are correct with this alternative approach, even for small homopolymers of length 20, 30 and 40. This table justifies the need for our implementation of RNApowerlaw as described in Sect. 3. Table 3 shows maximum likelihood scaling factors \(\alpha \) and Kolmogorov–Smirnov p values for optimal power-law fis of connectivity data for homopolymers of lengths from 30 to 150.
Figure 10a shows a scatter plot with regression line for the cut-off values \(x_c\), defined to be the least value such that the probability that a secondary structure for length n homopolymer has degree greater that \(x_c\) is at most 0.01. From this figure, we determined that for homopolymer length \(n>100\), it more than suffices to take degree upper bound \(K=n+30\). Figure 10b shows the connectivity degree distribution for a homopolymer of length 20, where degree dg(s) is redefined to be the number of structures t that can be obtained from s by adding, removing, or shifting a base pair in s. The so-called \(MS_2\) move set, consisting of an addition, removal or shift of a base pair is the default move set used in RNA kinetics software kinfold (Lorenz et al. 2011). Although a dynamic programming algorithm was described in Clote and Bayegan (2015) to compute the average \(MS_2\) network degree, the methods of this paper do not easily generalize to \(MS_2\) connectivity densities. Figure 11 shows a least-squares regression line for the log-log density plot for \(MS_2\) connectivity (computed by brute-force) for a homopolymer of length 20, together with an optimal power-law fit computed by RNApowerlaw. Since there are only 106.633 secondary structures for the 20-mer with \(\theta =3\), we ran powerlaw on \(MS_2\) connectivity data, which determined \(\alpha = 6.84\), \(k_{{xmin}}=36\), and a log odds ratio \(R= -2.06\) with p value of 0.248. Since RNApowerlaw determined \(\alpha = 6.84\), \(k_{{xmin}}=36\), and a Kolmogorov–Smirnov p value of 0.219, we can not reject the null hypothesis that a power-law distribution fits the tail of \(MS_2\) connectivity data for a 20-mer.
5 Conclusion
Since the pioneering work of Zipf on the scale-free nature of natural languages (Zipf 1949), various groups have found scale-free networks in diverse domains ranging from communication patterns of dolphins (McCowan et al. 2002), metabolic networks (Jeong et al. 2000), protein–protein interaction networks (Ito et al. 2000; Schwikowski et al. 2000), protein folding networks (Bowman and Pande 2010), genetic interaction networks (Tong et al. 2004; Van Noort et al. 2004) to multifractal time series (Budroni et al. 2017). These discoveries have galvanized efforts to understand biological networks from a mathematical and topological standpoint. Using mathematical analysis, Barabasi and Albert (1999) established that scale-free networks naturally emerge when networks are dynamic, whereby newly accrued nodes are preferentially connected to nodes already having high degree. On such grounds, one might argue that protein folding networks and protein–protein interaction (PPI) networks should exhibit scale-free properties, since nature is likely to reuse and amplify fast-folding domains—cf. Gilbert’s exon shuffling hypothesis (Gilbert 1978). Indeed, Cancherini et al. (2010) have established that in 4 metazoan species analyzed (H. sapiens, M. musculus, D. melanogaster, C. elegans) those genes, which are enriched in exon shuffling events, displayed a higher connectivity degree on average in protein–protein interaction (PPI) networks; i.e. such genes had a larger number of interacting partners. On similar grounds that nature should reuse and amplify successful metabolic networks, one might argue that metabolic networks should exhibit scale-free properties. However, rigorous statistical analysis has shown that metabolic networks fail a goodness-of-fit test for scale-free distribution, while PPI satisfy a goodness-of-fit test for scale-free distributions over a certain range of connectivity (Khanin and Wit 2006; Clauset et al. 2009).
There appears to be a current polemic whether certain naturally occurring networks are scale-free. Broido and Clauset (2019) provide statistical arguments that less than 45 of the 927 real-world network data sets (i.e. \(4\%\)) found in the Index of Complex Networks exhibit the “strongest level of direct evidence for scale-free structure”. In a response to a preprint of Broido and Clauset (2019) dated March 6, 2018 and posted on the Barabási Lab web site https://www.barabasilab.com/post/love-is-all-you-need, A.L. Barabási argued against the conclusions of Broido and Clauset (2019). Here, it should be noted that this is not the first time a polemic has arisen about the power-law distribution—indeed, there was a heated exchange between Mandelbrot and Simon almost 60 years ago in the journal Information and Control. For details, references, and a history of the power-law distribution, see Mitzenmacher (2004).
Given the current interest in whether certain naturally occurring networks are scale-free, we have introduced a novel algorithm to compute the connectivity density function for a given RNA homopolymer. Our algorithm requires \(O(K^2n^4)\) run time and \(O(Kn^3)\) storage, where K is a user-specified degree bound \(K \le \frac{(n-\theta )(n-\theta -1)}{2}\). Short of exhaustively listing secondary structures by brute-force, no such algorithm existed prior to our work. Since existent software appears unable to perform power-law fitting for exponentially large RNA connectivity data, we have also implemented code to compute and statistically evaluate the maximum likelihood power-law fit for an input histogram, using a very fast method to the density function of a sampled power-law distribution with given scaling parameter. Using the resulting code, called RNAdensity and RNApowerlaw, we have computed the connectivity density function for RNA secondary structure networks for homopolymers of length up to 150. Statistical analysis categorically shows that there is no statistically significant power-law fit for homopolymer RNA secondary structure network connectivity, despite the seemingly good visual fit shown in Fig. 9. Figure 12 shows that secondary structure network connectivity is not scale-free for the (real) 32 nt selenocysteine insertion sequence fruA. Figure 13 shows that the \(MS_1\) and \(MS_2\) degree distributions for other naturally occurring RNAs are not scale-free, in particular for the 65 nt RNA thermometer from Klebsiella pneumoniae subsp. pneumoniae with EMBL accession code CP000647.1/1773227-1773291 and the 76 nt alanine transfer RNA from Mycoplasma mycoides with accession code tdbR00000006 from tRNAdb Juhling et al. (2009) (accession code RA1180 from the Sprinzl tRNA database). While the density plot in Fig. 12 was produced by exhaustively enumerating all 971,299 secondary structures of the 32 nt fruA, Figure 13 was produced by enumerating all secondary structures having free energy within 13 kcal/mol of the minimum free energy, as computed by RNAsubopt from the Vienna RNA Package (Lorenz et al. 2011); this procedure generated 1,079,102 secondary structures (out of a total of \(\approx 1.99546 \times 10^{15}\) structures) for the 65 nt fourU RNA, and 408,414 secondary structures (out of a total of \(\approx 8.77347 \times 10^{17}\) structures) for the 76 nt tRNA.
Since (Day et al. 2003; Kihara and Skolnick 2003) have presented data that suggests that existent protein structures can be explained using only a small number of protein folds, we presented data in Table 4 that suggests that RNA secondary structures may satisfy a type of preferential attachment—a rigorous combinatorial argument establishes this fact for a modified notion of preferential attachment [data not shown, but available in the Appendix of Clote (2018)]. Finally, Python implementations of the algorithms from this paper are publicly available at http://bioinformatics.bc.edu/clotelab/RNAnetworks.
As an afternote, our personal opinion is that it doesn’t much matter whether a naturally occurring network arising from physical phenomena is precisely scale-free or not. If network connectivity appears to follow a power-law distribution, even approximately, then by results of Barabasi and Albert (1999), this suggests that preferential attachment could play a role in how the network may have been constructed by nature. Preferential attachment might well have been a factor in how protein and RNA structures have been formed by evolutionary forces—even in the emergence of stable folds in prebiotic times (Abkevich et al. 1997). It is noteworthy that only a small number of protein folds suffice to explain the diversity of all protein folds found in the Protein Data Bank (PDB) (Kihara and Skolnick 2003): “The number of proteins required to cover a target protein is very small, e.g. the top ten hit proteins can give 90% coverage below a RMSD of 3.5 Å for proteins up to 320 residues long.” As well, the 30 most populated metafolds represent “about half of a nonredundant subset of the PDB” (Day et al. 2003). However, other evolutionary factors seem to be present in the evolution of protein folds, such as kinetic accessibility (Cossio et al. 2010), as well as the ability to switch between alternate conformations (Porter and Looger 2018).
Notes
A network is said to be robust, or resilient, if its connectivity is (relatively) unaltered in the event that random nodes have been removed; i.e. alternate pathways exist to connect nodes, even if a (random) node has been removed. Since functionality remains in the case of random node failure, network robustness is of obvious importance in massively parallel computers, in the World Wide Web, in metabolic pathways, signaling pathways, etc. This topic is discussed in detail in Chapter 16, “Percolation and Network Resilience”, in Newman (2010).
References
Abkevich VI, Gutin AM, Shakhnovich EI (1997) Computer simulations of prebiotic evolution. In: The Pacific symposium on biocomputing, pp 27–38
Albert R, Barabási A-L (2002) Statistical mechanics of complex networks. Rev Mod Phys 74:47–97
Alstott J, Bullmore E, Plenz D (2014) Powerlaw: a Python package for analysis of heavy-tailed distributions. PLoS ONE 9(1):e85777
Barabasi AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512
Bayegan A, Clote P (2015) Network properties of the ensemble of RNA structures. PLoS ONE 10(10):e0139471 (preprint available at arxiv:1508.05499)
Bowman GR, Pande VS (2010) Protein folded states are kinetic hubs. Proc Natl Acad Sci USA 107(24):10890–10895
Broido AD, Clauset A (2019) Scale-free networks are rare. Nat Commun 10(1):1–10
Budroni MA, Baronchelli A, Pastor-Satorras R (2017) Scale-free networks emerging from multifractal time series. Phys Rev E 95(5–1):052311
Cancherini DV, Franca GS, De Souza SJ (2010) The role of exon shuffling in shaping protein–protein interaction networks. BMC Genom 11:S11
Clauset A, Shalizi CR, Newman MEJ (2009) Power-law distributions in empirical data. SIAM Rev 51(4):661–703
Clote P (2015) Expected degree for RNA secondary structure networks. J Comput Chem 36(2):103–117
Clote P (2018) On the scale-free nature of RNA secondary structure networks, pp 1–26
Clote P, Bayegan A (2015) Network properties of the ensemble of RNA structures. PLoS ONE 10(10):e0139476
Cossio P, Trovato A, Pietrucci F, Seno F, Maritan A, Laio A (2010) Exploring the universe of protein structures beyond the Protein Data Bank. PLoS Comput Biol 6(11):e1000957
Day R, Beck DA, Armen RS, Daggett V (2003) A consensus view of fold space: combining SCOP, CATH, and the Dali Domain Dictionary. Protein Sci 12(10):2150–2160
Flamm C, Fontana W, Hofacker IL, Schuster P (2000) RNA folding at elementary step resolution. RNA 6:325–338
Gilbert W (1978) Why genes in pieces? Nature 271(5645):501
Ito T, Tashiro K, Muta S, Ozawa R, Chiba T, Nishizawa M, Yamamoto K, Kuhara S, Sakaki Y (2000) Toward a protein–protein interaction map of the budding yeast: a comprehensive system to examine two-hybrid interactions in all possible combinations between the yeast proteins. Proc Natl Acad Sci USA 97(3):1143–1147
Jeong H, Tombor B, Albert R, Oltvai ZN, Barabasi AL (2000) The large-scale organization of metabolic networks. Nature 407(6804):651–654
Juhling F, Morl M, Hartmann RK, Sprinzl M, Stadler PF, Putz J (2009) tRNAdb 2009: compilation of tRNA sequences and tRNA genes. Nucl Acids Res 37(Database):D159–D162
Khanin R, Wit E (2006) How scale-free are biological networks. J Comput Biol 13(3):810–818
Kihara D, Skolnick J (2003) The PDB is a covering set of small protein structures. J Mol Biol 334(4):793–802
Lorenz R, Bernhart SH, Höner zu Siederdissen C, Tafer H, Flamm C, Stadler PF, Hofacker IL (2011) Viennarna package 2.0. Algorithms Mol Biol 6:26
Ma HW, Zeng AP (2003) The connectivity structure, giant strong component and centrality of metabolic networks. Bioinformatics 19(11):1423–1430
Malefaki S, Iliopoulos G (2007) Simulating from a multinomial distribution with large number of categories. Comput Stat Data Anal 51:5471–5476
McCowan B, Doyle LR, Hanser SF (2002) Using information theory to assess the diversity, complexity, and development of communicative repertoires. J Comput Psychol 116(2):166–172
Mitzenmacher M (2004) A brief history of generative models for power law and lognormal distributions. Internet Math. 1(2):226–251
Newman MEJ (2006) The structure and function of complex networks. SIAM Rev 45(2):167–256
Newman MEJ (2010) Networks: an introduction. Oxford University Press, Oxford
Nussinov R, Jacobson AB (1980) Fast algorithm for predicting the secondary structure of single stranded RNA. Proc Natl Acad Sci USA 77(11):6309–6313
Porter LL, Looger LL (2018) Extant fold-switching proteins are widespread. Proc Natl Acad Sci USA 115(23):5968–5973
Schwikowski P, Uetz BAND, Fields S (2000) A network of protein–protein interactions in yeast. Nat Biotechnol 18:1257–1261
Stein PR, Waterman MS (1978) On some new sequences generalizing the Catalan and Motzkin numbers. Discrete Math 26:261–272
Tong AH, Lesage G, Bader GD, Ding H, Xu H, Xin X, Young J, Berriz GF, Brost RL, Chang M, Chen Y, Cheng X, Chua G, Friesen H, Goldberg DS, Haynes J, Humphries C, He G, Hussein S, Ke L, Krogan N, Li Z, Levinson JN, Lu H, Menard P, Munyana C, Parsons AB, Ryan O, Tonikian R, Roberts T, Sdicu AM, Shapiro J, Sheikh B, Suter B, Wong SL, Zhang LV, Zhu H, Burd CG, Munro S, Sander C, Rine J, Greenblatt J, Peter M, Bretscher A, Bell G, Roth FP, Brown GW, Andrews B, Bussey H, Boone C (2004) Global mapping of the yeast genetic interaction network. Science 303(5659):808–813
Van Noort V, Snel B, Huynen MA (2004) The yeast coexpression network has a small-world, scale-free architecture and can be explained by a simple model. EMBO Rep 5(3):280–284
Wuchty S (2003) Small worlds in RNA structures. Nucl Acids Res 31(3):1108–1117
Zipf GK (1949) Human behavior and the principle of least effort. Addison Wesley, Boston
Acknowledgements
We would like to thank Amir H. Bayegan for providing the figures in Sect. 2.2 and Jenny Baglivo for a reference for the conditional method to sample from the multinomial distribution. This work was partially supported by National Science Foundation grant DBI-1262439. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Research supported by National Science Foundation Grant DBI-1262439.
Appendices
Appendix
Preferential attachment of RNA secondary structures
In this section, we provide preliminary data that suggest that preferential attachment holds in the homopolymer RNA secondary structure model. A rigorous argument can be found in the preprint (Clote 2018) for all homopolymer RNA networks, albeit with respect to a slight relaxation of our definitions. Before proceeding we recall basic definitions and notation. The notion of homopolymer secondary structure was defined at the beginning of Sect. 2.1; throughout this section, we denote the set of all secondary structures for a length n homopolymer by \({\mathcal {S}}_n\). If \(s \in {\mathcal {S}}_{n}\) and \(s' \in {\mathcal {S}}_{n+1}\), then we say that \(s'\)extendss, and write \(s \prec s'\), if \(s'\) is obtained by either (1) appending unpaired nucleotide \(n+1\) to the right of s, so that the dot-bracket notation of \(s'\) is \(s \bullet \), or (2) adding a base pair \((k,n+1)\) to s, where \(k \in [1,n-\theta ]\) is external to every base pair of s, i.e. it is not the case that \(i \le k \le j\) for any base pair (i, j) of s. Since the seminal papers of Stein and Waterman (1978), Nussinov and Jacobson (1980), this notion of extension has been used as the basis of recursive and/or dynamic programming algorithms to count/enumerate all secondary structures and to compute minimal free energy structures.
A reasonable approach to establish preferential attachment in the context of RNA secondary structures is to show that if the degree of s is greater than or equal to the degree of t in the network \({\mathcal {S}}_n\), then for most extensions \(s'\) of s, and \(t'\) of t, the degree of \(s'\) is greater than or equal to the degree of \(t'\) in the network \({\mathcal {S}}_{n+1}\). We show that this is indeed the case for homopolymers of modest length, using by brute-force, exhaustive computations in this section, and we rigorously establish this result for a relaxation \({\mathcal {S}}^*_n\) of the secondary structure model in Appendix A.
For fixed homopolymer length n, define the set \({\mathcal {A}}_n\) of 4-tuples \((s,t,s',t')\) by
A 4-tuple \((s,t,s',t') \in {\mathcal {A}}_n\)succeeds in demonstrating preferential attachment if \(dg(s') \ge dg(t')\); otherwise the 4-tuple fails to demonstrate preferential attachment. Let Succ\(_n\) [resp. Fail\(_n\)] denote the set of 4-tuples that succeed [resp. fail] to demonstrate preferential attachment, so that \({\mathcal {A}}_n = \text{ Succ }_n \cup \text{ Fail }_n\) (when n is clear, we drop the subscripts, and we ambiguously also use Succ and Fail to denote the sizes of these sets). Our first quantification of preferential attachment is given by the proportion Succ/(Succ+Fail):
Since secondary structures have possibly quite different degrees and numbers of extensions, a more accurate measure (in our opinion) of preferential attachment is given by \(\langle p(s',t'|s,t) \rangle \), defined as follows. For distinct, fixed structures \(s,t \in {\mathcal {S}}_n\), define
To clarify these definitions, we consider a small example. If \(n=5\), then \({\mathcal {S}}_n\) consists of the two structures \(\bullet \bullet \bullet \bullet \bullet \), and \(\,{\texttt {(}}\,\bullet \bullet \bullet \,{\texttt {)}}\,\), while \({\mathcal {S}}_{n+1}\) consists of the four structures \(\bullet \bullet \bullet \bullet \bullet \bullet \), \(\,{\texttt {(}}\,\bullet \bullet \bullet \bullet \,{\texttt {)}}\,\), \(\bullet \,{\texttt {(}}\,\bullet \bullet \bullet \,{\texttt {)}}\,\), \(\,{\texttt {(}}\,\bullet \bullet \bullet \,{\texttt {)}}\,\bullet \). Fix s to be \(\,{\texttt {(}}\,\bullet \bullet \bullet \,{\texttt {)}}\,\), and t to be \(\bullet \bullet \bullet \bullet \bullet \). Since the only neighbor of s is t, and vice-versa, it follows that \(dg(s)=1=dg(t)\). By definition, an extension \(s'\) of s is obtained either by adding an unpaired nucleotide to s at position \(n+1\), or by adding a base pair \((k,n+1)\) to s, where k is external to all base pairs of s. In the current case, the only possible extension of s is produced by the former rule, thus obtaining \(s'=\,{\texttt {(}}\,\bullet \bullet \bullet \,{\texttt {)}}\,\bullet \). Note that we do not consider the structure \(\bullet \,{\texttt {(}}\,\bullet \bullet \bullet \,{\texttt {)}}\,\) to be an extension of s. In contrast, the structure \(t= \bullet \bullet \bullet \bullet \bullet \) has three extensions: \(t'_1= \bullet \bullet \bullet \bullet \bullet \bullet \), \(t'_2= \,{\texttt {(}}\,\bullet \bullet \bullet \bullet \,{\texttt {)}}\,\), \(t'_3= \bullet \,{\texttt {(}}\,\bullet \bullet \bullet \,{\texttt {)}}\,\), where by definition, \(t'_4= \,{\texttt {(}}\,\bullet \bullet \bullet \,{\texttt {)}}\,\bullet \) is not considered to be an extension of t. Clearly \(dg(s') = dg(t'_2)\), \(dg(s') = dg(t'_3)\), but \(dg(s')=1 \not \ge dg(t'_1)=3\), so
so \(p(s',t'|s,t)= 0.6667\). If we now take \(s = \bullet \bullet \bullet \bullet \bullet \), and \(t = \,{\texttt {(}}\,\bullet \bullet \bullet \,{\texttt {)}}\,\), we find that
so \(p(s',t'|s,t) = 1\). The (arithmetical) average of 1 and 2/3 is \(\frac{2+3}{3} = 5/6 = 0.8333\), which is the value \(\langle p(s',t'|s,t) \rangle \) found in the first row and last column of Table 4. In contrast to this value, averaged over all pairs \(s,t \in {\mathcal {S}}_n\) for which \(dg(s) \ge dg(t)\), the total number of successes [resp. failures] is 5 [resp. 1], where a success [resp. failure] is defined as a 4-tuple \((s,t,s',t')\) for which \(s,t \in {\mathcal {S}}_n\), \(s',t' \in {\mathcal {S}}_{n+1}\), \(s \prec s'\), \(t \prec t'\), \(dg(s) \ge dg(t)\) and \(dg(s') \ge dg(t')\) [resp. \(dg(s')<dg(t')\)]. Thus we find the value \(5/6 = 0.8333\) in the first row and 7th column; however, it is not generally true that Succ\(_n\)/ (Succ\(_n\)+ Fail\(_n\)) agrees with \(\langle p(s',t'|s,t) \rangle \), since s, t may have different degrees in \({\mathcal {S}}_n\), and each may have a different number of extensions \(s\prec s'\), \(t \prec t'\), and each \(s',t'\) may each have different degrees in \({\mathcal {S}}_{n+1}\).
For homopolymers of length 5 to 18, Table 4 shows the proportion of successes, \(P(\text{ Succ })\), defined in Eq. (33), as well as the average preferential attachment probabilities \(\langle p(s',t'|s,t) \rangle \), defined in Eq. (35). Values in this table, produced by brute-force, exhaustive computation, were obtained for each homopolymer length \(n \in [5,19]\), by first generating the collections \({\mathcal {S}}_n\), then computing the degrees dg(s) for \(s \in {\mathcal {S}}_n\) by brute force, then considering all \({n \atopwithdelims ()2}\) unordered pairs s, t of distinct structures in \({\mathcal {S}}_n\). So far, the number of instances to consider is large—for instance, when \(n=18\), there are \({n \atopwithdelims ()2} = 274,564,461\) unordered pairs of distinct structures from \({\mathcal {S}}_n\). For each pair of distinct structures s, t from \({\mathcal {S}}_{n}\) that satisfy \(dg(s) \ge dg(t)\), a list \(L_s\) [resp. \(L_t\)] of extensions \(s \prec s'\) [resp. \(t \prec t'\)] were computed, where the size of each list is one plus the number of positions in \([1,n-\theta ]\) that are external to every base pair of s [resp. t]. Subsequently, the proportion of extension pairs \(s',t'\) that satisfy \(dg(s') \ge dg(t')\) is determined, thus yielding \(p(s',t'|s,t)\). Finally, the mean and standard deviation of the latter yields \(\langle p(s',t'|s,t) \rangle \), shown in the last column of the table. For \(n=18\), more than one trillion (\(1.36 \cdot 10^9\)) 4-tuples \((s,t,s',t')\) where considered for which \(dg(s) \ge dg(t)\)—this value is used in the denominator of Eq. (35)!
From the values in Table 4, it appears that the RNA homopolymer secondary structure model does demonstrate preferential attachment. This, in our opinion, may provide theoretical justification for the close approximation of the tail of degree distributions by a power-law distribution, even though a rigorous statistical test by bootstrapping Kolmogorov–Smirnov values solidly rejects this hypothesis.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Clote, P. Are RNA networks scale-free?. J. Math. Biol. 80, 1291–1321 (2020). https://doi.org/10.1007/s00285-019-01463-z
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00285-019-01463-z