Email updates

Keep up to date with the latest news and content from BMC Bioinformatics and BioMed Central.

This article is part of the supplement: Proceedings of the Third Annual RECOMB Satellite Workshop on Massively Parallel Sequencing (RECOMB-seq 2013)

Open Access Proceedings

A novel min-cost flow method for estimating transcript expression with RNA-Seq

Alexandru I Tomescu1*, Anna Kuosmanen1, Romeo Rizzi2 and Veli Mäkinen1

Author Affiliations

1 Helsinki Institute for Information Technology HIIT, Department of Computer Science, University of Helsinki, Finland

2 Department of Computer Science, University of Verona, Italy

For all author emails, please log on.

BMC Bioinformatics 2013, 14(Suppl 5):S15  doi:10.1186/1471-2105-14-S5-S15

The electronic version of this article is the complete one and can be found online at:

Published:10 April 2013

© 2013 Tomescu et al.; licensee BioMed Central Ltd.

This is an open access article distributed under the terms of the Creative Commons Attribution License (, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.



Through transcription and alternative splicing, a gene can be transcribed into different RNA sequences (isoforms), depending on the individual, on the tissue the cell is in, or in response to some stimuli. Recent RNA-Seq technology allows for new high-throughput ways for isoform identification and quantification based on short reads, and various methods have been put forward for this non-trivial problem.


In this paper we propose a novel radically different method based on minimum-cost network flows. This has a two-fold advantage: on the one hand, it translates the problem as an established one in the field of network flows, which can be solved in polynomial time, with different existing solvers; on the other hand, it is general enough to encompass many of the previous proposals under the least sum of squares model. Our method works as follows: in order to find the transcripts which best explain, under a given fitness model, a splicing graph resulting from an RNA-Seq experiment, we find a min-cost flow in an offset flow network, under an equivalent cost model. Under very weak assumptions on the fitness model, the optimal flow can be computed in polynomial time. Parsimoniously splitting the flow back into few path transcripts can be done with any of the heuristics and approximations available from the theory of network flows. In the present implementation, we choose the simple strategy of repeatedly removing the heaviest path.


We proposed a new very general method based on network flows for a multiassembly problem arising from isoform identification and quantification with RNA-Seq. Experimental results on prediction accuracy show that our method is very competitive with popular tools such as Cufflinks and IsoLasso. Our tool, called Traph (Transcrips in gRAPHs), is available at: webcite.


Recent RNA-Seq technology [1,2] opened a new high-throughput, low cost way for isoform identification and quantification, leading to new understanding of gene regulation in development and disease (e.g., [3]). In an RNA-Seq experiment a set of short reads is produced from mRNA transcripts. The difficulty in assembling these short reads into the transcripts from which they were sampled is non-trivial due to the fact that the transcripts (isoforms) may share exons. As a result, all methods for solving this problem rely on an explicit or implicit graph model. The nodes represent individual reads (overlap graph [4]), or contiguous stretches of DNA uninterrupted by spliced reads (splicing graph [5-7], connectivity graph [8-10]), while the edges are derived from overlaps or from spliced read alignments. Each node and edge has an associated observed coverage, and the problem of isoform identification and quantification is seen as separating the coverage of the graph into individual path components, under different models. Furthermore, this problem was also coined under the broad name 'Multiassembly Problem' [11], a hint that it can arise not only with RNA-Seq data, but also in other biological settings, such as assembling metagenomics reads [12].

Except for Cufflinks [4], all tools mentioned above rely on some optimization engine, whose solving is generally difficult. IsoInfer/IsoLasso [8,9], SLIDE [7], Scripture [10], and CLIIQ [6] exhaustively enumerate all possible candidate paths. For efficiency reasons, each has some restrictions on what a valid candidate path might be, and for each candidate isoform, they define a fitness function. IsoInfer/IsoLasso and SLIDE use a least sum of squares fitness function; IsoLasso and SLIDE both add different shrinkage terms to the fitness function in order to favor isoforms with fewer transcripts, which is computed with a modified LASSO algorithm, or a quadratic program; CLIIQ uses a least sum of absolute differences fitness function, solved by a linear integer program. Cufflinks avoids the problem of exhaustively enumerating all possible paths by returning a minimum path cover, and then assigning expression levels to each path in this cover based on a statistical model. Incidentally, note that computing a minimum path cover (in an acyclic digraph) is done by computing a maximum matching, which can be easily reduced to a flow problem. However, such reduction solves a different (implicitly defined) optimization problem that can be considered as a consensus model in the literature [6-10], mostly because the fitting of expression levels is separated in the process.

Our contribution

In this paper we propose a radically different and very general method relying on the established field of minimum-cost network flow problems [13]. This will not only provide a simple method and a fast polynomial time algorithm for solving it (as opposed to exhaustively enumerating all possible candidate paths, and then solving a quadratic/integer linear program for evaluating the fitness of each candidate isoform), but it can also lean on the ample literature on splitting a (min-cost) flow into paths, e.g., [14-17].

As in the case of the other tools, our method assumes that a splicing graph has been built for each gene. Each node of the graph corresponds to a stretch of DNA uninterrupted by any spliced read alignment; such sequences are called segments in [9], but for simplicity we just call them exons. Each edge of the graph corresponds to two exons consecutive in some transcript, that is, to some spliced read whose prefix aligns to the suffix of one exon, and whose suffix aligns to the prefix of another exon. Observe that such a graph can be seen as a directed acyclic graph (DAG, for short), the direction of the edges being according to the absolute position of the exons in the genome. For each exon v we can deduct its coverage cov(v) as the total number of reads aligned to the exon divided by the exon length, and the coverage cov(u, v) of an edge (u, v) as the total number of reads split aligned to that junction between exons u and v. An mRNA transcript candidate thus becomes a path from some source node to some sink node. The requirement that the transcripts start in a source node and end in a sink node is no restriction, as we can add dummy source/sink nodes as in-/out-neighbors to the nodes where we have indication that some transcript might start/end. Indeed, our splicing graph creation tool uses splicing alignments and coverage information to discover such start/end nodes and accordingly indicates them to our tool.

In order to define a fitness function in the broadest possible terms, let us assume that for each node v and edge (u, v) of the graph we have convex cost functions f v , f u v : modeling how close that node and edge must be explained by the candidate isoform. Then, we can state the problem of isoform identification and quantification as following problem.

Problem 1 (UTEC) Given a splicing DAG G = (V, E) with coverage values cov(v) and cov(u, v), and cost functions fv(·) and fuv(·), for all v V and (u, v) ∈ E, the Unannotated Transcript Expression Cover problem is to find a tuple   P of paths from the sources of G to the sinks of G, with an estimated expression level e(P) for each path P P , which minimize

su m - err ( G , P ) : = v V f v c o v ( v ) - P P : v P e ( P ) + ( u , v ) E f u v c o v ( u , v ) - P P : ( u , v ) P e ( P ) .

For example, if for all nodes v and edges (u, v), fv(x) = x, fuv(x) = x, then we have a least sum of absolute differences model as in CLIIQ. If fu(x) = x2, fuv(x) = x2, then we have a least sum of squares model as in IsoInfer/IsoLasso and SLIDE; this is the model which we also use in the implementation reported in this paper. Another cost function, suggested by [18], is f v ( x ) = x / c o v ( v ) , f u v ( x ) = x / c o v ( u , v ) for all nodes v and edges (u, v). Observe that many of the other biological assumptions of the other tools can be incorporated in the model of Problem UTEC.

We will show that Problem UTEC can be solved in polynomial time, by a reduction to a min-cost flow problem with convex cost functions. We will argue that finding the optimal tuple of paths explaining the graph is equivalent to finding the optimal flow in an offset flow network. Moreover, any splitting of this optimal flow into paths attains the minimum of Problem UTEC. In the same way as some of the other tools try to limit the number of paths explaining a splicing graph by a LASSO approach, we can rely on established methods for splitting any flow into few paths (e.g., [14-17]). In this paper, we employ only the simple linear-time heuristic of repeatedly removing the heaviest path, see e.g., [15].

We give experimental results to study how well the predictions match the ground-truth on simulated data, and how well it fares on real-data, compared to Cufflinks [4] and IsoLasso [9]; our method is very competitive, providing in many cases better precision and recall. We expect our lead to be even greater once we incorporate paired-end read information.


We begin by recalling the basic notions of flow and of a min-cost flow problem, and refer to the excellent monograph [13] for further details. A flow network (or simply network) is a tuple N = (G, b, q), where G = (V, E) is a directed graph, b is a function assigning a capacity b u v to every arc (u, v) ∈ E, and q is a function assigning an exogenous flow q v to every node v V, such that v V q v = 0 . We say that a function x assigning to every arc (u, v) ∈ E a number x u v is a flow over the network N, if the following two conditions are satisfied:

1. 0 ≤ xuv buv, for every (u, v) ∈ E,

2. u V x v u - u V x u v = q v , for every v V,

In a min-cost flow problem, one is additionally given flow cost functions cuv(·), for every arc (u, v) ∈ E, and is required to find a flow which minimizes:

( u , v ) E c u v ( x u v ) .

It is well-known that, under the assumption that all the flow cost functions cuv(·) are convex, a min-cost flow can be found in polynomial time [19] (see also [20] for the real-valued flow case).

The reduction to a min-cost flow problem

We will model Problem UTEC as a min-cost flow problem, thus showing that it can be solved in polynomial time. First, we argue that it can be transformed into the following equivalent problem, where the input exon chaining graph has measured coverages only on arcs.

Problem 2 (UTEJC) Given a splicing DAG G = (V, E) with coverage values cov(u, v), and cost functions fuv(·), for all (u, v) ∈ E, the Unannotated Transcript Expression Junction Cover problem is to find a tuple   P of paths from the sources of G to the sinks of G with an estimated expression level e(P) for each path P P , which minimize

( u , v ) E f u v c o v ( u , v ) - P P : ( u , v ) P e ( P ) .

Given an input G = (V, E) for Problem UTEC, we construct an input for Problem UTEJC by replacing every node v V with two new nodes, vin and vout, and an arc (vin, vout), with cov(vin, vout) = cov(v), and f v i n v o u t ( x ) = f v ( x ) . Furthermore, for every arc (u, v) ∈ E, we replace arc (u, v) with the arc (uout, vin), with the same coverage as (u, v). It is immediate that optimal solutions for G to Problem UTEC are in bijection with the optimal solutions for the transformed graph to Problem UTEJC.

To solve Problem UTEJC, we build an auxiliary offset network with convex costs of the form cuv(x) = fuv(x). An optimal flow for this network will model the offsets (positive or negative) between the measured coverages of the exon chaining graph and their actual expression levels in an optimal solution. Then, we argue that a min-cost flow on this network naturally induces a solution for the UTEJC problem.

Onwards, we denote by N G + ( v ) the set of out-neighbors of v in the directed graph G, that is, the set {w : (v, w) ∈ E(G)}. Similarly, we denote by N G - ( v ) the set of in-neighbors of v in the directed graph G, that is, the set {u : (u, v) ∈ E(G)}. When G is clear from the context, we will skip it as subscript.

Given a splicing DAG G with coverage values cov(u, v), and cost functions fuv, for all (u, v) ∈ E, we construct the offset network N* = (G*, b, q) with cost function c, as follows (see Figure 1 for an example):

thumbnailFigure 1. Example of an offset network. An input G to Problem UTEJC (a), and the offset network G* (b); arcs are labeled with their capacity, unlabeled arcs having infinite capacity

1. we add to G* all nodes and edges of G, together with

(a) a new source s0 and a new sink t0 with q s 0 : = q t 0 : = 0 ,

(b) arcs (s0, s), for every source s of G, and arcs (t, t0) for every sink t of G, each with infinite capacity and null cost function,

(c) arc (t0, s0) with infinite capacity and null cost function,

(d) nodes s* and t*, with initial exogenous flow q s * : = q t * : = 0 ;

2. for every arc (u, v) ∈ E(G),

(a) buv := ∞, cuv(x) : = fuv(x),

(b) we add the reverse arc (v, u) to G* with bvu := cov(u, v), cvu(x) : = fuv(x);

3. for every v V(G),

(a) its exogenous flow qv is zero,

(b) if u N + ( v ) c o v ( v , u ) - u N - ( v ) c o v ( u , v ) > 0 , we add arc (v, t*) to G* where:

i. b v t * : = u N + ( v ) c o v ( v , u ) - u N - ( v ) c o v ( u , v ) , c v t * ( x ) : = 0 ,

ii we update q t * : = q t * + u N - ( v ) c o v ( u , v ) - u N + ( v ) c o v ( v , u ) ;

(c) if u N + ( v ) c o v ( v , u ) - u N - ( v ) c o v ( u , v ) < 0 , we add arc (s*, v) to G* where:

i. b s * v : = u N - ( v ) c o v ( v , u ) - u N + ( v ) c o v ( u , v ) , c s * v ( x ) : = 0 ,

ii. we update q s * : = q s * + u N - ( v ) c o v ( v , u ) - u N + ( v ) c o v ( u , v ) .

The next lemma shows that there exists a min-cost flow x* on N*.

Lemma 1 Given a digraph G with arc coverages cov(·,·), the offset network N* = (G*, b, q) constructed as above is a flow network, i.e., v V ( G * ) q v = 0 .

Proof: Since qv = 0, for all v V (G*) \ {s*, t*}, it remains to show that q s * + q t * = 0 . Indeed,

q s * + q t * = v V ( G ) u N G - ( v ) c o v ( u , v ) - u N G + ( v ) c o v ( v , u ) (1) = v V ( G ) u N G - ( v ) c o v ( u , v ) - v V ( G ) u N G + ( v ) c o v ( v , u ) (2) = ( u , v ) E ( G ) c o v ( u , v ) - ( v , u ) E ( G ) c o v ( v , u ) = 0 (3) (4)


From such a flow x*, we construct the function x on the edges G as follows. First, observe that for every arc (u, v) ∈ E(G), at most one of x u v * or x v u * is nonnull. Indeed, if this were not the case, then a flow y* which coincides with x*, except for y u v * : = x u v * - min ( x u v * , x v u * ) and y v u * : = x v u * - min ( x u v * , x v u * ) , is also a flow on N* and has a strictly smaller cost than x*, contradicting the fact that x* is of minimum cost. Then, for each arc (u, v) ∈ E(G) we set:

x u v : = c o v ( u , v ) + x u v * - x v u * .

From a flow to a set of paths

Theorem 1 below will argue that the above defined function x is a flow on G (points (1), (2)), whose arcs we consider to have unbounded capacities and whose nodes, apart from the sources and sinks, have exogenous flow 0. It is a well-known result from classical network flow theory that such a flow can be decomposed into paths, that is, there exist paths P1 , . . . , Pt from the sources of G to the sinks of G, having weights w1, . . . , wt, respectively, such that, for every (u, v) ∈ E(G) we have

x u v = i : ( u , v ) belongs to P i w i .

Moreover, a decomposition of x into at most |E(G)| paths always exists and can be found in time |V (G)| · E(G). Theorem 1 also shows that the paths of any decomposition of x are an optimal solution for G to Problem UTEJC (point (3)).

Theorem 1 Given an optimal flow x* on G*, the function × on G just constructed satisfies the properties, where S denotes the set of sources of G, and T denotes the set of sinks of G:

(1) for all v V (G) \ (S T), u N G - ( v ) x u v = u N G + ( v ) x v u ;

(2) s S v N G + ( s ) x s v = t T u N G - ( t ) x u t

(3) any decomposition of × into paths attains the minimum of the objective function of Problem UTEJC, on input G.

Proof: (1): Let v V (G) \ (S T); by the definition of x, we can write

u N G ( v ) x u v u N G + ( v ) x v u = N G ( v ) ( c o v ( u , v ) + x u v * x v u * ) u N G + ( v ) ( c o v ( v , u ) + x v u * x u v * ) = u N G ( v ) c o v ( u , v ) N G + ( v , u c o v ( v , u ) + + u N G ( v ) x u v * + u N G + ( v ) x u v * u N G ( v ) x v u * u N G + ( v ) x v u * = u N G ( v ) c o v ( u , v ) u N G + ( v ) c o v ( v , u ) + u N G ( v ) N G + ( v ) x u v * u N G ( v ) N G + ( v ) x v u * .

Observe that for all edges entering t* (exiting s*), their flow equals their capacity, as we have adjusted the exogenous flow of t* (of s*) at point 3.(b)ii. (and 3.(c)ii.) in the construction of G*. We distinguish three cases.

First, if u N G - ( v ) N G + ( v ) x u v * - u N G - ( v ) N G + ( v ) x v u * > 0 , then u N G - ( v ) N G + ( v ) x u v * - u N G - ( v ) N G + ( v ) x v u * = x v t * * . Since the flow x* uses the arc (v, t*) with its maximum capacity, we have that x v t * * = b v t * = u N G + ( v ) c o v ( v , u ) - u N G - ( v ) c o v ( u , v ) , which shows that u N G - ( v ) x u v - u N G + ( v ) x v u = 0 , proving the claim.

Second, if u N G - ( v ) N G + ( v ) x u v * - u N G - ( v ) N G + ( v ) x v u * < 0 , then u N G - ( v ) N G + ( v ) x u v * - u N G - ( v ) N G + ( v ) x v u * - = - x s * v * . Since the flow x* uses the arc (s*, v) with its maximum capacity, we have that x s * v * = b s * v = u N G - ( v ) c o v ( v , u ) - u N G + ( v ) c o v ( u , v ) , which again proves the claim.

Finally, if u N G - ( v ) N G + ( v ) x u v * - u N G - ( v ) N G + ( v ) x v u * = 0 , then, by construction there is no edge between v and t* or s*, implying, again by construction, that u N G - ( v ) c o v ( u , v ) = u N G + ( v ) c o v ( v , u ) , from which the claim follows.

(2): From the definition of x, we have

s S v N G + ( s ) x s v = s S v N G + ( s ) ( c o v ( s , v ) + x s v * - x v s * ) (1)

= s S v N G + ( s ) c o v ( s , v ) + v N G + ( s ) x s v * - v N G + ( s ) x v s * (2)

By construction, since qs = 0 for all s S, we have x s t * * + v N G + ( s ) x s v * = v N G + ( s ) x v s * + x s 0 s * . Therefore, v N G + ( s ) x s v * - v N G + ( s ) x v s * = x s 0 s * - x s t * * = x s 0 s * - b s t * = x s 0 s * - v N G + ( s ) c o v ( s , v ) . Plugging this into (2), we obtain

s S v N G + ( s ) x s v = s S x s 0 s * = x t 0 s 0 * . (3)


t T u N G - ( t ) x u t = t T u N G - ( t ) ( c o v ( u , t ) + x u t * - x t u * ) (4)

= t T u N G - ( t ) c o v ( u , t ) + u N G - ( t ) x u t * - u N G - ( t ) x t u * (5)

By construction, since qt = 0 for all t T, we have x s * t * + u N G - ( t ) x u t * = x t t 0 * - u N G - ( t ) x t u * . Therefore, u N G - ( t ) x u t * - u N G - ( t ) x t u * = x t t 0 * - x s * t * = x t t 0 * - b s * t = x t t 0 * - u N G - ( t ) c o v ( u , t ) . Plugging this into (5), we prove the claim, since by (3) we get

t T u N G - ( t ) x u t = t T x t t 0 * = x t 0 s 0 * = s S v N G + ( s ) x s v . (6)

(3): Since any tuple of paths P = ( P 1 , P 2 , , P k ) from sources of G to sinks of G, induces a flow on G, where the exogenous flow of all nodes which are not sources nor sinks is zero, and any such flow can be split into paths from sources to sinks, the minimum value of

( u , v ) E ( G ) f u v c o v ( u , v ) - P i P . ( u , v ) P i e i , (7)

over all k, all k-tuples of paths P = ( P 1 , P 2 , . . . , P k ) from a source of G to a sink of G, and over all expression levels ei for each Pi, is equal to miny is a flow on G ( u , v ) E ( G ) f u v ( | c o v ( u , v ) - y v v | ) . Since any flow on G induces a flow on G*, and vice versa, the above is equal to

min z   is   a   flow   on   G * ( u , v ) E ( G ) f u v ( | z u v - z v u | ) .


x * = argmin z   is   a   flow   on   G * ( u , v ) E ( G ) f u v ( z u v ) + f u v ( z v u ) , (8)

and from minimality, for all arcs (u, v) ∈ E(G), at most one of zuv or zvu is non null, we have that x* also attains the minimum in (7), proving the theorem. □

In our implementation we use the min-cost flow engine available in the LEMON Graph Library [21]. If no engine for arbitrary convex cost functions is available, or, more generally, if the cost functions themselves happen not to be convex, one can approximate any cost function with piecewise constant or convex cost functions: e.g., one can replace an arc (u, v) of capacity buv, with |buv| arcs of capacity 1, such that first arc has cost f(1), and the ith arc, i >1, has cost f(i) - f(i - 1) (this reduction is only pseudo-polynomial but reveals quite effective in practice), see [13] for further details.

Decomposing the min-cost flow into few paths

As already shown by the other tools, we are generally interested in parsimoniously explaining an RNA-seq experiment, that is, in finding, among the optimal solutions to Problem UTEC, one with a low number of paths. At a closer analysis it can be seen that any flow on a graph G = (V, E) can be decomposed into at most |E| - |V| + 2 paths [14]. However, decomposing a flow into a minimum number of paths is an NP-hard problem in the strong sense, even when restricted to DAGs [14,15]. To overcome this limitation, various heuristics and approximations have been put forth, see, e.g., [14-17] and the references therein. The advantage of our method is that once we have obtained the optimal flow, we can apply any of these methods to split the flow into few paths. For simplicity, in this paper we employ the policy of repeatedly removing the heaviest path, see, e.g., [15]: until the network has null flow, we select a path from the sources to the sinks whose minimum flow on its edges is maximum, report it as transcript, and remove it from the flow network.

Results and discussion

We call our tool Traph (Transcripts in Graphs). We compared Traph to the most used isoform prediction tool Cufflinks [4] and with IsoLasso [9]. We also tried to include SLIDE [7] and CLIIQ [6], but we could not make the former work reliably, and for the latter the publicly available version was not yet available. Full experiment data is available at [22].

We should point out from the start that Traph is not yet employing paired-end read information. Nonetheless, the experiments we report (both simulated and real) are with paired-end reads, Cufflinks and IsoLasso having access to the paired-end information. Moreover, since Traph is not yet employing existing gene annotation information, we ran Cufflinks and IsoLasso without annotation. As already mentioned, we use a least sum of squares model. We experimented in the current implementation with other cost functions, as mentioned in the introduction, f z ( x ) = x , f z ( x ) = x / c o v ( z ) , or f z ( x ) = x / c o v ( z ) , respectively, for all nodes and edges z, but they currently give worse results.

Matching criteria

In order to match the predicted transcripts with the true transcripts, we take into account the DNA sequences but also the expression levels. For each gene, we construct a bipartite graph with the true transcripts T = ( T 1 , T 2 , ) as nodes in one set of the bipartition, and the predicted transcripts P = ( P 1 , P 2 , ) as nodes in the other set of the bipartition. Empty sequences with 0 expression level were added so that both sets of the bipartition had an equal number of nodes.

To define the costs of the edges of this bipartite graph, let us introduce (cf. Normalized Compression Distance [23]) the binary encoding of a true transcript T and its expression level e(T) with respect to a predicted transcript P with expression level e(P)

code ( T | P , j ) = γ ( j ) γ ( d + 1 ) editsencoded ( T , P ) γ ( f ( e ( T ) - e ( P ) ) ) , (9)

where γ(x) = 0|bin(x)-1 1bin(x), bin(x) being the binary encoding of x >0, j is the index of P in the list of predicted transcripts, d is the unit cost (Levenshtein) edit distance of T and P, editsencoded(T, P) lists the edits and gaps between edits using 2-bit fixed code for edit type, 2-bit fixed code for substituted/inserted symbol, and γ(x+1) for gap (run of identities) of length x, and f(x) is a bijection between {0, 1, -1, 2, -2, . . .} and {1, 2, 3, 4, 5, . . .} defined as f(x) = 2x for x > 0 and f(x) = 2(-x) + 1 otherwise.

Then, the edge cost between nodes T i T and P j P is defined as |code(Ti | Pj, j)| - |γ(j)|. The closer to zero this number is, the better the match between true transcript Ti, with true expression level e(Ti) and predicted transcript Pj with predicted expression level e(Pj). The minimum weight perfect matching was then computed; this gives a one-to-one mapping between true and predicted transcripts, therefore true transcripts can be ordered in the same order as they match predicted transcripts and code for the index, γ(j), is no longer required. Let edit code length for an edge between Ti and Pj be |γ(d + 1) editsencoded(Ti, Pj)|, where d is the edit distance. Let bitscore be edit code length divided by |γ(|Ti| + 1) editsencoded(Ti, ε)|; bitscore is asymmetric, and possibly greater than 1 if ε would be a better match to Ti than to Pj, but minimum weight perfect matching chose otherwise for global minimality. Let us also call relative expression level difference the ratio |e(Pj)-e(Ti)|/e(Ti). Each matched node pair with relative expression level difference and (edit) bitscore under some given thresholds define a true positive event (TP). The other kind of nodes define false positive (FP) and false negative (FN) events depending on which side of the bipartite graph they reside. Prediction efficiency based on precision, recall and F-measure is also employed in [6,9].

Simulated human data

As in the case of the other tools, we deem that validating against simulated data is a prerequisite, since, in general, on real data, we do not have available ground-truth. We designed the following validation experiment, closely following the approaches in [6,9]. We chose a set of genes at random, and looked up the corresponding annotated transcripts from the Ensembl database. Out of these genes, we selected only those having between 2 and 5 transcripts. In all, we had 29 genes. For each transcript, we simulated reads with the RNASeqReadSimulator [24]. This simulator chooses an expression level at random from lognormal distribution with mean -4 and variance 1. For each gene, it simulated paired-end reads, with fragment length mean 300 and standard deviation 20, as follows: a transcript was chosen randomly using its expression level as distribution weight, while the position of the read within the transcript was chosen uniformly. As argued in the case of IsoLasso [9], various error models can be incorporated in these steps, but we chose to compare the performance of the methods in neutral conditions. We mapped the reads with TopHat [25]: these read mapping results were given as input to the tested prediction software, and to a Python program which we wrote to construct the splicing graphs needed for Traph. Cufflinks and IsoLasso were ran with the default parameters, because the parameters they offer relate to RNA-seq lab protocol, which was not simulated; we could not see changes to other parameters which could be relevant to the prediction. We use FPKM values as expression levels.

We devised two experiment setups. In the first one, which we call single genes, 300, 000 paired-end reads were generated independently from the transcripts of each of the 29 genes, with the already assigned expression levels. They were independently given to TopHat for alignment, and these independent alignment results were fed to each tool. In the second, more realistic experiment, which we call batch mode, the transcripts and their assigned expression levels were combined into one file, and from this file 29 * 300, 000 paired-end reads were simulated. All these reads were fed to TopHat for alignment, and these combined alignment results were fed to the tools. The fragment length mean and standard deviation were passed to the tools, except for Cufflinks in batch mode, when it was able to infer them automatically.

Table 1 and Figure 2 show selected validation results. The measures reported are precision = TP/(TP+FP), recall = TP/(TP+FN), and F-measure = 2 * precision * recall/(precision + recall). We selected to depict two relative expression level differences, 0.1 and 0.9, illustrating opposite expression levels matching criteria. In the first, we require that the predicted expression levels be at most 10% different from the true ones, and in the second they can be at most 90% different from the true ones. Even though not yet employing paired-end information, Traph has better F-measure in three out of four scenarios. The lead of Traph is more visible in the batch mode scenario when the predicted expression levels can be at most 90% different from the true ones (Figure 2). This behavior might be due to the upward/downward coverage at the start/end of transcripts, which affects the average coverage Traph is assuming for source/sink nodes (exons). We expect to solve this by giving less weight to such exons in the fitness function. Notice also that out of the false positive transcripts reported by the tools, Cufflinks is reporting 32 transcripts which do not map to the areas of the 29 genes from where reads were simulated, IsoLasso is reporting 150 transcripts outside gene areas, while Traph is reporting only 15.

Table 1. Performance of the three tools

thumbnailFigure 2. Performance on simulated data. Performance of IsoLasso, Cufflinks, and Traph on simulated data: single genes scenario (a), (b); batch mode scenario (c), (d)

Real human data

We used the same real dataset from the IsoLasso paper [9], Caltech RNA-Seq track from the ENCODE project [GenBank:SRR065504], consisting of 75bp paired-end reads. Out of these reads, we picked the 2,406,339 which mapped to human chromosome 2. We selected the 674 genes where all three tools made some prediction; these genes have 6075 annotated transcripts.

First, we match the transcripts predicted by each tool with the annotated transcripts, employing the same minimum weight perfect matching method introduced before, this time without taking into account expression levels. A true positive is a match selected by the perfect matching with bitscore under 0.2. Traph predicted in total 2685 transcripts for these genes, out of which 244 match the annotation. Cufflinks predicted in total 1796, out of which 349 match the annotation, while IsoLasso predicted 1362, out of which 343 match the annotation. We also include a histogram (Figure 3) of the lengths of the annotated transcripts of these genes, and of the ones reported by Traph, Cufflinks and IsoLasso. Here we round all transcript lengths to the nearest multiple of 1000. We see that the distribution in the case of Traph is closer to the distribution in the case of the annotated transcripts; than the distributions for Cufflinks and IsoLasso.

thumbnailFigure 3. Results on real human data. Histogram of the distribution of transcript lengths of the annotation, and of the ones reported by Traph, Cufflinks and IsoLasso

Third, we match the transcripts predicted by one software to the transcripts predicted by the other two, employing the same matching method. As in [9], we depict in Figure 4 a more detailed Venn diagram of the intersections between the sets of transcripts reported by the three tools.

thumbnailFigure 4. Results on real human data. Venn diagram of the intersections of the sets of reported transcripts

Running times

On the real dataset, Cufflinks finished in 20 min, IsoLasso in 2 min, and Traph in 30 min. We should however stress that for solving the min-cost flow problem and for identifying the transcripts, Traph uses in fact 6 min, the rest of the time being spent by our graph creation tool, which is written in Python. We could not make such a detailed analysis in the case of the other two tools. The running time of our Python script is as well included in the last column of Table 1, where we listed the average running time per gene with simulated reads of each tool.


All tools for isoform identification and quantification use an explicit or implicit graph model. Resorting to such a representation, the main contribution of this paper consists in a novel, radically different method based on minimum-cost flows, an established problem, for which there exist polynomial-time algorithms and solvers. We implemented this method into our tool Traph. Even though Traph is not using paired-end information at this moment, Traph is competitive with state-of-the-art tools.

This leads us to expect that once we incorporate paired-end read information, the performance of Traph will increase significantly. Note also that in the current implementation, each exon equally contributes to the fitness function, independently of its length; we plan to include exon lengths in the fitness function in a future implementation. We also plan to integrate existing gene annotation into a more refined construction of the splicing graph and into the fitness model. Our method is general enough to easily accommodate other biological assumptions. In order to evaluate the tools against real ground-truth data, we have started a process of acquiring long sequencing reads (PacBio) of the true isoforms of a gene.

Competing interests

The authors declare that they have no competing interests.

Authors' contributions

AIT, VM and RR designed the method. VM, AK and AIT designed the experiments. AK evaluated the methods. AIT, VM and AK contributed to the writing. All authors read and approved the final manuscript.


We wish to thank Antti Honkela for many insightful discussions on transcript prediction. We would also like to thank Teemu Kivioja and the anonymous reviewers for hinting us related literature on refined cost functions for coverage counts, as well as for constructive comments that improved our experiment setup.


Publication of this article was supported by the Academy of Finland under grant 250345 (CoECGR).

This article has been published as part of BMC Bioinformatics Volume 14 Supplement 5, 2013: Proceedings of the Third Annual RECOMB Satellite Workshop on Massively Parallel Sequencing (RECOMB-seq 2013). The full contents of the supplement are available online at


  1. Mortazavi A, Williams BAA, McCue K, Schaeffer L, Wold B: Mapping and quantifying mammalian transcriptomes by RNA-Seq.

    Nature Methods 2008, 5:621-628. PubMed Abstract | Publisher Full Text OpenURL

  2. Pepke S, Wold B, Mortazavi A: Computation for ChIP-seq and RNA-seq studies.

    Nature methods 2009, 6:(11):s22-s32. PubMed Abstract | Publisher Full Text OpenURL

  3. Shah S, et al.: The clonal and mutational evolution spectrum of primary triple-negative breast cancers.

    Nature 2012, 486:(7403):395-399. PubMed Abstract | Publisher Full Text OpenURL

  4. Trapnell C, et al.: Transcript assembly and quantification by RNA-Seq reveals unannotated transcripts and isoform switching during cell differentiation.

    Nature Biotechnology 2010, 28:511-515. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  5. Heber S, Alekseyev M, Sze SH, Tang H, Pevzner PA: Splicing graphs and EST assembly problem.

    Bioinformatics 2002, 18(suppl 1):S181-S188. PubMed Abstract | Publisher Full Text OpenURL

  6. Lin YY, Dao P, Hach F, Bakhshi M, Mo F, Lapuk A, Collins C, Sahinalp SC: CLIIQ: Accurate Comparative Detection and Quantification of Expressed Isoforms in a Population. In Proc Algorithms in Bioinformatics - 12th International Workshop, WABI 2012, Volume 7534 of Lecture Notes in Computer Science. Springer; 2012:178-189. OpenURL

  7. Li JJ, Jiang CR, Brown JB, Huang H, Bickel PJ: Sparse linear modeling of next-generation mRNA sequencing (RNA-Seq) data for isoform discovery and abundance estimation.

    Proc Natl Acad Sci USA 2011, 108(50):19867-19872. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  8. Feng J, Li W, Jiang T: Inference of Isoforms from Short Sequence Reads. In RECOMB, Volume 6044 of Lecture Notes in Computer Science. Edited by Berger B. Springer; 2010:138-157. OpenURL

  9. Li W, Feng J, Jiang T: IsoLasso: a LASSO regression approach to RNA-Seq based transcriptome assembly.

    J Comput Biol 2011, 18(11):1693-707. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  10. Guttman M, Garber M, Levin JZ, Donaghey J, Robinson J, Adiconis X, Fan L, Koziol MJ, Gnirke A, Nusbaum C, Rinn JL, Lander ES, Regev A: Ab initio reconstruction of cell type-specific transcriptomes in mouse reveals the conserved multi-exonic structure of lincRNAs.

    Nat Biotechnol 2010, 28(5):503-510. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  11. Xing Y, Resch A, Lee C: The multiassembly problem: reconstructing multiple transcript isoforms from EST fragment mixtures.

    Genome Res 2004, 14:(3):426-441. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  12. Namiki T, Hachiya T, Tanaka H, Sakakibara Y: MetaVelvet: an extension of Velvet assembler to de novo metagenome assembly from short sequence reads.

    Nucleic Acids Res 2012, 40:e155. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL

  13. Ahuja RK, Magnanti TL, Orlin JB: Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Inc; 1993. OpenURL

  14. Vatinlen B, Chauvet F, Chrétienne P, Mahey P: Simple bounds and greedy algorithms for decomposing a flow into a minimal set of paths.

    European Journal of Operational Research 2008, 185(3):1390-1401. Publisher Full Text OpenURL

  15. Hartman T, Hassidim A, Kaplan H, Raz D, Segalov M: How to split a flow?

    In INFOCOM Edited by Greenberg AG, Sohraby K, IEEE. 2012, 828-836. OpenURL

  16. Koch R, Skutella M, Spenke I: Maximum k-Splittable s, t-Flows. [] webcite

    Theory of Computing Systems 2008, 43:56-66. Publisher Full Text OpenURL

  17. Salazar F, Skutella M: Single-source k-splittable min-cost flows.

    Oper Res Lett 2009, 37(2):71-74. Publisher Full Text OpenURL

  18. Van Der Heijden PG, Cruyff M, Van Houwelingen HC: Estimating the Size of a Criminal Population from Police Records Using the Truncated Poisson Regression Model.

    Statistica Neerlandica 2003, 57(3):289-304. Publisher Full Text OpenURL

  19. Minoux M: Solving integer minimum cost flows with separable convex cost objective polynomially. [] webcite

    In Netflow at Pisa, Volume 26 of Mathematical Programming Studies Edited by Gallo G, Sandi C. Springer Berlin Heidelberg; 1986, 237-239. OpenURL

  20. Weintraub A: A Primal Algorithm to Solve Network Flow Problems with Convex Costs. [] webcite

    Management Science 1974, 21:87-97. Publisher Full Text OpenURL

  21. Lemon Graph Library[] webcite

  22. Traph source code and experiment data[] webcite

  23. Cilibrasi R, Vitányi PMB: Clustering by compression.

    IEEE Transactions on Information Theory 2005, 51(4):1523-1545. Publisher Full Text OpenURL

  24. RNASeqReadSimulator[] webcite

  25. Trapnell C, Pachter L, Salzberg SL: TopHat: discovering splice junctions with RNA-Seq.

    Bioinformatics 2009, 25(9):1105-1111. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL