PENCALC: A program for penetrance estimation in autosomal dominant diseases



Similar documents
Mendelian inheritance and the

CCR Biology - Chapter 7 Practice Test - Summer 2012

Basic Principles of Forensic Molecular Biology and Genetics. Population Genetics

Chapter 4 Pedigree Analysis in Human Genetics. Chapter 4 Human Heredity by Michael Cummings 2006 Brooks/Cole-Thomson Learning

Population Genetics and Multifactorial Inheritance 2002

Chromosomes, Mapping, and the Meiosis Inheritance Connection

HLA data analysis in anthropology: basic theory and practice

Title: Genetics and Hearing Loss: Clinical and Molecular Characteristics

SeattleSNPs Interactive Tutorial: Web Tools for Site Selection, Linkage Disequilibrium and Haplotype Analysis

Hardy-Weinberg Equilibrium Problems

Y-STR haplotype diversity and population data for Central Brazil: implications for environmental forensics and paternity testing

GENETIC CROSSES. Monohybrid Crosses

Genetics and Evolution: An ios Application to Supplement Introductory Courses in. Transmission and Evolutionary Genetics

Paternity Testing. Chapter 23

Heredity. Sarah crosses a homozygous white flower and a homozygous purple flower. The cross results in all purple flowers.

2 GENETIC DATA ANALYSIS

Step-by-Step Guide to Bi-Parental Linkage Mapping WHITE PAPER

Genetic Mutations Cause Many Birth Defects:

7A The Origin of Modern Genetics

Mendelian and Non-Mendelian Heredity Grade Ten

The Making of the Fittest: Natural Selection in Humans

Excel Companion. (Profit Embedded PHD) User's Guide

Exploring contact patterns between two subpopulations

Chapter 9 Patterns of Inheritance

5 GENETIC LINKAGE AND MAPPING

Avaya Network Configuration Manager User Guide

Name: Class: Date: ID: A

A trait is a variation of a particular character (e.g. color, height). Traits are passed from parents to offspring through genes.

Lecture 6: Single nucleotide polymorphisms (SNPs) and Restriction Fragment Length Polymorphisms (RFLPs)

Delivering the power of the world s most successful genomics platform

GAW 15 Problem 3: Simulated Rheumatoid Arthritis Data Full Model and Simulation Parameters

User Manual for Web. Help Desk Authority 9.0

Heritability: Twin Studies. Twin studies are often used to assess genetic effects on variation in a trait

14.3 Studying the Human Genome

Instructions for data-entry and data-analysis using Epi Info

CHROMOSOMES AND INHERITANCE

somatic cell egg genotype gamete polar body phenotype homologous chromosome trait dominant autosome genetics recessive

Genetics Review for USMLE (Part 2)

Lasse Cronqvist. Tosmana. TOol for SMAll-N Analysis. version 1.2. User Manual

TimeValue Software Due Date Tracking and Task Management Software

Exclaimer Signature Manager 2.0 User Manual

Patient Information. for Childhood

PRINCIPLES OF POPULATION GENETICS

Hosted IP-PBX Phone System

BI122 Introduction to Human Genetics, Fall 2014

SPSS: Getting Started. For Windows

Heredity - Patterns of Inheritance

SQL Server 2014 BI. Lab 04. Enhancing an E-Commerce Web Application with Analysis Services Data Mining in SQL Server Jump to the Lab Overview

Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015

RETRIEVING SEQUENCE INFORMATION. Nucleotide sequence databases. Database search. Sequence alignment and comparison

OneStop Reporting 3.7 Installation Guide. Updated:

BRCA in Men. Mary B. Daly,M.D.,Ph.D. June 25, 2010

Basic SQL Server operations

Houston Region Diesel Engine Database Minimum System Requirements Installation Instructions Quick Start Guide version 0.1

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager

(1-p) 2. p(1-p) From the table, frequency of DpyUnc = ¼ (p^2) = #DpyUnc = p^2 = ¼(1-p)^2 + ½(1-p)p + ¼(p^2) #Dpy + #DpyUnc

A Software Tool for. Automatically Veried Operations on. Intervals and Probability Distributions. Daniel Berleant and Hang Cheng

F9 Integration Manager

Genetics Module B, Anchor 3

Two copies of each autosomal gene affect phenotype.

Gene Mapping Techniques

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Appendix 2.1 Tabular and Graphical Methods Using Excel

Create Custom Tables in No Time

Saffiyah Y. Manboard Biology Instructor Seagull Alternative High School

Metaswitch Hosted IP PBX. Administrator Guide. Version 7.2 Issue 1 30 Sep Document Number VPM

INTRODUCTION TO GENETIC EPIDEMIOLOGY (EPID0754) Prof. Dr. Dr. K. Van Steen

SCUtils WorkItem Scheduler Guide Solution for Microsoft System Center 2012 Service Manager

How to Schedule Report Execution and Mailing

The Developing Person Through the Life Span 8e by Kathleen Stassen Berger

How To Use Excel With A Calculator

A 6-day Course on Statistical Genetics

Carol Ludowese, MS, CGC Certified Genetic Counselor HDSA Center of Excellence at Hennepin County Medical Center Minneapolis, Minnesota

A LOGNORMAL MODEL FOR INSURANCE CLAIMS DATA

Kaspersky Security Center Web-Console

PRACTICE PROBLEMS - PEDIGREES AND PROBABILITIES

GrowthXP. Efficient and complete. Your tool to monitor growth from infancy to adulthood. GrowthXP.com. High resolution growth charts

BlueFuse Multi Analysis Software for Molecular Cytogenetics

Launch Create Store. Import Orders Enter Orders Manually Process Orders. Note: Ctrl+click on a number to jump to that topic.

Business Reports. ARUP Connect

Genetics for the Novice

Distribution List Manager User s Manual

MEDICAL GENETICS GENERAL OBJECTIVE SPECIFIC OBJECTIVES

Business Insight Report Authoring Getting Started Guide

UTILITIES BACKUP. Figure 25-1 Backup & Reindex utilities on the Main Menu

Barracuda Spam Firewall User s Guide

Salvador, Bahia, Brazil October 2015 PROGRAMME am Welcome to Salvador Rector, Universidade Federal da Bahia and Director of FIOCRUZ

SonicWALL GMS Custom Reports

WebSphere Business Monitor

ELECTRO-MECHANICAL PROJECT MANAGEMENT

Hosted PBX. Administrator Guide_Metaswitch. Version 7.2 Issue 1 29 Nov 2010

Chapter 8: Recombinant DNA 2002 by W. H. Freeman and Company Chapter 8: Recombinant DNA 2002 by W. H. Freeman and Company

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

Comparison of Major Domination Schemes for Diploid Binary Genetic Algorithms in Dynamic Environments

MCB41: Second Midterm Spring 2009

The correct answer is c A. Answer a is incorrect. The white-eye gene must be recessive since heterozygous females have red eyes.

Basics of Marker Assisted Selection

IBM Tivoli Network Manager 3.8

Mendelian Genetics in Drosophila

Summary and conclusions. Chapter 8. Summary and conclusions

Transcription:

Short Communication Genetics and Molecular Biology, 33, 3, 455-459 (2010) Copyright 2010, Sociedade Brasileira de Genética. Printed in Brazil www.sbg.org.br PENCALC: A program for penetrance estimation in autosomal dominant diseases Andréa R.V. Russo Horimoto, Márcio T. Onodera and Paulo A. Otto Departamento de Genética e Biologia Evolutiva Instituto de Biociências, Universidade de São Paulo, São Paulo, SP, Brazil. Abstract We present a computer program developed for estimating penetrance rates in autosomal dominant diseases by means of family kinship and phenotype information contained within the pedigrees. The program also determines the exact 95% credibility interval for the penetrance estimate. Both executable (PenCalc for Windows) and web versions (PenCalcWeb) of the software are available. The web version enables further calculations, such as heterozygosity probabilities and assessment of offspring risks for all individuals in the pedigrees. Both programs can be accessed and down-loaded freely at the home-page address http://www.ib.usp.br/~otto/software.htm. Key words: penetrance (rate, value), computer program, maximum likelihood estimation. Received: March 1, 2010; Accepted: May 5, 2010. Accurate penetrance estimates are important for determining genetic disease recurrence risks in families where incompletely penetrant Mendelian disorders are segregating or for establishing genetic map locations by linkage analysis. While crude penetrance estimates can be rapidly derived by dividing the number of observed individuals expressing a disease phenotype by a rough estimate of the probable number of carriers in a given pedigree exhibiting autosomal dominant inheritance, deriving exact maximum likelihood estimates of carrier status at an individual level is time consuming and tedious. In this paper, we describe the structure and use of a computer program designed to be user friendly and assist genetic counselors and gene mappers to make accurate penetrance estimates in all sizes and complexities of autosomal dominant pedigrees, including those containing consanguineous loops and twin pairs. The program deals with the situation of a single monogenic locus (A, a), with allele A dominant in relation to allele a. In the case of human autosomal dominant diseases, the homozygous condition AA is generally either unknown or very rare (given a low population frequency of the pathogenic allele A), so that in pedigrees with cases of autosomal dominant disease the affected individuals are almost invariably Aa heterozygotes, while normal individuals are either aa homozygotes or non-penetrant Aa heterozygotes. In this sense, the penetrance rate K is assumed to Send correspondence to Paulo A. Otto. Departamento de Genética e Biologia Evolutiva Instituto de Biociências, Universidade de São Paulo, Caixa Postal 11461, 05422-970 São Paulo SP, Brazil. E-mail: otto@usp.br. be the probability of an Aa heterozygote being affected: K = Prob(affected Aa). The penetrance rate estimation can be performed for polymorphic traits from familial aggregates including pairs of twins or other groups of close relatives, or, in the case of rare human diseases, through the analysis of phenotype segregation in pedigrees (a complete revision on this subject can be found in Horimoto and Otto, 2008). The algorithms are based on methods detailed by Rogatko (1986) and Horimoto (2009). PenCalc for Windows was developed using Microsoft Visual Basic 6.0. This compressed, self-installing program can be obtained free of charge from the home page http://www.ib.usp.br/~otto/software.htm. The same page contains the access link to the PenCalcWeb Internet (www) program, developed using Active Server Pages (ASP), through the languages VBScript and Jscript. Both penetrance programs are the intellectual property of the authors, and as such, any use of or reference to the materials included in them, must contain an explicit reference to their origin. Feedback from users is welcome and will be used to improve the program and to correct unforeseen flaws. Both programs are described in figures obtained directly in real time from screen images generated by the programs themselves. First we describe PenCalc for Windows. To illustrate the operation of the program, we will use as example the hypothetical pedigree shown in Figure 1. At left of this figure is represented the whole pedigree and at right the filtered genealogy from which we identify the following tree structures pertinent to penetrance estimation: three affected (penetrant) individuals (II-4, III-4, and IV-1); four obligate

456 Horimoto et al. Figure 1 - Hypothetical pedigree with individuals affected by an autosomal dominant disease. The whole pedigree is shown on the left; on the right all individuals and tree structures pertinent to penetrance estimation are shown the gray boxes indicate the two trees of normal individuals that occur in the filtered pedigree. non-penetrant individuals (I-1, II-1, II-3, and III-1); two normal individuals without offspring descending from an obligate (penetrant or non-penetrant) carrier of the gene (II-5 and II-6); and two 2-generation trees of normal individuals, one with two individuals in the second generation (II-2, III-2, and III-3), the other with three secondgeneration individuals (III-5, IV-2 to IV-4). Options File, Data Input and Help appear in the main menu of the program s opening page. The File menu accesses options for exiting the program, for saving or printing the text file generated by the program to show the likelihood function, the estimate of K (penetrance value) and its exact 95% credibility interval. The Data Input menu program allows the writing of a data file through the File submenu option Create (Figure 2), accessing an existing data file through the File submenu option Open,or entering the data through specific program forms (Screen option, Figures 3, 4, 6, and 7). The Help menu accesses a graphic interface with the program credits (option About...) or gives information on the use of the user s Manual in pdf format. The input of consanguineous structures is far more complicated; we shall use the example shown in Figure 5, where individuals I-1 and II-2 are assumed to be both descendents of related obligate carriers. In order to simplify not only the calculations but also the input of data, it is assumed that the dominant allele has been transmitted to the Figure 2 - Interface for pedigree data input. Information on the pedigree structure under study is typed into the text box in a standardized manner using commas to separate items on the same line and carriage return to terminate lines (for full details, refer to the pdf manual). The data on the first line (3,4,2) indicates the number of affected penetrant individuals, obligate non-penetrant individuals and normal individuals without offspring descending from obligate carriers (penetrant or non-penetrant), respectively. In the second line (2,2,3), the first figure (2) is the number of 2-generation trees of normal individuals; the digits that follow (2,3) are their corresponding offspring numbers. The next three lines containing one zero indicate, respectively, that no trees exist of normal individuals with 3, 4, or 5 generations; the line with three zeros, that there are no same-sex twin-pairs with both individuals normal, or one normal and one affected, or both affected; the zero on the last line, that no consanguineous trees occurred in the pedigree. The Back command button returns the main screen without saving the input data. The Save As button uses Windows standard commands for saving the data. When this takes place, the program automatically exhibits the results on the graphic interface (see Figure 8). Figure 3 - Graphic interface for data input through specific program forms, accessed through the Data Input submenu option Screen. The three leftmost text boxes were filled out, respectively, with the numbers of affected penetrant, obligate non-penetrant, and normal individuals without offspring descending from obligate carriers of the gene. The OK command buttons access the screens for data input of 2-, 3-, 4-, and 5-generation trees of normal individuals descended from obligate carriers (Figure 4), trees with consanguineous unions (Figure 6), and twin-pair occurrences (Figure 7); the Back command button returns to the main screen, without saving the input data, and the Enter command button returns to the main screen and the results are exhibited.

Penetrance rate estimation 457 individual IV-2 of the last generation by either individual I-1 or II-2: the tree is then split into two different configurations (1 and 2), and their corresponding data entered separately. Figure 4 - Final aspect of the graphic interface for data input for 2-generation trees of normal individuals, after the number (2) of two-generation trees of normal individuals is entered and the OK command button is keyed in. The Enter button saves the data in the boxes labeled Tree 1 and Tree 2 and then returns to the initial screen of data input (Figure 3). Similar graphic interfaces are presented for data input of 3-, 4-, and 5-generation trees of normal individuals (details on data input for these cases are explained in the program manual). Figure 5 - Example of a consanguineous tree (at left) that is split into two different configurations, 1 and 2. Configuration 1 has the following structures: one two-generation tree of normal individuals (I-1 and II-1), two non-penetrant obligate carriers (II-2 and III-1), one affected (penetrant) individual (IV-2) and one normal individual without offspring (IV-1), born to an obligate carrier. Configuration 2 has the following structures: three obligate non-penetrant carriers (I-1, II-1, and III-1), one affected (penetrant) individual (IV-2), and two normal individuals without offspring (II-2 and IV-1), both born to obligate carriers. All these data should be entered into the input window for consanguineous data shown in Figure 6. Figure 6 - Input of consanguineous trees (maximum number: 2). When no consanguineous trees occur (which is the case of the example pedigree in Figure 1), there is no need to access this data input window. The window shown here is using the data derived from the example in Figure 5. In the case of configuration 1 of Figure 5 there exists one two-generation tree of normal individuals and when the option is chosen the program automatically opens another window for the input of the number (n) of individuals in the last generation (that is 1 in the worked example). Other details for entering the data from trees with a more complex structure (as well as for other additional procedures) are described in the program manual.

458 Horimoto et al. Figure 7 - Data input of possible types of twin-pair occurrences (both normal individuals; one normal individual and one affected; both affected). These structures did not occur in the example pedigree of Figure 1 and the data input window is shown here just for descriptive purposes. The window above is accessed through data input windows shown in Figures 3 and 6 (respectively for non-consanguineous and consanguineous trees). Figure 9 - Interface of the program with the results for a pedigree containing two consanguineous trees (example adapted from Naveed et al., 2006). The final likelihood function of the family consists of a common noninbred part multiplied by each one of the four possible combinations of the formulae of one split tree from the first consanguineous tree and one from the other. The final estimate of K for the whole pedigree is obtained by weighing each of these four estimates K11, K12, K21, and K22 by the corresponding reciprocals of their variances. The lower and upper limits of the 95% credibility interval of the final estimate are also obtained by weighing the individual lower and upper limits of each Kij estimate by the corresponding reciprocals of the variances var(kij). In the case of the worked example of Figures 5 and 6, there is just one consanguineous tree and the final K estimate is obtained by combining the separate estimates for each of the two possible configurations. We next describe the program PenCalcWeb. Initially, the program shows graphic interfaces for entering data, similar to those for PenCalc for Windows. Because of the flexibility of the programming language, PenCalcWeb is far more intuitive to use than PenCalc for Windows. Only the final screen with results is shown in Figure 10. Figure 8 - Interface showing the final results derived from the example pedigree given in Figure 1. After all the pertinent data are keyed in, the program exhibits the estimate of the penetrance rate K, its exact 95% credibility interval, and (inside the text box) the formula for the corresponding likelihood function. A blank field with the option to identify the pedigree is also presented by the interface. The results can be recorded or printed through the File submenus options Save as or Print. The File submenu option Exit closes the program, erasing all data that were not saved. Figure 10 - Graphic interface presenting (a) the structures corresponding to the components of the same example pedigree used in the description of PenCalc for Windows; (b) the penetrance value and its respective exact 95% credibility interval; (c) the heterozygosity probability and the offspring risk for all individuals inside the filtered pedigree.

Penetrance rate estimation 459 Acknowledgments This paper was funded by a doctoral grant from CAPES to Andréa R. V. Russo Horimoto. The valuable criticism, corrections and suggestions made by our colleague Prof. Peter L. Pearson are also deeply acknowledged. References Naveed M, Al-Ali MT, Murthy SK, Al-Hajali S, Al-Khaja N, Deutsch S, Bottani A, Antonarakis SE, Nath SK and Radhakrishna U (2006) Ectrodactyly with aplasia of long bones (OMIM 119100) in a large inbred Arab family with an apparent autosomal dominant inheritance and reduced penetrance: Clinical and genetic analysis. Am J Med Genet 140A:1440-1446. Rogatko A, Pereira CAB and Frota-Pessoa O (1986) A Bayesian method for the estimation of penetrance: application to mandibulofacial and frontonasal dysostoses. Am J Med Genet 24:231-246. Internet Resources Horimoto ARVR and Otto PA (2008) Penetrance Rate Estimation. In: Otto PA (ed) Métodos Clásicos y Modernos para el Análisis de Datos en Genética Humana. Editorial Universitaria de la Universidad Nacional de Misiones, Posadas, pp 123-150, http://www.ib.usp.br/~otto/pop_genetics.htm (February 4, 2010). Horimoto ARVR (2009) Estimativa do valor da taxa de penetrância em doenças autossômicas dominantes: estudo teórico de modelos e desenvolvimento de um programa computacional. PhD Thesis, Instituto de Biociências, Universidade de São Paulo, http://www.teses.usp.br (tese_horimotoarvr.pdf) (February 4, 2010). Associate Editor: Peter Pearson License information: This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.