Advertisement

Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature

  • Xiaohua Hu
  • Illhoi Yoo
  • Peter Rumm
  • Michael Atwood
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3495)

Abstract

In this paper we present a semantic-based data mining approach to identify candidate viruses as potential bio-terrorism weapons from biomedical literature. We first identify all the possible properties of viruses as search key words based on Geissler’s 13 criteria; the identified properties are then defined using MeSH terms. Then, we assign each property an importance weight based on domain experts’ judgment. After generating all the possible valid combinations of the properties, we search the biomedical literature, retrieving all the relevant documents. Next our method extracts virus names from the downloaded documents for each search keyword and identifies the novel connection of the virus according to these 4 properties. If a virus is found in the different document sets obtained by several search keywords, the virus should be considered as suspicious and treated as candidate viruses for bio-terrorism. Our findings are intended as a guide to the virus literature to support further studies that might then lead to appropriate defense and public health measures.

Keywords

West Nile Virus Search Keyword Hepatitis Delta Virus Rift Valley Fever Rift Valley Fever Virus 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    The Association of State and Territorial Health Officials (ASTHO). Public Health Prepar-edness: A Progress Report – First Six Months (ATAIP Indicators Project) (2003)Google Scholar
  2. 2.
    Büchen-Osmond, C.: Taxonomy and Classification of Viruses. In: Manual of Clinical Microbiology, 8th edn., vol. 2, pp. 1217–1226. ASM Press, Washington (2003)Google Scholar
  3. 3.
    Diaz, R., et al.: National Advisory Committee on Children and Terrorism – Report to the Secretary of DHHS (2003)Google Scholar
  4. 4.
    DiGiacome, R.A., Kremer, J.M., Shah, D.M.: Fish oil dietary supplementation is patients with Raynaud’s phenomenon: A double-blind, controlled, prospective study. American Journal of Medicine 8, 158–164 (1989)CrossRefGoogle Scholar
  5. 5.
    Frist, B.: When Every Moment Counts – What You Need to Know About Bio-terrorism from the Senate’s Only Doctor. Rowman and Littlefield (2002)Google Scholar
  6. 6.
    Geissler, E. (ed.): Biological and toxin weapons today. SIPRI, Oxford (1986)Google Scholar
  7. 7.
    Gray, G.C., Callahan, J.D., Hawksworth, A.K., Fisher, C.A., Gaydos, J.C.: Respiratory diseases among U.S. military personnel: countering emerging threats. Emerging Infectious Disease 5(3), 379–387 (1999)CrossRefGoogle Scholar
  8. 8.
    Gursky, E.A.: Drafted to Fight Terror. U.S. Public Health on the Front Lines of Biological Defense, ANSER (2004)Google Scholar
  9. 9.
    Lane, S.P., Beugelsdijk, T., Patel, C.K.: FirePower in the Lab – Automation in the Fight Against Infectious Diseases and Bioterrorism. John Henry Press, DC (1999)Google Scholar
  10. 10.
    Swanson, D.R., Smalheiser, N.R., Bookstein, A.: Information discovery from complementary literatures: categorizing viruses as potential weapons. JASIST 52(10), 797–812 (2001)CrossRefGoogle Scholar
  11. 11.
    Swanson, D.: Fish-oil, Raynaud’s Syndrome, and undiscovered public knowledge. Perspectives in Biology and Medicine 30(1), 7–18 (1986)Google Scholar
  12. 12.
    Swanson, D.: Undiscovered public knowledge. Libr. Q. 56(2), 103–118 (1986)CrossRefMathSciNetGoogle Scholar
  13. 13.
    Web site updated regularly by the Agency for Health Care Research and Quality, US DHHS on bioterrorism and emerging infectious disease agents accessible at: http://www.bioterrorism.uab.edu/EIPBA/vhf/summary.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Xiaohua Hu
    • 1
  • Illhoi Yoo
    • 1
  • Peter Rumm
    • 2
  • Michael Atwood
    • 1
  1. 1.College of Information Science and TechnologyDrexel UniversityPhiladelphia
  2. 2.School of Public HealthDrexel UniversityPhiladelphia

Personalised recommendations