Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons

  • Xiaohua Hu
  • Xiaodan Zhang
  • Daniel Wu
  • Xiaohua Zhou
  • Peter Rumm
Part of the Integrated Series In Information Systems book series (ISIS, volume 18)

There are some viruses and bacteria that have been identified as bioterrorism weapons. However, there are a lot other viruses and bacteria that can be potential bioterrorism weapons. A system that can automatically suggest potential bioterrorism weapons will help laypeople to discover these suspicious viruses and bacteria. In this paper we apply instance-based learning & text mining approach to identify candidate viruses and bacteria as potential bio-terrorism weapons from biomedical literature. We first take text mining approach to identify topical terms of existed viruses (bacteria) from PubMed separately. Then, we apply a text mining method bridge these terms as instances with the remaining viruses (bacteria) and thus to discover how much these terms describe the remaining viruses (bacteria). In the end, we build an algorithm to rank all remaining viruses (bacteria). We suspect that the higher the ranking of the virus (bacterium) is, the more suspicious they will be potential bio-terrorism weapon. Our findings are intended as a guide to the virus and bacterium literature to support further studies that might then lead to appropriate defense and public health measures.


MeSH Term Hemorrhagic Fever With Renal Syndrome Biomedical Literature Hepatitis Delta Virus Rift Valley Fever 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Büchen-Osmond C. Taxonomy and Classification of Viruses. In: Manual of Clinical Microbiology, ASM Press, Washington DC, 8th ed, Vol 2, p. 1217-1226, 2003Google Scholar
  2. 2.
    DiGiacome, R.A, Kremer, J.M. and Shah, D.M. Fish oil dietary supplementation is patients with Raynaud’s phenomenon: A double-blind, controlled, prospective study, American Journal of Medicine, 158-164m, 8, 1989.Google Scholar
  3. 3.
    Geissler, E. (Ed.), Biological and toxin weapons today, Oxford, UK: SIPRI (1986)Google Scholar
  4. 4.
    Guidance on cooperative agreements from the U.S. Department of Health and Human Services, Centers for Disease Control and Prevention and the Human Resource Service Administration. Accessible at
  5. 5.
    Hu X., I. Yoo. P. Rumm, M. Atwood., Mining Candidate Viruses as Potential Bio-Terrorism Weapons from Biomedical Literature, in2005 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2005), Atlanta, Georgia, May 19-20, 2005Google Scholar
  6. 6.
    Hu X., Zhang X., Yoo, I., Atwood M., Rumm, P., A Text Mining Approach for Identifying Candidate Viruses as Potential Bio-terrorism Weapons, GESTS International Transaction on Compute Science and Engineering, Vol. 9, NO 1., July 2005Google Scholar
  7. 7.
    P. Kankar, S. Adak, A. Sarkar, K. Murari, K. and G. Sharma. "MedMeSH Summarizer: Text Mining for Gene Clusters", in the Proceedings of the Second SIAM International Conference on Data Mining, Arlington, VA, 2002Google Scholar
  8. 8.
    Rumm P.D. Bioterrorism preparedness: potential threats remain. Am J Public Health. 2005 Mar;95(3):372 (comment on previous article)CrossRefGoogle Scholar
  9. 9.
    Rumm P, Gaydos J, Mansfield J and Kelley P, A Department of Defense (DOD) Virtual Public Health Laboratory Directory, Mil Med, 2000;Jul,165-Supp. 2):73.Google Scholar
  10. 10.
    Swanson, DR., Fish-oil, Raynaud's Syndrome, and undiscovered public knowledge. Perspectives in Biology and Medicine 30(1), 7-18, 1986Google Scholar
  11. 11.
    Swanson, DR., Undiscovered public knowledge. Libr. Q. 56(2), pp. 103-118 1986CrossRefGoogle Scholar
  12. 12.
    Swanson, DR, Smalheiser NR, & Bookstein A Information discovery from complementary literatures: categorizing viruses as potential weapons. JASIST 52(10): 797-812 , 2001CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Xiaohua Hu
    • 1
  • Xiaodan Zhang
    • 1
  • Daniel Wu
    • 1
  • Xiaohua Zhou
    • 1
  • Peter Rumm
    • 2
  1. 1.College of Information Science and TechnologyDrexel UniversityPhiladelphiaUSA
  2. 2.School of Public HealthDrexel UniversityPhiladelphiaUSA

Personalised recommendations