ARTICLE INFO

Article Type

Systematic Review

Authors

Moazamiyanfar   R. (1)
Rouhani Nejad   H. (*)






(*) Department of Nano Technology, Advance Sciences & Technology Faculty, Pharmaceutical Sciences Branch, Islamic Azad University, Tehran, Iran
(1) 1Department of Nano Technology, Advance Sciences & Technology Faculty, Pharmaceutical Sciences Branch, Islamic Azad University, Tehran, Iran

Correspondence

Address: Institute of Biotechnology & Bioscience, Malek-Ashtar University of Technology, Lavizan, Shahid Babaee Highway, Tehran, Iran. Post Code: 158751774
Phone: +98 (21) 26754457
Fax: +98 (21) 22974604
rohaninejhad@gmail.com

Article History

Received:   December  10, 2016
Accepted:   August 9, 2017
ePublished:   June 3, 2018

ABSTRACT

Aims Bioterrorism is an invasive attack that can cause disease or death in humans, using viruses, bacteria or toxic substances. In recent years, due to an increase in the number of online articles in databases, much attention has been paid to the application of text mining and information extraction strategies from biomedical articles. The purpose of this study was to evaluate the importance of toxins as biological weapons by searching in medical texts and medical databases.
Instrument & Methods This text mining and data research study was carried out in 2015-2016. The Carrot 2 software was used to cluster the keyword search results into the network and especially the biomedical databases. When searching for keywords, the search engine was set up on PubMed and the cluster type was based on K-means, and at the end of the results, the results were considered as foam trees.
Findings The highest neurotoxins record was related to tetrodotoxin with a total record of 18970, The highest cytotoxins record was related to Pertussis toxin with a total record of 14390, The highest dermally hazardous cytotoxins record was related to Zearalenone with a total record of 2656.
Conclusion Priorities of Bioterrorism Tracking and Biological Warfare Tracking are early detection, public health and control of these agents, So the micro and macro policies should focus on these.


CITATION LINKS

[1]Henderson DA. The looming threat of bioterrorism. Science. 1999:283(5406):1279-82.
[2]Bellamy RJ, Freedman AR. Bioterrorism. Int J Med. 2001;94(4):227-34.
[3]Christopher LG, Cieslak LT, Pavlin JA, Eitzen EM. Biological warfare: A historical perspective. Jama. 1997;278(5):412-7.
[4]Karwa M, Bronzert P, Kvetan V. Bioterrorism and critical care. Crit Care Clin. 2003;19(2):279-313.
[5]DaSilva EJ. Biological warfare, bioterrorism, biodefence and the biological and toxin weapons convention. Electron J Biotechnol. 1999;2(3):3-4.
[6]Barras V, Greub G. History of biological warfare and bioterrorism. Clin Microbiol Infect. 2014;20(6):497-502.
[7]Krallinger M, Leitner F, Valencia A. Analysis of biological processes and diseases using text mining approaches. Bioinform Methods Clin Res. 2010;593:341-82.
[8]Rodriguez-Esteban R. Biomedical text mining and its applications. PLoS Comput Biol. 2009;5(12):e1000597.
[9]Sirmakessis S, Mining for gems of information. In: Sirmakessis S, editor. Text mining and its applications: Results of the NEMIS Launch Conference. New York: Springer; 2004. pp. 1-6.
[10]Hu X, Zhang X, Wu D, Zhou X, Rumm P, Text mining the biomedical literature for identification of potential virus/bacterium as bio-terrorism weapons. In: Chen H, Reid E, Sinai J, Silke A, Ganor B, editors, Terrorism Informatics. Hamburg: Springer; 2008. pp. 385-406.
[11]Swanson DR. Undiscovered public knowledge. Libr Q. 1986;56(2):103-18.
[12]Jacobs MK. The history of biologic warfare and bioterrorism. Dermatol Clin. 2004;22(3):231-46.
[13]Subirana M, Solá I, Garcia JM, Gich I, Urrútia G. A nursing qualitative systematic review required MEDLINE and CINAHL for study identification. J Clin Epidemiol. 2005;58(1):20-5.
[14]Wheeler DL, Barrett T, Benson DA, Bryant SH, Canese K, Chetvernin V, et al. Database resources of the National Center for Biotechnology Information. Nucleic Acids Res. 2007;35:5-12.
[15]Falagas ME, Pitsouni EI, Malietzis GA, Pappas G. Comparison of PubMed, Scopus, web of science, and Google scholar: Strengths and weaknesses. The FASEB J. 2008;22(2):338-42.
[16]Lodhi H, Saunders C, Shawe-Taylor J, Cristianini N, Watkins C. Text classification using string kernels. J Mach Learn Res. 2002;2:419-44.
[17]Ponmuthuramalingam P, Devi T. Effective term based text clustering algorithms. Int J Comput Sci Eng. 2010;2(5):1665-73.
[18]Xiaojun Z, Michael W, Berry and Jacob Kogan, editors. Text mining: Applications and theory. Inf Retr. 2011;14(2):208-11.
[19]Chaurasia N, Dhakar M, Tiwari A, Gupta RK. A survey on terrorist network mining: Current trends and opportunities. Int J Comput Sci Eng Surv. 2012;3(4):59-66.
[20]Schmitt K, Zacchia NA. Total decontamination cost of the anthrax letter attacks. Biosecur Bioterror: Biodef Strategy Pract Sci. 2012;10(1):98-107.
[21]Kortepeter MG, Parker GW. Potential biological weapons threats. Emerg Infect Dis. 1999;5(4):523-7.
[22]Jernigan JA, Stephens DS, Ashford DA, Omenaca C, Topiel MS, Galbraith M, et al. Bioterrorism-related inhalational anthrax: The first 10 cases reported in the United States. Emerg Infect Dis. 2001;7(6):933-44.
[23]Grönvall GK. A new role for scientists in the Biological Weapons Convention. Nat Biotechnol. 2005;23(10):1213-6.
[24]Kulkarni Sh, Baban Pawar S, Satpute G. Terror Detection Using Text Mining. Imp J Interdiscip Res. 2016;2(5):1882-5.