Analysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)

Authors

  • karimi, Elmira Iranian Research Institute for Information Science and Technology
Abstract:

Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis.    Methods: The method of this research is log analysis. In this research, the Ganj users’ query refinement behaviors were analyzed. User’s logs during 3 months between May and June 2016 were analyzed for semantic features. The study tool was a researcher-made checklist of semantic features. The total searches were 10 milion records which were limited to information science domain. About 106641 records were selected for analysis.  Results: The semantic relationships (based on thesaurus relationships) were revealed between pair’s terms in user’s searches. The results showed that users refined their searches based on some semantic relationships.     Conclusion: The results of this research can be used to improve the Ganj results and for term suggestion for users, so that they be able to choose proper terms while there are several related terms.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Query expansion based on relevance feedback and latent semantic analysis

Web search engines are one of the most popular tools on the Internet which are widely-used by expert and novice users. Constructing an adequate query which represents the best specification of users’ information need to the search engine is an important concern of web users. Query expansion is a way to reduce this concern and increase user satisfaction. In this paper, a new method of query expa...

full text

Log Analysis of Academic Digital Library: User Query Patterns

This study analyzed user queries submitted to an academic digital library for four weeks (July 2012 to August 2012). We examined users’ query behaviors and compared external and internal users’ query patterns for image-based collections. The results of this study identified the most frequently occurring queries, the mean of query strings, the term frequency, the most frequently used word pairs ...

full text

Query Log Analysis for User-Centric Multimedia Databases

Recently, the information community has seen the emergence of user-centric media applications, which are characterized by the central position given to the user. To fulfill the user-centric promise, it is necessary to understand and model the actions of the users of the system. This position paper presents a methodology for modeling the behavior of multimedia database users. To this end, we pro...

full text

A Semantic Perspective on Query Log Analysis

We present our views on the CLEF log file analysis task. We argue for a task definition that focuses on the semantic enrichment of query logs. In addition, we discuss how additional information about the context in which queries are being made could further our understanding of users’ information seeking and how to better facilitate this process.

full text

personalization of search engines, based-on comparative analysis of user behavior

in this research work, the impact of user’s behavior on search engine results is discussed. it aims to improvement of search results which leads to the higher satisfaction of users. in other words, we are trying to present a personalized search engine for each user, based on his/her activity and search history. we base our hypothesis that the search history of each user in a specific time frame...

full text

investigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances

در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 5  issue 3

pages  1- 14

publication date 2018-12

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

No Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023