Analysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)
نویسندگان
چکیده مقاله:
Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis. Methods: The method of this research is log analysis. In this research, the Ganj users’ query refinement behaviors were analyzed. User’s logs during 3 months between May and June 2016 were analyzed for semantic features. The study tool was a researcher-made checklist of semantic features. The total searches were 10 milion records which were limited to information science domain. About 106641 records were selected for analysis. Results: The semantic relationships (based on thesaurus relationships) were revealed between pair’s terms in user’s searches. The results showed that users refined their searches based on some semantic relationships. Conclusion: The results of this research can be used to improve the Ganj results and for term suggestion for users, so that they be able to choose proper terms while there are several related terms.
منابع مشابه
Query expansion based on relevance feedback and latent semantic analysis
Web search engines are one of the most popular tools on the Internet which are widely-used by expert and novice users. Constructing an adequate query which represents the best specification of users’ information need to the search engine is an important concern of web users. Query expansion is a way to reduce this concern and increase user satisfaction. In this paper, a new method of query expa...
متن کاملLog Analysis of Academic Digital Library: User Query Patterns
This study analyzed user queries submitted to an academic digital library for four weeks (July 2012 to August 2012). We examined users’ query behaviors and compared external and internal users’ query patterns for image-based collections. The results of this study identified the most frequently occurring queries, the mean of query strings, the term frequency, the most frequently used word pairs ...
متن کاملQuery Log Analysis for User-Centric Multimedia Databases
Recently, the information community has seen the emergence of user-centric media applications, which are characterized by the central position given to the user. To fulfill the user-centric promise, it is necessary to understand and model the actions of the users of the system. This position paper presents a methodology for modeling the behavior of multimedia database users. To this end, we pro...
متن کاملA Semantic Perspective on Query Log Analysis
We present our views on the CLEF log file analysis task. We argue for a task definition that focuses on the semantic enrichment of query logs. In addition, we discuss how additional information about the context in which queries are being made could further our understanding of users’ information seeking and how to better facilitate this process.
متن کاملpersonalization of search engines, based-on comparative analysis of user behavior
in this research work, the impact of user’s behavior on search engine results is discussed. it aims to improvement of search results which leads to the higher satisfaction of users. in other words, we are trying to present a personalized search engine for each user, based on his/her activity and search history. we base our hypothesis that the search history of each user in a specific time frame...
متن کاملinvestigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances
در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...
منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 5 شماره 3
صفحات 1- 14
تاریخ انتشار 2018-12
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
کلمات کلیدی برای این مقاله ارائه نشده است
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023