Log Analysis of Academic Digital Library: User Query Patterns
|
|
|
- Susanna Stafford
- 10 years ago
- Views:
Transcription
1 Log Analysis of Academic Digital Library: User Query Patterns Hyejung Han 1, Wooseob Jeong 1 and Dietmar Wolfram 1 1 University of Wisconsin - Milwaukee Abstract This study analyzed user queries submitted to an academic digital library for four weeks (July 2012 to August 2012). We examined users query behaviors and compared external and internal users query patterns for image-based collections. The results of this study identified the most frequently occurring queries, the mean of query strings, the term frequency, the most frequently used word pairs and the relationship between query terms. Transaction log analysis is useful to examine users information seeking behavior effectively due to the richness of data. The query analysis of this study shows not only users information seeking behaviors for image-based collections but also the differences between external and internal users query patterns clearly. Keywords: transaction log analysis, academic digital library, user queries, query analysis Citation: Han, H., Jeong, W., & Wolfram, D. (2014). Log Analysis of Academic Digital Library: User Query Patterns. In iconference 2014 Proceedings (p ). doi: /14346 Copyright: Copyright is held by the authors. Contact: [email protected], [email protected], [email protected] 1 Introduction and Literature Review Users search in various types of IR systems for their information by formulating queries in a search box. Search facilities for different types of Web IR environments may appear similar, but the contents can be different with the search box and execute button (Wolfram, 2008). For the examination of users information seeking patterns, transaction log data are used in many studies. Log data helps researchers identify and understand hidden and invisible user visit patterns (Zhang, 2008). Jansen (2006) noted that stored data in transaction logs of web search engines, intranets and websites can offer valuable insights about the information searching process of online searchers. Many researchers (Jansen, Spink and Saracevic, 2000; Spink, Wolfram, Jansen and Saracevic, 2001; Jansen and Spink, 2006; Zhang, Wolfram and Wang, 2009) have conducted transaction log query analysis of websites. Wolfram (2008) analyzed query characteristics in a bibliographic databank, OPAC, search Engine, and specialized search system such as HealthLink. Wang, Berry and Yang (2003) investigated an academic website s query trends and patterns with transaction log data during a four-year period. However, there is little investigation about transaction log analysis of users query in academic digital libraries, in particular image-based digital collections, although there have been studies to analyze users queries for image retrieval by surveys and interviews (Choi and Rasmussen, 2003). The purpose of this study is to identify and understand users query searching behavior and their query formulation patterns in an academic image-based digital library. It also compares the characteristics of external queries and internal queries. 2 Research Questions This study investigates the following research questions: a) What characteristics of querying in an academic image-based digital library can be identified? b) Are there different characteristics of querying between external and internal users for digital image collections?
2 c) What differences, if any, are there between experts and novices in query formulations in an imagebased digital library in terms of advanced search options such as Boolean operations? 3 Method Transaction log data for four weeks (from July 29, 2012 to August 26, 2012) were made available from the University of Wisconsin-Milwaukee libraries digital collections. The collections consist of over 54,000 photographic images, maps, and special collections. The masked IP address field and the referral field were extracted from the raw transaction log file and saved as a plain text file. There are two kinds of search query strings; those originating from the digital collection site (internal) and those from outside sources such as search engines (external). The internal search interface uses CISOBOX1 as a field name for the primary search function, while the external searches were identified with q for the query field. To compare the difference between the internal search and the external search, all the lines with the string CISOBOX1= in the referral field and all lines with the string of q= in the referral field were extracted into two files. For both files, the entries were sorted in alphabetic order of the masked IP addresses. From the sorted data set, all lines with the repeated same referral fields from the same IP addresses were eliminated. The repeated lines were generated because often one displayed page has multiple components such as images or icons. In this way, all the unique queries were identified. To analyze the records at the query and term level, only the query strings were extracted from the URL encodings at each referral field. The extracted query strings were further cleaned by removing all the non-alphabetic characters (digits and special characters) to make counting simpler. All the remaining alphabetic characters were transformed into lower case for more accurate word and query counting. Relationships among query term pairs were compared using the network analysis software Pajek ( 4 Results 4.1 Query Analysis External and internal query data were analyzed to compare the different characteristics between two groups. There were 2,825 external query lines and 11,194 internal query lines. Table 1 shows the 30 most frequent query strings for external searches and those for internal searches. The most frequent query in external data is the two-word query family notices with 24 occurrences (Table 1). External Query Strings Frequency Internal Query Strings Frequency family notices 24 tsybikoff g ts 1481 scenes_in_the_city_posting_the_messages 23 central tibet 543 Subjectarticles 15 wisconsin 182 kindergarten union 13 near south side 145 knit cast on 11 china 138 frank bradley 11 milwaukee 120 the dawn 9 james groppi papers 98 knitting patterns 9 s s 90 mark brinkley 9 hong kong harrison fo rman 89 Baumgarten 9 manila 81 china military police 7 california 79 Gwalior 7 hong kong 72 vegetation map of asia 7 turkey
3 shanghai evening post and mercur y 7 east side 69 Vietnam 7 downtown 69 pearl harbour 7 new york 66 Hiroshima 6 united states 64 Refugees 6 people 59 empire theater 6 am 59 Deegan 6 forman harrison 57 empire theatre 6 nanniwan 56 Schomberg 6 southeast side 55 ellen white 6 dwellings 53 Thailand 5 near north side 53 asylum hill hotel 5 documents 51 ellen brown 5 henan 48 functions of internet 5 west side 47 Morey 5 afghanistan 46 use and misuse of internet 5 hong 45 Table 1: External and Internal Query Strings The most frequent internal query is the three-word tsybikoff g ts (a Russian explorer named: Gombojab Tsybikov (Romanized as Tsybikoff)) with 1,481 occurrences (Table1). The top query strings are historical topic-related. As Jones and others (2000) found, the queries included users space error such as subjectarticles and spelling differences between UK and American systems such as pearl harbour. Figure 1 shows that the mean of external query strings is 2.45 with standard deviation of The mean of internal query strings is 1.96 with standard deviation of (Figure 2). 1004
4 Figure 1: External Query Strings Figure 2: Internal Query Strings 1005
5 4.2 Term Analysis For the analysis of individual term used in queries, the most frequent 30 query terms from the external queries and the internal queries were identified respectively. Since the purpose of this study is to explore term frequency patterns, all observed words were contained in the analysis, including Boolean operator AND and OR as well as stop words (e.g. the, of, and, a, etc.). In the external data, besides the stop words, the most frequently used query terms are Name related for conducting people searches (e.g. John, William, James, Thomas, Henry, Peter, etc.). In the internal data, the most frequently occurring terms are Geographic places related such as Tibet, Milwaukee, Wisconsin and China rather than stop words. The data also revealed that the top individual terms are much more consistent with the top queries among internal queries than external queries. 4.3 Word Pair Analysis To analyze the relationship among query terms, all the possible pairs of terms from each query string were created by a PHP script. The most frequent word pairs in the external data are use and of, or and or, and map and of. In the internal data, the most frequent word pairs are g and ts, tsybikoff and g and tsybikoff and ts. Thus, the internal top query pairs are consistent with internal top query strings. To visually examine the relationship among query terms, visualization of the relationship among all the terms in each data set (external vs. internal) was attempted by Pajek, one of the most popular network analysis tools. The data were converted to Pajek format using txt2pajek.exe with a weighted option for the pair frequency. To avoid too complex displays and to obtain meaningful outputs, only the top 100 word pairs from each data set were included (the ties were counted). Figure 3 illustrates the relationship among external search terms and Figure 4 shows that among internal ones. Figure 3: The relationship among external search terms 4.4 Differences between Experts and Novices Experts tend to use various search tactics more frequently in their searches than novice users. We could observe the differences between experts and novice users by analyzing the search queries using Boolean 1006
6 operators and wildcard characters, although their frequencies are low. Only 26 Boolean search queries were observed and only 4 queries using a wildcard character were identified. 5 Discussion and Conclusion Figure 4: The relationship among internal search terms The query analysis in this study shows the differences between external and internal query patterns clearly. Internal query strings, query terms and word-pairs show the consistent relationship among each other while external ones do not show this consistency. User queries between this academic digital library and the search engine Excite (Jansen) show some similarities. The average length of queries in both IR systems is short, with a mean of around 2 terms per a query. However, there exist differences in the search topic. Queries of this academic digital library include historical and geographical related topics while the search topics from search engines range from sexual topic to entertainment. The limited size of the data collection does not allow broad generalizations. The limitation of this study is to analyze query term frequency literally. For example, Hong Kong is two-term place name but in the single term analysis, it was divided into two single terms and they were ranked 9th and 10th as the most frequently used query terms. Due to a small amount of data, spelling errors were not examined. In a larger study in near future with additional data, more sophisticated data examination will be conducted. The results of this study are useful to understand users searching behavior, especially with their query patterns in an image-based academic digital library. There is little research about transaction log analysis of digital libraries. Hence, this study will contribute to the better understanding of users interaction with digital libraries, especially those with image-based collections. 6 References Choi, Y., & Rasmussen, E. M. (2003). Searching for images: the analysis of users' queries for image retrieval in American history. Journal of the American society for information science and technology, 54(6),
7 Jansen, B. J., Spink, A., & Saracevic, T. (2000). Real life, real users, and real needs: a study and analysis of user queries on the web. Information processing & management, 36(2), Jansen, B. J., and Spink, A. (2006). How are we searching the world wide web? A comparison of nine search engine transaction logs. Information Processing and Management, 42(1), Jansen, B. J. (2006). Search log analysis: what it is, what's been done, how to do it. Library & information science research, 28(3), Jones, S., Cunningham, S. J., McNab, R., & Boddie, S. (2000). A transaction log analysis of a digital library. International Journal on Digital Libraries, 3(2), Spink, A., Wolfram, D., Jansen, M. B., & Saracevic, T. (2001). Searching the web: The public and their queries. Journal of the American society for information science and technology, 52(3), Wang, P., Berry, M. W., & Yang, Y. (2003). Mining longitudinal Web queries: Trends and patterns. Journal of the American Society for Information Science and Technology, 54(8), Wolfram, D. (2008). Search characteristics in different types of Web-based IR environments: Are they the same?. Information processing & management, 44(3), Zhang, J., Wolfram, D., & Wang, P. (2009). Analysis of query keywords of sports?related queries using visualization and clustering. Journal of the American Society for Information Science and Technology, 60(8), Zhang, J. (2008). Visualization for information retrieval, New York, NY: Springer. 7 Table of Figures Figure 1: External Query Strings Figure 2: Internal Query Strings Figure 3: The relationship among external search terms Figure 4: The relationship among internal search terms Table of Tables Table 1: External and Internal Query Strings
Weiling Liu University of Louisville [email protected]
Weiling Liu University of Louisville [email protected] In an OPAC system, if the default options are not "Keyword" and "all of these," are they still the most frequently used options? Objectives: To
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
WEB OF SCIENCE QUICK REFERENCE CARD QUICK REFERENCE CARD
WEB OF SCIENCE QUICK REFERENCE CARD QUICK REFERENCE CARD REUTERS/ Ina Fassbender WHAT IS WEB OF SCIENCE? Search over 9,00 journals from over 5 different languages across the sciences, social sciences,
1.00 ATHENS LOG IN 4 2.00 BROWSE JOURNALS 4
1.00 ATHENS LOG IN 4 1.01 What is Athens? 4 1.02 Accessing Cambridge Journals Online using Athens 4 2.00 BROWSE JOURNALS 4 2.01 Browse: By title 5 2.02 Browse: By subject 5 2.03 Browse: Favourites 5 2.04
Scopus. Quick Reference Guide
Scopus Quick Reference Guide Quick Reference Guide An eye on global research. Scopus is the largest abstract and citation database of peer-reviewed literature, with bibliometrics tools to track, analyze
LexisNexis TotalPatent. Training Manual
LexisNexis TotalPatent Training Manual March, 2013 Table of Contents 1 GETTING STARTED Signing On / Off Setting Preferences and Project IDs Online Help and Feedback 2 SEARCHING FUNDAMENTALS Overview of
Quick Reference: Searching, Availability and Requesting an Item
Quick Reference: Searching, Availability and Requesting an Item Introduction Based on WorldCat holdings, WorldCat Local enables your users to search your local or shared catalog, scope results, and use
WEB OF SCIENCE CORE COLLECTION
What is Web of Science Core Collection? Search over 55 million records from the top journals, conference proceedings, and books in the sciences, social sciences, and arts and humanities to find the high
Analyzing Chinese-English Mixed Language Queries in a Web Search Engine
Analyzing Chinese-English Mixed Language Queries in a Web Search Engine Hengyi Fu School of Information Florida State University 142 Collegiate Loop, FL 32306 [email protected] Shuheng Wu School of Information
Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey
1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics
Search and Information Retrieval
Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search
Office of History. Using Code ZH Document Management System
Office of History Document Management System Using Code ZH Document The ZH Document (ZH DMS) uses a set of integrated tools to satisfy the requirements for managing its archive of electronic documents.
Bibliometrics and Transaction Log Analysis. Bibliometrics Citation Analysis Transaction Log Analysis
and Transaction Log Analysis Bibliometrics Citation Analysis Transaction Log Analysis Definitions: Quantitative study of literatures as reflected in bibliographies Use of quantitative analysis and statistics
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Building Data Warehouse
Building Data Warehouse Building Data Warehouse Teh Ying Wah, Ng Hooi Peng, and Ching Sue Hok Department of Information Science University Malaya Malaysia E-mail: [email protected] Abstract This paper introduces
On the Fly Query Segmentation Using Snippets
On the Fly Query Segmentation Using Snippets David J. Brenes 1, Daniel Gayo-Avello 2 and Rodrigo Garcia 3 1 Simplelogica S.L. [email protected] 2 University of Oviedo [email protected] 3 University
A Rule-Based Short Query Intent Identification System
A Rule-Based Short Query Intent Identification System Arijit De 1, Sunil Kumar Kopparapu 2 TCS Innovation Labs-Mumbai Tata Consultancy Services Pokhran Road No. 2, Thane West, Maharashtra 461, India 1
Comparing IPL2 and Yahoo! Answers: A Case Study of Digital Reference and Community Based Question Answering
Comparing and : A Case Study of Digital Reference and Community Based Answering Dan Wu 1 and Daqing He 1 School of Information Management, Wuhan University School of Information Sciences, University of
EBSCOhost User Guide Searching. Basic, Advanced & Visual Searching, Result List, Article Details, Additional Features. support.ebsco.
EBSCOhost User Guide Searching Basic, Advanced & Visual Searching, Result List, Article Details, Additional Features Table of Contents What is EBSCOhost... 3 System Requirements... 3 Inside this User Guide...
FileMaker 12. ODBC and JDBC Guide
FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
Chapter 1: The Cochrane Library Search Tour
Chapter : The Cochrane Library Search Tour Chapter : The Cochrane Library Search Tour This chapter will provide an overview of The Cochrane Library Search: Learn how The Cochrane Library new search feature
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Interactive Information Visualization in the Digital Flora of Texas
Interactive Information Visualization in the Digital Flora of Texas Teong Joo Ong 1, John J. Leggett 1, Hugh D. Wilson 2, Stephan L. Hatch 3, Monique D. Reed 2 1 Center for the Study of Digital Libraries,
Use of Online Public Access Catalogue at Annamalai University Library
International Journal of Information Science 2012, 2(6): 70-74 DOI: 10.5923/j.ijis.20120206.01 Use of Online Public Access Catalogue at Annamalai University Library S. Thanuskodi Department of Library
Query Recommendation employing Query Logs in Search Optimization
1917 Query Recommendation employing Query Logs in Search Optimization Neha Singh Department of Computer Science, Shri Siddhi Vinayak Group of Institutions, Bareilly Email: [email protected] Dr Manish
Implementing a Web-Based Architecture for DICOM Data Capture in Clinical Trials
Implementing a Web-Based Architecture for DICOM Data Capture in Clinical Trials Daniel Haak, Charles E. Page, Thomas M. Deserno Department of Medical Informatics, Uniklinik RWTH Aachen [email protected]
EndNote Beyond the Basics
IOE Library Guide EndNote Beyond the Basics These notes assume that you know EndNote basics and are using it regularly. Additional tips and instruction is contained within the guides and FAQs available
FileMaker 13. ODBC and JDBC Guide
FileMaker 13 ODBC and JDBC Guide 2004 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
U.S. Department of the Interior/Geological Survey. Earth Science Information System (ESIS)
U.S. Department of the Interior/Geological Survey Earth Science Information System (ESIS) Earth Science Information System (ESIS) Historical Background The Earth Science Information System (ESIS) was developed
Medical Information-Retrieval Systems. Dong Peng Medical Informatics Group
Medical Information-Retrieval Systems Dong Peng Medical Informatics Group Outline Evolution of medical Information-Retrieval (IR). The information retrieval process. The trend of medical information retrieval
Numerical Algorithms Group
Title: Summary: Using the Component Approach to Craft Customized Data Mining Solutions One definition of data mining is the non-trivial extraction of implicit, previously unknown and potentially useful
VMware vcenter Log Insight User's Guide
VMware vcenter Log Insight User's Guide vcenter Log Insight 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
XML Processing and Web Services. Chapter 17
XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Teamstudio USER GUIDE
Teamstudio Software Engineering Tools for IBM Lotus Notes and Domino USER GUIDE Edition 30 Copyright Notice This User Guide documents the entire Teamstudio product suite, including: Teamstudio Analyzer
OvidSP Quick Reference Guide
OvidSP Quick Reference Guide Opening an OvidSP Session Open the OvidSP URL with a browser or Follow a link on a web page or Use Athens or Shibboleth access Select Resources to Search In the Select Resource(s)
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,
SAS BI Dashboard 3.1. User s Guide
SAS BI Dashboard 3.1 User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2007. SAS BI Dashboard 3.1: User s Guide. Cary, NC: SAS Institute Inc. SAS BI Dashboard
FileMaker 11. ODBC and JDBC Guide
FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
XHTML Forms. Form syntax. Selection widgets. Submission method. Submission action. Radio buttons
XHTML Forms Web forms, much like the analogous paper forms, allow the user to provide input. This input is typically sent to a server for processing. Forms can be used to submit data (e.g., placing an
REUTERS/TIM WIMBORNE SCHOLARONE MANUSCRIPTS COGNOS REPORTS
REUTERS/TIM WIMBORNE SCHOLARONE MANUSCRIPTS COGNOS REPORTS 28-APRIL-2015 TABLE OF CONTENTS Select an item in the table of contents to go to that topic in the document. USE GET HELP NOW & FAQS... 1 SYSTEM
Chapter 5 Use the technological Tools for accessing Information 5.1 Overview of Databases are organized collections of information.
Chapter 5 Use the technological Tools for accessing Information 5.1 Overview of Databases are organized collections of information. Ex: Online Catalogs. 1. Structure of a Database - Contains record and
Your guide to finding academic information for Engineering
Your guide to finding academic information for Engineering This guide is designed to introduce you to electronic academic databases relevant to Engineering. Online databases contain large amounts of current
A COMPREHENSIVE REVIEW ON SEARCH ENGINE OPTIMIZATION
Volume 4, No. 1, January 2013 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info A COMPREHENSIVE REVIEW ON SEARCH ENGINE OPTIMIZATION 1 Er.Tanveer Singh, 2
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM IRANDOC CASE STUDY Ammar Jalalimanesh a,*, Elaheh Homayounvala a a Information engineering department, Iranian Research Institute for
USER GUIDE FOR L ANNÉE PHILOLOGIQUE ON THE INTERNET
USER GUIDE FOR L ANNÉE PHILOLOGIQUE ON THE INTERNET Tip: You can use the Bookmarks to navigate through the guide. Accessing L Année philologique Individual Membership Individual membership accounts are
Add external resources to your search by including Universal Search sites in either Basic or Advanced mode.
Opening a Nursing@Ovid Session Open the Nursing@Ovid URL with a browser or Follow a link on a web page or Use Athens or Shibboleth access Select Resources to Search On login, Nursing@Ovid may take you
Introduction to IR Systems: Supporting Boolean Text Search. Information Retrieval. IR vs. DBMS. Chapter 27, Part A
Introduction to IR Systems: Supporting Boolean Text Search Chapter 27, Part A Database Management Systems, R. Ramakrishnan 1 Information Retrieval A research field traditionally separate from Databases
School Library Standards. for California Public Schools, Grades Nine through Twelve
School Library Standards for California Public Schools, Grades Nine through Twelve STANDARD 1 Students Access Information The student will access information by applying knowledge of the organization of
K-means Clustering Technique on Search Engine Dataset using Data Mining Tool
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 505-510 International Research Publications House http://www. irphouse.com /ijict.htm K-means
PASSPORT USER GUIDE. This guide provides a detailed overview of how to use Passport, allowing you to find the information you need more efficiently.
PASSPORT USER GUIDE Euromonitor International s Passport is an integrated online database, providing business intelligence on industries, economies and consumers. Its simple-to-use interface makes it easy
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Figure A Partial list of EBSCOhost databases
Getting More from EBSCOhost Databases September 2006, St. Mary s University, Louis J. Blume Library, http://library.stmarytx.edu/acadlib/ Diane M. Duesterhoeft, [email protected], 210/436-3346;
Scholarly Use of Web Archives
Scholarly Use of Web Archives Helen Hockx-Yu Head of Web Archiving British Library 15 February 2013 Web Archiving initiatives worldwide http://en.wikipedia.org/wiki/file:map_of_web_archiving_initiatives_worldwide.png
Best Practices for Hadoop Data Analysis with Tableau
Best Practices for Hadoop Data Analysis with Tableau September 2013 2013 Hortonworks Inc. http:// Tableau 6.1.4 introduced the ability to visualize large, complex data stored in Apache Hadoop with Hortonworks
INTERNAL THREAT DETECTION
INTERNAL THREAT DETECTION ANALYZE. UNDERSTAND. INVESTIGATE. SECURITY ANALYZE, UNDERSTAND AND INVESTIGATE INSIDER THREATS WITH MADROC. Industrial espionage, stolen intellectual property and the most common
IT and CRM A basic CRM model Data source & gathering system Database system Data warehouse Information delivery system Information users
1 IT and CRM A basic CRM model Data source & gathering Database Data warehouse Information delivery Information users 2 IT and CRM Markets have always recognized the importance of gathering detailed data
CSSEA Helpdesk User Guide
CSSEA Helpdesk User Guide Contents I. Creating tickets... 3 1. Creating a New Ticket via Email... 3 a. Email format... 3 b. New ticket reply... 3 2. Creating a New ticket via the Website... 4 a. Browse
ProviderInfoSource. Provider User Guide. Find a Payor. Chapter 13
ProviderInfoSource Provider User Guide Find a Payor Chapter 13 ProviderInfoSource is an online tool that gives you and your staff immediate access to information pertinent to your practice http://providerinfosource.healthlink.com
The Impact of Query Suggestion in E-Commerce Websites
The Impact of Query Suggestion in E-Commerce Websites Alice Lee 1 and Michael Chau 1 1 School of Business, The University of Hong Kong, Pokfulam Road, Hong Kong [email protected], [email protected] Abstract.
Introduction. Chapter 1. 1.1 Introduction. 1.2 Background
Chapter 1 Introduction 1.1 Introduction This report is the fifth in the series describing experiments with the British Library Research & Development Department's (BLR&DD) Okapi bibliographic information
VMware vcenter Log Insight User's Guide
VMware vcenter Log Insight User's Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
Web Document Clustering
Web Document Clustering Lab Project based on the MDL clustering suite http://www.cs.ccsu.edu/~markov/mdlclustering/ Zdravko Markov Computer Science Department Central Connecticut State University New Britain,
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor
Cataloging in East Asia Library of Yale University
Wei Cen ILS 508: Information Analysis and Organization Term Paper Instructor: Dr. Sche Cataloging in East Asia Library of Yale University Introduction of East Asia Library The East Asia Library (EAL) of
Yandex: Webmaster Tools Overview and Guidelines
Yandex: Webmaster Tools Overview and Guidelines Agenda Introduction Register Features and Tools 2 Introduction What is Yandex Yandex is the leading search engine in Russia. It has nearly 60% market share
Nuix Forensic Focus 2014 Webinar Accelerating investigations using advanced ediscovery techniques 6 th March 2014
Nuix Forensic Focus 2014 Webinar Accelerating investigations using advanced ediscovery techniques 6 th March 2014 All rights reserved 2014. Nuix Software ABOUT THE PRESENTERS Paul Slater Director of Forensic
Creating and Implementing Conversational Agents
Creating and Implementing Conversational Agents Kenneth J. Luterbach East Carolina University Abstract First, this paper discusses the use of the Artificial Intelligence Markup Language (AIML) for the
WorldCat Local. May Install Notice
WorldCat Local May Install Notice Locally Held Editions: WorldCat Local will now display other locally held editions on the detailed record when an item is either not available or not held. This is an
Dedoose Distinguishing features and functions
Dedoose Distinguishing features and functions This document is intended to be read in conjunction with the Choosing a CAQDAS Package Working Paper which provides a more general commentary of common CAQDAS
Spotlight on Asia-Pacific
Spotlight on Asia-Pacific Executive Summary & Methodology This special Mobile Mix report focuses on the Asia-Pacific (APAC) mobile device market on the Millennial Media platform. This report will highlight
Make search become the internal function of Internet
Make search become the internal function of Internet Wang Liang 1, Guo Yi-Ping 2, Fang Ming 3 1, 3 (Department of Control Science and Control Engineer, Huazhong University of Science and Technology, WuHan,
Making critical connections: predictive analytics in government
Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse
RESEARCH ON THE FRAMEWORK OF SPATIO-TEMPORAL DATA WAREHOUSE
RESEARCH ON THE FRAMEWORK OF SPATIO-TEMPORAL DATA WAREHOUSE WANG Jizhou, LI Chengming Institute of GIS, Chinese Academy of Surveying and Mapping No.16, Road Beitaiping, District Haidian, Beijing, P.R.China,
Search Query and Matching Approach of Information Retrieval in Cloud Computing
International Journal of Advances in Electrical and Electronics Engineering 99 Available online at www.ijaeee.com & www.sestindia.org ISSN: 2319-1112 Search Query and Matching Approach of Information Retrieval
Hexaware E-book on Predictive Analytics
Hexaware E-book on Predictive Analytics Business Intelligence & Analytics Actionable Intelligence Enabled Published on : Feb 7, 2012 Hexaware E-book on Predictive Analytics What is Data mining? Data mining,
