A Rule-Based Short Query Intent Identification System



Similar documents
Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval

Analyzing Chinese-English Mixed Language Queries in a Web Search Engine

Natural Language to Relational Query by Using Parsing Compiler

On the Fly Query Segmentation Using Snippets

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL

Performance evaluation of Web Information Retrieval Systems and its application to e-business

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction

Search Result Optimization using Annotators

A Comparative Approach to Search Engine Ranking Strategies

Local Search The perfect guide

Inverted files and dynamic signature files for optimisation of Web directories

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Comparing IPL2 and Yahoo! Answers: A Case Study of Digital Reference and Community Based Question Answering


Computational Advertising Andrei Broder Yahoo! Research. SCECR, May 30, 2009

Dynamics of Genre and Domain Intents

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

ONLINE RESUME PARSING SYSTEM USING TEXT ANALYTICS

NOVEL APPROCH FOR OFT BASED WEB DOMAIN PREDICTION

GrammAds: Keyword and Ad Creative Generator for Online Advertising Campaigns

Movie Classification Using k-means and Hierarchical Clustering

Website Community Mining from Query Logs with Two-phase Clustering

Site-Specific versus General Purpose Web Search Engines: A Comparative Evaluation

A Novel Framework for Personalized Web Search

Multiword Keyword Recommendation System for Online Advertising

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Micro blogs Oriented Word Segmentation System

International Journal of Advance Research in Computer Science and Management Studies

A Survey on Product Aspect Ranking

Search Query and Matching Approach of Information Retrieval in Cloud Computing

CIRGIRDISCO at RepLab2014 Reputation Dimension Task: Using Wikipedia Graph Structure for Classifying the Reputation Dimension of a Tweet

Wikipedia and Web document based Query Translation and Expansion for Cross-language IR

Search and Information Retrieval

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Semantic Concept Based Retrieval of Software Bug Report with Feedback

COURSE RECOMMENDER SYSTEM IN E-LEARNING

Bisecting K-Means for Clustering Web Log data

ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search

Web Forensic Evidence of SQL Injection Analysis

Blog Post Extraction Using Title Finding

Recommendation Tool Using Collaborative Filtering

BILINGUAL TRANSLATION SYSTEM

Comparing Methods to Identify Defect Reports in a Change Management Database

Sentiment Analysis on Big Data

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining

Promoting Agriculture Knowledge via Public Web Search Engines : An Experience by an Iranian Librarian in Response to Agricultural Queries

Dissecting the Learning Behaviors in Hacker Forums

Credit Card Fraud Detection Using Self Organised Map

SEARCH ENGINE OPTIMIZATION USING D-DICTIONARY

Survey On: Nearest Neighbour Search With Keywords In Spatial Databases

Studying the Impact of Text Summarization on Contextual Advertising

Term extraction for user profiling: evaluation by the user

An Overview of Computational Advertising

SPATIAL DATA CLASSIFICATION AND DATA MINING

A Comparative Study on Sentiment Classification and Ranking on Product Reviews

A Logistic Regression Approach to Ad Click Prediction

CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance

Florida International University - University of Miami TRECVID 2014

Bayesian Spam Filtering

DESKTOP BASED RECOMMENDATION SYSTEM FOR CAMPUS RECRUITMENT USING MAHOUT

Log Analysis of Academic Digital Library: User Query Patterns

Categorical Data Visualization and Clustering Using Subjective Factors

Design call center management system of e-commerce based on BP neural network and multifractal

Link Analysis and Site Structure in Information Retrieval

Personalization of Web Search With Protected Privacy

The Scientific Data Mining Process

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS

A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS

Query Recommendation employing Query Logs in Search Optimization

A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN

Profile Based Personalized Web Search and Download Blocker

Information Need Assessment in Information Retrieval

A UPS Framework for Providing Privacy Protection in Personalized Web Search

SEO Techniques for various Applications - A Comparative Analyses and Evaluation

Keywords : Data Warehouse, Data Warehouse Testing, Lifecycle based Testing

Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari

Web based English-Chinese OOV term translation using Adaptive rules and Recursive feature selection

I. INTRODUCTION NOESIS ONTOLOGIES SEMANTICS AND ANNOTATION

Site Files. Pattern Discovery. Preprocess ed

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

DESIGN OF AN ONLINE EXPERT SYSTEM FOR CAREER GUIDANCE

Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies

Revenue Optimization with Relevance Constraint in Sponsored Search

Intrusion Detection System using Log Files and Reinforcement Learning

Intinno: A Web Integrated Digital Library and Learning Content Management System

Hybrid Technique for Data Cleaning

An Order-Invariant Time Series Distance Measure [Position on Recent Developments in Time Series Analysis]

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines

Intelligent Log Analyzer. André Restivo

Inner Classification of Clusters for Online News

Efficient Iceberg Query Evaluation for Structured Data using Bitmap Indices

BIDM Project. Predicting the contract type for IT/ITES outsourcing contracts

Machine Learning using MapReduce

Ranked Keyword Search in Cloud Computing: An Innovative Approach

Indian Agriculture Land through Decision Tree in Data Mining

K-means Clustering Technique on Search Engine Dataset using Data Mining Tool

Transcription:

A Rule-Based Short Query Intent Identification System Arijit De 1, Sunil Kumar Kopparapu 2 TCS Innovation Labs-Mumbai Tata Consultancy Services Pokhran Road No. 2, Thane West, Maharashtra 461, India 1 arijit6.d@tcs.com 2 sunilkumar.kopparapu@tcs.com Abstract Using SMS (Short Message System), cell phones can be used to query for information about various topics. In an SMS based search system, one of the key problems is to identify a domain (broad topic) associated with the user query; so that a more comprehensive search can be carried out by the domain specific search engine. In this paper we use a rule based approach, to identify the domain, called Short Query Intent Identification System (SQIIS). We construct two different rule-bases using different strategies to suit query intent identification. We evaluate the two rule-bases experimentally. Keywords-Information Retrieval; Question Answering; Named Entity Detection; Query Classification;Rule-Based Systems I. INTRODUCTION In a typical Information Retrieval (IR) system, the user enters a query in the form of a sentence or a string of words. The task of the system is to match the query to related documents in a rank ordered list of varying relevance. The performance of retrieval can be improved through identification of the intent of the query; the identified intent can be used to enable a specialized and hence restricted domain search. While, query intent identification becomes more important when topically different data repositories are being searched through a single interface, within a metasearch like framework, it becomes a crucial for SMS based mobile search. SMS based domain specific question answering systems are beginning to get popular [8, 9, 12]. Suktarachan [12] proposes such a system for answering questions of farmers while [9] proposes for FAQ and [8] for yellow pages query. However, a mobile phone user s queries might vary from sports scores, movies currently playing, yellow pages to find the nearest restaurant, route directions to a particular even to give a few examples. Almost always the answer to these queries will need searching distinctly different data repositories or domain specific systems. In such case, the first step in the search process is to correctly identify which domain (broad topic) the query is related to and enable a corresponding data repository where the specific search for information be carried out. One luxury that an Internet search system has over a SMS based mobile search system is that the former can return a list of documents that it thinks fit the query of the user. The user can then pick and chose what is relevant. However, the answer to an SMS query has to be short and of course accurate. Thus, SMS based systems can not dump a whole load of information to the user. This essentially means accuracy is of paramount importance in SMS searches. In this paper, we describe the working of Short Query Intent Identification System (SQIIS), which can be used to accurately detect the domain of an SMS query. The key strength of our system is a set of rules (rule-based) which enables the system identify the intent of the query and hence the domain. Our focus is in analyzing the construction of two different rule bases that can be used in domain detection. The paper is organized as follows. In Section II we give a brief overview of previous work in query intent identification and discuss how our work is related and different from the general body of knowledge in this area. In Section III we provide a brief introduction to SQIIS followed by a discussion on creation of two different rule bases in Section IV and we evaluate the rule-bases in Section V and conclude in Section VI. II. PREVIOUS WORK The broad area of query intent identification is a well explored area in field of IR. While most query intent identification techniques are targeted towards the World Wide Web and Internet Search technology. Brenes [1] break up the problem of query intent identification into topic identification and intent identification. Broder [4] and Jansen [6] laid out the generally accepted taxonomy for intent identification by distinguishing between navigational and informational queries. Navigational queries on the web are those where the user intends to find a specific web page, whereas informational queries are when the user seeks information on a certain topic. Our area of work, however, would fall under topic identification in the classification scheme proposed by Brenes [1]. Topic identification of queries is a promising area as it can dramatically improve accuracy of a retrieval system. Beitzel [2] compares query topic identification pre retrieval with post-retrieval and observes the effect of training a classifier explicitly from pre topic tagged queries in contrast to mapping a classifier trained using a document

classification scheme to a query topic classifier. In a previous work Beitzel [3] apply computational linguistics based technique to mine large collection of unlabeled web query logs that can create topical web query classifiers. They were able to demonstrate an improvement in topic identification and classification when their approach is combined with manual matching and supervised learning. Broader [5], Spink [11], and Pu [1] have all provided query taxonomies, similar to Yahoo! [13] and DMOZ [14] web directories. While topic identification of queries for the web is a fairly well explored topic, topic identification for mobile search has not been explored. Also most of these topic identification techniques are data driven and involve large training sets. In the absence of data a radically new approach is called for, that has minimal data dependency. This motivated us to develop a rule based system called Short Query Intent Identification System (SQIIS). III. OVERVIEW OF SQIIS The approach taken in solving the topic intent identification problem involves very little lexical parsing. It is similar to the approach taken by Kopparapu et.all [7]. First, SQIIS accepts a short user query and identifies the intent of the query or the domain best matching the query. For example a query Chinese restaurant in Andheri would be detected as a search in the domain of yellow pages. Similarly a query Slumdog Millionaire in Andheri then would be identified as a movie domain query. SQIIS caters to an SMS based querying system for a mobile search environment. Upon receiving the query, the system, makes a decision about which domain (topic) this query falls into by identifying the intent. The process that SQIIS uses for domain identification has two phases, namely, (1) Identifying word tokens using n-gram analysis of the input query and tagging the word tokens and (2) Rule-Based knowledge which uses the tagged tokens to determine the domain. SQIIS uses a rule-based RB = {r 1, r 2, r n } which contains a set of rules. Each rule, r i = {C i, [d 1 (c 1 ), d 2 (c 2 ), d n (c n )] } contains (1) a tag combination (a set of tags) C i = [t 1, t 3, tj] and (2) a set of domain d i (c i ) pairs where d i is the domain and c i is the confidence (or relevance) of that domain. The rule base is used to identify the domain and influences the performance of the system. Let T = {t 1, t 2, t n } be the tag set D = {d 1, d 2,d s } be the set of domains; one of which needs to be identified with a certain confidence given a tagged query. For example, if a query had two tags only, say t1 and t5, then the query would be represented as {1,,,,1,,,,,,,}; which would result in selection of d1 with c 1, d 2 with c 2 etc using the rule-base. The domain with the largest c would be the final selected domain due to the rule-base. A. Tagging SQIIS breaks the input query into word tokens through n gram analysis as a first step. Thus a token can contain one or more words in the input query. The process of tagging is performed on the tokens. Formally the process of tagging is performed as shown below. B. Algorithm for Tagging Word Tokens Input: The input query is a set of say j word tokens, namely, W = {w 1, w 3, w j } Output: The output is a tag (t i ε T) attached to each word token, namely, Q = { w 1[t 1], w 2[t 2], w j[t j] } Procedure: For each word token w 1εW (1) Look up token in each of the lookup table in {l 1, l 2,..l i} corresponding to each tag. (2) If w i is found in a lookup table l j then attach the corresponding tag t j to the word token w i. (3) Each token is looked up in all the lookup tables. If the token returns a match in a specific lookup table then the tag associated with the lookup table is attached to that token. The output therefore would be of the form Q = {w 1 [different list of tags attached], w 2 [different list of tags attached], w n [different list of tags attached]. C. Rule Based Domain Identification Phase A rule based expert system approach is used for domain identification. Table 1 shows the data structure of the rule base. Each tuple (row) represents a rule. Each tuple has a combination of tags and a set of domains and confidences. If a particular combination of tags matches a tag combination associated with a rule, then the rule is fired and the domains and their corresponding confidences are returned. If a specific combination of tags occurs then the query can be said to belong to a specific domain with a certain degree of confidence. If the confidence is high for a certain domain for a specific combination of tags, then there is a higher probability that that query belongs or can be mapped accurately to that domain. Rule ID TABLE 1. RULE BASE DATA STRUCTURE Tag Combinations Search Systems Domains 1 C1 => { t 1, t 4 } D1(.75) D2(.25). 2 C2 => { t 2,t 5 } D1(.45) D2(.55). 3.... We know that the output from the tagging phase is of the format Q = {w 1 [t 1], w 2 [t 2], w j [t j]}. In this phase the query is transformed into a set of tags Q t = {t 1, t 2, t j}. Q t is matched against the rule base (Table 1). If a combination in the rule base matches the set Q t then that rule (housed in the rule base) is fired and the domain confidences are returned. The domain with the maximum confidence is selected. D. Algorithm for Rule Based Domain Identification Input: Q = {w 1 [t 1], w 2 [t 2], w j [t j]} Output: Domain which has the highest confidence. Procedure: Obtain Q t = {t 1, t 3, t 4, t j} by and retaining the tags associated with the w j word tokens. Fit it to a combination C i in the rule table. Obtain domains and corresponding confidences.

E. System Description The built functional system consists of three domains, Yellow Pages, Movie and Road Map domains. There are overall seven tags. Namely, T = {address, category, proper name, movie title, movie performer (proper name), movie performer (category), direction word}. The address tag is assigned to a generalized address element such as road, street or name of a road, street or city area. The category tag is a assigned to keywords such as restaurant, theater, club, bank, hospital. A proper name is a name of a person, business etc. The above described tags can be broadly associated with yellow pages. The direction word tag is associated with words like from, to, way to etc. The movie title proper name tag is associated with part or whole of movie names, movie performer category refers to keywords like actor, music director etc. The movie performer proper name refers to names of movie personalities. The tags mentioned are broadly associated with the movie domain. Ideally a certain combination of tags will lead to the identification of a domain. IV. RULE GENERATION STRATEGIES Rule base construction is detrimental in the performance of the Short Query Intent Identification system. The rulebase is a mapping of combination of tags to all the domains with some weights. We used two different strategies to construct the rule-base. These are discussed next section. A. System Generated or Semi Supervised Rule Base The strategy for developing a rule base is a semi automated process. The method developed is based on the premise that if occurrence of a certain tag leads to a higher probability that the tag combination belongs to a particular domain. Here for each tag and domain pair, there is a weight attached, namely, (t i, d j) w ij. When the tag t i occurs in the query then the weight w ij is attached to the domain j. Formally, for every tag t i in set T and domain d j in set D there is a weight w ij attached namely (t i, d j) w ij. The confidence of a domain d k, confidence(d k) for a tag combination (t 1, t 2,.., t n ), is given as confidence (d k) = n i1 w ik. If there are a certain number of domains in the set D of domains within which the system operates, the confidences are normalized as norm-confidence (d k) = m j1 n i1 w ij confidence(d j ). This way for every combination of tags a set of confidences for each domain can be obtained. The domain with the maximum confidence is the domain to which the tag combination and its associated query are classified. Also some tags can not co-occur with other tags. From example a category tag might not exist with a movie title proper name tag. So we construct a set of tag pairs (t i, t j) where the tags can not appear together in a combination. If the tags appear together in a combination then the combination is considered invalid. In a very loose sense tag dimensionality checking is done automatically. The system generated rule base is easier to construct as it required determining a gross set of rules. It is less prone to human error, but chances of inaccuracies are more because it does not analyze the rule construction at a deep level. B. Hand Crafted Rule Base In a hand crafted rule-base say there are n tags and m domains associated with the system. We enumerate all the possible tag occurrences, namely, 2 n combinations. Manually we go through each combination and then determine the combination best describes a particular domain. Here we can say with absolute certainty if a combination can be classified in a particular domain. The domain confidence would be 1 and the other domain confidences would be. However some combinations might not be classifiable in any domain. Under those circumstances we would say that no domain can be determined. The system using hand crafted rule-base should perform best. However, hand-crafting needs tedious human intervention and is prone to human errors. In hand crafting the domain confidences are usually absolute. For example if a combination returns a domain d i, then we say that the confidence of d i is 1 while all other domains have a confidence of. In system generated rulebases, domain confidences are not absolute. For each domain the domain confidence may vary between and 1. V. EXPERIMENT AND EVALUATION We evaluated the two rule-bases we constructed for our system. In our current system we had 7 tags and 3 domains. We generated using a software program all possible combinations namely 2 7-1or 127 tag combinations. We treated these combinations as output from the tagging stage and fed them into our rule base. We evaluated all tag combinations of size between 1 and 6 which resulted in a certain tag combinations. Each of these combinations is fed into the rule-base. If the tag combination returns a specific domain then error is introduced with one tag at a time being changed to a different tag. Thus erroneous tag combinations are obtained and fed into the same rule-base and in each case the change in output is noted. If there is no change in outcome (final domain remains same, even after error in tagging) the case is counted as a C. If there is a change in the outcome (final domain changes) then the case is classified as a C1. If the alteration results in a system being unable to detect topical intent, we count it as a C2. We also computed the change in the identified domain confidences between the actual output and the desired output as a Euclidean distance between the domain confidences of the desired output and input. Let the output before error in tagging be [d 1(c 1), d 2(c 2),.d m(c m)] assuming m domains in the system. Here c 1, c 2.. c m are the confidences for domains d 1, d d and d m respectively. In our case m = 3. Let the output due to error in tagging be [d 1(c 1), d 2(c 2),.d m(c m)]. Then the distance is computed as m i1 2 ( c i c' ). The results for each of the two cases, namely C and C1 for the system generated and hand crafted rule base and rule base are shown in Figures 1, and 2 respectively. Figures 1 and 2 show i

cumulative plots of the variation from the desired output for misclassification for system generated rules (y-axis) versus the number of cases (x-axis). The results for handcrafted rules are tabulated in Table 2 and 3. 12 1 8 6 4 2.942 CO: No Change in Domain with Mistagging.1414.1767.1885.254.2121.2357.2474.2828 Eucledian.2867.382.3299.3535.3559.482.431.4949.5338.6123.6284 Figure 1. Results for System Generated Rule for cases in C C1: Domain Changed as a Result of Tagging Error 8 7 6 5 4 3 2 1.942.1414.254.2356.2357.2828.2867.382.3142 Eucledian.3299.3535.3558.482.4189.431.4949.5338.6123.6284 Figure 2. Results for System Generated Rule for cases in C1 TABLE 4: RESULTS FOR C FOR SYSTEM GENERATED RULES # of Cum # of 6 6.942 1 16.1414 2 36.1767 2 38.1885 2 4.254 4 44.2121 4 48.2357 6 54.2474 2 56.2828 2 58.2867 2 6.382 6 66.3299 12 78.3535 6 84.3559 2 86.482 2 88.431 4 92.4949 1 12.5338 2 14.6123 4 18.6284 2 11 TABLE 2: RESULTS FOR C FOR HAND CRAFTED RULES # of 16 16 TABLE 3: RESULTS FOR C1 FOR HAND CRAFTED RULES # of Cum # of 1.4142 92 92 Table 4, 5 show tabulated results for C, C1 for System Generated Rules. A quick glance through the results tabulated in Tables 2 through 5, might give the impression that the system generated rule is performing better than the hand crafted rule. However, notice that the variation measured in distance is the least () in the hand crafted rules. Assuming a reasonable threshold τ =.6 it can be seen that for C cases, the cumulative number of cases for the hand-crafted set = 16. However for the same threshold the system generated rule set is 11. We can conclude that the hand crafted rule actually performs a lot better (as expected).

TABLE 5: RESULTS FOR C1 FOR SYSTEM GENERATED RULES VI. # of Cum # of.942 2 2.1414 2 4.254 2 6.2356 2 8.2357 2 1.2828 2 12.2867 2 14.382 2 16.3142 2 18.3299 4 22.3535 6 28.3558 2 3.482 2 32.4189 8 4.431 2 42.4949 14 56.5338 6 62.6123 2 64.6284 8 72 CONCLUSIONS AND FUTURE WORK In this paper we have described the functioning of a rule based Short Query Intent Identification System. The rule base is a critical component of SQIIS. We have described two techniques (system generated and hand crafted) for generating a rule base. We have demonstrated how the hand crafted rule base performs better than the system generated rule base. Our experiments involved three domains yellow pages, movies and road map navigation domains. For domain detection we created a methodology for identifying named entities and tagging them with custom tags. In our system we have currently 7 tags. As future work we would be expanding this system to detect query topics spanning over a wide spectrum of domains and improving rule based generation strategies. REFERENCES [1] D. J. Brenes, D. GayoAvello and K. Pérez-González, Survey and evaluation of query intent detection methods, Workshop on Web Search Click Data (WSCD 29), Barcelona, Spain, ACM Press, February 29. [2] S.M. Beitzel, E.C. Jensen, A. Chowdhury, and O. Frieder, Varying approaches to topical web query classification, Proc. of the 3th annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR 27), Amsterdam, Netherlands, ACM Press, July 27. [3] S.M. Beitzel, E.C. Jensen, O. Frieder, D.D. Lewis, A. Chowdhury, and A. Kolcz, Improving automatic query classification via semi supervised learning, Proc. of the Fifth IEEE International Conference on Data Mining (ICDM 25), Houston, Texas, IEEE Press, November 25. [4] A.Z. Broder, A taxonomy of web search, Proc. of the 25th annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR 22), ACM Press, Auguest 22. [5] A.Z. Broder, M. Fontoura, E. Gabrilovich, A. Joshi, V. Josifovski, and T. Zhang, Robust classification of rare queries using web knowledge, Proceedings of the 3th annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR 27), Amsterdam, Netherlands, ACM Press, July 27. [6] B. J. Jansen, D. L. Booth, A. Spink, "Determining the Informational, navigational, and transactional intent of Web queries", Journal of Information Processing and Management, vol. 44(3), 28, pp. 1251-1266. [7] S.K. Kopparapu, A. Srivastava and P. V. S. Rao, "Minimal Parsing Key Concept Based Question Answering System", Proc. of 12th International Conference on Human Computer Interaction (HCI 27), Springer, Beijing, China, 27. [8] S. K. Kopparapu, A. Srivastava, A. Pande, "SMS based natural language interface to yellow pages directory", Proc. of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, Singapore, September, 27. [9] G. Kothari, S. Negi, T. A. Faruquie, V. T. Chakaravarthy, L. V. Subramaniam, "SMS based interface for FAQ retrieval", Proc. of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP, (AFNLP 29), Suntec, Singapore, 29. [1] H. T. Pu, S. L. Chuang, and C. Yang, Subject categorization of query terms for exploring Web users' search interests, Journal of the American Society for Information Science and Technology vol. 53, 21, pp. 617-63. [11] A. Spink, D. Wolfram, M.B.J. Jansen,, and T. Saracevic. Searching the web: The public and their queries, Journal of the American Society for Information Science and Technology, vol. 52, 21, pp. 226-234. [12] M. Suktarachan, P. Rattanamanee and A. Kawtrakul,"The development of a question-answering services system for the farmer through SMS: query analysis",proc. of the 29 Workshop on Knowledge and Reasoning for Answering Questions (KRAQ, 29), Association of Computational Linguistics Press, Suntec, Singapore 29. [13] URL of Yahoo, http://www.yahoo.com [14] URL of DMOZ http://www.dmoz.com