Please wait a minute...
New Technology of Library and Information Service  2006, Vol. 22 Issue (1): 44-46    DOI: 10.11925/infotech.1003-3513.2006.01.07
Current Issue | Archive | Adv Search |
Use of Learning Object Vocabulary in GEM Queries
Qin Jian Javier Calzada Prado2
1(School of Information Studies Syracuse University, USA)
2(Departamento de Biblioteconomía y Documentación Universidad Carlos III de Madrid)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      
Abstract  

Metadata applications have developed local controlled vocabulary to meet information needs of users, but little is known about what vocabularies users use in searching for information. This paper reports the findings from an analysis of a digital library’s query log. The analysis addresses questions of to what extent users use controlled vocabulary in resource discovery and what noncontrolled vocabulary users use in their resource discovery. The authors discuss what is missing between the controlled and noncontrolled vocabulary and how we can integrate user query terms into a learning object vocabulary for improving learning object representation and discovery.

Key wordsEducational metadata      Controlled vocabulary      Query log analysis      Data mining     
Received: 08 November 2005      Published: 25 January 2006
Corresponding Authors: Qin Jian     E-mail: jqin@syr.edu
About author:: Qin Jian,Javier Calzada Prado

Cite this article:

Qin Jian,Javier Calzada Prado. Use of Learning Object Vocabulary in GEM Queries. New Technology of Library and Information Service, 2006, 22(1): 44-46.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2006.01.07     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2006/V22/I1/44

[1] Yong Zhang,Shuqing Li,Yongshang Cheng. Mining Algorithm for Weighted Association Rules Based on Frequency Effective Length[J]. 数据分析与知识发现, 2019, 3(7): 85-93.
[2] Quan Lu,Anqi Zhu,Jiyue Zhang,Jing Chen. Research on User Information Requirement in Chinese Network Health Community: Taking Tumor-forum Data of Qiuyi as an Example[J]. 数据分析与知识发现, 2019, 3(4): 22-32.
[3] Dongmei Mu,Hui Fa,Ping Wang,Jing Sun. Research on Disease Risk Factors on Structural Equation Model[J]. 数据分析与知识发现, 2019, 3(4): 80-89.
[4] Li Yongnan. Using Bayes Theory to Classify Counter Terrorism Intelligence[J]. 数据分析与知识发现, 2018, 2(10): 9-14.
[5] Mu Dongmei,Wang Ping,Zhao Danning. Reducing Data Dimension of Electronic Medical Records: An Empirical Study[J]. 数据分析与知识发现, 2018, 2(1): 88-98.
[6] Hu Zhongyi,Wang Chaoqun,Wu Jiang. Identifying Phishing Websites with Multiple Online Data Sources[J]. 数据分析与知识发现, 2017, 1(6): 47-55.
[7] Jiang Siwei,Xie Zhenping,Chen Meijie,Cai Ming. Self-Explainable Reduction Method for Mixed Feature Data Modeling[J]. 数据分析与知识发现, 2017, 1(12): 92-100.
[8] Mu Dongmei,Ren Ke. Discovering Knowledge from Electronic Medical Records with Three Data Mining Algorithms[J]. 现代图书情报技术, 2016, 32(6): 102-109.
[9] Li Feng,Li Shu’ning,Yu Jing. A Department Oriented Library Usage Data System for Graduates[J]. 现代图书情报技术, 2016, 32(5): 99-103.
[10] Zhao Jingxian. Detect of Internet Fake Public Opinion Based on Decision Tree[J]. 现代图书情报技术, 2015, 31(6): 78-84.
[11] He Jianmin, Wang Zhe. The Pedigree Method to Mine Influential Clusters of Topic Information in Social Network[J]. 现代图书情报技术, 2015, 31(5): 65-72.
[12] Huang Wenbin, Xu Shanchuan, Ma Long, Wang Jun. Analysis of Mobile User Behaviors with Telecommunication Data[J]. 现代图书情报技术, 2015, 31(5): 80-87.
[13] Hao Mei, Wang Daoping. Mining Customer Focus Features from Product Reviews Oriented Supply Chain[J]. 现代图书情报技术, 2014, 30(4): 65-70.
[14] Sun Hongfei, Hou Wei. Application of Improved TFIDF Algorithm in Mining Potential Cooperation Relationship[J]. 现代图书情报技术, 2014, 30(10): 84-92.
[15] Li Gaohu, Gao Song, Tang Xiaoxin, Cao Hongbing, Tang Qiuhong. Design and Implementation of New Books Noting Personalized Recommendation System Based on Circulation Logs[J]. 现代图书情报技术, 2012, 28(6): 89-93.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn