Searching the sdi system against user profiles, Management Information Sys

Assignment Help:

Searching the SDI System Against User Profiles

As has been mentioned earlier, the user profile attempts to represent not only the user's subject interests but also his search preferences as well as search patterns. Let us try to analyse as to how searches are carried out in SDI System. 

A search tenth in a search profile can be a single word, a sequence of words in a string, an author's name, the name of an institution, the title of a journal, a subject heading and a classification code. It may occur in the reference as a description both of the contents of the document and of the document itself, the title of the source publication, organisation, report number, patent number, etc. Its some systems, the terms are restricted to those of a thesaurus compiled for that system'. The information professional constructs the search profile by selecting the search terms from the thesaurus' and other reference tools. In a thesaurus, we generally find synonyms, general definitions, specific definitions, related terms (RT) and narrower terms (NT): The thesauri also provide certain used for' terms (UF).

As the search is performed by matching the contents of the database (document profile) with search terms in the search profiles, all the variations in spelling have to be considered (e.g., gaging, gauging, etc). Both letters and numbers are searched in order to retrieve as many relevant references as possible. To enable this, the list of search terms in a search profile has to he exhaustive. For SDI to be selective, it has to be matched against the known subject interests of the individual (i.e., a subject profile) so that the user receives only that information which is relevant, The main aim of SDI is to save the user's time by not providing material which is of no interest to him/her. In order to do so search strategy consisting of the users interests (expressed in relevant terms must be created and stored.  


Related Discussions:- Searching the sdi system against user profiles

Notes, i am studying in tybca. in MIS, i have chapters: 1)Introduction to s...

i am studying in tybca. in MIS, i have chapters: 1)Introduction to system & Basic concepts 2)Information systems 3)Overview of MIS 4)Developing IS I want detailed notes on these to

Indexing - information retrieval, Indexing Indexing is the process of ...

Indexing Indexing is the process of allocating index terms or keys to a record or document represented in an Information Retrieval System. Historically, the term indexing was

Types of audiences, Information dissemination is a major activity in all ki...

Information dissemination is a major activity in all kinds of information processes. And there are various methods that can be identified in information dissemination, and since th

Serials control system, Serials Control System   Serials represent a la...

Serials Control System   Serials represent a large portion of the stock in academic and special libraries. The subscription for many of the scientific, technical and research p

Enterprise resource planning implementation, Question: (i) "Many organ...

Question: (i) "Many organisations have been using the Internet, Intranet and Extranet to realise strategic gains in their competitive position. To achieve and maintain such a

Enterprise resource planning, QUESTION 1 a) Explain what you understand...

QUESTION 1 a) Explain what you understand by the following terms i) Enterprise Resource Planning ii) Supply Chain Management Systems Illustrate your answer by means of

Stages in system development, Stages in System Development Information...

Stages in System Development Information professionals are mostly concerned with the first situation. In this context, the emphasis is on the systems requirements specificatio

OLTP & OLPP, Differentiate between OLTP and OLPP

Differentiate between OLTP and OLPP

What is the significance of telecommunications deregulation, Problem: (...

Problem: (a) Distinguish between a virus, a worm, and a Trojan horse. (b) A computer can be a target of a crime or an instrument of a crime. State three examples of each.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd