1. The study compared a topic map-based ontology information retrieval system to a clustering-based information retrieval system in the security domain.
2. Twenty information technology students participated in searches using each system and their search performance was measured.
3. The results showed that the topic map-based system had higher recall, shorter search times, and fewer search steps compared to the clustering-based system, especially for complex association and cross-reference search tasks.
Strategies for Landing an Oracle DBA Job as a Fresher
A Topic map-based ontology IR system versus Clustering-based IR System: A Comparative Study in Security Domain
1. A Topic map-based ontology IR system versus Clustering-based IR System: A Comparative Study in Security Domain Myongho Yi Texas Woman’s University, TX, USA, myi@twu.edu Sam Gyun Oh SungKyunKwan University, Seoul, Korea, samoh@skku.edu
2. Agenda 1. Related Works 2. Research Questions 3. Research Designs 4. Research Results 5. Conclusion
3.
4. Three Information Org. Approaches Term Lists: Synonym Rings* Authority Files* Glossaries/Dictionaries Gazetteers* Natural language Controlled language Weakly-structured Strongly-structured Classification & Categorization: Subject Headings Classification schemes* Taxonomies* Categorization schemes Relationship Groups : Ontologies* Semantic networks* Concept maps* Thesauri* Pick lists* (Zeng, 2005)
14. Research Variables Independent Variables Dependent Variables Two Retrieval Systems Topic Map-Based Ontology Information Retrieval System Clustering-Based Information Retrieval System Quantitative Measurement Search steps, Search Time
15. Search Task Types Task # Degree of Relationships Task 1 Simple Task List all the security software 2 Complex Task Name all the Security engineers who work for Cisco 3 Complex Task Find Vendors providing security training service 4 Association and Cross Reference Related Task List all the security hardware supported by IBM Consultants 5 Association and Cross Reference Related Task List all software using RSA cryptography and find engineers who specialize in these software packages. 6 Association and Cross Reference Related Task Find security system engineers who specialize in firewall and their supervisor and sale representatives 7 Association and Cross Reference Related Task Assume that your organization is interested in security training. Who will be the right people to contact? Please provide their e-mail addresses