SlideShare a Scribd company logo
1 of 14
EVALUATION OF MEDLARS
Derhashar Swargiary
M.L.I.S. 3rd year
Pondicherry University
INTRODUCTION
F. W. Lancaster professor emeritus at the
University of Illinois Graduate School of Library
and Information Science and former NLM
employee is the Pioneer in Evaluation of Early
MEDLARS Systems.
 The evaluation of the MEDLARS Demand Search
Service in 1966 and 1967 was one of the earliest
evaluations of a computer-based retrieval system
and the first application of recall and precision
measures in a large, operational database
setting.

EVALUATION OF OPERATING EFFICIENCY OF
MEDLARS:


NLM conducted a wide-ranging program to
evaluate the performance of MEDLARS. It was
conducted in 1966-67.
PURPOSE
To study the demand search requirements of
MEDLARS users.
 To determine how effectively and efficiently the
present MEDLARS services are meeting its
requirements.
 To determine factors adversely effecting the
performance.
 To discover ways in which more effectively or
more economically user requirements can be
satisfied

THE PRIME REQUIREMENTS OF DEMAND SEARCH USERS
WERE PRESUMED TO RELATE THE FOLLOWING FACTORS

:

The coverage of MEDLARS(i.e. the proportion of
useful literature on a particular topic, within the
time limit imposed, i.e. indexed into the system)
 Its recall power(i.e. its ability to retrieve relevant
documents)
 The precision power(i.e. the ability to hold back
the non relevant items
 The response time of the system
 The format in which the search results are
presented
 The amount of effort the user must personally
expend in order to achieve a satisfactory response
from the system.

THE TWO MOST CRITICAL PROBLEMS FACED
IN THE EVALUATION OF MEDLARS WERE:
Ensuring that the body of test request was as far
as possible representative of the complete
spectrum of kinds of requests processed.
 Establishing methods for determining recall and
precision performance.

METHODOLOGY
target of 300 evaluated queries were needed to
provide an adequate test
 stratified sampling of the medical institutions
from which demands had come during 1965, and
processing queries received from the sample
institutions over a 12-month period.
 The twenty-one user groups were so selected.
 Some 410 queries were received from the user
group and processed, and finally 302 of these
were fully evaluated and used in the MEDLARS
test.





Queries were submitted to the MEDLARS and on
receipt of the queries; MEDLARS staff prepared a
search formulation (i.e. query designation) for each
query using an appropriate combination of MeSH
terms. A computer search was then carried out in the
normal way. At this stage each user was also asked to
submit a list of recent articles that he judged to be
relevant to his query. The
result of a search was a computer printout of
references. Since the total items retrieved might be
high (some searches retrieved more than 500
references), 25 to 30 items were selected randomly
from the list and photocopies of these were provided
to the searcher fro relevance assessment.
Each searcher was asked to go through the full
text of the articles and then to report about each
article on the following scale of relevance:
 H1 – of major value (relevance)
 H2 – of minor value
 W1 – of no value
 W2 – of value not assessable (for example, in a
foreign language).

EACH SEARCHER WAS ASKED TO GO THROUGH THE FULL TEXT OF THE
ARTICLES AND THEN TO REPORT ABOUT EACH ARTICLE ON THE FOLLOWING
SCALE OF RELEVANCE:



If L items were in the sample, the overall precision
ratio was 100(H1 + H2)/L and the ‘major value’
precision ratio were 100H1/L. It was obviously not
feasible to examine the whole MEDLARS database in
relation to each search in order to establish recall
ratio. Therefore, an indirect method was adopted for
calculation of recall ratio: Each user was asked to
identify relevant items for his query before receiving
the search output and then search was carried out to
find out whether those items were indexed in the
database and retrieved along with other items that
are both relevant and irrelevant. If t such relevant
items were identified by the user and available on the
database for a given query, and H were retrieved in
the search, the overall recall ratio and ‘major value’
recall ratio was estimated as 100H/t and 100H1/t1
respectively.
The next stage of the evaluation was an elaborate
analysis of retrieval failures, i.e., examining, for
each search, collected data concerning failures
include:
 a) Query statement;
 b) Search formulation;
 c) Index entries for a sample of ‘missed’ items (i.e.
relevant items that are not retrieved) and ‘waste’
items (i.e. noise—retrieval of irrelevant items);
and
 d) Full text (c).

RESULTS:


The average number of references retrieved for each search was 175, with an
average or overall precision ratio of 50.4%; that is, of the average 175 references
retrieved, about 87 were found to be not relevant. The overall recall ratio was
57.7% as calculated by an indirect method. Taking the average search, and
assuming that about 88 of the references found were relevant, with an overall
recall ratio of 57.7% implies that about 150 references should have been found,
but 62 were missed. However, the recall and precision ratios for each of the 302
searches were analyzed and individual ratios were then averaged in the
MEDLARS test. The results were:
Overall

Recall ratio

Major value

57.7%

65.2%

25.7%
Precision ratio

50.4%
CONCLUSIONS



The results of the MEDLARS test led to a series
of recommendations for the improvement of the
MEDLARS performance. Some notable changes
made to the MEDLARS as a result of this test
include design of a new search request form
(intended to ensure that a request statement is a
good reflection of the information need behind it);
and expansion of the entry vocabulary and
improvement of its accessibility, and the adoption
of an increased level of integration among
personnel involved in indexing, searching and
vocabulary control devices.
REFERENCES:
Jones, Karen Spark and Willet, Peter (1997)
Readings in Information Retrieval. USA :
Elsevier science.
 Retrieved from http://www.egyankosh.com on
October 13th, 2013.
 Lal, C. and Kumar, K. (2005).Understanding
basics of Library and information Science. New
Delhi : Ess Ess Publication.


More Related Content

What's hot (20)

DESIDOC
DESIDOC DESIDOC
DESIDOC
 
Indexing language concept types and characteristics
Indexing language concept types and characteristicsIndexing language concept types and characteristics
Indexing language concept types and characteristics
 
INSPEC
INSPECINSPEC
INSPEC
 
alerting services.pptx
alerting services.pptxalerting services.pptx
alerting services.pptx
 
Ppt evaluation of information retrieval system
Ppt evaluation of information retrieval systemPpt evaluation of information retrieval system
Ppt evaluation of information retrieval system
 
Oclc
OclcOclc
Oclc
 
Chain indexing
Chain indexingChain indexing
Chain indexing
 
CAS & SDI service
CAS & SDI serviceCAS & SDI service
CAS & SDI service
 
bibliometrics
bibliometricsbibliometrics
bibliometrics
 
Inis ppt
Inis pptInis ppt
Inis ppt
 
PHASE RELATION .ppt.
PHASE RELATION .ppt.PHASE RELATION .ppt.
PHASE RELATION .ppt.
 
Web scale discovery service
Web scale discovery serviceWeb scale discovery service
Web scale discovery service
 
Spiral of Scientific method
Spiral of Scientific methodSpiral of Scientific method
Spiral of Scientific method
 
Library Automation in Circulation
Library Automation in Circulation Library Automation in Circulation
Library Automation in Circulation
 
Greenstone Digital Library
Greenstone Digital LibraryGreenstone Digital Library
Greenstone Digital Library
 
Webometrics
WebometricsWebometrics
Webometrics
 
Bibliometrics
BibliometricsBibliometrics
Bibliometrics
 
Current trends in library science research
Current trends in library science researchCurrent trends in library science research
Current trends in library science research
 
A brief history of MARC
A brief history of MARCA brief history of MARC
A brief history of MARC
 
House keeeping operations .pptx
House keeeping operations .pptxHouse keeeping operations .pptx
House keeeping operations .pptx
 

Similar to Evaluation of medlars

QI Plan Part One28QI Plan Part OneDavis .docx
QI Plan Part One28QI Plan Part OneDavis .docxQI Plan Part One28QI Plan Part OneDavis .docx
QI Plan Part One28QI Plan Part OneDavis .docxmakdul
 
Embi cri review-2012-final
Embi cri review-2012-finalEmbi cri review-2012-final
Embi cri review-2012-finalPeter Embi
 
eahil cpd pilot program. Webinar 50 shades of review
 eahil cpd pilot program. Webinar 50 shades of review eahil cpd pilot program. Webinar 50 shades of review
eahil cpd pilot program. Webinar 50 shades of reviewmaria gp
 
Integrating Quantitative and Qualitative.pdf
Integrating Quantitative and Qualitative.pdfIntegrating Quantitative and Qualitative.pdf
Integrating Quantitative and Qualitative.pdfQeerrooGanamaa
 
Validity in Research
Validity in ResearchValidity in Research
Validity in ResearchEcem Ekinci
 
Nursing Practice Literature Evaluation Table Article Paper.pdf
Nursing Practice Literature Evaluation Table Article Paper.pdfNursing Practice Literature Evaluation Table Article Paper.pdf
Nursing Practice Literature Evaluation Table Article Paper.pdfbkbk37
 
Informatio retrival evaluation
Informatio retrival evaluationInformatio retrival evaluation
Informatio retrival evaluationNidhirBiswas
 
Clinical practice critical_research_paper essay sample from assignmentsupport...
Clinical practice critical_research_paper essay sample from assignmentsupport...Clinical practice critical_research_paper essay sample from assignmentsupport...
Clinical practice critical_research_paper essay sample from assignmentsupport...https://writeessayuk.com/
 
Validity of Using the Assessment of Motor and ProcessSkills .docx
Validity of Using the Assessment of Motor and ProcessSkills .docxValidity of Using the Assessment of Motor and ProcessSkills .docx
Validity of Using the Assessment of Motor and ProcessSkills .docxdickonsondorris
 
Running head evaluation tool1evaluation tool6Evaluation Tool.docx
Running head evaluation tool1evaluation tool6Evaluation Tool.docxRunning head evaluation tool1evaluation tool6Evaluation Tool.docx
Running head evaluation tool1evaluation tool6Evaluation Tool.docxcowinhelen
 
Complete the following assignments using excel and the following t
Complete the following assignments using excel and the following tComplete the following assignments using excel and the following t
Complete the following assignments using excel and the following tLynellBull52
 
Discussion 1 Leadership Theories in Practice.docx
Discussion 1 Leadership Theories in Practice.docxDiscussion 1 Leadership Theories in Practice.docx
Discussion 1 Leadership Theories in Practice.docxbkbk37
 
A COMPARISON OF CLINICAL PRACTICE GUIDELINE APPRAISAL INSTRUMENTS
A COMPARISON OF CLINICAL PRACTICE GUIDELINE APPRAISAL INSTRUMENTSA COMPARISON OF CLINICAL PRACTICE GUIDELINE APPRAISAL INSTRUMENTS
A COMPARISON OF CLINICAL PRACTICE GUIDELINE APPRAISAL INSTRUMENTSJoe Osborn
 
Embi cri yir-2017-final
Embi cri yir-2017-finalEmbi cri yir-2017-final
Embi cri yir-2017-finalPeter Embi
 
Valid and Reliable ToolsThe goal of an evaluation is to determin.docx
Valid and Reliable ToolsThe goal of an evaluation is to determin.docxValid and Reliable ToolsThe goal of an evaluation is to determin.docx
Valid and Reliable ToolsThe goal of an evaluation is to determin.docxnealwaters20034
 
1) A cyber crime is a crime that involves a computer and the Inter.docx
1) A cyber crime is a crime that involves a computer and the Inter.docx1) A cyber crime is a crime that involves a computer and the Inter.docx
1) A cyber crime is a crime that involves a computer and the Inter.docxSONU61709
 
Running Head QNT561 .docx
Running Head QNT561                                             .docxRunning Head QNT561                                             .docx
Running Head QNT561 .docxtoltonkendal
 
Exploratory Factor Analysis
Exploratory Factor AnalysisExploratory Factor Analysis
Exploratory Factor AnalysisDaire Hooper
 

Similar to Evaluation of medlars (20)

QI Plan Part One28QI Plan Part OneDavis .docx
QI Plan Part One28QI Plan Part OneDavis .docxQI Plan Part One28QI Plan Part OneDavis .docx
QI Plan Part One28QI Plan Part OneDavis .docx
 
Embi cri review-2012-final
Embi cri review-2012-finalEmbi cri review-2012-final
Embi cri review-2012-final
 
eahil cpd pilot program. Webinar 50 shades of review
 eahil cpd pilot program. Webinar 50 shades of review eahil cpd pilot program. Webinar 50 shades of review
eahil cpd pilot program. Webinar 50 shades of review
 
Integrating Quantitative and Qualitative.pdf
Integrating Quantitative and Qualitative.pdfIntegrating Quantitative and Qualitative.pdf
Integrating Quantitative and Qualitative.pdf
 
Validity in Research
Validity in ResearchValidity in Research
Validity in Research
 
Nursing Practice Literature Evaluation Table Article Paper.pdf
Nursing Practice Literature Evaluation Table Article Paper.pdfNursing Practice Literature Evaluation Table Article Paper.pdf
Nursing Practice Literature Evaluation Table Article Paper.pdf
 
Methodology part.docx
Methodology part.docxMethodology part.docx
Methodology part.docx
 
Informatio retrival evaluation
Informatio retrival evaluationInformatio retrival evaluation
Informatio retrival evaluation
 
Clinical practice critical_research_paper essay sample from assignmentsupport...
Clinical practice critical_research_paper essay sample from assignmentsupport...Clinical practice critical_research_paper essay sample from assignmentsupport...
Clinical practice critical_research_paper essay sample from assignmentsupport...
 
Validity of Using the Assessment of Motor and ProcessSkills .docx
Validity of Using the Assessment of Motor and ProcessSkills .docxValidity of Using the Assessment of Motor and ProcessSkills .docx
Validity of Using the Assessment of Motor and ProcessSkills .docx
 
Running head evaluation tool1evaluation tool6Evaluation Tool.docx
Running head evaluation tool1evaluation tool6Evaluation Tool.docxRunning head evaluation tool1evaluation tool6Evaluation Tool.docx
Running head evaluation tool1evaluation tool6Evaluation Tool.docx
 
Complete the following assignments using excel and the following t
Complete the following assignments using excel and the following tComplete the following assignments using excel and the following t
Complete the following assignments using excel and the following t
 
Discussion 1 Leadership Theories in Practice.docx
Discussion 1 Leadership Theories in Practice.docxDiscussion 1 Leadership Theories in Practice.docx
Discussion 1 Leadership Theories in Practice.docx
 
A COMPARISON OF CLINICAL PRACTICE GUIDELINE APPRAISAL INSTRUMENTS
A COMPARISON OF CLINICAL PRACTICE GUIDELINE APPRAISAL INSTRUMENTSA COMPARISON OF CLINICAL PRACTICE GUIDELINE APPRAISAL INSTRUMENTS
A COMPARISON OF CLINICAL PRACTICE GUIDELINE APPRAISAL INSTRUMENTS
 
Embi cri yir-2017-final
Embi cri yir-2017-finalEmbi cri yir-2017-final
Embi cri yir-2017-final
 
Valid and Reliable ToolsThe goal of an evaluation is to determin.docx
Valid and Reliable ToolsThe goal of an evaluation is to determin.docxValid and Reliable ToolsThe goal of an evaluation is to determin.docx
Valid and Reliable ToolsThe goal of an evaluation is to determin.docx
 
Reability & Validity
Reability & ValidityReability & Validity
Reability & Validity
 
1) A cyber crime is a crime that involves a computer and the Inter.docx
1) A cyber crime is a crime that involves a computer and the Inter.docx1) A cyber crime is a crime that involves a computer and the Inter.docx
1) A cyber crime is a crime that involves a computer and the Inter.docx
 
Running Head QNT561 .docx
Running Head QNT561                                             .docxRunning Head QNT561                                             .docx
Running Head QNT561 .docx
 
Exploratory Factor Analysis
Exploratory Factor AnalysisExploratory Factor Analysis
Exploratory Factor Analysis
 

More from silambu111

Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval ssilambu111
 
Citation indexing
Citation indexingCitation indexing
Citation indexingsilambu111
 
Functions of information retrival system(1)
Functions of information retrival system(1)Functions of information retrival system(1)
Functions of information retrival system(1)silambu111
 

More from silambu111 (9)

Search engine
Search engineSearch engine
Search engine
 
Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval s
 
Sony
SonySony
Sony
 
Precis
PrecisPrecis
Precis
 
POPSI
POPSIPOPSI
POPSI
 
Citation indexing
Citation indexingCitation indexing
Citation indexing
 
Mam assign
Mam assignMam assign
Mam assign
 
Airtel
AirtelAirtel
Airtel
 
Functions of information retrival system(1)
Functions of information retrival system(1)Functions of information retrival system(1)
Functions of information retrival system(1)
 

Recently uploaded

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 

Recently uploaded (20)

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 

Evaluation of medlars

  • 1. EVALUATION OF MEDLARS Derhashar Swargiary M.L.I.S. 3rd year Pondicherry University
  • 2. INTRODUCTION F. W. Lancaster professor emeritus at the University of Illinois Graduate School of Library and Information Science and former NLM employee is the Pioneer in Evaluation of Early MEDLARS Systems.  The evaluation of the MEDLARS Demand Search Service in 1966 and 1967 was one of the earliest evaluations of a computer-based retrieval system and the first application of recall and precision measures in a large, operational database setting. 
  • 3. EVALUATION OF OPERATING EFFICIENCY OF MEDLARS:  NLM conducted a wide-ranging program to evaluate the performance of MEDLARS. It was conducted in 1966-67.
  • 4. PURPOSE To study the demand search requirements of MEDLARS users.  To determine how effectively and efficiently the present MEDLARS services are meeting its requirements.  To determine factors adversely effecting the performance.  To discover ways in which more effectively or more economically user requirements can be satisfied 
  • 5. THE PRIME REQUIREMENTS OF DEMAND SEARCH USERS WERE PRESUMED TO RELATE THE FOLLOWING FACTORS : The coverage of MEDLARS(i.e. the proportion of useful literature on a particular topic, within the time limit imposed, i.e. indexed into the system)  Its recall power(i.e. its ability to retrieve relevant documents)  The precision power(i.e. the ability to hold back the non relevant items  The response time of the system  The format in which the search results are presented  The amount of effort the user must personally expend in order to achieve a satisfactory response from the system. 
  • 6. THE TWO MOST CRITICAL PROBLEMS FACED IN THE EVALUATION OF MEDLARS WERE: Ensuring that the body of test request was as far as possible representative of the complete spectrum of kinds of requests processed.  Establishing methods for determining recall and precision performance. 
  • 7. METHODOLOGY target of 300 evaluated queries were needed to provide an adequate test  stratified sampling of the medical institutions from which demands had come during 1965, and processing queries received from the sample institutions over a 12-month period.  The twenty-one user groups were so selected.  Some 410 queries were received from the user group and processed, and finally 302 of these were fully evaluated and used in the MEDLARS test. 
  • 8.   Queries were submitted to the MEDLARS and on receipt of the queries; MEDLARS staff prepared a search formulation (i.e. query designation) for each query using an appropriate combination of MeSH terms. A computer search was then carried out in the normal way. At this stage each user was also asked to submit a list of recent articles that he judged to be relevant to his query. The result of a search was a computer printout of references. Since the total items retrieved might be high (some searches retrieved more than 500 references), 25 to 30 items were selected randomly from the list and photocopies of these were provided to the searcher fro relevance assessment.
  • 9. Each searcher was asked to go through the full text of the articles and then to report about each article on the following scale of relevance:  H1 – of major value (relevance)  H2 – of minor value  W1 – of no value  W2 – of value not assessable (for example, in a foreign language). 
  • 10. EACH SEARCHER WAS ASKED TO GO THROUGH THE FULL TEXT OF THE ARTICLES AND THEN TO REPORT ABOUT EACH ARTICLE ON THE FOLLOWING SCALE OF RELEVANCE:  If L items were in the sample, the overall precision ratio was 100(H1 + H2)/L and the ‘major value’ precision ratio were 100H1/L. It was obviously not feasible to examine the whole MEDLARS database in relation to each search in order to establish recall ratio. Therefore, an indirect method was adopted for calculation of recall ratio: Each user was asked to identify relevant items for his query before receiving the search output and then search was carried out to find out whether those items were indexed in the database and retrieved along with other items that are both relevant and irrelevant. If t such relevant items were identified by the user and available on the database for a given query, and H were retrieved in the search, the overall recall ratio and ‘major value’ recall ratio was estimated as 100H/t and 100H1/t1 respectively.
  • 11. The next stage of the evaluation was an elaborate analysis of retrieval failures, i.e., examining, for each search, collected data concerning failures include:  a) Query statement;  b) Search formulation;  c) Index entries for a sample of ‘missed’ items (i.e. relevant items that are not retrieved) and ‘waste’ items (i.e. noise—retrieval of irrelevant items); and  d) Full text (c). 
  • 12. RESULTS:  The average number of references retrieved for each search was 175, with an average or overall precision ratio of 50.4%; that is, of the average 175 references retrieved, about 87 were found to be not relevant. The overall recall ratio was 57.7% as calculated by an indirect method. Taking the average search, and assuming that about 88 of the references found were relevant, with an overall recall ratio of 57.7% implies that about 150 references should have been found, but 62 were missed. However, the recall and precision ratios for each of the 302 searches were analyzed and individual ratios were then averaged in the MEDLARS test. The results were: Overall Recall ratio Major value 57.7% 65.2% 25.7% Precision ratio 50.4%
  • 13. CONCLUSIONS  The results of the MEDLARS test led to a series of recommendations for the improvement of the MEDLARS performance. Some notable changes made to the MEDLARS as a result of this test include design of a new search request form (intended to ensure that a request statement is a good reflection of the information need behind it); and expansion of the entry vocabulary and improvement of its accessibility, and the adoption of an increased level of integration among personnel involved in indexing, searching and vocabulary control devices.
  • 14. REFERENCES: Jones, Karen Spark and Willet, Peter (1997) Readings in Information Retrieval. USA : Elsevier science.  Retrieved from http://www.egyankosh.com on October 13th, 2013.  Lal, C. and Kumar, K. (2005).Understanding basics of Library and information Science. New Delhi : Ess Ess Publication. 