SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Log Analysis to Understand Medical
  Professionals' Image Searching
            Behaviour
Theodora Tsikrika
Henning Müller
Charles E. Kahn
Overview
•   Medical image retrieval
•   Motivation of our work
•   Methods
•   Log file analysis
•   Search strategies
•   Frequent information needs
    •   Use as topics for a retrieval benchmark
•   Conclusions

                                                  2
Medical image retrieval
 •   Medical professionals frequently and
     increasingly search for visual information
     (images, videos)
 •   Particularly radiologists often search for
     images
     •   Internet search increasingly replaces search in
         reference books and discussions with colleagues
     •   Images are important for differential diagnosis,
         finding explications for unclear visual patterns
 •   Different types of image search systems
     •   Text-based search for images
                                                            3
Motivation
•   Knowing search tasks, goals and formulations
    of user groups for information retrieval is
    important
    •   To build new IR systems or benchmark existing ones
•   Several surveys have been performed
•   Log file analyses were done as well
    •   MedLine log files, not really for images
    •   HONmedia search, less focused as not radiologists, but
        rather general public, health professionals
•   Image search on the Internet for radiologists
    has increased strongly
                                                                 4
Log file analysis
 •   Session level, query level, term level
 •   Search logs have received much attention to
     learn more on user behavior
     •   Bad example: release of AOL log, privacy!!
     •   Amount of information differs, IP addresses, time
         stamps
 •   Session level is interesting as much is
     learned on behavior, query modifications,
     even satisfaction
     •   Terms added, removed, changed?
 •   Query and term level often focus on                     5
Methods
•   ARRS Goldminer made a log file available
    •   25’000 consecutive searches of medical
        professionals
    •   Search system is very popular with radiologists
        •   Allows search terms, selection of gender, age and
            modality

•   Search term normalization
    •   All lower case, removing special characters, quotes
    •   Manual work: “xray”, “x-ray”, “x ray” all equals “xray”
•   Removal of identical consecutive queries
•   No time stamps available, no IP address                       6
Results of the analysis
 •   23’033 queries after preprocessing, 14’413 of
     these are unique queries (63%)
 •   Query length 2.24 words, 2.46 for unique
     queries
     •   Similar to web search, one term less than MedLine
 •   Imaging modalities:
     •   MRI (586), CT (425), ultrasound (199), xray (139),
         PET (34), PET/CT (13), angiography (13), echo (11),
         radiography (10), tomography (6), fMRI (3), PET/MRI
         (1)
     •   This despite the possibility to filter for modalities
                                                                 7
Most frequent queries and terms




                                  8
Query modification
 •   5713 consecutive query pairs sharing at
     least one term, assumed to be single
     session




                                               9
Use of terms for topics in
ImageCLEF
 • ImageCLEF, image retrieval benchmark
    •   Using images and text as queries, 17 groups
        participated in 2012
•   Taking most frequent searches, at least two
    terms
•   Radiologist ranked these search terms by
    usefulness in radiology
•   Most useful terms were checked to find
    whether documents in PubMedCentral fulfill
    the need
•   30 most useful, most frequent, available
                                                      10
Conclusions
 • Analysis of log files can help understand
   user behavior
     •   Help build better systems based on user models
         and analyze current approaches, also
         shortcomings
 •   Time stamps and user identification are
     important for query session analysis
     •   We used implicit knowledge for this
 •   People do not know all details of systems
     •   Search for modalities in text and through filters
 •   Depending on results, users change terms
                                                             11
Questions?
 •   More information can be found at
     •   http://www.khresmoi.eu/
     •   http://medgift.hevs.ch/
     •   http://publications.hevs.ch/




 •   Contact:
     •   Henning.mueller@hevs.ch
                                        12

Mais conteúdo relacionado

Mais procurados

GlyGen Warren Workshop in Boston
GlyGen Warren Workshop in BostonGlyGen Warren Workshop in Boston
GlyGen Warren Workshop in BostonGlyGen
 
Pharos: A Torch to Use in Your Journey in the Dark Genome
Pharos: A Torch to Use in Your Journey in the Dark GenomePharos: A Torch to Use in Your Journey in the Dark Genome
Pharos: A Torch to Use in Your Journey in the Dark GenomeRajarshi Guha
 
Gaining credit for sharing research data
Gaining credit for sharing research dataGaining credit for sharing research data
Gaining credit for sharing research dataVarsha Khodiyar
 
HKU Data Curation MLIM7350 Class 9
HKU Data Curation MLIM7350 Class 9 HKU Data Curation MLIM7350 Class 9
HKU Data Curation MLIM7350 Class 9 Scott Edmunds
 
Measuring electronic resource availability final version
Measuring electronic resource availability final versionMeasuring electronic resource availability final version
Measuring electronic resource availability final versionSanjeet Mann
 
UK Digital Curation Centre: enabling research data management at the coalface
UK Digital Curation Centre: enabling research data management at the coalfaceUK Digital Curation Centre: enabling research data management at the coalface
UK Digital Curation Centre: enabling research data management at the coalfaceLizLyon
 
Functional and Architectural Requirements for Metadata: Supporting Discovery...
Functional and Architectural Requirements for Metadata: Supporting Discovery...Functional and Architectural Requirements for Metadata: Supporting Discovery...
Functional and Architectural Requirements for Metadata: Supporting Discovery...Jian Qin
 
Search Interface Feature Evaluation in Biosciences
Search Interface Feature Evaluation in BiosciencesSearch Interface Feature Evaluation in Biosciences
Search Interface Feature Evaluation in BiosciencesZanda Mark
 

Mais procurados (10)

Eng search techniques-
Eng search techniques-Eng search techniques-
Eng search techniques-
 
GlyGen Warren Workshop in Boston
GlyGen Warren Workshop in BostonGlyGen Warren Workshop in Boston
GlyGen Warren Workshop in Boston
 
Pharos: A Torch to Use in Your Journey in the Dark Genome
Pharos: A Torch to Use in Your Journey in the Dark GenomePharos: A Torch to Use in Your Journey in the Dark Genome
Pharos: A Torch to Use in Your Journey in the Dark Genome
 
Gaining credit for sharing research data
Gaining credit for sharing research dataGaining credit for sharing research data
Gaining credit for sharing research data
 
HKU Data Curation MLIM7350 Class 9
HKU Data Curation MLIM7350 Class 9 HKU Data Curation MLIM7350 Class 9
HKU Data Curation MLIM7350 Class 9
 
Measuring electronic resource availability final version
Measuring electronic resource availability final versionMeasuring electronic resource availability final version
Measuring electronic resource availability final version
 
UK Digital Curation Centre: enabling research data management at the coalface
UK Digital Curation Centre: enabling research data management at the coalfaceUK Digital Curation Centre: enabling research data management at the coalface
UK Digital Curation Centre: enabling research data management at the coalface
 
Functional and Architectural Requirements for Metadata: Supporting Discovery...
Functional and Architectural Requirements for Metadata: Supporting Discovery...Functional and Architectural Requirements for Metadata: Supporting Discovery...
Functional and Architectural Requirements for Metadata: Supporting Discovery...
 
Search Interface Feature Evaluation
Search Interface Feature EvaluationSearch Interface Feature Evaluation
Search Interface Feature Evaluation
 
Search Interface Feature Evaluation in Biosciences
Search Interface Feature Evaluation in BiosciencesSearch Interface Feature Evaluation in Biosciences
Search Interface Feature Evaluation in Biosciences
 

Destaque

Jadxmjkadis2011
Jadxmjkadis2011Jadxmjkadis2011
Jadxmjkadis2011aqey
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Maximise your returns in crisis management preparedness: a cyclic approach to...
Maximise your returns in crisis management preparedness: a cyclic approach to...Maximise your returns in crisis management preparedness: a cyclic approach to...
Maximise your returns in crisis management preparedness: a cyclic approach to...Global Risk Forum GRFDavos
 
Don't approach a goat from the front, a horse from the back, or a fool from a...
Don't approach a goat from the front, a horse from the back, or a fool from a...Don't approach a goat from the front, a horse from the back, or a fool from a...
Don't approach a goat from the front, a horse from the back, or a fool from a...Rhea Myers
 
Crowd Pleasers
Crowd PleasersCrowd Pleasers
Crowd PleasersAEI
 
Enhancing urban resilience to extreme waters: The WASH and RESCUE Initiative
Enhancing urban resilience to extreme waters: The WASH and RESCUE InitiativeEnhancing urban resilience to extreme waters: The WASH and RESCUE Initiative
Enhancing urban resilience to extreme waters: The WASH and RESCUE InitiativeGlobal Risk Forum GRFDavos
 
Everyone in the world may be to you your parent, your sibling, your child.
Everyone in the world may be to you your parent, your sibling, your child.Everyone in the world may be to you your parent, your sibling, your child.
Everyone in the world may be to you your parent, your sibling, your child.Rhea Myers
 
Lessons learned from recent very large-scale disasters in the world
Lessons learned from recent very large-scale disasters in the worldLessons learned from recent very large-scale disasters in the world
Lessons learned from recent very large-scale disasters in the worldGlobal Risk Forum GRFDavos
 
You cannot fly with wings made of butter.
You cannot fly with wings made of butter.You cannot fly with wings made of butter.
You cannot fly with wings made of butter.Rhea Myers
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Homes for sale in seminole, florida
Homes for sale in seminole, floridaHomes for sale in seminole, florida
Homes for sale in seminole, floridabobgaynor
 
Only when you can be extremely pliable and soft can you be extremely hard and...
Only when you can be extremely pliable and soft can you be extremely hard and...Only when you can be extremely pliable and soft can you be extremely hard and...
Only when you can be extremely pliable and soft can you be extremely hard and...Rhea Myers
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
The lion leaps from strength to strength
The lion leaps from strength to strengthThe lion leaps from strength to strength
The lion leaps from strength to strengthRhea Myers
 
νεομαρτυρες
νεομαρτυρεςνεομαρτυρες
νεομαρτυρεςgymzosim
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A training program for disaster mitigation through urban planning
A training program for disaster mitigation through urban planningA training program for disaster mitigation through urban planning
A training program for disaster mitigation through urban planningGlobal Risk Forum GRFDavos
 

Destaque (20)

Jadxmjkadis2011
Jadxmjkadis2011Jadxmjkadis2011
Jadxmjkadis2011
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Maximise your returns in crisis management preparedness: a cyclic approach to...
Maximise your returns in crisis management preparedness: a cyclic approach to...Maximise your returns in crisis management preparedness: a cyclic approach to...
Maximise your returns in crisis management preparedness: a cyclic approach to...
 
Don't approach a goat from the front, a horse from the back, or a fool from a...
Don't approach a goat from the front, a horse from the back, or a fool from a...Don't approach a goat from the front, a horse from the back, or a fool from a...
Don't approach a goat from the front, a horse from the back, or a fool from a...
 
Crowd Pleasers
Crowd PleasersCrowd Pleasers
Crowd Pleasers
 
Enhancing urban resilience to extreme waters: The WASH and RESCUE Initiative
Enhancing urban resilience to extreme waters: The WASH and RESCUE InitiativeEnhancing urban resilience to extreme waters: The WASH and RESCUE Initiative
Enhancing urban resilience to extreme waters: The WASH and RESCUE Initiative
 
End of the world
End of the worldEnd of the world
End of the world
 
The Internet’s Role in a Green Future
The Internet’s Role in a Green FutureThe Internet’s Role in a Green Future
The Internet’s Role in a Green Future
 
Everyone in the world may be to you your parent, your sibling, your child.
Everyone in the world may be to you your parent, your sibling, your child.Everyone in the world may be to you your parent, your sibling, your child.
Everyone in the world may be to you your parent, your sibling, your child.
 
Dide ira projects 2012 13
Dide ira projects 2012 13Dide ira projects 2012 13
Dide ira projects 2012 13
 
Lessons learned from recent very large-scale disasters in the world
Lessons learned from recent very large-scale disasters in the worldLessons learned from recent very large-scale disasters in the world
Lessons learned from recent very large-scale disasters in the world
 
You cannot fly with wings made of butter.
You cannot fly with wings made of butter.You cannot fly with wings made of butter.
You cannot fly with wings made of butter.
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Homes for sale in seminole, florida
Homes for sale in seminole, floridaHomes for sale in seminole, florida
Homes for sale in seminole, florida
 
Only when you can be extremely pliable and soft can you be extremely hard and...
Only when you can be extremely pliable and soft can you be extremely hard and...Only when you can be extremely pliable and soft can you be extremely hard and...
Only when you can be extremely pliable and soft can you be extremely hard and...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
The lion leaps from strength to strength
The lion leaps from strength to strengthThe lion leaps from strength to strength
The lion leaps from strength to strength
 
νεομαρτυρες
νεομαρτυρεςνεομαρτυρες
νεομαρτυρες
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A training program for disaster mitigation through urban planning
A training program for disaster mitigation through urban planningA training program for disaster mitigation through urban planning
A training program for disaster mitigation through urban planning
 

Semelhante a Understanding Medical Image Search Behavior Through Log Analysis

Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementKathryn Houk
 
Managing Ireland's Research Data - 3 Research Methods
Managing Ireland's Research Data - 3 Research MethodsManaging Ireland's Research Data - 3 Research Methods
Managing Ireland's Research Data - 3 Research MethodsRebecca Grant
 
The research process steps
The research process stepsThe research process steps
The research process stepsRoger Watson
 
Data Management for librarians
Data Management for librariansData Management for librarians
Data Management for librariansC. Tobin Magle
 
Assessing user experience of e-books in academic libraries
Assessing user experience of e-books in academic librariesAssessing user experience of e-books in academic libraries
Assessing user experience of e-books in academic librariesTao Zhang
 
Data Management for Undergraduate Research
Data Management for Undergraduate ResearchData Management for Undergraduate Research
Data Management for Undergraduate ResearchRebekah Cummings
 
Literature search techniques
Literature search techniquesLiterature search techniques
Literature search techniquesAhmed Elfaitury
 
What is the difference between research methodology and research design
What is the difference between research methodology and research designWhat is the difference between research methodology and research design
What is the difference between research methodology and research designPhD Assistance
 
Advanced topics research
Advanced topics researchAdvanced topics research
Advanced topics researchkieran122
 
Guy avoiding-dat apocalypse
Guy avoiding-dat apocalypseGuy avoiding-dat apocalypse
Guy avoiding-dat apocalypseENUG
 
Data Science Master Specialisation
Data Science Master SpecialisationData Science Master Specialisation
Data Science Master SpecialisationArjen de Vries
 
2018 Bio-IT World Agile in Wet Labs Speeds Big Data
2018 Bio-IT World Agile in Wet Labs Speeds Big Data2018 Bio-IT World Agile in Wet Labs Speeds Big Data
2018 Bio-IT World Agile in Wet Labs Speeds Big DataBruce Kozuma
 
Data and Donuts: How to write a data management plan
Data and Donuts: How to write a data management planData and Donuts: How to write a data management plan
Data and Donuts: How to write a data management planC. Tobin Magle
 
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...Nolan Nichols
 
Creating and Maintaining a Sustainable Research Data Management Service: Wher...
Creating and Maintaining a Sustainable Research Data Management Service: Wher...Creating and Maintaining a Sustainable Research Data Management Service: Wher...
Creating and Maintaining a Sustainable Research Data Management Service: Wher...ARLGSW
 

Semelhante a Understanding Medical Image Search Behavior Through Log Analysis (20)

Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data Management
 
Managing Ireland's Research Data - 3 Research Methods
Managing Ireland's Research Data - 3 Research MethodsManaging Ireland's Research Data - 3 Research Methods
Managing Ireland's Research Data - 3 Research Methods
 
Lagace, Standards Update
Lagace, Standards UpdateLagace, Standards Update
Lagace, Standards Update
 
The research process steps
The research process stepsThe research process steps
The research process steps
 
Data Management for librarians
Data Management for librariansData Management for librarians
Data Management for librarians
 
Medlars
MedlarsMedlars
Medlars
 
Assessing user experience of e-books in academic libraries
Assessing user experience of e-books in academic librariesAssessing user experience of e-books in academic libraries
Assessing user experience of e-books in academic libraries
 
Data Management for Undergraduate Research
Data Management for Undergraduate ResearchData Management for Undergraduate Research
Data Management for Undergraduate Research
 
Literature search techniques
Literature search techniquesLiterature search techniques
Literature search techniques
 
What is the difference between research methodology and research design
What is the difference between research methodology and research designWhat is the difference between research methodology and research design
What is the difference between research methodology and research design
 
Medical image analysis and big data evaluation infrastructures
Medical image analysis and big data evaluation infrastructuresMedical image analysis and big data evaluation infrastructures
Medical image analysis and big data evaluation infrastructures
 
Medical image analysis, retrieval and evaluation infrastructures
Medical image analysis, retrieval and evaluation infrastructuresMedical image analysis, retrieval and evaluation infrastructures
Medical image analysis, retrieval and evaluation infrastructures
 
Advanced topics research
Advanced topics researchAdvanced topics research
Advanced topics research
 
Guy avoiding-dat apocalypse
Guy avoiding-dat apocalypseGuy avoiding-dat apocalypse
Guy avoiding-dat apocalypse
 
Data Science Master Specialisation
Data Science Master SpecialisationData Science Master Specialisation
Data Science Master Specialisation
 
2018 Bio-IT World Agile in Wet Labs Speeds Big Data
2018 Bio-IT World Agile in Wet Labs Speeds Big Data2018 Bio-IT World Agile in Wet Labs Speeds Big Data
2018 Bio-IT World Agile in Wet Labs Speeds Big Data
 
SciBite
SciBiteSciBite
SciBite
 
Data and Donuts: How to write a data management plan
Data and Donuts: How to write a data management planData and Donuts: How to write a data management plan
Data and Donuts: How to write a data management plan
 
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
 
Creating and Maintaining a Sustainable Research Data Management Service: Wher...
Creating and Maintaining a Sustainable Research Data Management Service: Wher...Creating and Maintaining a Sustainable Research Data Management Service: Wher...
Creating and Maintaining a Sustainable Research Data Management Service: Wher...
 

Mais de Institute of Information Systems (HES-SO)

Classification of noisy free-text prostate cancer pathology reports using nat...
Classification of noisy free-text prostate cancer pathology reports using nat...Classification of noisy free-text prostate cancer pathology reports using nat...
Classification of noisy free-text prostate cancer pathology reports using nat...Institute of Information Systems (HES-SO)
 
Exploiting biomedical literature to mine out a large multimodal dataset of ra...
Exploiting biomedical literature to mine out a large multimodal dataset of ra...Exploiting biomedical literature to mine out a large multimodal dataset of ra...
Exploiting biomedical literature to mine out a large multimodal dataset of ra...Institute of Information Systems (HES-SO)
 
Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...Institute of Information Systems (HES-SO)
 
Risques opérationnels et le système de contrôle interne : les limites d’un te...
Risques opérationnels et le système de contrôle interne : les limites d’un te...Risques opérationnels et le système de contrôle interne : les limites d’un te...
Risques opérationnels et le système de contrôle interne : les limites d’un te...Institute of Information Systems (HES-SO)
 
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...Institute of Information Systems (HES-SO)
 
Le système de contrôle interne : Présentation générale, enjeux et méthodes
Le système de contrôle interne : Présentation générale, enjeux et méthodesLe système de contrôle interne : Présentation générale, enjeux et méthodes
Le système de contrôle interne : Présentation générale, enjeux et méthodesInstitute of Information Systems (HES-SO)
 
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...Institute of Information Systems (HES-SO)
 
NOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
NOSE: une approche Smart-City pour les zones périphériques et extra-urbainesNOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
NOSE: une approche Smart-City pour les zones périphériques et extra-urbainesInstitute of Information Systems (HES-SO)
 

Mais de Institute of Information Systems (HES-SO) (20)

MIE20232.pptx
MIE20232.pptxMIE20232.pptx
MIE20232.pptx
 
Classification of noisy free-text prostate cancer pathology reports using nat...
Classification of noisy free-text prostate cancer pathology reports using nat...Classification of noisy free-text prostate cancer pathology reports using nat...
Classification of noisy free-text prostate cancer pathology reports using nat...
 
Exploiting biomedical literature to mine out a large multimodal dataset of ra...
Exploiting biomedical literature to mine out a large multimodal dataset of ra...Exploiting biomedical literature to mine out a large multimodal dataset of ra...
Exploiting biomedical literature to mine out a large multimodal dataset of ra...
 
L'IoT dans les usines. Quels avantages ?
L'IoT dans les usines. Quels avantages ?L'IoT dans les usines. Quels avantages ?
L'IoT dans les usines. Quels avantages ?
 
Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...
 
Risques opérationnels et le système de contrôle interne : les limites d’un te...
Risques opérationnels et le système de contrôle interne : les limites d’un te...Risques opérationnels et le système de contrôle interne : les limites d’un te...
Risques opérationnels et le système de contrôle interne : les limites d’un te...
 
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
 
Le système de contrôle interne : Présentation générale, enjeux et méthodes
Le système de contrôle interne : Présentation générale, enjeux et méthodesLe système de contrôle interne : Présentation générale, enjeux et méthodes
Le système de contrôle interne : Présentation générale, enjeux et méthodes
 
Crowdsourcing-based Mobile Application for Wheelchair Accessibility
Crowdsourcing-based Mobile Application for Wheelchair AccessibilityCrowdsourcing-based Mobile Application for Wheelchair Accessibility
Crowdsourcing-based Mobile Application for Wheelchair Accessibility
 
Quelle(s) valeur(s) pour le leadership stratégique ?
Quelle(s) valeur(s) pour le leadership stratégique ?Quelle(s) valeur(s) pour le leadership stratégique ?
Quelle(s) valeur(s) pour le leadership stratégique ?
 
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
 
Challenges in medical imaging and the VISCERAL model
Challenges in medical imaging and the VISCERAL modelChallenges in medical imaging and the VISCERAL model
Challenges in medical imaging and the VISCERAL model
 
NOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
NOSE: une approche Smart-City pour les zones périphériques et extra-urbainesNOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
NOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
 
How to detect soft falls on devices
How to detect soft falls on devicesHow to detect soft falls on devices
How to detect soft falls on devices
 
FUNDAMENTALS OF TEXTURE PROCESSING FOR BIOMEDICAL IMAGE ANALYSIS
FUNDAMENTALS OF TEXTURE PROCESSING FOR BIOMEDICAL IMAGE ANALYSISFUNDAMENTALS OF TEXTURE PROCESSING FOR BIOMEDICAL IMAGE ANALYSIS
FUNDAMENTALS OF TEXTURE PROCESSING FOR BIOMEDICAL IMAGE ANALYSIS
 
MOBILE COLLECTION AND DISSEMINATION OF SENIORS’ SKILLS
MOBILE COLLECTION AND DISSEMINATION OF SENIORS’ SKILLSMOBILE COLLECTION AND DISSEMINATION OF SENIORS’ SKILLS
MOBILE COLLECTION AND DISSEMINATION OF SENIORS’ SKILLS
 
Enhanced Students Laboratory The GET project
Enhanced Students Laboratory The GET projectEnhanced Students Laboratory The GET project
Enhanced Students Laboratory The GET project
 
Solar production prediction based on non linear meteo source adaptation
Solar production prediction based on non linear meteo source adaptationSolar production prediction based on non linear meteo source adaptation
Solar production prediction based on non linear meteo source adaptation
 
Exploring the New Trends of Chinese Tourists in Switzerland
Exploring the New Trends of Chinese Tourists in SwitzerlandExploring the New Trends of Chinese Tourists in Switzerland
Exploring the New Trends of Chinese Tourists in Switzerland
 
Social Media Data analyzis and Semantics for Tourism Understanding
Social Media Data analyzis and Semantics for Tourism UnderstandingSocial Media Data analyzis and Semantics for Tourism Understanding
Social Media Data analyzis and Semantics for Tourism Understanding
 

Último

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Último (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Understanding Medical Image Search Behavior Through Log Analysis

  • 1. Log Analysis to Understand Medical Professionals' Image Searching Behaviour Theodora Tsikrika Henning Müller Charles E. Kahn
  • 2. Overview • Medical image retrieval • Motivation of our work • Methods • Log file analysis • Search strategies • Frequent information needs • Use as topics for a retrieval benchmark • Conclusions 2
  • 3. Medical image retrieval • Medical professionals frequently and increasingly search for visual information (images, videos) • Particularly radiologists often search for images • Internet search increasingly replaces search in reference books and discussions with colleagues • Images are important for differential diagnosis, finding explications for unclear visual patterns • Different types of image search systems • Text-based search for images 3
  • 4. Motivation • Knowing search tasks, goals and formulations of user groups for information retrieval is important • To build new IR systems or benchmark existing ones • Several surveys have been performed • Log file analyses were done as well • MedLine log files, not really for images • HONmedia search, less focused as not radiologists, but rather general public, health professionals • Image search on the Internet for radiologists has increased strongly 4
  • 5. Log file analysis • Session level, query level, term level • Search logs have received much attention to learn more on user behavior • Bad example: release of AOL log, privacy!! • Amount of information differs, IP addresses, time stamps • Session level is interesting as much is learned on behavior, query modifications, even satisfaction • Terms added, removed, changed? • Query and term level often focus on 5
  • 6. Methods • ARRS Goldminer made a log file available • 25’000 consecutive searches of medical professionals • Search system is very popular with radiologists • Allows search terms, selection of gender, age and modality • Search term normalization • All lower case, removing special characters, quotes • Manual work: “xray”, “x-ray”, “x ray” all equals “xray” • Removal of identical consecutive queries • No time stamps available, no IP address 6
  • 7. Results of the analysis • 23’033 queries after preprocessing, 14’413 of these are unique queries (63%) • Query length 2.24 words, 2.46 for unique queries • Similar to web search, one term less than MedLine • Imaging modalities: • MRI (586), CT (425), ultrasound (199), xray (139), PET (34), PET/CT (13), angiography (13), echo (11), radiography (10), tomography (6), fMRI (3), PET/MRI (1) • This despite the possibility to filter for modalities 7
  • 8. Most frequent queries and terms 8
  • 9. Query modification • 5713 consecutive query pairs sharing at least one term, assumed to be single session 9
  • 10. Use of terms for topics in ImageCLEF • ImageCLEF, image retrieval benchmark • Using images and text as queries, 17 groups participated in 2012 • Taking most frequent searches, at least two terms • Radiologist ranked these search terms by usefulness in radiology • Most useful terms were checked to find whether documents in PubMedCentral fulfill the need • 30 most useful, most frequent, available 10
  • 11. Conclusions • Analysis of log files can help understand user behavior • Help build better systems based on user models and analyze current approaches, also shortcomings • Time stamps and user identification are important for query session analysis • We used implicit knowledge for this • People do not know all details of systems • Search for modalities in text and through filters • Depending on results, users change terms 11
  • 12. Questions? • More information can be found at • http://www.khresmoi.eu/ • http://medgift.hevs.ch/ • http://publications.hevs.ch/ • Contact: • Henning.mueller@hevs.ch 12