SlideShare a Scribd company logo
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011



          An Attempt to Automate the Process of Source
                          Evaluation
                                         Sonal Aggarwal1 and Herre Van Oostendorp2
                              1
                                International Institute of Information Technology, Hyderabad, India
                                                Email: sonalaggarwal1@gmail.com
               2
                 Institute of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands
                                                       Email: herre@cs.uu.nl

Abstract — Credibility of a web-based document is an                       In this paper we try to automatically assign credibility indices
important concern, when a large number of documents is                     to web-based documents, based on different criteria and
available on internet for a given subject. In this paper, various          report back to the users.
criteria that affect the credibility of a document are explored.
An attempt is made to automate the process of assigning a                  B. Various criteria of source evaluation
credibility score to a web-based document. Presently the
                                                                                 The different criteria based on which we can evaluate a
prototype of the tool developed is restricted to only four criteria
– type of website, date of update, sentiment analysis and a
                                                                           web-based source are as follows: Type of website. A website
pre-defined Google page rank. Also a separate module for                   can be an educational website (.edu, .ac), government
checking “link integrity” of a website is developed. To obtain             website (.gov), a commercial website (.com), organizational
empirical validity of the tool, a pilot study is conducted which           website (.org) or other website. Depending on the type, a
collects credibility scoring for a set of websites by human                website can be more or less reliable; Date of the web-site,
judges. The correlation between the scores given by human                  when it was last updated, also affects the credibility of a
judges and the scores obtained by the tool developed is low.               web-based document; A web-document being a primary or
The possible reasons for the low correlation are firstly, the              secondary source, also decides the credibility of the
tool is restricted to only four criteria, and secondly, subjects
                                                                           document [6]; Availability of contact information (address
themselves had no agreement. Apparently they judged the
website on different criteria, and not weighted overall. Further
                                                                           and/or email id) of the owner of the web-document; Analyzing
enhancements to the work done in this paper can be of great                the link integrity of the website [7]. A website with balanced
use to a novice user, who wishes to search a reliable web-                 internal and external links is more credible. Also it should not
based document on any specific topic. This can be done by                  have any broken link; Analyzing the header/ footer of the
including all criteria (discussed in this paper) for calculating           web-site for any affiliation (if available) [8]; Completeness
the credibility score of a website.                                        and accuracy of the information; Author’s expertise in the
                                                                           subject [9]; Author’s opinion biased or un-biased. Analyzing
Index Terms — credibility score; source evaluation;                        the sentiment (positive, negative or neutral) of a website can
automation; web-based multiple documents
                                                                           determine author’s opinion; Author’s connection to the
                                                                           source of publication; connection to the intended audience
                        I. INTRODUCTION
                                                                           [6]; Author’s point of view is objective and impartial or not
A. Need for Source Evaluation of web-based Documents                       [6]; Author’s credentials like institutional affiliation (where
    The number of web-based documents available for a given                he or she works), educational background, past writings, or
subject is tremendous. So it becomes necessary to evaluate the             experience. [6]; Purpose of the web-page (somewhat reflected
sources of these documents in order to choose the most                     by the type of website); Interactivity, Usability of the web-
appropriate documents. Studies conducted by Metzger et al.                 site; Structure of the web-site in terms of graphics and text
[1] indicate that particularly college students rely heavily on            are appropriate or not [7]; Quality of information on the web-
the web for both general and academic information, but verify              site: elementary, technical, or advanced; “Tone” of the
the information very rarely. Another study by Walraven et al.              webpage: ironic, humorous, exaggerated or overblown
[2] also indicates that students do not frequently explicitly              arguments [10]; Determining if advertising and informational
evaluate ‘sources’ and ‘information’ with respect to a web-based           content are being supplied by the same person or
document. Empirical psychological research shows that                      organization; If so, advertising likely to bias informational
adequately evaluating the credibility of sources is important:             content [8]; Determining any software requirements that may
students who do this well or assess reliability and use source             limit access to web information [11]; Is the web-site better
characteristics achieve better comprehension of the content                than the other. If so why; Ranking of the web-source with
[3].Research by Amin et al. [4] demonstrates that providing a              Google. Google has a patented Page-Ranking technology
novice user with credibility scores of web-pages boosts the                that can also be criterion of source evaluation [12]; Domain
confidence level in the selection of information, though it                Experts’ view on the credibility of any web-document. As
does not make search more efficient. Case studies by [5]                   according to Amin [13], experts develop different strategies
emphasize on critical analysis of internet and scholarly sources           while seeking information from internet. These strategies can
by undergraduates, as they are unable to discriminate between              be helpful to a novice user. An expert can assess the credibility
                                                                           of a web document on the basis of two dimensions of credibility
credible and non-credible sources.
                                                                      18
© 2011 ACEEE
DOI: 01.IJCOM.02.02.160
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011


– trustworthiness (well-intentioned, unbiased) and expertise           Figure 1). User is allowed to edit any score or to download all
(knowledgeable, competent) [14]. C. Multi-Criteria Decision            the scores. Along with this, a separate module for checking
Analysis (MCDA) When a decision is affected by more than               link integrity is developed, which checks the link integrity of
one criterion, a Multi-criteria decision analysis is required.         a website address entered by the user.
One of the methods for doing this analysis is “Potentially All
                                                                       A. Materials & Equipments
Pairwise RanKings of all possible Alternatives” (PAPRIKA),
in which a pair-wise ranking of all possible alternatives is               The software tools used in the development of the
done, so as to identify all dominating and un-dominating               prototype source evaluation tool are: Python [17] and Py2exe
pairs. The dominating pairs are given more priority [15]. In           [18]; Pattern [19]; AlchemyAPI [20]; .Net Framework for web
this paper we are using this method to define initial weights          interface; Microsoft Access.
to available criteria for defining and computing credibility           B. Procedure
indices.
                                                                            A Python script is developed, which gets search results
                                                                       from Google or external links of Wikipedia page for a given
                        II. HYPOTHESIS
                                                                       topic using Pattern, does sentiment analysis using
    It is assumed that we can automate the process of                  AlchemyAPI, obtains Google Rank for which url from http://
assigning credibility indices to web-based documents based             webinfodb.net/a/pr.php?url=<website_url>, obtains type of
on various criteria for source evaluation. Presently to compute        website by analyzing the url, calculates credibility score for
the credibility index of a website we are considering only             each search URL based on four criteria and writes the result
four criteria: type of website, date of update, sentiment              to a database file. The script uses Multi-threading concept
analysis and Google page Rank. To examine whether we                   so that it can make parallel calls to different URLs. And it is
have achieved our goal we will compare the performance of              converted into an executable program using Py2exe. Another
the tool regarding the credibility index with the rating of            Python script is developed which checks the ‘link Integrity’
human judges.                                                          of a given URL It gives output as total number of ‘internal
                                                                       links’, ‘external links’ and ‘broken links’. This script makes
                         III. METHOD                                   call to each link available on the given web-page. If the link is
                                                                       not opening – it is considered as broken link. While if the link
A. Design
                                                                       is ‘#’ it is a self-link. If a link to a web-page in the same domain
    A Prototype of the tool is designed which takes Google             exists then it is said to be an internal-link. And if it goes to
Search results/Wikipedia external links for a given topic. And         another domain it is an external-link. A web-interface is
assigns a credibility score to each web-document based on              developed which uses the above python scripts for back-
different criteria. The weights (Table 1) are assigned using           end processing.
1000 Minds [16], decision making software which implements
PAPRIKA method.                                                                                  III RESULTS
                       TABLE I
                                                                       A. Output Source Evaluation Tool
         WEIGHTS ASSIGNED TO EACH CATEGORY
                                                                           The output of the tool when given a search topic “Tourism
                                                                       in India” is shown in Figure 1. The user is also allowed to edit
                                                                       or download results as a database file.
                                                                       B. Empirical Vailidity
                                                                         A small group of seven people was asked to give credibility
                                                                       scores (1-10) for nine websites. The pilot study was
                                                                       conducted by sending an email to the group. The participants
                                                                       were provided with the URLs of nine websites with a small
                                                                       introduction about the factors affecting the credibility. With
                                                                       a concern of not biasing the opinion of the group, the
                                                                       introduction part (in the form of question and answer) was
                                                                       made brief. The results were matched with the scores provided
                                                                       by the developed tool. The scores given by the participants
                                                                       and the tool are as shown in table 2. Based on the mean of
                                                                       scores obtained by the participants the correlation coefficient
                                                                       of 0.484, p<.19 is obtained.
Based on the above weights, a credibility score is assigned
to any website. For example if an organizational website which
is recently updated, having positive bias and rated as 7 by
Google ranking, will be given the following score :
(80.58+100+35.98+87.7)/4 = 76.065 The results (search results
with credibility scores) are displayed in a tabular form (see
                                                                  19
© 2011 ACEEE
DOI: 01.IJCOM.02.02.160
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011

                      TABLE II                                                                        REFERENCES
     SCORES GIVEN BY PARTICIPANTS AND THE TOOL
                                                                          [1] M.J. Metzger, A.J. Flanagin & L. Zwarun, 2003. “College
                                                                          student Web use, perceptions of information credibility, and
                                                                          verification behavior,” Computers & Education, volume 41, pp.
                                                                          271–290.
                                                                          [2] Amber Walraven, Saskia Brand-Gruwel & Henny Boshuizen,
                                                                          “How students evaluate information and sources when searching
                                                                          the World Wide Web for information”, Computers & Education,
                                                                          2009, 52, 234-246.
                                                                          [3] Braten, I., Strømso, HI, & Britt, MA (2009), ”Trust matters:
                                                                          Examining the role of source evaluation in students’ construction
                                                                          of meaning Within and across multiple text,” Reading Research
                                                                          Quarterly, 44, 6-28.
                                                                          [4] A. Amin, J. Zhang, H. Cramer, L. Hardman & V. Evers, “The
                                                                          effects of source credibility ratings in a cultural heritage information
                                                                          aggregator,” in Proceedings of the 3rd workshop on information
                 V. C ONCLUSIONS   & DISCUSSION                           credibility on the web, New York, NY, USA: ACM, 2009, pp. 35–
                                                                          42.
    The prototype of the tool developed uses only four criteria           [5] Calkins, S., & Kelley, M. R. (2007), “Evaluating Internet and
for assigning credibility score to the website. The pilot study           scholarly sources across the disciplines: Two case studies,” College
conducted to obtain empirical validity of the tool, gives a               Teaching, 55 (4), 151-156.
correlation with a low value (.48). The possible causes of this           [6]        Joan Ormondroyd , “Critically Analyzing Information
low correlation value can be summarized as follows: The tool              Sources,” September 2009, from: http://olinuris.library.cornell.edu/
                                                                          ref/research/skill26.htm
is restricted only to four criteria. If all criteria (discussed in
                                                                          [7] Esther Grassian, the UCLA Library, “Thinking Critically about
section I (B)) are included to obtain the credibility score, the
                                                                          World Wid e Web Resources,” June 1995, from: http://
system may give better results. Only then a higher correlation            www2.library.ucla.edu/libraries/college/11605_12337.cfm
with subjects’ judgments will be found; The weights assigned              [8] Beck, Susan, “The Good, The Bad & The Ugly: or, Why It’s
by the subjects had no agreement in themselves. Apparently                a Good Idea to Evaluate Web Sources,” 1997, from: http://
they judged the website on different criteria, and not weighted           lib.nmsu.edu/instruction/evalcrit.html
overall. The work done in this paper can be enhanced further,             [9] Laura Cohen, Trudi E. Jacobson , “Evaluating Web Content”,
by including all the criteria of source evaluation into an                March 2009, from: http://library.albany.edu/usered/eval/evalweb/
automated system. Some of the criteria may not be possible                EvaluatingWebContent.pdf
                                                                          [10] UC Berkeley - Teaching Library Internet Workshops, “Finding
to evaluate automatically. We may use a database having
                                                                          Information on the Internet: A Tutorial,” Copyright 2010, from:
meta-data given by experts in that case. Development of this
                                                                          http://www.lib.berkeley.ed u/TeachingLib/Guides/Internet/
system will be helpful to a novice user, giving him/her a level           Evaluate.html
of confidence on the reliability of any specific web-                     [11] Jan Alexander & Marsha Tate, “The Web as a Research Tool:
document.Also integration of this Source Evaluation tool to               Evaluation Techniques,” 1996-1998, from: http://
existing automatic multi-document summarizers will help to                www.med iaawaren ess.ca/en glish/resources/ed uca tion al/
achieve a better summarization.                                           teaching_backgrounders/internet/web_as_research_tool.cfm
                                                                          [12]       Google Technology, from: http://www.google.com/
                                                                          corporate/tech.html
                                                                          [13] A. Amin, J. van Ossenbruggen, L. Hardman & A. van Nispen,
                                                                          “Understanding cultural heritage experts’ information seeking
                                                                          needs,” In Proc. JCDL ‘08, pages 39{47, New York, NY, USA,
                                                                          2008. ACM.
                                                                          [14] B. J. Fogg and H. Tseng, “The elements of computer credibility,”
                                                                          In Proc. CHI ‘99, pp. 80-87, ACM.
                                                                          [15]       An Article on Multi-criteria decision analysis, from: http:/
                                                                          /en.wikipedia.org/wiki/Multi-criteria_decision_analysis
                                                                          [16] 1000Minds, advanced decision-support software, from: http:/
                                                                          /www.1000minds.com
                                                                          [17] Python, from: http://www.python.org
                                                                          [18] Py2exe, from: http://www.py2exe.org
                                                                          [19] De Smedt, T. & Daelemans, W. (2011), Pattern version 1.0,
                                                                          retrieved January 2011, from: http://www.clips.ua.ac.be/
         Figure1. Output of the tool for a searched topic
                                                                          [20] AlchemyAPI, a product of Orchestr8, semantic tagging and
                                                                          text mining solutions, from: http://www.alchemyapi.com




                                                                     20
© 2011 ACEEE
DOI: 01.IJCOM.02.02.160

More Related Content

What's hot

Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020
Editor IJARCET
 
Advanced Keyword Research SMX Toronto March 2013
Advanced Keyword Research SMX Toronto March 2013Advanced Keyword Research SMX Toronto March 2013
Advanced Keyword Research SMX Toronto March 2013
BrightEdge
 
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
cscpconf
 
WISE2019 presentation
WISE2019 presentationWISE2019 presentation
WISE2019 presentation
Yusuke Yamamoto
 
Comparative Study on Lexicon-based sentiment analysers over Negative sentiment
Comparative Study on Lexicon-based sentiment analysers over Negative sentimentComparative Study on Lexicon-based sentiment analysers over Negative sentiment
Comparative Study on Lexicon-based sentiment analysers over Negative sentiment
AI Publications
 
IRJET- Enhancing NLP Techniques for Fake Review Detection
IRJET- Enhancing NLP Techniques for Fake Review DetectionIRJET- Enhancing NLP Techniques for Fake Review Detection
IRJET- Enhancing NLP Techniques for Fake Review Detection
IRJET Journal
 
IRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product MarketingIRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product Marketing
IRJET Journal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
ijistjournal
 
D018212428
D018212428D018212428
D018212428
IOSR Journals
 
Cluster Based Web Search Using Support Vector Machine
Cluster Based Web Search Using Support Vector MachineCluster Based Web Search Using Support Vector Machine
Cluster Based Web Search Using Support Vector Machine
CSCJournals
 
IRJET-Model for semantic processing in information retrieval systems
IRJET-Model for semantic processing in information retrieval systemsIRJET-Model for semantic processing in information retrieval systems
IRJET-Model for semantic processing in information retrieval systems
IRJET Journal
 
ACM WebSci 2018 presentation/発表資料
ACM WebSci 2018 presentation/発表資料ACM WebSci 2018 presentation/発表資料
ACM WebSci 2018 presentation/発表資料
Yusuke Yamamoto
 
ASIDIC Spring 2010 Meeting Dwg
ASIDIC Spring 2010 Meeting   DwgASIDIC Spring 2010 Meeting   Dwg
ASIDIC Spring 2010 Meeting Dwg
Darrell W. Gunter
 

What's hot (13)

Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020Volume 2-issue-6-2016-2020
Volume 2-issue-6-2016-2020
 
Advanced Keyword Research SMX Toronto March 2013
Advanced Keyword Research SMX Toronto March 2013Advanced Keyword Research SMX Toronto March 2013
Advanced Keyword Research SMX Toronto March 2013
 
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
 
WISE2019 presentation
WISE2019 presentationWISE2019 presentation
WISE2019 presentation
 
Comparative Study on Lexicon-based sentiment analysers over Negative sentiment
Comparative Study on Lexicon-based sentiment analysers over Negative sentimentComparative Study on Lexicon-based sentiment analysers over Negative sentiment
Comparative Study on Lexicon-based sentiment analysers over Negative sentiment
 
IRJET- Enhancing NLP Techniques for Fake Review Detection
IRJET- Enhancing NLP Techniques for Fake Review DetectionIRJET- Enhancing NLP Techniques for Fake Review Detection
IRJET- Enhancing NLP Techniques for Fake Review Detection
 
IRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product MarketingIRJET- Predicting Review Ratings for Product Marketing
IRJET- Predicting Review Ratings for Product Marketing
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
D018212428
D018212428D018212428
D018212428
 
Cluster Based Web Search Using Support Vector Machine
Cluster Based Web Search Using Support Vector MachineCluster Based Web Search Using Support Vector Machine
Cluster Based Web Search Using Support Vector Machine
 
IRJET-Model for semantic processing in information retrieval systems
IRJET-Model for semantic processing in information retrieval systemsIRJET-Model for semantic processing in information retrieval systems
IRJET-Model for semantic processing in information retrieval systems
 
ACM WebSci 2018 presentation/発表資料
ACM WebSci 2018 presentation/発表資料ACM WebSci 2018 presentation/発表資料
ACM WebSci 2018 presentation/発表資料
 
ASIDIC Spring 2010 Meeting Dwg
ASIDIC Spring 2010 Meeting   DwgASIDIC Spring 2010 Meeting   Dwg
ASIDIC Spring 2010 Meeting Dwg
 

Viewers also liked

Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
IDES Editor
 
A Novel Method for Detection of Architectural Distortion in Mammogram
A Novel Method for Detection of Architectural Distortion in MammogramA Novel Method for Detection of Architectural Distortion in Mammogram
A Novel Method for Detection of Architectural Distortion in Mammogram
IDES Editor
 
A Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateA Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric Template
IDES Editor
 
Security Constrained UCP with Operational and Power Flow Constraints
Security Constrained UCP with Operational and Power Flow ConstraintsSecurity Constrained UCP with Operational and Power Flow Constraints
Security Constrained UCP with Operational and Power Flow Constraints
IDES Editor
 
Design of a Remotely Accessible PC based Temperature Monitoring System
Design of a Remotely Accessible PC based Temperature Monitoring SystemDesign of a Remotely Accessible PC based Temperature Monitoring System
Design of a Remotely Accessible PC based Temperature Monitoring System
IDES Editor
 
Receive Antenna Diversity and Subset Selection in MIMO Communication Systems
Receive Antenna Diversity and Subset Selection in MIMO Communication SystemsReceive Antenna Diversity and Subset Selection in MIMO Communication Systems
Receive Antenna Diversity and Subset Selection in MIMO Communication Systems
IDES Editor
 

Viewers also liked (6)

Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
 
A Novel Method for Detection of Architectural Distortion in Mammogram
A Novel Method for Detection of Architectural Distortion in MammogramA Novel Method for Detection of Architectural Distortion in Mammogram
A Novel Method for Detection of Architectural Distortion in Mammogram
 
A Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateA Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric Template
 
Security Constrained UCP with Operational and Power Flow Constraints
Security Constrained UCP with Operational and Power Flow ConstraintsSecurity Constrained UCP with Operational and Power Flow Constraints
Security Constrained UCP with Operational and Power Flow Constraints
 
Design of a Remotely Accessible PC based Temperature Monitoring System
Design of a Remotely Accessible PC based Temperature Monitoring SystemDesign of a Remotely Accessible PC based Temperature Monitoring System
Design of a Remotely Accessible PC based Temperature Monitoring System
 
Receive Antenna Diversity and Subset Selection in MIMO Communication Systems
Receive Antenna Diversity and Subset Selection in MIMO Communication SystemsReceive Antenna Diversity and Subset Selection in MIMO Communication Systems
Receive Antenna Diversity and Subset Selection in MIMO Communication Systems
 

Similar to An Attempt to Automate the Process of Source Evaluation

407 409
407 409407 409
Plenary paper-2012-weideman-academic-content-web-visibility-presence
Plenary paper-2012-weideman-academic-content-web-visibility-presencePlenary paper-2012-weideman-academic-content-web-visibility-presence
Plenary paper-2012-weideman-academic-content-web-visibility-presence
Cape Peninsula University of Technology
 
An Unsupervised Approach For Reputation Generation
An Unsupervised Approach For Reputation GenerationAn Unsupervised Approach For Reputation Generation
An Unsupervised Approach For Reputation Generation
Kayla Jones
 
Co-Extracting Opinions from Online Reviews
Co-Extracting Opinions from Online ReviewsCo-Extracting Opinions from Online Reviews
Co-Extracting Opinions from Online Reviews
Editor IJCATR
 
IRJET-Multi -Stage Smart Deep Web Crawling Systems: A Review
IRJET-Multi -Stage Smart Deep Web Crawling Systems: A ReviewIRJET-Multi -Stage Smart Deep Web Crawling Systems: A Review
IRJET-Multi -Stage Smart Deep Web Crawling Systems: A Review
IRJET Journal
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
IRJET Journal
 
Data Mining Module 5 Business Analytics.pdf
Data Mining Module 5 Business Analytics.pdfData Mining Module 5 Business Analytics.pdf
Data Mining Module 5 Business Analytics.pdf
Jayanti Pande
 
Data Processing in Web Mining Structure by Hyperlinks and Pagerank
Data Processing in Web Mining Structure by Hyperlinks and PagerankData Processing in Web Mining Structure by Hyperlinks and Pagerank
Data Processing in Web Mining Structure by Hyperlinks and Pagerank
ijtsrd
 
A machine learning approach to web page filtering using ...
A machine learning approach to web page filtering using ...A machine learning approach to web page filtering using ...
A machine learning approach to web page filtering using ...
butest
 
A machine learning approach to web page filtering using ...
A machine learning approach to web page filtering using ...A machine learning approach to web page filtering using ...
A machine learning approach to web page filtering using ...
butest
 
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET Journal
 
Detection of Phishing Websites
Detection of Phishing WebsitesDetection of Phishing Websites
Detection of Phishing Websites
IRJET Journal
 
Study of Recommendation System Used In Tourism and Travel
Study of Recommendation System Used In Tourism and TravelStudy of Recommendation System Used In Tourism and Travel
Study of Recommendation System Used In Tourism and Travel
ijtsrd
 
Ss06 03-038
Ss06 03-038Ss06 03-038
Ss06 03-038
Keri Strahler
 
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENTTOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
csandit
 
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENTTOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
cscpconf
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET Journal
 
Building a collective experience
Building a collective experienceBuilding a collective experience
Building a collective experience
IJDKP
 
Please follow these steps1. Choose a topic from the subject lis.docx
Please follow these steps1. Choose a topic from the subject lis.docxPlease follow these steps1. Choose a topic from the subject lis.docx
Please follow these steps1. Choose a topic from the subject lis.docx
mattjtoni51554
 
Sweeny ux-seo om-cap 2014_v3
Sweeny ux-seo om-cap 2014_v3Sweeny ux-seo om-cap 2014_v3
Sweeny ux-seo om-cap 2014_v3
Marianne Sweeny
 

Similar to An Attempt to Automate the Process of Source Evaluation (20)

407 409
407 409407 409
407 409
 
Plenary paper-2012-weideman-academic-content-web-visibility-presence
Plenary paper-2012-weideman-academic-content-web-visibility-presencePlenary paper-2012-weideman-academic-content-web-visibility-presence
Plenary paper-2012-weideman-academic-content-web-visibility-presence
 
An Unsupervised Approach For Reputation Generation
An Unsupervised Approach For Reputation GenerationAn Unsupervised Approach For Reputation Generation
An Unsupervised Approach For Reputation Generation
 
Co-Extracting Opinions from Online Reviews
Co-Extracting Opinions from Online ReviewsCo-Extracting Opinions from Online Reviews
Co-Extracting Opinions from Online Reviews
 
IRJET-Multi -Stage Smart Deep Web Crawling Systems: A Review
IRJET-Multi -Stage Smart Deep Web Crawling Systems: A ReviewIRJET-Multi -Stage Smart Deep Web Crawling Systems: A Review
IRJET-Multi -Stage Smart Deep Web Crawling Systems: A Review
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
 
Data Mining Module 5 Business Analytics.pdf
Data Mining Module 5 Business Analytics.pdfData Mining Module 5 Business Analytics.pdf
Data Mining Module 5 Business Analytics.pdf
 
Data Processing in Web Mining Structure by Hyperlinks and Pagerank
Data Processing in Web Mining Structure by Hyperlinks and PagerankData Processing in Web Mining Structure by Hyperlinks and Pagerank
Data Processing in Web Mining Structure by Hyperlinks and Pagerank
 
A machine learning approach to web page filtering using ...
A machine learning approach to web page filtering using ...A machine learning approach to web page filtering using ...
A machine learning approach to web page filtering using ...
 
A machine learning approach to web page filtering using ...
A machine learning approach to web page filtering using ...A machine learning approach to web page filtering using ...
A machine learning approach to web page filtering using ...
 
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
 
Detection of Phishing Websites
Detection of Phishing WebsitesDetection of Phishing Websites
Detection of Phishing Websites
 
Study of Recommendation System Used In Tourism and Travel
Study of Recommendation System Used In Tourism and TravelStudy of Recommendation System Used In Tourism and Travel
Study of Recommendation System Used In Tourism and Travel
 
Ss06 03-038
Ss06 03-038Ss06 03-038
Ss06 03-038
 
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENTTOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
 
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENTTOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
TOWARDS UNIVERSAL RATING OF ONLINE MULTIMEDIA CONTENT
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
 
Building a collective experience
Building a collective experienceBuilding a collective experience
Building a collective experience
 
Please follow these steps1. Choose a topic from the subject lis.docx
Please follow these steps1. Choose a topic from the subject lis.docxPlease follow these steps1. Choose a topic from the subject lis.docx
Please follow these steps1. Choose a topic from the subject lis.docx
 
Sweeny ux-seo om-cap 2014_v3
Sweeny ux-seo om-cap 2014_v3Sweeny ux-seo om-cap 2014_v3
Sweeny ux-seo om-cap 2014_v3
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

An Attempt to Automate the Process of Source Evaluation

  • 1. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 An Attempt to Automate the Process of Source Evaluation Sonal Aggarwal1 and Herre Van Oostendorp2 1 International Institute of Information Technology, Hyderabad, India Email: sonalaggarwal1@gmail.com 2 Institute of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands Email: herre@cs.uu.nl Abstract — Credibility of a web-based document is an In this paper we try to automatically assign credibility indices important concern, when a large number of documents is to web-based documents, based on different criteria and available on internet for a given subject. In this paper, various report back to the users. criteria that affect the credibility of a document are explored. An attempt is made to automate the process of assigning a B. Various criteria of source evaluation credibility score to a web-based document. Presently the The different criteria based on which we can evaluate a prototype of the tool developed is restricted to only four criteria – type of website, date of update, sentiment analysis and a web-based source are as follows: Type of website. A website pre-defined Google page rank. Also a separate module for can be an educational website (.edu, .ac), government checking “link integrity” of a website is developed. To obtain website (.gov), a commercial website (.com), organizational empirical validity of the tool, a pilot study is conducted which website (.org) or other website. Depending on the type, a collects credibility scoring for a set of websites by human website can be more or less reliable; Date of the web-site, judges. The correlation between the scores given by human when it was last updated, also affects the credibility of a judges and the scores obtained by the tool developed is low. web-based document; A web-document being a primary or The possible reasons for the low correlation are firstly, the secondary source, also decides the credibility of the tool is restricted to only four criteria, and secondly, subjects document [6]; Availability of contact information (address themselves had no agreement. Apparently they judged the website on different criteria, and not weighted overall. Further and/or email id) of the owner of the web-document; Analyzing enhancements to the work done in this paper can be of great the link integrity of the website [7]. A website with balanced use to a novice user, who wishes to search a reliable web- internal and external links is more credible. Also it should not based document on any specific topic. This can be done by have any broken link; Analyzing the header/ footer of the including all criteria (discussed in this paper) for calculating web-site for any affiliation (if available) [8]; Completeness the credibility score of a website. and accuracy of the information; Author’s expertise in the subject [9]; Author’s opinion biased or un-biased. Analyzing Index Terms — credibility score; source evaluation; the sentiment (positive, negative or neutral) of a website can automation; web-based multiple documents determine author’s opinion; Author’s connection to the source of publication; connection to the intended audience I. INTRODUCTION [6]; Author’s point of view is objective and impartial or not A. Need for Source Evaluation of web-based Documents [6]; Author’s credentials like institutional affiliation (where The number of web-based documents available for a given he or she works), educational background, past writings, or subject is tremendous. So it becomes necessary to evaluate the experience. [6]; Purpose of the web-page (somewhat reflected sources of these documents in order to choose the most by the type of website); Interactivity, Usability of the web- appropriate documents. Studies conducted by Metzger et al. site; Structure of the web-site in terms of graphics and text [1] indicate that particularly college students rely heavily on are appropriate or not [7]; Quality of information on the web- the web for both general and academic information, but verify site: elementary, technical, or advanced; “Tone” of the the information very rarely. Another study by Walraven et al. webpage: ironic, humorous, exaggerated or overblown [2] also indicates that students do not frequently explicitly arguments [10]; Determining if advertising and informational evaluate ‘sources’ and ‘information’ with respect to a web-based content are being supplied by the same person or document. Empirical psychological research shows that organization; If so, advertising likely to bias informational adequately evaluating the credibility of sources is important: content [8]; Determining any software requirements that may students who do this well or assess reliability and use source limit access to web information [11]; Is the web-site better characteristics achieve better comprehension of the content than the other. If so why; Ranking of the web-source with [3].Research by Amin et al. [4] demonstrates that providing a Google. Google has a patented Page-Ranking technology novice user with credibility scores of web-pages boosts the that can also be criterion of source evaluation [12]; Domain confidence level in the selection of information, though it Experts’ view on the credibility of any web-document. As does not make search more efficient. Case studies by [5] according to Amin [13], experts develop different strategies emphasize on critical analysis of internet and scholarly sources while seeking information from internet. These strategies can by undergraduates, as they are unable to discriminate between be helpful to a novice user. An expert can assess the credibility of a web document on the basis of two dimensions of credibility credible and non-credible sources. 18 © 2011 ACEEE DOI: 01.IJCOM.02.02.160
  • 2. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 – trustworthiness (well-intentioned, unbiased) and expertise Figure 1). User is allowed to edit any score or to download all (knowledgeable, competent) [14]. C. Multi-Criteria Decision the scores. Along with this, a separate module for checking Analysis (MCDA) When a decision is affected by more than link integrity is developed, which checks the link integrity of one criterion, a Multi-criteria decision analysis is required. a website address entered by the user. One of the methods for doing this analysis is “Potentially All A. Materials & Equipments Pairwise RanKings of all possible Alternatives” (PAPRIKA), in which a pair-wise ranking of all possible alternatives is The software tools used in the development of the done, so as to identify all dominating and un-dominating prototype source evaluation tool are: Python [17] and Py2exe pairs. The dominating pairs are given more priority [15]. In [18]; Pattern [19]; AlchemyAPI [20]; .Net Framework for web this paper we are using this method to define initial weights interface; Microsoft Access. to available criteria for defining and computing credibility B. Procedure indices. A Python script is developed, which gets search results from Google or external links of Wikipedia page for a given II. HYPOTHESIS topic using Pattern, does sentiment analysis using It is assumed that we can automate the process of AlchemyAPI, obtains Google Rank for which url from http:// assigning credibility indices to web-based documents based webinfodb.net/a/pr.php?url=<website_url>, obtains type of on various criteria for source evaluation. Presently to compute website by analyzing the url, calculates credibility score for the credibility index of a website we are considering only each search URL based on four criteria and writes the result four criteria: type of website, date of update, sentiment to a database file. The script uses Multi-threading concept analysis and Google page Rank. To examine whether we so that it can make parallel calls to different URLs. And it is have achieved our goal we will compare the performance of converted into an executable program using Py2exe. Another the tool regarding the credibility index with the rating of Python script is developed which checks the ‘link Integrity’ human judges. of a given URL It gives output as total number of ‘internal links’, ‘external links’ and ‘broken links’. This script makes III. METHOD call to each link available on the given web-page. If the link is not opening – it is considered as broken link. While if the link A. Design is ‘#’ it is a self-link. If a link to a web-page in the same domain A Prototype of the tool is designed which takes Google exists then it is said to be an internal-link. And if it goes to Search results/Wikipedia external links for a given topic. And another domain it is an external-link. A web-interface is assigns a credibility score to each web-document based on developed which uses the above python scripts for back- different criteria. The weights (Table 1) are assigned using end processing. 1000 Minds [16], decision making software which implements PAPRIKA method. III RESULTS TABLE I A. Output Source Evaluation Tool WEIGHTS ASSIGNED TO EACH CATEGORY The output of the tool when given a search topic “Tourism in India” is shown in Figure 1. The user is also allowed to edit or download results as a database file. B. Empirical Vailidity A small group of seven people was asked to give credibility scores (1-10) for nine websites. The pilot study was conducted by sending an email to the group. The participants were provided with the URLs of nine websites with a small introduction about the factors affecting the credibility. With a concern of not biasing the opinion of the group, the introduction part (in the form of question and answer) was made brief. The results were matched with the scores provided by the developed tool. The scores given by the participants and the tool are as shown in table 2. Based on the mean of scores obtained by the participants the correlation coefficient of 0.484, p<.19 is obtained. Based on the above weights, a credibility score is assigned to any website. For example if an organizational website which is recently updated, having positive bias and rated as 7 by Google ranking, will be given the following score : (80.58+100+35.98+87.7)/4 = 76.065 The results (search results with credibility scores) are displayed in a tabular form (see 19 © 2011 ACEEE DOI: 01.IJCOM.02.02.160
  • 3. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 TABLE II REFERENCES SCORES GIVEN BY PARTICIPANTS AND THE TOOL [1] M.J. Metzger, A.J. Flanagin & L. Zwarun, 2003. “College student Web use, perceptions of information credibility, and verification behavior,” Computers & Education, volume 41, pp. 271–290. [2] Amber Walraven, Saskia Brand-Gruwel & Henny Boshuizen, “How students evaluate information and sources when searching the World Wide Web for information”, Computers & Education, 2009, 52, 234-246. [3] Braten, I., Strømso, HI, & Britt, MA (2009), ”Trust matters: Examining the role of source evaluation in students’ construction of meaning Within and across multiple text,” Reading Research Quarterly, 44, 6-28. [4] A. Amin, J. Zhang, H. Cramer, L. Hardman & V. Evers, “The effects of source credibility ratings in a cultural heritage information aggregator,” in Proceedings of the 3rd workshop on information V. C ONCLUSIONS & DISCUSSION credibility on the web, New York, NY, USA: ACM, 2009, pp. 35– 42. The prototype of the tool developed uses only four criteria [5] Calkins, S., & Kelley, M. R. (2007), “Evaluating Internet and for assigning credibility score to the website. The pilot study scholarly sources across the disciplines: Two case studies,” College conducted to obtain empirical validity of the tool, gives a Teaching, 55 (4), 151-156. correlation with a low value (.48). The possible causes of this [6] Joan Ormondroyd , “Critically Analyzing Information low correlation value can be summarized as follows: The tool Sources,” September 2009, from: http://olinuris.library.cornell.edu/ ref/research/skill26.htm is restricted only to four criteria. If all criteria (discussed in [7] Esther Grassian, the UCLA Library, “Thinking Critically about section I (B)) are included to obtain the credibility score, the World Wid e Web Resources,” June 1995, from: http:// system may give better results. Only then a higher correlation www2.library.ucla.edu/libraries/college/11605_12337.cfm with subjects’ judgments will be found; The weights assigned [8] Beck, Susan, “The Good, The Bad & The Ugly: or, Why It’s by the subjects had no agreement in themselves. Apparently a Good Idea to Evaluate Web Sources,” 1997, from: http:// they judged the website on different criteria, and not weighted lib.nmsu.edu/instruction/evalcrit.html overall. The work done in this paper can be enhanced further, [9] Laura Cohen, Trudi E. Jacobson , “Evaluating Web Content”, by including all the criteria of source evaluation into an March 2009, from: http://library.albany.edu/usered/eval/evalweb/ automated system. Some of the criteria may not be possible EvaluatingWebContent.pdf [10] UC Berkeley - Teaching Library Internet Workshops, “Finding to evaluate automatically. We may use a database having Information on the Internet: A Tutorial,” Copyright 2010, from: meta-data given by experts in that case. Development of this http://www.lib.berkeley.ed u/TeachingLib/Guides/Internet/ system will be helpful to a novice user, giving him/her a level Evaluate.html of confidence on the reliability of any specific web- [11] Jan Alexander & Marsha Tate, “The Web as a Research Tool: document.Also integration of this Source Evaluation tool to Evaluation Techniques,” 1996-1998, from: http:// existing automatic multi-document summarizers will help to www.med iaawaren ess.ca/en glish/resources/ed uca tion al/ achieve a better summarization. teaching_backgrounders/internet/web_as_research_tool.cfm [12] Google Technology, from: http://www.google.com/ corporate/tech.html [13] A. Amin, J. van Ossenbruggen, L. Hardman & A. van Nispen, “Understanding cultural heritage experts’ information seeking needs,” In Proc. JCDL ‘08, pages 39{47, New York, NY, USA, 2008. ACM. [14] B. J. Fogg and H. Tseng, “The elements of computer credibility,” In Proc. CHI ‘99, pp. 80-87, ACM. [15] An Article on Multi-criteria decision analysis, from: http:/ /en.wikipedia.org/wiki/Multi-criteria_decision_analysis [16] 1000Minds, advanced decision-support software, from: http:/ /www.1000minds.com [17] Python, from: http://www.python.org [18] Py2exe, from: http://www.py2exe.org [19] De Smedt, T. & Daelemans, W. (2011), Pattern version 1.0, retrieved January 2011, from: http://www.clips.ua.ac.be/ Figure1. Output of the tool for a searched topic [20] AlchemyAPI, a product of Orchestr8, semantic tagging and text mining solutions, from: http://www.alchemyapi.com 20 © 2011 ACEEE DOI: 01.IJCOM.02.02.160