SlideShare a Scribd company logo
1 of 9
Download to read offline
http://www.iaeme.com/IJCET/index.asp 36 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 7, Issue 1, Jan-Feb 2016, pp. 36-44, Article ID: IJCET_07_01_005
Available online at
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1
Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
___________________________________________________________________________
STUDY OF DEEP WEB AND A NEW FORM
BASED CRAWLING TECHNIQUE
Debraj Dey
Computer Science and Engineering Department,
MaulanaAbulKalam Azad University of Technology
Kolkata, West Bengal, India
Payel Das
Computer Science and Engineering Department,
Maulana Abul Kalam Azad University of Technology
Kolkata, West Bengal, India
ABSTRACT
The World Wide Web, abbreviated as WWW is global information medium
interlinked with hypertext documents accessed via the internet. In a web
browser a user can easily search the content by simply filling up a form. As
the amount of information in the web is increasing drastically, the search
result needs to be increased and it depends completely on the searching
engine and the search engines are only as good as the web crawlers that serve
up content for the result.
The paper gives an idea of a new hidden web crawling technique that is
concerned with filling forms with meaningful values in order to get an
appropriate search results.
Key word: WWW, Web Crawler, Deep Web, HTML, SQLI
Cite this Article: Chittineni Aruna and R. Siva Ram Pra. Study of Deep Web
and A New Form Based Crawling Technique. International Journal of
Computer Engineering and Technology, 7(1), 2016, pp. 36-44.
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1
1. INTRODUCTION
The Deep Web is vast, thousands of times larger than the visible internet, which is
also called the surface web. But the Deep Web is not a place it simply accounts for all
of the unindexed content online like banking data, administrative codes of
government, corporations and universities. It’s like looking under the hood of the
internet. The Deep Web cannot be accessed through traditional search engines like
Goggle, Bing, Yahoo etc. because traditional search engines create their indices by
Study of Deep Web and A New Form Based Crawling Technique
http://www.iaeme.com/IJCET/index.asp 37 editor@iaeme.com
crawling surface web pages [1]. This large amount of information in the Deep Web is
only accessible through specific interfaces created by CGI or Common Gateway
Interface and HTML forms or JavaScript. A software service called Tor, originally
developed by US Military which is now an open source and publicly funded can also
be used to access the Deep Web. It is important to understand that an ideal platform to
accumulate all detailed information is nothing but the Deep Web which is worthwhile
for journalists, government agencies and dissidents around the world.
In general there are two common approaches to access the Deep Web content [6].
One is to create a vertical search engine for specific domain, where semantic mapping
is done in between individual data and mediator forms, and this technique is less
accurate and certainly has some drawbacks. The other one is the surfacing technique,
which is more common and effective approach. Our goal is to create a form based
crawling technique and to equip a web crawler with appropriate input values in order
to get accurate result.
The rest of the research paper is divided into six sections. In section II the
characteristics and scale of the Deep Web is discussed. Then in section III our
approach towards four categories of crawling technique is shown, including the
architecture of form focused crawling, and followed by given experiment and its
phases in section IV. Further in section V experiment results that are applied on
people domain is shown. Finally, in section VI conclusion and future work is
discussed followed by the references in section VII.
2. THE DEEP WEB
As time progresses the size of the Deep web is increasing exponentially and at a rate
that defines quantification. In the verge of 20th
century the WWW contained few
documents and sites. Back then it was manageable task to post all the documents as
static pages and the documents could easily be accessed through search engine by the
help of web crawlers. But now the content of the web is accessed dynamically for
maintaining a database. Since, the database is typically hidden from the traditional
search engine; so, in order to access the content of the database sometimes we need to
generate queries. The study by Bergman in the year 2001 suggests that the size of the
Deep Web was 500 times larger than the Surface Web [1].But back then it was
29,254,370 websites available in the internet among which 75% were inactive [7].
According to University of California, Berkeley the Deep Web contains
approximately 91,850 terabytes of data in 2003 [1]. A report published by IDC
predicted that the total of all digital data created, replicated, and consumed will reach
6 zettabytes in 2014 [4]. By the end of 2014, NetCraft confirmed that the total number
of websites increased to 1 billion [10]. Thus, according to the stats and opinion given
by the experts suggest that
 4.9% of the total web content is publically accessible.
 The Deep Web is nearly 4,000-5,000 times larger than the Surface Web.
 The Deep Web contains nearly 750 billion documents.
Debraj Dey and Payel Das
http://www.iaeme.com/IJCET/index.asp 38 editor@iaeme.com
3. OUR PROPOSED APPROACH
3.1. Categories of Web Crawling
A web crawler is a program that visits webpages; forms etc. and reads their content
and other required information like URL in order to create entries for the search
engine index. In general there are mainly four categories of crawling technique which
are:
3.1.1. Traditional Web Crawler
The traditional web crawlers do not distinguish between pages with and without forms
[3]. The main components of traditional web crawler are frontier, fetcher, URL
extractor, page filter and database. The architecture of traditional web crawler is
shown in figure 1. First, the module gets a unique URL from a set of seed URLs
which is later passed through frontier. Then the frontier sends the unique URL
through fetcher, which fetches the content of the web. Then the content is passed
through URL extractor. Later the extractor checks the pages to find new links. The
new links are sent through HTML-page filler to eliminate uninteresting pages and
finally the valid pages are stored in the database.
Figure1 Architecture of Traditional Web Crawler
3.1.2. Deep Web Crawler
There are millions of web pages which are indexed each and every day, but still a
huge amount of information is hidden behind the web forms. So, in order to retrieve
those information researchers are continuously developing the deep web crawler.
Figure 2 shows the architecture of deep web crawler. The main components of deep
web crawler are Input-Classifier, Domain Filter and HTML Analyzer. First, seed
URLs, domain data and the user specific are sent as inputs of the Input-Classifier. The
main function of Input-Classifier is to choose the HTML element and interact with the
various inputs [8]. After that these data are sent through domain filter and later
through HTML analyser to submit the forms to the web server. Finally, the Response-
Analyser edits and also updates the content of the database.
Study of Deep Web and A New Form Based Crawling Technique
http://www.iaeme.com/IJCET/index.asp 39 editor@iaeme.com
Figure2 Architecture of Deep Web Crawler
3.1.3. RIA Web Crawler
Over the last few decade, web application has become more interactive, responsive
and user friendly. These applications are called Rich Internet Application
(RIA).Certainly, accessing these applications are often time consuming because
technologies like AJAX and DOM are used heavily in the RIA [5]. To reduce the time
to crawl into RIA a good web crawler is required. The architecture of RIA Web
Crawler is shown in Figure 3. First, JavaScript engine starts with a virtual browser
and runs a JS engine, and then it retrieves the starting web page associated with an
URL seed and loads it in the virtual browser. After that, the constructed DOM is
passed to the DOM state to determine if this is the first time the DOM state is seen or
not. To extract the JS events the DOM state is passed to the extractor. Then the JS
event is passed to the strategy module. The strategy module decides which event is to
execute. Then the chosen event is passed to the JS engine for the further execution.
This process carries on until all the reachable DOM states are seen [9].
Figure 3 Architecture of RIA Web Crawler
Debraj Dey and Payel Das
http://www.iaeme.com/IJCET/index.asp 40 editor@iaeme.com
3.1.4. Unified Model Web Crawler
The Unified Modeling Language (UML) is a general purpose graphic language which
is usually used by software professionals for specifying, visualizing, constructing, and
documenting the artifacts of a software intensive system. So, in Unified Model Web
Crawler nod is calculated based on DOM and the URL. In this type of crawler
redirecting the browser is a special client side event. For this UML uses three main
models which are user model, object model and the dynamic model. The user model
consists of use case diagram, object model represent by the class diagram and
dynamic model is represent by the sequence diagram.
3.2. Search Interface
In this research paper we discussed two types of searching interface:
 Keyword based Search Interface.
 Multi-attribute Search Interface.
The information in the web database can be categorized in to categories which are
structured database or unstructured database. The unstructured database contains plain
text documents which are not well structured. It provides a simple keyword based
search interface, where the user types the required keyword to fill text field. For
example Fig 4 shows a typical keyword based search interface for people-search
database.
Figure4 Keyword based Search Interface
In contrast, structured database provide multi-attribute search interface which
provides multiple query boxes depends upon the content. For example Fig 5 shows a
multi-attribute search form interface for people-search database. Typically the given
attributes are first name, last name, middle name, dob, email id, gender, location, pin
code, marital status, contact number. Only first name, last name and gender are the
mandatory fields; which means even though the user have not enough information
about the person he is searching for, he will be able to see the search result. This is
one of the advantages of multi-attribute search interface.
Figure 5 Multi-attribute Search Interface
Study of Deep Web and A New Form Based Crawling Technique
http://www.iaeme.com/IJCET/index.asp 41 editor@iaeme.com
3.3. Form Focused Crawler
This type of crawler combines the use of page classifier and link classifier. The page
classifier concentrates on web pages and the link classifier works on the URLs. The
frontier manager is used to select the next target links for crawling. Form Classifier is
used to filter out useless forms. The new useful forms are added to the form database
[2]. The architecture of Form Focused crawler is shown in fig. 6.
Figure6 Form focused Crawler
4. EXPERIMENTATION
Our challenge is to find the lost individual or relatives from our people-search
database. The tools for this research include things like:
 Social Network
 Search Engines
 Public Records
 Online White Pages
 Birth, Marriage and Death indexes
 Refugee camp Records
 Non-Profit Organization Records
To determine the performance and accuracy of our technique, we test it on people
domain. Our experiment will go through two important phases.
4.1. Collecting phase
This is the first phase of our experimentation. This phase consists of two sub phases:
4.1.1. Creating collection sites
In this sub phase we manually visited 6 websites at random which is shown in table I,
and determined the attributes and aliases. The weight and threshold were also chosen
manually, depending upon number of attributes.
Debraj Dey and Payel Das
http://www.iaeme.com/IJCET/index.asp 42 editor@iaeme.com
Table I. Collection Websites
ATTRIBUTES URL
Email search https://www.peoplesmart.com/email
Phone No. search http://www.spokeo.com/reverse-phone-lookup
Address search http://www.yellowpages.com/whitepages/address
Name search https://www.pipl.com/name
Pine code search http://www.indiapost.gov.in/pincodesearch.aspx
Date of Birth search https://www.dobsearch.com/
4.1.2. Creating Label table
After collection sites are being injected, all data of people are being determined and
stored in labels table. The labels table contains label, alias and point which are shown
in table II. The point depends upon the websites, if a website’s search has more
attributes in offering then the point will be much higher, and if the website’s search
option has less attributes then the point will be at the lower side.
Table II Lebel Table
LEBEL ALIAS MARK
First_name ‘first_name of individual’, name 70
Middle_name ‘middle_name of individual’ 75
Last_name ‘last_name of individual’ 70
Date of Birth year, month, date 95
Location country, state, city 75
Pin code 90
Gender Male, female 95
Email 100
Contact no 95
4.2. Operating phase
In this phase we will determine the accuracy of our technique. First, we manually
obtained a result by visiting the websites, second we determined the result which is
obtained by the web crawler. Finally the results are being mapped by the help of
matrix into five different stages.
 Set of associations between form field and domain attribute determined by web
crawler = A
 Set of associations between form field and domain attribute determined manually = B
 Set of associations between forms and domains determined by web crawler= C
 Set of associations between forms and domains determined manually = D
 Set of submitted forms determined by web crawler = E
Here we used simple precision and recall method to determine the matrices. Five
stages are as follows:
Stage 1: [A∩ B] / [A] (PRECISION)
Stage 2: [A ∩ B] / [B](RECALL)
Study of Deep Web and A New Form Based Crawling Technique
http://www.iaeme.com/IJCET/index.asp 43 editor@iaeme.com
Stage 3: [C ∩ D] / [C](PRECISION)
Stage 4: [C ∩ D] / [D](RECALL)
Stage 5: [E] / [C ∩ D] (PRECISION)
5. EXPERIMENTAL RESULTS
In this section we concentrate on the results of our experiment. We have considered
six websites where the web crawler will crawl upon and extract the forms. The
websites are shown in table III.
Table III Operating Websites
NAME URL
Facebook
Google plus
LinkedIn
Pipl search
People search now
Any who
https://www.facebook.com
https://www.plus.google.com
https://www.linkedin.com
https://www.pipl.com
http://www.peoplesearchnow.com
http://www.anywho.com
We have gone through an ample number of experiments and tests to measure the
accuracy and performance of our technique. The overall results are shown in table IV.
Where X is denoted as collection dataset of collection websites and Y is denoted as
operating dataset of operating websites. The global dataset is determined as
(X+Y)*100.
Table IV Experimental Result
X Y (X+Y)*100
FORM-DOMAIN ASSCIATION
Precision 6/6
1.00
6/6
1.00
12/12
100
Recall 6/6
1.00
5/5
1.00
11/11
100
FIELD-ATTRIBUTE ASSOCIATION
Precision 19/22
0.86
38/45
0.84
57/67
85
Recall 19/22
0.86
37/46
0.80
56/68
82
SUBMITTED FORMS
Precision 6/6
1.00
6/6
1.00
12/12
100
6. CONCLUSION
This research paper represents a keyword based search form Interface and a multi-
attribute search form interface for people database. Both forms are being created
using simple HTML. SQL Injection technique is used to create the background
database. The search results are up to the mark.
We also portrayed four different categories of crawling technique including Form
Focused Web Crawling and given a fruitful source of information regarding each of
the techniques. Further, the results of our experiment are quite convincing and some
of them even reached 100 especially recall in associating forms and domains.
Debraj Dey and Payel Das
http://www.iaeme.com/IJCET/index.asp 44 editor@iaeme.com
From the future point of view we can suggest that the crawling technique can be
improved by adding more attributes to enhance the accuracy of the search. Handling
forms by using JavaScript can be significantly improved in performance of hidden
web crawling in the further future. Our proposed technique not only is applicable to
people domain but it also can be applicable for different domains.
REFERENCES
[1] Michael Bergman, The Deep Web: Surfacing Hidden Value, in the journal of
electronic Publication (JEP) volume 7, Issue 1, August, 2001.
[2] L. Barbosa, J Fieire, Searching for Hidden Web Database, in proceedings of
WebDB page 1-6 2005
[3] S. Bal Gupta, Challenges in Designing a Hidden Web Crawler, in International
Journal of Information Technology and System, 2(1), Jan-Jun 2013, pp 2277-
9825
[4] IDC worldwide predictions 2014: Battles for dominance – and survival on the 3rd
platform. http://www.idc.com/research/Predictions14/index.jsp, 2014.
[5] Seyed M. Mirtaheri, Mustafa EmreDinc¸t¨urk, Salman Hooshmand, Gregor V.
Bochmann, Guy-Vincent Jourdan, Brief History of Web Crawlers, School of
Electrical Engineering and Computer Science, University of Ottawa, Ottawa,
Ontario, Canada.
[6] Jaytrilok Choudhary and Devshri Roy. Priority Based Focused Web Crawler.
International Journal of Computer Engineering and Technology, 4(4), 2013, pp.
163-169.
[7] Houda El Bouhissi, Mimoun Malki and Djamila Berramdane. Applying Semantic
Web Services. International Journal of Computer Engineering and Technology,
4(2), 2013, pp. 108 - 113.
[8] A. Suganthy, G.S.Sumithra, J.Hindusha, A.Gayathri and S.Girija. Semantic Web
Services and its Challenges. International Journal of Computer Engineering and
Technology, 1(2), 2010, pp. 26-37.
[9] J. Madhavan, D. Ko L. Kot, Google’s Deep Web Crawl, Proceedings of 1st
International Conference on Very Large Data Bases(VLDB), August, Auckland,
New Zealand, (2008),pp. 1241-1252
[10] B. He, M. Patel, Z. Zhang, and K. C.-C. Chang, accessing the deep web,
Commun. ACM, 50(5), pp. 94–101, May 2007.
[11] Beena Mahar, C K Jha, A comparative study on web crawling for searching
hidden web” in (IJCSIT) International Journal of Computer Science and
Information Technologies, Vol. 6 (3)
[12] A. Mesbah, A. Van Deursen and S. Lenselink, Crawling Ajax based web
applications through dynamic analysis of user interface state changes in ACM
Transaction on the web- TWEB, volume 6, Issue 1,page 3, 2012.
[13] A report published by NetCraft on Web server survey January, 2015
http://www.netcraft.com/

More Related Content

Viewers also liked (20)

Tor projet
Tor projetTor projet
Tor projet
 
Deep web
Deep webDeep web
Deep web
 
La deep web
La deep webLa deep web
La deep web
 
Format string vunerability
Format string vunerabilityFormat string vunerability
Format string vunerability
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Web crawler
Web crawlerWeb crawler
Web crawler
 
Deep web
Deep webDeep web
Deep web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Transcendence: Enabling A Personal View of the Deep Web
Transcendence:  Enabling A Personal View of the Deep WebTranscendence:  Enabling A Personal View of the Deep Web
Transcendence: Enabling A Personal View of the Deep Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Smart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep Web
Smart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep WebSmart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep Web
Smart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep Web
 
Deep web
Deep webDeep web
Deep web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Deep web
Deep webDeep web
Deep web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Deep Web & Dark Web
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniques
 
Deep Web
Deep WebDeep Web
Deep Web
 

Similar to STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUE

Deep Web: Databases on the Web
Deep Web: Databases on the WebDeep Web: Databases on the Web
Deep Web: Databases on the WebDenis Shestakov
 
Advance Frameworks for Hidden Web Retrieval Using Innovative Vision-Based Pag...
Advance Frameworks for Hidden Web Retrieval Using Innovative Vision-Based Pag...Advance Frameworks for Hidden Web Retrieval Using Innovative Vision-Based Pag...
Advance Frameworks for Hidden Web Retrieval Using Innovative Vision-Based Pag...IOSR Journals
 
Librarian Internet Index
Librarian Internet IndexLibrarian Internet Index
Librarian Internet IndexOlga Bautista
 
Web engineering notes unit 2
Web engineering notes unit 2Web engineering notes unit 2
Web engineering notes unit 2inshu1890
 
What are the different types of web scraping approaches
What are the different types of web scraping approachesWhat are the different types of web scraping approaches
What are the different types of web scraping approachesAparna Sharma
 
Web Chat using React Framework
Web Chat using React FrameworkWeb Chat using React Framework
Web Chat using React Frameworkijtsrd
 
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...ijmech
 
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...ijmech
 
Design and Implementation of Carpool Data Acquisition Program Based on Web Cr...
Design and Implementation of Carpool Data Acquisition Program Based on Web Cr...Design and Implementation of Carpool Data Acquisition Program Based on Web Cr...
Design and Implementation of Carpool Data Acquisition Program Based on Web Cr...ijmech
 
Design and Development of a Headless Content Management System
Design and Development of a Headless Content Management SystemDesign and Development of a Headless Content Management System
Design and Development of a Headless Content Management SystemIRJET Journal
 
Security-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-LogicSecurity-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-LogicNana Kwame(Emeritus) Gyamfi
 
Property Management System
Property Management SystemProperty Management System
Property Management SystemAI Publications
 
Literature Survey on Web Mining
Literature Survey on Web MiningLiterature Survey on Web Mining
Literature Survey on Web MiningIOSR Journals
 
International conference On Computer Science And technology
International conference On Computer Science And technologyInternational conference On Computer Science And technology
International conference On Computer Science And technologyanchalsinghdm
 
Creation Of Social Group in Full Stack Progressive Apparel Purchasing Web App
Creation Of Social Group in Full Stack Progressive Apparel Purchasing Web AppCreation Of Social Group in Full Stack Progressive Apparel Purchasing Web App
Creation Of Social Group in Full Stack Progressive Apparel Purchasing Web AppIRJET Journal
 

Similar to STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUE (20)

Deep Web: Databases on the Web
Deep Web: Databases on the WebDeep Web: Databases on the Web
Deep Web: Databases on the Web
 
Web 2.0 vs Web 3.0
Web 2.0 vs Web 3.0Web 2.0 vs Web 3.0
Web 2.0 vs Web 3.0
 
EMPO ICT.pptx
EMPO ICT.pptxEMPO ICT.pptx
EMPO ICT.pptx
 
Advance Frameworks for Hidden Web Retrieval Using Innovative Vision-Based Pag...
Advance Frameworks for Hidden Web Retrieval Using Innovative Vision-Based Pag...Advance Frameworks for Hidden Web Retrieval Using Innovative Vision-Based Pag...
Advance Frameworks for Hidden Web Retrieval Using Innovative Vision-Based Pag...
 
Librarian Internet Index
Librarian Internet IndexLibrarian Internet Index
Librarian Internet Index
 
Web engineering notes unit 2
Web engineering notes unit 2Web engineering notes unit 2
Web engineering notes unit 2
 
What are the different types of web scraping approaches
What are the different types of web scraping approachesWhat are the different types of web scraping approaches
What are the different types of web scraping approaches
 
Litmus: RIA
Litmus: RIALitmus: RIA
Litmus: RIA
 
Web Chat using React Framework
Web Chat using React FrameworkWeb Chat using React Framework
Web Chat using React Framework
 
Web Programming Assignment
Web Programming AssignmentWeb Programming Assignment
Web Programming Assignment
 
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
 
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
DESIGN AND IMPLEMENTATION OF CARPOOL DATA ACQUISITION PROGRAM BASED ON WEB CR...
 
Design and Implementation of Carpool Data Acquisition Program Based on Web Cr...
Design and Implementation of Carpool Data Acquisition Program Based on Web Cr...Design and Implementation of Carpool Data Acquisition Program Based on Web Cr...
Design and Implementation of Carpool Data Acquisition Program Based on Web Cr...
 
Design and Development of a Headless Content Management System
Design and Development of a Headless Content Management SystemDesign and Development of a Headless Content Management System
Design and Development of a Headless Content Management System
 
Security-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-LogicSecurity-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
 
Property Management System
Property Management SystemProperty Management System
Property Management System
 
Literature Survey on Web Mining
Literature Survey on Web MiningLiterature Survey on Web Mining
Literature Survey on Web Mining
 
International conference On Computer Science And technology
International conference On Computer Science And technologyInternational conference On Computer Science And technology
International conference On Computer Science And technology
 
E017413647
E017413647E017413647
E017413647
 
Creation Of Social Group in Full Stack Progressive Apparel Purchasing Web App
Creation Of Social Group in Full Stack Progressive Apparel Purchasing Web AppCreation Of Social Group in Full Stack Progressive Apparel Purchasing Web App
Creation Of Social Group in Full Stack Progressive Apparel Purchasing Web App
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUE

  • 1. http://www.iaeme.com/IJCET/index.asp 36 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 36-44, Article ID: IJCET_07_01_005 Available online at http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1 Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com ISSN Print: 0976-6367 and ISSN Online: 0976–6375 © IAEME Publication ___________________________________________________________________________ STUDY OF DEEP WEB AND A NEW FORM BASED CRAWLING TECHNIQUE Debraj Dey Computer Science and Engineering Department, MaulanaAbulKalam Azad University of Technology Kolkata, West Bengal, India Payel Das Computer Science and Engineering Department, Maulana Abul Kalam Azad University of Technology Kolkata, West Bengal, India ABSTRACT The World Wide Web, abbreviated as WWW is global information medium interlinked with hypertext documents accessed via the internet. In a web browser a user can easily search the content by simply filling up a form. As the amount of information in the web is increasing drastically, the search result needs to be increased and it depends completely on the searching engine and the search engines are only as good as the web crawlers that serve up content for the result. The paper gives an idea of a new hidden web crawling technique that is concerned with filling forms with meaningful values in order to get an appropriate search results. Key word: WWW, Web Crawler, Deep Web, HTML, SQLI Cite this Article: Chittineni Aruna and R. Siva Ram Pra. Study of Deep Web and A New Form Based Crawling Technique. International Journal of Computer Engineering and Technology, 7(1), 2016, pp. 36-44. http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1 1. INTRODUCTION The Deep Web is vast, thousands of times larger than the visible internet, which is also called the surface web. But the Deep Web is not a place it simply accounts for all of the unindexed content online like banking data, administrative codes of government, corporations and universities. It’s like looking under the hood of the internet. The Deep Web cannot be accessed through traditional search engines like Goggle, Bing, Yahoo etc. because traditional search engines create their indices by
  • 2. Study of Deep Web and A New Form Based Crawling Technique http://www.iaeme.com/IJCET/index.asp 37 editor@iaeme.com crawling surface web pages [1]. This large amount of information in the Deep Web is only accessible through specific interfaces created by CGI or Common Gateway Interface and HTML forms or JavaScript. A software service called Tor, originally developed by US Military which is now an open source and publicly funded can also be used to access the Deep Web. It is important to understand that an ideal platform to accumulate all detailed information is nothing but the Deep Web which is worthwhile for journalists, government agencies and dissidents around the world. In general there are two common approaches to access the Deep Web content [6]. One is to create a vertical search engine for specific domain, where semantic mapping is done in between individual data and mediator forms, and this technique is less accurate and certainly has some drawbacks. The other one is the surfacing technique, which is more common and effective approach. Our goal is to create a form based crawling technique and to equip a web crawler with appropriate input values in order to get accurate result. The rest of the research paper is divided into six sections. In section II the characteristics and scale of the Deep Web is discussed. Then in section III our approach towards four categories of crawling technique is shown, including the architecture of form focused crawling, and followed by given experiment and its phases in section IV. Further in section V experiment results that are applied on people domain is shown. Finally, in section VI conclusion and future work is discussed followed by the references in section VII. 2. THE DEEP WEB As time progresses the size of the Deep web is increasing exponentially and at a rate that defines quantification. In the verge of 20th century the WWW contained few documents and sites. Back then it was manageable task to post all the documents as static pages and the documents could easily be accessed through search engine by the help of web crawlers. But now the content of the web is accessed dynamically for maintaining a database. Since, the database is typically hidden from the traditional search engine; so, in order to access the content of the database sometimes we need to generate queries. The study by Bergman in the year 2001 suggests that the size of the Deep Web was 500 times larger than the Surface Web [1].But back then it was 29,254,370 websites available in the internet among which 75% were inactive [7]. According to University of California, Berkeley the Deep Web contains approximately 91,850 terabytes of data in 2003 [1]. A report published by IDC predicted that the total of all digital data created, replicated, and consumed will reach 6 zettabytes in 2014 [4]. By the end of 2014, NetCraft confirmed that the total number of websites increased to 1 billion [10]. Thus, according to the stats and opinion given by the experts suggest that  4.9% of the total web content is publically accessible.  The Deep Web is nearly 4,000-5,000 times larger than the Surface Web.  The Deep Web contains nearly 750 billion documents.
  • 3. Debraj Dey and Payel Das http://www.iaeme.com/IJCET/index.asp 38 editor@iaeme.com 3. OUR PROPOSED APPROACH 3.1. Categories of Web Crawling A web crawler is a program that visits webpages; forms etc. and reads their content and other required information like URL in order to create entries for the search engine index. In general there are mainly four categories of crawling technique which are: 3.1.1. Traditional Web Crawler The traditional web crawlers do not distinguish between pages with and without forms [3]. The main components of traditional web crawler are frontier, fetcher, URL extractor, page filter and database. The architecture of traditional web crawler is shown in figure 1. First, the module gets a unique URL from a set of seed URLs which is later passed through frontier. Then the frontier sends the unique URL through fetcher, which fetches the content of the web. Then the content is passed through URL extractor. Later the extractor checks the pages to find new links. The new links are sent through HTML-page filler to eliminate uninteresting pages and finally the valid pages are stored in the database. Figure1 Architecture of Traditional Web Crawler 3.1.2. Deep Web Crawler There are millions of web pages which are indexed each and every day, but still a huge amount of information is hidden behind the web forms. So, in order to retrieve those information researchers are continuously developing the deep web crawler. Figure 2 shows the architecture of deep web crawler. The main components of deep web crawler are Input-Classifier, Domain Filter and HTML Analyzer. First, seed URLs, domain data and the user specific are sent as inputs of the Input-Classifier. The main function of Input-Classifier is to choose the HTML element and interact with the various inputs [8]. After that these data are sent through domain filter and later through HTML analyser to submit the forms to the web server. Finally, the Response- Analyser edits and also updates the content of the database.
  • 4. Study of Deep Web and A New Form Based Crawling Technique http://www.iaeme.com/IJCET/index.asp 39 editor@iaeme.com Figure2 Architecture of Deep Web Crawler 3.1.3. RIA Web Crawler Over the last few decade, web application has become more interactive, responsive and user friendly. These applications are called Rich Internet Application (RIA).Certainly, accessing these applications are often time consuming because technologies like AJAX and DOM are used heavily in the RIA [5]. To reduce the time to crawl into RIA a good web crawler is required. The architecture of RIA Web Crawler is shown in Figure 3. First, JavaScript engine starts with a virtual browser and runs a JS engine, and then it retrieves the starting web page associated with an URL seed and loads it in the virtual browser. After that, the constructed DOM is passed to the DOM state to determine if this is the first time the DOM state is seen or not. To extract the JS events the DOM state is passed to the extractor. Then the JS event is passed to the strategy module. The strategy module decides which event is to execute. Then the chosen event is passed to the JS engine for the further execution. This process carries on until all the reachable DOM states are seen [9]. Figure 3 Architecture of RIA Web Crawler
  • 5. Debraj Dey and Payel Das http://www.iaeme.com/IJCET/index.asp 40 editor@iaeme.com 3.1.4. Unified Model Web Crawler The Unified Modeling Language (UML) is a general purpose graphic language which is usually used by software professionals for specifying, visualizing, constructing, and documenting the artifacts of a software intensive system. So, in Unified Model Web Crawler nod is calculated based on DOM and the URL. In this type of crawler redirecting the browser is a special client side event. For this UML uses three main models which are user model, object model and the dynamic model. The user model consists of use case diagram, object model represent by the class diagram and dynamic model is represent by the sequence diagram. 3.2. Search Interface In this research paper we discussed two types of searching interface:  Keyword based Search Interface.  Multi-attribute Search Interface. The information in the web database can be categorized in to categories which are structured database or unstructured database. The unstructured database contains plain text documents which are not well structured. It provides a simple keyword based search interface, where the user types the required keyword to fill text field. For example Fig 4 shows a typical keyword based search interface for people-search database. Figure4 Keyword based Search Interface In contrast, structured database provide multi-attribute search interface which provides multiple query boxes depends upon the content. For example Fig 5 shows a multi-attribute search form interface for people-search database. Typically the given attributes are first name, last name, middle name, dob, email id, gender, location, pin code, marital status, contact number. Only first name, last name and gender are the mandatory fields; which means even though the user have not enough information about the person he is searching for, he will be able to see the search result. This is one of the advantages of multi-attribute search interface. Figure 5 Multi-attribute Search Interface
  • 6. Study of Deep Web and A New Form Based Crawling Technique http://www.iaeme.com/IJCET/index.asp 41 editor@iaeme.com 3.3. Form Focused Crawler This type of crawler combines the use of page classifier and link classifier. The page classifier concentrates on web pages and the link classifier works on the URLs. The frontier manager is used to select the next target links for crawling. Form Classifier is used to filter out useless forms. The new useful forms are added to the form database [2]. The architecture of Form Focused crawler is shown in fig. 6. Figure6 Form focused Crawler 4. EXPERIMENTATION Our challenge is to find the lost individual or relatives from our people-search database. The tools for this research include things like:  Social Network  Search Engines  Public Records  Online White Pages  Birth, Marriage and Death indexes  Refugee camp Records  Non-Profit Organization Records To determine the performance and accuracy of our technique, we test it on people domain. Our experiment will go through two important phases. 4.1. Collecting phase This is the first phase of our experimentation. This phase consists of two sub phases: 4.1.1. Creating collection sites In this sub phase we manually visited 6 websites at random which is shown in table I, and determined the attributes and aliases. The weight and threshold were also chosen manually, depending upon number of attributes.
  • 7. Debraj Dey and Payel Das http://www.iaeme.com/IJCET/index.asp 42 editor@iaeme.com Table I. Collection Websites ATTRIBUTES URL Email search https://www.peoplesmart.com/email Phone No. search http://www.spokeo.com/reverse-phone-lookup Address search http://www.yellowpages.com/whitepages/address Name search https://www.pipl.com/name Pine code search http://www.indiapost.gov.in/pincodesearch.aspx Date of Birth search https://www.dobsearch.com/ 4.1.2. Creating Label table After collection sites are being injected, all data of people are being determined and stored in labels table. The labels table contains label, alias and point which are shown in table II. The point depends upon the websites, if a website’s search has more attributes in offering then the point will be much higher, and if the website’s search option has less attributes then the point will be at the lower side. Table II Lebel Table LEBEL ALIAS MARK First_name ‘first_name of individual’, name 70 Middle_name ‘middle_name of individual’ 75 Last_name ‘last_name of individual’ 70 Date of Birth year, month, date 95 Location country, state, city 75 Pin code 90 Gender Male, female 95 Email 100 Contact no 95 4.2. Operating phase In this phase we will determine the accuracy of our technique. First, we manually obtained a result by visiting the websites, second we determined the result which is obtained by the web crawler. Finally the results are being mapped by the help of matrix into five different stages.  Set of associations between form field and domain attribute determined by web crawler = A  Set of associations between form field and domain attribute determined manually = B  Set of associations between forms and domains determined by web crawler= C  Set of associations between forms and domains determined manually = D  Set of submitted forms determined by web crawler = E Here we used simple precision and recall method to determine the matrices. Five stages are as follows: Stage 1: [A∩ B] / [A] (PRECISION) Stage 2: [A ∩ B] / [B](RECALL)
  • 8. Study of Deep Web and A New Form Based Crawling Technique http://www.iaeme.com/IJCET/index.asp 43 editor@iaeme.com Stage 3: [C ∩ D] / [C](PRECISION) Stage 4: [C ∩ D] / [D](RECALL) Stage 5: [E] / [C ∩ D] (PRECISION) 5. EXPERIMENTAL RESULTS In this section we concentrate on the results of our experiment. We have considered six websites where the web crawler will crawl upon and extract the forms. The websites are shown in table III. Table III Operating Websites NAME URL Facebook Google plus LinkedIn Pipl search People search now Any who https://www.facebook.com https://www.plus.google.com https://www.linkedin.com https://www.pipl.com http://www.peoplesearchnow.com http://www.anywho.com We have gone through an ample number of experiments and tests to measure the accuracy and performance of our technique. The overall results are shown in table IV. Where X is denoted as collection dataset of collection websites and Y is denoted as operating dataset of operating websites. The global dataset is determined as (X+Y)*100. Table IV Experimental Result X Y (X+Y)*100 FORM-DOMAIN ASSCIATION Precision 6/6 1.00 6/6 1.00 12/12 100 Recall 6/6 1.00 5/5 1.00 11/11 100 FIELD-ATTRIBUTE ASSOCIATION Precision 19/22 0.86 38/45 0.84 57/67 85 Recall 19/22 0.86 37/46 0.80 56/68 82 SUBMITTED FORMS Precision 6/6 1.00 6/6 1.00 12/12 100 6. CONCLUSION This research paper represents a keyword based search form Interface and a multi- attribute search form interface for people database. Both forms are being created using simple HTML. SQL Injection technique is used to create the background database. The search results are up to the mark. We also portrayed four different categories of crawling technique including Form Focused Web Crawling and given a fruitful source of information regarding each of the techniques. Further, the results of our experiment are quite convincing and some of them even reached 100 especially recall in associating forms and domains.
  • 9. Debraj Dey and Payel Das http://www.iaeme.com/IJCET/index.asp 44 editor@iaeme.com From the future point of view we can suggest that the crawling technique can be improved by adding more attributes to enhance the accuracy of the search. Handling forms by using JavaScript can be significantly improved in performance of hidden web crawling in the further future. Our proposed technique not only is applicable to people domain but it also can be applicable for different domains. REFERENCES [1] Michael Bergman, The Deep Web: Surfacing Hidden Value, in the journal of electronic Publication (JEP) volume 7, Issue 1, August, 2001. [2] L. Barbosa, J Fieire, Searching for Hidden Web Database, in proceedings of WebDB page 1-6 2005 [3] S. Bal Gupta, Challenges in Designing a Hidden Web Crawler, in International Journal of Information Technology and System, 2(1), Jan-Jun 2013, pp 2277- 9825 [4] IDC worldwide predictions 2014: Battles for dominance – and survival on the 3rd platform. http://www.idc.com/research/Predictions14/index.jsp, 2014. [5] Seyed M. Mirtaheri, Mustafa EmreDinc¸t¨urk, Salman Hooshmand, Gregor V. Bochmann, Guy-Vincent Jourdan, Brief History of Web Crawlers, School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, Ontario, Canada. [6] Jaytrilok Choudhary and Devshri Roy. Priority Based Focused Web Crawler. International Journal of Computer Engineering and Technology, 4(4), 2013, pp. 163-169. [7] Houda El Bouhissi, Mimoun Malki and Djamila Berramdane. Applying Semantic Web Services. International Journal of Computer Engineering and Technology, 4(2), 2013, pp. 108 - 113. [8] A. Suganthy, G.S.Sumithra, J.Hindusha, A.Gayathri and S.Girija. Semantic Web Services and its Challenges. International Journal of Computer Engineering and Technology, 1(2), 2010, pp. 26-37. [9] J. Madhavan, D. Ko L. Kot, Google’s Deep Web Crawl, Proceedings of 1st International Conference on Very Large Data Bases(VLDB), August, Auckland, New Zealand, (2008),pp. 1241-1252 [10] B. He, M. Patel, Z. Zhang, and K. C.-C. Chang, accessing the deep web, Commun. ACM, 50(5), pp. 94–101, May 2007. [11] Beena Mahar, C K Jha, A comparative study on web crawling for searching hidden web” in (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3) [12] A. Mesbah, A. Van Deursen and S. Lenselink, Crawling Ajax based web applications through dynamic analysis of user interface state changes in ACM Transaction on the web- TWEB, volume 6, Issue 1,page 3, 2012. [13] A report published by NetCraft on Web server survey January, 2015 http://www.netcraft.com/