SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 8, Issue 1 (July 2013), PP. 34-37
34
A Review of Trends in Research on Web Accessibility:
Sushree Sudesna Ashe, Subhendu kumar Pani
Associate Prof,Dept. of CSE OEC,Odisha
Abstract:- In recent years the growth of the World Wide Web exceeded all expectations.The World Wide Web
is a fertile area for data mining research.Web mining is a research topic which combines two of the activated
research areas: Data Mining and World Wide Web. Web mining research relates to several research
communities such as Database, information Retrieval and Artificial intelligence, visualization. Automated
analyses of WCAG 2.0 Level,a success criteria found high percentages of violations overall. Unlike more
circumscribed studies, however, the sites exhibited improvements over the years on a number of accessibility
indicators, with government sites being less likely than top sites to have accessibility violations. Examination of
the causes of success and failure suggests that improving accessibility may be due, in part, to changes in website
technologies and coding practices rather than a focus on accessibility per se. This paper reviews the research and
application issues in web Accessibility besides proving an overall view of Web mining.
Keywords:- Web, Data mining, web usage mining, web content mining, web structure mining,web accessibility.
I. INTRODUCTION
As the economics of service and information provision drive more content exclusively to the Web, a
large number of people with disabilities are disadvantaged. Once considered a luxury, access to the Web is now
becoming a requirement for full participation in society. Internet is the shared global computing network. It
enables global communications between all connected computing devices. It provides the platform for web
services and the World Wide Web[7,8,9]. Web is the totality of web pages stored on web servers. There is a
spectacular growth in web based information sources and services. It is estimated that, there is approximately
doubling of web pages each year. As the Web grows grander and more diverse, search engines also have
assumed a central role in the World Wide Web’s infrastructure as its scale and impact have escalated. In
Internet data are highly unstructured which makes it extremely difficult to search and retrieve valuable
information. Search engines define content by keywords. With the explosive growth of information sources
available on the World Wide Web, it has become increasingly necessary for users to utilize automated tools in
order to find, extract, filter, and evaluate the desired information and resources. In addition, with the
transformation of the Web into the primary tool for electronic commerce, it is imperative for organizations and
companies, who have invested millions in Internet and intranet technologies, to track and analyze user access
patterns. These factors give rise to the necessity of creating server-side and client-side intelligent systems that
can effectively mine for knowledge both across the Internet and in particular Web localities. Many
organizations and corporations
Provide information and services on the web such as automated customer support, on-line shopping,
and a myriad of resources and applications.web based applications and environments for electronic commerce,
distance education, on-line collaboration, news broadcasts etc., are becoming common practice and widespread.
The WWW is becoming ubiquitous and an ordinary tool for everyday activities of common people, from a child
sharing music files with friends to a senior receiving photographs and messages from grandchildren across the
world. It is typical to see web pages for courses in all fields taught at universities and colleges providing course
and related resources even if these courses are delivered in traditional classrooms. It is not surprising that the
web is the means of choice to architect modern advanced distance education systems. There are several
important issues, unique to the Web paradigm that comes into play if sophisticated types of analyses are to be
done on server side data collections. These include the necessity of integrating various data sources such as
server access logs, user registration or profile information; resolving difficulties in the identification of users due
to missing unique key attributes in collected data; and the importance of identifying user sessions or transactions
from usage data, site topologies, and models of user behavior. We devote the main part of this paper to the
discussion of issues and problems that characterize Web Accessibility. Furthermore, we survey some emerging
tools and techniques, and identify several future research directions[6,10].
This paper has been organized as follows. The next section presents an overview of classification of
web mining. Techniques on the web mining are discussed in section 3. Section 4 discusses success criteria of
web Accessibility. Section 5 concludes the paper.
A Review of Trends in Research on Web Accessibility:
35
II. WEB DATA MINING
2.1 OVERVIEW
The web mining is the use of data mining techniques to automatically discover and extract
information from World Wide Web documents and services [5]. This area of research is so huge today partly
due to the interest in e-commerce. This phenomenon partly creates confusion what constitutes Web mining and
when comparing research in this area. Similar to [5], we suggest decomposing Web mining into these subtasks,
namely
1. Resource finding: the task of retrieving intended Web documents.
2. Information selection and pre-processing: automatically selecting and pre-processing specific
information from retrieved Web resources[1].
3. Generalization: automatically discovers general patterns at individual Web sites as well as across multiple
sites.
4. Analysis: Validations and/or interpretation of the mined patterns.
We should also note that humans play an important role in the information or knowledge discovery
process on the web since the web is an interactive medium. This is especially important for validation and/or
interpretation in step 4.So, interactive querytriggered knowledge discovery is as important as the more
automatic data triggered knowledge discovery. However, we exclude the knowledge discovery done manually
by humans. Thus, Web mining refers to the overall process of discovering potentially useful and previously
unknown information or knowledge from the web data. It implicitly covers the standard process of knowledge
discovery in databases (KDD) [2].We could simply view web mining as an extension of KDD that is applied on
the Web data. From the KDD point of view, the information and knowledge terms are interchangeable[3].There
is a close relationship between data mining, machine learning and advanced data analysis[4].Web mining is
often associated with IR or IE.
III. WEB MINING TECHNIQUES
Traditional data mining techniques can also be used for web mining, such as classification, clustering,
association rule mining, and visualization. In web mining, classification algorithms can be used to classify users
into different classes according to their browsing behavior, for example according to their browsing time. After
classification, a useful classification rule like “30% of users browse product/food during the hours 8:00-10:00
PM” can be discovered. The difference between classification and clustering is that the classes in classification
are predefined (supervised), but in clustering are not predefined (unsupervised). The criterion by which items
are assigned to different clusters is the degree of similarity among them. The main purpose of Clustering is to
maximize both the similarity of the items in a cluster and the difference between clusters [12].The association
rule technique can be used to indicate pages that are most often referenced together and to discover the direct or
indirect relationships between web pages in users’ browsing behavior [11]. For example, an association rule in
the web usage mining area could take the form “the people who view web page index.htm and also view
product.htm the support=50% and the confidence=60%”. Visualization is a special analytical technique in web
mining that allows data and information to be understood or recognized by human eyes by using graphical and
visualized means to represent data, information and analysis results [13].In web structure mining, it usually
plays an important role in illustrating the structure of hypertexts and links in a website or the linking relationship
between websites. For the other two types of web mining technique, visualization is also an ideal tool to model
the data or information. For example, a graph (or map) can be used for web usage mining to present the traversal
paths of users or a graph may show information about web usage. This approach enables the analyst to
understand and efficiently interpret the results of web usage mining.
Association Rules: After transactions are detected in the preprocessing phase, frequent item-sets are
discovered using the A-priori algorithm [e.g. 13]. The support of item-set I is defined as the fraction of
transactions that contain I and is denoted by σ(I). A hypergraph is an extension of a graph where each
hyperedge can connect more than two vertices. A hyperedge connects URLs within a frequent item-set. Each
hyperedge is weighted by the averaged confidence of all the possible association rules formed on the basis of the
frequent item-set that the hyperedge represents. The hyperedge weight can be perceived as a degree of
similarity between URLs (vertices).
Sequential Pattern: Patterns are used to discover frequent subsequences among large amount of
sequential data. In web usage mining, sequential patterns are exploited to find sequential navigation patterns that
appear in users sessions frequently. The typical sequential pattern has the form[15]:the 70% of users who first
visited A.html and then visited B.html afterwards ,in the same session,have also accessed page
C.html.Sequential patterns might appear syntactically similar to association pattern mining.
Clustering: Clustering: techniques look for groups of similar items among large amount of data based
on a general idea of distance function which computes the similarity between groups.Clustering has been widely
used in Web Usage Mining to group together similar sessions [14]. Besides information from Web log files,
A Review of Trends in Research on Web Accessibility:
36
customer profiles often need to be obtained from an on-line survey form when the transaction occurs. For
example, you may be asked to answer the questions like age, gender, email account, mailing address, hobbies,
etc. Those data will be stored in the company’s customer profile database, and will be used for future data
mining purpose.
IV. SUCCESS CRITERIA EVALUATION
Analyses will be grouped within each of the four WCAG 2.0 principles: Perceivability (WCAG 2.0 SC
1.x), Operability (WCAG 2.0 SC 2.x), Understandability (WCAG 2.0 SC 3.x), and Robustness (WCAG 2.0
SC4.x). The relationship to WCAG 1.0 will be noted in each case.
4.1. Perceivability
The perceivability principle addresses the fact that Web users with vision or hearing loss will be unable
to access some forms of content unless it can be changed into other perceivable forms.
4.1.1. Text Alternatives: Images. Arguably the most researched aspect of the WCAG guidelines is the inclusion
of alternative descriptions of images, often referred to as the “alt tag”, such as the following.
<img src="mysite.gif" height="60" width="100" alt="logo for mysite.com" />
Complex images may also include a long description of their content using the longdesc attribute, such as what
follows.
<img src="mysite.gif" height="60" width="100" alt="logo for mysite.com" longdesc="mysite.html" />.
4.2. Operable
The WCAG 2.0 principle for operability addresses the need for Web pages to provide sufficient time
for input to be completed by users of assistive technologies, to avoiding flashing that could cause seizures, and
to be navigable by people using diverse means (e.g., a keyboard instead of a mouse). In our automatic checking,
we were able to reliably test two of the success criteria related to navigation.
4.3. Understandable
The WCAG 2.0 principle for understandability is designed to ensure that page content and interface
controls are understandable to all users. The different aspects of this address issues that affect page readability,
the predictability of page appearance and operation, and issues that affect users’ ability to avoid and recover
from errors.
4.4. Robustness
Robustness refers to the fact that the HTML/XHTML code must be robust enough that assistive
technologies (user agents) can reliably interpret it. If the code is malformed, user agents will find it difficult to
accurately render pages.
V. CONCLUSIONS
Looking over the entire 14 years since WCAG 1.0, however, we see evidence of improvement, at least
for some success criteria, with government sites showing more improvement than top sites on some, but not all,
criteria.A more detailed examination of both successes and failures leads us to question the extent to which
accessibility gains can be attributed to awareness of and adherence to WCAG guidelines, however. At least
some improvements appear to be side-effects of good coding practices and the desire to improve Web page
design and website prominence in search results. Future improvements in accessibility may come from
explicitly designing new technologies to have such beneficial side-effects.
REFERENCES
[1] G.Salton and M.McGill .introduction to modern information Retrival. McGraw Hill, 1983.
[2] U.Fayyad, G.Piatetsky-Shapiro, P.Smythfrom data mining to knowledge discovery: An overview. In
advances in knowledge Discovery and data mining, pages 1-34.AAA Press, 1996.
[3] U.Fayyad, G.Piatetsky-Shapiro, and P.Smyth knowledge discovery and data mining: toward a unifying
framework. In proceeding of the second int. conference on Knowledge Discovery and Data mining,
pages 82-88, 1996.
[4] M.A.Hearst.Untangling text data mining. In proceedings of ACL’99: the 37th Annual meeting of the
Association for computational Linguistics.
[5] O.Etzioni.The World Wide Web: Quagmire or gold mine.Communications of the ACM, 39(11):65-
68,1996.
[6] S.K.Madria, S.SBhowmick, W.K, Ng, and E.P.Lim.Research issues in web data mining. In
Proceedings of data ware housing and knowledge Discovery, first International conference,
DaWak’99, pages 303-312, 1999.
[7] R.Cooley, B.Mobasher, and J.Srivastava.Web mining: Information and pattern discovery on the World
Wide Web. In proceedings of the 9th IEEE International Conference on Tools with Artificial
Intelligence (ICTAI’97), 1997.
A Review of Trends in Research on Web Accessibility:
37
[8] R.kosala, H.Blockeel.Web mining Research: A survey
[9] S.K.Madria, S.S Bhowmick, W.K.Ng, and E.P.Lim.Research issues in web data mining. In proceedings
of data warehousing and knowledge Discovery, first International Conference, DaWak’99,pages301-
312,1999.
[10] Garofalaski,R.Rastogi,S.Shesadri,K.Shim,Datamining and the web:past,present and future,proceedings
WIDM99,Kanas City,USA 1999.
[11] J.Srivastava, R.Cooley, M.Deshpande, P.tan,web Usage Mining: Discovery and applications of usage
Patterns from web data,SIGKDD Explorations,Vol.1,No.2,Jan.2000.
[12] J.han and M.kamber, Data Mining Concepts and Techniques, Morgan Kaufmann Publisher, 2001.
[13] R. Agrawal, T. Imielinski, A. Swami. Mining Association Rules between Sets of Items in Large
Databases. Proceedings of the 1993 ACM SIGMOD Conference,1993.
[14] Jeffrey Heer and Ed H. Chi. Mining the structure of user activity using cluster stability. In Proceedings
of the Workshop on Web Analytics, Second SIAM Conference on Data Mining. ACM Press, 2002.
[15] Eleni Stroulia Nan Niu and Mohammad El-Ramly. Understanding web usage for dynamic web-site
adaptation: A case study. In Proceedings of the Fourth International Workshop on Web Site Evolution
(WSE’02), pages 53–64. IEEE, 2002.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET-Model for semantic processing in information retrieval systems
IRJET-Model for semantic processing in information retrieval systemsIRJET-Model for semantic processing in information retrieval systems
IRJET-Model for semantic processing in information retrieval systemsIRJET Journal
 
3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender systemIaetsd Iaetsd
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
Web personalization using clustering of web usage data
Web personalization using clustering of web usage dataWeb personalization using clustering of web usage data
Web personalization using clustering of web usage dataijfcstjournal
 
Comparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueComparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueIOSR Journals
 
`A Survey on approaches of Web Mining in Varied Areas
`A Survey on approaches of Web Mining in Varied Areas`A Survey on approaches of Web Mining in Varied Areas
`A Survey on approaches of Web Mining in Varied Areasinventionjournals
 
WEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESSWEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESSacijjournal
 
Web Mining for an Academic Portal: The case of Al-Imam Muhammad Ibn Saud Isla...
Web Mining for an Academic Portal: The case of Al-Imam Muhammad Ibn Saud Isla...Web Mining for an Academic Portal: The case of Al-Imam Muhammad Ibn Saud Isla...
Web Mining for an Academic Portal: The case of Al-Imam Muhammad Ibn Saud Isla...IOSR Journals
 
WEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONING
WEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONINGWEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONING
WEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONINGijaia
 
Integrating content search with structure analysis for hypermedia retrieval a...
Integrating content search with structure analysis for hypermedia retrieval a...Integrating content search with structure analysis for hypermedia retrieval a...
Integrating content search with structure analysis for hypermedia retrieval a...unyil96
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachIJECEIAES
 
A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesijctet
 

Was ist angesagt? (16)

Introduction abstract
Introduction abstractIntroduction abstract
Introduction abstract
 
IRJET-Model for semantic processing in information retrieval systems
IRJET-Model for semantic processing in information retrieval systemsIRJET-Model for semantic processing in information retrieval systems
IRJET-Model for semantic processing in information retrieval systems
 
3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
Web personalization using clustering of web usage data
Web personalization using clustering of web usage dataWeb personalization using clustering of web usage data
Web personalization using clustering of web usage data
 
Minning www
Minning wwwMinning www
Minning www
 
50320130403007
5032013040300750320130403007
50320130403007
 
Comparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueComparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering Technique
 
`A Survey on approaches of Web Mining in Varied Areas
`A Survey on approaches of Web Mining in Varied Areas`A Survey on approaches of Web Mining in Varied Areas
`A Survey on approaches of Web Mining in Varied Areas
 
WEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESSWEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESS
 
Web Mining for an Academic Portal: The case of Al-Imam Muhammad Ibn Saud Isla...
Web Mining for an Academic Portal: The case of Al-Imam Muhammad Ibn Saud Isla...Web Mining for an Academic Portal: The case of Al-Imam Muhammad Ibn Saud Isla...
Web Mining for an Academic Portal: The case of Al-Imam Muhammad Ibn Saud Isla...
 
WEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONING
WEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONINGWEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONING
WEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONING
 
ICICCE0280
ICICCE0280ICICCE0280
ICICCE0280
 
Integrating content search with structure analysis for hypermedia retrieval a...
Integrating content search with structure analysis for hypermedia retrieval a...Integrating content search with structure analysis for hypermedia retrieval a...
Integrating content search with structure analysis for hypermedia retrieval a...
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study Approach
 
A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniques
 

Andere mochten auch

Andere mochten auch (20)

Khelshi
KhelshiKhelshi
Khelshi
 
A new-look-at-rpo-final
A new-look-at-rpo-finalA new-look-at-rpo-final
A new-look-at-rpo-final
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
 
Ijarcet vol-2-issue-3-938-941
Ijarcet vol-2-issue-3-938-941Ijarcet vol-2-issue-3-938-941
Ijarcet vol-2-issue-3-938-941
 
Today’s hike
Today’s hikeToday’s hike
Today’s hike
 
Health & Safety Rep.
Health & Safety Rep.Health & Safety Rep.
Health & Safety Rep.
 
Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280Ijarcet vol-2-issue-7-2277-2280
Ijarcet vol-2-issue-7-2277-2280
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
 
1897 1900
1897 19001897 1900
1897 1900
 
projecten MW
projecten MWprojecten MW
projecten MW
 
Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383
 
Dhea rahmayanti xii ips 3
Dhea rahmayanti xii ips 3Dhea rahmayanti xii ips 3
Dhea rahmayanti xii ips 3
 
Membership_Certificate
Membership_CertificateMembership_Certificate
Membership_Certificate
 
Saro tribastone credits
Saro tribastone creditsSaro tribastone credits
Saro tribastone credits
 
1720 1724
1720 17241720 1724
1720 1724
 
1674 1677
1674 16771674 1677
1674 1677
 
Ijarcet vol-2-issue-2-347-351
Ijarcet vol-2-issue-2-347-351Ijarcet vol-2-issue-2-347-351
Ijarcet vol-2-issue-2-347-351
 
Ijarcet vol-2-issue-2-471-476
Ijarcet vol-2-issue-2-471-476Ijarcet vol-2-issue-2-471-476
Ijarcet vol-2-issue-2-471-476
 
Ijarcet vol-2-issue-7-2217-2222
Ijarcet vol-2-issue-7-2217-2222Ijarcet vol-2-issue-7-2217-2222
Ijarcet vol-2-issue-7-2217-2222
 
Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015Volume 2-issue-6-2009-2015
Volume 2-issue-6-2009-2015
 

Ähnlich wie International Journal of Engineering Research and Development (IJERD)

LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.docbutest
 
LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.docbutest
 
ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...
ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...
ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...IAEME Publication
 
A Study Web Data Mining Challenges And Application For Information Extraction
A Study  Web Data Mining Challenges And Application For Information ExtractionA Study  Web Data Mining Challenges And Application For Information Extraction
A Study Web Data Mining Challenges And Application For Information ExtractionScott Bou
 
Business Intelligence: A Rapidly Growing Option through Web Mining
Business Intelligence: A Rapidly Growing Option through Web  MiningBusiness Intelligence: A Rapidly Growing Option through Web  Mining
Business Intelligence: A Rapidly Growing Option through Web MiningIOSR Journals
 
International conference On Computer Science And technology
International conference On Computer Science And technologyInternational conference On Computer Science And technology
International conference On Computer Science And technologyanchalsinghdm
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
Effective Performance of Information Retrieval on Web by Using Web Crawling  
Effective Performance of Information Retrieval on Web by Using Web Crawling  Effective Performance of Information Retrieval on Web by Using Web Crawling  
Effective Performance of Information Retrieval on Web by Using Web Crawling  dannyijwest
 
Intelligent Web Crawling (WI-IAT 2013 Tutorial)
Intelligent Web Crawling (WI-IAT 2013 Tutorial)Intelligent Web Crawling (WI-IAT 2013 Tutorial)
Intelligent Web Crawling (WI-IAT 2013 Tutorial)Denis Shestakov
 
The Data Records Extraction from Web Pages
The Data Records Extraction from Web PagesThe Data Records Extraction from Web Pages
The Data Records Extraction from Web Pagesijtsrd
 
A Study of Pattern Analysis Techniques of Web Usage
A Study of Pattern Analysis Techniques of Web UsageA Study of Pattern Analysis Techniques of Web Usage
A Study of Pattern Analysis Techniques of Web Usageijbuiiir1
 

Ähnlich wie International Journal of Engineering Research and Development (IJERD) (20)

A Clustering Based Approach for knowledge discovery on web.
A Clustering Based Approach for knowledge discovery on web.A Clustering Based Approach for knowledge discovery on web.
A Clustering Based Approach for knowledge discovery on web.
 
LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.doc
 
LyonALMProposal20041018.doc
LyonALMProposal20041018.docLyonALMProposal20041018.doc
LyonALMProposal20041018.doc
 
ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...
ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...
ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...
 
A Study Web Data Mining Challenges And Application For Information Extraction
A Study  Web Data Mining Challenges And Application For Information ExtractionA Study  Web Data Mining Challenges And Application For Information Extraction
A Study Web Data Mining Challenges And Application For Information Extraction
 
Business Intelligence: A Rapidly Growing Option through Web Mining
Business Intelligence: A Rapidly Growing Option through Web  MiningBusiness Intelligence: A Rapidly Growing Option through Web  Mining
Business Intelligence: A Rapidly Growing Option through Web Mining
 
International conference On Computer Science And technology
International conference On Computer Science And technologyInternational conference On Computer Science And technology
International conference On Computer Science And technology
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
Effective Performance of Information Retrieval on Web by Using Web Crawling  
Effective Performance of Information Retrieval on Web by Using Web Crawling  Effective Performance of Information Retrieval on Web by Using Web Crawling  
Effective Performance of Information Retrieval on Web by Using Web Crawling  
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Intelligent Web Crawling (WI-IAT 2013 Tutorial)
Intelligent Web Crawling (WI-IAT 2013 Tutorial)Intelligent Web Crawling (WI-IAT 2013 Tutorial)
Intelligent Web Crawling (WI-IAT 2013 Tutorial)
 
The Data Records Extraction from Web Pages
The Data Records Extraction from Web PagesThe Data Records Extraction from Web Pages
The Data Records Extraction from Web Pages
 
A Study of Pattern Analysis Techniques of Web Usage
A Study of Pattern Analysis Techniques of Web UsageA Study of Pattern Analysis Techniques of Web Usage
A Study of Pattern Analysis Techniques of Web Usage
 
Pxc3893553
Pxc3893553Pxc3893553
Pxc3893553
 

Mehr von IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Mehr von IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 8, Issue 1 (July 2013), PP. 34-37 34 A Review of Trends in Research on Web Accessibility: Sushree Sudesna Ashe, Subhendu kumar Pani Associate Prof,Dept. of CSE OEC,Odisha Abstract:- In recent years the growth of the World Wide Web exceeded all expectations.The World Wide Web is a fertile area for data mining research.Web mining is a research topic which combines two of the activated research areas: Data Mining and World Wide Web. Web mining research relates to several research communities such as Database, information Retrieval and Artificial intelligence, visualization. Automated analyses of WCAG 2.0 Level,a success criteria found high percentages of violations overall. Unlike more circumscribed studies, however, the sites exhibited improvements over the years on a number of accessibility indicators, with government sites being less likely than top sites to have accessibility violations. Examination of the causes of success and failure suggests that improving accessibility may be due, in part, to changes in website technologies and coding practices rather than a focus on accessibility per se. This paper reviews the research and application issues in web Accessibility besides proving an overall view of Web mining. Keywords:- Web, Data mining, web usage mining, web content mining, web structure mining,web accessibility. I. INTRODUCTION As the economics of service and information provision drive more content exclusively to the Web, a large number of people with disabilities are disadvantaged. Once considered a luxury, access to the Web is now becoming a requirement for full participation in society. Internet is the shared global computing network. It enables global communications between all connected computing devices. It provides the platform for web services and the World Wide Web[7,8,9]. Web is the totality of web pages stored on web servers. There is a spectacular growth in web based information sources and services. It is estimated that, there is approximately doubling of web pages each year. As the Web grows grander and more diverse, search engines also have assumed a central role in the World Wide Web’s infrastructure as its scale and impact have escalated. In Internet data are highly unstructured which makes it extremely difficult to search and retrieve valuable information. Search engines define content by keywords. With the explosive growth of information sources available on the World Wide Web, it has become increasingly necessary for users to utilize automated tools in order to find, extract, filter, and evaluate the desired information and resources. In addition, with the transformation of the Web into the primary tool for electronic commerce, it is imperative for organizations and companies, who have invested millions in Internet and intranet technologies, to track and analyze user access patterns. These factors give rise to the necessity of creating server-side and client-side intelligent systems that can effectively mine for knowledge both across the Internet and in particular Web localities. Many organizations and corporations Provide information and services on the web such as automated customer support, on-line shopping, and a myriad of resources and applications.web based applications and environments for electronic commerce, distance education, on-line collaboration, news broadcasts etc., are becoming common practice and widespread. The WWW is becoming ubiquitous and an ordinary tool for everyday activities of common people, from a child sharing music files with friends to a senior receiving photographs and messages from grandchildren across the world. It is typical to see web pages for courses in all fields taught at universities and colleges providing course and related resources even if these courses are delivered in traditional classrooms. It is not surprising that the web is the means of choice to architect modern advanced distance education systems. There are several important issues, unique to the Web paradigm that comes into play if sophisticated types of analyses are to be done on server side data collections. These include the necessity of integrating various data sources such as server access logs, user registration or profile information; resolving difficulties in the identification of users due to missing unique key attributes in collected data; and the importance of identifying user sessions or transactions from usage data, site topologies, and models of user behavior. We devote the main part of this paper to the discussion of issues and problems that characterize Web Accessibility. Furthermore, we survey some emerging tools and techniques, and identify several future research directions[6,10]. This paper has been organized as follows. The next section presents an overview of classification of web mining. Techniques on the web mining are discussed in section 3. Section 4 discusses success criteria of web Accessibility. Section 5 concludes the paper.
  • 2. A Review of Trends in Research on Web Accessibility: 35 II. WEB DATA MINING 2.1 OVERVIEW The web mining is the use of data mining techniques to automatically discover and extract information from World Wide Web documents and services [5]. This area of research is so huge today partly due to the interest in e-commerce. This phenomenon partly creates confusion what constitutes Web mining and when comparing research in this area. Similar to [5], we suggest decomposing Web mining into these subtasks, namely 1. Resource finding: the task of retrieving intended Web documents. 2. Information selection and pre-processing: automatically selecting and pre-processing specific information from retrieved Web resources[1]. 3. Generalization: automatically discovers general patterns at individual Web sites as well as across multiple sites. 4. Analysis: Validations and/or interpretation of the mined patterns. We should also note that humans play an important role in the information or knowledge discovery process on the web since the web is an interactive medium. This is especially important for validation and/or interpretation in step 4.So, interactive querytriggered knowledge discovery is as important as the more automatic data triggered knowledge discovery. However, we exclude the knowledge discovery done manually by humans. Thus, Web mining refers to the overall process of discovering potentially useful and previously unknown information or knowledge from the web data. It implicitly covers the standard process of knowledge discovery in databases (KDD) [2].We could simply view web mining as an extension of KDD that is applied on the Web data. From the KDD point of view, the information and knowledge terms are interchangeable[3].There is a close relationship between data mining, machine learning and advanced data analysis[4].Web mining is often associated with IR or IE. III. WEB MINING TECHNIQUES Traditional data mining techniques can also be used for web mining, such as classification, clustering, association rule mining, and visualization. In web mining, classification algorithms can be used to classify users into different classes according to their browsing behavior, for example according to their browsing time. After classification, a useful classification rule like “30% of users browse product/food during the hours 8:00-10:00 PM” can be discovered. The difference between classification and clustering is that the classes in classification are predefined (supervised), but in clustering are not predefined (unsupervised). The criterion by which items are assigned to different clusters is the degree of similarity among them. The main purpose of Clustering is to maximize both the similarity of the items in a cluster and the difference between clusters [12].The association rule technique can be used to indicate pages that are most often referenced together and to discover the direct or indirect relationships between web pages in users’ browsing behavior [11]. For example, an association rule in the web usage mining area could take the form “the people who view web page index.htm and also view product.htm the support=50% and the confidence=60%”. Visualization is a special analytical technique in web mining that allows data and information to be understood or recognized by human eyes by using graphical and visualized means to represent data, information and analysis results [13].In web structure mining, it usually plays an important role in illustrating the structure of hypertexts and links in a website or the linking relationship between websites. For the other two types of web mining technique, visualization is also an ideal tool to model the data or information. For example, a graph (or map) can be used for web usage mining to present the traversal paths of users or a graph may show information about web usage. This approach enables the analyst to understand and efficiently interpret the results of web usage mining. Association Rules: After transactions are detected in the preprocessing phase, frequent item-sets are discovered using the A-priori algorithm [e.g. 13]. The support of item-set I is defined as the fraction of transactions that contain I and is denoted by σ(I). A hypergraph is an extension of a graph where each hyperedge can connect more than two vertices. A hyperedge connects URLs within a frequent item-set. Each hyperedge is weighted by the averaged confidence of all the possible association rules formed on the basis of the frequent item-set that the hyperedge represents. The hyperedge weight can be perceived as a degree of similarity between URLs (vertices). Sequential Pattern: Patterns are used to discover frequent subsequences among large amount of sequential data. In web usage mining, sequential patterns are exploited to find sequential navigation patterns that appear in users sessions frequently. The typical sequential pattern has the form[15]:the 70% of users who first visited A.html and then visited B.html afterwards ,in the same session,have also accessed page C.html.Sequential patterns might appear syntactically similar to association pattern mining. Clustering: Clustering: techniques look for groups of similar items among large amount of data based on a general idea of distance function which computes the similarity between groups.Clustering has been widely used in Web Usage Mining to group together similar sessions [14]. Besides information from Web log files,
  • 3. A Review of Trends in Research on Web Accessibility: 36 customer profiles often need to be obtained from an on-line survey form when the transaction occurs. For example, you may be asked to answer the questions like age, gender, email account, mailing address, hobbies, etc. Those data will be stored in the company’s customer profile database, and will be used for future data mining purpose. IV. SUCCESS CRITERIA EVALUATION Analyses will be grouped within each of the four WCAG 2.0 principles: Perceivability (WCAG 2.0 SC 1.x), Operability (WCAG 2.0 SC 2.x), Understandability (WCAG 2.0 SC 3.x), and Robustness (WCAG 2.0 SC4.x). The relationship to WCAG 1.0 will be noted in each case. 4.1. Perceivability The perceivability principle addresses the fact that Web users with vision or hearing loss will be unable to access some forms of content unless it can be changed into other perceivable forms. 4.1.1. Text Alternatives: Images. Arguably the most researched aspect of the WCAG guidelines is the inclusion of alternative descriptions of images, often referred to as the “alt tag”, such as the following. <img src="mysite.gif" height="60" width="100" alt="logo for mysite.com" /> Complex images may also include a long description of their content using the longdesc attribute, such as what follows. <img src="mysite.gif" height="60" width="100" alt="logo for mysite.com" longdesc="mysite.html" />. 4.2. Operable The WCAG 2.0 principle for operability addresses the need for Web pages to provide sufficient time for input to be completed by users of assistive technologies, to avoiding flashing that could cause seizures, and to be navigable by people using diverse means (e.g., a keyboard instead of a mouse). In our automatic checking, we were able to reliably test two of the success criteria related to navigation. 4.3. Understandable The WCAG 2.0 principle for understandability is designed to ensure that page content and interface controls are understandable to all users. The different aspects of this address issues that affect page readability, the predictability of page appearance and operation, and issues that affect users’ ability to avoid and recover from errors. 4.4. Robustness Robustness refers to the fact that the HTML/XHTML code must be robust enough that assistive technologies (user agents) can reliably interpret it. If the code is malformed, user agents will find it difficult to accurately render pages. V. CONCLUSIONS Looking over the entire 14 years since WCAG 1.0, however, we see evidence of improvement, at least for some success criteria, with government sites showing more improvement than top sites on some, but not all, criteria.A more detailed examination of both successes and failures leads us to question the extent to which accessibility gains can be attributed to awareness of and adherence to WCAG guidelines, however. At least some improvements appear to be side-effects of good coding practices and the desire to improve Web page design and website prominence in search results. Future improvements in accessibility may come from explicitly designing new technologies to have such beneficial side-effects. REFERENCES [1] G.Salton and M.McGill .introduction to modern information Retrival. McGraw Hill, 1983. [2] U.Fayyad, G.Piatetsky-Shapiro, P.Smythfrom data mining to knowledge discovery: An overview. In advances in knowledge Discovery and data mining, pages 1-34.AAA Press, 1996. [3] U.Fayyad, G.Piatetsky-Shapiro, and P.Smyth knowledge discovery and data mining: toward a unifying framework. In proceeding of the second int. conference on Knowledge Discovery and Data mining, pages 82-88, 1996. [4] M.A.Hearst.Untangling text data mining. In proceedings of ACL’99: the 37th Annual meeting of the Association for computational Linguistics. [5] O.Etzioni.The World Wide Web: Quagmire or gold mine.Communications of the ACM, 39(11):65- 68,1996. [6] S.K.Madria, S.SBhowmick, W.K, Ng, and E.P.Lim.Research issues in web data mining. In Proceedings of data ware housing and knowledge Discovery, first International conference, DaWak’99, pages 303-312, 1999. [7] R.Cooley, B.Mobasher, and J.Srivastava.Web mining: Information and pattern discovery on the World Wide Web. In proceedings of the 9th IEEE International Conference on Tools with Artificial Intelligence (ICTAI’97), 1997.
  • 4. A Review of Trends in Research on Web Accessibility: 37 [8] R.kosala, H.Blockeel.Web mining Research: A survey [9] S.K.Madria, S.S Bhowmick, W.K.Ng, and E.P.Lim.Research issues in web data mining. In proceedings of data warehousing and knowledge Discovery, first International Conference, DaWak’99,pages301- 312,1999. [10] Garofalaski,R.Rastogi,S.Shesadri,K.Shim,Datamining and the web:past,present and future,proceedings WIDM99,Kanas City,USA 1999. [11] J.Srivastava, R.Cooley, M.Deshpande, P.tan,web Usage Mining: Discovery and applications of usage Patterns from web data,SIGKDD Explorations,Vol.1,No.2,Jan.2000. [12] J.han and M.kamber, Data Mining Concepts and Techniques, Morgan Kaufmann Publisher, 2001. [13] R. Agrawal, T. Imielinski, A. Swami. Mining Association Rules between Sets of Items in Large Databases. Proceedings of the 1993 ACM SIGMOD Conference,1993. [14] Jeffrey Heer and Ed H. Chi. Mining the structure of user activity using cluster stability. In Proceedings of the Workshop on Web Analytics, Second SIAM Conference on Data Mining. ACM Press, 2002. [15] Eleni Stroulia Nan Niu and Mohammad El-Ramly. Understanding web usage for dynamic web-site adaptation: A case study. In Proceedings of the Fourth International Workshop on Web Site Evolution (WSE’02), pages 53–64. IEEE, 2002.