CFP last date
22 April 2024
Reseach Article

The Study of Multi-Search Services for Terrorist Network Mining

by R. D. Gaharwar, D. B. Shah, G. K. S. Gaharwar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 11
Year of Publication: 2016
Authors: R. D. Gaharwar, D. B. Shah, G. K. S. Gaharwar
10.5120/ijca2016911234

R. D. Gaharwar, D. B. Shah, G. K. S. Gaharwar . The Study of Multi-Search Services for Terrorist Network Mining. International Journal of Computer Applications. 147, 11 ( Aug 2016), 30-32. DOI=10.5120/ijca2016911234

@article{ 10.5120/ijca2016911234,
author = { R. D. Gaharwar, D. B. Shah, G. K. S. Gaharwar },
title = { The Study of Multi-Search Services for Terrorist Network Mining },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 11 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 30-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number11/25700-2016911234/ },
doi = { 10.5120/ijca2016911234 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:51:41.359986+05:30
%A R. D. Gaharwar
%A D. B. Shah
%A G. K. S. Gaharwar
%T The Study of Multi-Search Services for Terrorist Network Mining
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 11
%P 30-32
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Search engines are designed to make searching the enormous internet data easy but this digital data is growing exponentionally every year. Individual search engine can hardly cope up with this growth rate. There are number of standard search engines available today like Google, Bing, Ask, Dogpile etc but none of them is ideal. Every search services have different threshold ratios, different ranking algorithms leading to deviation in the output of each search result. Multi search services engaging different search engines can be solution to this problem. This paper presents Terrorist Meta Crawler, a web application that uses multiple search services to respond terrorist related user searches. Terrorist Meta Crawler sends web crawlers on different search engines to search terrorist information on web. Terrorist Network Mining can employ Terrorist Meta Crawler to mine vast ocean of data on web of the information of terrorist networks. This paper studies the Control Flow of Terrorist Meta Crawler for Terrorist Networking Mining application.

References
  1. Selberg, Erik, and Oren Etzioni. "The MetaCrawler architecture for resource aggregation on the Web." IEEE expert 12.1 (1997): 11-14.
  2. Heydon, Allan, and Marc Najork. "Mercator: A scalable, extensible web crawler." World Wide Web 2.4 (1999): 219-229.
  3. S. Azad and A. Gupta, "A Quantitative Assessment on 26/11 Mumbai Attack using Social NetworkAnalysis," Journal of Terrorism Research, vol. 2, no. 2, 2011.
  4. R. D. Gaharwar, D. B. Shah, and G.K.S. Gaharwar, "Terrorist Network Mining: Issues and Challenges," International Journal of Advance Research in Science and Engineering, vol. 4, no. 1, pp. 33-37, 2015.
  5. Danko, A. The concept of web search engines and metacrawlers within the Internet environment.
  6. ur Rehman, K., & Khan, M. N. A. (2013). The foremost guidelines for achieving higher ranking in search results through Search Engine Optimization. International Journal of Advanced Science and Technology,52, 101-110.
  7. Javad Hosseinkhani, Suriayati Chaprut, Hamed Taherdoost, and Amin Shahraki Moghaddam, "Propose a Framework for Criminal Mining by Web Structure and Content Mining," International Journal of Advanced Computer Science and Information Technology, vol. 1, no. 1, pp. 1-13, October 2012.
  8. R Gaharwar, D Shah, G Gaharwar, ”THE IMPLEMENTATION OF TERRORIST WEB MINER FOR THE TERRORIST NETWORKS”,IJRET 4 (11),pp 268-271
Index Terms

Computer Science
Information Sciences

Keywords

Search Engine Web Crawler Search Services Terrorist Network Meta Crawler