An Effective E-Learning System For The Deaf & Mute Primary School Students
Research Paper | Journal Paper
Vol.10 , Issue.11 , pp.1-7, Nov-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i11.17
Abstract
Sign language is a communication tool for people with deaf and mute conditions. It is a set of hand gestures used by deaf and mute people to communicate. Deaf and mute people face a lot of difficulties when communicating with ordinary people and struggle to learn new skills from others. Many researchers have carried out various approaches to solve the problems faced by deaf and mute people. Researchers have also focused on problems faced by deaf and mute children while learning. Most of the researchers have focused on teaching sign language. Providing a feedback mechanism is not well explored. Recognizing static and dynamic sign languages and providing feedback is a challenging problem. Sign language is not the same in every country. Therefore, a solution designed for one sign language can’t be used to solve problems faced by another sign language. In this research, a web application called Esign Guru is developed to teach Sri Lankan static and dynamic sign language while also proving practice and feedback mechanisms for each sign language. The proposed system uses machine learning techniques to recognize sign language performed by the user. The system has a text-to-sign language summary module, which helps the students to learn the sign language summary for the given text. Esign Guru is a web application, which can be accessed via any browser without any special devices which makes it a cost-effective solution.
Key-Words / Index Term
Static sign, dynamic sign, sign recognition, sign language practice, text-to-sign
References
[1] A. Mittal, P. Kumar, P. P. Roy, R. Balasubramanian and B. B. Chaudhuri, "A Modified LSTM Model for Continuous Sign Language Recognition Using Leap Motion," in IEEE Sensors Journal, Vol.19, No.16, pp.7056-7063, 15 Aug.15, 2019.
[2] E. Abraham, A. Nayak and A. Iqbal, "Real-Time Translation of Indian Sign Language using LSTM," 2019 Global Conference for Advancement in Technology (GCAT), pp.1-5, 2019.
[3] T. Liu, W. Zhou and H. Li, "Sign language recognition with long short-term memory," 2016 IEEE International Conference on Image Processing (ICIP), pp.2871-2875, 2016.
[4] G. García-Bautista, F. Trujillo-Romero and S. O. Caballero-Morales, "Mexican sign language recognition using kinect and data time warping algorithm, "2017 International Conference on Electronics, Communications and Computers (CONIELECOMP), pp.1-5, 2017.
[5] K. Bantupalli and Y. Xie, "American Sign Language Recognition using Deep Learning and Computer Vision," 2018 IEEE International Conference on Big Data (Big Data), pp.4896-4899, 2018.
[6] I. S. M. Dissanayake, P. J. Wickramanayake, M. A. S. Mudunkotuwa and P. W. N. Fernando, "Utalk: Sri Lankan Sign Language Converter Mobile App using Image Processing and Machine Learning," 2020 2nd International Conference on Advancements in Computing (ICAC), pp.31-36, 2020.
[7] L. K. S. Tolentino, R. O. S. Juan, A. C. Thioac, M. A. B. Pamahoy, J. R. R. Forteza and X. J. O. Garcia, "Static sign language recognition using deep learning", International Journal of Machine Learning and Computing, Vol.9, No.6, 2019.
[8] D. Manoj Kumar, K. Bavanraj, S. Thavananthan, G. M. A. S. Bastiansz, S. M. B. Harshanath and J. Alosious, "EasyTalk: A Translator for Sri Lankan Sign Language using Machine Learning and Artificial Intelligence," 2020 2nd International Conference on Advancements in Computing (ICAC), pp.506-511, 2020.
[9] R. Daroya, D. Peralta and P. Naval, "Alphabet Sign Language Image Classification Using Deep Learning," TENCON 2018 - 2018 IEEE Region 10 Conference, pp.0646-0650, 2018.
[10] K. Amrutha and P. Prabu, "ML Based Sign Language Recognition System," 2021 International Conference on Innovative Trends in Information Technology (ICITIIT), pp.1-6, 2021.
[11] R. Cui, H. Liu and C. Zhang, "A Deep Neural Framework for Continuous Sign Language Recognition by Iterative Training," in IEEE Transactions on Multimedia, Vol.21, No.7, pp.1880-1891, July 2019.
[12] N. Krishnamoorthy, A. Raveendran, P. Vadiveswaran, S. R. Arulraj, K. Manathunga and S. Siriwardana, "E-Learning Platform for Hearing Impaired Students," 2021 3rd International Conference on Advancements in Computing (ICAC), pp.122-127, 2021.
[13] A.E.E.E. Alfi, M.M.R.E. Basuony, and S.M.E. Atawy, “Intelligent Arabic text to arabic sign language translation for easy deaf communication,” International Journal of Computer Applications, Vol. 92, pp.22-29, 2014.
[14] M. El-Gayyar, A. Ibrahim, M.E. Wahed, “Translation from Arabic speech to Arabic Sign Language based on cloud computing,” Egyptian Informatics Journal, 17, pp.295-303, 2016.
[15] H. Luqman and S. Mahmoud, “Automatic translation of Arabic text-toArabic sign language,” Universal Access in the Information Society, pp.1-13, 2018.
[16] S.M. Halawani and A.B. Zaiton, “An avatar based translation system from Arabic speech to Arabic sign language for deaf people,” International Journal of Information Science Education, 2, pp.13-20, 2012.
[17] N. Aouiti and M. Jemni, “For a translating system from Arabic text to sign language,” Proceedings of the Confererence on Universal Learning Design, pp.33-38, 2014.
Citation
Kawsikan K., Jayakody E.D.D.L., Kothalawala K.L.T.D., Wijesekara M.P., Hansi De Silva, "An Effective E-Learning System For The Deaf & Mute Primary School Students," International Journal of Computer Sciences and Engineering, Vol.10, Issue.11, pp.1-7, 2022.
Energy Efficient Offline Parallel Scheduling in Cloud Computing by Reducing Total Busy Time
Research Paper | Journal Paper
Vol.10 , Issue.11 , pp.8-15, Nov-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i11.815
Abstract
The basic scheduling issue is examined in this chapter. On n identical computers with bounded capacity, n deterministic jobs need to be scheduled offline. Each work has a start time, a finish time, a processing time, and a machine capacity requirement. The purpose is to schedule all of the jobs no proactively in their start-time–end-time windows, subject to machine capacity limits so that the overall busy time of the machines is minimized. Minimizing the overall busy time for the scheduling of several identical machines is the name we give to this issue (MinTBT). Power-aware scheduling for Cloud computing, optical network design, customer service systems, and other relevant fields can all benefit from solving this issue. In the particular case where all jobs have the same process time and can be scheduled in a set time interval, scheduling to reduce busy time is already NP-hard. The 5-approximation approach for exceptional situations utilizing the first-fit-decreasing (FFD) algorithm is one of the best-known solutions to this problem. In this chapter, we suggest and demonstrate a modified first-fit-decreasing-earliest 3-approximation technique for the general case and gain further results for particular situations. Then, we demonstrate how our findings might be used in cloud computing to increase energy efficiency.
Key-Words / Index Term
Energy-efficient scheduling; offline algorithm; online algorithm; MFFDE algorithm; BFF algorithm; GRID algorithm; approximation ratio; competitive ratio
References
[1]. Hoogeveen JA, van de Velde SL, Veltman B. Complexity of scheduling multiprocessor tasks with prespecified processor allocations. Discrete Appl Math. Vol.55, Issue.3, pp.259–272, 1994.
[2]. Khandekar R, Schieber B, Shachnai H, Tamir T. Minimizing busy time in multiple machine real-time scheduling. Proceedings of IARCS annual conference on foundations of software technology and theoretical computer science (FSTTCS 2010). Chennai, India: LIPIcs, Schloss Dagstuhl—Leibniz-Zentrum fuer Informatik; Vol.8, pp.169–180, 2010.
[3]. Brucker P. Scheduling algorithms 5th ed. Berlin, Heidelberg, New York: Springer; 2007.
[4]. Beloglazov A, Buyya R, Lee YC, Zomaya AY. A taxonomy and survey of energy-efficient data centers and Cloud computing systems. Adv Comput. Vol.82, pp.47–111, 2011.
[5]. Jing SY, Ali S, She K, Zhong Y. State-of-the-art research study for green Cloud computing. J Supercomput, pp.1–24, 2011.
[6]. Graham RL. Bounds on multiprocessing timing anomalies. SIAM J Appl Math., Vol.17, Issue.2, pp.416–429, 1969.
[7]. Kleinberg JM, Tardos E. Algorithm design Boston, MA: Addison-Wesley: Pearson Education, Inc.; 2006.
[8]. Kovalyov MY, Ng CT, Cheng TCE. Fixed intervals scheduling: models, applications, computational complexity and algorithms. Eur J Oper Res., Vol.178, Issue.2, pp.331–342, 2007.
[9]. Beloglazov A, Abawajy JH, Buyya R. Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing. Future Gen Comput Syst. Vol.28, Issue.5, pp.755–768, 2012.
[10]. Winkler P, Zhang L. Wavelength assignment generalized interval graph coloring. Proceedings of fourteenth annual ACM-SIAM symposium on discrete algorithms (SODA 2003) Baltimore, MD: ACM/SIAM; pp.830–831, 2003.
[11]. Flammini M, Monaco G, Moscardelli L, et al. Minimizing total busy time in parallel scheduling with application to optical networks. Theor Comput Sci., Vol.411, Issue.40–42, pp.3553–3562, 2010.
[12]. Kolen AW, Lenstra JK, Papadimitriou CH, Spieksma FC. Interval scheduling: a survey. Nav Res Log., Vol.54, Issue.5, pp.530–543, 2007.
[13]. Srikantaiah S, Kansal A, Zhao F. Energy aware consolidation for Cloud computing. Proceedings of USENIX workshop on power aware computing and systems (HotPower 2008) San Diego, CA: USENIX; pp.10–14, 2008.
[14]. Lee YC, Zomaya AY. Energy efficient utilization of resources in Cloud computing systems. J Supercomput. Vol.60, Issue.2, pp.268–280, 2012.
[15]. Liu H, Xu C, Jin H, Gong J, Liao X. Performance and energy modeling for live migration of virtual machines, the 20th international symposium on high performance distributed computing. pp.171–182, 2011.
[16]. Kim KH, Beloglazov A, Buyya R. Power-aware provisioning of virtual machines for real-time Cloud services. Concurr Comput Pract Exp. Vol.23, Issue.13, pp.1491–1505, 2011.
[17]. Mathew V, Sitaraman RK, Shenoy PJ. Energy-aware load balancing in content delivery networks. Proceedings of IEEE INFOCOM Orlando, FL: IEEE; pp.954–962, 2012.
[18]. Rao L, Liu X, Xie L, Liu W. Minimizing electricity cost: optimization of distributed internet data centers in a multi-electricity-market environment. Proceedings of IEEE INFOCOM 2010 San Diego, CA: IEEE; pp.1145–1153, 2010.
[19]. Lin M, Wierman A, Andrew LLH, Thereska E. Dynamic right-sizing for power-proportional data centers. Proceedings of IEEE INFOCOM 2011 Shanghai, China: IEEE; pp.1098–1106, 2011.
[20]. Mertzios GB, Shalom M, Voloshin A, Wong PWH, Zaks S. Optimizing busy time on parallel machines. Proceedings of IPDPS Shanghai, China: IEEE; pp.238–248, 2012.
Citation
Sebagenzi Jason, "Energy Efficient Offline Parallel Scheduling in Cloud Computing by Reducing Total Busy Time," International Journal of Computer Sciences and Engineering, Vol.10, Issue.11, pp.8-15, 2022.
Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis
Survey Paper | Journal Paper
Vol.10 , Issue.11 , pp.16-19, Nov-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i11.1619
Abstract
The evolution of the world economy has been very high with the proliferation of new technology and universal communication super highways. Nonetheless, one of the unintended consequences of online or the internet is its use for illegal activities. Increasing social crime has become a global problem, and the activity of international criminal organizations has been steeply increased. Online fraudulent usually denotes to any form of fraud mechanism that uses the internet`s one or more components, such as emails, websites, web portals, etc. Nowadays, many tools are available to prevent the users from online fraudulent. The main aim of this paper to discuss the types of online fraud and tools to prevent those fraud activities.
Key-Words / Index Term
Fraudulent Types, Spam, Scam, Phishing, Identity Theft, Spyware, Tools
References
[1]. Hussein, Mohammed Juned, et al. "An evaluation of online proctoring tools." Open Praxis Vol.12, Issue.4, pp.509-525, 2020.
[2]. Wang, Shun-Yung Kevin, and Wilson Huang. "The evolutional view of the types of identity thefts and online frauds in the era of the Internet." Internet Journal of Criminology, Vol.12, pp.1 -21, 2011.
[3]. Koong, Kai S., Lai C. Liu, and June Wei. "An examination of Internet fraud occurrences." pp.441 – 449, 2012.
[4]. Apte, Manoj, Girish Keshav Palshikar, and Sriram Baskaran. "Frauds in online social networks: A review." Social networks and surveillance for society, pp.1–18, 2019.
[5]. Chen, Juan, and Chuanxiong Guo. "Online detection and prevention of phishing attacks." 2006 First International Conference on Communications and Networking in China. IEEE, pp.1-7, 2006.
[6]. Lai, Albert M., and Jason Nieh. "On the performance of wide-area thin-client computing." ACM Transactions on Computer Systems (TOCS), Vol.24, Issue.2, pp.175-209, 2006.
[7]. Alkhalil, Zainab, et al. "Phishing attacks: A recent comprehensive study and a new anatomy." Frontiers in Computer Science, Vol.3, pp.1-23, 2021.
[8]. Varshney, Gaurav, Manoj Misra, and Pradeep K. Atrey. "A survey and classification of web phishing detection schemes." Security and Communication Networks, Vol.9, Issue.18, pp. 6266-6284, 2016.
[9]. Srii Srinivasan, “A Merchant`s Guide to Online Fraud Detection”, 2022.
[10]. El Aassal, Ayman, and Rakesh Verma. "Spears Against Shields: Are Defenders Winning the Phishing War?" Proceedings of the ACM International Workshop on Security and Privacy Analytics, pp.15 – 24, 2019.
[11]. Ross, Philip E. "Microsoft to spammers: go phish [e-mail security]." IEEE Spectrum, Vol.43, Issue.1, pp.48-49, 2006.
[12]. Sonowal, Gunikhan. "Phishing Kits." Phishing and Communication Channels. Apress, Berkeley, CA, pp.115-135, 2022.
[13]. Martínez, Jeferson, and Javier M. Durán. "Software supply chain attacks, a threat to global cybersecurity: SolarWinds’ case study." International Journal of Safety and Security Engineering, Vol.11, Issue.5, pp.537-545, 2021.
[14]. Sahoo Anmol, Sahoo Aradhana, Prasad Srinivas, “ Enterprise Security Management(E-SRM)”, Indian Journals.com, Vol.10, Issue.1, 2012.
[15]. do Produto, Manual. "Norton™ AntiVirus.", 2013.
[16]. Kline, Jeffrey S. "McAfee Associates, Inc. Competitive Strategies for the Computer AntiVirus Industry."
[17]. Garba, Faisal A., et al. "Evaluating the state-of-the-art antivirus evasion tools on windows and android platform." 2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf). IEEE, pp.1-4, 2019.
[18]. Pavel, Cosmin. "Bitdefender®, the award-winning provider of innovative antivirus solutions." Romanian Distribution Committee Magazine 4.1: 20-24, 2013.
Citation
S. Vijayarani, R. Janani, "Online Fraud Types and Open-Source Online Fraud Prevention Tools– An Analysis," International Journal of Computer Sciences and Engineering, Vol.10, Issue.11, pp.16-19, 2022.
CityLayers: A GIS Integrated Framework towards the Sustainable Smart Cities Approach
Research Paper | Journal Paper
Vol.10 , Issue.11 , pp.20-26, Nov-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i11.2026
Abstract
The advent of smart cities aims to alleviate the challenges concerned with the ongoing urbanization and rising population density. To achieve the necessary degree of sustainability, government is looking for smart and efficient solutions for effective smart city data management. Such smart city decisions are based upon near real-time handling of a city’s needs, proper planning and better finance in various municipal sectors. This requires a need for a new generation GIS enabled Decision Support System (DSS) for more efficient Municipal e-Governance. In order to enable holistic planning and functionality of a city with high visual impact, municipalities, especially in developing countries, often lack proper integrated tools to analyse their broad spectrum of information. To address these issues, the present study strives to provide holistic solutions to the e-governances, by the virtue of Information Computing Technology (ICT), on the basis of a developed product called CityLayers, which is fully integrated with e-Governance applications. The product has been established using open source technologies and has been customized to handle vast Municipal datasets with effective geo-data visualization. The product is compliant to Open Geospatial Consortium, and is a cross- platform, cross-device in nature providing quick access to spatial data, visualization and analytical capabilities over a web browser.
Key-Words / Index Term
Smart cities, Open source technologies, ICT, E-governance
References
[1]. D. J. Maguire, “An overview and definition of GIS”. Geographical information systems: Principles and applications, Vol.1, No.1, pp. 9-20, 1991.
[2]. V. Maliene., V. Grigonis., Palevi?ius., & S. Griffiths, “Geographic information system: Old principles with new capabilities”.Urban Design International, Vol.16, No. 1, pp.1-6., 2011.
[3]. A. Tiwari., K. Jain, “GIS Steering smart future for smart Indian cities”, International Journal of Scientific and Research Publications, Vol.4, No. 8, pp. 442-446, 2014.
[4]. P.A.Johnson., A. Acedo., P.J. Robinson., “Canadian smart cities: Are we wiring new citizen?local government interactions?”, The Canadian Geographer/Le Géographe canadien, Vol. 64, No. 3, pp. 402-415,2020.
[5]. S. Qayyum., F. Ullah., F. Al-Turjman., & M. Mojtahedi, “Managing smart cities through six sigma DMADICV method: A review-based conceptual framework”, Sustainable Cities and Society, Vol. 72, pp.103022, 2021.
[6]. D. Chakraborty., D.Sarkar., S.Agarwal., D.Dutta., J.R. Sharma, “Web based GIS application using open source software for sharing geospatial data”, International Journal of Advanced Remote Sensing and GIS,Vol. 4, No. (1), pp. 1224-1228, 2015
[7]. P. Garg, “Development of an approach for Municipal GIS”, IJCEBS Vol.3 , 2015.
[8]. W.A. Abdulaal, “Framework for enterprise GIS for Saudi municipalities”, International Journal of Geographical Information Science,Vol. 23, No. 6, pp. 687-702, 2009.
[9]. M.A. Kamal, “City planning and development using geographic information systems, 11th International Conference on Computer and Information Technology pp. 31-35, 2008.
[10]. P.M. Li Zonghua, “A SOA-based Approach to Geographical Data Sharing”, International Symposium on Spatial Analysis, Spatial-Temporal Data Modeling,and Data Mining . Wuhan, China, 2016.
[11]. M. Miler., D. Odobasic., D. Medak, “An Efficient Web-GIS Solution based on Open Source Technologies: A Case-Study of Urban Planning and Management of the City of Zagreb, Croatia”, In FIG Congress Vol. 16. Australia: Sydney, 2010
[12]. V. Neene, M. Kademba, “Development of a Mobile GIS Property Mapping Application using Mobile Cloud Computing”, International Journal of Advanced Computer Science and Applications, Vol. 8 No. 10 , pp. 57-66, 2017.
Citation
Maulik Bhagat, Santosh Gaikwad, Rahul Kanani, Arjan Odedra, Aashima Sodhi, "CityLayers: A GIS Integrated Framework towards the Sustainable Smart Cities Approach," International Journal of Computer Sciences and Engineering, Vol.10, Issue.11, pp.20-26, 2022.
Machine Learning and Web based e-Learning Platform for Primary School Students
Research Paper | Journal Paper
Vol.10 , Issue.11 , pp.27-34, Nov-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i11.2734
Abstract
Covid – 19 pandemics prevent most elementary school pupils from attending and studying on school. According to Covid 19 standards and laws, schools began working online. It`s a great chance for kids to finish school properly. This concept discusses how students might train based on personal performances in a methodical way. Personal training for students based on performance research will use prior session data to help students improve their understanding. This section examines studies on online classroom activities. It may be a puzzle, short questions, game, or other activity that helps evaluate student performance. This internet app will record and schedule activities. This exercise helps students learn. A technique for reporting children`s activities analyzes all preceding experiences. It incorporates all three research components to help students grasp their level. The other three research components will also receive this information. This research component will inform the other components` questions and structures. Depending on their current talents and activity package, a system can map children`s future competencies. New analysis based on profile and other activity. Haggles and other internet data will be merged with machine learning and NLU to analyze matching (NLU). Artificial intelligence will prompt messages and offer message flows, dialogue, and other activities to expand a child`s knowledge. To begin, numerous activities, their effect levels, and their impact on a child`s knowledge will be investigated. This will allow you to communicate with primary children and provide positive feedback to help them enhance their knowledge. By reading students` facial expressions, attentiveness, and impressions of the topic module, you may establish a good learning environment. This study will train a model using a set of student photographs with diverse expressions and information to predict and interpret facial attention levels and other expressions.
Key-Words / Index Term
analysis, NLU, artificial intelligence
References
[1]. G. B. Brahim, "Predicting Student Performance from Online Engagement Activities Using Novel Statistical Features," in Arabian Journal for Science and Engineering (2022), 2022.
[2]. A. M. A. T. B. Diaa Salama AbdELminaam, "A deep facial recognition system using computational intelligent algorithms," PLOS ONE, 2020.
[3]. S. Keates and R. Dowland, "User modelling and the design of computer-based assistive devices," in IEEE Colloquium on Computers in the Service of Mankind: Helping the Disabled, London, UK, 2017.
[4]. Sengupta, P., Kinnebrew, J.S., Basu, S., Biswas, G., & Clark, D. (2013). Integrating computational thinking with K-12 science education using agent-based computation: a theoretical framework. Education and Information Technologies, 18, pp.351-380, 2013.
[5]. Maloney, J., Resnick, M., Rusk, N., Silverman, B., & Eastmong, E. (2010). The Scratch programming language and environment. ACM Transactions on Computing Education, Vol.10, Issue.4, pp.1-15, 2010.
[6]. Resnick, M., Maloney, J., Hernández, A.M., Rusk, N., Eastmond, E., Brennan, K., Millner, A., Rosenbaum, E., Silver, J., Silverman, B., & Kafai, Y. (2009) Scratch: programming for all. Communications of the ACM, Vol.52, Issue.11, 2009.
[7]. D. d. M. Magnus, L. F. B. Carbonera, L. L. Pfitscher and F. A. Farret, "An Educational Laboratory Approach for Hybrid Project-Based Learning of Synchronous Machine Stability and Control: A Case Study," in IEEE Transactions on Education, IEEE, 2020.
[8]. S. Q. K. P. D. N. K. G. P. J. S. S. K. S. A. J. Y.-Y. L. S. S. R. G. Y. Z. J. T. T. M. H. S. N. O. S. D. Asim Roy, "Performance Comparison of Machine Learning Platforms," in INFORMS Journal on Computing, 2019.
[9]. A. S. E. B. A. F. R. K. Dr. Jaydeep Patil, "A Voice Based Assistant Using Google Dialogflow and Machine Learning," in International Journal of Scientific Research in Science and Technology, Pune, Maharashtra, India, 2021.
[10]. C. D. E. A. K. G. Arzu Deveci Topal, "Chatbot application in a 5th grade science course," in Education and Information Technologies (2021), Izmit, Turkey, 2021.
[11]. S. M. Felix, S. Kumar and A. Veeramuthu, "A Smart Personal AI Assistant for Visually Impaired People," in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 2018.
[12]. F. A. M. Fonte, M. L. Nistal, M. L. Nistal and M. C. Rodríguez, "NLAST: A natural language assistant for students," in 2016 IEEE Global Engineering Education Conference (EDUCON), Abu Dhabi, United Arab Emirates, 2016.
[13]. H. Meng and Y. Cheng, "Research on face recognition algorithm based on multi task deep learning," in 2021 IEEE International Conference on Artificial Intelligence and Industrial Design (AIID), Guangzhou, China, 2021.
[14]. K. Shailaja and B. Anuradha, "Effective face recognition using deep learning based linear discriminant classification," in 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, India, 2016.
[15]. M. Arsenovic, S. Sladojevic, A. Anderla and D. Stefanovic, "FaceTime — Deep learning-based face recognition attendance system," in 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia, 2017.
[16]. Licorish, SA, George, JL, Owen, HE, Daniel, B (2017). "Go Kahoot!" enriching classroom engagement, motivation and learning experience with games. In Proceedings of the 25th International Conference on Computers in Education, (ICCE 2017). Christchurch, New Zealand: Asia-Pacific Society for Computers in Education, pp.755–764, 2017.
[17]. Gagné, R, & Driscoll, M (1988). Essentials of learning for instruction, (2nd ed.,). Englewood Cliffs: Prentice Hall. Gagné, RM (1985). The conditions of learning, (4th ed.,). New York: Rinehart & Winston.p
[18]. A. Sakila1, S. Vijayarani, “A Survey on Facial Recognition”, International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1-7, 2019.p
[19]. V. Jebasheeli, R. Vadivel, “Implementation of Automated Criminal Face Detection System Using Facial Recognition Approach”, International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.1-5, 2020.
Citation
M.K.M.P. Miyanadeniya, D.M.D. Amarasekara, S.D.D. Dilakshi, H.K.U. Perera, "Machine Learning and Web based e-Learning Platform for Primary School Students," International Journal of Computer Sciences and Engineering, Vol.10, Issue.11, pp.27-34, 2022.
HTML Tag Structure Based Content Retrieval from Web Pages
Research Paper | Journal Paper
Vol.10 , Issue.11 , pp.35-39, Nov-2022
CrossRef-DOI: https://doi.org/10.26438/ijcse/v10i11.3539
Abstract
With the immense quantity of information in the World Wide Web, the World Wide Web (WWW) contains enormous amounts of web pages which are accessible by users. Web pages formatted in HTML (i.e. Hyper Text Markup Language) are found on this network of computers. All the Web pages, pictures, videos and other online content can be accessed via a Web browser. This provides a very useful and helpful means of collecting information. Information retrieval systems can help to retrieving the relevant information from web documents. This process of information retrieval involves three stages such as identifying the documents want to be processed, writing of query and use of searching mechanism to retrieve the relevant web document information. This paper discuss how HTML Tags structure of web page are useful for retrieval of main or informative content from web pages for efficient web mining operations.
Key-Words / Index Term
WWW, Web Page, HTML Tags, Text Density
References
[1] Malik Agyemang, Ken Barker, Rada S. Alhajj, Mining Web Content Outliers using Structure Oriented Weighting Techniques and N-Grams ACM Symposium on Applied Computing, pp.482-487, 2005.
[2] Gupta Et. Al Automating Content Extraction of HTML Documents World Wide Web: Internet and Web Information Systems, Online version published in 2004.
[3] Pan Ei San, Boilerplate Removal and Content Extraction From Dynamic Web Pages, International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.4, No.6, 2014.
[4] Li Xiaoli, Shi Zhongzhi Innovative Web Page Classification through Reducing Noise Journal of Computer Science and Technology, Vol.17, No. 1., 2002
[5] A.K. Tripathy, A.K. Singh An Efficient Method Of Eliminating Noisy Information In Web Pages for Data mining, in Proceedings of the Fourth International Conference on Computer and Information Technology (CIT’04), 2004.
[6] Kaasinen, E., Aaltonen, M., Kolari, J., Melakoski, S., and Laakko, T., Two Approaches to Bringing Internet Services to WAP Devices, In Proceedings of 9th International World-Wide Web Conference, pp. 231-246, 2000.
[7] Wong, W. and Fu, A. W., Finding Structure and Characteristics of Web Documents for Classification, In ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD), Dallas, TX., USA, 2000.
[8] Deng Cai, Yu Shipeng and Wen Jirong, “VIPS: a vision-based page segmentation algorithm”, Microsoft Technical Report, MSR-TR-2003-79, 406-417, 2003.
[9] Sun Chengjie and Guan Yi, “A Statistical Approach for Content Extraction from Web Page”, Journal of Information Processing, Vol.18, Issue.5, pp.17-22, 2004.
[10] Zhao Xinxin,Suo Hongguang and Liu Yushu, “Web Content Information Extraction Method Based on Tag Window. Application Research of Computers, Vol.24, Issue.3, pp.144-145, 2007.
[11] Simple HTML Guide, 2014.
[12] List of main html tags. Online; accessed 25 march, 2014.
[13] S S Bhmare, B.V. Pawar “An Efficient Method of Web Page Noise Cleaning for Effective Web Mining", International Journal of Computer Applications (0975 – 8887) Vol.146 – No.3, pp.18-22, 2016.
[14] Dandan Song, Fei Sun, Lejian Liao.? A hybrid approach for content extraction with text density and visual importance of DOM nodes?. In the proceedings of Springer Knowl Inf Syst, Verlag London. Vol.42, pp.75-96, 2015.
[15] G. Salton and M. J. McGill, “Introduction to Modern Information Retrieval”, McGraw-Hill, New York, 1983.
[16] Soma Chatterjee, Kamal Sarkar “A Comparative Study of Three IR models for Bengali Document Retrieval” International Journal of Computer Sciences and Engineering E-ISSN 2347-2693 Vol.07, Issue.1, pp.220-225, 2019.
Citation
S.S. Bhamare, "HTML Tag Structure Based Content Retrieval from Web Pages," International Journal of Computer Sciences and Engineering, Vol.10, Issue.11, pp.35-39, 2022.