Volume- 12
Issue- 4
Year- 2024
DOI: 10.55524/ijircst.2024.12.4.5 | DOI URL: https://doi.org/10.55524/ijircst.2024.12.4.5 Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Ambareen Jameel , Mohd Usman Khan
In light of the exponential growth of web data and user volume, individuals are increasingly overwhelmed by information overload on the internet. Addressing this challenge, our study focuses on enhancing web information retrieval and presentation by leveraging web data mining techniques to uncover intrinsic relationships within textual, linkage, and usability data. Specifically, we aim to improve the performance of web information retrieval and presentation by analysing web data features. Our approach centres on web usage mining to identify usage patterns and integrate this knowledge with user profiles for personalized content delivery. Personalization, tailored to user’s characteristics and behaviours, serves to enhance engagement, conversion, and long-term commitment to websites. The objective of our research is to develop a web personalization system that enables users to access relevant website content without the need for explicit queries. This paper presents an extensive survey of various approaches proposed by researchers in the field of web personalization. It highlights the diverse methodologies and techniques employed to enhance user experience and engagement on the web. The paper identifies key challenges that require urgent attention to advance the field of web personalization.
[1] P. Chopra and; M. Ataullah, "A Survey on Improving the Efficiency of Different Web Structure Mining Algorithms," Int. J. Eng. Adv. Technol., vol. 2, pp. 296-298, 2013.Available from: https://www.ijeat.org/wp-content/uploads/papers/v2i3/C1110022313.pdf
[2] S. Srivastava, M. Haroon, and A. Bajaj, "Web document information extraction using class attribute approach," in 2013 4th International Conference on Computer and Communication Technology (ICCCT), Sep. 2013, pp. 17-22. Available from: https://doi.org/10.1109/ICCCT.2013.6749596
[3] W. Khan and M. Haroon, "An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks," International Journal of Cognitive Computing in Engineering, vol. 3, pp. 153-160, 2022. Available from: https://doi.org/10.1016/j.ijcce.2022.08.002
[4] D. Yang and J. Song, "Web content information extraction approach based on removing noise and content-features," in Proc. 2010 Int. Conf. Web Inf. Syst. Mining, WISM 2010, vol. 1, pp. 246-249, 2010. Available from: https://doi.org/10.1109/WISM.2010.82
[5] Y. H. Tao, T. P. Hong, and Y. M. Su, "Web usage mining with intentional browsing data," Expert Syst. Appl., vol. 34, pp. 189-197, 2008. Available from: https://10.1016/j.eswa.2007.02.017
[6] R. Khan, M. Haroon, and M. S. Husain, "Different technique of load balancing in distributed system: A review paper," in 2015 Global Conference on Communication Technologies (GCCT), Apr. 2015, pp. 371-375. Available from: https://doi.org//10.1109/GCCT.2015.7342686
[7] Z. A. Siddiqui and M. Haroon, "Research on significant factors affecting adoption of blockchain technology for enterprise distributed applications based on integrated MCDM FCEM-MULTIMOORA-FG method," Eng. Appl. of AI, vol. 118, p. 105699, 2023. Available from: https://doi.org//10.1016/j.engappai.2022.105699https://doi.org//10.1016/j.engappai.2022.105699
[8] M. Haroon and M. Husain, "Interest attentive dynamic load balancing in distributed systems," in 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), Mar. 2015, pp. 1116-1120. Available from: https://ieeexplore.ieee.org/abstract/document/7100421
[9] P. Desikan et al., "Web Mining for Business Computing," in Handb. Inf. Syst., pp. 1-36, 2009. Available from: https://www-users.cse.umn.edu/~desi0016/publications/BusinessComputing.pdf
[10] J. Srivastava, P. Desikan, and V. Kumar, "Web Mining — Concepts, Applications, and Research," Int. Res. J. Comput. Sci., 2016. Available from: https://dmr.cs.umn.edu/Papers/P2004_4.pdf
[11] M. S. Husain and D. M. Haroon, "An Enriched Information Security Framework from Various Attacks in the IoT," Int. J. Innovative Res. Comput. Sci. & Technol. (IJIRCST), vol. 8, pp. 64-72, 2020. Available from: https://doi.org//10.21276/ijircst.2020.8.4.3
[12] S. Deepa and S. Hariharan, "Web Content Mining: Issues and Challenges," IUP J. Inf. Technol., vol. 8, pp. 64-72, 2012. Available from: http://csjournals.com/IJCSC/PDF3-1/10.%20Kalpana.pdf
[13] J. Doe, "Developed a user segmentation model based on web usage data for personalized content delivery," Proc. Web Mining Conf., vol. 12, no. 3, pp. 45-56, 2017. Available from: https://doi.org//10.5121/ijist.2012.2104
[14] J. Smith, "Investigated the effectiveness of personalized recommendation systems in e-commerce websites," J. E-commerce Res., vol. 25, no. 2, pp. 78-91, 2019.
[15] D. Johnson, "Explored the impact of personalized content delivery on user engagement in online news portals," Jour of Online Journalism, vol. 18, no. 4, pp. 112-125, 2020.
[16] M. Haroon and M. Husain, "Analysis of dynamic load balancing in multiprocessor system," Int. J. Comput. Sci. Eng. Inf. Technol. Res., vol. 3, no. 1, 2013. Available from: https://www.semanticscholar.org/paper/ANALYSIS-OF-A-DYNAMIC-LOAD-BALANCING-IN-SYSTEM-Haroon-Husain/bd8fbd18df7928f1059fcf91fe6d96e4541b5c25
[15] W. Khan, M. Haroon, A. N. Khan, M. K. Hasan, A. Khan, U. A. Mokhtar, and S. Islam, "DVAEGMM: Dual variational autoencoder with Gaussian mixture model for anomaly detection on attributed networks," IEEE Access, vol. 10, pp. 91160-91176, 2022. Available from: https://doi.org//10.1109/ACCESS.2022.3201332
[16] M. S. Husain, "A review of information security from consumer’s perspective especially in online transactions," Int. J. Eng. Manage. Res., vol. 10, 2020. Available from: https://doi.org//doi.org/10.31033/ijemr.10.4.2
[17] A. M. Khan, S. Ahmad, and M. Haroon, "A comparative study of trends in security in cloud computing," in 2015 Fifth Int. Conf. Commun. Syst. Network Technol., Apr. 2015, pp. 586-590. Available from: https://doi.org//10.1109/CSNT.2015.31
[18] Z. A. Siddiqui and M. Haroon, "Application of artificial intelligence and machine learning in blockchain technology," in Artificial Intelligence and Machine Learning for EDGE Computing, Academic Press, 2022, pp. 169-185. Available from: https://doi.org//10.1016/B978-0-12-824054-0.00001-0
[20] L. Taylor, "Explored the use of deep learning techniques for personalized content recommendation in social media platforms," IEEE Trans. Social Media, vol. 40, no. 3, pp. 112-125, 2020.
[19] M. Haroon, M. M. Tripathi, and F. Ahmad, "Application of machine learning in forensic science," in Critical Concepts, Standards, and Techniques in Cyber Forensics, IGI Global, 2020, pp. 228-239. Available from: https://doi.org//10.4018/978-1-7998-1558-7.ch013
[20] Z. Li and W. K. Ng, "WICCAP: From SemiStructured Data to Structured Data," in Proceedings of the 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004. Available from: https://doi.org//10.1109/ECBS.2004.1316686
[21] F. LKi, Z. Liu, Y. Huang, and W.-K. Ng, "Web Information Collection, Collaging and programming (WICCAP)," in Proceedings of the 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.
[22] M. M. Tripathi, M. Haroon, Z. Khan, and M. S. Husain, "Security in digital healthcare system," in Pervasive Healthcare: A Compendium of Critical Factors for Success, 2022, pp. 217-231. Available from: https://doi.org//10.1007/978-3-030-77746-3_15
[23] M. Haroon, D. K. Misra, M. Husain, M. M. Tripathi, and A. Khan, "Security issues in the internet of things for the development of smart cities," in Advances in Cyberology and the Advent of the Next-Gen Information Revolution, IGI Global, 2023, pp. 123-137. Available from: https://doi.org//10.4018/978-1-6684-8133-2.ch007
[26] A. Mendez-Torreblanca and M. Monte, "A Trend Discovery for Dynamic Web Content Mining," IEEE Inteligence System, vol. 14, pp. 20-22, 2002. Available from: https://www.researchgate.net/publication/239356237_A_Trend_Discovery_System_for_Dynamic_Web_Content_Mining
M.Tech Scholar, Department of Computer Science and Engineering, Integral University, Lucknow, India
No. of Downloads: 25 | No. of Views: 891
Siti Nur.
September 2024 - Vol 12, Issue 5
Mrinal Kumar, Yuvaraj Madheswaran.
September 2024 - Vol 12, Issue 5
Saikat Banerjee, Soumitra Das, Abhoy Chand Mondal.
September 2024 - Vol 12, Issue 5