A Graphical user interface for web crawler
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
The number of web pages is increasing into millions and trillions around the world. To make searching much easier for users, web search engines came into existence. Web Search engines are used to find specific information on the World Wide Web. Without search engines, it would be almost impossible to locate anything on the Web unless or until a specific URL address is known. This information is provided to search by a web crawler which is a computer program or software. Web crawler is an essential component of search engines, data mining and other Internet applications. Scheduling Web pages to be downloaded is an important aspect of crawling. Previous research on Web crawl focused on optimizing either crawl speed or quality of the Web pages downloaded. While both metrics are important, scheduling using one of them alone is insufficient and can bias or hurt overall crawl process. This paper is all about design a new Web Crawler using VB.NET Technology.
Authors and Affiliations
Parli B Hari
An Effective Deadlock Detective Mechanism For Multithreaded Programs
In a Multithreaded environment, deadlock bugs may occur at any stage of the process. These bugs are reported to the users in the form of warnings and all the warnings are not real deadlocks. Existing techniques probabil...
slugIntelligent Traction System
A new kind of approaches are exhibited to ensure the railway safety and thereby assuring a secured travel. This project mainly performs the detection of faults that occurs due to cracks on tracks, obstacle and explosive...
Performance Comparison of Cryptanalysis Techniques over DES
The primary requirement of a good encryption technique is that it is either impossible or difficult to deduce the plaintext out of a ciphertext without the knowledge of key. Cryptanalysis is the technique that violates...
Study an Improvisation Method for Detecting Spoofed Attack in Wireless LAN
In terms of network security, spoofing is gaining illegitimate advantage by falsifying data. Spoofing can be done by a person or a program. Popularity of spoofing is increasing because of less precautions taken by appli...
Hierarchical Energy Management System for Smart Buildings
The Hierarchical energy management allows generation facilities to be run more efficiently with the rapid introduction of network enabled digital technology. This technology offers exciting opportunities to increase the...