Retrieving Business Applications using Open Web API’s Web Mining – Executive Dashboard Application Case Study
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 3
Abstract
Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the web have emerged from web searching to web mining. It is important for students to acquire knowledge and hands on experience in web mining during their education. In order to effectively utilize the power of web, information technology professional need to have sufficient knowledge and experience in various web technologies and applications. Recently many large companies such as Google, Microsoft, Amazon, e-Bay have opened access to their services and data through Application Programming Interfaces (APIs). In education, these APIs provide an ideal playground for students to acquire a valuable experience in leveraging the APIs to build interesting web mining applications. With the advent of the World Wide Web, many business applications that utilize data and text techniques to extract useful business information on the Web have evolved from Web searching. This paper reports on an experience using open Web Application Programming Interfaces (APIs) that have been made available by major Internet companies (e.g., Google, Amazon, and eBay) in a project to teach Web applications. The observations of the performance and a survey of the APIs show that we achieve project objectives and acquire valuable experience in leveraging the APIs to build interesting Web applications. We build website called “Executive DashBoard” an e-business idea: provide a platform for users to gather specifically useful information for their special products to sell or buy. DashBoard could provide complete production information, such as retail prices on Amazon, auction prices and seller details on eBay, and hot news of certain items from Google.
Authors and Affiliations
A. V. Krishna Prasad , Dr. S. Ramakrishna , Dr. D. Sravan Kumar , M. Upendra Kumar
Anti-Phishing Design Using Mutual Authentication Approach
The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft....
A NOVEL APPROACH FOR RETRIEVING AN IMAGE USING CBIR
In this paper we mainly focussed on how to retreive the images from large database. Generally in huge databases we will have large number of images with the same name. when we want to retrieve the image by giving a name,...
Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol
In this paper, we develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the p...
Study of Security in Wireless Sensor Networks
Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futuristic applications both for public and military. Many researchers tried to develop further cost and energy e...
Design and Analysis of Enhanced HTTP Proxy Cashing Server
A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an interm...