scholarly journals A Survey on Cyberspace Search Engines

Author(s):  
Ruiguang Li ◽  
Meng Shen ◽  
Hao Yu ◽  
Chao Li ◽  
Pengyu Duan ◽  
...  

AbstractThis paper introduces the concept of cyberspace search engine, and makes a deep survey on 5 well-known search engines, say Shodan, Censys, BinaryEdge, ZoomEye and Fofa, by querying official websites, analyzing APIs, and making academic research. We discuss the following items in details: Supporting internet protocols, Total amounts of detected devices, Device information, Scanning frequency, System architecture, The third party databases, Probes distribution, etc. We give a comprehensive comparison of the detecting abilities and working principles of the cyberspace search engines.

Author(s):  
Florian Schneider

The third chapter of China’s Digital Nationalism discusses a common access route into digital networks: the search engine. The chapter first presents scholarship on web queries and their social relevance, including state-of-the-field research on the world’s most ubiquitous search engine, Google, but also on China’s search engines. It then takes a tour through China’s search engine environment, experimenting with various platforms to see what happens when users search for Sino-Japanese issues. As this chapter shows, China’s search engines reproduce many of the biases that scholars have identified for other search engines, but they also generate additional biases through the commercial imperatives under which they labour. The chapter concludes that this outcome is owed to a ‘digital bias’ that is produced when algorithms draw from material, social, as well as subjective factors to generate effective search results for users, which in China actively contributes to the construction of the Chinese nation.


Author(s):  
S. Belinsha ◽  
A.P.V. Raghavendra

Search engines are being widely used by the web users. The search engine companies are concerned to produce best search results. Search logs are the records which records the interactions between the user and the search engine. Various search patterns, user's behaviors can be analyzed from these logs, which will help to enhance the search results. Publishing these search logs to third party for analysis is a privacy issue. Zealous algorithm of filtering the frequent search items in the search log looses its utility in the course of providing privacy. The proposed confess algorithm extends the work by qualifying the infrequent search items in the log which tends to increase the utility of the search log by preserving the privacy. Confess algorithm involves qualifying the infrequent keywords, URL clicks in the search log and publishing it along with the frequent items.


2017 ◽  
Vol 33 (06) ◽  
pp. 665-669 ◽  
Author(s):  
Amar Gupta ◽  
Michael Nissan ◽  
Michael Carron ◽  
Giancarlo Zuliani ◽  
Hani Rayess

AbstractThe Internet is the primary source of information for facial plastic surgery patients. Most patients only analyze information in the first 10 Web sites retrieved. The aim of this study was to determine factors critical for improving Web site traffic and search engine optimization. A Google search of “rhinoplasty” was performed in Michigan. The first 20 distinct Web sites originating from private sources were included. Private was defined as personal Web sites for private practice physicians. The Web sites were evaluated using SEOquake and WooRANK, publicly available programs that analyze Web sites. Factors examined included the presence of social media, the number of distinct pages on the Web site, the traffic to the Web site, use of keywords, such as rhinoplasty in the heading and meta description, average visit duration, traffic coming from search, bounce rate, and the number of advertisements. Readability and Web site quality were also analyzed using the DISCERN and Health on the Net Foundation code principles. The first 10 Web sites were compared with the latter 10 Web sites using Student's t-tests. The first 10 Web sites received a significantly lower portion of traffic from search engines than the second 10 Web sites. The first 10 Web sites also had significantly fewer tags of the keyword “nose” in the meta description of the Web site. The first 10 Web sites were significantly more reliable according to the DISCERN instrument, scoring an average of 2.42 compared with 2.05 for the second 10 Web sites (p = 0.029). Search engine optimization is critical for facial plastic surgeons as it improves online presence. This may potentially result in increased traffic and an increase in patient visits. However, Web sites that rely too heavily on search engines for traffic are less likely to be in the top 10 search results. Web site curators should maintain a wide focus for obtaining Web site traffic, possibly including advertising and publishing information in third party sources such as “RealSelf.”


2014 ◽  
Vol 905 ◽  
pp. 655-658
Author(s):  
Li Na Zhang ◽  
Zhi Yin Yang ◽  
Bo Yang

Taking the search engines mentioned in Related Documents, Alexa website and100 best alternative search engines as the basic samples, this paper selects 43 third-generation search engines according with the definition standard from 148 basic samples, and makes the investigation on selected third-generation search engines from two aspects of basic features and functions, and analyzes the investigation results from five aspects of types distribution, functions distribution , languages distribution , popularities distribution and searching effects evaluation.


Author(s):  
A. Salman Ayaz ◽  
Jaya A Venkat ◽  
Zameer Gulzar

The information available online is mostly present in an unstructured form and search engines are indispensable tools especially in higher education organizations for obtaining information from the Internet. Various search engines were developed to help learners to retrieve the information but unfortunately, most of the information retrieved is not relevant. The main objective of this research is to provide relevant document links to the learners using a three-layered meta-search architecture. The first layer retrieves information links from the web based on the learner query, which is then fed to the second layer where filtering and clustering of document links are done based on semantics. The third layer, with the help of a reasoner, categorizes information into relevant and irrelevant information links in the repository. The experimental study was conducted on a training data set using web queries related to the domain of sports, entertainment, and academics. The results indicate that the proposed meta-search engine performs well as compared to another stand-alone search engine with better recall.


2014 ◽  
Vol 1 (3) ◽  
pp. 161-172 ◽  
Author(s):  
Robin Roj

Abstract This paper presents three different search engines for the detection of CAD-parts in large databases. The analysis of the contained information is performed by the export of the data that is stored in the structure trees of the CAD-models. A preparation program generates one XML-file for every model, which in addition to including the data of the structure tree, also owns certain physical properties of each part. The first search engine is specializes in the discovery of standard parts, like screws or washers. The second program uses certain user input as search parameters, and therefore has the ability to perform personalized queries. The third one compares one given reference part with all parts in the database, and locates files that are identical, or similar to, the reference part. All approaches run automatically, and have the analysis of the structure tree in common. Files constructed with CATIA V5, and search engines written with Python have been used for the implementation. The paper also includes a short comparison of the advantages and disadvantages of each program, as well as a performance test.


2014 ◽  
Author(s):  
Jaclyn M. Moloney ◽  
Chelsea A. Reid ◽  
Jody L. Davis ◽  
Jeni L. Burnette ◽  
Jeffrey D. Green

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Sign in / Sign up

Export Citation Format

Share Document