Use of the Internet for Information Organization, Distance Learning, and Specimen Presentation John Kevin Vandyk Iowa State University

Total Page:16

File Type:pdf, Size:1020Kb

Use of the Internet for Information Organization, Distance Learning, and Specimen Presentation John Kevin Vandyk Iowa State University Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 2003 Use of the internet for information organization, distance learning, and specimen presentation John Kevin VanDyk Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Entomology Commons Recommended Citation VanDyk, John Kevin, "Use of the internet for information organization, distance learning, and specimen presentation " (2003). Retrospective Theses and Dissertations. 1709. https://lib.dr.iastate.edu/rtd/1709 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Use of the internet for information organization, distance learning, and specimen presentation by John Kevin VanDyk A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Entomology Program of Study Committee: John Obrycki, Major Professor Steve Hernnstadt Greg Miller Wayne Rowley Jon Tollefson Iowa State University Ames, Iowa 2003 UMI Number: 3190729 INFORMATION TO USERS The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleed-through, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. UMI UMI Microform 3190729 Copyright 2006 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest Information and Learning Company 300 North Zeeb Road P.O. Box 1346 Ann Arbor, Ml 48106-1346 Graduate College Iowa State University This is to certify that the doctoral dissertation of John Kevin VanDyk has met the dissertation requirements of Iowa State University Signature was redacted for privacy. Signature was redacted for privacy. For the Major Program I dedicate this to my wife and best friend, Christina IV TABLE OF CONTENTS LIST OF FIGURES vi LIST OF TABLES vii GENERAL INTRODUCTION 1 Objectives for Dissertation 1 Dissertation Organization 1 USE OF THE INTERNET IN THE DISCIPLINE OF ENTOMOLOGY: A HISTORY 3 Early Networking 3 Gopher 4 Gopher Eclipsed by World-Wide Web 4 Entomology Websites Established 5 Problems 6 A GLOBAL METADATA MODEL FOR INTEGRATED PEST MANAGEMENT INFORMATION 8 Introduction 8 Materials and Methods 28 Results 31 Discussion 34 Conclusion 37 INTERACTIVE THREE-DIMENSIONAL INSECT MODELS FOR DISTANCE EDUCATION 39 Introduction 39 Materials and Methods 44 Results 47 Discussion 48 Conclusion 51 A WEB-BASED INTRODUCTORY ENTOMOLOGY COURSE 52 Introduction 52 Materials and Methods 52 Results 55 Discussion 59 Conclusion 60 GENERAL CONCLUSIONS 61 REFERENCES CITED 62 APPENDIX A. OPILIO PLUGIN 67 APPENDIX B. RUBY CODE APPENDIX C. THREE-DIMENSIONAL MODELS APPENDIX D. CHARACTER DIAGRAMS APPENDIX E. ENTOMOLOGY 201 ONLINE COURSE VI LIST OF FIGURES Figure 2.1. Category approval interface. 14 Figure 2.2. Category addition interface. 16 Figure 2.3. Category deletion interface. 17 Figure 2.4. Category alias creation interface. 18 Figure 2.5. Category alias deletion interface. 19 Figure 2.6. Category redirection interface. 20 Figure 2.7. Category merge interface. 21 Figure 2.8. Sidebar with related articles list generated from metadata. 25 Figure 2.9. Image gallery page with related articles list generated from metadata. 26 Figure 2.10. Comprehensive and per-year indices generated from hierarchical metadata 27 Figure 2.11. Search results interface. 32 Figure 2.12. Browsable categories interface. 33 Figure 4.1. Distribution of number of pages viewed by students during exams. 57 vii LIST OF TABLES Table 2.1. Distribution of requests for Integrated Crop Management articles by month for 2002. 34 Table 3.1. Delivery technologies and requirements for participation. 39 Table 3.2. Characters chosen for identification on specimens. 46 Table 3.3. Reasons given for preferring virtual model or real specimen. 49 Table 4.1. Enrollment and retention in web-based sections of ENT 201, 1999-2003 55 Table 4.2. Elapsed time from beginning exam to viewing material on course website for exams 4 and 5, ENT 201 summer session 2003 58 1 GENERAL INTRODUCTION Objectives for Dissertation The objectives of this dissertation are to explore the relationship between the discipline of entomology and internet-related computing technology, specifically: (1) to investigate the current use of the internet as a medium for organizing information for lifelong learning within the discipline of entomology, (2) to explore the effectiveness of three-dimensional virtual insects as a tool for entomology distance education, and (3) to demonstrate the utility of the world-wide web and related internet technologies for teaching entomology through the construction of a distance education course in entomology. Dissertation Organization This dissertation is composed of four sections. The General Introduction (Chapter 1) presents the history of the use of the internet within the discipline of entomology and outlines the challenges that face entomologists. Portions of this chapter have been published in American Entomologist and Annual Review of Entomology (VanDyk 1995, VanDyk 2000). The second section (Chapter 2) introduces a global model for mining current entomological information through the use of metadata and summarizes the current state of electronic entomological information in the United States. The third section (Chapter 3) focuses on the use of the internet in entomological distance education through the evaluation of a unique method of replicating the experience of an insect morphology laboratory class using three- dimensional insects in virtual reality. The virtual reality models (part of the creative component of this dissertation) can be found on a CD-ROM (see Appendix C). The final section (Chapter 4) discusses the online course that was constructed using the metadata approach outlined in Chapter 2. The online course is also part of the creative component of this dissertation. Discussion of the course is followed by a General Conclusion and a General Reference section at the end of the dissertation. The General Reference section includes citations used throughout the dissertation. Appendix A includes the code for Opilio, the data mining program constructed to evaluate current entomological information and organize information using metadata. Appendix B includes the code used to analyze log files to determine usage 2 of metadata-generated links in Chapter 2. Appendix C is available on the accompanying CD-ROM and includes the source files used to create the object movies and the object movies themselves. Appendix D contains the diagrams used in Chapter 3 to compare the effectiveness of the object movies. Appendix E contains the HTML source files for the online course and can be found on the accompanying CD-ROM. 3 USE OF THE INTERNET IN THE DISCIPLINE OF ENTOMOLOGY: A HISTORY The wide acceptance of distributed information systems has had a very significant impact on the way extension entomology functions. In 2003, we are in the midst of a revolution which began in the early 1980's with the personal computer, gained momentum with the development of Gopher and the world-wide web, and promises to change even basic human activities because of the wide availability of internet connections to consumers today. This review offers a look at the history of distributed information systems, an examination of current problems; and a presentation of the new opportunities afforded by current technology with particular application to extension entomology. Early Networking Traditional entomology extension programs have focused on providing research-based information for agriculture and urban clients. Information was delivered in print, in person, and later by telephone, radio and television. In the mid-1980's, personal computers became available but were used primarily for document production for the printed page rather than communication. The fax machine rather than the computer became popular for communicating because there were wide incompatibilities between computer hardware, software, and media. The early 1990's brought the beginning of standardization. The protocol chosen was transmission control protocol/internet protocol (TCP/IP) and universities began making serious efforts to connect departmental networks, which had previously been used for internal file sharing and printer sharing, to the internet. Since the early days of the internet in the late 1960's and early 1970s, a simple protocol called file transfer protocol (FTP) had been used to transfer information from one computer to another over a TCP/IP network (Postel and Reynolds 1985). It worked well but lacked a graphical user interface. Instead, it required use of a command-line interface and knowledge of both the internet hostname of the other computer and the file's location within the computer's directory structure. FTP as a protocol is still
Recommended publications
  • Easy Slackware
    1 Создание легкой системы на базе Slackware I - Введение Slackware пользуется заслуженной популярностью как классический linux дистрибутив, и поговорка "кто знает Red Hat тот знает только Red Hat, кто знает Slackware тот знает linux" несмотря на явный снобизм поклонников "бога Патре­ га" все же имеет под собой основания. Одним из преимуществ Slackware является возможность простого создания на ее основе практически любой системы, в том числе быстрой и легкой десктопной, о чем далее и пойдет речь. Есть дис­ трибутивы, клоны Slackware, созданные именно с этой целью, типа Аbsolute, но все же лучше создавать систему под себя, с максимальным учетом именно своих потребностей, и Slackware пожалуй как никакой другой дистрибутив подходит именно для этой цели. Легкость и быстрота системы определяется выбором WM (DM) , набором программ и оптимизацией программ и системы в целом. Первое исключает KDE, Gnome, даже новые версии XFCЕ, остается разве что LXDE, но набор программ в нем совершенно не устраивает. Оптимизация наиболее часто используемых про­ грамм и нескольких базовых системных пакетов осуществляется их сборкой из сорцов компилятором, оптимизированным именно под Ваш комп, причем каж­ дая программа конфигурируется исходя из Ваших потребностей к ее возможно­ стям. Оптимизация системы в целом осуществляется ее настройкой согласно спе­ цифическим требованиям к десктопу. Такой подход был выбран по банальной причине, возиться с gentoo нет ни­ какого желания, комп все таки создан для того чтобы им пользоваться, а не для компиляции программ, в тоже время у каждого есть минимальный набор из не­ большого количества наиболее часто используемых программ, на которые стоит потратить некоторое, не такое уж большое, время, чтобы довести их до ума. Кро­ ме того, такой подход позволяет иметь самые свежие версии наиболее часто ис­ пользуемых программ.
    [Show full text]
  • Ebook - Informations About Operating Systems Version: August 15, 2006 | Download
    eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org AIX Internet: AIX AmigaOS Internet: AmigaOS AtheOS Internet: AtheOS BeIA Internet: BeIA BeOS Internet: BeOS BSDi Internet: BSDi CP/M Internet: CP/M Darwin Internet: Darwin EPOC Internet: EPOC FreeBSD Internet: FreeBSD HP-UX Internet: HP-UX Hurd Internet: Hurd Inferno Internet: Inferno IRIX Internet: IRIX JavaOS Internet: JavaOS LFS Internet: LFS Linspire Internet: Linspire Linux Internet: Linux MacOS Internet: MacOS Minix Internet: Minix MorphOS Internet: MorphOS MS-DOS Internet: MS-DOS MVS Internet: MVS NetBSD Internet: NetBSD NetWare Internet: NetWare Newdeal Internet: Newdeal NEXTSTEP Internet: NEXTSTEP OpenBSD Internet: OpenBSD OS/2 Internet: OS/2 Further operating systems Internet: Further operating systems PalmOS Internet: PalmOS Plan9 Internet: Plan9 QNX Internet: QNX RiscOS Internet: RiscOS Solaris Internet: Solaris SuSE Linux Internet: SuSE Linux Unicos Internet: Unicos Unix Internet: Unix Unixware Internet: Unixware Windows 2000 Internet: Windows 2000 Windows 3.11 Internet: Windows 3.11 Windows 95 Internet: Windows 95 Windows 98 Internet: Windows 98 Windows CE Internet: Windows CE Windows Family Internet: Windows Family Windows ME Internet: Windows ME Seite 1 von 138 eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org Windows NT 3.1 Internet: Windows NT 3.1 Windows NT 4.0 Internet: Windows NT 4.0 Windows Server 2003 Internet: Windows Server 2003 Windows Vista Internet: Windows Vista Windows XP Internet: Windows XP Apple - Company Internet: Apple - Company AT&T - Company Internet: AT&T - Company Be Inc. - Company Internet: Be Inc. - Company BSD Family Internet: BSD Family Cray Inc.
    [Show full text]
  • Awareness and Utilization of Search Engines for Information Retrieval by Students of National Open University of Nigeria in Enugu Study Centre Library
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln 2020 Awareness and Utilization of Search Engines for Information Retrieval by Students of National Open University of Nigeria in Enugu Study Centre Library SUNDAY JUDE ONUH National Open University of Nigeria, [email protected] OGOEGBUNAM LOVETH EKWUEME National Open University of Nigeria, [email protected] Follow this and additional works at: https://digitalcommons.unl.edu/libphilprac Part of the Library and Information Science Commons ONUH, SUNDAY JUDE and EKWUEME, OGOEGBUNAM LOVETH, "Awareness and Utilization of Search Engines for Information Retrieval by Students of National Open University of Nigeria in Enugu Study Centre Library" (2020). Library Philosophy and Practice (e-journal). 4650. https://digitalcommons.unl.edu/libphilprac/4650 Awareness and Utilization of Search Engines for Information Retrieval by Students of National Open University of Nigeria in Enugu Study Centre Library By Jude Sunday Onuh Enugu Study Centre Library National Open University of Nigeria [email protected] & Loveth Ogoegbunam Ekwueme Department of Library and Information Science National Open University of Nigeria [email protected] Abstract This study dwelt on awareness and utilization of search engines for information retrieval by students of National Open University of Nigeria (NOUN) Enugu Study centre. Descriptive survey research was adopted for the study. Two research questions were drawn from the two purposes that guided the study. The population consists of 5855 undergraduate students of NOUN Enugu Study Centre. A sample size of 293 students was used as 5% of the entire population.
    [Show full text]
  • Further Reading and What's Next
    APPENDIX Further Reading and What’s Next I hope you have gotten an idea of how, as a penetration tester, you could test a web application and find its security flaws by hunting bugs. In this concluding chapter, we will see how we can extend our knowledge of what we have learned so far. In the previous chapter, we saw how SQL injection has been done; however, we have not seen the automated part of SQL injection, which can be done by other tools alongside Burp Suite. We will use sqlmap, a very useful tool, for this purpose. Tools that Can Be Used Alongside Burp Suite We have seen earlier that the best alternative to Burp Suite is OWASP ZAP. Where Burp Community edition has some limitations, ZAP can help you overcome them. Moreover, ZAP is an open source free tool; it is community-based, so you don’t have to pay for it for using any kind of advanced technique. We have also seen how ZAP works. Here, we will therefore concentrate on sqlmap only, another very useful tool we need for bug hunting. The sqlmap is command line based. It comes with Kali Linux by default. You can just open your terminal and start scanning by using sqlmap. However, as always, be careful about using it against any live © Sanjib Sinha 2019 197 S. Sinha, Bug Bounty Hunting for Web Security, https://doi.org/10.1007/978-1-4842-5391-5 APPENDIX FuRtHeR Reading and What’s Next system; don’t use it without permission. If your client’s web application has vulnerabilities, you can use sqlmap to detect the database, table names, columns, and even read the contents inside.
    [Show full text]
  • Creating Permanent Test Collections of Web Pages for Information Extraction Research*
    Creating Permanent Test Collections of Web Pages for Information Extraction Research* Bernhard Pollak and Wolfgang Gatterbauer Database and Artificial Intelligence Group Vienna University of Technology, Austria {pollak, gatter}@dbai.tuwien.ac.at Abstract. In the research area of automatic web information extraction, there is a need for permanent and annotated web page collections enabling objective performance evaluation of different algorithms. Currently, researchers are suffering from the absence of such representative and contemporary test collections, especially on web tables. At the same time, creating your own sharable web page collections is not trivial nowadays because of the dynamic and diverse nature of modern web technologies employed to create often short- lived online content. In this paper, we cover the problem of creating static representations of web pages in order to build sharable ground truth test sets. We explain the principal difficulties of the problem, discuss possible approaches and introduce our solution: WebPageDump, a Firefox extension capable of saving web pages exactly as they are rendered online. Finally, we benchmark our system with current alternatives using an innovative automatic method based on image snapshots. Keywords: saving web pages, web information extraction, test data, Firefox, web table ground truth, performance evaluation 1 Introduction In the visions of a future Semantic Web, agents will crawl the web for information related to a given task. With the current web lacking semantic annotation, researchers are working on automatic information extraction systems that allow transforming heterogonous and semi-structured information into structured databases that can be later queried for data analysis. For testing purposes researchers need representative and annotated ground truth test data sets in order to benchmark different extraction algorithms against each other.
    [Show full text]
  • Digicult.Info Issue 6
    .Info Issue 6 A Newsletter on Digital Culture ISSN 1609-3941 December 2003 INTRODUCTION his is a rich issue of DigiCULT.Info covering topics in such Tareas as digitisation, asset management and publication, virtual reality, documentation, digital preservation, and the development of the knowledge society. n October the Italian Presidency of the European Union pro- Imoted, in cooperation with the European Commission and the ERPANET (http://www.erpanet.org) and MINERVA Continued next page (UofGlasgow),© HATII Ross, Seamus 2003 Technology explained and applied ... Challenges, strategic issues, new initiatives ... 6 3D-ArchGIS:Archiving Cultural Heritage 16 New Open-source Software for Content in a 3D Multimedia Space and Repository Management 10 Zope at Duke University: Open Source Content 19 The IRCAM Digital Sound Archive in Context Management in a Higher Education Context 55 Towards a Knowledge Society 16 PLEADE – EAD for the Web 31 Metadata Debate:Two Perspectives on Dublin Core News from DigiCULT´s Regional Correspondents ... 34 Cistercians in Yorkshire: Creating a Virtual Heritage Learning Package 37 Bulgaria 45 SMIL Explained 38 Czech Republic 47 Finding Names with the Autonom Parser 40 France 49 The Object of Learning:Virtual and Physical 41 Greece Cultural Heritage Interactions 42 Italy News, events ... 44 Poland 44 Serbia and Montenegro 23 Delivering The Times Digital Archive 30 NZ Electronic Text Centre 37 Cultural Heritage Events Action in the Preservation of Memory ... 52 New Project Highlights the Growing Use of DOIs 24 PANDORA,Australia’s
    [Show full text]
  • Vol.11, No. 2, 2011
    Applied Computing Review 2 SIGAPP FY’11 Semi-Annual Report July 2010- February 2011 Sung Y. Shin Mission To further the interests of the computing professionals engaged in the development of new computing applications and to transfer the capabilities of computing technology to new problem domains. Officers Chair – Sung Y. Shin South Dakota State University, USA Vice Chair – Richard Chbeir Bourgogne University, Dijon, France Secretary – W. Eric Wong University of Texas, USA Treasurer – Lorie Liebrock New Mexico Institute of Mining and Technology, USA Web Master – Hisham Haddad Kennesaw State University, USA ACM Program Coordinator – Irene Frawley ACM HQ Applied Computing Review 3 Notice to Contributing Authors to SIG Newsletters By submitting your article for distribution in this Special Interest Group publication, you hereby grant to ACM the following non-exclusive, perpetual, worldwide rights. • To publish in print on condition of acceptance by the editor • To digitize and post your article in the electronic version of this publication • To include the article in the ACM Digital Library • To allow users to copy and distribute the article for noncommercial, educational, or research purposes. However, as a contributing author, you retain copyright to your article and ACM will make every effort to refer requests for commercial use directly to you. Status Update SIGAPP's main event for this year will be the Symposium on Applied Computing (SAC) 2011 in Taichung, Taiwan from March 21-24 which will carry the tradition from Switzerland's SAC 2010. This year's SAC preparation has been very successful. More details about incoming SAC 2011 will follow in the next section.
    [Show full text]
  • Online-Quellen Nutzen: Recherche Im Internet
    ONLINE-QUELLEN NUTZEN: RECHERCHE IM INTERNET Katharina Gilarski, Verena Müller, Martin Nissen (Stand: 08/2020) Inhaltsverzeichnis 1 Recherche mit Universalsuchmaschinen ............................................................. 2 1.1 Clever googlen ......................................................................................................... 2 1.2 Suchoperatoren für die einfache Suche ................................................................... 2 1.3 Die erweiterte Suche mit Google .............................................................................. 3 1.4 Die umgekehrte Bildersuche mit Google .................................................................. 4 1.5 Das Geheimnis der Treffersortierung in Google ....................................................... 5 1.6 Alternative universelle Suchmaschinen .................................................................... 6 1.7 Surface vs. Deep Web ............................................................................................. 9 1.8 Vor- und Nachteile von universellen Suchmaschinen ............................................. 10 1.9 Bewertung von Internetquellen ............................................................................... 10 2 Recherche mit wissenschaftlichen Suchmaschinen ......................................... 11 2.1 Google Scholar: Googles Suchmaschine für Wissenschaftler ................................ 11 2.2 Suchmöglichkeiten von Google Scholar ................................................................
    [Show full text]
  • Hacker Poderá Me Invadir Se O Computador Não Estiver Conectado À Internet?
    Cartilha de Segurança para Internet 16deoutubrode2000 Resumo Esta cartilha destina-se aos usuários finais com pouco ou nenhum co- nhecimento a respeito da utilização da Internet. Como tais usuários não possuem conhecimentos dos termos técnicos normalmente empregados pe- los profissionais da área de informática, usou-se uma linguagem não-técnica neste texto. A idéia desta cartilha é dar ao usuário iniciante uma visão geral dos con- ceitos mais básicos de segurança. Sumário 1 Introdução 3 2 Senhas 3 2.1 Como escolher uma boa senha? ................... 3 2.2 Com que freqüência devo mudar minha senha? .......... 4 2.3 Quantas senhas diferentes devo usar? ................ 4 3 Problemas Usuais de Segurança 5 3.1 Engenharia Social .......................... 5 3.2 Cavalos de Tróia .......................... 5 3.2.1 Como meu computador pode ser infectado por um Cavalo de Tróia? .......................... 5 3.2.2 O que um Cavalo de Tróia pode fazer em meu computador? 6 3.2.3 O hacker poderá me invadir se o computador não estiver conectado à Internet? .................... 6 3.2.4 O computador pode ser infectado por um Cavalo de Tróia sem que se perceba? .................... 6 3.2.5 Como posso saber se o computador está infectado? . 6 3.2.6 Como proteger o computador dos Cavalos de Tróia? . 6 3.3 Backdoors .............................. 7 3.3.1 Como se prevenir dos Backdoors? ............. 7 3.4 Vírus ................................ 7 1 3.4.1 Como o computador é infectado por um Vírus? ...... 7 3.4.2 O que os Vírus podem fazer no computador? ....... 8 3.4.3 O computador pode ser infectado por um Vírus sem que se perceba? .........................
    [Show full text]
  • Merging Multiple Search Results Approach for Meta-Search Engines
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by D-Scholarship@Pitt MERGING MULTIPLE SEARCH RESULTS APPROACH FOR META-SEARCH ENGINES By Khaled Abd-El-Fatah Mohamed B.S-------- Cairo University, Egypt, 1995 M.A-------Cairo University, Egypt, 1999 M.A------- University of Pittsburgh 2001 Submitted to the Graduate Faculty of School of Information Sciences in Partial Fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2004 UNIVERSITY OF PITTSBURGH INFORMATION SCIENCES This dissertation was presented by Khaled Abd-El-Fatah Mohamed It was defended on Janauary 29, 2004 and approved by Chris Tomer, PhD, Associate Professor, DLIS Jose-Marie Griffiths, PhD, Professor, DLIS Don King, Research Professor, DLIS Amy Knapp, PhD, ULS Dissertation Director: Chris Tomer, PhD, Associate Professor MERGING MULTIPLE SEARCH RESULTS APPROACH FOR META-SEARCH ENGINES Khaled A. Mohamed, PhD University of Pittsburgh, 2004 Meta Search Engines are finding tools developed for enhancing the search performance by submitting user queries to multiple search engines and combining the search results in a unified ranked list. They utilized data fusion technique, which requires three major steps: databases selection, the results combination, and the results merging. This study tries to build a framework that can be used for merging the search results retrieved from any set of search engines. This framework based on answering three major questions: 1. How meta-search developers could define the optimal rank order for the selected engines. 2. How meta-search developers could choose the best search engines combination. 3. What is the optimal heuristic merging function that could be used for aggregating the rank order of the retrieved documents form incomparable search engines.
    [Show full text]
  • Exploring Search Engine Optimization (SEO) Techniques for Dynamic Websites
    Master Thesis Computer Science Thesis no: MCS-2011-10 March, 2011 __________________________________________________________________________ Exploring Search Engine Optimization (SEO) Techniques for Dynamic Websites Wasfa Kanwal School of Computing Blekinge Institute of Technology SE – 371 39 Karlskrona Sweden This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. ___________________________________________________________________________________ Contact Information: Author: Wasfa Kanwal E-mail: [email protected] University advisor: Martin Boldt, PhD. School of Computing School of Computing Internet : www.bth.se/com Blekinge Institute of Technology Phone : +46 455 38 50 00 SE – 371 39 Karlskrona Fax : +46 455 38 50 57 Sweden ii ABSTRACT Context: With growing number of online businesses, Search Engine Optimization (SEO) has become vital to capitalize a business because SEO is key factor for marketing an online business. SEO is the process to optimize a website so that it ranks well on Search Engine Result Pages (SERPs). Dynamic websites are commonly used for e-commerce because they are easier to update and expand; however they are subjected to indexing related problems. Objectives: This research aims to examine and address dynamic websites indexing related issues. To achieve aims and objectives of this research I intend to explore dynamic websites indexing considerations, investigate SEO tools to carry SEO campaign in three major search engines (Google, Yahoo and Bing), experiment SEO techniques, and determine to what extent dynamic websites can be made search engine friendly on these major search engines.
    [Show full text]
  • Annex I: List of Internet Robots, Crawlers, Spiders, Etc. This Is A
    Annex I: List of internet robots, crawlers, spiders, etc. This is a revised list published on 15/04/2016. Please note it is rationalised, removing some previously redundant entries (e.g. the text ‘bot’ – msnbot, awbot, bbot, turnitinbot, etc. – which is now collapsed down to a single entry ‘bot’). COUNTER welcomes updates and suggestions for this list from our community of users. bot spider crawl ^.?$ [^a]fish ^IDA$ ^ruby$ ^voyager\/ ^@ozilla\/\d ^ÆƽâºóµÄ$ ^ÆƽâºóµÄ$ alexa Alexandria(\s|\+)prototype(\s|\+)project AllenTrack almaden appie Arachmo architext aria2\/\d arks ^Array$ asterias atomz BDFetch Betsie biadu biglotron BingPreview bjaaland Blackboard[\+\s]Safeassign blaiz\-bee bloglines blogpulse boitho\.com\-dc bookmark\-manager Brutus\/AET bwh3_user_agent CakePHP celestial cfnetwork checkprivacy China\sLocal\sBrowse\s2\.6 cloakDetect coccoc\/1\.0 Code\sSample\sWeb\sClient ColdFusion combine contentmatch ContentSmartz core CoverScout curl\/7 cursor custo DataCha0s\/2\.0 daumoa ^\%?default\%?$ Dispatch\/\d docomo Download\+Master DSurf easydl EBSCO\sEJS\sContent\sServer ELinks\/ EmailSiphon EmailWolf EndNote EThOS\+\(British\+Library\) facebookexternalhit\/ favorg FDM(\s|\+)\d feedburner FeedFetcher feedreader ferret Fetch(\s|\+)API(\s|\+)Request findlinks ^FileDown$ ^Filter$ ^firefox$ ^FOCA Fulltext Funnelback GetRight geturl GLMSLinkAnalysis Goldfire(\s|\+)Server google grub gulliver gvfs\/ harvest heritrix holmes htdig htmlparser HttpComponents\/1.1 HTTPFetcher http.?client httpget httrack ia_archiver ichiro iktomi ilse
    [Show full text]