{"id":1270,"date":"2018-12-04T05:52:02","date_gmt":"2018-12-04T05:52:02","guid":{"rendered":"http:\/\/www.gyanvihar.org\/journals\/?p=1270"},"modified":"2019-05-14T11:55:43","modified_gmt":"2019-05-14T11:55:43","slug":"web-mining-prominent-application","status":"publish","type":"post","link":"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/","title":{"rendered":"Web Mining: Prominent application"},"content":{"rendered":"<p style=\"text-align: center;\"><strong><sup>1<\/sup>Neha Mittal<\/strong><\/p>\n<p style=\"text-align: center;\"><sup>1<\/sup>M.Tech, Computers Science, IV semester, SGVU, Jaipur<\/p>\n<p style=\"text-align: justify;\"><strong>ABSTRACT:\u00a0In recent years, we have witnessed the ever \u2013 interesting and upcoming publishing medium is the World Wide Web. Undoubtedly, much of the web content is unstructured, so gathering and making sense of such data is very tedious. An application of data mining techniques to the World Wide Web called Web Mining, makes it easier. Web mining is used to discover useful and interesting patterns from the web. Web mining can be further divided into three types. The first is, Web content mining &#8211; the process of discovering information or resource from millions of sources across the World Wide Web. The second is, Web Structure Mining \u2013 concerned with discovering the structural summary of the web page and the hyperlinks. The third is, Web usage mining \u2013 discovering the navigation patterns of the surfers from the web data..<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>The data available on the web is so voluminous and heterogeneous that it becomes an essential factor to mine this available data to make it presentable, useful, pertinent to a particular problem. Web mining deals with extracting these interesting patterns developing useful abstracts from diversified sources. The present paper deals with a preliminary discussion of WEB mining, few key computer science contributions in the field of web mining , the prominent successful applications and outlines some promising areas of future research.<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong><em>Keywords \u2013 Content Mining Structure Mining, HITS, Page Rank, Usage Mining, Netcraft Survey<\/em><\/strong><\/p>\n<p><strong>I. INTRODUCTION<\/strong><\/p>\n<p style=\"text-align: justify;\">WWW enriches us with enormous amount of widely dispersed, interconnected, beneficial and dynamic hypertext information. It has profoundly caters the different needs of us in various stages like communication, business, entertainment and so on.<\/p>\n<p style=\"text-align: justify;\">The current World Wide Web has been reached the peak of its success with respect to:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Valuable resources of information<\/li>\n<li>Enormous number of users<\/li>\n<li>Multiform and multitude of data<\/li>\n<li>Efficient digital commerce<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The abundant unstructured or semi-structured information on the web leads a great challenge for both the users, who are seeking for effectively valuable information and for the business people, who needs to provide personalized service to the individual consumers, buried in the billions of web pages. To overcome these problems, data mining techniques must be applied on the www.<\/p>\n<p style=\"text-align: justify;\">In this paper we present a preliminary discussion about Web mining, key accomplishments, applications and future directions<\/p>\n<p style=\"text-align: justify;\"><strong>II. DEFINITION OF WEB MINING<\/strong><\/p>\n<p style=\"text-align: justify;\">Web mining is the application of data mining techniques to discover the patterns from the web. The main objective of web mining is to develop more intelligent tools for potentially help the user in finding, extracting, filtering and evaluating valuable information and resources.<\/p>\n<p style=\"text-align: justify;\"><strong>III. REASONS FOR WEB MINING<\/strong><\/p>\n<p style=\"text-align: justify;\">As like a coin, WWW has two sides, the user and the information provider. Both the sides face problems while dealing with the web data.<\/p>\n<p style=\"text-align: justify;\"><em>A<\/em>. <em>The User Problems<\/em><\/p>\n<ol style=\"text-align: justify;\">\n<li><strong><em>Finding relevant information<\/em><\/strong><em>: <\/em>People, either browse or use the search service to find specific information on web. Today\u2019s search tools have two problems. (1) Low precision due to the irrelevance of various search results. (2) Low recall due to the inability to index all the information available on the web as some of the relevant pages is not properly indexed. This is a Query \u2013 triggered process.<\/li>\n<li><strong><em>Extracting new knowledge form the web<\/em><\/strong><em>: <\/em>This is a data triggered process. As it is hard to get relevant information, it\u2019s very hard to make sense out of it.<\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><em>B. The Information Providers\u2019 Problems<\/em><\/p>\n<p style=\"text-align: justify;\">Deficient in gathering information about \u2013<\/p>\n<ul style=\"text-align: justify;\">\n<li>What do the customers do?<\/li>\n<li>What do the customers want?<\/li>\n<li>How to personalize the individual users?<\/li>\n<li>How effectively use the web data to market products and to service the customer?<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong>IV. WEB MINING TAXONOMY<\/strong><\/p>\n<p style=\"text-align: justify;\">According to analysis targets, Web Mining techniques can be categorized into three areas. They are:<\/p>\n<p style=\"text-align: justify;\"><em>A. Web Content Mining<\/em><\/p>\n<p style=\"text-align: justify;\">Web Content Mining is the process of extracting useful information from the contents of Web documents. Content data corresponds to the collection of facts a Web page was designed to convey to the users. It may consist of text, images, audio, video, or structured records such as lists and tables. Research activities in this field also involve using techniques from other disciplines such as Information Retrieval (IR) and Natural Language Processing (NLP). While there exists a significant body of work in extracting knowledge from images &#8211; in the fields of image processing and computer vision &#8211; the application of these techniques to Web content mining has not been very rapid.<\/p>\n<p style=\"text-align: justify;\"><em>B. Web Structure Mining<\/em><\/p>\n<p style=\"text-align: justify;\">The structure of a typical Web graph consists of Web pages as nodes, and hyperlinks as edges connecting between two related pages.Web Structure Mining can be regarded as the process of discovering structure information from the Web. This type of mining can be further divided into two kinds based on the kind of structural data used.<\/p>\n<p style=\"text-align: justify;\"><strong><em>Hyperlinks: <\/em><\/strong>A Hyperlink is a structural unit that connects a Web page to different location, either within the same Web page or to a different Web page. A hyperlink that connect to a different part of the same page is called an <em>Intra- Document<\/em> <em>Hyperlink<\/em>, and a hyperlink that connects two different pages is called an <em>Inter-Document Hyperlink<\/em>. There has been a significant body of work on hyperlink analysis, of which an up-to-date survey. There has been a significant body of work on hyperlink analysis, of which provides an up-to-date survey.<\/p>\n<p style=\"text-align: justify;\"><strong><em>Document Structure<\/em><\/strong>: In addition, the content within a Web page can also be organized in a tree-structured format, based on the various HTML and XML tags within the page.<\/p>\n<p style=\"text-align: justify;\"><em>C<\/em><em>. Web Usage Mining<\/em><\/p>\n<p style=\"text-align: justify;\">It is the techniques to discover interesting usage patterns from Webdata, in order to understand and better serve the needs of Web-based applications It deals with the prediction of the surfer\u2019s behaviour and interaction with the web. The web content and structure mining uses the primary data web but, the web usage mining mines the secondary data, that is, the data from the web server, access logs, proxy server logs, browser logs, user profiles, registration data, user sessions or transactions, user queries and so on. The success of usage mining depends on what and how much valid and reliable knowledge one can discover from the huge, raw log data.<\/p>\n<p style=\"text-align: justify;\"><em>Real world application: <\/em>Google Analytics \u2013 a service offered by Google that generates detailed statistics about the visits to a website.<\/p>\n<p style=\"text-align: justify;\"><strong>V. WEB MINING APPLICATIONS <\/strong><\/p>\n<p style=\"text-align: justify;\"><em>Some of the web mining applications<\/em>:<\/p>\n<ul style=\"text-align: justify;\">\n<li>E-Commerce<\/li>\n<li>Search Engines and Web search<\/li>\n<li>Website Design<\/li>\n<li>Recommendation engines<\/li>\n<li>Web communities and web market places<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong>VI. PROMINENT APPLICATIONS<\/strong><\/p>\n<p style=\"text-align: justify;\">This section describes some of the most successful applications in this section. Clearly, realizing that these applications use Web mining is largely a retrospective exercise.<\/p>\n<p style=\"text-align: justify;\"><em>A. Personalized Customer Experience in B2C E-commerce-Amazon.com<\/em><\/p>\n<p style=\"text-align: justify;\">Early on in the life of Amazon.com, its visionary CEO Jeff Bezos observed, \u2019In a traditional (brick-and-mortar) store, the main effort is in getting a customer to the store. Once a customer is in the store they are likely to make a purchase &#8211; since the cost of going to another store is high \u2013 and thus the marketing budget (focused on getting the customer to the store) is in general much higher than the in store customer experience budget (which keeps the customer in the store). In the case of an on-line store, getting in or out requires exactly one click, and thus the main focus must be on customer experience in the store.\u2019 This fundamental observation has been the driving force behind Amazon\u2019s comprehensive approach to personalized customer experience, based on the mantra \u2019a personalized store for every customer. A host of Web mining techniques, e.g. associations between pages visited, click-path analysis, etc., are used to improve the customer\u2019s experience during a \u2019store visit\u2019. Knowledge gained from Web mining is the key intelligence behind Amazon\u2019s features such as \u2019instant recommendations\u2019, \u2019purchase circles\u2019, \u2019wish-lists\u2019, etc.<\/p>\n<p style=\"text-align: justify;\"><em>B. Web Search\u2014Google<\/em><\/p>\n<p style=\"text-align: justify;\">Google has successfully used the data available from the Web content (the actual text and the hyper-text) and the Web graph to enhance its search capabilities and provide best results to the users. Google has expanded its search technology to provide site-specific search to enable users to search for information within a specific website. The Google Toolbar\u2019 is another service provided by Google that seeks to make search easier and informative by providing additional features such as highlighting the query words on the returned web pages. The full version of the toolbar, if installed, also sends the click-stream information of the user to Google. The usage statistics thus obtained would be used by Google to enhance the quality of its results. Google also provides advanced search capabilities to search images and look for pages that have been updated within a specific date range. Built on top of Netscape\u2019s Open Directory project, Google\u2019s web directory provides a fast and easy way to search within a certain topic or related topics. The Advertising Programs introduced by Google targets users by providing advertisements that are relevant to search query. This does not bother users with irrelevant ads and has increased the clicks for the advertising companies by four or five times.<\/p>\n<p style=\"text-align: justify;\">One of the latest services offered by Google is,\u2019 Google News\u2019. It integrates news from the online versions of all newspapers and organizes them categorically to make it easier for users to read \u201dthe most relevant news\u201d. It seeks to provide information that is the latest by constantly retrieving pages that are being updated on a regular basis.<\/p>\n<p style=\"text-align: justify;\"><em>C. Personalized Portal for the Web \u2013 My Yahoo<\/em><\/p>\n<p style=\"text-align: justify;\">Yahoo was the first to introduce the concept of a \u2018personalized portal\u2019, i.e. a Web site designed to have the look-and-feel as well as content personalized to the needs of an individual end-user. This has been an extremely popular concept and has led to the creation of other personalized portals, e.g. Yodlee for private information. Mining My Yahoo usage logs provides Yahoo valuable insight into an individual\u2019s Web usage habits, enabling Yahoo to provide compelling personalized content, which in turn has led to the tremendous popularity of the Yahoo Web site.<\/p>\n<p style=\"text-align: justify;\"><strong>VII. FUTURE RESEARCH DIRECTIONS<\/strong><\/p>\n<p style=\"text-align: justify;\">As the Web and its usage grows, it will continue to generate ever more content, structure, and usage data, andthe value of Web mining will keep increasing. Outlined hereare some research directions that must be pursued to ensure that we continue to develop Web mining technologies thatwill enable this value to be realized.<\/p>\n<p style=\"text-align: justify;\"><em>A. Temporal evolution of the Web<\/em><\/p>\n<p style=\"text-align: justify;\">Large organizations generally archive (at least portions of) usage data from there Web sites. With these sources of data available, there is a large scope of research to develop techniques for analyzing of how the Web evolves over time. The temporal behavior of the three kinds of Web data: Web Content, Web Structure and Web Usage. The methodology suggested for Hyperlink Analysis in [9] can be extended here and the research can be classified based on Knowledge Models, Metrics, Analysis Scope and Algorithms. For example, the analysis scope of the temporal behavior could be restricted to the behavior of a single document, multiple documents or the whole Web graph. The other factor that has to be studied is the effect of Web Content, Web Structure and Web Usage on each other over time.<\/p>\n<p><em>B<\/em><em>. Fraud and threat analysis<\/em><\/p>\n<p style=\"text-align: justify;\">The anonymity provided by the Web has led to a significant increase in attempted frauds, from unauthorized use of individual credit cards to hacking into credit card database for blackmail purposes. Yet another example is auction fraud, which has been increasing on popular sites like eBay. Since all these frauds are being perpetrated through the Internet, Web mining is the perfect analysis technique for detecting and preventing them. Research issues include developing techniques to recognize known frauds, and characterize and then recognize unknown or novel frauds, etc. The issues in cyber threat analysis and intrusion detection are quite similar in nature.<\/p>\n<p><strong>VIII. CONCLUSION<\/strong><\/p>\n<p style=\"text-align: justify;\">As the Web and its usage continues to grow, so does the opportunity to analyze Web data and extract all manner of useful knowledge from it. The past five years has seen the emergence of Web mining as a rapidly growing area, due to the efforts of the research community as well as various organizations that are practicing. In this paper we have briefly described the key computer science achievements made in this field, the prominent successful applications, and outlined some promising areas of future research in the area of web mining.<\/p>\n<p><strong>REFERENCES<\/strong><\/p>\n<ol>\n<li style=\"text-align: justify;\">T. Berners-Lee, R. Cailliau, A. Loutonen, H. Nielsen, and A.Secret. The World- Wide Web. <em>Communications of the ACM,<\/em>37(8):76- 82, 1994<\/li>\n<li style=\"text-align: justify;\">R. Albert, H. Jeong, and A.-L. Barabasi.Diameter of the World-wide web. <em>Nature, 401:13Q-131,<\/em> September 1999.<\/li>\n<li style=\"text-align: justify;\">J. Borges\u00a0\u00a0 and\u00a0\u00a0 M.\u00a0\u00a0 Levene.\u00a0\u00a0 Mining\u00a0\u00a0 Association\u00a0\u00a0 Rules\u00a0\u00a0 in Hypertex Databases. <em>In knowledge Discovery and Data Mining<\/em>.<\/li>\n<li style=\"text-align: justify;\">B. Berendt. Using site semantics to analyze, visualize, and support navigation. <em>Data Mining and Knowledge Discovery,<\/em>37-59,2002.<\/li>\n<li style=\"text-align: justify;\">B. Berendt, A. Hotho, and G. Stumme. Towards semantic web mining. In I. Horrocks and 1. Hendler, editors, <em>Proceedings of<\/em> <em>the1st International Semantic Web Conference (ISWC-02)<\/em>, pages 264-278. Springer-Verlag, 2002.<\/li>\n<li style=\"text-align: justify;\">J. Srivastava, B. Mobasher, Panel discussion on \u201cWeb Mining: Hype or Reality?\u201d at <em>the 9th IEEE International Conference on CA,1997.<\/em><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>1Neha Mittal 1M.Tech, Computers Science, IV semester, SGVU, Jaipur ABSTRACT:\u00a0In recent years, we have witnessed the ever \u2013 interesting and upcoming publishing medium is the World Wide Web. Undoubtedly, much of the web content is unstructured, so gathering and making sense of such data is very tedious. An application of data mining techniques to the [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26,31],"tags":[],"class_list":["post-1270","post","type-post","status-publish","format-standard","hentry","category-international-journal-of-converging-technologies-management","category-volume-3-issue-1-2017"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>research journal - Research Journal<\/title>\n<meta name=\"description\" content=\"Personalized web search is a promising method to improve the accuracy of web search. This research journal throws light on levels of person identity on web\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Protection in Personalized Web Search - SGVU Research Journal\" \/>\n<meta property=\"og:description\" content=\"Personalized web search is a promising method to improve the accuracy of web search. This research journal throws light on levels of person identity on web\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/\" \/>\n<meta property=\"og:site_name\" content=\"research journal\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-04T05:52:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-14T11:55:43+00:00\" \/>\n<meta name=\"author\" content=\"gyanvihar3\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Privacy Protection in Personalized Web Search - SGVU Research Journal\" \/>\n<meta name=\"twitter:description\" content=\"Personalized web search is a promising method to improve the accuracy of web search. This research journal throws light on levels of person identity on web\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"gyanvihar3\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/\",\"name\":\"Privacy Protection in Personalized Web Search - SGVU Research Journal\",\"isPartOf\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\"},\"datePublished\":\"2018-12-04T05:52:02+00:00\",\"dateModified\":\"2019-05-14T11:55:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9\"},\"description\":\"Personalized web search is a promising method to improve the accuracy of web search. This research journal throws light on levels of person identity on web\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gyanvihar.org\/journals\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web Mining: Prominent application\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/\",\"name\":\"research journal\",\"description\":\"Research Journal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9\",\"name\":\"gyanvihar3\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g\",\"caption\":\"gyanvihar3\"},\"url\":\"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar3\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"research journal - Research Journal","description":"Personalized web search is a promising method to improve the accuracy of web search. This research journal throws light on levels of person identity on web","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/","og_locale":"en_US","og_type":"article","og_title":"Privacy Protection in Personalized Web Search - SGVU Research Journal","og_description":"Personalized web search is a promising method to improve the accuracy of web search. This research journal throws light on levels of person identity on web","og_url":"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/","og_site_name":"research journal","article_published_time":"2018-12-04T05:52:02+00:00","article_modified_time":"2019-05-14T11:55:43+00:00","author":"gyanvihar3","twitter_card":"summary_large_image","twitter_title":"Privacy Protection in Personalized Web Search - SGVU Research Journal","twitter_description":"Personalized web search is a promising method to improve the accuracy of web search. This research journal throws light on levels of person identity on web","twitter_misc":{"Written by":"gyanvihar3","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/","url":"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/","name":"Privacy Protection in Personalized Web Search - SGVU Research Journal","isPartOf":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#website"},"datePublished":"2018-12-04T05:52:02+00:00","dateModified":"2019-05-14T11:55:43+00:00","author":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9"},"description":"Personalized web search is a promising method to improve the accuracy of web search. This research journal throws light on levels of person identity on web","breadcrumb":{"@id":"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.gyanvihar.org\/journals\/web-mining-prominent-application\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gyanvihar.org\/journals\/"},{"@type":"ListItem","position":2,"name":"Web Mining: Prominent application"}]},{"@type":"WebSite","@id":"https:\/\/www.gyanvihar.org\/journals\/#website","url":"https:\/\/www.gyanvihar.org\/journals\/","name":"research journal","description":"Research Journal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9","name":"gyanvihar3","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g","caption":"gyanvihar3"},"url":"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar3\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/1270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/comments?post=1270"}],"version-history":[{"count":3,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/1270\/revisions"}],"predecessor-version":[{"id":2457,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/1270\/revisions\/2457"}],"wp:attachment":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/media?parent=1270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/categories?post=1270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/tags?post=1270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}