Call for Paper

CAE solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 31, 2023.

Read More

Architectural Design of Meta Crawler for Terrorist Network Mining

R. D. Gaharwar, D. B. Shah. Published in Networks.

Communications on Applied Electronics
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: R. D. Gaharwar, D. B. Shah

R D Gaharwar and D B Shah. Architectural Design of Meta Crawler for Terrorist Network Mining. Communications on Applied Electronics 5(8):37-40, August 2016. BibTeX

	author = {R. D. Gaharwar and D. B. Shah},
	title = {Architectural Design of Meta Crawler for Terrorist Network Mining},
	journal = {Communications on Applied Electronics},
	issue_date = {August 2016},
	volume = {5},
	number = {8},
	month = {Aug},
	year = {2016},
	issn = {2394-4714},
	pages = {37-40},
	numpages = {4},
	url = {},
	doi = {10.5120/cae2016652352},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Nowadays world is flooded with the digital data as well as with different types of search services but none of the search service gives the complete view of internet data. Moreover there is scarcity of the Meta Crawlers that are application specific. This paper presents architectural design of Meta crawler designed especially for Terrorist Web Mining. This architectural design is use to create an effective Meta crawling service that span across search engines. Meta crawler collates the search results of multiple search engines to fetch the terrorist Networks related information. Search results from single search engine may prove insufficient and spamming affected hence there is need for Meta Crawler which filters the results aggregated. Meta Crawler proposed in this paper has a multithreaded architecture hence this Terrorist Meta Crawler design have advantages like performance efficiency and scalability. This architecture can be used to designed a terrorist network related dynamic Meta Crawler.


  1. Sergey Brin and Lawrence Page, "The Anatomy of a Large-Scale Hypertextual Web Search Engine," in 7th World Wide Conference(WWW7), Brisbane, 1998.
  2. Heydon, Allan, and Marc Najork. "Mercator: A scalable, extensible web crawler." World Wide Web 2.4 (1999): 219-229.
  3. Etzioni, Oren. "Moving up the information food chain: Deploying softbots on the world wide web." AI magazine 18.2 (1997): 11.
  4. R. D. Gaharwar, D. B. Shah, and G.K.S. Gaharwar, "Proposed Architecture for Terrorist Web Miner," International Journal of Computer Applications, vol. 128, no. 9, pp. 18-20, October 2015.
  5. Gyongi, Zoltan, and Hector Garcia-Molina, "Spam: It's not just for inboxes anymore.”,  Computer 38.10 (2005): 28-34.
  6. Yang, X., & Zhang, M. (2000). Necessary Constraints for Fusion Algorithms in Meta Search Engine Systems. In Proc. of the Int’l Conf. on Intelligent Technologies (pp. 409-416)
  7. Selberg, E., & Etzioni, O. (1995, December). Multi-service search and comparison using the MetaCrawler. In Proceedings of the Fourth Int'l WWW Conference, Boston.
  8. Laria, Víctor González, Richard Griffiths, and Graham Winstanley. "Application of a clustering algorithm to recover topic content in an unstructured text-based environment."
  9. Selberg, E., & Etzioni, O. (1997). The MetaCrawler architecture for resource aggregation on the Web. IEEE expert, 12(1), 11-14.


Search Engine, Web Crawler, Terrorist Network, Meta Crawler, Terrorist Meta Crawler