Skip to main content

Research Repository

Advanced Search

All Outputs (25)

Optimizing webpage relevancy using page ranking and content based ranking. (2018)
Journal Article
BABU, J.S., KUMAR, T.R. and BANO, S. 2018. Optimizing webpage relevancy using page ranking and content based ranking. International journal of engineering and technology (Science Publishing Corporation) [online], 7(2.7): proceedings of the 2018 International conference on Internet of Things (IoT) and cyber security (ICICS 2018), 22-23 March 2018, Vijayawada, India, pages 1025-1029. Available from: https://doi.org/10.14419/ijet.v7i2.7.12220

Systems for web information mining can be isolated into a few classifications, depending on the type of target data and the purposes of the activity: Web structure mining; Web utilization mining; and Web Content Mining. This paper proposes another We... Read More about Optimizing webpage relevancy using page ranking and content based ranking..

A compressive survey on different image processing techniques to identify the brain tumor. (2018)
Journal Article
BHAGAVAN, K., IMAMBI, S.S. and BANO, S. 2018. A compressive survey on different image processing techniques to identify the brain tumor. International journal of engineering and technology (Science Publishing Corporation) [online], 7(2.7): proceedings of the 2018 International conference on Internet of Things (IoT) and cyber security (ICICS 2018), 22-23 March 2018, Vijayawada, India, pages 1081-1084. Available from: https://doi.org/10.14419/ijet.v7i2.7.12232

Medical imaging technology has revolutionized health care over the past three decades, allowing doctors to detect, cure and improve patient outcomes. Medicinal imaging involves pictures - of internal organs, parts, tissues and bones - for therapeutic... Read More about A compressive survey on different image processing techniques to identify the brain tumor..

A process model for implementing information systems security governance. (2018)
Journal Article
NICHO, M. 2018. A process model for implementing information systems security governance. Information and computer security [online], 26(1), pages 10-38. Available from: https://doi.org/10.1108/ICS-07-2016-0061

Purpose: The frequent and increasingly potent cyber-attacks due to lack of an optimal mix of technical as well as non-technical IT controls, has led to increased adoption of security governance controls by organizations. The paper thus seeks to const... Read More about A process model for implementing information systems security governance..

Unsupervised image saliency detection with Gestalt-laws guided optimization and visual attention based refinement. (2018)
Journal Article
YAN, Y., REN, J., SUN, G., ZHAO, H., HAN, J., LI, X., MARSHALL, S. and ZHAN, J. 2018. Unsupervised image saliency detection with Gestalt-laws guided optimization and visual attention based refinement. Pattern recognition [online], 79, pages 65-78. Available from: https://doi.org/10.1016/j.patcog.2018.02.004

Visual attention is a kind of fundamental cognitive capability that allows human beings to focus on the region of interests (ROIs) under complex natural environments. What kind of ROIs that we pay attention to mainly depends on two distinct types of... Read More about Unsupervised image saliency detection with Gestalt-laws guided optimization and visual attention based refinement..

Improving e-learning recommendation by using background knowledge. (2018)
Journal Article
MBIPOM, B., CRAW, S. and MASSIE, S. 2021. Improving e-learning recommendation by using background knowledge. Expert systems [online], 38(7): artificial intelligence/EDMA 2017, article e12265. Available from: https://doi.org/10.1111/exsy.12265

There is currently a large amount of e-Learning resources available to learners on the Web. However, learners often have difficulty finding and retrieving relevant materials to support their learning goals because they lack the domain knowledge to cr... Read More about Improving e-learning recommendation by using background knowledge..