A Novel Multifactor Authentication System Ensuring Usability and Security G Mathew, S Thomas International Journal of Security, Privacy and Trust Management (IJSPTM) 2 (5), 2013 | 15 | 2013 |
Vehicle counting based on convolution neural network JM Anil, L Mathews, R Renji, RM Jose, S Thomas 2023 7th International Conference on Intelligent Computing and Control …, 2023 | 8 | 2023 |
Semantic web based adaptive E-Learning triggered through short message services J Antony, F Thottupuram, S Thomas, MV John Computer Science & Education (ICCSE), 2012 7th International Conference …, 2012 | 7 | 2012 |
A Low Distortion Reversible Data Hiding Technique using Improved PPVO Predictor N Thomas, S Thomas International Conference on Emerging Trends in Engineering, Science and …, 2015 | 4 | 2015 |
Reversible Watermarking using Image Content Assessment and Histogram Shifting N Thomas, S Thomas 5th IEEE International Conference on Advances in Computing & Communications …, 2015 | 3 | 2015 |
Analysis of image inpainting and object removal methodologies S Thomas, DJ Mathew Annual International Conference on Emerging Research Areas on Computing …, 2020 | 2 | 2020 |
Suicidal Ideation Prediction Using Machine Learning A Benny, VS Aarsha, A Subair, AP Nair, S Thomas 2023 International Conference on Circuit Power and Computing Technologies …, 2023 | 1 | 2023 |
Effect of Color Space Transforms and Fractional Derivative on Traffic Sign Images S Thomas, J Mathew 2024 1st International Conference on Trends in Engineering Systems and …, 2024 | | 2024 |
Speak Out: Turns Your Smartphone into a Microphone A Saseendran, A Lakshmi, A Jose, G Gopan, S Thomas Emerging Technologies for Sustainability, 225-230, 2020 | | 2020 |
Hand gesture keyboard for blind using CNN S Thomas, D Sunny, J Jaleel, J Raju, F Rahim AIP Conference Proceedings 2222 (1), 2020 | | 2020 |
Survey of Performance Enhancing Strategies and Speculative Execution in Hadoop ST Urmila J International Conference on Current Research on Embedded, Information and …, 2017 | | 2017 |
Colour Pass System for User Authentication AP Biju, A Azad, J Justine, S Thomas IJSTE - International Journal of Science Technology & Engineering 2 (11), 2016 | | 2016 |
Fibonacci Based Permutation Tree for 3D Steganography TM Thomas, S Thomas International Journal of Research in Computer Application and Information …, 2014 | | 2014 |
Data Hiding for High Image Quality Based on Local Complexity and Interpolation NK George, S Thomas International Journal of Advance Research in Computer Science and Management …, 2014 | | 2014 |
Instalert - A Path Tracker Mobile Application using GPS S Jacob, N Thomas, A Jacob, S Thomas International Conference on Recent Trends in Engineering and Technology …, 2014 | | 2014 |
An Improvement to Vertex Decimation : Finding Referencing Neighbors for Low Distortion in 3D Steganography TM Thomas, J Varghese, S Thomas Control Communication and Computing (ICCC), 2013 International Conference on …, 2013 | | 2013 |
An Authentication System For Information Security Using Cued Click Point And One Time Session Key G Mathew, S Thomas International Journal of Engineering Research and Technology 2 (7), 2580-2586, 2013 | | 2013 |
Classification of Lung Cancer Subtypes Using Deep Learning Model AK George, AM Jacob, AM Mathew, E Antony, S Thomas | | |
A Review of Parkinson Disease Detection Techniques JJ Joseph, NJ Abraham, MA Philips, SM Saji, S Thomas | | |
Survey of Strabismus Detection Techniques P Suresh, SS Alex, R Varghese, T Zacharias, S Thomas | | |