Ikuti
Shiney Thomas
Shiney Thomas
Email yang diverifikasi di amaljyothi.ac.in
Judul
Dikutip oleh
Dikutip oleh
Tahun
A Novel Multifactor Authentication System Ensuring Usability and Security
G Mathew, S Thomas
International Journal of Security, Privacy and Trust Management (IJSPTM) 2 (5), 2013
152013
Vehicle counting based on convolution neural network
JM Anil, L Mathews, R Renji, RM Jose, S Thomas
2023 7th International Conference on Intelligent Computing and Control …, 2023
82023
Semantic web based adaptive E-Learning triggered through short message services
J Antony, F Thottupuram, S Thomas, MV John
Computer Science & Education (ICCSE), 2012 7th International Conference …, 2012
72012
A Low Distortion Reversible Data Hiding Technique using Improved PPVO Predictor
N Thomas, S Thomas
International Conference on Emerging Trends in Engineering, Science and …, 2015
42015
Reversible Watermarking using Image Content Assessment and Histogram Shifting
N Thomas, S Thomas
5th IEEE International Conference on Advances in Computing & Communications …, 2015
32015
Analysis of image inpainting and object removal methodologies
S Thomas, DJ Mathew
Annual International Conference on Emerging Research Areas on Computing …, 2020
22020
Suicidal Ideation Prediction Using Machine Learning
A Benny, VS Aarsha, A Subair, AP Nair, S Thomas
2023 International Conference on Circuit Power and Computing Technologies …, 2023
12023
Effect of Color Space Transforms and Fractional Derivative on Traffic Sign Images
S Thomas, J Mathew
2024 1st International Conference on Trends in Engineering Systems and …, 2024
2024
Speak Out: Turns Your Smartphone into a Microphone
A Saseendran, A Lakshmi, A Jose, G Gopan, S Thomas
Emerging Technologies for Sustainability, 225-230, 2020
2020
Hand gesture keyboard for blind using CNN
S Thomas, D Sunny, J Jaleel, J Raju, F Rahim
AIP Conference Proceedings 2222 (1), 2020
2020
Survey of Performance Enhancing Strategies and Speculative Execution in Hadoop
ST Urmila J
International Conference on Current Research on Embedded, Information and …, 2017
2017
Colour Pass System for User Authentication
AP Biju, A Azad, J Justine, S Thomas
IJSTE - International Journal of Science Technology & Engineering 2 (11), 2016
2016
Fibonacci Based Permutation Tree for 3D Steganography
TM Thomas, S Thomas
International Journal of Research in Computer Application and Information …, 2014
2014
Data Hiding for High Image Quality Based on Local Complexity and Interpolation
NK George, S Thomas
International Journal of Advance Research in Computer Science and Management …, 2014
2014
Instalert - A Path Tracker Mobile Application using GPS
S Jacob, N Thomas, A Jacob, S Thomas
International Conference on Recent Trends in Engineering and Technology …, 2014
2014
An Improvement to Vertex Decimation : Finding Referencing Neighbors for Low Distortion in 3D Steganography
TM Thomas, J Varghese, S Thomas
Control Communication and Computing (ICCC), 2013 International Conference on …, 2013
2013
An Authentication System For Information Security Using Cued Click Point And One Time Session Key
G Mathew, S Thomas
International Journal of Engineering Research and Technology 2 (7), 2580-2586, 2013
2013
Classification of Lung Cancer Subtypes Using Deep Learning Model
AK George, AM Jacob, AM Mathew, E Antony, S Thomas
A Review of Parkinson Disease Detection Techniques
JJ Joseph, NJ Abraham, MA Philips, SM Saji, S Thomas
Survey of Strabismus Detection Techniques
P Suresh, SS Alex, R Varghese, T Zacharias, S Thomas
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20