Search Results - "Thomas, Shiney"
-
1
Effect of Color Space Transforms and Fractional Derivative on Traffic Sign Images
Published in 2024 1st International Conference on Trends in Engineering Systems and Technologies (ICTEST) (11-04-2024)“…Locating traffic signs in natural images poses an immense challenge. One major challenge is to find an appropriate dataset and this is achieved by the use of…”
Get full text
Conference Proceeding -
2
Vehicle Counting based on Convolution Neural Network
Published in 2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS) (17-05-2023)“…In recent decades, intelligent transportation systems have drawn a lot of attention. For a traffic control strategy to be successful, accurate and thorough…”
Get full text
Conference Proceeding -
3
Suicidal Ideation Prediction Using Machine Learning
Published in 2023 International Conference on Circuit Power and Computing Technologies (ICCPCT) (10-08-2023)“…Suicide has become a leading factor in death globally. The rate of suicides is sharply increasing with every passing year. It is important to note that…”
Get full text
Conference Proceeding -
4
Exploring the variables that impact on self-reported back in nurses working in critical care environments
Published in Journal of emergency medicine, trauma & acute care (09-10-2016)“…Background: There is little evidence of research outcome data or studies into self-reported back pain in Middle Eastern or Gulf region countries. Within HMC…”
Get full text
Journal Article -
5
Reversible Watermarking Using Image Content Assessment and Histogram Shifting
Published in 2015 Fifth International Conference on Advances in Computing and Communications (ICACC) (01-09-2015)“…Reversible data hiding is a technique to embed additional message into some distortion-unacceptable cover media, such as military or medical images, in a…”
Get full text
Conference Proceeding -
6
A Novel Multifactor Authentication System Ensuring Usability and Security
Published 16-11-2013“…User authentication is one of the most important part of information security. Computer security most commonly depends on passwords to authenticate human…”
Get full text
Journal Article -
7
An improvement to vertex decimation: Finding referencing neighbors for low distortion in 3D steganography
Published in 2013 International Conference on Control Communication and Computing (ICCC) (01-12-2013)“…The concept of data hiding has made it possible to effectively transmit data in such a way that there is no compromise in security. Recent 3D steganographic…”
Get full text
Conference Proceeding -
8
The experiences and perceptions of selected female community college trustees in illinois
Published 01-01-2015“…The purpose of this qualitative, multiple case study was to gain insight into and understanding of the experiences and perceptions of selected female community…”
Get full text
Dissertation -
9
Semantic web based adaptive E-Learning triggered through short message services
Published in 2012 7th International Conference on Computer Science & Education (ICCSE) (01-07-2012)“…As E-Learning Systems are gaining more and more popularity; this paper proposes an adaptive E-Learning System based on semantic web technologies. Initially we…”
Get full text
Conference Proceeding -
10