Search Results - "Thomas, Shiney"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Effect of Color Space Transforms and Fractional Derivative on Traffic Sign Images by Thomas, Shiney, Mathew, Juby

    “…Locating traffic signs in natural images poses an immense challenge. One major challenge is to find an appropriate dataset and this is achieved by the use of…”
    Get full text
    Conference Proceeding
  2. 2

    Vehicle Counting based on Convolution Neural Network by Anil, Jenna Maria, Mathews, Liz, Renji, Rajeswari, Jose, Riya Mariya, Thomas, Shiney

    “…In recent decades, intelligent transportation systems have drawn a lot of attention. For a traffic control strategy to be successful, accurate and thorough…”
    Get full text
    Conference Proceeding
  3. 3

    Suicidal Ideation Prediction Using Machine Learning by Benny, Anson, S, Aarsha V, Subair, Ameen, Nair, Anu P, Thomas, Shiney

    “…Suicide has become a leading factor in death globally. The rate of suicides is sharply increasing with every passing year. It is important to note that…”
    Get full text
    Conference Proceeding
  4. 4
  5. 5

    Reversible Watermarking Using Image Content Assessment and Histogram Shifting by Thomas, Neethu, Thomas, Shiney

    “…Reversible data hiding is a technique to embed additional message into some distortion-unacceptable cover media, such as military or medical images, in a…”
    Get full text
    Conference Proceeding
  6. 6

    A Novel Multifactor Authentication System Ensuring Usability and Security by Mathew, Gloriya, Thomas, Shiney

    Published 16-11-2013
    “…User authentication is one of the most important part of information security. Computer security most commonly depends on passwords to authenticate human…”
    Get full text
    Journal Article
  7. 7

    An improvement to vertex decimation: Finding referencing neighbors for low distortion in 3D steganography by Thomas, Tina Maria, Varghese, Jiss, Thomas, Shiney

    “…The concept of data hiding has made it possible to effectively transmit data in such a way that there is no compromise in security. Recent 3D steganographic…”
    Get full text
    Conference Proceeding
  8. 8

    The experiences and perceptions of selected female community college trustees in illinois by Thomas-Jacob, Shiney

    Published 01-01-2015
    “…The purpose of this qualitative, multiple case study was to gain insight into and understanding of the experiences and perceptions of selected female community…”
    Get full text
    Dissertation
  9. 9

    Semantic web based adaptive E-Learning triggered through short message services by Antony, J., Thottupuram, F. R., Thomas, S., John, M. V.

    “…As E-Learning Systems are gaining more and more popularity; this paper proposes an adaptive E-Learning System based on semantic web technologies. Initially we…”
    Get full text
    Conference Proceeding
  10. 10