Skip to main content

Showing 1–4 of 4 results for author: K, M M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.00264  [pdf

    cs.SE

    Mining unit test cases to synthesize API usage examples

    Authors: Mohammad Ghafari, Konstantin Rubinov, Mohammad Mehdi Pourhashem K

    Abstract: Software developers study and reuse existing source code to understand how to properly use application programming interfaces (APIs). However, manually finding sufficient and adequate code examples for a given API is a difficult and a time-consuming activity. Existing approaches to find or generate examples assume availability of a reasonable set of client code that uses the API. This assumption d… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: Journal of Software: Evolution and Process

  2. arXiv:2102.05450  [pdf, other

    eess.IV cs.CV cs.LG

    Reference-based Texture transfer for Single Image Super-resolution of Magnetic Resonance images

    Authors: Madhu Mithra K K, Sriprabha Ramanarayanan, Keerthi Ram, Mohanasankar Sivaprakasam

    Abstract: Magnetic Resonance Imaging (MRI) is a valuable clinical diagnostic modality for spine pathologies with excellent characterization for infection, tumor, degenerations, fractures and herniations. However in surgery, image-guided spinal procedures continue to rely on CT and fluoroscopy, as MRI slice resolutions are typically insufficient. Building upon state-of-the-art single image super-resolution,… ▽ More

    Submitted 10 February, 2021; originally announced February 2021.

    Comments: Accepted at ISBI 2021

  3. Blockchain based Attack Detection on Machine Learning Algorithms for IoT based E-Health Applications

    Authors: Thippa Reddy Gadekallu, Manoj M K, Sivarama Krishnan S, Neeraj Kumar, Saqib Hakak, Sweta Bhattacharya

    Abstract: The application of machine learning (ML) algorithms are massively scaling-up due to rapid digitization and emergence of new tecnologies like Internet of Things (IoT). In today's digital era, we can find ML algorithms being applied in the areas of healthcare, IoT, engineering, finance and so on. However, all these algorithms need to be trained in order to predict/solve a particular problem. There i… ▽ More

    Submitted 2 October, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Accepted in IEEE IoT Magazine

    Journal ref: IEEE Internet of Things Magazine 4, 30-33 (2021)

  4. A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN

    Authors: Manojkumar. M. K, Sathya. D

    Abstract: A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an entity which interferes with the physical transmission and reception of wireless communications. Reactive jamming attack is a major security problem in the wireless sensor network… ▽ More

    Submitted 6 February, 2014; originally announced February 2014.

    Comments: 4 pages,3 figures,"Published with International Journal of Computer Trends and Technology (IJCTT)"

    Journal ref: IJCTT 7(3):143-146, January 2014. Published by Seventh Sense Research Group