Determining the best weightage feature in parameterization process of GCCD model for clone detection in C-based applications
The term 'code clone' relates to code that has been replicated many times in a program. Primarily, Type-1, Type-2, Type-3, and Type-4 serve as the four distinct categories for the classification of code clones. Distinct code clone approaches and tools have been implemented for identifying...
| Main Authors: | Nurul Syafiqah, Zaidi, Mubarak Ali, Al Fahim, Abdul Sahli, Fakhrudin, Rahiwan Nazar, Romli |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40358/ http://umpir.ump.edu.my/id/eprint/40358/1/Determining%20the%20best%20weightage%20feature%20in%20parameterization.pdf http://umpir.ump.edu.my/id/eprint/40358/2/Determining%20the%20best%20weightage%20feature%20in%20parameterization%20process%20of%20GCCD%20model%20for%20clone%20detection%20in%20C-based%20applications_ABS.pdf |
Similar Items
Enhancing generic code clone detection model through protected access modifier rule and weightage
by: Siti An Nasihah, Mohd Napi
Published: (2016)
by: Siti An Nasihah, Mohd Napi
Published: (2016)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
A Case Study of Linear Weightage Model for Supplier Selection Process
by: Ali, A.A., et al.
Published: (2008)
by: Ali, A.A., et al.
Published: (2008)
Code clone detection model: a SWOT analysis perspective
by: Mubarak-Ali, Al-Fahim, et al.
Published: (2018)
by: Mubarak-Ali, Al-Fahim, et al.
Published: (2018)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
A hybrid parameterization method for NURBS
by: Shamsuddin, Siti Mariyam, et al.
Published: (2004)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2004)
Hybrid Framework Parameterization Reduction Combination in Soft Set
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
Enhancement of generic code clone detection model for python application
by: Ilyana Najwa Aiza, Asmad, et al.
Published: (2022)
by: Ilyana Najwa Aiza, Asmad, et al.
Published: (2022)
Analysis of Parameterization Value Reduction of Soft Sets and its Algorithm
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2016)
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2016)
Maldroid- attribute selection analysis for malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
by: Rahiwan Nazar, Romli, et al.
Published: (2019)
Enhancing Match Detection Process Using Chi-Square Equation for Improving Type-3 and Type-4 Clones in Java Applications
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2025)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2025)
A review on distance measure formula for enhancing match detection process of generic code clone detection model in Java Application
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
Enhancing generic code clone detection model for C based application
by: Ainun Syahirah, Adnan
Published: (2019)
by: Ainun Syahirah, Adnan
Published: (2019)
Fuzzy-based parameterized Gaussian edge detector using global and local properties
by: See, J., et al.
Published: (2005)
by: See, J., et al.
Published: (2005)
An adaptive and parameterized job grouping algorithm for scheduling grid jobs
by: Nithiapidary, Muthuvelu, et al.
Published: (2008)
by: Nithiapidary, Muthuvelu, et al.
Published: (2008)
Image clone 1
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image clone 2
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Features Selection in the Proposed Draft Sheet C1 for General Elections in
Indonesia
by: Erin, Efriansyah, et al.
Published: (2023)
by: Erin, Efriansyah, et al.
Published: (2023)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
A review of feature selection on text classification
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
Simulation technologies in networking and communications: selecting the best tool for the test
Published: (2015)
Published: (2015)
A Systematic Survey on the Research of AI-predictive Models for Wastewater Treatment Processes
by: Mohan, Varun Geetha, et al.
Published: (2023)
by: Mohan, Varun Geetha, et al.
Published: (2023)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
The hybrid feature selection technique using term frequency-inverse document frequency and support vector machine-recursive feature elimination for sentiment classification
by: Nur Syafiqah, Mohd Nafis
Published: (2022)
by: Nur Syafiqah, Mohd Nafis
Published: (2022)
Web Phishing Classification Model using Artificial Neural Network and Deep Learning Neural Network
by: Noor Hazirah, Hassan, et al.
Published: (2023)
by: Noor Hazirah, Hassan, et al.
Published: (2023)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Mechanize feature-to-feature matching system utilizing repeated inspection data
by: Mat Din, Mazura, et al.
Published: (2008)
by: Mat Din, Mazura, et al.
Published: (2008)
A proposed model for the selection of workers on crowdsourcing platforms utilizing nested criteria matching
by: Cucus, Ahmad, et al.
Published: (2024)
by: Cucus, Ahmad, et al.
Published: (2024)
An empirical study of feature selection for text categorization based on term weightage
by: Bong, Chih How, et al.
Published: (2004)
by: Bong, Chih How, et al.
Published: (2004)
Lean principles in IT services: a case study on implementation and best practices
by: Suresh, malladi, et al.
Published: (2010)
by: Suresh, malladi, et al.
Published: (2010)
Determining the best-FIT programmers using prognostic attributes / Sorada Prathan
by: Sorada , Prathan
Published: (2018)
by: Sorada , Prathan
Published: (2018)
Global Best Local Neighborhood in Particle Swarm Optimization in Dynamic Environment
by: Zalili, Musa, et al.
Published: (2018)
by: Zalili, Musa, et al.
Published: (2018)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Child tracking system using GPS and Arduino
by: Nurul Syafiqah, Zaidi
Published: (2019)
by: Nurul Syafiqah, Zaidi
Published: (2019)
Automation tool for role transition in oracle data guard databases by adopting oracle best known practices / Sathis Krishnan
by: Sathis , Krishnan
Published: (2019)
by: Sathis , Krishnan
Published: (2019)
Feature-based phishing detection technique
by: Xin, Mei Choo, et al.
Published: (2016)
by: Xin, Mei Choo, et al.
Published: (2016)
Investigating the effectiveness of point features matching for detecting gun items
by: Nur Najwa, Ibrahim
Published: (2018)
by: Nur Najwa, Ibrahim
Published: (2018)
Knowledge-based semantic relatedness measure using semantic features
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
Similar Items
-
Enhancing generic code clone detection model through protected access modifier rule and weightage
by: Siti An Nasihah, Mohd Napi
Published: (2016) -
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021) -
A Case Study of Linear Weightage Model for Supplier Selection Process
by: Ali, A.A., et al.
Published: (2008) -
Code clone detection model: a SWOT analysis perspective
by: Mubarak-Ali, Al-Fahim, et al.
Published: (2018) -
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)