Code clone detection using string based tree matching technique
Pengklonan kod telah menjadi suatu isu sejak beberapa tahun kebelakangan ini selari dengan peliambahan jumlah aplikasi web dan perisian berdiri sendiri pada hari ini. Pengklonan memberi kesan yang sangat besar kepada fasa penyelenggaran sistem kerana secm'a tidak langsung peningkatan bila...
| Main Author: | Wahid, Norfaradilla |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/7384/ http://eprints.uthm.edu.my/7384/1/24p%20NORFARADILLA%20WAHID.pdf |
Similar Items
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
A review on distance measure formula for enhancing match detection process of generic code clone detection model in Java Application
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
Enhancing generic code clone detection model for C based application
by: Ainun Syahirah, Adnan
Published: (2019)
by: Ainun Syahirah, Adnan
Published: (2019)
Source code optimizer using local optimization approach for java based generic code clone detection
by: Ikhwan Muhammad, Hillmee
Published: (2019)
by: Ikhwan Muhammad, Hillmee
Published: (2019)
Enhancement of generic code clone detection model for python application
by: Ilyana Najwa Aiza, Asmad, et al.
Published: (2022)
by: Ilyana Najwa Aiza, Asmad, et al.
Published: (2022)
Strings
by: Soomro, Waseem Javaid, et al.
Published: (2011)
by: Soomro, Waseem Javaid, et al.
Published: (2011)
Methods of string class
by: Soomro, Waseem Javaid, et al.
Published: (2011)
by: Soomro, Waseem Javaid, et al.
Published: (2011)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
Code clone detection model: a SWOT analysis perspective
by: Mubarak-Ali, Al-Fahim, et al.
Published: (2018)
by: Mubarak-Ali, Al-Fahim, et al.
Published: (2018)
Effectiveness of RSS feed item duplication detection using word matching
by: Tan, Ian K. T., et al.
Published: (2011)
by: Tan, Ian K. T., et al.
Published: (2011)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
A New Evolving Tree-Based Model with Local Re-learning for Document Clustering and Visualization
by: Chang, Wuilee, et al.
Published: (2017)
by: Chang, Wuilee, et al.
Published: (2017)
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)
by: Edris, Khalid Edris, et al.
Published: (2014)
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
A secure authentication scheme using locimetric and press touch code techniques
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
Investigating the effectiveness of point features matching for detecting gun items
by: Nur Najwa, Ibrahim
Published: (2018)
by: Nur Najwa, Ibrahim
Published: (2018)
Intelligent Mobile Maid Matching Using Similarity Search
by: Ong, Shu Xian
Published: (2020)
by: Ong, Shu Xian
Published: (2020)
New bloom filter architecture for string matching
by: Sediyono, Agung, et al.
Published: (2008)
by: Sediyono, Agung, et al.
Published: (2008)
Arabic words recognition technique for pattern matching using SIFT, SURF and ORB
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
Generating UML class diagram from source codes using multi-threading technique
by: Abdullah, Saif Khalid
Published: (2015)
by: Abdullah, Saif Khalid
Published: (2015)
Matching Technique for Resource Discovery using PageRank
by: Zarandah, Qasem M.
Published: (2006)
by: Zarandah, Qasem M.
Published: (2006)
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
by: Lai, Chor Kiew, et al.
Published: (2021)
by: Lai, Chor Kiew, et al.
Published: (2021)
A Survey of schema matching research using database schemas and instances
by: Aljuboori, Ali Alwan, et al.
Published: (2017)
by: Aljuboori, Ali Alwan, et al.
Published: (2017)
OrangeCode : Website to learn coding via gaming
by: Nasrul Arif, Zakria
Published: (2019)
by: Nasrul Arif, Zakria
Published: (2019)
Student attendance system based on random code (SAS)
by: Shaza Akmalina, Badrul Kamal
Published: (2019)
by: Shaza Akmalina, Badrul Kamal
Published: (2019)
An empirical comparative study of instance-based schema matching
by: Alzeber, Mogahed, et al.
Published: (2018)
by: Alzeber, Mogahed, et al.
Published: (2018)
Template matching analysis using neural network for mobile iris recognition system
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
Analogical Learner For Natural Language Processing Based On Structured String-tree Correspondence (sstc) And
Case-based Reasoning
by: Lim, Huan Ngee
Published: (2009)
by: Lim, Huan Ngee
Published: (2009)
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020)
by: Noor Syahirah, Nordin, et al.
Published: (2020)
A hybrid technique using minimal spanning tree and analytic hierarchical process to improve functional requirements prioritization
by: Yaseen, Muhammad
Published: (2021)
by: Yaseen, Muhammad
Published: (2021)
Analysis of string matching compression algorithms
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
An extended tree-based keyphrase extraction technique (etket) for academic articles based on syntactic features
by: Mohammad Badrul Alam, Miah
Published: (2024)
by: Mohammad Badrul Alam, Miah
Published: (2024)
Die defect detection for integrated circuit using deep learning object detection techniques
by: Wong, Tack Hwa
Published: (2023)
by: Wong, Tack Hwa
Published: (2023)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
Similar Items
-
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008) -
A review on distance measure formula for enhancing match detection process of generic code clone detection model in Java Application
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021) -
Enhancing generic code clone detection model for C based application
by: Ainun Syahirah, Adnan
Published: (2019) -
Source code optimizer using local optimization approach for java based generic code clone detection
by: Ikhwan Muhammad, Hillmee
Published: (2019) -
Enhancement of generic code clone detection model for python application
by: Ilyana Najwa Aiza, Asmad, et al.
Published: (2022)