Code clone detection using string based tree matching technique
Code cloning have been an issue in these few years as the number of available web application and stand alone software increase nowadays. The major consequences of cloning is that it would risk the maintenance process as there are many duplicated codes in the systems that practically increase the co...
| Main Author: | Wahid, Norfaradilla |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9508/ http://eprints.utm.my/9508/1/NorfaradillaWahidMFSKSM2008.pdf |
Similar Items
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Paraphrase Detection using String Similarity with Synonyms
by: Lee, Jun Choi, et al.
Published: (2015)
by: Lee, Jun Choi, et al.
Published: (2015)
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
Enhancing Match Detection Process Using Chi-Square Equation for Improving Type-3 and Type-4 Clones in Java Applications
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2025)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2025)
Enhancing generic code clone detection model through protected access modifier rule and weightage
by: Siti An Nasihah, Mohd Napi
Published: (2016)
by: Siti An Nasihah, Mohd Napi
Published: (2016)
Analysis of string matching compression algorithms
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
A review on distance measure formula for enhancing match detection process of generic code clone detection model in Java Application
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013)
by: Norhidayah, Muhammad, et al.
Published: (2013)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
Analogical Learner For Natural Language Processing Based On Structured String-tree Correspondence (sstc) And
Case-based Reasoning
by: Lim, Huan Ngee
Published: (2009)
by: Lim, Huan Ngee
Published: (2009)
Source code optimizer using local optimization approach for java based generic code clone detection
by: Ikhwan Muhammad, Hillmee
Published: (2019)
by: Ikhwan Muhammad, Hillmee
Published: (2019)
Enhancing generic code clone detection model for C based application
by: Ainun Syahirah, Adnan
Published: (2019)
by: Ainun Syahirah, Adnan
Published: (2019)
Arabic words recognition technique for pattern matching using SIFT, SURF and ORB
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
A tree based keyphrase extraction technique for academic literature
by: Rabby, Gollam
Published: (2019)
by: Rabby, Gollam
Published: (2019)
Enhancement of generic code clone detection model for python application
by: Ilyana Najwa Aiza, Asmad, et al.
Published: (2022)
by: Ilyana Najwa Aiza, Asmad, et al.
Published: (2022)
Investigating the effectiveness of point features matching for detecting gun items
by: Nur Najwa, Ibrahim
Published: (2018)
by: Nur Najwa, Ibrahim
Published: (2018)
TeKET: a tree-based unsupervised keyphrase extraction technique
by: Rabby, Gollam, et al.
Published: (2020)
by: Rabby, Gollam, et al.
Published: (2020)
Image matching using relational graph representation
by: Lai, Chui Yen
Published: (2005)
by: Lai, Chui Yen
Published: (2005)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Image clone 1
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image clone 2
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Optical Character Recognition By Using Template Matching (Alphabet)
by: Nadira, Muda, et al.
Published: (2007)
by: Nadira, Muda, et al.
Published: (2007)
Neural network corner detection of vertex chain code
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
Feature-based phishing detection technique
by: Xin, Mei Choo, et al.
Published: (2016)
by: Xin, Mei Choo, et al.
Published: (2016)
An Intelligent Method. For Processing String In 3-D Based
On Its Minimum Energy.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
Strings
by: Soomro, Waseem Javaid, et al.
Published: (2011)
by: Soomro, Waseem Javaid, et al.
Published: (2011)
An empirical comparative study of instance-based schema matching
by: Alzeber, Mogahed, et al.
Published: (2018)
by: Alzeber, Mogahed, et al.
Published: (2018)
Neural network in corner detection of vertex chain code series
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
Ontology matching: in search of challenges ahead
by: Farooqui, N.K., et al.
Published: (2015)
by: Farooqui, N.K., et al.
Published: (2015)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Development of job matching algorithm with collective learning
by: Cheng, Kam Ching
Published: (2013)
by: Cheng, Kam Ching
Published: (2013)
Stroke-to-stroke matching in on-line signature verification
by: Ahmad Jaini, Azhar
Published: (2010)
by: Ahmad Jaini, Azhar
Published: (2010)
Determining the best weightage feature in parameterization process of GCCD model for clone detection in C-based applications
by: Nurul Syafiqah, Zaidi, et al.
Published: (2023)
by: Nurul Syafiqah, Zaidi, et al.
Published: (2023)
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
by: Loh, Kin Ming
Published: (2022)
by: Loh, Kin Ming
Published: (2022)
Fast Determination of Items Support Technique from Enhanced Tree Data Structure
by: Abdullah, Zailani, et al.
Published: (2014)
by: Abdullah, Zailani, et al.
Published: (2014)
Detection of cracked digitized paintings and manuscripts
based on threshold techniques
by: abdulwahab, Nawafil, et al.
Published: (2019)
by: abdulwahab, Nawafil, et al.
Published: (2019)
Phishing Website Detection Technique Using Machine Learning
by: Nurul Amira, Mohd Zin
Published: (2022)
by: Nurul Amira, Mohd Zin
Published: (2022)
inding similarities of word matching in translated arabic and english documents using GHSOM algorithm
by: Ismail, Hanadi Hassen
Published: (2007)
by: Ismail, Hanadi Hassen
Published: (2007)
Exploring student performance patterns using tree-based techniques
by: Kurniadi, Felix Indra, et al.
Published: (2023)
by: Kurniadi, Felix Indra, et al.
Published: (2023)
Similar Items
-
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008) -
Paraphrase Detection using String Similarity with Synonyms
by: Lee, Jun Choi, et al.
Published: (2015) -
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007) -
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010) -
Enhancing Match Detection Process Using Chi-Square Equation for Improving Type-3 and Type-4 Clones in Java Applications
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2025)