Code clone detection using string based tree matching technique
Pengklonan kod telah menjadi suatu isu sejak beberapa tahun kebelakangan ini selari dengan peliambahan jumlah aplikasi web dan perisian berdiri sendiri pada hari ini. Pengklonan memberi kesan yang sangat besar kepada fasa penyelenggaran sistem kerana secm'a tidak langsung peningkatan bila...
| Main Author: | Wahid, Norfaradilla |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/7384/ |
| Abstract | Abstract here |
Similar Items
Code clone detection using string based tree matching technique
Published: (2025)
Published: (2025)
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008)
by: Norulazmi, Kasim
Published: (2008)
Investigation of block matching algorithm for video coding
by: Faizul Hadi Mohamad Jamil
Published: (2013)
by: Faizul Hadi Mohamad Jamil
Published: (2013)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
Integrating Case-Based Reasoning in Job Matching System for Pre-selection Process of Recruitment
by: Norhasimah, Mustafa
Published: (2009)
by: Norhasimah, Mustafa
Published: (2009)
Generating UML class diagram from source codes using multi-threading technique
by: Abdullah, Saif Khalid
Published: (2015)
by: Abdullah, Saif Khalid
Published: (2015)
A hybrid technique using minimal spanning tree and analytic hierarchical process to improve functional requirements prioritization
by: Yaseen, Muhammad
Published: (2021)
by: Yaseen, Muhammad
Published: (2021)
Comparison study on sorting techniques in static data structure
by: Naser Frak, Anwar
Published: (2016)
by: Naser Frak, Anwar
Published: (2016)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Analogical Learner For Natural Language Processing Based On Structured String-tree Correspondence (sstc) And
Case-based Reasoning
by: Lim, Huan Ngee
Published: (2009)
by: Lim, Huan Ngee
Published: (2009)
An extended tree-based keyphrase extraction technique (etket) for academic articles based on syntactic features
by: Mohammad Badrul Alam, Miah
Published: (2024)
by: Mohammad Badrul Alam, Miah
Published: (2024)
Matching Technique for Resource Discovery using PageRank
by: Zarandah, Qasem M.
Published: (2006)
by: Zarandah, Qasem M.
Published: (2006)
A Simulation Model for the Handling of Raw Materials at the Bar Code Process
by: Ranjeet Singh, Bishan Singh
Published: (2004)
by: Ranjeet Singh, Bishan Singh
Published: (2004)
A case tool for code inspection / by Siti Hajar binti Alias.
by: Alias, Siti Hajar
Published: (2002)
by: Alias, Siti Hajar
Published: (2002)
The comparative study of model-based and appearance Based gait recognition for leave bag behind
by: Zainol, Norfazilah
Published: (2018)
by: Zainol, Norfazilah
Published: (2018)
Developing Strategic Reports for National Co-Operative of Malaysia (Angkasa) Using Data Warehouse and Decision Tree Model
by: Al-Badri, Ayad H. Mousa
Published: (2012)
by: Al-Badri, Ayad H. Mousa
Published: (2012)
A model for federated data grid systems based on network core area
by: Mohamad, Zarina
Published: (2013)
by: Mohamad, Zarina
Published: (2013)
Detecting Fraud Patterns in Telecommunications Using Case Based Reasoning
by: Shuaibu, Bala Musa
Published: (2008)
by: Shuaibu, Bala Musa
Published: (2008)
An enhanced anycast routing protocol using nearest PIM-SM tree distribution with load-balancing scheme / Jimmy Tan Kai Hong.
by: Tan, Jimmy Kai Hong
Published: (2003)
by: Tan, Jimmy Kai Hong
Published: (2003)
Wood species recognition based on phase - only correlation (POC) technique
by: Nik Kamariah, Nik Ismail
Published: (2013)
by: Nik Kamariah, Nik Ismail
Published: (2013)
The performance of soft computing techniques on content-based SMS spam filtering
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
by: Hammoudeh, S. Alamri
Published: (2020)
by: Hammoudeh, S. Alamri
Published: (2020)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Data mining in network traffic using fuzzy clustering
by: Mohamad, Shamsul
Published: (2003)
by: Mohamad, Shamsul
Published: (2003)
Test suite reduction in android application using refactoring
by: Ahmed, Maryam Temitayo
Published: (2016)
by: Ahmed, Maryam Temitayo
Published: (2016)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Specification of vertical semantic consistency rules of UML class diagram refinement using logical approach
by: Nuraini Abdulganiyyi, Nuraini
Published: (2014)
by: Nuraini Abdulganiyyi, Nuraini
Published: (2014)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Web Based Help Desk System for UUM CAS Postgraduate Help Desk Department Based on Problem Tracking Technique
by: Shaar, Fadi
Published: (2011)
by: Shaar, Fadi
Published: (2011)
Design and development of skin detection model based deep learning on different skin tones
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Testing model using risk poker technique for scrum-based software development projects / Siti Noor Hasanah Ghazali
by: Siti Noor Hasanah , Ghazali
Published: (2017)
by: Siti Noor Hasanah , Ghazali
Published: (2017)
Similar Items
-
Code clone detection using string based tree matching technique
Published: (2025) -
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008) -
Investigation of block matching algorithm for video coding
by: Faizul Hadi Mohamad Jamil
Published: (2013) -
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015) -
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)