Code clone detection using string based tree matching technique
Pengklonan kod telah menjadi suatu isu sejak beberapa tahun kebelakangan ini selari dengan peliambahan jumlah aplikasi web dan perisian berdiri sendiri pada hari ini. Pengklonan memberi kesan yang sangat besar kepada fasa penyelenggaran sistem kerana secm'a tidak langsung peningkatan bila...
| Main Author: | Wahid, Norfaradilla |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/7384/ |
| Abstract | Abstract here |
Similar Items
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008)
by: Norulazmi, Kasim
Published: (2008)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
Investigation of block matching algorithm for video coding
by: Faizul Hadi Mohamad Jamil
Published: (2013)
by: Faizul Hadi Mohamad Jamil
Published: (2013)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
Integrating Case-Based Reasoning in Job Matching System for Pre-selection Process of Recruitment
by: Norhasimah, Mustafa
Published: (2009)
by: Norhasimah, Mustafa
Published: (2009)
Generating UML class diagram from source codes using multi-threading technique
by: Abdullah, Saif Khalid
Published: (2015)
by: Abdullah, Saif Khalid
Published: (2015)
A hybrid technique using minimal spanning tree and analytic hierarchical process to improve functional requirements prioritization
by: Yaseen, Muhammad
Published: (2021)
by: Yaseen, Muhammad
Published: (2021)
System performance evaluation through preventive maintenance scenarios using simulation technique
by: lIyana, Abdullah
Published: (2013)
by: lIyana, Abdullah
Published: (2013)
Comparison study on sorting techniques in static data structure
by: Naser Frak, Anwar
Published: (2016)
by: Naser Frak, Anwar
Published: (2016)
Discovering student learning styles in engineering mathematic at Politeknik Merlimau using neural network techniques
by: Mat Esa, Asmarizan
Published: (2015)
by: Mat Esa, Asmarizan
Published: (2015)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
An extended tree-based keyphrase extraction technique (etket) for academic articles based on syntactic features
by: Mohammad Badrul Alam, Miah
Published: (2024)
by: Mohammad Badrul Alam, Miah
Published: (2024)
Analogical Learner For Natural Language Processing Based On Structured String-tree Correspondence (sstc) And
Case-based Reasoning
by: Lim, Huan Ngee
Published: (2009)
by: Lim, Huan Ngee
Published: (2009)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Oil palm tree Crowns delineation and enumeration using satellite images
by: Chai, Soo See
Published: (2003)
by: Chai, Soo See
Published: (2003)
Real estate recommender systems using case-base reasoning approach
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
Matching Technique for Resource Discovery using PageRank
by: Zarandah, Qasem M.
Published: (2006)
by: Zarandah, Qasem M.
Published: (2006)
The comparative study of model-based and appearance Based gait recognition for leave bag behind
by: Zainol, Norfazilah
Published: (2018)
by: Zainol, Norfazilah
Published: (2018)
A case tool for code inspection / by Siti Hajar binti Alias.
by: Alias, Siti Hajar
Published: (2002)
by: Alias, Siti Hajar
Published: (2002)
A Simulation Model for the Handling of Raw Materials at the Bar Code Process
by: Ranjeet Singh, Bishan Singh
Published: (2004)
by: Ranjeet Singh, Bishan Singh
Published: (2004)
A model for federated data grid systems based on network core area
by: Mohamad, Zarina
Published: (2013)
by: Mohamad, Zarina
Published: (2013)
The enhancement of gamification leader board model based on player type to increase learning engagement
by: Daud, Rafizah
Published: (2019)
by: Daud, Rafizah
Published: (2019)
Developing Strategic Reports for National Co-Operative of Malaysia (Angkasa) Using Data Warehouse and Decision Tree Model
by: Al-Badri, Ayad H. Mousa
Published: (2012)
by: Al-Badri, Ayad H. Mousa
Published: (2012)
Detecting Fraud Patterns in Telecommunications Using Case Based Reasoning
by: Shuaibu, Bala Musa
Published: (2008)
by: Shuaibu, Bala Musa
Published: (2008)
Spatial information-based multimodal integration technique
by: Lee, Bee Wah
Published: (2006)
by: Lee, Bee Wah
Published: (2006)
An enhanced anycast routing protocol using nearest PIM-SM tree distribution with load-balancing scheme / Jimmy Tan Kai Hong.
by: Tan, Jimmy Kai Hong
Published: (2003)
by: Tan, Jimmy Kai Hong
Published: (2003)
Test suite reduction in android application using refactoring
by: Ahmed, Maryam Temitayo
Published: (2016)
by: Ahmed, Maryam Temitayo
Published: (2016)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Data mining in network traffic using fuzzy clustering
by: Mohamad, Shamsul
Published: (2003)
by: Mohamad, Shamsul
Published: (2003)
Production quantity estimation using an improved artificial neural network
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014)
by: Rachmawan, Ardiansa
Published: (2014)
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
by: Lateh, Masitah bdul
Published: (2020)
by: Lateh, Masitah bdul
Published: (2020)
Cancer patient's record queries using answer on-demand data sharing architecture
by: Aiza Syahida, Zakaria
Published: (2014)
by: Aiza Syahida, Zakaria
Published: (2014)
Wood species recognition based on phase - only correlation (POC) technique
by: Nik Kamariah, Nik Ismail
Published: (2013)
by: Nik Kamariah, Nik Ismail
Published: (2013)
Similar Items
-
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008) -
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015) -
Investigation of block matching algorithm for video coding
by: Faizul Hadi Mohamad Jamil
Published: (2013) -
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018) -
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
