• No results found

clone detection techniques

Comparison And Evaluation of Code Clone Detection Techniques

Comparison And Evaluation of Code Clone Detection Techniques

... code clone detection, various techniques has been proposed for detection of code clones such as detection based on textual approach, detection based on tokens, detection ...

6

Evaluating Code Clone Techniques

Evaluating Code Clone Techniques

... representative clone detection techniques — namely simple line matching, parameterized matching, and metric fingerprints— by means of five small to medium ...code detection techniques ...

10

Reusability Testing for Code Clone Detection in Web Applications

Reusability Testing for Code Clone Detection in Web Applications

... level techniques such as Aspect-Oriented Programming to avoid the harmful effects of ...of clone detection techniques been proposed in the ...

5

Implementing Lexical Approach of Clone Detection and Removal for Type-3

Implementing Lexical Approach of Clone Detection and Removal for Type-3

... code clone detection techniques and tools have been ...code clone will make system difficult to ...in clone reduction as they were able to remove almost all clones traditional ...

6

Automatic Detection of Clone Websites Using Combined Clustering

Automatic Detection of Clone Websites Using Combined Clustering

... Abstract— To achieve success, Hackers try to find a way to scale their scams. They duplicate content on new websites, often staying one step forward to defenders that finish off past schemes. For a few scams, like ...

5

A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices

A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices

... with clone attacks in particular and not one-node compromise ...ID. Clone nodes are, in other words, exact copies of the original compromised ...a clone attack, we only consider the aftermath of ...

5

Clone Detection In Wsn's For Optimization Of Energy And Memory Efficiency

Clone Detection In Wsn's For Optimization Of Energy And Memory Efficiency

... existing clone detection protocols with random witnessselection scheme, the required buffer storage of sensors is usually dependent on the node density, protocol, the required bufferstorage of sensors is ...

7

Software Refactoring Technique for Code Clone Detection of Static and Dynamic Website

Software Refactoring Technique for Code Clone Detection of Static and Dynamic Website

... The proposed method called “SD Code Clone detection technique (SDCC) aims the detection of clones on both static and dynamic web pages.. The proposed model consists [r] ...

10

Code clone detection using string based tree matching technique

Code clone detection using string based tree matching technique

... the techniques apply expensive syntax analysis for ...existing techniques used tree- based detection as it were more ...the techniques do a single layer detection which means after the ...

12

Image Enhancement and Compression using Edge Detection Technique

Image Enhancement and Compression using Edge Detection Technique

... Edge detection mainly aims at detecting the points in an image which is digital where its brightness changes or in other terms, the one which has ...edge detection techniques such as Canny edge ...

5

Applying classification techniques for network intrusion detection

Applying classification techniques for network intrusion detection

... intrusion detection system (HIDS), which consolidates the upsides of the capacity of peculiarity of the anomaly detection system ability to detect obscure attacks and decrease false- positive rate of misuse ...

5

An Efficient Type 4 Clone Detection Technique for Software Testing

An Efficient Type 4 Clone Detection Technique for Software Testing

... improvement. Clone testing is one of the sorts of ...Code clone is one of the components making programming upkeep increasingly ...identified clone in Type 3 as it ...identify clone in TYPE 4 ...

5

Dynamic Node Clone Detection Approach in Wireless Sensor Network

Dynamic Node Clone Detection Approach in Wireless Sensor Network

... In the paper [5], a new self-healing protocol named Randomized, Efficient and Distributed (RED) protocol is implemented for clone detection. Each node will broadcast a random value to all other nodes, while ...

5

A BAC clone fingerprinting approach to the detection of human genome rearrangements

A BAC clone fingerprinting approach to the detection of human genome rearrangements

... rearrangement detection, we used computational simulations and fingerprinted a set of clones derived from the MCF7 breast tumor cell line for which ESP data were available ...each clone and comparing FPP ...

17

A SECRET KEY BASED DETECTION OF CLONE ATTACKS IN MOBILE WSNs

A SECRET KEY BASED DETECTION OF CLONE ATTACKS IN MOBILE WSNs

... 7. If the distance difference is > 0, find the travel time for the distance and compare this with the system speed. If it exceeds system speed Vmax then clone node found. This is performed for the received ...

5

Lung Parenchyma Detection Using Segmentation Techniques

Lung Parenchyma Detection Using Segmentation Techniques

... Intensity inhomogeneity is the main problem in image processing. Image segmentation may be considerably difficult for images with intensity inhomogeneities due to overlapping of the intensity ranges in the regions to ...

7

Cryptanalysis   and  Improvement  of  Smart-ID's  Clone  Detection  Mechanism

Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism

... the clone detection mechanism and showed, under a realistic race condition, how an attacker which holds a clone of the password camouflaged private share of a client can lunch online password guesses ...

7

To Enhance Type 4 Clone Detection in Clone          Testing

To Enhance Type 4 Clone Detection in Clone Testing

... skills, techniques, technology and methods applied upon a variety of domains to evolve and create useful systems that solve many problems like practical ...some techniques and tools depending upon the ...

5

Detecting Similarities and Clones Using UML Diagrams

Detecting Similarities and Clones Using UML Diagrams

... identifying clone fragments that can be important refactoring ...detect clone fragments that belong to the same clone class and have a tendency of changing together during software ...more ...

8

ERCD: Energy and Memory Dynamic Clone Detection in Wireless Sensor Networks

ERCD: Energy and Memory Dynamic Clone Detection in Wireless Sensor Networks

... distributed clone detection protocols have been proposed, such as Dynamic and Distributed protocol (DDP) and Line-Select Multicast protocol (LSM) ...improving clone detection probability ...

7

Show all 10000 documents...

Related subjects