• No results found

[PDF] Top 20 Code Clones Detection in Websites using Hybrid Approach

Has 10000 "Code Clones Detection in Websites using Hybrid Approach" found on our website. Below are the top 20 most common "Code Clones Detection in Websites using Hybrid Approach".

Code Clones Detection in Websites using Hybrid Approach

Code Clones Detection in Websites using Hybrid Approach

... of code occurs recurrently during the growth and evolution of large software ...systems. Clones are habitually created by copy-and paste programming and expansion of the presented code and also often ... See full document

5

An Effective Approach to Find Refactoring Opportunities for Detected Code Clones

An Effective Approach to Find Refactoring Opportunities for Detected Code Clones

... the code clones have been introduced by ...source code, quickly detection of refactoring oriented code ...oriented code clones should be ...By using this Aries ... See full document

5

Implementation of HTSCCDUToLiA (Hybrid Technique for Software Cloning Code Detection using Token and Line based Approach)

Implementation of HTSCCDUToLiA (Hybrid Technique for Software Cloning Code Detection using Token and Line based Approach)

... similar code or in other words some software developers say auto- generated code which is too difficult to ...software code clones that are present in any software more than one ...“A ... See full document

7

Review of Literature for Code Duplication and Refactoring of Code Clones

Review of Literature for Code Duplication and Refactoring of Code Clones

... classical code –based development ...cloned code are error –prone as they should be carried out multiple times for all instances of a ...detecting code clones [32]. The various sections of ... See full document

11

A Framework of New Hybrid Features for Intelligent Detection of Zero Hour Phishing Websites

A Framework of New Hybrid Features for Intelligent Detection of Zero Hour Phishing Websites

... phishing websites have moderate accuracy and false alarm rates and rely heavily on limited types of ...phishing websites to evade detec- ...against detection eva- ...new hybrid features with ... See full document

10

Code Cloning using Abstract Syntax Tree

Code Cloning using Abstract Syntax Tree

... of code clones in ...our code which results in the huge demand for resource utilization thereby increasing the cost for both development and maintenance phase of the software development the life ... See full document

6

An Advanced Approach to Polymorphic/Metamorpic Malware Detection using Hybrid Clustering Approach

An Advanced Approach to Polymorphic/Metamorpic Malware Detection using Hybrid Clustering Approach

... Malware is a one type of software which can harm the computer’s operating system and may also can steal the personal information from the computer, malware can be made by using any programming language by the ... See full document

7

Detection Of Pharming Attack On Websites Using Svm Classifier

Detection Of Pharming Attack On Websites Using Svm Classifier

... analysis, using data provided by different DNS servers. Approach is integrated within web browser of user so that notification arises in case of any doubtful website ...proposed hybrid ... See full document

5

Credit card fraud detection-a hybrid approach using simple  genetic and apriori algorithms

Credit card fraud detection-a hybrid approach using simple genetic and apriori algorithms

... security code only if it is a valid credit card ...this approach is the algorithm used can be applied only for the financial institution and the customer will not be initiated about ... See full document

6

Parallel and Distributed Code Clone Detection using Sequential Pattern Mining

Parallel and Distributed Code Clone Detection using Sequential Pattern Mining

... mining approach to code clone ...scale code clone detection. It is implemented this approach in a family of clone detectors, called PD EgyCD (Parallel and Distributed Egypt Clone ... See full document

7

Comparison And Evaluation of Code Clone Detection Techniques

Comparison And Evaluation of Code Clone Detection Techniques

... pre-existing code with or without changing a few part of the ...of code with or without some modification is termed as code ...of code is a common problem in development of software which ... See full document

6

Real time intrusion detection system using hybrid concept

Real time intrusion detection system using hybrid concept

... with the probability of the variables occurring given that the result should occurs. The probability of proof variable gives the result occurs is assumed to be independent of the probability of other proof variables give ... See full document

7

A heuristic-based approach to code-smell detection

A heuristic-based approach to code-smell detection

... During the development of object oriented software, de- pendencies (e.g. method call and use of attributes) between classes emerge that were not identified or specified explic- itly at design time. This leads to a more ... See full document

71

A NAND Subtraction Detection Technique for Hybrid SCM SAC-OCDMA System

A NAND Subtraction Detection Technique for Hybrid SCM SAC-OCDMA System

... sequence code that serves as its ...Several code families are developed for SAC-OCDMA such as modified quadratic congruence codes (MQC), M-sequence codes, double weight codes (DW) [2], ...a detection ... See full document

8

Detection of Websites Based on Phishing Websites Characteristics

Detection of Websites Based on Phishing Websites Characteristics

... phishing websites by checking the websites characteristics, we extract some phishing characteristics out of the all standards to evaluate the security of the websites, and check each websites ... See full document

7

Code Smell Detection and Refactoring Using Automated Genetic Algorithm Approach

Code Smell Detection and Refactoring Using Automated Genetic Algorithm Approach

... In code smell detection tool annotations were suggested regarding the smells of the code which are helpful for the developer[8] to perform refactoring according to the annotation ...of code, ... See full document

8

Genre detection of documents using hybrid techniques of machine learning

Genre detection of documents using hybrid techniques of machine learning

... networks. Using four classifiers, namely, naïve bayes, nearest neighbour, decision tree, subspace (Li and Jain, 1998) document categorization was ...networks. Using four classifiers, namely, naïve bayes, ... See full document

5

Automatic Detection of Clone Websites Using Combined Clustering

Automatic Detection of Clone Websites Using Combined Clustering

... new websites, often staying one step forward to defenders that finish off past ...pretend detection by victims and ...scam websites: pretend written agreement services and high-yield investment ... See full document

5

Visual Elicitation of Roles: Using A Hybrid Approach

Visual Elicitation of Roles: Using A Hybrid Approach

... Since the goal of our algorithm is to minimize the visualization cost of a set of hyper rectangles, visual cost ( σ U , σ P , σ R ) of sampled datasets using three different conversions. It depends on the number ... See full document

8

Detection of Node Clones in Wireless Sensor Network Using Detection Protocols

Detection of Node Clones in Wireless Sensor Network Using Detection Protocols

... clone detection protocols are introduced via distributed hash table and randomly directed exploration to detect node ...node clones. The later one is using probabilistic directed forwarding technique ... See full document

6

Show all 10000 documents...