• No results found

[PDF] Top 20 Comparison And Evaluation of Code Clone Detection Techniques

Has 10000 "Comparison And Evaluation of Code Clone Detection Techniques" found on our website. Below are the top 20 most common "Comparison And Evaluation of Code Clone Detection Techniques".

Comparison And Evaluation of Code Clone Detection Techniques

Comparison And Evaluation of Code Clone Detection Techniques

... pre-existing code with or without some modification in few part of ...pre-existing code with or without modification is termed as Code ...Clone.Code clone has no single or generic definition, ... See full document

6

Study and comparison of various image edge detection techniques used in quality inspection and evaluation of agricultural and food products by computer vision

Study and comparison of various image edge detection techniques used in quality inspection and evaluation of agricultural and food products by computer vision

... edge detection is in the forefront of computer vision system for detection of vegetables, fruits and food grains needs to quality inspection and evaluation, it is crucial to have a good understanding ... See full document

8

Study and comparison of various image edge detection techniques used in quality inspection and evaluation of agricultural and food products by computer vision

Study and comparison of various image edge detection techniques used in quality inspection and evaluation of agricultural and food products by computer vision

... Edge detection refers to the process of identifying and locating sharp discontinuities in an image’s like vegetables, fruits and food ...edge detection involve convolving the image with an operator (a 2-D ... See full document

8

Performance evaluation of edge detection techniques for square pixel and hexagon pixel images

Performance evaluation of edge detection techniques for square pixel and hexagon pixel images

... is comparison between various edge detection techniques on square pixel structure, hexagonal pixel structure and enhanced hexagonal pixel structure using Gaussian ...edge detection ... See full document

7

Detecting Similarities and Clones Using UML Diagrams

Detecting Similarities and Clones Using UML Diagrams

... of code has been studied within application engineering frequently within the subject of clone ...source code which are tremendously an identical; these regions of similarity are referred to as ... See full document

8

Code Cloning using Abstract Syntax Tree

Code Cloning using Abstract Syntax Tree

... To find the code fragments which yields similar result or are similar in syntax are the main problem in clone detection. So for this, first the program or the file in which we are trying to find ... See full document

6

Evaluating Code Clone Techniques

Evaluating Code Clone Techniques

... representative clone detection techniques — namely simple line matching, parameterized matching, and metric fingerprints— by means of five small to medium ...duplicated code detection ... See full document

10

IJCSMC, Vol. 3, Issue. 7, July 2014, pg.155 – 160 RESEARCH ARTICLE A Hybrid Approach to Perform Code Clone Analysis

IJCSMC, Vol. 3, Issue. 7, July 2014, pg.155 – 160 RESEARCH ARTICLE A Hybrid Approach to Perform Code Clone Analysis

... of code clone detection and ...to code cloning as well defined a deep analytical study of clone detection and its ...major clone detection approaches called static ... See full document

6

To Enhance Type 4 Clone Detection in Clone          Testing

To Enhance Type 4 Clone Detection in Clone Testing

... for clone testing. The tool will test the efficiency of code cloned with existing and with new algorithm for different lines of first and second ...second code from which we want to compare and find ... See full document

5

Detection of Behavioural Clone

Detection of Behavioural Clone

... source code is cloned [2]. Several techniques have been proposed to detect similar clone fragments also called simple clones [3] but analysis of similarities at higher levels of abstraction still ... See full document

5

Code clone detection using string based tree matching technique

Code clone detection using string based tree matching technique

... where code was ...systems, detection is feasible only by automatic ...several techniques have been proposed to detect clones automatically (Bellon et ... See full document

12

Reusability Testing for Code Clone Detection in Web Applications

Reusability Testing for Code Clone Detection in Web Applications

... level techniques such as Aspect-Oriented Programming to avoid the harmful effects of ...of clone detection techniques been proposed in the ...on code clones is that it is mostly focused ... See full document

5

Techniques and Algorithm for Clone Detection and Analysis

Techniques and Algorithm for Clone Detection and Analysis

... source code, several studies have exposed that the replica of a code or code clone in software technology are possibly ...replicated code, particularly later starting introduction to ... See full document

7

Code Clone Detection Method Based on the Combination of Tree Based and Token Based Methods

Code Clone Detection Method Based on the Combination of Tree Based and Token Based Methods

... high-accuracy code clone detection method based on the combination of tree-based and token-based ...called code clone, is one of the main factors that reduces the quality and ... See full document

16

CODE CLONE DETECTION USING WEIGHTED FEED FORWARD BACK PROPOGATION NEURAL NETWORK

CODE CLONE DETECTION USING WEIGHTED FEED FORWARD BACK PROPOGATION NEURAL NETWORK

... Machine learning algorithms facilitate a lot in decision making and neural network has performed well in categorization purpose in medical field. Most popular techniques among them are neural network. Neural ... See full document

6

Clone-Chunk Algorithm for Non-Contiguous Clone Detection

Clone-Chunk Algorithm for Non-Contiguous Clone Detection

... There are many approaches [7] that convert the detected clone code into a function and replace that cloned code from every file to that function. But the major disadvantage with this approach is that ... See full document

6

ERCD: Energy and Memory Dynamic Clone Detection in Wireless Sensor Networks

ERCD: Energy and Memory Dynamic Clone Detection in Wireless Sensor Networks

... distributed clone detection protocols have been proposed, such as Dynamic and Distributed protocol (DDP) and Line-Select Multicast protocol (LSM) ...improving clone detection probability ... See full document

7

Title: A Weighted Layered Approach for Code Clone Detection

Title: A Weighted Layered Approach for Code Clone Detection

... with code cloning and relative ...differnt code clone detection ...and code level to formulate the problem and to identify the associated issues with the software ...the code ... See full document

6

Triple Correlation Gold Code Channelized Receiver

Triple Correlation Gold Code Channelized Receiver

... gold code of length 63 chips generated by the preferred polynomials x 6 + x +1 and x 6 + x 5 + x 2 + x +1, the receiver will consist of 6 channels where each channel consist of 2-Stage TC receivers and the optimum ... See full document

6

Comparison of three cell block techniques for detection of low frequency abnormal cells

Comparison of three cell block techniques for detection of low frequency abnormal cells

... microtomy because all the cells are located in a defined region of the block. In contrast, cells may be randomly located throughout the block using the simple sedimentation and HistoGel techniques. This can ... See full document

7

Show all 10000 documents...