The object of the study is code in the Python programming language, analyzed by machine learning methods to identify clones. This work is devoted to the study of machine learning methods and implementation of the decision tree machine learning model in the problem of finding clones in the program code. The paper also analyzes existing machine learning approaches for detecting duplicates in program code. During the comparison, the advantages and disadvantages of each algorithm were determined, and the results were summarized in the corresponding comparison tables. As a result of the analysis, it was determined that the method based on the decision tree, which gives the best result in the task of finding clones in the program code, is the mo...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Although duplicated code is known to pose severe problems for software maintenance, it is difficult ...
Identical code fragments in different locations are recognized as code clones. There are four native...
Despite substantial study over the past three decades resulting in the development of more than 250 ...
This paper presents a new technique for clone detection using sequential pattern mining titled EgyCD...
Similar fragments in source codes are known as clones or duplicated codes. One major issue with dupl...
Abstract—In any programming language source code, the code that is repeated is called the clone. The...
Abstract—Code Clones are the similar program structures in a software system. It is one of the main ...
This paper presents a tree-pattern-based method of automatically and accurately finding code clones ...
The paper proposes a code-clone detection method that gives the highest possible precision and recal...
Code clone is a portion of codes that contains some similarities in the same software regardless of ...
Clone detection is the process of detecting similar segments of code in one or more source files. Th...
Source code plagiarism in students solutions of programming tasks is a serious problem, especially i...
Copying a code fragment and reusing it by pasting with or without minor modifications is a common pr...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Although duplicated code is known to pose severe problems for software maintenance, it is difficult ...
Identical code fragments in different locations are recognized as code clones. There are four native...
Despite substantial study over the past three decades resulting in the development of more than 250 ...
This paper presents a new technique for clone detection using sequential pattern mining titled EgyCD...
Similar fragments in source codes are known as clones or duplicated codes. One major issue with dupl...
Abstract—In any programming language source code, the code that is repeated is called the clone. The...
Abstract—Code Clones are the similar program structures in a software system. It is one of the main ...
This paper presents a tree-pattern-based method of automatically and accurately finding code clones ...
The paper proposes a code-clone detection method that gives the highest possible precision and recal...
Code clone is a portion of codes that contains some similarities in the same software regardless of ...
Clone detection is the process of detecting similar segments of code in one or more source files. Th...
Source code plagiarism in students solutions of programming tasks is a serious problem, especially i...
Copying a code fragment and reusing it by pasting with or without minor modifications is a common pr...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Code clones, referring to code fragments that are either similar or identical and are copied and pas...
Although duplicated code is known to pose severe problems for software maintenance, it is difficult ...
Identical code fragments in different locations are recognized as code clones. There are four native...