Dissertationen zum Thema „Clone Detection and Analysis“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Clone Detection and Analysis" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Krutz, Daniel Edward. „Code Clone Discovery Based on Concolic Analysis“. NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/203.
Der volle Inhalt der QuelleAnbalagan, Sindhuja. „On Occurrence Of Plagiarism In Published Computer Science Thesis Reports At Swedish Universities“. Thesis, Högskolan Dalarna, Datateknik, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:du-5377.
Der volle Inhalt der QuelleNilsson, Erik. „Abstract Syntax Tree Analysis for Plagiarism Detection“. Thesis, Linköpings universitet, Institutionen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-80888.
Der volle Inhalt der QuelleElva, Rochelle. „Detecting Semantic Method Clones in Java Code using Method IOE-Behavior“. Doctoral diss., University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5731.
Der volle Inhalt der QuellePh.D.
Doctorate
Computer Science
Engineering and Computer Science
Computer Science
Rieger, Matthias. „Effective clone detection without language barriers /“. [S.l.] : [s.n.], 2005. http://www.zb.unibe.ch/download/eldiss/05rieger_m.pdf.
Der volle Inhalt der QuelleErsson, Sara. „Code Clone Detection for Equivalence Assurance“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284329.
Der volle Inhalt der QuelleFör att stödja flera olika programmingsspråk har det blivit alltmer vanligt atterbjuda applikationsprogrammeringsgränssnitt (API:er) på olika programmeringsspråk.Detta resulterar dock i utmaningen att säkerställa att API:erna ärekvivalenta angående deras gränssnitt. För att uppnå detta har kodklonsdetekteringsteknikeranpassats, för att matcha liknande funktionsdeklarationeri API:erna. Först undersöktes existerande kodklonsverktyg. Eftersom de intepresterade bra, användes ett trädbaserat syntaktiskt tillvägagångssätt, där allaheader-filer kompilerades med Clang. De abstrakta syntaxträden, som erhöllsunder kompileringen, traverserades sedan för att lokalisera funktionsdeklarationsnoderna,och för att lagra funktionsnamnen och parametervariabelnamnen.När funktionsnamnen matchades, användes ett textbaserat tillvägagångssätt,som omvandlade funktionsnamnen enligt en uppsättning implementeraderegler.En strikt regel jämför omvandlingar av hela funktionsnamn på ett exakt sätt,medan en lös regel bara jämför omvandlingar av delar of funktionsnamn, ochmatchar den resterande delen med vadsomhelst. Reglerna applicerades bådasjälva och i olika kombinationer, där den striktaste regeln applicerades först,följt av den näst strikaste, och så vidare.De regler som matchar bäst visade sig vara de som är striktast, och som intepåverkas av ordningen på funktionerna i vilken de matchas. Dessa reglervisade sig vara väldigt robusta mot API-evolution, dvs. ett ökat antal publikafunktioner i API:erna. Regler som är mindre strikta och stabila, och interobusta mot API-evolution kan fortfarande användas, men helst som ett komplementtill de striktare och mer stabila reglerna, när de flesta av funktionernaredan har blivit matchade.Verktyget har evaluerats på de två API:erna i Kings mjukvaruutvecklarkit, ochtäckte 94% av de tillgängliga funktionsmatchningarna.
Zhang, Xianpeng. „Software Clone Detection Basedon Context Information“. Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-324959.
Der volle Inhalt der QuelleBahtiyar, Muhammed Yasin. „JClone: Syntax tree based clone detection for Java“. Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5455.
Der volle Inhalt der QuelleAn unavoidable amount of money is spent on maintaining existing software systems today. Software maintenance cost generally higher than development cost of the system therefore lowering maintenance cost is highly appreciated in software industry.
A significant part of maintenance activities is related to repeating the investigation of problems and applying repeated solutions several times. A software system may contain a common bug in several different places and it might take extra effort and time to fix all existences of this bug. This operation commonly increases the cost of Software Maintenance Activities.
Detecting duplicate code fragments can significantly decrease the time and effort therefore the maintenance cost. Clone code detection can be achieved via analyzing the source code of given software system. An abstract syntax tree based clone detector for java systems is designed and implemented through this study.
This master thesis examines a software engineering process to create an abstract syntax tree based clone detector for the projects implemented in Java programming language.
Khan, Mohammed Salman. „A Topic Modeling approach for Code Clone Detection“. UNF Digital Commons, 2019. https://digitalcommons.unf.edu/etd/874.
Der volle Inhalt der QuelleSaini, Vaibhav Pratap Singh. „Towards Accurate and Scalable Clone Detection Using Software Metrics“. Thesis, University of California, Irvine, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10981732.
Der volle Inhalt der QuelleCode clone detection tools find exact or similar pieces of code, known as code clones. Code clones are categorized into four types of increasing difficulty of detection, ranging from purely textual (Type I) to purely semantic (Type IV). Most clone detectors reported in the literature, work well up to Type III, which accounts for syntactic differences. In between Type III and Type IV, however, there lies a spectrum of clones that, although still exhibiting some syntactic similarities, are extremely hard to detect—the Twilight Zone. Besides correctness, scalability has become a must-have requirement for modern clone detection tools. The increase in amount of source code in web-hosted open source repository services has presented opportunities to improve the state of the art in various modern use cases of clone detection such as detecting similar mobile applications, license violation detection, mining library candidates, code repair, and code search among others. Though these opportunities are exciting, scaling such vast corpora poses critical challenge.
Over the years, many clone detection techniques and tools have been developed. One class of these techniques is based on software metrics. Metrics based clone detection has potential to identify clones in the Twilight Zone. For various reasons, however, metrics-based techniques are hard to scale to large datasets. My work highlights issues which prohibit metric based clone detection techniques to scale large datasets while maintaining high levels of correctness. The identification of these issues allowed me to rethink how metrics could be used for clone detection.
This dissertation starts by presenting an empirical study using software metrics to understand if metrics can be used to identify differences in cloned and non-cloned code. The study is followed by another large scale study to explore the extent of cloning in GitHub. Here, the dissertation highlights scalability challenges in clone detection and how they were addressed. The above two studies provided a strong base to use software metrics for clone detection in a scalable manner. To this end, the dissertation presents Oreo, a novel approach capable of detecting harder-to-detect clones in the Twilight Zone. Oreo is built using a combination of machine learning, information retrieval, and software metrics. This dissertation evaluates the recall of Oreo on BigCloneBench, a benchmark of real world code clones. In experiments to compare the detection performance of Oreo with other five state of the art clone detectors, we found that Oreo has both high recall and precision. More importantly, it pushes the boundary in detection of clones with moderate to weak syntactic similarity, in a scalable manner. Further, to address the issues identified in precision evaluations, the dissertation presents InspectorClone, a semi automated approach to facilitate precision studies of clone detection tools. InspectorClone makes use of some of the concepts introduced in the design of Oreo to automatically resolve different types of clone pairs. Experiments demonstrate that InspectorClone has a very high precision and it significantly reduces the number of clone pairs that need human validation during precision experiments. Moreover, InspectorClone aggregates the individual effort of multiple teams into a single evolving dataset of labeled clone pairs, creating an important asset for software clone research. Finally, the dissertation concludes with a discussion on the lessons learned during the design and development of Oreo and lists down a few areas for the future work in code clone detection.
Simko, Thomas J. „Cloneless: Code Clone Detection via Program Dependence Graphs with Relaxed Constraints“. DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/2040.
Der volle Inhalt der QuelleAl, Hakami Hosam Hasan. „Stable marriage problem based adaptation for clone detection and service selection“. Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11041.
Der volle Inhalt der QuelleMayo, Quentin R. „Detection of Generalizable Clone Security Coding Bugs Using Graphs and Learning Algorithms“. Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404548/.
Der volle Inhalt der QuelleParkkila, Christoffer. „CLONE DETECTION IN MODEL-BASED DESIGN: AN EVALUATION IN THE SAFETY-CRITICAL RAILWAY DOMAIN“. Thesis, Mälardalens högskola, Inbyggda system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-54936.
Der volle Inhalt der QuellePatience, Trudy. „Sequence analysis of a Cowdria ruminantium lamdba (sic) GEM-11 clone“. Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/53052.
Der volle Inhalt der QuelleENGLISH ABSTRACT: Heartwater is a major threat to livestock in Africa due to its high mortality rate. The intracellular nature of the causative organism, Cowdria ruminantium, makes it difficult to study, hence an effective and user-friendly vaccine has been extremely difficult to obtain. Two C. ruminantium DNA libraries have recently been constructed, the lambda GEM11 bacteriophage DNA library and the lambda ZAPII bacteriophage DNA library, and this has lead to a renewed search for protective genes that could be used as a vaccine against heartwater. In this study, several molecular techniques including PCR, cloning and sequencing were used to identify genes in the lambda GEM11 bacteriophage DNA library that code for proteins, which could be used as vaccines to protect susceptible animals against heartwater. The lambda GEM11 library was screened with a rickettsial secretory protein gene sequence, known as seeD. One positive colony was selected from which the bacteriophage DNA was isolated. The C. ruminantium DNA was amplified from the bacteriophage DNA by using PCR and C. ruminantium-specific primers. The C. ruminantium DNA was screened with Mycoplasma, bovine and Cowdria DNA probes. The amplified DNA was subeloned into two vectors and the clones were screened by restriction analysis to identify clones containing inserts. The appropriate clones were sequenced and overlapping sequences matched, ordered and aligned. Two sequences were continuous with a short sequence of unidentified bases in between. Oligonucleotide primers were designed to amplify the DNA sequence between the two contiguous sequences. This led to the identification of the entire sequence of the C. ruminantium genome contained within the bacteriophage plaque. The single contiguous sequence was analysed and the putative protein-coding sequences were obtained and compared to DNA sequences of known organisms using the BLAST program. Five open reading frames were identified with homology to genes encoding specific proteins in bacteria. Two open reading frames showed homology to the genes encoding the transporter proteins, FtsY and the ABC transporter, and three open reading frames were found to be homologous to genes encoding the essential enzymes dethiobiotin synthetase, pro lipoprotein diacylglycerol transferase and the putative NADH-ubiquinone oxidoreductase subunit. The five open reading frames encode for genes, which are essential for the normal functioning of the C. ruminantium organism. However, these open reading frames might not be effective for use in a DNA vaccine since none of the open reading frames showed homology to obvious genes that could play a role in immunity and therefore confer protection. The open reading frames can be used in mutagenesis studies to produce attenuated strains of the organism that possess mutated versions of these proteins. These attentuated strains could be used for the vaccination of cattle, and thereby confer protection against viable pathogenic C. ruminantium isolates.
AFRIKAANSE OPSOMMING: Hartwater is 'n bedreiging vir vee in Afrika weens die hoë mortaliteitssyfer verbonde aan die siekte. Die intrasellulêre aard van die organisme wat hartwater veroorsaak, Cowdria ruminantium, bemoeilik navorsing aangaande die organisme. Dit het tot gevolg dat 'n effektiewe en gebruikersvriendelike entstof moeilik bekombaar is. Daar is onlangs sukses behaal met die konstruksie van twee C. ruminantium DNA genoteke, die lambda GEM11 bakteriofaag genoteek en die lambda ZAPII bakteriofaag genoteek. Dit het gelei tot 'n herlewing in die soektog na beskermende gene, wat in 'n entstof teen hartwater gebruik kan word. In hierdie studie is verskeie molekulêre tegnieke insluitende PKR, klonering en geenopeenvolging bepaling, gebruik om gene te identifiseer in die lambda GEM11 bakteriofaag genoteek wat kodeer vir proteïene wat in entstowwe gebruik kan word as beskerming teen hartwater. Die secD geen is gebruik om die lambda GEM11 bakteriofaag genoteek te sif. Een positiewe plaak is gevind waarna die DNA uit die bakteriofaag plaak geïsoleer en die C. ruminantium DNA vanuit die bakteriofaag plaak geamplifiseer is deur gebruik te maak van PKR en spesifieke C. ruminantium inleiers. Die C. ruminantium DNA is gesif met Mycoplasma, bees en Cowdria radioaktief gemerkte DNA peilers. Die C. ruminantium DNA is vervolgens in twee vektore gekloneer. Die klone is gesif deur middel van restriksie analise. Die DNA volgorde van die klone is bepaal en twee ononderbroke sekwense is geïdentifiseer met 'n gaping in die middel tussen die twee sekwense. Oligonukleotied inleiers is daarna ontwerp om die geenopeenvolging van die gaping tussen die twee sekwense te vul. Hierdeur kon die volledige geenopeenvolging van die genoom van C. ruminantium wat in die lambda GEM 11 bakteriofaag plaak voorkom, bepaal word. Hierdie volledige geenopeenvolging is vervolgens geanaliseer en die oop leesrame wat daarin voorkom geïdentifiseer. Vyf leesrame is gevind om homologie met gene wat kodeer vir proteïene wat in bakterieë voorkom, te toon. Twee leesrame het homologie met die gene wat kodeer vir transport proteïene, FtsYen die ABC transporter getoon, en drie leesrame het homologie met gene wat kodeer vir die essensiële ensieme detiobiotin sintetase, prolipoproteïen diasielgliserol transferase en die NADHubikinoon oksidoreduktase subeenheid getoon. Dié vyf leesrame het die potensiaal om as entstowwe gebruik te word aangesien al vyf leesrame kodeer vir gene wat 'n belangrike rol speel in die oorlewing van die C. ruminantium organisme. Alhoewel die leesrame moontlik nie so effektief sal wees in 'n DNA entstof nie, toon dit potensiaal om in mutasieeksperimente gebruik te word. Organismes wat die gemuteerde weergawe van die geen besit sal nie-funksionele proteïene produseer, wat 'n invloed kan hê op die normale fisiologiese funksies van die organisme en dus sal lei tot 'n minder virulente organisme. Die geattenueerde organisme kan moontlik gebruik word om diere te immuniseer en daardeur immuniteit aan diere lewer wat beskerming sal bied teen patogeniese C. ruminantium isolate.
Mohd, Aris Siti Norismah. „Molecular and biochemical analysis of the ERT1b ripening clone from tomato“. Thesis, University of Nottingham, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285460.
Der volle Inhalt der QuelleLy, Kevin. „Normalizer: Augmenting Code Clone Detectors using Source Code Normalization“. DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1722.
Der volle Inhalt der QuelleSood, Rachit K. „Clone Detection & Cataloging Method (CDCM) Towards an automatic approach for bootstrapping reuse efforts in an organization“. The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1345436534.
Der volle Inhalt der QuelleKasprzyk, Arkadiusz. „Investigation of clonality and minimal residual disease in haematological malignancy using fluorescent in situ hybridization“. Thesis, University College London (University of London), 1998. http://discovery.ucl.ac.uk/1317904/.
Der volle Inhalt der QuelleChen, Mengsu. „How Reliable is the Crowdsourced Knowledge of Security Implementation?“ Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/86885.
Der volle Inhalt der QuelleMaster of Science
Stack Overflow (SO), the most popular question and answer platform for programmers today, has accumulated and continues accumulating tremendous question and answer posts since its launch a decade ago. Contributed by numerous users all over the world, these posts are a type of crowdsourced knowledge. In the past few years, they have been the main reference source for software developers. Studies have shown that code snippets in answer posts are copied into production software. This is a dangerous sign because the code snippets contributed by SO users are not guaranteed to be secure implementations of critical functions, such as transferring sensitive information on the internet. In this project, we conducted a comprehensive study on answer posts related to Java security APIs. By labeling code snippets as secure or insecure, contrasting their distributions over associated attributes such as post score and user reputation, we found that there are a significant number of insecure answers (644 insecure vs 785 secure in our study) on Stack Overflow. Our statistical analysis also revealed the infeasibility of differentiating between secure and insecure posts leveraging the current community feedback system (eg. voting) of Stack Overflow.
Kerkhoff, Sebastian. „A Connection Between Clone Theory and FCA Provided by Duality Theory“. Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-73938.
Der volle Inhalt der QuelleAziz, Ahmad Naseer. „Genetic analysis of the anther-derived progeny and isolated pollen grains of a culture-responsive Solanum clone“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0023/NQ38342.pdf.
Der volle Inhalt der QuelleStrouts, Fiona Rosalind. „The complete genome and functional analysis of the Brazilian Purpuric Fever clone of Haemophilus influenzae biogroup Aegyptius“. Thesis, Imperial College London, 2010. http://hdl.handle.net/10044/1/6351.
Der volle Inhalt der QuellePadmanabhan, Sivasankar. „Drowsiness detection using HRV analysis“. Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1596988.
Der volle Inhalt der QuelleThe field of drowsiness detection is gaining more attention these days. An estimate by National Highway Traffic Safety Administration states that the total number of people falling asleep on the wheel is increasing day by day. If there is an effective way to monitor this condition and alert the drivers, many fatal accidents can be prevented. This thesis work elaborates on one such simple, yet effective drowsiness detection algorithm, the HRV - Heart Rate Variability analysis. Many psychological researchers have found out that when a person becomes drowsy, there is a variation in their heart signal. Monitoring this physiological variation would be more efficient than monitoring their facial movements such as blinking, eye brow contraction, and yawning, which are said to happen after much longer time when compared to the immediate changes in the heart rate. Hence, an algorithm that detects drowsiness based on HRV analysis is developed and implemented by analyzing heart signals. Simple hardware setups were used to collect the ECG data, and digital filters were used to remove noise and extract the desired information for further analysis. The developed algorithm was implemented successfully and the results obtained were more precise and satisfactory. This approach of monitoring drowsiness is more reliable and accurate and when implemented with its necessary features, it can monitor drowsiness more effectively and save hundreds of lives every day.
Orvalho, André. „Botnet Detection by Correlation Analysis“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105096.
Der volle Inhalt der QuelleTait, Crawford. „Wavelet analysis for onset detection“. Thesis, University of Glasgow, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363156.
Der volle Inhalt der QuelleNikolaidis, Dimitrios. „Detection of mines using hyperspectral analysis“. Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA311744.
Der volle Inhalt der QuelleThesis advisor(s): David D. Cleary, Suntharalingam Gnanalingam. "June 1996." Includes bibliographical references. Also Available online.
Al, Amro Sulaiman. „Behaviour-based virus analysis and detection“. Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9488.
Der volle Inhalt der QuelleWang, Chen-Shan. „Moving object detection by track analysis“. Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA241007.
Der volle Inhalt der QuelleThesis Advisor(s): Lee, Chin-Hwa. Second Reader: Hippenstiel, Ralph. "September 1990." Description based on title screen as viewed on December 18, 2009. DTIC Identifier(s): Underwater Object Locators, Underwater Tracking, Underwater Targets, Acoustic Detection, Computerized Simulation, Acoustic Data. Author(s) subject terms: Hough Transform, ILS, LAS, Sorting, Modification, Similarity. Includes bibliographical references (p. 76). Also available in print.
Kumar, Surinder. „Lane Detection based on Contrast Analysis“. Master's thesis, Universitätsbibliothek Chemnitz, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-206227.
Der volle Inhalt der QuelleLinguraru, Marius George. „Feature detection in mammographic image analysis“. Thesis, University of Oxford, 2004. http://ora.ox.ac.uk/objects/uuid:b92185f0-c7bf-40e1-bc17-bf71065f001f.
Der volle Inhalt der QuelleMarshall, Jonathan Peter. „Detection and analysis of debris discs“. Thesis, Open University, 2011. http://oro.open.ac.uk/54869/.
Der volle Inhalt der QuelleHallam, Robert Kenneth. „Dual optical detection and multivariate analysis“. Thesis, Loughborough University, 2003. https://dspace.lboro.ac.uk/2134/33747.
Der volle Inhalt der QuelleCrane, Nicola. „Debiasing reasoning : a signal detection analysis“. Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/82265/.
Der volle Inhalt der QuelleMoussaileb, Routa. „Log analysis for malicious software detection“. Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0211.
Der volle Inhalt der QuelleRansomware remains the number one cyberthreat for individuals, enterprises, and governments. Malware’s aftermath can cause irreversible casualties if the requirements of the attackers are not met in time. This thesis targets Windows ransomware. It affects users’ data and undermines many public services. Four stages of this malware attack are defined: delivery, deployment, destruction, and dealing. The corresponding countermeasures are assigned to each phase of the attack and clustered according to the techniques used. This thesis presents three contributions. The first detection mechanism is located in the file system layer. It is based on the system traversal that is sufficient to highlight the malicious behavior. This thesis proposes also an analysis of the network traffic. It is generated by collected ransomware samples to perform a packet-level detection. A study of the ransom notes is made to define where it takes place in a ransomware workflow. The last contribution provides an insight into plausible attacks, especially Doxware. A quantification model that explores the Windows file system in search of valuable data is presented. It is based on the term frequency-inverse document frequency solution provided in the literature for information retrieval. Honeypot techniques are also used to protect the sensitive files of the users. Finally, this thesis provides future perspectives granting a better roadmap for researchers
Sheikhalishahi, Mina. „Spam campaign detection, analysis, and formalization“. Doctoral thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/26935.
Der volle Inhalt der QuelleLes courriels Spams (courriels indésirables ou pourriels) imposent des coûts annuels extrêmement lourds en termes de temps, d’espace de stockage et d’argent aux utilisateurs privés et aux entreprises. Afin de lutter efficacement contre le problème des spams, il ne suffit pas d’arrêter les messages de spam qui sont livrés à la boîte de réception de l’utilisateur. Il est obligatoire, soit d’essayer de trouver et de persécuter les spammeurs qui, généralement, se cachent derrière des réseaux complexes de dispositifs infectés, ou d’analyser le comportement des spammeurs afin de trouver des stratégies de défense appropriées. Cependant, une telle tâche est difficile en raison des techniques de camouflage, ce qui nécessite une analyse manuelle des spams corrélés pour trouver les spammeurs. Pour faciliter une telle analyse, qui doit être effectuée sur de grandes quantités des courriels non classés, nous proposons une méthodologie de regroupement catégorique, nommé CCTree, permettant de diviser un grand volume de spams en des campagnes, et ce, en se basant sur leur similarité structurale. Nous montrons l’efficacité et l’efficience de notre algorithme de clustering proposé par plusieurs expériences. Ensuite, une approche d’auto-apprentissage est proposée pour étiqueter les campagnes de spam en se basant sur le but des spammeur, par exemple, phishing. Les campagnes de spam marquées sont utilisées afin de former un classificateur, qui peut être appliqué dans la classification des nouveaux courriels de spam. En outre, les campagnes marquées, avec un ensemble de quatre autres critères de classement, sont ordonnées selon les priorités des enquêteurs. Finalement, une structure basée sur le semiring est proposée pour la représentation abstraite de CCTree. Le schéma abstrait de CCTree, nommé CCTree terme, est appliqué pour formaliser la parallélisation du CCTree. Grâce à un certain nombre d’analyses mathématiques et de résultats expérimentaux, nous montrons l’efficience et l’efficacité du cadre proposé.
Spam emails yearly impose extremely heavy costs in terms of time, storage space, and money to both private users and companies. To effectively fight the problem of spam emails, it is not enough to stop spam messages to be delivered to end user inbox or be collected in spam box. It is mandatory either to try to find and persecute the spammers, generally hiding behind complex networks of infected devices, which send spam emails against their user will, i.e. botnets; or analyze the spammer behavior to find appropriate strategies against it. However, such a task is difficult due to the camouflage techniques, which makes necessary a manual analysis of correlated spam emails to find the spammers. To facilitate such an analysis, which should be performed on large amounts of unclassified raw emails, we propose a categorical clustering methodology, named CCTree, to divide large amount of spam emails into spam campaigns by structural similarity. We show the effectiveness and efficiency of our proposed clustering algorithm through several experiments. Afterwards, a self-learning approach is proposed to label spam campaigns based on the goal of spammer, e.g. phishing. The labeled spam campaigns are used to train a classifier, which can be applied in classifying new spam emails. Furthermore, the labeled campaigns, with the set of four more ranking features, are ordered according to investigators priorities. A semiring-based structure is proposed to abstract CCTree representation. Through several theorems we show under some conditions the proposed approach fully abstracts the tree representation. The abstract schema of CCTree, named CCTree term, is applied to formalize CCTree parallelism. Through a number of mathematical analysis and experimental results, we show the efficiency and effectiveness of our proposed framework as an automatic tool for spam campaign detection, labeling, ranking, and formalization.
Ghazali, Mohd Fairusham. „Leak detection using instantaneous frequency analysis“. Thesis, University of Sheffield, 2012. http://etheses.whiterose.ac.uk/2545/.
Der volle Inhalt der QuelleLehtomäki, J. (Janne). „Analysis of energy based signal detection“. Doctoral thesis, University of Oulu, 2005. http://urn.fi/urn:isbn:9514279255.
Der volle Inhalt der QuelleNawawi, Mustaffa bin. „Flow injection analysis with bioluminescence detection“. Thesis, Loughborough University, 1987. https://dspace.lboro.ac.uk/2134/31964.
Der volle Inhalt der QuelleWang, Shinan. „Detection and Analysis of GNSS Multipath“. Thesis, KTH, Geodesi och satellitpositionering, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188573.
Der volle Inhalt der QuelleFlervägsfel genereras när en signal anländer till antennen genom flera olika vägar i stället för den direkta vägen från satelliten. Det är i stor utsträckning beroende på den omgivande miljön av antennen och satellitgeometrin. Trots olika metoder för att reducera flervägsfel, är det fortfarande en dominerande felkälla som inte kan ignoreras för precis positionering med GNSS och andra GNSS-tillämpningar. I denna rapport har två metoder utvecklats med Trimble Business Center och MATLAB för att studera närvaron och effekten av flervägsfelet. Den första metoden - Trimble baslinje analys fokuserar på förändring i höjden för studie stationen relativt till referensstationen över tid. Den andra metoden - RINEX analys fokuserar på förändring av den geometrifria kombination av pseudoavståndsmätningar () och fasmätningar () över tid. Dessa två metoder har först testats på KTH-stationen och sedan appliceras på stationen Vidsel och stationen Botsmark. Olika resultat indikerar förekomsten av flervägsfel på de tre stationer. Höjden för studiestationerna har ett dagligt variationsmönster på grund av flervägsfelet. Flervägsfel orsakar även buller i satellitsignalerna, var pseudoavstånd är mer drabbade än fasmätningarna. Det är också värt att noterade att satelliter med låg elevationsvinkel är mer mottagliga för flervägsfel än vid hög elevationsvinkel.
Abd, Yusof Noor Fazilla. „Computational approaches to depression analysis : from detection to intention analysis“. Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=238393.
Der volle Inhalt der QuelleLeite, Jose Antonio Ferreira. „Multi-scale line detection“. Thesis, University of York, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362017.
Der volle Inhalt der QuelleManceau, Jérôme. „Clonage réaliste de visage“. Thesis, CentraleSupélec, 2016. http://www.theses.fr/2016SUPL0004/document.
Der volle Inhalt der Quelle3D face clones can be used in many areas such as Human-Computer Interaction and as pretreatment in applications such as emotion analysis. However, such clones should have well-modeled facial shape while keeping the specificities of individuals and they should be semantic. A clone is semantic when we know the position of the different parts of the face (eyes, nose...). In our technique, we use a RGB-D sensor to get the specificities of individuals and 3D Morphable Face Model to mark facial shape. For the reconstruction of the shape, we reverse the process classically used. Indeed, we first perform fitting and then data fusion. For each depth frame, we keep the suitable parts of data called patches. Depending on the location, we merge either sensor data or 3D Morphable Face Model data. For the reconstruction of the texture, we use shape and texture patches to preserve the person's characteristics. They are detected using the depth frames of a RGB-D sensor. The tests we perform show the robustness and the accuracy of our method
Yanilmaz, Huseyin. „Damage Detection In Beams By Wavelet Analysis“. Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609162/index.pdf.
Der volle Inhalt der QuelleAlonso-Fernandez, Fernando, und Josef Bigun. „Iris Pupil Detection by Structure Tensor Analysis“. Högskolan i Halmstad, Halmstad Embedded and Intelligent Systems Research (EIS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-14946.
Der volle Inhalt der QuelleParks, Donovan H. „Object detection and analysis using coherency filtering“. Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99784.
Der volle Inhalt der QuelleExtensive experimental results demonstrate that the proposed system can robustly identify objects contained in test images focusing on pose, scale, illumination, occlusion, and image noise. A qualitative comparison with four state-of-the-art systems indicates comparable or superior performance on test sets of similar difficulty can be achieved by the proposed system, while being capable of robustly identifying objects under a greater range of viewing conditions.
Behrens, Richard J. „Change detection analysis with spectral thermal imagery“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA356044.
Der volle Inhalt der Quelle"September 1998." Thesis advisor(s): Richard Christopher Olsen, David D. Cleary. Includes bibliographical references (p. 129-131). Also available online.
Avdiienko, Vitalii [Verfasser]. „Program analysis for anomaly detection / Vitalii Avdiienko“. Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1224883659/34.
Der volle Inhalt der QuelleWolf, Katharine. „Flow injection analysis with photodiode array detection“. Thesis, University of Hull, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.278427.
Der volle Inhalt der QuelleBeaulieu, Martin Ronald. „Launch detection satellite system engineering error analysis“. Thesis, Monterey, California. Naval Postgraduate School, 1996. http://hdl.handle.net/10945/8611.
Der volle Inhalt der QuelleAn orbiting detector of infrared (IR) energy may be used to detect the rocket plumes generated by ballistic missiles during the powered segment of their trajectory. By measuring angular directions of the detections over several observations, the trajectory properties, launch location, and impact area may be estimated using a nonlinear least-squares iteration procedure. observations from two or more sensors may be combined to form stereoscopic lines of sight (LOS), increasing the accuracy of the estimation algorithm. The focus of this research has been to develop a computer-model of an estimation algorithm, and determine what parameter, or combination of parameters will significantly affect on the error of the tactical parameter estimation. This model is coded in MATLAB, and generates observation data, and produces an estimate for time, position, and heading at launch, at burnout, and calculates an impact time and position. The effects of time errors, LOS measurement errors, and satellite position errors upon the estimation accuracy were then determined using analytical and Monte Carlo simulation techniques.