keyboard_arrow_up
Accepted Papers
Shazam4code: a Scalable Search System for Derivative Clones

Jamie A. Heller and Samuel Z. Guyer, Department of Computer Science, Tufts University, Veracode Inc.

ABSTRACT

Copying and pasting code is common and has implications in software maintenance, security, legal, and plagiarism applications. This behavior may have a poison pill effect that propagates a bug or even violates a software license. Our focus is to provide a quick search system to determine if a code snippet is derivative of known code snippets, resulting from copying and pasting with possible edits, helping to identify code provenance, reducing the risk of license violations and helping to trace bug propagation. We present a new framework approach called Shazam4Code that has three major stages, source code normalization through canonicalization, functional fingerprinting through Abstract Syntax Tree (AST) decomposition via root-to-leaf node paths, and efficient fingerprint matching using Nearest Neighbor Locality Sensitive Hashing (NN-LSH). The search cost of our approach is independent of database size. We evaluate our framework for accuracy and performance using BigCloneBench and the iJaDataset.

KEYWORDS

Code Clone Detection, Abstract Syntax Tree, Canonicalization, Neareast Neighbor Locality Sensitive Hashing, Code Provenance


Iot Security and Privacy

Nikitha Merilena Jonnada, University of the Cumberlands, USA

ABSTRACT

In this paper, the author discusses the importance of IoT, its security measures, and device protection. IoT devices have become a trend as they allow users to easily use and understand the devices. IoT has become a widely used technique within many industries like banking, agriculture, health care, and others. It made the users experience easy. IoT without AI has been a good investment for many users as its connectivity helps them use multiple devices from a single device and sometimes with a single click.

KEYWORDS

Artificial Intelligence (AI), Machine Learning (ML), Internet of Things (IoT), Security, Hacking, Risks.


The Smart Garbage Bin Management Using Iot & Mobile Application with Cloud Databases

Lakmali Karunarathne, York St John University, UK

ABSTRACT

Smart garbage bins which are automatically opened the bins doors when the person is standing in front of the smart bins are the perfectly innovated garbage bins by the IT industries and developers. The IR sensor is used to sense the waste and then its identified the which category the waste is by the support of sensors like metal proximity sensor, capacitive proximity sensor and the inductive proximity sensor. The expected services are aimed to provide by this entire system. The entire project is included things are, identifying the bins category, dispose the waste based on that category, send notifications and provide the reports for the purpose of getting awareness about the users garbage management. The IOT product is combined with the SMART GARBAGE MASTER (SGM) mobile application to interact with the entire IOT system via the cloud based to provide effective and efficient service to the users who use this system. The data is sent the Arduino for taking the decision that the garbage is either metal or non- metal.

KEYWORDS

Smart, garbage, segregation, plastic, paper, sensors, ultrasonic sensor, IR sensor, bin, level, percentage, IOT, Arduino, Cloud Databases.


menu
Reach Us

emailsipro@ccsea2025.org


emailsiproconference@gmail.com

close