【正文】
n M, Carvalho L G, et al. Reconfigurable systems for sequencealignment and for general dynamic programming.[J]. Genetics Molecular Research Gmr,2005, 4(3):543. [5]Guo P, Deng Y W, Zhang H Y. A CAPTCHA Image Recognition Algorithm Based on EditDistance[J]. Key Engineering Materials, 2011, 474476:22032207. [6]AlAnzi F S, Abuzeina D. Toward an enhanced Arabic text classification using cosinesimilarity and Latent Semantic Indexing[J]. Journal of King Saud University Computer andInformation Sciences, 2016. [7]Ducasse S, phane, Rieger M, et al. A language independent approach for detecting duplicatedcode. In: ICSM[J]. 2000:109118. [8]Roy C K, Cordy J R. NICAD: Accurate Detection of NearMiss Intentional Clones UsingFlexible PrettyPrinting and Code Normalization[C]// The, IEEE International Conference onProgram Comprehension. IEEE Computer Society, 2008:172181. [9]Baker B S. On finding duplication and nearduplication in large software systems[C]//Reverse Engineering,1995. Proceedings of, Working Conference on. IEEE, 1995:8695. [10]Baker B S. Parameterized Duplication in Strings: Algorithms and an Application to SoftwareMaintenance[J]. Siam Journal on Computing, 1997, 26(5):13431362. [11]Juergens E, Deissenboeck F, Hummel B. Clone Detective A workbench for clone detectionresearch[C]// IEEE, International Conference on Software En [12]Higo Y, Kamiya T, Kusumoto S, et al. Method and implementation for invest