CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Detection of Behavioural Clone

by Manu Singh, Vidushi Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 14
Year of Publication: 2014
Authors: Manu Singh, Vidushi Sharma
10.5120/17886-8859

Manu Singh, Vidushi Sharma . Detection of Behavioural Clone. International Journal of Computer Applications. 102, 14 ( September 2014), 41-45. DOI=10.5120/17886-8859

@article{ 10.5120/17886-8859,
author = { Manu Singh, Vidushi Sharma },
title = { Detection of Behavioural Clone },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 14 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number14/17886-8859/ },
doi = { 10.5120/17886-8859 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:19.472162+05:30
%A Manu Singh
%A Vidushi Sharma
%T Detection of Behavioural Clone
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 14
%P 41-45
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

High level cloning in a system is the aggregation of four classes of high level similarities these four classes are behavioural Clones, concept clones, structural clones and domain model clones. Behavioural clones are used to depict similar run time behavior. This paper presents a method for the detection of behavioural clone. The proposed system detects behavioural type of higher level clones in two file of same or different directories. This is done with the help of clone detection tool designed in DOT NET. The work is implemented as a generalized tool which accepts different programming language as input and the existence of clone can be detected across the source code of different languages. The main distinctive feature of the proposed methodology is the use of command prompt to determine runtime behaviour of cloned code.

References
  1. H. A. Basit, S. Jarzabek, "A Case for Structural Clones", International Workshop on Software Clones (IWSC), 2009.
  2. B. S Baker, "On finding duplication and near duplication in large software system", proceedings of Second IEEE Working Conference on Reverse Engineering, 1995.
  3. William S. Evans , Christopher W. Fraser and Fei Ma, "Clone detection via structural abstraction" Software quality journal Volume 17, Number 4, 2009.
  4. Cory Kasper, Michael W. Godfrey, "Cloning considered harmful", Working Conference on Reverse Engineering, 2006
  5. M. Zibran, C. Roy, "The Road to Software Clone Management: A Survey", Tech. Report 2012-03, Department of Computer Science, University of Saskatchewan, Canada, pp. 1-62, 2012.
  6. C. Roy, J. Cordy, and R. Koschke, "Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach," Science of Computer Programming, vol. 74, pp. 470–495, 2009.
  7. M. Singh, V. Sharma, "High Level Clones Classification" International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-6, August 2013.
  8. E. Jürgens, F. Deissenboeck, and B. Hummel, " Code Similarities Beyond Copy & Paste", in proceedings of CSMR, pages 78-87, 2010.
  9. T. Kwon and Z. Su. , "Modeling high-level behavior patterns for precise similarity analysis of software", In UC Davis technical report CSE-2010-16, 2010.
  10. Nicolas Gold, Jens Krinke, Mark Harman,David Binkley, Proceedings of the 4th International Workshop on Software Clones IWSC '10, ACM, 2010
Index Terms

Computer Science
Information Sciences

Keywords

Behavioural Clones higher level clone simple clone classification of high level clones.