CFP last date
20 May 2024
Reseach Article

A Novel Composite Approach for Software Clone Detection

by Gurvinder Singh, Jahid Ali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 7
Year of Publication: 2015
Authors: Gurvinder Singh, Jahid Ali
10.5120/ijca2015906098

Gurvinder Singh, Jahid Ali . A Novel Composite Approach for Software Clone Detection. International Journal of Computer Applications. 126, 7 ( September 2015), 31-35. DOI=10.5120/ijca2015906098

@article{ 10.5120/ijca2015906098,
author = { Gurvinder Singh, Jahid Ali },
title = { A Novel Composite Approach for Software Clone Detection },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 7 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number7/22565-2015906098/ },
doi = { 10.5120/ijca2015906098 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:50.730926+05:30
%A Gurvinder Singh
%A Jahid Ali
%T A Novel Composite Approach for Software Clone Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 7
%P 31-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent decades, the branch of Clone Detection has undergone a great advancement. This progress is due to the development of various methods, which involves the implementation of complex algorithms and tool chains to offer clone detection. Various clone detection methods that are already available include textual comparison, token comparison, and comparison of Abstract Syntax trees, Suffix trees and Program Dependency Graphs. Moreover, these Clone Detection techniques are limited to a particular programming language environment only. The aim of the paper is to present a survey of the various existing techniques and to develop a tool which is user friendly, easy to maintain and is not limited to small and big software. This method of clone detection can also be implemented to more complex applications such as web based applications. i.e a website code related to PHP or JSP or it can be an application which is linked with internet not a standalone application. In addition to this, the proposed approach is applicable to all the languages and platforms. Hence the proposed system is a platform independent system..

References
  1. Chanchal K. Roy and James R. Cordy, “An Empirical Study of Function Clones in Open Source Software”, 1095-1350/08 $25.00 © 2008 IEEE
  2. Mark Gabel Lingxiao Jiang Zhendong Su, “Scalable Detection of Semantic Clones”, ICSE’08, May 10–18, 2008, Leipzig, Germany. Copyright 2008 ACM
  3. Chanchal K. Roy, “Detection and Analysis of Near-Miss Software Clones”, 978-1-4244-4828-9/09/$25.00 2009 IEEE
  4. Yoshiki Higo, and Shinji Kusumoto, “Enhancing Quality of Code Clone Detection with Program Dependency Graph”, 2009 IEEE
  5. Chanchal K. Roy, James R. Cordya, Rainer Koschkeb, “Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach”, Preprint submitted to Science of Computer Programming February 24, 2009
  6. Prajila Prem, “A Review on Code Clone Analysis and Code Clone Detection”, ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 12, June 2013
  7. Iman Keivanloo, Juergen Rilling, Philippe Charland, “SeClone - A Hybrid Approach to Internet-scale Real-time Code Clone Search”, 1063-6897/11 $26.00 © 2011 IEEE
  8. Hitesh Sajnani, Joel Ossher, Cristina Lopes, “Parallel Code Clone Detection Using MapReduce”, 2012 IEEE
  9. Norihiro Yoshida, Yoshiki Higo, Shinji Kusumoto, Katsuro Inoue, “An Experience Report on Analyzing Industrial Software Systems Using Code Clone Detection Techniques”, 2012 IEEE
  10. Kanika Raheja1, Raj Kumar Tekchandani2, “An Efficient Code Clone Detection Model on Java Byte Code Using Hybrid Approach”
  11. Rajkumar Tekchandani1, Rajesh Kumar Bhatia2, Maninder Singh, “Semantic Code Clone Detection Using Parse Trees and Grammar Recovery”
  12. Kanika Raheja Rajkumar Tekchandani, “An Emerging Approach towards Code Clone Detection: Metric Based Approach on Byte Code”, Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
  13. Al-Fahim Mubarak Ali, Shahida Sulaiman, “A Hybrid Technique in Pre-processing and Transformation Process for Code Clone Detection”, 2014 IEEE
  14. Robin Sharma, “Hybrid Approach for Efficient Software Clone Detection”, IRACST – Engineering Science and Technology: An International Journal (ESTIJ), ISSN: 2250-3498 Vol.3, No.2, April 2013
  15. Deepak Sethi Manisha Sehrawat Bharat Bhushan Naib, “Detection of code clones using Datasets”, Volume 2, Issue 7, July 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
  16. Gurunadha Rao Goda, Avula Damodaram, “An Efficient Software Clone Detection System based on the Textual Comparison of Dynamic Methods and Metrics Computation”, International Journal of Computer Applications (0975 – 8887) Volume 86 – No 6, January 2014
  17. T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE Transactions on Software Engineering, 28(7):654–670, July 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Clone detection Textual comparison Hybrid approach code cloning.