CFP last date
20 May 2024
Reseach Article

Code Clones Detection in Websites using Hybrid Approach

by Rubala Sivakumar, Kodhai.e
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 13
Year of Publication: 2012
Authors: Rubala Sivakumar, Kodhai.e
10.5120/7409-0402

Rubala Sivakumar, Kodhai.e . Code Clones Detection in Websites using Hybrid Approach. International Journal of Computer Applications. 48, 13 ( June 2012), 23-27. DOI=10.5120/7409-0402

@article{ 10.5120/7409-0402,
author = { Rubala Sivakumar, Kodhai.e },
title = { Code Clones Detection in Websites using Hybrid Approach },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 13 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number13/7409-0402/ },
doi = { 10.5120/7409-0402 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:43:59.069319+05:30
%A Rubala Sivakumar
%A Kodhai.e
%T Code Clones Detection in Websites using Hybrid Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 13
%P 23-27
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Code Clone is a pathological form of software reuse because of its effects on the maintenance of large software systems. Probably the existing web applications use a mixture of Designing page and scripting language code as the front-end to business services. Analogously to traditional applications, redundant code is introduced by copy-and-paste practices called 'Code Clones'. This paper proposes the detection of all types of clones by identifying cloned functions within scripting code of web applications using Hybrid approach with the combination of textual and metric analysis. Various metrics had been formulated and their values were utilized during the detection process. Compared to the other approaches, this method is considered to be the least complex and is to provide a most accurate and efficient way of Clone Detection. The results obtained had been compared with an existing tool for the open source of web applications.

References
  1. Kodhai. E, Kanmani. S, Kamatchi. A, Radhika. R, Detection of Type-1 and Type-2 Clone Using Textual Analysis and Metrics in ITC,2010.
  2. Antoniol, G. , Villano, U. , Merlo, E. and Di Penta, M. Analyzing cloning evolution in the Linuxkernel. Information and Software Technology 2002, 44(13). 755–765.
  3. Antoniol, G. , Casazza, G. , Di Penta, M. and Merlo, E. Modeling Clones Evolution Through Time Series. in International Conference on Software Maintenance, (Florence, Italy, 2001). 273-280.
  4. Balazinska, M. , Merlo, E. , Dagenais, M. , Lague, B and Kontogiannis, K. Measuring Clone Based Reengineering Opportunities. in Sixth IEEE International Symposium on Software Metrics, (Boca Raton, USA, 1999). 292-303.
  5. Boldyreff, C. and Kewish, R. Reverse Engineering to Achieve Maintainable WWW Sites. in EightWorking Conference on Reverse Engineering (WCRE'01), (Stuttgart, Germany, 2001). 249-257.
  6. Fioravanti, F. , Migliarase, G. and Nesi, P. Reengineering Analysis of Object-Oriented Systems via Duplication Analysis. in International Conference on Software Engineering, (Florence, Italy, 2001); 577-590.
  7. Baker, B. S. On Finding Duplication and Near-Duplication in Large Software Systems. in Second Working Conference on Reverse Engineering, (Toronto, Canada, 1995). 86-95.
  8. Balazinska, M. , Merlo, E. , Dagenais, M. , Lague, B. and Kontogiannis, K. Partial Redesign of Java Software Systems Based on Clone Analysis. in Sixth Working Conference on Reverse Engineering, (Atlanta, USA, 1999). 326-336.
  9. Carpenter, B (Ed. ). Architectural Principles of the Internet. RFC 1958, June 1996.
  10. Johnson, J. H. Substring Matching for Clone Detection and Change Tracking. in Proceedings International Conference on Software Maintenance, (Victoria, Canada, 1994). 120-126.
  11. Johnson, J. H. Identifying Redundancy in Source Code using Fingerprints. in CAS Conference. (Toronto, Canada, 1993). 171–183.
  12. Berners-Lee, T. Principles of Design. 1998, last change: January2002.
  13. http://www. w3. org/DesignIssues/Principles. html
  14. Baxter, I. D. , Yahin, A. , Moura, L. , Santa Anna, M. and Bier, L. Clone Detection Using Abstract Syntax Trees. in International Conference on Software Maintenance, (Washington DC, USA, 1998). 368-377.
  15. Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. In Proc. of the Product Focused Software Process Improvement Int'l Conference,pages 220{233, 2004.
  16. Kamiya, T. , Kusumoto, S. and Inoue, K. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE Transactions On Software Engineering 2002, 28(7). 654–670.
  17. S. Bellon, R. Koschke, G. Antoniol, J. Krinke and E. Merlo, Comparison and Evolution of Clone Detection Tools IEEE TSE, 33(9):577-591, 2007
  18. F. V. Rysselberghe and S. Demeyer, Evaluating Clone Detection Techniques. In ELISA, 12pp. , 2003.
  19. Rainer Koschke, Raimar Falke, Pierre FrenZel, Clone Detection Usimg Abstract Syntax Suffix Trees- Working Conference on Reverse Engineering 2006.
  20. Xcent,QuickAuction. Available:http://www. xcent. com/products/QuickAuction. htm [Access éd January 2004].
  21. Snitz Forums 2000, Product Specifications and Downloads. Available:http://forum. snitz. com/spec. asp [Accessed January 2004].
  22. Web Wiz Guide, Web Wiz Forums Downloads. Available: http://www. webwizguide. info/web_wiz_forums/forum_download. asp [Accessed January 2004].
Index Terms

Computer Science
Information Sciences

Keywords

Clone Detection Code Duplication Functional Clones Hybrid Approach Refactoring And Web Applications