A Novel Method of Clone Detection by Neural Networks
Article Main Content
Code clone is that type of engine that helps to find duplicate code patterns find within the whole code. Programmers usually adopt code reusability task from previous few years, so that time consumption can be reduces. Code reusability can be done via replication or by just copy-paste. Code reusability leads to not writing code from scratch, just copy paste the useful part of the code. In finding of duplicated code fragment or text, plagiarism detection also work pretty well but it is not applicable to the large system in finding functional clone and also it is more time consuming even at small scale which make the detection method inappropriate. In this paper, we proposed a pattern similarity conditions on the basis of textual similarity for finding the code or text clones in the large content on the basis of SVM, Neural Network using Java coding, Neural Network and Sim Cad. This approach detects code or text clones from original one. The resultant simulation is taken place in the MATLAB environment, and it has shown that it is providing better results. The proposed algorithm performance is measured using parameters i.e. FRR, FAR and Accuracy.
References
-
Roy, C., Cordy, J., (2007), “A Survey on Software Clone Detection Research”, Technical Report 2007-541, Queen’s University at Kingston Ontario, Canada, p. 115.
Google Scholar
1
-
Koschke, R., (2007), “Survey of research on software clones, in: Duplication, Redundancy, and Similarity in Software,” Dagstuhl Seminar Proceedings, p. 24.
Google Scholar
2
-
Kitchenham, B., Charters, S., (2007), “Guidelines for performing systematic literature reviews in software engineering.” Technical Report EBSE-2007-01, School of Computer Science and Mathematics, Keele University, Keele and Department of Computer Science, University of Durham, Durham, UK, p. 65.
Google Scholar
3
-
Antoniol, G., Cassaza, G., Penta, M., Merlo (2001), Modeling clones evolution through time series, in: Proceedings of the 17th International Conference on Software Maintenance (ICSM ’01), pp. 273–280.
Google Scholar
4
-
Bellon, S., et.al. (2007), Comparison and evaluation of clone detection tools. IEEE Transactions on Software Engineering vol33(9), pp. 577-591.
Google Scholar
5
-
Komondoor, R., and Horwitz, S., (2001), "Using slicing to identify duplication in source code."In International Static Analysis Symposium, pp. 40-56. Springer Berlin Heidelberg.
Google Scholar
6
-
Toshihiro, K., Kusumoto, S., and Inoue, K., (2002), "CCFinder: a multilinguistic token-based code clone detection system for large scale source code." IEEE Transactions on Software Engineering 28, no. 7, pp. 654- 670.
Google Scholar
7
-
Roy, C.K., Cordy, J.,and Koschke, R., (2009), "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach." Science of Computer Programming 74, no. 7, pp. 470-495.
Google Scholar
8
-
Garg, V., Srivastava, A., and Mishra, A., (2013) "Obscuring Mobile Agents by Source Code Obfuscation." International Journal of Computer Applications 61, no. 9.
Google Scholar
9
-
Kodhai, E., and Kanmani, S., (2013), "Method-Level code clone modification using refactoring techniques for clone maintenance." Advanced Computing 4, no. 2 (2013): 7.
Google Scholar
10
-
Rattan, D., Bhatia, R., and Singh, M., (2013), "Software clone detection: A systematic review." Information and Software Technology 55, no. 7, pp. 1165-1199.
Google Scholar
11
-
Bansal, G., and Tekchandani, R., (2014), "Selecting a set of appropriate metrics for detecting code clones."In Contemporary Computing (IC3), 2014 Seventh International Conference on, pp. 484-488. IEEE.
Google Scholar
12
-
Goda, G., and Damodaram, A., (2014), "An efficient software clone detection system based on the textual comparison of dynamic methods and metrics computation." International Journal of Computer Applications 86, no. 6.
Google Scholar
13
-
Wagner, S., Abdulkhaleq, A., Bogicevic, I., Ostberg, J., and Ramadani, J., (2016), "How are functionally similar code clones syntactically different? An empirical study and a benchmark." PeerJ Computer Science 2: e49.
Google Scholar
14
-
Göde, N., and Koschke, R., (2009), "Incremental clone detection."In Software Maintenance and Reengineering, 2009.CSMR'09. 13th European Conference on, pp. 219-228. IEEE.
Google Scholar
15
-
Zhenmin, L., Lu, S., Myagmar, S., and Zhou, Y., (2006), "CP-Miner: Finding copy-paste and related bugs in large- scale software code." IEEE Transactions on software Engineering 32, no. 3, pp. 176-192.
Google Scholar
16
-
Koschke, Rainer, RaimarFalke, and Pierre Frenzel. Clone detection using abstract syntax suffix trees. In Reverse Engineering, 2006.WCRE'06. 13th Working Conference on, pp. 253-262. IEEE, 2006.
Google Scholar
17
-
Yang, Y., and Guo, Y., (2012), "Boreas: an accurate and scalable token-based approach to code clone detection." In Automated Software Engineering (ASE), 2012 Proceedings of the 27th IEEE/ACM International Conference on, pp. 286-289. IEEE.
Google Scholar
18
-
Gabel, M., Jiang, L., and Su, Z., (2008), "Scalable detection of semantic clones."In Software Engineering, 2008.ICSE'08. ACM/IEEE 30th International Conference on, pp. 321-330. IEEE.
Google Scholar
19
-
Cory, K., and Godfrey, M., (2006), "" Cloning considered harmful" considered harmful." In Reverse Engineering, 2006.WCRE'06. 13th Working Conference on, pp. 19-28. IEEE.
Google Scholar
20
-
Denis, K., Koskinen, J., Sakkinen, M., and Markkula, J., (2010), "Exploratory analysis of the relations between code cloning and open source software quality." In Quality of Information and Communications Technology (QUATIC), 2010 Seventh International Conference on the, pp. 358-363. IEEE.
Google Scholar
21
-
Kim, M., Sazawal, V., Notkin, D., and Murphy, M., (2005), "An empirical study of code clone genealogies." In ACM SIGSOFT Software Engineering Notes, vol. 30, no. 5, pp. 187-196.ACM.
Google Scholar
22
-
Kim, H., Jung, Y., Kim, S., and Yi, K., (2011), "MeCC: memory comparison-based clone detector." In Software Engineering (ICSE), 2011 33rd International Conference on, pp. 301-310.IEEE.
Google Scholar
23
-
Mubarak, A., and Sulaiman, S., (2014), "A hybrid technique in pre-processing and transformation process for code clone detection." In Software Engineering Conference (MySEC), 2014 8th Malaysian, pp. 102-107.IEEE.
Google Scholar
24
-
Bari, M.A., and Ahamad, S., (2011), "Code Cloning: The Analysis, Detection and Removal." International Journal of Computer Applications 20, no. 7: 34-38.
Google Scholar
25
Most read articles by the same author(s)
-
Chetanpal Singh,
Rahul Thakkar,
Jatinder Warraich,
IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations , European Journal of Engineering and Technology Research: Vol. 8 No. 4 (2023) -
Chetanpal Singh,
Rahul Thakkar,
Jatinder Warraich,
Blockchain in Supply Chain Management , European Journal of Engineering and Technology Research: Vol. 7 No. 5 (2022) -
Chetanpal Singh,
Machine Learning in Pattern Recognition , European Journal of Engineering and Technology Research: Vol. 8 No. 2 (2023) -
Chetanpal Singh,
Medical Imaging using Deep Learning Models , European Journal of Engineering and Technology Research: Vol. 6 No. 5 (2021) -
Jatinder Warraich,
Chetanpal Singh,
Prem Thapa,
Blockchain-based Intelligent Monitored Security System for Detection of Replication Attack in the Wireless Healthcare Network , European Journal of Engineering and Technology Research: Vol. 6 No. 6 (2021)