A Novel Technique to Detect Semantic Clones
|
|
- Philippa King
- 5 years ago
- Views:
Transcription
1 A Novel Technique to Detect Semantic Clones Nirpjeet Kaur #1, Sumeet Kaur Sehra *2, Diana Nagpal #3 IT Dept. Guru Nanak Dev Engineering College Ludhiana, India Abstract Existing research shows there are more than 5-10% [1] of code clone exists in the normal program, which is often source of bug in most cases and is very difficult to detect without several test cases. Though several automated refactoring tools exists but it fails to tell the number of place where the refactoring is necessary. Many code clone detection techniques have been employed to remove syntactic clones but less research is geared towards finding semantic clones most because of its lower payoff though the error cheeped because of semantic clones are almost invisible even to most experienced programmer. This paper proposes a technique that may be employed to automatically detect semantic clones. Keywords Code Clone, Syntactic Clone, Semantic Clone, Abstract Syntax Tree, Graph. I. INTRODUCTION Evolution of systems have grown in tremendous place. Earlier most systems were manually operated but now most of them are automated and network connected. Couple of decade ago there were barely any software in industries and business houses but today any industry has ten million mines of software, they are rolling compute farm outfitted with ten, dozen, even hundreds of processors that not only talk to each other but are also talking to outside world. As company strive to deliver higher quality products they really struggle with the complexity of the system and how to put them together today. Upwards of forty percent [20][23] are their engineering efforts are being spent on soft wares. Industry are taking on the challenges that organization face from this rising complexity. Most of business houses uses solutions for system and software engineering to simplify the complex design process and break it down to smaller manageable pieces and then to distribute these pieces to their engineering team which resides around the world part of them is the ability to real time capability to audit and trace the information through these complex system to design smarter product with a road map that helps them avoid the challenges of the complexity they face these days. One of the major problem faced by software engineering is duplicate code also known as code clone. Code clones [3],[4],[5],[6] are small snippets of codes that are placed in different location of a module. They arises commonly when a software application is under augmentation for some time or by sloppy design and ill structure of the code. Code clones creates difficulty when modifying the application because finding issues and modifying codes needs to be done at different locations. Hence giving rise to maintenance costs and may cause unfavorable system crash and untraceable bugs leading to project failure and reputation degradation. There are several reason [9][10][11] for code clone to exist: 1. Copying and pasting of code Usually caused when a fragment of code is working properly and similar functionality is required at another part of the program 2. Plagiarism Where a piece of code is used reengineered or used without permission. 3. Generated Code RAD Tools generate fragments of code that are used to reduce project development time. Code Smell is a known problem and is as old as the universe of programming itself. There are various types of code smell, but the focus of this paper is based on special type of code smell namely, code duplication. Code Duplication is an unwanted effect which usually arises when different parts of code in the same project are similar. Refactoring is considered one of the effective way to counter code delicacy. But there are several problems associated with Code Refactoring and they are: ISSN: Page 56
2 1. It is hard to find the area where refactoring is required 2. Refactoring may break existing working code 3. Bug introduced while refactoring is difficult to find 4. Only applicable when test cases are ready But one may break the existing code while refactoring hence, refactoring should be only considered when some functionality is to be added in the existing code and it is hard to implement the functionality or modify them, then refactor. One should take extreme precaution when test cases are not present while refactoring, since without refactoring it is hard to know whether the code has been broken after refactoring or not. II. CODE CATEGORIZATION Various kinds of code clone exists in software life cycle these code clone can be put down as: A. Syntactic Clone [8][12][13] Syntactic code clone measures the closeness and similarity between different pieces of codes. It is partitioned in three types: Type I - Is a type of syntactic clone where clone group have exact same code, character by character except difference in whitespace and comments. Type II-Is a type of syntactic clone that is built on top of Type A and in addition to it the type name or variable name may be different. Type III -Is a type of syntactic clone that is built on top of Type B and in addition to it may have some new statements or maybe some statements are missing from the original.. B. Semantic Clone Semantic type clones deals with meaning of the code and not the syntax. III. BACKGROUND All paragraphs must be indented. All paragraphs must be justified, i.e. both left-justified and rightjustified. A. Text Based Techniques These techniques considers a program to be sequence of characters and compares raw text without regard to any specific language constructs. [12], proposed a novel technique where each character of bounded segment of the code with rest pieces of code without taking spaces and comments into account using a simple loop. The advantages of these types of technique lies in the fact that they are easy to implement and little to no code transformation is required. [16], used differential file comparison algorithm also coined as DIFF algorithm. In this algorithm source code normalization is required by removing whitespaces and comments followed by determining equivalence class of a file with the lines of another and then finding longest common subsequence and then on match and then weeding out spurious sequences also called jackpots. Techniq ues TABLE 1 COMPARISON OF RESULTS OF DIFF AND OTHER TOOLS Appearance (in Time New Roman or Times) Comparison Total Total No. of No. of clones detected Lines DIFF Source DIFF Destination Other Source Other Destination The table shows DIFF superiority over other clone detection tools as there were only 14 clones present in their test cases. And other tool shows inaccuracy while detecting clones. B. Token Based Techniques [8,12,13,21,22] Is much like lexical analyser that breaks program up into tokens and then move sliding window across the token stream looking for similar sequences. [18], proposed program slicing method by at first finding all global variable followed by searching for variables in various program sections such as function, loop etc. and tagging each of these tokens and at last slicing every section based on local and global constructs. They repeated this process till each of the tokens are tagged and sliced and then they merged their result set and marked clones present in their test files. They claim these technique is not only faster than other techniques present in different text based tools but also perform this classification with better accuracy. ISSN: Page 57
3 Block diagram of their token-clone detecting software is given below: terms of actual programs structural meaning. The disadvantages of using these types of techniques is that it is much slower than Token based techniques. [2][7] Produced abstract syntax suffix trees to detect clones present in test cases. Though their technique works well on all syntactic types but is mainly geared towards finding syntax based clones or Type III clones. Their algorithm comprises of following steps 1) Parse the Code in test cases 2) Generate Abstract suffix trees 3) Serialize Abstract suffix trees 4) Apply suffix tree detection 5) Finally, decomposing tokens into syntactic units Figure 1: Token-Clone Detection using Program Slicing [17], proposed a scalable technique for token based clone detection in this method they used cosine similarity function on a count matrix. At first they constructed a matrix by partitioning different tokens present in the program based on their vicinity. Then using the cosine similarity to reconstruct the matrix. On using this technique clones are grouped together. The cosine similarity function is given below:.advantage of this technique over text based technique is that it can safely ignore text present in string literals of any code segment. But is slower than text based techniques. C. Syntax Based Techniques Works similar to a parser. The source is parsed at first and then a tree representation is built from it and then sub-trees are compared against each other. Advantage now we don t get weird clones that include the end of one method and the first two line of another method. They break across the method boundary because it doesn t make much sense in Figure 2: Example of Suffix trees IV. METHODOLOGY The multiplicity of complexity in semantic clones are many higher than any existing semantic clone in the code. It is difficult to detect and remove and is often ignored though it reflects sloppy design and major source of internal inconsistency in interrelated systems. Builds program dependence graph [14][15][19] which is a typical compiler internal representation. Lot of program structures are abstracted away for maintaining the meaning and so it is obviously difficult to detect similarity in structure if most fragments are abstracted but of course maintaining a meaning and also have a better chance of detecting these similar meaning but having different syntax. The disadvantage is that it slowest of all the techniques because sub graph are matched instead of sub trees and graph are computationally more expensive than tree structures. ISSN: Page 58
4 This research at first creates two language and then graph are generated from their program codes further this graph are divided into n different sub graphs and each sub graphs are compared against each other based on their degree of similarity, the conclusion is drawn about the presence of semantic code clone. Graph_Compare(s,G): 1. Initialise (Q=Empty,V=subGraph(starts_with( # ))); 2. Foreach v [v]:= Unvisited ; ; d[v]:= ; d[s]:= 0; end foreach Foreach v Figure 3 Clone detection Three randomly selected test cases are selected, compared and represented in Figure 3. In the first test cases, which was very rudimentary and had 7 actual clone, all the 7 clones were detected correctly. But in more complex program the error percentage was still below 30. ; d[v]:= d[u]+1; End if End for 6. For T i = (V, π[x], x) End for 7. ⁰Sim = Compare_Nodes_SubGraph(V i,v j ) 8. Return (V,T, ⁰Sim) V. CONCLUSIONS The clone detection were applied on two semantically different languages and few test cases were generated to demonstrate the capability of the algorithm. Figure 4: Error Percentage VI. FUTURE SCOPE The time and space complexity of the algorithm used is of the order: Time Complexity: C 1 n+ C 2 deg(u) (u V) = O(n+m), where n=n(v), m=n(e) Space Complexity: O( n+m) This research work used Adjacency matrix as a data structure to store data in the algorithm to reduce program complexity. But Adjacency list can be used to in place of Adjacency matrix to improve space complexity. To improve time complexity or performance, some other data structures can be investigated. ISSN: Page 59
5 ACKNOWLEDGMENT I express my gratitude to Prof. Sumeet Kaur Sehra for their aspiring guidance, invaluably constructive criticism and advice during this research work. I am also grateful to Prof. Diana Nagpal for sharing her technical views on a number of issues related to this research. REFERENCES [1] Yingnong Dang, Song Ge, Ray Huang and dongmei Zhang. Honululu,"Code Clone Detection Experience at Microsoft", ACM, 23 May 2011, Microsoft Research Asia. [2] R. V. Patil, Madhuri Lole, Ruchira Kudale, Rajani Konde, S. D. Joshi and V. Khanna. Pune,"Code Clone Detection Technique Using Weighted Graph and CFG.", s.n., 16 March 2014, Proceedings of 4th IRF International conference [3] Ritesh V. Patil, S. D. Joshi and V. Khanna. 9, Chennai,"Code Clone Detection using Decentralized Architecture and Parallel Processing- Latest Short Revie", s.n., September 2014, International Journal of Advanced Research in Computer Science and Software Engineering, Vol X. [4] Kodhai.E, Perumal.A and Kanmani.S. 1, Puducherry,'"Clone Detection using Textual and Metric Analysis to figure out all Types of Clones", IJCCIS, July 2010, International Journal of Computer communication and Information System, Vol [5] Jiyong Jang, Maverick Woo and David Brumley. San Francisco,"ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions", IEEE Xplore, May 2012, Institute of Electricals and Electronics Engineers, pp , [6] Hosam AlHakami, Feng Chen and Helge Janicke. 4, Leicester."An Extended Stable Marriage Problem Algorithm for Clone Detection.", IJSEA, July 2014, Internation Journal of Software Engineering & Application, Vol. 5. [7] Rainer Koschke, Raimar Falke and Pierre Frenzel. [ed.] IEEE Xplore. Benevento,"Clone Detection Using Abstract Syntax Suffix Trees", IEEE, October 2006, Institute of Electrical and Electronics Engineers, pp [8] Horwitz, Randy Smith and Suzan.," Detecting and Measuring Similarity in Code Clones",June [9] Raemaekers, Steven. Amsterdam,"Testing Semantic Clone Detection Candidates", Digital Academic Repository of the University of Amsterdam, [10] Kamino: Dynamic Approach to Semantic Code Clone Detection. Neubauer, Lindsay Anne. s.l.: Columbia University, 2014, Columbia University Computer Science Technical Reports. CUCS PDCA12-70 data sheet, Opto Speed SA, Mezzovico, Switzerland. [11] Yue Jia, David Binkley, Mark Harman, Jens Krinke and Makoto Matsushita. London:,"KClone: A Proposed Approach to Fast Precise Code Clone Detection. ",The UCL Department of Computer Science, August 2010.J. Padhye, V. Firoiu, and D. Towsley, A stochastic model of TCP Reno congestion avoidance and control, Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep , [12] A qualitative approach. Chanchal K. Roy, James R. Cordy and Rainer Kosche. 7, Canada:,"Comparison and Evaluation of Code Clone Detection Techniques and tools",science Direct, May 2009, Science of Computer Programming, Vol. 74, pp [13] Heejung Kim, Yungbum Jung, Sunghun Kim and Kwankeun Yi. [ed.] IEEE Xplore. Honolulu:,"MeCC: Memory Comparison-based Clone Detector",IEEE, 21 May 2011, Institute of Electrical and Electronics Engineers, pp [14] Cordy, Chanchal K. Roy and James R. [ed.] IEEE Xplore. Amsterdam:,"Scenario-Based Comparison of Clone Detection Techniques",IEEE, June 2008, Program Comprehension, ICPC The 16th IEEE International Conference on, pp [15] Rothermel, Alessandro Orso and Gregg. [ed.] FOSE Atlanta:,"Software Testing: A Research Travelogue ( )",ACM Digital Library, 2014, Proceedings of the 36th IEEE and ACM SIGSOFT International Conference on Software Engineering (ICSE 2014), pp [16] Rowyda Mohammed Abd El-Aziz, Amal Elsayed Aboutabl and Mostafa-Sami Mostafa. 8, Cairo:,"Clone Detection Using DIFF Algorithm for Aspect Mining",IJACSA, 2012, International Journal of Advanced Computer Science and Applications, Vol. 3. [17] Guo, Yang Yuan and Yao,"Boreas: An Accurate and Scalable Token- Based Approach to Code Clone Detection", [ed.] IEEE Xplore. Essen: IEEE, 3-7 September 2012, Automated Software Engineering (ASE), 2012 Proceedings of the 27th IEEE/ACM International Conference, pp [18] Shilpa, Rajnish Kumar and Prof. 4, Chandigarh:,"Token based clone detection using program slicing",ijcta, International Journal of Computer Technology & Application, Vol [19] Florida: University of Central Florida, "JSCTracker: A Tool and Algorithm for Semantic Method Clone Detection Using Method IOE- Behavior",15 October 2012, Technical Article, p. 16. [20] Tekchandani, Kanika Raheja and Rajkumar. 5, Patiala,"An Emerging Approach towards Code Clone Detection: Metric Based Approach on Byte Code", IJARCSSE, May 2013, International Journal of Advanced Research in Computer Science and Software Engineering, Vol X. [21] Singh, Girija Gupta and Indu. 9, Sirsa,"A Novel Approach towards Code Clone Detection and Redesigning", IJARCSSE, September 2013, International Journal of Advanced Research in Computer Science and Software Engineering, Vol X. [22] Bakr Al-Batran, Bernhard Schätz and Benjamin Hummel. [ed.] Springer. Wellington,"Semantic Clone Detection for Model-Based Development of Embedded Systems", Springer Berlin Heidelberg, 16 October 2011, 14th International Conference, MODELS 2011, Wellington, New Zealand, October 16-21, Proceedings, Vol. 6981, pp [23] Beverly, MA,"Highly Configurable and Extensible Code Clone Detection. IEEE, [ed.]", Reverse Engineering (WCRE), th Working Conference, October 2010, Institute of Electrical and Electronics Engineers, pp Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std , ISSN: Page 60
Token based clone detection using program slicing
Token based clone detection using program slicing Rajnish Kumar PEC University of Technology Rajnish_pawar90@yahoo.com Prof. Shilpa PEC University of Technology Shilpaverma.pec@gmail.com Abstract Software
More informationA Weighted Layered Approach for Code Clone Detection
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationDr. Sushil Garg Professor, Dept. of Computer Science & Applications, College City, India
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Study of Different
More informationKeywords Clone detection, metrics computation, hybrid approach, complexity, byte code
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging Approach
More informationCross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes
Cross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes 1 K. Vidhya, 2 N. Sumathi, 3 D. Ramya, 1, 2 Assistant Professor 3 PG Student, Dept.
More informationKeywords Code cloning, Clone detection, Software metrics, Potential clones, Clone pairs, Clone classes. Fig. 1 Code with clones
Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detection of Potential
More informationThe goal of this project is to enhance the identification of code duplication which can result in high cost reductions for a minimal price.
Code Duplication New Proposal Dolores Zage, Wayne Zage Ball State University June 1, 2017 July 31, 2018 Long Term Goals The goal of this project is to enhance the identification of code duplication which
More informationA Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique
A Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique 1 Syed MohdFazalulHaque, 2 Dr. V Srikanth, 3 Dr. E. Sreenivasa Reddy 1 Maulana Azad National Urdu University, 2 Professor,
More informationTo Enhance Type 4 Clone Detection in Clone Testing Swati Sharma #1, Priyanka Mehta #2 1 M.Tech Scholar,
To Enhance Type 4 Clone Detection in Clone Testing Swati Sharma #1, Priyanka Mehta #2 1 M.Tech Scholar, 2 Head of Department, Department of Computer Science & Engineering, Universal Institute of Engineering
More informationCode duplication in Software Systems: A Survey
Code duplication in Software Systems: A Survey G. Anil kumar 1 Dr. C.R.K.Reddy 2 Dr. A. Govardhan 3 A. Ratna Raju 4 1,4 MGIT, Dept. of Computer science, Hyderabad, India Email: anilgkumar@mgit.ac.in, ratnaraju@mgit.ac.in
More informationDetection of Non Continguous Clones in Software using Program Slicing
Detection of Non Continguous Clones in Software using Program Slicing Er. Richa Grover 1 Er. Narender Rana 2 M.Tech in CSE 1 Astt. Proff. In C.S.E 2 GITM, Kurukshetra University, INDIA Abstract Code duplication
More informationAn Effective Approach for Detecting Code Clones
An Effective Approach for Detecting Code Clones Girija Gupta #1, Indu Singh *2 # M.Tech Student( CSE) JCD College of Engineering, Affiliated to Guru Jambheshwar University,Hisar,India * Assistant Professor(
More informationISSN: (PRINT) ISSN: (ONLINE)
IJRECE VOL. 5 ISSUE 2 APR.-JUNE. 217 ISSN: 2393-928 (PRINT) ISSN: 2348-2281 (ONLINE) Code Clone Detection Using Metrics Based Technique and Classification using Neural Network Sukhpreet Kaur 1, Prof. Manpreet
More informationSample IJAETMAS Paper for A4 Page Size
Sample IJAETMAS Paper for A4 Page Size 1st author name 1, 2 nd author name 2, 3 rd author name 3 ¹Department & university, Country ²Department & university, Country ³Department & university, Country 1
More informationClone Detection using Textual and Metric Analysis to figure out all Types of Clones
Detection using Textual and Metric Analysis to figure out all Types of s Kodhai.E 1, Perumal.A 2, and Kanmani.S 3 1 SMVEC, Dept. of Information Technology, Puducherry, India Email: kodhaiej@yahoo.co.in
More informationSoftware Clone Detection. Kevin Tang Mar. 29, 2012
Software Clone Detection Kevin Tang Mar. 29, 2012 Software Clone Detection Introduction Reasons for Code Duplication Drawbacks of Code Duplication Clone Definitions in the Literature Detection Techniques
More informationA Measurement of Similarity to Identify Identical Code Clones
The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 735 A Measurement of Similarity to Identify Identical Code Clones Mythili ShanmughaSundaram and Sarala Subramani Department
More informationDCC / ICEx / UFMG. Software Code Clone. Eduardo Figueiredo.
DCC / ICEx / UFMG Software Code Clone Eduardo Figueiredo http://www.dcc.ufmg.br/~figueiredo Code Clone Code Clone, also called Duplicated Code, is a well known code smell in software systems Code clones
More informationInternational Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, ISSN
International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, www.ijcea.com ISSN 2321-3469 SECURE DATA DEDUPLICATION FOR CLOUD STORAGE: A SURVEY Vidya Kurtadikar
More informationIMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING
IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING Pardeep kaur 1 and Er. Rupinder Singh 2 1 Research Scholar, Dept. of Computer Science and Engineering, Chandigarh University, Gharuan, India (Email: Pardeepdharni664@gmail.com)
More informationDesign Code Clone Detection System uses Optimal and Intelligence Technique based on Software Engineering
Volume 8, No. 5, May-June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design Code Clone Detection System uses
More informationRochester Institute of Technology. Making personalized education scalable using Sequence Alignment Algorithm
Rochester Institute of Technology Making personalized education scalable using Sequence Alignment Algorithm Submitted by: Lakhan Bhojwani Advisor: Dr. Carlos Rivero 1 1. Abstract There are many ways proposed
More informationImpact of Dependency Graph in Software Testing
Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,
More informationAccuracy Enhancement in Code Clone Detection Using Advance Normalization
Accuracy Enhancement in Code Clone Detection Using Advance Normalization 1 Ritesh V. Patil, 2 S. D. Joshi, 3 Digvijay A. Ajagekar, 4 Priyanka A. Shirke, 5 Vivek P. Talekar, 6 Shubham D. Bankar 1 Research
More informationStudy and Analysis of Object-Oriented Languages using Hybrid Clone Detection Technique
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 6 (2017) pp. 1635-1649 Research India Publications http://www.ripublication.com Study and Analysis of Object-Oriented
More informationAn Exploratory Study on Interface Similarities in Code Clones
1 st WETSoDA, December 4, 2017 - Nanjing, China An Exploratory Study on Interface Similarities in Code Clones Md Rakib Hossain Misu, Abdus Satter, Kazi Sakib Institute of Information Technology University
More informationChallenges in Mobile Ad Hoc Network
American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.
More informationSoftware Clone Detection Using Cosine Distance Similarity
Software Clone Detection Using Cosine Distance Similarity A Dissertation SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF DEGREE OF MASTER OF TECHNOLOGY IN COMPUTER SCIENCE & ENGINEERING
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017
RESEARCH ARTICLE OPEN ACCESS Handling Anomalies in the System Design: A Unique Methodology and Solution Pratik Rajan Bhore [1], Dr. Shashank D. Joshi [2], Dr. Naveenkumar Jayakumar [3] Department of Computer
More information좋은 발표란 무엇인가? 정영범 서울대학교 5th ROSAEC Workshop 2011년 1월 6일 목요일
5th ROSAEC Workshop ! " # $ Static Analysis of Multi-Staged Programs via Unstaging Translation Wontae Choi Baris Aktemur Kwangkeun Yi Seoul National University, Korea UIUC, USA & Ozyegin University,
More informationOn Refactoring for Open Source Java Program
On Refactoring for Open Source Java Program Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1, Katsuro Inoue 1 and Yoshio Kataoka 3 1 Graduate School of Information Science and Technology, Osaka University
More informationDETERMINE COHESION AND COUPLING FOR CLASS DIAGRAM THROUGH SLICING TECHNIQUES
IJACE: Volume 4, No. 1, January-June 2012, pp. 19-24 DETERMINE COHESION AND COUPLING FOR CLASS DIAGRAM THROUGH SLICING TECHNIQUES Akhilesh Kumar 1* & Sunint Kaur Khalsa 1 Abstract: High cohesion or module
More informationDetection and Behavior Identification of Higher-Level Clones in Software
Detection and Behavior Identification of Higher-Level Clones in Software Swarupa S. Bongale, Prof. K. B. Manwade D. Y. Patil College of Engg. & Tech., Shivaji University Kolhapur, India Ashokrao Mane Group
More informationCOMPARISON AND EVALUATION ON METRICS
COMPARISON AND EVALUATION ON METRICS BASED APPROACH FOR DETECTING CODE CLONE D. Gayathri Devi 1 1 Department of Computer Science, Karpagam University, Coimbatore, Tamilnadu dgayadevi@gmail.com Abstract
More informationSimilarities in Source Codes
Similarities in Source Codes Marek ROŠTÁR* Slovak University of Technology in Bratislava Faculty of Informatics and Information Technologies Ilkovičova 2, 842 16 Bratislava, Slovakia rostarmarek@gmail.com
More informationSourcererCC -- Scaling Code Clone Detection to Big-Code
SourcererCC -- Scaling Code Clone Detection to Big-Code What did this paper do? SourcererCC a token-based clone detector, that can detect both exact and near-miss clones from large inter project repositories
More informationA Hybrid Unsupervised Web Data Extraction using Trinity and NLP
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 02 July 2015 ISSN (online): 2349-6010 A Hybrid Unsupervised Web Data Extraction using Trinity and NLP Anju R
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 5, May 213 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Code Reusability
More informationIJRIM Volume 2, Issue 2 (February 2012) (ISSN )
AN ENHANCED APPROACH TO OPTIMIZE WEB SEARCH BASED ON PROVENANCE USING FUZZY EQUIVALENCE RELATION BY LEMMATIZATION Divya* Tanvi Gupta* ABSTRACT In this paper, the focus is on one of the pre-processing technique
More informationLecture 25 Clone Detection CCFinder. EE 382V Spring 2009 Software Evolution - Instructor Miryung Kim
Lecture 25 Clone Detection CCFinder Today s Agenda (1) Recap of Polymetric Views Class Presentation Suchitra (advocate) Reza (skeptic) Today s Agenda (2) CCFinder, Kamiya et al. TSE 2002 Recap of Polymetric
More informationKeywords Repository, Retrieval, Component, Reusability, Query.
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Search
More informationAbstract Syntax Tree Generation using Modified Grammar for Source Code Plagiarism Detection
Abstract Syntax Tree Generation using Modified Grammar for Source Code Plagiarism Detection 1 Resmi N.G., 2 Soman K.P. 1 CEN, Amrita Vishwa Vidyapeetham, Coimbatore, Tamilnadu, India 2 CEN, Amrita Vishwa
More informationText Data Pre-processing and Dimensionality Reduction Techniques for Document Clustering
Text Data Pre-processing and Dimensionality Reduction Techniques for Document Clustering A. Anil Kumar Dept of CSE Sri Sivani College of Engineering Srikakulam, India S.Chandrasekhar Dept of CSE Sri Sivani
More informationRearranging the Order of Program Statements for Code Clone Detection
Rearranging the Order of Program Statements for Code Clone Detection Yusuke Sabi, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University, Japan Email: {y-sabi,higo,kusumoto@ist.osaka-u.ac.jp
More informationRefactoring Support Based on Code Clone Analysis
Refactoring Support Based on Code Clone Analysis Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1 and Katsuro Inoue 1 1 Graduate School of Information Science and Technology, Osaka University, Toyonaka,
More informationCode Duplication++ Status Report Dolores Zage, Wayne Zage, Nathan White Ball State University November 2018
Code Duplication++ Status Report Dolores Zage, Wayne Zage, Nathan White Ball State University November 2018 Long Term Goals The goal of this project is to enhance the identification of code duplication
More information. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research). International Journal of Emerging Technologies in Computational
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 2, Mar-Apr 2015
RESEARCH ARTICLE Code Clone Detection and Analysis Using Software Metrics and Neural Network-A Literature Review Balwinder Kumar [1], Dr. Satwinder Singh [2] Department of Computer Science Engineering
More informationIncremental K-means Clustering Algorithms: A Review
Incremental K-means Clustering Algorithms: A Review Amit Yadav Department of Computer Science Engineering Prof. Gambhir Singh H.R.Institute of Engineering and Technology, Ghaziabad Abstract: Clustering
More informationDCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code Junaid Akram (Member, IEEE), Zhendong Shi, Majid Mumtaz and Luo Ping State Key Laboratory of Information Security,
More informationINFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationReverse Software Engineering Using UML tools Jalak Vora 1 Ravi Zala 2
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Reverse Software Engineering Using UML tools Jalak Vora 1 Ravi Zala 2 1, 2 Department
More informationProceedings of the Eighth International Workshop on Software Clones (IWSC 2014)
Electronic Communications of the EASST Volume 63 (2014) Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014) Toward a Code-Clone Search through the Entire Lifecycle Position
More informationInternational Journal of Scientific & Engineering Research, Volume 8, Issue 2, February ISSN
International Journal of Scientific & Engineering Research, Volume 8, Issue 2, February-2017 164 DETECTION OF SOFTWARE REFACTORABILITY THROUGH SOFTWARE CLONES WITH DIFFRENT ALGORITHMS Ritika Rani 1,Pooja
More informationNatural Language to Database Interface
Natural Language to Database Interface Aarti Sawant 1, Pooja Lambate 2, A. S. Zore 1 Information Technology, University of Pune, Marathwada Mitra Mandal Institute Of Technology. Pune, Maharashtra, India
More informationDemonstration of Software for Optimizing Machine Critical Programs by Call Graph Generator
International Journal of Computer (IJC) ISSN 2307-4531 http://gssrr.org/index.php?journal=internationaljournalofcomputer&page=index Demonstration of Software for Optimizing Machine Critical Programs by
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) CONTEXT SENSITIVE TEXT SUMMARIZATION USING HIERARCHICAL CLUSTERING ALGORITHM
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & 6367(Print), ISSN 0976 6375(Online) Volume 3, Issue 1, January- June (2012), TECHNOLOGY (IJCET) IAEME ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume
More information1/30/18. Overview. Code Clones. Code Clone Categorization. Code Clones. Code Clone Categorization. Key Points of Code Clones
Overview Code Clones Definition and categories Clone detection Clone removal refactoring Spiros Mancoridis[1] Modified by Na Meng 2 Code Clones Code clone is a code fragment in source files that is identical
More informationIdentification of File and Directory Level Near-Miss Clones For Higher Level Cloning Sonam Gupta, Vishwachi
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-8 Identification of File and Directory Level Near-Miss Clones For Higher Level Cloning Sonam Gupta,
More informationAutomatic Identification of Important Clones for Refactoring and Tracking
Automatic Identification of Important Clones for Refactoring and Tracking Manishankar Mondal Chanchal K. Roy Kevin A. Schneider Department of Computer Science, University of Saskatchewan, Canada {mshankar.mondal,
More informationSemantic Clone Detection Using Machine Learning
Semantic Clone Detection Using Machine Learning Abdullah Sheneamer University of Colorado Colorado Springs, CO USA 80918 Email: asheneam@uccs.edu Jugal Kalita University of Colorado Colorado Springs, CO
More information2014, IJARCSSE All Rights Reserved Page 303
Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Software
More informationA Technique to Detect Multi-grained Code Clones
Detection Time The Number of Detectable Clones A Technique to Detect Multi-grained Code Clones Yusuke Yuki, Yoshiki Higo, and Shinji Kusumoto Graduate School of Information Science and Technology, Osaka
More informationA Tree Kernel Based Approach for Clone Detection
A Tree Kernel Based Approach for Clone Detection Anna Corazza 1, Sergio Di Martino 1, Valerio Maggio 1, Giuseppe Scanniello 2 1) University of Naples Federico II 2) University of Basilicata Outline Background
More informationAn innovative approach towards Virtual Pen with real-time OCR feature
An innovative approach towards Virtual Pen with real-time OCR feature Mr. Goraknath A. Nagargoje 1, Prof. Anil L. Wanare 2 Dept of E&TC 1 1 Assistant Professor in E&TC Dept. 12 Dr D.Y.Patil School Of Engineering,Pune
More informationJSCTracker: A Semantic Clone Detection Tool for Java Code Rochelle Elva and Gary T. Leavens
JSCTracker: A Semantic Clone Detection Tool for Java Code Rochelle Elva and Gary T. Leavens CS-TR-12-04 March 2012 Keywords: semantic clone detection, input-output behavior, effects, IOE behavior, Java
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationSoftware Clone Detection and Refactoring
Software Clone Detection and Refactoring Francesca Arcelli Fontana *, Marco Zanoni *, Andrea Ranchetti * and Davide Ranchetti * * University of Milano-Bicocca, Viale Sarca, 336, 20126 Milano, Italy, {arcelli,marco.zanoni}@disco.unimib.it,
More informationAnalysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator
Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless
More informationA STUDY OF BNP PARALLEL TASK SCHEDULING ALGORITHMS METRIC S FOR DISTRIBUTED DATABASE SYSTEM Manik Sharma 1, Dr. Gurdev Singh 2 and Harsimran Kaur 3
A STUDY OF BNP PARALLEL TASK SCHEDULING ALGORITHMS METRIC S FOR DISTRIBUTED DATABASE SYSTEM Manik Sharma 1, Dr. Gurdev Singh 2 and Harsimran Kaur 3 1 Assistant Professor & Head, Department of Computer
More informationEfficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment
IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8, August 216 17 Efficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment Puneet
More informationCODE CLONE DETECTION A NEW APPROACH. - Sanjeev Chakraborty
CODE CLONE DETECTION A NEW APPROACH - Sanjeev Chakraborty ` CONTENTS Need of Research...3 1. Abstract...4 2. Introduction...4 3. Related Works...5 4. Methodology...5 5. Experimental Set-Up...6 6. Implementation...6
More informationAn Approach to Detect Clones in Class Diagram Based on Suffix Array
An Approach to Detect Clones in Class Diagram Based on Suffix Array Amandeep Kaur, Computer Science and Engg. Department, BBSBEC Fatehgarh Sahib, Punjab, India. Manpreet Kaur, Computer Science and Engg.
More informationA Survey of Software Clone Detection Techniques
A Survey of Software Detection Techniques Abdullah Sheneamer Department of Computer Science University of Colorado at Colo. Springs, USA Colorado Springs, USA asheneam@uccs.edu Jugal Kalita Department
More informationDesign and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler
Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler Rakesh Kumar 1, Dr. Vishnu Shrivastava 2 1 P.hD. Scholar ECE Department, Vivekanand Global University,
More informationCost Minimization by QR Code Compression
Cost Minimization by QR Code Compression Sharu Goel #1, Ajay Kumar Singh *2 #1 M. Tech Student & CSE Deptt., Meerut Institute of Engineering and Technology, Baghpat Bypass Road, NH- 58, Meerut, UPTU, (India)
More informationTowards the Code Clone Analysis in Heterogeneous Software Products
Towards the Code Clone Analysis in Heterogeneous Software Products 11 TIJANA VISLAVSKI, ZORAN BUDIMAC AND GORDANA RAKIĆ, University of Novi Sad Code clones are parts of source code that were usually created
More informationComparison of FP tree and Apriori Algorithm
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.78-82 Comparison of FP tree and Apriori Algorithm Prashasti
More informationWhite Box Testing with Object Oriented programming
White Box Testing with Object Oriented programming Mrs.Randive R.B 1, Mrs.Bansode S.Y 2 1,2 TPCT S College Of Engineering,Osmanabad Abstract:-Software testing is one of the best means to affirm the quality
More informationA Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationDirectory Structure and File Allocation Methods
ISSN:0975-9646 Mandeep Kaur et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2), 2016, 577-582 Directory Structure and ile Allocation Methods Mandeep Kaur,
More informationAnalyzing Working of FP-Growth Algorithm for Frequent Pattern Mining
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 4, Issue 4, 2017, PP 22-30 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) DOI: http://dx.doi.org/10.20431/2349-4859.0404003
More informationCode Clone Detector: A Hybrid Approach on Java Byte Code
Code Clone Detector: A Hybrid Approach on Java Byte Code Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering in Software Engineering Submitted By
More informationSearching for Configurations in Clone Evaluation A Replication Study
Searching for Configurations in Clone Evaluation A Replication Study Chaiyong Ragkhitwetsagul 1, Matheus Paixao 1, Manal Adham 1 Saheed Busari 1, Jens Krinke 1 and John H. Drake 2 1 University College
More informationTEXT PREPROCESSING FOR TEXT MINING USING SIDE INFORMATION
TEXT PREPROCESSING FOR TEXT MINING USING SIDE INFORMATION Ms. Nikita P.Katariya 1, Prof. M. S. Chaudhari 2 1 Dept. of Computer Science & Engg, P.B.C.E., Nagpur, India, nikitakatariya@yahoo.com 2 Dept.
More informationA Review on Cache Memory with Multiprocessor System
A Review on Cache Memory with Multiprocessor System Chirag R. Patel 1, Rajesh H. Davda 2 1,2 Computer Engineering Department, C. U. Shah College of Engineering & Technology, Wadhwan (Gujarat) Abstract
More informationA NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHINE LEARNING AND DATA MINING
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHINE LEARNING AND DATA MINING Prof. KhushaliDeulkar 1, Jai Kapoor 2, Priya Gaud 3, Harshal Gala 4 Department Of Computer Engineering
More informationKeywords Data alignment, Data annotation, Web database, Search Result Record
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web
More information2IS55 Software Evolution. Code duplication. Alexander Serebrenik
2IS55 Software Evolution Code duplication Alexander Serebrenik Assignments Assignment 2: Graded Assignment 3: Today 23:59. Assignment 4 already open. Code duplication Deadline: March 30, 2011, 23:59. /
More informationEnhancing Program Dependency Graph Based Clone Detection Using Approximate Subgraph Matching
Enhancing Program Dependency Graph Based Clone Detection Using Approximate Subgraph Matching A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF THE DEGREE OF MASTER OF
More informationA System of Image Matching and 3D Reconstruction
A System of Image Matching and 3D Reconstruction CS231A Project Report 1. Introduction Xianfeng Rui Given thousands of unordered images of photos with a variety of scenes in your gallery, you will find
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:
More informationA Novel Technique for Retrieving Source Code Duplication
A Novel Technique for Retrieving Source Code Duplication Yoshihisa Udagawa Computer Science Department, Faculty of Engineering Tokyo Polytechnic University Atsugi-city, Kanagawa, Japan udagawa@cs.t-kougei.ac.jp
More informationRate Based Pacing with Various TCP Variants
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,
More informationA Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2
A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 1 Department of Electronics & Comp. Sc, RTMNU, Nagpur, India 2 Department of Computer Science, Hislop College, Nagpur,
More informationPerformance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack
Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University
More informationAn Improved Document Clustering Approach Using Weighted K-Means Algorithm
An Improved Document Clustering Approach Using Weighted K-Means Algorithm 1 Megha Mandloi; 2 Abhay Kothari 1 Computer Science, AITR, Indore, M.P. Pin 453771, India 2 Computer Science, AITR, Indore, M.P.
More informationObject-Oriented Analysis and Design Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology-Kharagpur
Object-Oriented Analysis and Design Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology-Kharagpur Lecture 06 Object-Oriented Analysis and Design Welcome
More informationClone Detection and Maintenance with AI Techniques. Na Meng Virginia Tech
Clone Detection and Maintenance with AI Techniques Na Meng Virginia Tech Code Clones Developers copy and paste code to improve programming productivity Clone detections tools are needed to help bug fixes
More informationENTROPY ENCODERS: HUFFMAN CODING AND ARITHMETIC CODING 1
ENTROPY ENCODERS: HUFFMAN CODING AND ARITHMETIC CODING 1 Ketki R. Jadhav, 2 Jayshree R. Pansare 1,2 Department of Computer Engineering, M.E.S. College of Engineering, Pune, India Abstract Today, there
More information