A Novel Technique to Detect Semantic Clones

Size: px
Start display at page:

Download "A Novel Technique to Detect Semantic Clones"

Transcription

1 A Novel Technique to Detect Semantic Clones Nirpjeet Kaur #1, Sumeet Kaur Sehra *2, Diana Nagpal #3 IT Dept. Guru Nanak Dev Engineering College Ludhiana, India Abstract Existing research shows there are more than 5-10% [1] of code clone exists in the normal program, which is often source of bug in most cases and is very difficult to detect without several test cases. Though several automated refactoring tools exists but it fails to tell the number of place where the refactoring is necessary. Many code clone detection techniques have been employed to remove syntactic clones but less research is geared towards finding semantic clones most because of its lower payoff though the error cheeped because of semantic clones are almost invisible even to most experienced programmer. This paper proposes a technique that may be employed to automatically detect semantic clones. Keywords Code Clone, Syntactic Clone, Semantic Clone, Abstract Syntax Tree, Graph. I. INTRODUCTION Evolution of systems have grown in tremendous place. Earlier most systems were manually operated but now most of them are automated and network connected. Couple of decade ago there were barely any software in industries and business houses but today any industry has ten million mines of software, they are rolling compute farm outfitted with ten, dozen, even hundreds of processors that not only talk to each other but are also talking to outside world. As company strive to deliver higher quality products they really struggle with the complexity of the system and how to put them together today. Upwards of forty percent [20][23] are their engineering efforts are being spent on soft wares. Industry are taking on the challenges that organization face from this rising complexity. Most of business houses uses solutions for system and software engineering to simplify the complex design process and break it down to smaller manageable pieces and then to distribute these pieces to their engineering team which resides around the world part of them is the ability to real time capability to audit and trace the information through these complex system to design smarter product with a road map that helps them avoid the challenges of the complexity they face these days. One of the major problem faced by software engineering is duplicate code also known as code clone. Code clones [3],[4],[5],[6] are small snippets of codes that are placed in different location of a module. They arises commonly when a software application is under augmentation for some time or by sloppy design and ill structure of the code. Code clones creates difficulty when modifying the application because finding issues and modifying codes needs to be done at different locations. Hence giving rise to maintenance costs and may cause unfavorable system crash and untraceable bugs leading to project failure and reputation degradation. There are several reason [9][10][11] for code clone to exist: 1. Copying and pasting of code Usually caused when a fragment of code is working properly and similar functionality is required at another part of the program 2. Plagiarism Where a piece of code is used reengineered or used without permission. 3. Generated Code RAD Tools generate fragments of code that are used to reduce project development time. Code Smell is a known problem and is as old as the universe of programming itself. There are various types of code smell, but the focus of this paper is based on special type of code smell namely, code duplication. Code Duplication is an unwanted effect which usually arises when different parts of code in the same project are similar. Refactoring is considered one of the effective way to counter code delicacy. But there are several problems associated with Code Refactoring and they are: ISSN: Page 56

2 1. It is hard to find the area where refactoring is required 2. Refactoring may break existing working code 3. Bug introduced while refactoring is difficult to find 4. Only applicable when test cases are ready But one may break the existing code while refactoring hence, refactoring should be only considered when some functionality is to be added in the existing code and it is hard to implement the functionality or modify them, then refactor. One should take extreme precaution when test cases are not present while refactoring, since without refactoring it is hard to know whether the code has been broken after refactoring or not. II. CODE CATEGORIZATION Various kinds of code clone exists in software life cycle these code clone can be put down as: A. Syntactic Clone [8][12][13] Syntactic code clone measures the closeness and similarity between different pieces of codes. It is partitioned in three types: Type I - Is a type of syntactic clone where clone group have exact same code, character by character except difference in whitespace and comments. Type II-Is a type of syntactic clone that is built on top of Type A and in addition to it the type name or variable name may be different. Type III -Is a type of syntactic clone that is built on top of Type B and in addition to it may have some new statements or maybe some statements are missing from the original.. B. Semantic Clone Semantic type clones deals with meaning of the code and not the syntax. III. BACKGROUND All paragraphs must be indented. All paragraphs must be justified, i.e. both left-justified and rightjustified. A. Text Based Techniques These techniques considers a program to be sequence of characters and compares raw text without regard to any specific language constructs. [12], proposed a novel technique where each character of bounded segment of the code with rest pieces of code without taking spaces and comments into account using a simple loop. The advantages of these types of technique lies in the fact that they are easy to implement and little to no code transformation is required. [16], used differential file comparison algorithm also coined as DIFF algorithm. In this algorithm source code normalization is required by removing whitespaces and comments followed by determining equivalence class of a file with the lines of another and then finding longest common subsequence and then on match and then weeding out spurious sequences also called jackpots. Techniq ues TABLE 1 COMPARISON OF RESULTS OF DIFF AND OTHER TOOLS Appearance (in Time New Roman or Times) Comparison Total Total No. of No. of clones detected Lines DIFF Source DIFF Destination Other Source Other Destination The table shows DIFF superiority over other clone detection tools as there were only 14 clones present in their test cases. And other tool shows inaccuracy while detecting clones. B. Token Based Techniques [8,12,13,21,22] Is much like lexical analyser that breaks program up into tokens and then move sliding window across the token stream looking for similar sequences. [18], proposed program slicing method by at first finding all global variable followed by searching for variables in various program sections such as function, loop etc. and tagging each of these tokens and at last slicing every section based on local and global constructs. They repeated this process till each of the tokens are tagged and sliced and then they merged their result set and marked clones present in their test files. They claim these technique is not only faster than other techniques present in different text based tools but also perform this classification with better accuracy. ISSN: Page 57

3 Block diagram of their token-clone detecting software is given below: terms of actual programs structural meaning. The disadvantages of using these types of techniques is that it is much slower than Token based techniques. [2][7] Produced abstract syntax suffix trees to detect clones present in test cases. Though their technique works well on all syntactic types but is mainly geared towards finding syntax based clones or Type III clones. Their algorithm comprises of following steps 1) Parse the Code in test cases 2) Generate Abstract suffix trees 3) Serialize Abstract suffix trees 4) Apply suffix tree detection 5) Finally, decomposing tokens into syntactic units Figure 1: Token-Clone Detection using Program Slicing [17], proposed a scalable technique for token based clone detection in this method they used cosine similarity function on a count matrix. At first they constructed a matrix by partitioning different tokens present in the program based on their vicinity. Then using the cosine similarity to reconstruct the matrix. On using this technique clones are grouped together. The cosine similarity function is given below:.advantage of this technique over text based technique is that it can safely ignore text present in string literals of any code segment. But is slower than text based techniques. C. Syntax Based Techniques Works similar to a parser. The source is parsed at first and then a tree representation is built from it and then sub-trees are compared against each other. Advantage now we don t get weird clones that include the end of one method and the first two line of another method. They break across the method boundary because it doesn t make much sense in Figure 2: Example of Suffix trees IV. METHODOLOGY The multiplicity of complexity in semantic clones are many higher than any existing semantic clone in the code. It is difficult to detect and remove and is often ignored though it reflects sloppy design and major source of internal inconsistency in interrelated systems. Builds program dependence graph [14][15][19] which is a typical compiler internal representation. Lot of program structures are abstracted away for maintaining the meaning and so it is obviously difficult to detect similarity in structure if most fragments are abstracted but of course maintaining a meaning and also have a better chance of detecting these similar meaning but having different syntax. The disadvantage is that it slowest of all the techniques because sub graph are matched instead of sub trees and graph are computationally more expensive than tree structures. ISSN: Page 58

4 This research at first creates two language and then graph are generated from their program codes further this graph are divided into n different sub graphs and each sub graphs are compared against each other based on their degree of similarity, the conclusion is drawn about the presence of semantic code clone. Graph_Compare(s,G): 1. Initialise (Q=Empty,V=subGraph(starts_with( # ))); 2. Foreach v [v]:= Unvisited ; ; d[v]:= ; d[s]:= 0; end foreach Foreach v Figure 3 Clone detection Three randomly selected test cases are selected, compared and represented in Figure 3. In the first test cases, which was very rudimentary and had 7 actual clone, all the 7 clones were detected correctly. But in more complex program the error percentage was still below 30. ; d[v]:= d[u]+1; End if End for 6. For T i = (V, π[x], x) End for 7. ⁰Sim = Compare_Nodes_SubGraph(V i,v j ) 8. Return (V,T, ⁰Sim) V. CONCLUSIONS The clone detection were applied on two semantically different languages and few test cases were generated to demonstrate the capability of the algorithm. Figure 4: Error Percentage VI. FUTURE SCOPE The time and space complexity of the algorithm used is of the order: Time Complexity: C 1 n+ C 2 deg(u) (u V) = O(n+m), where n=n(v), m=n(e) Space Complexity: O( n+m) This research work used Adjacency matrix as a data structure to store data in the algorithm to reduce program complexity. But Adjacency list can be used to in place of Adjacency matrix to improve space complexity. To improve time complexity or performance, some other data structures can be investigated. ISSN: Page 59

5 ACKNOWLEDGMENT I express my gratitude to Prof. Sumeet Kaur Sehra for their aspiring guidance, invaluably constructive criticism and advice during this research work. I am also grateful to Prof. Diana Nagpal for sharing her technical views on a number of issues related to this research. REFERENCES [1] Yingnong Dang, Song Ge, Ray Huang and dongmei Zhang. Honululu,"Code Clone Detection Experience at Microsoft", ACM, 23 May 2011, Microsoft Research Asia. [2] R. V. Patil, Madhuri Lole, Ruchira Kudale, Rajani Konde, S. D. Joshi and V. Khanna. Pune,"Code Clone Detection Technique Using Weighted Graph and CFG.", s.n., 16 March 2014, Proceedings of 4th IRF International conference [3] Ritesh V. Patil, S. D. Joshi and V. Khanna. 9, Chennai,"Code Clone Detection using Decentralized Architecture and Parallel Processing- Latest Short Revie", s.n., September 2014, International Journal of Advanced Research in Computer Science and Software Engineering, Vol X. [4] Kodhai.E, Perumal.A and Kanmani.S. 1, Puducherry,'"Clone Detection using Textual and Metric Analysis to figure out all Types of Clones", IJCCIS, July 2010, International Journal of Computer communication and Information System, Vol [5] Jiyong Jang, Maverick Woo and David Brumley. San Francisco,"ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions", IEEE Xplore, May 2012, Institute of Electricals and Electronics Engineers, pp , [6] Hosam AlHakami, Feng Chen and Helge Janicke. 4, Leicester."An Extended Stable Marriage Problem Algorithm for Clone Detection.", IJSEA, July 2014, Internation Journal of Software Engineering & Application, Vol. 5. [7] Rainer Koschke, Raimar Falke and Pierre Frenzel. [ed.] IEEE Xplore. Benevento,"Clone Detection Using Abstract Syntax Suffix Trees", IEEE, October 2006, Institute of Electrical and Electronics Engineers, pp [8] Horwitz, Randy Smith and Suzan.," Detecting and Measuring Similarity in Code Clones",June [9] Raemaekers, Steven. Amsterdam,"Testing Semantic Clone Detection Candidates", Digital Academic Repository of the University of Amsterdam, [10] Kamino: Dynamic Approach to Semantic Code Clone Detection. Neubauer, Lindsay Anne. s.l.: Columbia University, 2014, Columbia University Computer Science Technical Reports. CUCS PDCA12-70 data sheet, Opto Speed SA, Mezzovico, Switzerland. [11] Yue Jia, David Binkley, Mark Harman, Jens Krinke and Makoto Matsushita. London:,"KClone: A Proposed Approach to Fast Precise Code Clone Detection. ",The UCL Department of Computer Science, August 2010.J. Padhye, V. Firoiu, and D. Towsley, A stochastic model of TCP Reno congestion avoidance and control, Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep , [12] A qualitative approach. Chanchal K. Roy, James R. Cordy and Rainer Kosche. 7, Canada:,"Comparison and Evaluation of Code Clone Detection Techniques and tools",science Direct, May 2009, Science of Computer Programming, Vol. 74, pp [13] Heejung Kim, Yungbum Jung, Sunghun Kim and Kwankeun Yi. [ed.] IEEE Xplore. Honolulu:,"MeCC: Memory Comparison-based Clone Detector",IEEE, 21 May 2011, Institute of Electrical and Electronics Engineers, pp [14] Cordy, Chanchal K. Roy and James R. [ed.] IEEE Xplore. Amsterdam:,"Scenario-Based Comparison of Clone Detection Techniques",IEEE, June 2008, Program Comprehension, ICPC The 16th IEEE International Conference on, pp [15] Rothermel, Alessandro Orso and Gregg. [ed.] FOSE Atlanta:,"Software Testing: A Research Travelogue ( )",ACM Digital Library, 2014, Proceedings of the 36th IEEE and ACM SIGSOFT International Conference on Software Engineering (ICSE 2014), pp [16] Rowyda Mohammed Abd El-Aziz, Amal Elsayed Aboutabl and Mostafa-Sami Mostafa. 8, Cairo:,"Clone Detection Using DIFF Algorithm for Aspect Mining",IJACSA, 2012, International Journal of Advanced Computer Science and Applications, Vol. 3. [17] Guo, Yang Yuan and Yao,"Boreas: An Accurate and Scalable Token- Based Approach to Code Clone Detection", [ed.] IEEE Xplore. Essen: IEEE, 3-7 September 2012, Automated Software Engineering (ASE), 2012 Proceedings of the 27th IEEE/ACM International Conference, pp [18] Shilpa, Rajnish Kumar and Prof. 4, Chandigarh:,"Token based clone detection using program slicing",ijcta, International Journal of Computer Technology & Application, Vol [19] Florida: University of Central Florida, "JSCTracker: A Tool and Algorithm for Semantic Method Clone Detection Using Method IOE- Behavior",15 October 2012, Technical Article, p. 16. [20] Tekchandani, Kanika Raheja and Rajkumar. 5, Patiala,"An Emerging Approach towards Code Clone Detection: Metric Based Approach on Byte Code", IJARCSSE, May 2013, International Journal of Advanced Research in Computer Science and Software Engineering, Vol X. [21] Singh, Girija Gupta and Indu. 9, Sirsa,"A Novel Approach towards Code Clone Detection and Redesigning", IJARCSSE, September 2013, International Journal of Advanced Research in Computer Science and Software Engineering, Vol X. [22] Bakr Al-Batran, Bernhard Schätz and Benjamin Hummel. [ed.] Springer. Wellington,"Semantic Clone Detection for Model-Based Development of Embedded Systems", Springer Berlin Heidelberg, 16 October 2011, 14th International Conference, MODELS 2011, Wellington, New Zealand, October 16-21, Proceedings, Vol. 6981, pp [23] Beverly, MA,"Highly Configurable and Extensible Code Clone Detection. IEEE, [ed.]", Reverse Engineering (WCRE), th Working Conference, October 2010, Institute of Electrical and Electronics Engineers, pp Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std , ISSN: Page 60

Token based clone detection using program slicing

Token based clone detection using program slicing Token based clone detection using program slicing Rajnish Kumar PEC University of Technology Rajnish_pawar90@yahoo.com Prof. Shilpa PEC University of Technology Shilpaverma.pec@gmail.com Abstract Software

More information

A Weighted Layered Approach for Code Clone Detection

A Weighted Layered Approach for Code Clone Detection Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Dr. Sushil Garg Professor, Dept. of Computer Science & Applications, College City, India

Dr. Sushil Garg Professor, Dept. of Computer Science & Applications, College City, India Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Study of Different

More information

Keywords Clone detection, metrics computation, hybrid approach, complexity, byte code

Keywords Clone detection, metrics computation, hybrid approach, complexity, byte code Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging Approach

More information

Cross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes

Cross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes Cross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes 1 K. Vidhya, 2 N. Sumathi, 3 D. Ramya, 1, 2 Assistant Professor 3 PG Student, Dept.

More information

Keywords Code cloning, Clone detection, Software metrics, Potential clones, Clone pairs, Clone classes. Fig. 1 Code with clones

Keywords Code cloning, Clone detection, Software metrics, Potential clones, Clone pairs, Clone classes. Fig. 1 Code with clones Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detection of Potential

More information

The goal of this project is to enhance the identification of code duplication which can result in high cost reductions for a minimal price.

The goal of this project is to enhance the identification of code duplication which can result in high cost reductions for a minimal price. Code Duplication New Proposal Dolores Zage, Wayne Zage Ball State University June 1, 2017 July 31, 2018 Long Term Goals The goal of this project is to enhance the identification of code duplication which

More information

A Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique

A Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique A Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique 1 Syed MohdFazalulHaque, 2 Dr. V Srikanth, 3 Dr. E. Sreenivasa Reddy 1 Maulana Azad National Urdu University, 2 Professor,

More information

To Enhance Type 4 Clone Detection in Clone Testing Swati Sharma #1, Priyanka Mehta #2 1 M.Tech Scholar,

To Enhance Type 4 Clone Detection in Clone Testing Swati Sharma #1, Priyanka Mehta #2 1 M.Tech Scholar, To Enhance Type 4 Clone Detection in Clone Testing Swati Sharma #1, Priyanka Mehta #2 1 M.Tech Scholar, 2 Head of Department, Department of Computer Science & Engineering, Universal Institute of Engineering

More information

Code duplication in Software Systems: A Survey

Code duplication in Software Systems: A Survey Code duplication in Software Systems: A Survey G. Anil kumar 1 Dr. C.R.K.Reddy 2 Dr. A. Govardhan 3 A. Ratna Raju 4 1,4 MGIT, Dept. of Computer science, Hyderabad, India Email: anilgkumar@mgit.ac.in, ratnaraju@mgit.ac.in

More information

Detection of Non Continguous Clones in Software using Program Slicing

Detection of Non Continguous Clones in Software using Program Slicing Detection of Non Continguous Clones in Software using Program Slicing Er. Richa Grover 1 Er. Narender Rana 2 M.Tech in CSE 1 Astt. Proff. In C.S.E 2 GITM, Kurukshetra University, INDIA Abstract Code duplication

More information

An Effective Approach for Detecting Code Clones

An Effective Approach for Detecting Code Clones An Effective Approach for Detecting Code Clones Girija Gupta #1, Indu Singh *2 # M.Tech Student( CSE) JCD College of Engineering, Affiliated to Guru Jambheshwar University,Hisar,India * Assistant Professor(

More information

ISSN: (PRINT) ISSN: (ONLINE)

ISSN: (PRINT) ISSN: (ONLINE) IJRECE VOL. 5 ISSUE 2 APR.-JUNE. 217 ISSN: 2393-928 (PRINT) ISSN: 2348-2281 (ONLINE) Code Clone Detection Using Metrics Based Technique and Classification using Neural Network Sukhpreet Kaur 1, Prof. Manpreet

More information

Sample IJAETMAS Paper for A4 Page Size

Sample IJAETMAS Paper for A4 Page Size Sample IJAETMAS Paper for A4 Page Size 1st author name 1, 2 nd author name 2, 3 rd author name 3 ¹Department & university, Country ²Department & university, Country ³Department & university, Country 1

More information

Clone Detection using Textual and Metric Analysis to figure out all Types of Clones

Clone Detection using Textual and Metric Analysis to figure out all Types of Clones Detection using Textual and Metric Analysis to figure out all Types of s Kodhai.E 1, Perumal.A 2, and Kanmani.S 3 1 SMVEC, Dept. of Information Technology, Puducherry, India Email: kodhaiej@yahoo.co.in

More information

Software Clone Detection. Kevin Tang Mar. 29, 2012

Software Clone Detection. Kevin Tang Mar. 29, 2012 Software Clone Detection Kevin Tang Mar. 29, 2012 Software Clone Detection Introduction Reasons for Code Duplication Drawbacks of Code Duplication Clone Definitions in the Literature Detection Techniques

More information

A Measurement of Similarity to Identify Identical Code Clones

A Measurement of Similarity to Identify Identical Code Clones The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 735 A Measurement of Similarity to Identify Identical Code Clones Mythili ShanmughaSundaram and Sarala Subramani Department

More information

DCC / ICEx / UFMG. Software Code Clone. Eduardo Figueiredo.

DCC / ICEx / UFMG. Software Code Clone. Eduardo Figueiredo. DCC / ICEx / UFMG Software Code Clone Eduardo Figueiredo http://www.dcc.ufmg.br/~figueiredo Code Clone Code Clone, also called Duplicated Code, is a well known code smell in software systems Code clones

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18,   ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, www.ijcea.com ISSN 2321-3469 SECURE DATA DEDUPLICATION FOR CLOUD STORAGE: A SURVEY Vidya Kurtadikar

More information

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING Pardeep kaur 1 and Er. Rupinder Singh 2 1 Research Scholar, Dept. of Computer Science and Engineering, Chandigarh University, Gharuan, India (Email: Pardeepdharni664@gmail.com)

More information

Design Code Clone Detection System uses Optimal and Intelligence Technique based on Software Engineering

Design Code Clone Detection System uses Optimal and Intelligence Technique based on Software Engineering Volume 8, No. 5, May-June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design Code Clone Detection System uses

More information

Rochester Institute of Technology. Making personalized education scalable using Sequence Alignment Algorithm

Rochester Institute of Technology. Making personalized education scalable using Sequence Alignment Algorithm Rochester Institute of Technology Making personalized education scalable using Sequence Alignment Algorithm Submitted by: Lakhan Bhojwani Advisor: Dr. Carlos Rivero 1 1. Abstract There are many ways proposed

More information

Impact of Dependency Graph in Software Testing

Impact of Dependency Graph in Software Testing Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,

More information

Accuracy Enhancement in Code Clone Detection Using Advance Normalization

Accuracy Enhancement in Code Clone Detection Using Advance Normalization Accuracy Enhancement in Code Clone Detection Using Advance Normalization 1 Ritesh V. Patil, 2 S. D. Joshi, 3 Digvijay A. Ajagekar, 4 Priyanka A. Shirke, 5 Vivek P. Talekar, 6 Shubham D. Bankar 1 Research

More information

Study and Analysis of Object-Oriented Languages using Hybrid Clone Detection Technique

Study and Analysis of Object-Oriented Languages using Hybrid Clone Detection Technique Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 6 (2017) pp. 1635-1649 Research India Publications http://www.ripublication.com Study and Analysis of Object-Oriented

More information

An Exploratory Study on Interface Similarities in Code Clones

An Exploratory Study on Interface Similarities in Code Clones 1 st WETSoDA, December 4, 2017 - Nanjing, China An Exploratory Study on Interface Similarities in Code Clones Md Rakib Hossain Misu, Abdus Satter, Kazi Sakib Institute of Information Technology University

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

Software Clone Detection Using Cosine Distance Similarity

Software Clone Detection Using Cosine Distance Similarity Software Clone Detection Using Cosine Distance Similarity A Dissertation SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF DEGREE OF MASTER OF TECHNOLOGY IN COMPUTER SCIENCE & ENGINEERING

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017 RESEARCH ARTICLE OPEN ACCESS Handling Anomalies in the System Design: A Unique Methodology and Solution Pratik Rajan Bhore [1], Dr. Shashank D. Joshi [2], Dr. Naveenkumar Jayakumar [3] Department of Computer

More information

좋은 발표란 무엇인가? 정영범 서울대학교 5th ROSAEC Workshop 2011년 1월 6일 목요일

좋은 발표란 무엇인가? 정영범 서울대학교 5th ROSAEC Workshop 2011년 1월 6일 목요일 5th ROSAEC Workshop ! " # $ Static Analysis of Multi-Staged Programs via Unstaging Translation Wontae Choi Baris Aktemur Kwangkeun Yi Seoul National University, Korea UIUC, USA & Ozyegin University,

More information

On Refactoring for Open Source Java Program

On Refactoring for Open Source Java Program On Refactoring for Open Source Java Program Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1, Katsuro Inoue 1 and Yoshio Kataoka 3 1 Graduate School of Information Science and Technology, Osaka University

More information

DETERMINE COHESION AND COUPLING FOR CLASS DIAGRAM THROUGH SLICING TECHNIQUES

DETERMINE COHESION AND COUPLING FOR CLASS DIAGRAM THROUGH SLICING TECHNIQUES IJACE: Volume 4, No. 1, January-June 2012, pp. 19-24 DETERMINE COHESION AND COUPLING FOR CLASS DIAGRAM THROUGH SLICING TECHNIQUES Akhilesh Kumar 1* & Sunint Kaur Khalsa 1 Abstract: High cohesion or module

More information

Detection and Behavior Identification of Higher-Level Clones in Software

Detection and Behavior Identification of Higher-Level Clones in Software Detection and Behavior Identification of Higher-Level Clones in Software Swarupa S. Bongale, Prof. K. B. Manwade D. Y. Patil College of Engg. & Tech., Shivaji University Kolhapur, India Ashokrao Mane Group

More information

COMPARISON AND EVALUATION ON METRICS

COMPARISON AND EVALUATION ON METRICS COMPARISON AND EVALUATION ON METRICS BASED APPROACH FOR DETECTING CODE CLONE D. Gayathri Devi 1 1 Department of Computer Science, Karpagam University, Coimbatore, Tamilnadu dgayadevi@gmail.com Abstract

More information

Similarities in Source Codes

Similarities in Source Codes Similarities in Source Codes Marek ROŠTÁR* Slovak University of Technology in Bratislava Faculty of Informatics and Information Technologies Ilkovičova 2, 842 16 Bratislava, Slovakia rostarmarek@gmail.com

More information

SourcererCC -- Scaling Code Clone Detection to Big-Code

SourcererCC -- Scaling Code Clone Detection to Big-Code SourcererCC -- Scaling Code Clone Detection to Big-Code What did this paper do? SourcererCC a token-based clone detector, that can detect both exact and near-miss clones from large inter project repositories

More information

A Hybrid Unsupervised Web Data Extraction using Trinity and NLP

A Hybrid Unsupervised Web Data Extraction using Trinity and NLP IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 02 July 2015 ISSN (online): 2349-6010 A Hybrid Unsupervised Web Data Extraction using Trinity and NLP Anju R

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 213 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Code Reusability

More information

IJRIM Volume 2, Issue 2 (February 2012) (ISSN )

IJRIM Volume 2, Issue 2 (February 2012) (ISSN ) AN ENHANCED APPROACH TO OPTIMIZE WEB SEARCH BASED ON PROVENANCE USING FUZZY EQUIVALENCE RELATION BY LEMMATIZATION Divya* Tanvi Gupta* ABSTRACT In this paper, the focus is on one of the pre-processing technique

More information

Lecture 25 Clone Detection CCFinder. EE 382V Spring 2009 Software Evolution - Instructor Miryung Kim

Lecture 25 Clone Detection CCFinder. EE 382V Spring 2009 Software Evolution - Instructor Miryung Kim Lecture 25 Clone Detection CCFinder Today s Agenda (1) Recap of Polymetric Views Class Presentation Suchitra (advocate) Reza (skeptic) Today s Agenda (2) CCFinder, Kamiya et al. TSE 2002 Recap of Polymetric

More information

Keywords Repository, Retrieval, Component, Reusability, Query.

Keywords Repository, Retrieval, Component, Reusability, Query. Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Search

More information

Abstract Syntax Tree Generation using Modified Grammar for Source Code Plagiarism Detection

Abstract Syntax Tree Generation using Modified Grammar for Source Code Plagiarism Detection Abstract Syntax Tree Generation using Modified Grammar for Source Code Plagiarism Detection 1 Resmi N.G., 2 Soman K.P. 1 CEN, Amrita Vishwa Vidyapeetham, Coimbatore, Tamilnadu, India 2 CEN, Amrita Vishwa

More information

Text Data Pre-processing and Dimensionality Reduction Techniques for Document Clustering

Text Data Pre-processing and Dimensionality Reduction Techniques for Document Clustering Text Data Pre-processing and Dimensionality Reduction Techniques for Document Clustering A. Anil Kumar Dept of CSE Sri Sivani College of Engineering Srikakulam, India S.Chandrasekhar Dept of CSE Sri Sivani

More information

Rearranging the Order of Program Statements for Code Clone Detection

Rearranging the Order of Program Statements for Code Clone Detection Rearranging the Order of Program Statements for Code Clone Detection Yusuke Sabi, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University, Japan Email: {y-sabi,higo,kusumoto@ist.osaka-u.ac.jp

More information

Refactoring Support Based on Code Clone Analysis

Refactoring Support Based on Code Clone Analysis Refactoring Support Based on Code Clone Analysis Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1 and Katsuro Inoue 1 1 Graduate School of Information Science and Technology, Osaka University, Toyonaka,

More information

Code Duplication++ Status Report Dolores Zage, Wayne Zage, Nathan White Ball State University November 2018

Code Duplication++ Status Report Dolores Zage, Wayne Zage, Nathan White Ball State University November 2018 Code Duplication++ Status Report Dolores Zage, Wayne Zage, Nathan White Ball State University November 2018 Long Term Goals The goal of this project is to enhance the identification of code duplication

More information

. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research). International Journal of Emerging Technologies in Computational

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 2, Mar-Apr 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 2, Mar-Apr 2015 RESEARCH ARTICLE Code Clone Detection and Analysis Using Software Metrics and Neural Network-A Literature Review Balwinder Kumar [1], Dr. Satwinder Singh [2] Department of Computer Science Engineering

More information

Incremental K-means Clustering Algorithms: A Review

Incremental K-means Clustering Algorithms: A Review Incremental K-means Clustering Algorithms: A Review Amit Yadav Department of Computer Science Engineering Prof. Gambhir Singh H.R.Institute of Engineering and Technology, Ghaziabad Abstract: Clustering

More information

DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code

DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code Junaid Akram (Member, IEEE), Zhendong Shi, Majid Mumtaz and Luo Ping State Key Laboratory of Information Security,

More information

INFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATA

INFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,

More information

Reverse Software Engineering Using UML tools Jalak Vora 1 Ravi Zala 2

Reverse Software Engineering Using UML tools Jalak Vora 1 Ravi Zala 2 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Reverse Software Engineering Using UML tools Jalak Vora 1 Ravi Zala 2 1, 2 Department

More information

Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014)

Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014) Electronic Communications of the EASST Volume 63 (2014) Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014) Toward a Code-Clone Search through the Entire Lifecycle Position

More information

International Journal of Scientific & Engineering Research, Volume 8, Issue 2, February ISSN

International Journal of Scientific & Engineering Research, Volume 8, Issue 2, February ISSN International Journal of Scientific & Engineering Research, Volume 8, Issue 2, February-2017 164 DETECTION OF SOFTWARE REFACTORABILITY THROUGH SOFTWARE CLONES WITH DIFFRENT ALGORITHMS Ritika Rani 1,Pooja

More information

Natural Language to Database Interface

Natural Language to Database Interface Natural Language to Database Interface Aarti Sawant 1, Pooja Lambate 2, A. S. Zore 1 Information Technology, University of Pune, Marathwada Mitra Mandal Institute Of Technology. Pune, Maharashtra, India

More information

Demonstration of Software for Optimizing Machine Critical Programs by Call Graph Generator

Demonstration of Software for Optimizing Machine Critical Programs by Call Graph Generator International Journal of Computer (IJC) ISSN 2307-4531 http://gssrr.org/index.php?journal=internationaljournalofcomputer&page=index Demonstration of Software for Optimizing Machine Critical Programs by

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) CONTEXT SENSITIVE TEXT SUMMARIZATION USING HIERARCHICAL CLUSTERING ALGORITHM

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) CONTEXT SENSITIVE TEXT SUMMARIZATION USING HIERARCHICAL CLUSTERING ALGORITHM INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & 6367(Print), ISSN 0976 6375(Online) Volume 3, Issue 1, January- June (2012), TECHNOLOGY (IJCET) IAEME ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume

More information

1/30/18. Overview. Code Clones. Code Clone Categorization. Code Clones. Code Clone Categorization. Key Points of Code Clones

1/30/18. Overview. Code Clones. Code Clone Categorization. Code Clones. Code Clone Categorization. Key Points of Code Clones Overview Code Clones Definition and categories Clone detection Clone removal refactoring Spiros Mancoridis[1] Modified by Na Meng 2 Code Clones Code clone is a code fragment in source files that is identical

More information

Identification of File and Directory Level Near-Miss Clones For Higher Level Cloning Sonam Gupta, Vishwachi

Identification of File and Directory Level Near-Miss Clones For Higher Level Cloning Sonam Gupta, Vishwachi International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-8 Identification of File and Directory Level Near-Miss Clones For Higher Level Cloning Sonam Gupta,

More information

Automatic Identification of Important Clones for Refactoring and Tracking

Automatic Identification of Important Clones for Refactoring and Tracking Automatic Identification of Important Clones for Refactoring and Tracking Manishankar Mondal Chanchal K. Roy Kevin A. Schneider Department of Computer Science, University of Saskatchewan, Canada {mshankar.mondal,

More information

Semantic Clone Detection Using Machine Learning

Semantic Clone Detection Using Machine Learning Semantic Clone Detection Using Machine Learning Abdullah Sheneamer University of Colorado Colorado Springs, CO USA 80918 Email: asheneam@uccs.edu Jugal Kalita University of Colorado Colorado Springs, CO

More information

2014, IJARCSSE All Rights Reserved Page 303

2014, IJARCSSE All Rights Reserved Page 303 Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Software

More information

A Technique to Detect Multi-grained Code Clones

A Technique to Detect Multi-grained Code Clones Detection Time The Number of Detectable Clones A Technique to Detect Multi-grained Code Clones Yusuke Yuki, Yoshiki Higo, and Shinji Kusumoto Graduate School of Information Science and Technology, Osaka

More information

A Tree Kernel Based Approach for Clone Detection

A Tree Kernel Based Approach for Clone Detection A Tree Kernel Based Approach for Clone Detection Anna Corazza 1, Sergio Di Martino 1, Valerio Maggio 1, Giuseppe Scanniello 2 1) University of Naples Federico II 2) University of Basilicata Outline Background

More information

An innovative approach towards Virtual Pen with real-time OCR feature

An innovative approach towards Virtual Pen with real-time OCR feature An innovative approach towards Virtual Pen with real-time OCR feature Mr. Goraknath A. Nagargoje 1, Prof. Anil L. Wanare 2 Dept of E&TC 1 1 Assistant Professor in E&TC Dept. 12 Dr D.Y.Patil School Of Engineering,Pune

More information

JSCTracker: A Semantic Clone Detection Tool for Java Code Rochelle Elva and Gary T. Leavens

JSCTracker: A Semantic Clone Detection Tool for Java Code Rochelle Elva and Gary T. Leavens JSCTracker: A Semantic Clone Detection Tool for Java Code Rochelle Elva and Gary T. Leavens CS-TR-12-04 March 2012 Keywords: semantic clone detection, input-output behavior, effects, IOE behavior, Java

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Software Clone Detection and Refactoring

Software Clone Detection and Refactoring Software Clone Detection and Refactoring Francesca Arcelli Fontana *, Marco Zanoni *, Andrea Ranchetti * and Davide Ranchetti * * University of Milano-Bicocca, Viale Sarca, 336, 20126 Milano, Italy, {arcelli,marco.zanoni}@disco.unimib.it,

More information

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless

More information

A STUDY OF BNP PARALLEL TASK SCHEDULING ALGORITHMS METRIC S FOR DISTRIBUTED DATABASE SYSTEM Manik Sharma 1, Dr. Gurdev Singh 2 and Harsimran Kaur 3

A STUDY OF BNP PARALLEL TASK SCHEDULING ALGORITHMS METRIC S FOR DISTRIBUTED DATABASE SYSTEM Manik Sharma 1, Dr. Gurdev Singh 2 and Harsimran Kaur 3 A STUDY OF BNP PARALLEL TASK SCHEDULING ALGORITHMS METRIC S FOR DISTRIBUTED DATABASE SYSTEM Manik Sharma 1, Dr. Gurdev Singh 2 and Harsimran Kaur 3 1 Assistant Professor & Head, Department of Computer

More information

Efficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment

Efficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8, August 216 17 Efficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment Puneet

More information

CODE CLONE DETECTION A NEW APPROACH. - Sanjeev Chakraborty

CODE CLONE DETECTION A NEW APPROACH. - Sanjeev Chakraborty CODE CLONE DETECTION A NEW APPROACH - Sanjeev Chakraborty ` CONTENTS Need of Research...3 1. Abstract...4 2. Introduction...4 3. Related Works...5 4. Methodology...5 5. Experimental Set-Up...6 6. Implementation...6

More information

An Approach to Detect Clones in Class Diagram Based on Suffix Array

An Approach to Detect Clones in Class Diagram Based on Suffix Array An Approach to Detect Clones in Class Diagram Based on Suffix Array Amandeep Kaur, Computer Science and Engg. Department, BBSBEC Fatehgarh Sahib, Punjab, India. Manpreet Kaur, Computer Science and Engg.

More information

A Survey of Software Clone Detection Techniques

A Survey of Software Clone Detection Techniques A Survey of Software Detection Techniques Abdullah Sheneamer Department of Computer Science University of Colorado at Colo. Springs, USA Colorado Springs, USA asheneam@uccs.edu Jugal Kalita Department

More information

Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler

Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler Rakesh Kumar 1, Dr. Vishnu Shrivastava 2 1 P.hD. Scholar ECE Department, Vivekanand Global University,

More information

Cost Minimization by QR Code Compression

Cost Minimization by QR Code Compression Cost Minimization by QR Code Compression Sharu Goel #1, Ajay Kumar Singh *2 #1 M. Tech Student & CSE Deptt., Meerut Institute of Engineering and Technology, Baghpat Bypass Road, NH- 58, Meerut, UPTU, (India)

More information

Towards the Code Clone Analysis in Heterogeneous Software Products

Towards the Code Clone Analysis in Heterogeneous Software Products Towards the Code Clone Analysis in Heterogeneous Software Products 11 TIJANA VISLAVSKI, ZORAN BUDIMAC AND GORDANA RAKIĆ, University of Novi Sad Code clones are parts of source code that were usually created

More information

Comparison of FP tree and Apriori Algorithm

Comparison of FP tree and Apriori Algorithm International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.78-82 Comparison of FP tree and Apriori Algorithm Prashasti

More information

White Box Testing with Object Oriented programming

White Box Testing with Object Oriented programming White Box Testing with Object Oriented programming Mrs.Randive R.B 1, Mrs.Bansode S.Y 2 1,2 TPCT S College Of Engineering,Osmanabad Abstract:-Software testing is one of the best means to affirm the quality

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Directory Structure and File Allocation Methods

Directory Structure and File Allocation Methods ISSN:0975-9646 Mandeep Kaur et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2), 2016, 577-582 Directory Structure and ile Allocation Methods Mandeep Kaur,

More information

Analyzing Working of FP-Growth Algorithm for Frequent Pattern Mining

Analyzing Working of FP-Growth Algorithm for Frequent Pattern Mining International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 4, Issue 4, 2017, PP 22-30 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) DOI: http://dx.doi.org/10.20431/2349-4859.0404003

More information

Code Clone Detector: A Hybrid Approach on Java Byte Code

Code Clone Detector: A Hybrid Approach on Java Byte Code Code Clone Detector: A Hybrid Approach on Java Byte Code Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering in Software Engineering Submitted By

More information

Searching for Configurations in Clone Evaluation A Replication Study

Searching for Configurations in Clone Evaluation A Replication Study Searching for Configurations in Clone Evaluation A Replication Study Chaiyong Ragkhitwetsagul 1, Matheus Paixao 1, Manal Adham 1 Saheed Busari 1, Jens Krinke 1 and John H. Drake 2 1 University College

More information

TEXT PREPROCESSING FOR TEXT MINING USING SIDE INFORMATION

TEXT PREPROCESSING FOR TEXT MINING USING SIDE INFORMATION TEXT PREPROCESSING FOR TEXT MINING USING SIDE INFORMATION Ms. Nikita P.Katariya 1, Prof. M. S. Chaudhari 2 1 Dept. of Computer Science & Engg, P.B.C.E., Nagpur, India, nikitakatariya@yahoo.com 2 Dept.

More information

A Review on Cache Memory with Multiprocessor System

A Review on Cache Memory with Multiprocessor System A Review on Cache Memory with Multiprocessor System Chirag R. Patel 1, Rajesh H. Davda 2 1,2 Computer Engineering Department, C. U. Shah College of Engineering & Technology, Wadhwan (Gujarat) Abstract

More information

A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHINE LEARNING AND DATA MINING

A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHINE LEARNING AND DATA MINING A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHINE LEARNING AND DATA MINING Prof. KhushaliDeulkar 1, Jai Kapoor 2, Priya Gaud 3, Harshal Gala 4 Department Of Computer Engineering

More information

Keywords Data alignment, Data annotation, Web database, Search Result Record

Keywords Data alignment, Data annotation, Web database, Search Result Record Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web

More information

2IS55 Software Evolution. Code duplication. Alexander Serebrenik

2IS55 Software Evolution. Code duplication. Alexander Serebrenik 2IS55 Software Evolution Code duplication Alexander Serebrenik Assignments Assignment 2: Graded Assignment 3: Today 23:59. Assignment 4 already open. Code duplication Deadline: March 30, 2011, 23:59. /

More information

Enhancing Program Dependency Graph Based Clone Detection Using Approximate Subgraph Matching

Enhancing Program Dependency Graph Based Clone Detection Using Approximate Subgraph Matching Enhancing Program Dependency Graph Based Clone Detection Using Approximate Subgraph Matching A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF THE DEGREE OF MASTER OF

More information

A System of Image Matching and 3D Reconstruction

A System of Image Matching and 3D Reconstruction A System of Image Matching and 3D Reconstruction CS231A Project Report 1. Introduction Xianfeng Rui Given thousands of unordered images of photos with a variety of scenes in your gallery, you will find

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:

More information

A Novel Technique for Retrieving Source Code Duplication

A Novel Technique for Retrieving Source Code Duplication A Novel Technique for Retrieving Source Code Duplication Yoshihisa Udagawa Computer Science Department, Faculty of Engineering Tokyo Polytechnic University Atsugi-city, Kanagawa, Japan udagawa@cs.t-kougei.ac.jp

More information

Rate Based Pacing with Various TCP Variants

Rate Based Pacing with Various TCP Variants International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,

More information

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2

A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 A Survey Of Different Text Mining Techniques Varsha C. Pande 1 and Dr. A.S. Khandelwal 2 1 Department of Electronics & Comp. Sc, RTMNU, Nagpur, India 2 Department of Computer Science, Hislop College, Nagpur,

More information

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University

More information

An Improved Document Clustering Approach Using Weighted K-Means Algorithm

An Improved Document Clustering Approach Using Weighted K-Means Algorithm An Improved Document Clustering Approach Using Weighted K-Means Algorithm 1 Megha Mandloi; 2 Abhay Kothari 1 Computer Science, AITR, Indore, M.P. Pin 453771, India 2 Computer Science, AITR, Indore, M.P.

More information

Object-Oriented Analysis and Design Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology-Kharagpur

Object-Oriented Analysis and Design Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology-Kharagpur Object-Oriented Analysis and Design Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology-Kharagpur Lecture 06 Object-Oriented Analysis and Design Welcome

More information

Clone Detection and Maintenance with AI Techniques. Na Meng Virginia Tech

Clone Detection and Maintenance with AI Techniques. Na Meng Virginia Tech Clone Detection and Maintenance with AI Techniques Na Meng Virginia Tech Code Clones Developers copy and paste code to improve programming productivity Clone detections tools are needed to help bug fixes

More information

ENTROPY ENCODERS: HUFFMAN CODING AND ARITHMETIC CODING 1

ENTROPY ENCODERS: HUFFMAN CODING AND ARITHMETIC CODING 1 ENTROPY ENCODERS: HUFFMAN CODING AND ARITHMETIC CODING 1 Ketki R. Jadhav, 2 Jayshree R. Pansare 1,2 Department of Computer Engineering, M.E.S. College of Engineering, Pune, India Abstract Today, there

More information