CFP last date
20 January 2025
Reseach Article

Implementation of HTSCCDUToLiA (Hybrid Technique for Software Cloning Code Detection using Token and Line based Approach)

by Sheetal, Rimmy Chuchra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 13
Year of Publication: 2018
Authors: Sheetal, Rimmy Chuchra
10.5120/ijca2018917789

Sheetal, Rimmy Chuchra . Implementation of HTSCCDUToLiA (Hybrid Technique for Software Cloning Code Detection using Token and Line based Approach). International Journal of Computer Applications. 182, 13 ( Sep 2018), 48-54. DOI=10.5120/ijca2018917789

@article{ 10.5120/ijca2018917789,
author = { Sheetal, Rimmy Chuchra },
title = { Implementation of HTSCCDUToLiA (Hybrid Technique for Software Cloning Code Detection using Token and Line based Approach) },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2018 },
volume = { 182 },
number = { 13 },
month = { Sep },
year = { 2018 },
issn = { 0975-8887 },
pages = { 48-54 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number13/29926-2018917789/ },
doi = { 10.5120/ijca2018917789 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:11:21.254558+05:30
%A Sheetal
%A Rimmy Chuchra
%T Implementation of HTSCCDUToLiA (Hybrid Technique for Software Cloning Code Detection using Token and Line based Approach)
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 13
%P 48-54
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The criteria or procedure of software development is going to be changing continuously by changing time. Some of the new functions may be added, modified or deleted according to the requirement of the users. Through the continues changes, the concept of software evolution is originated. These regular changes in any software during development are a very complex process. As the presence of same code more than one time is if increases then the quality of that particular software are automatically degraded. As founded by the authors in their previous study the maximum use of copy paste programming during software development may also effect on some other factors as an example software maintainability, software reusability, software performance, maintenance cost and overall software performance. The presence of code clones makes the software maintenance extremely difficult. So, to detect software clones during the development of any software or after the development of that particular software is a mandatory or priority for any software developer. Code clones identification thus becomes extremely necessary for improving the maintenance, reusability, performance and in other words, you may say for improving the overall quality of any software. Several studies show that about 5% to 20% of software systems can contain duplicated code even without doing little or minor modifications. As I studied in my journey of research there are various types of techniques are available in the software industry which are used for software clone detection viz. Token based Approach, Line based Approach, Lexical based Approach, Program Dependency Method, Abstract Syntax Tree based Method, Text Based Method and Metric Based Method. Every technique has following different criteria for detecting different type of clone viz. Type 0, Type 1, Type 2, Type 3 and Type 4.Everytype of software clone lies in own distinct software class so that can be described with different definitions as an example Type 0 performs exact cloning, Type 1 clone is used to detect identical copies except comments, Type 2 clone is used to detect some of the user defined names as like literal names and function names, Type 3 clone is used to detect added, deleted or interchanged lines and Type 4 Clone is used to detect unintentional or un-knowingly presence of similar code or in other words some software developers say auto-generated code which is too difficult to detect. This research paper has focused on to detect and eliminate the software code clones that are present in any software more than one time. I proposed a new methodology which is termed as “A Hybrid Technique for software code clone detection by using Token Based and Line Based Approach” (HTSCCDUToLiA) whose main purpose is to detect different types of clones viz. Type 0, Type 1 and Type 2 clones etc. This newly designed methodology working is based on two different types of software cloning approaches viz. Line based Approach and Token Based Approach. This new designed hybrid method will produce more efficient results than already existing techniques. The major objective of this paper is to remove redundant code or free space which is covered by the comment lines especially. The main significance to propose this hybrid technique is to automatic detection of different software code clones within minimum duration of time. Different parameters are considered for software code clone detection in different tables as an example size of code, type of clone, efficiency and portability etc. In addition, at the last the percentage of code clone detection is also calculated by utilizing a different comparison parameter. In addition, the major benefit to design this new hybrid technique is to save software developer time, computer memory space as well as developer effort. By utilizing this new designed methodology the amount of code clones under a specific project or specific application can be easily reduced or removed up to some extent that will ultimately increases the overall performance of the software. In this way, this new designed methodology, in future will helpful for producing more consistent or more efficient results. And hence, the different software parameters viz. software reusability, software maintenance, software performance and overall software quality can be easily improved and easily managed.

References
  1. Jahid Ali and Gurwinder Singh, September 2017. A Novel Composite Approach for Software Clone Detection, International Journal of Computer Applications.
  2. Sandeep Bali and Sumesh Sood, ,May-June 2017. A Composition of Clone Detection Technique: - A Hybrid Approach, International Journal of Emerging trends & Technology in Computer Science.
  3. Gurwinder Sigh and Jahid Ali, 2017.Study and analysis of Object oriented Languages Using Hybrid Clone Detection Technique”, Advances in Computational Sciences & Technology, Research India Publications.
  4. Sreenivasa Reddy and Syed MohdFazalulHaque, July 2017. XSCDF: - Towards a Framework for Comprehensive Software Clone Detection & Visualization Using Ontology, International Journal of Latest Technology in Engineering and Management & Applied Science.
  5. FazalulHaque& Syed Mohd, March-April 2017. Generic Code Cloning Method for Detection of Clone Code in Software Development, International Journal of Computer Engineering and Technology.
  6. Heejo Lee and Hakjoo Oh,2017. A Scalable Approach for Vulnerable Code Clone Discovery, IEEE Symposium on Security & Privacy, Korea University, Korea.
  7. Sukhpreet Kaur and Manpreet Kaur, April-June 2017. Code Clone Detection Using Metrics based Technique & Classification Using Neural Network, International Journal of Research in Electronics and Computer Engineering.
  8. Nguyen H.A, September-October 2017.Clone Management for Evolving Software, IEEE transactions on software engineering.
  9. Zibran M.F. and Roy C. K., 2016. Conflict-aware optimal scheduling of prioritized code clone refactoring, IET Software.
  10. Meena Bharti and Rajan Goyal, December 2014 Software Cloning & its detection methods.
  11. K. Rainer,F. Raimar, F. Pierre, 2006. Clone Detection Using Abstract Syntax Suffix Trees, Working Conference on Reverse Engineering.
  12. H. Yoshiki, U. Yasushi, 2011. Incremental Code Clone Detection: A PDG-based Approach, IEEE18th Working Conference on Reverse Engineering.
  13. M. Hiroaki, H. Keisuke, 2012. Folding Repeated Instructions for Improving Token-based Code Clone Detection, 2012.IEEE 12th International Working Conference on Source Code Analysis and Manipulation, Trento.
Index Terms

Computer Science
Information Sciences

Keywords

Line Based Approach Token based Approach Hybrid Technique Time Space Software Developer Lines of Code (LOC) Types of clone clone percentage Software Cloning Input File Efficiency and Portability.