CFP last date
20 January 2025
Reseach Article

Implication of Clone Detection and Refactoring Techniques using Delayed Duplicate Detection Refactoring

by M. Deepika, S. Sarala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 6
Year of Publication: 2014
Authors: M. Deepika, S. Sarala
10.5120/16217-5661

M. Deepika, S. Sarala . Implication of Clone Detection and Refactoring Techniques using Delayed Duplicate Detection Refactoring. International Journal of Computer Applications. 93, 6 ( May 2014), 5-10. DOI=10.5120/16217-5661

@article{ 10.5120/16217-5661,
author = { M. Deepika, S. Sarala },
title = { Implication of Clone Detection and Refactoring Techniques using Delayed Duplicate Detection Refactoring },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 6 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 5-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number6/16217-5661/ },
doi = { 10.5120/16217-5661 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:15:05.927528+05:30
%A M. Deepika
%A S. Sarala
%T Implication of Clone Detection and Refactoring Techniques using Delayed Duplicate Detection Refactoring
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 6
%P 5-10
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Code maintenance has been increased when the similar code fragments is reduced in the software systems. Refactoring is a change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behavior based on code, the refactoring mechanism is used to discover the clone detection. The proposed algorithm insists semantic relevance between files, classes and methods towards c# applications. The delayed duplicate detection refactoring technique uses the code analyzer and semantic graph for quickly detect the duplicate files in the application. The implemented clone refactoring technique enhances the Semantic Relevance Entity Detection algorithm which provides better performance and accurate result for unifying the process of clone detection and refactoring.

References
  1. S. Sarala, M. Deepika, "Unifying Clone Analysis and Refactoring Activity towards C# Applications", Proceedings of the IEEE 4th International Conference on Computing, Communication and Methodologies, ISBN: 978-1-4799-3925-1, pp. 1-5, 2013.
  2. S. Sarala, S. Mythili, "A Language Independent Approach for Method Level Clone Detection Using Fingerprinting", International Journal of Advanced Research in Computer Science, Vol. 3, No. 2, pp. 368-371, 2012.
  3. S. Sarala, S. Mythili, "Experimental Approach of Clone Detection Techniques", Proceedings of the International Conference on Systems, Methodologies, Automation and Research Trends, pp. 1-6, 2012.
  4. S. Sarala, "Defects Detection in Imperative Language and C# Applications – Towards Evaluation Approach", Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol. I, pp. 940-944, 2008.
  5. Robert Tairas, Jeff Gray, "Increasing clone maintenance support by unifying clone detection and refactoring activities", Journal of Information and Software Technology, Elsevier Publications, Vol. 54, pp. 1297-1307, 2012.
  6. Wafa Basit, Fakhar Lodhi, "Preservation of Externally Observable Behavior after Pull Up Method Refactoring", 15th International Conference on Computer and Information Technology, pp. 309-313, 2012.
  7. Dhavleesh Rattan, Rajesh Bhatia, Maninder Singh, "Software clone detection: A systematic review", Journal of Information and Software Technology, Elsevier Publications, Vol. 55, pp. 1165-1199, 2013.
  8. Sara Dersten, Jakob Axelsson, Joakim Froberg, "An empirical study of refactoring decisions in embedded software and systems", Journal of Procedia Computer Science, Elsevier Publications, Vol. 8, pp. 279-284, 2012.
  9. Santiago A. Vidal, Claudia A. Marcos, "Building an expert system to assist system refactorization", Journal of Expert Systems with Applications, Elsevier Publications, Vol. 39, pp. 3810-3816, 2012.
  10. Aikaterini Christopoulou, E. A. Giakoumakis, Vassilis E. Zafeiris, Vasiliki Soukara, "Automated refactoring to the Strategy design pattern", Journal of Information and Software Technology, Elsevier Publications, Vol. 54, pp. 1202-1214,2012.
  11. Remco Dijkman, Beat Gfeller, Jochen Küster, Hagen Völzer, "Identifying refactoring opportunities in process model repositories", Journal of Information and Software Technology, Elsevier Publications, Vol. 53, pp. 937-948, 2011.
  12. Nikolaos Tsantalis, Alexander Chatzigeorgiou, "Identification of extract method refactoring opportunities for the decomposition of methods", The Journal of Systems and Software, Elsevier Publications, Vol. 84, pp. 1757-1782, 2011.
  13. Calin Glitia, Pierre Boulet, Eric Lenormand, Michel Barreteau, "Repetitive model refactoring strategy for the design space exploration of intensive signal processing applications", Journal of Systems Architecture, Elsevier Publications, Vol. 57, pp. 815-829, 2011.
  14. Liming Zhao, Jane Huffman Hayes, "Rank-based refactoring decision support: two studies", Journal of Innovations Syst Softw Eng, Springer Publications, Vol. 7, pp. 171-189, 2011.
  15. Minhaz F. Zibran, Chanchal K. Roy, "A Constraint Programming Approach to Conflict-aware Optimal Scheduling of Prioritized Code Clone Refactoring", 11th IEEE International Working Conference on Source Code Analysis and Manipulation, pp. 105 – 114, 2011.
  16. Abdulaziz Alkhalid, Mohammad Alshayeb, Sabri Mahmoud, "Software refactoring at the function level using new adaptive K-Nearest Neighbor algorithm", Journal of Advances in Engineering Software, Elsevier Publications, Vol. 41, pp. 1160-1178, 2010.
  17. Chanchal K. Roy, James R. Cordy, Rainer Koschke, "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach", Science of Computer Programming, Elsevier Publications, Vol. 74, pp. 470-495, 2009.
  18. Shinji Kawaguchi, Takanobu Yamashinay, Hidetake Uwano, "SHINOBI: A Tool for Automatic Code Clone Detection in the IDE", Proceedings of the 16th Working Conference on Reverse Engineering, pp. 313-314, 2009.
  19. Chien-Tsun Chen, Yu Chin Cheng, Chin-Yun Hsieh, I-Lang Wu, "Exception handling refactorings: Directed by goals and driven by bug fixing", Journal of Systems and Software, Elsevier Publications, Vol. 82, pp. 333-345 , 2009.
  20. Sang Keun Rhee, Jihye Lee, Myon-Woong Park, "Semantic relevance measure between resources based on a graph structure", Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 229–236, 2008.
  21. Ekwa Duala-Ekoko, Martin P. Robillard, "CloneTracker: Tool Support for Code Clone Management", 30th International Conference on Software Engineering, pp. 1-4, 2008.
  22. G. Anil kumar, Dr. C. R. K. Reddy, Dr. A. Govardhan, Gousiya Begum, "Code Clone Detection with Refactoring support Through Textual analysis", International Journal of Computer Trends and Technology, Vol. 2, No. 2, pp. 147-150, 2011.
  23. R. Tairas, J. Gray, I. D. Baxter, "Visualizing clone detection results", Proceedings of the 22nd IEEE/ACM international conference on Automated software engineering, pp. 549–550, 2007.
  24. P. Jablonski and D. Hou, "CReN: a tool for tracking copy-and paste code clones and renaming identifiers consistently in the ide", Proceedings of the OOPSLA workshop on eclipse technology eXchange, pp. 16–20, 2007.
  25. Z. Li, S. Lu, S. Myagmar, and Y. Zhou, "CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code", Proceedings of the Sixth Symposium on Operating Systems Design and Implementation, Vol. 6, pp. 289-302, 2004.
  26. William S. Evans, Christopher W. Fraser, Fei Ma, "Clone detection via structural abstraction", Journal of Software Qual J, Springer Science+ Business Media Publications, pp. 309-330, 2009.
  27. M. Fowler, K. Beck, J. Brant, W. Opdyke, D. Roberts, "Refactoring: Improving the Design of Existing Code", Addison Wesley, 1999.
  28. W. C. Wake, "Refactoring Workbook", Addison Wesley, 2003.
  29. T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: A Multi- Linguistic Token-based Code Clone Detection System for Large Scale Source Code", IEEE Transactions on Software Engineering, Vol. 28, No. 7, pp. 654–670, 2002.
  30. M. Musuvathi, D. Park, A. Chou, D. R. Engler, and D. L. Dill, "CMC: A pragmatic approach to model checking real code", Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, Vol. 36, pp. 75-88, 2002.
  31. Huiqing Li, Simon Thompson, "Clone Detection and Removal for Erlang/OTP within a Refactoring Environment", Proceedings of the ACM SIGPLAN workshop on Partial Evaluation and Program Manipulation, pp. 169-178, 2009.
  32. Sang Keun Rhee , Jihye Lee , Myon-woong Park, "Ontology Based Semantic Relevance Measure", Proceedings of the First International Workshop on Semantic Web and Web 2. 0 in Architectural, Product and Engineering Design, pp. 1-6, 2007.
  33. X Giro, F Marques, "Semantic Entity Detection Using Description Graphs", Proceedings of the Workshop on Image Analysis for Multimedia Application Services, pp. 1-4, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Refactoring Code clones Clone detection Parsing Source code fragments Delayed duplicate detection Abstract Syntax Tree (AST).