Code clone is that type of engine that helps to find duplicate code patterns find within the whole code. Programmers usually adopt code reusability task from previous few years, so that time consumption can be reduces. Code reusability can be done via replication or by just copy-paste. Code reusability leads to not writing code from scratch, just copy paste the useful part of the code. In finding of duplicated code fragment or text, plagiarism detection also work pretty well but it is not applicable to the large system in finding functional clone and also it is more time consuming even at small scale which make the detection method inappropriate. In this paper, we proposed a pattern similarity conditions on the basis of textual similarity for finding the code or text clones in the large content on the basis of SVM, Neural Network using Java coding, Neural Network and Sim Cad. This approach detects code or text clones from original one. The resultant simulation is taken place in the MATLAB environment, and it has shown that it is providing better results. The proposed algorithm performance is measured using parameters i.e. FRR, FAR and Accuracy.
Roy, C., Cordy, J., (2007), “A Survey on Software Clone Detection Research”, Technical Report 2007-541, Queen’s University at Kingston Ontario, Canada, p. 115.
Koschke, R., (2007), “Survey of research on software clones, in: Duplication, Redundancy, and Similarity in Software,” Dagstuhl Seminar Proceedings, p. 24.
Kitchenham, B., Charters, S., (2007), “Guidelines for performing systematic literature reviews in software engineering.” Technical Report EBSE-2007-01, School of Computer Science and Mathematics, Keele University, Keele and Department of Computer Science, University of Durham, Durham, UK, p. 65.
Antoniol, G., Cassaza, G., Penta, M., Merlo (2001), Modeling clones evolution through time series, in: Proceedings of the 17th International Conference on Software Maintenance (ICSM ’01), pp. 273–280.
Bellon, S., et.al. (2007), Comparison and evaluation of clone detection tools. IEEE Transactions on Software Engineering vol33(9), pp. 577-591.
Komondoor, R., and Horwitz, S., (2001), "Using slicing to identify duplication in source code."In International Static Analysis Symposium, pp. 40-56. Springer Berlin Heidelberg.
Toshihiro, K., Kusumoto, S., and Inoue, K., (2002), "CCFinder: a multilinguistic token-based code clone detection system for large scale source code." IEEE Transactions on Software Engineering 28, no. 7, pp. 654- 670.
Roy, C.K., Cordy, J.,and Koschke, R., (2009), "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach." Science of Computer Programming 74, no. 7, pp. 470-495.
Garg, V., Srivastava, A., and Mishra, A., (2013) "Obscuring Mobile Agents by Source Code Obfuscation." International Journal of Computer Applications 61, no. 9.
Kodhai, E., and Kanmani, S., (2013), "Method-Level code clone modification using refactoring techniques for clone maintenance." Advanced Computing 4, no. 2 (2013): 7.
Rattan, D., Bhatia, R., and Singh, M., (2013), "Software clone detection: A systematic review." Information and Software Technology 55, no. 7, pp. 1165-1199.
Bansal, G., and Tekchandani, R., (2014), "Selecting a set of appropriate metrics for detecting code clones."In Contemporary Computing (IC3), 2014 Seventh International Conference on, pp. 484-488. IEEE.
Goda, G., and Damodaram, A., (2014), "An efficient software clone detection system based on the textual comparison of dynamic methods and metrics computation." International Journal of Computer Applications 86, no. 6.
Wagner, S., Abdulkhaleq, A., Bogicevic, I., Ostberg, J., and Ramadani, J., (2016), "How are functionally similar code clones syntactically different? An empirical study and a benchmark." PeerJ Computer Science 2: e49.
Göde, N., and Koschke, R., (2009), "Incremental clone detection."In Software Maintenance and Reengineering, 2009.CSMR'09. 13th European Conference on, pp. 219-228. IEEE.
Zhenmin, L., Lu, S., Myagmar, S., and Zhou, Y., (2006), "CP-Miner: Finding copy-paste and related bugs in large- scale software code." IEEE Transactions on software Engineering 32, no. 3, pp. 176-192.
Koschke, Rainer, RaimarFalke, and Pierre Frenzel. Clone detection using abstract syntax suffix trees. In Reverse Engineering, 2006.WCRE'06. 13th Working Conference on, pp. 253-262. IEEE, 2006.
Yang, Y., and Guo, Y., (2012), "Boreas: an accurate and scalable token-based approach to code clone detection." In Automated Software Engineering (ASE), 2012 Proceedings of the 27th IEEE/ACM International Conference on, pp. 286-289. IEEE.
Gabel, M., Jiang, L., and Su, Z., (2008), "Scalable detection of semantic clones."In Software Engineering, 2008.ICSE'08. ACM/IEEE 30th International Conference on, pp. 321-330. IEEE.
Cory, K., and Godfrey, M., (2006), "" Cloning considered harmful" considered harmful." In Reverse Engineering, 2006.WCRE'06. 13th Working Conference on, pp. 19-28. IEEE.
Denis, K., Koskinen, J., Sakkinen, M., and Markkula, J., (2010), "Exploratory analysis of the relations between code cloning and open source software quality." In Quality of Information and Communications Technology (QUATIC), 2010 Seventh International Conference on the, pp. 358-363. IEEE.
Kim, M., Sazawal, V., Notkin, D., and Murphy, M., (2005), "An empirical study of code clone genealogies." In ACM SIGSOFT Software Engineering Notes, vol. 30, no. 5, pp. 187-196.ACM.
Kim, H., Jung, Y., Kim, S., and Yi, K., (2011), "MeCC: memory comparison-based clone detector." In Software Engineering (ICSE), 2011 33rd International Conference on, pp. 301-310.IEEE.
Mubarak, A., and Sulaiman, S., (2014), "A hybrid technique in pre-processing and transformation process for code clone detection." In Software Engineering Conference (MySEC), 2014 8th Malaysian, pp. 102-107.IEEE.
Bari, M.A., and Ahamad, S., (2011), "Code Cloning: The Analysis, Detection and Removal." International Journal of Computer Applications 20, no. 7: 34-38.
This work is licensed under a Creative Commons Attribution 4.0 International License.
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.
Submission of the manuscript represents that the manuscript has not been published previously and is not considered for publication elsewhere.