Token-based Code Clone Detection Technique in a Student's Programming Exercise

Author(s):  
Mai Iwamoto ◽  
Shunsuke Oshima ◽  
Takuo Nakashima
2012 ◽  
Vol 3 (2) ◽  
pp. 275-278 ◽  
Author(s):  
Amandeep Kaur ◽  
Mandeep Singh Sandhu

The aspiration of this study is to understand and analyze the concept of software Cloning and its detection. Software cloning is an acuity in which source code is duplicated. Software cloning and its detection is one of emerging and most dominant area of research in the field of software engineering. There exist numbers of techniques to detect clone in software. The focus of this study will be given on acquiring and analyzing the concept of hybrid clone detection technique. We will try to devise an algorithm for detecting duplicacy in the software by using hybrid software clone detection technique. The algorithm will first compute the required software metrics that provide sufficient information regarding the software application and then depending on software metrics matches the clone will be detected. While detecting clone we will focus on line clone rather than token or word.


2020 ◽  
Vol 9 (6) ◽  
pp. 3925-3931
Author(s):  
S. Sharma ◽  
D. Rattan ◽  
K. Singh

2020 ◽  
Vol 19 (4) ◽  
pp. 28-39 ◽  
Author(s):  
Andrew Walker ◽  
Tomas Cerny ◽  
Eungee Song

2018 ◽  
Vol 7 (2.27) ◽  
pp. 144
Author(s):  
Gundeep Kaur ◽  
Sumit Sharma

Object-oriented programming today, is the main prototype in typical software development. Code Cloning defines generally, all through the designing and development of software systems. Detection can be based on Textual analysis, Lexical analysis, Syntax analysis, Semantic analysis, Hybrid analysis and Metric analysis. The major drawback of the present research is that it focuses more on fragments of copied code and does not focus on the aspect that the fragments of duplicated code are may be part of a larger replicated program structure. In this process, techniques take a lot of time and it creates complexity. In our research, a source code is then scanned for detecting various methods by adopting a “OPTIMIZED SVM ALGORITHM” and the method definitions are extracted and collected by means of a CLONE CODE and saved for further reference. To evaluate the performance parameters we calculate the LOC, the number of repetitions, and maximum and minimum LOC. To enhance the performance metrics precision recall, accuracy and reduce the error rate and time complexity  


Sign in / Sign up

Export Citation Format

Share Document