A Novel Technique to Detect Semantic Clones

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-23 Number-2
Year of Publication : 2015
Authors : Nirpjeet Kaur, Sumeet Kaur Sehra, Diana Nagpal
  10.14445/22312803/IJCTT-V23P113

MLA

Nirpjeet Kaur, Sumeet Kaur Sehra, Diana Nagpal "A Novel Technique to Detect Semantic Clones". International Journal of Computer Trends and Technology (IJCTT) V23(2):56-60, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Existing research shows there are more than 5-10%[1] of code clone exists in the normal program, which is often source of bug in most cases and is very difficult to detect without several test cases. Though several automated refactoring tools exists but it fails to tell the number of place where the refactoring is necessary. Many code clone detection techniques have been employed to remove syntactic clones but less research is geared towards finding semantic clones most because of its lower payoff though the error cheeped because of semantic clones are almost invisible even to most experienced programmer. This paper proposes a technique that may be employed to automatically detect semantic clones.

References
[1] Yingnong Dang, Song Ge, Ray Huang and dongmei Zhang. Honululu ,"Code Clone Detection Experience at Microsoft", ACM, 23 May 2011, Microsoft Research Asia.
[2] R. V. Patil, Madhuri Lole, Ruchira Kudale, Rajani Konde, S. D. Joshi and V. Khanna. Pune ,"Code Clone Detection Technique Using Weighted Graph and CFG.", s.n., 16 March 2014, Proceedings of 4th IRF International conference. 978-93-82702-66-5.
[3] Ritesh V. Patil, S. D. Joshi and V. Khanna. 9, Chennai ,"Code Clone Detection using Decentralized Architecture and Parallel Processing- Latest Short Revie", s.n., September 2014, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4. 2277-128X.
[4] Kodhai.E, Perumal.A and Kanmani.S. 1, Puducherry ,'"Clone Detection using Textual and Metric Analysis to figure out all Types of Clones", IJCCIS, July 2010, International Journal of Computer communication and Information System, Vol. 2. 0976-1349.
[5] Jiyong Jang, Maverick Woo and David Brumley. San Francisco ,"ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions", IEEE Xplore, May 2012, Institute of Electricals and Electronics Engineers, pp. 48-62. 978-0-7695-4681-0 .,
[6] Hosam AlHakami, Feng Chen and Helge Janicke. 4, Leicester."An Extended Stable Marriage Problem Algorithm for Clone Detection.", IJSEA, July 2014, Internation Journal of Software Engineering & Application, Vol. 5.
[7] Rainer Koschke, Raimar Falke and Pierre Frenzel. [ed.] IEEE Xplore. Benevento,"Clone Detection Using Abstract Syntax Suffix Trees", IEEE, October 2006, Institute of Electrical and Electronics Engineers, pp. 253-262. 0-7695-2719-1 .
[8] Horwitz, Randy Smith and Suzan.," Detecting and Measuring Similarity in Code Clones",June 2009.
[9] Raemaekers, Steven. Amsterdam ,"Testing Semantic Clone Detection Candidates", Digital Academic Repository of the University of Amsterdam, 1995.
[10] Kamino: Dynamic Approach to Semantic Code Clone Detection. Neubauer, Lindsay Anne. s.l.: Columbia University, 2014, Columbia University Computer Science Technical Reports. CUCS-022-14. “PDCA12-70 data sheet,” Opto Speed SA, Mezzovico, Switzerland.
[11] Yue Jia, David Binkley, Mark Harman, Jens Krinke and Makoto Matsushita. London:,"KClone: A Proposed Approach to Fast Precise Code Clone Detection. ",The UCL Department of Computer Science, August 2010.J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.
[12] A qualitative approach. Chanchal K. Roy, James R. Cordy and Rainer Kosche. 7, Canada:,"Comparison and Evaluation of Code Clone Detection Techniques and tools",Science Direct, May 2009, Science of Computer Programming, Vol. 74, pp. 470-495.
[13] Heejung Kim, Yungbum Jung, Sunghun Kim and Kwankeun Yi. [ed.] IEEE Xplore. Honolulu:,"MeCC: Memory Comparison-based Clone Detector",IEEE, 21 May 2011, Institute of Electrical and Electronics Engineers, pp. 301-310. 978-1-4503-0445-0.
[14] Cordy, Chanchal K. Roy and James R. [ed.] IEEE Xplore. Amsterdam:,"Scenario-Based Comparison of Clone Detection Techniques",IEEE, 10-13 June 2008, Program Comprehension, 2008. ICPC 2008. The 16th IEEE International Conference on, pp. 153-162. 978-0-7695-3176-2
[15] Rothermel, Alessandro Orso and Gregg. [ed.] FOSE 2014. Atlanta:,"Software Testing: A Research Travelogue (2000- 2014)",ACM Digital Library, 2014, Proceedings of the 36th IEEE and ACM SIGSOFT International Conference on Software Engineering (ICSE 2014), pp. 117-132. 978-1-4503-2865-4.
[16] Rowyda Mohammed Abd El-Aziz, Amal Elsayed Aboutabl and Mostafa-Sami Mostafa. 8, Cairo:,"Clone Detection Using DIFF Algorithm for Aspect Mining",IJACSA, 2012, International Journal of Advanced Computer Science and Applications, Vol. 3.
[17] Guo, Yang Yuan and Yao ,"Boreas: An Accurate and Scalable Token- Based Approach to Code Clone Detection", [ed.] IEEE Xplore. Essen: IEEE, 3-7 September 2012, Automated Software Engineering (ASE), 2012 Proceedings of the 27th IEEE/ACM International Conference, pp. 286-289. 978-1-4503-1204-2.
[18] Shilpa, Rajnish Kumar and Prof. 4, Chandigarh:,"Token based clone detection using program slicing",IJCTA, International Journal of Computer Technology & Application, Vol. 5. 2229-6093.
[19] Florida: University of Central Florida, "JSCTracker: A Tool and Algorithm for Semantic Method Clone Detection Using Method IOEBehavior", 15 October 2012, Technical Article, p. 16.
[20] Tekchandani, Kanika Raheja and Rajkumar. 5, Patiala,"An Emerging Approach towards Code Clone Detection: Metric Based Approach on Byte Code", IJARCSSE, May 2013, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3. 2277-128X.
[21] Singh, Girija Gupta and Indu. 9, Sirsa,"A Novel Approach towards Code Clone Detection and Redesigning", IJARCSSE, September 2013, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3. 2277-128X.
[22] Bakr Al-Batran, Bernhard Schätz and Benjamin Hummel. [ed.] Springer. Wellington,"Semantic Clone Detection for Model-Based Development of Embedded Systems", Springer Berlin Heidelberg, 16 October 2011, 14th International Conference, MODELS 2011, Wellington, New Zealand, October 16-21, 2011. Proceedings, Vol. 6981, pp. 258-272. 0302-9743.
[23] Beverly, MA,"Highly Configurable and Extensible Code Clone Detection. IEEE, [ed.]", Reverse Engineering (WCRE), 2010 17th Working Conference, 13-16 October 2010, Institute of Electrical and Electronics Engineers, pp. 237-421. 978-1-4244-8911-4.Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997.

Keywords
Code Clone, Syntactic Clone, Semantic Clone, Abstract Syntax Tree, Graph.