Enhanced Pre-processing and Parameterization Process of Generic Code Clone Detection Model for Clones in Java']Java Applications

被引:0
作者
Mokhtar, Nur Nadzirah [1 ]
Muharak-Ali, Al-Fahim [1 ]
Hamza, Mohd Azwan Mohamad [1 ]
机构
[1] Univ Malaysia Pahang, Fac Comp, Gambang 26300, Pahang, Malaysia
关键词
Code clone; code clone detection model; !text type='java']java[!/text] applications; computational intelligence;
D O I
10.14569/IJACSA.2020.0110669
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Code clones are repeated source code in a program. There are four types of code clone which are: Type 1, Type 2, Type 3 and Type 4. Various code clone detection models have been used to detect code clone. Generic Code Clone model is a model that consists of a combination of five processes in detecting code clone from Type-1 until Type-4 in Java Applications. The five processes are Pre-processing, Transformation, Parameterization, Categorization and Match Detection process. This work aims to improve code clone detection by enhancing the Generic Code Clone Detection (GCCD) model. Therefore, the Preprocessing and Parameterization process is enhanced to achieve this aim. The enhancement is to determine the best constant and weightage that can be used to improve the code clone detection result. The code clone detection result from the proposed enhancement shows that private with its weightage is the best constant and weightage for the Generic Code Clone Detection Model.
引用
收藏
页码:570 / 577
页数:8
相关论文
共 27 条
  • [11] Kamalpriya CM, 2017, INT WORKS SOFTW CLON, P61
  • [12] CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    Kamiya, T
    Kusumoto, S
    Inoue, K
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (07) : 654 - 670
  • [13] Kapser C. J., 2012, 2012 Proceedings of the 6th International Workshop on Software Clones (IWSC 2012), P72, DOI 10.1109/IWSC.2012.6227870
  • [14] Kim DK., 2019, INT J ELECT COMPUT E, V9, P3804, DOI 10.11591/ijece.v9i5.pp3804-3812
  • [15] Kodhai E., 2010, Proceedings of the 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC 2010), P241, DOI 10.1109/ITC.2010.55
  • [16] Marcus A, 2001, 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, P107, DOI 10.1109/ASE.2001.989796
  • [17] Mubarak-Ali A., 2019, IOP C SERIES MAT SCI, V769, pPahang
  • [18] Pyl M, 2020, INT WORKS SOFTW CLON, P33, DOI [10.1109/IWSC50091.2020.9047641, 10.1109/iwsc50091.2020.9047641]
  • [19] On the Relationships between Stability and Bug-proneness of Code Clones: An Empirical Study
    Rahman, Md Saidur
    Roy, Chanchal K.
    [J]. 2017 IEEE 17TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2017, : 131 - 140
  • [20] Sudhamani M, 2016, PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), P59, DOI 10.1109/IC3I.2016.7917935