Full Paper View Go Back
Detection of Cross Language Clones of C and Java Language using Levenshtein Distance Algorithm
Sanjay B. Ankali1 , Latha Parthiban2
Section:Research Paper, Product Type: Journal-Paper
Vol.7 ,
Issue.6 , pp.19-24, Dec-2019
CrossRef-DOI: https://doi.org/10.26438/ijsrcse/v7i6.1924
Online published on Dec 31, 2019
Copyright © Sanjay B. Ankali, Latha Parthiban . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Sanjay B. Ankali, Latha Parthiban, “Detection of Cross Language Clones of C and Java Language using Levenshtein Distance Algorithm,” International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.6, pp.19-24, 2019.
MLA Style Citation: Sanjay B. Ankali, Latha Parthiban "Detection of Cross Language Clones of C and Java Language using Levenshtein Distance Algorithm." International Journal of Scientific Research in Computer Science and Engineering 7.6 (2019): 19-24.
APA Style Citation: Sanjay B. Ankali, Latha Parthiban, (2019). Detection of Cross Language Clones of C and Java Language using Levenshtein Distance Algorithm. International Journal of Scientific Research in Computer Science and Engineering, 7(6), 19-24.
BibTex Style Citation:
@article{Ankali_2019,
author = {Sanjay B. Ankali, Latha Parthiban},
title = {Detection of Cross Language Clones of C and Java Language using Levenshtein Distance Algorithm},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2019},
volume = {7},
Issue = {6},
month = {12},
year = {2019},
issn = {2347-2693},
pages = {19-24},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1587},
doi = {https://doi.org/10.26438/ijcse/v7i6.1924}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.1924}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1587
TI - Detection of Cross Language Clones of C and Java Language using Levenshtein Distance Algorithm
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Sanjay B. Ankali, Latha Parthiban
PY - 2019
DA - 2019/12/31
PB - IJCSE, Indore, INDIA
SP - 19-24
IS - 6
VL - 7
SN - 2347-2693
ER -
Abstract :
In code engineering the study on software forking presents that 10-15% of the code in large codebase are clones. gcc-8.7%, JDK-29%, Linux-22% There are state of art tools for detecting clones like CCFinderX, EqMiner, Dup, Simjava, Nicad but cannot work with IDE’s hence To solve the software maintenance efforts in development process it is important to propose efficient techniques to identify clones(especially type-III and type-IV clones) .we propose dictionary based Approach to detect cross clones of C and Java to provide proper inputs to the developers who engage in software forking or porting activities by detecting and correcting porting and copying errors that arise during porting process for IDE’s like NetBeans, Eclipse.
Key-Words / Index Term :
type-III, type-IV clones
References :
[1] F. Alomari, I. Keivanloo, C. K. Roy, J. Rilling, “Detecting Clones across Microsoft .NET Programming Language”s, 1095-1350/91 4891 IEEE.
[2] M. Abdelkader M. Malki, “Clone Detection Using Time Series and Dynamic Time Warping Techniques”,978-1-4673-9669-1/15, 2015 IEEE.
[3] B. Ray, C. Wiley, M. Kim, “REPERTOIRE: A Cross-System Porting Analysis Tool for Forked Software Project”s, SIGSOFT’12/FSE-20,November,11–16,2012, Cary, North Carolina, USA. Copyright 2012 ACM 978-1-4503-1614-9/12.
[4] S. Abid, S. Javed, Momna Naseem, Suleman Shahid, H.Abdul Basit,Yoshiki Higo,”CodeEase: Harnessing Method Clone Structures for Reuse”, 978-1-5090-6595- 0/17, 2017 IEEE .
[4] B.B.chua, “Detecting sustainable programming languages through forking open source project for survivability”y, 978-1-5090-1944-1/15, 2015 IEEE.
[5] F.-Hsiang Su, J.Bell, G.Kaiser, S. Sethumadhavan, “Identifying Functionally Similar Code in Complex Codebases”, ICPC 2016, Austin, Texas, 978-1-5090-1428-6/2016 IEEE
[6] F. Deissenboeck, L. Heinemann, B. Hummel, and S. Wagner, “Chal-lenges of the Dynamic Detection of Functionally Similar Code Fragments,” ser. CSMR ’12.
[7] Y.Yuan and Y. Guo, “Boreas: An Accurate and Scalable Token-Based Approac to Code Clone Detection” ,2013 International Conference on Software Engineering.
[8] B. Priyambadha, S. Rochimah, “Case Study on Semantic Clone Detection Based On Code Behavior”, 978-1-4799-7996-7, 2014 IEEE.
[9] F. Mihai Lazar, O. Banias, “Clone detection algorithm based on the Abstract Syntax Tree approach”, 9th IEEE International Symposium on Applied Computational Intelligence and Informatics • May 15-17, 2014 • Timişoara, Romania.
[10] C. Ragkhitwetsagul, “Measuring Code Similarity in Large-scaled Code Corpora”, 978-1-5090-3806-0/2016 IEEE.
[11] V. Saini, H. Sajnani, J. Kim, and C. Lopes, “SourcererCC andSourcererCC-I: Tools to Detect Clones in Batch mode and During Software Development,” ICSE’16 Companion, May 14-22, 2016, Austin, TX,USA c 2016 ACM. ISBN 978-1-4503-4205-6/16/05.
[12] C. K. Roy, “Detection and Analysis of Near-Miss Software Clones”, 978-1- 4244-4828 2009 IEEE.
[13] www.mtsystems.com
[14] M.Steinbeck, “an Arc-Based Approach for Visualization of Code Smell”s, 978-1-5090-5501-2, 2017 IEEE
[15] Y. Hu, Y.Zhang, J. Li, D. Gu, “Cross-Architecture Binary Semantics Understanding via Similar Code Comparison”, 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering.
[16] D. Mazinanian, N. Tsantalis, R. Stein, Z. Valenta, “JDeodorant: Clone Refactoring”, 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering Companion
[17] T. Ishio, Y.e, Kaoru, “source file search file for clone and own”, 2017 IEEE, 14th International Conference on Software Repository
[18] K. Raheja,, R. Tekchandani, “An Efficient Code Clone Detection Model on Java Byte Code Using Hybrid Approach”
[19] M. Stephan,James R. Cordy, “Model-Driven Evaluation of Software Architecture Quality Using Model Clone Detection”, 978-1-5090-4127-5/ 2016 IEEE
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.