This research studies the various clone detection methods to propose the novel clone detection technique. Clone Detection first parses the source code and then performs data mining with plan on the parsed code. All similar code segments are recognized and then irregularity recognition is performed. The whole process is executed in an issue of minutes. Outcomes are stored in a database for future use. Neural Network, SVM, Data mining are used to evaluate the performance of the system and the parameters FAR, FRR and accuracy are used.
Anna Bartkowiak, “Neural Networks and Pattern Recognition,” Institute of Computer Science, University of WrocAlaw.
Amandeep Kaur, Mandeep Singh Sandhu, “Software code clone detection model using hybrid approach”, in IJCT, Volume 3 No.2, OCT, 2012.
Blawinder Kumar, “Analysis of Code Clone Detection using Object Oriented System and Neural Network”, International Journal of Engineering Research & Technology (IJERT), Vol. 3 Issue 9, September- 2014.
Chanchal K. Roy, James R. Cordy, “Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach,” Preprint submitted to Science of Computer Programming February 24, 2009.
Chatterji, “Effects of cloned code on software maintainability: A replicated developer study”, Reverse Engineering (WCRE), 2013 20th Working Conference, IEEE, 2013.
Dr.Gayathri Devi, Dr. M. Punithavalli, “Comparison and Evaluation on Metric based approach for detecting code clone”, Indian Journal of Computer Science and Engineering, Vol. 2 No. 5 Oct-Nov 2011.
Dmitriy Fradkin and Ilya Muchnik, “Support Vector Machines for Classification,” 2000 Mathematics Subject Classi_cation. 62H30.
Er. Rajnish Bala, Er. Navpreet Rupal, “A survey on clone detection and clone analysis,” International Journal of Advanced Trends in Computer Applications (IJATCA) Volume 1, Number 5, May - 2015, pp. 17-20 ISSN: 2395-3519.
Filip Van Rysselberghe, Serge Demeyer, “Evaluating Clone Detection Techniques,” http://www.refactoring.com/ for an overview of IDE’s supporting refactoring.
Girija Gupta, Indu Singh, “A Novel Approach Towards Code Clone Detection and Redesigning”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 9, September 2013 ISSN: 2277 128X.
Hassan Raza Bhatti, “Automatic Measurement of Source Code Complexity”, Master’s Thesis submitted at Luleĺ University of Technology, 2011.
Hiroaki Murakami, Keisuke Hotta, “Folding Repeated Instructions for Improving Token-based Code Clone Detection,” 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation.
Ke Wang, Philip S. Yu, “Bottom-Up Generalization: A Data Mining Solution to Privacy Protection,” Proceedings of the Fourth IEEE International Conference on Data Mining (ICDM’04) 0-7695-2142-8/04 $ 20.00 IEEE.
Kodhai. E, Kanmani. S, Kamatchi. A, Radhika. R, “Detection ofType-1 and Type-2 Clone Using Textual Analysis and Metrics”, in ITC, 2010 IEEE..
Kodhai. E, Perumal. A, and Kanmani. S,“Clone Detection using Textual and Metric Analysis to figure out all Types of Clones”, in IJCCIS, Vol2. No1. ISSN: 0976–1349 July – Dec 2010.
Kodhai, SelvaduraiKanmani, “Method-level code clone detection through LWH (Light Weight Hybrid) approach”,Journal of Software Engineering Research and Development, October 2014, 2:12.
Leonardo Moura, Marcelo Sant’Anna, “Clone Detection Using Abstract Syntax Trees,” Copyright 1998 IEEE. Published in the Proceedings of ICSM’98, November 16-19, 1998.
Liu Yucheng, “Incremental Learning Method of Least Squares Support Vector Machine,” 2010 International Conference on Intelligent Computation Technology and Automation.
Mohammed Abdul Bari, Dr.ShahanawajAhamad, “Code Cloning: The Analysis, Detection and Removal”, in InternationalJournal of Computer Applications (0975 – 8887), Volume 20–No.7, April 2011.
Mustafa Kapdan, Mehmet Aktas, MelikeYigit, “On the Structural Code Clone Detection Problem: A Survey and Software Metric Based Approach”Computational Science and Its Applications – ICCSA 2014Lecture Notes in Computer Science Volume 8583, 2014, pp 492-507.
Osmar R. Zaďane, “Introduction to Data Mining,” Osmar R. Zaďane, 1999 CMPUT690 Principles of Knowledge Discovery in Databases.
Prajila Prem, “A Review on Code Clone Analysis and Code Clone Detection,” ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 12, June 2013.
RubalaSivakumar, Kodhai. E,“Code Clones Detection in Websites using Hybrid Approach”, in IJCA (0975 – 888) Volume 48–No.13, June 2012
Savvas Karatsiolis, “Region based Support Vector Machine Algorithm for Medical Diagnosis on Pima Indian Diabetes DataSet,” Proceedings of the 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE), Larnaca, Cyprus, 11-13 November 2012.
Salwa K. Abd-El-Hafiz, “A Metrics-Based Data Mining Approach for Software Clone Detection”, 2012 IEEE 36th International Conference on Computer Software and Application.
Wouter gevaert, georgi tsenov, “Neural networks used for speech recognition,” Journal of automatic control, university of belgrade, VOL. 20:1-7, 2010.
Xindong Wu, Xingquan Zhu, “Data mining with Big Data,” Digital Object Indentifier 10.1109/TKDE.2013.109 1041-4347/13/$31.00 © 2013 IEEE.
Yogita Sharma, “Hybrid technique for object oriented software clone detection”, M.E Thesis submitted at Thapar University, Patiala, 2011.
Yoshiki Higo, Ken-ichi Sawa “Problematic Code Clones Identification using Multiple Detection Results,” 2009 16th Asia-Pacific Software Engineering Conference.
Yoshiki Higo, Yasushi Ueda, “Incremental Code Clone Detection: A PDG-based Approach,” 2011 18th Working Conference on Reverse Engineering
Code clone detection, SVM, Neural Network, Data mining, FAR, FRR, Accuracy.