HYBRID TECHNIQUE FOR SOFTWARE CODE CLONE DETECTION
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 2, Issue 2
Abstract
Software Clone detection is one of the hottest research area that helps in detecting duplicate code from an applications. The research has shown that 5% to 20% of software systems can contain duplicated code that is generated by simply copying the existing program code and pasting with or without minor modifications. Cloning creates problem when a bug is found in one code segment that was copied and pasted at several locations earlier. The objective of this study is to analyze the working of hybrid clone detection technique that design and analyze a hybrid technique for detecting software clone in an application. We will combine metric approach with text base (line of code) technique for the above said reason. A model will be designed to automate the concept of clone detection.
Authors and Affiliations
Priyanka Batta, Miss Himanshi
F-MEEP: Fuzzy Logic Based Multihop Energy Efficient Routing Protocol for HWSN
Energy preservation is one of the most important research challenges in Wireless Senor Networks (WSNs). In recent research, topologies and architectures have investigated that allow energy efficiency in WSNs. Clustering...
Are We Really Preparing Preservice Teachers to Teach with Technology in the Classroom?
Are Quebec’s future teachers well prepared to integrate information and communication technologies (ICT) into the classroom? To answer this question, 2,065 teachers-in-training from nine universities offering teacher o...
Information Hiding Using Mosaic Images with Random Image Key Generation
Image watermarking is one of the efficient technique to send the secrete information from sender to receiver. The concept of information hiding using mosaic images is also an efficient technique of keeping the informatio...
E-government Implementation in Developing Countries: A Literature Review
Recently, due to the numerous benefits of e-government implementation, so it becomes inevitable for both developed and developing countries. However, the benefits of implementing e-government, it faces many challenges in...
HYBRID MODEL OF RSA, AES AND BLOWFISH TO ENHANCE CLOUD SECURITY
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the s...