Software clone detection using clustering approach

Bikash Joshi, Puskar Budhathoki, Wei Lee Woon, Davor Svetinovic

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Code clones are highly similar or identical code segments. Identification of clones helps improve software quality through managed evolution, refactoring, complexity reduction, etc. In this study, we investigate Type 1 and Type 2 function clones using a data mining technique. First, we create a dataset by collecting metrics for all functions in a software system. Second, we apply DBSCAN clustering algorithm on the dataset so that each cluster can be analysed to detect Type 1 and Type 2 function clones. We evaluate our approach by analyzing an open source software Bitmessage. We calculate the precision value to show the effectiveness of our approach in detecting function clones. We show that our approach for functional clone detection is effective with high precision value and number of function clones detected.

Original languageBritish English
Title of host publicationNeural Information Processing - 22nd International Conference, ICONIP 2015, Proceedings
EditorsWeng Kin Lai, Qingshan Liu, Tingwen Huang, Sabri Arik
PublisherSpringer Verlag
Pages520-527
Number of pages8
ISBN (Print)9783319265346
DOIs
StatePublished - 2015
Event22nd International Conference on Neural Information Processing, ICONIP 2015 - Istanbul, Turkey
Duration: 9 Nov 201512 Nov 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9490
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd International Conference on Neural Information Processing, ICONIP 2015
Country/TerritoryTurkey
CityIstanbul
Period9/11/1512/11/15

Keywords

  • Clone detection
  • Data mining
  • Function clones
  • Software metrics

Fingerprint

Dive into the research topics of 'Software clone detection using clustering approach'. Together they form a unique fingerprint.

Cite this