Code Cloning: The Analysis, Detection and Removal

  title={Code Cloning: The Analysis, Detection and Removal},
  author={Abdul Bari Mohammed and Ahamad Shahanawaj},
  journal={International Journal of Computer Applications},
The coping, modifying a block of code is identified as cloning and is the most basic means of software reuse. It has been extensively used within the software development community. An official survey which is carried out within large, long term software development project suggested that 25-30% of modules in system may be cloned. This paper begins with background concept of code cloning, presents overcall taxonomy of current techniques and tools, and classify evolution tools in two different… 

Figures and Tables from this paper

A Review on Code Clone Analysis and Code Clone Detection

Different methods for code clone detection, different tools and technique used for that and the code analysis will be discussed.

Methodology on Code Clone Detection with Refactoring Using Textual and Metrics Analysis in Software

The proposed research model for detection of clone approach shows that the detection process is easier and it has produced efficient results, and the analysis of the experimental results shows that Precision and Recall values are improved and they are better than the previous techniques.


This study is to analyze the working of hybrid clone detection technique that design and analyze a hybrid technique for detecting software clone in an application and will combine metric approach with text base (line of code) technique.

A Hybrid Approach to Perform Code Clone Analysis

In this work, a hybrid mechanism is presented to identify the code cloning over the program code and the algorithmic structures of this code cloning are explored.

Study of Different Code Cloning Techniques

The code cloning is been explored along with different code cloning approaches to identify the cloning ratio over the code.

Clone Detection in Web Application Using Clone Metrics

This study proposes an efficient clone detection technique which is used to detect clones in various programming language and can also be implemented to more complex application such as web applications.

A Survey on Code Clone and Detecting Techniques

An overview of existing research in the field of code identification and refactoring code has grown as an active area in software engineering community in last decades.


The hybrid approach which is made up of two techniques, one is textual and another one is metric based approach for detecting code clone of all types in open source software system and shows that a hybrid approach is lightweight technique which gives accurate result being less complex.

To Enhance Type 4 Clone Detection in Clone Testing

The enhancement in code clone detection algorithm will be proposed which detect type 4, which is more accurate and more efficient in manner and combines algorithm with type 4 to detect a clone in particular function.

Code Clone Detection Using Various Approaches C

ISBN 978-81-929648-0-5 IRISET@2014 63 Abstract— In the last few decades many techniques for software clone detection have been investigated by various researchers to detect the duplicated code in



The development of a software clone detector

A system to detect clones of procedures in large software systems is described, using a self organising neural net, a SOM, to cluster feature vectors associated with the procedures.

Using Slicing to Identify Duplication in Source Code

The design and initial implementation of a tool that finds clones and displays them to the programmer and uses program dependence graphs (PDGs) and program slicing to find isomorphic PDG subgraphs that represent clones is described.

A Survey on Software Clone Detection Research

The state of the art in clone detection research is surveyed, the clone terms commonly used in the literature are described along with their corresponding mappings to the commonly used clone types and several open problems related to clone detectionResearch are pointed out.

Comparison and evaluation of code clone detection techniques and tools: A qualitative approach

Experiment on the automatic detection of function clones in a software system using metrics

A technique to automatically identify duplicate and near duplicate functions in a large software system using metrics extracted from the source code using the tool Datrix/sup TM/.

CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code

A new clone detection technique, which consists of the transformation of input source text and a token-by-token comparison, is proposed, which has effectively found clones and the metrics have been able to effectively identify the characteristics of the systems.

Pattern matching for clone and concept detection

Three pattern-matching techniques are presented: source code metrics, a dynamic programming algorithm for finding the best alignment between two code fragments, and a statistical matching algorithm between abstract code descriptions represented in an abstract language and actual source code.

Clone Detection Using Abstract Syntax Suffix Trees

This paper describes how to make use of suffix trees to find clones in abstract syntax trees and empirically compares the new technique to other techniques using the Bellon benchmark for clone detectors.

A Literature Review of Clone Detection Analysis

Cl clone detection analysis has been used to track the movement of code over time in a process called origin analysis, which attempts to match a function in one vers ion with the most similar function in a previous version.

NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization

  • C. RoyJ. Cordy
  • Computer Science
    2008 16th IEEE International Conference on Program Comprehension
  • 2008
A new language- specific parser-based but lightweight clone detection approach exploiting a novel application of a source transformation system that is capable of finding near-miss clones with high precision and recall, and with reasonable performance.