Comprehensively Meld Code Clone Identifier for Replicated Source Code Identification in Diverse Web Browsers

Dr. Dhaya R., Dr. Kanthavel R.
2020 Journal of Trends in Computer Science and Smart Technology  
The emergence and the progress in the process of reusing the software's, has caused difficulties in the maintaining the software codes and the corresponding depositories. Cloning of software codes is the important reason behind the arising difficulties in the maintenance of the software codes and the depositories. The cloning of codes is a process of replicating the existing codes for utilizing it elsewhere within the software system. The copying and pasting of the fragments of code is also
more » ... thought-out as the method of code cloning causing difficulties in the software maintenance. The maintenance of software is described as the alteration performed over the existing software on the completion of the development as well as the implementation process. Utilizing the maintenance process in the software the software companies deliver the improvements and the additional enhancements according to the working circumstance. The maintenance mainly focuses on removing the bugs and to repair the identified faults in the time of execution to enhance the performance. The work focused on the paper is mainly a comprehensive study over the prevailing tools laid out in the process of code-clone identification. The different techniques employed, the challenges incurred, the blunders made in the development, the enhanced refactoring challenges and efforts in the comprehension of codes are explored in the paper. From the study it was understood that the code clone identification using the web based tools are more advantageous than engaging algorithms in identifying the clones. So the a hybridized (meld) web based code clone identifier tool is engaged in the process of identifying the cloning of codes in diverse web browsers in exhibited in the paper. The exhibited tool equips a highly powerful tool for detecting the clones in a precise an efficient manner. The duplication of codes are often vulnerable and could be malicious. So the exhibited work in the future concentrates in developing an extended tool to identify the malicious codes to improvise the process of code clone identification making it concise and effective.
doi:10.36548/jtcsst.2020.2.005 fatcat:4ksgujduh5gudddqhzveeyojbu