International Core Journal of Engineering 2020-26 | Page 197

[24] Mccormick W P , Lyons N I , Hutcheson K. Distributional properties of jaccard’s index of similarity[J]. Communications in Statistics, 1992, 21(1):18. [25] YU T T, XU P N, JIANG Y, et al. Text Similarity Method Based on the Improved Jaccard Coefficient[J]. Computer Systems & Applications, 2017, 26(12):137-142. [26] TIAN X, ZHENG J, ZHANG Z P.Jaccard Text Similarity Algorithm Based on Word Embedding[J]. Computer Science, 2018, 45(07):186- 189. [27] Ragkhitwetsagul C , Krinke J , Marnette B . A picture is worth a thousand words: Code clone detection based on image similarity[C]// IEEE International Workshop on Software Clones. IEEE Computer Society, 2018. [28] SONG B, JIANG W L, SUN T, et al. Image registration algorithm based on fast feature extraction and perceptual hash. Computer Engineering and Applications, 2018,54(07):206-212. [29] LI D P, YANG C, JINAG Q, et al. A Client-Based Image Fuzzy Deduplication Method Supporting Proof of Ownership[J]. Chinese Journal of Computers, 2018, 41(06):1047-1063. [30] Jacomy M, Venturini T, Bastian M, et al. ForceAtlas2, a Continuous Graph Layout Algorithm for Handy Network Visualization Designed for the Gephi Software[J]. PLOS ONE, 2014, 9(6): e98679. [31] Hu Y F. Efficient and high quality force-directed graph drawing[J]. Mathematica Journal, 2006, 10: 37-71. [32] Noack A. Energy Models for Graph Clustering[J]. Journal of Graph Algorithms and Applications, 2007, 11(2):453-480. [33] Frick A, Ludwig A, Mehldau H. A Fast Adaptive Layout Algorithm for Undirected Graphs[C]// Proc DIMACS Int Work Graph Drawing. Springer-Verlag, 1994:388-403. [34] Svajlenko J , Roy C K . BigCloneEval: A Clone Detection Tool Evaluation Framework with BigCloneBench[C]// 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2016:131-140. [35] Roy C K , Cordy J R. A Mutation/Injection-Based Automatic Framework for Evaluating Code Clone Detection Tools[C]// C3S2E Conference. ACM, 2008:157-166. [36] Roy C K , Cordy J R. A Mutation/Injection-Based Automatic Framework for Evaluating Code Clone Detection Tools[C]// C3S2E Conference. ACM, 2008:157-166. [37] SU X H, ZHANG F L. A Survey for Management-Oriented Code Clone Research[J]. Chinese Journal of Computers, 2018, 41(03):628- 651. [38] Svajlenko J , Roy C K. Evaluating Modern Clone Detection Tools[C]// IEEE International Conference on Software Maintenance & Evolution. IEEE, 2014:321-330. [10] Lee S. SDD: High Performance Code Clone Detection System for Large Scale Source Code[C]// Companion to the Acm Sigplan Conference on Object-oriented Programming. ACM, 2005:140-141. [11] Baker B S. On finding duplication and near-duplication in large software systems[C]// Proceedings of the 2nd IEEE Working Conference on Reverse Engineering, 1995. IEEE, 1995:86-95. [12] Ducasse, Stéphane, Rieger M, Demeyer S. A Language Independent Approach for Detecting Duplicated Code[C]// IEEE International Conference on Software Maintenance. IEEE, 1999:109-118. [13] Li Z, Lu S, Myagmar S, et al. CP-Miner: finding copy-paste and related bugs in large-scale software code[J]. IEEE Transactions on Software Engineering, 2006, 32(3):176-192. [14] Li L, Feng H, Zhuang W, et al. CCLearner: A Deep Learning-Based Clone Detection Approach[C]// 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE Computer Society, 2017:249-260. [15] Yuan Y, Guo Y. Boreas: an accurate and scalable token-based approach to code clone detection[C]// IEEE/ACM International Conference on Automated Software Engineering. IEEE, 2012:286- 289. [16] Jiang L, Misherghi G, Su Z, et al. DECKARD:Scalable and Accurate Tree-Based Detection of Code Clones[C]// International Conference on Software Engineering. IEEE Computer Society, 2007:96-105. [17] Baxter I D , Yahin A , Moura L , et al. Clone detection using abstract syntax trees[C]// Conference on Reverse Engineering. IEEE, 2006:253-262. [18] Wei H H, Li M. Supervised Deep Features for Software Functional Clone Detection by Exploiting Lexical and Syntactical Information in Source Code[C]// International Joint Conferences on Artificial Intelligence Organization. IJCAI, 2017:3034-3040. [19] Krinke J. Identifying Similar Code with Program Dependence Graphs[C]//Conference on Reverse Engineering. IEEE, 2001:301- 309. [20] Hummel B, Juergens E, Heinemann L,et al. Index-based code clone detection: incremental, distributed, scalable[C]//2010 IEEE International Conference on Software Maintenance. IEEE Computer Society, 2010:1-9. [21] Komondoor R, Horwitz S. Using slicing to identify duplication in source code[C]// 8th International Symposium on Static Analysis. Springer-Verlag, 2001:40-56. [22] Zhang Y L, Basit H A, Jarzabek S, et al. Query-based filtering and graphical view generation for clone analysis[C]//2008 IEEE International Conference on Software Maintenance. IEEE Computer Society, 2008:376-385. [23] ZHANG J J, WANG C H, ZHANG L P, et al. Clone code detection based on Levenshtein distance of token[J]. Journal of Computer Applications, 2015, 35(12):3536-3543. 175