Loading [Contrib]/a11y/accessibility-menu.js
Research article Special Issues

Identification of propagated defects to reduce software testing cost via mutation testing


  • In software engineering, testing has long been a research area of software maintenance. Testing is extremely expensive, and there is no guarantee that all defects will be found within a single round of testing. Therefore, fixing defects that are not discovered by a single round of testing is important for reducing the test costs. During the software maintenance process, testing is conducted within the scope of a set of test cases called a test suite. Mutation testing is a method that uses mutants to evaluate whether the test cases of the test suite are appropriate. In this paper, an approach is proposed that uses the mutants of a mutation test to identify defects that are not discovered through a single round of testing. The proposed method simultaneously applies two or more mutants to a single program to define and record the relationships between different lines of code. In turn, these relationships are examined using the defects that were discovered by a single round of testing, and possible defects are recommended from among the recorded candidates. To evaluate the proposed method, a comparative study was conducted using the fault localization method, which is commonly employed in defect prediction, as well as the Defects4J defect prediction dataset, which is widely used in software defect prediction. The results of the evaluation showed that the proposed method achieves a better performance than seven other fault localization methods (Tarantula, Ochiai, Opt2, Barinel, Dstar2, Muse, and Jaccard).

    Citation: Dong-Gun Lee, Yeong-Seok Seo. Identification of propagated defects to reduce software testing cost via mutation testing[J]. Mathematical Biosciences and Engineering, 2022, 19(6): 6124-6140. doi: 10.3934/mbe.2022286

    Related Papers:

    [1] Wenya Shi, Xinpeng Yan, Zhan Huan . Faster free pseudoinverse greedy block Kaczmarz method for image recovery. Electronic Research Archive, 2024, 32(6): 3973-3988. doi: 10.3934/era.2024178
    [2] Fang Wang, Weiguo Li, Wendi Bao, Li Liu . Greedy randomized and maximal weighted residual Kaczmarz methods with oblique projection. Electronic Research Archive, 2022, 30(4): 1158-1186. doi: 10.3934/era.2022062
    [3] Jia-Min Luo, Hou-Biao Li, Wei-Bo Wei . Block splitting preconditioner for time-space fractional diffusion equations. Electronic Research Archive, 2022, 30(3): 780-797. doi: 10.3934/era.2022041
    [4] Jingshi Li, Jiachuan Zhang, Guoliang Ju, Juntao You . A multi-mode expansion method for boundary optimal control problems constrained by random Poisson equations. Electronic Research Archive, 2020, 28(2): 977-1000. doi: 10.3934/era.2020052
    [5] Bin Wang, Lin Mu . Viscosity robust weak Galerkin finite element methods for Stokes problems. Electronic Research Archive, 2021, 29(1): 1881-1895. doi: 10.3934/era.2020096
    [6] Huimin Qu, Haiyan Xie, Qianying Wang . Multi-convolutional neural network brain image denoising study based on feature distillation learning and dense residual attention. Electronic Research Archive, 2025, 33(3): 1231-1266. doi: 10.3934/era.2025055
    [7] Jiange Liu, Yu Chen, Xin Dai, Li Cao, Qingwu Li . MFCEN: A lightweight multi-scale feature cooperative enhancement network for single-image super-resolution. Electronic Research Archive, 2024, 32(10): 5783-5803. doi: 10.3934/era.2024267
    [8] Zengyu Cai, Liusen Xu, Jianwei Zhang, Yuan Feng, Liang Zhu, Fangmei Liu . ViT-DualAtt: An efficient pornographic image classification method based on Vision Transformer with dual attention. Electronic Research Archive, 2024, 32(12): 6698-6716. doi: 10.3934/era.2024313
    [9] Yantong Guo, Quansheng Wu, Xiaofeng Wang . An extension of high-order Kou's method for solving nonlinear systems and its stability analysis. Electronic Research Archive, 2025, 33(3): 1566-1588. doi: 10.3934/era.2025074
    [10] Xuefei He, Kun Wang, Liwei Xu . Efficient finite difference methods for the nonlinear Helmholtz equation in Kerr medium. Electronic Research Archive, 2020, 28(4): 1503-1528. doi: 10.3934/era.2020079
  • In software engineering, testing has long been a research area of software maintenance. Testing is extremely expensive, and there is no guarantee that all defects will be found within a single round of testing. Therefore, fixing defects that are not discovered by a single round of testing is important for reducing the test costs. During the software maintenance process, testing is conducted within the scope of a set of test cases called a test suite. Mutation testing is a method that uses mutants to evaluate whether the test cases of the test suite are appropriate. In this paper, an approach is proposed that uses the mutants of a mutation test to identify defects that are not discovered through a single round of testing. The proposed method simultaneously applies two or more mutants to a single program to define and record the relationships between different lines of code. In turn, these relationships are examined using the defects that were discovered by a single round of testing, and possible defects are recommended from among the recorded candidates. To evaluate the proposed method, a comparative study was conducted using the fault localization method, which is commonly employed in defect prediction, as well as the Defects4J defect prediction dataset, which is widely used in software defect prediction. The results of the evaluation showed that the proposed method achieves a better performance than seven other fault localization methods (Tarantula, Ochiai, Opt2, Barinel, Dstar2, Muse, and Jaccard).



    Posterior portion fractures of the acetabulum are the most frequent pattern of acetabular fractures, comprising approximately 19.4–35% of all acetabular fractures [1,2]. Based on the works of Judet and Letournel [3,4], accurate reduction and stable osteosynthesis with early mobilization have become the gold standard for the treatment of posterior acetabular fractures [5]. When faced with acetabular fractures involving the posterior portion, the Kocher-Langenbeck (K-L) approach is regarded as the classic approach for its direct visualization of the entire posterior column and posterior wall as well as indirect access to the true pelvis [6,7]. However, the extensive incision of the K-L approach results in high risks of medial femoral circumflex artery (MFCA) and sciatic nerve (SN) injury intraoperatively, especially for inexperienced surgeons [8,9]. In addition, the sharpness damage of muscles used in the K-L approach usually results in formation of heterotopic ossification (HO) and decreased muscle strength post-operatively [10,11].

    Over recent decades, minimally-invasive surgery has become a clinical trend because of its expected benefits including less tissue trauma and early rehabilitation. In the standard K-L approach, the gluteus maximus is split to expose the posterior patterns of the acetabulum, and the short external rotators (SER) are dissected; moreover, the capsule of the hip would be dissected if necessary. As a result, numerous surgeons have focused their views on a minimally-invasive modification of the K-L approach [12,13,14,15,16].

    In the present study, a novel minimally-invasive posterior approach, the DPA, based on the classic K-L approach, was designed to treat posterior acetabular portion fractures and the clinical outcomes were evaluated over a 1 year follow-up.

    Inclusion criteria were: (1) acute acetabular fractures (<21 days); (2) acetabular fractures involving the posterior wall, posterior column, posterior wall and posterior column.

    Exclusion criteria were: (1) open fractures; (2) acetabular fractures involving the anterior portion and quadrilateral plate which required an anterior approach; (3) follow-up for less than 1 year or loss to follow-up.

    The study was approved by the Ethics Committee of the Third affiliated hospital of Southern Medical University, Guangzhou, China, and all procedures involving human participants were carried out in accordance with the ethical standards of the institutional and/or national research committee and the 1964 Helsinki declaration and its later amendments or comparable ethical standards.

    Between January 2016 and June 2017, 22 consecutive patients with acetabular posterior portion fractures treated surgically in our trauma center using the DPA were retrospectively analyzed. Finally, 10 patients were included in this study according to our inclusion and exclusion criteria. Before surgery, all patients underwent radiographic examinations including X-rays (anteroposterior (AP) view and Judet view) and computed tomography (CT) scans (slice thickness of 1 mm) with three-dimensional (3D) reconstructions.

    All surgical procedures were performed by the same senior surgeon in this study.

    The patients with hip dislocation underwent a closed reduction and supracondylar traction as soon as possible after admission. All patients received routine antibiotic prophylaxis 30 min prior to operation. Under general anesthesia, the patient was placed in a prone position on the radiolucent operating table, with hip extension and knee flexion to avoid excessive tension on the SN. The feasibility of obtaining AP and Judet oblique views captured by C-arm fluoroscopy was verified for each patient before surgical draping. As shown in Figure 1, the posterior superior iliac spine and the posterior margin of the tip of the greater trochanter were treated as the landmarks for incision.

    Figure 1.  The landmarks for DPA. (1) Posterior tip of the greater trochanter. (2) Posterior superior iliac spine. (3) Midpoint between (1) and (2).

    Essentially, the skin incision of the DPA is similar to the proximal portion of the classical K-L incision [7]. A straight skin incision was initiated from the midpoint between the posterior superior iliac spine and the posterior tip of the greater trochanter, and extended towards the latter approximately 8–11 cm (Figure 2A, E). The gluteus maximus muscles were dissected bluntly along the muscle fibers. Neither the proximal part of the gluteus maximus attaching to the iliac crest nor the distal part inserting into the femur was detached. Holding the layers of the gluteus maximus apart using retractors, the piriformis and gluteus medius were exposed and the interval between these two muscles was identified (Figure 2B, F). The SN could be distinguished by its course anterior to the piriformis. With anterosuperior retraction of the gluteus medius muscle, the superior gluteal neurovascular bundle contiguous to the greater sciatic notch could be defined in the proximal direction (Figure 2C, G). Instead of dividing the SERs and abductors, the interval was further developed by retracting the gluteus medius anterosuperiorly and the piriformis posteroinferiorly. In this way, access to the entire acetabular posterior wall, partial hip capsule and the great mass of the posterior column (from the superior margin of the greater sciatic foramen to the sciatic spine) was achieved (Figure 2D, H). Nevertheless, in the region of the greater sciatic notch, the surgeon needed to manipulate carefully to avoid intraoperative damage to the superior gluteal neurovascular bundle and the SN. This procedure created a space between the undersurface of the piriformis muscle and the posterior wall of the acetabulum, allowing reduction of acetabular posterior portion fractures under direct visualization.

    Figure 2.  Scheme diagrams and intraoperative photographs of DPA. (A, E) DPA incision. (B, F) The layers of the gluteus maximus, piriformis and gluteus medius were exposed by blunt dissection and the interval between these two muscles was identified under retraction. (C, G) With anterosuperior retraction of the gluteus medius muscle, the superior gluteal neurovascular bundle contiguous to the greater sciatic notch could be identified in the proximal direction. (D, H) The manipulation space of the posterior acetabular fracture (the entire acetabular posterior wall, part of the hip capsule and the posterior column) was further developed by retracting the gluteus medius anterosuperiorly and the piriformis posteroinferiorly. (1) Posterior tip of the greater trochanter; (2) posterior superior iliac spine; (3) gluteus maximus; (4) gluteus medius; (5) interval between the gluteus medius and piriformis; (6) piriformis; (7) sciatic nerve; (8) the superior gluteal neurovascular bundle; (9) superior margin of the greater sciatic foramen; (10) greater sciatic foramen; (11) sacrospinous ligament; (12) capsule of hip; (13) fracture line; (14) displaced fracture fragment.

    For posterior column fractures with or without posterior wall fractures, fractures of the posterior column should be reduced and fixed first. On the other hand, for posterior wall fractures, any hematoma and hip capsule debris could be cleaned up directly by traction of the fragments, and soft tissue attached to the displaced fragments could be preserved. Capsulotomy of the hip joint was no longer necessary in this approach (Figure 3A). Moreover, as a benefit of the extensive exposure of the intra-articular surface, a marginal compressive fracture of the hip joint could be treated by bone grafting if necessary. After that, anatomic reduction and temporary fixation with K-wires of the posterior wall fragments was performed (Figure 3B). Finally, the appropriate reconstruction plates were chosen to contour adequately to accommodate the shape of the posterior wall and inserted to fix the posterior rim of the acetabulum (Figure 3C). A thorough irrigation was performed and closed suction drainage was placed before wound closure.

    Figure 3.  Schematic diagrams of DPA. (A) Hematoma and hip capsule debris could be cleaned up directly by traction of the fragments and the attached soft tissue of displaced fragments could be preserved. (B) Anatomic reduction and temporary fixation of the posterior wall fragments with K-wires. (C) Fixation with reconstruction plates. (1) The superior gluteal neurovascular bundle, (2) gluteus medius, (3) capsule of hip, (4) fracture fragments, (5) piriformis, (6) fracture line, (7) Kirschner wires, (8) reconstruction plate, (9) screw.

    The whole procedure was performed between the space of the posterior column through windows between the gluteus medius and the piriformis muscles superiorly and between the SERs and retro-acetabular surface without dividing the rotators and abductors. The fractures of the posterior wall were appropriately stabilized with reconstruction plates. The reduction was assessed from the interlocking of the ragged fracture ends perioperatively without joint incision and division of rotators. The safe insertion of the screws was further assessed by confirming the fixation under an image intensifier.

    After surgery, the function of the SN was examined once the patient recovered from anesthesia. Routine antibiotic prophylaxis was administered for 24 h postoperatively. Low molecular weight heparin was administered daily for 2 weeks to prevent thrombosis. The suction drain was removed once the aspirated volume was less than 50 mL/d. X-ray examinations and CT scans with 3D reconstruction were performed in all patients postoperatively. Active and passive movement of the hip was started as soon as medically possible. Toe-touch weight bearing with the help of a walker or crutches was allowed at 4–6 weeks, and gradually full weight bearing was started 3–4 months after surgery.

    Blood loss, operative time, time to surgery, reduction quality and complications were recorded. Patients received routine postoperative follow-up at 1, 3, 6, and 12 months, and annually thereafter. According to the Matta scoring system [17,18,19], the reduction of fractures was evaluated by measuring the postoperative residual displacements on postoperative radiographs, with reduction quality classified as anatomic (<1 mm), imperfect (1–3 mm), or poor (>3 mm). At the final follow-up the patients were evaluated clinically building on Merle d'Aubigne and Postel scoring which had been modified by Matta [17,18,20], ranging from excellent (18 points), good (15–17 points), and fair (14 or 13 points), to poor (<13 points).

    Preoperative, intraoperative and postoperative data were recorded. Statistical analysis was mainly conducted using SPSS Statistics (SPSS Inc., Chicago, IL, USA). Patient characteristics and results are described by mean, standard deviation, and percentage. One sample T test was used to measure the significant of operative time and blood loss between our data and previous study of K-L approach.

    Between June 2016 and June 2017, 22 consecutive patients with posterior portion fractures received surgical treatment through the DPA at our medical center. However, due to incomplete data, 12 patients were excluded from this study. Of the remaining 10 patients, seven were male and three were female, with a mean age of 37 years (range: 17–54 years; SD: 12.3 years). Six patients were injured in traffic accidents and four had a history of falling. According to the Judet and Letournel classification, six patients were diagnosed with isolated posterior wall fractures (60%), and four patients with posterior column and posterior wall fractures (40%). Additionally, in six (60%) patients, posterior wall fractures were associated with posterior hip dislocation. The dislocations were reduced as soon as possible. And preoperative supracondylar traction was performed, using weights up to 10 to 12 kg, until surgery. No abnormalities or deficits of the lower limbs were observed in any patients upon neurovascular examination. None of patients had associated injuries of the extremities or had fractures of the head of the femur. All patients were taken for operation as soon as their general medical condition permitted. The average time between injury and surgery was 6 days (range: 4–11 days; SD: 2.5 days) (Table 1).

    Table 1.  Patient demographic and injury data.
    Variable Value (mean ± SD) Percent (%)
    Gender
    Male 7 70
    Female 3 30
    Mean age (years) 37 ± 12.3 (range: 17–54) -
    Acetabular fracture type
    Posterior wall 6 60
    Posterior column and posterior wall 4 40
    Mechanism of injury
    Fall from a height 4 40
    Traffic accident 6 60
    Associated injury
    Posterior hip dislocation 6 60
    Extremity fractures 0 0
    Mean time from injury to surgery (days) 6 ± 2.5 (range: 4–11) -

     | Show Table
    DownLoad: CSV

    For all operations, the mean length of the incision was 9.6 cm (rang: 8–11 cm; SD: 1.4 cm) with a mean operative time of 50 min (range: 35–80 min; SD: 14.5 min). Mean blood loss during surgery was 310 mL (range: 200–440 mL; SD: 82.6 mL). As shown in Figure 4, the operative time and blood loss of DPA exhibited significant decline (p < 0.01) when compared that in previous report of traditional K-L approach [21]. All fractures exhibited radiological evidence of fracture union within 12 weeks after surgery (mean fracture union time, 9.3 weeks; range: 8–12 weeks; SD: 1.0 week). In the post-operative evaluations, the postoperative reduction quality was graded as anatomic in seven patients (70%), imperfect in three patients (30%), and poor in zero patients (0%) according to the Matta scoring system [17,18,19]. No patient exhibited loss of reduction at the end of the follow-up period (Figure 5). The clinical outcomes based on the modified Merle d'Aubigné scoring system [17,18,20] were as follows: excellent in six patients (60%), good in two patients (20%), fair in two patients (20%), and poor in zero patients (0%) (Table 2).

    Figure 4.  Parametric comparison of DPA and previous study of K-L approach. (A) Comparison of Operative time between DPA and previous study of K-L approach ("**" represented p < 0.01). (B) Comparison of Blood loss between DPA and previous study of K-L approach ("**" represented p < 0.01).
    Figure 5.  Representative radiographs of a 45-year-old man who sustained posterior column and posterior wall fractures and was treated by the DPA. (A) Pre-operative obturator oblique view; (B) pre-operative 3-dimensional CT scan; (C) post-operative anteroposterior view; (D-F) post-operative 3-dimensional CT scan.
    Table 2.  Postoperative outcomes and complications.
    Postoperative data Value mean ± SD Percent (%)
    Length of incision(cm) 9.6 ± 1.4 (range: 8–11) -
    Mean operative time (min) 50 ± 14.5 (range: 35–80) -
    Mean blood loss (ml) 310 ± 82.6 (range: 200–440) -
    Mean union time (weeks) 9.3 ± 1.0 (range: 8–12) -
    Reduction quality (Matta)
    Anatomic (<1 mm) 7 70
    Imperfect (1–3 mm) 3 30
    Poor (>3 mm) 0 0
    The modified Merle d'Aubigné score
    Excellent 6 60
    Good 2 20
    Fair 2 20
    Poor 0 0
    Complications
    Heterotopic ossification 1 10
    Femoral head necrosis 1 10

     | Show Table
    DownLoad: CSV

    HO developed in one patient but the range of motion (ROM) of his hip recovered to a similar range as the uninjured hip by the end of the follow-up period. Femoral head necrosis occurred in one case at 9 months after surgery with the diagnosis of complicated posterior wall fractures associated with posterior hip dislocation. The patient received total hip arthroplasty at one year after surgery. Intraoperative radial measurements exhibited an accurate reduction in all patients and no screws were presented in the acetabular fossa. No iatrogenic damage to the SN or the superior gluteal neurovascular bundle and no posttraumatic arthritis was observed postoperatively. There were no instances of wound infection, implant loosening or breakage, recurrent dislocation, deep vein thrombosis, or revision fixation (Table 2).

    Over recent decades, based on the contributions of Judet et al. [3], treatment strategies for acetabular fractures involving the posterior portion have changed from non-operative treatments to surgical treatments. However, for most surgeons, operating on posterior acetabular fractures can be very challenging due to the complex adjacent arteries and nerves [8,22]. Consequently, conventional surgical approaches required extensive exposure and could result in severe trauma and high risks of complications such as HO or iatrogenic nerve or artery injury [8,10,23]. In this study, inspired by the traditional Kocher approach, we designed a novel minimally-invasive posterior approach to treat fractures of the posterior portion of the acetabulum. Satisfactory clinical outcomes were obtained with this reduced approach, with less soft tissue trauma and reduced risks of injury to the iatrogenic SERs, MFCA and SN.

    In classic treatment of posterior acetabular fractures, the K-L approach is considered the ideal approach, with the benefit of remarkable exposure. Nevertheless, a 15–20 cm incision should be performed, and splitting of the SERs, abductors, and even the hip capsule is essential for this approach, therefore, extensive intra-operative blood loss and lengthy operative time are always involved [24]. Collinge et al. reported a 644 mL mean blood loss and 258 min mean operative time in 33 operations performed by the classic K-L approach [25]. In addition, for the trochanteric flip osteotomy associated with the K-L approach, although this can improve visualization of the superior acetabulum and enhance the protective on the MFCA, it is associated with increased blood loss and operative time, according to a recent study [16,26]. Furthermore, a rate of trochanter nonunion ranging from 2.1–2.4% is reported after trochanteric flip osteotomy [27,28]. In our study, the DPA provided direct visualization of the entire posterior wall, part of the hip capsule and the posterior column between the space of the gluteus medius and the piriformis, and yet required an incision of only 8–11 cm. Additionally, the mean operative time of surgery via the DPA was 50 min and mean blood loss was 310 mL. These data suggest that the DPA could be considered a minimally-invasive modification of the traditional Kocher approach.

    Physically, the SERs, abductors and gluteus muscles contribute to the strength of hip joints, and intraoperative preservation of these components is related positively with post-operative rehabilitation. Matta and Ceylan proposed that the reduced muscular split is associated with improvement of hip abduction in their analyses [29,30]. Simultaneously, Borelli et al. reported a hip-muscle strength deficit post-operatively in 15 operations performed using the classic K-L incision [11]. Consequently, as the DPA utilizes blunt division of the SERs, abductors and gluteus muscles, the DPA can provide opportunities for stable and fast post-operative rehabilitation of the hip joint.

    For most surgeons, protection of the MFCA is one of the vital key points for the posterior approach of acetabular fracture, since iatrogenic injury of the MFCA may result in avascular necrosis of the femoral head [31]. Meanwhile, recent investigations suggested that the gluteal artery is involved in the blood supply to the femoral head [32]. Moreover, iatrogenic injury of the SN can catastrophically destroy the functions of the lower limbs. According to recent analyses, a rate of 3–18% of SN injury was associated with surgery via the K-L approach with or without trochanteric flip osteotomy [33,34,35]. In our design, the manipulation space of the DPA was created through blunt separation of the piriformis muscle, and the gluteus medius, the MFCA, SN, superior and inferior gluteal neurovascular bundles could be well protected synchronously by retractors when compared to both the K-L approach and the osteotomy assistant K-L approach according to the anatomical characteristics of the posterior acetabulum. As a result, there were no instances of iatrogenic injury in our study. Nevertheless, one of our patients presented with femoral head necrosis; however, since the patient experienced extensive dislocation time before transfer to our medical center (11 days), it is our view that the major cause of femoral head necrosis may be the result of dislocation rather than iatrogenic injury of the supplying arteries.

    HO is one of the unfortunate possible complications in orthopedics which result in chronic pain and unsatisfactory hip function [36]. Negrin et al. reported an HO rate of 37.9% post-operatively, in the analysis of 167 cases treated by the K-L approach [37]. Based on past investigations, HO is believed to be strongly related to the incision and split division of muscles [15,38]. Although there was one patient who presented with HO at 3 months post-operatively, the DPA approach may provide a low risk of HO due to the blunt division performed during surgery.

    In recent reports, some minimally-invasive approaches similar to DPA have been described. SER-sparing modifications of the K-L approach for selected posterior portion fractures have been reported by Magu [13], Josten [14] and Sarlak [15]. A mean operative time of 73.2 min and mean blood loss of 187 mL in 14 cases were described by Magu and the reduction quality measurements showed an excellent outcome in ten patients (71%), good in three (22%) and fair in one (7%) [13]. In 2011, Josten et al. applied the same approach to stabilize nine patients with a mean operative time of 94 min, the reduction quality was classified as anatomic in five patients, imperfect in three, and poor in one patient [14]. In our results, the DPA resulted in similar operative time and blood loss; in addition, the modified Merle d'Aubigné scoring measurements presented approximate results when compared to the recent reported minimally-invasive approaches for posterior acetabular fractures. Our data suggested that the DPA may be a safe and minimally-invasive technique for the treatment of posterior acetabular fractures. Although the DPA exhibited advantages and excellent follow-up results in this study, the limitations of small case volume and short follow up time remain. Simultaneously, there are no data comparing the DPA and the K-L approach. Therefore, in further studies, a larger number of cases and longer follow-up time is necessary, while comparison of the DPA with other classic approaches for treatment of posterior acetabular factures will also be necessary.

    In this study, a novel minimally-invasive approach for the treatment of posterior acetabular fracture was described and evaluated by 1 year follow-up. In addition to the low blood loss, short operative time and low risk of iatrogenic injury, the patients who underwent the DPA exhibited positive functional recovery in follow-up. Therefore, we conclude that the DPA is an effective, safe and minimally-invasive technique for the treatment of posterior acetabular fractures.

    This study was supported by the National Natural Science Foundation of China (81772428), Special Program of Guangdong Frontier and Key Technological Innovation (No. 2015B010125006) and the "Clinical Research Initiative" of Southern Medical University (No. LC2016ZD032).

    All authors declare no potential conflicts of interest.



    [1] R. H. Ur, R. Mushtaq, A. Palwasha, K. Mukhtaj, I. Nadeem, K. H. Ullah, Making the sourcing decision of software maintenance and information technology, IEEE Access, 9 (2021), 11492-11510. https://doi.org/10.1109/ACCESS.2021.3051023 doi: 10.1109/ACCESS.2021.3051023
    [2] F.S. Ana M, M. R. Chaudron, M. Genero, An industrial case study on the use of UML in software maintenance and its perceived benefits and hurdles, Empirical Software Eng., 23 (2018), 3281-3345. https://doi.org/10.1007/s10664-018-9599-4 doi: 10.1007/s10664-018-9599-4
    [3] E. Vahid, O. Bushehrian, G. Robles, Task assignment to counter the effect of developer turnover in software maintenance: A knowledge diffusion model, Inf. Software Technol., 143 (2022), 106786. https://doi.org/10.1016/j.infsof.2021.106786 doi: 10.1016/j.infsof.2021.106786
    [4] K. Jang, W. Kim, A method of activity-based software maintenance cost estimation for package software, J. Supercomput., 78 (2021), 8151-8171. https://doi.org/10.1007/s11227-020-03610-6 doi: 10.1007/s11227-020-03610-6
    [5] T. Masateru, M. Akito, M. Kenichi, O. Sawako, O. Tomoki, Analysis of work efficiency and quality of software maintenance using cross-company dataset, IEICE Trans. Inf. Syst., 104 (2021), 76-90. https://doi.org/10.1587/transinf.2020MPP0004 doi: 10.1587/transinf.2020MPP0004
    [6] K.W. Kim, Y. Son, Software weakness evaluation method for secure software development, in Proceedings on 2021 International Conferences on Multimedia Information Technology and Applications, (2021), 322-325.
    [7] C. Kim, D. Kim, H. Kang, Detecting defect in headlamp housing with machine learning techniques, in Proceedings on 2021 International Conferences on Multimedia Information Technology and Applications, (2021), 428-430.
    [8] Y. J. Choi, Y. W. Lee, B. G Kim, Residual-based graph convolutional network for emotion recognition in conversation for smart Internet of Things, Big Data, 9 (2021), 279-288. https://doi.org/10.1089/big.2020.0274 doi: 10.1089/big.2020.0274
    [9] P. P. Roy, P. Kumar, B.G. Kim, An efficient sign language recognition (SLR) system using Camshift tracker and hidden Markov model (hmm), SN Comput. Sci., 2 (2021), 1-15. https://doi.org/10.1007/s42979-021-00485-z doi: 10.1007/s42979-021-00485-z
    [10] B. George, F. Stefan, M. Michael, P. Josef, An early investigation of unit testing practices of component-based software systems, in 2020 IEEE Workshop on Validation, Analysis and Evolution of Software Tests, (2020), 12-15. https://doi.org/10.1109/VST50071.2020.9051632
    [11] M. Alcon, H. Tabani, J. Abella, F. J. Cazorla, Enabling Unit Testing of Already-Integrated AI Software Systems: The Case of Apollo for Autonomous Driving, in 2021 24th Euromicro Conference on Digital System Design, (2021), 426-433. https://doi.org/10.1109/DSD53832.2021.00071
    [12] D. Xavier, S. Panichella, A. Gambi, Java unit testing tool competition: Eighth round, in Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, (2020), 545-548. https://doi.org/10.1145/3387940.3392265
    [13] T. Mengqing, J. Yan, W. Xiang, P. Rushu, Black-box approach for software testing based on fat-property, in MATEC Web of Conferences, 309 (2020), 02008. https://doi.org/10.1051/matecconf/202030902008
    [14] S. Bo, Y. Shao, C. Chen, Study on the automated unit testing solution on the linux platform, in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion, (2019), 358-361. https://doi.org/10.1109/QRS-C.2019.00073
    [15] M. Héctor D, J. Gunel, S. Federica, T. Paolo, C. David, Diversifying focused testing for unit testing, ACM Trans. Software Eng. Method., 30 (2021), 1-24. https://doi.org/10.1145/3447265 doi: 10.1145/3447265
    [16] X. Wang, L. Wei, B. Tao, S. Ji, A study about unit testing for embedded software of control system in nuclear power plant, in International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection for Nuclear Power Plant, (2020), 157-163. https://doi.org/10.1007/978-981-16-3456-7_17
    [17] F. Anfal A, R. G. Alsarraj, A. M. Altaie, Software cost estimation based on dolphin algorithm, IEEE Access, 8 (2020), 75279-75287. https://doi.org/10.1109/ACCESS.2020.2988867 doi: 10.1109/ACCESS.2020.2988867
    [18] C. Sonia, H. Singh, Optimizing design of fuzzy model for software cost estimation using particle swarm optimization algorithm, Int. J. Comput. Intell. Appl., 19 (2020), 2050005. https://doi.org/10.1142/S1469026820500054 doi: 10.1142/S1469026820500054
    [19] A. Farrukh, A review of machine learning models for software cost estimation, Rev. Comput. Eng. Res., 6 (2019), 64-75. https://doi.org/10.18488/journal.76.2019.62.64.75 doi: 10.18488/journal.76.2019.62.64.75
    [20] K. Ishleen, N. G. Singh, W. Ritika, J. Vishal, B. Anupam, Neuro fuzzy—COCOMO Ⅱ model for software cost estimation, Int. J. Inf. Technol., 10 (2018), 181-187. https://doi.org/10.1007/s41870-018-0083-6 doi: 10.1007/s41870-018-0083-6
    [21] J. Miller, S. Wienke, M. Schlottke-Lakemper, M. Meinke, M. S. Müller, Applicability of the software cost model COCOMO Ⅱ to HPC projects, Int. J. Comput. Sci. Eng., 17 (2018), 283-296. https://doi.org/10.1504/IJCSE.2018.095849 doi: 10.1504/IJCSE.2018.095849
    [22] A. Asheeri, M. Mohd, M. Hammad, Machine learning models for software cost estimation, in 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, (2019), 1-6. https://doi.org/10.1109/3ICT.2019.8910327
    [23] A. Shaina, N. Mishra, Software cost estimation using artificial neural network, in Soft Computing: Theories and Applications, Springer, (2018), 51-58. https://doi.org/10.1007/978-981-10-5699-4_6
    [24] S. S. Pratap, V. P. Singh, A. K. Mehta, Differential evolution using homeostasis adaption based mutation operator and its application for software cost estimation, J. King Saud Univ.-Comput. Inf. Sci., 33 (2021), 740-752. https://doi.org/10.1016/j.jksuci.2018.05.009 doi: 10.1016/j.jksuci.2018.05.009
    [25] S. W. Ahmad, G. R. Bamnote, Whale-crow optimization (WCO)-based optimal regression model for software cost estimation, Sādhanā, 44 (2019), 1-15. https://doi.org/10.1007/s12046-019-1085-1 doi: 10.1007/s12046-019-1085-1
    [26] J. A. Khan, S. U. R. Khan, J. Iqbal, I. U. Rehman, Empirical investigation about the factors affecting the cost estimation in global software development context, IEEE Access, 9 (2021), 22274-22294. https://doi.org/10.1109/ACCESS.2021.3055858 doi: 10.1109/ACCESS.2021.3055858
    [27] V. S. Desai, R. Mohanty, ANN-Cuckoo optimization technique to predict software cost estimation, in 2018 Conference on Information and Communication Technology, (2018), 1-6. https://doi.org/10.1109/INFOCOMTECH.2018.8722380
    [28] R. C. A. Alves, D. A. G. Oliveira, G. A. N. Segura, C. B. Margi, The cost of software-defining things: A scalability study of software-defined sensor networks, IEEE Access 7 (2019), 115093-115108. https://doi.org/10.1109/ACCESS.2019.2936127
    [29] D. G. Lee, Y. S. Seo, Testing cost reduction using nested mutation testing, in Proceedings on 2021 International Conferences on Multimedia Information Technology and Applications, (2021), 462-464.
    [30] N. Li, M. Shepperd, Y. Guo, A systematic review of unsupervised learning techniques for software defect prediction, Inf. Software Technol., 122 (2020), 106287. https://doi.org/10.1016/j.infsof.2020.106287 doi: 10.1016/j.infsof.2020.106287
    [31] F. Keller, L. Grunske, S. Heiden, A. Filieri, A. Hoorn, D. Lo, A critical evaluation of spectrum-based fault localization techniques on a large-scale software system, in 2017 IEEE International Conference on Software Quality, Reliability and Security, (2017), 114-125. https://doi.org/10.1109/QRS.2017.22
    [32] The cost of poor software quality in the US: A 2020 report, Report of Proc. Consortium Inf. Softw. QualityTM, 2021. Available from: https://www.disputesoft.com/wp-content/uploads/2021/01/CPSQ-2020-Software-Report.pdf.
    [33] 'Fully weaponized' software bug poses a threat to Minecraft gamers and apps worldwide including Google, Twitter, Netflix, Spotify, Apple iCloud, Uber and Amazon, 2021. Available from: https://www.dailymail.co.uk/news/article-10297693/Global-race-patch-critical-computer-bug.html.
    [34] P. Vitharana, Defect propagation at the project-level: results and a post-hoc analysis on inspection efficiency, Empirical Software Eng., 22 (2017), 57-79. https://doi.org/10.1007/s10664-015-9415-3 doi: 10.1007/s10664-015-9415-3
    [35] Z. Wei, T. Shen, X. Chen, Just-in-time defect prediction technology based on interpretability technology, in 2021 8th International Conference on Dependable Systems and Their Applications (DSA), (2021), 78-89. https://doi.org/10.1109/DSA52907.2021.00017
    [36] L. Ma, F. Zhang, J. Sun, M. Xue, B. Li, F. J. Xu, et al., Deepmutation: Mutation testing of deep learning systems, in 2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE), (2018), 100-111. https://doi.org/10.1109/ISSRE.2018.00021
    [37] G. Petrovic, M. Ivankovic, B. Kurtz, P. Ammann, R. Just, An industrial application of mutation testing: Lessons, challenges, and research directions, in 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), (2018), 47-53. https://doi.org/10.1109/ICSTW.2018.00027
    [38] Q. Hu, L. Ma, X. Xie, B. Yu, Y. Liu, J. Zhao, DeepMutation++: A mutation testing framework for deep learning systems, in 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), (2019), 1158-1611. https://doi.org/10.1109/ASE.2019.00126
    [39] P. Gómez-Abajo, E. Guerra, J. D. Lara, M. G. Merayo, Wodel-Test: a model-based framework for language-independent mutation testing, Software Syst. Model., 20 (2021), 767-793. https://doi.org/10.1007/s10270-020-00827-0 doi: 10.1007/s10270-020-00827-0
    [40] L. Chen, L. Zhang, Speeding up mutation testing via regression test selection: An extensive study, in 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), (2018), 58-69. https://doi.org/10.1109/ICST.2018.00016
    [41] N. Humbatova, G. Jahangirova, P. Tonella, DeepCrime: mutation testing of deep learning systems based on real faults, in Proceedings of the 30th ACM SIGSOFT International, Symposium on Software Testing and Analysis, (2021), 67-78. https://doi.org/10.1145/3460319.3464825
    [42] K. Moran, M. Tufano, C. Bernal-Cárdenas, M. Linares-Vásquez, G. Bavota, C. Vendome, et al., MDroid+: A mutation testing framework for android, in 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion), (2018), 33-36. https://doi.org/10.1145/3183440.3183492
    [43] Z. Li, H. Wu, J. Xu, X. Wang, L. Zhang, Z. Chen, MuSC: A tool for mutation testing of ethereum smart contract, in 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), (2019), 1198-1201. https://doi.org/10.1109/ASE.2019.00136
    [44] D. Mao, L. Chen, L. Zhang, An extensive study on cross-project predictive mutation testing, in 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST), (2019), 160-171. https://doi.org/10.1109/ICST.2019.00025
    [45] D. Cheng, C. Cao, C. Xu, X. Ma, Manifesting bugs in machine learning code: An explorative study with mutation testing, in 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), (2018), 313-324. https://doi.org/10.1109/QRS.2018.00044
    [46] S. Lee, D. Binkley, R. Feldt, N. Gold, S. Yoo, Causal program dependence analysis, preprint, arXiv: 2104.09107. https://doi.org/10.48550/arXiv.2104.09107
    [47] S. Oh, S. Lee, S. Yoo, Effectively sampling higher order mutants using causal effect, in 2021 IEEE International Conference on Software Testing, Verification and Validation Workshops, (2021), 19-24. https://doi.org/10.1109/ICSTW52544.2021.00017
    [48] X. Cai, Y. Niu, S. Geng, J. Zhang, Z. Cui, J. Li, et al., An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search, Concurrency Comput.: Pract. Exper., 32 (2020), e5478. https://doi.org/10.1002/cpe.5478 doi: 10.1002/cpe.5478
    [49] A. Rahman, J. Stallings, L. Williams, Defect prediction metrics for infrastructure as code scripts in DevOps, in Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, (2018), 414-415. https://doi.org/10.1145/3183440.3195034
    [50] A. Amar, P. C. Rigby, Mining historical test logs to predict bugs and localize faults in the test logs, in 2019 IEEE/ACM 41st International Conference on Software Engineering. (2019), 140-151. https://doi.org/10.1109/ICSE.2019.00031
    [51] P. Sangameshwar, B. Ravindran, Predicting software defect type using concept-based classification, Empirical Software Eng., 25 (2020), 1341-1378. https://doi.org/10.1142/S1469026820500054 doi: 10.1142/S1469026820500054
    [52] S. Wang, T. Liu, J. Nam, L. Tan, Deep semantic feature learning for software defect prediction, IEEE Trans. Software Eng., 46 (2018), 1267-1293. https://doi.org/10.1109/TSE.2018.2877612 doi: 10.1109/TSE.2018.2877612
    [53] X. Yin, L. Liu, H. Liu, Q. Wu, Heterogeneous cross-project defect prediction with multiple source projects based on transfer learning, Math. Biosci. Eng., 17 (2020), 1020-1040. https://doi.org/10.3934/mbe.2020054 doi: 10.3934/mbe.2020054
    [54] L. Qiao, X. Li, Q. Umer, P. Guo, Deep learning based software defect prediction, Neurocomputing, 385 (2020), 100-110. https://doi.org/10.1016/j.neucom.2019.11.067 doi: 10.1016/j.neucom.2019.11.067
    [55] F. Wu, X. Y. Jing, Y. Sun, J. Sun, L. Huang, F. Cui, et al., Cross-project and within-project semisupervised software defect prediction: A unified approach, IEEE Trans. Reliab., 67 (2018), 581-597. https://doi.org/10.1109/TR.2018.2804922 doi: 10.1109/TR.2018.2804922
    [56] D. L. Miholca, G. Czibula, I. G. Czibula, A novel approach for software defect prediction through hybridizing gradual relational association rules with artificial neural networks, Inf. Sci., 441 (2018), 152-170. https://doi.org/10.1016/j.ins.2018.02.027 doi: 10.1016/j.ins.2018.02.027
    [57] A. Majd, M. Vahidi-Asl, A. Khalilian, P. Poorsarvi-Tehrani, H. Haghighi, SLDeep: Statement-level software defect prediction using deep-learning model on static code features, Expert Syst. Appl., 147 (2020), 113156. https://doi.org/10.1016/j.eswa.2019.113156 doi: 10.1016/j.eswa.2019.113156
    [58] G. G. Cabral, L. L. Minku, E. Shihab, S. Mujahid, Class imbalance evolution and verification latency in just-in-time software defect prediction, in 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), (2019), 666-676. https://doi.org/10.1109/ICSE.2019.00076
    [59] A. Perez, R. Abreu, A. Deursen, A test-suite diagnosability metric for spectrum-based fault localization approaches, in 2017 IEEE/ACM 39th International Conference on Software Engineering, (2017), 654-664. https://doi.org/10.1109/ICSE.2017.66
    [60] X. Li, W. Li, Y. Zhang, L. Zhang, Deepfl: Integrating multiple fault diagnosis dimensions for deep fault localization, in Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, (2019), 169-180. https://doi.org/10.1145/3293882.3330574
    [61] A. Zakari, S. P. Lee, R. Abreu, B. H. Ahmed, R. A. Rasheed, Multiple fault localization of software programs: A systematic literature review, Inf. Software Technol., 124 (2020), 106312. https://doi.org/10.1016/j.infsof.2020.106312 doi: 10.1016/j.infsof.2020.106312
    [62] Z. Li, Y. Wu, Y. Liu, An empirical study of bug isolation on the effectiveness of multiple fault localization, in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), (2019), 18-25. https://doi.org/10.1109/QRS.2019.00016
    [63] H. L. Ribeiro, R. P. A. de Araujo, M. L. Chaim, H. A. de Souza, F. Kon, Jaguar: A spectrum-based fault localization tool for real-world software, in 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), (2018), 404-409. https://doi.org/10.1109/ICST.2018.00048
    [64] K. Liu, A. Koyuncu, T. F. Bissyandé, D. Kim, J. Klein, Y. Le Traon, You cannot fix what you cannot find! An investigation of fault localization bias in benchmarking automated program repair systems, in 2019 12th IEEE conference on software testing, validation and verification (ICST), (2019), 102-113. https://doi.org/10.1109/ICST.2019.00020
    [65] D. Zou, J. Liang, Y. Xiong, M. D. Ernst, L. Zhang, An empirical study of fault localization families and their combinations, IEEE Trans. Software Eng., 47 (2019), 332-347. https://doi.org/10.1109/TSE.2019.2892102 doi: 10.1109/TSE.2019.2892102
    [66] J. Kim, J. Kim, E. Lee, Variable-based fault localization, Inf. Software Technol., 107 (2019), 179-191. https://doi.org/10.1016/j.infsof.2018.11.009 doi: 10.1016/j.infsof.2018.11.009
    [67] Y. Kim, S. Mun, S. Yoo, M. Kim, Precise learn-to-rank fault localization using dynamic and static features of target programs, ACM Trans. Software Eng. Method. (TOSEM), 28 (2019), 1-34. https://doi.org/10.1145/3345628 doi: 10.1145/3345628
    [68] Defects4J, 2022. available from: https://github.com/rjust/defects4j.
  • This article has been cited by:

    1. Shunchang Li, Gang Wu, A Semi‐Randomized and Augmented Kaczmarz Method With Simple Random Sampling for Large‐Scale Inconsistent Linear Systems, 2024, 1070-5325, 10.1002/nla.2591
    2. Guang-Xin Huang, Shuang-You Zhong, Tensor randomized extended Kaczmarz methods for large inconsistent tensor linear equations with t-product, 2024, 96, 1017-1398, 1755, 10.1007/s11075-023-01684-w
    3. Ran-Ran Li, Hao Liu, The maximum residual block Kaczmarz algorithm based on feature selection, 2025, 10, 2473-6988, 6270, 10.3934/math.2025286
    4. Ran-Ran Li, Hao Liu, The global block Kaczmarz method using double greedy strategy, 2025, 1017-1398, 10.1007/s11075-025-02069-x
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2897) PDF downloads(143) Cited by(1)

Figures and Tables

Figures(4)  /  Tables(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog