Search results

1 – 10 of 383
Article
Publication date: 24 April 2024

Bahman Arasteh and Ali Ghaffari

Reducing the number of generated mutants by clustering redundant mutants, reducing the execution time by decreasing the number of generated mutants and reducing the cost of…

Abstract

Purpose

Reducing the number of generated mutants by clustering redundant mutants, reducing the execution time by decreasing the number of generated mutants and reducing the cost of mutation testing are the main goals of this study.

Design/methodology/approach

In this study, a method is suggested to identify and prone the redundant mutants. In the method, first, the program source code is analyzed by the developed parser to filter out the effectless instructions; then the remaining instructions are mutated by the standard mutation operators. The single-line mutants are partially executed by the developed instruction evaluator. Next, a clustering method is used to group the single-line mutants with the same results. There is only one complete run per cluster.

Findings

The results of experiments on the Java benchmarks indicate that the proposed method causes a 53.51 per cent reduction in the number of mutants and a 57.64 per cent time reduction compared to similar experiments in the MuJava and MuClipse tools.

Originality/value

Developing a classifier that takes the source code of the program and classifies the programs' instructions into effective and effectless classes using a dependency graph; filtering out the effectless instructions reduces the total number of mutants generated; Developing and implementing an instruction parser and instruction-level mutant generator for Java programs; the mutant generator takes instruction in the original program as a string and generates its single-line mutants based on the standard mutation operators in MuJava; Developing a stack-based evaluator that takes an instruction (original or mutant) and the test data and evaluates its result without executing the whole program.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Abstract

Details

Leaders Assemble! Leadership in the MCU
Type: Book
ISBN: 978-1-80117-673-6

Article
Publication date: 12 November 2020

Seyed Mohammad Javad Hosseini, Bahman Arasteh, Ayaz Isazadeh, Mehran Mohsenzadeh and Mitra Mirzarezaee

The purpose of this study is to reduce the number of mutations and, consequently, reduce the cost of mutation test. The results of related studies indicate that about 40% of…

Abstract

Purpose

The purpose of this study is to reduce the number of mutations and, consequently, reduce the cost of mutation test. The results of related studies indicate that about 40% of injected faults (mutants) in the source code are effect-less (equivalent). Equivalent mutants are one of the major costs of mutation testing and the identification of equivalent and effect-less mutants has been known as an undecidable problem.

Design/methodology/approach

In a program with n branch instructions (if instruction) there are 2n execution paths (test paths) that the data and codes into each of these paths can be considered as a target of mutation. Given the role and impact of data in a program, some of data and codes propagates the injected mutants more likely to the output of the program. In this study, firstly the error-propagation rate of the program data is quantified using static analysis of the program control-flow graph. Then, the most error-propagating test paths are identified by the proposed heuristic algorithm (Genetic Algorithm [GA]). Data and codes with higher error-propagation rate are only considered as the strategic locations for the mutation testing.

Findings

In order to evaluate the proposed method, an extensive series of mutation testing experiments have been conducted on a set of traditional benchmark programs using MuJava tool set. The results depict that the proposed method reduces the number of mutants about 24%. Also, in the corresponding experiments, the mutation score is increased about 5.6%. The success rate of the GA in finding the most error-propagating paths of the input programs is 99%. On average, only 7.46% of generated mutants by the proposed method are equivalent. Indeed, 92.54% of generated mutants are non-equivalent.

Originality/value

The main contribution of this study is as follows: Proposing a set of equations to measure the error-propagation rate of each data, basic-block and execution path of a program. Proposing a genetic algorithm to identify a most error-propagating path of program as locations of mutations. Developing an efficient mutation-testing framework that mutates only the strategic locations of a program identified by the proposed genetic algorithms. Reducing the time and cost of mutation testing by reducing the equivalent mutants.

Details

Data Technologies and Applications, vol. 55 no. 1
Type: Research Article
ISSN: 2514-9288

Keywords

Book part
Publication date: 20 October 2022

Francesca Lopez

X-Men is a movie franchise spanning 11 films centered on monsters and mutants (Braidotti, 1996), that is, the superheroes that appeared in the Marvel comics (Lauren Shuler Donner…

Abstract

X-Men is a movie franchise spanning 11 films centered on monsters and mutants (Braidotti, 1996), that is, the superheroes that appeared in the Marvel comics (Lauren Shuler Donner, 2000–2017). The franchise includes a rich compendium of male and female characters. Characters from both gender categories are gifted with powers and enjoy a remarkable focus from the plot. However, there are fewer female characters than male, and the former's powers are mainly related to the mind, rather than physical strength. If it is possible to immediately criticise the above-mentioned male focus, or the unequal distribution of powers, at the same time it is impossible to deny that both gender categories – male and female – reintroduce the gender binary that structures everyday reality in our current society (Butler, 2015). Such binary is a structural part of the cisgender and heteronormative system, inside which human beings carry out their existence. For these reasons, X-Men was interpreted by many transgender movements as a possible monstrous reclamation because it confers visibility to those bodies which are outside the norm (Preciado, 2020b) and it includes them in the context of a possible recognition as part of the cultural imaginary. This analysis, therefore, glimpses a possible liberation from the epistemological and material violence of the cisgender norm. This chapter will focus on the way in which the X-Men saga isn't faithful to a revolutionarily monstrous possibility, but rather carries out, through an apparatus of capture (Deleuze & Guattari, 2009), the reenactment of cis- and heteronormativity. In fact, those mutant and monstrous bodies represented here can be part of a highly popular franchise because they are part of the cisgender and heterosexual norm (Wittig, 1992) and because they put their monstrosity not outside the devices of power (Foucault, 2015), but at their service.

Details

Interdisciplinary Essays on Monsters and the Monstrous
Type: Book
ISBN: 978-1-80117-027-7

Keywords

Article
Publication date: 2 June 2020

Nasrin Shomali and Bahman Arasteh

For delivering high-quality software applications, proper testing is required. A software test will function successfully if it can find more software faults. The traditional…

Abstract

Purpose

For delivering high-quality software applications, proper testing is required. A software test will function successfully if it can find more software faults. The traditional method of assessing the quality and effectiveness of a test suite is mutation testing. One of the main drawbacks of mutation testing is its computational cost. The research problem of this study is the high computational cost of the mutation test. Reducing the time and cost of the mutation test is the main goal of this study.

Design/methodology/approach

With regard to the 80–20 rule, 80% of the faults are found in 20% of the fault-prone code of a program. The proposed method statically analyzes the source code of the program to identify the fault-prone locations of the program. Identifying the fault-prone (complex) paths of a program is an NP-hard problem. In the proposed method, a firefly optimization algorithm is used for identifying the most fault-prone paths of a program; then, the mutation operators are injected only on the identified fault-prone instructions.

Findings

The source codes of five traditional benchmark programs were used for evaluating the effectiveness of the proposed method to reduce the mutant number. The proposed method was implemented in Matlab. The mutation injection operations were carried out by MuJava, and the output was investigated. The results confirm that the proposed method considerably reduces the number of mutants, and consequently, the cost of software mutation-test.

Originality/value

The proposed method avoids the mutation of nonfault-prone (simple) codes of the program, and consequently, the number of mutants considerably is reduced. In a program with n branch instructions (if instruction), there are 2n execution paths (test paths) that the data and codes into each of these paths can be considered as a target of mutation. Identifying the error-prone (complex) paths of a program is an NP-hard problem. In the proposed method, a firefly optimization algorithm as a heuristic algorithm is used for identifying the most error-prone paths of a program; then, the mutation operators (faults) are injected only on the identified fault-prone instructions.

Details

Data Technologies and Applications, vol. 54 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

Book part
Publication date: 24 November 2022

Deepthi Krishna Thota

The image of Mel Gibson and Hugh Jackman (as Wolverine) in the Mad Max and X-Men franchises represents traditional heroic action masculinity. This chapter explores the roles of…

Abstract

The image of Mel Gibson and Hugh Jackman (as Wolverine) in the Mad Max and X-Men franchises represents traditional heroic action masculinity. This chapter explores the roles of female action heroes in defying patriarchy and subverting action film genre stereotypes in male-dominated franchises. In contrast to past characterisations of Max, Mad Max: Fury Road (2015) provides both a departure to the role of Max as the male saviour seeking vengeance, by focusing on Imperator Furiosa and offering space for a portrayal of femininity characterised by inclusivity and tolerance. In Logan (2017), the decay of Wolverine is central to the narrative. Rather than the portrayal of an immortal hypermasculine hero in the previous X-Men films (with emphasis on men in X-Men), a new female mutant Laura assumes his mantle. In this context, I consider the gender roles and depiction of women in these films, and how they may be read as offering a futuristic vision of utopia in dystopian narrative worlds.

In the distant future, the social and economic systems build by the patriarchy are crumbling, causing an environmental crisis and divisive society, where people who are different (mutants) are hunted down. Mad Max: Fury Road and Logan both offer an alternative depiction of women and girls, providing new perspectives to navigate an uncertain dystopian world through fierce female warriors Furiosa, and mutant girl Laura. Ultimately this chapter demonstrates that survival in the post-apocalyptic and dystopian worlds represented in Mad Max: Fury Road and Logan may be achieved via a subversive feminist solution/utopia to the crisis of masculinity.

Details

Gender and Action Films 2000 and Beyond
Type: Book
ISBN: 978-1-80117-518-0

Keywords

Article
Publication date: 1 January 2013

A.A. Abdel Hameed, A.M. Ayesh, M. Abdel Razik and H.F. Abdel Mawla

The purpose of this paper is to study the effect of ultraviolet radiation (UVC) on the survivability and susceptibility of some fungal species isolated from the indoor air of…

Abstract

Purpose

The purpose of this paper is to study the effect of ultraviolet radiation (UVC) on the survivability and susceptibility of some fungal species isolated from the indoor air of agricultural, industry‐related workplaces.

Design/methodology/approach

Environmental fungi were collected from the air of cotton and soybean mills using liquid impinger sampler (AGI‐30). The UVC exposure experiment was performed on Aspergillus flavus, Aspergillus parasiticus, Aspergillus ochraceous, Aspergillus fumigatus, Aspergillus niger and Penicillium rubrum using UV lamp (λ=254 nm; 0.1 mW/cm2). The susceptibility constant (Z) was used to determine the susceptibility of any given organism to UVC.

Findings

The conidia survival was inversely proportional to the time of UVC exposure and ∼77‐88.5% of conidia were killed within six hours of exposure. Mutant conidia showed a wide range of morphological alterations including damage of their cell walls and features. Mycotoxin production patterns of the mutants Aspergillus flavus and Aspergillus parasiticus changed on comparison with the parental control patterns.

Originality/value

The paper provides information on the effect of UVC radiation on environmental fungi. The results reported in this research discussed the disadvantages of using UVC as a decontaminant of fungi.

Details

Management of Environmental Quality: An International Journal, vol. 24 no. 1
Type: Research Article
ISSN: 1477-7835

Keywords

Book part
Publication date: 20 October 2022

Francesca Lopez, Russ Martin and Chloë Isabel Olivo

What relation does the monster figure have to gender? It is widely accepted that monsters in television, cinema and literature commonly stand in for the Other, be that a social…

Abstract

What relation does the monster figure have to gender? It is widely accepted that monsters in television, cinema and literature commonly stand in for the Other, be that a social, political or racialised Other. To consider monsters and monstrosity through the lens of gender is to investigate the links between the monster figure and the Others that exist under the system of patriarchy – most notably women, gender-diverse people and queer folks. In this collective chapter, Francesca Lopez, Russ Martin and Chloe Olivo explore how the monster figure relates to gender via a conversation that traces the links between three individually written chapters – X-Men: The Normative System Disguised as Mutant, Dragula and the Expansive Queerness of the Drag Supermonster and Femicide on the Frontier: Analysing Motives Behind the Femicide Crisis in Ciudad Juàrez. Each of these chapters investigates social norms relating to gender and those who challenge or defy them. Ultimately, the authors argue, it is those whose gendered and sexual identities are not associated with social power that are made monstrous by the patriarchy. This conversation-based chapter considers both real-life situations in which real people are made monstrous and monsters from fiction films and reality television. Ultimately, the authors suggest that the monster figure can be powerful and transformative for those who exist on the margins of the patriarchy – though, as this chapter documents, such is not always the case.

Details

Interdisciplinary Essays on Monsters and the Monstrous
Type: Book
ISBN: 978-1-80117-027-7

Keywords

Book part
Publication date: 5 January 2005

David Sloan Wilson

Darwin’s theory of natural selection, which explains how individual organisms can become exquisitely adapted to their environments, does not explain the evolution of adaptive…

Abstract

Darwin’s theory of natural selection, which explains how individual organisms can become exquisitely adapted to their environments, does not explain the evolution of adaptive societies with equal ease. To understand the nature of the problem, imagine a mutant individual who behaves in a way that increases the survival of everyone in her society, including herself, to an equal degree. Such a “no-cost public good” might not appear very feasible (and will soon be amended), but is useful for illustrative purposes. By increasing the fitness of everyone, the mutant trait will not increase in frequency within the society (other than by drift, which can equally cause a decrease in frequency). This example illustrates the elementary fact that natural selection is based on relative fitness. It’s not enough for a mutant trait to increase its own survival and reproduction; it must do so more than alternative traits in the population. The relative nature of fitness makes the evolutionary forces within a population insensitive to the welfare of the population as a whole.

Details

Evolutionary Psychology and Economic Theory
Type: Book
ISBN: 978-0-76231-138-5

Article
Publication date: 1 December 2002

T. Habtemariam, B. Tameru, D. Nganwa, L. Ayanwale, A. Ahmed, D. Oryang and H. AbdelRahman

Computational models can facilitate the understanding of complex biomedical systems such as in HIV/AIDS. Untangling the dynamics between HIV and CD4+ cellular populations and…

Abstract

Computational models can facilitate the understanding of complex biomedical systems such as in HIV/AIDS. Untangling the dynamics between HIV and CD4+ cellular populations and molecular interactions can be used to investigate the effective points of interventions in the HIV life cycle. With that in mind, we have developed a state transition systems dynamics and stochastic model that can be used to examine various alternatives for the control and treatment of HIV/AIDS. The specific objectives of our study were to use a cellular/molecular model to study optimal chemotherapies for reducing the HIV viral load and to use the model to study the pattern of mutant viral populations and resistance to drug therapies. The model considers major state variables (uninfected CD4+ lymphocytes, infected CD4+ cells, replicated virions) along with their respective state transition rates (viz. CD4+ replacement rate, infection rate, replication rate, depletion rate). The state transitions are represented by ordinary differential equations. The systems dynamics model was used for a variety of computational experimentations to evaluate HIV mutations, and to evaluate effective strategies in HIV drug therapy interventions.

Details

Kybernetes, vol. 31 no. 9/10
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 383