{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:35:09Z","timestamp":1761708909851,"version":"3.41.0"},"reference-count":27,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2013,8,26]],"date-time":"2013-08-26T00:00:00Z","timestamp":1377475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2013,8,26]]},"abstract":"<jats:p>As quality of software plays a vital role in real time systems, it is essential to identify the crucial parts in the system and to test them effectively. In the proposed approach, the critical components are identified by means of mutation based impact analysis. The next task is to test the critical components using the Hybrid Genetic Algorithm (HGA) based test case generation and optimization approach. The mutants are automatically generated by seeding faults into each method of all the components in the Software Under Test (SUT). The initial set of test cases is generated using randomized test data. The generated test cases are executed over the original and the mutant to identify whether the test case detects the error or not. Based on the results, the Mutation Score (MS) is calculated, which always lies between 0 and 1. The best test cases are chosen based on having higher mutation scores and are executed on mutants to analyze how each component affects the other components in the SUT. Based on the analysis, the critical components are identified and they need rigorous testing using the test cases generated by the HGA. The algorithm uses the RemoveTop and LocalBest improvement heuristics to achieve near optimal solutions. In unit testing, the test cases are executed against the original and the mutant. The test case optimization is done by evaluating the effectiveness of test suites using the Mutation Score and the Branch Coverage Value (BCV). In pair-wise testing, the effective test cases are selected based on the higher mutation scores and branch coverage values. The components are executed against these test cases and the execution traces are recorded. The traced results are compared against the expected outputs which were previously stored in the repository and the statuses are updated. Based on the statuses, the faulty methods are revealed. The efficiency of the proposed approach is compared with Genetic Algorithm (GA) and we concluded that the final test suite size and the total execution time are reduced in the proposed approach. Finally various graphs and PDF reports are generated for visualization purposes.<\/jats:p>","DOI":"10.1145\/2507288.2507309","type":"journal-article","created":{"date-parts":[[2013,9,3]],"date-time":"2013-09-03T11:57:11Z","timestamp":1378209431000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Critical components testing using hybrid genetic algorithm"],"prefix":"10.1145","volume":"38","author":[{"given":"D.","family":"Jeya Mala","sequence":"first","affiliation":[{"name":"Thiagarajar College of Engineering Tamil Nadu, India"}]},{"given":"K.","family":"Sabari Nathan","sequence":"additional","affiliation":[{"name":"Thiagarajar College of Engineering Tamil Nadu, India"}]},{"given":"S.","family":"Balamurugan","sequence":"additional","affiliation":[{"name":"Thiagarajar College of Engineering Tamil Nadu, India"}]}],"member":"320","published-online":{"date-parts":[[2013,8,26]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Software Engineering. A Practitioner's Approach","author":"Pressman Roger S.","year":"1997","unstructured":"Roger S. Pressman . Software Engineering. A Practitioner's Approach , McGraw Hill , 1997 . Roger S. Pressman. Software Engineering. A Practitioner's Approach, McGraw Hill, 1997."},{"unstructured":"Aditya P.Mathur. Software Testing. Pearson Education Asia.  Aditya P.Mathur. Software Testing. Pearson Education Asia.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","volume-title":"PEARSON Education","author":"Desikan Srinivasan","year":"2006","unstructured":"Srinivasan Desikan , Gopalaswamy Ramesh . Software Testing Principles & Practices . PEARSON Education , 2006 . Srinivasan Desikan, Gopalaswamy Ramesh. Software Testing Principles & Practices. PEARSON Education, 2006."},{"key":"e_1_2_1_4_1","first-page":"181","volume-title":"Advanced Computing (ICoAC), 2011 Third International Conference on , vol., no.","author":"Praba D.J.","year":"2011","unstructured":"Mala, D.J. , Praba . M. R. Critical components identification and verification for effective software test prioritization . Advanced Computing (ICoAC), 2011 Third International Conference on , vol., no. , pp. 181 -- 186 , 14-16 Dec. 2011 Mala, D.J., Praba. M.R. Critical components identification and verification for effective software test prioritization. Advanced Computing (ICoAC), 2011 Third International Conference on , vol., no., pp.181--186, 14-16 Dec. 2011"},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1145\/1764810.1764824"},{"unstructured":"MUJava homepage {Online}. Available: http:\/\/cs.gmu.edu\/~offutt\/mujava\/  MUJava homepage {Online}. Available: http:\/\/cs.gmu.edu\/~offutt\/mujava\/","key":"e_1_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1002\/stvr.v15:2"},{"key":"e_1_2_1_9_1","volume-title":"PEARSON Education","author":"Desikan Srinivasan","year":"2006","unstructured":"Srinivasan Desikan , Gopalaswamy Ramesh . Software Testing Principles & Practices . PEARSON Education , 2006 . Srinivasan Desikan, Gopalaswamy Ramesh. Software Testing Principles & Practices. PEARSON Education, 2006."},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.5555\/257572.257597"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of Seventh International Conference on Software Engineering and Knowledge Engineering.","author":"Lonigro F., A.","year":"1995","unstructured":"Lanubile, F., A. Lonigro , and G. Visaggio . Comparing models for identifying fault-prone software components . Proceedings of Seventh International Conference on Software Engineering and Knowledge Engineering. 1995 . Lanubile, F., A. Lonigro, and G. Visaggio. Comparing models for identifying fault-prone software components. Proceedings of Seventh International Conference on Software Engineering and Knowledge Engineering. 1995."},{"unstructured":"http:\/\/www.informit.com\/guides\/content.aspx  http:\/\/www.informit.com\/guides\/content.aspx","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings: International Conference on Software Quality.","author":"Helander M.","year":"1996","unstructured":"Ohlsson, Niclas, M. Helander , and C. Wohlin . Quality improvement by identification of fault-prone modules using software design metrics . Proceedings: International Conference on Software Quality. 1996 . Ohlsson, Niclas, M. Helander, and C. Wohlin. Quality improvement by identification of fault-prone modules using software design metrics. Proceedings: International Conference on Software Quality. 1996."},{"unstructured":"Birt James R. and Renate Sitte. Optimizing testing efficiency with error-prone path identification and genetic algorithms. Software  Birt James R. and Renate Sitte. Optimizing testing efficiency with error-prone path identification and genetic algorithms. Software","key":"e_1_2_1_14_1"},{"issue":"6","key":"e_1_2_1_15_1","first-page":"250","article-title":"Simulator for Identifying Critical Components for Testing in a Component Based Software System","volume":"10","author":"Suri P.K.","year":"2010","unstructured":"P.K. Suri , Kumar Sandeep . Simulator for Identifying Critical Components for Testing in a Component Based Software System . IJCSNS International Journal of Computer Science and Network Security. Vol. 10 , No. 6 , 2010 ; pp. 250 -- 257 . P.K. Suri, Kumar Sandeep. Simulator for Identifying Critical Components for Testing in a Component Based Software System. IJCSNS International Journal of Computer Science and Network Security. Vol.10, No.6, 2010; pp. 250--257.","journal-title":"IJCSNS International Journal of Computer Science and Network Security."},{"doi-asserted-by":"publisher","key":"e_1_2_1_16_1","DOI":"10.1109\/TSE.2006.102"},{"doi-asserted-by":"publisher","key":"e_1_2_1_17_1","DOI":"10.1016\/j.jss.2007.12.794"},{"issue":"4","key":"e_1_2_1_18_1","first-page":"41","article-title":"A novel methodology for software risk assessment at architectural level using UML diagrams","volume":"9","author":"Mitrabinda Ray","year":"2011","unstructured":"Ray Mitrabinda , Prasad Mohapatra Durga . A novel methodology for software risk assessment at architectural level using UML diagrams , SETLabs Briefings , Vol 9 , No 4 , 2011 ; pp. 41 -- 60 . Ray Mitrabinda, Prasad Mohapatra Durga. A novel methodology for software risk assessment at architectural level using UML diagrams, SETLabs Briefings, Vol 9, No 4, 2011; pp.41--60.","journal-title":"SETLabs Briefings"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1109\/TSE.2003.1237174"},{"unstructured":"http:\/\/www.infosys.com\/engineering-services\/white-papers\/Documents\/comprehensive-metrics-model.pdf  http:\/\/www.infosys.com\/engineering-services\/white-papers\/Documents\/comprehensive-metrics-model.pdf","key":"e_1_2_1_20_1"},{"unstructured":"http:\/\/ant.apache.org\/  http:\/\/ant.apache.org\/","key":"e_1_2_1_22_1"},{"unstructured":"http:\/\/staffwww.dcs.shef.ac.uk\/people\/A.Simons\/jwalk\/download.html  http:\/\/staffwww.dcs.shef.ac.uk\/people\/A.Simons\/jwalk\/download.html","key":"e_1_2_1_23_1"},{"unstructured":"http:\/\/workbench.haefelinger.it\/flaka\/  http:\/\/workbench.haefelinger.it\/flaka\/","key":"e_1_2_1_24_1"},{"issue":"2","key":"e_1_2_1_25_1","first-page":"24","article-title":"Critical Components Identification using Mutation based Components Impact Analysis","volume":"3","author":"Jeyamala D.","year":"2013","unstructured":"D. Jeyamala , K. Sabari Nathan . Critical Components Identification using Mutation based Components Impact Analysis . IJCSI International Journal of Computer Science and Informatics. Vol. 3 , No. 2 , 2013 ; pp. 24 -- 33 . D. Jeyamala, K. Sabari Nathan. Critical Components Identification using Mutation based Components Impact Analysis. IJCSI International Journal of Computer Science and Informatics. Vol.3, No.2, 2013; pp. 24--33.","journal-title":"IJCSI International Journal of Computer Science and Informatics."},{"issue":"2","key":"e_1_2_1_26_1","first-page":"17","article-title":"Fault-prone Components Identification for Real-time Complex systems based on Criticality Analysis","volume":"3","author":"Jeyamala D.","year":"2013","unstructured":"D. Jeyamala , S. Balamurugan . Fault-prone Components Identification for Real-time Complex systems based on Criticality Analysis . IJCSI International Journal of Computer Science and Informatics. Vol. 3 , No. 2 , 2013 ; pp. 17 -- 23 . D. Jeyamala, S. Balamurugan. Fault-prone Components Identification for Real-time Complex systems based on Criticality Analysis. IJCSI International Journal of Computer Science and Informatics. Vol.3, No.2, 2013; pp. 17--23.","journal-title":"IJCSI International Journal of Computer Science and Informatics."},{"issue":"2","key":"e_1_2_1_27_1","first-page":"69","article-title":"OCL formal Specification based Metrics a measure of complexity and fault proneness","volume":"3","author":"Jeyamala D.","year":"2013","unstructured":"D. Jeyamala , A. Jalila . OCL formal Specification based Metrics a measure of complexity and fault proneness . IJCSI International Journal of Computer Science and Informatics. Vol. 3 , No. 2 , 2013 ; pp. 69 -- 79 . D. Jeyamala, A.Jalila. OCL formal Specification based Metrics a measure of complexity and fault proneness. IJCSI International Journal of Computer Science and Informatics. Vol.3, No.2, 2013; pp. 69--79.","journal-title":"IJCSI International Journal of Computer Science and Informatics."},{"issue":"1","key":"e_1_2_1_28_1","first-page":"133","article-title":"A Hybrid Test Optimization Framework-- Coupling Genetic Algorithm with Local Search Technique","volume":"29","author":"Jeyamala D.","year":"2010","unstructured":"D. Jeyamala , V. Mohan . A Hybrid Test Optimization Framework-- Coupling Genetic Algorithm with Local Search Technique . International Journal of Computing and Informatics ,Vol. 29 , No. 1 , pp. 133 -- 164 , 2010 D. Jeyamala, V. Mohan. A Hybrid Test Optimization Framework-- Coupling Genetic Algorithm with Local Search Technique. International Journal of Computing and Informatics,Vol.29, No.1, pp. 133--164, 2010","journal-title":"International Journal of Computing and Informatics"},{"key":"e_1_2_1_29_1","first-page":"15","volume-title":"ABC Tester -- Artificial Bee Colony Optimization For Software Test Suite Optimization. IJSE -- International Journal of Software Engineering","author":"Jeyamala D.","year":"2009","unstructured":"D. Jeyamala , V. Mohan . ABC Tester -- Artificial Bee Colony Optimization For Software Test Suite Optimization. IJSE -- International Journal of Software Engineering . Vol. 2 , No .2, pp. 15 -- 48 , 2009 D. Jeyamala, V. Mohan. ABC Tester -- Artificial Bee Colony Optimization For Software Test Suite Optimization. IJSE -- International Journal of Software Engineering. Vol.2, No.2, pp.15--48, 2009"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2507288.2507309","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2507288.2507309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:29Z","timestamp":1750231709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2507288.2507309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,26]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,8,26]]}},"alternative-id":["10.1145\/2507288.2507309"],"URL":"https:\/\/doi.org\/10.1145\/2507288.2507309","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2013,8,26]]},"assertion":[{"value":"2013-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}