
In software engineering, testing has long been a research area of software maintenance. Testing is extremely expensive, and there is no guarantee that all defects will be found within a single round of testing. Therefore, fixing defects that are not discovered by a single round of testing is important for reducing the test costs. During the software maintenance process, testing is conducted within the scope of a set of test cases called a test suite. Mutation testing is a method that uses mutants to evaluate whether the test cases of the test suite are appropriate. In this paper, an approach is proposed that uses the mutants of a mutation test to identify defects that are not discovered through a single round of testing. The proposed method simultaneously applies two or more mutants to a single program to define and record the relationships between different lines of code. In turn, these relationships are examined using the defects that were discovered by a single round of testing, and possible defects are recommended from among the recorded candidates. To evaluate the proposed method, a comparative study was conducted using the fault localization method, which is commonly employed in defect prediction, as well as the Defects4J defect prediction dataset, which is widely used in software defect prediction. The results of the evaluation showed that the proposed method achieves a better performance than seven other fault localization methods (Tarantula, Ochiai, Opt2, Barinel, Dstar2, Muse, and Jaccard).
Citation: Dong-Gun Lee, Yeong-Seok Seo. Identification of propagated defects to reduce software testing cost via mutation testing[J]. Mathematical Biosciences and Engineering, 2022, 19(6): 6124-6140. doi: 10.3934/mbe.2022286
[1] | Wenjing Wang, Jingjing Dong, Dong Xu, Zhilian Yan, Jianping Zhou . Synchronization control of time-delay neural networks via event-triggered non-fragile cost-guaranteed control. Mathematical Biosciences and Engineering, 2023, 20(1): 52-75. doi: 10.3934/mbe.2023004 |
[2] | Pan Wang, Xuechen Li, Qianqian Zheng . Synchronization of inertial complex-valued memristor-based neural networks with time-varying delays. Mathematical Biosciences and Engineering, 2024, 21(2): 3319-3334. doi: 10.3934/mbe.2024147 |
[3] | Biwen Li, Xuan Cheng . Synchronization analysis of coupled fractional-order neural networks with time-varying delays. Mathematical Biosciences and Engineering, 2023, 20(8): 14846-14865. doi: 10.3934/mbe.2023665 |
[4] | Ruoyu Wei, Jinde Cao . Prespecified-time bipartite synchronization of coupled reaction-diffusion memristive neural networks with competitive interactions. Mathematical Biosciences and Engineering, 2022, 19(12): 12814-12832. doi: 10.3934/mbe.2022598 |
[5] | Bingrui Zhang, Jin-E Zhang . Fixed-deviation stabilization and synchronization for delayed fractional-order complex-valued neural networks. Mathematical Biosciences and Engineering, 2023, 20(6): 10244-10263. doi: 10.3934/mbe.2023449 |
[6] | Trayan Stamov, Gani Stamov, Ivanka Stamova, Ekaterina Gospodinova . Lyapunov approach to manifolds stability for impulsive Cohen–Grossberg-type conformable neural network models. Mathematical Biosciences and Engineering, 2023, 20(8): 15431-15455. doi: 10.3934/mbe.2023689 |
[7] | Hai Lin, Jingcheng Wang . Pinning control of complex networks with time-varying inner and outer coupling. Mathematical Biosciences and Engineering, 2021, 18(4): 3435-3447. doi: 10.3934/mbe.2021172 |
[8] | Zhen Yang, Zhengqiu Zhang, Xiaoli Wang . New finite-time synchronization conditions of delayed multinonidentical coupled complex dynamical networks. Mathematical Biosciences and Engineering, 2023, 20(2): 3047-3069. doi: 10.3934/mbe.2023144 |
[9] | Karim El Laithy, Martin Bogdan . Synaptic energy drives the information processing mechanisms in spiking neural networks. Mathematical Biosciences and Engineering, 2014, 11(2): 233-256. doi: 10.3934/mbe.2014.11.233 |
[10] | Guowei Wang, Yan Fu . Spatiotemporal patterns and collective dynamics of bi-layer coupled Izhikevich neural networks with multi-area channels. Mathematical Biosciences and Engineering, 2023, 20(2): 3944-3969. doi: 10.3934/mbe.2023184 |
In software engineering, testing has long been a research area of software maintenance. Testing is extremely expensive, and there is no guarantee that all defects will be found within a single round of testing. Therefore, fixing defects that are not discovered by a single round of testing is important for reducing the test costs. During the software maintenance process, testing is conducted within the scope of a set of test cases called a test suite. Mutation testing is a method that uses mutants to evaluate whether the test cases of the test suite are appropriate. In this paper, an approach is proposed that uses the mutants of a mutation test to identify defects that are not discovered through a single round of testing. The proposed method simultaneously applies two or more mutants to a single program to define and record the relationships between different lines of code. In turn, these relationships are examined using the defects that were discovered by a single round of testing, and possible defects are recommended from among the recorded candidates. To evaluate the proposed method, a comparative study was conducted using the fault localization method, which is commonly employed in defect prediction, as well as the Defects4J defect prediction dataset, which is widely used in software defect prediction. The results of the evaluation showed that the proposed method achieves a better performance than seven other fault localization methods (Tarantula, Ochiai, Opt2, Barinel, Dstar2, Muse, and Jaccard).
Due to the wide variety of applications in fields including associative memories, signal processing, parallel computation, pattern recognition, neural networks have drawn a lot of interest in recent years. In many real-world systems, artificial neural networks, neural networks, biological systems have inevitable applications. [1,2,3,4,5,6,7]. Due to the obvious transmission frequency of interconnected neurons and the finite switching speeds of the amplifiers, time delays are ineluctably given. Their presence might affect a system's stability by causing oscillation and instability features [8,9,10,11,12,13,14,15,16,17,18]. Delayed dynamical networks and many time-delay system kinds have been studied, and numerous important outcomes have been presented [19,20,21,22,23,24,25].
Kosko was the first person to propose that BAM-NNs could be important to the NNs theory [26]. Furthermore, BAM neural frameworks involving delays attracted significant thought and underwent in-depth research. While there is no connection between neurons in the same layer, neurons in another layer are entirely interconnected to those in the first layer. It performs a two-way affiliated hunt to store bipolar vector combines by cycles of forward and backward propagation information streams between the two layers, and it sums up the single-layer auto-cooperative Hebbian connection to a two-layer design coordinated hetero acquainted circuits. As a result, it has numerous applications in the fields of artificial intelligence and pattern identification [27,28,29,30,31,32,33,34,35]. Appropriately, the BAM neural system has been generally concentrated on both in principle and applications. This makes focusing on the stability of the BAM neural framework, which has largely been studied, fascinating and fundamental [36,37,38,39,40,41,42,43,44].
The synchronization control of chaotic networks plays vital role in applications such as image encryption, secure communication, DC-DC motor and etc. [45,46,47,48]. Satellites play a significant part in the advancement of space technology, civic, military, and scientific endeavors. In particular, feedback control, adaptive control, sampled-data control, and other strategies have been employed to synchronize and regulate the satellite systems [49,50]. Recently, the issue of memristive BAM networks synchronization with stochastic feedback gain variations in [50].
It is inferred that in real-world scenarios, a nearby float framework as noted in practical model controller does not avoid the proceed out of coefficient uncertainty, leading to the murkiness in controller execution caused by the required word length in any updated structures or additional parameter turning in the final controller use. Along the same ideas, it is crucial to design a non-fragile controller such that it is insensitive to uncertainty. Non-fragile control has developed into a fascinating topic in both theory and practical application. There has been extensive research into the use of non-fragile controllers in recent years [51,52]. However, the problem of non-fragile control of a BAM delayed neural network and controller gain fluctuation has not been thoroughly examined.
This study examines the non-fragile synchronization for a BAM delayed neural network and a randomly occurring controller gain fluctuation, which is motivated by the studies. New stability requirements for BAM neural networks with arbitrarily occurring controller gain fluctuation are derived in terms of LMI by building an appropriate Lyapunov-Krasovskii functional (LKF) and using conventional integral inequality techniques. Solving the suggested LMI condition yields the gain matrices for the proposed controller design. Finally, a numerical example is used to illustrate the proposed strategy.
Notations: In this work, Rp represents Euclidean space of p dimension. Rp×q denotes the set of all p×q real matrices. The identity matrix is denoted by I. Here R>0(<0) represents R is a symmetric positive (negative) definite matrices. The elements below the main diagonal of a symmetric matrixl is given by '*'.
In this study, we will investigate the synchronization of BAM delayed neural network with randomly occurring. The BAM NNs with time-varying delay components can be modeled as follows
˙θi(ℵ)=−aiθi(ℵ)+∑nj=1w(1)ij˜fj(λj(ℵ))+∑nj=1w(2)ij˜fj(λj(ℵ−σ(ℵ)))+Ii,˙λj(ℵ)=−bjλj(ℵ)+∑ni=1v(1)ji˜gi(θi(ℵ))+∑ni=1v(2)ji˜gi(θi(ℵ−κ(ℵ)))+Jj,} | (2.1) |
where γi(ℵ) and δj(ℵ) are the state variables of the neuron at time ℵ respectively. The non linear functions ˜fj(⋅), ˜gi(⋅) are neuron activation functions. The positive constants ai,bj denote the time scales of the respective layers of the neurons. w(1)ij, w(2)ij, v(1)ji, v(2)ji are connection weights of the network. Ii and Jj denotes the external inputs. σ(ℵ),κ(ℵ) are time varying delays satisfying
0≤σ(ℵ)≤σ, ˙σ(ℵ)=μ1<1, 0≤κ(ℵ)≤κ, ˙κ(ℵ)=μ2<2, | (2.2) |
and, σ, κ, μ1, and μ2 are constants.
Consequently, the corresponding compact matrix form can be used to describe the master system (2.1) as,
M:{˙θ(ℵ)=−Aθ(ℵ)+W1˜f(λ(ℵ))+W2˜f(λ(ℵ−σ(ℵ))),˙λ(ℵ)=−Bλ(ℵ)+V1˜g(θ(ℵ))+V2˜g(θ(ℵ−κ(ℵ))), | (2.3) |
where, B=diag[b1,b2,...,bn]>0, A=diag[a1,a2,...,an]>0, Wk=(w(k)ij)(n×n), Vk=(v(k)ij)(n×n),k=1,2.
Assumption (1). ˜gj(⋅),˜fi(⋅) are neuron activation functions, which is bounded, then there exist constants H−i, H+i, L−j, L+j such that
L−j≤˜gj(ϕ)−˜gj(ϱ)ϕ−ϱ≤L+j,H−i≤˜fi(ϕ)−˜fi(ϱ)ϕ−ϱ≤H+i, | (2.4) |
where, j=1,..,n,i=1,...m, and ϱ,ϕ∈R with ϕ≠ϱ. We define the subsequent matrices for ease of notation:
H1=diag{H+1H−1,H+2H−2,...,H+mH−m},H2=diag{H−1+H+12,H+2+H−22,...,H+m+H−m2},L1=diag{L+1L−1,L+2L−2,...,L+nL−n},L2=diag{L+1+L−12,L+2+L−22,...,L+n+L−n2}. |
Master system and slave system state variables are represented by θ(ℵ),λ(ℵ) and ˆθ(ℵ) and ˆλ(ℵ), respectively. We take into account the master system's slave system in the follows.
S:{˙ˆθ(ℵ)=−Aˆθ(ℵ)+W1˜f(ˆλ(ℵ))+W2˜f(ˆλ(ℵ−σ(ℵ)))+u(ℵ),˙ˆλ(ℵ)=−Bˆλ(ℵ)+V1˜g(ˆθ(ℵ))+V2˜g(ˆθ(ℵ−κ(ℵ)))+v(ℵ) | (2.5) |
We choose the following non-fragile controller:
u(ℵ)=(K1+ϕ(ℵ)ΔK1(ℵ))ζ(ℵ), v(ℵ)=(K2+ϱ(ℵ)ΔK2(ℵ))ϖ(ℵ), | (2.6) |
Here the controller gain matrices are given by K1,K2. The matrix ΔKi(ℵ)(i=1,2) satisfy
ΔKi(ℵ)=HiΔ(ℵ)Ei (i=1,2) | (2.7) |
and
ΔT(ℵ)Δ(ℵ)≤I, | (2.8) |
where Hi,Ei are known constant matrices. To desribe randomly accuring control gain fluctuation we introduced the stachastic variables ϕ(ℵ),ϱ(ℵ)∈R. It is a sequence of white noise generated by Bernoulli distribution with values of zero or one
Pr{ϱ(ℵ)=0}=1−ϱ, Pr{ϱ(ℵ)=1}=ϱ,Pr{ϕ(ℵ)=0}=1−ϕ, Pr{ϕ(ℵ)=1}=ϕ, | (2.9) |
where 0≤ϱ,ϕ≤1 is constant.
Set the synchronization error signals ϖ(ℵ)=ˆλ(ℵ)−λ(ℵ) and ζ(ℵ)=ˆθ(ℵ)−θ(ℵ). Error dynamics between systems (2.3) and (2.5) can therefore be written as follows:
˙ζ(ℵ)=(−A+(K1+ϕ(ℵ)ΔK1(ℵ)))ζ(ℵ)+W1f(ϖ(ℵ))+W2f(ϖ(ℵ−σ(ℵ))),˙ϖ(ℵ)=(−B+(K2+ϱ(ℵ)ΔK2(ℵ)))ϖ(ℵ)+V1g(ζ(ℵ))+V2g(ζ(ℵ−κ(ℵ)))}. | (2.10) |
where g(ζ(ℵ))=˜g(ˆθ(ℵ))−˜g(θ(ℵ)), and f(ϖ(ℵ))=˜f(ˆλ(ℵ))−˜f(λ(ℵ)).
The following crucial conditions are used to obtain our main findings:
Lemma 2.1. [53] (Schur complement) Let Z, V,O be given matrices such that Z>0, then
[OVTv−Z]<0iffO+VTZ−1V<0. |
Lemma 2.2. [54] Given matrices Z=ZT,R,O and Q=QT>0 with appropriate dimensions
Z+RL(ℵ)O+OTLT(ℵ)RT<0, |
for all L(ℵ) satisfying LT(ℵ)L(ℵ)≤I if and only if there exists a scalar ε>0 such that
Z+ε−1RRT+εOTQO<0. |
Lemma 2.3. [55] For a given matrix Z∈S+n and a function ς:[c,d]→Rn whose derivative ˙ς∈PC([c,d],Rn), the following inequalities hold: ∫dc˙ςT(r)Z˙ς(r)dr≥1d−c ˆφ¯Zˆφ, where ¯Z=diag{Z,3Z,5Z}, ˆφ=[φT1 φT2 φT3]T, φ1=ς(d)−ς(c), φ2=ς(d)+ς(c)−2d−c∫dcς(r)dr, φ3=ς(d)−ς(c)+6d−c∫dcς(r)dr−12(d−c)2∫dc∫dcς(u)duds.
The necessary requirements for guaranteeing the stability of system (2.10) are established in this part.
Theorem 3.1. From Assumption (A), ϕ,ϱ, and ϵi are positive scalars, if there exist symmetric matrices Pi>0, Qi>0, Ri>0, Zi>0, any matrices Ji and Gi, diagonal matrices Si>0 (i=1,2) satisfying
Ξ=[ΠΩ∗Λ]<0, | (3.1) |
where
Π=[Π113Z1κS2L20−24Z1κ260Z1κ3Π17∗Π220036Z1κ2−60Z1κ30∗∗Π330000∗∗∗Π44000∗∗∗∗−192Z1κ3360Z1κ40∗∗∗∗∗−720Z1κ50∗∗∗∗∗∗Π77],Ω=[00J1W1J1W20000000000VT1JT200000VT1JT2VT2JT200000VT2JT20000000000000000J1W1J1W2000],Λ=[Λ113Z2σS1H20−24Z2σ260Z2σ3Λ17∗Λ220036Z2σ2−60Z2σ30∗∗Λ330000∗∗∗Λ44000∗∗∗∗−192Z2σ3360Z2σ40∗∗∗∗∗−720Z2σ50∗∗∗∗∗∗Λ77], |
Π11=R1−S2L1−9Z1κ−J1A+G1+ϕJ1ΔK1(ℵ)+GT1−ATJT1+ϕΔKT1(ℵ)JT1,Π17=−J1−ϵ1ATJT1+ϵ1GT1+ϵ1ϕΔKT1(ℵ)JT1+P1,Π22=−R1−9Z1κ,Π33=Q2−S2,Π44=−(1−μ2)Q2,Π77=−ϵ1J1+κZ1−ϵ1JT1,Λ11=R2−S1H1−J2B+G2+ϱJ2ΔK2(ℵ)−9Z2σ−BTJT+GT2+ϱΔKT2(ℵ)JT2,Λ17=−J2−ϵ2BTJT2+ϵ2GT2+ϵ2ϱΔKT2(ℵ)JT2+P2,Λ22=−R2−9Z2σ,Λ33=Q1−S1,Λ44=−(1−μ1)Q1,Λ77=σZ2−ϵ2J2−ϵ2JT2, |
When this happens, the system (2.10) is asymptotically stable and Ki=J−1iGi. are control gain matrices.
Proof. Take into account the LKF candidate below:
V(ζℵ,ϖℵ,ℵ)=4∑i=1Vi(ζℵ,ϖℵ,ℵ), | (3.2) |
where
V1(ζℵ,ϖℵ,ℵ)=ζT(ℵ)P1ζ(ℵ)+ϖT(ℵ)P2ϖ(ℵ),V2(ζℵ,ϖℵ,ℵ)=∫ℵℵ−σ(ℵ)fT(ϖ(s))Q1f(ϖ(s))ds+∫ℵℵ−κ(ℵ)gT(ζ(s))Q2g(ζ(s))ds,V3(ζℵ,ϖℵ,ℵ)=∫ℵℵ−κζT(s)R1ζ(s)ds+∫ℵℵ−σϖT(s)R2ϖ(s)ds,V4(ζℵ,ϖℵ,ℵ)=∫0−κ∫ℵℵ+θ˙ζT(s)Z1˙ζ(s)dsdθ+∫0−σ∫ℵℵ+θ˙ϖT(s)Z2˙ϖ(s)dsdθ. |
The infinitesimal operator L ofV(ζℵ,ϖℵ,ℵ) is:
LV(ζℵ,ϖℵ,ℵ)=limΔ→01Δ{E{V(ζℵ+Δ,yℵ+Δ,ℵ)|(ζℵ,ϖℵ,ℵ)}−V(ζℵ,ϖℵ,ℵ)},E{LV(ζℵ,ϖℵ,ℵ)}=4∑i=1E{LVi(ζℵ,ϖℵ,ℵ)}. | (3.3) |
Using the stochastic derivative of V(ζℵ,ϖℵ,ℵ), we can determine:
E{LV1(ζℵ,ϖℵ,ℵ)}=2ζT(ℵ)P1˙ζ(ℵ)+2ϖT(ℵ)P2˙ϖ(ℵ), | (3.4) |
E{LV2(ζℵ,ϖℵ,ℵ)}≤fT(ϖ(ℵ))Q1f(ϖ(ℵ))−(1−μ1)fT(ϖ(ℵ−σ(ℵ)))Q1f(ϖ(ℵ−σ(ℵ)))+gT(ζ(ℵ))Q2g(ζ(ℵ))−(1−μ2)gT(ζ(ℵ−κ(ℵ)))Q2g(ζ(ℵ−κ(ℵ))), | (3.5) |
E{LV3(ζℵ,ϖℵ,ℵ)}=ζT(ℵ)R1ζ(ℵ)−ζT(ℵ−κ)R1ζ(ℵ−κ)+ϖT(ℵ)R2ϖ(ℵ)−ϖT(ℵ−σ)R2ϖ(ℵ−σ), | (3.6) |
E{LV4(ζℵ,ϖℵ,ℵ)}=κ˙ζT(ℵ)Z1˙ζ(ℵ)−∫ℵℵ−κ˙ζT(s)Z1˙ζ(s)ds+σ˙ϖT(ℵ)Z2˙ϖ(ℵ)−∫ℵℵ−σ˙ϖT(s)Z2˙ϖ(s)ds, | (3.7) |
By applying Lemma 2.3 in (2.17), we can obtain
−∫ℵℵ−κ˙ζT(s)Z1˙ζ(s)ds≤−1κηT1(ℵ)[Z10003Z10005Z1]η1(ℵ), | (3.8) |
−∫ℵℵ−σ˙ϖT(s)Z2˙ϖ(s)ds≤−1σηT2(ℵ)[Z20003Z20005Z2]η2(ℵ), | (3.9) |
where
η1(ℵ)=[ζT(ℵ)−ζT(ℵ−κ)ζT(ℵ)+ζT(ℵ−κ)−2κ∫ℵℵ−κζT(s)dsζT(ℵ)−ζT(ℵ−κ)+6κ∫ℵℵ−κζT(s)ds−12κ2∫ℵℵ−κ∫tsζT(u)duds]T,η2(ℵ)=[ϖT(ℵ)−ϖT(ℵ−σ)ϖT(ℵ)+ϖT(ℵ−σ)−2σ∫ℵℵ−σϖT(s)dsϖT(ℵ)−ϖT(ℵ−σ)+6σ∫ℵℵ−σϖT(s)ds−12σ2∫ℵℵ−κ∫tsϖT(u)duds]T. |
From the assumption (A), there exists a diagonal matrices S1>0, S2>0 and Hi, Li(i=1,2), the following inequalities hold:
0≤[ϖ(ℵ)f(ϖ(ℵ))]T[−S1H1S1H2∗−S1][ϖ(ℵ)f(ϖ(ℵ))], | (3.10) |
0≤[ζ(ℵ)g(ζ(ℵ))]T[−S2L1S2L2∗−S2][ζ(ℵ)g(ζ(ℵ))]. | (3.11) |
The following equations satisfy for any matrices J1,J2 and scalar ϵ1,ϵ2:
0=2[ζT(ℵ)+ϵ1˙ζ(ℵ)]J1[−˙ζ(ℵ)+(−A+(K1+ϕ(ℵ)ΔK1(ℵ)))ζ(ℵ)+W1f(ϖ(ℵ))+W2f(ϖ(ℵ−σ(ℵ)))], | (3.12) |
0=2[ϖT(ℵ)+ϵ2˙ϖ(ℵ)]J2[−˙ϖ(ℵ)+(−B+(K2+ϱ(ℵ)ΔK2(ℵ)))ϖ(ℵ)+V1g(ζ(ℵ))+V2g(ζ(ℵ−κ(ℵ)))], | (3.13) |
substituting (3.4)–(3.6), and (3.7)–(3.23) in (3.3), we get
E{LV(ζℵ,ϖℵ,ℵ)}≤ξT(ℵ) Ξ ξ(ℵ), | (3.14) |
where ξ(ℵ)=[ζT(ℵ) ζT(ℵ−κ) gT(ζ(ℵ)) gT(ζ(ℵ−κ(ℵ))) ∫ℵℵ−κζT(s)ds ∫ℵℵ−κ∫ℵsζT(s)duds ˙ζT(ℵ) ϖT(ℵ)ϖT(ℵ−σ) fT(ϖ(ℵ)) fT(ϖ(ℵ−κ(ℵ))) ∫ℵℵ−σϖT(s)ds ∫ℵℵ−σ∫ℵsϖT(s)duds ˙ϖT(ℵ)]T.
It gives that Ξ <0. This demonstrates that the system (2.10) is asymptotically stable using the Lyapunov stability theory. The proof is now complete.
Theorem 3.2. Under Assumption (A), ϕ,ϱ and ϵi are positive scalars, then there exist symmetric matrices Pi>0, Qi>0, Ri>0, Zi>0, diagonal matrices Si>0, for any matrices Ji, Gi, and scalars ρi>0 (i=1,2) such that
˜Ξ=[ˆΞΥ1ρ1Υ2Ψ1Ψ2∗−ρ1I000∗∗−ρ1I00∗∗∗−ρ2I0∗∗∗∗−ρ2I]<0, | (3.15) |
where
ˆΞ=[ˆΠΩ∗ˆΛ],ˆΠ=[ˆΠ113Z1κS2L20−24Z1κ260Z1κ3ˆΠ17∗Π220036Z1κ2−60Z1κ30∗∗Π330000∗∗∗Π44000∗∗∗∗−192Z1κ3360Z1κ40∗∗∗∗∗−720Z1κ50∗∗∗∗∗∗Π77],ˆΛ=[ˆΛ113Z2σS1H20−24Z2σ260Z2σ3ˆΛ17∗Λ220036Z2σ2−60Z2σ30∗∗Λ330000∗∗∗Λ44000∗∗∗∗−192Z2σ3360Z2σ40∗∗∗∗∗−720Z2σ50∗∗∗∗∗∗Λ77], |
ˆΠ11=R1−S2L1−9Z1κ−J1A+G1+GT1−ATJT1,ˆΠ17=−J1−ϵ1ATJT1+ϵ1GT1+P1,ˆΛ11=R2−S1H1−J2B+G2−9Z2σ−BTJT+GT2,ˆΛ17=−J2−ϵ2BTJT2+ϵ2GT2+P2,Υ1=[ϕHT1JT1 0,...,0⏟5elements ϕϵ1HT1JT1 0,...,0⏟7elements]T,Υ2=[E1 0,...,0⏟13elements]T,Ψ1=[0,...,0⏟7elements ϱHT2JT2 0,...,0⏟5elements ϱϵ2HT2JT2]T,Ψ2=[0,...,0⏟7elements ρ2E2 0,...,0⏟6elements]T |
The controller gain matrices are also provided by in equation (2.6) are given by Ki=J−1iGi.
Proof. By using Schur complement,
[ˆΞ]+Υ1ΔK1(ℵ)ΥT2+Υ2ΔKT1(ℵ)ΥT1+Ψ1ΔK2(ℵ)ΨT2+Ψ2ΔKT2(ℵ)ΨT1<0. |
From Lemma 2, we get
˜Ξ=[ˆΞΥ1ρ1Υ2Ψ1Ψ2∗−ρ1I000∗∗−ρ1I00∗∗∗−ρ2I0∗∗∗∗−ρ2I]<0 |
It is clear that the disparities in (3.15) still exist. The evidence is now complete.
Two examples are provided in this part to show the applicability of our findings.
Example 4.1. The following BAM neural network with time varying delays:
˙ζ(ℵ)=(−A+(K1+ϕ(ℵ)ΔK1(ℵ)))ζ(ℵ)+W1f(ϖ(ℵ))+W2f(ϖ(ℵ−σ(ℵ))),˙ϖ(ℵ)=(−B+(K2+ϱ(ℵ)ΔK2(ℵ)))ϖ(ℵ)+V1g(ζ(ℵ))+V2g(ζ(ℵ−κ(ℵ))),} | (4.1) |
with the following parameters:
A=[1001], W1=[2−0.11−53.2],W2=[−1.6−0.8−0.18−2.5], H1=[0.45000.45],E1=[0.35000.35], B=[3002], V1=[1−1.11−21.2],V2=[−0.6−1.8−0.68−0.5],H2=[0.25000.25], E2=[0.15000.15], H1=L1=0, H2=L2=I. |
Additionally, we take κ=3.2, σ=3.2, μ1=0.9, μ2=0.9, ϕ=0.9, ϱ=0.9, ϵ1=0.5, and ϵ2=0.5. By solving the LMIs in Theorem 3.2, we get
P1=[48.3823−0.5707−0.570749.5117], P2=[46.62800.25890.258950.0702],Q1=[19.28354.76024.760228.1068], Q2=[19.03795.74755.747525.7761],R1=[35.0318−1.4108−1.410831.6352],R2=[35.2798−1.5288−1.528833.4075],Z1=[0.01670.00090.00090.0116], Z2=[0.0332−0.0196−0.01960.0971],G1=[−96.51481.09481.0948−99.3356],G2=[−91.4745−1.3821−1.3821−96.5435],J1=[0.15710.03320.03320.1827], J2=[0.3903−0.1807−0.18070.9874]ρ1=42.3781, ρ2=44.9762. |
As well as the following non-fragile controller gains matrices:
K1=[−639.9952126.6829122.2775−566.6860], K2=[−256.7506−53.3312−48.3949−107.5330]. |
In this scenario is proved the given system is asymptotically stable. In Figure 1, state response are depicted.
The issue of BAM delayed neural networks with non-fragile control and controller gain fluctuation has been examined in this article. To ensure the stability of the aforementioned systems, delay-dependent conditions are established. In terms of linear matrix inequalities (LMIs), necessary conditions are obtained by building an L-K functional and utilizing the traditional integral inequality technique. This technique ensures asymptotically stability of addressed to the concerned neural networks. Lastly, a numerical example is provided to demonstrate the viability of the findings in this study. Stochastic differential equations and complex networks both respond well to this approach in future research.
[1] |
R. H. Ur, R. Mushtaq, A. Palwasha, K. Mukhtaj, I. Nadeem, K. H. Ullah, Making the sourcing decision of software maintenance and information technology, IEEE Access, 9 (2021), 11492-11510. https://doi.org/10.1109/ACCESS.2021.3051023 doi: 10.1109/ACCESS.2021.3051023
![]() |
[2] |
F.S. Ana M, M. R. Chaudron, M. Genero, An industrial case study on the use of UML in software maintenance and its perceived benefits and hurdles, Empirical Software Eng., 23 (2018), 3281-3345. https://doi.org/10.1007/s10664-018-9599-4 doi: 10.1007/s10664-018-9599-4
![]() |
[3] |
E. Vahid, O. Bushehrian, G. Robles, Task assignment to counter the effect of developer turnover in software maintenance: A knowledge diffusion model, Inf. Software Technol., 143 (2022), 106786. https://doi.org/10.1016/j.infsof.2021.106786 doi: 10.1016/j.infsof.2021.106786
![]() |
[4] |
K. Jang, W. Kim, A method of activity-based software maintenance cost estimation for package software, J. Supercomput., 78 (2021), 8151-8171. https://doi.org/10.1007/s11227-020-03610-6 doi: 10.1007/s11227-020-03610-6
![]() |
[5] |
T. Masateru, M. Akito, M. Kenichi, O. Sawako, O. Tomoki, Analysis of work efficiency and quality of software maintenance using cross-company dataset, IEICE Trans. Inf. Syst., 104 (2021), 76-90. https://doi.org/10.1587/transinf.2020MPP0004 doi: 10.1587/transinf.2020MPP0004
![]() |
[6] | K.W. Kim, Y. Son, Software weakness evaluation method for secure software development, in Proceedings on 2021 International Conferences on Multimedia Information Technology and Applications, (2021), 322-325. |
[7] | C. Kim, D. Kim, H. Kang, Detecting defect in headlamp housing with machine learning techniques, in Proceedings on 2021 International Conferences on Multimedia Information Technology and Applications, (2021), 428-430. |
[8] |
Y. J. Choi, Y. W. Lee, B. G Kim, Residual-based graph convolutional network for emotion recognition in conversation for smart Internet of Things, Big Data, 9 (2021), 279-288. https://doi.org/10.1089/big.2020.0274 doi: 10.1089/big.2020.0274
![]() |
[9] |
P. P. Roy, P. Kumar, B.G. Kim, An efficient sign language recognition (SLR) system using Camshift tracker and hidden Markov model (hmm), SN Comput. Sci., 2 (2021), 1-15. https://doi.org/10.1007/s42979-021-00485-z doi: 10.1007/s42979-021-00485-z
![]() |
[10] | B. George, F. Stefan, M. Michael, P. Josef, An early investigation of unit testing practices of component-based software systems, in 2020 IEEE Workshop on Validation, Analysis and Evolution of Software Tests, (2020), 12-15. https://doi.org/10.1109/VST50071.2020.9051632 |
[11] | M. Alcon, H. Tabani, J. Abella, F. J. Cazorla, Enabling Unit Testing of Already-Integrated AI Software Systems: The Case of Apollo for Autonomous Driving, in 2021 24th Euromicro Conference on Digital System Design, (2021), 426-433. https://doi.org/10.1109/DSD53832.2021.00071 |
[12] | D. Xavier, S. Panichella, A. Gambi, Java unit testing tool competition: Eighth round, in Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, (2020), 545-548. https://doi.org/10.1145/3387940.3392265 |
[13] | T. Mengqing, J. Yan, W. Xiang, P. Rushu, Black-box approach for software testing based on fat-property, in MATEC Web of Conferences, 309 (2020), 02008. https://doi.org/10.1051/matecconf/202030902008 |
[14] | S. Bo, Y. Shao, C. Chen, Study on the automated unit testing solution on the linux platform, in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion, (2019), 358-361. https://doi.org/10.1109/QRS-C.2019.00073 |
[15] |
M. Héctor D, J. Gunel, S. Federica, T. Paolo, C. David, Diversifying focused testing for unit testing, ACM Trans. Software Eng. Method., 30 (2021), 1-24. https://doi.org/10.1145/3447265 doi: 10.1145/3447265
![]() |
[16] | X. Wang, L. Wei, B. Tao, S. Ji, A study about unit testing for embedded software of control system in nuclear power plant, in International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection for Nuclear Power Plant, (2020), 157-163. https://doi.org/10.1007/978-981-16-3456-7_17 |
[17] |
F. Anfal A, R. G. Alsarraj, A. M. Altaie, Software cost estimation based on dolphin algorithm, IEEE Access, 8 (2020), 75279-75287. https://doi.org/10.1109/ACCESS.2020.2988867 doi: 10.1109/ACCESS.2020.2988867
![]() |
[18] |
C. Sonia, H. Singh, Optimizing design of fuzzy model for software cost estimation using particle swarm optimization algorithm, Int. J. Comput. Intell. Appl., 19 (2020), 2050005. https://doi.org/10.1142/S1469026820500054 doi: 10.1142/S1469026820500054
![]() |
[19] |
A. Farrukh, A review of machine learning models for software cost estimation, Rev. Comput. Eng. Res., 6 (2019), 64-75. https://doi.org/10.18488/journal.76.2019.62.64.75 doi: 10.18488/journal.76.2019.62.64.75
![]() |
[20] |
K. Ishleen, N. G. Singh, W. Ritika, J. Vishal, B. Anupam, Neuro fuzzy—COCOMO Ⅱ model for software cost estimation, Int. J. Inf. Technol., 10 (2018), 181-187. https://doi.org/10.1007/s41870-018-0083-6 doi: 10.1007/s41870-018-0083-6
![]() |
[21] |
J. Miller, S. Wienke, M. Schlottke-Lakemper, M. Meinke, M. S. Müller, Applicability of the software cost model COCOMO Ⅱ to HPC projects, Int. J. Comput. Sci. Eng., 17 (2018), 283-296. https://doi.org/10.1504/IJCSE.2018.095849 doi: 10.1504/IJCSE.2018.095849
![]() |
[22] | A. Asheeri, M. Mohd, M. Hammad, Machine learning models for software cost estimation, in 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, (2019), 1-6. https://doi.org/10.1109/3ICT.2019.8910327 |
[23] | A. Shaina, N. Mishra, Software cost estimation using artificial neural network, in Soft Computing: Theories and Applications, Springer, (2018), 51-58. https://doi.org/10.1007/978-981-10-5699-4_6 |
[24] |
S. S. Pratap, V. P. Singh, A. K. Mehta, Differential evolution using homeostasis adaption based mutation operator and its application for software cost estimation, J. King Saud Univ.-Comput. Inf. Sci., 33 (2021), 740-752. https://doi.org/10.1016/j.jksuci.2018.05.009 doi: 10.1016/j.jksuci.2018.05.009
![]() |
[25] |
S. W. Ahmad, G. R. Bamnote, Whale-crow optimization (WCO)-based optimal regression model for software cost estimation, Sādhanā, 44 (2019), 1-15. https://doi.org/10.1007/s12046-019-1085-1 doi: 10.1007/s12046-019-1085-1
![]() |
[26] |
J. A. Khan, S. U. R. Khan, J. Iqbal, I. U. Rehman, Empirical investigation about the factors affecting the cost estimation in global software development context, IEEE Access, 9 (2021), 22274-22294. https://doi.org/10.1109/ACCESS.2021.3055858 doi: 10.1109/ACCESS.2021.3055858
![]() |
[27] | V. S. Desai, R. Mohanty, ANN-Cuckoo optimization technique to predict software cost estimation, in 2018 Conference on Information and Communication Technology, (2018), 1-6. https://doi.org/10.1109/INFOCOMTECH.2018.8722380 |
[28] | R. C. A. Alves, D. A. G. Oliveira, G. A. N. Segura, C. B. Margi, The cost of software-defining things: A scalability study of software-defined sensor networks, IEEE Access 7 (2019), 115093-115108. https://doi.org/10.1109/ACCESS.2019.2936127 |
[29] | D. G. Lee, Y. S. Seo, Testing cost reduction using nested mutation testing, in Proceedings on 2021 International Conferences on Multimedia Information Technology and Applications, (2021), 462-464. |
[30] |
N. Li, M. Shepperd, Y. Guo, A systematic review of unsupervised learning techniques for software defect prediction, Inf. Software Technol., 122 (2020), 106287. https://doi.org/10.1016/j.infsof.2020.106287 doi: 10.1016/j.infsof.2020.106287
![]() |
[31] | F. Keller, L. Grunske, S. Heiden, A. Filieri, A. Hoorn, D. Lo, A critical evaluation of spectrum-based fault localization techniques on a large-scale software system, in 2017 IEEE International Conference on Software Quality, Reliability and Security, (2017), 114-125. https://doi.org/10.1109/QRS.2017.22 |
[32] | The cost of poor software quality in the US: A 2020 report, Report of Proc. Consortium Inf. Softw. QualityTM, 2021. Available from: https://www.disputesoft.com/wp-content/uploads/2021/01/CPSQ-2020-Software-Report.pdf. |
[33] | 'Fully weaponized' software bug poses a threat to Minecraft gamers and apps worldwide including Google, Twitter, Netflix, Spotify, Apple iCloud, Uber and Amazon, 2021. Available from: https://www.dailymail.co.uk/news/article-10297693/Global-race-patch-critical-computer-bug.html. |
[34] |
P. Vitharana, Defect propagation at the project-level: results and a post-hoc analysis on inspection efficiency, Empirical Software Eng., 22 (2017), 57-79. https://doi.org/10.1007/s10664-015-9415-3 doi: 10.1007/s10664-015-9415-3
![]() |
[35] | Z. Wei, T. Shen, X. Chen, Just-in-time defect prediction technology based on interpretability technology, in 2021 8th International Conference on Dependable Systems and Their Applications (DSA), (2021), 78-89. https://doi.org/10.1109/DSA52907.2021.00017 |
[36] | L. Ma, F. Zhang, J. Sun, M. Xue, B. Li, F. J. Xu, et al., Deepmutation: Mutation testing of deep learning systems, in 2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE), (2018), 100-111. https://doi.org/10.1109/ISSRE.2018.00021 |
[37] | G. Petrovic, M. Ivankovic, B. Kurtz, P. Ammann, R. Just, An industrial application of mutation testing: Lessons, challenges, and research directions, in 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), (2018), 47-53. https://doi.org/10.1109/ICSTW.2018.00027 |
[38] | Q. Hu, L. Ma, X. Xie, B. Yu, Y. Liu, J. Zhao, DeepMutation++: A mutation testing framework for deep learning systems, in 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), (2019), 1158-1611. https://doi.org/10.1109/ASE.2019.00126 |
[39] |
P. Gómez-Abajo, E. Guerra, J. D. Lara, M. G. Merayo, Wodel-Test: a model-based framework for language-independent mutation testing, Software Syst. Model., 20 (2021), 767-793. https://doi.org/10.1007/s10270-020-00827-0 doi: 10.1007/s10270-020-00827-0
![]() |
[40] | L. Chen, L. Zhang, Speeding up mutation testing via regression test selection: An extensive study, in 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), (2018), 58-69. https://doi.org/10.1109/ICST.2018.00016 |
[41] | N. Humbatova, G. Jahangirova, P. Tonella, DeepCrime: mutation testing of deep learning systems based on real faults, in Proceedings of the 30th ACM SIGSOFT International, Symposium on Software Testing and Analysis, (2021), 67-78. https://doi.org/10.1145/3460319.3464825 |
[42] | K. Moran, M. Tufano, C. Bernal-Cárdenas, M. Linares-Vásquez, G. Bavota, C. Vendome, et al., MDroid+: A mutation testing framework for android, in 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion), (2018), 33-36. https://doi.org/10.1145/3183440.3183492 |
[43] | Z. Li, H. Wu, J. Xu, X. Wang, L. Zhang, Z. Chen, MuSC: A tool for mutation testing of ethereum smart contract, in 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), (2019), 1198-1201. https://doi.org/10.1109/ASE.2019.00136 |
[44] | D. Mao, L. Chen, L. Zhang, An extensive study on cross-project predictive mutation testing, in 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST), (2019), 160-171. https://doi.org/10.1109/ICST.2019.00025 |
[45] | D. Cheng, C. Cao, C. Xu, X. Ma, Manifesting bugs in machine learning code: An explorative study with mutation testing, in 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), (2018), 313-324. https://doi.org/10.1109/QRS.2018.00044 |
[46] | S. Lee, D. Binkley, R. Feldt, N. Gold, S. Yoo, Causal program dependence analysis, preprint, arXiv: 2104.09107. https://doi.org/10.48550/arXiv.2104.09107 |
[47] | S. Oh, S. Lee, S. Yoo, Effectively sampling higher order mutants using causal effect, in 2021 IEEE International Conference on Software Testing, Verification and Validation Workshops, (2021), 19-24. https://doi.org/10.1109/ICSTW52544.2021.00017 |
[48] |
X. Cai, Y. Niu, S. Geng, J. Zhang, Z. Cui, J. Li, et al., An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search, Concurrency Comput.: Pract. Exper., 32 (2020), e5478. https://doi.org/10.1002/cpe.5478 doi: 10.1002/cpe.5478
![]() |
[49] | A. Rahman, J. Stallings, L. Williams, Defect prediction metrics for infrastructure as code scripts in DevOps, in Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, (2018), 414-415. https://doi.org/10.1145/3183440.3195034 |
[50] | A. Amar, P. C. Rigby, Mining historical test logs to predict bugs and localize faults in the test logs, in 2019 IEEE/ACM 41st International Conference on Software Engineering. (2019), 140-151. https://doi.org/10.1109/ICSE.2019.00031 |
[51] |
P. Sangameshwar, B. Ravindran, Predicting software defect type using concept-based classification, Empirical Software Eng., 25 (2020), 1341-1378. https://doi.org/10.1142/S1469026820500054 doi: 10.1142/S1469026820500054
![]() |
[52] |
S. Wang, T. Liu, J. Nam, L. Tan, Deep semantic feature learning for software defect prediction, IEEE Trans. Software Eng., 46 (2018), 1267-1293. https://doi.org/10.1109/TSE.2018.2877612 doi: 10.1109/TSE.2018.2877612
![]() |
[53] |
X. Yin, L. Liu, H. Liu, Q. Wu, Heterogeneous cross-project defect prediction with multiple source projects based on transfer learning, Math. Biosci. Eng., 17 (2020), 1020-1040. https://doi.org/10.3934/mbe.2020054 doi: 10.3934/mbe.2020054
![]() |
[54] |
L. Qiao, X. Li, Q. Umer, P. Guo, Deep learning based software defect prediction, Neurocomputing, 385 (2020), 100-110. https://doi.org/10.1016/j.neucom.2019.11.067 doi: 10.1016/j.neucom.2019.11.067
![]() |
[55] |
F. Wu, X. Y. Jing, Y. Sun, J. Sun, L. Huang, F. Cui, et al., Cross-project and within-project semisupervised software defect prediction: A unified approach, IEEE Trans. Reliab., 67 (2018), 581-597. https://doi.org/10.1109/TR.2018.2804922 doi: 10.1109/TR.2018.2804922
![]() |
[56] |
D. L. Miholca, G. Czibula, I. G. Czibula, A novel approach for software defect prediction through hybridizing gradual relational association rules with artificial neural networks, Inf. Sci., 441 (2018), 152-170. https://doi.org/10.1016/j.ins.2018.02.027 doi: 10.1016/j.ins.2018.02.027
![]() |
[57] |
A. Majd, M. Vahidi-Asl, A. Khalilian, P. Poorsarvi-Tehrani, H. Haghighi, SLDeep: Statement-level software defect prediction using deep-learning model on static code features, Expert Syst. Appl., 147 (2020), 113156. https://doi.org/10.1016/j.eswa.2019.113156 doi: 10.1016/j.eswa.2019.113156
![]() |
[58] | G. G. Cabral, L. L. Minku, E. Shihab, S. Mujahid, Class imbalance evolution and verification latency in just-in-time software defect prediction, in 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), (2019), 666-676. https://doi.org/10.1109/ICSE.2019.00076 |
[59] | A. Perez, R. Abreu, A. Deursen, A test-suite diagnosability metric for spectrum-based fault localization approaches, in 2017 IEEE/ACM 39th International Conference on Software Engineering, (2017), 654-664. https://doi.org/10.1109/ICSE.2017.66 |
[60] | X. Li, W. Li, Y. Zhang, L. Zhang, Deepfl: Integrating multiple fault diagnosis dimensions for deep fault localization, in Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, (2019), 169-180. https://doi.org/10.1145/3293882.3330574 |
[61] |
A. Zakari, S. P. Lee, R. Abreu, B. H. Ahmed, R. A. Rasheed, Multiple fault localization of software programs: A systematic literature review, Inf. Software Technol., 124 (2020), 106312. https://doi.org/10.1016/j.infsof.2020.106312 doi: 10.1016/j.infsof.2020.106312
![]() |
[62] | Z. Li, Y. Wu, Y. Liu, An empirical study of bug isolation on the effectiveness of multiple fault localization, in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), (2019), 18-25. https://doi.org/10.1109/QRS.2019.00016 |
[63] | H. L. Ribeiro, R. P. A. de Araujo, M. L. Chaim, H. A. de Souza, F. Kon, Jaguar: A spectrum-based fault localization tool for real-world software, in 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), (2018), 404-409. https://doi.org/10.1109/ICST.2018.00048 |
[64] | K. Liu, A. Koyuncu, T. F. Bissyandé, D. Kim, J. Klein, Y. Le Traon, You cannot fix what you cannot find! An investigation of fault localization bias in benchmarking automated program repair systems, in 2019 12th IEEE conference on software testing, validation and verification (ICST), (2019), 102-113. https://doi.org/10.1109/ICST.2019.00020 |
[65] |
D. Zou, J. Liang, Y. Xiong, M. D. Ernst, L. Zhang, An empirical study of fault localization families and their combinations, IEEE Trans. Software Eng., 47 (2019), 332-347. https://doi.org/10.1109/TSE.2019.2892102 doi: 10.1109/TSE.2019.2892102
![]() |
[66] |
J. Kim, J. Kim, E. Lee, Variable-based fault localization, Inf. Software Technol., 107 (2019), 179-191. https://doi.org/10.1016/j.infsof.2018.11.009 doi: 10.1016/j.infsof.2018.11.009
![]() |
[67] |
Y. Kim, S. Mun, S. Yoo, M. Kim, Precise learn-to-rank fault localization using dynamic and static features of target programs, ACM Trans. Software Eng. Method. (TOSEM), 28 (2019), 1-34. https://doi.org/10.1145/3345628 doi: 10.1145/3345628
![]() |
[68] | Defects4J, 2022. available from: https://github.com/rjust/defects4j. |
1. | Chengqiang Wang, Xiangqing Zhao, Can Wang, Zhiwei Lv, Synchronization of Takagi–Sugeno Fuzzy Time-Delayed Stochastic Bidirectional Associative Memory Neural Networks Driven by Brownian Motion in Pre-Assigned Settling Time, 2023, 11, 2227-7390, 3697, 10.3390/math11173697 | |
2. | A. Karnan, G. Nagamani, Event-triggered extended dissipative synchronization for delayed neural networks with random uncertainties, 2023, 175, 09600779, 113982, 10.1016/j.chaos.2023.113982 |