Arasteh, BahmanGhaffari, Ali2024-05-192024-05-1920242514-92882514-9318https://doi.org10.1108/DTA-05-2023-0152https://hdl.handle.net/20.500.12713/5584PurposeReducing the number of generated mutants by clustering redundant mutants, reducing the execution time by decreasing the number of generated mutants and reducing the cost of mutation testing are the main goals of this study.Design/methodology/approachIn this study, a method is suggested to identify and prone the redundant mutants. In the method, first, the program source code is analyzed by the developed parser to filter out the effectless instructions; then the remaining instructions are mutated by the standard mutation operators. The single-line mutants are partially executed by the developed instruction evaluator. Next, a clustering method is used to group the single-line mutants with the same results. There is only one complete run per cluster.FindingsThe results of experiments on the Java benchmarks indicate that the proposed method causes a 53.51 per cent reduction in the number of mutants and a 57.64 per cent time reduction compared to similar experiments in the MuJava and MuClipse tools.Originality/valueDeveloping a classifier that takes the source code of the program and classifies the programs' instructions into effective and effectless classes using a dependency graph; filtering out the effectless instructions reduces the total number of mutants generated; Developing and implementing an instruction parser and instruction-level mutant generator for Java programs; the mutant generator takes instruction in the original program as a string and generates its single-line mutants based on the standard mutation operators in MuJava; Developing a stack-based evaluator that takes an instruction (original or mutant) and the test data and evaluates its result without executing the whole program.Competing interests: The authors declare that no funds, grants, or other support were received during the preparation of this manuscript. The authors have no relevant financial or nonfinancial conflict of interest.Authors' contribution statement: The proposed method was developed and discretized by the authors. The designed algorithm was implemented and coded by the authors. The implemented method was adapted and benchmarked by the authors. The data and results analysis were performed by the authors. The manuscript of the paper was written by the authors.Ethical and informed consent for data used: The data used in this research does not belong to any other person or third party and was prepared and generated by the researchers themselves during the research. The data of this research will be accessible to other researchers.Data availability access: The data relating to the current study is available in google.drive and can be freely accessed by the following link:https://drive.google.com/drive/folders/1d69XSBZ-ioInjPw9L4qp-3BBe2jlkkfv?usp=share_linkOriginality/valueDeveloping a classifier that takes the source code of the program and classifies the programs' instructions into effective and effectless classes using a dependency graph; filtering out the effectless instructions reduces the total number of mutants generated; Developing and implementing an instruction parser and instruction-level mutant generator for Java programs; the mutant generator takes instruction in the original program as a string and generates its single-line mutants based on the standard mutation operators in MuJava; Developing a stack-based evaluator that takes an instruction (original or mutant) and the test data and evaluates its result without executing the whole program. Competing interests: The authors declare that no funds, grants, or other support were received during the preparation of this manuscript. The authors have no relevant financial or nonfinancial conflict of interest.Authors' contribution statement: The proposed method was developed and discretized by the authors. The designed algorithm was implemented and coded by the authors. The implemented method was adapted and benchmarked by the authors. The data and results analysis were performed by the authors. The manuscript of the paper was written by the authors.Ethical and informed consent for data used: The data used in this research does not belong to any other person or third party and was prepared and generated by the researchers themselves during the research. The data of this research will be accessible to other researchers.Data availability access: The data relating to the current study is available in google.drive and can be freely accessed by the following link:https://drive.google.com/drive/folders/1d69XSBZ-ioInjPw9L4qp-3BBe2jlkkfv?usp=share_linkOriginality/valueDeveloping a classifier that takes the source code of the program and classifies the programs' instructions into effective and effectless classes using a dependency graph; filtering out the effectless instructions reduces the total number of mutants generated; Developing and implementing an instruction parser and instruction-level mutant generator for Java programs; the mutant generator takes instruction in the original program as a string and generates its single-line mutants based on the standard mutation operators in MuJava; Developing a stack-based evaluator that takes an instruction (original or mutant) and the test data and evaluates its result without executing the whole program.Competing interests: The authors declare that no funds, grants, or other support were received during the preparation of this manuscript. The authors have no relevant financial or nonfinancial conflict of interest.Authors' contribution statement: The proposed method was developed and discretized by the authors. The designed algorithm was implemented and coded by the authors. The implemented method was adapted and benchmarked by the authors. The data and results analysis were performed by the authors. The manuscript of the paper was written by the authors.Ethical and informed consent for data used: The data used in this research does not belong to any other person or third party and was prepared and generated by the researchers themselves during the research. The data of this research will be accessible to other researchers.Data availability access: The data relating to the current study is available in google.drive and can be freely accessed by the following link:https://drive.google.com/drive/folders/1d69XSBZ-ioInjPw9L4qp-3BBe2jlkkfv?usp=share_linkOriginality/valueDeveloping a classifier that takes the source code of the program and classifies the programs' instructions into effective and effectless classes using a dependency graph; filtering out the effectless instructions reduces the total number of mutants generated; Developing and implementing an instruction parser and instruction-level mutant generator for Java programs; the mutant generator takes instruction in the original program as a string and generates its single-line mutants based on the standard mutation operators in MuJava; Developing a stack-based evaluator that takes an instruction (original or mutant) and the test data and evaluates its result without executing the whole program. Competing interests: The authors declare that no funds, grants, or other support were received during the preparation of this manuscript. The authors have no relevant financial or nonfinancial conflict of interest.Authors' contribution statement: The proposed method was developed and discretized by the authors. The designed algorithm was implemented and coded by the authors. The implemented method was adapted and benchmarked by the authors. The data and results analysis were performed by the authors. The manuscript of the paper was written by the authors.Ethical and informed consent for data used: The data used in this research does not belong to any other person or third party and was prepared and generated by the researchers themselves during the research. The data of this research will be accessible to other researchers.Data availability access: The data relating to the current study is available in google.drive and can be freely accessed by the following link:https://drive.google.com/drive/folders/1d69XSBZ-ioInjPw9L4qp-3BBe2jlkkfv?usp=share_linkOriginality/valueDeveloping a classifier that takes the source code of the program and classifies the programs' instructions into effective and effectless classes using a dependency graph; filtering out the effectless instructions reduces the total number of mutants generated; Developing and implementing an instruction parser and instruction-level mutant generator for Java programs; the mutant generator takes instruction in the original program as a string and generates its single-line mutants based on the standard mutation operators in MuJava; Developing a stack-based evaluator that takes an instruction (original or mutant) and the test data and evaluates its result without executing the whole program.Competing interests: The authors declare that no funds, grants, or other support were received during the preparation of this manuscript. The authors have no relevant financial or nonfinancial conflict of interest.Authors' contribution statement: The proposed method was developed and discretized by the authors. The designed algorithm was implemented and coded by the authors. The implemented method was adapted and benchmarked by the authors. The data and results analysis were performed by the authors. The manuscript of the paper was written by the authors.Ethical and informed consent for data used: The data used in this research does not belong to any other person or third party and was prepared and generated by the researchers themselves during the research. The data of this research will be accessible to other researchers.Data availability access: The data relating to the current study is available in google.drive and can be freely accessed by the following link:https://drive.google.com/drive/folders/1d69XSBZ-ioInjPw9L4qp-3BBe2jlkkfv?usp=share_linkeninfo:eu-repo/semantics/closedAccessSoftware Mutation TestingSingle-Line MutantsRedundant MutantMutant ClusteringCost Of Mutation TestEfficient software mutation test by clustering the single-line redundant mutantsArticleWOS:0012075784000012-s2.0-85191351759N/A10.1108/DTA-05-2023-0152Q2