SlideShare a Scribd company logo
1 of 1
Download to read offline
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 05 Issue: 01 June 2016, Page No. 5- 11
ISSN: 2278-2397
Bug Loc: Bug Localization in Multi Threaded
Application via Graph Mining Approach
A. Adhiselvam1
, E. Kirubakaran2
, R. Sukumar3
1
Assistant Professor, Department of MCA, S.T.E.T Women’s College, Mannargudi
2
Additional General Manager, STTP (System), Bharat Heavy Electrical Limited, Trichy
3
Professor, Department of CSE, Sethu Institute of Technology, Kariapatti
Email: adhiselvam@yahoo.com, ekiru@bheltry.co.in, rsukumar@sethu.ac.in
Abstract
Detection of software bugs and its occurrences, repudiation and its root cause is a very difficult process in large multi threaded
applications. It is a must for a software developer or software organization to identify bugs in their applications and to remove or
overcome them. The application should be protected from malfunctioning. Many of the compilers and Integrated Development
Environments are effectively identifying errors and bugs in applications while running or compiling, but they fail in detecting actual
cause for the bugs in the running applications. The developer has to reframe or recreate the package with the new one without bugs. It
is time consuming and effort is wasted in Software Development Life Cycle. There is a possibility to use graph mining techniques in
detecting software bugs. But there are many problems in using graph mining techniques. Managing large graph data, processing nodes
with links and processing subgraphs are the problems to be faced in graph mining approach. This paper presents a novel algorithm
named BugLoc which is capable of detecting bugs from the multi threaded software application. The BugLoc uses object template to
store graph data which reduces graph management complexities. It also uses substring analysis method in detecting frequent
subgraphs. The BugLoc then analyses frequent subgraphs to detect exact location of the software bugs. The experimental results show
that the algorithm is very efficient, accurate and scalable for large graph dataset.
Keywords : Graph Mining, Pattern Mining, Heuristic Approach, Frequent Subgraph, Bug Localization

More Related Content

What's hot

CyberSecurity_Certificate
CyberSecurity_CertificateCyberSecurity_Certificate
CyberSecurity_CertificateAaron Meis
 
Certificate on Cybersecurity
Certificate  on CybersecurityCertificate  on Cybersecurity
Certificate on CybersecurityMetasebia Kassa
 
brandnewresume10-11-2016
brandnewresume10-11-2016brandnewresume10-11-2016
brandnewresume10-11-2016Jifei Xu
 
Usability in Emergency Response Applications
Usability in Emergency Response ApplicationsUsability in Emergency Response Applications
Usability in Emergency Response ApplicationsDave Bouwman
 
An Emphasized Dual Similarity Measure Integration for Online Image Retrieval ...
An Emphasized Dual Similarity Measure Integration for Online Image Retrieval ...An Emphasized Dual Similarity Measure Integration for Online Image Retrieval ...
An Emphasized Dual Similarity Measure Integration for Online Image Retrieval ...ijcoa
 

What's hot (6)

CyberSecurity_Certificate
CyberSecurity_CertificateCyberSecurity_Certificate
CyberSecurity_Certificate
 
Certificate on Cybersecurity
Certificate  on CybersecurityCertificate  on Cybersecurity
Certificate on Cybersecurity
 
brandnewresume10-11-2016
brandnewresume10-11-2016brandnewresume10-11-2016
brandnewresume10-11-2016
 
Usability in Emergency Response Applications
Usability in Emergency Response ApplicationsUsability in Emergency Response Applications
Usability in Emergency Response Applications
 
An Emphasized Dual Similarity Measure Integration for Online Image Retrieval ...
An Emphasized Dual Similarity Measure Integration for Online Image Retrieval ...An Emphasized Dual Similarity Measure Integration for Online Image Retrieval ...
An Emphasized Dual Similarity Measure Integration for Online Image Retrieval ...
 
Certificate
CertificateCertificate
Certificate
 

Similar to BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach

A Survey on Bug Tracking System for Effective Bug Clearance
A Survey on Bug Tracking System for Effective Bug ClearanceA Survey on Bug Tracking System for Effective Bug Clearance
A Survey on Bug Tracking System for Effective Bug ClearanceIRJET Journal
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
 
Bug Triage: An Automated Process
Bug Triage: An Automated ProcessBug Triage: An Automated Process
Bug Triage: An Automated ProcessIRJET Journal
 
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...IJCI JOURNAL
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET Journal
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTIRJET Journal
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...iosrjce
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...ijtsrd
 
Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...eSAT Journals
 
IRJET- Determining the Components of Waste Assisted with Analysis of Meth...
IRJET-  	  Determining the Components of Waste Assisted with Analysis of Meth...IRJET-  	  Determining the Components of Waste Assisted with Analysis of Meth...
IRJET- Determining the Components of Waste Assisted with Analysis of Meth...IRJET Journal
 
Run Time Evaluation by using Object Oriented Debugging Tool
Run Time Evaluation by using Object Oriented Debugging ToolRun Time Evaluation by using Object Oriented Debugging Tool
Run Time Evaluation by using Object Oriented Debugging Toolijsrd.com
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET Journal
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine LearningIRJET Journal
 
Crime File System
Crime File SystemCrime File System
Crime File SystemIJARIIT
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...IOSR Journals
 

Similar to BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach (20)

A Survey on Bug Tracking System for Effective Bug Clearance
A Survey on Bug Tracking System for Effective Bug ClearanceA Survey on Bug Tracking System for Effective Bug Clearance
A Survey on Bug Tracking System for Effective Bug Clearance
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Bug Triage: An Automated Process
Bug Triage: An Automated ProcessBug Triage: An Automated Process
Bug Triage: An Automated Process
 
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
 
F017652530
F017652530F017652530
F017652530
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
 
Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...
 
IJET-V2I6P28
IJET-V2I6P28IJET-V2I6P28
IJET-V2I6P28
 
IRJET- Determining the Components of Waste Assisted with Analysis of Meth...
IRJET-  	  Determining the Components of Waste Assisted with Analysis of Meth...IRJET-  	  Determining the Components of Waste Assisted with Analysis of Meth...
IRJET- Determining the Components of Waste Assisted with Analysis of Meth...
 
Run Time Evaluation by using Object Oriented Debugging Tool
Run Time Evaluation by using Object Oriented Debugging ToolRun Time Evaluation by using Object Oriented Debugging Tool
Run Time Evaluation by using Object Oriented Debugging Tool
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine Learning
 
Crime File System
Crime File SystemCrime File System
Crime File System
 
Cv32608610
Cv32608610Cv32608610
Cv32608610
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
 

More from ijcoa

SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in AcadamicsSPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamicsijcoa
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Techniqueijcoa
 
Analysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix ModalAnalysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix Modalijcoa
 
Solving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy NumbersSolving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy Numbersijcoa
 
Fuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-CutsFuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-Cutsijcoa
 
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...ijcoa
 
Dual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its ApplicationsDual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its Applicationsijcoa
 
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...ijcoa
 
Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))ijcoa
 
Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...ijcoa
 
Format Preserving Encryption for Small Domain
Format Preserving Encryption for Small DomainFormat Preserving Encryption for Small Domain
Format Preserving Encryption for Small Domainijcoa
 
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...ijcoa
 
Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...ijcoa
 
Test Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost OptimizationTest Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost Optimizationijcoa
 
Artifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s ApplicationsArtifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s Applicationsijcoa
 
Effectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number TheoryEffectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number Theoryijcoa
 
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human BrainMicro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brainijcoa
 
EDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in SchoolsEDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in Schoolsijcoa
 
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...ijcoa
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic Systemijcoa
 

More from ijcoa (20)

SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in AcadamicsSPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Analysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix ModalAnalysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix Modal
 
Solving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy NumbersSolving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy Numbers
 
Fuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-CutsFuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-Cuts
 
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
 
Dual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its ApplicationsDual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its Applications
 
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
 
Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))
 
Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...
 
Format Preserving Encryption for Small Domain
Format Preserving Encryption for Small DomainFormat Preserving Encryption for Small Domain
Format Preserving Encryption for Small Domain
 
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
 
Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...
 
Test Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost OptimizationTest Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost Optimization
 
Artifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s ApplicationsArtifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s Applications
 
Effectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number TheoryEffectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number Theory
 
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human BrainMicro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
 
EDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in SchoolsEDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in Schools
 
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
 
Multi-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic SystemMulti-Biometric Authentication through Hybrid Cryptographic System
Multi-Biometric Authentication through Hybrid Cryptographic System
 

Recently uploaded

Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 

Recently uploaded (20)

Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 

BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach

  • 1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 05 Issue: 01 June 2016, Page No. 5- 11 ISSN: 2278-2397 Bug Loc: Bug Localization in Multi Threaded Application via Graph Mining Approach A. Adhiselvam1 , E. Kirubakaran2 , R. Sukumar3 1 Assistant Professor, Department of MCA, S.T.E.T Women’s College, Mannargudi 2 Additional General Manager, STTP (System), Bharat Heavy Electrical Limited, Trichy 3 Professor, Department of CSE, Sethu Institute of Technology, Kariapatti Email: adhiselvam@yahoo.com, ekiru@bheltry.co.in, rsukumar@sethu.ac.in Abstract Detection of software bugs and its occurrences, repudiation and its root cause is a very difficult process in large multi threaded applications. It is a must for a software developer or software organization to identify bugs in their applications and to remove or overcome them. The application should be protected from malfunctioning. Many of the compilers and Integrated Development Environments are effectively identifying errors and bugs in applications while running or compiling, but they fail in detecting actual cause for the bugs in the running applications. The developer has to reframe or recreate the package with the new one without bugs. It is time consuming and effort is wasted in Software Development Life Cycle. There is a possibility to use graph mining techniques in detecting software bugs. But there are many problems in using graph mining techniques. Managing large graph data, processing nodes with links and processing subgraphs are the problems to be faced in graph mining approach. This paper presents a novel algorithm named BugLoc which is capable of detecting bugs from the multi threaded software application. The BugLoc uses object template to store graph data which reduces graph management complexities. It also uses substring analysis method in detecting frequent subgraphs. The BugLoc then analyses frequent subgraphs to detect exact location of the software bugs. The experimental results show that the algorithm is very efficient, accurate and scalable for large graph dataset. Keywords : Graph Mining, Pattern Mining, Heuristic Approach, Frequent Subgraph, Bug Localization