SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 6 (May. - Jun. 2013), PP 51-54
www.iosrjournals.org
www.iosrjournals.org 51 | Page
Static Slicing Technique with Algorithmic Approach
Sonam Agarwal1
, ArunPrakash Agarwal2
1
(M.Tech CSE, Amity University, Noida, India)
2
(Assistant Professor, Amity University, Noida, India)
Abstract:In order to improve the accuracy of the static programslicing which is used to locate the faults that
cause an exception,we propose a new algorithm which isstored when an exception occurred. The proposed
approachconsists of various steps and figure out those methods and statements thathave not been executed.
Then, these methods which are notexecuted will be ignored when building the system dependencegraph. Finally,
the accurate slice will be got by adopting theimproved program slicing algorithm. And the result shows that
using our approachthe slice is 8 percent less than using the general static programslicing algorithm on
average.One approach to improve the comprehension ofprograms is to reduce the amount of data to be
observedand inspected. Programmers tend to focus andcomprehended selected functions (outputs) and those
partsof a program that are directly related to that particularfunction rather than all possible program functions.
Oneapproach is to utilize program slicing, a program decomposition technique that transforms a large
programinto a smaller one that contains only statements relevantto the computation of a selected function.
Keywords: Program slicing, Static slicing, Static slicing algorithm
I. Introduction
Program slicing is a decomposition technique to solve program analysis problem. Program slicing is
used for slicing the large program into small and simple programsthat contain only that statement that is
necessary to complete any execution or execute any program without any error. It is widely used for program
analysis, understanding, testing, debugging, metricetc. The concept and principle of program slicing were first
established by M.Weiser [6] in 1979, and after thatmany other slicing techniques has been implemented.
Program slicing is a feasible method to restrict the focus of a task to specific sub-components of a program.
The program slicing can be classified as static slicing anddynamic slicing. For a specific slicing criterion, the
maindifference between them is that the information they required.Static program slicing only needs static
information which is the source code, while the other requires the entire execution trace which is corresponding
to a specific program input. In other words, static slicing considers all possible executions but dynamic slicing
only considers the execution of a specific input [16]. Therefore, dynamic slicing contains fewer statements and
is more precise than the static one. The optimizeddynamic slicing will take several minutes to perform the
slicingand the preparing time is even longer [2]. With complex program and long execution traces, dynamic
slicing is not appropriate.
Applying slicing technique to software architectures can benefit software development in two main ways
[18]. The first one concerns maintenance of a component-based software. By using slicing tools on an
architectural description, we can determine which components might be affected when a given component is
modified. Second, architectural reuse can be facilitated. While reuse of code is important, reuse of software
design and patterns are expected to offer greater productivity benefits and reliability enhancements[22].
II. Paper Work
In this paper we firstlywritethe simple program along with the sliced program. Sliced program is also
calledthe simple slicing or static slicing of a program.
(a) Void main()
(b) {
(c) inti=0;
(d) int n;
(e) int sum=0;
(f) printf(―enter the value of n‖);
(g) scanf(―%d‖,&n);
(h) for(i=0; i<n; i++)
(i) {
(j) sum=sum+i;
(k) printf(―the current value of i is‖,i);
Static Slicing Technique With Algorithmic Approach
www.iosrjournals.org 52 | Page
(l) }
(m) printf(―the sum is‖,sum);
(n) getch();
(o) }
Program: Simple Program
This program consists of three variables. Sohere we have three variables which can remove. Now we
describe all the three conditions that satisfy thecriteria[20]. After removing one by one each variable which
program remains that is called sliced program or static sliced program.
Condition 1: Remove variable i
(a) Void main()
(b) {
(c)
(d) int n;
(e) int sum=0;
(f) printf(―enter the value of n‖);
(g) scanf(―%d‖,&n);
(h)
(i)
(j)
(k)
(l)
(m) printf(―the sum is‖,sum);
(n) getch();
(o) }
Program: Static Sliced Program
Condition 2: Remove variable n
(a) Void main()
(b) {
(c) inti=0;
(d)
(e) int sum=0;
(f) printf(―enter the value of n‖);
(g)
(h)
(i) {
(j) sum=sum+i;
(k) printf(―the current value of i is‖,i);
(l) }
(m) printf(―the sum is‖,sum);
(n) getch();
(o) }
Program: Static Sliced Program
Condition 3: Remove variable sum
(a) Void main()
(b) {
(c) inti=0;
(d) int n;
(e)
(f) printf(―enter the value of n‖);
(g) scanf(―%d‖,&n);
(h) for(i=0; i<n; i++)
(i) {
(j)
(k) printf(―the current value of i is‖,i);
Static Slicing Technique With Algorithmic Approach
www.iosrjournals.org 53 | Page
(l) }
(m)
(n) getch();
(o) }
Program: Static Sliced Program
Now after understanding the static slicing concept we describe a static slicing algorithm which is
clearly understandable and gives the solution of simple program to the static sliced program. This algorithm is
very simple and gives the precise solution of any problem. In order to extract a slice from a program, the
dependencies between the statements must be computed first. The control flow graph (CFG) is a data structure
which makes the control dependencies for each operation in a program explicit [3][4].
2.1 Algorithm
P: Simple Program
Ch: variable which we want to remove
Static_Slice(p,ch)
{
int l;
str s1=‖ ‖;
1. Open program P in read mode
2. Fetch the input variable Ch
3. Find l i.e. length of program P
4. while(!EOF)
5. {
6. for(i=0;i<=l;i++)
7. {
8. if(Ch==getc(p))
9. {
10. Delete the variable;
11. }
12. else
13. {
14. s1=s1+Ch;
15. }
16. }
17. }
III. Conclusion
This paper, presents general program slicing algorithms. The algorithms compute correctprogram slices
for all language constructs found in major object-oriented programming languages, e.g., polymorphism,
inheritance, late binding, exception handling, local and global variables. This paper provides the general static
slicing algorithm computes correct and executable static slices.Static slicing methods have been proposed for
maintenance and program understanding because this way certainparts of the program can be ―sliced away‖ that
are of nointerest with respect to the slicing criterion.
The application of slicing in various areas likes debugging, cohesion measurement, comprehension,
maintenance and re-engineering and testing are highlighted.In this paper, we have proposed and validated a
technique, which is an extension of an existing technique proposed by us in an analogous study. On
carefullyanalyzing the code the behavior of techniques we observed that proposed technique gives better result.
IV. Future Scope
As part of our future work, we will expand ourframework to extend the algorithmic support within
ourstructure and derive new slicing related concepts, as wellas new visualization techniques. We also plan to
integrateforward slicing algorithm and backward slicing algorithm within our static slicingframework.
In future we plan to make a more robust implementation of the algorithms and to perform some
measurementson real, industrial applications with real case studies. Forthis purpose we need to make the
implementation more stable and improve the performance, especially regarding theslowdown of the
instrumented code. Another on-going work is to implement the algorithm for the C++ language.
Static Slicing Technique With Algorithmic Approach
www.iosrjournals.org 54 | Page
References
[1] Tao Wang and Abhik Roy Choudhury,‖ Dynamic Slicing on Java Bytecode Traces‖,Singapore International Conference on Software
Engineering (ICSE), 2004
[2] Hiralalagarwal,richard a. demillo and eugene h. spafford,‖ Debugging with Dynamic Slicing andBacktracking‖, Software— Practice
And Experience, Vol. 23, no. 6, pp. 589–616, JUNE 1993
[3] SwarnenduBiswas and Rajib Mall, ―Regression Test Selection Techniques: A Survey‖, Information and Software Technology, Vol.
52, no. 1, January 2010
[4] Jaiprakash T Lalchandani, R Mall, ‖Regression TestingBased-on Slicing of Component-based SoftwareArchitectures‖, ISEC ,vol. 79,
no. 06, pp. 19-22, 2008
[5] Rajiv Gupta, Mary Jean Harrold, Mary Lou Soffa, ―AnApproach to Regression Testing using Slicing‖, ACMTransactions on
Programming Languages and Systems,vol. 12, no. 1, pp. 26-60, January 1990
[6] Yogesh Singh, ArvinderKaur and BhartiSuri, ―A Hybrid Approach for Regression Testingin Interprocedural Program‖, Journal of
Information Processing Systems, Vol.6, No.1, March 2010
[7] Hongchang Zhang, Shujuan Jiang, Rong Jin, ―An Improved Static Program Slicing Algorithm Using Stack Trace‖,IEEE,2011
[8] N.Sasirekha, A.Edwin Robert, Dr.M.Hemalatha,―Program slicing techniques and its applications‖,International Journal of Software
Engineering &Applications (IJSEA), Vol. 2, No. 3, pp.85-92, July 2011
[9] MithunAcharya, Brian Robinson, ―Practical ChangeImpact Analysis Based on Static Program Slicing forIndustrial Software
Systems‖, ICSE, vol. 11, pp. 21–28,may 2011
[10] BaowenXu, JuQian, Xiaofang Zhang, Zhongqiang, WuLin Chen,‖ A Brief Survey Of Program Slicing‖, ACMSIGSOFT Software
Engineering, Vol. 30, no. 2, pp. 1-36, March 2005
[11] Josep Silva, ―A Vocabulary of Program Slicing-BasedTechniques‖, ACM Computing Surveys, Vol. 44, No. 3,Article 12, June 2012
[12] S. Horwitz, T. Reps, and D. Binkley, ―InterproceduralSlicing Using Dependence Graphs‖, ACM Transactionon Programming
Languages and Systems, 1990, pp. 26-61
[13] SwateeRekhaMohanty,Durga Prasad Mohapatra, HimansuSekharBehara, ―A Novel Approach for Static Slicing of Inter-Procedural
Programs‖,9th International Conference on Information Technology (ICIT'06), 2006
[14] Frank Tip, ―A Survey of Program Slicing Techniques‖,Journal of Programming Languages, Vol. 3, No. 3, pp.121– 189
[15] David Binkley, ―The Application of Program Slicing toRegression Testing‖
[16] DebasisMohapatra, ―GA Based Test Case GenerationApproach for Formation of Efficient Set of DynamicSlices‖, International
Journal on Computer Science andEngineering (IJCSE),Vol. 3, No. 9, September 2011
[17] AmoghKatti, SujathaTerdal, ―Program Slicing forRefactoring: Static Slicer using Dynamic Analyser‖, International Journal of
Computer Applications, Vol. 9,No. 6, November 2010
[18] HiralalAgrawal, Joseph R. Horgan, ―Dynamic ProgramSlicing‖, ACM SIGPLAN Notices, Vol. 25, No. 6, pp.246-256, June 1990
[19] Z. Chen, B. Xu, and J. Zhao, ―An Overview of MethodsforDependence Analysis of Concurrent Programs‖, ACMSIGPLAN Notices,
Vol. 37, No. 8, pp. 45-52, 2002
[20] Lei Xu, BaowenXu, Zhenqiang Chen, Jixiang Jiang, andHuowang Chen, ―Regression testing for web applicationsbased on slicing. In
Proceedings of the 27th AnnualInternational Computer Software and ApplicationsConference‖,IEEE Computer Society, pages 652–
656,Los Alamitos, CA, USA, November 2003
[21] J. Bible, G. Rothermel, and D. Rosenblum, ‖Acomparative study of coarse- and fine-grained saferegression test-selection
techniques‖, ACM Transactionson Software Engineering and Methodology, Vol. 10, No.2, pp. 149–183, April 2001
[22] S.S. Anju, P. Harmya, NoopaJagadeesh, R. darsana,―Malware detection using assembly code and controlflow graph optimization‖,
ACM Digital library, No. 52,2010
[23] J.Zhao, J.Cheng, and K.Ushijima, ―Static Slicing ofConcurrent Object-Oriented Programs‖, Proc. of the 20th
IEEE Annual
International Computer Software andApplications conference, IEEE, pp.312-320, August, 1996

Contenu connexe

Tendances

IRJET - Airplane Crash Analysis and Prediction using Machine Learning
IRJET - Airplane Crash Analysis and Prediction using Machine LearningIRJET - Airplane Crash Analysis and Prediction using Machine Learning
IRJET - Airplane Crash Analysis and Prediction using Machine LearningIRJET Journal
 
DHSSTTSL11192.HSI Process (1)
DHSSTTSL11192.HSI Process (1)DHSSTTSL11192.HSI Process (1)
DHSSTTSL11192.HSI Process (1)John Chin
 
Using Mutation in Fault Localization
Using Mutation in Fault Localization Using Mutation in Fault Localization
Using Mutation in Fault Localization csandit
 
Regression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythiaRegression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythiaTELKOMNIKA JOURNAL
 
Learning to Spot and Refactor Inconsistent Method Names
Learning to Spot and Refactor Inconsistent Method NamesLearning to Spot and Refactor Inconsistent Method Names
Learning to Spot and Refactor Inconsistent Method NamesDongsun Kim
 
Code coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationCode coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationijseajournal
 
A Closer Look at Real-World Patches
A Closer Look at Real-World PatchesA Closer Look at Real-World Patches
A Closer Look at Real-World PatchesDongsun Kim
 
Software Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled DatasetsSoftware Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled DatasetsSung Kim
 
STAR: Stack Trace based Automatic Crash Reproduction
STAR: Stack Trace based Automatic Crash ReproductionSTAR: Stack Trace based Automatic Crash Reproduction
STAR: Stack Trace based Automatic Crash ReproductionSung Kim
 
Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2gregoryg
 
AUTOCODECOVERGEN: PROTOTYPE OF DATA DRIVEN UNIT TEST GENRATION TOOL THAT GUAR...
AUTOCODECOVERGEN: PROTOTYPE OF DATA DRIVEN UNIT TEST GENRATION TOOL THAT GUAR...AUTOCODECOVERGEN: PROTOTYPE OF DATA DRIVEN UNIT TEST GENRATION TOOL THAT GUAR...
AUTOCODECOVERGEN: PROTOTYPE OF DATA DRIVEN UNIT TEST GENRATION TOOL THAT GUAR...acijjournal
 

Tendances (12)

IRJET - Airplane Crash Analysis and Prediction using Machine Learning
IRJET - Airplane Crash Analysis and Prediction using Machine LearningIRJET - Airplane Crash Analysis and Prediction using Machine Learning
IRJET - Airplane Crash Analysis and Prediction using Machine Learning
 
DHSSTTSL11192.HSI Process (1)
DHSSTTSL11192.HSI Process (1)DHSSTTSL11192.HSI Process (1)
DHSSTTSL11192.HSI Process (1)
 
Using Mutation in Fault Localization
Using Mutation in Fault Localization Using Mutation in Fault Localization
Using Mutation in Fault Localization
 
Regression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythiaRegression test selection model: a comparison between ReTSE and pythia
Regression test selection model: a comparison between ReTSE and pythia
 
Learning to Spot and Refactor Inconsistent Method Names
Learning to Spot and Refactor Inconsistent Method NamesLearning to Spot and Refactor Inconsistent Method Names
Learning to Spot and Refactor Inconsistent Method Names
 
Code coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationCode coverage based test case selection and prioritization
Code coverage based test case selection and prioritization
 
A Closer Look at Real-World Patches
A Closer Look at Real-World PatchesA Closer Look at Real-World Patches
A Closer Look at Real-World Patches
 
Software Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled DatasetsSoftware Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled Datasets
 
STAR: Stack Trace based Automatic Crash Reproduction
STAR: Stack Trace based Automatic Crash ReproductionSTAR: Stack Trace based Automatic Crash Reproduction
STAR: Stack Trace based Automatic Crash Reproduction
 
Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2Boetticher Presentation Promise 2008v2
Boetticher Presentation Promise 2008v2
 
Path testing
Path testingPath testing
Path testing
 
AUTOCODECOVERGEN: PROTOTYPE OF DATA DRIVEN UNIT TEST GENRATION TOOL THAT GUAR...
AUTOCODECOVERGEN: PROTOTYPE OF DATA DRIVEN UNIT TEST GENRATION TOOL THAT GUAR...AUTOCODECOVERGEN: PROTOTYPE OF DATA DRIVEN UNIT TEST GENRATION TOOL THAT GUAR...
AUTOCODECOVERGEN: PROTOTYPE OF DATA DRIVEN UNIT TEST GENRATION TOOL THAT GUAR...
 

En vedette

K-NN Classifier Performs Better Than K-Means Clustering in Missing Value Imp...
K-NN Classifier Performs Better Than K-Means Clustering in  Missing Value Imp...K-NN Classifier Performs Better Than K-Means Clustering in  Missing Value Imp...
K-NN Classifier Performs Better Than K-Means Clustering in Missing Value Imp...IOSR Journals
 
тестфонетика9 класса
тестфонетика9 классатестфонетика9 класса
тестфонетика9 классаNatalya Dyrda
 
Presentazione dogsinthecity
Presentazione dogsinthecityPresentazione dogsinthecity
Presentazione dogsinthecitylucaminetti
 
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingAdaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingIOSR Journals
 
A Tailored Anti-Forensic Approach for Bitmap Compression in Medical Images
A Tailored Anti-Forensic Approach for Bitmap Compression in  Medical ImagesA Tailored Anti-Forensic Approach for Bitmap Compression in  Medical Images
A Tailored Anti-Forensic Approach for Bitmap Compression in Medical ImagesIOSR Journals
 
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
Horizontal Aggregations in SQL to Prepare Data Sets for Data  Mining AnalysisHorizontal Aggregations in SQL to Prepare Data Sets for Data  Mining Analysis
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining AnalysisIOSR Journals
 
Auroras boreales
Auroras borealesAuroras boreales
Auroras borealespaulau2012
 
егэ виды грамматических ошибок
егэ виды грамматических ошибокегэ виды грамматических ошибок
егэ виды грамматических ошибокNatalya Dyrda
 
iphone5 管理面での提案書
iphone5 管理面での提案書iphone5 管理面での提案書
iphone5 管理面での提案書keichi ide
 
Belgium's Social Media and Netlog
Belgium's Social Media and NetlogBelgium's Social Media and Netlog
Belgium's Social Media and NetlogKatherine Witsman
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...IOSR Journals
 
Prospect of E-Retailing In India
Prospect of E-Retailing In IndiaProspect of E-Retailing In India
Prospect of E-Retailing In IndiaIOSR Journals
 
S cmmi-wbs
S cmmi-wbsS cmmi-wbs
S cmmi-wbsllymaam
 
Navigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On OntologyNavigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On OntologyIOSR Journals
 
Dimitri Biological Lights: Science Fair 2013
Dimitri Biological Lights: Science Fair 2013Dimitri Biological Lights: Science Fair 2013
Dimitri Biological Lights: Science Fair 2013iamdz2
 
Incidence of Equine Hoof Derangements in Malaysian Horse Population
Incidence of Equine Hoof Derangements in Malaysian Horse PopulationIncidence of Equine Hoof Derangements in Malaysian Horse Population
Incidence of Equine Hoof Derangements in Malaysian Horse PopulationIOSR Journals
 

En vedette (20)

8 hw cells_organisation
8 hw cells_organisation8 hw cells_organisation
8 hw cells_organisation
 
K-NN Classifier Performs Better Than K-Means Clustering in Missing Value Imp...
K-NN Classifier Performs Better Than K-Means Clustering in  Missing Value Imp...K-NN Classifier Performs Better Than K-Means Clustering in  Missing Value Imp...
K-NN Classifier Performs Better Than K-Means Clustering in Missing Value Imp...
 
тестфонетика9 класса
тестфонетика9 классатестфонетика9 класса
тестфонетика9 класса
 
Presentazione dogsinthecity
Presentazione dogsinthecityPresentazione dogsinthecity
Presentazione dogsinthecity
 
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingAdaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social Networking
 
A Tailored Anti-Forensic Approach for Bitmap Compression in Medical Images
A Tailored Anti-Forensic Approach for Bitmap Compression in  Medical ImagesA Tailored Anti-Forensic Approach for Bitmap Compression in  Medical Images
A Tailored Anti-Forensic Approach for Bitmap Compression in Medical Images
 
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
Horizontal Aggregations in SQL to Prepare Data Sets for Data  Mining AnalysisHorizontal Aggregations in SQL to Prepare Data Sets for Data  Mining Analysis
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
 
Auroras boreales
Auroras borealesAuroras boreales
Auroras boreales
 
егэ виды грамматических ошибок
егэ виды грамматических ошибокегэ виды грамматических ошибок
егэ виды грамматических ошибок
 
Modelo pedagogico
Modelo pedagogicoModelo pedagogico
Modelo pedagogico
 
E0362430
E0362430E0362430
E0362430
 
iphone5 管理面での提案書
iphone5 管理面での提案書iphone5 管理面での提案書
iphone5 管理面での提案書
 
Belgium's Social Media and Netlog
Belgium's Social Media and NetlogBelgium's Social Media and Netlog
Belgium's Social Media and Netlog
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
 
Prospect of E-Retailing In India
Prospect of E-Retailing In IndiaProspect of E-Retailing In India
Prospect of E-Retailing In India
 
Hang the broom
Hang the broomHang the broom
Hang the broom
 
S cmmi-wbs
S cmmi-wbsS cmmi-wbs
S cmmi-wbs
 
Navigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On OntologyNavigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On Ontology
 
Dimitri Biological Lights: Science Fair 2013
Dimitri Biological Lights: Science Fair 2013Dimitri Biological Lights: Science Fair 2013
Dimitri Biological Lights: Science Fair 2013
 
Incidence of Equine Hoof Derangements in Malaysian Horse Population
Incidence of Equine Hoof Derangements in Malaysian Horse PopulationIncidence of Equine Hoof Derangements in Malaysian Horse Population
Incidence of Equine Hoof Derangements in Malaysian Horse Population
 

Similaire à Static Slicing Technique with Algorithmic Approach

A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...iosrjce
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTIRJET Journal
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
A review of slicing techniques in software engineering
A review of slicing techniques in software engineeringA review of slicing techniques in software engineering
A review of slicing techniques in software engineeringSalam Shah
 
Architecture of a morphological malware detector
Architecture of a morphological malware detectorArchitecture of a morphological malware detector
Architecture of a morphological malware detectorUltraUploader
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...IOSR Journals
 
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMSDYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMSPraveen Penumathsa
 
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMSDYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMSPraveen Penumathsa
 
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...acijjournal
 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...acijjournal
 
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...IJCI JOURNAL
 
Deepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine LearningDeepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine LearningIRJET Journal
 
Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...eSAT Journals
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodIRJET Journal
 
Bug Triage: An Automated Process
Bug Triage: An Automated ProcessBug Triage: An Automated Process
Bug Triage: An Automated ProcessIRJET Journal
 

Similaire à Static Slicing Technique with Algorithmic Approach (20)

A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
A Review on Software Fault Detection and Prevention Mechanism in Software Dev...
 
F017652530
F017652530F017652530
F017652530
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
J034057065
J034057065J034057065
J034057065
 
Ijetcas14 468
Ijetcas14 468Ijetcas14 468
Ijetcas14 468
 
A review of slicing techniques in software engineering
A review of slicing techniques in software engineeringA review of slicing techniques in software engineering
A review of slicing techniques in software engineering
 
Architecture of a morphological malware detector
Architecture of a morphological malware detectorArchitecture of a morphological malware detector
Architecture of a morphological malware detector
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
 
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMSDYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
 
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMSDYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
DYNAMIC SLICING OF ASPECT-ORIENTED PROGRAMS
 
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
 
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
 
A035401010
A035401010A035401010
A035401010
 
Deepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine LearningDeepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine Learning
 
Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
 
Bug Triage: An Automated Process
Bug Triage: An Automated ProcessBug Triage: An Automated Process
Bug Triage: An Automated Process
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Dernier (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Static Slicing Technique with Algorithmic Approach

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 6 (May. - Jun. 2013), PP 51-54 www.iosrjournals.org www.iosrjournals.org 51 | Page Static Slicing Technique with Algorithmic Approach Sonam Agarwal1 , ArunPrakash Agarwal2 1 (M.Tech CSE, Amity University, Noida, India) 2 (Assistant Professor, Amity University, Noida, India) Abstract:In order to improve the accuracy of the static programslicing which is used to locate the faults that cause an exception,we propose a new algorithm which isstored when an exception occurred. The proposed approachconsists of various steps and figure out those methods and statements thathave not been executed. Then, these methods which are notexecuted will be ignored when building the system dependencegraph. Finally, the accurate slice will be got by adopting theimproved program slicing algorithm. And the result shows that using our approachthe slice is 8 percent less than using the general static programslicing algorithm on average.One approach to improve the comprehension ofprograms is to reduce the amount of data to be observedand inspected. Programmers tend to focus andcomprehended selected functions (outputs) and those partsof a program that are directly related to that particularfunction rather than all possible program functions. Oneapproach is to utilize program slicing, a program decomposition technique that transforms a large programinto a smaller one that contains only statements relevantto the computation of a selected function. Keywords: Program slicing, Static slicing, Static slicing algorithm I. Introduction Program slicing is a decomposition technique to solve program analysis problem. Program slicing is used for slicing the large program into small and simple programsthat contain only that statement that is necessary to complete any execution or execute any program without any error. It is widely used for program analysis, understanding, testing, debugging, metricetc. The concept and principle of program slicing were first established by M.Weiser [6] in 1979, and after thatmany other slicing techniques has been implemented. Program slicing is a feasible method to restrict the focus of a task to specific sub-components of a program. The program slicing can be classified as static slicing anddynamic slicing. For a specific slicing criterion, the maindifference between them is that the information they required.Static program slicing only needs static information which is the source code, while the other requires the entire execution trace which is corresponding to a specific program input. In other words, static slicing considers all possible executions but dynamic slicing only considers the execution of a specific input [16]. Therefore, dynamic slicing contains fewer statements and is more precise than the static one. The optimizeddynamic slicing will take several minutes to perform the slicingand the preparing time is even longer [2]. With complex program and long execution traces, dynamic slicing is not appropriate. Applying slicing technique to software architectures can benefit software development in two main ways [18]. The first one concerns maintenance of a component-based software. By using slicing tools on an architectural description, we can determine which components might be affected when a given component is modified. Second, architectural reuse can be facilitated. While reuse of code is important, reuse of software design and patterns are expected to offer greater productivity benefits and reliability enhancements[22]. II. Paper Work In this paper we firstlywritethe simple program along with the sliced program. Sliced program is also calledthe simple slicing or static slicing of a program. (a) Void main() (b) { (c) inti=0; (d) int n; (e) int sum=0; (f) printf(―enter the value of n‖); (g) scanf(―%d‖,&n); (h) for(i=0; i<n; i++) (i) { (j) sum=sum+i; (k) printf(―the current value of i is‖,i);
  • 2. Static Slicing Technique With Algorithmic Approach www.iosrjournals.org 52 | Page (l) } (m) printf(―the sum is‖,sum); (n) getch(); (o) } Program: Simple Program This program consists of three variables. Sohere we have three variables which can remove. Now we describe all the three conditions that satisfy thecriteria[20]. After removing one by one each variable which program remains that is called sliced program or static sliced program. Condition 1: Remove variable i (a) Void main() (b) { (c) (d) int n; (e) int sum=0; (f) printf(―enter the value of n‖); (g) scanf(―%d‖,&n); (h) (i) (j) (k) (l) (m) printf(―the sum is‖,sum); (n) getch(); (o) } Program: Static Sliced Program Condition 2: Remove variable n (a) Void main() (b) { (c) inti=0; (d) (e) int sum=0; (f) printf(―enter the value of n‖); (g) (h) (i) { (j) sum=sum+i; (k) printf(―the current value of i is‖,i); (l) } (m) printf(―the sum is‖,sum); (n) getch(); (o) } Program: Static Sliced Program Condition 3: Remove variable sum (a) Void main() (b) { (c) inti=0; (d) int n; (e) (f) printf(―enter the value of n‖); (g) scanf(―%d‖,&n); (h) for(i=0; i<n; i++) (i) { (j) (k) printf(―the current value of i is‖,i);
  • 3. Static Slicing Technique With Algorithmic Approach www.iosrjournals.org 53 | Page (l) } (m) (n) getch(); (o) } Program: Static Sliced Program Now after understanding the static slicing concept we describe a static slicing algorithm which is clearly understandable and gives the solution of simple program to the static sliced program. This algorithm is very simple and gives the precise solution of any problem. In order to extract a slice from a program, the dependencies between the statements must be computed first. The control flow graph (CFG) is a data structure which makes the control dependencies for each operation in a program explicit [3][4]. 2.1 Algorithm P: Simple Program Ch: variable which we want to remove Static_Slice(p,ch) { int l; str s1=‖ ‖; 1. Open program P in read mode 2. Fetch the input variable Ch 3. Find l i.e. length of program P 4. while(!EOF) 5. { 6. for(i=0;i<=l;i++) 7. { 8. if(Ch==getc(p)) 9. { 10. Delete the variable; 11. } 12. else 13. { 14. s1=s1+Ch; 15. } 16. } 17. } III. Conclusion This paper, presents general program slicing algorithms. The algorithms compute correctprogram slices for all language constructs found in major object-oriented programming languages, e.g., polymorphism, inheritance, late binding, exception handling, local and global variables. This paper provides the general static slicing algorithm computes correct and executable static slices.Static slicing methods have been proposed for maintenance and program understanding because this way certainparts of the program can be ―sliced away‖ that are of nointerest with respect to the slicing criterion. The application of slicing in various areas likes debugging, cohesion measurement, comprehension, maintenance and re-engineering and testing are highlighted.In this paper, we have proposed and validated a technique, which is an extension of an existing technique proposed by us in an analogous study. On carefullyanalyzing the code the behavior of techniques we observed that proposed technique gives better result. IV. Future Scope As part of our future work, we will expand ourframework to extend the algorithmic support within ourstructure and derive new slicing related concepts, as wellas new visualization techniques. We also plan to integrateforward slicing algorithm and backward slicing algorithm within our static slicingframework. In future we plan to make a more robust implementation of the algorithms and to perform some measurementson real, industrial applications with real case studies. Forthis purpose we need to make the implementation more stable and improve the performance, especially regarding theslowdown of the instrumented code. Another on-going work is to implement the algorithm for the C++ language.
  • 4. Static Slicing Technique With Algorithmic Approach www.iosrjournals.org 54 | Page References [1] Tao Wang and Abhik Roy Choudhury,‖ Dynamic Slicing on Java Bytecode Traces‖,Singapore International Conference on Software Engineering (ICSE), 2004 [2] Hiralalagarwal,richard a. demillo and eugene h. spafford,‖ Debugging with Dynamic Slicing andBacktracking‖, Software— Practice And Experience, Vol. 23, no. 6, pp. 589–616, JUNE 1993 [3] SwarnenduBiswas and Rajib Mall, ―Regression Test Selection Techniques: A Survey‖, Information and Software Technology, Vol. 52, no. 1, January 2010 [4] Jaiprakash T Lalchandani, R Mall, ‖Regression TestingBased-on Slicing of Component-based SoftwareArchitectures‖, ISEC ,vol. 79, no. 06, pp. 19-22, 2008 [5] Rajiv Gupta, Mary Jean Harrold, Mary Lou Soffa, ―AnApproach to Regression Testing using Slicing‖, ACMTransactions on Programming Languages and Systems,vol. 12, no. 1, pp. 26-60, January 1990 [6] Yogesh Singh, ArvinderKaur and BhartiSuri, ―A Hybrid Approach for Regression Testingin Interprocedural Program‖, Journal of Information Processing Systems, Vol.6, No.1, March 2010 [7] Hongchang Zhang, Shujuan Jiang, Rong Jin, ―An Improved Static Program Slicing Algorithm Using Stack Trace‖,IEEE,2011 [8] N.Sasirekha, A.Edwin Robert, Dr.M.Hemalatha,―Program slicing techniques and its applications‖,International Journal of Software Engineering &Applications (IJSEA), Vol. 2, No. 3, pp.85-92, July 2011 [9] MithunAcharya, Brian Robinson, ―Practical ChangeImpact Analysis Based on Static Program Slicing forIndustrial Software Systems‖, ICSE, vol. 11, pp. 21–28,may 2011 [10] BaowenXu, JuQian, Xiaofang Zhang, Zhongqiang, WuLin Chen,‖ A Brief Survey Of Program Slicing‖, ACMSIGSOFT Software Engineering, Vol. 30, no. 2, pp. 1-36, March 2005 [11] Josep Silva, ―A Vocabulary of Program Slicing-BasedTechniques‖, ACM Computing Surveys, Vol. 44, No. 3,Article 12, June 2012 [12] S. Horwitz, T. Reps, and D. Binkley, ―InterproceduralSlicing Using Dependence Graphs‖, ACM Transactionon Programming Languages and Systems, 1990, pp. 26-61 [13] SwateeRekhaMohanty,Durga Prasad Mohapatra, HimansuSekharBehara, ―A Novel Approach for Static Slicing of Inter-Procedural Programs‖,9th International Conference on Information Technology (ICIT'06), 2006 [14] Frank Tip, ―A Survey of Program Slicing Techniques‖,Journal of Programming Languages, Vol. 3, No. 3, pp.121– 189 [15] David Binkley, ―The Application of Program Slicing toRegression Testing‖ [16] DebasisMohapatra, ―GA Based Test Case GenerationApproach for Formation of Efficient Set of DynamicSlices‖, International Journal on Computer Science andEngineering (IJCSE),Vol. 3, No. 9, September 2011 [17] AmoghKatti, SujathaTerdal, ―Program Slicing forRefactoring: Static Slicer using Dynamic Analyser‖, International Journal of Computer Applications, Vol. 9,No. 6, November 2010 [18] HiralalAgrawal, Joseph R. Horgan, ―Dynamic ProgramSlicing‖, ACM SIGPLAN Notices, Vol. 25, No. 6, pp.246-256, June 1990 [19] Z. Chen, B. Xu, and J. Zhao, ―An Overview of MethodsforDependence Analysis of Concurrent Programs‖, ACMSIGPLAN Notices, Vol. 37, No. 8, pp. 45-52, 2002 [20] Lei Xu, BaowenXu, Zhenqiang Chen, Jixiang Jiang, andHuowang Chen, ―Regression testing for web applicationsbased on slicing. In Proceedings of the 27th AnnualInternational Computer Software and ApplicationsConference‖,IEEE Computer Society, pages 652– 656,Los Alamitos, CA, USA, November 2003 [21] J. Bible, G. Rothermel, and D. Rosenblum, ‖Acomparative study of coarse- and fine-grained saferegression test-selection techniques‖, ACM Transactionson Software Engineering and Methodology, Vol. 10, No.2, pp. 149–183, April 2001 [22] S.S. Anju, P. Harmya, NoopaJagadeesh, R. darsana,―Malware detection using assembly code and controlflow graph optimization‖, ACM Digital library, No. 52,2010 [23] J.Zhao, J.Cheng, and K.Ushijima, ―Static Slicing ofConcurrent Object-Oriented Programs‖, Proc. of the 20th IEEE Annual International Computer Software andApplications conference, IEEE, pp.312-320, August, 1996