The Study of Software Engineering for Development and Maintenance of Software Systems

Authors

  • Elturabi Osman Ahmed Assistant Professor, Department of CS & IT, Al-Baha University, Al-Baha, Kingdom of Saudi Arabia

Keywords:

Fuzzy TOPSIS, Software Engineering (SE), Security Attackers, Software Development, Wireless Sensor Networks (WSNs).

Abstract

In the realm of software engineering either software defect identification has grown in importance as a research avenue to improve software reliability. Program dependability is improved by optimizing testing resources and helping developers discover possible issues with the use of program defect predictions. It is essential to apply Software Engineering (SE) procedures to crucial and complex systems, such as networking and security systems. Security attackers are drawn to WSNs (Wireless Sensor Networks) due to their widespread use in army as well as civilian networks.. Maintenance effort has been found to increase significantly as a result of this deterioration impact, also known as the porosity effect. Errors in the way software requirements are processed are a major cause of software project failure. In order to determine the degree to which a software requirements engineer's capabilities align with industry expectations, this work suggests an empirical software engineering-based method for evaluating such skills. From that point forward, we make an evaluation approach in view of fuzzier TOPSIS that can deal with the subjectivity and fluffiness remembered for maintainability appraisals. An Industry 5.0 programming improvement business contextual investigation outlines the appropriateness and adequacy of our proposed philosophy. The contextual analysis results feature the maintainability benefits and inconveniences of various programming draws near. The review's decisions give computer programming leader’s significant data that will assist them with pursuing very much educated choices on manageability.

Downloads

Download data is not yet available.

References

S. F. Suhel, V. K. Shukla, S. Vyas, and V. P. Mishra, “Conversation to automation in banking through chatbot using artificial machine intelligence language,” in Proceedings of the 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), IEEE, Noida, India, June 2020.

P. Balaji and K. Chidambaram, “Cancer diagnosis of microscopic biopsy images using a social spider optimisation-tuned neural network,” Diagnostics, vol. 12, no. 1, p. 11, 2021.

A. Bangash, H. Sahar, A. Hindle, and K. Ali, “On the time-based conclusion stability of cross-project defect prediction models,” Empirical Software Engineering, vol. 25, no. 6, pp. 1–38, 2020.

L. Gong, S. Jiang, L. Bo, L. Jiang, and J. Qian, “A novel class-imbalance learning approach for both within-project and cross-project defect prediction,” IEEE Transactions on Reliability, vol. 69, no. 1, pp. 40–54, 2020.

R. Yogesh, A. K. Dubey, R. R. Arora, and A. Mathur, “Fruit defect prediction model (fdpm) based on three-level validation,” Journal of Nondestructive Evaluation, vol. 40, no. 2, pp. 1–12, 2021.

G. S. Sriram, “Challenges of cloud compute load balancing algorithms,” International Research Journal of Modernization in Engineering Technology and Science, vol. 4, no. 1, pp. 1186–1190, 2022.

H. Li, M. Shabaz, and R. Castillejo-Melgarejo, “Implementation of python data in online translation crawler website design,” International Journal of System Assurance Engineering and Management, vol. 2021, p. 7, 2021.

G. Esteves, E. Figueiredo, A. Veloso, M. Viggiato, and N. Ziviani, “Understanding machine learning software defect predictions,” Automated Software Engineering, vol. 27, no. 3-4, pp. 369–392, 2020.

G. S. Sriram, “Security challenges of big data computing,” International Research Journal of Modernization in Engineering Technology and Science, vol. 4, no. 1, pp. 1164–1171, 2022.

X. Huang, V. Jagota, E. Espinoza-Muñoz, and J. Flores-Albornoz, “Tourist hot spots prediction model based on optimized neural network algorithm,” International Journal of System Assurance Engineering and Management, vol. 13, pp. 63–71, 2022.

J. Roberts, I.-H. Hann, and S. Slaughter, “Communication networks in an open source software project,” International Federation for Information Processing, vol. 203, pp. 297–306, 2006.

V. Basili, L. Briand, S. Condon, Y. Kim, W. L. Melo, and J. D. Valett, “Understanding and predicting the process of software maintenance releases,” in Proceedings of the 18th International Conference on Software Engineering, pp. 464–474, March 1996.

Y. Zhao, H. B. Kuan Tan, and W. Zhang, “Software cost estimation through conceptual requirement,” in Proceedings of the International Conference on Quality Software, pp. 141–144, 2003.

B. Boehm, A. W. Brown, R. Madachy, and Y. Yang, “A software product line life cycle cost estimation model,” in Proceedings of the International Symposium on Empirical Software Engineering (ISESE ’04), pp. 156–164, August 2004.

X. Ran, X. Zhou, M. Lei, W. Tepsan, and W. Deng, “A novel k-means clustering algorithm with a noise algorithm for capturing urban hotspots,” Applied Sciences, vol. 11, no. 23, p. 11202, 2021.

Mao, K., Capra, L., Harman, M., &Jia, Y. (2017). A survey of the use of crowdsourcing in software engineering. Journal of Systems and Software, 126, 57-84.

Amershi, S., Begel, A., Bird, C., DeLine, R., Gall, H., Kamar, E., ... & Zimmermann, T. (2019, May). Software engineering for machine learning: A case study. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp. 291-300). IEEE.

Pyster, A., Adcock, R., Ardis, M., Cloutier, R., Henry, D., Laird, L., ... & Wade, J. (2015). Exploring the relationship between systems engineering and software engineering. Procedia Computer Science, 44, 708-717.

Ouni, A., Kessentini, M., Sahraoui, H., Inoue, K., & Deb, K. (2016). Multi-criteria code refactoring using search-based software engineering: An industrial case study. ACM Transactions on Software Engineering and Methodology (TOSEM), 25(3), 1-53.

Stol, K. J., Ralph, P., & Fitzgerald, B. (2016, May). Grounded theory in software engineering research: a critical review and guidelines. In Proceedings of the 38th International conference on software engineering (pp. 120-131).

Laplante, P. A., &Kassab, M. (2022). Requirements engineering for software and systems. Auerbach Publications.

Alshamrani, A., &Bahattab, A. (2015). A comparison between three SDLC models waterfall model, spiral model, and Incremental/Iterative model. International Journal of Computer Science Issues (IJCSI), 12(1), 106.

Chopra, A. K., & Singh, M. P. (2016, April). From social machines to social protocols: Software engineering foundations for sociotechnical systems. In Proceedings of the 25th International Conference on World Wide Web (pp. 903-914).

Petersen, K., Vakkalanka, S., &Kuzniarz, L. (2015). Guidelines for conducting systematic mapping studies in software engineering: An update. Information and software technology, 64, 1-18.

Curcio, K., Navarro, T., Malucelli, A., &Reinehr, S. (2018). Requirements engineering: A systematic mapping study in agile software development. Journal of Systems and Software, 139, 32-50.

W. Deng, X. X. Zhang, Y. Q. Zhou et al., “An enhanced fast non-dominated solution sorting genetic algorithm for multi- objective problems,” Information Sciences, vol. 585, pp. 441–453, 2022.

S. Ouhbi, A. Idri, J. L. Fernández-Alemán, and A. Toval, “Requirements engineering education: a systematic mapping study,” Requirements Engineering, vol. 20, no. 2, pp. 119–138, 2015.

Ansari, M.T.J.; Pandey, D.; Alenezi, M. STORE: Security threat oriented requirements engineering methodology. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 191–203.

E. Q. Wu, M. Zhou, D. Hu et al., “Self-paced dynamic infinite mixture model for fatigue evaluation of pilots' brains,” IEEE Transactions on Cybernetics, vol. PP, pp. 1–16, 2021.

H. Cui, Y. Guan, H. Chen, and W. Deng, “A novel advancing signal processing method based on coupled multi-stable stochastic resonance for fault detection,” Applied Sciences, vol. 11, no. 12, p. 5385, 2021.

Downloads

Published

13.12.2023

How to Cite

Ahmed, E. O. . (2023). The Study of Software Engineering for Development and Maintenance of Software Systems. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 128–137. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4102

Issue

Section

Research Article