Special Issue "Soft Computing Methods for Innovative Software Practices"

Submission Deadline: 31 December 2020 (closed)
Guest Editors
Dr. Basit Shahzad, University Technology Petronas, Malaysia
Dr. Zubair Asghar, Higher Education Commission, Pakistan
Dr. Kashif Saleem, University Technology Malaysia, Malaysia
Dr. Mohsin Iftikhar, University of Sydney, Australia


Large-scale system development faces various issues and challenges as engineering and management tasks get more complex at a larger scale. There is an increasing need for large-scale system-development of software projects, and this poses a big challenge for those in development business. The greatest problem with large-scale systems development is probably the emergent properties of the systems, which indicate those system properties that are not embodied in any of the parts of the system, like system safety, security and performance. Application development demands unique domain expertise, project methodology, and software architecture patterns. The incorporation of soft computing based methods will help in developing the good development practices and will improve the software success.


Developing products can be complex and fraught with risks. The industry presents a set of unique software development issues and challenges that require domain expertise, foresight and specialized knowledge. By understanding and preparing for the most commonly encountered issues in large scale application development, one can avoid typical mistakes, reduce schedule, and cost overruns. Depending on the product and service. Software companies have to address a complex array of requirements, regulations and competitive forces for software projects. We expect to investigate and report Soft computing based highly specified, formal processes and high assurance quality requirements drive mission and safety critical software projects.


The scope and interests for the special issue include but are not limited to the following list:

• Soft Business modes for large scale applications

• Human behavior analysis in large scale projects

• Human computer interaction applications design

• Software development challenges for large scale applications

• Soft Models, methods, and tools for large scale applications

• Modeling and characteristics of large-scale applications

• Design and development issue in large scale applications for learning

• Design and development issue in large scale applications for healthcare

• Design and development of gaming applications

• Agile methods for improving the best software practices

• Soft computing application development for IoT and Blockchain

Soft Computing in software; Soft computing in IoT; Large scale application development

Published Papers
  • Modernization Framework to Enhance the Security of Legacy Information Systems
  • Abstract Due to various issues such as lack of agility, low performance, security issues, and high maintenance costs, the organization replaces its legacy information system (LIS). However, with the expansion of information technology, the security of the old system has received great attention. The protection of legacy data and information is critical to the organization. However, achieving safety through modernization, redevelopment, or redesign of LIS is a time-consuming and costly solution, especially in small and medium enterprises (SMEs). In addition, newly developed systems often lose inherent business rules, data integrity, and user trust. In this paper, we propose a Security Modernization… More
  •   Views:617       Downloads:378        Download PDF

  • Personalized Information Retrieval from Friendship Strength of Social Media Comments
  • Abstract Social networks have become an important venue to express the feelings of their users on a large scale. People are intuitive to use social networks to express their feelings, discuss ideas, and invite folks to take suggestions. Every social media user has a circle of friends. The suggestions of these friends are considered important contributions. Users pay more attention to suggestions provided by their friends or close friends. However, as the content on the Internet increases day by day, user satisfaction decreases at the same rate due to unsatisfactory search results. In this regard, different recommender systems have been developed… More
  •   Views:706       Downloads:402        Download PDF

  • Evaluation of Natural Language Software Interfaces to Databases
  • Abstract Relational databases are still important in modern times due to their many advantages, such as ease of interaction, simplicity and data integrity. In this regard, structured query language (SQL) and technical knowledge about database schemas are the basic building blocks for retrieving information from relational databases. Generally, non-expert users cannot skillfully write technical queries on the target database. To this end, many database natural language interfaces (NLIDB) have been developed to greatly facilitate users. However, each system provides a different interface for new users, so beginners can use different interactive modes to enter keyword-based queries. For users, migrating from one… More
  •   Views:620       Downloads:405        Download PDF

  • Requirement Design for Software Configuration and System Modeling
  • Abstract Software Configuration Management (SCM) aims to control the development of complex software systems. Traditional SCM systems treat text files as central artifacts, so they are mainly developed for source code. Such a system is not suitable for model-based software development with model-centric artifacts. When applying traditional systems to model-based software development, new challenges such as model mapping, differentiation, and merging arise. Many existing methods mainly use UML or domain-specific languages to determine model differences. However, as far as we know, there is no such technology for System Modeling Language (SysML) models. SysML covers the entire development life cycle of various… More
  •   Views:620       Downloads:462        Download PDF

  • Multi-Objective Adapted Binary Bat for Test Suite Reduction
  • Abstract Regression testing is an essential quality test technique during the maintenance phase of the software. It is executed to ensure the validity of the software after any modification. As software evolves, the test suite expands and may become too large to be executed entirely within a limited testing budget and/or time. So, to reduce the cost of regression testing, it is mandatory to reduce the size of the test suite by discarding the redundant test cases and selecting the most representative ones that do not compromise the effectiveness of the test suite in terms of some predefined criteria such as… More
  •   Views:705       Downloads:480        Download PDF

  • CMMI Compliant Workflow Models to Track and Control Changes
  • Abstract The Capability Maturity Model Integration (CMMI) is a renowned Software Process Improvement (SPI) framework. Research studies have revealed that CMMI adoption needs a lot of resources in terms of training, funds, and professional workers. However, the software SMEs (SSMEs) have few resources and cannot adopt CMMI. One of the challenges of adopting CMMI is that CMMI tells “What to do?” as requirements to be met, and leaves “How to do?” to the implementers. The software industry especially SSMEs faces difficulties in successfully implementing various process areas (PAs) particularly Configuration Management Process Area (CM-PA). SG-2 (Track and control changes) is one… More
  •   Views:824       Downloads:469        Download PDF

  • Leaf Blights Detection and Classification in Large Scale Applications
  • Abstract Crops are very important to the financial needs of a country. Due to various diseases caused by different pathogens, a large number of crops have been destroyed. As humanoids, our basic need is food for survival, and the most basic foundation of our food is agriculture. For many developing countries, it is mainly an important source of income. Bacterial diseases are one of the main diseases that cause improper production and a major economic crisis for the country. Therefore, it is necessary to detect the disease early. However, it is not easy for humans to analyze the different leaves of… More
  •   Views:1409       Downloads:600        Download PDF

  • AAP4All: An Adaptive Auto Parallelization of Serial Code for HPC Systems
  • Abstract High Performance Computing (HPC) technologies are emphasizing to increase the system performance across many disciplines. The primary challenge in HPC systems is how to achieve massive performance by minimum power consumption. However, the modern HPC systems are configured by adding the powerful and energy efficient multi-cores/many-cores parallel computing devices such as GPUs, MIC, and FPGA etc. Due to increasing the complexity of one chip many-cores/multi-cores systems, only well-balanced and optimized parallel programming technique is the solution to provide substantial increase in performance under power consumption limitations. Conventionally, the researchers face various barriers while parallelizing their serial code because they don’t… More
  •   Views:707       Downloads:456        Download PDF

  • Evaluating and Ranking Mobile Learning Factors Using a Multi-criterion Decision-making (MCDM) Approach
  • Abstract The escalating growth in digital technology is setting the stage for changes in university education, as E-learning brings students and faculties outside the contained classroom environment. While mobile learning is considered an emerging technology, there is comprehensive literature on mobile learning and its applications. However, there has been relatively little research on mobile learning recognition and readiness compared to mobile learning studies and implementations. The advent of mobile learning (M-learning) provides additional flexibility in terms of time and location. M-learning lacks an established place in university education. The influence of its critical success factors (CSFs) on the university education system… More
  •   Views:1131       Downloads:667        Download PDF

  • Workflow Models to Establish Software Baselines in SSMEs
  • Abstract Capability Maturity Model Integration (CMMI) is used for Software Process Improvement (SPI) worldwide. Research reveals that CMMI adoption needs a lot of resources in terms of training, funds, and professional workers. Software Small & Medium Enterprises (SSMEs) cannot, however, reserve resources for the purpose. One of the challenges of CMMI adoption is that CMMI identifies “What-to-Do” as a requirement to fulfill and leaves “How-To-Do” to implementers. Implementation of Configuration Management Process Area (CM-PA), being one of the umbrella activities, presents more obstacles generally to the software industry and particularly to SSMEs as compared to other PAs. Establish software baselines is… More
  •   Views:1066       Downloads:581        Download PDF

  • Evolution of Influential Developer’s Communities in OSS and its Impact on Quality
  • Abstract The high turnover of developers in the Open-Source Software (OSS) systems is due to the lack of restriction on a developer’s involvement and contributions. The primary developers start and administer an OSS project. However, they do not manage those who contribute. The literature shows that 80% of issues are resolved by 20% of developers when developing an OSS. Therefore, identifying influential developer communities is quite necessary for OSS stakeholders to reduce the efforts required to solve the issue through releases and predict quality. The purpose of this proposed empirical study is to explore influential communities by analyzing the relationship between… More
  •   Views:1016       Downloads:658        Download PDF

  • Designing an Online Appointment System for Semiliterate Users
  • Abstract Information and Communications Technology (ICT) has revolutionized the healthcare leading to provision of eHealth facilities remotely. During the peak time of COVID-19, as the long queues at health care facilities can result in spread of the virus. ICT can play an effective role especially for reducing the extended waiting time of patients to consult a medical practitioner which is considered as a source of hazard during the pandemic. However, in developing countries where majority population is semiliterate so find difficulty when come into contact with appointment systems which are not particularly designed keeping in consideration the requirements of semiliterate users.… More
  •   Views:1197       Downloads:1201        Download PDF

  • Secure Image Authentication Using Watermarking and Blockchain
  • Abstract Image authentication is an important field that employs many different approaches and has several significant applications. In the proposed approach, we used a combination of two techniques to achieve authentication. Image watermarking is one of the techniques that has been used in many studies but the authentication field still needs to be studied. Blockchain technology is a relatively new technology that has significant research potential related to image authentication. The watermark is embedded into the third-level discrete wavelet transform (DWT) in the middle frequency regions to achieve security and imperceptibility goals. Peak signal-to-noise ratio PSNR, structural similarity matrix (SSIM), normalized… More
  •   Views:1305       Downloads:773        Download PDF

  • Building Information Modeling Based Automated Building Regulation Compliance Checking Asp.net Web Software
  • Abstract Building regulations used in the architecture, engineering, and construction sectors are legal documents prepared under the control of local authorities for use by individuals. These regulations determine the conditions for ensuring performance and quality throughout the entire construction process. The building regulation inspection process conducted with the traditional manual method is time-consuming and error-prone for architects, engineers, and local authorities. It is known that most of these inspections are carried out with municipalities by local authorities. The mutual interview study and literature review shows that there is no standard rule for the legal auditing process and the same services are… More
  •   Views:1201       Downloads:878        Download PDF

  • A Technology Enabled Learning Model in Healthcare during COVID-19
  • Abstract The World Health Organization has warned about the spread of communicable and non-communicable diseases especially in the developing countries. The COVID–19 has also emerged as one of the most challengeable pandemics of the whole world. In current medical emergency, the virtual health education is much vital for handling alerts and outbreaks of diseases for a community of users. The Information and Communication Technology provide an opportunity to deal with the challenges related to handling alerts and outbreaks of diseases. The technology infrastructure in the developing countries is surging rise and can be used to develop Technology Enabled Learning Solutions for… More
  •   Views:1314       Downloads:628        Download PDF

  • CMMI Compliant Workflow Models to Establish Configuration Management Integrity in Software SMEs
  • Abstract Capability Maturity Model Integration (CMMI) is a world-renowned framework for software process improvement, which specifies “What-To-Do” in terms of requirements. However, it leaves the “How-To-Do” part regarding implementation to implementers. The software industry especially software SMEs (SSMEs) faces difficulties in implementing the Specific Practices (SPs) of Various Process Areas (PAs). Configuration Management Process Area (CM-PA) is usually ignored despite its acknowledged importance in the software development process. Establishing integrity is one of the three Specific Goals (SGs) that CMMI ver. 1.3 requires for successful implementation of CM-PA. This goal is achieved through the implementation of two SPs (i.e., 3.1 and… More
  •   Views:1326       Downloads:923        Download PDF

  • Ontology-Based Verification of UML Class Model XOR Constraint and Dependency Relationship Constraints
  • Abstract Unified Modeling Language (UML) models are considered important artifacts of model-driven engineering (MDE). This can automatically transform models to other paradigms and programming languages. If a model has bugs, then MDE can transfer these to a new code. The class model is a key component of UML that is used in analysis and design. Without a formal foundation, UML can create only graphical diagrams, making it impossible to verify properties such as satisfiability, consistency and consequences. Different techniques have been used to verify UML class models, but these do not support some important components. This paper transforms and verifies unsupported… More
  •   Views:1322       Downloads:963       Cited by:1        Download PDF

  • CMMI Compliant Modernization Framework to Transform Legacy Systems
  • Abstract Legacy systems deteriorate due to changing business practices and recurrent problems such as high maintenance cost, lack of agility, and degraded performance. Modernization is highly desired especially for those organizations where key business processes are managed by legacy systems. During modernizing, two important aspects are usually ignored, i.e., the transformation of a legacy system to an enterprise solution, and considerations of quality concerns. This overlooking leads to a modernized information system that partially achieves the expected outcome. In this paper, we propose a Capability Maturity Model Integration (CMMI) Compliant Modernization Framework (CCMF) that addresses the problems of legacy systems by… More
  •   Views:1224       Downloads:923       Cited by:1        Download PDF

  • Roughsets-based Approach for Predicting Battery Life in IoT
  • Abstract Internet of Things (IoT) and related applications have successfully contributed towards enhancing the value of life in this planet. The advanced wireless sensor networks and its revolutionary computational capabilities have enabled various IoT applications become the next frontier, touching almost all domains of life. With this enormous progress, energy optimization has also become a primary concern with the need to attend to green technologies. The present study focuses on the predictions pertinent to the sustainability of battery life in IoT frameworks in the marine environment. The data used is a publicly available dataset collected from the Chicago district beach water.… More
  •   Views:1192       Downloads:719       Cited by:8        Download PDF

  • Investigating Crucial Factors of Agile Software Development through Composite Approach
  • Abstract The major emphasis of Software Engineering (SE) discipline is to produce successful software systems. The success of software projects is estimated through quadruple measures including budget, cost, scope, and quality. To meet this aim of SE, several software development processes are presented in the literature. Such processes are categorized into two different methodologies which are known as traditional and agile software development methodologies. The issue with traditional software development methodologies is that they had not shown any remarkable progress towards the fundamental goal of SE. Consequently, software development organizations have started to adopt agile methodologies in the pursuit of successful… More
  •   Views:1738       Downloads:1016        Download PDF