Special Issue "Soft Computing Methods for Innovative Software Practices"

Submission Deadline: 31 December 2020 (closed)
Guest Editors
Dr. Basit Shahzad, University Technology Petronas, Malaysia
Dr. Zubair Asghar, Higher Education Commission, Pakistan
Dr. Kashif Saleem, University Technology Malaysia, Malaysia
Dr. Mohsin Iftikhar, University of Sydney, Australia


Large-scale system development faces various issues and challenges as engineering and management tasks get more complex at a larger scale. There is an increasing need for large-scale system-development of software projects, and this poses a big challenge for those in development business. The greatest problem with large-scale systems development is probably the emergent properties of the systems, which indicate those system properties that are not embodied in any of the parts of the system, like system safety, security and performance. Application development demands unique domain expertise, project methodology, and software architecture patterns. The incorporation of soft computing based methods will help in developing the good development practices and will improve the software success.


Developing products can be complex and fraught with risks. The industry presents a set of unique software development issues and challenges that require domain expertise, foresight and specialized knowledge. By understanding and preparing for the most commonly encountered issues in large scale application development, one can avoid typical mistakes, reduce schedule, and cost overruns. Depending on the product and service. Software companies have to address a complex array of requirements, regulations and competitive forces for software projects. We expect to investigate and report Soft computing based highly specified, formal processes and high assurance quality requirements drive mission and safety critical software projects.


The scope and interests for the special issue include but are not limited to the following list:

• Soft Business modes for large scale applications

• Human behavior analysis in large scale projects

• Human computer interaction applications design

• Software development challenges for large scale applications

• Soft Models, methods, and tools for large scale applications

• Modeling and characteristics of large-scale applications

• Design and development issue in large scale applications for learning

• Design and development issue in large scale applications for healthcare

• Design and development of gaming applications

• Agile methods for improving the best software practices

• Soft computing application development for IoT and Blockchain

Soft Computing in software; Soft computing in IoT; Large scale application development

Published Papers
  • Evaluating and Ranking Mobile Learning Factors Using a Multi-criterion Decision-making (MCDM) Approach
  • Abstract The escalating growth in digital technology is setting the stage for changes in university education, as E-learning brings students and faculties outside the contained classroom environment. While mobile learning is considered an emerging technology, there is comprehensive literature on mobile learning and its applications. However, there has been relatively little research on mobile learning recognition and readiness compared to mobile learning studies and implementations. The advent of mobile learning (M-learning) provides additional flexibility in terms of time and location. M-learning lacks an established place in university education. The influence of its critical success factors (CSFs) on the university education system… More
  •   Views:182       Downloads:109        Download PDF

  • Workflow Models to Establish Software Baselines in SSMEs
  • Abstract Capability Maturity Model Integration (CMMI) is used for Software Process Improvement (SPI) worldwide. Research reveals that CMMI adoption needs a lot of resources in terms of training, funds, and professional workers. Software Small & Medium Enterprises (SSMEs) cannot, however, reserve resources for the purpose. One of the challenges of CMMI adoption is that CMMI identifies “What-to-Do” as a requirement to fulfill and leaves “How-To-Do” to implementers. Implementation of Configuration Management Process Area (CM-PA), being one of the umbrella activities, presents more obstacles generally to the software industry and particularly to SSMEs as compared to other PAs. Establish software baselines is… More
  •   Views:165       Downloads:99        Download PDF

  • Evolution of Influential Developer’s Communities in OSS and its Impact on Quality
  • Abstract The high turnover of developers in the Open-Source Software (OSS) systems is due to the lack of restriction on a developer’s involvement and contributions. The primary developers start and administer an OSS project. However, they do not manage those who contribute. The literature shows that 80% of issues are resolved by 20% of developers when developing an OSS. Therefore, identifying influential developer communities is quite necessary for OSS stakeholders to reduce the efforts required to solve the issue through releases and predict quality. The purpose of this proposed empirical study is to explore influential communities by analyzing the relationship between… More
  •   Views:233       Downloads:151        Download PDF

  • Designing an Online Appointment System for Semiliterate Users
  • Abstract Information and Communications Technology (ICT) has revolutionized the healthcare leading to provision of eHealth facilities remotely. During the peak time of COVID-19, as the long queues at health care facilities can result in spread of the virus. ICT can play an effective role especially for reducing the extended waiting time of patients to consult a medical practitioner which is considered as a source of hazard during the pandemic. However, in developing countries where majority population is semiliterate so find difficulty when come into contact with appointment systems which are not particularly designed keeping in consideration the requirements of semiliterate users.… More
  •   Views:230       Downloads:223        Download PDF

  • Secure Image Authentication Using Watermarking and Blockchain
  • Abstract Image authentication is an important field that employs many different approaches and has several significant applications. In the proposed approach, we used a combination of two techniques to achieve authentication. Image watermarking is one of the techniques that has been used in many studies but the authentication field still needs to be studied. Blockchain technology is a relatively new technology that has significant research potential related to image authentication. The watermark is embedded into the third-level discrete wavelet transform (DWT) in the middle frequency regions to achieve security and imperceptibility goals. Peak signal-to-noise ratio PSNR, structural similarity matrix (SSIM), normalized… More
  •   Views:223       Downloads:162        Download PDF

  • Building Information Modeling Based Automated Building Regulation Compliance Checking Asp.net Web Software
  • Abstract Building regulations used in the architecture, engineering, and construction sectors are legal documents prepared under the control of local authorities for use by individuals. These regulations determine the conditions for ensuring performance and quality throughout the entire construction process. The building regulation inspection process conducted with the traditional manual method is time-consuming and error-prone for architects, engineers, and local authorities. It is known that most of these inspections are carried out with municipalities by local authorities. The mutual interview study and literature review shows that there is no standard rule for the legal auditing process and the same services are… More
  •   Views:341       Downloads:280        Download PDF

  • A Technology Enabled Learning Model in Healthcare during COVID-19
  • Abstract The World Health Organization has warned about the spread of communicable and non-communicable diseases especially in the developing countries. The COVID–19 has also emerged as one of the most challengeable pandemics of the whole world. In current medical emergency, the virtual health education is much vital for handling alerts and outbreaks of diseases for a community of users. The Information and Communication Technology provide an opportunity to deal with the challenges related to handling alerts and outbreaks of diseases. The technology infrastructure in the developing countries is surging rise and can be used to develop Technology Enabled Learning Solutions for… More
  •   Views:521       Downloads:189        Download PDF

  • CMMI Compliant Workflow Models to Establish Configuration Management Integrity in Software SMEs
  • Abstract Capability Maturity Model Integration (CMMI) is a world-renowned framework for software process improvement, which specifies “What-To-Do” in terms of requirements. However, it leaves the “How-To-Do” part regarding implementation to implementers. The software industry especially software SMEs (SSMEs) faces difficulties in implementing the Specific Practices (SPs) of Various Process Areas (PAs). Configuration Management Process Area (CM-PA) is usually ignored despite its acknowledged importance in the software development process. Establishing integrity is one of the three Specific Goals (SGs) that CMMI ver. 1.3 requires for successful implementation of CM-PA. This goal is achieved through the implementation of two SPs (i.e., 3.1 and… More
  •   Views:386       Downloads:272        Download PDF

  • Ontology-Based Verification of UML Class Model XOR Constraint and Dependency Relationship Constraints
  • Abstract Unified Modeling Language (UML) models are considered important artifacts of model-driven engineering (MDE). This can automatically transform models to other paradigms and programming languages. If a model has bugs, then MDE can transfer these to a new code. The class model is a key component of UML that is used in analysis and design. Without a formal foundation, UML can create only graphical diagrams, making it impossible to verify properties such as satisfiability, consistency and consequences. Different techniques have been used to verify UML class models, but these do not support some important components. This paper transforms and verifies unsupported… More
  •   Views:474       Downloads:276        Download PDF

  • CMMI Compliant Modernization Framework to Transform Legacy Systems
  • Abstract Legacy systems deteriorate due to changing business practices and recurrent problems such as high maintenance cost, lack of agility, and degraded performance. Modernization is highly desired especially for those organizations where key business processes are managed by legacy systems. During modernizing, two important aspects are usually ignored, i.e., the transformation of a legacy system to an enterprise solution, and considerations of quality concerns. This overlooking leads to a modernized information system that partially achieves the expected outcome. In this paper, we propose a Capability Maturity Model Integration (CMMI) Compliant Modernization Framework (CCMF) that addresses the problems of legacy systems by… More
  •   Views:428       Downloads:311        Download PDF

  • Roughsets-based Approach for Predicting Battery Life in IoT
  • Abstract Internet of Things (IoT) and related applications have successfully contributed towards enhancing the value of life in this planet. The advanced wireless sensor networks and its revolutionary computational capabilities have enabled various IoT applications become the next frontier, touching almost all domains of life. With this enormous progress, energy optimization has also become a primary concern with the need to attend to green technologies. The present study focuses on the predictions pertinent to the sustainability of battery life in IoT frameworks in the marine environment. The data used is a publicly available dataset collected from the Chicago district beach water.… More
  •   Views:349       Downloads:240        Download PDF

  • Investigating Crucial Factors of Agile Software Development through Composite Approach
  • Abstract The major emphasis of Software Engineering (SE) discipline is to produce successful software systems. The success of software projects is estimated through quadruple measures including budget, cost, scope, and quality. To meet this aim of SE, several software development processes are presented in the literature. Such processes are categorized into two different methodologies which are known as traditional and agile software development methodologies. The issue with traditional software development methodologies is that they had not shown any remarkable progress towards the fundamental goal of SE. Consequently, software development organizations have started to adopt agile methodologies in the pursuit of successful… More
  •   Views:627       Downloads:434        Download PDF