Identification of Risk Factors in the Software Design Stage Using the C4.5 Algorithm

Authors

  • M. Akiyasul Azkiya Universitas Negeri Semarang
  • Deva Sindi Maulita Universitas Negeri Semarang
  • Jumanto Universitas Negeri Semarang

DOI:

https://doi.org/10.25299/itjrd.2023.13251

Keywords:

Risk Factors, Software Design, Data Analysis, Algorithm C4.5, Data Mining

Abstract

A strong design phase is necessary for good software. However, design errors in software can cause serious issues with its creation and use. Therefore, the goal of this study is to find risk variables that could have an early impact on software development. In this study, a machine learning technique called technique C4.5 is employed to create decision tree models. 100 respondents with software design experience participated in the online surveys and questionnaires that collected the data for this study in 2022. The C4.5 Algorithm was used in this study to analyze the data and determine the risk variables that affect the success of software design. The study's findings show that the C4.5 Algorithm-based model has a high level of accuracy (93.33%), which means that the data can offer crucial insights into understanding potential risks that may arise during the software design stage, enabling software developers to take the necessary precautions to lessen or eliminate these risks. In order to enhance the caliber and effectiveness of software design, this research is anticipated to provide a significant contribution to practitioners and academics in the field of software development.

Downloads

Download data is not yet available.

Author Biographies

M. Akiyasul Azkiya, Universitas Negeri Semarang

Departement of Computer Science

Deva Sindi Maulita, Universitas Negeri Semarang

Departement of Computer Science

Jumanto, Universitas Negeri Semarang

Departement of Computer Science

References

A. Akhtar, B. Bakhtawar, and S. Akhtar, “EXTREME PROGRAMMING VS SCRUM: A COMPARISON OF AGILE MODELS,” International Journal of Technology, Innovation and Management (IJTIM), vol. 2, no. 2, Oct. 2022, doi: 10.54489/ijtim.v2i2.77.

J. Segura, “The Teaching of Usability in Software Development: Case Study in the Computer Engineering Career at the University of Matanzas,” International Journal of Engineering Pedagogy (iJEP), vol. 11, no. 1, p. 4, Jan. 2021, doi: 10.3991/ijep.v11i1.14837.

N. T. Al-Qemaqchi, “Transformation of Architectural Design Concepts During the Early Design Phase,” International Journal of Engineering Pedagogy (iJEP), vol. 12, no. 6, pp. 85–99, Dec. 2022, doi: 10.3991/ijep.v12i6.31717.

B. Kang, N. Crilly, W. Ning, and P. O. Kristensson, “Prototyping to elicit user requirements for product development: Using head-mounted augmented reality when designing interactive devices,” Des Stud, vol. 84, p. 101147, Jan. 2023, doi: 10.1016/j.destud.2022.101147.

A. Strielkina and A. Tetskyi, “Methodology for assessing satisfaction with requirements at the early stages of the software development process,” Radioelectronic and Computer Systems, no. 1, pp. 197–206, Mar. 2023, doi: 10.32620/reks.2023.1.16.

H. Edison, X. Wang, and K. Conboy, “Comparing Methods for Large-Scale Agile Software Development: A Systematic Literature Review,” IEEE Transactions on Software Engineering, vol. 48, no. 8, pp. 2709–2731, Aug. 2022, doi: 10.1109/TSE.2021.3069039.

S. Zapata, F. Gallardo, G. Sevilla, E. Torres, and R. Forradellas, “Trust evaluation in virtual software development teams using BERT-based language models,” J Comput Sci Technol, vol. 23, no. 1, p. e04, Apr. 2023, doi: 10.24215/16666038.23.e04.

A. Aslam et al., “Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development,” IEEE Access, vol. 5, pp. 20349–20373, 2017, doi: 10.1109/ACCESS.2017.2757605.

Z.-N. Li, X.-H. Huang, T. Mu, and J. Wang, “Attention-Based Lane Change and Crash Risk Prediction Model in Highways,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 22909–22922, Dec. 2022, doi: 10.1109/TITS.2022.3193682.

P. Sotiropoulos, C.-M. Mathas, C. Vassilakis, and N. Kolokotronis, “A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk,” Electronics (Basel), vol. 12, no. 10, p. 2278, May 2023, doi: 10.3390/electronics12102278.

M. J. H. Faruk, S. Subramanian, H. Shahriar, M. Valero, X. Li, and M. Tasnim, “Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study,” in 2022 IEEE/ACIS 20th International Conference on Software Engineering Research, Management and Applications (SERA), IEEE, May 2022, pp. 120–127. doi: 10.1109/SERA54885.2022.9806817.

A. Baraldi, L. D. Sapia, D. Tiede, M. Sudmanns, H. Augustin, and S. Lang, “Innovative Analysis Ready Data (ARD) product and process requirements, software system design, algorithms and implementation at the midstream as necessary-but-not-sufficient precondition of the downstream in a new notion of Space Economy 4.0 - Part 2: Software developments,” Big Earth Data, pp. 1–118, Oct. 2022, doi: 10.1080/20964471.2021.2017582.

A. Jadhav, M. Kaur, and F. Akter, “Evolution of Software Development Effort and Cost Estimation Techniques: Five Decades Study Using Automated Text Mining Approach,” Math Probl Eng, vol. 2022, pp. 1–17, May 2022, doi: 10.1155/2022/5782587.

L. M. Alves, G. Souza, P. Ribeiro, and R. J. Machado, “Longevity of risks in software development projects: a comparative analysis with an academic environment,” Procedia Comput Sci, vol. 181, pp. 827–834, 2021, doi: 10.1016/j.procs.2021.01.236.

A. Bombarda et al., “Guidelines for the development of a critical software under emergency,” Inf Softw Technol, vol. 152, p. 107061, Dec. 2022, doi: 10.1016/j.infsof.2022.107061.

A. R. Lendra and D. Firdaus, “IMPLEMENTATION OF C4.5 ALGORITHM TO ASSIST IN THE SELECTION OF FLOOR CONSTRUCTION PROJECTS,” IJISCS (International Journal of Information System and Computer Science), vol. 4, no. 3, p. 153, Nov. 2020, doi: 10.56327/ijiscs.v4i3.947.

Khan T, “Software Design Phase Risk Factors,” 2023. https://www.kaggle.com/datasets/asif05amu/software-design-phase-risk-factors (accessed May 30, 2023).

P. Varalakshmi, N. Vasumathi, and R. Venkatesan, “Tropical Cyclone prediction based on multi-model fusion across Indian coastal region,” Prog Oceanogr, vol. 193, p. 102557, Apr. 2021, doi: 10.1016/j.pocean.2021.102557.

B. F. Tanyu, A. Abbaspour, Y. Alimohammadlou, and G. Tecuci, “Landslide susceptibility analyses using Random Forest, C4.5, and C5.0 with balanced and unbalanced datasets,” Catena (Amst), vol. 203, p. 105355, Aug. 2021, doi: 10.1016/j.catena.2021.105355.

P. K R and N. N C, “Lung Cancer Survivability Prediction based on Performance Using Classification Techniques of Support Vector Machines, C4.5 and Naive Bayes Algorithms for Healthcare Analytics,” Procedia Comput Sci, vol. 132, pp. 412–420, 2018, doi: 10.1016/j.procs.2018.05.162.

S. Moral-García, C. J. Mantas, J. G. Castellano, and J. Abellán, “Using Credal C4.5 for Calibrated Label Ranking in Multi-Label Classification,” International Journal of Approximate Reasoning, vol. 147, pp. 60–77, Aug. 2022, doi: 10.1016/j.ijar.2022.05.005.

X. Meng, P. Zhang, Y. Xu, and H. Xie, “Construction of decision tree based on C4.5 algorithm for online voltage stability assessment,” International Journal of Electrical Power & Energy Systems, vol. 118, p. 105793, Jun. 2020, doi: 10.1016/j.ijepes.2019.105793.

S. Lestari, Y. Yulmaini, A. Aswin, S. Sylvia, Y. A. Pratama, and S. Sulyono, “Implementation of the C4.5 algorithm for micro, small, and medium enterprises classification,” International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 6, p. 6707, Dec. 2022, doi: 10.11591/ijece.v12i6.pp6707-6715.

M. Z. Naser, “Machine learning for all! Benchmarking automated, explainable, and coding-free platforms on civil and environmental engineering problems,” Journal of Infrastructure Intelligence and Resilience, vol. 2, no. 1, p. 100028, Mar. 2023, doi: 10.1016/j.iintel.2023.100028.

S. Kim and H. Lee, “Customer Churn Prediction in Influencer Commerce: An Application of Decision Trees,” Procedia Comput Sci, vol. 199, pp. 1332–1339, 2022, doi: 10.1016/j.procs.2022.01.169.

I. Garcia-Magarino, G. Gray, R. Lacuesta, and J. Lloret, “Survivability Strategies for Emerging Wireless Networks With Data Mining Techniques: a Case Study With NetLogo and RapidMiner,” IEEE Access, vol. 6, pp. 27958–27970, 2018, doi: 10.1109/ACCESS.2018.2825954.

Downloads

Published

2024-02-15

How to Cite

Azkiya, M. A., Maulita, D. S., & Jumanto. (2024). Identification of Risk Factors in the Software Design Stage Using the C4.5 Algorithm. IT Journal Research and Development, 8(2), 143–152. https://doi.org/10.25299/itjrd.2023.13251

Issue

Section

Articles