<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis and Risk Management in Software Development Using the Logical-Algebraic Model</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Khansaa Azeez Obayes Al-Husseini</string-name>
          <email>azeezkhansaa@gmail.com</email>
          <email>inb.khansaa@atu.edu.iq</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ali Hamzah Obaid</string-name>
          <email>alimk_iq@yahoo.com</email>
          <email>inb.ali210@atu.edu.iq</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Babylon Technical Institute, Al-Furat Al-Awsat Technical University</institution>
          ,
          <addr-line>51015 Babylon</addr-line>
          ,
          <country country="IQ">Iraq</country>
        </aff>
      </contrib-group>
      <fpage>241</fpage>
      <lpage>248</lpage>
      <abstract>
        <p>In this paper, we construct a logical-algebraic model that covers all the parameters and operations of the risk process and create Specification of risk assessment processes based on logical-algebraic formalisms-sets, matches, relations, tuples, predicates, and Specification tools to automate the process of risk assessment. And addressing concerns in a change in the software development life cycle that changes requirements depending on the requirements of the development work.</p>
      </abstract>
      <kwd-group>
        <kwd>Risk Management</kwd>
        <kwd>Software Intensive Systems (SIS)</kwd>
        <kwd>information technology (IT)</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Risk is an increased probability of loss, The risk is an increased probability at losses,
a possible problem that is or not to occur. This, as a rule, arises from the loss of input,
control in time. And the possibility of a loss in the process of software development is
called the risk of software development. The loss can be any, for example, increasing
the cost of production, reducing the quality of software development, the inability to
complete the project on time. The risk of software development exists because the
future remains uncertain, and there are many known and unknown things that cannot
be included in the project plan. The risk of software development There are two types
of risks that are either internal and controlled by the project manager or external risks
that are outside the control of the project manager To automate the processes of risk
assessment, first of all, it is necessary to build the most general model that reflects
common entities: the totality of the parameters used and the operations used. Logical
algebraic models are most often used to specify objects of modeling at the most
general level. When modeling the risk assessment processes, this reveals a multitude of
parameter values and a variety of operations of the risk assessment process. When
creating appropriate automation tools in the logical-algebraic model, multiple
specifications appear that are involved in risk assessment, as well as many software
functions for processing these specifications and generating estimates.</p>
      <p>
        Software development methodology
is the operation of dividing software development work into distinct stages And
aiming to a good organization and to improve the design. Common methodologies
include a prototyping, Development (RAD) , Rational Unified Process (RUP)
,waterfall, Most theories attempt to minimize risk by using developing software in
little time, called restoration, which typically lasts one week to one month and
includes all the tasks necessary " planning, requirements analysis, design, coding,
testing, and documentation". Figure (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
      </p>
      <p>
        Figure(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) above oversimplifies the process subtleties The first step is ideas in the
process, extract and form these ideas of the requirements, the requirements that feed
the process are ideas. Program objectives can be set at the requirements stage.
      </p>
      <p>In the second step, the output of a development process, The user manual, software
development documentation, testing, and maintenance is the product of the
development process to help developers improve and develop the software in the future</p>
    </sec>
    <sec id="sec-2">
      <title>Risk Management in Software Development</title>
      <p>Risk is the probability of loss. This depends both on the likelihood of adverse
events and the consequences of these events; The impact is manifested in a blend of
money related misfortunes, time delays and loss of productivity. Hazard is an
antecedent to the issue, the probability that at some random point in the product life cycle,
Because of these and other factors, every software development project contains
elements of uncertainty. the predicted goals will become unattainable within the
accessible assets.
5</p>
      <p>Empirical Data Sample Analysis
is a proof-based way to deal with the investigation and translation of data. The exact
methodology depends on genuine information, measurements, and results as opposed
to speculations and ideas. The data sample provided by project consists the following
assumptions about the data sample were made:
 Duration of the project.
 Start and finish date.
 Development cost.
 Rate software development.</p>
      <p>These findings suggest that the data sample provided by the project the specific
features of risk data. Software Development projects have a high rate of failure. A
model of software development using the Logical-Algebraic Model describes managerial
processes that can be used to reduce software development difficulties from the
managerial control perspective.</p>
      <p>Our study examined the performance of projects Software Development in relation
to the activities of maturity. activities associated with the Software Development
control of development-related positively to project performance measures.</p>
      <p>Measure of probability</p>
      <p>Probability measures in Software Development risk analysis must relate to a
specified level of exposure which can, for example, be the consumption of a particular
quantity of Project time without work, or an individual exposure event.
. The probability measures are generally expressed in one of two forms:
• The probability of the risk event occurring with a specified exposure event (e.g.
probability of illness),</p>
      <p>• The average number of risk events that may occur within a specified period.</p>
    </sec>
    <sec id="sec-3">
      <title>Description of the Risk Assessment Process</title>
      <p>Software Development projects have a high rate of failure. Organizations have tried to
reduce the rate through methodological approaches but with little perceived success.
A model of software development maturity using the Logical-Algebraic Model
describes managerial processes that can be used to attack software development
difficulties from the managerial control perspective. Our study examined the performance of
projects Software Development in relation to the activities of maturity. activities
associated with the Software Development control of development-related positively to
project performance measures.</p>
      <p>Work on risk analysis and the construction of an adequate model of its
assessment is very time-consuming. This is due, on the one hand, to the instability of the
causes of risk factors, and on the other hand, to the complexity of formalizing the
quantitative assessment of performance. Therefore, the justification and development
of risk assessment models require a thorough analysis of the nature of the initial
information on the causes and risk factors, as well as the purpose of the study.</p>
      <p>Depending on the nature of the initial information available at the time of problem
statement and the chosen method of uncertainty description, the following classes of
mathematical models of risk impact assessment are most common: deterministic;
stochastic; linguistic and non-stochastic.</p>
      <p>In its most general form, parameterization of risk assessment processes covers the
following entities:
where R is an assessment of the consequences of a risk event;
P-probability of occurrence of a risk event;</p>
      <p>I-potential consequences of the risk factor.
7</p>
    </sec>
    <sec id="sec-4">
      <title>Development of Logical-Algebraic Model</title>
      <p>The above description shows that the risk assessment process involves different in
nature and mechanisms of representation of the entity, which causes the multi-grade
algebraic model. To formalize using the technique of multi-sorted algebras (algebras
multistoried) you must first specify the underlying set. This specification is given
below.</p>
      <p>PSPEC ={ PSpec1, PSpec2, …} – project specification,</p>
      <p>Where PSpeci =&lt; attгi ,vali&gt; – significant specifier, attг i – attribute і-rо
specifier's, vali – attribute value і-rо specifier's.
Dictionary report error RF={rf1, rf2………….} – multiple risk factors,
Where rfi=&lt;rfnamei, pspeci&gt;,
Where rfnamei – risk factor name;
pspeci PSREC – program specification, which is associated with the i-th risk
factor;</p>
      <p>PR – set of material values of risk probability;</p>
      <p>SR – the set of values of financial losses associated with the fact of risk
triggering;</p>
      <p>PF – many types of prototyping used to Refine risk assessments;
EST = {est1, est2 ….} – many of the risk assessments,
Where
esti = &lt;rfi, pri,sri&gt; – vector of estimation-set of complex estimations risk the
form of triples, where rfi RF, pri PR, sr  SR.</p>
      <p>EXP = {exp1, exp2, …} – a lot of experts submitted a spec to the following:
expi = &lt;exp_namei, exp_wi, exp_speci &gt;,</p>
      <p>Where exp_namei, exp_wi, exp_speci – name, weight and specialization of the
expert;</p>
      <p>LOGS = {log1, log2, …} – multiple log entries that capture the results of the risk
assessment process;</p>
      <p>The functions used in the risk assessment process in the form adopted for the
logical-algebraic specification are as follows:</p>
      <p>Fest: PSPE × C × Exp × XRF → EST - risk assessment function;</p>
      <p>Frf select: RF×SPEC→RF* – function of selection of a subset of risk factors
important for the project;</p>
      <p>Pspec_select: PSPEC × EST → PSPEC – allocation function specifiers, which
have made the greatest impact on value pi и si;</p>
      <p>Flog: EXP × EST × DT→ LOGS – a function of General process logging, where
DT is a set of data-time values to be recorded in log records.</p>
      <p>Pstop: RF × PR × SF → {true, false} – predicate of the iterative process stop "
Risk Assessment-Prototyping-Modification PSPEC».</p>
      <p>Pnp: RF × PR × SF × PF → {true, false} – the predicate initiate the prototyping
process in order to clarify the risk factors.</p>
      <p>Composing a system of supporting sets and functions involved in risk
assessment, as well as a set of predicates that serve the process, we obtain the following
logical-algebraic model in the format of a multi-grade algebra specification:</p>
      <p>RfsckA =(RF, PSPEC, EST, EXP | Fest, Frf select, Pspec_select, Flog, P_stop,
Prt,Perr,………)
prototype of profiling .
type evaluation of accuracy.</p>
      <p>Strategy pessimistic assessment</p>
      <p>=
for an optimistic assessment</p>
      <p>=
average grade</p>
      <p>=
Where Prt - the predicate of the decision about the need to create and execute a
Perr - The predicate of the decision about the need to create and perform a
proto8</p>
    </sec>
    <sec id="sec-5">
      <title>Model of Iterative Process of Risk Minimization in The</title>
    </sec>
    <sec id="sec-6">
      <title>Design of Automated Systems</title>
      <p>Risk assessment - a set of analytical measures to predict the possibility of obtaining
additional business income or a certain amount of damage from the risk situation and
late adoption of measures to prevent the risk.</p>
      <p>The degree of risk is the probability of occurrence of a loss event, as well as the
amount of possible damage from it. Risk can be:</p>
      <p>acceptable-there is a threat of complete loss of profit from the implementation of
the planned project;</p>
      <p>critical-possible non-receipt of not only profits, but also revenue and loss coverage
at the expense of the entrepreneur;
catastrophic-possible loss of capital, property, and bankruptcy of the entrepreneur.
The risk impact assessment model can be summarized as follows:
F = f(P, I)……
where: F - assessment of the consequences of a risk event;
P-probability of occurrence of a risk event;
I-potential consequences of a risk event.</p>
      <p>In General, the construction of a risk assessment model is complicated by the
instability of causes or risk factors and the complexity of formalizing the results of
activities. Therefore, when justifying and developing risk assessment models, a
thorough analysis of the nature of the initial information on the causes and risk factors is
required.</p>
      <p>
        From the above we come to an Algebraic model of the process Figure (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ).
      </p>
      <p>PPstop = Predicate that detects that all the possibilities to Refine the risk
assessment have been exhausted</p>
      <p>Pstop=( T Bound</p>
      <p>The practical importance of research is the ability to use theoretical and
methodological results in practice to ensure risk calculation and thus the stability
of the means of implementation and development of the project as there are many
risks associated with creating high-quality programs on time and with a specific
budget. Nevertheless, in order to make sense to take these risks, they should be
compensated with sufficient remuneration. The developed tools help the project
manager to provide for risk response measures, based on more reliable
information. Reliable and more detailed information allows making more effective
decisions, which in turn reduces the possibility of risk occurrence. The product of
probability and impact determines the importance of risk - its value is an indicator
that can be used in the decision-making process.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Sosnin p.
          <article-title>i. pseudo-code control of work flows in the design of automated systems</article-title>
          .
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. Negoda v.n.
          <article-title>simulation programs generation based on decision tables translation technics. "interactive systems: the problem of iluman-computer interaction</article-title>
          ,
          <source>proceedings of the international conference. ulianovsk</source>
          ,
          <year>2001</year>
          . p.
          <fpage>92</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Khansaa</given-names>
            <surname>Azeez Obayes Al-Husseini</surname>
          </string-name>
          ,
          <article-title>Information security in the field of technical development and information, Interactive Systems: Problems of Human-Computer Interaction Ulyanovsk:</article-title>
          USTU,
          <fpage>71</fpage>
          -
          <lpage>80p</lpage>
          .
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. Sosnin p.
          <article-title>question-answer processor for cooperative work in human-computer environment</article-title>
          .
          <source>proceeding the 2 international ieee conference intelligent system</source>
          ,
          <year>2004</year>
          ;
          <fpage>452</fpage>
          -
          <lpage>456</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. Allison robin.
          <source>msf risk management discipline v.1</source>
          .
          <issue>1</issue>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>6. Zaitseva, lv, methods and models of adaptation to students in computer training systems</article-title>
          ,
          <source>educational technology &amp; society.- no. 4.</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Khansaa</given-names>
            <surname>Azeez Obayes Al-Husseini</surname>
          </string-name>
          ,
          <article-title>Ali Hamzah Obaid : development of risk management tools in question-answering based software design environment</article-title>
          .
          <source>international journal of computer science and mobile computing ijcsmc</source>
          , vol.
          <volume>7</volume>
          ,
          <issue>issue</issue>
          . 6, june 2018, pg.
          <fpage>165</fpage>
          -
          <lpage>174</lpage>
          . issn 2320-088x
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Ali</given-names>
            <surname>Hamzah</surname>
          </string-name>
          <string-name>
            <surname>Obaid</surname>
          </string-name>
          , Khansaa Azeez Obayes Al-Husseini :
          <article-title>tools for conceptual-algorithmic prototyping of project solutions in software intensive systems design</article-title>
          .
          <source>international journal of engineering technologies and management research</source>
          ,
          <volume>5</volume>
          (
          <issue>10</issue>
          ),
          <fpage>117</fpage>
          -
          <lpage>122</lpage>
          . doi:
          <volume>10</volume>
          .5281/zenodo.1491903 . issn:
          <fpage>2454</fpage>
          -
          <lpage>1907</lpage>
          . vol.
          <volume>5</volume>
          (
          <issue>iss</issue>
          .10): october
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Khansaa</given-names>
            <surname>Azeez Obayes Al-Husseini</surname>
          </string-name>
          ,
          <article-title>Ali Hamzah Obaid : usage of prototyping in software testing .multi-knowledge electronic comprehensive journal for education and science publications</article-title>
          .
          <source>issue</source>
          (
          <issue>14</issue>
          ), nov (
          <year>2018</year>
          ) .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Khansaa Azeez Obayes Al-Husseini</surname>
          </string-name>
          :
          <article-title>risk management tools in the design of automated systems . p 287 interactive systems: problems of human-computer interaction</article-title>
          . ulyanovsk , russia: ustu,
          <year>2017</year>
          . − 290 p. udc
          <volume>681</volume>
          .
          <volume>518</volume>
          (
          <issue>04</issue>
          ).
          <source>isbn 978-5-9795-1692-9</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <article-title>Ali hamzah obaid : tools for conceptual-algorithmic prototyping in solving design problems in the development of systems with software ,interactive systems: problems of human-computer interaction</article-title>
          . ulyanovsk , russia: ustu,
          <year>2017</year>
          . − 290 p. udc
          <volume>681</volume>
          .
          <volume>518</volume>
          (
          <issue>04</issue>
          ) .
          <source>isbn 978-5-9795-1692-9</source>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. Kotov v. ye. petri networks .- moscow: nauka,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <article-title>kurgan gs, models, methods and technology of differentiated learning on the basis of the internet</article-title>
          .
          <source>m. williams</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. OBAID,
          <string-name>
            <given-names>Ali</given-names>
            <surname>Hamzah</surname>
          </string-name>
          .
          <article-title>Information hiding techniques for steganography and digital watermarking</article-title>
          .
          <source>UDC 681</source>
          .
          <volume>518</volume>
          (
          <issue>04</issue>
          )
          <article-title>INTERACTIVE S&lt;STEMS: Problems of Human-Computer Interaction</article-title>
          .
          <article-title>-Collection of scientific papers</article-title>
          .
          <source>- Ulyanovsk: USTU</source>
          ,
          <year>2015</year>
          .- 306 p.
          <year>2015</year>
          , pp.
          <fpage>63</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. http://iso27000.ru
          <article-title>/chitalnyi-zai/upravlenie-riskami-informacionnoi-bezopasnosti/kakupravlyat-riskami-informacionnoi-bezopasnosti .</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>a. alexander, the timeless way of building</article-title>
          , new york,,
          <year>1979</year>
          .google scholar .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. karlm,
          <article-title>"software lifecycle models"</article-title>
          , kth,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>