<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An implementation Analysis of Risk Mitigation in Software Reusability using Matrix Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alankrita Aggarwal</string-name>
          <email>alankrita.agg@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kanwalvir S. Dhindsa</string-name>
          <email>kdhindsa@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>P. K. Suri</string-name>
          <email>pksurikuk@gmail</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pardeep Singh</string-name>
          <email>pardeep.maan@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kurukshetra University</institution>
          ,
          <addr-line>Thanesar, Kurukshtera, Haryana 136119</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Petroleum and Energy Studies</institution>
          ,
          <addr-line>Energy Acres, UPES, Bidholi, via, Prem Nagar, Dehradun, Uttarakhand-248007</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Component-based programming is one of the most efficient and reliable parameters to improve software development capabilities. The reusable components not only speed up the development process but also increase the software's reliability. But this reliability and efficiency depend on the number of components used along with interfacing with new components. In this work, a weighted approach is defined to perform the analysis and to identify the effectiveness and risk minimization of software reusability and done using Matlab simulations.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Software Components</kwd>
        <kwd>Risk Mitigation</kwd>
        <kwd>Matrix analysis</kwd>
        <kwd>Complexity Analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Today most of the available software systems are defined in modular form. These modules are
defined in the form of a method or component. These components are being used in a software
system as the essential software part based on which software complexity analysis can be
performed. This usability analysis also depends on multiple parameters such as the criticality of
the components, the Number of variables or methods being shared, interactivity with external or
internal files, etc. Based on these all vectors, software complexity analysis to perform reliable
software delivery [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ][
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>1.1SoftwareComponents</title>
      <p>A software module or component can be described along with specific properties</p>
      <p>A Software module, the block, function, or the class can be a Software component. These
modules can be dependent on the language or can be neutral and generalized so that can be
embedded in any language
These components can be application or database-specific these components can be an
online or offline component. An end product or it can be if extensible can be considered a
software component.</p>
      <p>An interface that conceptually identifies internal and external interface with the main
application will be also a part of a software component
•</p>
      <p>
        A deliverable software object can also be considered a software component. The
abovementioned points about the software components must be supported by all the available
languages [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ][
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
      </p>
    </sec>
    <sec id="sec-3">
      <title>1.2 SoftwareMetrics</title>
      <p>
        As the number of components available on the market increases, it is becoming more important to
devise software metrics to quantify the various characteristics of components and their usage.
Metrics can also be used in guiding decisions throughout the life cycle, determining whether
software quality improvement initiatives are financially worthwhile. Therefore, a different set of
metrics is required to measure various aspects for component-based systems and their quality
issues. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ][
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
      </p>
    </sec>
    <sec id="sec-4">
      <title>2. Literature Review</title>
      <p>Defined work on the analysis of the software system for different structural and object-oriented
metrics. The authors discussed the metrics such as LOC, cyclomatic complexity, cohesion, and
coupling.
•
•
•
•
•
•
•
•
•
•
•</p>
      <p>
        Authors proposed estimation on software products to analyze the software system under
defect analysis for an object-oriented software system [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Presented a resource-based software estimation scheme for software quality analysis. The
author defined a budget analysis approach to improve software product analysis and also
performed analysis under different testing aspects.[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
The proposed work introduced an improved metrics-based complexity model for
objectoriented programming and the complexity analysis under multiple aspects so that effective
software development under method analysis will be performed [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Proposed the structural complexity model under an integral factor so that the development
effort will be reduced and also proposed the size and complexity-based model for the
development of software systems under cost estimation [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Proposed and defined a computational system for the software system under the software
development rules for cost, timeline, and quality analysis [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        The idea developed computational work to perform software development and software
product analysis under cost and time analysis. Here all works are done to define a parametric
analysis on software system under software quality and software history analysis [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ][
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
The work analyzed the software measurement under the defined framework so that the
software measurement validation is performed along with the structural model for software
development so that the attribute relation analysis will be performed [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        Authors presented the entity analysis of the components of the software and analyzed the
effective path generation so that effective software measurement and testing will be applied
over it [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ][
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        The proposed work explained the reuse of software by using combining RF and gradient
boosting machine learning methods [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>Proposed to minimize the risk by using Random ForestAlgorithm [18][19].</p>
      <p>Explained the methods to increase the quality of software by bugs detection and
prediction methods[20[21][22].</p>
    </sec>
    <sec id="sec-5">
      <title>3. Proposed Work</title>
      <p>Risk mitigation is the important criterion in a software plan while performing software cost
analysis and software project scheduling. Software reusability is about designing a software
system by using some existing software or the module. In this work, we are combining the
software reusability vector with software risk management. The presented work is divided into
four main stages. During the first stage, software analysis will be done under the metric-based
estimation. In the second stage; the module requirement will be defined to represent
reusable modules. In the final stage, all representations of reusable modules will get identified in
terms of cost estimation with the inclusion and testing of reused modules will be performed. Based
on this analysis, the system cost and the risk estimation will be identified and presented as the final
result. The work begins with the selection of a complete software system. These stages are defined
in figure 1. As shown in the figure.</p>
      <p>The parts are the evaluation of individual software modules, module interaction analysis, and the
complete system analysis. This stage will be able to perform the software representation in terms
of software statistical analysis. In the second stage, the software system will be analyzed
respectively to the new software system with which, the existing software system will be
integrated.</p>
    </sec>
    <sec id="sec-6">
      <title>3. Results &amp; Discussion</title>
      <p>The presented work is implemented in a Matlab environment to the process of data
analysis from obtaining data from external sources and databases, doing pre-processing,
related visualization, numerical analysis to produce quality output presentation tested on a
dummy.</p>
    </sec>
    <sec id="sec-7">
      <title>4. Conclusion &amp; Future Scope</title>
      <p>In this work, system complexity analysis is defined respective to software usability under different
parameters such as inter-communication analysis, and risk is minimized. The work can be
analyzed with the help of various machine learning methods which will be giving promising
results rather than traditional methods. The paper applies to the industry as the component-based
risk mitigation will minimize the risk and will be useful to the industry as well. module-based
project representation. The results obtained from the work are given here under.Here figure 2 the
individual. Module analysis dependent on module interface complexity is shown. Here x-axis is
representing the modules and the y-axis is representing complexity analysis.In figure 3 the internal
component analysis respective to modules is shown. Here x-axis is representing the modules and
the y-axis is representing complexity analysis.</p>
    </sec>
    <sec id="sec-8">
      <title>5. Acknowledgment</title>
      <p>We are thankful to the research department of IKG Punjab Technical University, Kapurthala
(Punjab) for their assistance. No other person or organization is associated with our work in this
manuscript.</p>
    </sec>
    <sec id="sec-9">
      <title>6. References</title>
      <p>forest and gradient boosting machine learning algorithm. Software: Practice and Experience,
51(4),735-747.
[18] Aggarwal, A., Dhindsa, K. S., &amp; Suri, P. K. (2021). Performance-Aware Approach for
Software Risk Management Using Random Forest Algorithm. International Journal of
Software Innovation (IJSI), 9(1),12-19.
[19] Aggarwal, Alankrita, Kanwalvir Singh Dhindsa, and P. K. Suri. "Enhancing Software
Quality Assurance by Using Knowledge Discovery and Bug Prediction Techniques." In Soft
Computing for Intelligent Systems, pp. 97-118. Springer, Singapore,2021.
[20] Hasan, M. Mahmudul, George Kousiouris, DimosthenisAnagnostopoulos, TetaStamati, Peri
zoucopoulos, and Mara Nikolaidou. "CISMET: A Semantic Ontology Framework for
Regulatory-Requirements-Compliant Information Systems Development and Its Application
in the GDPR Case." International Journal on Semantic Web and Information Systems
(IJSWIS) 17, no. 1 (2021):1- 24.
[21] Abayomi-Alli, Adebayo Adewumi, Sanjay Misra, MulkahOpeyemiAkala, Abiodun
MotunrayoIkotun, and BolanleAdefowokeOjokoh. "An Ontology-Based Information
Extraction System for Organic Farming." International Journal on Semantic Web and
Information Systems (IJSWIS) 17, no. 2 (2021): 79-99.
[22] DK ShivaniGaba, ShifaliSingla.A Genetic Improved Quantum Cryptography Model to
Optimize Network Communication,” Special Issue, vol. 8, no. 9S, pp. 256–259, Aug. 2019.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Sedigh-Ali</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghafoor</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Paul</surname>
            ,
            <given-names>R. A.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Software engineering metrics for COTSbased systems</article-title>
          . Computer,
          <volume>34</volume>
          (
          <issue>5</issue>
          ),
          <fpage>44</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Prasad</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Nagar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2009</year>
          ,
          <article-title>July)</article-title>
          .
          <article-title>Experimental analysis of different metrics (objectoriented and structural) of software</article-title>
          .
          <source>In 2009 First International Conference on Computational Intelligence, Communication Systems and Networks</source>
          (pp.
          <fpage>235</fpage>
          -
          <lpage>240</lpage>
          ).IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Rana</surname>
            ,
            <given-names>Z. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shamail</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Awais</surname>
            ,
            <given-names>M. M.</given-names>
          </string-name>
          (
          <year>2009</year>
          , May).
          <article-title>Ineffectiveness of use of software science metrics as predictors of defects in object oriented software</article-title>
          .
          <source>In 2009 Wri World Congress on Software Engineering</source>
          (Vol.
          <volume>4</volume>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>7</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Boehm</surname>
            ,
            <given-names>B. W.</given-names>
          </string-name>
          (
          <year>1988</year>
          ).
          <article-title>A spiral model of software development and enhancement</article-title>
          .
          <source>Computer</source>
          ,
          <volume>21</volume>
          (
          <issue>5</issue>
          ),
          <fpage>61</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Da-Wei</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2007</year>
          , April).
          <article-title>The software complexity model and metrics for object-oriented</article-title>
          . In 2007 International Workshop on Anti-Counterfeiting,
          <article-title>Security and Identification (ASID) (pp</article-title>
          .
          <fpage>464</fpage>
          -
          <lpage>469</lpage>
          ). IEEE
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Shatnawi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>A quantitative investigation of the acceptable risk levels of objectoriented metrics in open-source systems</article-title>
          .
          <source>IEEE Transactions on software engineering</source>
          ,
          <volume>36</volume>
          (
          <issue>2</issue>
          ),
          <fpage>216</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Krishnapriya</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ramar</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2010</year>
          , June).
          <article-title>Exploring the difference between object oriented class inheritance and interfaces using coupling measures</article-title>
          .
          <source>In 2010 International Conference on Advances in Computer Engineering</source>
          (pp.
          <fpage>207</fpage>
          -
          <lpage>211</lpage>
          ).IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Kulkarni</surname>
            ,
            <given-names>U. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalshetty</surname>
            ,
            <given-names>Y. R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Arde</surname>
            ,
            <given-names>V. G.</given-names>
          </string-name>
          (
          <year>2010</year>
          , November).
          <article-title>Validation of ck metrics for object oriented design measurement</article-title>
          .
          <source>In 2010 3rd international conference on emerging trends in engineering and technology</source>
          (pp.
          <fpage>646</fpage>
          -
          <lpage>651</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Du</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          (
          <year>2010</year>
          , December).
          <article-title>Software Power: a new approach to software complexity metrics</article-title>
          .
          <source>In 2010 Second World Congress on Software Engineering</source>
          (Vol.
          <volume>2</volume>
          , pp.
          <fpage>165</fpage>
          -
          <lpage>168</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Bruda</surname>
            ,
            <given-names>S. D.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Complexity metrics for componentbased software systems</article-title>
          .
          <source>International Journal of Digital Content Technology and its Applications</source>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          ),
          <fpage>235</fpage>
          -
          <lpage>244</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Thapaliyal</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Verma</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Software defects and object oriented metrics-an empirical analysis</article-title>
          .
          <source>International Journal of Computer Applications</source>
          ,
          <volume>9</volume>
          (
          <issue>5</issue>
          ),
          <fpage>41</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Da-Wei</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2007</year>
          , April).
          <article-title>The software complexity model and metrics for object-oriented</article-title>
          . In 2007 International Workshop on Anti-Counterfeiting,
          <article-title>Security and Identification (ASID) (pp</article-title>
          .
          <fpage>464</fpage>
          -
          <lpage>469</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Koh</surname>
            ,
            <given-names>T. W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Selamat</surname>
            ,
            <given-names>M. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghani</surname>
            ,
            <given-names>A. A. A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Abdullah</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Review of complexity metrics for object oriented software products</article-title>
          .
          <source>International Journal of Computer Science and Network Security</source>
          ,
          <volume>8</volume>
          (
          <issue>11</issue>
          ),
          <fpage>314</fpage>
          -
          <lpage>320</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Xiao</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2009</year>
          , March).
          <article-title>A tool for the application of software metrics to UML class diagram</article-title>
          .
          <source>In 2009 First International Workshop on Education Technology and Computer Science</source>
          (Vol.
          <volume>1</volume>
          , pp.
          <fpage>181</fpage>
          -
          <lpage>184</lpage>
          ).IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Selvarani</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nair</surname>
            ,
            <given-names>T. G.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Prasad</surname>
            ,
            <given-names>V. K.</given-names>
          </string-name>
          (
          <year>2009</year>
          , May).
          <article-title>Estimation of defect proneness using design complexity measurements in object-oriented software</article-title>
          .
          <source>In 2009 International Conference on Signal Processing Systems</source>
          (pp.
          <fpage>766</fpage>
          -
          <lpage>770</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Lang</surname>
            ,
            <given-names>A. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Debenham</surname>
            ,
            <given-names>C. J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>DeLaurentis</surname>
            ,
            <given-names>D. A.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Enabling reusability of a spacecraftdesigntoolset via MBSE</article-title>
          .
          <source>In AIAA Scitech 2021 Forum</source>
          (p.
          <fpage>0095</fpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Sandhu</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Batth</surname>
            ,
            <given-names>R. S.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Software reuse analytics using integrated random</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>