Advertisement

Application of the TOPSİS method to improve software efficiency and to optimize its management

  • Shafagat MahmudovaEmail author
Methodologies and Application
  • 6 Downloads

Abstract

Technique for Order of Prevention by Similarity to Ideal Solution (TOPSİS) method is used for decision-making to improve software efficiency and to optimize its management by using methodological approaches. TOPSIS method is a multi-criteria decision-making analysis method. TOPSIS identifies the best alternative variant based on compromise solution. The basic concept of the TOPSIS method is that the chosen alternate variant has to be at the shortest Euclidean distance from the positive ideal solution and at the farthest Euclidean distance from the negative ideal solution. Criteria and alternatives for software are identified. Two or three of software features from other studies are used. Based on international experience, practically, only few characteristics of software efficiency have been used in the articles so far, but not all eight characteristics. Eight attributes of software efficiency are used, which distinguish this study from others. The values of the worst and best alternatives are found in multi-criterion decision-making by using the estimations of four expert programmers. The software currently run in three systems was used in experiments. The skills of the experts are also taken into account for finding the values. The results of the experiments are estimated to be good.

Keywords

Software Characteristics Criteria Alternatives Efficiency TOPSIS 

Notes

Acknowledgements

The author thanks the editors and anonymous reviewers for their helpful comments and suggestions that have led to this improved version of the paper.

Compliance with ethical standards

Conflict of interest

The author declares no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the author.

References

  1. Alguliyev RM, Kazimov TH, Mahmudova SJ, Mahmudova RS (2005) Corporate information systems educational center. In: The international conference educational technology, ICTE’2005, pp 294–298Google Scholar
  2. Cho J, Kim B, Choi C, Jeong H (2016) Study of market scale and share estimation methodology on effective feasibility analysis of government R&D program related to information technology. In: The international conference on platform technology and service (PLATCON). IEEE.  https://doi.org/10.1109/PlatCon.2016.7456826
  3. Fernandez Y, Verdegay JA (2018) New model based on soft computing for evaluation and selection of software products. IEEE Latin Am Trans 16:1186–1192.  https://doi.org/10.1109/TLA.2018.8362155 CrossRefGoogle Scholar
  4. Ghosh S, Chen ZY (2019) Special issue on trustworthy systems and software. Softw Qual J 27(3):921–922.  https://doi.org/10.1007/s11219-019-09450-9 CrossRefGoogle Scholar
  5. Hanine M, Boutkhoum B, Omar T, Agouti T (2016) Application of an integrated multi-criteria decision making AHP-TOPSIS methodology for ETL software selection. SpringerPlus 5:1–17.  https://doi.org/10.1186/s40064-016-1888-z CrossRefGoogle Scholar
  6. Hwang CL, Yoon K (1981) Methods for multiple attribute decision making. Springer, New York, pp 58–191.  https://doi.org/10.1007/978-3-642-48318-9_3 CrossRefGoogle Scholar
  7. Jabrayilova ZQ, Sabina NM (2011) Defining methods of importance factor of the criteria in the solution of personnel management problems and detection of contradictions. In: The 11th international conference on pattern recognition and information processing (PRIP’2011), pp 330–333Google Scholar
  8. Jeesoo J, Taeeun K, Hwankuk K (2018) An automated vulnerability detection and remediation method for software security. Sustainability 10(5):1–14.  https://doi.org/10.3390/su10051652 CrossRefGoogle Scholar
  9. Kazimov T, Mahmudova S (2016) About the calculation method of the coefficient that shows significance extent of geometric characteristics in determination of racial and ethnic identity of human. Rev Comput Eng Res 3(3):47–54.  https://doi.org/10.18488/journal.76/2016.3.3/76.3.47.54 CrossRefGoogle Scholar
  10. Kelemenis A, Askounis D (2010) A new TOPSIS-based multi-criteria approach to personnel selection. Expert Syst Appl 37:4999–5008.  https://doi.org/10.1016/j.eswa.2009.12.013 CrossRefGoogle Scholar
  11. Kondrashov M, Pankratov A, Batseva N (2019) The architecture and functionality of the software to identify the actual voltage static load characteristics of large consumers. In: The 2019 international Siberian conference on control and communications (SIBCON).  https://doi.org/10.1109/SIBCON.2019.8729660
  12. Mahmudova S (2018a) Analysis of software performance enhancement and development of algorithm. Int J Innov Sci Res Technol 4(1):219–229Google Scholar
  13. Mahmudova S (2018b) Methods of organizing the technological process of software development. Rev Inf Eng Appl 5(1):1–11.  https://doi.org/10.18488/journal.79.2018.51.1.11 CrossRefGoogle Scholar
  14. Mamedova MG, Dzhabrailova ZG (2015) Mnogo-kriterial’naya optimizatsiya zadach upravleniya chelovecheskimi resursami na baze modifitsirovannogo metoda TOPSIS. Vostochno-Yevropeyskiy zhurnal peredovykh tekhnologiy 2(74):48–61.  https://doi.org/10.15587/1729-4061.2015.40533 CrossRefGoogle Scholar
  15. Milutinovic S, Mezzetti E, Abella J, Cazorla FJ (2019) Increasing the reliability of software timing analysis for cache-based processors. IEEE Trans Comput 68(6):836–851.  https://doi.org/10.1109/TC.2018.2890626 MathSciNetCrossRefzbMATHGoogle Scholar
  16. Parameshwaran R, Kumar SP, Saravanakumar K (2015) An integrated fuzzy MCDM based approach for robot selection considering objective and subjective criteria. Appl Soft Comput 26:31–41.  https://doi.org/10.1016/j.asoc.2014.09.025 CrossRefGoogle Scholar
  17. Rao RV (2013) Decision making in the manufacturing environment using graph theory and fuzzy multiple attribute decision making methods. Springer, BerlinCrossRefGoogle Scholar
  18. Sadiq M, Afrin A (2017) An integrated approach for the selection of software requirements using fuzzy AHP and fuzzy TOPSIS method. In: International conference on intelligent computing, instrumentation and control technologies (ICICICT), pp 1094–1100.  https://doi.org/10.1109/icicict1.2017.8342722
  19. Van O, Paul C (2019) Software security and systematizing knowledge. IEEE Secur Priv 17(3):4–6.  https://doi.org/10.1109/msec.2019.2904127 CrossRefGoogle Scholar
  20. Welch MJ (1985) Convenience software. Byte 10(6):353–363Google Scholar
  21. Yang XS, Cui ZH, Xiao R, Gandomi A, Karamanoglu M (2013) Swarm intelligence and bio-inspired computation: theory and applications. Elsevier, AmsterdamCrossRefGoogle Scholar
  22. Yi T, Fang C (2018) A novel method of complexity metric for object-oriented software. Int J Digit Multimed Broadcast.  https://doi.org/10.1155/2018/7624768 CrossRefGoogle Scholar
  23. Yin X, Wang LM, Jiang SR (2019) A hierarchical mobility management scheme based on software defined networking. Peer-to-peer Netw Appl 12(2):310–325.  https://doi.org/10.1007/s12083-017-0615-z CrossRefGoogle Scholar
  24. Zhang W, Zhang Q (2014) Multi-stage evaluation and selection in the formation process of complex creative solution. Qual Quant Int J Methodol 48(5):2375–2404.  https://doi.org/10.1007/s11135-013-9896-3 CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Institute of Information Technology of ANASBakuAzerbaijan

Personalised recommendations