{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:09:28Z","timestamp":1760609368822},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s10115-021-01573-5","type":"journal-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T20:02:38Z","timestamp":1622232158000},"page":"1909-1934","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An integrated approach using IF-TOPSIS, fuzzy DEMATEL, and enhanced CSA optimized ANFIS for software risk prediction"],"prefix":"10.1007","volume":"63","author":[{"given":"K.","family":"Suresh","sequence":"first","affiliation":[]},{"given":"R.","family":"Dillibabu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,28]]},"reference":[{"issue":"1","key":"1573_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0164-1212(99)00128-4","volume":"52","author":"J Jiang","year":"2000","unstructured":"Jiang J, Klein G (2000) Software development risks to project effectiveness. J Syst Softw 52(1):3\u201310","journal-title":"J Syst Softw"},{"issue":"1\u20132","key":"1573_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/S0164-1212(02)00155-3","volume":"70","author":"M de Oliveira Barros","year":"2004","unstructured":"de Oliveira Barros M, Werner CM, Travassos GH (2004) Supporting risks in software project management. J Syst Softw 70(1\u20132):21\u201335","journal-title":"J Syst Softw"},{"issue":"4","key":"1573_CR3","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.jss.2006.06.018","volume":"80","author":"K-S Na","year":"2007","unstructured":"Na K-S, Simpson JT, Li X, Singh T, Kim K-Y (2007) Software development risk and project performance measurement: evidence in Korea. J Syst Softw 80(4):596\u2013605","journal-title":"J Syst Softw"},{"issue":"11","key":"1573_CR4","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1029496.1029497","volume":"47","author":"A Tiwana","year":"2004","unstructured":"Tiwana A, Keil M (2004) The one-minute risk assessment tool. Commun ACM 47(11):73\u201377","journal-title":"Commun ACM"},{"issue":"1","key":"1573_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/52.62930","volume":"8","author":"BW Boehm","year":"1991","unstructured":"Boehm BW (1991) Software risk management: principles and practices. IEEE Softw 8(1):32\u201341","journal-title":"IEEE Softw"},{"issue":"5","key":"1573_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/2.589908","volume":"30","author":"A Gemmer","year":"1997","unstructured":"Gemmer A (1997) Risk management: moving beyond process. Computer 30(5):33\u201343","journal-title":"Computer"},{"key":"1573_CR7","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1002\/pip.3315","volume":"28","author":"V Sundararaj","year":"2020","unstructured":"Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28:1128\u20131145","journal-title":"Prog Photovolt Res Appl"},{"issue":"1","key":"1573_CR8","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11277-018-6014-9","volume":"104","author":"S Vinu","year":"2019","unstructured":"Vinu S (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173\u2013197","journal-title":"Wirel Pers Commun"},{"key":"1573_CR9","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.cose.2018.04.009","volume":"77","author":"S Vinu","year":"2018","unstructured":"Vinu S, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277\u2013288","journal-title":"Comput Secur"},{"issue":"3","key":"1573_CR10","first-page":"117","volume":"9","author":"V Sundararaj","year":"2016","unstructured":"Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117\u2013126","journal-title":"Int J Intell Eng Syst"},{"issue":"4","key":"1573_CR11","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1504\/IJBET.2019.103242","volume":"31","author":"V Sundararaj","year":"2019","unstructured":"Sundararaj V (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325","journal-title":"Int J Biomed Eng Technol"},{"issue":"1","key":"1573_CR12","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/S0925-5273(02)00330-4","volume":"90","author":"G B\u00fcy\u00fck\u00f6zkan","year":"2004","unstructured":"B\u00fcy\u00fck\u00f6zkan G, Feyzioglu G (2004) A fuzzy decision making approach for the new product development process under uncertainty. Int J Prod Econ 90(1):27\u201345","journal-title":"Int J Prod Econ"},{"issue":"3","key":"1573_CR13","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0164-1212(01)00066-8","volume":"59","author":"DX Houston","year":"2001","unstructured":"Houston DX, Mackulak GT, Collofello JS (2001) Stochastic simulation of risk factor potential effects for software development risk management. J Syst Softw 59(3):247\u2013257","journal-title":"J Syst Softw"},{"key":"1573_CR14","unstructured":"Maniasi S, Britos P, Garc\u00eda-Mart\u00ednez R (2006) A taxonomy-based model for identifying risks. In: JIISIC, pp 13\u201318"},{"issue":"9","key":"1573_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSPEC.2005.1502528","volume":"42","author":"RN Charette","year":"2005","unstructured":"Charette RN (2005) Why software fails. IEEE Spectr 42(9):36","journal-title":"IEEE Spectr"},{"key":"1573_CR16","volume-title":"Managing risk: Methods for software systems development","author":"EM Hall","year":"1998","unstructured":"Hall EM (1998) Managing risk: Methods for software systems development. Pearson Education"},{"key":"1573_CR17","unstructured":"B\u00fcy\u00fck\u00f6zkan G, Mauris G, Berrah L, Feyzio\u011flu O (2003) Providing elucidations of Web site evaluation based on a multi-criteria aggregation. In Proceedings of the international fuzzy systems association world congress (IFSA), Istanbul, Turkey, pp 131\u2013134"},{"issue":"3","key":"1573_CR18","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1016\/j.eswa.2012.05.046","volume":"40","author":"A Baykaso\u011flu","year":"2013","unstructured":"Baykaso\u011flu A, Kaplano\u011flu V, Durmu\u015fo\u011flu ZD, \u015eahin C (2013) Integrating fuzzy DEMATEL and fuzzy hierarchical TOPSIS methods for truck selection. Expert Syst Appl 40(3):899\u2013907","journal-title":"Expert Syst Appl"},{"issue":"4","key":"1573_CR19","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1080\/09511920701575195","volume":"21","author":"O Feyzio\u011flu","year":"2008","unstructured":"Feyzio\u011flu O, B\u00fcy\u00fck\u00f6zkan G (2008) An integrated group decision-making approach for new product development. Int J Comput Integr Manuf 21(4):366\u2013375","journal-title":"Int J Comput Integr Manuf"},{"key":"1573_CR20","doi-asserted-by":"publisher","DOI":"10.4324\/9780080498089","volume-title":"Risk management in software development projects","author":"J McManus","year":"2012","unstructured":"McManus J (2012) Risk management in software development projects. Routledge"},{"key":"1573_CR21","doi-asserted-by":"crossref","unstructured":"Boehm B (1989) Software risk management. In European software engineering conference. Springer, Berlin, pp 1\u201319","DOI":"10.1007\/3-540-51635-2_29"},{"issue":"3","key":"1573_CR22","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/sys.10040","volume":"6","author":"A Engel","year":"2003","unstructured":"Engel A, Barad M (2003) A methodology for modeling VVT risks and costs. Syst Eng 6(3):135\u2013151","journal-title":"Syst Eng"},{"issue":"3","key":"1573_CR23","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/0165-0114(95)00201-4","volume":"80","author":"H-M Lee","year":"1996","unstructured":"Lee H-M (1996) Group decision making using fuzzy sets theory for evaluating the rate of aggregative risk in software development. Fuzzy Sets Syst 80(3):261\u2013271","journal-title":"Fuzzy Sets Syst"},{"key":"1573_CR24","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"1","author":"T Takagi","year":"1985","unstructured":"Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man Cybern 1:116\u2013132","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"1573_CR25","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.asoc.2014.01.027","volume":"18","author":"SK Patil","year":"2014","unstructured":"Patil SK, Kant R (2014) A hybrid approach based on fuzzy DEMATEL and FMCDM to predict success of knowledge management adoption in supply chain. Appl Soft Comput 18:126\u2013135","journal-title":"Appl Soft Comput"},{"key":"1573_CR26","unstructured":"Guide A (2001) Project management body of knowledge (pmbok\u00ae guide). In: Project Management Institute"},{"issue":"6","key":"1573_CR27","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1057\/ejis.2012.42","volume":"22","author":"M Keil","year":"2013","unstructured":"Keil M, Rai A, Liu S (2013) How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects. Eur J Inf Syst 22(6):650\u2013672","journal-title":"Eur J Inf Syst"},{"issue":"3","key":"1573_CR28","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1007\/s00500-019-03997-2","volume":"24","author":"K Suresh","year":"2020","unstructured":"Suresh K, Dillibabu R (2020) A novel fuzzy mechanism for risk assessment in software projects. Soft Comput 24(3):1683\u20131705","journal-title":"Soft Comput"},{"issue":"3","key":"1573_CR29","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/21.256541","volume":"23","author":"J-SR Jang","year":"1993","unstructured":"Jang J-SR (1993) ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans Syst Man Cybern 23(3):665\u2013685","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"1573_CR30","doi-asserted-by":"publisher","first-page":"2511","DOI":"10.1109\/TSMC.2017.2755377","volume":"49","author":"S-M Lu","year":"2017","unstructured":"Lu S-M, Li DP, Liu YJ (2017) Adaptive neural network control for uncertain time-varying state constrained robotics systems. IEEE Trans Syst Man Cybern Syst 49:2511\u20132518","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"05","key":"1573_CR31","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1142\/S0218488503002387","volume":"11","author":"S Opricovic","year":"2003","unstructured":"Opricovic S, Tzeng G-H (2003) Defuzzification within a multicriteria decision model. Int J Uncertain Fuzziness Knowl-Based Syst 11(05):635\u2013652","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"1573_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.engappai.2017.01.006","volume":"60","author":"SHS Moosavi","year":"2017","unstructured":"Moosavi SHS, Bardsiri VK (2017) Satin bowerbird optimizer: A new optimization algorithm to optimize ANFIS for software development effort estimation. Eng Appl Artif Intell 60:1\u201315","journal-title":"Eng Appl Artif Intell"},{"issue":"2","key":"1573_CR33","doi-asserted-by":"publisher","first-page":"97","DOI":"10.3311\/PPci.7166","volume":"57","author":"A Kaveh","year":"2013","unstructured":"Kaveh A, Ghazaan MI, Bakhshpoori T (2013) An improved ray optimization algorithm for design of truss structures. Period Polytech Civ Eng 57(2):97\u2013112","journal-title":"Period Polytech Civ Eng"},{"key":"1573_CR34","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.advengsoft.2013.03.004","volume":"59","author":"A Kaveh","year":"2013","unstructured":"Kaveh A, Farhoudi N (2013) A new optimization method: Dolphin echolocation. Adv Eng Softw 59:53\u201370","journal-title":"Adv Eng Softw"},{"issue":"3","key":"1573_CR35","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s10898-007-9149-x","volume":"39","author":"D Karaboga","year":"2007","unstructured":"Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm. J Global Optim 39(3):459\u2013471","journal-title":"J Global Optim"},{"key":"1573_CR36","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"issue":"9","key":"1573_CR37","doi-asserted-by":"publisher","first-page":"4414","DOI":"10.1016\/j.eswa.2014.01.015","volume":"41","author":"R Lourenzutti","year":"2014","unstructured":"Lourenzutti R, Krohling RA (2014) The Hellinger distance in multicriteria decision making: an illustration to the TOPSIS and TODIM methods. Expert Syst Appl 41(9):4414\u20134421","journal-title":"Expert Syst Appl"},{"key":"1573_CR38","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.knosys.2012.12.014","volume":"42","author":"Z-P Fan","year":"2013","unstructured":"Fan Z-P, Zhang X, Chen F-D, Liu Y (2013) Extended TODIM method for hybrid multiple attribute decision making problems. Knowl-Based Syst 42:40\u201348","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"1573_CR39","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.ejor.2007.10.046","volume":"193","author":"LFAM Gomes","year":"2009","unstructured":"Gomes LFAM (2009) An application of the TODIM method to the multicriteria rental evaluation of residential properties. Eur J Oper Res 193(1):204\u2013211","journal-title":"Eur J Oper Res"},{"issue":"2","key":"1573_CR40","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s13042-015-0370-5","volume":"9","author":"J Gopal","year":"2018","unstructured":"Gopal J, Sangaiah AK, Basu A, Gao XZ (2018) Integration of fuzzy DEMATEL and FMCDM approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome. Int J Mach Learn Cybern 9(2):225\u2013241","journal-title":"Int J Mach Learn Cybern"},{"key":"1573_CR41","unstructured":"NASA93 COCOMO data set\u2014http:\/\/promise.site.uottawa.ca\/SERepository\/datasets-page.html"},{"issue":"1","key":"1573_CR42","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s00521-015-2040-7","volume":"28","author":"AK Sangaiah","year":"2017","unstructured":"Sangaiah AK, Gopal J, Basu A, Subramaniam PR (2017) An integrated fuzzy DEMATEL, TOPSIS, and ELECTRE approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome. Neural Comput Appl 28(1):111\u2013123","journal-title":"Neural Comput Appl"},{"key":"1573_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00500-019-04640-w","volume":"24","author":"AK Bhullar","year":"2020","unstructured":"Bhullar AK, Kaur R, Sondhi S (2020) Enhanced crow search algorithm for AVR optimization. Soft Comput 24:1\u201331","journal-title":"Soft Comput"},{"issue":"6","key":"1573_CR44","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.1109\/TCYB.2013.2239988","volume":"43","author":"W Gong","year":"2013","unstructured":"Gong W, Cai Z (2013) Differential evolution with ranking-based mutation operators. IEEE Trans Cybern 43(6):2066\u20132081","journal-title":"IEEE Trans Cybern"},{"issue":"2","key":"1573_CR45","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10700-007-9004-z","volume":"6","author":"Z Xu","year":"2007","unstructured":"Xu Z (2007) Some similarity measures of intuitionistic fuzzy sets and their applications to multiple attribute decision making. Fuzzy Optim Decis Mak 6(2):109\u2013121","journal-title":"Fuzzy Optim Decis Mak"},{"key":"1573_CR46","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.eswa.2017.07.045","volume":"89","author":"KP Yoon","year":"2017","unstructured":"Yoon KP, Kim WK (2017) The behavioral TOPSIS. Expert Syst Appl 89:266\u2013272","journal-title":"Expert Syst Appl"},{"issue":"5","key":"1573_CR47","first-page":"759","volume":"3","author":"S Kumar","year":"2013","unstructured":"Kumar S, Chopra V (2013) Neural network and fuzzy logic based framework for software development effort estimation. Int J Adv Res Comput Sci Softw Eng 3(5):759\u2013763","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"issue":"4","key":"1573_CR48","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s10664-005-3864-z","volume":"10","author":"Y Takagi","year":"2005","unstructured":"Takagi Y, Mizuno O, Kikuno T (2005) An empirical approach to characterizing risky software projects based on logistic regression analysis. Empir Softw Eng 10(4):495\u2013515","journal-title":"Empir Softw Eng"},{"key":"1573_CR49","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.csi.2015.01.001","volume":"40","author":"W-M Han","year":"2015","unstructured":"Han W-M (2015) Discriminating risky software project using neural networks. Comput Stand Interfaces 40:15\u201322","journal-title":"Comput Stand Interfaces"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-021-01573-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-021-01573-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-021-01573-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T21:05:49Z","timestamp":1675371949000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-021-01573-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,28]]},"references-count":49,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["1573"],"URL":"https:\/\/doi.org\/10.1007\/s10115-021-01573-5","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,28]]},"assertion":[{"value":"17 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}