{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T05:01:41Z","timestamp":1773032501923,"version":"3.50.1"},"reference-count":37,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"vor","delay-in-days":281,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100004242","name":"Princess Nourah Bint Abdulrahman University","doi-asserted-by":"publisher","award":["PNURSP2025R897"],"award-info":[{"award-number":["PNURSP2025R897"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Software"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>\n                    Prioritizing software requirements in a sustainable manner can significantly contribute to the success of a software project, adding substantial value throughout its development lifecycle. Analytic hierarchical process (AHP) is considered to yield more accurate prioritized results, but due to high pairwise comparisons, it is not considered to be scalable for prioritization of high number of requirements. To address scalability issue, a hybrid approach of minimal spanning trees (MSTs) and AHP, called as spanning tree and AHP (SAHP), is designed for prioritizing large set of functional requirements (FRs) with fewer comparisons, and thus scalability issue is solved. In this research, on\u2010demand open object (ODOO) enterprise resource planning (ERP) system FRs are prioritized, and the results are compared with AHP. The results of the case study proved that SAHP is more scalable that can prioritize any type of requirement with only\n                    <jats:italic>n<\/jats:italic>\n                    \u20131 pairs of requirements. Total FRs considered for case from ODOO were 100, where 18 spanning trees were constructed from it. With only 90 pairwise comparisons, these FRs were prioritized with more consistency compared to AHP. Total pairwise comparisons with AHP reach 4950, which is 55 times more compared with SAHP. Consistency of results is measured from average consistency index (CI) value, which was below 0.1. The consistency ratio (CR) value below 0.1 shows results are consistent and acceptable.\n                  <\/jats:p>","DOI":"10.1049\/sfw2\/8819735","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T10:12:08Z","timestamp":1760004728000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of Minimal Spanning Tree and Analytic Hierarchical Process (SAHP) Based Hybrid Technique for Software Requirements Prioritization"],"prefix":"10.1049","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0832-9399","authenticated-orcid":false,"given":"Muhammad","family":"Yaseen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2589-6176","authenticated-orcid":false,"given":"Esraa","family":"Ali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8681-6382","authenticated-orcid":false,"given":"Nadeem","family":"Sarwar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6664-5923","authenticated-orcid":false,"given":"Leila","family":"Jamel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7895-9911","authenticated-orcid":false,"given":"Irfanud","family":"Din","sequence":"additional","affiliation":[]},{"given":"Farrukh","family":"Yuldashev","sequence":"additional","affiliation":[]},{"given":"Foongli","family":"Law","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"key":"e_1_2_15_1_2","first-page":"542","article-title":"Effective Requirement Elicitation Process Using Developed Open-Source Software Systems","volume":"9","author":"Yaseen M.","year":"2020","journal-title":"International Journal of Advanced Trends in Computer Science and Engineering"},{"key":"e_1_2_15_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014381"},{"key":"e_1_2_15_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/RE48521.2020.00065"},{"key":"e_1_2_15_4_2","first-page":"3763","article-title":"An Integrated Approach Towards Automated Software Requirements Elicitation From Unstructured Documents","volume":"12","author":"Jaya S. M. A.","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_2_15_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/52.605933"},{"key":"e_1_2_15_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.03.012"},{"key":"e_1_2_15_7_2","first-page":"2723","article-title":"Investigation and Analysis of the Requirement Engineering in Software Development Process and Its Systematic Requirements Elicitation Approach","volume":"9","author":"Suhaib M.","year":"2020","journal-title":"International Journal of Scientific & Technology Research"},{"key":"e_1_2_15_8_2","first-page":"18","article-title":"Systematic Approach in Change Management for Elicitation and Prioritization of Requirements in Agile","volume":"5","author":"Jadi A. M. R. M.","year":"2020","journal-title":"Journal of Software Engineering & Intelligent Systems"},{"key":"e_1_2_15_9_2","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2015.11.06"},{"key":"e_1_2_15_10_2","volume-title":"A Comparison of Nine Basic Techniques for Requirements Prioritization","author":"Vestola M.","year":"2010"},{"key":"e_1_2_15_11_2","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/09912020"},{"key":"e_1_2_15_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-04902-y"},{"key":"e_1_2_15_13_2","first-page":"11","article-title":"An Empirical Evaluation of Requirements Prioritization Techniques","volume":"7","author":"Jan N.","year":"2020","journal-title":"Marketing and Branding Research"},{"key":"e_1_2_15_14_2","first-page":"47","volume-title":"Eltracting Core Requirements for Software Product Lines","author":"Reinhartz I.","year":"2019"},{"key":"e_1_2_15_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(97)00053-0"},{"key":"e_1_2_15_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-023-00397-9"},{"key":"e_1_2_15_17_2","doi-asserted-by":"crossref","unstructured":"FellirF. NafilK. andTouahniR. Systems Requirements Prioritization Based on AHP 2014 Third IEEE International Colloquium in Information Science and Technology (CIST) 2015 Tetouan Morocco IEEE 163\u2013167.","DOI":"10.1109\/CIST.2014.7016612"},{"key":"e_1_2_15_18_2","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/769\/1\/012060"},{"key":"e_1_2_15_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2016.09.020"},{"key":"e_1_2_15_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.04.010"},{"key":"e_1_2_15_21_2","doi-asserted-by":"publisher","DOI":"10.1002\/spip.249"},{"key":"e_1_2_15_22_2","doi-asserted-by":"publisher","DOI":"10.1137\/0207024"},{"key":"e_1_2_15_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s004530010008"},{"key":"e_1_2_15_24_2","doi-asserted-by":"crossref","unstructured":"UsmanM. SakethiD. YuniartiR. andCucusA. The Hybrid of Depth First Search Technique and Kruskal\u2019s Algorithm for Solving the Multiperiod Degree Constrained Minimum Spanning Tree Problem 2015 4th International Conference on Interactive Digital Media (ICIDM) 2015 Bandung Indonesia IEEE 1\u20134.","DOI":"10.1109\/IDM.2015.7516333"},{"key":"e_1_2_15_25_2","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016908481"},{"key":"e_1_2_15_26_2","first-page":"14","article-title":"Functional Requirements Prioritization Using Graph and Sorting Algorithm","volume":"8","author":"Yaseen M.","year":"2020","journal-title":"International Journal of Scientific Research in Computer Science and Engineering"},{"key":"e_1_2_15_27_2","doi-asserted-by":"publisher","DOI":"10.2307\/2297303"},{"key":"e_1_2_15_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11139-017-9989-z"},{"key":"e_1_2_15_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00026-015-0289-2"},{"key":"e_1_2_15_30_2","article-title":"Prioritization of Software Functional Requirements From Developers Perspective","volume":"11","author":"Yaseen M.","year":"2020","journal-title":"International Journal of Advanced Trends in Computer Science and Engineering"},{"key":"e_1_2_15_31_2","first-page":"132","article-title":"Eliciting Theory of Software Maintenance Outsourcing Process: A Systematic Literature Review","volume":"18","author":"Ikram A.","year":"2018","journal-title":"S International Journal of Computer Science and Network Security"},{"key":"e_1_2_15_32_2","article-title":"Towards Offshore Software Maintenance Outsourcing Process Model","volume":"20","author":"Ikram A.","year":"2020","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_2_15_33_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.030927"},{"key":"e_1_2_15_34_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.029609"},{"key":"e_1_2_15_35_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.034692"},{"key":"e_1_2_15_36_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.030818"},{"key":"e_1_2_15_37_2","doi-asserted-by":"publisher","DOI":"10.3390\/su16010433"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/sfw2\/8819735","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/sfw2\/8819735","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/sfw2\/8819735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T04:10:12Z","timestamp":1773029412000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/sfw2\/8819735"}},"subtitle":[],"editor":[{"given":"Tomasz","family":"G\u00f3rski","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/sfw2\/8819735"],"URL":"https:\/\/doi.org\/10.1049\/sfw2\/8819735","archive":["Portico"],"relation":{},"ISSN":["1751-8806","1751-8814"],"issn-type":[{"value":"1751-8806","type":"print"},{"value":"1751-8814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8819735"}}