{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:58:03Z","timestamp":1776783483873,"version":"3.51.2"},"reference-count":108,"publisher":"Informa UK Limited","issue":"10-11","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Computer Integrated Manufacturing"],"published-print":{"date-parts":[[2020,11,1]]},"DOI":"10.1080\/0951192x.2020.1780320","type":"journal-article","created":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T23:04:47Z","timestamp":1593126287000},"page":"1129-1144","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":33,"title":["(AIAM2019) Artificial Intelligence in Software Engineering and inverse: Review"],"prefix":"10.1080","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0211-3503","authenticated-orcid":false,"given":"Mohammad","family":"Shehab","sequence":"first","affiliation":[{"name":"Computer Science, Artificial Intelligence Department, Aqaba University of Technology, Aqaba, Jordan"}]},{"given":"Laith","family":"Abualigah","sequence":"additional","affiliation":[{"name":"Faculty of Computer Sciences and Informatics, Amman Arab University, Amman, Jordan"}]},{"given":"Muath Ibrahim","family":"Jarrah","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Parit Raja, Malaysia"}]},{"given":"Osama Ahmad","family":"Alomari","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Istanbul Gelisim University, Istanbul, Turkey"}]},{"given":"Mohammad Sh.","family":"Daoud","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Al Ain University of Science and Technology, Abu Dhabi, UAE"}]}],"member":"301","published-online":{"date-parts":[[2020,6,25]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.61"},{"key":"cit0002","first-page":"1","author":"Abualigah L.","year":"2019","journal-title":"Neural Computing & Applications31:"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09420-6"},{"issue":"1","key":"cit0004","volume":"75","author":"Abu-Hashem M. A.","year":"2015","journal-title":"Journal of Theoretical & Applied Information Technology"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3102318"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1186\/s40411-016-0032-7"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2017.55007"},{"key":"cit0008","first-page":"52","volume-title":"Proceedings of the First Taibah University International Conference on Computing and Information Technology (ICCIT 2012), Al-Madinah Al-Munawwarah, Saudi Arabia","author":"Ammar H. H.","year":"2012"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1145\/565816.503275"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1145\/280765.280784"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-934613-67-5.50020-4"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44539-0_8"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1145\/2785592.2785619"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1109\/SE4HPCS.2015.9"},{"key":"cit0015","first-page":"525","volume-title":"Proc. Of Expert Systems in Government Symposium","author":"Brown R.","year":"1985"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3240298"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1201\/9780203757314"},{"issue":"3","key":"cit0018","first-page":"360","volume":"6","author":"Chowdhury M.","year":"2012","journal-title":"Artificial Intelligence Applications to Critical Transportation Issues"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1145\/1067445.1067482"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.21236\/ADA449860"},{"key":"cit0021","first-page":"419","volume-title":"ICALP Satellite Workshops","author":"Depke R.","year":"2000"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1109\/CESYS.2017.8321218"},{"key":"cit0023","doi-asserted-by":"crossref","unstructured":"Eisty, N. U., G. K. Thiruvathukal, and J. C. Carver. 2019. \u201cUse of Software Process in Research Software Development: A Survey.\u201d 3 (3): 180\u2013202.","DOI":"10.1145\/3319008.3319351"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1145\/336595.337046"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91662-0_43"},{"key":"cit0026","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/3194104.3194109","volume-title":"Proceedings of the 6th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering","author":"Feldt R.","year":"2018"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1108\/JGOSS-11-2016-0033"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1145\/149516.149530"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1007\/BF00142926"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.32"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1145\/1836089.1836091"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.metabol.2017.01.011"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1109\/RAISE.2012.6227961"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.47"},{"issue":"12","key":"cit0035","first-page":"3774","volume":"3","author":"Jain P.","year":"2011","journal-title":"International Journal on Computer Science and Engineering"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.4018\/IJOSSP.2018100104"},{"issue":"3","key":"cit0037","first-page":"52","volume":"11","author":"Johanson A.","year":"2018","journal-title":"Computing in Science & Engineering"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1145\/2903220.2903223"},{"key":"cit0039","unstructured":"Kelly, V. E., and U. Nonnenmann. 1987. \u201cInferring Formal Software Specifications from Episodic Descriptions.\u201d InSixth National Conference on Artificial Intelligence, 127-132. Seattle, Washington."},{"issue":"9","key":"cit0040","first-page":"56","volume":"9","author":"Kendall E. A.","year":"1997","journal-title":"JOOP"},{"issue":"1","key":"cit0041","first-page":"77","volume":"9","author":"Kramer M.","year":"2018","journal-title":"Review of Business & Finance Studies"},{"issue":"3","key":"cit0042","first-page":"1","volume":"5","author":"Krishnan M. S.","year":"2015","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1145\/3084100.3084104"},{"key":"cit0044","unstructured":"Kurzweil, R., R. Richter, R. Kurzweil, and M. L. Schneider. 1990.The Age of Intelligent Machines, 579. Cambridge, MA: MIT press."},{"issue":"1","key":"cit0045","first-page":"42","volume":"3","author":"Ma L.","year":"2018","journal-title":"arXiv Preprint arXiv:1810.04538"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2016.080487"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2009.5069054"},{"key":"cit0048","first-page":"319","volume-title":"3 Confer\u00eancia Internacional Sobre Engenharia De Manuten\u00e7\u00e3o (Income-iii 2018)","author":"Meja Ni\u00f1o C.","year":"2018"},{"issue":"3","key":"cit0049","first-page":"249","volume":"21","author":"Menghi C.","year":"2018","journal-title":"arXiv Preprint arXiv:1811.11123"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-758-4.ch014"},{"key":"cit0051","unstructured":"Mistry, S. V. 2017. \u201cHomelessness and Trust: The Effects of Homeless Intake Verification on Relationships.\u201dWashington and Lee University33 (2): 365\u2013374."},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0171-1"},{"key":"cit0053","first-page":"3","volume-title":"Proceedings of the Agent-oriented Information Systems Workshop at the 17th National Conference on Artificial Intelligence","author":"Odell J.","year":"2000"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-408-03741-9.50027-1"},{"key":"cit0055","volume-title":"Engineering Artificial Intelligence Software","volume":"9","author":"Partridge D.","year":"1992"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1145\/568760.568763"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8667.1990.tb00376.x"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1002\/9781119357056.ch10"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2010.06.001"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194091000044"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.773090"},{"issue":"2","key":"cit0062","first-page":"125","volume":"4","author":"Rao P. V.","year":"2018","journal-title":"Journal for Research\u2014 Volume"},{"key":"cit0063","first-page":"10","volume-title":"International MultiConference of Engineers and Computer Scientists (IMECS 2009)","volume":"1","author":"Raza F. N.","year":"2009"},{"issue":"3","key":"cit0064","first-page":"5","volume":"18","author":"Rech J.","year":"2004","journal-title":"KI"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEET.2017.16"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.03.009"},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.09.001"},{"key":"cit0068","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49665-7_6"},{"key":"cit0069","doi-asserted-by":"publisher","DOI":"10.2118\/169507-MS"},{"key":"cit0070","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079972"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1504\/IJRIS.2019.098058"},{"key":"cit0072","doi-asserted-by":"publisher","DOI":"10.1007\/s12539-018-0295-2"},{"key":"cit0073","doi-asserted-by":"publisher","DOI":"10.32890\/jict2018.17.4.8"},{"issue":"12","key":"cit0074","first-page":"24","volume":"4","author":"Shankari K. H.","year":"2014","journal-title":"International Journal of Engineering Research and Applications"},{"key":"cit0075","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36083-2_5"},{"key":"cit0076","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36083-2_6"},{"key":"cit0077","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04570-6"},{"key":"cit0078","first-page":"1","author":"Shehab M.","year":"2020","journal-title":"Engineering with Computers"},{"key":"cit0079","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.02.034"},{"key":"cit0080","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199909\/10)11:5<293::AID-SMR198>3.0.CO;2-R"},{"key":"cit0081","unstructured":"Stewart, J. 2015. \u201cStrong Artificial Intelligence and National Security: Operational and Strategic Implications.\u201d Technical report, naval war college newport ri joint military operations dept."},{"issue":"4","key":"cit0082","first-page":"77","volume":"6","author":"Tahir M.","year":"2016","journal-title":"The Journal of Applied Environmental and Biological Sciences (JAEBS)"},{"issue":"4","key":"cit0083","first-page":"7062","volume":"5","author":"Tamalika B.","year":"2017","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"cit0084","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859053"},{"key":"cit0085","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10701-6"},{"key":"cit0086","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.72"},{"key":"cit0087","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048083"},{"issue":"1","key":"cit0088","volume":"14","author":"Tunio M. Z.","year":"2018","journal-title":"Journal of Information Processing Systems"},{"key":"cit0089","volume-title":"NTNU Computer Science Graduate Student Conference, Norwegian University of Science and Technology","author":"Tveit A.","year":"2001"},{"key":"cit0090","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-016-0530-4"},{"key":"cit0091","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2015.88038"},{"key":"cit0092","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-9636-7_9"},{"key":"cit0093","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00027-3"},{"key":"cit0094","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1165.001.0001","volume-title":"The AI Business: Commercial Uses of Artificial Intelligence","volume":"25","author":"Winston P. H.","year":"1984"},{"key":"cit0095","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3267427"},{"key":"cit0096","first-page":"207","volume-title":"International Workshop on Agent-Oriented Software Engineering","author":"Wood M. F.","year":"2000"},{"key":"cit0097","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:19971026"},{"key":"cit0098","doi-asserted-by":"crossref","unstructured":"Wooldridge, M., N. R. Jennings, and D. Kinny. 1999. \u201cA Methodology for Agent-oriented Analysis and Design.\u201d In\u00a0Proceedings of the third annual conference on Autonomous Agents, 69-76.","DOI":"10.1145\/301136.301165"},{"key":"cit0099","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010071910869"},{"key":"cit0100","doi-asserted-by":"publisher","DOI":"10.1109\/RAISE.2013.6615197"},{"key":"cit0101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99933-3_1"},{"issue":"6","key":"cit0102","first-page":"344","volume":"14","author":"Yampolskiy R. V.","year":"2016","journal-title":"arXiv Preprint arXiv:1610.07997"},{"key":"cit0103","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.11.050"},{"key":"cit0104","first-page":"469","volume-title":"Proceedings Fourth International Conference on MultiAgent Systems","author":"Yim H.","year":"2000"},{"key":"cit0105","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48166-4_16"},{"key":"cit0106","volume-title":"Why Programs Fail: A Guide to Systematic Debugging","volume":"22","author":"Zeller A.","year":"2009"},{"key":"cit0107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69062-7_8"},{"issue":"3","key":"cit0108","volume":"2","author":"Zohair L. M. A.","year":"2018","journal-title":"International Journal of Information Technology and Language Studies"}],"container-title":["International Journal of Computer Integrated Manufacturing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0951192X.2020.1780320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T12:50:17Z","timestamp":1723121417000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0951192X.2020.1780320"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,25]]},"references-count":108,"journal-issue":{"issue":"10-11","published-print":{"date-parts":[[2020,11,1]]}},"alternative-id":["10.1080\/0951192X.2020.1780320"],"URL":"https:\/\/doi.org\/10.1080\/0951192x.2020.1780320","relation":{},"ISSN":["0951-192X","1362-3052"],"issn-type":[{"value":"0951-192X","type":"print"},{"value":"1362-3052","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcim20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcim20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-06-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}