{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:25:05Z","timestamp":1772033105210,"version":"3.50.1"},"reference-count":25,"publisher":"Wiley","license":[{"start":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T00:00:00Z","timestamp":1703635200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2023,12,27]]},"abstract":"<jats:p>Maintenance is one of the costliest phases in the software development process. If architectural design models are accessible, software maintenance can be made more straightforward. When the software\u2019s source code is the only available resource, comprehending the program profoundly impacts the costs associated with software maintenance. The primary objective of comprehending the source code is extracting information used during the software maintenance phase. Generating a structural model based on the program source code is an effective way of reducing overall software maintenance costs. Software module clustering is considered a tremendous reverse engineering technique for constructing structural design models from the program source code. The main objectives of clustering modules are to reduce the quantity of connections between clusters, increase connections within clusters, and improve the quality of clustering. Finding the perfect clustering model is considered an NP-complete problem, and many previous approaches had significant issues in addressing this problem, such as low success rates, instability, and poor modularization quality. This paper applied the horse herd optimization algorithm, a distinctive population-based and discrete metaheuristic technique, in clustering software modules. The proposed method\u2019s effectiveness in addressing the module clustering problem was examined by ten real-world standard software test benchmarks. Based on the experimental data, the quality of the clustered models produced is approximately 3.219, with a standard deviation of 0.0718 across the ten benchmarks. The proposed method surpasses former methods in convergence, modularization quality, and result stability. Furthermore, the experimental results demonstrate the versatility of this approach in effectively addressing various real-world discrete optimization challenges.<\/jats:p>","DOI":"10.1155\/2023\/3988288","type":"journal-article","created":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T19:20:10Z","timestamp":1703704810000},"page":"1-16","source":"Crossref","is-referenced-by-count":8,"title":["A Modified Horse Herd Optimization Algorithm and Its Application in the Program Source Code Clustering"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5202-6315","authenticated-orcid":true,"given":"Bahman","family":"Arasteh","sequence":"first","affiliation":[{"name":"Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, Istanbul, T\u00fcrkiye"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8645-9888","authenticated-orcid":true,"given":"Peri","family":"Gunes","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Istanbul Aydin University, Istanbul, T\u00fcrkiye"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4808-2856","authenticated-orcid":true,"given":"Asgarali","family":"Bouyer","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, Istanbul, T\u00fcrkiye"},{"name":"Department of Software Engineering, Azarbaijan Shahid Madani University, Tabriz, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1588-1659","authenticated-orcid":true,"given":"Farhad","family":"Soleimanian Gharehchopogh","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0146-1450","authenticated-orcid":true,"given":"Hamed","family":"Alipour Banaei","sequence":"additional","affiliation":[{"name":"Department of Electronics, Tabriz Branch, Islamic Azad University, Tabriz, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9073-1576","authenticated-orcid":true,"given":"Reza","family":"Ghanbarzadeh","sequence":"additional","affiliation":[{"name":"Faculty of Science and Engineering, Southern Cross University, Gold Coast, Australia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cl.2016.09.003"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-018-1299-9"},{"key":"3","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.infsof.2016.09.011","article-title":"Improving the modular structure of software system using structural and lexical dependency","volume":"82","author":"J. K. Chhabra","year":"2017","journal-title":"Information and Software Technology"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111349"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2989-x"},{"key":"6","doi-asserted-by":"crossref","article-title":"Software modularization using the modified firefly algorithm","author":"A. Mamaghani","DOI":"10.1109\/MySec.2014.6986037"},{"key":"7","doi-asserted-by":"crossref","article-title":"A multiple hill climbing approach to software module clustering","author":"K. Mahdavi","DOI":"10.1109\/ICSM.2003.1235437"},{"key":"8","doi-asserted-by":"crossref","article-title":"A clustering tool for the recovery and maintenance of software system structures","author":"S. Mancoridis","DOI":"10.1109\/ICSM.1999.792498"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2010.26"},{"key":"10","doi-asserted-by":"crossref","first-page":"449","DOI":"10.3233\/IDT-200070","article-title":"A software modules clustering method using the combination of particle swarm optimisation and genetic algorithms","volume":"14","author":"B. Arasteh","year":"2020","journal-title":"Intelligent Decision Technologies"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03112-0"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1108\/dta-08-2019-0138"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2022.103252"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07781-6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2408"},{"key":"16","first-page":"177","article-title":"Reverse engineering","volume-title":"Practical Reusable Unix Software","author":"Y. Chen","year":"1995"},{"key":"17","doi-asserted-by":"crossref","article-title":"Chava: reverse engineering and tracking of java applets","author":"J. Korn","DOI":"10.1109\/WCRE.1999.806970"},{"key":"18","article-title":"Software module clustering using a hyper-heuristic based multi-objective genetic algorithm","author":"A. C. Kumari"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.09.004"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2016-0253"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.3390\/sym15020401"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106711"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2023.3255003"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00709-4"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.3390\/math10193532"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2023\/3988288.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2023\/3988288.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2023\/3988288.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T19:20:14Z","timestamp":1703704814000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2023\/3988288\/"}},"subtitle":[],"editor":[{"given":"Roberto","family":"Natella","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,12,27]]},"references-count":25,"alternative-id":["3988288","3988288"],"URL":"https:\/\/doi.org\/10.1155\/2023\/3988288","relation":{},"ISSN":["1099-0526","1076-2787"],"issn-type":[{"value":"1099-0526","type":"electronic"},{"value":"1076-2787","type":"print"}],"subject":[],"published":{"date-parts":[[2023,12,27]]}}}