{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T18:39:59Z","timestamp":1698950399884},"reference-count":52,"publisher":"World Scientific Pub Co Pte Lt","issue":"06","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2021,6]]},"abstract":" Bad smells represent imperfection in the design of the software system and trigger the urge to refactor the source code. The quality of object-oriented software has always been a major concern for the developer team and refactoring techniques help them to focus on this aspect by transforming the code in a way such that the behavior of the software can be preserved. Rigorous research has been done in this field to improve the quality of the software using various techniques. But, one of the issues still remains unsettled, i.e. the overhead effort to refactor the code in order to yield the maximum maintainability value. In this paper, a quantitative evaluation method has been proposed to improve the maintainability value by identifying the most optimum refactoring dependencies in advance with the help of various meta-heuristic algorithms, including A*<\/jats:sup>, AO*<\/jats:sup>, Hill-Climbing and Greedy approaches. A comparison has been done between the maintainability values of the software used, before and after applying the proposed methodology. The results of this study show that the Greedy algorithm is the most promising algorithm amongst all the algorithms in determining the most optimum refactoring sequence resulting in 18.56% and 9.90% improvements in the maintainability values of jTDS and ArtOfIllusion projects, respectively. Further, this study would be beneficial for the software maintenance team as refactoring sequences will be available beforehand, thereby helping the team in maintaining the software with much ease to enhance the maintainability of the software. The proposed methodology will help the maintenance team to focus on a limited portion of the software due to prioritization of the classes, in turn helping them in completing their work within the budget and time constraints. <\/jats:p>","DOI":"10.1142\/s0218194021500248","type":"journal-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T03:43:23Z","timestamp":1624333403000},"page":"803-835","source":"Crossref","is-referenced-by-count":2,"title":["Identifying the Optimal Refactoring Dependencies Using Heuristic Search Algorithms to Maximize Maintainability"],"prefix":"10.1142","volume":"31","author":[{"given":"Anuradha","family":"Chug","sequence":"first","affiliation":[{"name":"University School of Information, Communication & Technology (USICT), Guru Gobind Singh Indraprastha University, Sector \u2013 16C, Dwarka, New Delhi 110078, NCT Delhi, India"}]},{"given":"Sandhya","family":"Tarwani","sequence":"additional","affiliation":[{"name":"University School of Information, Communication & Technology (USICT), Guru Gobind Singh Indraprastha University, Sector \u2013 16C, Dwarka, New Delhi 110078, NCT Delhi, India"}]}],"member":"219","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"S0218194021500248BIB001","first-page":"62","volume":"65","author":"Olmsted B. A.","year":"1998","journal-title":"Def. Couns. J."},{"key":"S0218194021500248BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21378-6_2"},{"key":"S0218194021500248BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405253"},{"key":"S0218194021500248BIB005","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2331057"},{"key":"S0218194021500248BIB006","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler M.","year":"2018"},{"key":"S0218194021500248BIB007","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879216"},{"key":"S0218194021500248BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2015.02.007"},{"key":"S0218194021500248BIB009","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985989"},{"key":"S0218194021500248BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2008.4493342"},{"key":"S0218194021500248BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.84"},{"key":"S0218194021500248BIB012","volume-title":"Microsoft Secrets: How the World\u2019s Most Powerful Software Company Creates Technology, Shapes Markets, and Manages People","author":"Cusumano M. A.","year":"1998"},{"key":"S0218194021500248BIB013","doi-asserted-by":"publisher","DOI":"10.1287\/opre.21.2.498"},{"key":"S0218194021500248BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9313-0"},{"key":"S0218194021500248BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.09.006"},{"key":"S0218194021500248BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2013.6648192"},{"key":"S0218194021500248BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2015.7335413"},{"key":"S0218194021500248BIB018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07881-6_44"},{"key":"S0218194021500248BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9414-4"},{"key":"S0218194021500248BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2015.7106367"},{"key":"S0218194021500248BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2014.69"},{"key":"S0218194021500248BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.73"},{"key":"S0218194021500248BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.18"},{"key":"S0218194021500248BIB024","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.21"},{"key":"S0218194021500248BIB025","doi-asserted-by":"publisher","DOI":"10.1145\/118014.117970"},{"key":"S0218194021500248BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2014.21"},{"key":"S0218194021500248BIB027","first-page":"1","volume":"38","author":"Qayum F.","year":"2010","journal-title":"Electron. Commun. EASST"},{"key":"S0218194021500248BIB028","doi-asserted-by":"publisher","DOI":"10.1145\/2714064.2660239"},{"key":"S0218194021500248BIB029","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.10.007"},{"key":"S0218194021500248BIB030","doi-asserted-by":"publisher","DOI":"10.1145\/1830483.1830731"},{"key":"S0218194021500248BIB031","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.009"},{"key":"S0218194021500248BIB032","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39742-4_11"},{"key":"S0218194021500248BIB033","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.31"},{"key":"S0218194021500248BIB034","doi-asserted-by":"publisher","DOI":"10.1109\/IICIP.2016.7975322"},{"key":"S0218194021500248BIB035","doi-asserted-by":"publisher","DOI":"10.1109\/32.689404"},{"key":"S0218194021500248BIB036","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2006.5.8.a5"},{"key":"S0218194021500248BIB037","doi-asserted-by":"publisher","DOI":"10.1109\/TOOLS.1999.779004"},{"key":"S0218194021500248BIB038","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194016500431"},{"key":"S0218194021500248BIB039","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732033"},{"key":"S0218194021500248BIB040","doi-asserted-by":"publisher","DOI":"10.1109\/STEP.1997.615494"},{"key":"S0218194021500248BIB041","volume-title":"Proc. Workshop Quantitative Methods for Object-Oriented Systems Development","author":"e Abreu F. B.","year":"1995"},{"key":"S0218194021500248BIB042","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2009.5363987"},{"key":"S0218194021500248BIB043","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"S0218194021500248BIB044","volume-title":"Object-Oriented Software Construction","volume":"2","author":"Meyer B.","year":"1988"},{"key":"S0218194021500248BIB045","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358796"},{"key":"S0218194021500248BIB047","author":"Dubey S. K.","year":"2011","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"S0218194021500248BIB048","volume-title":"Principles of Artificial Intelligence","author":"Nilsson N. J.","year":"2014"},{"key":"S0218194021500248BIB049","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell S.","year":"2002"},{"key":"S0218194021500248BIB050","unstructured":"G. T. Heineman and W. T. Councill (eds.), On language interfaces, in Component-Based Software Engineering: Putting the Pieces Together (Addison-Wesley, 2001), p. 5 (hal-01424909f)."},{"key":"S0218194021500248BIB051","doi-asserted-by":"publisher","DOI":"10.1145\/2576768.2598366"},{"key":"S0218194021500248BIB052","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22183-0_4"},{"key":"S0218194021500248BIB053","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09940-8_3"},{"key":"S0218194021500248BIB054","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04566-8"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194021500248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T03:43:38Z","timestamp":1624333418000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194021500248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":52,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10.1142\/S0218194021500248"],"URL":"https:\/\/doi.org\/10.1142\/s0218194021500248","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}