The process of software evaluation is one of the key tasks that are addressed by the quality assurance teams so that the risks in the software suite can be identified and can be removed with prior notifications. Different types of metrics can be used in defect prediction models, and widely used metrics are source code and process metrics. A simulated environment for the entire process shall be generated for multiple scenarios and parameters so that the results and conclusion can be depicted in an effective way. The focus of research is to develop a narrative architecture and design for software risk management using soft computing and nature-inspired approach. The proposed approach titled simulated biological reaction (SBR) is expected to have the effectual results on multiple parameters with the flavor of soft computing-based optimization. The proposed approach shall be integrating the simulation of microbiological process in different substances and elements to produce a new substance.<\/p>","DOI":"10.4018\/ijsppc.2020040104","type":"journal-article","created":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T12:39:44Z","timestamp":1595939984000},"page":"44-54","source":"Crossref","is-referenced-by-count":6,"title":["Design for Software Risk Management Using Soft Computing and Simulated Biological Approach"],"prefix":"10.4018","volume":"12","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0931-1118","authenticated-orcid":true,"given":"Alankrita","family":"Aggarwal","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, IKG Punjab Technical University, Jallandhar, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7911-9244","authenticated-orcid":true,"given":"Kanwalvir S.","family":"Dhindsa","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Baba Banda Singh Bahadur Engineering College, Fatehgarh, India"}]},{"given":"P. K.","family":"Suri","sequence":"additional","affiliation":[{"name":"Kurukshetra University, Kurukshetra, India"}]}],"member":"2432","container-title":["International Journal of Security and Privacy in Pervasive Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=259342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T22:31:52Z","timestamp":1651876312000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSPPC.2020040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijsppc.2020040104","relation":{},"ISSN":["2643-7937","2643-7945"],"issn-type":[{"value":"2643-7937","type":"print"},{"value":"2643-7945","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}