Submitted:
13 April 2025
Posted:
14 April 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Proposed Methodology
2.1. Discuss the Impact of Solution/Competitive Solutions
2.2. Impact of the BetterMood App on People
2.3. BetterMood App Effectiveness in Handling Mental Health Conditions
2.4. Competitor Analysis of the Market
| STRENGTHS + | WEAKNESSES – |
| -Establishment as a well-known brand. -Wide spectrum of mental health professionals. |
-Restricted geographic reach. -Insufficiently tailored services. -Dependency on conventional models for appointments. |
| OPPORTUNITIES + | THREATS – |
| -Entering new markets. -Including services related to telemedicine. |
-Emerging competition. -Regulatory changes. |
| STRENGTHS + | WEAKNESSES – |
| -Cutting-edge telemedicine systems. -User friendly interface. -Affordable pricing model. |
-Restricted mental healthcare professional system. -Dependance on internet connectivity. |
| OPPORTUNITIES + | THREATS – |
| -Working together with healthcare providers. | -Technological disruptions. -Data privacy concerns. |
| STRENGTHS + | WEAKNESSES – |
| -Expertise in a particular area of mental health. -Better treatment plans. |
-Restricted accessibility in rural regions. -High-cost services. -Longer wait times for appointments.  |
| OPPORTUNITIES + | THREATS – |
| -Increasing the reach of the network. -Develop the features of mobile app. -Combining forces with insurers. |
-Regulatory restrictions. -Economic downturns. -Competition from traditional healthcare models. |
| STRENGTHS + | WEAKNESSES – |
|
-Innovative Approach. -Strong Team. -Technological Viability. -Clear Vision and Mission. |
-Dependency on User Feedback. -Limited Market Reach. -Competitor Dominance. |
| OPPORTUNITIES + | THREATS – |
| -Global Expansion. -Strategic Partnership. |
-Economic Factors. -Regulatory Changes. -Emerging Competition. |
3. Commercial Feasibility of the BetterMood App
3.1. Technical and Economic Feasibility Analysis
Technical Feasibility
3.2. Economic Viability
3.3. Business Model and Revenue Strategies
4. System Requirements
4.1. Documentation of Requirements Gathering Elicitation
- Language Setting: Users have the option to select the system language to their preferred language of choice when logging in.
- Assessment: Users undertake a mental health assessment to determine their present state of well-being.
- Personalized Recommendation: Following the unique design of this APP's system and the depiction of the exclusive customization of personal users, we will integrate meditation exercises, audio guidance, sleep sound, breathing exercises and other functions into the personalized recommendation function, after the user has been tested through the psychological test, the professional psychological practitioners and big data analysis will recommend to the user's present most pressing need for the function according to the test result.
- Life Skills: Apart from meditation, BetterMood also provides various life skills and advice like emotional control and relationship enhancement to help users enhance quality of life overall.
- Community Support: Users can interact with other members of the BetterMood community, sharing experiences, providing support, and encouragement.
4.2. Functional and Non-Functional Requirements of The System
| Category | Requirements |
| Functional Requirements | |
| 1. Language Setting | -Upon logging in, users can set the system language to their preferred language. |
| 2. Assessment | -Users undergo a mental health assessment/test to determine their current well-being. |
| 3. Personalized Recommendations | -Based on the assessment results, users receive personalized recommendations. |
| 4. Life-Skills | -In addition to mediation, BetterMood also provides various Life Skills and advice such as emotional management and relationship improvement to help users learn meditation techniques and apply them to daily life. |
| 5. Community Support | -Users can interact with other members of the |
| BetterMood community, sharing experiences, offering support, and encouragement. |
|
| Category | Requirements |
| Non-Functional Requirements | |
| 1. Usability | -The system should be user friendly, user interface that is clear and made to be simple to use and traverse, allowing users easily locate and access the features. |
| 2. Reliability | -The system should be reliable, with minimal downtime to guarantee that the program continues to function even in the case of unforeseen circumstances. |
| 3. Security | -The system must securely handle by the admin. Using safe login procedures to confirm user identities. -Ensuring safe protocols between software and application. |
| 4. Performance | -The system should be responsive to how quickly the app reacts to user events, such as login or sign-in to minimize delay. |
| 5. Scalability | -The system should be scalable to adapt to demand by scaling resources through monitoring. |
| 6. Maintainability | -The system should be easy to maintain and update, allowing quick adjustment to the feature system with significant downtime. |

5. System Analysis and Design
5.1. UML Use Case Diagram (Before)


5.2. UML Class Diagram

5.3. UML Object Diagram




6. Conclusions and Future Enhancement
References
- Babbar, H.; Rani, S.; Masud, M.; Verma, S.; Anand, D.; Jhanjhi, N. Load balancing algorithm for migrating switches in software-defined vehicular networks. Computational Materials and Continua 2021, 67, 67–1301. [Google Scholar] [CrossRef]
- Giorgini, P.; Massacci, F.; Zannone, N. (Eds.). (n.d.). International school on foundations of security analysis and design (pp. 237–272). Springer Berlin Heidelberg.
- Hou, X.; Zhao, Y.; Liu, Y.; Yang, Z.; Wang, K.; Li, L.; … & Wang, H. Large language models for software engineering: A systematic literature review. arXiv 2023, arXiv:2308.10620, arXiv.
- Koç, H.; Erdoğan, A.M.; Barjakly, Y.; Peker, S. UML diagrams in software engineering research: A systematic literature review. Proceedings of MDPI 2021, 74, 13. [Google Scholar]
- Laplante, P.A.; Kassab, M. (2022). What every engineer should know about software engineering. CRC Press.
- Munthe, I.R.; Rambe, B.H.; Pane, R.; Irmayani, D.; Nasution, M. UML modeling and black box testing methods in the school payment information system. Jurnal Mantik 2020, 4, 1634–1640. [Google Scholar]
- Ouhbi, S.; Pombo, N. (2020, April). Software engineering education: Challenges and perspectives. In 2020 IEEE Global Engineering Education Conference (EDUCON) (pp. 202–209).
- Planas, E.; Cabot, J. How are UML class diagrams built in practice? A usability study of two UML tools: MagicDraw and Papyrus. Computer Standards & Interfaces 2020, 67, 103363. [Google Scholar]
- Ralph, P.; Ali, N.B.; Baltes, S.; Bianculli, D.; Diaz, J.; Dittrich, Y.; … & Vegas, S. Empirical standards for software engineering research. arXiv 2020, arXiv:arXiv:2010.03525, arXiv.
- Saeed, S.; Abdullah, A. Analysis of lung cancer patients for data mining tool. International Journal of Computer Science and Network Security 2019, 19, 90–105. [Google Scholar]
- Saeed, S.; Abdullah, A. Combination of brain cancer with hybrid K-NN algorithm using statistical analysis of cerebrospinal fluid (CSF) surgery. International Journal of Computer Science and Network Security 2021, 21, 120–130. [Google Scholar]
- Saeed, S.; Abdullah, A.; Naqvi, M. Implementation of Fourier transformation with brain cancer and CSF images. Indian Journal of Science & Technology 2019, 12, 1–16. [Google Scholar]
- Saeed, S.; Abdullah, A.; Jhanjhi, N.Z.; Naqvi, M.; Nayyar, A. New techniques for efficiently k-NN algorithm for brain tumor detection. Multimedia Tools and Applications 2022, 81, 18595–18616. [Google Scholar] [CrossRef]
- Saeed, S.; Khan, H. Global mortality rate and statistical results of Coronavirus. Infectious Diseases and Tropical Medicine 2021, 1–12. [Google Scholar]
- Tsui, F.; Karam, O.; Bernal, B. (2022). Essentials of software engineering. Jones & Bartlett Learning.
- Alkinani, M.H.; Almazroi, A.A.; Jhanjhi, N.Z.; Khan, N.A. 5G and IoT-based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle. Sensors 2021, 21, 6905. [Google Scholar] [CrossRef] [PubMed]
- Abdullah, A. Investigation of brain cancer with interfacing of 3-dimensional image processing. Indian Journal of Science & Technology 2019, 12, 1–12. [Google Scholar]
- Dogra, V.; Singh, A.; Verma, S.; Kavita, Jhanjhi, N.Z.; Talib, M.N. (2021). Analyzing DistilBERT for sentiment classification of banking financial news. In S. L. Peng, S.Y. Hsieh, S. Gopalakrishnan, & B. Duraisamy (Eds.), Intelligent computing and innovation on data science (Vol. 248, pp. 665–675). Springer. [CrossRef]
- Ralph, P.; Ali, N.B.; Baltes, S.; Bianculli, D.; Diaz, J.; Dittrich, Y.; Vegas, S. Empirical standards for software engineering research. arXiv 2020, arXiv:2010.03525. https://arxiv.org/abs/2010, arXiv. [Google Scholar]
- Aldughayfiq, B.; Ashfaq, F.; Jhanjhi, N.Z.; Humayun, M. Explainable AI for retinoblastoma diagnosis: interpreting deep learning models with LIME and SHAP. Diagnostics 2023, 13, 1932. [Google Scholar] [CrossRef]
- Attaullah, M.; Ali, M.; Almufareh, M.F.; Ahmad, M.; Hussain, L.; Jhanjhi, N.; Humayun, M. Initial stage COVID-19 detection system based on patients’ symptoms and chest X-ray images. Applied Artificial Intelligence 2022, 36, 2055398. [Google Scholar] [CrossRef]
- Gill, S.H.; Razzaq, M.A.; Ahmad, M.; Almansour, F.M.; Haq, I.U.; Jhanjhi, N.Z.; ... & Masud, M. Security and privacy aspects of cloud computing: a smart campus case study. Intelligent Automation & Soft Computing 2022, 31, 117–128.
- Alferidah, D.K.; Jhanjhi, N.Z. (2020, October). Cybersecurity impact over bigdata and iot growth. In 2020 International Conference on Computational Intelligence (ICCI) (pp. 103–108). IEEE.
- Babbar, H.; Rani, S.; Masud, M.; Verma, S.; Anand, D.; Jhanjhi, N. Load balancing algorithm for migrating switches in software-defined vehicular networks. Comput. Mater. Contin 2021, 67, 1301–1316. [Google Scholar]
- Kumar, M.S.; Vimal, S.; Jhanjhi, N.Z.; Dhanabalan, S.S.; Alhumyani, H.A. Blockchain based peer to peer communication in autonomous drone operation. Energy Reports 2021, 7, 7925–7939. [Google Scholar] [CrossRef]
- Jena, K.K.; Bhoi, S.K.; Malik, T.K.; Sahoo, K.S.; Jhanjhi, N.Z.; Bhatia, S.; Amsaad, F. E-learning course recommender system using collaborative filtering models. Electronics 2022, 12, 157. [Google Scholar] [CrossRef]
- Shah, I.A.; Jhanjhi, N.Z.; Laraib, A. (2023). Cybersecurity and blockchain usage in contemporary business. In Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications (pp. 49–64). IGI Global.
- Muzafar, S.; Jhanjhi, N.Z. (2020). Success stories of ICT implementation in Saudi Arabia. In Employing Recent Technologies for Improved Digital Governance (pp. 151–163). IGI Global.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).