A cluster analysis method of software development activities based on event log

被引:0
|
作者
Tang M. [1 ,2 ]
Li T. [3 ]
Zhu R. [1 ]
Ma Z. [1 ]
机构
[1] School of Software, Yunnan University, Kunming
[2] School of Life Sciences, Yunnan Normal University, Kunming
[3] School of Big Data, Yunnan Agricultural University, Kunming
基金
中国国家自然科学基金;
关键词
Clustering analysis; Environment; Event; Event log; Process mining; Software development activity;
D O I
10.2174/2666255813666191204144931
中图分类号
学科分类号
摘要
Background: Event log data generated in the software development process contains historical information and future trends in software development activities. The mining and analysis of event log data contribute to identify and discover software development activities and provide effective support for software development process mining and modeling. Methods: Firstly, a deep learning model (Word2vec) was used for feature extraction and vectorization of software development process event logs. Then, the K-means clustering algorithm and measure of silhouette coefficient and intra-cluster SSE were used for clustering and clustering effect evaluation of vectorized software development process event logs. Results: This paper obtained the mapping relationship between software development activities and events, and realized the identification and discovery of software development activities. Conclusion: Two practical software development projects (jEdit and Argouml) are given to prove the feasibility, rationality and effectiveness of our proposed method. This work provides effective support for software development process mining and software development behavior guidance. © 2021 Bentham Science Publishers.
引用
收藏
页码:1843 / 1851
页数:8
相关论文
共 50 条
  • [21] Semantics-based event log aggregation for process mining and analytics
    Amit V. Deokar
    Jie Tao
    Information Systems Frontiers, 2015, 17 : 1209 - 1226
  • [22] Semantics-based event log aggregation for process mining and analytics
    Deokar, Amit V.
    Tao, Jie
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (06) : 1209 - 1226
  • [23] Method for conformance checking based on token log
    Ge, Ji-Dong (gjd@nju.edu.cn), 2015, Chinese Academy of Sciences (26): : 509 - 532
  • [24] Bayesian network construction from event log for lateness analysis in port logistics
    Sutrisnowati, Riska Asriana
    Bae, Hyerim
    Song, Minseok
    COMPUTERS & INDUSTRIAL ENGINEERING, 2015, 89 : 53 - 66
  • [25] Automated Event Log Analysis With Causal Dependency Graphs for Impact Assessment of Business Processes
    Raptaki, Melina
    Stergiopoulos, George
    Gritzalis, Dimitris
    IEEE ACCESS, 2024, 12 : 194322 - 194339
  • [26] A Temporal Work Transference Event Log Trace Classification Algorithm and Its Experimental Analysis
    Dinh-Lam Pham
    Ahn, Hyun
    Kim, Kwanghoon
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 692 - 696
  • [27] TOOLING SOFTWARE FOR DEVELOPMENT AND EXECUTION SUPPORT OF SCIENTIFIC COMPUTING APPLICATIONS IN CLUSTER SYSTEMS
    Artamonov, Yu. S.
    Vostokin, S. V.
    VESTNIK SAMARSKOGO GOSUDARSTVENNOGO TEKHNICHESKOGO UNIVERSITETA-SERIYA-FIZIKO-MATEMATICHESKIYE NAUKI, 2015, 19 (04): : 785 - 798
  • [28] Towards an Entropy-Based Analysis of Log Variability
    Back, Christoffer Olling
    Debois, Soren
    Slaats, Tijs
    BUSINESS PROCESS MANAGEMENT WORKSHOPS (BPM 2017), 2018, 308 : 53 - 70
  • [29] Fast Conformance Analysis based on Activity Log Abstraction
    Dixit, P. M.
    Verbeek, H. M. W.
    van der Aalst, W. M. P.
    2018 IEEE 22ND INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2018), 2018, : 135 - 144
  • [30] Detecting cross-case associations in an event log: toward a pattern-based detection
    Yael Dubinsky
    Pnina Soffer
    Irit Hadar
    Software and Systems Modeling, 2023, 22 : 1755 - 1777