To apply Data Mining for Classification of Crowd sourced Software Requirements

被引:14
|
作者
Taj, Soonh [1 ]
Arain, Qasim [1 ]
Memon, Imran [2 ]
Zubedi, Asma [3 ]
机构
[1] MUET, Dept Software Engn, Jamshoro, Hyderabad, Pakistan
[2] Bahria Univ, Dept Comp Sci, Karachi Campus, Karachi, Pakistan
[3] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
来源
PROCEEDINGS OF 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND INFORMATION ENGINEERING (ICSIE 2019) | 2019年
关键词
Crowdsourcing; Requirement elicitation; Data mining; Requirement classification; Functional Requirements and Non-Functional Requirements;
D O I
10.1145/3328833.3328837
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Now a day's main focus of developers is to build quality software that works according to customer needs and for this reason it is necessary to gather right requirements as requirement elicitation is the critical step that impacts on the success of software project as misinterpreted requirements leads to the failure of software project. By keeping this in mind a research is carried out on improving requirements elicitation process and automating the process of classifying requirements. In this research, a model is proposed which will help in this scenario for requirements elicitation and requirement classification. This paper presents a model in which crowd sourcing approach is used so that customers, end users, stakeholders, developers and software engineers can make active participation for requirement elicitation process and requirements gathered using crowdsourcing approach are used by model for classification process i.e. classification of requirements into functional and non-functional requirements. For the proof of proposed model a case study is conducted. Results of case study provided the usefulness and efficiency of proposed model for classification of crowd sourced software requirements.
引用
收藏
页码:42 / 46
页数:5
相关论文
共 50 条
  • [31] Measuring Lineup Difficulty By Matching Distance Metrics With Subject Choices in Crowd-Sourced Data
    Chowdhury, Niladri Roy
    Cook, Dianne
    Hofmann, Heike
    Majumder, Mahbubul
    JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, 2018, 27 (01) : 132 - 145
  • [32] Using Crowd-Sourced Data to Study Public Services: Lessons from Urban India
    Alison E. Post
    Anustubh Agnihotri
    Christopher Hyun
    Studies in Comparative International Development, 2018, 53 : 324 - 342
  • [33] Data mining in software metrics databases
    Dick, S
    Meeks, A
    Last, M
    Bunke, H
    Kandel, A
    FUZZY SETS AND SYSTEMS, 2004, 145 (01) : 81 - 110
  • [34] Using Crowd-Sourced Data to Study Public Services: Lessons from Urban India
    Post, Alison E.
    Agnihotri, Anustubh
    Hyun, Christopher
    STUDIES IN COMPARATIVE INTERNATIONAL DEVELOPMENT, 2018, 53 (03) : 324 - 342
  • [35] Detection and Classification of Malicious Flows in Software-Defined Networks Using Data Mining Techniques
    Amanowicz, Marek
    Jankowski, Damian
    SENSORS, 2021, 21 (09)
  • [36] Mining of Classification Patterns in Clinical Data through Data Mining Algorithms
    Jacob, Shomona Gracia
    Ramani, R. Geetha
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 997 - 1003
  • [37] Software testing data analysis based on data mining
    Wang, Hongpo
    Bai, Linnan
    Ming Jiezhang
    Zhang, Jun
    Li, Qiang
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 682 - 687
  • [38] Apply data mining to Defense-in-Depth network security system
    Huang, NF
    Kao, CN
    Hun, HW
    Jai, GY
    Lin, CL
    AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 159 - 162
  • [39] Data mining requirements for customized goods and services
    Tien, James M.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2006, 5 (04) : 683 - 698
  • [40] Mining software defect data to support software testing management
    Hewett, Rattikorn
    APPLIED INTELLIGENCE, 2011, 34 (02) : 245 - 257