Mining Non-Functional Requirements using Machine Learning Techniques

被引:8
作者
Jindal, Rajni [1 ]
Malhotra, Ruchika [2 ]
Jain, Abha [3 ]
Bansal, Ankita [4 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci Engn, Delhi, India
[2] Delhi Technol Univ, Dept Software Engn, Delhi, India
[3] Delhi Univ, Dept Comp Sci, Delhi, India
[4] Netaji Subhas Univ Technol, Div Informat Technol, Delhi, India
关键词
requirement engineering; text mining; non-functional requirements; machine learning; receiver operating characteristics; CLASSIFICATION; PREDICTION;
D O I
10.37190/e-Inf210105
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Background: Non-Functional Requirements (NFR) have a direct impact on the architecture of the system, thus it is essential to identify NFRs in the initial phases of software development. Aim: The work is based on extraction of relevant keywords from NFR descriptions by employing text mining steps and thereafter classifying these descriptions into one of the nine types of NFRs. Method: For each NFR type, keywords are extracted from a set of pre-categorized specifications using Information-Gain measure. Then models using 8 Machine Learning (ML) techniques are developed for classification of NFR descriptions. A set of 15 projects (containing 326 NFR descriptions) developed by MS students at DePaul University are used to evaluate the models. Results: The study analyzes the performance of ML models in terms of classification and misclassification rate to determine the best model for predicting each type NFR descriptions. The Naive Bayes model has performed best in predicting "maintainability" and "availability" type of NFRs. Conclusion: The NFR descriptions should be analyzed and mapped into their corresponding NFR types during the initial phases. The authors conducted cost benefit analysis to appreciate the advantage of using the proposed models.
引用
收藏
页码:85 / 114
页数:30
相关论文
共 65 条
[1]   What Works Better? A Study of Classifying Requirements [J].
Abad, Zahra Shakeri Hossein ;
Karras, Oliver ;
Ghazi, Parisa ;
Glinz, Martin ;
Ruhe, Guenther ;
Schneider, Kurt .
2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2017, :496-501
[2]   CARDWATCH: A neural network based database mining system for credit card fraud detection [J].
Aleskerov, E ;
Freisleben, B ;
Rao, B .
PROCEEDINGS OF THE IEEE/IAFE 1997 COMPUTATIONAL INTELLIGENCE FOR FINANCIAL ENGINEERING (CIFER), 1997, :220-226
[3]   The Effects of leVectorization Methods on Non-Functional Requirements Classification [J].
Amasaki, Sousuke ;
Leelaprute, Pattara .
44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, :175-182
[4]  
[Anonymous], 2014, TWINPEAKS
[5]  
[Anonymous], 2015, THE
[6]  
Arisholm E., 2006, P 2006 ACMIEEE INT S, P8
[7]   Replicated case studies for investigating quality factors in object-oriented designs [J].
Briand L.C. ;
Wüst J. ;
Lounis H. .
Empirical Software Engineering, 2001, 6 (01) :11-58
[8]   Exploring the relationships between design measures and software quality in object-oriented systems [J].
Briand, LC ;
Wüst, J ;
Daly, JW ;
Porter, DV .
JOURNAL OF SYSTEMS AND SOFTWARE, 2000, 51 (03) :245-273
[9]  
Broomhead D. S., 1988, Complex Systems, V2, P321
[10]   Identification of non-functional requirements in textual specifications: A semi-supervised learning approach [J].
Casamayor, Agustin ;
Godoy, Daniela ;
Campo, Marcelo .
INFORMATION AND SOFTWARE TECHNOLOGY, 2010, 52 (04) :436-445