The document proposes a Requirement Opinions Mining Method (ROM) to mine user requirements from software review data. It first defines requirement opinions, functional requirement opinions, and non-functional requirement opinions. It then uses deep learning models to classify reviews into functional and non-functional categories. Functional reviews are further classified into three categories and sequence labeling is used to identify functional requirements. Non-functional reviews are clustered using K-means clustering with word vectors. Finally, specific requirements are extracted from the clusters using TF-IDF and syntactic analysis to realize requirement opinion mining from software review data. A case study is conducted on reviews from a Chinese mobile application platform.
Co-Extracting Opinions from Online ReviewsEditor IJCATR
Exclusion of opinion targets and words from online reviews is an important and challenging task in opinion mining. The
opinion mining is the use of natural language processing, text analysis and computational process to identify and recover the subjective
information in source materials. This paper propose a Supervised word alignment model, which identifying the opinion relation. Rather
than this paper focused on topical relation, in which to extract the relevant information or features only from a particular online reviews.
It is based on feature extraction algorithm to identify the potential features. Finally the items are ranked based on the frequency of
positive and negative reviews. Compared to previous methods, our model captures opinion relation and feature extraction more precisely.
One of the most advantages that our model obtain better precision because of supervised alignment model. In addition, an opinion
relation graph is used to refer the relationship between opinion targets and opinion words.
This document provides a review of sentiment mining and related classifiers. It begins with an introduction to data mining and web mining. It then discusses related work on applying techniques like content, descriptive and network analytics to tweets to gain supply chain insights. The document also covers the basic workflow of opinion mining including preprocessing, feature extraction and selection, and feature weighting. It compares classifiers like Naive Bayes, decision trees, k-nearest neighbor, and support vector machines. Finally, it discusses applications of sentiment analysis in areas like commercial markets, products, maps, software, and voting. It also discusses the importance of opinion mining in governance.
APPLYING OPINION MINING TO ORGANIZE WEB OPINIONSIJCSEA Journal
Rapid increase of opinions on the web requires an effectual system to organize opinions. Opinion mining is a realistically plot and demanding field devoted to detect subjective content in text documents. If opinions are non-structured then it’s difficult for customers and organizations to understand. This study proposes an approach focusing on designing a system to organize web opinions at the time when user is posting, before actually being extracted by expertise. New system (Opinion Organization System) provides four stages. In first stage, it provides a list of several product categories and user selects at least one. In second stage, a list of selected product relevant features is displayed to the user. In third stage, user firstly selects features for which wants to express opinions, then uses polarity based P set and N set containing adjective words list and in fourth stage, uses thumb selection table to add opinions.
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...IRJET Journal
This document discusses using semantic web approaches for web personalization. It begins with an abstract that outlines how web personalization can help address the problem of information overload by recommending and filtering web pages according to a user's interests. The document then reviews related work on using ontologies and semantic web technologies for personalized e-learning, recommender systems, and other applications. It categorizes different semantic web approaches that have been used for web personalization, including their pros and cons. The overall purpose is to survey semantic web techniques for personalization and how they have been applied in previous research.
Framework for Product Recommandation for Review Datasetrahulmonikasharma
In the social networking era, product reviews have a significant influence on the purchase decisions of customers so the market has recognized this problem The problem with this is that the customers do not know how these systems work which results in trust issues. Therefore a different system is needed that helps customers with their need to process the information in product reviews. There are different approaches and algorithms of data filtering and recommendation .Most existing recommender systems were developed for commercial domains with millions of users. In this paper we have discussed the recommendation system and its related research and implemented different techniques of the recommender system .
This document summarizes a research paper that proposes a method for performing sentiment analysis on product reviews to identify promising product features. It involves scraping short reviews from websites, preprocessing the text through cleaning, tokenization and part-of-speech tagging. Next, it uses pattern mining and a custom lexicon dictionary to determine the overall sentiment score and sentiment scores for specific product features. The goal is to analyze which features consumers view most positively to help businesses understand customer preferences.
Analysis on Recommended System for Web Information Retrieval Using HMMIJERA Editor
Web is a rich domain of data and knowledge, which is spread over the world in unstructured manner. The
number of users is continuously access the information over the internet. Web mining is an application of data
mining where web related data is extracted and manipulated for extracting knowledge. The data mining is used
in the domain of web information mining is refers as web mining, that is further divided into three major
domains web uses mining, web content mining and web structure mining. The proposed work is intended to
work with web uses mining. The concept of web mining is to improve the user feedbacks and user navigation
pattern discovery for a CRM system. Finally a new algorithm HMM is used for finding the pattern in data,
which method promises to provide much accurate recommendation.
A Review on Sentimental Analysis of Application ReviewsIJMER
As with rapid evolution of computer technology and smart phones mobile applications
become very important part of our life. It is very difficult for customers to keep track of different
applications reviews so sentimental analysis is used. Sentimental analysis is effective and efficient
evolution of customer’s opinion in real time. Sentimental analysis for applications review is performed
two approaches statistical model based approaches and Natural Language Processing (NLP) based
approaches to create rules. Two schemes used for analyzing the textual comments- aspect level
sentimental analysis analyses the text and provide a label on each aspect then scores on multiple
aspects are aggregated and result for reviews shown in graphs. Second scheme is document level
analyses which comprising of adjectives, adverbs and verbs and n-gram feature extraction. I have also
used our SentiWordNet scheme to compute the document-level sentiment for each movie reviewed
and compared the results with results obtained using Alchemy API. The sentiment profile of a movie is
also compared with the document-level sentiment result. The results obtained show that my scheme
produces a more accurate and focused sentiment profile than the simple document-level sentiment
analysis.
Co-Extracting Opinions from Online ReviewsEditor IJCATR
Exclusion of opinion targets and words from online reviews is an important and challenging task in opinion mining. The
opinion mining is the use of natural language processing, text analysis and computational process to identify and recover the subjective
information in source materials. This paper propose a Supervised word alignment model, which identifying the opinion relation. Rather
than this paper focused on topical relation, in which to extract the relevant information or features only from a particular online reviews.
It is based on feature extraction algorithm to identify the potential features. Finally the items are ranked based on the frequency of
positive and negative reviews. Compared to previous methods, our model captures opinion relation and feature extraction more precisely.
One of the most advantages that our model obtain better precision because of supervised alignment model. In addition, an opinion
relation graph is used to refer the relationship between opinion targets and opinion words.
This document provides a review of sentiment mining and related classifiers. It begins with an introduction to data mining and web mining. It then discusses related work on applying techniques like content, descriptive and network analytics to tweets to gain supply chain insights. The document also covers the basic workflow of opinion mining including preprocessing, feature extraction and selection, and feature weighting. It compares classifiers like Naive Bayes, decision trees, k-nearest neighbor, and support vector machines. Finally, it discusses applications of sentiment analysis in areas like commercial markets, products, maps, software, and voting. It also discusses the importance of opinion mining in governance.
APPLYING OPINION MINING TO ORGANIZE WEB OPINIONSIJCSEA Journal
Rapid increase of opinions on the web requires an effectual system to organize opinions. Opinion mining is a realistically plot and demanding field devoted to detect subjective content in text documents. If opinions are non-structured then it’s difficult for customers and organizations to understand. This study proposes an approach focusing on designing a system to organize web opinions at the time when user is posting, before actually being extracted by expertise. New system (Opinion Organization System) provides four stages. In first stage, it provides a list of several product categories and user selects at least one. In second stage, a list of selected product relevant features is displayed to the user. In third stage, user firstly selects features for which wants to express opinions, then uses polarity based P set and N set containing adjective words list and in fourth stage, uses thumb selection table to add opinions.
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...IRJET Journal
This document discusses using semantic web approaches for web personalization. It begins with an abstract that outlines how web personalization can help address the problem of information overload by recommending and filtering web pages according to a user's interests. The document then reviews related work on using ontologies and semantic web technologies for personalized e-learning, recommender systems, and other applications. It categorizes different semantic web approaches that have been used for web personalization, including their pros and cons. The overall purpose is to survey semantic web techniques for personalization and how they have been applied in previous research.
Framework for Product Recommandation for Review Datasetrahulmonikasharma
In the social networking era, product reviews have a significant influence on the purchase decisions of customers so the market has recognized this problem The problem with this is that the customers do not know how these systems work which results in trust issues. Therefore a different system is needed that helps customers with their need to process the information in product reviews. There are different approaches and algorithms of data filtering and recommendation .Most existing recommender systems were developed for commercial domains with millions of users. In this paper we have discussed the recommendation system and its related research and implemented different techniques of the recommender system .
This document summarizes a research paper that proposes a method for performing sentiment analysis on product reviews to identify promising product features. It involves scraping short reviews from websites, preprocessing the text through cleaning, tokenization and part-of-speech tagging. Next, it uses pattern mining and a custom lexicon dictionary to determine the overall sentiment score and sentiment scores for specific product features. The goal is to analyze which features consumers view most positively to help businesses understand customer preferences.
Analysis on Recommended System for Web Information Retrieval Using HMMIJERA Editor
Web is a rich domain of data and knowledge, which is spread over the world in unstructured manner. The
number of users is continuously access the information over the internet. Web mining is an application of data
mining where web related data is extracted and manipulated for extracting knowledge. The data mining is used
in the domain of web information mining is refers as web mining, that is further divided into three major
domains web uses mining, web content mining and web structure mining. The proposed work is intended to
work with web uses mining. The concept of web mining is to improve the user feedbacks and user navigation
pattern discovery for a CRM system. Finally a new algorithm HMM is used for finding the pattern in data,
which method promises to provide much accurate recommendation.
A Review on Sentimental Analysis of Application ReviewsIJMER
As with rapid evolution of computer technology and smart phones mobile applications
become very important part of our life. It is very difficult for customers to keep track of different
applications reviews so sentimental analysis is used. Sentimental analysis is effective and efficient
evolution of customer’s opinion in real time. Sentimental analysis for applications review is performed
two approaches statistical model based approaches and Natural Language Processing (NLP) based
approaches to create rules. Two schemes used for analyzing the textual comments- aspect level
sentimental analysis analyses the text and provide a label on each aspect then scores on multiple
aspects are aggregated and result for reviews shown in graphs. Second scheme is document level
analyses which comprising of adjectives, adverbs and verbs and n-gram feature extraction. I have also
used our SentiWordNet scheme to compute the document-level sentiment for each movie reviewed
and compared the results with results obtained using Alchemy API. The sentiment profile of a movie is
also compared with the document-level sentiment result. The results obtained show that my scheme
produces a more accurate and focused sentiment profile than the simple document-level sentiment
analysis.
This document discusses various techniques for sentiment analysis of application reviews, including both statistical and natural language processing approaches. It describes how sentiment analysis can be used to analyze textual reviews and classify them as positive or negative. Several key techniques are discussed, such as using machine learning classifiers like Naive Bayes, extracting n-grams and sentiment-oriented words, and developing rule-based models using techniques like identifying parts of speech. The document also discusses using these techniques to perform sentiment analysis at both the document and aspect levels.
This document discusses various techniques for sentiment analysis of application reviews, including both statistical and natural language processing approaches. It describes how sentiment analysis can be used to analyze textual reviews and classify them as positive or negative. Several key techniques are discussed, such as using machine learning classifiers like Naive Bayes, extracting n-grams and sentiment-oriented words, and developing rule-based models using techniques like identifying parts of speech. The document also discusses using these techniques to perform sentiment analysis at both the document and aspect levels.
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...csandit
This paper presents an evaluation methodology to reveal the relationships between the
attributes of software products, practices applied during the development phase and the user
evaluation of the products. For the case study, the games sector has been chosen due to easy
access to the user evaluation of this type of software products. Product attributes and practices
applied during the development phase have been collected from the developers via
questionnaires. User evaluation results were collected from a group of independent evaluators.
Two bipartite networks were created using the gathered data. The first network maps software
products to the practices applied during the development phase and the second network maps
the products to the product attributes. According to the links, similarities were determined and
subgroups of products were obtained according to selected development phase practices. By
this way, the effect of development phase on the user evaluation has been investigated.
IRJET- Hybrid Recommendation System for MoviesIRJET Journal
This document describes a hybrid recommendation system for movies that combines collaborative and content-based filtering. It uses the MovieLens rating dataset and supplements it with additional data from IMDB, such as movie details. Algorithms like nearest neighbors collaborative filtering and content-based filtering are used to provide personalized movie recommendations to users. The system architecture and design are outlined, including user profiles, movie searching, and success prediction for upcoming movies. An evaluation of the system demonstrates how additional content features can improve recommendation accuracy over collaborative filtering alone.
Recommendation System Using Social Networking ijcseit
With the proliferation of electronic commerce and knowledge economy environment both organizations and
individuals generate and consume a large amount of online information. With the huge availability of
product information on website, many times it becomes difficult for a consumer to locate item he wants to
buy. Recommendation Systems [RS] provide a solution to this. Many websites such as YouTube, e-Bay,
Amazon have come up with their own versions of Recommendation Systems. However Issues like lack of
data, changing data, changing user preferences and unpredictable items are faced by these
recommendation systems. In this paper we propose a model of Recommendation systems in e-commerce
domain which will address issues of cold start problem and change in user preference problem. Our work
proposes a novel recommendation system which incorporates user profile parameters obtained from Social
Networking website. Our proposed model SNetRS is a collaborative filtering based algorithm, which
focuses on user preferences obtained from FaceBook. We have taken domain of books to illustrate our
model.
A Survey on Recommendation System based on Knowledge Graph and Machine LearningIRJET Journal
This document provides an overview of recommendation systems based on knowledge graphs and machine learning. It first defines key concepts like recommendation systems, knowledge graphs, meta paths, and knowledge graph embedding. It then discusses standard recommendation approaches like content-based filtering, collaborative filtering, and hybrid filtering. The document focuses on knowledge graph-based recommendation systems, how they address issues with traditional approaches, and how machine learning can be used alongside knowledge graphs. It reviews several papers on using knowledge graphs for recommendations and proposes a comparative study. The document also outlines a proposed recommendation system and potential future research directions in the domain.
This document summarizes a research paper on developing a feature-based product recommendation system. It begins by introducing recommender systems and their importance for e-commerce. It then describes how the proposed system takes basic product descriptions as input, recognizes features using association rule mining and k-nearest neighbor algorithms, and outputs recommended additional features to improve the product profile. The paper evaluates the system's performance on recommending antivirus software features. In under 3 sentences.
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET Journal
This document discusses a proposed system for categorizing search engine results using conceptual clustering. The system analyzes the content of search results to extract relevant concepts, then uses a personalized conceptual clustering algorithm to generate a decision tree of query clusters. This tree can be used to identify categories for web pages and provide topically relevant results to users. The system aims to improve on traditional ranked search results by categorizing results based on the conceptual preferences and interests of individual users.
Enhanced Web Usage Mining Using Fuzzy Clustering and Collaborative Filtering ...inventionjournals
This document discusses an enhanced web usage mining system using fuzzy clustering and collaborative filtering recommendation algorithms. It aims to address challenges with existing recommender systems like producing low quality recommendations for large datasets. The system architecture uses fuzzy clustering to predict future user access based on browsing behavior. Collaborative filtering is then used to produce expected results by combining fuzzy clustering outputs with a web database. This approach aims to provide users with more relevant recommendations in a shorter time compared to other systems.
Tourism Based Hybrid Recommendation SystemIRJET Journal
This paper proposes a hybrid tourism recommendation system that combines collaborative filtering, content-based filtering, and aspect-based sentiment analysis to improve accuracy and address cold start problems. The system analyzes user ratings and reviews to predict ratings for other tourism packages. It stores ratings, reviews, and sentiment information in a database to enhance recommendations. Results showed the hybrid approach increased efficiency over conventional methods. Future work could include testing on additional datasets and expanding the system.
ANALYSIS OF ENTERPRISE SHARED RESOURCE INVOCATION SCHEME BASED ON HADOOP AND Rijaia
The response rate and performance indicators of enterprise resource calls have become an important part
of measuring the difference in enterprise user experience. An efficient corporate shared resource calling
system can significantly improve the office efficiency of corporate users and significantly improve the
fluency of corporate users' resource calling. Hadoop has powerful data integration and analysis
capabilities in resource extraction, while R has excellent statistical capabilities and resource personalized
decomposition and display capabilities in data calling. This article will propose an integration plan for
enterprise shared resource invocation based on Hadoop and R to further improve the efficiency of
enterprise users' shared resource utilization, improve the efficiency of system operation, and bring
enterprise users a higher level of user experience. First, we use Hadoop to extract the corporate shared
resources required by corporate users from the nearby resource storage computer room and
terminal equipment to increase the call rate, and use the R function attribute to convert the user’s search
results into linear correlations, according to the correlation The strong and weak principles are displayed
in order to improve the corresponding speed and experience. This article proposes feasible solutions to the
shortcomings in the current enterprise shared resource invocation. We can use public data sets to perform
personalized regression analysis on user needs, and optimize and integrate most relevant information.
Analysis of Enterprise Shared Resource Invocation Scheme based on Hadoop and R gerogepatton
The response rate and performance indicators of enterprise resource calls have become an important part
of measuring the difference in enterprise user experience. An efficient corporate shared resource calling
system can significantly improve the office efficiency of corporate users and significantly improve the
fluency of corporate users' resource calling. Hadoop has powerful data integration and analysis
capabilities in resource extraction, while R has excellent statistical capabilities and resource personalized
decomposition and display capabilities in data calling. This article will propose an integration plan for
enterprise shared resource invocation based on Hadoop and R to further improve the efficiency of
enterprise users' shared resource utilization, improve the efficiency of system operation, and bring
enterprise users a higher level of user experience. First, we use Hadoop to extract the corporate shared
resources required by corporate users from the nearby resource storage computer room and
terminal equipment to increase the call rate, and use the R function attribute to convert the user’s search
results into linear correlations, according to the correlation The strong and weak principles are displayed
in order to improve the corresponding speed and experience. This article proposes feasible solutions to the
shortcomings in the current enterprise shared resource invocation. We can use public data sets to perform
personalized regression analysis on user needs, and optimize and integrate most relevant information.
IRJET- A New Approach to Product Recommendation SystemsIRJET Journal
1. The document proposes a new approach to product recommendation systems for e-commerce websites that uses multiple algorithms and user verification.
2. It clusters users based on purchase history and recommends products to a user based on the purchases and ratings of similar users, while also considering a user's indicated likes and dislikes.
3. A key aspect is verifying that reviews are from actual customers by requiring users to enter a transaction ID and one-time password sent by email after purchasing a product before they can post a review. This helps reduce fake reviews.
IRJET- A New Approach to Product Recommendation SystemsIRJET Journal
This document proposes a new approach to product recommendation systems for e-commerce websites. It discusses some limitations of current recommendation systems, such as being business motivated or only based on individual user interests. The proposed system aims to find similar users based on their ratings and dislikes to make recommendations. It also implements a verification step to only allow reviews from users who have purchased the product, to ensure reviews are genuine. The system would cluster users based on interests and notify further recommendations to users in the same cluster.
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...cscpconf
This paper presents an evaluation methodology to reveal the relationships between the attributes of software products, practices applied during the development phase and the user
evaluation of the products. For the case study, the games sector has been chosen due to easy access to the user evaluation of this type of software products. Product attributes and practices
applied during the development phase have been collected from the developers via questionnaires. User evaluation results were collected from a group of independent evaluators. Two bipartite networks were created using the gathered data. The first network maps software products to the practices applied during the development phase and the second network maps
the products to the product attributes. According to the links, similarities were determined and subgroups of products were obtained according to selected development phase practices. By this way, the effect of development phase on the user evaluation has been investigated
Video Commercial Image Preference Study Through The Web Analytical ToolCSCJournals
This document discusses adding video commercial files to a web-based analytical tool for conducting consumer surveys. It provides context on web surveys, product presentation methods, and the development of web-based image survey systems. It also reviews literature on commercial design and factors that influence consumer responses to advertisements like spokesperson credibility and consumer involvement. The goal is to integrate dynamic video files into the existing 2D web analytical system to provide more information and an improved method for evaluating consumer preferences and perceptions of brand images through video commercials.
DEVELOPMENT OF WEB APPLICATION FOR PACKAGING DESIGNijma
The majority of One Tambon One Product (OTOP) entrepreneurs desired a new packaging design that attracts the attention of consumers. The aims of this research were to 1) determine the packaging demands of entrepreneurs, 2) develop a conceptual framework for web applications, and 3) create web applications. Finally, 4) to ascertain entrepreneurs' satisfaction with the use of web applications in packaging design. The demographic and sample were recruited from the central region's population, entrepreneurs, and customers. Purposive sampling was used to choose 400 entrepreneurs and customers in Saraburi province. The main result was that requirement of entrepreneursabout package must be easy to portable. And Web Application must be also easy to use. By opinion of experts the result of web application development was overall high level and satisfaction of web application that help entrepreneurs to design package was high level. So the benefit of research is that entrepreneurs had web application to design the package and lower cost.
The document discusses a content-based recommendation system with sentiment analysis. It provides an overview of recommendation systems and their importance. The objectives are to provide personalized recommendations to users based on their preferences using information filtering techniques. Existing systems faced issues like scalability, sparsity, and cold starts. The proposed system is a hybrid approach that combines item-based collaborative filtering with user clustering to make predictions. It will be scalable while addressing cold starts. Tools like Flask, JavaScript, Python are used. Cosine similarity and sentiment analysis techniques are also discussed. The conclusion is that the proposed system can recommend less popular items and future work could include other factors in recommendations.
Develop a robust and effective book recommendation system that provides personalized suggestions to users, enhancing their reading experience and promoting diverse literary exploration.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
This document discusses various techniques for sentiment analysis of application reviews, including both statistical and natural language processing approaches. It describes how sentiment analysis can be used to analyze textual reviews and classify them as positive or negative. Several key techniques are discussed, such as using machine learning classifiers like Naive Bayes, extracting n-grams and sentiment-oriented words, and developing rule-based models using techniques like identifying parts of speech. The document also discusses using these techniques to perform sentiment analysis at both the document and aspect levels.
This document discusses various techniques for sentiment analysis of application reviews, including both statistical and natural language processing approaches. It describes how sentiment analysis can be used to analyze textual reviews and classify them as positive or negative. Several key techniques are discussed, such as using machine learning classifiers like Naive Bayes, extracting n-grams and sentiment-oriented words, and developing rule-based models using techniques like identifying parts of speech. The document also discusses using these techniques to perform sentiment analysis at both the document and aspect levels.
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...csandit
This paper presents an evaluation methodology to reveal the relationships between the
attributes of software products, practices applied during the development phase and the user
evaluation of the products. For the case study, the games sector has been chosen due to easy
access to the user evaluation of this type of software products. Product attributes and practices
applied during the development phase have been collected from the developers via
questionnaires. User evaluation results were collected from a group of independent evaluators.
Two bipartite networks were created using the gathered data. The first network maps software
products to the practices applied during the development phase and the second network maps
the products to the product attributes. According to the links, similarities were determined and
subgroups of products were obtained according to selected development phase practices. By
this way, the effect of development phase on the user evaluation has been investigated.
IRJET- Hybrid Recommendation System for MoviesIRJET Journal
This document describes a hybrid recommendation system for movies that combines collaborative and content-based filtering. It uses the MovieLens rating dataset and supplements it with additional data from IMDB, such as movie details. Algorithms like nearest neighbors collaborative filtering and content-based filtering are used to provide personalized movie recommendations to users. The system architecture and design are outlined, including user profiles, movie searching, and success prediction for upcoming movies. An evaluation of the system demonstrates how additional content features can improve recommendation accuracy over collaborative filtering alone.
Recommendation System Using Social Networking ijcseit
With the proliferation of electronic commerce and knowledge economy environment both organizations and
individuals generate and consume a large amount of online information. With the huge availability of
product information on website, many times it becomes difficult for a consumer to locate item he wants to
buy. Recommendation Systems [RS] provide a solution to this. Many websites such as YouTube, e-Bay,
Amazon have come up with their own versions of Recommendation Systems. However Issues like lack of
data, changing data, changing user preferences and unpredictable items are faced by these
recommendation systems. In this paper we propose a model of Recommendation systems in e-commerce
domain which will address issues of cold start problem and change in user preference problem. Our work
proposes a novel recommendation system which incorporates user profile parameters obtained from Social
Networking website. Our proposed model SNetRS is a collaborative filtering based algorithm, which
focuses on user preferences obtained from FaceBook. We have taken domain of books to illustrate our
model.
A Survey on Recommendation System based on Knowledge Graph and Machine LearningIRJET Journal
This document provides an overview of recommendation systems based on knowledge graphs and machine learning. It first defines key concepts like recommendation systems, knowledge graphs, meta paths, and knowledge graph embedding. It then discusses standard recommendation approaches like content-based filtering, collaborative filtering, and hybrid filtering. The document focuses on knowledge graph-based recommendation systems, how they address issues with traditional approaches, and how machine learning can be used alongside knowledge graphs. It reviews several papers on using knowledge graphs for recommendations and proposes a comparative study. The document also outlines a proposed recommendation system and potential future research directions in the domain.
This document summarizes a research paper on developing a feature-based product recommendation system. It begins by introducing recommender systems and their importance for e-commerce. It then describes how the proposed system takes basic product descriptions as input, recognizes features using association rule mining and k-nearest neighbor algorithms, and outputs recommended additional features to improve the product profile. The paper evaluates the system's performance on recommending antivirus software features. In under 3 sentences.
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET Journal
This document discusses a proposed system for categorizing search engine results using conceptual clustering. The system analyzes the content of search results to extract relevant concepts, then uses a personalized conceptual clustering algorithm to generate a decision tree of query clusters. This tree can be used to identify categories for web pages and provide topically relevant results to users. The system aims to improve on traditional ranked search results by categorizing results based on the conceptual preferences and interests of individual users.
Enhanced Web Usage Mining Using Fuzzy Clustering and Collaborative Filtering ...inventionjournals
This document discusses an enhanced web usage mining system using fuzzy clustering and collaborative filtering recommendation algorithms. It aims to address challenges with existing recommender systems like producing low quality recommendations for large datasets. The system architecture uses fuzzy clustering to predict future user access based on browsing behavior. Collaborative filtering is then used to produce expected results by combining fuzzy clustering outputs with a web database. This approach aims to provide users with more relevant recommendations in a shorter time compared to other systems.
Tourism Based Hybrid Recommendation SystemIRJET Journal
This paper proposes a hybrid tourism recommendation system that combines collaborative filtering, content-based filtering, and aspect-based sentiment analysis to improve accuracy and address cold start problems. The system analyzes user ratings and reviews to predict ratings for other tourism packages. It stores ratings, reviews, and sentiment information in a database to enhance recommendations. Results showed the hybrid approach increased efficiency over conventional methods. Future work could include testing on additional datasets and expanding the system.
ANALYSIS OF ENTERPRISE SHARED RESOURCE INVOCATION SCHEME BASED ON HADOOP AND Rijaia
The response rate and performance indicators of enterprise resource calls have become an important part
of measuring the difference in enterprise user experience. An efficient corporate shared resource calling
system can significantly improve the office efficiency of corporate users and significantly improve the
fluency of corporate users' resource calling. Hadoop has powerful data integration and analysis
capabilities in resource extraction, while R has excellent statistical capabilities and resource personalized
decomposition and display capabilities in data calling. This article will propose an integration plan for
enterprise shared resource invocation based on Hadoop and R to further improve the efficiency of
enterprise users' shared resource utilization, improve the efficiency of system operation, and bring
enterprise users a higher level of user experience. First, we use Hadoop to extract the corporate shared
resources required by corporate users from the nearby resource storage computer room and
terminal equipment to increase the call rate, and use the R function attribute to convert the user’s search
results into linear correlations, according to the correlation The strong and weak principles are displayed
in order to improve the corresponding speed and experience. This article proposes feasible solutions to the
shortcomings in the current enterprise shared resource invocation. We can use public data sets to perform
personalized regression analysis on user needs, and optimize and integrate most relevant information.
Analysis of Enterprise Shared Resource Invocation Scheme based on Hadoop and R gerogepatton
The response rate and performance indicators of enterprise resource calls have become an important part
of measuring the difference in enterprise user experience. An efficient corporate shared resource calling
system can significantly improve the office efficiency of corporate users and significantly improve the
fluency of corporate users' resource calling. Hadoop has powerful data integration and analysis
capabilities in resource extraction, while R has excellent statistical capabilities and resource personalized
decomposition and display capabilities in data calling. This article will propose an integration plan for
enterprise shared resource invocation based on Hadoop and R to further improve the efficiency of
enterprise users' shared resource utilization, improve the efficiency of system operation, and bring
enterprise users a higher level of user experience. First, we use Hadoop to extract the corporate shared
resources required by corporate users from the nearby resource storage computer room and
terminal equipment to increase the call rate, and use the R function attribute to convert the user’s search
results into linear correlations, according to the correlation The strong and weak principles are displayed
in order to improve the corresponding speed and experience. This article proposes feasible solutions to the
shortcomings in the current enterprise shared resource invocation. We can use public data sets to perform
personalized regression analysis on user needs, and optimize and integrate most relevant information.
IRJET- A New Approach to Product Recommendation SystemsIRJET Journal
1. The document proposes a new approach to product recommendation systems for e-commerce websites that uses multiple algorithms and user verification.
2. It clusters users based on purchase history and recommends products to a user based on the purchases and ratings of similar users, while also considering a user's indicated likes and dislikes.
3. A key aspect is verifying that reviews are from actual customers by requiring users to enter a transaction ID and one-time password sent by email after purchasing a product before they can post a review. This helps reduce fake reviews.
IRJET- A New Approach to Product Recommendation SystemsIRJET Journal
This document proposes a new approach to product recommendation systems for e-commerce websites. It discusses some limitations of current recommendation systems, such as being business motivated or only based on individual user interests. The proposed system aims to find similar users based on their ratings and dislikes to make recommendations. It also implements a verification step to only allow reviews from users who have purchased the product, to ensure reviews are genuine. The system would cluster users based on interests and notify further recommendations to users in the same cluster.
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...cscpconf
This paper presents an evaluation methodology to reveal the relationships between the attributes of software products, practices applied during the development phase and the user
evaluation of the products. For the case study, the games sector has been chosen due to easy access to the user evaluation of this type of software products. Product attributes and practices
applied during the development phase have been collected from the developers via questionnaires. User evaluation results were collected from a group of independent evaluators. Two bipartite networks were created using the gathered data. The first network maps software products to the practices applied during the development phase and the second network maps
the products to the product attributes. According to the links, similarities were determined and subgroups of products were obtained according to selected development phase practices. By this way, the effect of development phase on the user evaluation has been investigated
Video Commercial Image Preference Study Through The Web Analytical ToolCSCJournals
This document discusses adding video commercial files to a web-based analytical tool for conducting consumer surveys. It provides context on web surveys, product presentation methods, and the development of web-based image survey systems. It also reviews literature on commercial design and factors that influence consumer responses to advertisements like spokesperson credibility and consumer involvement. The goal is to integrate dynamic video files into the existing 2D web analytical system to provide more information and an improved method for evaluating consumer preferences and perceptions of brand images through video commercials.
DEVELOPMENT OF WEB APPLICATION FOR PACKAGING DESIGNijma
The majority of One Tambon One Product (OTOP) entrepreneurs desired a new packaging design that attracts the attention of consumers. The aims of this research were to 1) determine the packaging demands of entrepreneurs, 2) develop a conceptual framework for web applications, and 3) create web applications. Finally, 4) to ascertain entrepreneurs' satisfaction with the use of web applications in packaging design. The demographic and sample were recruited from the central region's population, entrepreneurs, and customers. Purposive sampling was used to choose 400 entrepreneurs and customers in Saraburi province. The main result was that requirement of entrepreneursabout package must be easy to portable. And Web Application must be also easy to use. By opinion of experts the result of web application development was overall high level and satisfaction of web application that help entrepreneurs to design package was high level. So the benefit of research is that entrepreneurs had web application to design the package and lower cost.
The document discusses a content-based recommendation system with sentiment analysis. It provides an overview of recommendation systems and their importance. The objectives are to provide personalized recommendations to users based on their preferences using information filtering techniques. Existing systems faced issues like scalability, sparsity, and cold starts. The proposed system is a hybrid approach that combines item-based collaborative filtering with user clustering to make predictions. It will be scalable while addressing cold starts. Tools like Flask, JavaScript, Python are used. Cosine similarity and sentiment analysis techniques are also discussed. The conclusion is that the proposed system can recommend less popular items and future work could include other factors in recommendations.
Develop a robust and effective book recommendation system that provides personalized suggestions to users, enhancing their reading experience and promoting diverse literary exploration.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
2. reviews; Next, based on the differences between functional data
and non-functional data, this paper defines three categories on the
description of software functional data, and chooses to use
sequence labeling methods to identify functional requirements
opinion. K-means method based on word vector clusters classified
data, and the results of clustering are mined by TF-IDF and
syntactic analysis to mine specific requirement opinions. Finally,
We have a case study of the user review data of the platform 360
mobile assistants based on the current domestic large mobile
application services.
The second section of this paper discusses related work; The third
section gives some basic definitions involved in this method, and
gives the ROM framework; The fourth section details the method
of requirement opinion mining; the fifth section analyzes the
method of this paper. Section VI summarizes and looks forward to
it.
2. RELATED WORK
With the rapid development of social media platforms over the
past decade, many opinions mining methods based on online
review data have been spawned. Han et al. [6] comprehensively
reviewed the related research on the method of opinion mining.
He separately introduced the two dimensions about the aspects
and opinion of opinion mining. In the aspect extraction study, Jin
et al. [7] used an HMM model with vocabulary to extract aspects.
The method first establishes a set of words consisting of different
vocabularies and their corresponding part of speech, so as to
manually mark the aspects of the review text and the content of
the opinion, and then send them to the HMM. In addition, topic
model methods such as pLSA (probabilistic latent semantic
analysis) and LDA (latent Dirichlet allocation) are also used in
aspect extraction tasks. Hu et al. [8] first thought that nouns and
noun phrases were explicit aspects. The electronic product review
data is tagged with part of speech, and the Apriori algorithm-
based association rule mining method is used to find frequently
occurring nouns and noun phrases as candidate aspects, and then
the wrong phrase is filtered by the pruning algorithm to form
Aspect collection. In the study of the mining of opinions, most
statistical models, the mining opinion of aspect-based are
considered to be sequence tag problems [9]. Some researchers use
corpora to construct rules, preprocess corpus and word frequency
statistics, and then mine features and rules for statistical results,
and then use this rule to extract viewpoint words. In order to
reduce the manual labeling work, more and more scholars use
syntactic dependencies to extract opinion.
The method based on online review mining is mainly to mine
some news, books and products, and hope that users can find
valuable opinions in the reviews data more quickly and accurately,
and the merchants can provide better services for users. In recent
years, with the widespread use of mobile APP, there are more and
more software-based review data, and some research has also
appeared. Mainly adopt the method of classification or topic
extraction: (1) Firstly, classify user reviews. Panichella et al. [10]
found that text analysis, natural language processing, and
sentiment analysis combined to extract features from reviews, and
then use these features to train machine learning classifiers to get
the best classification. Maalej et al. [11] tried a variety of
techniques to process and classify user reviews, and found
through experiments that multiple binary classifiers are superior to
single multivariate classifiers. McIlroy et al. [12] focused on the
multi-label issue of reviews, and thought that a review may
contain multiple questions. The article raised 14 types of
questions and considered them to be independent of the specific
application. The machine learning classifiers such as Naive Bayes,
J48 decision tree and support vector machine are compared.
Finally, the support vector machine is used for classification.
Pagano et al. [13] investigated the specific content of user reviews
on the Apple App Store in 2013 and classified the content
according to the theme. Whether the method is suitable for the
Chinese application market needs further verification. (2) Some
studies use the methods adopted by the topic for review analysis.
Jiang et al. [14] proposed an associated LDA model for the
opinion mining problem domain and applied it to users' online
reviews. The above work only considers the method of
classification or topic extraction. chen et al. [5] combines the
methods of classification and topic extraction, obtains the types of
questions pointed out by the reviews through classification, and
obtains the specific software features in the reviews through topic
mining. A review analysis method RASL based on support vector
machine and topic model was raised.
Although the above work has achieved very objective results, the
subject extraction of the method is greatly affected by the
classified problem set, and it takes too much time for manual
labeling, and the user's needs are not carefully mined. Based on
the reduction of a large number of artificial work, this paper
intends to use the deep learning model to classify non-functional
and functional requirements, and select K-means based on word
vector to cluster the key information of requirement opinions, TF-
IDF and Syntactic analysis is used to mine the requirement
opinion mining of APP-based review data, and extract functional
and non-functional requirement opinions respectively to provide
clearer and more explicit requirement assistance for the
participants of the user story.
3. DEFINITIONS AND THE ROM
FRAMEWORK
This paper combines knowledge in the field of opinion mining
and requirements engineering to define requirement opinions. In
the definition of opinions, Kim et al. [15] proposed to define the
concept of opinions from four perspectives, namely, the aspect,
the opinion holder, the expression and the sentiment. And the four
are related to each other. For a certain subject, the opinion holder
expresses a review containing a certain emotional attitude, which
is the content of the opinion. We expanded the requirement
opinion based on the definition of the opinion. For a certain aspect
of software, the software user expresses some reviews with
emotional attitudes or questionable reviews for the software with
certain specific needs, called requirement opinions, which can be
formalized into the following four-tuples, as defined below:
Definition 1:
Requirement opinions:=
< Software, aspects, software users, emotional attitudes +
aspects of requirements / specific requirements >
For example WeChat: (1) ‘What is the reason why the position is
not used after the upgrade? (2) ‘What version of the particulate
loan is available? My WeChat does not have this function, is it not
qualified enough? In these two reviews, for the WeChat software,
(1) pointed out that the position update after the version update is
not as good as before, and the evaluation of the location of the
new version is low. (2) It is pointed out that this user's WeChat
did not find the particulate loan function, indicating that he has
this requirement.
27
3. Software requirements are generally divided into two categories:
functional requirements and non-functional requirements [16]. We
define functional and non-functional requirements separately.
Functional requirements have a uniform definition, which is the
function of the system or the behavior of the system under certain
conditions. We define the functional requirements opinion
according to this definition: The things of software specific to do
can be described by a set of requirements consisting of functions
and behavior points, as defined as Definition 2 below:
Definition 2:
Functional requirements opinions:=
<Function/specific behavior description, requirement
opinion >
Non-functional requirements are oriented toward the overall
attributes of the software. They usually describe the extent to
which the software satisfies certain attributes and is difficult to
express in a unified way [16]. Jia et al. [17] has divided the non-
functional requirements of the non-functional requirements into
the five categories of non-functional requirements such as
‘performance’, ‘reliability’, ‘availability’, ‘security’,
‘maintainability’. We refer to five categories of non-functional
requirements types to define non-functional requirements. We
classify the review data with these features as non-functional data,
as defined below:
Definition 3:
Non-functional requirement opinions:=
<Five major categories of non-functional requirements
description, requirement reviews>
The preliminary characteristics of the five categories of non-
functional requirements are based on the non-functional
requirements of Jia et al. [17] and their description vocabulary.
Vocabulary specific to the software requirements will be
developed in our next step. Some of the characteristic words are
shown in Table 1 below:
Table 1. Part of the characteristic word display
Aspect Characteristic word
performance
performance 、 high performance 、 time 、 response 、
reaction、delay time、bandwidth、capacity、space、
wait、Calculation、Occupy...
reliability
reliability、 reliable 、 stable 、 complete 、 Consisten 、
Compatible 、 effective 、 Correctness 、 serious 、
malfunction、Failure Rate...
availability
availability 、 Easy to learn 、 Easy to use 、
Understandable 、 operating 、 Attraction) 、 output 、
productive forces、benefit、Experience、interface...
security
security、safety、secret、password、visit、control、
access、jurisdiction、identity、verification、invade、
firewall、reveal...
maintainability
maintainability、maintain、test、detection、analyze、
cohesion 、 coupling 、 module 、 portable 、 reuse 、
quality、code...
Based on the above definitions, the framework of the requirement
opinion mining method (ROMc) is shown in Figure 1. Firstly,
based on the 360 mobile application platform, the review data of
various software is crawled. For details of the crawled content, see
the data description module in Chapter 5, and then classify the
functional data and non-functional data respectively. Extracting
the aspect-level requirements based on this software in these two
types of data, This applies to user story information assistance for
software improvement and software development.
Participants of user story
Non-Function
Requirements
Function -
Requirement
Review data
Classifier
Model
(deep
learning/statistic/r
egulation)
Classified
requirement
s
input
Requirement
opinions
Software
update/developme
nt
assist
train
storage
take out
Review -
datas
requirements
Requireme
nt opinions remand
Figure 1. The framework of ROM.
4. ROM (REQUIREMENT OPINION
MINING METHOD)
4.1 Classification of Requirement Opinions
Based on Deep Learning Methods
The classification techniques selected for different tasks in
domestic and foreign research are also different [18], This paper
chooses a deep learning method to classify the data, which is
divided into two stages: data preprocessing stage and model
training and prediction stage. The data preprocessing stage is
relatively simple, and the main job is to label the data for training
of the classification model. Here, the non-functional data is
marked as 0, the functional data is marked as 1, and the useless
data is marked as 2 based on the definition of functional and non-
functional requirements. After the marked corpus is divided into
training sets, verification sets, and test sets according to a certain
proportion, training can be performed. Here, this article chooses to
use the deep learning method for training (the model structure and
parameter details are not discussed here), the specific training
steps are as follows:
Training steps:
1) Random training samples from the training set 𝑿𝒊 (If it is
batch mode, it is to select multiple samples at the same
time.)
2) Forward propagation of 𝑿𝒊 under the current parameter W
to obtain the loss value
3) According to the chain rule, the backward propagation is
used to obtain the gradient value
𝝏𝒍𝒐𝒔𝒔
𝝏𝒘
4) Update parameter values 𝒘 ← 𝒘 − 𝜶 ∗
𝝏𝒍𝒐𝒔𝒔
𝝏𝒘
5) Cycle through steps 1~4 until the loss meets the target or
reaches the specified number of training rounds and
terminates the training.
28
4. In the process of training, the model can be saved according to the
situation. The saved model is used for prediction. The steps of
neural network prediction are similar to the training process, Just
no backpropagation update parameters are needed, and no
expansion is performed here. In this paper, the predicted data is
unlabeled review data. After the model is predicted, the data can
be classified into three categories according to the model-
predicted tags for further mining. The complete process for the
classification of requirement opinions on supervised methods is
shown in Figure 2.
Figure 2. The Classification flow chart.
In the classification stage of the review data, we first manually
label the native corpus, and then put the labeled corpus into the
model for training. Then save the model to predict the native
corpus, so as to realize the classification of functional and non-
functional data.
4.2 Extraction of Requirement Opinions
Based on Classified Data
As shown in definitions 2 and 3 above, functional data mainly
refers to the functions implemented by the system and reviews
under certain conditions, For example the review data: “Why
didn't WeChat care about tips? It is recommended to set a special
concern sound, and the position after the update is not easy to
use.” which mainly addresses the specific needs of users, In
functional requirements data, we get the functional requirement
opinions of ‘set a special concern sound’ ‘the position after the
update is not easy to use’ and so on. Non-functional data mainly
refers to reviews based on aspects and aspect requirements in
terms of performance, reliability, security and other characteristics.
For example the review data: “Garbage application, Not only
takes up a lot of memory, but also full of ads” This review data
points out the user's emotional needs for performance and
usability in this app, Currently we do not distinguish between
emotional attitudes, We believe that in software development and
iterative updates, both positive and negative attitudes indicate user
needs. Ideally, we get the non-functional requirement opinions of
‘takes up a lot of memory’ ‘full of ads’ and so on. In view of the
large differences between the types of non-functional data and
functional data, We use different methods for different data sets.
We detail the following:
4.2.1 Method for Extracting Requirement Opinions
based on Functional Data
This paper uses BiLSTM + CRF as the model of sequence
labeling, defines three types of functional data descriptions, and
identifies and extracts them. In previous work, We use sequence
labeling method to define and justify the identification of specific
software functions [19], We will not go into details here. This
article redefines software feature categories from another
dimension. In view of the characteristics of functional data based
on software reviews, software function descriptions can be further
divided into three categories, They are function loss (FL), function
improvement (FI), and function complement (FC).It means that
this software is missing some functions required by users, a
certain function already exists but needs to be improved, this
function already exists and has achieved a good user experience.
Examples of category review data are as table 2 show:
Table 2. The category of functional review data
Category Examples
Function improvement ( FI) ‘Chat history is out of sync’...
Function complement(FC) ‘Good, WeChat payment is very convenient’...
Fuction loss(FL) ‘It is recommended to set a special care tone.’...
The framework of the model is mainly composed of a word
embedding layer, a Bi-LSTM layer, and an output layer. It mainly
identifies the functional review data descriptions. Ideally, we get
three types of descriptions of functional requirements, and we
extract the requirements separately. Let's take the function loss
(FL) data as an example. The model framework is as follows in
Figure 3:
Figure 3. Model framework.
4.2.2 Method for Extracting Requirement Opinions
based on Non-functional Data
In view of the many types of software involved in non-functional
data, in order to reduce the manual labeling work, we use the
traditional unsupervised algorithm K-means combined with Tf-idf
and syntactic analysis (hanlp) for requirement opinion extraction.
We perform algorithm demonstration on classified data. Here we
choose to use non-functional requirement review data (NFD). The
detailed algorithm flow is as follows.
Algorithm Description:
Input: collection of text to be clustered
𝑫 = {𝑵𝑭𝑫𝟏, 𝑵𝑭𝑫𝟐, … , 𝑵𝑭𝑫𝑵}, Number of
clusters K.
Output: clustering: {𝑺𝟏, 𝑺𝟐, … , 𝑺𝑲}.
1. Randomly select K samples in D as the initial mean
vector
2. while (when the algorithm convergence condition is not
met):
29
5. 3. for i=1, … , N
4. for k=1, …, K
5. Calculate the distance d
6. 𝒅(𝑵𝑭𝑫𝒊, 𝒎𝒌) = ‖𝑵𝑭𝑫𝒊 − 𝒎𝒌‖𝟐
of the
sample
𝑵𝑭𝑫𝒊to 𝒎𝒌
7. Divide the sample 𝑵𝑭𝑫𝒊 into the cluster where the
nearest mean vector is located 𝒂𝒓𝒈𝐦𝐢𝐧
𝒌
{𝒅(𝑵𝑭𝑫𝒊, 𝒎𝒌)}
8. for i = 1, …, K
9. Update each cluster mean vector:
𝒎𝒌
𝒏𝒆𝒘
=
𝟏
|𝑺𝒌|
∑ 𝑵𝑭𝑫𝒊
𝑵𝑭𝑫𝒊∈𝑺𝒌
In the K-means clustering algorithm, two key points are involved.
The first is the similarity calculation method. In the above
algorithm flow, the Euclidean distance is used as the default
vector similarity calculation method. In the specific application, it
can also be replaced, for example, using cosine as the evaluation
index of similarity. The second point is the representation of this
article. There are two commonly used text representation methods,
One-hot representation method, and word vector representation
method. Text representation in the form of One-hot, although the
calculation is simple, the effect is significantly different from the
representation method of the word vector. Therefore, this paper
chooses the method of using the word vector to represent the text.
After determining the above two points, the clustering algorithm
can be performed. First, the divided text is preprocessed by word
segmentation, part-of-speech tagging, etc., and the word vector is
trained using word2vec. Next, the review text is converted to a
vector representation based on the trained word vector. Then, the
clustering algorithm is called to complete the text clustering. After
the text clustering is completed, we can get K clusters. Ideally, we
think that these K clusters contain the aspect and aspect
requirements or specific requirements we want to mine.
After the clustering algorithm obtains K clusters, we need to
further extract the requirement reviews to get fine-grained aspects
(keywords) and aspect requirements or specific requirements.
There are many ways to further extract aspects (keywords), which
can be done by TF, LDA, Textrank, TF-IDF, etc. Here we choose
to use TF-IDF. The TF in the TF-IDF algorithm represents the
word frequency, and the IDF represents the inverse document
frequency. The word frequency indicates the number of times a
word appears in the current text, and it is assumed that the high-
frequency word contains more information characteristics than the
low-frequency word, so the higher the word frequency, the more
important. The calculation of TF is expressed as follows:
𝑇𝐹𝑖 = 𝑁(𝑡𝑖, 𝑑) (1)
where 𝑡𝑖 represents a word, d represents a document, and N
represents the number of times a word is in a corresponding
document. The document frequency (DF) indicates the number of
documents containing a word in all corpora. The higher the DF
value of a word, the lower the amount of effective information it
contains. Therefore, IDF essentially reflects the importance of
features in the entire corpus. The formula is defined as follows:
𝑖𝑑𝑓𝑖 = log
𝑁
𝑑𝑓𝑖
(2)
where 𝑖𝑑𝑓𝑖 represents the DF of the word 𝑡𝑖, and N is the total
number of documents in the corpus. After calculating the TF and
the IDF, the results of the two are multiplied to obtain the final
TF-IDF value. Intuitively, the TF-IDF algorithm believes that the
most critical point of distinguishing text should be that there are
enough occurrences of the current text and fewer words appear in
all the texts globally.
When applying the TF-IDF algorithm on a clustered cluster, a
basic transformation is required. Here, you only need to treat all
the text in one cluster as a whole, and all the clusters can be used
as a corpus.
With the TF-IDF algorithm, we can extract the keywords (aspects)
in each cluster. The nouns, noun phrases, gerunds, etc. in the
cluster are used as aspects of the user's requirement opinions.
Then re-excavate the review data in the cluster, using the HanLP
tool for syntactic analysis. Establish rules based on relationship
between subject-predicate and verb-object relationship, Adjectives,
verbs, adverb combinations, verb combinations, etc. as the content
of requirement opinions based on aspects with emotional attitudes,
Thus extracting aspect requirements or specific requirements in
the requirement opinion according to the rules. Based on this, we
will dig out the requirement opinions we need.
5. CASE STUDY
5.1 Data Crawling and Description
360 mobile assistant is an application platform with a large
domestic market share, providing a series of services [5] such as
uninstalling, installing, upgrading and evaluating mobile
applications. We currently only crawl the top ten APP review data
of various types of 360 mobile assistants. In each APP's review
data is divided into three levels of reviews, they are good, middle
and bad reviews. This article does not distinguish the three levels
of reviews, no matter what kind of emotions, it may contain
requirements. We crawled the top ten reviews of each app and did
statistics on each type of review data. Later work will further
crawl the data of the 360 mobile assistant according to the needs.
And combine the data of each mobile application market to
achieve a more comprehensive data set. preventing the
requirement opinions of a certain software from being different in
different application markets. so as to achieve more
comprehensive requirement opinions mining. The crawling
statistics of various software review data are as follows in Table 3.
Table 3. Statistics of each category review data
Application category Number of reviews
Theme & wallpaper 16129
Health & care 5291
Office & business 15405
Map & travel 15497
Av audio-visual 11789
Picture & video 11337
Education & study 11124
News & read 10710
Life & leisure 9699
Communication social 8050
Financial management 14900
To facilitate the analysis and display, we select some review data
of the communication social WeChat and QQ for example
analysis. First, we preprocess the crawled data. According to the
30
6. definition of non-functional requirements and functional
requirements in Chapter 3, we mark non-functional data as 0,
functional data as 1, and useless data as 2. The labeled data is
shown in the following Table 4.
Table 4. Data label display
Software
Name
Review data Label
WeChat It is recommended to set a special care tone 1
WeChat Take up a lot of memory 0
WeChat
The most garbage application, full of
advertising, memory thief, send a file and
various restrictions, not easy to use.
0
WeChat
Do you dare to let Ma Huateng Ma Yun go
bankrupt?
2
QQ Garbage, often numbered 0
QQ The new version cannot directly collect text. 1
QQ
I have been playing QQ for five or six years, it
is really my youth.
2
QQ Take up too much space 0
5.2 Requirement Opinion Classification
First, the labeled corpus is divided into training set, verification
set and test set according to the allocation of 7:2:1. The classified
data set is used to train the classification model, and the better-
performing model is saved. Next, load the trained model, classify
it on the unlabeled review corpus, and divide the review into three
parts. We select some of the review data mentioned above to show
the ideal classification effect, as shown in Figure 4.
Figure 4. Classification model ideal rendering.
5.3 Requirement Opinion Mining
After classifying the data, we process the functional and non-
functional data separately. For functional data, we divided the
functional descriptions into three categories. FL, FI, and FC, and
manually labeled them. Use BiLstm + Crf model for training and
prediction on new data to get functional requirements descriptions
for each category. The expected result is shown in Table 5.
For these three categories of requirement descriptions, We directly
extract opinions as functional requirements, The next step can be
fine-grained mining of FC and FI data.
Table 5. The expected result of functional requirement
opinions
Category Description
FL
(Fuction loss)
Input: ‘ It is recommended to set a special care tone.’
Output: B-FC M-FC . ... E-FC
FI
(Fuction improvement)
Input:‘Chat history is out of sync’
Output: B-FL M-BL .... E-BL
FC
(Function
complement)
Input:‘Good, WeChat payment is very convenient’..
Output: B-FI M-BI ... . E-BI
In non-functional data, some examples of WeChat data are
analyzed. First, cluster the requirement opinions to get clusters
that are clustered by certain requirements. Secondly, the
information of keywords (aspects) in the cluster is extracted by
TF-IDF. Finally, based on syntactic analysis, the aspect
requirements are extracted. The ideal result extraction result is
shown in the following figure 5.
Figure 5. The respected result of non-functional requirement
opinions.
The final expected results are shown in the chart below Figure 5.
In the category of social and communication, the requirement
opinion data for WeChat and QQ is divided into non-functional
requirement opinions and functional requirement opinions. The
classification of software requirements comments is convenient
for participants in the user story to inquire the requirements
information in software development and software iterative update.
As shown as figure 6.
Figure 6. Partial mining category display.
31
7. Based on the non-functional requirements comments and
functional requirements of QQ and WeChat based on the
comment data, the results of the demand opinion mining are
shown in Table 6.
Table 6. Requirement opinion mining part results
Software NFROs FROs
WeChat
Take up a lot of memory
More advertising...
set a special care
tone
Real name
certification requires
a bank card...
QQ
More frequent ringing
Take up a lot of memory...
Cannot collect text(
Chat history is out of
sync...
Finally, because the user requirements of each software are
different, but there is a common requirement under the same kind.
For example, in the reviews on the user reviews of WeChat and
QQ, the issue of ‘occupied memory’ is mentioned. Under the
premise of utilizing the uniqueness, We use statistics on non-
functional demand opinions and functional demand opinions
under the premise of using uniqueness. Find out the user’attention
point in non-functional requirements data and functional
requirements data under the communication social category. Store
uniqueness and commonality in some form. It is more convenient
for the participants of the user story to make inquiries about the
requirement comments. So that the method completes the
requirement information auxiliary work. The specific application
process simulation is shown in the following figure7:
Figure 7. Requirement opinion application flow.
6. CONCLUSION AND FUTUREWORKS
This paper proposes a requirement opinion mining method based
on software user reviews data, which aims to find the user's
requirement point for the software, to help the participants of the
user story in the required project to carry out the requirement
information assistance of software improvement or software
development. First, we define requirement opinions, functional
requirements opinions, and non-functional opinions based on the
definitions of opinion mining and requirements engineering. Then
introduce our ROM. We first need to get enough software reviews,
then extract some opinions about the requirements, and mark the
requirements, by the using of the corpus of the labeled to train the
text classification deep learning model, which allows the
annotated corpus to be predicted by the model. Thereby obtaining
3 aspects of data. Next, Targeting different characteristics of
functional and non-functional data, This article adopts BiLSTM +
CRF method and the clustering algorithm based on word vector,
TF-IDF and syntax analysis is used to mine the fine-grained
requirements, and the user's requirement opinions are mined. This
paper mainly realizes the initial construction of the idea of
requirement opinion mining method. The next step will be to
implement the method of requirement opinion mining in this
paper and make adjustments to the model and method according
to the specific problems encountered.
7. REFERENCES
[1] Boehm, B. and Turner, R., 2005. Management challenges to
implementing agile processes in traditional development
organizations. IEEE software, 22(5), pp.30-39.
[2] Cao, L. and Ramesh, B., 2008. Agile requirem000ooents
engineering practices: An empirical study. IEEE
software, 25(1), pp.60-67.
[3] Cohn, M., 2004. User stories applied: For agile software
development. Addison-Wesley Professional.
[4] Wang, CH., Jin, Z., Zhao, HY., Liu, L., Zhang, W. and Cui,
MY., 2019. Human-assisted elicitation and evolution of user
stories with scenarios. Ruan Jian Xue Bao(Chinses Journal
of Software), 30(10), pp.3186-3205.
[5] Chen, Q., Zhang, L., Jiang, J. and Huang, XY., 2018. Review
Analysis Method Based on Support Vector Machine and
Latent Dirichlet Allocation. Ruan Jian Xue Bao(Chinses
Journal of Software), 30(5), pp.1547-1560.
[6] Han, ZM., Li, MQ., Liu, W., Zhang, MM., Duan, DG. and
Yu, CC., 2017. Survey of Studies on Aspect-Based Opinion
Mining of Internet. Ruan Jian Xue Bao(Chinses Journal of
Software), 29(02), pp.417-441.
[7] Jin, W., Ho, H.H. and Srihari, R.K., 2009, June. A novel
lexicalized HMM-based learning framework for web opinion
mining. In Proceedings of the 26th annual international
conference on machine learning, Citeseer, pp.465-472.
[8] Hu, M. and Liu, B., 2004, August. Mining and summarizing
customer reviews. In Proceedings of the tenth ACM
SIGKDD international conference on Knowledge discovery
and data mining, ACM, pp.168-177.
[9] Sterckx, L., Caragea, C., Demeester, T. and Develder, C.,
2016, November. Supervised keyphrase extraction as
positive unlabeled learning. In Proceedings of the 2016
Conference on Empirical Methods in Natural Language
Processing, pp.1924-1929.
[10] Panichella, S., Di Sorbo, A., Guzman, E., Visaggio, C.A.,
Canfora, G. and Gall, H.C., 2015, September. How can i
improve my app? classifying user reviews for software
maintenance and evolution. In 2015 IEEE international
conference on software maintenance and evolution,
IEEE, pp.281-290.
[11] Maalej, W. and Nabil, H., 2015, August. Bug report, feature
request, or simply praise? on automatically classifying app
reviews. In 2015 IEEE 23rd international requirements
engineering conference, IEEE, pp.116-125.
[12] McIlroy, S., Ali, N., Khalid, H. and Hassan, A.E., 2016.
Analyzing and automatically labelling the types of user
issues that are raised in mobile app reviews. Empirical
Software Engineering, 21(3), pp.1067-1106.
[13] Pagano, D. and Maalej, W., 2013, July. User feedback in the
appstore: An empirical study. In 2013 21st IEEE
international requirements engineering conference,
IEEE, pp.125-134.
[14] Jiang, W., Zhang, L., Dai, Y., Jiang, J. and Wang, G., 2013.
Analyzing helpfulness of online reviews for user
32
8. requirements elicitation. Jisuanji Xuebao(Chinese Journal of
Computers), 36(1), pp.119-131.
[15] Kim, S.M. and Hovy, E., 2004, August. Determining the
sentiment of opinions. In Proceedings of the 20th
international conference on Computational Linguistics,
Association for Computational Linguistics, p. 1367.
[16] Luo, XX., Li, ZH. and Zhao, YJ., 2015. Overviews on
software non-functional requirements at home and abroad.
Application Research of Computer, 32(4), pp.972-977.
[17] Jia, YD. And Liu, L., 2019. Recognition and Classification of
Non-functional Requirements in Chinese. Ruan Jian Xue
Bao(Chinses Journal of Software), 30(10), pp.3115-3126.
[18] Nikolai A. K. Steur and Carsten Mueller, 2019.
"Classification of Viral Hemorrhagic Fever Focusing Ebola
and Lassa Fever Using Neural Networks," International
Journal of Machine Learning and Computing vol. 9, pp. 334-
343.
[19] N. Li, L. Zheng, Y. Wang and B. Wang, 2019. "Feature-
Specific Named Entity Recognition in Software
Development Social Content," 2019 IEEE International
Conference on Smart Internet of Things (SmartIoT), pp. 175-
182.
33