• Aucun résultat trouvé

Computational Intelligence in Data Mining - Volume 3

N/A
N/A
Protected

Academic year: 2022

Partager "Computational Intelligence in Data Mining - Volume 3"

Copied!
716
0
0

Texte intégral

(1)

Lakhmi C. Jain

Himansu Sekhar Behera Jyotsna Kumar Mandal Durga Prasad Mohapatra

Editors

Computational

Intelligence in Data Mining - Volume 3

SM AR T INNO V A TI O N , SY S T E M S A N D T E C H N O L O GI E S 3 3

Proceedings of the International Conference

on CIDM, 20-21 December 2014

(2)

Smart Innovation, Systems and Technologies

Volume 33

Series editors

Robert J. Howlett, KES International, Shoreham-by-Sea, UK e-mail: rjhowlett@kesinternational.org

Lakhmi C. Jain, University of Canberra, Canberra, Australia, and University of South Australia, Adelaide, Australia

e-mail: Lakhmi.jain@unisa.edu.au

(3)

About this Series

The Smart Innovation, Systems and Technologies book series encompasses the topics of knowledge, intelligence, innovation and sustainability. The aim of the series is to make available a platform for the publication of books on all aspects of single and multi-disciplinary research on these themes in order to make the latest results available in a readily-accessible form. Volumes on interdisciplinary research combining two or more of these areas is particularly sought.

The series covers systems and paradigms that employ knowledge and intelligence in a broad sense. Its scope is systems having embedded knowledge and intelligence, which may be applied to the solution of world problems in industry, the environment and the community. It also focusses on the knowledge- transfer methodologies and innovation strategies employed to make this happen effectively. The combination of intelligent systems tools and a broad range of applications introduces a need for a synergy of disciplines from science, technology, business and the humanities. The series will include conference proceedings, edited collections, monographs, handbooks, reference books, and other relevant types of book in areas of science and technology where smart systems and technologies can offer innovative solutions.

High quality content is an essential feature for all book proposals accepted for the series. It is expected that editors of all accepted volumes will ensure that contributions are subjected to an appropriate level of reviewing process and adhere to KES quality principles.

More information about this series at http://www.springer.com/series/8767

(4)

Lakhmi C. Jain

Himansu Sekhar Behera Jyotsna Kumar Mandal

Durga Prasad Mohapatra

Editors

Computational Intelligence in Data Mining - Volume 3

Proceedings of the International Conference on CIDM, 20-21 December 2014

123

(5)

Editors Lakhmi C. Jain University of Canberra Canberra

Australia and

University of South Australia Adelaide, SA

Australia

Himansu Sekhar Behera

Department of Computer Science and Engineering

Veer Surendra Sai University of Technology

Sambalpur, Odisha India

Jyotsna Kumar Mandal

Department of Computer Science and Engineering

Kalyani University Nadia, West Bengal India

Durga Prasad Mohapatra Department of Computer Science

and Engineering

National Institute of Technology Rourkela Rourkela

India

ISSN 2190-3018 ISSN 2190-3026 (electronic) Smart Innovation, Systems and Technologies

ISBN 978-81-322-2201-9 ISBN 978-81-322-2202-6 (eBook) DOI 10.1007/978-81-322-2202-6

Library of Congress Control Number: 2014956493

Springer New Delhi Heidelberg New York Dordrecht London

©Springer India 2015

This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.

The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.

The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made.

Printed on acid-free paper

Springer (India) Pvt. Ltd. is part of Springer Science+Business Media (www.springer.com)

(6)

Preface

The First International Conference on“Computational Intelligence in Data Mining (ICCIDM-2014)”was hosted and organized jointly by the Department of Computer Science and Engineering, Information Technology and MCA, Veer Surendra Sai University of Technology, Burla, Sambalpur, Odisha, India between 20 and 21 December 2014. ICCIDM is an international interdisciplinary conference covering research and developments in the fields of Data Mining, Computational Intelli- gence, Soft Computing, Machine Learning, Fuzzy Logic, and a lot more. More than 550 prospective authors had submitted their research papers to the conference.

ICCIDM selected 192 papers after a double blind peer review process by experi- enced subject expertise reviewers chosen from the country and abroad. The pro- ceedings of ICCIDM is a nice collection of interdisciplinary papers concerned in various prolific research areas of Data Mining and Computational Intelligence. It has been an honor for us to have the chance to edit the proceedings. We have enjoyed considerably working in cooperation with the International Advisory, Program, and Technical Committees to call for papers, review papers, andfinalize papers to be included in the proceedings.

This International Conference ICCIDM aims at encompassing a new breed of engineers, technologists making it a crest of global success. It will also educate the youth to move ahead for inventing something that will lead to great success. This year’s program includes an exciting collection of contributions resulting from a successful call for papers. The selected papers have been divided into thematic areas including both review and research papers which highlight the current focus of Computational Intelligence Techniques in Data Mining. The conference aims at creating a forum for further discussion for an integrated information field incor- porating a series of technical issues in the frontier analysis and design aspects of different alliances in the relatedfield of Intelligent computing and others. Therefore the call for paper was on three major themes like Methods, Algorithms, and Models in Data mining and Machine learning, Advance Computing and Applications.

Further, papers discussing the issues and applications related to the theme of the conference were also welcomed at ICCIDM.

v

(7)

The proceedings of ICCIDM have been released to mark this great day in ICCIDM which is a collection of ideas and perspectives on different issues and some new thoughts on various fields of Intelligent Computing. We hope the author’s own research and opinions add value to it. First and foremost are the authors of papers, columns, and editorials whose works have made the conference a great success. We had a great time putting together this proceedings. The ICCIDM conference and proceedings are a credit to a large group of people and everyone should be there for the outcome. We extend our deep sense of gratitude to all for their warm encouragement, inspiration, and continuous support for making it possible.

Hope all of us will appreciate the good contributions made and justify our efforts.

vi Preface

(8)

Acknowledgments

The theme and relevance of ICCIDM has attracted more than 550 researchers/

academicians around the globe, which enabled us to select good quality papers and serve to demonstrate the popularity of the ICCIDM conference for sharing ideas and researchfindings with truly national and international communities. Thanks to all who have contributed in producing such a comprehensive conference proceedings of ICCIDM.

The organizing committee believes and trusts that we have been true to the spirit of collegiality that members of ICCIDM value, even as maintaining an elevated standard as we have reviewed papers, provided feedback, and present a strong body of published work in this collection of proceedings. Thanks to all the members of the Organizing committee for their heartfelt support and cooperation.

It has been an honor for us to edit the proceedings. We have enjoyed consid- erably working in cooperation with the International Advisory, Program, and Technical Committees to call for papers, review papers, andfinalize papers to be included in the proceedings.

We express our sincere thanks and obligations to the benign reviewers for sparing their valuable time and effort in reviewing the papers along with sugges- tions and appreciation in improvising the presentation, quality, and content of this proceedings. Without this commitment it would not be possible to have the important reviewer status assigned to papers in the proceedings. The eminence of these papers is an accolade to the authors and also to the reviewers who have guided for indispensable perfection.

We would like to gratefully acknowledge the enthusiastic guidance and con- tinuous support of Prof. (Dr.) Lakhmi Jain, as and when it was needed as well as adjudicating on those difficult decisions in the preparation of the proceedings and impetus to our efforts to publish this proceeding.

Last but not the least, the editorial members of Springer Publishing deserve a special mention and our sincere thanks to them not only for making our dream come true in the shape of this proceedings, but also for its brilliant get-up and in-time publication in Smart, Innovation, System and Technologies, Springer.

vii

(9)

I feel honored to express my deep sense of gratitude to all members of International Advisory Committee, Technical Committee, Program Committee, Organizing Committee, and Editorial Committee members of ICCIDM for their unconditional support and cooperation.

The ICCIDM conference and proceedings are a credit to a large group of people and everyone should be proud of the outcome.

Himansu Sekhar Behera

viii Acknowledgments

(10)

About the Conference

The International Conference on “Computational Intelligence in Data Mining” (ICCIDM-2014) has been established itself as one of the leading and prestigious conference which will facilitate cross-cooperation across the diverse regional research communities within India as well as with other International regional research programs and partners. Such an active dialogue and discussion among International and National research communities is required to address many new trends and challenges and applications of Computational Intelligence in thefield of Science, Engineering and Technology. ICCIDM 2014 is endowed with an oppor- tune forum and a vibrant platform for researchers, academicians, scientists, and practitioners to share their original research findings and practical development experiences on the new challenges and budding confronting issues.

The conference aims to:

• Provide an insight into current strength and weaknesses of current applications as well as researchfindings of both Computational Intelligence and Data Mining.

• Improve the exchange of ideas and coherence between the various Computational Intelligence Methods.

• Enhance the relevance and exploitation of data mining application areas for end- user as well as novice user application.

• Bridge research with practice that will lead to a fruitful platform for the devel- opment of Computational Intelligence in Data mining for researchers and practitioners.

• Promote novel high quality research findings and innovative solutions to the challenging problems in Intelligent Computing.

• Make a tangible contribution to some innovative findings in the field of data mining.

• Provide research recommendations for future assessment reports.

ix

(11)

So, we hope the participants will gain new perspectives and views on current research topics from leading scientists, researchers, and academicians around the world, contribute their own ideas on important research topics like Data Mining and Computational Intelligence, as well as network and collaborate with their interna- tional counterparts.

x About the Conference

(12)

Conference Committee

Patron

Prof. E. Saibaba Reddy

Vice Chancellor, VSSUT, Burla, Odisha, India Convenor

Dr. H.S. Behera

Department of CSE and IT, VSSUT, Burla, Odisha, India Co-Convenor

Dr. M.R. Kabat

Department of CSE and IT, VSSUT, Burla, Odisha, India Organizing Secretary

Mr. Janmenjoy Nayak, DST INSPIRE Fellow, Government of India

Conference Chairs

Honorary General Chair

Prof. P K. Dash, Ph.D., D.Sc., FNAE, SMIEEE, Director Multi Disciplinary Research Center, S‘O’A University, India

Prof. Lakhmi C. Jain, Ph.D., M.E., B.E.(Hons), Fellow (Engineers Australia), University of Canberra, Canberra, Australia and University of South Australia, Adelaide, SA, Australia

Honorary Advisory Chair

Prof. Shankar K. Pal, Distinguished Professor Indian Statistical Institute, Kolkata, India General Chair

Prof. Rajib Mall, Ph.D., Professor and Head

Department of Computer Science and Engineering, IIT Kharagpur, India

xi

(13)

Program Chairs

Dr. Sukumar Mishra, Ph.D., Professor Department of EE, IIT Delhi, India Dr. R.P. Panda, Ph.D., Professor

Department of ETC, VSSUT, Burla, Odisha, India Dr. J.K. Mandal, Ph.D., Professor

Department of CSE, University of Kalyani, Kolkata, India Finance Chair

Dr. D. Dhupal, Coordinator, TEQIP, VSSUT, Burla Volume Editors

Prof. Lakhmi C. Jain, Ph.D., M.E., B.E.(Hons), Fellow (Engineers Australia), University of Canberra, Canberra, Australia and University of South Australia, Adelaide, SA, Australia

Prof. H.S. Behera, Reader, Department of Computer Science Engineering and Information Technology, Veer Surendra Sai University of Technology, Burla, Odisha, India

Prof. J.K. Mandal, Professor, Department of Computer Science and Engineering, University of Kalyani, Kolkata, India

Prof. D.P. Mohapatra, Associate Professor, Department of Computer Science and Engineering, NIT, Rourkela, Odisa, India

International Advisory Committee

Prof. C.R. Tripathy (VC, Sambalpur University) Prof. B.B. Pati (VSSUT, Burla)

Prof. A.N. Nayak (VSSUT, Burla) Prof. S. Yordanova (STU, Bulgaria)

Prof. P. Mohapatra (University of California) Prof. S. Naik (University of Waterloo, Canada) Prof. S. Bhattacharjee (NIT, Surat)

Prof. G. Saniel (NIT, Durgapur)

Prof. K.K. Bharadwaj (JNU, New Delhi) Prof. Richard Le (Latrob University, Australia) Prof. K.K. Shukla (IIT, BHU)

Prof. G.K. Nayak (IIIT, BBSR) Prof. S. Sakhya (TU, Nepal)

Prof. A.P. Mathur (SUTD, Singapore) Prof. P. Sanyal (WBUT, Kolkata) Prof. Yew-Soon Ong (NTU, Singapore) Prof. S. Mahesan (Japfna University, Srilanka) Prof. B. Satapathy (SU, SBP)

xii Conference Committee

(14)

Prof. G. Chakraborty (IPU, Japan) Prof. T.S. Teck (NU, Singapore) Prof. P. Mitra (P.S. University, USA) Prof. A. Konar (Jadavpur University) Prof. S. Das (Galgotias University) Prof. A. Ramanan (UJ, Srilanka) Prof. Sudipta Mohapatra, (IIT, KGP) Prof. P. Bhattacharya (NIT, Agaratala) Prof. N. Chaki (University of Calcutta) Dr. J.R. Mohanty, (Registrar, VSSUT, Burla) Prof. M.N. Favorskaya (SibSAU)

Mr. D. Minz (COF, VSSUT, Burla) Prof. L.M. Patnaik (DIAT, Pune) Prof. G. Panda (IIT, BHU) Prof. S.K. Jena (NIT, RKL)

Prof. V.E. Balas (University of Arad) Prof. R. Kotagiri (University of Melbourne) Prof. B.B. Biswal (NIT, RKL)

Prof. Amit Das (BESU, Kolkata) Prof. P.K. Patra (CET, BBSR) Prof. N.G.P.C Mahalik (California) Prof. D.K. Pratihar (IIT, KGP) Prof. A. Ghosh (ISI, Kolkata) Prof. P. Mitra (IIT, KGP) Prof. P.P. Das (IIT, KGP) Prof. M.S. Rao (JNTU, HYD) Prof. A. Damodaram (JNTU, HYD) Prof. M. Dash (NTU, Singapore) Prof. I.S. Dhillon (University of Texas) Prof. S. Biswas (IIT, Bombay)

Prof. S. Pattnayak (S‘O’A, BBSR) Prof. M. Biswal (IIT, KGP) Prof. Tony Clark (M.S.U, UK) Prof. Sanjib ku. Panda (NUS) Prof. G.C. Nandy (IIIT, Allahabad) Prof. R.C. Hansdah (IISC, Bangalore) Prof. S.K. Basu (BHU, India) Prof. P.K. Jana (ISM, Dhanbad) Prof. P.P. Choudhury (ISI, Kolkata) Prof. H. Pattnayak (KIIT, BBSR) Prof. P. Srinivasa Rao (AU, Andhra)

Conference Committee xiii

(15)

International Technical Committee

Dr. Istvan Erlich, Ph.D., Chair Professor, Head

Department of EE and IT, University of DUISBURG-ESSEN, Germany Dr. Torbjørn Skramstad, Professor,

Department of Computer and System Science, Norwegian University of Science and Technology, Norway

Dr. P.N. Suganthan, Ph.D., Associate Professor School of EEE, NTU, Singapore

Prof. Ashok Pradhan, Ph.D., Professor Department of EE, IIT Kharagpur, India Dr. N.P. Padhy, Ph.D., Professor Department of EE, IIT, Roorkee, India Dr. B. Majhi, Ph.D., Professor

Department of Computer Science and Engineering, N.I.T Rourkela Dr. P.K. Hota, Ph.D., Professor

Department of EE, VSSUT, Burla, Odisha, India Dr. G. Sahoo, Ph.D., Professor

Head, Department of IT, B.I.T, Meshra, India Dr. Amit Saxena, Ph.D., Professor

Head, Department of CS and IT, CU, Bilashpur, India Dr. Sidhartha Panda, Ph.D., Professor

Department of EEE, VSSUT, Burla, Odisha, India Dr. Swagatam Das, Ph.D., Associate Professor Indian Statistical Institute, Kolkata, India

Dr. Chiranjeev Kumar, Ph.D., Associate Professor and Head Department of CSE, Indian School of Mines (ISM), Dhanbad Dr. B.K. Panigrahi, Ph.D., Associate Professor

Department of EE, IIT Delhi, India Dr. A.K. Turuk, Ph.D., Associate Professor Head, Department of CSE, NIT, RKL, India Dr. S. Samantray, Ph.D., Associate Professor Department of EE, IIT BBSR, Odisha, India Dr. B. Biswal, Ph.D., Professor

Department of ETC, GMRIT, A.P., India Dr. Suresh C. Satpathy, Professor, Head

Department of Computer Science and Engineering, ANITS, AP, India Dr. S. Dehuri, Ph.D., Associate Professor

Department of System Engineering, Ajou University, South Korea Dr. B.B. Mishra, Ph.D., Professor,

Department of IT, S.I.T, BBSR, India Dr. G. Jena, Ph.D., Professor

Department of CSE, RIT, Berhampu, Odisha, India Dr. Aneesh Krishna, Assistant Professor

Department of Computing, Curtin University, Perth, Australia

xiv Conference Committee

(16)

Dr. Ranjan Behera, Ph.D., Assistant Professor Department of EE, IIT, Patna, India

Dr. A.K. Barisal, Ph.D., Reader

Department of EE, VSSUT, Burla, Odisha, India Dr. R. Mohanty, Reader

Department of CSE, VSSUT, Burla

Conference Steering Committee

Publicity Chair

Prof. A. Rath, DRIEMS, Cuttack Prof. B. Naik, VSSUT, Burla Mr. Sambit Bakshi, NIT, RKL Logistic Chair

Prof. S.P. Sahoo, VSSUT, Burla Prof. S.K. Nayak, VSSUT, Burla Prof. D.C. Rao, VSSUT, Burla Prof. K.K. Sahu, VSSUT, Burla Organizing Committee Prof. D. Mishra, VSSUT, Burla Prof. J. Rana, VSSUT, Burla Prof. P.K. Pradhan, VSSUT, Burla Prof. P.C. Swain, VSSUT, Burla Prof. P.K. Modi, VSSUT, Burla Prof. S.K. Swain, VSSUT, Burla Prof. P.K. Das, VSSUT, Burla Prof. P.R. Dash, VSSUT, Burla Prof. P.K. Kar, VSSUT, Burla Prof. U.R. Jena, VSSUT, Burla Prof. S.S. Das, VSSUT, Burla Prof. Sukalyan Dash, VSSUT, Burla Prof. D. Mishra, VSSUT, Burla Prof. S. Aggrawal, VSSUT, Burla Prof. R.K. Sahu, VSSUT, Burla Prof. M. Tripathy, VSSUT, Burla Prof. K. Sethi, VSSUT, Burla Prof. B.B. Mangaraj, VSSUT, Burla Prof. M.R. Pradhan, VSSUT, Burla Prof. S.K. Sarangi, VSSUT, Burla Prof. N. Bhoi, VSSUT, Burla Prof. J.R. Mohanty, VSSUT, Burla

Conference Committee xv

(17)

Prof. Sumanta Panda, VSSUT, Burla Prof. A.K. Pattnaik, VSSUT, Burla Prof. S. Panigrahi, VSSUT, Burla Prof. S. Behera, VSSUT, Burla Prof. M.K. Jena, VSSUT, Burla Prof. S. Acharya, VSSUT, Burla Prof. S. Kissan, VSSUT, Burla Prof. S. Sathua, VSSUT, Burla Prof. E. Oram, VSSUT, Burla Dr. M.K. Patel, VSSUT, Burla Mr. N.K.S. Behera, M.Tech. Scholar Mr. T. Das, M.Tech. Scholar Mr. S.R. Sahu, M.Tech. Scholar Mr. M.K. Sahoo, M.Tech. Scholar Prof. J.V.R. Murthy, JNTU, Kakinada Prof. G.M.V. Prasad, B.V.CIT, AP Prof. S. Pradhan, UU, BBSR Prof. P.M. Khilar, NIT, RKL Prof. Murthy Sharma, BVC, AP Prof. M. Patra, BU, Berhampur Prof. M. Srivastava, GGU, Bilaspur Prof. P.K. Behera, UU, BBSR Prof. B.D. Sahu, NIT, RKL

Prof. S. Baboo, Sambalpur University Prof. Ajit K. Nayak, S‘O’A, BBSR Prof. Debahuti Mishra, ITER, BBSR Prof. S. Sethi, IGIT, Sarang

Prof. C.S. Panda, Sambalpur University Prof. N. Kamila, CVRCE, BBSR Prof. H.K. Tripathy, KIIT, BBSR Prof. S.K. Sahana, BIT, Meshra Prof. Lambodar Jena, GEC, BBSR Prof. R.C. Balabantaray, IIIT, BBSR Prof. D. Gountia, CET, BBSR Prof. Mihir Singh, WBUT, Kolkata Prof. A. Khaskalam, GGU, Bilaspur Prof. Sashikala Mishra, ITER, BBSR Prof. D.K. Behera, TAT, BBSR Prof. Shruti Mishra, ITER, BBSR Prof. H. Das, KIIT, BBSR Mr. Sarat C. Nayak, Ph.D. Scholar Mr. Pradipta K. Das, Ph.D. Scholar Mr. G.T. Chandrasekhar, Ph.D. Scholar Mr. P. Mohanty, Ph.D. Scholar

Mr. Sibarama Panigrahi, Ph.D. Scholar

xvi Conference Committee

(18)

Mr. A.K. Bhoi, Ph.D. Scholar Mr. T.K. Samal, Ph.D. Scholar Mr. Ch. Ashutosh Swain, MCA Mr. Nrusingh P. Achraya, MCA Mr. Devi P. Kanungo, M.Tech. Scholar Mr. M.K. Sahu, M.Tech. Scholar

Conference Committee xvii

(19)

Contents

Conceptual Modeling of Non-Functional Requirements

from Natural Language Text. . . 1 S. Abirami, G. Shankari, S. Akshaya and M. Sithika

A Genetic Algorithm Approach for Multi-criteria Project

Selection for Analogy-Based Software Cost Estimation . . . 13 Sweta Kumari and Shashank Pushkar

A Service-Oriented Architecture (SOA) Framework Component

for Verification of Choreography. . . 25 Prachet Bhuyan, Abhishek Ray and Durga Prasad Mohapatra

Migration of Agents in Artificial Agent Societies: Framework

and State-of-the-Art. . . 37 Harjot Kaur, Karanjeet Singh Kahlon and Rajinder Singh Virk

Automated Colour Segmentation of Malaria Parasite

with Fuzzy and Fractal Methods . . . 53 M.L. Chayadevi and G.T. Raju

Syllable Based Concatenative Synthesis for Text

to Speech Conversion. . . 65 S. Ananthi and P. Dhanalakshmi

Kannada Stemmer and Its Effect on Kannada Documents

Classification. . . 75 N. Deepamala and P. Ramakanth Kumar

Boosting Formal Concept Analysis Based Definition Extraction

via Named Entity Recognition . . . 87 G.S. Mahalakshmi and A.L. Agasta Adline

xix

(20)

Harmonic Reduction Using PV Fuzzy with Inverter . . . 99 Subha Darsini Misra, Tapas Mohapatra and Asish K Nanda

Experimental Validation of a Fuzzy Model for Damage

Prediction of Composite Beam Structure . . . 109 Deepak K. Agarwalla, Amiya K. Dash and Biswadeep Tripathy

A Comparative View of AoA Estimation in WSN Positioning . . . 123 Sharmilla Mohapatra, Sasmita Behera and C.R. Tripathy

Multi-strategy Based Matching Technique for Ontology

Integration . . . 135 S. Kumar and V. Singh

Impact of Fuzzy Logic Based UPFC Controller on Voltage Stability

of a Stand-Alone Hybrid System . . . 149 Asit Mohanty and Meera Viswavandya

A Novel Modified Apriori Approach for Web

Document Clustering. . . 159 Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra

and Sanjay Kumar Sahay

Sliding-Window Based Method to Discover High Utility

Patterns from Data Streams. . . 173 Chiranjeevi Manike and Hari Om

Important Author Analysis in Research Professionals’

Relationship Network Based on Social Network Analysis Metrics . . . . 185 Manoj Kumar Pandia and Anand Bihari

Predicting Software Development Effort Using Tuned

Artificial Neural Network. . . 195 H.S. Hota, Ragini Shukla and S. Singhai

Computer Vision Based Classification of Indian Gujarat-17

Rice Using Geometrical Features and Cart. . . 205 Chetna V. Maheshwari, Niky K. Jain and Samrat Khanna

A Novel Feature Extraction and Classification Technique for Machine Learning Using Time Series and Statistical

Approach . . . 217 R.C. Barik and B. Naik

xx Contents

(21)

Implementation of 32-Point FFT Processor for OFDM System. . . 229 G. Soundarya, V. Jagan Naveen and D. Tirumala Rao

Performance Analysis of Microstrip Antenna Using GNU

Radio with USRP N210. . . 239 S. Santhosh, S.J. Arunselvan, S.H. Aazam, R. Gandhiraj

and K.P. Soman

Selection of Control Parameters of Differential Evolution

Algorithm for Economic Load Dispatch Problem . . . 251 Narendra Kumar Yegireddy, Sidhartha Panda, Umesh kumar Rout

and Rama Kishore Bonthu

Wireless QoS Routing Protocol (WQRP): Ensuring Quality

of Service in Mobile Adhoc Networks. . . 261 Nishtha Kesswani

CS-ATMA: A Hybrid Single Channel MAC Layer Protocol

for Wireless Sensor Networks . . . 271 Sonali Mishra, Rakesh Ranjan Swain, Tushar Kanta Samal

and Manas Ranjan Kabat

Energy Efficient Reliable Data Delivery in Wireless Sensor

Networks for Real Time Applications. . . 281 Prabhudutta Mohanty, Manas Ranjan Kabat

and Manoj Kumar Patel

A Rule Induction Model Empowered by Fuzzy-Rough Particle Swarm Optimization Algorithm for Classification

of Microarray Dataset. . . 291 Sujata Dash

Bird Mating Optimization Based Multilayer Perceptron

for Diseases Classification . . . 305 N.K.S. Behera, A.R. Routray, Janmenjoy Nayak and H.S. Behera

Comparison and Prediction of Monthly Average Solar Radiation

Data Using Soft Computing Approach for Eastern India. . . 317 Sthitapragyan Mohanty, Prashanta Kumar Patra and Sudhansu S. Sahoo

Effect of Thermal Radiation on Unsteady Magnetohydrodynamic

Free Convective Flow in Vertical Channel in Porous Medium. . . 327 J.P. Panda

Contents xxi

(22)

A Fuzzy Based Approach for the Selection of Software

Testing Automation Framework. . . 335 Mohd Sadiq and Fahamida Firoze

Time Frequency Analysis and Classification of Power Quality

Events Using Bacteria Foraging Algorithm. . . 345 S. Jagadeesh and B. Biswal

Non-Stationary Signal Analysis Using Time Frequency

Transform. . . 353 M. Kasi Subrahmanyam and Birendra Biswal

Multivariate Linear Regression Model for Host Based

Intrusion Detection . . . 361 Sunil Kumar Gautam and Hari Om

CBDF Based Cooperative Multi Robot Target Searching

and Tracking Using BA. . . 373 Sanjeev Sharma, Chiranjib Sur, Anupam Shukla and Ritu Tiwari

A Highly Robust Proxy Enabled Overload Monitoring

System (P-OMS) for E-Business Web Servers. . . 385 S.V. Shetty, H. Sarojadevi and B. Sriram

Short Term Hydro Thermal Scheduling Using Invasive

Weed Optimization Technique. . . 395 A.K. Barisal, R.C. Prusty, S.S. Dash and S.K. Kisan

Contourlet Transform Based Feature Extraction Method

for Finger Knuckle Recognition System . . . 407 K. Usha and M. Ezhilarasan

CDM Controller Design for Non-minimum Unstable Higher

Order System . . . 417 T.V. Dixit, Nivedita Rajak, Surekha Bhusnur and Shashwati Ray

Model Based Test Case Prioritization Using Association

Rule Mining . . . 429 Arup Abhinna Acharya, Prateeva Mahali and Durga Prasad Mohapatra

Rank Based Ant Algorithm for 2D-HP Protein Folding. . . 441 N. Thilagavathi and T. Amudha

xxii Contents

(23)

Boolean Operations on Free Form Shapes in a Level

Set Framework. . . 453 V.R. Bindu and K.N. Ramachandran Nair

Feature Extraction and Recognition of Ancient Kannada

Epigraphs. . . 469 A. Soumya and G. Hemantha Kumar

eKMP: A Proposed Enhancement of KMP Algorithm. . . 479 Nitashi Kalita, Chitra, Radhika Sharma and Samarjeet Borah

Acquisition and Analysis of Robotic Data Using Machine

Learning Techniques. . . 489 Shivendra Mishra, G. Radhakrishnan, Deepa Gupta

and T.S.B. Sudarshan

Maximum Likelihood DOA Estimation in Wireless Sensor Networks Using Comprehensive Learning Particle Swarm

Optimization Algorithm. . . 499 Srinivash Roula, Harikrishna Gantayat, T. Panigrahi and G. Panda

Performance Evaluation of Some Clustering Indices. . . 509 Parthajit Roy and J.K. Mandal

A New (n,n) Blockcipher Hash Function Using Feistel Network:

Apposite for RFID Security. . . 519 Atsuko Miyaji and Mazumder Rashed

Efficient Web Log Mining and Navigational Prediction

with EHPSO and Scaled Markov Model. . . 529 Kapil Kundra, Usvir Kaur and Dheerendra Singh

View Invariant Human Action Recognition Using

Improved Motion Descriptor . . . 545 M. Sivarathinabala, S. Abirami and R. Baskaran

Visual Secret Sharing of Color Image Using Extended

Asmuth Bloom Technique . . . 555 L. Jani Anbarasi, G.S. Anadha Mala and D.R.L. Prassana

Enhancing Teaching-Learning Professional Courses

via M-Learning. . . 563 V. Sangeetha Chamundeswari and G.S. Mahalakshmi

Contents xxiii

(24)

Evaluation of Fitness Functions for Swarm Clustering

Applied to Gene Expression Data. . . 571 P.K. Nizar Banu and S. Andrews

Context Based Retrieval of Scientific Publications

via Reader Lens . . . 583 G.S. Mahalakshmi, R. Siva and S. Sendhilkumar

Numerical Modeling of Cyclone-Generated Wave Around

Offshore Objects. . . 597 Subrata Bose and Gunamani Jena

Cooperative Resource Provisioning for Futuristic

Cloud Markets . . . 607 Geetika Mudali, Manas Ranjan Patra, K. Hemant K. Reddy

and Diptendu S. Roy

Frequency Based Inverse Damage Assessment Technique

Using Novel Hybrid Neuro-particle Swarm Optimization. . . 617 Bharadwaj Nanda, R. Anand and Dipak K. Maiti

A Hybrid CRO-K-Means Algorithm for Data Clustering. . . 627 Sibarama Panigrahi, Balaram Rath and P. Santosh Kumar

An Approach Towards Most Cancerous Gene Selection

from Microarray Data. . . 641 Sunanda Das and Asit Kumar Das

An Ordering Policy with Time-Proportional Deterioration,

Linear Demand and Permissible Delay in Payment. . . 649 Trailokyanath Singh and Hadibandhu Pattanayak

Computation of Compactly Supported Biorthogonal Riesz

Basis of Wavelets. . . 659 Mahendra Kumar Jena and Manas Ranjan Mishra

Data Mining Approach for Modeling Risk Assessment

in Computational Grid. . . 673 Sara Abdelwahab and Ajith Abraham

Degree of Approximation of Conjugate Series of a Fourier

Series by Hausdroff and Norlund Product Summability. . . 685 Sunita Sarangi, S.K. Paikray, M. Dash, M. Misra and U.K. Misra

xxiv Contents

(25)

A Novel Approach for Intellectual Image Retrieval Based

on Image Content Using ANN. . . 693 Anuja Khodaskar and Sidharth Ladhake

Hierarchical Agents Based Fault-Tolerant

and Congestion-Aware Routing for NoC. . . 705 Chinmaya Kumar Nayak, Satyabrata Das and Himansu Sekhar Behera

Author Index . . . 715

Contents xxv

(26)

Editors ’ Biography

Prof. Lakhmi C. Jainis with the Faculty of Education, Science, Technology and Mathematics at the University of Canberra, Australia and University of South Australia, Australia. He is a Fellow of the Institution of Engineers, Australia.

Professor Jain founded the Knowledge-Based Intelligent Engineering System (KES) International, a professional community for providing opportunities for publication, knowledge exchange, cooperation, and teaming. Involving around 5,000 researchers drawn from universities and companies worldwide, KES facili- tates international cooperation and generates synergy in teaching and research. KES regularly provides networking opportunities for the professional community through one of the largest conferences of its kind in the area of KES. His interests focus on artificial intelligence paradigms and their applications in complex systems, security, e-education, e-healthcare, unmanned air vehicles, and intelligent agents.

Prof. Himansu Sekhar Behera is working as a Reader in the Department of Computer Science Engineering and Information Technology, Veer Surendra Sai University of Technology (VSSUT) (A Unitary Technical University, Established by Government of Odisha), Burla, Odisha. He has received M.Tech. in Computer Science and Engineering from N.I.T, Rourkela (formerly R.E.C., Rourkela) and Doctor of Philosophy in Engineering (Ph.D.) from Biju Pattnaik University of Technology (BPUT), Rourkela, Government of Odisha respectively. He has pub- lished more than 80 research papers in various international journals and confer- ences, edited 11 books and is acting as a member of the editorial/reviewer board of various international journals. He is proficient in the field of Computer Science Engineering and served in the capacity of program chair, tutorial chair, and acted as advisory member of committees of many national and international conferences.

His research interest includes Data Mining and Intelligent Computing. He is associated with various educational and research societies like OITS, ISTE, IE, ISTD, CSI, OMS, AIAER, SMIAENG, SMCSTA, etc. He is currently guiding seven Ph.D. scholars.

xxvii

(27)

Prof. Jyotsna Kumar Mandalis working as Professor in Computer Science and Engineering, University of Kalyani, India. Ex-Dean Faculty of Engineering, Technology and Management (two consecutive terms since 2008). He has 26 years of teaching and research experiences. He was Life Member of Computer Society of India since 1992 and life member of Cryptology Research Society of India, member of AIRCC, associate member of IEEE and ACM. His research interests include Network Security, Steganography, Remote Sensing and GIS Application, Image Processing, Wireless and Sensor Networks. Domain Expert of Uttar Banga Krishi Viswavidyalaya, Bidhan Chandra Krishi Viswavidyalaya for planning and inte- gration of Public domain networks. He has been associated with national and international journals and conferences. The total number of publications to his credit is more than 320, including 110 publications in various international journals.

Currently, he is working as Director, IQAC, Kalyani University.

Prof. Durga Prasad Mohapatra received his Ph.D. from Indian Institute of Technology Kharagpur and is presently serving as an Associate Professor in NIT Rourkela, Odisha. His research interests include software engineering, real-time systems, discrete mathematics, and distributed computing. He has published more than 30 research papers in these fields in various international Journals and con- ferences. He has received several project grants from DST and UGC, Government of India. He received the Young Scientist Award for the year 2006 from Orissa Bigyan Academy. He has also received the Prof. K. Arumugam National Award and the Maharashtra State National Award for outstanding research work in Soft- ware Engineering for the years 2009 and 2010, respectively, from the Indian Society for Technical Education (ISTE), New Delhi. He is nominated to receive the Bharat Shiksha Ratan Award for significant contribution in academics awarded by the Global Society for Health and Educational Growth, Delhi.

xxviii EditorsBiography

(28)

Conceptual Modeling of Non-Functional Requirements from Natural Language Text

S. Abirami, G. Shankari, S. Akshaya and M. Sithika

Abstract The conceptual model is an intermediate model that represents the concepts (entities), attributes and their relationships that aids in the visualization of requirements. In literature, explicit design elements such as concept, attribute, operations, relationships are extracted as functional requirements and they are represented in the conceptual model. The conceptual model cannot be complete unless Non-Functional Requirements are included. This problem has motivated us to consider both functional and Non Functional Requirements in this research for the development of a conceptual model. Therefore, this paper presents a framework for the development of conceptual model by designing a classifier which segregates the functional and Non Functional Requirements (NFR) from the requirements automatically. Later, these requirements are transformed to the conceptual model with explicit visualization of NFR using design rules. In addition, the results of this model are also validated against the standard models.

Keywords Conceptual modeling

Non-functional requirements

Natural language processing

NFR classier

S. Abirami (&)G. ShankariS. AkshayaM. Sithika

Department of Information Science and Technology, College of Engineering, Anna University, Chennai, India

e-mail: abirami_mr@yahoo.com G. Shankari

e-mail: shankarigiri2@gmail.com S. Akshaya

e-mail: akshaya.it2010@gmail.com M. Sithika

e-mail: sithika1008@gmail.com

©Springer India 2015

L.C. Jain et al. (eds.),Computational Intelligence in Data Mining - Volume 3, Smart Innovation, Systems and Technologies 33, DOI 10.1007/978-81-322-2202-6_1

1

(29)

1 Introduction

Automated Requirement Analysis is a kind of Information Extraction (IE) task in the domain of Natural Language Processing (NLP). In fact, it is the most significant phase of Software Development Life Cycle (SDLC) [1]. Errors caused during this phase can be quite expensive tofix it later. Requirements Gathering and Analysis is the most critical phase of the SDLC and this could greatly benefit through their automation as said by VidhuBala et al. [2]. Automation of conceptual model not only saves time but also helps in visualizing the problem. Conceptual model contains only domain entities and attributes according to Larman [3].

All the researches in the literature contribute towards the extraction of function requirements from natural language text. In addition to functional requirements, Non-Functional Requirements (NFR) should also be considered while creating a conceptual model. This is because the non-satisfaction of NFRs has been consid- ered as one of the main reason for the failure of various software projects according to Saleh [4]. Therefore, we have proposed a system in this research which extracts Non-Functional Requirements with functional requirements automatically to make the conceptual model a complete one. The novelty of this paper lies in the devel- opment of the conceptual model named CMFNR thereby extracting and visualizing Non-Functional Requirements too.

This paper is organized as follows: Sect.2discusses about the related works and Sect.3describes our system of CM-NFR whereas Sect.4discusses the performance obtained by our system and Sect.5 concludes the paper.

2 Related Work

Here, literature survey has been done in two areas namely explicit functional requirements modeling and Non-Functional Requirements modeling. Text mining has been used to assist requirement analysis in [5] where in the responsibilities were first identified using POS tags and then grouped semantically using clustering algorithms. But this approach requires human interaction to identify the conceptual classes. Later, Use case diagram, Conceptual model, Collaboration diagram and Design class diagram were generated using a tool called UMGAR (UML Model Generator from Analysis of Requirements) in [6]. But, it requires both requirements specification and use case specification in active voice form to generate the UML diagrams. Requirements and use cases were processed to produce classes, attributes and functional modules using DAT (Design Assistant Tool) in [7].

Tools like NLARE have been developed in literature to evaluate the quality of requirements like atomicity, ambiguity and completeness in [8]. Significant work in automating the conceptual model creation has been done in [2]. But the above system assumes that the input is grammatically correct and handles only explicit requirements. Non-Functional Requirements (NFR) are not handled here.

2 S. Abirami et al.

(30)

Taking Use Case Description (UCD) written in natural language as input, a parsed UCD and a UML class model were developed in [9], using a tool called Class-Gen.

Parsed Use Case Description were subjected to rules to identify a list of candidate classes and relations. But the classes extracted should be refined by a human expert since the rules were not complete. All the above models discussed in the literature concentrate on functional requirements and they lack on the extraction of Non- Functional Requirements (NFR).

A novel approach to automatically transform NL specification of software constraints to OCL constraints was done by Bajwa [10]. According to UML, a note is used to represent a NFR. But this is not sufficient. Non-Functional Requirements comes in the second conceptual model of the class. Name of the class corresponded to the NFR being modeled and the entire requirement was specified in a note using OCL (Object Constraint Language). Hence, a class diagram can be used as extension to model NFR [4] in an effective way. As a result, in this research, we intend to develop an extended class diagram which could visualize the Non- Functional Requirements extracted automatically.

3 Conceptual Model-Non functional Requirements (CM-NFR) Architecture

The CMNFR shown in Fig. 1 illustrates the proposed system. This provides an enhancement to the model developed in [2] where in NFRs were not considered.

3.1 Tokenization

The natural language requirements in a text document is tokenized into a list of sentences using the Punkt Sentence Tokenizer [11] that is available as a part of the NLTK package for python.

3.2 NFR Classi fi cation

NFR classifier uses a set of pre-defined knowledge base to classify the list of sentences into two lists namely functional and Non-Functional Requirements. The knowledge base used by the classifier is specified below.

Conceptual Modeling of Non-Functional Requirements 3

(31)

3.2.1 Extracting Specific Non-functional Requirements and Its Attributes

The classification of the NFR into a specific category namely performance, cost and interoperability is achieved by the following rules that are stated at a Bird’s-eye view level. The novelty of our system lies in the construction of CM-NFR which extracts Non-Functional Requirements automatically from requirements text visu- alizes both functional and Non-Functional Requirements in a complete way. Syn- tactic rules used by the NFR Classifier to discriminate the Non-Functional Requirements from requirements has been listed below:

Classifier Rule 1: Whenever time is preceded by‘at least within’,‘atmost within’,

‘within’ clauses and the sentence contains the terms ‘throughput’ or ‘response time’, then it is a non-functional performance requirement.

Example: The system should retrieve the results within 3 s.

The system should have very less response time.

Fig. 1 Architecture of conceptual model generator

4 S. Abirami et al.

(32)

Classifier Rule 2: Whenever a sentence contains memory units and terms like

‘memory’,‘storage’,‘space’, then it is a non-functional memory requirement.

Example: The application should not consume a memory space of more than 2 GB.

Classifier Rule 3: Whenever a sentence contains the phrase‘/second’or‘/minute’ or ‘per second’ etc. then it is a non-functional performance requirement that emphasizes speed.

Example: the system should handle 100 transactions/s.

Classifier Rule 4: Whenever a number is followed by rs, $, yen, pounds or any monetary unit then it is a non-functional cost requirement.

Classifier Rule 5: Whenever a sentence contains the stem‘interoperate’then it is a non-functional interoperability requirement.

Example: The application shall properly interoperate with the legacy Customer Oracle database.

The above rules were formulated after analyzing various requirements document done on number of projects in the development of software systems. Sentences which satisfy the classifier rules would be segregated either as functional or Non- Functional Requirements.

3.3 Deep Parsing

The output of the previous module (functional and Non-Functional Requirements) isfirst subjected to POS tagging using Stanford-POS tagger [12] to get POS tags (Part-Of-Speech) and then it is subjected to deep parsing using Stanford-parser to get typed dependencies and a parse tree.

3.4 Syntactic Analysis

The POS tagged functional requirements and their typed dependencies are used by the following rules to extract the required design elements as done in the conceptual modeling [2] later. The class rule, attribute and relation rules which were used in this research to extract design elements specified explicitly has been identified and used over the POS tagged sentences (both functional and non functional) as listed below. They are illustrated with an example for each in the following subsections:

3.4.1 Rules Used for Class Generation

Class Rule 1:Any Noun that appears as a subject is always a class[2].

Example: Abankowns an ATM.

Class Rule 2:Nouns are always converted to their singular form.This is done by obtaining the stemmed form of the word.

Conceptual Modeling of Non-Functional Requirements 5

(33)

Class Rule 3: Nouns occurring as objects participate in relations, but are not created as classes explicitly[2].

Example: The user presses the button.

Class Rule 4:Gerunds are created as classes[9].

Gerund forms of verbs are treated as class names.

Examples: Borrowing is processed by the staff. Identified classes: Borrowing.

3.4.2 Rules Used for Attribute Generation

Attribute Rule 1: A noun phrase which follows the phrase ‘identified by’, ‘rec- ognized by’indicates presence of an attribute [9].

Example: An employee is identified by employee id. → Employee has attribute employee id.

Attribute Rule 2: An intransitive verb with an adverb may signify an attribute [9].

Example: the train arrives in the morning at 8 AM.→Train has an attribute, time.

Attribute Rule 3: A classifiable adjective, either in the predicate form or in attributive form signifies an attribute [2].

Example: The red button glows when pressed.→ Button has an attribute, color.

Attribute Rule 4: possessive apostrophe signifies an attribute [9].

Example: employee’s name is save→Name is an attribute of the employee.

Attribute Rule 5: The genitive case when referring to a relationship of possessor uses the‘of’construction [9].

Example: The name of the employee is printed → Name is an attribute of the employee.

3.4.3 Rules Used for Relation Generation

Relation rule 1: A transitive verb is a candidate for a relationship [9].

A transitive verb links a subject and an object. If the object translates to a class, the verb becomes a relation.

Example: The banker issues a cheque→Relation (banker, 1, cheque, 1, issues).

Relation rule 2: A verb with a preposition is a candidate for a relationship [2].

A verb that contains a prepositional object linked with a transitive verb along with a preposition, combines with the preposition to form a relationship.

Example: The cheque is sent to the bank.→sent _to is the relation.

Relation rule 3: A sentence of the form‘the r of a is b’[9].

Relation rule 4: A sentence of the form‘a is the r of b’[2].

Example: The bank of the customer is SBI→Relation (bank, 1, customer, 1, SBI).

Example: SBI is the bank of the customer→Relation (bank, 1, customer, 1, SBI).

In the above sentences, r is the relation that relates class a to class b. The above two rules are examples of the relation being in the form of a noun, rather than a verb.

6 S. Abirami et al.

(34)

3.4.4 Rules Used for Operation Generation

Operation rule 1: An intransitive verb is an operation [9].

An intransitive verb is a verb that does not need an object.

Example: The laptop hibernates.→ hibernate is an operation of laptop.

Operation rule 2: A verb that relates an entity to a candidate class that is not created as an entity (fails Class Rule 3 after completion of class identification) becomes an operation [2].

3.4.5 Post Processing

Post processing is mainly done to remove unnecessary design elements. Post processing is done in three areas. Trivial relations are converted to operations, trivial associations are converted to attributes and trivial classes are removed. These are done based on the rules proposed in [2]. Since our system, mainly concentrates on the extraction of Non-Functional Requirements, design of elements has been adopted from [2,9].

4 Results and Performance Analysis 4.1 Experimentation Setup and Metrics

The input to the system can be a either natural language text document or SRS (Software Requirements Specification). We have taken three standard input systems as datasets namely ATM, Online Course Registration System and Payroll System.

This system has been implemented in Ubuntu environment by employing the languages Python and Shell Script for extraction of concepts, attributes and rela- tionships [13] and dot script for visualizing the conceptual model generated [14].

Figure2depicts the conceptual model generated and visualized [14] with NFR for an ATM system requirements specification.

In previous model, performance of the functional requirements modeling has been measured based on three metrics namely Recall, Precision and Over- Specification. Equations 1, 2 and 3 depict the formulas for precision, recall and over-specification respectively.

Precision ¼Ncorrect=ðNcorrectþNincorrectÞ ð1Þ Recall¼Ncorrect

NcorrectþNmissing

ð2Þ

Conceptual Modeling of Non-Functional Requirements 7

(35)

Over-Specification¼Nextra

NcorrectþNmissing

ð3Þ

where,

Ncorrect specifies the number of design elements correctly identified by the sys- tem andNincorrectindicates the number of wrong design elements that are identified as correct.Nmissingindicates the number of design elements that are in the answers but not identified by the system andNextrashows the number of valid extra classes retrieved by the system.

4.2 Performance Evaluation

The three standard input documents taken to evaluate our system are ATM [15], Course Registration system [16] and Payroll System where payroll system is an user generated input. Initially, performance of the NFR classifier has been evaluated Fig. 2 CM-NFR visualization for ATM system

8 S. Abirami et al.

(36)

to assure whether the Non-Functional Requirements have been fully extracted by the system. Later, extraction rate of NFR attributes are evaluated using measures such as precious, recall and f-measures. In addition to that, a comparative analysis of the identification of NFR attributes between manual and automated process has been evaluated.

4.2.1 Evaluation of the Classifier

The performance of the classifier can be measured by calculating the number of requirements that are classified correctly versus the number of requirements clas- sified incorrectly. The evaluation was done by taking the requirements documents of three domains and operating the classifier over it. The above process was repeated 5 times to ensure that the results are reliable. The results obtained are summarized in the Table1 shown above.

4.2.2 Evaluation of NFR Extraction

The performance evaluation of the process of extracting specific Non Functional Requirements can be done by calculation precision, recall and F-score based on True Positive (TP), False Positive (FP), False Negative (FN) values. TP indicates correct classification. F-score gives a weighted average of the precision and recall values. The performance was evaluated again by running the process for three case studies and the results are summarized in the Table2and the Fig.3shown below.

Table 1 Performance evaluation of the classier

Hit rate (%) Error rate (%)

ATM 80 100 100 100 100 20 0 0 0 0

Payroll system 100 100 100 100 100 0 0 0 0 0

Course registration system

100 100 100 80 100 0 0 0 20 0

Table 2 Performance

evaluation of NFR extraction Precision Recall F-score

ATM 100 90 94.73

Payroll system 100 100 100

Course registration system 100 90 94.73

Conceptual Modeling of Non-Functional Requirements 9

(37)

4.2.3 Identifying NFR Attributes

The subjects were given time to analyze NFR attributes and to group them according to their category such as cost, interoperability and performance (memory, time, speed). The time taken by the individuals to identify NFR attributes from a Payroll system requirements and automatically generated conceptual model using the same payroll system were measured separately and the results are shown in Table3.

5 Conclusion and Future Work

This research provides an efficient approach to extract design elements as well as their Non-Functional Requirements from requirements text document. The extraction and representation of the NFRs also known as soft goals is a novel aspect of our work through this NFR extraction and visualization in conceptual models, Non-Functional Requirements could be better grasped by the individuals rather from a natural language text. In future, this could be extended to more number of NFRs.

Acknowledgments This research is getting supported by UGC, New Delhi, India under Major Research project scheme of Engineering Sciences under the FileF.no. 42-129/2013(SR).

Fig. 3 Performance evaluation of NFR

Table 3 Time taken by individuals in identifying NFR attributes

NFR attributes Requirements (s) Automatically generated conceptual model (s)

Identication of NFR attributes 150 65

Specic NFR categories 85 50

10 S. Abirami et al.

(38)

References

1. Meth, H., Brhel, M., Maedche, A.: The state of the art in automated requirements elicitation.

J. Inf. Softw. Technol.55(10), 16951709 (2013) (Elsevier)

2. VidhuBala, R.V., Abirami, S.: Conceptual modeling of explicit natural language functional specications. J. Syst. Softw.88(1), 2541 (2013) (Elsevier)

3. Larman, C.: Applying UML and PatternsAn Introduction to Object-Oriented Analysis and Design and Iterative Development 3rd edn. Pearson Education, Ghaziabad (2005)

4. Saleh, K., Al-Zarouni, A.: Capturing non-functional software requirements using the user requirements notation. In: Proceedings of The International Research Conference on Innovations in Information Technology, India (2004)

5. Casamayor, A., Godoy, D., Campo, M.: Functional grouping of natural language requirements for assistance in architectural software design. J. Knowl. Based Syst.30(1), 7886 (2012) (Elsevier)

6. Deeptimahanti, D.K., Sanyal, R.: Semi-automatic generation of UML models from natural language requirements. In: Proceedings of ISEC, ACM, India (2011)

7. Sarkar, S., Sharma, V.S., Agarwal, R.: Creating design from requirements and use cases:

bridging the gap between requirement and detailed design. In: Proceedings of ISEC, ACM, India (2012)

8. Huertas, C., Reyes, J.R.: NLARE, A natural language processing tool for automatic requirements evaluation. In: Proceedings of CUBE, ACM, India (2012)

9. Elbendak, M., Vickers, P., Rossiter, N.: Parsed use case descriptions as a basis for object- oriented class model generation. J. Syst. Softw.84(7), 12091223 (2011) (Elsevier) 10. Bajwa, I.S., Lee, M., Bordbar, B.: Translating natural language constraints to OCL. J. King

Saud Univ. Comput. Inf. Sci.24(2), 117128 (2012) (Production and hosting by Elsevier) 11.http://www.nltk.orgthe ofcial site for NLTK

12.http://nlp.stanford.edu/software/lex-parser.shtmtParser and POS Tagger

13. Gowsikhaa, D., Abirami, S., Baskaran, R.: Construction of image ontology using low level for image retrivel. In: Proceedings of the International Conference on Computer Communication and Informatics, (ICCCI 2012), pp. 129134 (2012)

14. VidhuBala, R.V., Mala, T., Abirami, S.: Effective visualization of conceptual class diagrams.

In: Proceedings of International Conference on Recent Advances in Computing and Software Systems. pp. 16 (2012). doi:10.1109/RACSS.2012.6212688

15. Rumbaugh, J., Blaha, M., Premerlani, W., Eddy, F., Lorensen,W.: Object-Oriented Modeling and Design. Pearson Education, Ghaziabad (1991)

16. Section 1: Course Registration Requirements, IBM Corp, IBM Rational Softwares

Conceptual Modeling of Non-Functional Requirements 11

(39)

A Genetic Algorithm Approach for Multi-criteria Project Selection for Analogy-Based Software Cost Estimation

Sweta Kumari and Shashank Pushkar

Abstract This paper presents genetic algorithms as multi-criteria project selection for improving the Analogy Based Estimation (ABE) process, which is suitable to reuse past project experience to create estimation of the new projects. An attempt has also been made to create a multi-criteria project selection problem with and without allowing for interactive effects between projects based on criteria which are determined by the decision makers. Two categories of projects are also presented for comparison purposes with other traditional optimization methods and the experimented results show the capability of the proposed Genetic Algorithm based method in multi-criteria project selection problem and it can be used as an efficient solution to the problem that will enhance the ABE process. Here, Mean Absolute Relative Error (MARE) is used to evaluate the performance of ABE process and it has been found that interactive effects between projects may change the results.

Keywords Software cost estimation

Analogy based estimation

Genetic

algorithm

Multi-criteria decision making

Nonlinear integer programming

1 Introduction

Success of software organizations rely on proper management activities such as planning, budgeting, scheduling, resource allocation and effort requirements for software projects. Software effort estimation is the process of making an approximate judgment of the costs of software. Inaccurate estimation of software cost lowers the proficiency of the project, wastes the company’s budget and can result in failure of the

S. Kumari (&)S. Pushkar

Department of CSE, BIT, Mesra, Ranchi, India e-mail: swetak44@gmail.com

S. Pushkar

e-mail: shashank_pushkar@yahoo.com

©Springer India 2015

L.C. Jain et al. (eds.),Computational Intelligence in Data Mining - Volume 3, Smart Innovation, Systems and Technologies 33, DOI 10.1007/978-81-322-2202-6_2

13

(40)

entire project. Broadly, there are two types of cost estimation methods: Algorithmic and Non-algorithmic. Algorithmic method calculates cost of the software by using formula or some experimental equations whereas Non-algorithmic methods use a historical data that is related to the previously completed similar projects for calcu- lating the cost of the software [1]. Analogy based estimation is a Non-algorithmic method in that a critical role is played by the similarity measures between a pair of projects. Here, a distance is calculated between the software project being estimated and each of the historical software projects. It thenfinds the most similar project that is used to estimate the cost. Estimation by analogy is essentially a form of Case Based Reasoning [2]. However, as it is argued in [3] there are certain advantages in respect with rule based systems, such as the fact that users are keen to accept solutions from analogy based techniques, rather than solutions derived from uncomfortable chains of rules or neural nets. Naturally, there are some difficulties with analogy-based estimation such as lack of appropriate analogues and issues with selecting and using them. Choosing an appropriate set of projects participating in cost estimation process are very important for any organizations to achieve their goals. In this process, several reasons involve such as the number of investment projects, presence of multiple decision criteria such as takings maximization or risk minimization, business and operational rules such as budget limits and time windows for starting dates. Project selection is a difficult task, if the project interactions in terms of multiple selection criteria and information of preferences of decision-makers are taken into account, mainly in the presence of a huge number of projects.

2 Related Works

Various methods and mathematical models have been developed to deal with the problem of selecting and scheduling projects. Since the pioneering ranking method from [4] other methods have been proposed: Scoring [5], Analytical Hierarchy Process [6,7] and Goal Programming [8] among others. However, these methods think that project interdependencies do not exist [9]. Other authors have proposed project selection models that deal with the existence of interdependencies.

According to [8], these models, classified by the fundamental solution method are:

Dynamic Programming [10] models reflect interdependency in special cases;

Quadratic/Linear 0–1 programming models have a quadratic objective function and linear constraints, they limit interdependency only in the objective and between two projects. Quadratic/Quadratic 0–1 programming [11] with interdependency between two projects in the objective function and in the resource constraints; and Nonlinear 0–1 programming, with interdependency reflected in the objective function and the constraints among as many projects as necessary [9, 12] presents a linear 0–1 programming model for the selection and scheduling of projects, that includes technical interdependency. Medaglia et al. [13] also present some features of

14 S. Kumari and S. Pushkar

(41)

technical interdependence in linear project selection and scheduling models.

According to the literature review, it has been found that estimation by analogies requires a significant amount of computations as well as lack of appropriate analogous and issues with selecting and using them. And it has been also observed that interactive effects between projects are significant for selecting a project because it may give unwanted result [14]. In this research, we propose Genetic Algorithms (GA) as multi-criteria project selection for improving the ABE system’s performance and try to make a multi-criteria project selection problem allowing for project interactions that are based on multiple criteria and Decision makers pref- erence information based on some significance. Here, the performance of ABE system is analyzed and compared in terms of MARE. Rest of the paper is divided in different sections as follows: a detail formulation of a multi-criteria project selection problem is described in Sect.2. In Sect.3, GA is used as the optimization technique for Project Selection problem. In Sect.4, Numerical examples are also given for illustration purpose. Experiments and comparison results are described in Sect. 5 and in the end, the concluding remark is discussed.

3 Formulation of the Project Selection Problem

In project selection, a decision-maker is deals with the problem of selecting an appropriate subset of projects from an inappropriate set of projects based on a set of selection criteria. This process is known as the multi-criteria decision making (MCDM) process [15–17]. In general, there are two types of MCDM problems:

multi-attribute decision making (MADM) problem and multi-objective decision making (MODM) problem. Based on this categorization, multi-criteria project selection problem is seen as a distinctive MADM problem in terms of the char- acteristics of project selection. In this paperNprojects are considered for selection as well as evaluation, and decision variable xn denotes whether the project is selected or not. If there are no interactive effects between projects, the project selection problem can be formulated in the following form:

Max E¼XN

n¼1

XJ

j¼1

pjcnj

! xn

s:t:XN

n¼1

xn¼R

xn¼f0;1g;xn ¼1;2;. . .;7

ð1Þ

Therefore, the multi-criteria project selection problem with interactive effects between projects based on criteria can be formulated in the following form:

A Genetic Algorithm Approach for Multi-criteria Project 15

Références

Documents relatifs

Section 3 first describes a recent experiment to use different biomedical ontologies as reference ontologies without using semantic similarity to improve alignment results

To evaluate the proposed approach, we implemented a question generation en- gine that utilizes algorithm 1 and used the implemented engine to generate anal- ogy questions from

When compared with all measures in both tables 2 and 3, WP had the lowest SAQ value (rank of 15). If the ranking was not identical across all OA systems, a ranking was only

For quality assessment, we compare the results of HMatch4 and HMatch3 against the ground truth produced by the hu- man users of our crowdsourcing system. The decision to exclude

In this paper we address the two mentioned problems by proposing a representation of the notions underlying the SemSim semantic similarity method [2], according to

Semantic similarity is used to include similarity measures that use an ontology’s structure or external knowledge sources to determine similarity between

Linked Data aims to extend the Web by publishing various open datasets as RDF and establishing connections between them. DBpedia exploits the huge amount of information contained

5) First literal based convergence: walkers step onto similar literals after the first step - this is considered significant because it is the only step where the literals