Logo PTI Logo FedCSIS

Proceedings of the 18th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems, Volume 35

Association Rule Mining for Requirement Elicitation Techniques in IT Projects

,

DOI: http://dx.doi.org/10.15439/2023F4831

Citation: Proceedings of the 18th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ĺšlęzak (eds). ACSIS, Vol. 35, pages 983–987 ()

Full text

Abstract. Selecting suitable techniques for requirements elicitation in IT projects is crucial to the business analysis planning process. Typically, the determining factors are the preferences of stakeholders, primarily business analysts, previous experience, and company practices, as well as the availability of sources of information. The influence of other factors is not as evident. One of the possible ways to form recommendations for using techniques is the analysis of industrial experience. This paper is intended to analyze the application of association rules mining to define factors influencing technique selection and predict the usage of a particular elicitation technique depending on the project context and specialist background. The dataset for experiments was formed based on a survey of 324 specialists from Ukrainian IT companies. The associations found to make it possible to speed up the process of choosing elicitation techniques and improve the elicitation process efficiency.

References

  1. K. Pohl, "Requirements engineering: fundamentals, principles, and techniques", Springer, New York, USA, 2010, 182 p.
  2. D. Gobov, V. Yanchuk, "Network Analysis Application to Analyze the Activities and Artifacts in the Core Business Analysis Cycle," 2021 2nd International Informatics and Software Engineering Conference (IISEC), Ankara, Turkey, 2021, pp. 1-6, http://dx.doi.org/10.1109/IISEC54230.2021.9672373.
  3. D. Gobov, "Practical Study on Software Requirements Specification and Modelling Techniques". International Journal of Computing, 22(1), pp. 78-86, 2023. https://doi.org/10.47839/ijc.22.1.2882.
  4. H. Dafaalla, et al., "Deep Learning Model for Selecting Suitable Requirements Elicitation Techniques, Applied Science, vol. 12 (18), pp. 9060, 2022. https://doi.org/10.3390/app12189060
  5. V. Sharma, S. Rai, A Dev, "A comprehensive study of artificial neural networks." International Journal of Advanced research in computer science and software engineering, vol 2, no. 10, pp. 278-284, 2012
  6. N Darwish, A. Mohamed, A. Abdelghany, "A hybrid machine learning model for selecting suitable requirements elicitation techniques", International Journal of Computer Science and Information Security, vol. 14, no. 6, pp. 1-12, 2016.
  7. I. Bodnarchuk, et al., "Adaptive Method for Assessment and Selection of Software Architecture in Flexible Techniques of Design", IEEE, 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT), pp. 292-297, 2018. https://doi.org/10.1109/stc-csit.2018.8526620 
  8. F. Hujainah, R. B. A. Bakar, M. A. Abdulgabber, "StakeQP: A semi-automated stakeholder quantification and prioritization technique for requirement selection in software system projects", Decision Support Systems, vol. 121, pp. 94-108, 2019. https://doi.org/10.1016/j.dss.2019.04.009
  9. J. Li, et al., "Attributes-based decision making for selection of requirement elicitation techniques using the analytic network process", Mathematical Problems in Engineering, vol. 2020, pp. 1-13, 2020. https://doi.org/10.1155/2020/2156023
  10. G. Castro, et al., "Applying Association Rules to Study Bipolar Disorder and Premenstrual Dysphoric Disorder Comorbidity," 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), Quebec, QC, Canada, 2018, pp. 1-4. https://doi.org/10.1109/ccece.2018.8447747
  11. C. Creighton, S. Hanash, "Mining gene expression databases for association rules", Bioinformatics, vol. 19., no. 1, pp. 79-86, 2003. https://doi.org/10.1093/bioinformatics/19.1.79
  12. A. Mirabad, S. Sharifian, "Application of association rules in Iranian Railways (RAI) accident data analysis", Safety Science, vol. 48, no. 10, pp. 1427-1435, 2010. https://doi.org/10.1016/j.ssci.2010.06.006
  13. D. SĂĄnchez, et al., "Association rules applied to credit card fraud detection", Expert systems with applications, vol. 36, no. 2, pp. 3630-3640, 2009. https://doi.org/10.1016/j.eswa.2008.02.001
  14. E. Lamma, et al., "Improving the SLA algorithm using association rules", Springer Berlin Heidelberg, AI* IA 2003: Advances in Artificial Intelligence: 8th Congress of the Italian Association for Artificial Intelligence, Pisa, Italy, September 2003. Proceedings 8, pp. 165-175, 2003. https://doi.org/10.1007/978-3-540-39853-0_14
  15. R. Agrawal, et al., "Fast algorithms for mining association rules", Proceeding 20th international conference very large data bases, VLDB, vol. 1215., pp. 487-499, 1994.
  16. D. Gobov, I. Huchenko, “Influence of the software development project context on the requirements elicitation techniques selection”, In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education IV. ICCSEEA 2021. Lecture Notes on Data Engineering and Communications Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-030-80472-5_18.