Skip to main content
Log in

Crowdsourcing service requirement oriented requirement pattern elicitation method

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

“Pattern” can always help machine to recognize the new encounters, so does “requirement pattern.” Requirement pattern is one of the essences for the cognitive service to understand customer’s intention. Since crowdsourcing service platform holds abundant user demands in the form of text information, the method proposed in this paper aims at eliciting valuable patterns from this “treasure.” This method is based on a knowledge graph, which is constructed with the refined concepts of those text information of several different domains. Due to the irregularity and difference of user demand expressions, this paper will firstly explain the knowledge extraction method for heterogeneous text and the knowledge fusion-based knowledge graph construction method. Afterward, we will introduce the requirement pattern elicitation method based on this knowledge graph. The pattern could either be a frequent demand sequence or a domain-oriented rule or link. Finally, this paper will demonstrate a case study to show how those patterns can help to understand customers’ intention effectively and accurately.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. Stanford coreNLP toolkit helps this research with syntactic dependency analysis and part-of-speech tagging. Its download link is https://stanfordnlp.github.io/CoreNLP/.

  2. We have post our data set and our source code in GitHub. You can download them from the following URL: https://github.com/Lvmengyao313/Freelancer.

References

  1. Kaiya H, Saeki M (2006) Using domain ontology as domain knowledge for requirements elicitation. In: IEEE international requirements engineering conference, pp 186–195

  2. Xiang J, Liu L, Qiao W (2007) SREM: a service requirements elicitation mechanism based on ontology. In: International computer software and applications conference, pp 196–203

  3. Souag A, Salinesi C, Mazo R (2015) A security ontology for security requirements elicitation. In: International symposium on engineering secure software and systems, pp 157–177

  4. Chen X, Jin Z (2016) Capturing requirements from expected interactions between software and its interactive environment: an ontology based approach. Int J Softw Eng Knowl Eng 26(01):15–39

    Article  Google Scholar 

  5. Shi X, Jin Z et al (2015) PKU knowware online: dynamic and on-demand knowledge provision. J Front Comput Sci Technol 9(6):660–668

    Google Scholar 

  6. Li J, Ritter A, Hovy E (2014) Weakly supervised user profile extraction from Twitter. In: Meeting of the association for computational linguistics, pp 165–174

  7. Venkatesan K (2015) Mining user profile exploitation cluster from computer program Logs. Int J Innov Res Comput Commun Eng 3:1556–1561

    Article  Google Scholar 

  8. Guy I, Avraham U, Carmel D, et al (2013) Mining expertise and interests from social media. In: International conference on world wide web, pp 515–526

  9. Zhao Z, Cheng Z, Hong L, et al (2015) Improving user topic interest profiles by behavior factorization. In: International conference on World Wide Web, pp 1406–1416

  10. Li H, Ai W, Liu X et al (2016) Voting with their feet: inferring user preferences from app management activities. In: International conference on World Wide Web, 2016

  11. Wei Q, Jin Z, Xu Y (2014) Service discovery for Internet of things based on probabilistic topic model. J Softw 25(8):1640–1658

    Google Scholar 

  12. Gao Z, Fan Y, Wu C et al (2016) SeCo-LDA: mining service co-occurrence topics for recommendation. In: IEEE international conference on web services. IEEE, pp 25–32

  13. Dong XL, Gabrilovich E, Heitz G et al (2014) From data fusion to knowledge fusion. Proc Vldb Endow 7(10):881–892

    Article  Google Scholar 

  14. Surdeanu M, Tibshirani J, Nallapati R et al (2012) Multi-instance multi-label learning for relation extraction. In: Joint conference on empirical methods in natural language processing and computational natural language learning, pp 455–465

  15. Rodriguez T, Aguilar J (2018) Knowledge extraction system from unstructured documents. IEEE Lat Am Trans 16(2):639–646

    Article  Google Scholar 

  16. Maio CD, Fenza G, Loia V et al (2016) Time aware knowledge extraction for microblog summarization on Twitter. Inf Fusion 28(C):60–74

    Article  Google Scholar 

  17. Morgan W, Morgan W, Morgan W (2011) Smoothing techniques for adaptive online language models: topic tracking in tweet streams. In: ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 422–429

  18. Cohen WW, Ravikumar P, Fienberg SE (2003) A comparison of string distance metrics for name-matching tasks. In: International conference on information integration on the web. AAAI Press, pp 73–78

  19. Resnik P (2011) Semantic similarity in a taxonomy: an information-based measure and its, application to problems of ambiguity in natural language. In: Semantic ambiguity and un-derspecification, pp 159–201

  20. Jin X, Sun C, Lin L et al (2014) Exploiting multiple resources for word-phrase semantic similarity evaluation, vol 8801, pp 46–57

  21. Sen P (2012) Collective context-aware topic models for entity disambiguation. In: International conference on World Wide Web. ACM, pp 729–738

  22. Hao Y, Zhang Y, He S et al (2016) A joint embedding method for entity alignment of knowledge bases. In: China conference on knowledge graph and semantic computing. Springer Singapore, pp 3–14

  23. Han J, Pei J, Yin Y (2000) Mining frequent patterns without candidate generation. In: ACM SIGMOD international conference on management of data. ACM, pp 1–12

  24. Pei J, Han J, Mortazavi-Asl B et al (2001) PrefixSpan: mining sequential patterns efficiently by prefix-projected pattern growth. In: International conference on data engineering. IEEE Computer Society, p 215

  25. Cook DJ, Holder LB (1994) Substructure discovery using minimum description length and background knowledge. J Artif Intell Res 1(1):1442

    Google Scholar 

  26. Yan X, Han J (2002) gSpan: graph-based substructure pattern mining. In: IEEE international conference on data mining. IEEE Computer Society, p 721

  27. Nijssen S (2004) A quickstart in frequent structure mining can make a difference. In: Tenth ACM SIGKDD international conference on knowledge discovery and data mining, Seattle, Washington, USA, Aug, 2004. DBLP, pp 647–652

  28. Wang H, Perng CS, Ma S et al (2005) Demand-driven frequent itemset mining using pattern structures. Knowl Inf Syst 8(1):82–102

    Article  Google Scholar 

  29. Lu HC, Yang YW (2018) Mining mobile application usage pattern for demand prediction by considering spatial and temporal relations. Geoinformatica 5:1–29

    Google Scholar 

  30. Deshpande M, Kuramochi M, Karypis G (2005) Frequent Sub-structure-based approaches for classifying chemical compounds. IEEE Trans Knowl Data Eng 17(8):1036–1050

    Article  Google Scholar 

  31. Xu X, Cui L, Liu S et al (2017) Predicting hospital readmission from longitudinal healthcare data using graph pattern mining based temporal phenotypes. In: IEEE international conference on bioinformatics and biomedicine. IEEE Computer Society, pp 824–829

  32. Richardson M, Domingos P (2006) Markov logic networks. Kluwer Academic Publishers, Dordrecht

    Book  Google Scholar 

  33. Yang F, Yang Z, Cohen WW (2017) Differentiable learning of logical rules for knowledge base reasoning

  34. Mobasheri A (2017) A rule-based spatial reasoning approach for OpenStreetMap data quality enrichment; case study of routing and navigation. Sensors 17(11):2498

    Article  Google Scholar 

  35. Abudahab K, Xu DL, Chen YW (2016) A new belief rule base knowledge representation scheme and inference methodology using the evidential reasoning rule for evidence combination. Expert Syst Appl 51(C):218–230

    Article  Google Scholar 

  36. Lu SY, Hsu KH, Kuo LJ (2013) A semantic service match approach based on WordNet and SWRL rules. In: IEEE, international conference on e-business engineering. IEEE Computer Society, pp 419–422

  37. Bordes A, Usunier N, Garcia-Duran A et al (2013) Translating embeddings for modeling multi-relational data. In: International conference on neural information processing systems. Curran Associates Inc., pp 2787–2795

  38. Wang Z, Zhang J, Feng J et al (2014) Knowledge graph embedding by translating on hyperplanes. In: Twenty-eighth AAAI conference on artificial intelligence. AAAI Press, pp 1112–1119

  39. Lin Y, Liu Z, Zhu X et al (2015) Learning entity and relation embeddings for knowledge graph completion. In: Twenty-ninth AAAI conference on artificial intelligence. AAAI Press, pp 2181–2187

  40. Lin Y, Liu Z, Luan H et al (2015) Modeling relation paths for representation learning of knowledge bases. Computer Science, 2015

Download references

Acknowledgements

Research in this paper is partially supported by the National Key Research and Development Program of China (2018YFB1004804), the National Science Foundation of China (61802089, 61772155, 61832004, 61832014).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiying Tu.

Ethics declarations

Conflict of interest

We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work. There is no professional or other personal interest of any nature or kind in any product, service and/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled, “Crowdsourcing Service Requirement Oriented Requirement Pattern Elicitation Method”.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tu, Z., Lv, M., Xu, X. et al. Crowdsourcing service requirement oriented requirement pattern elicitation method. Neural Comput & Applic 32, 10109–10126 (2020). https://doi.org/10.1007/s00521-019-04542-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-019-04542-w

Keywords

Navigation