Computer Science ›› 2020, Vol. 47 ›› Issue (3): 48-53.doi: 10.11896/jsjkx.190700146
Special Issue: Intelligent Software Engineering
• Intelligent Software Engineering • Previous Articles Next Articles
KANG Yan,CUI Guo-rong,LI Hao,YANG Qi-yue,LI Jin-yuan,WANG Pei-yao
CLC Number:
[1]TONG Z X,MA P J,DING X,et al.Requirement Research on Demand Clustering and Demand Optimization Method Based on Natural Language Understanding [J].High Technology Letters,2015,25(3):257-269. [2]MÖLLER K H.Ausgangsdaten für Qualit?tsmetriken-Eine Fundgrube für Analysen[M]∥Software-Metriken in der Praxis.Springer,1996. [3]BOEHM B W,ROSS R.Theory-W Software Project Management:Principles and Examples[J].IEEE Transactions on Software Engineering,1989,15(7):902-916. [4]DAVIS A M.Software requirements:objects,functions,and states [M].PTR Prentice Hall,1993. [5]XIAO W N,ZHANG W Q,WANG L L.Research on a Software Needs Analysis Risk Assessment Model Based on BP Neural Network [J].Computer Science,2011,38(4):199-202. [6]WANG Y M,HAN F,WANG H P,et al.Software Demand Risk Model Based on Grey Clustering Evaluation and Its Application[J].Computer Engineering and Design,2006(18):3497-3500. [7]DEVLIN J,CHANG M W,LEE K,et al.BERT:Pre-training of Deep Bidirectional Transformers for Language Understanding[M]∥Encyclopedia of Systems Biology.New York:Springer,2013. [8]VASWANI A,SHAZEER N,PARMAR N,et al.Attention Is All You Need[J].arXiv:1706.03762,2017. [9]MARGHNY H.MOHAMED,MOHAMMED M.Abdelsamea:Self Organization Map based Texture Feature Extraction for Efficient Medical Image Categorization[J].arXiv:1408.4143,2014. [10]MARTIN J,KLEINROCK L.Excerpts from:An Information Systems Manifesto[J].Communications of the ACM,1985,28(3):252-255. [11]ZHAO W,ZHANG L,MEI H,et al.A Program Clustering Method Based on Functional Demand Hierarchy Condensation[J].Journal of Software,2006(8):1661-1668. [12]JIANG B,YE L Y,PAN W F,et al.Service clustering method based on demand function semantics [J].Journal of Computers,2018,41(6):1035-1046. [13]SUN Z Y,LIU G S.Research on neural network clustering algorithm for short texts [J].Computer Science,2018,45 (S1):392-395. [14]HU W S,YANG J F,ZHAO M.Demand analysis based on grey clustering algorithm [J].Computer Science,2016,43 (S1):471-475. [15]MIKOLOV T,CHEN K,CORRADO G,et al.Efficient Estimation of Word Representations in Vector Space[J].arXiv:1301.3781,2013. [16]COATES A,NG A Y.Learning feature representations with K-means[J].Lecture Notes in Computer Science,2012,7700:561-580. [17]ZEPEDA-MENDOZA M L,RESENDIS-ANTONIO O.Hierarchical Agglomerative Clustering[M]∥Encyclopedia of Systems Biology.New York:Springer,2013. [18]COMON P.Independent component analysis,A new concept [J].Signal Processing,1994,36(3):287-314. [19]BLEI D M,NG A Y,JORDAN M I.Latent dirichlet allocation[J].Journal of Machine Learning Research,2012,3:993-1022. |
[1] | WU Zi-yi, LI Shao-mei, JIANG Meng-han, ZHANG Jian-peng. Ontology Alignment Method Based on Self-attention [J]. Computer Science, 2022, 49(9): 215-220. |
[2] | FANG Yi-qiu, ZHANG Zhen-kun, GE Jun-wei. Cross-domain Recommendation Algorithm Based on Self-attention Mechanism and Transfer Learning [J]. Computer Science, 2022, 49(8): 70-77. |
[3] | CHEN Kun-feng, PAN Zhi-song, WANG Jia-bao, SHI Lei, ZHANG Jin. Moderate Clothes-Changing Person Re-identification Based on Bionics of Binocular Summation [J]. Computer Science, 2022, 49(8): 165-171. |
[4] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[5] | JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186. |
[6] | ZHANG Jia-hao, LIU Feng, QI Jia-yin. Lightweight Micro-expression Recognition Architecture Based on Bottleneck Transformer [J]. Computer Science, 2022, 49(6A): 370-377. |
[7] | KANG Yan, WU Zhi-wei, KOU Yong-qi, ZHANG Lan, XIE Si-yu, LI Hao. Deep Integrated Learning Software Requirement Classification Fusing Bert and Graph Convolution [J]. Computer Science, 2022, 49(6A): 150-158. |
[8] | ZHAO Dan-dan, HUANG De-gen, MENG Jia-na, DONG Yu, ZHANG Pan. Chinese Entity Relations Classification Based on BERT-GRU-ATT [J]. Computer Science, 2022, 49(6): 319-325. |
[9] | HAN Jie, CHEN Jun-fen, LI Yan, ZHAN Ze-cong. Self-supervised Deep Clustering Algorithm Based on Self-attention [J]. Computer Science, 2022, 49(3): 134-143. |
[10] | HU Yan-li, TONG Tan-qian, ZHANG Xiao-yu, PENG Juan. Self-attention-based BGRU and CNN for Sentiment Analysis [J]. Computer Science, 2022, 49(1): 252-258. |
[11] | HU De-feng, ZHANG Chen-xi, WANG Shi-tao, ZHAO Qin-pei, LI Jiang-feng. Intelligent Prediction Model of Tool Wear Based on Deep Signal Processing and Stacked-ResGRU [J]. Computer Science, 2021, 48(6): 175-183. |
[12] | WANG Xi, ZHANG Kai, LI Jun-hui, KONG Fang, ZHANG Yi-tian. Generation of Image Caption of Joint Self-attention and Recurrent Neural Network [J]. Computer Science, 2021, 48(4): 157-163. |
[13] | YU You-qin, LI Bi-cheng. Microblog User Interest Recognition Based on Multi-granularity Text Feature Representation [J]. Computer Science, 2021, 48(12): 219-225. |
[14] | ZHOU Xiao-shi, ZHANG Zi-wei, WEN Juan. Natural Language Steganography Based on Neural Machine Translation [J]. Computer Science, 2021, 48(11A): 557-564. |
[15] | ZHANG Shi-hao, DU Sheng-dong, JIA Zhen, LI Tian-rui. Medical Entity Relation Extraction Based on Deep Neural Network and Self-attention Mechanism [J]. Computer Science, 2021, 48(10): 77-84. |
|