Computer Science ›› 2020, Vol. 47 ›› Issue (3): 48-53.doi: 10.11896/jsjkx.190700146

Special Issue: Intelligent Software Engineering

• Intelligent Software Engineering • Previous Articles     Next Articles

Software Requirements Clustering Algorithm Based on Self-attention Mechanism and Multi- channel Pyramid Convolution

KANG Yan,CUI Guo-rong,LI Hao,YANG Qi-yue,LI Jin-yuan,WANG Pei-yao   

  1. (College of Software, Yunnan University, Kunming 650091, China)
  • Received:2019-07-22 Online:2020-03-15 Published:2020-03-30
  • About author:KANG Yan,born in 1972,master supervisor,is member of China Computer Federation (CCF).Her main research interests include machine learning and so on. CUI Guo-rong,born in 1995,master.His main research interests include natural language processing and so on.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61762092, 61762089) and Yunnan Provincial Key Laboratory of Software Engineering Open Fund Project (2017SE204).

Abstract: With the rapid increasing in the number of software and the increasing variety of types,how to mine the text characteristics of software requirements and cluster the characteristics of software requirements has become a major challenge in the field of software engineering.The clustering of software requirements texts provides a reliable guarantee for the software development process while reducing the potential risks and negative impacts of the requirements analysis phase.However,the software requirements text has the characteristics of high dispersion,high noise,and sparse data.At present,the work related to clustering is limited to a single type of text,and the functional semantics of software requirements are rarely considered.In view of the characteristics of the demand text and the limitations of the traditional clustering method,this paper proposed a software demand clustering algorithm (SA-MPCN&SOM) combining the self-attention mechanism and multi-channel pyramid convolution.The method captures the global features through the self-attention mechanism,and then extract the required text features from the depth of the different windows based on multi-channel pyramid convolution.Thus,the perceived text fragments are multiplied,and finally the multiplexed text features are clustered using SOM.The experimental results on the software demand data show that the proposed method can better mine the demand features,cluster the demand features,and outperform other feature extraction methods and clustering algorithms.

Key words: Demand analysis, Pyramid convolution, Self-attention, Text clustering, Text feature

CLC Number: 

  • TP309
[1]TONG Z X,MA P J,DING X,et al.Requirement Research on Demand Clustering and Demand Optimization Method Based on Natural Language Understanding [J].High Technology Letters,2015,25(3):257-269.
[2]MÖLLER K H.Ausgangsdaten für Qualit?tsmetriken-Eine Fundgrube für Analysen[M]∥Software-Metriken in der Praxis.Springer,1996.
[3]BOEHM B W,ROSS R.Theory-W Software Project Management:Principles and Examples[J].IEEE Transactions on Software Engineering,1989,15(7):902-916.
[4]DAVIS A M.Software requirements:objects,functions,and states [M].PTR Prentice Hall,1993.
[5]XIAO W N,ZHANG W Q,WANG L L.Research on a Software Needs Analysis Risk Assessment Model Based on BP Neural Network [J].Computer Science,2011,38(4):199-202.
[6]WANG Y M,HAN F,WANG H P,et al.Software Demand Risk Model Based on Grey Clustering Evaluation and Its Application[J].Computer Engineering and Design,2006(18):3497-3500.
[7]DEVLIN J,CHANG M W,LEE K,et al.BERT:Pre-training of Deep Bidirectional Transformers for Language Understanding[M]∥Encyclopedia of Systems Biology.New York:Springer,2013.
[8]VASWANI A,SHAZEER N,PARMAR N,et al.Attention Is All You Need[J].arXiv:1706.03762,2017.
[9]MARGHNY H.MOHAMED,MOHAMMED M.Abdelsamea:Self Organization Map based Texture Feature Extraction for Efficient Medical Image Categorization[J].arXiv:1408.4143,2014.
[10]MARTIN J,KLEINROCK L.Excerpts from:An Information Systems Manifesto[J].Communications of the ACM,1985,28(3):252-255.
[11]ZHAO W,ZHANG L,MEI H,et al.A Program Clustering Method Based on Functional Demand Hierarchy Condensation[J].Journal of Software,2006(8):1661-1668.
[12]JIANG B,YE L Y,PAN W F,et al.Service clustering method based on demand function semantics [J].Journal of Computers,2018,41(6):1035-1046.
[13]SUN Z Y,LIU G S.Research on neural network clustering algorithm for short texts [J].Computer Science,2018,45 (S1):392-395.
[14]HU W S,YANG J F,ZHAO M.Demand analysis based on grey clustering algorithm [J].Computer Science,2016,43 (S1):471-475.
[15]MIKOLOV T,CHEN K,CORRADO G,et al.Efficient Estimation of Word Representations in Vector Space[J].arXiv:1301.3781,2013.
[16]COATES A,NG A Y.Learning feature representations with K-means[J].Lecture Notes in Computer Science,2012,7700:561-580.
[17]ZEPEDA-MENDOZA M L,RESENDIS-ANTONIO O.Hierarchical Agglomerative Clustering[M]∥Encyclopedia of Systems Biology.New York:Springer,2013.
[18]COMON P.Independent component analysis,A new concept [J].Signal Processing,1994,36(3):287-314.
[19]BLEI D M,NG A Y,JORDAN M I.Latent dirichlet allocation[J].Journal of Machine Learning Research,2012,3:993-1022.
[1] WU Zi-yi, LI Shao-mei, JIANG Meng-han, ZHANG Jian-peng. Ontology Alignment Method Based on Self-attention [J]. Computer Science, 2022, 49(9): 215-220.
[2] FANG Yi-qiu, ZHANG Zhen-kun, GE Jun-wei. Cross-domain Recommendation Algorithm Based on Self-attention Mechanism and Transfer Learning [J]. Computer Science, 2022, 49(8): 70-77.
[3] CHEN Kun-feng, PAN Zhi-song, WANG Jia-bao, SHI Lei, ZHANG Jin. Moderate Clothes-Changing Person Re-identification Based on Bionics of Binocular Summation [J]. Computer Science, 2022, 49(8): 165-171.
[4] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[5] JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186.
[6] ZHANG Jia-hao, LIU Feng, QI Jia-yin. Lightweight Micro-expression Recognition Architecture Based on Bottleneck Transformer [J]. Computer Science, 2022, 49(6A): 370-377.
[7] KANG Yan, WU Zhi-wei, KOU Yong-qi, ZHANG Lan, XIE Si-yu, LI Hao. Deep Integrated Learning Software Requirement Classification Fusing Bert and Graph Convolution [J]. Computer Science, 2022, 49(6A): 150-158.
[8] ZHAO Dan-dan, HUANG De-gen, MENG Jia-na, DONG Yu, ZHANG Pan. Chinese Entity Relations Classification Based on BERT-GRU-ATT [J]. Computer Science, 2022, 49(6): 319-325.
[9] HAN Jie, CHEN Jun-fen, LI Yan, ZHAN Ze-cong. Self-supervised Deep Clustering Algorithm Based on Self-attention [J]. Computer Science, 2022, 49(3): 134-143.
[10] HU Yan-li, TONG Tan-qian, ZHANG Xiao-yu, PENG Juan. Self-attention-based BGRU and CNN for Sentiment Analysis [J]. Computer Science, 2022, 49(1): 252-258.
[11] HU De-feng, ZHANG Chen-xi, WANG Shi-tao, ZHAO Qin-pei, LI Jiang-feng. Intelligent Prediction Model of Tool Wear Based on Deep Signal Processing and Stacked-ResGRU [J]. Computer Science, 2021, 48(6): 175-183.
[12] WANG Xi, ZHANG Kai, LI Jun-hui, KONG Fang, ZHANG Yi-tian. Generation of Image Caption of Joint Self-attention and Recurrent Neural Network [J]. Computer Science, 2021, 48(4): 157-163.
[13] YU You-qin, LI Bi-cheng. Microblog User Interest Recognition Based on Multi-granularity Text Feature Representation [J]. Computer Science, 2021, 48(12): 219-225.
[14] ZHOU Xiao-shi, ZHANG Zi-wei, WEN Juan. Natural Language Steganography Based on Neural Machine Translation [J]. Computer Science, 2021, 48(11A): 557-564.
[15] ZHANG Shi-hao, DU Sheng-dong, JIA Zhen, LI Tian-rui. Medical Entity Relation Extraction Based on Deep Neural Network and Self-attention Mechanism [J]. Computer Science, 2021, 48(10): 77-84.
Full text



No Suggested Reading articles found!