NON FUNCTIONAL REQUIREMENT TRACEABILITY AUTOMATION-AN MOBILE MULTIMEDIA APPROACH



Similar documents
Performance Evaluation of Requirements Engineering Methodology for Automated Detection of Non Functional Requirements

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL

Requirements engineering

ISSN: A Review: Image Retrieval Using Web Multimedia Mining

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS

FPGA Implementation of Human Behavior Analysis Using Facial Image

A Review of Data Mining Techniques

Requirements engineering and quality attributes

Improving Traceability of Requirements Through Qualitative Data Analysis

Customer Classification And Prediction Based On Data Mining Technique

Random forest algorithm in big data environment

How To Use Neural Networks In Data Mining

Requirements Analysis through Viewpoints Oriented Requirements Model (VORD)

Bisecting K-Means for Clustering Web Log data

Unlocking Value from. Patanjali V, Lead Data Scientist, Tiger Analytics Anand B, Director Analytics Consulting,Tiger Analytics

SVM Based License Plate Recognition System

Enhanced Boosted Trees Technique for Customer Churn Prediction Model

Neural Networks in Data Mining

Elicitation and Modeling Non-Functional Requirements A POS Case Study

Partnering for Project Success: Project Manager and Business Analyst Collaboration

The Scientific Data Mining Process

Keywords document, agile documentation, documentation, Techno functional expert, Team Collaboration, document selection;

Lecture 9: Requirements Modelling

Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization

Elicitation and Modeling Non-Functional Requirements A POS Case Study

Master s Program in Information Systems

SPATIAL DATA CLASSIFICATION AND DATA MINING

QOS Based Web Service Ranking Using Fuzzy C-means Clusters

An Analysis of Hybrid Tool Estimator: An Integration of Risk with Software Estimation

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets

Knowledge Discovery from patents using KMX Text Analytics

MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts

Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) ( ) Roman Kern. KTI, TU Graz

EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN

Prediction of Heart Disease Using Naïve Bayes Algorithm

DATA MINING TECHNIQUES AND APPLICATIONS

Pattern-Aided Regression Modelling and Prediction Model Analysis

Financial Trading System using Combination of Textual and Numerical Data

A secure face tracking system

Introduction to Data Mining

Natural Language to Relational Query by Using Parsing Compiler

Big Data Analytics for SCADA

MSCA Introduction to Statistical Concepts

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: Vol. 1, Issue 6, October Big Data and Hadoop

Software Defect Prediction Modeling

A Data Warehouse Case Study

Architecture Centric Development in Software Product Lines

IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION

SIGNATURE VERIFICATION

CS 6361, SPRING 2010 Advanced Requirements Engineering Web Based Meeting Scheduler- Project Plan

Software Requirements, Third Edition

Comparing Methods to Identify Defect Reports in a Change Management Database

Implementation of Model-View-Controller Architecture Pattern for Business Intelligence Architecture

Comparison of K-means and Backpropagation Data Mining Algorithms

Keywords : Data Warehouse, Data Warehouse Testing, Lifecycle based Testing

Social Media Mining. Data Mining Essentials

Data Mining. Nonlinear Classification

Establishing the Uniqueness of the Human Voice for Security Applications

REFLECTIONS ON THE USE OF BIG DATA FOR STATISTICAL PRODUCTION

An Approach towards Automation of Requirements Analysis

Requirements Definition and Management Processes

AN IMPROVED DESIGN OF REVERSIBLE BINARY TO BINARY CODED DECIMAL CONVERTER FOR BINARY CODED DECIMAL MULTIPLICATION

Optimization of Image Search from Photo Sharing Websites Using Personal Data

Data Mining Governance for Service Oriented Architecture

Big Data Analytics. An Introduction. Oliver Fuchsberger University of Paderborn 2014

Secure State UML: Modeling and Testing Security Concerns of Software Systems Using UML State Machines

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition

Extension of Decision Tree Algorithm for Stream Data Mining Using Real Data

META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING

Do you know? "7 Practices" for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd.

A Step towards Software Corrective Maintenance: Using RCM model

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

Automatic Detection of PCB Defects

REVIEW OF ENSEMBLE CLASSIFICATION

Dataset Preparation and Indexing for Data Mining Analysis Using Horizontal Aggregations

HiTech. White Paper. A Next Generation Search System for Today's Digital Enterprises

Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier

Data Integration using Agent based Mediator-Wrapper Architecture. Tutorial Report For Agent Based Software Engineering (SENG 609.

Software Engineering. Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti

Predict the Popularity of YouTube Videos Using Early View Data

Requirements Engineering

(b) How data mining is different from knowledge discovery in databases (KDD)? Explain.

PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2

Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results

Position Classification Standard for Management and Program Clerical and Assistance Series, GS-0344

Web Mining using Artificial Ant Colonies : A Survey

Business Analysis Standardization & Maturity

Decision Support System For A Customer Relationship Management Case Study

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Florida International University - University of Miami TRECVID 2014

Using Feedback Tags and Sentiment Analysis to Generate Sharable Learning Resources

Modeling and Design of Intelligent Agent System

Transcription:

Journal of Computer Science 2012, 8 (11), 1803-1808 ISSN 1549-3636 2012 doi:10.3844/jcssp.2012.1803.1808 Published Online 8 (11) 2012 (http://www.thescipub.com/jcs.toc) NON FUNCTIONAL REQUIREMENT TRACEABILITY AUTOMATION-AN MOBILE MULTIMEDIA APPROACH 1 J. Selvakumar and 2 M. Rajaram 1 Department of Software Engineering, Sri Ramakrishna Engineering College, Coimbatore, 641 022, Tamil Nadu, India 2 Anna University of Technology Tirunelveli, Tirunelveli-627 007, Tamil Nadu, India Received 2012-03-01, Revised 2012-07-16; Accepted 2012-09-06 ABSTRACT Requirements Engineering (RE) is the area of software engineering that deals with the discovery and specification of the objectives for the system under development and the environment in which it is used including the human activities it supports. Requirement Elicitation is process of gathering requirements from stakeholders. Incorporating RE to identify non Functional Requirements (NFR) in early stages of design and implementation avoids ambiguities, conflicting requirement and other defects. The efficacy of the requirement engineering methodology is its ability to capture NFR in an efficient manner. In this study, we propose a novel method of elicitation using mobile multimedia and to automatically trace the NFR. The requirements description is captured in video using smart phones. Requirement document are prepared using voice to text converter. NFR is detected automatically from the requirement document and hand gestures emphasise the importance of the requirement. It is observed that the precision and recall of the classifiers is better using multimedia data. Features were extracted from video frame and audio using image processing technique and speech processing. We investigated data mining approach to identify Non Functional Requirements (NFR) from Functional Requirement (FR) Documents. Results obtained were satisfactory. Keywords: Non Functional Requirement, Split Video, Voice to Text, Mobile Multimedia, Requirement Engineering 1. INTRODUCTION Requirement Engineering (RE) consists of activities like elicitation, detection, authentication, documenting a set of requirements for development of software system. The software quality is directly related to the quality of RE and also the number of defects depends upon the quality of RE (Voas, 2003). Projects fail or are cancelled due to improper quality requirements and when done well helps reduce costs and increase quality of software; thus RE is critical for developing and maintaining software. Resolving defective requirements like conflicting requirements, ambiguous or inconsistent requirements are part of the RE (Niazi, 2002). Requirements can be broadly classified into Functional Requirements (FR) and Non Functional which describe what the software has to do that is the functionality of the system whereas NFR deals with requirements that constrain the system and are generally quality requirements which specify how well the software performs (Li et al., 2004). Simple language, detailed business requirements and detailed description of system services are the most common characteristics of FR. The NFR can be classified as Organizational requirements, Product requirements and External requirements. Since NFR identifies user or system constraints it is characterized by features such as user-friendliness, response time, portability, reliability and maintainability. Requirement elicitation is an important process to identify complete, clear, correct and consistent requirements (Mustafa et al., 2005). Focus groups, interviews, observation, survey, questionnaire are some Requirements (NFR). FR are basically product features of the techniques used for elicitation (Khan and Mustafa, Correspondings Author: Selvakumar, J., Department of Software Engineering, Sri Ramakrishna Engineering College, Coimbatore, 641 022, Tamil Nadu, India Tel: 91 9994266855 1803

2008). One of the main problems faced during elicitation is the communication barrier between the analyst and the stakeholder. Conflicting requirements, unspoken or assumed requirements, difficulty in meeting the stakeholders are some of the challenges faced during requirement elicitation (Beyer and Holtzblatt, 1998). Multimedia methods are effective to address the communication gap between the analyst and stakeholder. Multimedia in form of video is used for requirement elicitation (Brun-Cottan and Wall, 1995); use of leads to better stake holder involvement, enforces focused observation, enables repeatability, thus ensuring better elicitation. The mobile device technologies have evolved significantly over the past few years. Mobile devices like smart phones, personal digital assistants led to the development of RE tools for requirement gathering. Modern mobile smart phones have multimedia features like microphones and digital cameras which can be used for requirement elicitation (Wahsheh and Foss, 2008). The requirements are captured as natural language statements in video with hand gestures to emphasis the importance of the requirements. In this study, a novel method of requirements gathering is proposed. Using speech processing techniques and image processing techniques, the functional and non functional requirements are extracted using natural language processing. The proposed method is tested using data mining techniques and benchmarked with manual classification. 1.1. Previous Research Kumar (2009) created a user friendly and intelligent tool to assist software engineers in the analysis and design stages for extracting software requirements and develop different UML representations. The key feature of the proposed tool is the automatic generation of classified requirements, use case diagram and Object Interaction Diagram (OID) from a text based case or voice which is first converted to text. The study also discusses existing modeling tool issues and implementing a new modeling tool using speech reorganization tool and an artificial Intelligence concept. Using speech recognition-based language tool software demonstrably improves the mean analysis abilities of a heterogeneous group of developers. Steele et al. (2006) proposed an automatic speech recognition technique for capturing the non-functional requirements spoken by stakeholders at open meetings and interviews during the requirements elicitation process. As statements related to system qualities such as security, performance and portability are often scattered throughout statements of functional need, the ability to listen in on a conversation and correctly capture these statements into a single view is very helpful. The proposed approach is intended to enhance and not replace existing elicitation methods in which stakeholders are more directly asked to describe their needs. Training a speech detection tool to recognize individual users is time consuming while speech detection for un-enrolled users is notoriously difficult. The proposed approach uses a context-free grammar to boost recognition accuracy, segment the stakeholders utterances and finally to classify the recognized statements by quality type. The accuracy of the NFR classification is limited not only by the completeness and correctness of the indicator terms, but also by the accuracy of the underlying speech recognition. Rabiser et al. (2006) reported two different approaches enabling mobile analysts and end users to add multimedia descriptions to requirements. Based on mobile tool for scenario-based RE, the authors compared a solution based on the COTS package Microsoft Pocket Word with a novel plug-in solution providing more flexibility for tool users. The authors explored which option was more amenable to different user types. As little was known about capturing multimedia requirements descriptions using mobile RE tools, this comparison can stimulate further research in this field. Pocket Word perfectly supports users which prefer to work with a fully-fledged word processor. Seamlessly integrating such a COTS product is challenging (Sullabi and Shukur, 2008). A plug-in solution is a more flexible and adaptive solution providing just the features most users need. The contribution provided by this study can help researchers to select an appropriate solution how to facilitate multimedia requirements descriptions. Nagel et al. (2010) proposed a solution by employing mobile devices as a ubiquitous recording infrastructure that also enables the user to bridge the gap between informal communication and formal project model elements. The mobile recording application can establish links between a conversation recording in a central audio repository and project model elements in our project management and CASE tool. Project participants can use the application to capture audio and context, create new work items for other participants, engage in asynchronous audio discussions and review project artifacts. Steinberg et al. (2010) presented a system that acquires and classifies users hand gestures from images 1804

and videos. Using inputs from low resolution off-theshelf web cameras, the proposed algorithm identifies the location and shape of the depicted hand gesture and classifies it into one of several predefined gestures. The proposed method first applies image processing techniques on the images in order to cancel background and noise effects on the image; it then extracts relevant features for classification and finally classifies the gesture features using a multiclass Support Vector Machine classifier. The algorithm is robust and operates well on several different backgrounds, lighting and noise conditions. The proposed method achieves an average 97.8% accuracy rate in several cases and it is suitable for both real-time and offline classification. 2. MATERIALS AND METHODS In this study it is proposed to gather requirements using the video facility available in mobile phones. The user uses his hand gesture to convey the importance of the requirement. The requirement gathered using the mobile phone is shown in Fig. 1. Different hand gestures are used to differentiate the task in hand. Some of the gestures used in this study are shown in Fig. 2. The work to convert the multimedia data into of the video can be broadly classified into three major parts: Converting the audio data to text using speech to text converter. Using Natural Language Processing (NLP) it is proposed to extract features from the textual content and classify the text as functional or non functional requirement Converting the video data to frames, identifying the Region of Interest and classification of the hand gesture Using the above image and text data classify the type of Non Functional Requirement (NRF) specified The block diagram of the proposed audio feature extraction method is shown in Fig. 3. Once the audio features are extracted textual content, the video is split into frames and each frame is examined for the region of interest. If the frame does not contain the ROI, it is discarded else it is used for feature extraction and classification. The block diagram of the proposed technique is shown in Fig. 4. The video frames extracted and processing steps are shown in Fig. 5. The goal of this work is to evaluate the performance of the proposed method in automated classification of NRF. To validate the proposed method the author used one of his students to read the NFR dataset available in the promise data repository with appropriate gestures. The NFR dataset consists of 15 requirement specifications of MS student projects and has a total of 326 NFRs and 358 FRs. The NFR categories included availability, scalability, usability, security. One NFR category in the dataset was portability and since only one class label existed, the instance was removed from this study. Bagging based classifiers generated multiple versions of predictors and using the same to get an aggregated predictor. A predictor φ (x, l) predicts a class label j {1, 2,, J}. With the learning set l, Φ predicts class label j at input x with relative frequency Eq. 1: Q(j x) = P( φ (x,l) = j) (1) The probability that the predictor classifies x correctly is Eq. 2: Q(j x)p(j x) (2) j Boosting (Friedman et al., 2000) works by using classification algorithms sequentially on the reweighted versions of the training data. The final class label predicted is based on the weighted majority vote. In logitboost the initial weights is set at 1/N where N is the number of instance with the probability estimate p (x i = 0.5). The process is repeated m times and the function is fitted using least squares regression. Fig. 1. The requirement captured in a BlackBerry handset 1805

Fig. 2. Gestures used to convey different meanings during the multimedia requirement gathering Fig. 3. The proposed feature extraction technique for audio data Fig. 4. Vision based hand gesture classification system 1806

Fig. 5. The original frame and the feature extracted frames Fig. 6. Classification accuracy and the relative absolute error Table 1. Precision and recall on the investigated data Logitboost Bagging ------------------------ ----------------------- Class Precision Recall Precision Recall Performance 0.933 0.700 0.833 0.833 Look and Feel 0.571 0.333 1.000 0.100 Usability 0.474 0.500 0.364 0.615 Availability 0.600 0.750 1.000 0.333 Security 0.444 0.500 0.533 0.571 Functional 0.677 0.894 0.709 0.907 Fault Tolerance 0.200 0.200 0.000 0.000 Scalability 0.500 0.143 0.500 0.143 Operational 0.714 0.385 0.588 0.476 Legal 0.000 0.000 0.000 0.000 Maintainability 0.333 0.250 1.000 0.250 Table 2. The classification results when conventional technique is used Logitboost Bagging ---------------------- ---------------------- Precision Recall Precision Recall Performance 0.830 0.722 0.844 0.704 Look and Feel 0.231 0.079 0.625 0.132 Usability 0.569 0.433 0.414 0.433 Availability 0.800 0.571 0.727 0.381 Security 0.588 0.455 0.578 0.394 Functional 0.625 0.894 0.608 0.906 Fault Tolerance 0.000 0.000 0.333 0.100 Scalability 0.333 0.333 0.250 0.095 Operational 0.543 0.403 0.549 0.452 Legal 0.333 0.077 0.000 0.000 Maintainability 0.176 0.013 0.667 0.118 1807

3. RESULTS The precision and recall for both the classifiers on the predicted class labels is shown in Table 1. Table 2 shows the precision and recall for conventional non video based technique. From Table 1 and 2 it is seen that the classifier accuracy improves by more than 5%. The overall classification accuracy and the relative absolute error are shown in Fig. 6. 4. DISCUSSION In this study a novel multimedia based requirement engineering methodology based on gesture was proposed. Features were extracted from video frame and audio using image processing technique and speech processing. We investigated data mining approach to identify Non Functional Requirements (NFR) from Functional Requirement (FR) Documents. 5. CONCLUSION In the proposed method we use public dataset available in the promise database repository and investigate Bagging and Logitboost classification algorithms. The data was recorded in a mobile handset by one user. 57 words based on their importance were extracted from the requirement document for the data mining operation. Results obtained were satisfactory. Further work needs to be done by using Neural Network based retrieval system and preprocessing the data with Singular Value Decomposition. It is shown that multimedia based techniques improve the overall accuracy in the automation of identifying functional and non functional requirements. 6. REFERENCES Beyer, H. and K. Holtzblatt, 1998. Contextual Design: Defining Customer-Centered Systems. 1st Edn., Morgan Kaufmann, San Francisco, Calif., ISBN: 10-1558604111, pp: 427. Brun-Cottan, F. and P. Wall, 1995. Using video to represent the user. Commun. ACM., 38: 61-70. DOI: 10.1145/203356.203368 Kumar, B.V.D., 2009. Speech to UML: An intelligent modeling tool for software engineering. Comput. Sci. Lett. Friedman, J., T. Hastie and R. Tibshirani, 2000. Additive logistic regression: A statistical view of boosting. Ann. Stat., 28: 337-407. DOI: 10.1214/aos/1016218223 Khan, R.A. and K. Mustafa, 2008. Secured Requirement Specification Framework (SRSF). Am. J. Applied Sci., 5: 1622-1629. DOI: 10.3844/ajassp.2008.1622.1629 Li, J., A. Eberlein and B.H. Far, 2004. Evaluating the requirements engineering process using major concerns. Software Eng. Mustafa, K., K. Gowthaman and R.A. Khan, 2005. Measuring the function points for migration project: A case study. Am. J. Applied Sci., 2: 1218-1221. DOI: 10.3844/ajassp.2005.1218.1221 Nagel, M., J. Helming, M. Koegel and H. Naughton, 2010. Audio recording in software engineering. ICSE South Africa. Niazi, M.K., 2002. Improving the requirements engineering process through the application of a key process areas approach. AWRE. Rabiser, R., N. Seyff and P. Grunbacher, 2006. Capturing multimedia requirements descriptions with mobile RE tools. Proceedings of the 1st International Workshop on Multimedia Requirements Engineering, Sep. 12-12, IEEE Xplore Press, Minnneapolis, MN, USA., pp: 2-2. DOI: 10.1109/MERE.2006.1 Steele, A., J. Arnold and J. Cleland-Huang, 2006. Speech detection of stakeholders non-functional requirements. Proceedings of the 1st International Workshop on Multimedia Requirements Engineering, Sep. 12-12, IEEE Xplore Press, pp: 3-3. DOI: 10.1109/MERE.2006.5 Steinberg, I., T.M. London and D.D. Castro, 2010. Hand gesture recognition in images and video. Department of Electrical Engineering. Sullabi, M.A. and Z. Shukur, 2008. SNL2Z: Tool for translating an informal structured software specification into formal specification. Am. J. Applied Sci., 5: 378-384. DOI: 10.3844/ajassp.2008.378.384 Voas, J., 2003. Assuring software quality assurance. IEEE Software, 20: 48-49. DOI: 10.1109/MS.2003.1196320 Wahsheh, L.A. and J. Alves-Foss, 2008. Security policy development: Towards a life-cycle and logic-based verification model. Am. J. Applied Sci., 5: 1117-1126. DOI: 10.3844/ajassp.2008.1117.1126 1808