A cluster analysis method of software development activities based on event log

被引:0
|
作者
Tang M. [1 ,2 ]
Li T. [3 ]
Zhu R. [1 ]
Ma Z. [1 ]
机构
[1] School of Software, Yunnan University, Kunming
[2] School of Life Sciences, Yunnan Normal University, Kunming
[3] School of Big Data, Yunnan Agricultural University, Kunming
基金
中国国家自然科学基金;
关键词
Clustering analysis; Environment; Event; Event log; Process mining; Software development activity;
D O I
10.2174/2666255813666191204144931
中图分类号
学科分类号
摘要
Background: Event log data generated in the software development process contains historical information and future trends in software development activities. The mining and analysis of event log data contribute to identify and discover software development activities and provide effective support for software development process mining and modeling. Methods: Firstly, a deep learning model (Word2vec) was used for feature extraction and vectorization of software development process event logs. Then, the K-means clustering algorithm and measure of silhouette coefficient and intra-cluster SSE were used for clustering and clustering effect evaluation of vectorized software development process event logs. Results: This paper obtained the mapping relationship between software development activities and events, and realized the identification and discovery of software development activities. Conclusion: Two practical software development projects (jEdit and Argouml) are given to prove the feasibility, rationality and effectiveness of our proposed method. This work provides effective support for software development process mining and software development behavior guidance. © 2021 Bentham Science Publishers.
引用
收藏
页码:1843 / 1851
页数:8
相关论文
共 50 条
  • [1] Web-based software development for cluster analysis experiment
    Shi, Tongju
    Ma, Xinshun
    2011 International Conference on Multimedia Technology, ICMT 2011, 2011, : 3301 - 3304
  • [2] Process next event prediction method based on event log sampling
    Dong, Lele
    Liu, Cong
    Zhang, Shuaipeng
    Ni, Weijian
    Ren, Chongguang
    Zeng, Qingtian
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2024, 30 (10): : 3621 - 3632
  • [3] Recursion Aware Modeling and Discovery for Hierarchical Software Event Log Analysis
    Leemans, Maikel
    van der Aalst, Wil M. P.
    van den Brand, Mark G. J.
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2018), 2018, : 185 - 196
  • [4] An Event Log Repair Method Based on Masked Transformer Model
    Wu, Ping
    Fang, Xianwen
    Fang, Huan
    Gong, Ziyou
    Kan, Daoyu
    APPLIED ARTIFICIAL INTELLIGENCE, 2024, 38 (01)
  • [5] Myocardial functional imaging in mice: development of a voxel based and cluster analysis software
    Curdy, M.
    Viertl, D.
    Georgantas, C.
    Prior, J. O.
    Allenbach, G.
    EUROPEAN JOURNAL OF NUCLEAR MEDICINE AND MOLECULAR IMAGING, 2018, 45 : S308 - S308
  • [6] Event log analysis service
    Inokuma, Hayato
    2006 SICE-ICASE International Joint Conference, Vols 1-13, 2006, : 3296 - 3299
  • [7] Event Log Analysis Software Design for Naval Combat System using Smart Platform
    Kim, Seung-Han
    Kim, Da-Hye
    Kim, Dong-Seong
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 216 - 217
  • [8] The Statechart Workbench: Enabling Scalable Software Event Log Analysis using Process Mining
    Leemans, Maikel
    van der Aalst, Wil M. P.
    van den Brand, Mark G. J.
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2018), 2018, : 502 - 506
  • [9] iBelt : An interpretable cluster analysis method for event logs
    Liu W.
    Wang G.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2022, 28 (10): : 3175 - 3186
  • [10] Research on cluster analysis method of e-government public hotspot information based on web log analysis
    Wang, Suozhu
    Zhang, Jianlin
    Yang, Fuze
    Ye, Jia
    Journal of Computing and Information Technology, 2014, 22 (SpecialIssue) : 11 - 19