Identification of data cohesive subsystems using data mining techniques

被引:23
|
作者
de Oca, CM [1 ]
Carver, DL [1 ]
机构
[1] Louisiana State Univ, Dept Comp Sci, Baton Rouge, LA 70803 USA
关键词
D O I
10.1109/ICSM.1998.738485
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The activity of reengineering and maintaining large legacy systems involves the use of design recovery techniques to produce abstractions that facilitate the understanding of the system. In this paper, we present an approach to design recovery based on data mining. This approach derives from the observation that data mining can discover unsuspected non-trivial relationships among elements in large databases. This observation suggests that data mining can be used to elicit new knowledge about the design of a subject system and that it can be applied to large legacy systems. We describe the ISA methodology which uses data mining to identify data cohesive subsystems. We were able to decompose COBOL systems into subsystems by using this approach. Our experience shows that data mining can identify data cohesive subsystems without any previous knowledge of the subject system. Furthermore, data mining can produce meaningful results regardless of system size making this approach especially appropriate to the analysis of large undocumented systems.
引用
收藏
页码:16 / 23
页数:8
相关论文
共 50 条
  • [1] Identification of lead compounds in pharmaceutical data using data mining techniques
    Nicolaou, CA
    [J]. ADVANCES IN INFORMATICS, 2003, 2563 : 133 - 146
  • [2] Using Data Mining Techniques for Sentiment Shifter Identification
    Noferesti, Samira
    Shamsfard, Mehrnoush
    [J]. LREC 2016 - TENTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, 2016, : 2716 - 2720
  • [3] Identification of problems in industrial networks using data mining techniques
    Igor, Halenar
    Michal, Kebisek
    Tadanai, Ondrej
    [J]. INES 2015 - IEEE 19TH INTERNATIONAL CONFERENCE ON INTELLIGENT ENGINEERING SYSTEMS, 2015, : 295 - 300
  • [4] Intrusion detection and identification system using data mining and forensic techniques
    Len, Fang-Yie
    Hu, Kai-Wei
    Jiang, Fuu-Cheng
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 137 - +
  • [5] Automated Chagas Disease Vectors Identification using Data Mining Techniques
    Ghasemi, Zeinab
    Banitaan, Shadi
    Al-Refai, Ghaith
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2020, : 540 - 545
  • [6] Micro Sequence Identification of DNA Data Using Pattern Mining Techniques
    Surendar, A.
    Shaik, Sadulla
    Rani, N. Usha Rani
    [J]. MATERIALS TODAY-PROCEEDINGS, 2018, 5 (01) : 578 - 587
  • [7] Crime detection and criminal identification in India using data mining techniques
    Tayal D.K.
    Jain A.
    Arora S.
    Agarwal S.
    Gupta T.
    Tyagi N.
    [J]. AI and Society, 2014, 30 (01): : 117 - 127
  • [8] Using data mining and datawarehousing techniques
    Forcht, KA
    Cochran, K
    [J]. INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 1999, 99 (5-6) : 189 - 196
  • [9] Using data mining and datawarehousing techniques
    Forcht, Karen A.
    Cochran, Kevin
    [J]. Industrial Management and Data Systems, 1999, 99 (05): : 189 - 196
  • [10] DATA MINING DATA MINING CONCEPTS AND TECHNIQUES
    Agarwal, Shivam
    [J]. 2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 203 - 207