Construction and Application of the User Behavior Knowledge Graph in Software Platforms
DOI:
https://doi.org/10.13052/jwe1540-9589.2027Keywords:
User behavior knowledge graph, user knowledge extraction, graph database, knowledge graph constructionAbstract
The analysis of user behavior provides a large amount of useful information. After being extracted, this information is called user knowledge. User knowledge plays a guiding role in implementing user-centric updates for software platforms. A good representation and application of user knowledge can accelerate the development of a software platform and improve its quality. This paper aims to further the utilization of user knowledge by mining the user knowledge that is implicit in user behavior and then constructing a knowledge graph of this behavior. First, the association between a software bug and a software component is mined from the user knowledge. Then, the knowledge entity extraction and relationship extraction are performed from the development code and the user behavior. Finally, the knowledge is stored in the graph database, from which it can be visually retrieved. Relevant experiments on CIFLog, an integrated logging processing software platform, have proved the effectiveness of this research. Constructing a user behavior knowledge graph can improve the utilization of user knowledge as well as the quality of software platform development.
Downloads
References
F. Wang, J.P. Liu, B. Liu, T.Y. Qian, Y.H. Xiao, Z.Y. Peng, ‘Survey on construction of code knowledge graph and intelligent software development’, Journal of Software, vol. 11, no. 18, Nov. 2019, pp. 1–20.
P. Huang, A. Tafti, S. Mithas, ‘Platform Sponsor Investments and User Contributions in Knowledge Communities: The Role of Knowledge Seeding’, MIS Quarterly, vol. 42, no. 1, 2018, pp. 213–240.
K. Dhindsa, D. Carcone, S. Becker, ‘Toward an Open-Ended BCI: A User-Centered Coadaptive Design’, Neural computation, 2017, 29(10): 2742–2768.
L. Ning, Wang, ‘CIFLog: the 3rd generation logging software based on Java-NetBeans’, Acta Petrolei Sinica, vol. 34, no. 1, 2013, pp. 192–200.
Kang, Sangwoo, and J. Seo, ‘Two-phase reanalysis model for understanding user intention’, Pattern Recognition Letters, 42(2014): 35–39.
M. Xin, Y. Zhang, S. Li, et al., ‘A Location-Context Awareness Mobile Services Collaborative Recommendation Algorithm Based on User Behavior Prediction’, International Journal of Web Services Research, vol. 2, no. 14, 2017, pp. 45–66.
Burkhardt, Dirk, et al., ‘Search Intention Analysis for Task- and User-Centered Visualization in Big Data Applications’, Procedia Computer Science 104(2017): 539–547.
S. Lakshmi Priya, S. Varatharajan, ‘Parallel algorithm based consumer behavior analysis for generating personalized ontology system’, International Journal of Managment, IT and Engineering, 2013, 3(5).
Lei, Wu, F. Qing, and J. Zhou, ‘Improved Personalized Recommendation based on Causal Association Rule and Collaborative Filtering’, International Journal of Distance Education Technologies, 14.3(2016): 21–33.
Khater, Shaymaa, D. Gracanin, and H.G. Elmongui, ‘Personalized Recommendation for Online Social Networks Information: Personal Preferences and Location-Based Community Trends’, IEEE transactions on computational social systems, 99(2017): 1–17.
Singal, Himani, and S. Kohli, ‘Trust Necessitated through Metrics: Estimating the Trustworthiness of Websites’, Procedia Computer Science, 85(2016): 133–140.
Majed Alrubaian, Muhammad Al-Qurishi, Mabrook Al-Rakhami, Mohammad Mehedi Hassan, Atif Alamri, ‘Reputation-based credibility analysis of Twitter social network users’, Concurrency and Computation: Practice and Experience, 2017, 29(7).
Zhou Wei, Wen Junhao, Qu Qiang, Zeng Jun, Cheng Tian, ‘Shilling attack detection for recommender systems based on credibility of group users and rating time series’, PloS one, 2018, 13(5).
Meng XW, Wang F, Shi YC, et al., ‘Mobile User Requirements Acquisition Techniques and Their Applications’, Journal of Software, vol. 3, no. 25, Dec. 2013, pp. 439–456.
C. Wang, W. Zhao, J. Wang, et al., ‘Multidimensional customer requirements acquisition based on ontology’, Computer Integrated Manufacturing Systems, vol. 4, no. 22, Jan. 2016, pp. 908–916.
Y. Wang, S. Yu, T. Xu, ‘A User Requirement Driven Framework for Collaborative Design Knowledge Management’, Advanced Engineering Informatics, vol. 33, 2017, pp. 16–28.
M. Maouche, and M. Bettaz, ‘Towards a Software Engineering Approach to Multi-Scale Modeling and Simulation’, International Journal of Software Engineering & Its Applications, 2016, 10(11): 205–218.
R.A.B. Ouriques, K. Wnuk, T. Gorschek, et al., ‘Knowledge Management Strategies and Processes in Agile Software Development: A Systematic Literature Review’, International Journal of Software Engineering and Knowledge Engineering, 2019, 29(3): 345–380.
De Vasconcelos, Jose Braga, et al., ‘The application of knowledge management to software evolution’, International Journal of Information Management 37. 1pt. A(2017): 1499–1506.
Goncalves, Joshua, and A. Krishna, ‘Incorporating Change Management Within Dynamic Requirements-Based Model-Driven Agent Development’, The Computer journal, 2017, 60(7): 1044–1077.
W.P. Li, J.B. Wang, Z.Q. Lin, J.F. Zhao, Y.Z. Zou, B. Xie, ‘Software Knowledge Graph Building Method for Open Source Project’, Journal of Frontiers of Computer Science and Technology, vol. 11, no. 6, 2017, pp. 851–862.
Arshad, Muhammad U., et al., ‘Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases’, IEEE Transactions on Knowledge & Data Engineering, 99(2017): 866–879.
P.J. Foote, D.G. Stuart, R. Elmore-Yalch, ‘Exploring customer loyalty as a transit performance measure’, Transportation Research Record: Journal of the Transportation Research Record, vol. 1783, 2001, pp. 93–101.
R. Agrawal, R. Srikant, ‘Fast algorithms for mining association rules’, Proc of International Conference on Very Large Databases. 1994, pp. 487–499.
G. Gopinath, S. Sagayaraj, ‘To Generate the Ontology from Java Source Code’, International Journal of Advanced Computer Science and Applications, vol. 2, no. 2, 2011.