Open Access   Article Go Back

Intention Mining for Introspective Behavior Modelling in Business Intelligence

Deepali N. Pande1 , Kaushik R. Roy2 , Satyajit S. Uparkar3

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 1092-1106, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.10921106

Online published on Apr 30, 2019

Copyright © Deepali N. Pande, Kaushik R. Roy, Satyajit S. Uparkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Deepali N. Pande, Kaushik R. Roy, Satyajit S. Uparkar, “Intention Mining for Introspective Behavior Modelling in Business Intelligence,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1092-1106, 2019.

MLA Style Citation: Deepali N. Pande, Kaushik R. Roy, Satyajit S. Uparkar "Intention Mining for Introspective Behavior Modelling in Business Intelligence." International Journal of Computer Sciences and Engineering 7.4 (2019): 1092-1106.

APA Style Citation: Deepali N. Pande, Kaushik R. Roy, Satyajit S. Uparkar, (2019). Intention Mining for Introspective Behavior Modelling in Business Intelligence. International Journal of Computer Sciences and Engineering, 7(4), 1092-1106.

BibTex Style Citation:
@article{Pande_2019,
author = {Deepali N. Pande, Kaushik R. Roy, Satyajit S. Uparkar},
title = {Intention Mining for Introspective Behavior Modelling in Business Intelligence},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {1092-1106},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4172},
doi = {https://doi.org/10.26438/ijcse/v7i4.10921106}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.10921106}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4172
TI - Intention Mining for Introspective Behavior Modelling in Business Intelligence
T2 - International Journal of Computer Sciences and Engineering
AU - Deepali N. Pande, Kaushik R. Roy, Satyajit S. Uparkar
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 1092-1106
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
357 244 downloads 165 downloads
  
  
           

Abstract

Mining user-intents has been a core platform in semantic web search and intelligent test mining. Prior art on these arena lacks infeasibility in materialization of theoretical foundations on factual viewpoints. Literatures and artifacts are needed to twitch conceptualization of formalism and methodologies on distinct domains under user-intent mining. This chapter provides a basis formulation of automata, theories and algorithm design approach for user-intent mining on social networks. The aim and the scope of this chapter is introspection of user’s aspiration in online search mechanics symbolizing business intelligence. A concrete approach to retrieve named entities from live social networks has been modelled in this chapter. The source for retrieval are public logs, blog, social channels and web-o-media has been constructed as an activity model which is modelled as transient in nature. Formulation of automata to recognize intent-keywords and the algorithm to reason the context of dialogue on live –talks have been described. This chapter describes principles and mathematical approach to design ontologies for intelligent mining for reasoning in live-talks overcoming the problem of out-of-vocabulary (OOV).

Key-Words / Index Term

opinion mining, social networks, ontology, live-talk reasoning, out-of-vocabulary (OOV)

References

[1]. Agrawal R.D, Gunopulos and F. Leymann (1998), “Mining Process Models from Workflow Logs”, Sixth International Conference on Extending Database Technology, pp. 469-483.
[2]. H. Yin et al, “A Temporal Context-Aware Model for User Behavior Modelling in Social Media Systems,” Proc.2014 ACM SIGMOD Int`l Conf.Management of Data(SIGMOD),2014,pp. 1543-1554.
[3]. A.Ferraz Cotsa et al., “RSC: Mining and Modeling Temporal Activity in Social Media,” Proc.21th ACM SICKDD Int`l Conf. knowledge Discovery and Data Mining(SIGKDD), 2015,pp.269-278.
[4]. R.Hinami and S.Satoh, “Audience Behavior Mining by Integratig TV Rating with Multimedia Contents”, IEEE Int`l Symp.Multimedia(ISM), 2016, pp.44-51.
[5]. J.Machajdik and A.Hanbury, “Affective image Classification Using Features Inspired by psychology and Art Theory”, Proc.18th ACM Int`l Cont.Multimedia(MM),2010,pp,83-92
[6]. A.Krizhevsky,I,Sutskever, and G.E. Hinton, “ImageNet Classification with Deep Convolutional Neural Network Systems(NIPS)”, 2012,2012,PP.1097-1105.
[7]. X.Wu and S.Satoh, “Ultrahigh-Speed TV Commercial Detection, Extraction, and Matching”, IEE J.of forecasting, Vol.27, no. 4, 2011, pp.
[8]. N.Katayama et al., “Mining large-Scale Brodcast Video Archives Towards Inter-Video Structuring”, Advances in Multimedia Information Processing-PCM 2004,LNSC 3332, Springer,2005,pp489-496.
[9]. C.Rolland, N.Prakash, and A.Benjamen, “A Multi-Model View of Process Modelling,” Req.Eng.,Vol.4,N.4.Springer-Verlag,1999.
[10]. W.M.P.Van der Aalst, “Process Mining: Discovery, Conformance and Enhancement of Business Process”, Ist Ed.,2011,pp.184-352.
[11]. C.Hug.R.Deneckere, and C. Salinensi, “Map-TBS: Map process enactment traces and analysis”, RCIS,2012,pp.204-209.
[12]. L.Maruster, “Machine Learning Approach to Understand Business Process”, PhD Thesis, Tech.Univ.Eindhoven,The Nrtherlands,2006.
[13]. C.Rolland, “A Comprensive View of Process Engineerng”, CAiSE98, LNCS 1413, Springer, Pisa, Itly, June 1998.
[14]. H.Schonberg, B.Weber and B.V.,Dongen, “Suporting Flexile Process through Recommendation baised on History”, Springer, BPM, vol 5240, pp.51-66. 2008
[15]. A.Rozinat, M.Veloso, and W.M.P. van der Aalst, “Evaluating the quality of discovered Process Models”, Antewrp, Belgium, 2008, pp 45-52.
[16]. R.Agrawwal, D.Gunopulos, and F.Leymann, “Minng Process Models from Workflow Longs”, EDBT,LNCS 1377, pp. 469-483, Springer. 1998.
[17]. J. Herbist and D. Karaginnis, “Integrating Machine Learning and Workflow Management to Support Acquisition and Adaptation of Workflow Models”, Workshop and database and Expert System Applications, 1998.
[18]. G.Khodabandelou, C. Hug, R. Deneckere, and C. Salinei, “Supervised International Process Models Discovery Using Hidden Markov Models”, 7th IEEE RCIS conference, Parice, France, 2013.
[19]. J. Cook, and A. wolf, “Automating Process Discovery through Event- Data Analysis,” Int. Conf. on soft. Eng, ACM process 1995, pp. 73-82
[20]. F. van der Aalst, A. Weijters, "Generic Process Mining." Application and Theory of Petri Nets, LNCS 3536, 2005.
[21]. W. Van Der Aalst, A. Weijters and L. Maruster, “WorkFlow Mining: Discovering Process Model from Event Logs,” IEEE Trans, on Knowledge and Data Eng Vol. 16 N.6, 1996, pp. 47-60.
[22]. J. Laflaquiere, “A Web Service Composition System Based on Fuzzy Dominance for Preference Query,” PhD thesis, University de technologies de Troyes, Campus France, 2009
[23]. T.K. Moon, “The Expectation Maximization Algorithm”, Signal Process Magazine, IEEE, Vol 12, N.6, 1996, pp. 47-60.
[24]. G. Greco, A. Guzzo, and L. Pontieri, “Mining Hierachies of Models: From abstract Views to Concrete Specifications,” BPM, 2005, pp. 32-47.
[25]. I.vanderfesten, H. Reijers, W. van der Aalst, “Product-based workflow support Information Systems,” Vol.36, No.2, pp. 517-
[26]. G. Greco, A. Guzzo, and L. Pontieri, “Mining Hierarchies of Models: From Abreact Views to Concrete Specifications,” BPM, 2005, pp.32-47.
[27]. Vanderfeesten, H. Reijers, W. van der Aalst, "Product- baised Workflow Support Information Systems." Vol. 36, No.2, pp.517-535, 2011.
[28]. G. Grosz, C.Rolland, S.Schwer, C. Souuveryet, V. Plihon, S. Si-Said, C. Ben Ashour and C. Gnho, “Modelling the Requirements Engineering Process: An Overview of the Nature Approach,” RE`97, London, Vol.2,1997.
[29]. J. Cook and A. Wolf, “Discovering Models of Software Process from Event-Based data,” ACM Trans. on Soft. Eng. and Methodology, Vol.7, No. 3, 1998, pp.215-249.
[30]. S. Minscok, C.W. Gunther, and W.M.P. Van der Aalst, “Trace Clustering in Process Mining Business Process Management Workshops,” LNBIP 2009, Vol.17. pp 109-120.
[31]. F.Fibre and I.H. Witten, “Data Mining: Practical Machine Learning Tools and Techniques”, 3rd Ed., Morgan Kaufmann Publishers Inc. San Francisco, USA, 2005.
[32]. Dardenne, A. Van Lamsweerde and S. Fickasu, “Goal-Directed Requirements Acquisition”, Sci. Comput. Program, Vol.77, No.2, 1989, pp.257-286.
[33]. Van Dingen, and W, Van Der Aalst, “Multi- Phase Process Mining: Building Instance Graphs,” Int. Conf. on Conceptual Modelling, LNCS 3288, Springer, 2004, pp. 362-376.
[34]. L.E. Baum, T. Petrie, G. Soules, and N. Wess, “A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains,” AT&T Technical Journal, Vol.64, No.2, 1985, pp.391-408.
[35]. G. Khodabandeleou, C. Hug. R. Deneckere, C. Salinesi, M. Bajec, E. Kornyshova and M. Jankovie, “Cots Products to Trace Method Enactment: Review and Selection”, 21st Ecis, Utrecht, Netherland, 2013.
[36]. E. Yu, “Modelling Strategic Relationship for Process Re-Engineering”, PhD thesis, University of Toronto, Dept of Computer Science, 1995.
[37]. T. Joachims, “Text Categorization with Support Vector Machines”, Technical Report, LS VIII No. 23, University of Dortmund, 1997.
[38]. Event Log Analyser IEEE Conference viewed October 2012.
[39]. J.Aranda, And G. Venolia, “The Secret Life of Bugs: Going Apart the Errors and Omissions in Software Repositories”, in Proceedings of the 31st International Conference on Software Engineering (ICSE), 2009, pp. 298-308.
[40]. G.Antoniol, K. Ayari, M. Di Penta, F. Khomh, Y. Guhneuc, “Is It a Bug or An Enhancement? A Text-Based Approach to Classify Change Requests”. CASCON. 2008:23.
[41]. J. Anvik, L. Hiew, and G.C. Murohy, “Who Should Fix This Bug?” In Proceeding of the 28th International Conference on Software Engineering (ICSE), 2006, pp. 361-370.
[42]. Bacchelli, T. dal sasso, M.D` Ambros, and M. Lanza. “Contest Classification of Development Emails”, In Proceedings of the 34th International Conference on Software Engineering (ICSE), 2012, pp. 375-385.
[43]. C.Vasallo, S. Panichella, M. Di Penta, And G. Canfora, CODES: “Mining Source Code Description From Developers Discussions”, In Proceedings of The 22th IEEE International Conference on Program Comprehension (ICPC), 2014, Pp. 106-109.
[44]. R. A. Baeza- yates, B. Ribiro-Neto, “Modern Information Retrieval”, Addison- Wesley Longman Publishing Co., Inc. Boston, MA, USA, 1999.
[45]. V.R.Basili, L.C. Briand, and W.L. Mlo, “A Validation Of Object Oriented Design Matrices As Quality Indicators”, In IEEE Trans. Software Eng., Vol.22, No. 10, 1996, pp. 751-761.
[46]. Begel and N. Nagappan, Global Software Development. “Who Does It?” In Proceedings of the 2008 IEEE International Conference on Global Software Engineering (ICGSE), 2008, pp. 195-199.
[47]. D. M. Blei, A.Y. Ng, and M.I. Jorden, “Latent Dirichlet Allocation. In Journal of Machine Learning Research (JMLR)”, Vol. 3, 2003, pp. 993-1022.
[48]. G.Confora, M. Di Penta, R. Oliveto, and S. Panchella, “Who Is Going To Mentor Newcomers in Open Source Projects?” In Proceedings of ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering (FSE), 2012:44.
[49]. D. Cer, M.C. de Marneffe, D. Jurafsky, and C.D. Manning, “Parsing to Stanfold Dependencies: Trade-Offs between Speed and Accuracy”, in Proceeding of the 7th International Conference Language Resources and Evaluation (LREC), 2010.
[50]. L. Cerulo, M. Ceccarelli, M. Di Penta, and G. Canfora, “A Hidden Markov Model to Detect Coded Information Islands in Free Text” in Proceeding of 13th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), 2014, pp. 157-166.
[51]. E.Ceylan, F. Kutlubay, and A. Bener, “Software Defect Identification Using Machine Learning Techniques”, in Software Engineering and Advanced Applications, 2006. SEAA 06, 32nd EUROMICRO Conference on, 2006, pp. 240-247.
[52]. A. M. Jehad Sarkar. "Hidden Markov Mined Activity Model for Human Activity Recognition" , International Journal of Distributed Sensor Networks, 2014
[53]. hal-paris1.archives-ouvertes.fr
[54]. Kinam Park, Taemin Lee, Soonyoung Jung, Sangyep Nam, Heuiseok Lim. "Extracting Search Intentions from Web Search Logs" , 2010 2nd International Conference on Information Technology Convergence and Services, 2010
[55]. Khodabandelou, Ghazaleh, Charlotte Hug, Rebecca Deneckère, and Camille Salinesi. "Process Mining Versus Intention Mining" , Lecture Notes in Business Information Processing, 2013.
[56]. mlsc.lboro.ac.uk
[57]. Kithmi Ashangani, K. U. Wickramasinghe, D. W. N. De Silva, V. M. Gamwara, Anupiya Nugaliyadde, Yashas Mallawarachchi. “Semantic video search by automatic video annotation using TensorFlow” , 2016 Manufacturing & Industrial Engineering Symposium (MIES), 2016.
[58]. Tingting Lu, Shifeng Hou, Zhenxiang Chen, Lizhen Cui, Lei Zhang. "An Intention-Topic Model Based on Verbs Clustering and Short Texts Topic Mining" , 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015
[59]. Lecture Notes in Computer Science, 2004.
[60]. Submitted to The University of Manchester
[61]. G. Murray, E. Hoque, G. Carenini. “Opinion Summarization and Visualization”, Elsevier BV, 2017.
[62]. Submitted to Universiti Tunku Abdul Rahman
[63]. S. Bansal, “Data Security by Steganography: A Review”, IJSRNC, Vol 7, Issue-1 Mar-2019
[64]. Submitted to University of Johannsburg
[65]. Santanu Mandal, Sumit Gupta, “A novel dictionary-based classification algorithm for opinion mining”, 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 2016
[66]. “Enterprise, Business-Process and Information Systems Modeling", Springer Nature, 2013
[67]. Sirisha Aguru, Batteri Madhavrao, “Data Security in Cloud Computing Using RC6 Encryption and Steganography Algorithms”, IJSRCSE, Vol 7, Issue 1 Feb 2019.
[68]. Kinam Park. "Automatic extraction of user’s search intention from web search logs",
Multimedia Tools and Applications, 01/13/2011.
[69]. export.arxiv.org
[70]. Process Mining, 2011
[71]. Song, B. L., Liao, and J.Lee -. “Intelligent Collaborative Quality Assurance System for Wind Turbine Supply Chain Management”, International Journal of Advanced Computer Science and Applications, 2013.
[72]. file.allitebooks.com
[73]. Ghazaleh Khodabandelou, Charlotte Hug, Rebecca Deneckère, Camille Salinesi. "Chapter- 33 Process Mining versus Intention Mining”, Springer Nature, 2013.
[74]. Tao Mei, Xian-Sheng Hua, He-Qin Zhou, Shipeng Li, “Modeling and Mining of Users Capture Intention for Home Videos”, IEEE Transactions on Multimedia, 2007.
[75]. Andrea Di Sorbo, Sebastiano Panichella, Corrado A. Visaggio, Massimiliano Di Penta, Gerardo Canfora, Harald Gall. “DECA”, Proceedings of the 38th International Conference on Software Engineering Companion - ICSE `16, 2016
[76]. xin-xia.github.io
[77]. “Conceptual Modeling – ER 2005”, Springer Nature, 2005
[78]. www.engineering.wright.edu