Submitted:
02 October 2023
Posted:
05 October 2023
You are already at the latest version
Abstract

Keywords:
1. Introduction
2. Literature Review
| Year Of Pub |
Title | Techniques Used | Results | Ref. |
|---|---|---|---|---|
| 2015 | Applying analytical hierarchy process to system quality requirements prioritisation |
AHP | The AHP technique effectively removes discrepancies between stakeholders’ interests and the business goals. | (Kassab & Kilicay-Ergin, 2015) |
| 2015 | Comparison of Requirement Prioritisation Techniques to Find Best Prioritisation Technique | binary search tree, AHP, hierarchy AHP, spanning tree matrix, priority group/Numerical Analysis, bubble sort, MoSoW, simple ranking and Planning Game | AHP is the best requirements prioritisation technique amongst all the requirements prioritisation techniques | (Ali Khan et al., 2015) |
| 2016 | An Evaluation of Requirement Prioritisation Techniques with ANP | ANP, binary search tree, AHP, hierarchy AHP, spanning tree matrix, priority group and bubble sort | ANP is the best technique among the seven techniques, though it consumes time | (Khan et al., 2016) |
| 2016 | An approach to estimation of degree of customization for ERP projects using prioritised requirements | Framework using AHP | AHP framework gave better results | (Parthasarathy & Daneva, 2016) |
| 2017 | Fuzzy_MoSCoW: A fuzzy based MoSCoW method for the prioritisation of software requirements |
Fuzzy MoSCoW | This technique incorporates uncertainty and allocates resource effectively. | (K. S. Ahmad et al., 2017) |
| 2020 | A Novel Approach for Software Requirement Prioritisation |
MAHP, a combination of AHP and MoSCoW | MAHP reduces the number of comparisons and hence saves time | (Jahan et al., 2019) |
| 2020 | Prioritisation of Software Functional Requirements from Developers Perspective |
Spanning Tree and AHP | There was less dependency among requirements hence less waiting time for developers because of spanning tree | (Yaseen et al., 2020) |
| 2022 | E-AHP: An Enhanced Analytical Hierarchy Process Algorithm for Prioritising Large Software Requirements Numbers | Enhanced AHP | E-AHP gives better results for large projects | (Mohamed et al., 2022) |
| 2015 | Efficient agglomerative hierarchical clustering | Efficient agglomerative hierarchical clustering | Experimental results show consistent performance across various settings, proving efficient AHP to be reliable. | (Bouguettaya et al., 2015a) |
| 2016 | A hierarchical clustering method for multivariate geostatistical data | Aglomerative hierarchical clustering | Proposed clustering method yields satisfactory results compared to other geostatistical methods. | (Fouedjio, 2016) |
| 2017 | Milling tool wear state recognition based on partitioning around medoids (PAM) clustering | PAM | PAM outperforms k-means and fuzzy c-means in Ti-6Al-4V alloy end milling experiments. | (Li et al., 2017) |
| 2017 | Malware family identification with BIRCH clustering | BIRCH | BIRCH excels in malware family identification with high accuracy and low clustering time. | (Pitolli et al., 2017) |
| 2020 | Unsupervised K-Means Clustering Algorithm | Unsupervised K-Means | The U-k-means algorithm is robust to data structure and performs better than existing algorithms. | (Sinaga & Yang, 2020a) |
| 2020 | Applications of Clustering Techniques in Data Mining: A Comparative Study | K-Means, Hierarchical Clustering, DB Scan, OPTICS, Density-Based Clustering, EM Algorithm | The paper emphasises the value of K-means clustering in consumer data analysis and business decision-making | (Faizan et al., 2020) |
| 2020 | A Comparative Study on K-Means Clustering and Agglomerative Hierarchical Clustering | K-Means and Agglomerative Hierarchy | K-means performs faster for large datasets and agglomerative hierarchical is better for smaller ones. | (B, 2020) |
| 2021 | Gaussian Mixture Model Clustering with Incomplete Data | GMM | Experiments validate the effectiveness of the proposed algorithm. | (Y. Zhang et al., 2021a) |
| 2022 | Bayesian Inference-Based Gaussian Mixture Models with Optimal Components Estimation Towards Large-Scale Synthetic Data Generation for In Silico Clinical Trials | BGMM-OCE | BGMM-OCE outperforms other synthetic data generators in terms of computational efficiency and unbiasedness | (Pezoulas et al., 2022) |
| 2022 | Design and Implementation of an Improved K-Means Clustering Algorithm | Improved K-Means | Enhanced algorithm works better than conventional K-Means. | (Zhao, 2022) |
| 2022 | Gaussian mixture model clustering algorithms for the analysis of high-precision mass measurements |
GMM | Results from GMMs were closely congruent with values that had previously been published. | (Weber et al., 2022) |
3. Techniques Used in the Study
3.1. Requirements Prioritisation Techniques
3.1.1. Analytical Hierarchical Process
3.1.2. MoSCoW
3.2. Clustering Algorithms
3.2.1. K-Means
3.2.2. Partition Around Medoids (PAM)
3.2.3. Agglomerative Hierarchical Clustering
3.2.4. Gaussian Mixture Models (GMM)
3.2.5. BIRCH
4. Proposed Methodology

4.1. Requirements Elicitation
4.2. Requirements Analysis
4.3. Stakeholders’ Input
4.4. Problem Formulation
4.4.1. Quantitative Data
4.4.2. AHP Dataset
4.5. Elbow Method
4.6. Clusters Formation
4.7. Clusters Evaluation
4.7.1. Dunn Index
4.7.2. Silhouette Index
4.7.3. Caliński-Harabasz Index
4.8 Requirements Prioritisation
5. Methodology Implementation
5.1. Formulation of Problem
5.1.1. 20 Requirements Problem
| C1 | C2 | C3 | C4 | C5 | Effort | |
|---|---|---|---|---|---|---|
| R1 | 4 | 4 | 5 | 4 | 5 | 1 |
| R2 | 2 | 4 | 3 | 5 | 4 | 4 |
| R3 | 1 | 2 | 3 | 2 | 2 | 2 |
| R4 | 2 | 2 | 3 | 3 | 4 | 3 |
| R5 | 5 | 4 | 4 | 3 | 5 | 4 |
| R6 | 5 | 5 | 5 | 4 | 4 | 7 |
| R7 | 2 | 1 | 2 | 2 | 2 | 10 |
| R8 | 4 | 4 | 4 | 4 | 4 | 2 |
| R9 | 4 | 4 | 4 | 2 | 5 | 1 |
| R10 | 4 | 5 | 4 | 3 | 2 | 3 |
| R11 | 2 | 2 | 2 | 5 | 4 | 2 |
| R12 | 3 | 3 | 4 | 2 | 5 | 5 |
| R13 | 4 | 2 | 1 | 3 | 3 | 8 |
| R14 | 2 | 4 | 5 | 2 | 4 | 2 |
| R15 | 4 | 4 | 4 | 4 | 4 | 1 |
| R16 | 4 | 2 | 1 | 3 | 1 | 4 |
| R17 | 4 | 3 | 2 | 5 | 1 | 10 |
| R18 | 1 | 2 | 3 | 4 | 2 | 4 |
| R19 | 3 | 3 | 3 | 3 | 4 | 8 |
| R20 | 2 | 1 | 2 | 2 | 1 | 4 |
| Customers' Weights | C1 | C2 | C3 | C4 | C5 |
|---|---|---|---|---|---|
| 1 | 4 | 2 | 3 | 4 |
5.1.2. 20 Requirements Problem using Quantitative Approach
| ID | Effort | Satisfaction | ID | Effort | Satisfaction | |
|---|---|---|---|---|---|---|
| R1 | 1 | 62 | R11 | 2 | 45 | |
| R2 | 4 | 55 | R12 | 5 | 49 | |
| R3 | 2 | 29 | R13 | 8 | 35 | |
| R4 | 3 | 41 | R14 | 2 | 50 | |
| R5 | 4 | 58 | R15 | 1 | 56 | |
| R6 | 7 | 63 | R16 | 4 | 27 | |
| R7 | 10 | 24 | R17 | 10 | 39 | |
| R8 | 2 | 56 | R18 | 4 | 35 | |
| R9 | 1 | 54 | R19 | 4 | 46 | |
| R10 | 3 | 49 | R20 | 4 | 20 |
5.1.3. 20 Requirements Problem using AHP
| ID | Effort | Satisfaction |
|---|---|---|
| R1 | 12.7640176 | 3.24660865 |
| R2 | 3.19100441 | 3.65981339 |
| R3 | 6.38200881 | 6.9410254 |
| R4 | 4.25467254 | 4.90950577 |
| R5 | 3.19100441 | 3.4705127 |
| R6 | 1.82343109 | 3.19507518 |
| R7 | 1.27640176 | 8.38707236 |
| R8 | 6.38200881 | 3.59445958 |
| R9 | 12.7640176 | 3.72758771 |
| R10 | 4.25467254 | 4.10795381 |
| R11 | 6.38200881 | 4.47310526 |
| R12 | 2.55280353 | 4.10795381 |
| R13 | 1.5955022 | 5.75113533 |
| R14 | 6.38200881 | 4.02579473 |
| R15 | 12.7640176 | 3.59445958 |
| R16 | 3.19100441 | 7.45517543 |
| R17 | 1.27640176 | 5.1612753 |
| R18 | 3.19100441 | 5.75113533 |
| R19 | 3.19100441 | 4.37586384 |
| R20 | 3.19100441 | 10.0644868 |
5.1.4. 100 Requirements Problem
| ID | Effort | Satisfaction | ID | Effort | Satisfaction | |
|---|---|---|---|---|---|---|
| R1 | 16 | 29 | R1 | 0.35245612 | 0.87906114 | |
| R2 | 19 | 23 | R2 | 0.29680515 | 1.10838143 | |
| R3 | 16 | 18 | R3 | 0.35245612 | 1.41626516 | |
| R4 | 7 | 21 | R4 | 0.80561398 | 1.21394157 | |
| R5 | 19 | 22 | R5 | 0.29680515 | 1.15876241 | |
| R6 | 15 | 20 | R6 | 0.37595319 | 1.27463865 | |
| R7 | 8 | 22 | R7 | 0.70491224 | 1.15876241 | |
| R8 | 10 | 29 | R8 | 0.56392979 | 0.87906114 | |
| R9 | 6 | 27 | R9 | 0.93988298 | 0.94417678 | |
| R10 | 18 | 21 | R10 | 0.31329433 | 1.21394157 | |
| R11 | 15 | 31 | R11 | 0.37595319 | 0.82234751 | |
| R12 | 12 | 33 | R12 | 0.46994149 | 0.77250827 | |
| R13 | 16 | 33 | R13 | 0.35245612 | 0.77250827 | |
| R14 | 20 | 25 | R14 | 0.28196489 | 1.01971092 | |
| R15 | 9 | 25 | R15 | 0.62658865 | 1.01971092 | |
| R16 | 4 | 30 | R16 | 1.40982447 | 0.8497591 | |
| R17 | 16 | 25 | R17 | 0.35245612 | 1.01971092 | |
| R18 | 2 | 28 | R18 | 2.81964894 | 0.91045618 | |
| R19 | 9 | 35 | R19 | 0.62658865 | 0.72836494 | |
| R20 | 3 | 29 | R20 | 1.87976596 | 0.87906114 | |
| R21 | 2 | 27 | R21 | 2.81964894 | 0.94417678 | |
| R22 | 10 | 23 | R22 | 0.56392979 | 1.10838143 | |
| R23 | 4 | 28 | R23 | 1.40982447 | 0.91045618 | |
| R24 | 2 | 29 | R24 | 2.81964894 | 0.87906114 | |
| R25 | 7 | 36 | R25 | 0.80561398 | 0.70813258 | |
| R26 | 15 | 28 | R26 | 0.37595319 | 0.91045618 | |
| R27 | 8 | 30 | R27 | 0.70491224 | 0.8497591 | |
| R28 | 20 | 22 | R28 | 0.28196489 | 1.15876241 | |
| R29 | 9 | 30 | R29 | 0.62658865 | 0.8497591 | |
| R30 | 11 | 32 | R30 | 0.51266344 | 0.79664915 | |
| R31 | 5 | 20 | R31 | 1.12785958 | 1.27463865 | |
| R32 | 1 | 31 | R32 | 5.63929788 | 0.82234751 | |
| R33 | 17 | 24 | R33 | 0.3317234 | 1.06219887 | |
| R34 | 6 | 26 | R34 | 0.93988298 | 0.98049127 | |
| R35 | 2 | 24 | R35 | 2.81964894 | 1.06219887 | |
| R36 | 16 | 23 | R36 | 0.35245612 | 1.10838143 | |
| R37 | 8 | 26 | R37 | 0.70491224 | 0.98049127 | |
| R38 | 12 | 32 | R38 | 0.46994149 | 0.79664915 | |
| R39 | 18 | 26 | R39 | 0.31329433 | 0.98049127 | |
| R40 | 5 | 27 | R40 | 1.12785958 | 0.94417678 | |
| R41 | 6 | 32 | R41 | 0.93988298 | 0.79664915 | |
| R42 | 14 | 30 | R42 | 0.40280699 | 0.8497591 | |
| R43 | 15 | 15 | R43 | 0.37595319 | 1.6995182 | |
| R44 | 20 | 26 | R44 | 0.28196489 | 0.98049127 | |
| R45 | 14 | 29 | R45 | 0.40280699 | 0.87906114 | |
| R46 | 9 | 28 | R46 | 0.62658865 | 0.91045618 | |
| R47 | 16 | 27 | R47 | 0.35245612 | 0.94417678 | |
| R48 | 6 | 21 | R48 | 0.93988298 | 1.21394157 | |
| R49 | 6 | 28 | R49 | 0.93988298 | 0.91045618 | |
| R50 | 6 | 32 | R50 | 0.93988298 | 0.79664915 | |
| R51 | 6 | 34 | R51 | 0.93988298 | 0.74978744 | |
| R52 | 2 | 27 | R52 | 2.81964894 | 0.94417678 | |
| R53 | 17 | 24 | R53 | 0.3317234 | 1.06219887 | |
| R54 | 18 | 30 | R54 | 0.31329433 | 0.8497591 | |
| R55 | 1 | 24 | R55 | 5.63929788 | 1.06219887 | |
| R56 | 3 | 35 | R56 | 1.87976596 | 0.72836494 | |
| R57 | 14 | 35 | R57 | 0.40280699 | 0.72836494 | |
| R58 | 16 | 18 | R58 | 0.35245612 | 1.41626516 | |
| R59 | 18 | 23 | R59 | 0.31329433 | 1.10838143 | |
| R60 | 7 | 26 | R60 | 0.80561398 | 0.98049127 | |
| R61 | 10 | 18 | R61 | 0.56392979 | 1.41626516 | |
| R62 | 7 | 28 | R62 | 0.80561398 | 0.91045618 | |
| R63 | 16 | 29 | R63 | 0.35245612 | 0.87906114 | |
| R64 | 19 | 38 | R64 | 0.29680515 | 0.67086245 | |
| R65 | 17 | 25 | R65 | 0.3317234 | 1.01971092 | |
| R66 | 15 | 22 | R66 | 0.37595319 | 1.15876241 | |
| R67 | 11 | 23 | R67 | 0.51266344 | 1.10838143 | |
| R68 | 8 | 26 | R68 | 0.70491224 | 0.98049127 | |
| R69 | 20 | 34 | R69 | 0.28196489 | 0.74978744 | |
| R70 | 1 | 15 | R70 | 5.63929788 | 1.6995182 | |
| R71 | 5 | 23 | R71 | 1.12785958 | 1.10838143 | |
| R72 | 8 | 32 | R72 | 0.70491224 | 0.79664915 | |
| R73 | 3 | 28 | R73 | 1.87976596 | 0.91045618 | |
| R74 | 15 | 29 | R74 | 0.37595319 | 0.87906114 | |
| R75 | 4 | 21 | R75 | 1.40982447 | 1.21394157 | |
| R76 | 20 | 21 | R76 | 0.28196489 | 1.21394157 | |
| R77 | 10 | 31 | R77 | 0.56392979 | 0.82234751 | |
| R78 | 20 | 39 | R78 | 0.28196489 | 0.65366084 | |
| R79 | 3 | 21 | R79 | 1.87976596 | 1.21394157 | |
| R80 | 20 | 23 | R80 | 0.28196489 | 1.10838143 | |
| R81 | 10 | 22 | R81 | 0.56392979 | 1.15876241 | |
| R82 | 16 | 22 | R82 | 0.35245612 | 1.15876241 | |
| R83 | 19 | 24 | R83 | 0.29680515 | 1.06219887 | |
| R84 | 3 | 25 | R84 | 1.87976596 | 1.01971092 | |
| R85 | 12 | 29 | R85 | 0.46994149 | 0.87906114 | |
| R86 | 16 | 15 | R86 | 0.35245612 | 1.6995182 | |
| R87 | 15 | 28 | R87 | 0.37595319 | 0.91045618 | |
| R88 | 1 | 21 | R88 | 5.63929788 | 1.21394157 | |
| R89 | 6 | 34 | R89 | 0.93988298 | 0.74978744 | |
| R90 | 7 | 32 | R90 | 0.80561398 | 0.79664915 | |
| R91 | 15 | 27 | R91 | 0.37595319 | 0.94417678 | |
| R92 | 18 | 32 | R92 | 0.31329433 | 0.79664915 | |
| R93 | 4 | 27 | R93 | 1.40982447 | 0.94417678 | |
| R94 | 7 | 25 | R94 | 0.80561398 | 1.01971092 | |
| R95 | 2 | 21 | R95 | 2.81964894 | 1.21394157 | |
| R96 | 7 | 24 | R96 | 0.80561398 | 1.06219887 | |
| R97 | 8 | 24 | R97 | 0.70491224 | 1.06219887 | |
| R98 | 7 | 39 | R98 | 0.80561398 | 0.65366084 | |
| R99 | 7 | 18 | R99 | 0.80561398 | 1.41626516 | |
| R100 | 3 | 27 | R100 | 1.87976596 | 0.94417678 |
5.2. Determining No. of Clusters

5.3. Clusters Formation and Evaluation


5.3.1. K-Means
| 20 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 0.209 | 0.4336 |
| Silhouette | 3 | 0.4666 | 0.5690 |
| CH | 3 | 22.9273 | 33.7443 |
| Dunn | 4 | 0.2527 | 0.2417 |
| Silhouette | 4 | 0.4176 | 0.4863 |
| CH | 4 | 24.3832 | 34.1044 |
| 100 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 0.0548 | 0.2364 |
| Silhouette | 3 | 0.4283 | 0.4632 |
| CH | 3 | 89.5132 | 89.7174 |
| Dunn | 4 | 0.0783 | 0.2377 |
| Silhouette | 4 | 0.3993 | 0.4766 |
| CH | 4 | 90.9959 | 96.8018 |
5.3.2. PAM
| 20 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 0.2607 | 2.7100 |
| Silhouette | 3 | 0.4843 | 0.5208 |
| CH | 3 | 22.6144 | 31.1727 |
| Dunn | 4 | 0.3151 | 1.5103 |
| Silhouette | 4 | 0.4116 | 0.4374 |
| CH | 4 | 24.0329 | 31.2174 |
| 100 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 0.0831 | 0.3396 |
| Silhouette | 3 | 0.4308 | 0.3943 |
| CH | 3 | 89.5132 | 46.9101 |
| Dunn | 4 | 0.0696 | 0.3024 |
| Silhouette | 4 | 0.3993 | 0.3998 |
| CH | 4 | 88.7641 | 64.6714 |
5.3.3. Hierarchical
| 20 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 0.2576 | 2.9804 |
| Silhouette | 3 | 0.4549 | 0.5690 |
| CH | 3 | 18.6832 | 33.7443 |
| Dunn | 4 | 0.2482 | 2.7427 |
| Silhouette | 4 | 0.3561 | 0.4863 |
| CH | 4 | 18.7909 | 34.1044 |
| 100 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 0.1096 | 0.3472 |
| Silhouette | 3 | 0.4278 | 0.4327 |
| CH | 3 | 88.0933 | 82.8722 |
| Dunn | 4 | 0.1096 | 0.2518 |
| Silhouette | 4 | 0.3964 | 0.4576 |
| CH | 4 | 82.5902 | 95.1834 |
5.3.4. GMM
| 20 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 0.2739 | 0.3723 |
| Silhouette | 3 | 0.4568 | 0.5690 |
| CH | 3 | 22.5821 | 33.744 |
| Dunn | 4 | 0.1796 | 0.310 |
| Silhouette | 4 | 0.3839 | 0.4905 |
| CH | 4 | 22.0866 | 33.633 |
| 100 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 0.7259 | 0.1706 |
| Silhouette | 3 | 0.4285 | 0.0743 |
| CH | 3 | 90.674 | 26.5032 |
| Dunn | 4 | 0.5557 | 0.077 |
| Silhouette | 4 | 0.3721 | 0.1082 |
| CH | 4 | 90.7001 | 36.2847 |
5.3.5. BIRCH
| 20 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 12.9526 | 7.249 |
| Silhouette | 3 | 0.4672 | 0.5690 |
| CH | 3 | 18.9442 | 33.744 |
| 100 Requirements Problem | |||
|---|---|---|---|
| Clusters | Quantitative | AHP | |
| Dunn | 3 | 8.9139 | 0.665 |
| Silhouette | 3 | 0.4384 | 0.4053 |
| CH | 3 | 96.1607 | 79.1779 |
5.4. Prioritisation of Requirements
6. RESULTS
7. CONCLUSION AND FUTURE WORK
References
- Achimugu, P., Selamat, A., Ibrahim, R., & Mahrin, M. N. (2014). A systematic literature review of software requirements prioritization research. Information and Software Technology, 56(6), 568–585. [CrossRef]
- Ahmad, A., Goransson, M., & Shahzad, A. (2010). Limitations of the Analytic Hierarchy Process Technique with Respect to Geographically Distributed Stakeholders . World Academy of Science, Engineering and Technology, 111–116.
- Ahmad, K. S., Ahmad, N., Tahir, H., & Khan, S. (2017). Fuzzy_MoSCoW: A fuzzy based MoSCoW method for the prioritization of software requirements. 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 433–437. [CrossRef]
- Ali Khan, J., Ur Rehman, I., Hayat Khan, Y., Javed Khan, I., & Rashid, S. (2015). Comparison of Requirement Prioritization Techniques to Find Best Prioritization Technique. International Journal of Modern Education and Computer Science, 7(11), 53–59. [CrossRef]
- Azzolini, M., & Passoni, L. I. (2013). Prioritization of Software Requirements: a Cognitive Approach. Procedings of the Fourth International Workshop on Knowledge Discovery, Knowledge Management and Decision Support. [CrossRef]
- B, K. (2020). A Comparative Study on K-Means Clustering and Agglomerative Hierarchical Clustering. International Journal of Emerging Trends in Engineering Research, 8(5), 1600–1604. [CrossRef]
- Bouguettaya, A., Yu, Q., Liu, X., Zhou, X., & Song, A. (2015a). Efficient agglomerative hierarchical clustering. Expert Systems with Applications, 42(5), 2785–2797. [CrossRef]
- Bouguettaya, A., Yu, Q., Liu, X., Zhou, X., & Song, A. (2015b). Efficient agglomerative hierarchical clustering. Expert Systems with Applications, 42(5), 2785–2797. [CrossRef]
- Bruce L. Golden, Edward A. Wasil, & Patrick T. Harker (Eds.). (1989). “The analytic hierarchy process.” Applications and Studies.
- del Sagrado, J., & del Águila, I. M. (2021). Assisted requirements selection by clustering. Requirements Engineering, 26(2), 167–184. [CrossRef]
- del Sagrado, J., del Águila, I. M., & Orellana, F. J. (2015). Multi-objective ant colony optimization for requirements selection. Empirical Software Engineering, 20(3), 577–610. [CrossRef]
- Emam, K. El, & Koru, A. G. (2008). A Replicated Survey of IT Software Project Failures. IEEE Software, 25(5), 84–90. [CrossRef]
- Faizan, M., F., M., Ismail, S., & Sultan, S. (2020). Applications of Clustering Techniques in Data Mining: A Comparative Study. International Journal of Advanced Computer Science and Applications, 11(12). [CrossRef]
- Fouedjio, F. (2016). A hierarchical clustering method for multivariate geostatistical data. Spatial Statistics, 18, 333–351. [CrossRef]
- Franch, X., & Ruhe, G. (2016). Software release planning. Proceedings of the 38th International Conference on Software Engineering Companion, 894–895. [CrossRef]
- Govender, P., & Sivakumar, V. (2020). Application of k-means and hierarchical clustering techniques for analysis of air pollution: A review (1980–2019). Atmospheric Pollution Research, 11(1), 40–56. [CrossRef]
- Greer, D., & Ruhe, G. (2004). Software release planning: an evolutionary and iterative approach. Information and Software Technology, 46(4), 243–253. [CrossRef]
- Hartigan, J. A., & Wong, M. A. (1979). Algorithm AS 136: A K-Means Clustering Algorithm. Applied Statistics, 28(1), 100. [CrossRef]
- Hatton, S. (n.d.). Early Prioritisation of Goals. In Advances in Conceptual Modeling – Foundations and Applications (pp. 235–244). Springer Berlin Heidelberg. [CrossRef]
- Hudaib, A., Masadeh, R., Qasem, M. H., & Alzaqebah, A. (2018). Requirements Prioritization Techniques Comparison. Modern Applied Science, 12(2), 62. [CrossRef]
- Jahan, M. S., Azam, F., Anwar, M. W., Amjad, A., & Ayub, K. (2019). A Novel Approach for Software Requirement Prioritization. 2019 7th International Conference in Software Engineering Research and Innovation (CONISOFT), 1–7. [CrossRef]
- Kassab, M., & Kilicay-Ergin, N. (2015). Applying analytical hierarchy process to system quality requirements prioritization. Innovations in Systems and Software Engineering, 11(4), 303–312. [CrossRef]
- Khan, J. A., Izaz-ur-Rehman, Khan, S. P., Qasim, I., & Khan, Y. H. (2016). An Evaluation of Requirement Prioritization Techniques with ANP. International Journal of Advanced Computer Science and Applications, 7(7).
- L Kaufman, & PJ Rousseeuw. (2009). Finding Groups in Data: An Introduction to Cluster Analysis. John Wiley & Sons.
- Li, Z., Wang, G., & He, G. (2017). Milling tool wear state recognition based on partitioning around medoids (PAM) clustering. The International Journal of Advanced Manufacturing Technology, 88(5–8), 1203–1213. [CrossRef]
- Likas, A., Vlassis, N., & J. Verbeek, J. (2003). The global k-means clustering algorithm. Pattern Recognition, 36(2), 451–461. [CrossRef]
- Mohamed, N., Mazen, S., & Helmy, W. (2022). E-AHP: An Enhanced Analytical Hierarchy Process Algorithm for Priotrizing Large Software Requirements Numbers. International Journal of Advanced Computer Science and Applications, 13(7). [CrossRef]
- Olaronke, I., Rhoda, I., & Ishaya, G. (2018). An Appraisal of Software Requirement Prioritization Techniques. Asian Journal of Research in Computer Science, 1–16. [CrossRef]
- Parthasarathy, S., & Daneva, M. (2016). An approach to estimation of degree of customization for ERP projects using prioritized requirements. Journal of Systems and Software, 117, 471–487. [CrossRef]
- Peng, K., Zheng, L., Xu, X., Lin, T., & Leung, V. C. M. (2018). Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment (pp. 166–177). [CrossRef]
- Pezoulas, V. C., Tachos, N. S., Gkois, G., Olivotto, I., Barlocco, F., & Fotiadis, D. I. (2022). Bayesian Inference-Based Gaussian Mixture Models With Optimal Components Estimation Towards Large-Scale Synthetic Data Generation for In Silico Clinical Trials. IEEE Open Journal of Engineering in Medicine and Biology, 3, 108–114. [CrossRef]
- Pitolli, G., Aniello, L., Laurenza, G., Querzoni, L., & Baldoni, R. (2017). Malware family identification with BIRCH clustering. 2017 International Carnahan Conference on Security Technology (ICCST), 1–6. [CrossRef]
- Pradeep Rai, & Shubha Singh. (2010). A Survey of Clustering Techniques. International Journal of Computer Applications, 7.
- Regnell, B., Höst, M., och Dag, J. N., Beremark, P., & Hjelm, T. (2001). An Industrial Case Study on Distributed Prioritisation in Market-Driven Requirements Engineering for Packaged Software. Requirements Engineering, 6(1), 51–62. [CrossRef]
- Simmons, E. (2004). Requirements triage: what can we learn from a “medical” approach? IEEE Software, 21(4), 86–88. [CrossRef]
- Sinaga, K. P., & Yang, M.-S. (2020a). Unsupervised K-Means Clustering Algorithm. IEEE Access, 8, 80716–80727. [CrossRef]
- Sinaga, K. P., & Yang, M.-S. (2020b). Unsupervised K-Means Clustering Algorithm. IEEE Access, 8, 80716–80727. [CrossRef]
- Weber, C. M., Ray, D., Valverde, A. A., Clark, J. A., & Sharma, K. S. (2022). Gaussian mixture model clustering algorithms for the analysis of high-precision mass measurements. Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, 1027, 166299. [CrossRef]
- Yaseen, M., Mustapha, A., & Ibrahim, N. (2020). Prioritization of Software Functional Requirements from Developers Perspective. International Journal of Advanced Computer Science and Applications, 11(9).
- Zhang, T., Ramakrishnan, R., & Livny, M. (1996). BIRCH. ACM SIGMOD Record, 25(2), 103–114. [CrossRef]
- Zhang, Y., Li, M., Wang, S., Dai, S., Luo, L., Zhu, E., Xu, H., Zhu, X., Yao, C., & Zhou, H. (2021a). Gaussian Mixture Model Clustering with Incomplete Data. ACM Transactions on Multimedia Computing, Communications, and Applications, 17(1s), 1–14. [CrossRef]
- Zhang, Y., Li, M., Wang, S., Dai, S., Luo, L., Zhu, E., Xu, H., Zhu, X., Yao, C., & Zhou, H. (2021b). Gaussian Mixture Model Clustering with Incomplete Data. ACM Transactions on Multimedia Computing, Communications, and Applications, 17(1s), 1–14. [CrossRef]
- Zhao, H. (2022). Design and Implementation of an Improved K-Means Clustering Algorithm. Mobile Information Systems, 2022, 1–10. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).