[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3021460.3021470acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisecConference Proceedingsconference-collections
research-article

An Approach to Mine Business Rule Intents from Domain-specific Documents

Published: 05 February 2017 Publication History

Abstract

An enterprise system enables business by providing various services that are guided by set of well-defined processes, and adhere to certain business rules and constraints. The business rules are usually written using English in operating procedures, terms and conditions, and various other supporting documents. For implementing the business rules in a software system, or expressing them as UML use-case specifications, analysts manually interpret the documents, leading to potential discrepancies, ambiguities, and quality issues in the software system that can be resolved only after testing.
To minimize such errors, we propose a novel method to mine the documents automatically to extract the fundamental atomic facts in every sentence - called as business rule intents. We adopt dependency tree parser to parse the rule sentences and extract rule intents from them. Our experiments using few publicly available sample documents in the financial domain yielded very promising results, where rule intents extraction produced an average precision of 78% and recall of 80%.

References

[1]
EU-RentACar case study. http://www.businessrulesgroup.org/first_paper/br01ad.htm. [Online; accessed 18-April-2016].
[2]
Object Management Group(OMG). http://www.omg.org. [Online; accessed 29-September-2015].
[3]
Reserve Bank of India (RBI), Master Circulars. https://rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx/?id=9031. [Online; accessed 18-April-2016].
[4]
Semantics Of Business Vocabulary And Rules (SBVR). http://www.omg.org/spec/SBVR/. [Online; accessed 29-September-2015].
[5]
J. Atkinson-Abutridy, C. Mellish, and S. Aitken. Combining information extraction with genetic algorithms for text mining. IEEE Intelligent Systems, 19(3):22--30, May 2004.
[6]
I. S. Bajwa, M. G. Lee, and B. Bordbar. SBVR business rules generation from natural language specification. In AI for Business Agility, Papers from the 2011 AAAI Spring Symposium, Technical Report SS-11-03, Stanford, California, USA, March 21--23, 2011, 2011.
[7]
B. K. Boguraev. Towards finite-state analysis of lexical cohesion. In Proceedings of the 3rd international conference on finite-state methods for NLP, 2000.
[8]
C. C. Chiang. Extracting business rules from legacy systems into reusable components. In 2006 IEEE/SMC International Conference on System of Systems Engineering, pages 6 pp.--, April 2006.
[9]
P. K. Chittimalli and K. Anand. Domain-independent method of detecting inconsistencies in sbvr-based business rules. In Proceedings of the International Workshop on Formal Methods for Analysis of Business Systems@ASE 2016, pages 9--16. ACM, 2016.
[10]
F. Ciravegna. Adaptive information extraction from text by rule induction and generalisation. In Proceedings of the 17th International Joint Conference on Artificial Intelligence -- Volume 2, IJCAI'01, pages 1251--1256, San Francisco, CA, USA, 2001. Morgan Kaufmann Publishers Inc.
[11]
M.-C. De Marneffe and C. D. Manning. Stanford typed dependencies manual. Technical report, Technical report, Stanford University, 2008.
[12]
A. B. Earls, S. M. Embury, and N. H. Turner. A method for the manual extraction of business rules from legacy source code. BT Technology Journal, 20(4):127--145, Oct. 2002.
[13]
C. J. Fillmore. The case for case, dins. In E. Bach and R. Harms, editors, Universals in Linguistic Theory. Holt, Rinehart, and Winston, 1968.
[14]
S. Ghaisas, M. Motwani, and P. Anish. Detecting system use cases and validations from documents. In Automated Software Engineering (ASE), 2013 IEEE/ACM 28th International Conference on, pages 568--573, Nov 2013.
[15]
Z. GuoDong, S. Jian, Z. Jie, and Z. Min. Exploring various knowledge in relation extraction. In Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics, ACL '05, pages 427--434, Stroudsburg, PA, USA, 2005. Association for Computational Linguistics.
[16]
H. Huang. Business rule extraction from legacy code. In Proceedings of the 20th Conference on Computer Software and Applications, COMPSAC '96, pages 162--, Washington, DC, USA, 1996. IEEE Computer Society.
[17]
N. Kambhatla. Combining lexical, syntactic, and semantic features with maximum entropy models for extracting relations. In Proceedings of the ACL 2004 on Interactive Poster and Demonstration Sessions, ACLdemo '04, Stroudsburg, PA, USA, 2004. Association for Computational Linguistics.
[18]
I. Muslea et al. Extraction patterns for information extraction tasks: A survey. In The AAAI-99 Workshop on Machine Learning for Information Extraction, volume 2, 1999.
[19]
T. Nasukawa and T. Nagano. Text analysis and knowledge mining system. IBM Systems Journal, 40(4):967--984, 2001.
[20]
R. Pandita, X. Xiao, H. Zhong, T. Xie, S. Oney, and A. Paradkar. Inferring method specifications from natural language api descriptions. In Proceedings of the 34th International Conference on Software Engineering, ICSE '12, pages 815--825, Piscataway, NJ, USA, 2012. IEEE Press.
[21]
S. Pawar, P. Bhattacharyya, and G. K. Palshikar. Semi-supervised relation extraction using em algorithm. https://www.cse.iitb.ac.in/~pb/papers/icon13-ie-em.pdf, 2014.
[22]
E. Putrycz and A. W. Kark. Rule Representation, Interchange and Reasoning on the Web: International Symposium, RuleML 2008, Orlando, FL, USA, October 30--31, 2008. Proceedings, chapter Connecting Legacy Code, Business Rules and Documentation, pages 17--30. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.
[23]
L. R. Rabiner and B.-H. Juang. An introduction to hidden markov models. ASSP Magazine, IEEE, 3(1):4--16, 1986.
[24]
C. Rolland and C. B. Achour. Guiding the construction of textual use case specifications. Data Knowl. Eng., 25(1-2):125--160, Mar. 1998.
[25]
A. Sinha, A. Paradkar, P. Kumanan, and B. Boguraev. A linguistic analysis engine for natural language use case description and its application to dependability analysis in industrial use cases. In Dependable Systems Networks, 2009. DSN '09. IEEE/IFIP International Conference on, pages 327--336, June 2009.
[26]
H. M. Sneed. Extracting business logic from existing cobol programs as a basis for redevelopment. In Program Comprehension, 2001. IWPC 2001. Proceedings. 9th International Workshop on, pages 167--175, 2001.
[27]
N. Sobhana, P. Mitra, and S. Ghosh. Conditional random field based named entity recognition in geological text. International Journal of Computer Applications, 1(3):143--147, 2010.
[28]
C. Wang, Y. Zhou, and J. Chen. Extracting prime business rules from large legacy system. In Computer Science and Software Engineering, 2008 International Conference on, volume 2, pages 19--23, Dec 2008.
[29]
X. Wang, J. Sun, X. Yang, Z. He, and S. Maddineni. Business rules extraction from large legacy systems. In Software Maintenance and Reengineering, 2004. CSMR 2004. Proceedings. Eighth European Conference on, pages 249--258, March 2004.
[30]
X. Xiao, A. Paradkar, S. Thummalapenta, and T. Xie. Automated extraction of security policies from natural-language software documents. In Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE '12, pages 12:1--12:11, New York, NY, USA, 2012. ACM.
[31]
H. Zhong, L. Zhang, T. Xie, and H. Mei. Inferring resource specifications from natural language api documentation. In Proceedings of the 2009 IEEE/ACM International Conference on Automated Software Engineering, ASE '09, pages 307--318, Washington, DC, USA, 2009. IEEE Computer Society.
[32]
G. Zhou and J. Su. Named entity recognition using an hmm-based chunk tagger. In Proceedings of the 40th Annual Meeting on Association for Computational Linguistics, ACL '02, pages 473--480, Stroudsburg, PA, USA, 2002. Association for Computational Linguistics.

Cited By

View all
  • (2021)Open Information Extraction Using Dependency Parser for Business Rule Mining in SBVR FormatProceedings of the 14th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)10.1145/3452383.3452396(1-11)Online publication date: 25-Feb-2021
  • (2020)An Approach to Mine SBVR Vocabularies and Rules from Business DocumentsProceedings of the 13th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)10.1145/3385032.3385046(1-11)Online publication date: 27-Feb-2020
  • (2019)SBVR-based Business Rule Creation for Legacy Programs using Variable ProvenanceProceedings of the 12th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)10.1145/3299771.3299786(1-11)Online publication date: 14-Feb-2019
  • Show More Cited By
  1. An Approach to Mine Business Rule Intents from Domain-specific Documents

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ISEC '17: Proceedings of the 10th Innovations in Software Engineering Conference
    February 2017
    235 pages
    ISBN:9781450348560
    DOI:10.1145/3021460
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    In-Cooperation

    • iSOFT: iSOFT

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 February 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ISEC '17

    Acceptance Rates

    ISEC '17 Paper Acceptance Rate 25 of 81 submissions, 31%;
    Overall Acceptance Rate 76 of 315 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Open Information Extraction Using Dependency Parser for Business Rule Mining in SBVR FormatProceedings of the 14th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)10.1145/3452383.3452396(1-11)Online publication date: 25-Feb-2021
    • (2020)An Approach to Mine SBVR Vocabularies and Rules from Business DocumentsProceedings of the 13th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)10.1145/3385032.3385046(1-11)Online publication date: 27-Feb-2020
    • (2019)SBVR-based Business Rule Creation for Legacy Programs using Variable ProvenanceProceedings of the 12th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)10.1145/3299771.3299786(1-11)Online publication date: 14-Feb-2019
    • (2019)BuRRiToProceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering10.1109/ASE.2019.00134(1190-1193)Online publication date: 10-Nov-2019
    • (2018)Relation Identification in Business Rules for Domain-specific DocumentsProceedings of the 11th Innovations in Software Engineering Conference10.1145/3172871.3172884(1-5)Online publication date: 9-Feb-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media