Natural Language Processing for Software Engineering
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Graphical and digital media applications > Natural Language Processing for Software Engineering
Natural Language Processing for Software Engineering

Natural Language Processing for Software Engineering


     0     
5
4
3
2
1



International Edition


X
About the Book

Discover how Natural Language Processing for Software Engineering can transform your understanding of agile development, equipping you with essential tools and insights to enhance software quality and responsiveness in today’s rapidly changing technological landscape. Agile development enhances business responsiveness through continuous software delivery, emphasizing iterative methodologies that produce incremental, usable software. Working software is the main measure of progress, and ongoing customer collaboration is essential. Approaches like Scrum, eXtreme Programming (XP), and Crystal share these principles but differ in focus: Scrum reduces documentation, XP improves software quality and adaptability to changing requirements, and Crystal emphasizes people and interactions while retaining key artifacts. Modifying software systems designed with Object-Oriented Analysis and Design can be costly and time-consuming in rapidly changing environments requiring frequent updates. This book explores how natural language processing can enhance agile methodologies, particularly in requirements engineering. It introduces tools that help developers create, organize, and update documentation throughout the agile project process.

Table of Contents:
Preface xvii 1 Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment 1 Ravindra Bhardwaj, Sreenivasulu Gogula, Bidisha Bhabani, K. Kanagalakshmi, Aparajita Mukherjee and D. Vetrithangam 1.1 Introduction 2 1.2 Need of Vulnerability Identification 4 1.3 Vulnerabilities in IoT Web Applications 5 1.4 Intrusion Detection System 7 1.5 Machine Learning in Intrusion Detection System 10 1.6 Conclusion 12 References 12 2 Frequent Pattern Mining Using Artificial Intelligence and Machine Learning 15 R. Deepika, Sreenivasulu Gogula, K. Kanagalakshmi, Anshu Mehta, S. J. Vivekanandan and D. Vetrithangam 2.1 Introduction 16 2.2 Data Mining Functions 17 2.3 Related Work 19 2.4 Machine Learning for Frequent Pattern Mining 24 2.5 Conclusion 26 References 26 3 Classification and Detection of Prostate Cancer Using Machine Learning Techniques 29 D. Vetrithangam, Pramod Kumar, Shaik Munawar, Rituparna Biswas, Deependra Pandey and Amar Choudhary 3.1 Introduction 30 3.2 Literature Survey 32 3.3 Machine Learning for Prostate Cancer Classification and Detection 35 3.4 Conclusion 37 References 38 4 NLP-Based Spellchecker and Grammar Checker for Indic Languages 43 Brijesh Kumar Y. Panchal and Apurva Shah 4.1 Introduction 44 4.2 NLP-Based Techniques of Spellcheckers and Grammar Checkers 44 4.2.1 Syntax-Based 44 4.2.2 Statistics-Based 45 4.2.3 Rule-Based 45 4.2.4 Deep Learning-Based 45 4.2.5 Machine Learning-Based 46 4.2.6 Reinforcement Learning-Based 46 4.3 Grammar Checker Related Work 47 4.4 Spellchecker Related Work 58 4.5 Conclusion 66 References 67 5 Identification of Gujarati Ghazal Chanda with Cross-Platform Application 71 Brijeshkumar Y. Panchal Abbreviations 72 5.1 Introduction 72 5.1.1 The Gujarati Language 72 5.2 Ghazal 75 5.3 History and Grammar of Ghazal 77 5.4 Literature Review 78 5.5 Proposed System 85 5.6 Conclusion 92 References 92 6 Cancer Classification and Detection Using Machine Learning Techniques 95 Syed Jahangir Badashah, Afaque Alam, Malik Jawarneh, Tejashree Tejpal Moharekar, Venkatesan Hariram, Galiveeti Poornima and Ashish Jain 6.1 Introduction 96 6.2 Machine Learning Techniques 97 6.3 Review of Machine Learning for Cancer Detection 101 6.4 Methods 103 6.5 Result Analysis 106 6.6 Conclusion 107 References 108 7 Text Mining Techniques and Natural Language Processing 113 Tzu-Chia Chen 7.1 Introduction 113 7.2 Text Classification and Text Clustering 115 7.3 Related Work 116 7.4 Methodology 121 7.5 Conclusion 123 References 123 8 An Investigation of Techniques to Encounter Security Issues Related to Mobile Applications 127 Devabalan Pounraj, Pankaj Goel, Meenakshi, Domenic T. Sanchez, Parashuram Shankar Vadar, Rafael D. Sanchez and Malik Jawarneh 8.1 Introduction 128 8.2 Literature Review 130 8.3 Results and Discussions 137 8.4 Conclusion 138 References 139 9 Machine Learning for Sentiment Analysis Using Social Media Scrapped Data 143 Galiveeti Poornima, Meenakshi, Malik Jawarneh, A. Shobana, K.P. Yuvaraj, Urmila R. Pol and Tejashree Tejpal Moharekar 9.1 Introduction 144 9.2 Twitter Sentiment Analysis 146 9.3 Sentiment Analysis Using Machine Learning Techniques 149 9.4 Conclusion 152 References 152 10 Opinion Mining Using Classification Techniques on Electronic Media Data 155 Meenakshi 10.1 Introduction 156 10.2 Opinion Mining 158 10.3 Related Work 159 10.4 Opinion Mining Techniques 161 10.4.1 Naïve Bayes 162 10.4.2 Support Vector Machine 162 10.4.3 Decision Tree 163 10.4.4 Multiple Linear Regression 163 10.4.5 Multilayer Perceptron 164 10.4.6 Convolutional Neural Network 164 10.4.7 Long Short-Term Memory 165 10.5 Conclusion 166 References 166 11 Spam Content Filtering in Online Social Networks 169 Meenakshi 11.1 Introduction 169 11.1.1 E-Mail Spam 170 11.2 E-Mail Spam Identification Methods 171 11.2.1 Content-Based Spam Identification Method 171 11.2.2 Identity-Based Spam Identification Method 172 11.3 Online Social Network Spam 172 11.4 Related Work 173 11.5 Challenges in the Spam Message Identification 177 11.6 Spam Classification with SVM Filter 178 11.7 Conclusion 179 References 180 12 An Investigation of Various Techniques to Improve Cyber Security 183 Shoaib Mohammad, Ramendra Pratap Singh, Rajiv Kumar, Kshitij Kumar Rai, Arti Sharma and Saloni Rathore 12.1 Introduction 184 12.2 Various Attacks 185 12.3 Methods 189 12.4 Conclusion 190 References 191 13 Brain Tumor Classification and Detection Using Machine Learning by Analyzing MRI Images 193 Chandrima Sinha Roy, K. Parvathavarthini, M. Gomathi, Mrunal Pravinkumar Fatangare, D. Kishore and Anilkumar Suthar 13.1 Introduction 194 13.2 Literature Survey 197 13.3 Methods 200 13.4 Result Analysis 202 13.5 Conclusion 203 References 203 14 Optimized Machine Learning Techniques for Software Fault Prediction 207 Chetan Shelke, Ashwini Mandale (Jadhav), Shaik Anjimoon, Asha V., Ginni Nijhawan and Joshuva Arockia Dhanraj 14.1 Introduction 208 14.2 Literature Survey 211 14.3 Methods 214 14.4 Result Analysis 216 14.5 Conclusion 216 References 217 15 Pancreatic Cancer Detection Using Machine Learning and Image Processing 221 Shashidhar Sonnad, Rejwan Bin Sulaiman, Amer Kareem, S. Shalini, D. Kishore and Jayasankar Narayanan 15.1 Introduction 222 15.2 Literature Survey 225 15.3 Methodology 227 15.4 Result Analysis 228 15.5 Conclusion 228 References 229 16 An Investigation of Various Text Mining Techniques 233 Rajashree Gadhave, Anita Chaudhari, B. Ramesh, Vijilius Helena Raj, H. Pal Thethi and A. Ravitheja 16.1 Introduction 234 16.2 Related Work 236 16.3 Classification Techniques for Text Mining 240 16.3.1 Machine Learning Based Text Classification 240 16.3.2 Ontology-Based Text Classification 241 16.3.3 Hybrid Approaches 241 16.4 Conclusion 241 References 241 17 Automated Query Processing Using Natural Language Processing 245 Divyanshu Sinha, G. Ravivarman, B. Rajalakshmi, V. Alekhya, Rajeev Sobti and R. Udhayakumar 17.1 Introduction 246 17.1.1 Natural Language Processing 246 17.2 The Challenges of NLP 248 17.3 Related Work 249 17.4 Natural Language Interfaces Systems 253 17.5 Conclusion 255 References 256 18 Data Mining Techniques for Web Usage Mining 259 Navdeep Kumar Chopra, Chinnem Rama Mohan, Snehal Dipak Chaudhary, Manisha Kasar, Trupti Suryawanshi and Shikha Dubey 18.1 Introduction 260 18.1.1 Web Usage Mining 260 18.2 Web Mining 263 18.2.1 Web Content Mining 264 18.2.2 Web Structure Mining 264 18.2.3 Web Usage Mining 265 18.2.3.1 Preprocessing 265 18.2.3.2 Pattern Discovery 265 18.2.3.3 Pattern Analysis 266 18.3 Web Usage Data Mining Techniques 266 18.4 Conclusion 268 References 269 19 Natural Language Processing Using Soft Computing 271 M. Rajkumar, Viswanathasarma Ch, Anandhi R. J., D. Anandhasilambarasan, Om Prakash Yadav and Joshuva Arockia Dhanraj 19.1 Introduction 272 19.2 Related Work 273 19.3 NLP Soft Computing Approaches 276 19.4 Conclusion 279 References 279 20 Sentiment Analysis Using Natural Language Processing 283 Brijesh Goswami, Nidhi Bhavsar, Soleman Awad Alzobidy, B. Lavanya, R. Udhayakumar and Rajapandian K. 20.1 Introduction 284 20.2 Sentiment Analysis Levels 285 20.2.1 Document Level 285 20.2.2 Sentence Level 285 20.2.3 Aspect Level 286 20.3 Challenges in Sentiment Analysis 286 20.4 Related Work 288 20.5 Machine Learning Techniques for Sentiment Analysis 290 20.6 Conclusion 292 References 292 21 Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data 295 C. V. Guru Rao, Nagendra Prasad Krishnam, Akula Rajitha, Anandhi R. J., Atul Singla and Joshuva Arockia Dhanraj 21.1 Introduction 296 21.2 Web Mining 298 21.3 Taxonomy of Web Data Mining 299 21.3.1 Web Usage Mining 300 21.3.2 Web Structure Mining 301 21.3.3 Web Content Mining 301 21.4 Web Content Mining Methods 302 21.4.1 Unstructured Text Data Mining 302 21.4.2 Structured Data Mining 303 21.4.3 Semi-Structured Data Mining 303 21.5 Efficient Algorithms for Web Data Extraction 304 21.6 Machine Learning Based Web Content Extraction Methods 305 21.7 Conclusion 307 References 307 22 Intelligent Pattern Discovery Using Web Data Mining 311 Vidyapati Jha, Chinnem Rama Mohan, T. Sampath Kumar, Anandhi R.J., Bhimasen Moharana and P. Pavankumar 22.1 Introduction 312 22.2 Pattern Discovery from Web Server Logs 313 22.2.1 Subsequently Accessed Interesting Page Categories 314 22.2.2 Subsequent Probable Page of Visit 314 22.2.3 Strongly and Weakly Linked Web Pages 314 22.2.4 User Groups 315 22.2.5 Fraudulent and Genuine Sessions 315 22.2.6 Web Traffic Behavior 315 22.2.7 Purchase Preference of Customers 315 22.3 Data Mining Techniques for Web Server Log Analysis 316 22.4 Graph Theory Techniques for Analysis of Web Server Logs 318 22.5 Conclusion 319 References 320 23 A Review of Security Features in Prominent Cloud Service Providers 323 Abhishek Mishra, Abhishek Sharma, Rajat Bhardwaj, Romil Rawat, T.M.Thiyagu and Hitesh Rawat 23.1 Introduction 324 23.2 Cloud Computing Overview 324 23.3 Cloud Computing Model 326 23.4 Challenges with Cloud Security and Potential Solutions 327 23.5 Comparative Analysis 332 23.6 Conclusion 332 References 332 24 Prioritization of Security Vulnerabilities under Cloud Infrastructure Using AHP 335 Abhishek Sharma and Umesh Kumar Singh 24.1 Introduction 336 24.2 Related Work 338 24.3 Proposed Method 341 24.4 Result and Discussion 346 24.5 Conclusion 352 References 352 25 Cloud Computing Security Through Detection & Mitigation of Zero-Day Attack Using Machine Learning Techniques 357 Abhishek Sharma and Umesh Kumar Singh 25.1 Introduction 358 25.2 Related Work 360 25.2.1 Analysis of Zero-Day Exploits and Traditional Methods 364 25.3 Proposed Methodology 367 25.4 Results and Discussion 376 25.4.1 Prevention & Mitigation of Zero Day Attacks (ZDAs) 381 25.5 Conclusion and Future Work 383 References 384 26 Predicting Rumors Spread Using Textual and Social Context in Propagation Graph with Graph Neural Network 389 Siddharath Kumar Arjaria, Hardik Sachan, Satyam Dubey, Ayush Pandey, Mansi Gautam, Nikita Gupta and Abhishek Singh Rathore 26.1 Introduction 390 26.2 Literature Review 391 26.3 Proposed Methodology 393 26.3.1 Tweep Tendency Encoding 394 26.3.2 Network Dynamics Extraction 395 26.3.3 Extracted Information Integration 396 26.4 Results and Discussion 398 26.5 Conclusion 399 References 400 27 Implications, Opportunities, and Challenges of Blockchain in Natural Language Processing 403 Neha Agrawal, Balwinder Kaur Dhaliwal, Shilpa Sharma, Neha Yadav and Ranjana Sikarwar 27.1 Introduction 404 27.2 Related Work 406 27.3 Overview on Blockchain Technology and NLP 409 27.3.1 Blockchain Technology, Features, and Applications 409 27.3.2 Natural Language Processing 410 27.3.3 Challenges in NLP 411 27.3.4 Data Integration and Accuracy in NLP 411 27.4 Integration of Blockchain into NLP 412 27.5 Applications of Blockchain in NLP 414 27.6 Blockchain Solutions for NLP 417 27.7 Implications of Blockchain Development Solutions in NLP 418 27.8 Sectors That can be Benified from Blockchain and NLP Integration 419 27.9 Challenges 420 27.10 Conclusion 422 References 422 28 Emotion Detection Using Natural Language Processing by Text Classification 425 Jyoti Jayal, Vijay Kumar, Paramita Sarkar and Sudipta Kumar Dutta 28.1 Introduction 426 28.2 Natural Language Processing 427 28.3 Emotion Recognition 429 28.4 Related Work 430 28.4.1 Emotion Detection Using Machine Learning 430 28.4.2 Emotion Detection Using Deep Learning 432 28.4.3 Emotion Detection Using Ensemble Learning 435 28.5 Machine Learning Techniques for Emotion Detection 437 28.6 Conclusion 439 References 439 29 Alzheimer Disease Detection Using Machine Learning Techniques 443 M. Prabavathy, Paramita Sarkar, Abhrendu Bhattacharya and Anil Kumar Behera 29.1 Introduction 444 29.2 Machine Learning Techniques to Detect Alzheimer’s Disease 445 29.3 Pre-Processing Techniques for Alzheimer’s Disease Detection 446 29.4 Feature Extraction Techniques for Alzheimer’s Disease Detection 448 29.5 Feature Selection Techniques for Diagnosis of Alzheimer’s Disease 449 29.6 Machine Learning Models Used for Alzheimer’s Disease Detection 451 29.7 Conclusion 453 References 454 30 Netnographic Literature Review and Research Methodology for Maritime Business and Potential Cyber Threats 457 Hitesh Rawat, Anjali Rawat and Romil Rawat 30.1 Introduction 458 30.2 Criminal Flows Framework 460 30.3 Oceanic Crime Exchange and Categorization 462 30.4 Fisheries Crimes and Mobility Crimes 469 30.5 Conclusion 470 30.6 Discussion 470 References 470 31 Review of Research Methodology and IT for Business and Threat Management 475 Hitesh Rawat, Anjali Rawat, Sunday Adeola Ajagbe and Yagyanath Rimal Abbreviation Used 476 31.1 Introduction 477 31.2 Conclusion 484 References 485 About the Editors 487 Index 489

About the Author :
Rajesh Kumar Chakrawarti, PhD, is a dean and professor in the Department of Computer Science and Engineering at Sushila Devi Bansal College, Bansal Group of Institutions, India. He has over 20 years of professional experience in academia and industry. Additionally, he has organized and attended over 200 seminars, workshops, and conferences and has published over 100 research papers and book chapters in nationally and internationally revered publications. Ranjana Sikarwar is currently pursuing a PhD from Amity University, Gwalior. She completed her Bachelor of Engineering in 2006 and Master of Technology in Computer Science and Engineering in 2015. Her research interests include social network analysis, graph mining, machine learning, Internet of Things, and deep learning. Sanjaya Kumar Sarangi, PhD, is an adjunct professor and coordinator at Utkal University with over 23 years of experience in the academic, research, and industry sectors. He has a number of publications in journals and conferences, has authored many textbooks and book chapters, and has more than 30 national and international patents. He is an active member and life member of many associations, as well as an editor, technical program committee member, and reviewer in reputed journals and conferences. He has dedicated his career to advancing information and communication technology to enhance and optimize worldwide research and information dissemination, leading to improved student learning and teaching methods. Samson Arun Raj Albert Raj, PhD, is an assistant professor and placement coordinator in the Division of Computer Science and Engineering, School of Computer Science and Technology, Karunya Institute of Technology and Sciences, Tamil Nadu, India. His research is focused on smart city development using drone networks and energy grids with various applications, and his areas of expertise include wireless sensor networks, vehicular ad-hoc networks, and intelligent transportation systems. Shweta Gupta is an assistant professor in the Computer Science and Engineering Department at Medicaps University, Indore (M.P.), India. She focuses on natural language processing, data mining, and machine learning. She aims to close the knowledge gap between theory and real-world applications in the tech sector through her passion for research and teaching. Her approach centers on encouraging creativity and motivating students to strive for technological excellence. Krishnan Sakthidasan Sankaran, PhD, is a professor in the Department of Electronics and Communication Engineering at Hindustan Institute of Technology and Science, India. He has been a senior member of the Institute of Electrical and Electronics Engineers for the past ten years and has published more than 70 papers in refereed journals and international conferences. He has also published three books to his credit. His research interests include image processing, wireless networks, cloud computing, and antenna design. Romil Rawat has attended several research programs and received research grants from the United States, Germany, Italy, and the United Kingdom. He has chaired international conferences and hosted several research events, in addition to publishing several research patents. His research interests include cybersecurity, Internet of Things, dark web crime analysis and investigation techniques, and working towards tracing illicit anonymous contents of cyber terrorism and criminal activities.


Best Sellers


Product Details
  • ISBN-13: 9781394272433
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Scrivener
  • Language: English
  • Returnable: Y
  • Returnable: Y
  • ISBN-10: 139427243X
  • Publisher Date: 17 Jan 2025
  • Binding: Hardback
  • No of Pages: 544
  • Returnable: Y
  • Weight: 907 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Natural Language Processing for Software Engineering
John Wiley & Sons Inc -
Natural Language Processing for Software Engineering
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Natural Language Processing for Software Engineering

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!