{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:55:34Z","timestamp":1760586934771},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T00:00:00Z","timestamp":1552867200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s00500-019-03882-y","type":"journal-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T11:05:01Z","timestamp":1552907101000},"page":"13433-13448","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A methodology to rank the design patterns on the base of text relevancy"],"prefix":"10.1007","volume":"23","author":[{"given":"Shahid","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Jacky","family":"Keung","sequence":"additional","affiliation":[]},{"given":"Mohammad Khalid","family":"Sohail","sequence":"additional","affiliation":[]},{"given":"Arif Ali","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Manzoor","family":"Ilahi","sequence":"additional","affiliation":[]},{"given":"Ghufran","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Muhammad Rafiq","family":"Mufti","sequence":"additional","affiliation":[]},{"given":"Muhammad Asim","family":"Noor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,18]]},"reference":[{"key":"3882_CR1","doi-asserted-by":"crossref","unstructured":"Baraki H et al (2015) Interdisciplinary design patterns for socially aware computing. In: Proceeding of 37th international conference on software engineering (ICSE)","DOI":"10.1109\/ICSE.2015.180"},{"key":"3882_CR2","volume-title":"Software architecture in practice","author":"L Bass","year":"2012","unstructured":"Bass L, Clements P, Kazman R (2012) Software architecture in practice, 3rd edn. Addison-Wesley Professional, Boston","edition":"3"},{"key":"3882_CR3","doi-asserted-by":"crossref","unstructured":"Birukou A (2010) A survey of existing approaches for pattern search and selection. In: Proceeding of PLoP","DOI":"10.1145\/2328909.2328912"},{"key":"3882_CR4","doi-asserted-by":"crossref","unstructured":"Blomqvist E (2008) Pattern ranking for semiautomatic ontology construction. In: Proceedings of SAC","DOI":"10.1145\/1363686.1364224"},{"key":"3882_CR5","unstructured":"Booch G (2006) Handbook of software architecture, 2004. IBM Corporation. http:\/\/handbookofsoftwarearchitecture.com\/"},{"key":"3882_CR6","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s11219-014-9249-z","volume":"23","author":"C Bouhours","year":"2015","unstructured":"Bouhours C, Leblance H, Percebois C (2015) Spoiled patterns: how to extend the GoF. Softw Qual J 23:661\u2013694","journal-title":"Softw Qual J"},{"key":"3882_CR7","series-title":"A pattern language for distributed computing","volume-title":"Pattern-oriented software architecture","author":"F Buschmann","year":"2007","unstructured":"Buschmann F, Henney K, Schmidt DC (2007a) Pattern-oriented software architecture, vol 4. A pattern language for distributed computing. Wiley, New York"},{"key":"3882_CR8","series-title":"On patterns and pattern languages","volume-title":"Pattern-oriented software architecture","author":"F Buschmann","year":"2007","unstructured":"Buschmann F, Henney K, Schmidt DC (2007b) Pattern-oriented software architecture, vol 5. On patterns and pattern languages. Wiley, New York"},{"key":"3882_CR9","volume-title":"Real-time design patterns: robust scalable architecture for real-time systems","author":"BP Douglass","year":"2002","unstructured":"Douglass BP (2002) Real-time design patterns: robust scalable architecture for real-time systems. Addison-Wesley, Boston"},{"key":"3882_CR10","volume-title":"The design of sites: patterns, principles and processes for crafting a customer-centered web experience","author":"V Duyne","year":"2003","unstructured":"Duyne V et al (2003) The design of sites: patterns, principles and processes for crafting a customer-centered web experience. Addison Wesley, Boston"},{"key":"3882_CR11","volume-title":"Design patterns: elements of reusable object-oriented software","author":"E Gamma","year":"1995","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns: elements of reusable object-oriented software. Addison-Wesley, Boston"},{"key":"3882_CR12","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.jss.2011.08.031","volume":"85","author":"SMH Hasheminejad","year":"2012","unstructured":"Hasheminejad SMH, Jalili S (2012) Design patterns selection: an automatic two-phase method. J Syst Softw 85:408\u2013424","journal-title":"J Syst Softw"},{"key":"3882_CR13","unstructured":"Hasso S, Carlson CR (2005) A theoretically-based process for organizing design patterns. In: Proceedings of 12th pattern language of patterns"},{"key":"3882_CR14","doi-asserted-by":"crossref","unstructured":"Henninger S, Correa V (2007) Software pattern communities: current practices and challenges. In: Proceedings of the 14th conference on pattern languages of programs","DOI":"10.1145\/1772070.1772087"},{"key":"3882_CR15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.21248\/jlcl.20.2005.68","volume":"20","author":"A Hotho","year":"2005","unstructured":"Hotho A, Nurnberger A, Paab G (2005) A brief survey of text mining. J Comput Linguist Lang Technol 20:19\u201362","journal-title":"J Comput Linguist Lang Technol"},{"issue":"1","key":"3882_CR16","first-page":"1","volume":"8","author":"NL Hsueh","year":"2007","unstructured":"Hsueh NL, Kuo J-Y, Lin C-C (2007) Object-oriented design: a goal-driven and pattern-based approach. J Softw Syst Model 8(1):1\u201318","journal-title":"J Softw Syst Model"},{"key":"3882_CR17","unstructured":"Huang A (2008) Similarity measures for text document clustering. In: Proceedings of NZCSRSC"},{"key":"3882_CR18","doi-asserted-by":"crossref","unstructured":"Hussain S et al (2016) A methodology to automate the selection of design patterns. In: Proceeding of 40th annual computer software and applications conference (COMPSAC)","DOI":"10.1109\/COMPSAC.2016.226"},{"key":"3882_CR19","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.asoc.2017.04.043","volume":"58","author":"S Hussain","year":"2017","unstructured":"Hussain S, Keung J, Khan AA (2017a) Software design patterns classification and selection using text categorization approach. Appl Soft Comput 58:225\u2013244","journal-title":"Appl Soft Comput"},{"key":"3882_CR20","unstructured":"Hussain S, Keung J, Khan AA (2017) A framework for ranking of software design patterns. In: Proceedings of 11th international conference on complex, intelligent, and software intensive systems, Jul 10\u201312, 2017"},{"issue":"3","key":"3882_CR21","doi-asserted-by":"publisher","first-page":"173","DOI":"10.7763\/LNSE.2015.V3.185","volume":"3","author":"I Issaoui","year":"2015","unstructured":"Issaoui I, Bouassida N, Abdallah HB (2015) A new approach for interactive design pattern recommendation. Lect Notes Softw Eng 3(3):173","journal-title":"Lect Notes Softw Eng"},{"key":"3882_CR22","doi-asserted-by":"crossref","unstructured":"Khoury PE, Mokhtari A, Coquery E, Hacid MS (2008) An ontological interface for software developers to select security patterns. In: Proceedings of 19th international conference on database and expert systems application, (DEXA\u201908), pp 297\u2013301","DOI":"10.1109\/DEXA.2008.110"},{"key":"3882_CR23","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1016\/j.jvlc.2007.02.009","volume":"18","author":"DK Kim","year":"2007","unstructured":"Kim DK, Khawand CE (2007) An approach to precisely specifying the problem domain of design patterns. J Vis Lang Comput 18:560\u2013591","journal-title":"J Vis Lang Comput"},{"issue":"3","key":"3882_CR24","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s11219-008-9048-5","volume":"16","author":"DK Kim","year":"2008","unstructured":"Kim DK, Shen W (2008) Evaluating pattern conformance of UML models: a divide and conquer approach and case studies. Softw Qual J 16(3):329\u2013359","journal-title":"Softw Qual J"},{"key":"3882_CR25","series-title":"Patterns for resource management","volume-title":"Pattern-oriented software architecture","author":"M Kircher","year":"2004","unstructured":"Kircher M, Jain O (2004) Pattern-oriented software architecture, vol 3. Patterns for resource management. Wiley, New York"},{"issue":"10","key":"3882_CR26","doi-asserted-by":"publisher","first-page":"1854","DOI":"10.1587\/transinf.E94.D.1854","volume":"94","author":"H Li","year":"2011","unstructured":"Li H (2011) A short introduction to \u2018learning to rank\u2019. IEICE Trans Inf Syst 94(10):1854\u20131862","journal-title":"IEICE Trans Inf Syst"},{"key":"3882_CR27","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1016\/j.asej.2014.04.011","volume":"5","author":"W Medhat","year":"2014","unstructured":"Medhat W, Hassan A, Korashy H (2014) Sentiment analysis algorithms and applications: a survey. Ain Shams Eng J 5:1093\u20131113","journal-title":"Ain Shams Eng J"},{"issue":"3","key":"3882_CR28","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10791-006-9019-z","volume":"10","author":"D Metzler","year":"2007","unstructured":"Metzler D, Croft WB (2007) Linear feature-based models for information retrieval. Inf Retr 10(3):257\u2013274","journal-title":"Inf Retr"},{"key":"3882_CR29","doi-asserted-by":"crossref","unstructured":"Palma F, Farzin H, Gueheneuc Y-G (2012) Recommendation system for design patterns in software development: an DRP Ovrview. In: Proceeding of RSSE","DOI":"10.1109\/RSSE.2012.6233399"},{"key":"3882_CR30","series-title":"Patterns for concurrent and networked objects","volume-title":"Pattern-oriented software architecture","author":"DC Schmidt","year":"2000","unstructured":"Schmidt DC, Stal M, Rohnert H, Buschmann F (2000) Pattern-oriented software architecture, vol 2. Patterns for concurrent and networked objects. Wiley, New York"},{"key":"3882_CR31","volume-title":"Security patterns: integrating security and systems engineering","author":"M Schumacher","year":"2006","unstructured":"Schumacher M, Fernandez E, Hybertson D, Buschmann F (2006) Security patterns: integrating security and systems engineering. Wiley, New York"},{"key":"3882_CR32","volume-title":"Design pattern explained: a new perspective on object oriented design","author":"A Shalloway","year":"2001","unstructured":"Shalloway A, Trott R (2001) Design pattern explained: a new perspective on object oriented design. Addison Wesley, Boston"},{"key":"3882_CR33","volume-title":"Operating System Concepts","author":"A Silberschatz","year":"2002","unstructured":"Silberschatz A, Galvin PB, Gagne G (2002) Operating System Concepts, 6th edn. Wiley, USA","edition":"6"},{"key":"3882_CR34","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.eswa.2015.08.050","volume":"43","author":"AK Uysal","year":"2016","unstructured":"Uysal AK (2016) An improved global feature selection scheme for text classification. Expert Syst Appl 43:82\u201392","journal-title":"Expert Syst Appl"},{"key":"3882_CR35","unstructured":"van Welie M (2006) Patterns in interaction design. http:\/\/www.welie.com\/ . Updated: 27 June 2006"},{"key":"3882_CR36","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.scico.2015.12.007","volume":"121","author":"P Velasco-Elizondo","year":"2016","unstructured":"Velasco-Elizondo P, Marin-Pina R, Vazquez-Reyes S, Mora-Soto A, Mejia J (2016) Knowledge representation and information extraction for analyzing architectural patterns. Sci Comput Program 121:176\u2013189","journal-title":"Sci Comput Program"},{"key":"3882_CR37","doi-asserted-by":"crossref","unstructured":"Wood WG (2007) A practical example of applying attribute-driven design (ADD), version 2.0, technical report, SE Institute","DOI":"10.21236\/ADA468604"},{"issue":"3","key":"3882_CR38","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/s10791-009-9112-1","volume":"13","author":"Q Wu","year":"2007","unstructured":"Wu Q, Burges CJC, Svore K, Gao J (2007) Adapting boosting for information retrieval measures. J Inf Retr 13(3):254\u2013270","journal-title":"J Inf Retr"},{"key":"3882_CR39","doi-asserted-by":"crossref","unstructured":"Xu J, Li H (2007) AdaRank: a boosting algorithm for information retrieval. In: Proceedings of SIGIR, pp 391\u2013398","DOI":"10.1145\/1277741.1277809"},{"key":"3882_CR40","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.knosys.2014.04.025","volume":"66","author":"C Zhang","year":"2014","unstructured":"Zhang C, Wu X, Niu Z, Ding W (2014) Authorship identification from unstructured texts. Knowl Based Syst 66:99\u2013111","journal-title":"Knowl Based Syst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03882-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-03882-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03882-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T16:25:53Z","timestamp":1694708753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-03882-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,18]]},"references-count":40,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["3882"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-03882-y","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,18]]},"assertion":[{"value":"18 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Since in the article there is no human involvement for data gathering, consequently informed consent is not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}