{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:38:06Z","timestamp":1777894686642,"version":"3.51.4"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/snams.2018.8554909","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:03:09Z","timestamp":1543885389000},"page":"323-327","source":"Crossref","is-referenced-by-count":29,"title":["A Novel Recommender System Based on Apriori Algorithm for Requirements Engineering"],"prefix":"10.1109","author":[{"given":"Shadi","family":"AlZu'bi","sequence":"first","affiliation":[]},{"given":"Bilal","family":"Hawashin","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"EIBes","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Al-Ayyoub","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","first-page":"487","article-title":"Fast algorithms for mining association rules","volume":"1215","author":"agrawal","year":"1994","journal-title":"Proc 20th Int Conf on Very large Data Bases"},{"key":"ref31","author":"witten","year":"2016","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref30","first-page":"245","article-title":"A content analysis technique for inconsistency detection in software requirements documents","author":"fantechi","year":"2005","journal-title":"WER"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2010.5774847"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AEECT.2011.6132516"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.2009.12"},{"key":"ref13","article-title":"An efficient user interest extractor for recommender systems","volume":"2","author":"hawashin","year":"2015","journal-title":"Proceedings of the World Congress on Engineering and Computer Science"},{"key":"ref14","article-title":"An efficient agent-based system to extract interests of user groups","volume":"1","author":"hawashin","year":"2016","journal-title":"Proceedings of the World Congress on Engineering and Computer Science"},{"key":"ref15","first-page":"904","article-title":"Elderly people health monitoring system using fuzzy rule based approach","volume":"4","author":"mansour","year":"2014","journal-title":"International Journal of Advanced Computer Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/USER.2013.6603080"},{"key":"ref17","first-page":"1161","article-title":"Intellireq: Intelligent techniques for software requirements engineering","author":"ninaus","year":"2014","journal-title":"ECAI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021240730564"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2043932.2044017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1562764.1562784"},{"key":"ref27","article-title":"Ultra-large-scale systems: The software challenge of the future","author":"northrop","year":"2006","journal-title":"CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v32i3.2366"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45135-5_1"},{"key":"ref29","first-page":"105","article-title":"Group decision support for requirements negotiation","author":"felfernig","year":"2011","journal-title":"Proc Int Conf User Modeling Adaptation and Personalization"},{"key":"ref5","article-title":"Evaluation framework for tools that manage requirements inconsistency","author":"iyer","year":"2004","journal-title":"Proc AWRE 04 9th Australian Workshop on Requirements Engineering"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MeMeA.2011.5966667"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245121"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806844"},{"key":"ref9","article-title":"Medical volume segmentation using 3d multiresolution analysis","author":"alzubi","year":"2012","journal-title":"2012 International Conference on Innovations in Information Technology (IIT)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34419-0_14"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167344"},{"key":"ref22","first-page":"105","article-title":"Group decision support for requirements negotiation","author":"felfernig","year":"2011","journal-title":"Proc Int Conf User Modeling Adaptation and Personalization"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007369909943"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/989863.989948"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1370700.1370702"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.47"}],"event":{"name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Valencia","start":{"date-parts":[[2018,10,15]]},"end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536820\/8554420\/08554909.pdf?arnumber=8554909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:09:38Z","timestamp":1643288978000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554909\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/snams.2018.8554909","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}