{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:47:01Z","timestamp":1773247621251,"version":"3.50.1"},"reference-count":51,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T00:00:00Z","timestamp":1594771200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB1002101"],"award-info":[{"award-number":["2017YFB1002101"]}]},{"name":"National Key R&D Program of China","award":["U1636203"],"award-info":[{"award-number":["U1636203"]}]},{"name":"National Key R&D Program of China","award":["6141B08010102"],"award-info":[{"award-number":["6141B08010102"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB1002101"],"award-info":[{"award-number":["2017YFB1002101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636203"],"award-info":[{"award-number":["U1636203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["6141B08010102"],"award-info":[{"award-number":["6141B08010102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Joint Advanced Research Foundation of China Electronics Technology Group Corporation","award":["2017YFB1002101"],"award-info":[{"award-number":["2017YFB1002101"]}]},{"name":"Joint Advanced Research Foundation of China Electronics Technology Group Corporation","award":["U1636203"],"award-info":[{"award-number":["U1636203"]}]},{"name":"Joint Advanced Research Foundation of China Electronics Technology Group Corporation","award":["6141B08010102"],"award-info":[{"award-number":["6141B08010102"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,7,15]]},"abstract":"<jats:p><jats:italic>Context<\/jats:italic>. The improvements made in the last couple of decades in the requirements engineering (RE) processes and methods have witnessed a rapid rise in effectively using diverse machine learning (ML) techniques to resolve several multifaceted RE issues. One such challenging issue is the effective identification and classification of the software requirements on Stack Overflow (SO) for building quality systems. The appropriateness of ML-based techniques to tackle this issue has revealed quite substantial results, much effective than those produced by the usual available natural language processing (NLP) techniques. Nonetheless, a complete, systematic, and detailed comprehension of these ML based techniques is considerably scarce. <jats:italic>Objective<\/jats:italic>. To identify or recognize and classify the kinds of ML algorithms used for software requirements identification primarily on SO. <jats:italic>Method<\/jats:italic>. This paper reports a systematic literature review (SLR) collecting empirical evidence published up to May 2020. <jats:italic>Results<\/jats:italic>. This SLR study found 2,484 published papers related to RE and SO. The data extraction process of the SLR showed that (1) Latent Dirichlet Allocation (LDA) topic modeling is among the widely used ML algorithm in the selected studies and (2) precision and recall are amongst the most commonly utilized evaluation methods for measuring the performance of these ML algorithms. <jats:italic>Conclusion<\/jats:italic>. Our SLR study revealed that while ML algorithms have phenomenal capabilities of identifying the software requirements on SO, they still are confronted with various open problems\/issues that will eventually limit their practical applications and performances. Our SLR study calls for the need of close collaboration venture between the RE and ML communities\/researchers to handle the open issues confronted in the development of some real world machine learning-based quality systems.<\/jats:p>","DOI":"10.1155\/2020\/8830683","type":"journal-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T23:36:23Z","timestamp":1594856183000},"page":"1-19","source":"Crossref","is-referenced-by-count":34,"title":["A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3576-8365","authenticated-orcid":true,"given":"Arshad","family":"Ahmad","sequence":"first","affiliation":[{"name":"School of Computer Science & Technology, Beijing Institute of Technology, Beijing, China"},{"name":"Department of Computer Science, University of Swabi, Anbar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1691-1584","authenticated-orcid":true,"given":"Chong","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Computer Science & Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4656-1041","authenticated-orcid":true,"given":"Muzammil","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Swat, Mingora, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5863-8467","authenticated-orcid":true,"given":"Asif","family":"Khan","sequence":"additional","affiliation":[{"name":"School of Computer Science & Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Ayaz","family":"Ullah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Swabi, Anbar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0126-9944","authenticated-orcid":true,"given":"Shah","family":"Nazir","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Swabi, Anbar, Pakistan"}]},{"given":"Adnan","family":"Tahir","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]}],"member":"311","reference":[{"key":"1","first-page":"2087","volume":"4","year":"2012","journal-title":"Research Journal of Applied Sciences, Engineering and Technology"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2818724"},{"key":"7","year":"2017"},{"key":"8","volume-title":"Research on comprehending software requirements on social media","year":"2018"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.12.028"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1108\/dta-07-2017-0054"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.07.006"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.11.007"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2914429"},{"key":"23","first-page":"501","volume":"8","year":"2018","journal-title":"International Journal of Machine Learning and Computing (IJMLC)"},{"key":"25","first-page":"1","volume":"33","year":"2004"},{"key":"26","year":"2007"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0144"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.06.011"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-015-0222-6"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.09.004"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/2830544.2830547"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.03.008"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswax.2019.100001"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-017-9597-8"},{"key":"36","first-page":"390","volume":"8","year":"2019","journal-title":"International Journal of Engineering & Technology"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.002"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.02.001"},{"key":"41","volume":"4","year":"2015"},{"key":"42","year":"2017"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2005.6"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2019.103362"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.02.002"},{"key":"53","year":"2010"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.08.002"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.01.006"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2002.1027796"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.10.006"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.10.017"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9492-y"},{"key":"63","year":"2006"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133826"},{"key":"65","first-page":"993","volume":"3","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"66","first-page":"11","volume-title":"On the uniform convergence of relative frequencies of events to their probabilities","year":"2015"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.33832\/ijgdc.2019.12.1.03"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1177\/160940690600500107"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.3316\/qrj0902027"},{"key":"70","year":"2012"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.4304\/jait.1.1.4-20"},{"key":"72","first-page":"1930","volume":"2","year":"2011","journal-title":"International Journal of Computer Applications in Technology"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-007-0045-1"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.10.010"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-016-0251-9"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksues.2016.04.002"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.063"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8830683.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8830683.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8830683.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T23:36:33Z","timestamp":1594856193000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8830683\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,15]]},"references-count":51,"alternative-id":["8830683","8830683"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8830683","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,15]]}}}