an integrated OO (Object Orientated) data store and can be applied to either a one
main or whole company project. In this method, each requirement is known as a ‘Re-
quirement Object’ hence the Object Orientated perspective. It provides good visuali-
sation of such documents as hierarchies, and its extension language enables a wide
range of supporting tools to be built, and many are provided as menu commands and
examples.
Figure 3. illustrates how, using the DOORS specification framework, we have
adapted it to suit the stakeholders needs when asking them to enter their require-
ments. The stakeholder ID and agent ID are assigned by the project team whereas the
requirement ID is assigned by the agent and is created by combing various parts of
the stakeholder ID and Agent ID into a unique requirements reference.
Throughout the process of entering each requirement, the agent will be able to
monitor each word to check for spelling errors and also be able to detect ‘keywords’
for example, if the stakeholder entered ‘The system must be able to operate 24 hours
a day’ The agent might ask the stakeholder to define the word ‘operate’. All identified
keywords will then be saved in an online glossary which the project team can access
and check for ambiguities between stakeholders, e.g. if ‘operate’ is a culturally de-
pendant word and different stakeholders interpret the word in a different way.
Once all requirements have been entered, spelling checked and keywords high-
lighted. The stakeholder is then asked to prioritise their requirements – 1 being the
most important, 2 the next important and so on, until they all have a priority associ-
ated with them. When all requirements have been entered, the agents will therefore
enter the negotiation process without any assistance from the project team.
An email does not fall neatly into the domain of text classification. There is much
extraneous information that is redundant when classifying the ‘type’ of email it is
(e.g. needed or spam mail) All the methods serve to simplify the problem and reduce
the amount of noise inherent in the problem Applying these methods to each email
message transforms the message into an acceptable input document to a text classi-
fier. Each message can then be viewed as a collection of words which can then be
examined for frequency of occurrence.
The classification problem can be simplified by removing the common pronouns,
verbs and adverbs such as “the”, “it”, “here”. These words can be put into a list called
a ‘stoplist’ and filtered out when trying to classify emails. Since a majority of these
words appear in almost all documents, they can be ignored without losing any infor-
mation. A stoplist will be implemented in the agents in order to reduce the ‘noise’ and
allow focus to be on the less frequent text.
The Porter Stemming Algorithm was developed by Martin Porter in 1980 and is
another methods for refining the text even further. It has been very widely imple-
mented and coded in various programming languages since its publication with re-
search still being conducted into making the algorithm more efficient [18]. ‘Stem-
ming’ has the purpose of treating words the same root as being equivalent. For exam-
ple, see, seen, sees and saw would all be transformed into their root ‘see’, thus elimi-
nating the irrelevant differences between ‘saw’ and ‘seen’.
By using both methods and comparing the similarity of the text left behind it
should be easy for the agents to judge whether the two requirements are the same or
different. If the agents decide they are the same requirement, the agent with the low-
est ranking stakeholder will ‘freeze’ that requirement and not use in the negotiation
process. This means that the requirement will still be prioritised, but no more than
once.
20