{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T05:57:56Z","timestamp":1769320676412,"version":"3.49.0"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"European University of Atlantic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3354955","type":"journal-article","created":{"date-parts":[[2024,1,16]],"date-time":"2024-01-16T18:24:24Z","timestamp":1705429464000},"page":"15651-15661","source":"Crossref","is-referenced-by-count":5,"title":["Detecting Pragmatic Ambiguity in Requirement Specification Using Novel Concept Maximum Matching Approach Based on Graph Network"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8808-5317","authenticated-orcid":false,"given":"Khadija","family":"Aslam","sequence":"first","affiliation":[{"name":"Strategic Systems International, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5536-8764","authenticated-orcid":false,"given":"Faiza","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering and Technology (UET), Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6446-4945","authenticated-orcid":false,"given":"Ayesha","family":"Altaf","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering and Technology (UET), Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3874-2088","authenticated-orcid":false,"given":"Naveed","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, University of Central Punjab, Lahore, Pakistan"}]},{"given":"M\u00f3nica Gracia","family":"Villar","sequence":"additional","affiliation":[{"name":"Universidad Europea del Atl&#x00E1;ntico, Santander, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8747-5679","authenticated-orcid":false,"given":"Emmanuel Soriano","family":"Flores","sequence":"additional","affiliation":[{"name":"Universidad Europea del Atl&#x00E1;ntico, Santander, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3134-7720","authenticated-orcid":false,"given":"Isabel","family":"De La Torre D\u00edez","sequence":"additional","affiliation":[{"name":"Department of Signal Theory, Communications and Telematics Engineering, Unviersity of Valladolid, Valladolid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8271-6496","authenticated-orcid":false,"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/AIRE.2014.6894849"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345803"},{"issue":"2","key":"ref3","first-page":"40","article-title":"A systematic study on requirement engineering processes and practices in Mauritius","volume":"5","author":"Huzooree","year":"2015","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref4","first-page":"318","article-title":"A comparative study of formal and informal specifications through an industrial case study","volume-title":"Proc. IEEE\/IFIP Workshop Formal Specification Comput. Syst. (FSCBS)","author":"Satpathy"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-003-0179-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2815021.2815032"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912250"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EmpiRE.2015.7431303"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14192-8_20"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2017.20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3299818"},{"issue":"12","key":"ref12","doi-asserted-by":"crossref","first-page":"2662","DOI":"10.3390\/electronics12122662","article-title":"Policy-based spam detection of tweets dataset","volume":"12","author":"Dar","year":"2023","journal-title":"Electronics"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.1016\/j.procs.2022.09.205","article-title":"A method of ambiguity detection in requirement specifications by using a knowledge dictionary","volume":"207","author":"Kato","year":"2022","journal-title":"Proc. Comput. Sci."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457127"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1122-4_25"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00133"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2019.00048"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1447"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-021-00291-0"},{"key":"ref20","article-title":"Identifying the requirement conflicts in SRS documents using transformer-based sentence embeddings","author":"Malik","year":"2022","journal-title":"arXiv:2206.13690"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v10i1.21996"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510157"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.05.001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00067"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2022.2098189"},{"issue":"3","key":"ref26","first-page":"249","article-title":"A critical study of pragmatic ambiguity detection in natural language requirements","volume":"11","author":"Satpute","year":"2023","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807478"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1963564.1963605"},{"issue":"8","key":"ref29","first-page":"2275","article-title":"An approach for detecting syntax and syntactic ambiguity in software requirement specification","volume":"96","author":"Sabriye","year":"2018","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8080002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WIIAT.2008.118"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOMAN.2019.8714682"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/s23208642"},{"issue":"12","key":"ref34","doi-asserted-by":"crossref","first-page":"7297","DOI":"10.3390\/app13127297","article-title":"ADAL-NN: Anomaly detection and localization using deep relational learning in distributed systems","volume":"13","author":"Ahmed","year":"2023","journal-title":"Appl. Sci."},{"issue":"11","key":"ref35","doi-asserted-by":"crossref","first-page":"5263","DOI":"10.3390\/s23115263","article-title":"Blockchain-modeled Edge-Computing-Based smart home monitoring system with energy usage prediction","volume":"23","author":"Iqbal","year":"2023","journal-title":"Sensors"},{"issue":"12","key":"ref36","doi-asserted-by":"crossref","first-page":"5379","DOI":"10.3390\/s23125379","article-title":"Resilience optimization of post-quantum cryptography key encapsulation algorithms","volume":"23","author":"Farooq","year":"2023","journal-title":"Sensors"},{"issue":"12","key":"ref37","doi-asserted-by":"crossref","first-page":"5388","DOI":"10.3390\/s23125388","article-title":"DrunkChain: Blockchain-based IoT system for preventing drunk driving-related traffic accidents","volume":"23","author":"Farooq","year":"2023","journal-title":"Sensors"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1177\/08944393221110148"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3278293.3278304"},{"issue":"2","key":"ref40","first-page":"52","article-title":"A tool to detect pragmatic ambiguity with possible interpretations suggestion in software requirement specifications","volume":"3","author":"Mohamed","year":"2022","journal-title":"Int. J. Synergy Eng. Technol."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/AIRE.2018.00011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-016-0249-3"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10401171.pdf?arnumber=10401171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T03:51:38Z","timestamp":1743220298000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10401171\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3354955","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}