{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:38:27Z","timestamp":1764333507372,"version":"3.33.0"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,18]]},"DOI":"10.1109\/ic3i61595.2024.10829078","type":"proceedings-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T19:34:30Z","timestamp":1736969670000},"page":"998-1001","source":"Crossref","is-referenced-by-count":1,"title":["Applying Keyword Extraction Techniques on Customer\u2019s Feedback of a Software Product to Accelerate Agile Based Development"],"prefix":"10.1109","author":[{"given":"Nidhi","family":"Bhatia","sequence":"first","affiliation":[{"name":"SRM Institute of Science &#x0026; Technology Delhi NCR Campus,Department of Computer Science and Engineering,Ghaziabad,UttarPradesh,India"}]},{"given":"Jitendra","family":"Singh","sequence":"additional","affiliation":[{"name":"SRM Institute of Science &#x0026; Technology Delhi NCR Campus,Department of Computer Science and Engineering,Ghaziabad,UttarPradesh,India"}]},{"family":"Vandana","sequence":"additional","affiliation":[{"name":"Chaudhary Charan Singh University,SCRIET,Department of Computer Application,Meerut,UttarPradesh,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"7228","DOI":"10.3390\/app13127228","article-title":"Unlocking the Potential of Keyword Extraction: The Need for Access to High-Quality Datasets","volume":"13","author":"Amur","year":"2023","journal-title":"Appl. Sci"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC.2019.8819630"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76941-7_63"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.32473\/flairs.36.133280","article-title":"Unsupervised Keyword Extraction for Hashtag Recommendation in Social Media","author":"Jafari","year":"2023"},{"article-title":"Keyword extraction: A review of methods and approaches","year":"2014","author":"Beliga","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.56726\/irjmets35029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.59670\/jns.v34i.1741"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76941-7_63"},{"article-title":"KeyBERT: Minimal Keyword Extraction withBERT","year":"2020","author":"Grootendorst","key":"ref9"}],"event":{"name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2024,9,18]]},"location":"Greater Noida, India","end":{"date-parts":[[2024,9,20]]}},"container-title":["2024 7th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10828566\/10827843\/10829078.pdf?arnumber=10829078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T06:05:49Z","timestamp":1737007549000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10829078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,18]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/ic3i61595.2024.10829078","relation":{},"subject":[],"published":{"date-parts":[[2024,9,18]]}}}