{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:16:59Z","timestamp":1777130219323,"version":"3.51.4"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/icset59111.2023.10295108","type":"proceedings-article","created":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:52:58Z","timestamp":1698691978000},"page":"40-45","source":"Crossref","is-referenced-by-count":29,"title":["A Comparative Study on Embedding Models for Keyword Extraction Using KeyBERT Method"],"prefix":"10.1109","author":[{"given":"Bayan","family":"Issa","sequence":"first","affiliation":[{"name":"University of Aleppo,Faculty of Informatics Engineering,Syria"}]},{"given":"Muhammed Basheer","family":"Jasser","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Hui Na","family":"Chua","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Muzaffar","family":"Hamzah","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Sabah, Kota Kinabalu,Faculty of Computing and Informatics,Sabah,Malaysia,88450"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258552"},{"key":"ref2","article-title":"KeyXtract Twitter model \u2013 An essential keywords extraction model for Twitter designed using NLP tools","author":"Weerasooriya","year":"2017","journal-title":"ArXiv170802912 Cs"},{"key":"ref3","first-page":"2077","article-title":"Bayesian text segmentation for index term identification and keyphrase extraction","author":"Newman","year":"2012","journal-title":"In COLING 2012"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.052"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.10.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2980258.2980442"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9780470689646.ch1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.013"},{"key":"ref9","first-page":"404","article-title":"Textrank: Bringing order into text","volume-title":"In the 2004 conference on empirical methods in natural language processing","author":"Mihalcea"},{"key":"ref10","first-page":"543","article-title":"TopicRank: Graph-based topic ranking for keyphrase extraction","volume-title":"In International joint conference on natural language processing (IJCNLP)","author":"Bougouin"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1102"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965087"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-2100"},{"key":"ref14","article-title":"Keybert: Minimal keyword extraction with bert","author":"Grootendorst","year":"2020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5391\/IJFIS.2015.15.3.153"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/d16-1080"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79150-6_50"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.967"},{"key":"ref19","first-page":"35","article-title":"Exploring linguistically-lightweight keyword extraction techniques for indexing news articles in a multilingual set-up","volume-title":"In the EACL Hackashop on News Media Content Analysis and Automated Report Generation","author":"Piskorski","year":"2021"},{"key":"ref20","article-title":"Keyword Extraction\u2014A Benchmark of 7 Algorithms in Python I compared 7 relevant algorithms in a keyword extraction task on a corpus of 2000 documents","author":"D\u2019Agostino","year":"2023"},{"key":"ref21","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv preprint arXiv:1810.04805"},{"key":"ref22","article-title":"Longformer: The long-document transformer","author":"Beltagy","year":"2020","journal-title":"arXiv preprint arXiv:2004.05150"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"}],"event":{"name":"2023 IEEE 13th International Conference on System Engineering and Technology (ICSET)","location":"Shah Alam, Malaysia","start":{"date-parts":[[2023,10,2]]},"end":{"date-parts":[[2023,10,2]]}},"container-title":["2023 IEEE 13th International Conference on System Engineering and Technology (ICSET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10294331\/10295068\/10295108.pdf?arnumber=10295108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T10:51:27Z","timestamp":1709376687000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10295108\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icset59111.2023.10295108","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}