{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:18:55Z","timestamp":1770747535840,"version":"3.49.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/snams.2018.8554896","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:03:09Z","timestamp":1543885389000},"page":"264-271","source":"Crossref","is-referenced-by-count":9,"title":["The Canonical Model of Structure for Data Extraction in Systematic Reviews of Scientific Research Articles"],"prefix":"10.1109","author":[{"given":"Muhammad Bello","family":"Aliyu","sequence":"first","affiliation":[]},{"given":"Rahat","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Anne","family":"James","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","author":"verderbeck","year":"2009","journal-title":"Machine Learning Approach to Identifying Sections in Legal Briefs"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-015-0066-7"},{"key":"ref32","article-title":"Big Data analytics and Computational Intelligence for Cyber-Physical Systems: Recent trends and state of the art applications","author":"iqbal","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"ref31","article-title":"Extracting Formulaic and Free Text Clinical Research Articles Metadata using Conditional Random Fields","author":"lin","year":"2010","journal-title":"Proceedings of Second Louhi Workshop on Text and Data Mining of Health Documents Association for Computational Linguistics"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-10-56"},{"key":"ref37","article-title":"Princeton University","year":"2010","journal-title":"About WordNet\ufffd"},{"key":"ref36","author":"pollock","year":"2018","journal-title":"Tools for Extracting Data and Text from PDFs - A Review"},{"key":"ref35","author":"adobe acrobat","year":"2018","journal-title":"PDF Three Letters that Changed the World"},{"key":"ref34","first-page":"863","article-title":"V-ROOM: a virtual meeting system with intelligent structured summarisaton","volume":"10","author":"james","year":"2016","journal-title":"Information Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.04.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.21"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SBES.2011.9"},{"key":"ref13","article-title":"An Approach Based on Visual Text Mining to Support Categorization and Classification in the Systematic Mapping","author":"felizardo","year":"2010","journal-title":"EASE"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2011.0004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSA.2012.27"},{"key":"ref16","author":"sun","year":"2012","journal-title":"Towards Evidence-Based Ontology for Supporting Systematic Literature Review"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.19153\/cleiej.15.1.2"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/2745802.2745825","article-title":"SESRA: A Web-Based Automated Tool to Support the Systematic Literature Review Process","author":"molleri","year":"2015","journal-title":"Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2372233.2372243"},{"key":"ref4","author":"marshall","year":"2016","journal-title":"Tool Support for Systematic Reviews in Software Engineering"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2013.19.1.16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.10.009"},{"key":"ref27","first-page":"350","article-title":"Automated Extraction of Reported Statistical Analyses: Towards a Logical Representation of Clinical Trial Literature","author":"hsu","year":"2012","journal-title":"AMIA Annual Symposium Proceedings"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/2046-4053-4-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-015-0066-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1515\/jib-2013-222"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.62"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2008.10.016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317449"},{"key":"ref1","article-title":"Systematic Review Process for Software Engineering","author":"mian","year":"2005","journal-title":"ESELAW'05 2nd Experimental Software Engineering Latin American Workshop"},{"key":"ref9","first-page":"1051","article-title":"Performing Systematic Literature Reviews in Software Engineering","author":"budgen","year":"2004","journal-title":"Proceedings of the 28th International Conference on Software Engineering"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1186\/1471-2105-12-S2-S5","article-title":"Automatic Classification of Sentences to Support Evidence Based Medicine","author":"kim","year":"2011","journal-title":"BMC Bioinformatics"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2008.12.011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-10-29"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.02.006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.07.009"},{"key":"ref26","first-page":"1070","article-title":"Exploiting Classification Correlations for the Extraction of Evidence-Based Practice Information","author":"zhao","year":"2012","journal-title":"AMIA Annual Symposium Proceedings"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00354-007-0017-5"}],"event":{"name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Valencia","start":{"date-parts":[[2018,10,15]]},"end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536820\/8554420\/08554896.pdf?arnumber=8554896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:05:59Z","timestamp":1643249159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/snams.2018.8554896","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}