{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T18:50:55Z","timestamp":1744138255599},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T00:00:00Z","timestamp":1687564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T00:00:00Z","timestamp":1687564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11227-023-05472-0","type":"journal-article","created":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T13:00:21Z","timestamp":1687611621000},"page":"363-394","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP"],"prefix":"10.1007","volume":"80","author":[{"given":"Chih-Yung","family":"Chang","sequence":"first","affiliation":[]},{"given":"Syu-Jhih","family":"Jhang","sequence":"additional","affiliation":[]},{"given":"Shih-Jung","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Diptendu Sinha","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,24]]},"reference":[{"issue":"3","key":"5472_CR1","first-page":"503","volume":"11","author":"B Kabra","year":"2023","unstructured":"Kabra B, Nagar C (2023) Convolutional neural network based sentiment analysis with TF\u2013IDF based vectorization. J Integrated Sci Technol 11(3):503\u2013503","journal-title":"J Integrated Sci Technol"},{"issue":"1","key":"5472_CR2","doi-asserted-by":"publisher","first-page":"88","DOI":"10.22581\/muet1982.2301.09","volume":"42","author":"MA Abid","year":"2023","unstructured":"Abid MA, Mushtaq MF, Akram U, Abbasi MA, Rustam F (2023) Comparative analysis of TF\u2013IDF and loglikelihood method for keywords extraction of twitter data. Mehran Univ Res J Eng Technol 42(1):88\u201394","journal-title":"Mehran Univ Res J Eng Technol"},{"key":"5472_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.datak.2022.102110","volume":"144","author":"A Sharma","year":"2023","unstructured":"Sharma A, Kumar S (2023) Ontology-based semantic retrieval of documents using Word2Vec model. Data Knowl Eng 144:1\u201318","journal-title":"Data Knowl Eng"},{"key":"5472_CR4","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-031-27915-7_43","volume":"160","author":"M Jaca-Madariaga","year":"2023","unstructured":"Jaca-Madariaga M, Zarrabeitia-Bilbao E, Rio-Belver RM, Moens MF (2023) Sentiment analysis model using Word2Vec, Bi-LSTM and attention mechanism. IoT Data Sci Eng Manage 160:239\u2013244","journal-title":"IoT Data Sci Eng Manage"},{"key":"5472_CR5","first-page":"677","volume":"2","author":"SK Zim","year":"2023","unstructured":"Zim SK, Ashraf F, Iqbal T, Islam MA, Polok IK, Ahmed L, Mukta MSH (2023) Exploring Word2Vec embedding for sentiment analysis of Bangla raw and romanized text. Proc Int Conf Data Sci Appl 2:677\u2013691","journal-title":"Proc Int Conf Data Sci Appl"},{"key":"5472_CR6","doi-asserted-by":"crossref","unstructured":"Aoumeur NE, Li Z, EM Alshari (2023) Improving the polarity of text through word2vec embedding for primary classical arabic sentiment analysis. Neural processing letters, pp 1\u201316","DOI":"10.1007\/s11063-022-11111-1"},{"key":"5472_CR7","doi-asserted-by":"crossref","unstructured":"Suleiman D, Awajan A, Al-Madi N (2017) Deep learning based technique for plagiarism detection in Arabic texts. In: International Conference on New Trends in Computing Sciences (ICTCS), pp 216\u2013222","DOI":"10.1109\/ICTCS.2017.42"},{"key":"5472_CR8","doi-asserted-by":"crossref","unstructured":"Luo Q, Xu W (2014) A study on the CBOW model's overfitting and stability. Association for Computing Machinery, pp 9\u201312","DOI":"10.1145\/2663792.2663793"},{"key":"5472_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1742-6596\/2258\/1\/012007","volume":"2258","author":"T Shi","year":"2022","unstructured":"Shi T, Li X, Liu Z, Wang L (2022) Research on Bi-LSTM machine reading comprehension algorithm based on attention mechanism. J Phys Conf Ser 2258:1\u20138","journal-title":"J Phys Conf Ser"},{"key":"5472_CR10","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1016\/j.psep.2021.12.038","volume":"158","author":"S Jing","year":"2022","unstructured":"Jing S, Liu X, Gong X, Tang Y, Xiong G (2022) Correlation analysis and text classification of chemical accident cases based on word embedding. Process Saf Environ Prot 158:698\u2013710","journal-title":"Process Saf Environ Prot"},{"key":"5472_CR11","doi-asserted-by":"crossref","unstructured":"Styawati S, Nurkholis A, Aldino A, Samsugi S, Suryati E, Cahyono RP (2022) Sentiment analysis on online transportation reviews using Word2Vec text embedding model feature extraction and support vector machine (SVM) algorithm. International Seminar on Machine Learning, Optimization, and Data Science (ISMODE), pp 163\u2013167","DOI":"10.1109\/ISMODE53584.2022.9742906"},{"issue":"1","key":"5472_CR12","first-page":"1","volume":"4","author":"F Rahutomo","year":"2012","unstructured":"Rahutomo F, Kitasuka T, Aritsugi M (2012) Semantic cosine similarity. Int Stud Conf Adv Sci Technol ICAST 4(1):1","journal-title":"Int Stud Conf Adv Sci Technol ICAST"},{"key":"5472_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ins.2015.02.024","volume":"307","author":"P Xia","year":"2015","unstructured":"Xia P, Zhang L, Li F (2015) Learning similarity with cosine similarity ensemble. Inf Sci 307:39\u201352","journal-title":"Inf Sci"},{"key":"5472_CR14","doi-asserted-by":"crossref","unstructured":"Bohra A, Barwar N (2022) A deep learning approach for plagiarism detection system using BERT. In: Congress on Intelligent Systems, pp. 163\u2013174","DOI":"10.1007\/978-981-16-9113-3_13"},{"key":"5472_CR15","doi-asserted-by":"crossref","unstructured":"Xia C, He T, Li W, Qin Z, Zou Z (2019) Similarity analysis of law documents based on Word2Vec. In: International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp 354\u2013357","DOI":"10.1109\/QRS-C.2019.00072"},{"issue":"2\u20133","key":"5472_CR16","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1080\/00437956.1954.11659520","volume":"10","author":"ZS Harris","year":"1954","unstructured":"Harris ZS (1954) Distributional structure. Word 10(2\u20133):146\u2013162","journal-title":"Word"},{"issue":"1","key":"5472_CR17","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s13042-010-0001-0","volume":"1","author":"Y Zhang","year":"2010","unstructured":"Zhang Y, Jin R, Zhou Z-H (2010) Understanding bag-of-words model: a statistical framework. Int J Mach Learn Cybern 1(1):43\u201352","journal-title":"Int J Mach Learn Cybern"},{"key":"5472_CR18","doi-asserted-by":"crossref","unstructured":"Rosu R, Stoica AS, Popescu PS, Mih\u0103escu MC (2021) NLP based deep learning approach for plagiarism detection. In: RoCHI-International Conference on Human-Computer Interaction, Romania, pp 48\u201360","DOI":"10.37789\/ijusi.2020.13.1.4"},{"key":"5472_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2022.116677","volume":"197","author":"K Yalcin","year":"2022","unstructured":"Yalcin K, Cicekli I, Ercan G (2022) An external plagiarism detection system based on part-of-speech (POS) tag N-grams and word embedding. Expert Syst Appl 197:1\u201316","journal-title":"Expert Syst Appl"},{"issue":"3","key":"5472_CR20","doi-asserted-by":"publisher","first-page":"177","DOI":"10.36548\/jaicn.2020.3.005","volume":"2","author":"N Awale","year":"2020","unstructured":"Awale N, Pandey M, Dulal A, Timsina B (2020) Plagiarism detection in programming assignments using machine learning. J Artif Intell Capsul Netw 2(3):177\u2013184","journal-title":"J Artif Intell Capsul Netw"},{"key":"5472_CR21","doi-asserted-by":"crossref","unstructured":"Ramadhanti NR, Mariyah S (2019) Document similarity detection using indonesian language Word2Vec model. In: International Conference on Informatics and Computational Sciences (ICICoS), pp 1\u20136","DOI":"10.1109\/ICICoS48119.2019.8982432"},{"key":"5472_CR22","doi-asserted-by":"crossref","unstructured":"Qurashi AW, Holmes V, Johnson AP (2020) Document processing: methods for semantic text similarity analysis. In: International Conference on INnovations in Intelligent SysTems and Applications (INISTA), pp 1\u20136","DOI":"10.1109\/INISTA49547.2020.9194665"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05472-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05472-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05472-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T11:23:52Z","timestamp":1704713032000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05472-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,24]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5472"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05472-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,24]]},"assertion":[{"value":"1 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All participating authors have been informed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"This study does not involve either\u00a0human\u00a0subjects or animals.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}