{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:29:00Z","timestamp":1773840540046,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T00:00:00Z","timestamp":1739923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T00:00:00Z","timestamp":1739923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Prog Artif Intell"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s13748-025-00365-0","type":"journal-article","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:57:49Z","timestamp":1739995069000},"page":"275-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Optimizing text classification accuracy: a hybrid strategy incorporating enhanced NSGA-II and XGBoost techniques for feature selection"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0977-0602","authenticated-orcid":false,"given":"Mohamed Atef","family":"Mosa","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,19]]},"reference":[{"issue":"5","key":"365_CR1","first-page":"476","volume":"19","author":"S Aalaei","year":"2016","unstructured":"Aalaei, S., Shahraki, H., Rowhanimanesh, A., Eslami, S.: Feature selection using genetic algorithm for breast cancer diagnosis: experiment on three different datasets. Iran. J. Basic Med. Sci. 19(5), 476 (2016)","journal-title":"Iran. J. Basic Med. Sci."},{"issue":"3","key":"365_CR2","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1007\/s12065-023-00822-6","volume":"17","author":"B Alhijawi","year":"2024","unstructured":"Alhijawi, B., Awajan, A.: Genetic algorithms: theory, genetic operators, solutions, and applications. Evol. Intell. 17(3), 1245\u20131256 (2024)","journal-title":"Evol. Intell."},{"issue":"2","key":"365_CR3","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.jksuci.2014.04.001","volume":"27","author":"MN Al-Kabi","year":"2015","unstructured":"Al-Kabi, M.N., Kazakzeh, S.A., Ata, B.M.A., Al-Rababah, S.A., Alsmadi, I.M.: A novel root based Arabic stemmer. J. King Saud Univ. Comput. Inf. Sci. 27(2), 94\u2013103 (2015)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"365_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2020.100079","volume":"18","author":"Z Alom","year":"2020","unstructured":"Alom, Z., Carminati, B., Ferrari, E.: A deep learning model for Twitter spam detection. Online Soc. Netw. Media 18, 100079 (2020)","journal-title":"Online Soc. Netw. Media"},{"issue":"2","key":"365_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3545113","volume":"22","author":"MA Alzubaidi","year":"2023","unstructured":"Alzubaidi, M.A., Otoom, M., Abu Rwaq, A.M.: A novel assistive glove to convert arabic sign language into speech. ACM Trans. Asian Low-Resour. Lang. Inf. Process. 22(2), 1\u201316 (2023)","journal-title":"ACM Trans. Asian Low-Resour. Lang. Inf. Process."},{"issue":"4","key":"365_CR6","first-page":"899","volume":"5","author":"OH Babatunde","year":"2014","unstructured":"Babatunde, O.H., Armstrong, L., Leng, J., Diepeveen, D.: A genetic algorithm-based\nfeature selection. Int. J. Electron. Commu. Comput. Eng. 5(4), 899\u2013905\n (2014)","journal-title":"Int. J. Electron. Commu. Comput. Eng"},{"key":"365_CR7","doi-asserted-by":"crossref","unstructured":"Benitez, I.P., Sison, A.M., Medina, R.P.: An improved genetic algorithm for feature selection in the classification of disaster-related Twitter messages. In:\u00a02018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), pp. 238\u2013243. IEEE (2018)\u200f","DOI":"10.1109\/ISCAIE.2018.8405477"},{"key":"365_CR8","doi-asserted-by":"crossref","unstructured":"Borse, D., Borse, S.: State of the art on Twitter spam detection. In:\u00a0International Conference on Computing in Engineering & Technology, pp. 486\u2013496. Singapore: Springer (2022)","DOI":"10.1007\/978-981-19-2719-5_46"},{"key":"365_CR9","doi-asserted-by":"crossref","unstructured":"Cabrera-Diego, L.A., Torres-Moreno, J.M., Durette, B.: Evaluating multiple summaries without human models: a first experiment with a trivergent model. In: Natural Language Processing and Information Systems: 21st International Conference on Applications of Natural Language to Information Systems, NLDB 2016, Salford, UK, June 22\u201324, 2016, Proceedings 21, pp. 91\u2013101. Springer (2016)","DOI":"10.1007\/978-3-319-41754-7_8"},{"key":"365_CR10","doi-asserted-by":"crossref","unstructured":"Chen, T., & Guestrin, C.: Xgboost: a scalable tree boosting system. In:\u00a0Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"365_CR11","first-page":"41956","volume":"36","author":"V Cherepanova","year":"2024","unstructured":"Cherepanova, V., Levin, R., Somepalli, G., Geiping, J., Bruss, C.B., Wilson, A.G., ... Goldblum, M.: A performance-driven benchmark for feature selection in tabular deep learning.\u00a0Adv. Neural Inf. Process. Syst. 36, 41956\u201341979 (2024)","journal-title":"Adv. Neural Inf. Process. Syst"},{"issue":"1","key":"365_CR12","first-page":"18","volume":"6","author":"K Chowdhury","year":"2020","unstructured":"Chowdhury, K.: Spam identification on Facebook, Twitter and Email using machine learning.\u00a0CERES.\u00a06(1), 18\u201326 (2020)","journal-title":"CERES"},{"issue":"2","key":"365_CR13","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.A.M.T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"20","key":"365_CR14","doi-asserted-by":"publisher","first-page":"58029","DOI":"10.1007\/s11042-023-17167-y","volume":"83","author":"AF Gad","year":"2024","unstructured":"Gad, A.F.: Pygad: an intuitive genetic algorithm python library. Multimed. Tools Appl. 83(20), 58029\u201358042 (2024)","journal-title":"Multimed. Tools Appl."},{"key":"365_CR15","doi-asserted-by":"publisher","first-page":"98475","DOI":"10.1109\/ACCESS.2022.3204593","volume":"10","author":"SA Ghaleb","year":"2022","unstructured":"Ghaleb, S.A., Mohamad, M., Ghanem, W.A.H., Nasser, A.B., Ghetas, M., Abdullahi, A.M., Saleh, S.A.M., Arshad, H., Omolara, A.E., Abiodun, O.I.: Feature selection by multiobjective optimization: application to spam detection system by neural networks and grasshopper optimization algorithm. IEEE Access 10, 98475\u201398489 (2022)","journal-title":"IEEE Access"},{"key":"365_CR16","doi-asserted-by":"publisher","first-page":"84365","DOI":"10.1109\/ACCESS.2022.3196905","volume":"10","author":"N Ghatasheh","year":"2022","unstructured":"Ghatasheh, N., Altaharwa, I., Aldebei, K.: Modified genetic algorithm for feature selection and hyper parameter optimization: case of XGBoost in spam prediction. IEEE Access 10, 84365\u201384383 (2022)","journal-title":"IEEE Access"},{"key":"365_CR17","first-page":"2093","volume-title":"Tabu Search","author":"F Glover","year":"1998","unstructured":"Glover, F., Laguna, M.: Tabu Search, pp. 2093\u20132229. Springer, Berlin (1998)"},{"key":"365_CR18","doi-asserted-by":"crossref","unstructured":"Hadi, M.T., Baawi, S.S.: Email spam detection by machine learning approaches: a review. In:\u00a0International Conference on Forthcoming Networks and Sustainability in the AIoT Era, pp. 186\u2013204. Cham: Springer (2024)","DOI":"10.1007\/978-3-031-62871-9_15"},{"issue":"8","key":"365_CR19","first-page":"910","volume":"16","author":"F Hadizadeh","year":"2013","unstructured":"Hadizadeh, F., Vahdani, S., Jafarpour, M.: Quantitative structure\u2013activity relationship studies of 4-imidazolyl-1, 4-dihydropyridines as calcium channel blockers. Iran. J. Basic Med. Sci. 16(8), 910 (2013)","journal-title":"Iran. J. Basic Med. Sci."},{"key":"365_CR20","doi-asserted-by":"publisher","first-page":"14637","DOI":"10.1109\/ACCESS.2019.2892852","volume":"7","author":"F Iqbal","year":"2019","unstructured":"Iqbal, F., Hashmi, M.J., Fung, B.C.M, Batool, R., Khattak, A.M., Aleem, S., Hung, P.C.K.: A hybrid framework for sentiment analysis using genetic algorithm based feature reduction. IEEE Access 7, 14637\u201314652 (2019)","journal-title":"IEEE Access"},{"key":"365_CR21","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.830","volume":"8","author":"S Kaddoura","year":"2022","unstructured":"Kaddoura, S., Chandrasekaran, G., Popescu, D.E., Duraisamy, J.H.: A systematic literature review on spam content detection and classification. PeerJ Comput. Sci. 8, e830 (2022)","journal-title":"PeerJ Comput. Sci."},{"key":"365_CR22","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.imu.2018.12.001","volume":"14","author":"KR Kruthika","year":"2019","unstructured":"Kruthika, K.R., Maheshappa, H.D., Alzheimer\u2019s Disease Neuroimaging Initiative: CBIR system using capsule networks and 3D CNN for Alzheimer\u2019s disease diagnosis. Inform. Med. Unlock. 14, 59\u201368 (2019)","journal-title":"Inform. Med. Unlock."},{"key":"365_CR23","doi-asserted-by":"publisher","first-page":"80253","DOI":"10.1109\/ACCESS.2021.3081479","volume":"9","author":"X Liu","year":"2021","unstructured":"Liu, X., Lu, H., Nayak, A.: A spam transformer model for SMS spam detection. IEEE Access 9, 80253\u201380263 (2021)","journal-title":"IEEE Access"},{"issue":"1","key":"365_CR24","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TIT.1963.1057810","volume":"9","author":"T Marill","year":"1963","unstructured":"Marill, T., Green, D.: On the effectiveness of receptors in recognition systems. IEEE Trans. Inf. Theory 9(1), 11\u201317 (1963)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"365_CR25","doi-asserted-by":"crossref","unstructured":"Markines, B., Cattuto, C., Menczer, F.: Social spam detection. In:\u00a0Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, pp. 41\u201348 (2009)","DOI":"10.1145\/1531914.1531924"},{"key":"365_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106189","volume":"90","author":"MA Mosa","year":"2020","unstructured":"Mosa, M.A.: A novel hybrid particle swarm optimization and gravitational search algorithm for multi-objective optimization of text mining. Appl. Soft Comput. 90, 106189 (2020)","journal-title":"Appl. Soft Comput."},{"key":"365_CR27","doi-asserted-by":"publisher","unstructured":"Mosa, M.A.: Data text mining based on swarm intelligence techniques: review of text summarization systems. Trends Appl. Text Summarization Tech. 88\u2013124 (2020). https:\/\/doi.org\/10.4018\/978-1-5225-9373-7.ch004","DOI":"10.4018\/978-1-5225-9373-7.ch004"},{"key":"365_CR28","first-page":"174","volume":"4","author":"MA Mosa","year":"2021","unstructured":"Mosa, M.A.: A prioritized satellite task scheduling model based on the fewer observation opportunities. Islamic Univ. J. Appl. Sci. (JESC) 4, 174\u2013194 (2021)","journal-title":"Islamic Univ. J. Appl. Sci. (JESC)"},{"issue":"12","key":"365_CR29","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1080\/08839514.2021.1966883","volume":"35","author":"MA Mosa","year":"2021","unstructured":"Mosa, M.A.: Predicting semantic categories in text based on knowledge graph combined with machine learning techniques. Appl. Artif. Intell. 35(12), 933\u2013951 (2021)","journal-title":"Appl. Artif. Intell."},{"issue":"7","key":"365_CR30","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1080\/0952813X.2022.2125588","volume":"36","author":"MA Mosa","year":"2022","unstructured":"Mosa, M.A.: Feature selection based on ACO and knowledge graph for Arabic text classification.\u00a0J. Exp. Theor. Artif. Intell. 36(7), 1155\u20131172 (2022). https:\/\/doi.org\/10.1080\/0952813X.2022.2125588","journal-title":"J. Exp. Theor. Artif. Intell"},{"issue":"7","key":"365_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3588315","volume":"22","author":"MA Mosa","year":"2023","unstructured":"Mosa, M.A.: An exhaustive literature review of hadith text mining. ACM Trans. Asian Low-Resour. Lang. Inf. Process. 22(7), 1\u201316 (2023)","journal-title":"ACM Trans. Asian Low-Resour. Lang. Inf. Process."},{"key":"365_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117193","volume":"201","author":"A Occhipinti","year":"2022","unstructured":"Occhipinti, A., Rogers, L., Angione, C.: A pipeline and comparative study of 12 machine learning models for text classification. Expert Syst. Appl. 201, 117193 (2022)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"365_CR33","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1007\/s12652-021-03385-5","volume":"4","author":"P Pirozmand","year":"2023","unstructured":"Pirozmand, P., Sadeghilalimi, M., Hosseinabadi, A.A.R., Sadeghilalimi, F., Mirkamali, S., Slowik, A.: A feature selection approach for spam detection in social networks using gravitational force-based heuristic algorithm.\u00a0J. Ambient Intell. Human. Comput. 14(1), 1633\u20131646 (2023)","journal-title":"J. Ambient Intell. Human. Comput"},{"key":"365_CR34","doi-asserted-by":"publisher","first-page":"143485","DOI":"10.1109\/ACCESS.2024.3399264","volume":"12","author":"A Qazi","year":"2024","unstructured":"Qazi, A., Hasan, N., Mao, R., Abo, M.E.M., Dey, S.K., Hardaker, G.: Machine learning-based opinion spam detection: a systematic literature review.\u00a0IEEE Access 12, 143485\u2013143499 (2024)","journal-title":"IEEE Access"},{"issue":"3","key":"365_CR35","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/s41315-021-00217-9","volume":"6","author":"KV Samarthrao","year":"2022","unstructured":"Samarthrao, K.V., Rohokale, V.M.: A hybrid meta-heuristic-based multi-objective feature selection with adaptive capsule network for automated email spam detection. Int. J. Intell. Robot. Appl. 6(3), 497\u2013521 (2022)","journal-title":"Int. J. Intell. Robot. Appl."},{"issue":"5","key":"365_CR36","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s42979-023-02126-z","volume":"4","author":"P Swetha","year":"2023","unstructured":"Swetha, P., Rao, D.S.: Effective feature selection-based meta-heuristics optimization approach for spam detection. SN Comput. Sci. 4(5), 681 (2023)","journal-title":"SN Comput. Sci."},{"issue":"3","key":"365_CR37","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1007\/s10115-023-02010-5","volume":"66","author":"D Theng","year":"2024","unstructured":"Theng, D., Bhoyar, K.K.: Feature selection techniques for machine learning: a survey of more than two decades of research. Knowl. Inf. Syst. 66(3), 1575\u20131637 (2024)","journal-title":"Knowl. Inf. Syst."},{"key":"365_CR38","doi-asserted-by":"publisher","first-page":"143627","DOI":"10.1109\/ACCESS.2024.3467996","volume":"12","author":"EH Tusher","year":"2024","unstructured":"Tusher, E.H., Ismail, M.A., Rahman, M.A., Alenezi, A.H., Uddin, M.: Email spam: a comprehensive review of optimize detection methods, challenges, and open research problems.\u00a0IEEE Access\u200f 12, 143627\u2013143657 (2024)","journal-title":"IEEE Access"},{"issue":"9","key":"365_CR39","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1109\/T-C.1971.223410","volume":"100","author":"AW Whitney","year":"1971","unstructured":"Whitney, A.W.: A direct method of nonparametric measurement selection. IEEE Trans. Comput. 100(9), 1100\u20131103 (1971)","journal-title":"IEEE Trans. Comput."},{"issue":"8","key":"365_CR40","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1109\/TPAMI.2016.2537340","volume":"38","author":"D Wu","year":"2016","unstructured":"Wu, D., Pigou, L., Kindermans, P.J., Le, N.D.H., Shao, L., Dambre, J., Odobez, J.M.: Deep dynamic neural networks for multimodal gesture segmentation and recognition. IEEE Trans. Pattern Anal. Mach. Intell. 38(8), 1583\u20131597 (2016)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"10","key":"365_CR41","doi-asserted-by":"publisher","first-page":"2357","DOI":"10.1109\/TNNLS.2014.2382123","volume":"26","author":"J Wu","year":"2015","unstructured":"Wu, J., Yang, H.: Linear regression-based efficient SVM learning for large-scale classification. IEEE Trans. Neural Netw. Learn. Syst. 26(10), 2357\u20132369 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"365_CR42","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.cose.2017.11.013","volume":"76","author":"T Wu","year":"2018","unstructured":"Wu, T., Wen, S., Xiang, Y., Zhou, W.: Twitter spam detection: survey of new approaches and comparative study. Comput. Secur. 76, 265\u2013284 (2018)","journal-title":"Comput. Secur."},{"key":"365_CR43","doi-asserted-by":"publisher","first-page":"159081","DOI":"10.1109\/ACCESS.2019.2949741","volume":"7","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Jolfaei, A., Alazab, M.: A face emotion recognition method using convolutional neural network and image edge computing. IEEE Access 7, 159081\u2013159089 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"365_CR44","doi-asserted-by":"publisher","first-page":"1774","DOI":"10.1109\/TNNLS.2017.2673241","volume":"29","author":"S Zhang","year":"2017","unstructured":"Zhang, S., Li, X., Zong, M., Zhu, X., Wang, R.: Efficient kNN classification with different numbers of nearest neighbors. IEEE Trans. Neural Netw. Learn. Syst. 29(5), 1774\u20131785 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."}],"container-title":["Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13748-025-00365-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13748-025-00365-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13748-025-00365-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:32:12Z","timestamp":1748521932000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13748-025-00365-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,19]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["365"],"URL":"https:\/\/doi.org\/10.1007\/s13748-025-00365-0","relation":{},"ISSN":["2192-6352","2192-6360"],"issn-type":[{"value":"2192-6352","type":"print"},{"value":"2192-6360","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,19]]},"assertion":[{"value":"10 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest related to this article's research, authorship, or publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This study adhered to ethical guidelines. All participants provided informed consent before their involvement. Consent for publication has also been obtained from all relevant parties. Supporting data and materials are available upon request.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}