{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T23:06:49Z","timestamp":1771628809350,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372956","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Text classification using Fuzzy TF-IDF and Machine Learning Models"],"prefix":"10.1145","author":[{"given":"Mariem","family":"Bounabi","sequence":"first","affiliation":[{"name":"Computer sciences, Imaging and Numerical Analysis Laboratory (LIIAN), Fes, Morocco"}]},{"given":"Karim","family":"El Moutaouakil","sequence":"additional","affiliation":[{"name":"Engineering Sciences Laboratory, FPT Taza, Morocco"}]},{"given":"Khalid","family":"Satori","sequence":"additional","affiliation":[{"name":"Computer sciences, Imaging and Numerical Analysis Laboratory (LIIAN), Fes, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"issue":"5360","key":"e_1_3_2_1_1_1","first-page":"98","volume":"280","author":"Lawrence S.","year":"1998","unstructured":"Lawrence , S. , & Giles , C. L. ( 1998 ). Searching the World Wide Web.Science , 280 ( 5360 ), 98 -- 100 . Lawrence, S., & Giles, C. L. (1998). Searching the World Wide Web.Science, 280(5360), 98--100.","journal-title":"Searching the World Wide Web.Science"},{"key":"e_1_3_2_1_2_1","first-page":"54","volume-title":"AAAI\/IAAI","volume":"1","author":"Pazzani M. J.","year":"1996","unstructured":"Pazzani , M. J. , Muramatsu , J. , & Billsus , D. ( 1996 , August). Syskill &Webert:Identifying interesting web sites . In AAAI\/IAAI , Vol. 1 (pp. 54 -- 61 ). Pazzani, M. J., Muramatsu, J., & Billsus, D. (1996, August). Syskill &Webert:Identifying interesting web sites. In AAAI\/IAAI, Vol. 1 (pp. 54--61)."},{"key":"e_1_3_2_1_3_1","unstructured":"Sahami M. Dumais S. Heckerman D. Horvitz E.(1998) A Bayesian Approach to Filtering Junk email.AAAI 98 Workshops on Text Categorization July.  Sahami M. Dumais S. Heckerman D. Horvitz E.(1998) A Bayesian Approach to Filtering Junk email.AAAI 98 Workshops on Text Categorization July."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50048-7"},{"key":"e_1_3_2_1_5_1","volume-title":"Web page classification: Features and algorithms.ACM computing surveys (CSUR), 41(2), 12","author":"Qi X.","year":"2009","unstructured":"Qi , X. , & Davison , B. D. ( 2009 ). Web page classification: Features and algorithms.ACM computing surveys (CSUR), 41(2), 12 . Qi, X., & Davison, B. D. (2009). Web page classification: Features and algorithms.ACM computing surveys (CSUR), 41(2), 12."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Conference on Automated Learning and Discovery, CMU, June.","author":"Apte C.","year":"1998","unstructured":"Apte , C. , Damerau , F. and Weiss , S . ( 1998 ) Text Mining with Decision Rule and Decision Trees . In Proceedings of the Conference on Automated Learning and Discovery, CMU, June. Apte, C., Damerau, F. and Weiss, S. (1998) Text Mining with Decision Rule and Decision Trees. In Proceedings of the Conference on Automated Learning and Discovery, CMU, June."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/160688.160691"},{"key":"e_1_3_2_1_9_1","volume-title":"Fourth Annual Symposium on Document Analysis and Information Retrieve","author":"Wiener E.","year":"1995","unstructured":"Wiener , E. , Pederson , J. and Weigend , A . ( 1995 ) A Neural Network Approach to Topic Spotting . Fourth Annual Symposium on Document Analysis and Information Retrieve Wiener, E., Pederson, J. and Weigend, A. (1995) A Neural Network Approach to Topic Spotting. Fourth Annual Symposium on Document Analysis and Information Retrieve"},{"key":"e_1_3_2_1_10_1","volume-title":"D. (1992)","author":"Masand B.","unstructured":"Masand , B. , Linoff , G. , Waltz , D. (1992) Classifying News Stories Using Memory Based Reasoning. In Proceedings of the 15th Annual ACM\/SIGIR Conference on Research and Development in Information Retrieval, 59--65. Masand, B., Linoff, G., Waltz, D. (1992) Classifying News Stories Using Memory Based Reasoning. In Proceedings of the 15th Annual ACM\/SIGIR Conference on Research and Development in Information Retrieval, 59--65."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0026683"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410410560582"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277928"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1997.619831"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/500820"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1394399"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.01.013"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.10.011"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.06.005"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1023"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.07.019"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.005"},{"key":"e_1_3_2_1_24_1","first-page":"746","volume-title":"Proceedings of the 2013 conference of the north American chapter of the association for computational linguistics: Human language technologies (NAACL-HLT-2013)","author":"Mikolov T.","year":"2013","unstructured":"Mikolov , T. , Yih , W.-t. , & Zweig , G. ( 2013 ). Linguistic regularities in continuous space word representations .. In Proceedings of the 2013 conference of the north American chapter of the association for computational linguistics: Human language technologies (NAACL-HLT-2013) : 13 (pp. 746 -- 751 ). Mikolov, T., Yih, W.-t., & Zweig, G. (2013). Linguistic regularities in continuous space word representations.. In Proceedings of the 2013 conference of the north American chapter of the association for computational linguistics: Human language technologies (NAACL-HLT-2013): 13 (pp. 746--751)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9528-0"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-010-9165-y"},{"issue":"8","key":"e_1_3_2_1_28_1","first-page":"1070","article-title":"SVOIS: Support vector oriented instance selection for text classification","volume":"38","author":"Tsai C.","year":"2013","unstructured":"Tsai , C. , & Chang , C. ( 2013 ). SVOIS: Support vector oriented instance selection for text classification . Information Sciences , 38 ( 8 ), 1070 -- 1083 . doi: 10.1016\/j.is.2013. 05.001. 10.1016\/j.is.2013 Tsai, C., & Chang, C. (2013). SVOIS: Support vector oriented instance selection for text classification. Information Sciences, 38 (8), 1070--1083. doi: 10.1016\/j.is.2013. 05.001.","journal-title":"Information Sciences"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.03.058"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3090354.3090398"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"D. Greene and P. Cunningham. 2006.Practical Solutions to the Problem of Diagonal Dominance in Kernel Document Clustering: Proc.ICML 2006.  D. Greene and P. Cunningham. 2006.Practical Solutions to the Problem of Diagonal Dominance in Kernel Document Clustering: Proc.ICML 2006.","DOI":"10.1145\/1143844.1143892"},{"key":"e_1_3_2_1_32_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1007\/11941439_114","volume-title":"F-Score and ROC: A Family of Discriminant Measures for Performance Evaluation\"","author":"Sokolova N.","year":"2006","unstructured":"M. Sokolova , N. Japkowicz and S. Szpakowicz : \" Beyond Accuracy , F-Score and ROC: A Family of Discriminant Measures for Performance Evaluation\" , Lecture Notes in Computer Science , Vol. 4304 , 2006 , pp. 1015 -- 1010 . M. Sokolova, N. Japkowicz and S. Szpakowicz: \"Beyond Accuracy, F-Score and ROC: A Family of Discriminant Measures for Performance Evaluation\", Lecture Notes in Computer Science, Vol. 4304, 2006, pp. 1015--10."},{"key":"e_1_3_2_1_33_1","unstructured":"R. J. Urbanowicz M. Meeker W. Lacava R. S. Olson and H. Jason \"ReliefBased Feature Selection: Introduction and Review.\"  R. J. Urbanowicz M. Meeker W. Lacava R. S. Olson and H. Jason \"ReliefBased Feature Selection: Introduction and Review.\""},{"key":"e_1_3_2_1_34_1","volume-title":"Sigmis: A Feature Selection Algorithm Using Correlation Based Method","author":"Blessie E.","unstructured":"E. C. Blessie and E. Karthikeyan , \" Sigmis: A Feature Selection Algorithm Using Correlation Based Method ,\" vol. 6 , no. 3, pp. 385--394, 2012. E. C. Blessie and E. Karthikeyan, \"Sigmis: A Feature Selection Algorithm Using Correlation Based Method,\" vol. 6, no. 3, pp. 385--394, 2012."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2019.101171"},{"key":"e_1_3_2_1_36_1","first-page":"8887","article-title":"Analysis of machine learning algorithms using WEKA","volume":"975","author":"Desai A.","year":"2012","unstructured":"Desai , A. , & Sunil , R. ( 2012 ). Analysis of machine learning algorithms using WEKA . International Journal of Computer Applications , 975 , 8887 . Desai, A., & Sunil, R. (2012). Analysis of machine learning algorithms using WEKA. International Journal of Computer Applications, 975, 8887.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96292-4_27"},{"key":"e_1_3_2_1_38_1","first-page":"155","volume-title":"WSEAS Transactions on Computers, 12 (4)","author":"Ettaouil M.","year":"2013","unstructured":"Ettaouil , M. , Lazaar , M. , Elmoutaouakil , K. , Haddouch , K. , \"A new algorithm for optimization of the kohonen network architectures using the continuous hopfield networks\" , ( 2013 ) WSEAS Transactions on Computers, 12 (4) , pp. 155 -- 163 . Ettaouil, M., Lazaar, M., Elmoutaouakil, K., Haddouch, K., \"A new algorithm for optimization of the kohonen network architectures using the continuous hopfield networks\", (2013) WSEAS Transactions on Computers, 12 (4), pp. 155--163."},{"key":"e_1_3_2_1_39_1","volume-title":"SITA","author":"Ettaouil M.","year":"2013","unstructured":"Ettaouil , M. , Lazaar , M. , En-Naimani , Z. , \"A hybrid ANN\/HMM models for arabic speech recognition using optimal codebook\", (2013) 2013 8th International Conference on Intelligent Systems: Theories and Applications , SITA 2013 . Ettaouil, M., Lazaar, M., En-Naimani, Z., \"A hybrid ANN\/HMM models for arabic speech recognition using optimal codebook\", (2013) 2013 8th International Conference on Intelligent Systems: Theories and Applications, SITA 2013."},{"key":"e_1_3_2_1_40_1","first-page":"3194","volume-title":"International Journal of Electrical and Computer Engineering, 8 (5)","author":"Omara H.","year":"2018","unstructured":"Omara , H. , Lazaar , M. , Tabii , Y. \" Effect of feature selection on gene expression datasets classification accuracy\" , ( 2018 ) International Journal of Electrical and Computer Engineering, 8 (5) , pp. 3194 -- 3203 Omara, H., Lazaar, M., Tabii, Y.\"Effect of feature selection on gene expression datasets classification accuracy\", (2018) International Journal of Electrical and Computer Engineering, 8 (5), pp. 3194--3203"},{"key":"e_1_3_2_1_41_1","volume-title":"Prediction of Supplier Performance: A Novel DEA-ANFIS Based Approach. 2nd BDCA conference. ACM. DOI: 10","author":"Khaldi R.","unstructured":"Khaldi , R. , Chiheb , R. , El Afia A. , Akaaboune , A. , and Faizi , R ., 2017 . Prediction of Supplier Performance: A Novel DEA-ANFIS Based Approach. 2nd BDCA conference. ACM. DOI: 10 .1145\/3090354.3090416. 10.1145\/3090354.3090416 Khaldi, R., Chiheb, R., El Afia A., Akaaboune, A., and Faizi, R., 2017. Prediction of Supplier Performance: A Novel DEA-ANFIS Based Approach. 2nd BDCA conference. ACM. DOI: 10.1145\/3090354.3090416."},{"key":"e_1_3_2_1_42_1","series-title":"Vol. 165","volume-title":"An introduction to fuzzy logic applications in intelligent systems","author":"Yager R. R.","year":"2012","unstructured":"Yager , R. R. , & Zadeh , L. A. (Eds.). ( 2012 ). An introduction to fuzzy logic applications in intelligent systems ( Vol. 165 ) . Springer Science & Business Media . Yager, R. R., & Zadeh, L. A. (Eds.). (2012). An introduction to fuzzy logic applications in intelligent systems (Vol. 165). Springer Science & Business Media."},{"key":"e_1_3_2_1_43_1","first-page":"39","volume-title":"Proceedings of the 2nd international Conference on Big Data, Cloud and Applications","author":"Dahmouni","unstructured":"Dahmouni , Abdellatif, K. El Moutaouakil , and Khalid Satori. \" A Cloud Face Recognition System using A New Optimal Local Binary Pattern. \" In Proceedings of the 2nd international Conference on Big Data, Cloud and Applications , p. 39 . ACM, 2017. Dahmouni, Abdellatif, K. El Moutaouakil, and Khalid Satori. \"A Cloud Face Recognition System using A New Optimal Local Binary Pattern. \" In Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, p. 39. ACM, 2017."}],"event":{"name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","location":"Rabat Morocco","acronym":"BDIoT'19"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":43,"alternative-id":["10.1145\/3372938.3372956","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372956","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}