{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:19:02Z","timestamp":1740028742065,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"abstract":"<jats:p>We report on some experiments using linguistic information as additional features as part of document representation. The use of linguistic features on several information retrieval and text mining tasks is a hot topic, due to the polarity of conclusions encountered by several researchers. In this work, extracted information of every word like the Part Of Speech, stem and morphological root have been combined in different ways for experimenting on a possible improvement in the classification performance and on several algorithms. Our results show that certain gain can be obtained when these varied features are combined in a certain manner, and that these results are independent from the set of classification algorithms applied or the evaluation paradigm chosen, providing certain consistency to our conclusions in text categorization on the Reuters-21578 collection.<\/jats:p>","DOI":"10.3233\/978-1-58603-898-4-245","type":"book-chapter","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:11:46Z","timestamp":1739992306000},"source":"Crossref","is-referenced-by-count":0,"title":["Using linguistic information as features for text categorization"],"prefix":"10.3233","author":[{"family":"Montejo-R&aacute;ez Arturo","sequence":"additional","affiliation":[]},{"family":"Ure&ntilde;a-L&oacute;pez Luis Alfonso","sequence":"additional","affiliation":[]},{"family":"Garc&iacute;a-Cumbreras Miguel &Aacute;ngel","sequence":"additional","affiliation":[]},{"family":"Perea-Ortega Jos&eacute; Manuel","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["NATO Science for Peace and Security Series - D: Information and Communication Security","Mining Massive Data Sets for Security"],"original-title":[],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:26:11Z","timestamp":1739993171000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISSNISBN&issn=1874-6268&volume=19&spage=245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-58603-898-4-245","relation":{},"ISSN":["1874-6268"],"issn-type":[{"value":"1874-6268","type":"print"}],"subject":[],"published":{"date-parts":[[2008]]}}}