2019
DOI: 10.1108/el-12-2018-0245
|View full text |Cite
|
Sign up to set email alerts
|

An efficient semantic recommender method forArabic text

Abstract: Purpose This paper aims to propose a new efficient semantic recommender method for Arabic content. Design/methodology/approach Three semantic similarities were proposed to be integrated with the recommender system to improve its ability to recommend based on the semantic aspect. The proposed similarities are CHI-based semantic similarity, singular value decomposition (SVD)-based semantic similarity and Arabic WordNet-based semantic similarity. These similarities were compared with the existing similarities u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 28 publications
0
15
0
Order By: Relevance
“…Hawashin et al [6] suggested a semantic recommender of Arabic content. The similarity methods used are CHIs, SVDs, and semantic similarity for on Arabic WordNet.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Hawashin et al [6] suggested a semantic recommender of Arabic content. The similarity methods used are CHIs, SVDs, and semantic similarity for on Arabic WordNet.…”
Section: Related Workmentioning
confidence: 99%
“…RMSE metric is the most valuable metric when significantly large errors are unwanted [36], [37]. It is computed as (6):…”
Section: Experimental Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Such interests can be used later by various parties. Hawashin, Alzubi, Kanan, and Mansour () proposed a recommender system for Arabic text. They used both Word2Vec and correlated interests in their work.…”
Section: Related Workmentioning
confidence: 99%
“…Several techniques exist to save users from phishing attacks, including the heuristic approach (Babagoli et al, 2019), the rule-based approach (Adewole et al, 2019) and a supervised machine learning (ML) approach (Sahingoz et al, 2019). Supervised ML algorithms are widely used for classification (Alzu'bi et al, 2018;Hawashin et al, 2019) and are more popular among all the techniques used to detect phishing websites. Kumar and Chaudhary (2017) introduced a framework based on machine learning for e-commerce-based mobile applications to detect malwares.…”
Section: Introductionmentioning
confidence: 99%