“…TC techniques are also important methods in knowledge management, such as content-based recommendation (Hawashin et al, 2019; Wijewickrema et al, 2019; Wu et al, 2020), patent classification (Kim et al, 2020), and information extraction (Al-Yahya, 2018). Besides, TC techniques have been frequently applied to the detection of unwanted messages, including short message spam, junk mails, and suspicious malignant mails (Ezpeleta et al, 2017; Hsiao & Chang, 2008; Mujtaba, Shuib, Raj, & Gunalan 2018; Seyyedi & Minaeibidgoli, 2018).…”