Review History


All reviews of published articles are made public. This includes manuscript files, peer review comments, author rebuttals and revised materials. Note: This was optional for articles submitted before 13 February 2023.

Peer reviewers are encouraged (but not required) to provide their names to the authors when submitting their peer review. If they agree to provide their name, then their personal profile page will reflect a public acknowledgment that they performed a review (even if the article is rejected). If the article is accepted, then reviewers who provided their name will be associated with the article itself.

View examples of open peer review.

Summary

  • The initial submission of this article was received on October 20th, 2022 and was peer-reviewed by 2 reviewers and the Academic Editor.
  • The Academic Editor made their initial decision on November 14th, 2022.
  • The first revision was submitted on December 30th, 2022 and was reviewed by 1 reviewer and the Academic Editor.
  • The article was Accepted by the Academic Editor on January 13th, 2023.

Version 0.2 (accepted)

· Jan 13, 2023 · Academic Editor

Accept

Many thanks for revising your manuscript After consulting experienced reviewers and our own assessment of the manuscript, I am happy to inform you that your paper is accepted.

[# PeerJ Staff Note - this decision was reviewed and approved by Jyotismita Chaki, a PeerJ Computer Science Section Editor covering this Section #]

Reviewer 2 ·

Basic reporting

The authors seems to have incorporated the comments, therefore, it can be conisidered

Experimental design

The authors seems to have incorporated the comments, therefore, it can be conisidered

Validity of the findings

The authors seems to have incorporated the comments, therefore, it can be conisidered

Additional comments

The authors seems to have incorporated the comments, therefore, it can be conisidered

Version 0.1 (original submission)

· Nov 14, 2022 · Academic Editor

Major Revisions

The paper needs major improvements e.g. the comparison with state of the art and the other issues mentioned by the reviewers. Please address the concerns, questions, and suggestions of the reviewers according to basic reporting, validity of the findings, and validity of the findings. Thank you...

[# PeerJ Staff Note: Please ensure that all review comments are addressed in a rebuttal letter and any edits or clarifications mentioned in the letter are also inserted into the revised manuscript where appropriate. It is a common mistake to address reviewer questions in the rebuttal letter but not in the revised manuscript. If a reviewer raised a question then your readers will probably have the same question so you should ensure that the manuscript can stand alone without the rebuttal letter. Directions on how to prepare a rebuttal letter can be found at: https://peerj.com/benefits/academic-rebuttal-letters/ #]

Reviewer 1 ·

Basic reporting

This manuscript introduces different dimensionality reduction methods (lossless, low-loss and lossy) as an optimization problem that can be solved using multiobjective evolutionary algorithms, and provides an experimental comparison of lossless and low-loss schemes for text representation. The experiment results show the effectiveness of the proposed algorithm.

Experimental design

(1) It should be clearer for show and introduce the reformulated multiobjective optimization problem. Please define the reformulated multiobjective optimization problem using the classic multiobjective optimization problem definition format, to make it more understandable and readable.

(2) Please add more details about the feature reduction.

(3) I wonder that the number of the original dimensions of the datasets and the number of dimensions after dimensionality reduction.

Validity of the findings

(4) The comparison in Figure 2 may be pointless. Please display the results in another form.

(5) The experimental results are not sufficient. Please add more convincing results.

Reviewer 2 ·

Basic reporting

This paper proposes a Multiobjective Evolutionary Optimization for dimensionality reduction of texts represented by synsets, I have a few concerns below
The abstract needs to be further improved to show the clear contribution of the proposed work along with its validation/justification by comparing it with state-of-the-art.
There should be a clear problem statement and the objectives, the author achieved in the study.

the data set, its volume, the sources of collection of the data set and the preprocessing applied by the authors could be moved at the start of the experimental protocol. The data pre-processing should be discussed in detail. E.g what were the data attribute, how did you tokenize it and what noises were removed?
What are the basis to get Table1 ?, eg. How the values has been calculated ?

The main deficiency of this work is the missing evaluation, the author should give a comparison of their work with state-of-the-art works to validate their work. It is suggested to apply the proposed technique to some other text spam detectors so that the variety of the text and work could be better understood. The one suggested could be the Gmail spam detector or any other email spam detector which generally detects the spam in the text data

Experimental design

This paper proposes a Multiobjective Evolutionary Optimization for dimensionality reduction of texts represented by synsets, I have a few concerns below
The abstract needs to be further improved to show the clear contribution of the proposed work along with its validation/justification by comparing it with state-of-the-art.
There should be a clear problem statement and the objectives, the author achieved in the study.

the data set, its volume, the sources of collection of the data set and the preprocessing applied by the authors could be moved at the start of the experimental protocol. The data pre-processing should be discussed in detail. E.g what were the data attribute, how did you tokenize it and what noises were removed?
What are the basis to get Table1 ?, eg. How the values has been calculated ?

The main deficiency of this work is the missing evaluation, the author should give a comparison of their work with state-of-the-art works to validate their work. It is suggested to apply the proposed technique to some other text spam detectors so that the variety of the text and work could be better understood. The one suggested could be the Gmail spam detector or any other email spam detector which generally detects the spam in the text data

Validity of the findings

This paper proposes a Multiobjective Evolutionary Optimization for dimensionality reduction of texts represented by synsets, I have a few concerns below
The abstract needs to be further improved to show the clear contribution of the proposed work along with its validation/justification by comparing it with state-of-the-art.
There should be a clear problem statement and the objectives, the author achieved in the study.

the data set, its volume, the sources of collection of the data set and the preprocessing applied by the authors could be moved at the start of the experimental protocol. The data pre-processing should be discussed in detail. E.g what were the data attribute, how did you tokenize it and what noises were removed?
What are the basis to get Table1 ?, eg. How the values has been calculated ?

The main deficiency of this work is the missing evaluation, the author should give a comparison of their work with state-of-the-art works to validate their work. It is suggested to apply the proposed technique to some other text spam detectors so that the variety of the text and work could be better understood. The one suggested could be the Gmail spam detector or any other email spam detector which generally detects the spam in the text data

Additional comments

This paper proposes a Multiobjective Evolutionary Optimization for dimensionality reduction of texts represented by synsets, I have a few concerns below
The abstract needs to be further improved to show the clear contribution of the proposed work along with its validation/justification by comparing it with state-of-the-art.
There should be a clear problem statement and the objectives, the author achieved in the study.

the data set, its volume, the sources of collection of the data set and the preprocessing applied by the authors could be moved at the start of the experimental protocol. The data pre-processing should be discussed in detail. E.g what were the data attribute, how did you tokenize it and what noises were removed?
What are the basis to get Table1 ?, eg. How the values has been calculated ?

The main deficiency of this work is the missing evaluation, the author should give a comparison of their work with state-of-the-art works to validate their work. It is suggested to apply the proposed technique to some other text spam detectors so that the variety of the text and work could be better understood. The one suggested could be the Gmail spam detector or any other email spam detector which generally detects the spam in the text data

All text and materials provided via this peer-review history page are made available under a Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.