Email Representation using Noncharacteristic Information and its Application
نویسندگان
چکیده
Focusing on the uncertainty of classifying emails based-on email content and the incompleteness of email representation, the paper proposes a new representation using noncharacteristic information. The new approach refers to the whole email, contains feature items extracted from email content, and noncharacteristic items extracted from email header. In the expriment, we adopt Naïve Bayes classifier to classify emails, classification results indicate that the new approach overcomes the shortcomings of original content-based filtering and improves the recall and the precision of spam filtering.
منابع مشابه
Horizontal representation of a hesitant fuzzy set and its application to multiple attribute decision making
The main aim of this paper is to present a novel method for ranking hesitant fuzzy sets (HFSs) based on transforming HFSs into fuzzy sets (FSs). The idea behind the method is an interesting HFS decomposition which is referred here to as the horizontal representation in the current study. To show the validity of the proposed ranking method, we apply it to solve a multi-attribute decision-making ...
متن کاملPointwise Green Function Bounds and Long-Time Stability of Large-Amplitude Noncharacteristic Boundary Layers
Using pointwise semigroup techniques of Zumbrun–Howard and Mascia–Zumbrun, we obtain sharp global pointwise Green function bounds for noncharacteristic boundary layers of arbitrary amplitude. These estimates allow us to analyze linearized and nonlinearized stability of noncharacteristic boundary layers of one-dimensional systems of conservation laws, showing that both are equivalent to a numeri...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملExplaining the Methods of Architecture Representation Using Semiotic Analysis (Umberto Eco's Theory of Architecture Codes)
: In this paper, it is tried to explain the concept of representation and architectural representation through a qualitative methodology, approach its procedure for gradual creation in architecture and then according to scholars and to obtain the effect of this concept in the process of architectural facts the concepts are presented. In addition, it is referred to theories and practical texts b...
متن کاملA new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCIT
دوره 5 شماره
صفحات -
تاریخ انتشار 2010