slugComparative Study on Email Spam Classifier Using Feature Selection Techniques
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
Now a days e-mail is very popular because the way of communication method is very easy and due to these reasons some advertisers and social networks sent messages,for advertising their product,that are unwanted for users and not requested by the users, these messages are called spam messages. Sometimes these spam messages are harmful for system after clicking the link which is sent by the spammer or advertisement companies. It takes lots of time for deleting and also occupy memory for storage. Due to these we need filtering the messages and this is the important task for separating the genuine messages from the junk messages. Even though number of researchers are uses different classification techniques for classify the spam, still 100% accuracy in spam classification are question mark, In this paper, we used spam data set which are collected from UCI repository. Initially, various classification algorithms are applied over this dataset using CLEMENTINE data mining tool. This data set is divided into two parts one is training data set and the other one is testing data set. After that most of the data is used for training and a smaller portion of the data is used for testing. After a model has been processed by using the training set, we test the model and identify the results. This process is done by different data set. Finally, best classifier for email spam i.e neural network is identified based on the Training and testing accuracy of various models. In this thesis we also use feature selection method selecting features of spam data set which removes the redundant , irrelevant and noisy data. It improves the data quality and also increase the accuracy of the resulting models.
Authors and Affiliations
Yukti Kesharwani, Shrikant Lade, Dayashakar Pandey
A Black hole Detection Algorithm in MANETS Using MAC Scheme
Unattended installation of sensor nodes in the environment causes many security threats in the Ad-hoc networks. The security of the DSR and AODV protocol is threaded bydifferent types of attacks. Mobile Adhoc Networks (...
Security Attacks on Network Layer in Wireless Sensor Networks-An Overview
The wireless sensor networks (WSN) are said to be one of the popular networks in using all-inclusive applications These networks are structured in many or more number of sensor nodes. The Deployment of nodes in these ne...
slugMR Brain Image Segmentation Based on Principle Component Analysis and Self-Organizing Map
In this paper, a fully unsupervised segmentation of Magnetic Resonance (MR) brain image is presented, which is based on a competitive learning algorithm- Self Organizing Map (SOM). We tried to address the problem of se...
Image Characterization Based Adaptive Wavelet Transform in Image Retrieval
The paper presents the image retrieval based on adaptive wavelet transform. Improving the retrieval efficiency in the image database set using discrete wavelet transform and different distance calculation. The adaptive...
The Case Study of Swarm Intelligence Optimization Algorithm Performance
This paper was study in swarm intelligence optimization algorithm performance nature-inspired meta-heuristic algorithm, especially those based on swarm intelligence. Have attracted much attention in the algorithm Partic...