Spam filtering for optimization in internet promotions using bayesian analysis
Journal Title: Journal of Applied Quantitative Methods - Year 2010, Vol 5, Issue 2
Abstract
The main characteristics of an e-business and its promoting are presented. It contains ways of promoting an e-business, examined in depth the e-mail marketing principle along with advantages and disadvantages of the implementation. E-mail marketing metrics are defined for analyzing the impact on customers. A model for optimization the promoting process via email is created for reaching the threshold of profitability for electronic business. The model implements Bayesian spam filtering and applies an internal classification, using the principles of conditioned probabilities.
Authors and Affiliations
Ion SMEUREANU, Madalina ZURINI
A Multifactor Statistical Model for Analysing the Physico-Chemical Variables in the Coastal Area at St-Louis and Tamarin, Mauritius
The coastal pollution is an issue of concern for Mauritius. Since the past two decades, agricultural activities have contributed to pesticide and fertilizer run off in coastal waters. Over the recent years, the major urb...
Entreprises Behavior in Cooperative and Punishment‘s Repeated Negotiations
Our paper considers a “negotiation game” between two players which combines the features of two-players alternating offers bargaining and repeated games. Generally, the negotiation game admits a large number of equilibri...
DIFFERENTIAL VARIABILITY OF TEST SCORES AMONG SCHOOLS: A MULTILEVEL ANALYSIS OF THE FIFTH-GRADE INVALSI TEST USING HETEROSCEDASTIC RANDOM EFFECTS
The performance of a school system can be evaluated through the learning levels of the pupils, usually summarized by school mean scores. The variability of the mean scores among schools is rarely studied in detail, thoug...
QUANTITATIVE METHODS FOR IDENTIFICATION OF REGIONAL CLUSTERS IN ROMANIA
The main goal of this paper is to describe some methods, that make use of employment data and that allow to measure to what the companies are spatially proximate. Specifically, we will outline the most prominent spatial...
EVALUATING SECURITY THREATS IN DISTRIBUTED APPLICATIONS LIFESTAGES
The article starts with the classification of security threats as related to the context of operating distributed IT&C applications – DIAs, as concerning users, processes and the information exchanged. Security risks...