Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 8
Abstract
E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing amount of electronic business and financial transactions directly contribute to the increase in e-mail-based threats. Email spam is one of the major problems of the today’s Internet, bringing financial damage to companies and annoying individual users. Among the approaches developed to stop spam, filtering is the one of the most important technique. Many researches in spam filtering have been centered on the more sophisticated lassifierrelated issues. In recent days, Machine learning for pam classification is an important research issue. This paper explores and identifies the use of different learning algorithms for classifying spam messages from e-mail. A comparative analysis among the algorithms has also been presented.
Authors and Affiliations
R. Deepa Lakshmi , N. Radha
An Efficient Approach for Image Recognition using Data Mining
Skin region detection plays an important role in a variety of applications such as face detection, adult image filtering and gesture recognition. We present some definitions about digital imaging or numerical imaging and...
Novel Sorting Algorithm
Sorting has become a stand in need of prosaic life activities. Sorting in computer science alluded to as ordering deals with arranging elements of a list or a set of records of a file in ascending or descending order. We...
Rapid and Proactive Approach on Exploration of Database Vulnerabilities
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system res...
A Study on Block Matching Algorithms for Motion Estimation
Block matching motion estimation is the essence of video coding systems. This paper gives a review of the different block matching algorithms used for motion estimation in video compression. It compares 10 different type...
Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
Protection of data is the utmost thing for any company related to digital information. There are several malicious methods adapted, based on the priority of demand of that piece of information. There are several cryptosy...