342 research outputs found
On the use of Locality for Improving SVM-Based Spam Filtering
Recent growths in the use of email for communication and the corresponding growths in the volume of email received have made automatic processing of emails desirable. In tandem is the prevailing problem of Advance Fee fraud E-mails that pervades inboxes globally. These genres of e-mails solicit for financial transactions and funds transfers from unsuspecting users. Most modern mail-reading software packages provide some forms of programmable automatic filtering, typically in the form of sets of rules that file or otherwise dispose mails based on keywords detected in the headers or message body. Unfortunately programming these filters is an arcane and sometimes inefficient process. An adaptive mail system which can learn its users’ mail sorting preferences would therefore be more desirable. Premised on the work of Blanzieri & Bryl (2007), we proposes a framework dedicated to the phenomenon of locality in email data analysis of advance fee fraud e-mails which engages Support Vector Machines (SVM) classifier for building local decision rules into the classification process of the spam filter design for this genre of e-mails
Identifying spam e-mail messages using an intelligence algorithm
During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams
Stability and Effective Process Control for Secure Email Filtering
A fantastic tool for both commercial and personal communication is electronic mail. It has increasingly become a necessary component of our working life since it is straightforward, available, and simple to use. Spam emails have started to tarnish internet experiences and threaten the integrity of email. Due to the exponential growth of spam, both people and organisations are under a great deal of financial and other strain. In order to prevent the future of email itself from being in jeopardy, a solution to the spam problem must be discovered. There is an urgent need to solve the Email spam issue since spam volume has been rising over the last several decades. As part of this effort, many effects of spam emails on businesses and people were noted and thoroughly examined. In order to properly assess current technologies, solutions, and methods, a comprehensive literature review was conducted throughout the procedures. The goals of this work is to develop new methodologies for the implementation of new strategies for the efficient management of email spam and to construct a proof-of-concept software system for the Process controlled assessment of such strategies
Hybrid Models Of Fuzzy Artmap And Qlearning For Pattern Classification
Pengelasan corak adalah salah satu isu utama dalam pelbagai tugas pencarian
data. Dalam kajian ini, fokus penyelidikan tertumpu kepada reka bentuk dan
pembinaan model hibrid yang menggabungkan rangkaian neural Teori Resonan
Adaptif (ART) terselia dan model Pembelajaran Pengukuhan (RL) untuk pengelasan
corak. Secara khususnya, rangkaian ARTMAP Kabur (FAM) dan Pembelajaran-Q
dijadikan sebagai tulang belakang dalam merekabentuk dan membina model-model
hibrid. Satu model QFAM baharu terlebih dahulu diperkenalkan bagi menambahbaik
prestasi pengelasan rangkaian FAM. Strategi pruning dimasukkan bagi
mengurangkan kekompleksan QFAM. Bagi mengatasi isu ketidak-telusan, Algoritma
Genetik (GA) digunakan bagi mengekstrak hukum kabur if-then daripada QFAM.
Model yang terhasil iaitu QFAM-GA, dapat memberi ramalan berserta dengan
huraian dengan hanya menggunakan bilangan antisiden yang sedikit. Bagi
menambahkan lagi kebolehtahanan model-model Q-FAM, penggunaan sistem agenpelbagai
telah dicadangkan. Hasilnya, model gugusan QFAM berasaskan agen
dengan ukuran percaya dan kaedah rundingan baharu telah dicadangkan. Pelbagai
jenis masalah tanda-aras telah digunakan bagi penilaian model-model gugusan dan
individu berasaskan QFAM. Hasilnya telah dianalisa dan dibandingkan dengan FAM
serta model-model yang dilaporkan dalam kajian terdahulu. Sebagai tambahan, dua
daripada masalah dunia-nyata digunakan bagi menunjukkan kebolehan praktikal
model hibrid. Keputusan akhir menunjukkan keberkesanan modul berasaskan QFAM
dalam menerajui tugas-tugas pengelasan corak.
________________________________________________________________________________________________________________________
Pattern classification is one of the primary issues in various data mining
tasks. In this study, the main research focus is on the design and
development of hybrid models, combining the supervised Adaptive
Resonance Theory (ART) neural network and Reinforcement Learning (RL)
models for pattern classification. Specifically, the Fuzzy ARTMAP (FAM)
network and Q-learning are adopted as the backbone for designing and
developing the hybrid models. A new QFAM model is first introduced to
improve the classification performance of FAM network. A pruning strategy
is incorporated to reduce the complexity of QFAM. To overcome the
opaqueness issue, a Genetic Algorithm (GA) is used to extract fuzzy if-then
rules from QFAM. The resulting model, i.e. QFAM-GA, is able to provide
predictions with explanations using only a few antecedents. To further
improve the robustness of QFAM-based models, the notion of multi agent
systems is employed. As a result, an agent-based QFAM ensemble model
with a new trust measurement and negotiation method is proposed. A variety
of benchmark problems are used for evaluation of individual and ensemble
QFAM-based models. The results are analyzed and compared with those
from FAM as well as other models reported in the literature. In addition, two
real-world problems are used to demonstrate the practicality of the hybrid
models. The outcomes indicate the effectiveness of QFAM-based models in
tackling pattern classification tasks
An approach to preventing spam using Access Codes with a combination of anti-spam mechanisms
Spam is becoming a more and more severe problem for individuals, networks,
organisations and businesses. The losses caused by spam are billions of dollars every
year. Research shows that spam contributes more than 80% of e-mails with an increased
in its growth rate every year. Spam is not limited to emails; it has started affecting other
technologies like VoIP, cellular and traditional telephony, and instant messaging services.
None of the approaches (including legislative, collaborative, social awareness and
technological) separately or in combination with other approaches, can prevent sufficient
of the spam to be deemed a solution to the spam problem.
The severity of the spam problem and the limitations of the state-of-the-Art solutions
create a strong need for an efficient anti-spam mechanism that can prevent significant
volumes of spam without showing any false positives. This can be achieved by an
efficient anti-spam mechanism such as the proposed anti-spam mechanism known as
"Spam Prevention using Access Codes", SPAC. SPAC targets spam from two angles i.e.
to prevent/block spam and to discourage spammers by making the infrastructure
environment very unpleasant for them.
In addition to the idea of Access Codes, SPAC combines the ideas behind some of the
key current technological anti-spam measures to increase effectiveness. The difference in
this work is that SPAC uses those ideas effectively and combines them in a unique way
which enables SPAC to acquire the good features of a number of technological anti-spam
approaches without showing any of the drawbacks of these approaches. Sybil attacks,
Dictionary attacks and address spoofing have no impact on the performance of SPAC. In
fact SPAC functions in a similar way (i.e. as for unknown persons) for these sorts of
attacks.
An application known as the "SPAC application" has been developed to test the
performance of the SPAC mechanism. The results obtained from various tests on the
SPAC application show that SPAC has a clear edge over the existing anti-spam
technological approaches
From Social Data Mining to Forecasting Socio-Economic Crisis
Socio-economic data mining has a great potential in terms of gaining a better
understanding of problems that our economy and society are facing, such as
financial instability, shortages of resources, or conflicts. Without
large-scale data mining, progress in these areas seems hard or impossible.
Therefore, a suitable, distributed data mining infrastructure and research
centers should be built in Europe. It also appears appropriate to build a
network of Crisis Observatories. They can be imagined as laboratories devoted
to the gathering and processing of enormous volumes of data on both natural
systems such as the Earth and its ecosystem, as well as on human
techno-socio-economic systems, so as to gain early warnings of impending
events. Reality mining provides the chance to adapt more quickly and more
accurately to changing situations. Further opportunities arise by individually
customized services, which however should be provided in a privacy-respecting
way. This requires the development of novel ICT (such as a self- organizing
Web), but most likely new legal regulations and suitable institutions as well.
As long as such regulations are lacking on a world-wide scale, it is in the
public interest that scientists explore what can be done with the huge data
available. Big data do have the potential to change or even threaten democratic
societies. The same applies to sudden and large-scale failures of ICT systems.
Therefore, dealing with data must be done with a large degree of responsibility
and care. Self-interests of individuals, companies or institutions have limits,
where the public interest is affected, and public interest is not a sufficient
justification to violate human rights of individuals. Privacy is a high good,
as confidentiality is, and damaging it would have serious side effects for
society.Comment: 65 pages, 1 figure, Visioneer White Paper, see
http://www.visioneer.ethz.c
Recommended from our members
The virtual participant : story telling in a computer supported collaborative learning environment
This thesis presents a study of a novel approach for supporting students in text based electronic conferencing. It describes the development of a concept known as the Virtual Participant. An initial prototype was developed which was tested on the Open University Business School MBA course on Creative Management. The Virtual Participant first presented itself to the users as Uncle Bulgaria. a metaphor for collecting and recycling important information.
The Virtual Participant approach is to store the discussions students have had in previous years that the course has run. and to retrieve those discussions at a time most appropriate to helping the students studying this year. It was never intended to provide 'the answer' but rather examples of similar discussions on similar topics. Uncle Bulgaria interacted with the students over a period of 16 weeks. during which time the students prepared two assignments and completed the first half of the course. The information gained from the students' interactions with the system and their feedback to a questionnaire survey was then fed back into a second prototype' which was again tested on the same course.
In the second study the system was known to the students as the Active Archive. an active component of an archive of past student discussions. Through cross year comparisons it was possible to evaluate the improvements made between the Active Archive and Uncle Bulgaria systems. The Active Archive interacted with the students on a much larger scale than Uncle Bulgaria had. but with no increased negative impact. The second study provided examples where the Active Archive stimulated discussion amongst the students and vicarious learning could be said to have taken place. Taking the lessons learned from these two studies a number of guidelines for the development of such systems have been produced and are described and discussed
Filter mediated design : generating coherence in (collaborative) design
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Architecture, 1999.Includes bibliographical references (leaves 67-69).Architectural design involves the integration of diverse, sometimes conflicting, concepts and requirements into a coherent single composition. This paper proposes a method for negotiating architectural design across domains, by examining issues of ontology, perception, generation and evaluation, and detailing a prototype in which these mechanisms are augmented using computational agents for achieving coherence and innovation in remote collaborative design. The paper proposes a common geometric and topological database, from which multiple semantic models are constructed. Filter Mediated Design is intended to explore the processes and strategies of constructing intelligent designs and design intelligence.by John R. Haymaker.S.M
The Internet vs. the Nation-State: Prevention and Prosecution Challenges on the Internet in Republic of TürkiyI
Social, economic, and technological developments are widely accepted as powerful forces that affect the role, power, and functions of nation-states. Being one of the most influential technological developments in the recent decades, the internet has come into prominence in this regard.
With the use of the Internet, the monopoly of media and information controlled by official ideologies, capitalist barons, or elites is seriously challenged. Consequently the power balance between individuals and authorities in the mass media and communication has been transformed in a significant way. Though their reliability may sometimes be questionable, the number and type of information resources has increased dramatically, and accessing information has become easier substantially. People are more interconnected today than ever before. They can easily find, join, or construct their personal, social or political networks. With a number of internet applications and social media, collective reactions, social movements and activities are more organized and effective today than ever before. That is why we have seen so much social fluctuation, unrest. protest, and political activism all over the world in the last few years.
Moreover new terms and phenomena like cyber-crime, cyber warfare, and cyber-attacks have urged nation-states to be more careful about the internet and increase their efforts to control it. This level of social chaos in different states and increasing cyber-crimes lead us to question the effectiveness of nation-states\u27 controlling measures. Focusing on one state, the Republic of Türkiye, this study analyzes two important dimensions of state control efforts, prevention and prosecution. On the prevention side, I explore the effectiveness of internet access blocking. On the prosecution side, I analyze the effectiveness of prosecution in internet child pornography.
The result of testing to measure the effectiveness of Internet website blocking reveals that there are significant gaps, complications, and dilemmas in these policies. A similar situation is also seen in the investigations of internet child pornography. Analysis conducted of the operational investigation files reveals that in most of the files, suspects could not be identified, traced or brought before judicial authorities. As seen in these two fields, state policing efforts of the Internet in a country are not absolute, and the Internet can be a vulnerable space in which any local or foreign actor or agents like criminals, opposition groups, terrorists can create problems for nation-states
- …