junk mail
Recently Published Documents


TOTAL DOCUMENTS

78
(FIVE YEARS 11)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
Sonal Chakole ◽  
Sarita Padole ◽  
Apurva Kamble ◽  
Vandana Wadekar ◽  
Ankit Dhande

Electronic Mail (E-mail) has established a significant place in information user’s life. Mails are used as a major and important mode of information sharing because emails are faster and effective way of communication. Email plays its important role of communication in both personal and professional aspects of one’s life. The rapid increase in the number of account holders from last few decades and the increase in the volume of mails have generated various serious issues too. The content base mail classification can be classified into four ways namely Private, Public, Newsletter, and Anonymous. Every user has the right to choose their keyword (a semi-private password). Those contacts who know the user’s keyword will be classified as private contacts and those users who are unknown them classified anonymous contacts. A contact can be classified as public or private, upon verification of an anonymous contact. Any newsletter or group mails are classified into newsletter contacts. It is highly likely that the rests are junk mail or spam. In this project, a spam detector to identify an email as either spam or ham is built using n-gram analysis. The system involves the classification of mails based on user’s contacts. This way any mail from a contact whom the user knows very well is being displayed.


2021 ◽  
pp. 80-116
Author(s):  
Joseph Elkanah Rosenberg
Keyword(s):  

In Elizabeth Bowen’s The Death of the Heart (1938), the novel’s victimized, orphan-heroine Portia is said to cherish a “wretched little escritoire” stuffed full, as if it “were a bin,” with junk mail. Crammed into an overflowing desk, the advertisements and begging letters that Portia collects have been rendered void: they are circulars that have been taken out of circulation. Like Portia’s desk, Bowen’s fiction is stuffed full of letters: letters sent, lost, found, returned to sender, read, unread, buried, and burned. Such letters offer an image of intimate print reduced to wastepaper. In Bowen’s fiction, the degraded materiality of print corrupts the privacy of the epistolary form, mediating the depths of feeling into clutter. And when wrongly re-circulated—as happens to the letters intercepted by the orphan Leopold in The House in Paris (1935), or the mysterious packet left behind by Guy Danby in A World of Love (1955)—junk mail transforms into a menacing remainder that shatters the boundary between the interior world of memory and consciousness and the exterior world of objects and others.


Author(s):  
Joseph Elkanah Rosenberg

At the same time that writers were becoming infatuated with new technologies like the cinema and the radio, they were also being haunted by their own pages. From Henry James’s fascination with burnt manuscripts to destroyed books in the fiction of the Blitz, from junk mail in the work of Elizabeth Bowen to bureaucratic paperwork in Vladimir Nabokov, modern fiction is littered with images of tattered and useless paper that reveal an increasingly uneasy relationship between literature and its own materials over the course of the twentieth century. Wastepaper Modernism argues that these images are vital to our understanding of modernism, disclosing an anxiety about textual matter that lurks behind the desire for radically different modes of communication. Having its roots in the late nineteenth century, but finding its fullest constellation in the wake of the high modernist experimentation with novelistic form, “wastepaper modernism” arises when fiction imagines its own processes of transmission and representation breaking down. When the descriptive capabilities of the novel exhaust themselves, the wastepaper modernists picture instead the physical decay of the book’s own primary matter. Bringing together book history and media theory with detailed close reading, Wastepaper Modernism reveals modernist literature’s dark sense of itself as a ruin in the making.


2021 ◽  
Vol 12 (2) ◽  
pp. 121
Author(s):  
Fitriyani Tella ◽  
Imam Riadi ◽  
Sunardi .

Abstract In the era of technology, email has become one of the important things in the means of communication. Email is a medium for communication and also a place to store crime. One common crime is email spamming and spoofing. Spam is junk mail or unwanted messages, this spam email will be sent to someone's inbox and is useless to the recipient. Spam is sent on the network to increase network traffic. Email spoofing is a way to hide the origin of messages used by spammers. Email spoofing can change the email sender's information ie in the "From" field. Email spoofing comes from the sender which will make the email look like the real sender. The technique used to determine the comparison of email spoofing and spamming attacks using a method is the Network Forensics Development Life Cycle (NFDLC). Network forensics is performed to find out the IP address of the spamming and spoofing e-mail attacks. This research will also produce an email forgery pattern in the header, place and date of the perpetrators of the crime attacks.Keyword: articles, english, Abstracts Abstrak Pada Era teknologi sekarang email telah menjadi salah satu hal yang penting dalam sarana komunikasi. Email merupakan salah satu media untuk berkomunikasi dan juga menjadi tempat untuk menyimpan kejahatan. Salah satu kejahatan yang sering terjadi adalah email spamming dan spoofing.  Spam adalah junk mail atau pesan yang tidak diinginkan, spam email ini akan dikirimkan kepada inbox mail seseorang dan tidak berguna untuk penerima. Spam dikirim pada jaringan untuk meningkatkan lalu lintas jaringan. Email spoofing adalah cara untuk menyembunyikan asal usul pesan yang digunakan oleh spammer. Email spoofing dapat mengubah informasi pengirim email yaitu pada bidang “From”. Email spoofing berasal dari pengirim yang akan menjadikan email tampak seperti pengirim sebenarnya. Teknik yang dilakukan untuk mengetahui perbandingan dari serangan email spoofing dan spamming yaitu menggunakan metode adalah Network Forensics Development Life Cycle (NFDLC). Dilakukan forensik jaringan guna mengetahui ip address dari serangan email spamming dan spoofing tersebut. Penelitian ini juga akan menghasilkan pola pemalsuan email pada header,  tempat dan tanggal dari pelaku melakukan serangan kejahatan. Keyword: Forensik Jaringan, E-mail Spamming, E-mail Spoofing 


2020 ◽  
Vol 7 (4) ◽  
pp. 91-95
Author(s):  
Venkata RamiReddy Chirra ◽  
Hoolda Daniel Maddiboyina ◽  
Yakobu Dasari ◽  
Ranganadhareddy Aluru

Spam in email box is received because of advertising, collecting personal information, or to indulge malware through websites or scripts. Most often, spammers send junk mail with an intention of committing email fraud. Today spam mail accounts for 45% of all email and hence there is an ever-increasing need to build efficient spam filters to identify and block spam mail. However, notably today’s spam filters in use are built using traditional approaches such as statistical and content-based techniques. These techniques don’t improve their performance while handling huge data and they need a lot of domain expertise, human intervention and they neglect the relation between the words in context and consider the occurrence of the word. To address these limitations, we developed a spam filter using deep neural networks. In this work, various deep neural networks such as RNN, LSTM, GRU, Bidirectional RNN, Bidirectional LSTM, and Bidirectional GRU are used to a built spam filter. The experimentation was carried out on two datasets, one is a 20 newsgroup dataset, which contains multi-classes with 20,000 documents and the other is ENRON, a dataset contains 5,000 emails. The custom-designed models have performed well on both benchmark datasets and attained greater accuracy.


2020 ◽  
Vol 20 (S1) ◽  
Author(s):  
James K. Elrod ◽  
John L. Fortenberry

Abstract Background Direct marketing—the delivery of messages via mail, the Internet, and similar routes directly to consumers—is used extensively by healthcare organizations to attract and inform current and prospective patients of health and medical offerings and opportunities. Examples of direct marketing include direct-mail marketing, telemarketing, and Internet marketing, with routes being selected on the basis of their ability to reach desired audiences. The various avenues offered by direct marketing afford options to address most any sought group. Discussion Direct marketing is one of the most recognized forms of marketing communication, thanks in large part to its widespread use and direct engagement of consumers. While some applications clearly have the potential to irritate consumers (e.g., junk mail in post boxes, spam in email inboxes), direct marketing can be deployed in manners respectful of recipients and, in such cases, it can prove to be a helpful communications asset. To aid others in understanding this particular conveyance method, this article presents an overview of direct marketing and shares deployment insights and experiences from Willis-Knighton Health System. Conclusions Direct marketing provides a useful communications pathway, permitting health and medical institutions to educate and enlighten desired audiences. Given instances of overuse and misuse by organizations, however, great care must be taken to design and deploy direct marketing initiatives inoffensively. If well designed and respectfully implemented, direct marketing affords significant communications utility, earning a valued place in the marketing communications arsenals of healthcare establishments.


Spam is well defined as the unsolicited bulk messages or junk mail will send to email address or phone number that are generally marketable in nature and also carry malicious documents. The main issue of spam is that it can download malicious files which can attack the computers, smart phones and networks, utilize network bandwidth and storage space, degrades email servers and can cause attacks in our devices like spyware, phishing and ransomware. In the existing approach, an exploratory analysis of supervised machine learning algorithms has done and the performance has been evaluated. The drawback of existing approach is that the performance of supervised machine learning algorithms decreases as we increase the size of the dataset. In order to overcome such drawbacks, an efficient spam detection using recurrent neural networks using the BiGRU model has been proposed. By implementing this, it has been achieved with better accuracy of 99.07%. From this, it is concluded that BiGRU model has better performance than existing approaches.


2020 ◽  
Author(s):  
Wenhua Liang ◽  
Dan Liu ◽  
Min Li ◽  
Wei Wang ◽  
Qin Zheng ◽  
...  
Keyword(s):  

UNSTRUCTURED Dear Editor, Per your instruction, I have submitted a formal request to withdraw our manuscript 18108 on June 11th with an explanation for the withdraw and a scan of the signed letter. The same letter has been uploaded to your online system as well. I am sending this withdraw letter again due to the “request for a revised manuscript” email get to us again! Feel free to contact me should you have any question. But, please help DO NOT send any further junk mail to 40+ co-authors. It is really bad that we have submitted the withdraw petition several times with an explanation, but the system is still sending emails to all authorships. Best regards, Jian-Bing Fan (the corresponding author)


2019 ◽  
Vol 7 (2) ◽  
pp. 239
Author(s):  
Made Bagus Megawan ◽  
Ida Bagus Suryawan

This research was conducted to find out what kind of waste management is in the tourist attraction of Candikusuma Beach and how much participation and involvment of society in it. Garbage now becomes a crucial problem so it needs to be identified more about it’s management. Waste is a challenge in the implementation of tourism activities. Rubbish need to be addressed in maintaining Cleanliness (Kebersihan) and Beauty (Keindahan) of tourism attraction as an indicator in the Sapta Pesona. The methods used in this research is descriptive qualitative. The technique of determination of informants used is purposive sampling technique. Data sources used are primary and secondary data sources. Primary data in this research is sourced from direct observation to the research location by means of observation and interviews. While secondary data in this research are the data obtained from the documentation or studies library to complement the primary data from the Locus of the reserch. The results of research indicate that the existing waste management in coastal tourist attraction Candikusuma Beach is good, it’s just the involvement of the community in it has not been maximized and less care about coastal cleanliness, the identification process of this management using 3R process among others Reduce, Reuse Recycle. Origin of waste there is a large portion of it coming from the junk mail from upstream. Although there are still many things thet need to be addressed in order to make the management process better and maximum. Keyword : Waste, 3R Process, Society Participation.


Sign in / Sign up

Export Citation Format

Share Document