Mail Filtering Algorithm Based on the Feedback Correction Probability Learning

2013 ◽  
Vol 756-759 ◽  
pp. 1013-1016
Author(s):  
Xiao Yun Zou

With the popularity of the Internet, e-mail with its fast and convenient advantages has gradually developed into one of the important communication tools in people's lives. However, the problem of followed spam is increasingly severe, it is not only the dissemination of harmful information, but also waste of public resources. To solve this problem, the author proposed a mail filtering algorithm based on the feedback correction probability learning. The feedback correction probability training has less feedback learning data and use error-driven training in order to achieve a high classification effect. The experiment also tested the idea.

Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


Author(s):  
Nasreen Abdel - Ilah Zahra

The study was used to study the reality of the use of postgraduate students for e- mail. The descriptive descriptive method was used. The questionnaire was used as a tool for study، which averaged 1.99 and a standard deviation of 0.61. It was applied to 45 students from post- Different The results showed that postgraduate students have a desire to use e- mail in university education and to communicate with colleagues and faculty members. However، there are obstacles to their use. The faculty members do not encourage students to use e- mail، lack e- mail skills، Access to the internet laboratory at the college، the reluctance of faculty members to give their email address to students، network problems (slow) In the light of the results، a set of recommendations and proposals were presented to activate the use of e- mail in university education، especially among postgraduate students in the Faculty of Education and various Syrian and Arab universities


Author(s):  
Cao Liu ◽  
Shizhu He ◽  
Kang Liu ◽  
Jun Zhao

By reason of being able to obtain natural language responses, natural answers are more favored in real-world Question Answering (QA) systems. Generative models learn to automatically generate natural answers from large-scale question answer pairs (QA-pairs). However, they are suffering from the uncontrollable and uneven quality of QA-pairs crawled from the Internet. To address this problem, we propose a curriculum learning based framework for natural answer generation (CL-NAG), which is able to take full advantage of the valuable learning data from a noisy and uneven-quality corpus. Specifically, we employ two practical measures to automatically measure the quality (complexity) of QA-pairs. Based on the measurements, CL-NAG firstly utilizes simple and low-quality QA-pairs to learn a basic model, and then gradually learns to produce better answers with richer contents and more complete syntaxes based on more complex and higher-quality QA-pairs. In this way, all valuable information in the noisy and uneven-quality corpus could be fully exploited. Experiments demonstrate that CL-NAG outperforms the state-of-the-arts, which increases 6.8% and 8.7% in the accuracy for simple and complex questions, respectively.


Author(s):  
Ramesh Palanisamy ◽  
Mohammed Tariq Shaikh ◽  
Senthil Jayapal ◽  
Darla Thomas

Nowadays phishing can be considered one of the simplest and oldest ways to steal important data from users on the internet. And only by collecting a small quantity of data about victim the attacker will be able to produce personalized and plausible e-mail. However, these days more ways that are trying to be found and new technologies are inventive to deal with phishing. In this paper, I will present type, cause, prevention measures and dynamic features for growing phishing attacks.


Recently, the market of E-Learning is soaring and is known as a new paradigm in modern education. E-Learning acts as a medium, consisting of several types of computers and electronic media that are communication tools as well as the Internet, which provides training and informative access on certain subjects. By using E-Learning students can attend online classes anywhere, regardless of time and place. Generally, E-Learning is more geared towards self-training and is ideal for individuals who work full-time but desire to further their studies. Thus, this study has been developed and integrated with factors leading towards the effectiveness of E-Learning as a tool in Teaching and Learning (T&L) approach. A quantitative approach was applied by using a self-administered distribution of questionnaire targeted at higher education students. Therefore, the outcomes of this research will help to provide insightful information to the current education system in Malaysia, particularly in crafting strategies to enhance the learning education for the country in general.


Sign in / Sign up

Export Citation Format

Share Document