Automated Ham-Spam Lexicon Generation Based on Semantic Relations Extraction

Automated Ham-Spam Lexicon Generation Based on Semantic Relations Extraction

Ayman E. Khedr (Faculty of Computers and Information Technology, Future University in Egypt, New Cairo, Egypt), Amira M. Idrees (Faculty of Computers and Information, Fayoum University, Egypt) and Essam Shaaban (Information Systems Department, Beni-Suef University, Beni Suef, Egypt)
Copyright: © 2020 |Pages: 20
DOI: 10.4018/IJeC.2020040104

Abstract

One of the current essential methods for communication is electronic email (e-mail). It is currently considered the official method for different business activities such as conducting agreements, the setup of official meetings, and team collaboration. This continuous interest in e-mails as a communication channel has drawn the attention to the need for eliminating spam which have a vital effect on both network resources and business activities. This research focuses on generating a ham-spam lexicon based on text analysis which is aimed to be one of the main resources for detecting personal spam e-mails. The lexicon generation is a key step to efficiently and economically successful spam elimination. The proposed framework has proven its applicability on a dataset of six groups and the classification algorithms have been examined to prove the efficient classification. The research is a step in a wider view for general intelligent business communication and collaboration framework.
Article Preview
Top

Literature Review

Mining Techniques are currently the key factor for different research in different fields including healthcare systems (Khedr, Kholeif, & Saad, 2017) and education systems (Khedr, Kholeif, & Hessen, 2015). Manipulating these techniques has proved to provide high accuracy in the discovery process such as in (Sultan, Khedr, Idrees, & Kholeif, 2017) which proposed an enhancement in FP-growth associations rules mining algorithm. Other examples are presented in (Khedr, Idrees, & Elseddawy, 2016; Khedr & Borgman, 2006) which proposed a successful enhancement classification mining techniques. Segments of information with different nature are targeted due to the variety of their usage such as in (Khedr & Kok, 2006) for banking data, (Khedr, 2013) for risk management data, and (Khedr, Kholeif, & Hessen, 2015) for learning data. In this section, the research will focus on two consecutive subjects, text analysis with demonstrating its applications and related fields, then a focus on the research for detecting spams from e-mails is discussed.

Complete Article List

Search this Journal:
Reset
Open Access Articles
Volume 17: 4 Issues (2021): 1 Released, 3 Forthcoming
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing