• Title/Summary/Keyword: #-mail

Search Result 1,927, Processing Time 0.029 seconds

A Study on the Extraction of E-mail Region in Unconstraint Calling Card Images (무제약 명함 영상에서의 E-mail 영역 검출에 관한 연구)

  • 신상철;정재영
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.183-189
    • /
    • 2002
  • In this paper, we propose an algorithm to extract the E-mail address in calling card images. Firstly, text regions are separated from background. in the image. To do this, the properties of e-mail addresses and the texture features in the image is used. And then, each text region is explored to find the candidates of e-mail region. Finally, each candidate is divided into characters to find at-symbol(@), that is, e-mail region. The experimental results show hit-ratio over 93.3% for the various kind of calling cards containing different fonts, background images, caricatures.

  • PDF

E-mail System Model based on Ethereum (이더리움 기반 이메일 시스템 모델)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.99-106
    • /
    • 2017
  • With the advent of virtual money such as bit coins, interest in the block chain is increasing. Block Chain is a technology that supports Distributed Ledger and is a versatile technology applicable to various fields. Currently, the block chain is conducting research for various applications such as virtual money, trade finance, marketplace, power market, image contents service, and IoT. The technologies that make up the block chain are smart contract, digital signature/hash function and consensus algorithm. And these technologies operate on P2P networks. In this paper, we have studied e-mail system based on the ethereum which is one of the block chain based technologies. Most legacy mail systems use SMTP and the POP3/IMAP protocol to send and receive e-mail, and e-mail use S/MIME to protect the e-mail. However, S/MIME is vulnerable to DDoS attacks because it is configured centrally. And it also does not provide non-repudiation of mail reception. To overcome these weaknesses, we proposed an e-mail system model based on ethereum. The proposed model is able to cope with DDoS attack and forgery prevention by using block chain based technology, and reliable recording and management among block chain participants are provided, so that it is possible to provide a non-repudiation function of e-mail transmission and reception.

A spam mail blocking method using collection and frequency analysis (수집과 빈도분석을 통한 스팸메일 차단 방법)

  • Baek Ki-Young;Kim Seung-Hae;Choi Jang-Won;Ryou Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.137-146
    • /
    • 2005
  • The email using internet is situated by means of basic communication method that ordinardy people use. Thereby damage scale of the spam mail becomes wider. The many blocking methods of the spam mail are proposed and archived. Hut they are insufficient to block various types of spam mail The blocking method of spam mail proposed by this paper is consisted of 3 steps (collection, frequency analysis and blocking). It can effectively block various types of spam mail using collected spam mail and various forms of spam mail that changes.

Sender Authentication Mechanism based on SW Security Card with PGP for Secure E-mail (SW 형태의 보안카드와 PGP 기반 안전한 E-mail 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.3
    • /
    • pp.57-66
    • /
    • 2007
  • E-mail system is considered as a most important communication media, which can be used to transmit personal information by internet. But e-mail attack also has been increased by spoofing e-mail sender address. Therefore, this work proposes sender verification faculty for spam mail protection at sender's MTA by using security card for protection forged sender and also for authenticating legal sender. Sender's mail MT A requests security card's code number to sender. Then sender input code number and generate session key after sender verification. Session key is used to encrypt sender's signature and secure message transmission. This work can provide efficient and secure e-mail sender authentication with sender verification and message encryption.

  • PDF

Optimal Process Plan for the Mail Sorting Machine (순로구분기 최적운영방안에 관한 연구)

  • Im, Jun-Muk;;Wang, Seung-Jin;Choe, Han-Yong;Gang, Jin-Gyu;Bae, Seong-Min
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.115-118
    • /
    • 2004
  • Recently, mail center considers introducing the automatic mail sorting machine to improve the productivity of sorting process. This paper deals with the development of optimal process plan for the mail sorting machine. We suggest several alternatives and evaluate them throughout the process analyzing method.

  • PDF

Designed of Intelligent E-mail Knowledge Management System (지능형 E-mail 지식관리시스템 설계)

  • 박시일;김두현;김용성
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10d
    • /
    • pp.310-312
    • /
    • 2002
  • 본 논문에서는 E-mail을 적용한 지능형 E-mail 지식관리시스템을 제안하고자 한다. E-mail은 사용자에게 익숙하고, 정형화된 정보로 표현이 쉽고, 이미 많이 구축되어 있는 시스템이다. 이러한 E-mail의 정보를 활용하여 사용자에 따라 지식을 평가하고, 지식그룹 생성이 가능한 지식 관리 시스템을 설계한다. 이를 위해서 클러스터링을 이용해 지식간의 유사 정도에 따라 유사한 지식을 그룹화 시키는 지식그룹(Knowledge Group) 생성 알고리즘을 제안하고 사용자의 선호도(preference)를 반영하기 위해 사용자 프로파일(User Profile)을 설계하고, 사용자의 선호도에 적합한 지식을 검색하는고리즘을 제안한다.

  • PDF

An Algorithm of E-mail Region Extraction in a Calling Card Image (명함 영상에서의 E-mail 영역 검출 알고리즘)

  • 신상철;권미숙;정재영
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.336-342
    • /
    • 2002
  • 통신 수단의 발달로 인터넷을 이용한 E-mail이 활성화된 지금 명함에서 E-mail정보는 빠지지 않고 표기된다. 만약 수작업으로 관련 정보를 입력했던 것을 명함이미지에서 E-mail을 자동으로 추출한다면 유용할 것이다. 본 논문에서는 명함 영상에서 E-mail 영역을 검출하기 위한 텍스처 특성을 분석하여 텍스트 영역을 분할하고 연결화소를 이용한 개별문자 추출 방법을 통해 at symbol@을 인식하는 방법에 관하여 논한다.

  • PDF

Improved Spam Filter via Handling of Text Embedded Image E-mail

  • Youn, Seongwook;Cho, Hyun-Chong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.401-407
    • /
    • 2015
  • The increase of image spam, a kind of spam in which the text message is embedded into attached image to defeat spam filtering technique, is a major problem of the current e-mail system. For nearly a decade, content based filtering using text classification or machine learning has been a major trend of anti-spam filtering system. Recently, spammers try to defeat anti-spam filter by many techniques. Text embedding into attached image is one of them. We proposed an ontology spam filters. However, the proposed system handles only text e-mail and the percentage of attached images is increasing sharply. The contribution of the paper is that we add image e-mail handling capability into the anti-spam filtering system keeping the advantages of the previous text based spam e-mail filtering system. Also, the proposed system gives a low false negative value, which means that user's valuable e-mail is rarely regarded as a spam e-mail.

Development of a Transportation Planning System for the Mail Transportation Network (우편운송망에서의 운송편 관리를 위한 교환/집중국망 상시조정시스템 개발)

  • Choi, Ji-Young;Kim, Wan-Seok;Park, Jong-Heung;Lee, Tae-Han
    • IE interfaces
    • /
    • v.21 no.1
    • /
    • pp.120-130
    • /
    • 2008
  • In this paper, we develop a transportation planning system for the mail transportation network, which consists of 25 mail centers and one mail exchange center. The main functions of the system are adjustment of transportation plan, creation of new transportation plan, and calculation of expected exchange mail volume which are transported through mail exchange center. We develop an adjusting algorithm which gives a new transportation plan by deleting, adding or changing the current routes. The algorithm based on the transportation results of current transportation plan and mail volume data. We design and implement a planning system by installing the algorithm as the planning engine. For the practical use, the system is connected to the information system of Korea Post, PostNet.

An Architecture for Certificate and Agent Based E-mailing to Block Spam Mail

  • Nam, Sang-Zo
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.2
    • /
    • pp.39-50
    • /
    • 2003
  • Deleting unsolicited email, popularly known as spam mail, is an annoying task for Internet users. Moreover, spam mail causes a variety of social problems. At present, legal restrictions cannot eradicate spam senders. As a result, many technical methods to eliminate spam mail such as spam filtering and online stamps have been introduced. However, the process of blocking spam mail can inadvertently result in suspension of indispensable or beneficial communication. In this paper, we propose a certificate and agent based emailing architecture that can block spam mail, while at the same time approve certified mail. This architecture can be accelerated by synergistic utilization of digital signature and electronic document interchange.

  • PDF