• Title/Summary/Keyword: E-Mail

Search Result 1,063, Processing Time 0.026 seconds

Spam Filter by Using X2 Statistics and Support Vector Machines (카이제곱 통계량과 지지벡터기계를 이용한 스팸메일 필터)

  • Lee, Song-Wook
    • The KIPS Transactions:PartB
    • /
    • v.17B no.3
    • /
    • pp.249-254
    • /
    • 2010
  • We propose an automatic spam filter for e-mail data using Support Vector Machines(SVM). We use a lexical form of a word and its part of speech(POS) tags as features and select features by chi square statistics. We represent each feature by TF(text frequency), TF-IDF, and binary weight for experiments. After training SVM with the selected features, SVM classifies each e-mail as spam or not. In experiment, the selected features improve the performance of our system and we acquired overall 98.9% of accuracy with TREC05-p1 spam corpus.

Design and Implementation of Integrated E-Coaching system Based on Synchronous and Asynchronous (동기/비동기 기반의 통합 E-코칭 시스템 설계 및 구현)

  • Kim, DoYeon;Kim, DoHyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.1-7
    • /
    • 2015
  • Until now, face to face coaching has been applied almost for completing the goal in various field. Face to face coaching is difficult always to reach each other anywhere, anytime due to the availability of internet and mobile devices. Recently, e-coaching is attempted to expend. But current e-coaching is supporting the secondary role for face to face coaching. E-coaching system has many benefits to use advancement technologies in internet. Therefore, the development of e-coaching system based on horizontal relationships between coach and coachee needs to communication anytime and anywhere in Internet. Usually previous online coaching systems have four types of interactions i.e. electronic mail, video chat, text chat, phone call. Most of the e-coaching approaches are easy to access and provide communication synchronous; video chat is an excellent visibility, whereas e-mail is asynchronous and document-centric. In this paper, we design and implement the integration e-coaching system based on synchronous and asynchronous. This system provides the asynchronous coaching offered by way of e-mail, and the synchronous coaching used P2P (Peer to Peer) video chat and text group chat. This system allows simultaneously asynchronous and synchronous coaching, and supports individual and group communication for periodical or informal coaching.

A Study on the Online-based one-stop private health insurance claims (온라인 기반 원스톱 실손의료보험료 청구에 관한 연구)

  • Lee, Kyounghak;Kang, Min-Soo;Lee, Jae-Yeul
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.231-237
    • /
    • 2016
  • The private health insurance covers areas that are not covered by the national health insurance to reinforce insurance guarantee. Realistically, however, many people renunciate small sum insurance claims because the inconvenient claim procedures require a certificate from the hospital for resubmission to the insurance company, which is very time consuming. Therefore, One-stop insurance payout claiming system that is capable of one stop processing of the issuance of e-page safer technology-based certification to claiming of insurance payout by utilizing authorized electronic address (#-mail) through the utilization of private information concealment technology and identification certification technology for the convenience of the subscribers and the simplification of operation was developed.

Spam-mail Filtering System Using Naive Bayesian Classifier and Message Rule (나이브 베이지안 분류자와 메세지 규칙을 이용한 스팸메일 필터링 시스템)

  • 조한철;조근식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04b
    • /
    • pp.223-225
    • /
    • 2002
  • 인터넷의 급속한 성장과 함께 E-Mail은 대표적인 통신수단의 하나가 되어버렸다. 편리하다는 점을 이용해서 엄청난 양의 스팸메일이 매일같이 쏟아져 오고 , 그 문제점의 심각성에 정보통신부에서 정보통신망 이용촉진 및 정보보호 등에 관한 법률이라는 새로운 법률까지 생겨났다. 본 논문에서는 이 법률에서 요구하는 '광고'라는 문구를 걸러내는 등의 메시지 규칙을 갖는 시스템과 기존의 문서 분류에 널리 쓰이던 나이브 베이지안 분류자(Naive Baesian Classifier)를 결합한 스팸 메일 필터링 시스템(Spam-mail Fitering System)을 제안한다. 제안된 시스템에서는 사용자가 직접 규칙을 작성할 필요없이 학습한 데이터를 갖고 자동으로 스팸메일을 분류할 수가 있다. 들어온 메일은 메시지 규칙 기반 필터가 먼저 적용되고, 메세지 규칙 기반 필터에서 분류되지 않으면 나이브 베이지안 필터에서 분류된다. 실험에서는 제안된 시스템의 성능을 평가하기 위해서 메시지 규칙을 사용한 시스템 및 나이브 베이지만 분류자 시스템과 비교 평가하였다. 또한 임계치를 변경함으로써 제안된 시스템의 성능을 높일 수있도록 하였다.

  • PDF

Design and Implementation of Secure Mail System for Firewall System (칩입차단시스템에서 안전한 메일시스템 설계 및 구현)

  • 조영남;전문석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.303-305
    • /
    • 1999
  • 정보화 시대를 맞이하여 인터넷의 빠른 성장을 이끌고 있는 대표적인 서비스가 바로 E-mail이다. 그만큼 다른 서비스보다 대중적이라 할 수 있다. 그러나 다른 서비스와 마찬가지로 보안상 많은 문제점을 가지고 있다. 첫째로 메일서비스 시스템 자체의 보안상 허점을 이용해서 시스템에 침입, 파괴 활동을 할 수 있으며, 둘째로 메일의 기밀성 및 무결성이 확보되지 않아서 안전한 전달이 이루어질 수 없다. 본 논문에서는 위에서 언급했던 문제점들을 극복할 수 있는 해결책을 침입차단 시스템에서 모색하려 한다. UNIX에서 가장 공통적인 SMTP 서버가 Sendmail이다. Sendmail은 매우 강력하지만 오랫동안 크고 작은 보안 문제를 가지고 있다. 다른 종류의 메일러에는 smail3, MMDF, Z-Mail이 있지만 현재의 Sendmail보다 더 안전하지는 못하다. 본 논문에서 Senmail의 문제점을 알아보고 해결방법을 찾아낸다. 또한 메일의 내용의 기밀성 및 무결성, 송신 부인 방지, 수신 부인 방지를 위한 방법에 대하여 논의해 본다.

  • PDF

Influence of mass and contact surface on pounding response of RC structures

  • Khatiwada, Sushil;Larkin, Tam;Chouw, Nawawi
    • Earthquakes and Structures
    • /
    • v.7 no.3
    • /
    • pp.385-400
    • /
    • 2014
  • Pounding damage to bridges and buildings is observed in most major earthquakes. The damage mainly occurs in reinforced concrete slabs, e.g. building floors and bridge decks. This study presents the results from pounding of reinforced concrete slabs. A parametric investigation was conducted involving the mass of the pendulums, the relative velocities of impact and the geometry of the contact surface. The effect of these parameters on the coefficient of restitution and peak impact acceleration is shown. In contrast to predictions from numerical force models, it was observed that peak acceleration is independent of mass. The coefficient of restitution is affected by the impact velocity, total participating mass and the mass ratio of striker and struck block.

Design and Implementation of a Improved Cipher Web Mail System using a Chaos Cipher (카오스 암호를 이용한 개선된 암호화 웹 메일 시스템의 설계와 구현)

  • Kim Dae-Young;Kim Tae-Sik
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.437-444
    • /
    • 2006
  • A chaos cipher system that focuses on the stream cipher system has a demerit that the longer the text is, the slower the speed of the encryption and description and the transmission and reception. On this study, we designed the cipher web mail system showing much better capabilities than the existing web mail system as the text is longer. In the embodiment of the cipher web mail system, we developed the key stream, the encryption and description of the text and the inside and outside mail viewer and so on. After the efficiency test, it was valued high in the respect of the speed of the encryption and description and the transmission and reception. And it made up for the defect of the stream cipher system. We expect that we can use it through the persistent applied study in the server system security, the file security, the security of the internet information, the protection of the e-commerce system information and other fields based on the cipher technique as the wide use cipher system that can replace the block cipher system.

A Study on the Opt-in Marketing

  • OH, Won-Kyo;LEE, Won-Jun
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.49-59
    • /
    • 2020
  • Purpose: Online and social media and mobile shopping are increasing and companies are required to provide personal information in order to supplement the non-invasive characteristics of the channels. With the increased provision of personal information, consumers' personal and social concerns about the prevention of personal information infringement are also increasing, and in response, personal or opt-in marketing has emerged to compensate for reckless information abuse. Despite the background of this emergence, the existing prior studies are limited to ignoring the negative feelings of consumers in the real world, including only the net function and positive effect of the opt-in mail. Research design, data and methodology: The research framework was intended to utilize the impact of human marketing activities on consumer attitudes combined with positive and negative factors. Factors that positively affect attitudes toward permation marketing were presented, such as informality, and perceived risks were presented as negative impact factors. Also, based on previous prior research, the prior factors of opt-in marketing were to present the effect on purchase intent through the medium of attitude toward opt-in marketing. Results: In this study, we used the framework of a two factor theory to address positive and negative factors as a leading factor in the customer attitude toward opt-in mail advertising, and as a result, functionality and personalization have a positive effect on customer attitude and perceived risk have a negative impact on customer attitude. In addition, it was confirmed that the customer attitude formed this way affects the intention to purchase again. Conclusions: This study suggests that we have demonstrated that marketing, an opt-in marketing that has been recognized as part of marketing that is deployed after obtaining customer consent, has been applied without any other marketing methodology. E-mail advertising at this point also provides practical implications that the system safeguards are in place under an opt-in protocol or system, and that even if an e-mail advertisement is carried out, customers will need to look at the level of awareness about the risks, and suggests that they need to consider the customer's journey that could lead to purchase at the content level.

Development of Information Sharing and Management System for Closed User Group (폐쇄 사용자 그룹을 위한 정보공유 관리 시스템의 개발)

  • Huh, Mi-Young;Hyun, Wook;Kang, Shin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.324-327
    • /
    • 2000
  • There are developing the World Wide Web systems for their information sharing among certain closed user group. These systems are required five common functions as follows. First, they have to support the web service for Internet users to access easily. Second, Hey have to support the authorization service to confirm the allowed users. Third, they have to support the database service to manage the sharing information among users. Fourth, they have to support the bulletin board service for closed users to discuss. Fifth, they have to support the e-mail service to send e-mail to the certain user subset and mail archive service to save and manage the previous mail information. In this paper, we described the detail function and processing procedure of our implemente system under LINUX operating system. In addition, we described problems occurring in implementation and their solutions.

  • PDF

Ransomware Analysis and Method for Minimize the Damage (랜섬웨어 분석과 피해 최소화 방안)

  • Moon, Jaeyeon;Chang, Younghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.1
    • /
    • pp.79-85
    • /
    • 2016
  • Ransomware was a malicious code that active around the US, but now it spreads rapidly all over the world and emerges in korea recently because of exponential computer supply and increase in users. Initially ransomware uses e-mail as an attack medium in such a way that induces to click a file through the spam mail Pam, but it is now circulated through the smart phone message. The current trend is an increase in the number of damage, including attacks such as the domestic large community site by ransomware hangul version. Ransomware outputs a warning message to the user to encrypt the file and leads to monetary damages and demands for payment via bitcoin as virtual currency is difficult to infer the tracking status. This paper presents an analysis and solutions to damage cases caused by ransomware.