CEAI: CCM-based email authorship identification model

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CEAI: CCM based Email Authorship Identification Model

In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some more interesting and effective features for email authorship identification (e.g. the last punctuatio...

متن کامل

An Automata Based Authorship Identification System

AN AUTOMATA BASED AUTHORSHIP IDENTIFICATION SYSTEM by Shangxuan Zhang This thesis gives a design and implementation for an authorship identification system based on automata modeling. The writing samples of an author were collected to build a tree and use the ALERGIA algorithm to merge all the compatible states of the tree in order to get a stochastic finite automaton. This automaton represents...

متن کامل

Visualizing Authorship for Identification

As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this study we created an authorship visualization called Writeprints that can help identify individuals based on their writing style. The visualization creates unique writing style patterns that can be automatically identifie...

متن کامل

mortality forecasting based on lee-carter model

over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...

15 صفحه اول

Email FI identification and resolution with model checking

Internet applications, such as Email, VoIP and WWW, have been enhanced with features. However, the introduction and modification of features may result in undesired behaviors, and this effect is known as feature interaction (‘‘FI’’). Among other methods, constraint logic programming and model checking have been adopted to address the two main problems in telephony FIs: detection and resolution....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Egyptian Informatics Journal

سال: 2013

ISSN: 1110-8665

DOI: 10.1016/j.eij.2013.10.001