CEAI: CCM-based email authorship identification model
نویسندگان
چکیده
منابع مشابه
CEAI: CCM based Email Authorship Identification Model
In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some more interesting and effective features for email authorship identification (e.g. the last punctuatio...
متن کاملAn Automata Based Authorship Identification System
AN AUTOMATA BASED AUTHORSHIP IDENTIFICATION SYSTEM by Shangxuan Zhang This thesis gives a design and implementation for an authorship identification system based on automata modeling. The writing samples of an author were collected to build a tree and use the ALERGIA algorithm to merge all the compatible states of the tree in order to get a stochastic finite automaton. This automaton represents...
متن کاملVisualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this study we created an authorship visualization called Writeprints that can help identify individuals based on their writing style. The visualization creates unique writing style patterns that can be automatically identifie...
متن کاملmortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولEmail FI identification and resolution with model checking
Internet applications, such as Email, VoIP and WWW, have been enhanced with features. However, the introduction and modification of features may result in undesired behaviors, and this effect is known as feature interaction (‘‘FI’’). Among other methods, constraint logic programming and model checking have been adopted to address the two main problems in telephony FIs: detection and resolution....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Egyptian Informatics Journal
سال: 2013
ISSN: 1110-8665
DOI: 10.1016/j.eij.2013.10.001