• Title/Summary/Keyword: e-mail classification

Search Result 62, Processing Time 0.02 seconds

E-mail Based Data Mining Agent for Multimedia Questionnaire Classification (이메일 방식을 사용한 멀티미디어 웹 설문지 관리 시스템)

  • Yoon, Young-Mi;Kwak, Mi-Ra;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2831-2833
    • /
    • 2002
  • 최근 인터넷의 대중화와 함께 설문조사 기법이 발전하면서 '사이버 설문조사'의 활용범위가 넓어지고 있다. 웹을 중심으로 진행되는 사이버 설문조사는 적은 비용으로 단시간내 여론을 알 수 있는 장점이 있지만, 서버와 네트워크에 과다한 트래픽을 유발한다. 본 논문은 이러한 단점을 보완하기 위해 이메일 방식을 사용한 멀티미디어 웹 설문지 관리 시스템을 설계 및 구현하였다. 본 시스템은 POP3로 수신된 설문메일을 가져와 처리함으로써 기존의 인터텟상에서 이루어지는 설문조사와는 달리 웹 데이터베이스를 사용하지 않는다. 따라서, 서버의 트래픽을 줄이고, 수신된 설문메일의 설문형태에 따른 키워드로 답변을 필터링하여 잘못된 응답메일은 자동으로 발신하고 제대로 수신된 메일은 문항별로 응답을 데이터베이스에 저장한다. 또한, 기존의 단순한 설문형태를 벗어나 동영상과 사운드를 이용한 멀티미디어 설문메일을 통해 다양한 설문조사가 가능하며 이메일을 이용함으로써 사용자가 직접 설문사이트에 전속하지 않아도 되는 편리함을 제공한다.

  • PDF

Automatic Categorization of Real World FAQs Using Hierarchical Document Clustering (계층적 문서 클러스터링을 이용한 실세계 질의 메일의 자동 분류)

  • 류중원;조성배
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.05a
    • /
    • pp.187-190
    • /
    • 2001
  • Due to the recent proliferation of the internet, it is broadly granted that the necessity of the automatic document categorization has been on the rise. Since it is a heavy time-consuming work and takes too much manpower to process and classify manually, we need a system that categorizes them automatically as their contents. In this paper, we propose the automatic E-mail response system that is based on 2 hierarchical document clustering methods. One is to get the final result from the classifier trained seperatly within each class, after clustering the whole documents into 3 groups so that the first classifier categorize the input documents as the corresponding group. The other method is that the system classifies the most distinct classes first as their similarity, successively. Neural networks have been adopted as classifiers, we have used dendrograms to show the hierarchical aspect of similarities between classes. The comparison among the performances of hierarchical and non-hierarchical classifiers tells us clustering methods have provided the classification efficiency.

  • PDF

A Knowledge-based Folder Recommendation Procedure for e-mail Classification (사용자의 지식을 반영한 메일 폴더추천에 관한 방법론)

  • 류미;김재경
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2004.11a
    • /
    • pp.349-357
    • /
    • 2004
  • 최근 메일이 커뮤니케이션의 중요한 수단 중 하나로 자리잡고 있으나 과다한 정보 전달 및 원하는 않는 정보의 전달 등으로 인해 사용자가 메일을 확인하고 정리하기 위해 많은 시간과 노력을 투자하고 있다. 본 연구에서는 사용자가 적은 시간과 노력으로 메일을 활용하고, 보다 편리하게 사용할 수 있는 폴더 추천 방법론 개발을 목표로 하고 있다. 이러한 목표를 위해 TF-IDF를 기반으로 하는 다양한 방법론이 개발되고 활용되어 왔으나, 메일이라는 영역의 특성상 단어의 수나 내용에 한계가 있는 경우 안정적인 추천이 이루어지지 못할 수 있었다. 따라서 본 연구에서는 기존의 TF-IDF 방법에 사용자의 지식을 부여한 새로운 방법을 제시함으로써 단어의 수나 내용에 한계가 있는 경우에도 안정적인 추천이 이루어질 수 있도록 하였다. 또한 실제 데이터를 활용하여 기존의 방법과 본 연구에서 제시한 방법론을 비교 실험해 봄으로써, 본 연구에서 제시하고 있는 방법론의 성능을 입증하고자 하였다.

  • PDF

Effective Marketing Module to the Optimization of Consumer Information in Mid-small e-Commerce Shopping Mall (중소 전자상거래 기업의 소비자정보 최적화를 위한 효율적 마케팅 모듈: e-CRM 연동전략을 중심으로)

  • Kim, Yeon-Jeong
    • Journal of Global Scholars of Marketing Science
    • /
    • v.14
    • /
    • pp.125-144
    • /
    • 2004
  • The purpose of this study is to classify customer bye-mailing responsiveness on time-series analysis and RFM module and testify the effectiveness of grouping by ROI analysis. RFM (Recency, Frequency, Monetary Value) analysis are used for customer classification that is fundamental process of e-CRM application. ROI analysis were consisted of open, click-through, duration time, conversion rate, personalization and e-mail loyalty index. Major findings are as follows; Customer segmentation were loyal customer, odds customer, dormant customer, secession customer and observation customer by Activity email module. And Loyal, dormant and secession customer are segregated by RFM module. Loyal customer group have higher point of all ROI index than other groups. These results indicated that customer responsiveness of e-mailing and RFM analysis were appropriate methods to grouping the customer. Mid-small Internet Biz adapted marketing strategy by optimization of consumer information.

  • PDF

A Study On Managing Electronic Mail Messages as Records of Public Institutions (공공기관의 이메일기록 관리 방안 연구)

  • Song, Ji Hyoun
    • The Korean Journal of Archival Studies
    • /
    • no.15
    • /
    • pp.141-183
    • /
    • 2007
  • It is not an overstatement that nowadays electronic mails are communicated more frequently as well as conveniently than phones and facsimiles, not only in routine life hot also in business transactions. Also, it is evident that emails will be used more and more as a communication method between internal and external organizations. If the information transferred and received via emails takes a role of business records, it is no wonder that emails should be uniformly managed as public records. Currently, however, specific policies or guidelines for the management of email records are not available, nor do most of public employees realize that emails are the actual records of the organization. In fact, the three research methods have been used for this study in the purpose of the establishment of email records management scheme. First of all, bibliographic research has been conducted in an effort to describes the definition and types of email records indicated in the guidelines of each nation, as well as the differences from the transitory email messages. Secondly, email management guidelines and policies of public institutions of England, The United States, Australia, and Canada, so-called the advanced countries of the records management, have been analyzed to examine the advanced examples of email management. In order to manage email records effectively, the functional requirements - capture, classification, storage, access, tracking, disposition, and role and responsibility were categorized in this thesis, based on the ISO 15489. As the designs of these foreign guidelines vary one another, common factors of them were extracted to be included in the realm of the seven stages. Lastly, this thesis has analyzed characteristics of the email system within the Electronic Document Management System of existing administrative institutions. Also, it has examined the overall environment of the email records management of public institutions and sought out its improvement. In essence, focused on the crucial factors on email management drawn out from the email management guidelines of foreign nations and the analysis of the policies, this thesis proposes an email records management scheme for Korean public intuitions, as well as an email management model suitable for forthcoming e-government era.

Reliability of the Visual Discrimination Scale on Oral Mucosa Pressure Ulcer for Healthcare Providers (의료인을 위한 구강점막욕창 시각적 감별도구의 신뢰도)

  • Uhm, Ju-Yeon;Kim, Myoung Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.443-450
    • /
    • 2020
  • The purpose of this study was to examine the inter-rater and intra-rater reliability of the oral mucosa pressure ulcer classification system based on the photographs. The study consisted of two stages; development and evaluation. In the developmental stage, 9 photographs of 82 were selected. In the evaluation stage, a total of 49 participants were invited web-based survey by e-mail. Cohen's weighted kappa and Krippendorff's alpha were used to define the inter-rater reliability. Nine photographs consisted of two, three, three, and one in normal, stage 1, stage 2, and stomatitis, respectively. The inter-rater reliabilities of wound care nurse specialist, intensive care nurse specialist, and dentist groups were 0.75, 0.70, and 0.78, respectively. The intra-rater reliability was 0.73. The inter-rater and intra-rater reliabilities of the oral mucosa pressure ulcer classification system showed substantially good agreement.

Spammer Detection using Features based on User Relationships in Twitter (관계 기반 특징을 이용한 트위터 스패머 탐지)

  • Lee, Chansik;Kim, Juntae
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.785-791
    • /
    • 2014
  • Twitter is one of the most famous SNS(Social Network Service) in the world. Twitter spammer accounts that are created easily by E-mail authentication deliver harmful content to twitter users. This paper presents a spammer detection method that utilizes features based on the relationship between users in twitter. Relationship-based features include friends relationship that represents user preferences and type relationship that represents similarity between users. We compared the performance of the proposed method and conventional spammer detection method on a dataset with 3% to 30% spammer ratio, and the experimental results show that proposed method outperformed conventional method in Naive Bayesian Classification and Decision Tree Learning.

E-mail Classification Using Dynamic Category Hierarchy and Automatic Generation of Category Label (분류 주제 자동 생성 및 동적분류체계 방법을 이용한 이메일 분류)

  • Ahn, C.M.;Park, S.;Park, S.H.;Choi, B.K.;Lee, J.H.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.439-441
    • /
    • 2004
  • 이메일 사용이 보편화됨에 따라 점차 수신되는 메일의 량이 증가하고 있다. 이러한 메일 량의 증가는 사용자로 하여금 이메일을 좀더 효율적으로 분류할 수 있는 방법을 필요하게 한다. 그러나 현재의 이메일 분류는 규칙기반, 베이시안, SVM 등을 이용하여 스팸메일을 필터링 하는 이원분류가 주로 연구되고 있다. 이외에도 다원분류에 대한 연구로는 클러스터링을 이용한 방법이 있으나, 이는 단순히 유사도에 의해 메일을 묶는 수준에 그치고 있다. 본 논문에서는 벡터모델의 유사도를 기반으로 한 분류 주제 자동 생성 알고리즘과 동적분류체계 방법을 결합하여 새로운 이메일 자동 다원분류 방법을 제안했다. 본 논문에서 제안한 방법은 이메일을 자동으로 분류하여, 분류된 결과를 색인검색과 디렉토리 검색 방법을 지원하며 대량의 메일도 효율적으로 관리할 수 있다. 또한 메시지를 동적으로 재분류 할 수 있게 함으로써 디렉토리 검색시 재현율을 높였다.

  • PDF

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.

A Study on Spam Document Classification Method using Characteristics of Keyword Repetition (단어 반복 특징을 이용한 스팸 문서 분류 방법에 관한 연구)

  • Lee, Seong-Jin;Baik, Jong-Bum;Han, Chung-Seok;Lee, Soo-Won
    • The KIPS Transactions:PartB
    • /
    • v.18B no.5
    • /
    • pp.315-324
    • /
    • 2011
  • In Web environment, a flood of spam causes serious social problems such as personal information leak, monetary loss from fishing and distribution of harmful contents. Moreover, types and techniques of spam distribution which must be controlled are varying as days go by. The learning based spam classification method using Bag-of-Words model is the most widely used method until now. However, this method is vulnerable to anti-spam avoidance techniques, which recent spams commonly have, because it classifies spam documents utilizing only keyword occurrence information from classification model training process. In this paper, we propose a spam document detection method using a characteristic of repeating words occurring in spam documents as a solution of anti-spam avoidance techniques. Recently, most spam documents have a trend of repeating key phrases that are designed to spread, and this trend can be used as a measure in classifying spam documents. In this paper, we define six variables, which represent a characteristic of word repetition, and use those variables as a feature set for constructing a classification model. The effectiveness of proposed method is evaluated by an experiment with blog posts and E-mail data. The result of experiment shows that the proposed method outperforms other approaches.