Open Access
Subscription Access
Open Access
Subscription Access
Efficient Email Classification Approach Based on Semantic Methods
Subscribe/Renew Journal
Considering the manner that of its ease, efficiency and ampleness, guileless Bayes (NB) has continued being likely the most notable 10 estimations inside the mastery mining and AI person’s crew. Of unique techniques to a good deal helpfully its unexpected possibility doubt, the characteristic weighting has put extra emphasis on essentially insightful functions than those that are extensively much less perceptive. Right currently, combat that for NB drastically perceptive capabilities have to be definitely related with the type (most outrageous simple noteworthiness), however uncorrelated with first-rate features (least regular redundancy). In angle on this reason, we propose an association hooked up perspective weighting (CFW) channel for NB [1, 2, 3].
Keywords
Correlation, Feature weighting, Mutual Information, Mutual Redundancy, Mutual Relevance, Naive Bayes.
Subscription
Login to verify subscription
User
Font Size
Information
- M. Perry, K. O’hara, A. Sellen, B. Brown, and R. Harper, “Dealing with mobility: Understanding access anytime, anywhere,” ACM Transactions on Computer-Human Interaction, vol. 8, no. 4, pp. 323-347, 2001.
- J. Mukherjee, and B. Ramamurthy, “Communication technologies and architectures for space network and interplanetary internet,” IEEE Communications Surveys and Tutorials, vol. 15, no. 2, pp. 881-897, 2013.
- G. Miao, J. Zander, K. W. Sung, and S. B. Slimane, Fundamentals of Mobile Data Networks, Cambridge University Press, 2016.
- Q. A. Arain, D. Zhongliang, I. Memon, S. Arain, F. K. Shaikh, A. Zubedi, M. A. Unar, A. Ashraf, and R. Shaikh, “Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks,” Wireless Personal Communications, vol. 95, no. 2, pp. 505-521, 2017.
- Y. Hu, and V. O. Li, “Satellite-based internet: A tutorial,” IEEE Communications Magazine, vol. 39, no. 3, pp. 154-162, 2001.
- T. B. Zahariadis, K. G. Vaxevanakis, C. P. Tsantilas, N. A. Zervos, and N. A. Nikolaou, “Global roaming in next-generation networks,” IEEE Communications Magazine, vol. 40, no. 2, pp. 145-151, 2002.
- F. Li, L. Yang, W. Wu, L. Zhang, and Z. Shi, “Research status and development trends of security assurance for space-ground integration information network,” Journal on Communications, vol. 37, no. 11, pp. 156-168, 2016.
- Y. Jiang, C. Lin, X. Shen, and M. Shi, “Mutual authentication and key exchange protocols for roaming services in wireless mobile networks,” IEEE Transactions on Wireless Communications, vol. 5, no. 9, pp. 2569-2577, 2006.
- P. Gope, and T. Hwang, “Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks,” IEEE Systems Journal, vol. 10, no. 4, pp. 1370-1379, 2016.
- I. F. Akyildiz, H. Uzunalioglu, and M. D. Bender, “Handover management in low earth orbit (LEO) satellite networks,” Mobile Networks and Applications, vol. 4, no. 4, pp. 301-310, 1999.
- D. He, J. Bu, S. Chan, C. Chen, and M. Yin, “Privacy preserving universal authentication protocol for wireless communications,” IEEE Transactions on Wireless Communications, vol. 10, no. 2, pp. 431-436, 2011.
- G. Yang, Q. Huang, D. S. Wong, and X. Deng, “Universal authentication protocols for anonymous wireless communications,” IEEE Transactions on Wireless Communications, vol. 9, no. 1, 2010.
Abstract Views: 369
PDF Views: 0