SlideShare a Scribd company logo
1 of 21
PRESENTATION ON
SPAM E-MAIL DETECTION
PRESENTED BY
Nabin Jamkatel (3391)
Rajiv Gupta (3396)
Rakesh Chhetri (3397)
Sabina Lamichhane (3398)
INTRODUCTION
Spam e-mails can be not only annoying but also dangerous to
consumers.
Spam e-mails can be defined as :
1. Anonymity
2. Mass Mailings
3. Unsolicited:
Spam e-mail are message randomly sent to multiple addressees by all
sorts of groups, but mostly lazy advertisers and criminals who wish to
lead you to phishing sites.
NAÏVE BAYS CLASSIFIER
Simple probabilistic classifier that calculates a set of
probabilities by counting the frequency and combination of
values in a given dataset.
Represent as a vector of feature values.
It is very useful to classify the e-mails properly
The precision and recall of this method is known to be very
effective
PROBLEM STATEMENT
 Unwanted e-mails irritating internet connection
Critical e-mail message are missed and / or delayed.
Millions of compromised computers
Billions of dollars lost worldwide
Identity theft
Spam can crash mail servers and fill up hard drives
OBJECTIVE
The objective of identification of Spam e-mails are :
• To give knowledge to the user about the fake e-mails and
relevant e-mails
• To classify that mail spam or not.
LITERATURE REVIEW
• We consulted from G. He, Spam Detection, 1st ed. 2007 and
learned about this problem.
• Spam prevention is often neglected, although some simple
measures can dramatically reduce the amount of spam that
reaches your mailbox.
• Before they are able to send you spam, spammers obviously
first need to obtain your email address, which they can do
through different routes.
SCOPE OF THE PROJECT:
• It provides sensitivity to the client and adapts well to the
future spam techniques.
• It considers a complete message instead of single words with
respect to its organization.
• It increases Security and Control.
• It reduces IT Administration Costs.
• It also reduce Network Resource Costs.
DOCUMENT
PREPROCESSING
Tokenization
• Tokenization is the process of breaking a stream of text up into
words, phrases, symbols, or other meaningful elements called
tokens.
• The list of tokens becomes input for further processing such as
parsing or text mining.
LEMMATIZATION
• Lemmatization in linguistics, is the process of grouping
together the different inflected forms of a word so they can be
analysed as a single item.
• In computational linguistics, lemmatisation is the algorithmic
process of determining the lemma for a given word.
REMOVAL OF STOP WORD
• Sometimes, the extremely common word which would appear
to be of very little value in helping select documents matching
user need are excluded from the vocabulary entirely.
REQUIREMENT ANALYSIS
Functional Requirement
To classify the e-mails which is done by first taking out the feature
vector extraction which involves first taking out whether the word
is a spam or not.
Non-Functional Requirement
Ensures high availability of email data here datasets.
User should get the result as fast as possible.
It should be easy to use i.e., user is just required to type the words
and click then the result is displayed or user is just required to
enter a pair of reasonable sentence.
FEASIBILITY STUDY
• Technical Feasibility
• Economic Feasibility
• Operational Feasibility
TESTING
• we tested the datasets and found out which e-mail is spam
and which mail is non spam indicated as 0 and 1 respectively.
• We calculated the feature vector to know whether it is spam
or non-spam
• Using that feature vector Naïve Bayes Algorithm works by
comparing the trained data to test the data
DATASET
• Dataset is a collection of data or related information that is
composed for separate elements.
• A collection of dataset for e-mail spam contains spam and
non-spam messages
OUTPUT
Any external email can be detected and classified as spam e-
mail. So the users will be aware of such email.
Mails are classified into spam and non spam.
From the classified data we have calculated the accuracy as
99.18 %
Recall = 99.07%
F-measure= 99.53
CONCLUSION
• We are able to classify the emails as spam or non-spam. With
high number of emails lots if people using the system it will
be difficult to handle all possible mails as our project deals
with only limited amount of corpus.
REFERENCES
• [1]Clemmer, A. (2012). How Bayesian algorithm works. [online] Available
at: https://www.quora.com/How-do-Bayesian-algorithms-work-for-the-
identification-of-spam [Accessed 16 Aug. 2017].
• [2]What is Email Spam?. (2017). [Blog] comm100. Available at:
https://emailmarketing.comm100.com/email-marketing-ebook/email-
spam.aspx [Accessed 27 Aug. 2017].
• [3]G. He, Spam Detection, 1st ed. 2007.
• [4] bot2, V. (2017). Email Spam Filtering : A python implementation with
scikit-learn. [online] Machine Learning in Action. Available at:
https://appliedmachinelearning.wordpress.com/2017/01/23/email-spam-
filter-python-scikit-learn/ [Accessed 30 Aug. 2017].
Thank You

More Related Content

What's hot

Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingVimal Dewangan
 
Token, Pattern and Lexeme
Token, Pattern and LexemeToken, Pattern and Lexeme
Token, Pattern and LexemeA. S. M. Shafi
 
Spam detection using machine learning based binary classifier_043660
Spam detection using machine learning based binary classifier_043660Spam detection using machine learning based binary classifier_043660
Spam detection using machine learning based binary classifier_043660syaidatulamirah
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Learning rule of first order rules
Learning rule of first order rulesLearning rule of first order rules
Learning rule of first order rulesswapnac12
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionvineeta vineeta
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksAshish Arora
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSumit Raj
 
final-spam-e-mail-detection-180125111231.pptx
final-spam-e-mail-detection-180125111231.pptxfinal-spam-e-mail-detection-180125111231.pptx
final-spam-e-mail-detection-180125111231.pptxinfotowards
 
Heart disease prediction using machine learning algorithm
Heart disease prediction using machine learning algorithm Heart disease prediction using machine learning algorithm
Heart disease prediction using machine learning algorithm Kedar Damkondwar
 

What's hot (20)

Housing price prediction
Housing price predictionHousing price prediction
Housing price prediction
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Taxonomy for bugs
Taxonomy for bugsTaxonomy for bugs
Taxonomy for bugs
 
Token, Pattern and Lexeme
Token, Pattern and LexemeToken, Pattern and Lexeme
Token, Pattern and Lexeme
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
PAC Learning
PAC LearningPAC Learning
PAC Learning
 
Spam detection using machine learning based binary classifier_043660
Spam detection using machine learning based binary classifier_043660Spam detection using machine learning based binary classifier_043660
Spam detection using machine learning based binary classifier_043660
 
Np cooks theorem
Np cooks theoremNp cooks theorem
Np cooks theorem
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Error control
Error controlError control
Error control
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Final Report(SuddhasatwaSatpathy)
Final Report(SuddhasatwaSatpathy)Final Report(SuddhasatwaSatpathy)
Final Report(SuddhasatwaSatpathy)
 
Learning rule of first order rules
Learning rule of first order rulesLearning rule of first order rules
Learning rule of first order rules
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Naive bayes
Naive bayesNaive bayes
Naive bayes
 
K Nearest Neighbors
K Nearest NeighborsK Nearest Neighbors
K Nearest Neighbors
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter Data
 
final-spam-e-mail-detection-180125111231.pptx
final-spam-e-mail-detection-180125111231.pptxfinal-spam-e-mail-detection-180125111231.pptx
final-spam-e-mail-detection-180125111231.pptx
 
Heart disease prediction using machine learning algorithm
Heart disease prediction using machine learning algorithm Heart disease prediction using machine learning algorithm
Heart disease prediction using machine learning algorithm
 

Similar to Final spam-e-mail-detection

Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptxWanderer20
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingEditor IJCATR
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsIRJET Journal
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptxAnush90
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMSWORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMSIJNSA Journal
 
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemA multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemcsandit
 
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemA multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemcsandit
 
Detection of Spam in Emails using Machine Learning
Detection of Spam in Emails using Machine LearningDetection of Spam in Emails using Machine Learning
Detection of Spam in Emails using Machine LearningIRJET Journal
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...IRJET Journal
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...IRJET Journal
 
A Survey on Spam Filtering Methods and Mapreduce with SVM
A Survey on Spam Filtering Methods and Mapreduce with SVMA Survey on Spam Filtering Methods and Mapreduce with SVM
A Survey on Spam Filtering Methods and Mapreduce with SVMIRJET Journal
 
An introductory approach to email marketing-Part i-A Stayena Business Lab in...
An introductory approach to email marketing-Part i-A Stayena Business Lab  in...An introductory approach to email marketing-Part i-A Stayena Business Lab  in...
An introductory approach to email marketing-Part i-A Stayena Business Lab in...H Joshi
 
An analysis on Filter for Spam Mail
An analysis on Filter for Spam MailAn analysis on Filter for Spam Mail
An analysis on Filter for Spam MailAM Publications
 
Evaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsEvaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsMichael Lamont
 
Analysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysisAnalysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysisijnlc
 
Identifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeIdentifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeEditor IJCATR
 
Prepare black list using bayesian approach to improve performance of spam fil...
Prepare black list using bayesian approach to improve performance of spam fil...Prepare black list using bayesian approach to improve performance of spam fil...
Prepare black list using bayesian approach to improve performance of spam fil...IAEME Publication
 
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...IJNSA Journal
 

Similar to Final spam-e-mail-detection (20)

Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptx
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMSWORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
 
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemA multi layer architecture for spam-detection system
A multi layer architecture for spam-detection system
 
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemA multi layer architecture for spam-detection system
A multi layer architecture for spam-detection system
 
Detection of Spam in Emails using Machine Learning
Detection of Spam in Emails using Machine LearningDetection of Spam in Emails using Machine Learning
Detection of Spam in Emails using Machine Learning
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 
A Survey on Spam Filtering Methods and Mapreduce with SVM
A Survey on Spam Filtering Methods and Mapreduce with SVMA Survey on Spam Filtering Methods and Mapreduce with SVM
A Survey on Spam Filtering Methods and Mapreduce with SVM
 
An introductory approach to email marketing-Part i-A Stayena Business Lab in...
An introductory approach to email marketing-Part i-A Stayena Business Lab  in...An introductory approach to email marketing-Part i-A Stayena Business Lab  in...
An introductory approach to email marketing-Part i-A Stayena Business Lab in...
 
An analysis on Filter for Spam Mail
An analysis on Filter for Spam MailAn analysis on Filter for Spam Mail
An analysis on Filter for Spam Mail
 
Evaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsEvaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam Solutions
 
B0940509
B0940509B0940509
B0940509
 
Analysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysisAnalysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysis
 
Identifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeIdentifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision Tree
 
Prepare black list using bayesian approach to improve performance of spam fil...
Prepare black list using bayesian approach to improve performance of spam fil...Prepare black list using bayesian approach to improve performance of spam fil...
Prepare black list using bayesian approach to improve performance of spam fil...
 
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...
 

More from Partnered Health

Java For beginners and CSIT and IT students
Java  For beginners and CSIT and IT studentsJava  For beginners and CSIT and IT students
Java For beginners and CSIT and IT studentsPartnered Health
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsPartnered Health
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsPartnered Health
 
Hardware concept for graphics
Hardware concept  for graphics Hardware concept  for graphics
Hardware concept for graphics Partnered Health
 
Dom(document object model)
Dom(document object model)Dom(document object model)
Dom(document object model)Partnered Health
 
Web inspector for front end developers..
Web inspector for front end developers..Web inspector for front end developers..
Web inspector for front end developers..Partnered Health
 
Web crawler and applications
Web crawler and applicationsWeb crawler and applications
Web crawler and applicationsPartnered Health
 
Listing in web development and uses
Listing in web development and usesListing in web development and uses
Listing in web development and usesPartnered Health
 
Fire bugfirebug and ways to install it..
Fire bugfirebug and ways to install it..Fire bugfirebug and ways to install it..
Fire bugfirebug and ways to install it..Partnered Health
 
Analysis of unix and windows
Analysis of unix and windowsAnalysis of unix and windows
Analysis of unix and windowsPartnered Health
 
Organizational aspect of sample survey
Organizational aspect of sample surveyOrganizational aspect of sample survey
Organizational aspect of sample surveyPartnered Health
 
Question and questionnaire design
Question and questionnaire designQuestion and questionnaire design
Question and questionnaire designPartnered Health
 
Presentation on census survey and sample survey
Presentation on census survey and sample surveyPresentation on census survey and sample survey
Presentation on census survey and sample surveyPartnered Health
 

More from Partnered Health (20)

Java For beginners and CSIT and IT students
Java  For beginners and CSIT and IT studentsJava  For beginners and CSIT and IT students
Java For beginners and CSIT and IT students
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Hardware concept for graphics
Hardware concept  for graphics Hardware concept  for graphics
Hardware concept for graphics
 
Dom(document object model)
Dom(document object model)Dom(document object model)
Dom(document object model)
 
Web technology
Web technologyWeb technology
Web technology
 
Web inspector for front end developers..
Web inspector for front end developers..Web inspector for front end developers..
Web inspector for front end developers..
 
Web crawler and applications
Web crawler and applicationsWeb crawler and applications
Web crawler and applications
 
Semantic markup language
Semantic markup languageSemantic markup language
Semantic markup language
 
Meta tags
Meta tagsMeta tags
Meta tags
 
Listing in web development and uses
Listing in web development and usesListing in web development and uses
Listing in web development and uses
 
Fire bugfirebug and ways to install it..
Fire bugfirebug and ways to install it..Fire bugfirebug and ways to install it..
Fire bugfirebug and ways to install it..
 
Dreamweaver and idm
Dreamweaver and idmDreamweaver and idm
Dreamweaver and idm
 
File structure
File structureFile structure
File structure
 
Structure
StructureStructure
Structure
 
Analysis of unix and windows
Analysis of unix and windowsAnalysis of unix and windows
Analysis of unix and windows
 
Organizational aspect of sample survey
Organizational aspect of sample surveyOrganizational aspect of sample survey
Organizational aspect of sample survey
 
Question and questionnaire design
Question and questionnaire designQuestion and questionnaire design
Question and questionnaire design
 
Sampling
SamplingSampling
Sampling
 
Presentation on census survey and sample survey
Presentation on census survey and sample surveyPresentation on census survey and sample survey
Presentation on census survey and sample survey
 

Recently uploaded

How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 

Recently uploaded (20)

How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 

Final spam-e-mail-detection

  • 1. PRESENTATION ON SPAM E-MAIL DETECTION PRESENTED BY Nabin Jamkatel (3391) Rajiv Gupta (3396) Rakesh Chhetri (3397) Sabina Lamichhane (3398)
  • 2. INTRODUCTION Spam e-mails can be not only annoying but also dangerous to consumers. Spam e-mails can be defined as : 1. Anonymity 2. Mass Mailings 3. Unsolicited: Spam e-mail are message randomly sent to multiple addressees by all sorts of groups, but mostly lazy advertisers and criminals who wish to lead you to phishing sites.
  • 3. NAÏVE BAYS CLASSIFIER Simple probabilistic classifier that calculates a set of probabilities by counting the frequency and combination of values in a given dataset. Represent as a vector of feature values. It is very useful to classify the e-mails properly The precision and recall of this method is known to be very effective
  • 4. PROBLEM STATEMENT  Unwanted e-mails irritating internet connection Critical e-mail message are missed and / or delayed. Millions of compromised computers Billions of dollars lost worldwide Identity theft Spam can crash mail servers and fill up hard drives
  • 5. OBJECTIVE The objective of identification of Spam e-mails are : • To give knowledge to the user about the fake e-mails and relevant e-mails • To classify that mail spam or not.
  • 6. LITERATURE REVIEW • We consulted from G. He, Spam Detection, 1st ed. 2007 and learned about this problem. • Spam prevention is often neglected, although some simple measures can dramatically reduce the amount of spam that reaches your mailbox. • Before they are able to send you spam, spammers obviously first need to obtain your email address, which they can do through different routes.
  • 7. SCOPE OF THE PROJECT: • It provides sensitivity to the client and adapts well to the future spam techniques. • It considers a complete message instead of single words with respect to its organization. • It increases Security and Control. • It reduces IT Administration Costs. • It also reduce Network Resource Costs.
  • 8. DOCUMENT PREPROCESSING Tokenization • Tokenization is the process of breaking a stream of text up into words, phrases, symbols, or other meaningful elements called tokens. • The list of tokens becomes input for further processing such as parsing or text mining.
  • 9. LEMMATIZATION • Lemmatization in linguistics, is the process of grouping together the different inflected forms of a word so they can be analysed as a single item. • In computational linguistics, lemmatisation is the algorithmic process of determining the lemma for a given word.
  • 10. REMOVAL OF STOP WORD • Sometimes, the extremely common word which would appear to be of very little value in helping select documents matching user need are excluded from the vocabulary entirely.
  • 11. REQUIREMENT ANALYSIS Functional Requirement To classify the e-mails which is done by first taking out the feature vector extraction which involves first taking out whether the word is a spam or not. Non-Functional Requirement Ensures high availability of email data here datasets. User should get the result as fast as possible. It should be easy to use i.e., user is just required to type the words and click then the result is displayed or user is just required to enter a pair of reasonable sentence.
  • 12. FEASIBILITY STUDY • Technical Feasibility • Economic Feasibility • Operational Feasibility
  • 13. TESTING • we tested the datasets and found out which e-mail is spam and which mail is non spam indicated as 0 and 1 respectively. • We calculated the feature vector to know whether it is spam or non-spam • Using that feature vector Naïve Bayes Algorithm works by comparing the trained data to test the data
  • 14. DATASET • Dataset is a collection of data or related information that is composed for separate elements. • A collection of dataset for e-mail spam contains spam and non-spam messages
  • 15. OUTPUT Any external email can be detected and classified as spam e- mail. So the users will be aware of such email. Mails are classified into spam and non spam. From the classified data we have calculated the accuracy as 99.18 % Recall = 99.07% F-measure= 99.53
  • 16.
  • 17.
  • 18.
  • 19. CONCLUSION • We are able to classify the emails as spam or non-spam. With high number of emails lots if people using the system it will be difficult to handle all possible mails as our project deals with only limited amount of corpus.
  • 20. REFERENCES • [1]Clemmer, A. (2012). How Bayesian algorithm works. [online] Available at: https://www.quora.com/How-do-Bayesian-algorithms-work-for-the- identification-of-spam [Accessed 16 Aug. 2017]. • [2]What is Email Spam?. (2017). [Blog] comm100. Available at: https://emailmarketing.comm100.com/email-marketing-ebook/email- spam.aspx [Accessed 27 Aug. 2017]. • [3]G. He, Spam Detection, 1st ed. 2007. • [4] bot2, V. (2017). Email Spam Filtering : A python implementation with scikit-learn. [online] Machine Learning in Action. Available at: https://appliedmachinelearning.wordpress.com/2017/01/23/email-spam- filter-python-scikit-learn/ [Accessed 30 Aug. 2017].