Manuscripts

Recent Papers

Research Paper

Advanced detection of spam and email filtering using natural language processing algorithms

Unsolicited bulk emails from random email addresses sent to a user's inbox are generally called junk or spam emails. 45% of all emails sent are spam and 14.5 billion spam emails are sent every single day. Around 36% of spam emails is content related to sales, advertising, and promotions that the recipient explicitly did not opt to receive. However, not all spam emails are used for this purpose. Spam emails are also sent for phishing purposes that deceive users and lead the recipients to malicious websites with unethical intentions. Numerous techniques have been developed to block such spam emails but a majority of users still receive them. This is because of the ability of the spammers to manipulate the filters. Spam costs businesses a whopping $20.5 billion every year. Even worse is that the cost of spam is likely to continue rising. Data indicates that losses to business will grow to $257 billion annually within a few years if the current rate of spam email is not decreased. To curb this problem, we present a method based on Natural Language Processing (NLP) for the filtration of spam emails in order to enhance online security. The technique proposed in this research paper is an approach which stepwise blocks spam mail based on the sender's email address along with the content of the email. This paper presents a proposed NLP system using N-gram model, Word Stemming algorithm and Bayesian Classification algorithm for detection of spam content and effectively filtering it.

Published by: Sujesh Shankar

Author: Sujesh Shankar

Paper ID: V4I4-1417

Paper Status: published

Published: August 4, 2018

Full Details
Technical Notes

Research perspectives in Siddha Varmam therapy

Siddha system is one of the oldest medical systems in the world. Siddhars, the fore-runners of this medical system served the community with many special therapies and Varmam is one among them. Varmam is the vital life energy points located in the human body. 108 main points have been identified by the Siddhars. The term Varmam also indicates the therapeutic manipulation of specific points in which the pranic energy is found concentrated. Even though Varmam therapy has been in existence for centuries, research in Varmam is still in the toddler stage. Central Council for Research in Siddha has the mandate to do research in Varmam. Standardization is the foremost component in any research. There are no specific guidelines to standardize the Varmam therapy. Just as a therapeutic interventional pre-clinical study, the standardization of Varmam is considered a pre-clinical one. Standardization of Varmam is comprised of mapping of Varmam points, the establishment of a relationship with Nadi, standardization of pressure given to Varmam points, standardization of techniques of applying pressure, physiological correlation of Varmam, standardization with respect to bioenergy field and therapeutic grouping of Varmam points. This paper deals with the research perspective of Varmam.

Published by: Natarajan, Ramaswamy R. S

Author: Natarajan

Paper ID: V4I4-1410

Paper Status: published

Published: August 4, 2018

Full Details
Research Paper

Feature selection in network intrusion detection using metaheuristic algorithms

Network Intrusion Detection (IDS) mechanism is a primary requirement in the current fast growing network systems. Data Mining and Machine Learning (DM-ML) approaches are widely used for network anomaly detection during the past few years. Machine learning based intrusive activity detector is getting popular. However, they produce a high volume of false alarms. One of the main reasons for generating false signals is redundancy in the datasets. To resolve this problem, an efficient feature selection is necessary to improve the intrusion detection system performance. For this purpose, here we use Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Artificial Bee Colony (ABC), K-Nearest Neighbors (KNN) and Support Vector Machine (SVM). The three abovementioned algorithms are used to select the most relevant feature set for identifying network attacks, KNN and SVM algorithms are used as classifiers to evaluate the performance of these feature selection algorithms. The standard NSL-KDD dataset is used for training and testing in this study. We used different metrics to determine which of these algorithms provide a better overall performance when they are used for feature selection in intrusion detection. Our experiments show that PSO, ACO and ABC algorithms perform better than other approaches in feature selection. Feature selection based on ABC provides 98.9% of accuracy rate and 0.78% false alarm with KNN algorithm as the classifier, which is the best result among the examined algorithms.

Published by: Tahira Khorram, Nurdan Akhan Baykan

Author: Tahira Khorram

Paper ID: V4I4-1414

Paper Status: published

Published: August 4, 2018

Full Details
Research Paper

Right to education and learning disabled children

Every child has a different learning style and therefore it is important for teachers to think of new and interesting ways to educate them. While general students need equal attention from teachers. Students with special needs require extra attention. It is learning disabilities that are the vaguest and mystifying when compared to other major handicapping or disabling conditions, with the possible exception of emotional disturbances. It is still a great deal of debate as to what is meant by the term Learning Disability. It is so because the field is quite new and the group of persons whom we now call Learning Disabled is unusually diverse.

Published by: Indu Bala Kushwah, Dr. Meena Bhandari

Author: Indu Bala Kushwah

Paper ID: V4I4-1403

Paper Status: published

Published: August 3, 2018

Full Details
Review Paper

Restructuring and management of higher education in India

Education has a vital role to play in the life of an individual as well as the society. The availability of quality higher education in India, though increasing, is unable to meet the demands of the growing youth population and aspirations of the people. To meet the higher educational requirements and aspirations of its people, India has more than 150 Central Universities, more than 315 State Universities, approximate 200 Private Universities and a whopping 34,000 odd colleges. This paper reviews the management of higher education in India

Published by: Lt. Gen Rakesh Kumar Sharma (Retd.)

Author: Lt. Gen Rakesh Kumar Sharma (Retd.)

Paper ID: V4I4-1420

Paper Status: published

Published: August 3, 2018

Full Details
Review Paper

Drinkable book

Water pollution affects the entire biosphere of plants and organisms living in these water bodies, as well as organisms and plants that might be exposed to the water. The effect can be damaging not only to individual species but also to the natural biological communities. The sources of water pollution can be grouped into point sources, non-point sources and groundwater pollution. Contaminants leading to water pollution include a wide spectrum of chemicals, pathogens, and physical changes such as elevated temperature. Measurement of water pollution is carried out by analyzing water samples with physical, chemical and biological tests. Control of water pollution can be achieved by appropriate wastewater treatment, providing safely managed sanitation services for people who are currently without access, agricultural wastewater treatment, erosion and sediment control from construction sites, and control of urban runoff.

Published by: G. V. R. Prasad

Author: G. V. R. Prasad

Paper ID: V4I4-1400

Paper Status: published

Published: August 3, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X