{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T06:55:49Z","timestamp":1763621749480},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03178-5","type":"journal-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T13:02:13Z","timestamp":1727701333000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing Mail Sorting with Naive Bayes Classifier and Enhanced Feature Extraction Method"],"prefix":"10.1007","volume":"5","author":[{"given":"C.","family":"Pavithra","sequence":"first","affiliation":[]},{"given":"M.","family":"Saradha","sequence":"additional","affiliation":[]},{"given":"B. Antline","family":"Nisha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"3178_CR1","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.eswa.2016.03.020","volume":"58","author":"M Heydari","year":"2016","unstructured":"Heydari M, Tavakoli, Salim N. Detection of fake opinions using time series. Expert Syst Appl. 2016;58:83\u201392.","journal-title":"Expert Syst Appl"},{"key":"3178_CR2","doi-asserted-by":"crossref","unstructured":"Nidhi PRP, Patel A. A survey on fake review detection using machine learning techniques 2018. In: 4th international conference on computing communication and automation (ICCCA); 2018.","DOI":"10.1109\/CCAA.2018.8777594"},{"key":"3178_CR3","doi-asserted-by":"crossref","unstructured":"Kai RF, Petersen S, Mujtaba M, Mattsson. Systematic mapping studies in software engineering, 2008.","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"3178_CR4","doi-asserted-by":"crossref","unstructured":"Feng W, Sun J, Zhang L, Cao C, Yang Q. A support vector machine based Naive Bayes algorithm for spam filtering. In: 2016 IEEE 35th international performance computing and communications conference (IPCCC), Las Vegas, NV, 2016, pp. 1\u20138.","DOI":"10.1109\/PCCC.2016.7820655"},{"key":"3178_CR5","unstructured":"Renuka KD, Visalakshi P. Latent semantic Indexing primarily based SVM model for Email spam classification, 2014."},{"key":"3178_CR6","doi-asserted-by":"crossref","unstructured":"Harisinghaney A, Dixit A, Gupta S, Arora A. Text and image based mostly spam email classification using KNN, Naive Bayes and Reverse DBSCAN algorithmic rule in improvement, reliabilty, 2014 International Conference on, pp. 153\u2013155.","DOI":"10.1109\/ICROIT.2014.6798302"},{"key":"3178_CR7","unstructured":"Ernst MD. Natural Language is a Programming Language: Applying natural language processing to software development 2nd summit on advances in programming languages (SNAPL 2017), vol 71. ISSN 1868\u20138969, pp 1\u201314."},{"key":"3178_CR8","doi-asserted-by":"crossref","unstructured":"Shenglei CGLLM. A novel selective naive Bayes algorithm. Knowl Based Syst. 2020;192.","DOI":"10.1016\/j.knosys.2019.105361"},{"issue":"4","key":"3178_CR9","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.ipm.2014.11.001","volume":"51","author":"D Hernandez Fusilier","year":"2015","unstructured":"Hernandez Fusilier D, Montes-y-G\u00b4omez M, Rosso P, Guzman Cabrera R. Detecting positive and negative deceptive opinions using PU learning. Inf Process Manage. 2015;51(4):433\u201343.","journal-title":"Inf Process Manage"},{"key":"3178_CR10","doi-asserted-by":"crossref","unstructured":"Shreyas Aiyar NS. N-Gram Assisted you-tube spam comment detection, international conference on computational intelligence and data science, pp. 174\u2013182; 2018.","DOI":"10.1016\/j.procs.2018.05.181"},{"key":"3178_CR11","unstructured":"Androutsopoulos I, Paliouras G, Michelakis E. Learning to filter unsolicited commercial e-mail, Technical report NCSR Demokritos, 2011."},{"key":"3178_CR12","unstructured":"Tariq M, Jameel B, Tariq A, Jan Q, Nisar R. A. S., Detecting threat e-mails using Bayesian approach. IJSDIA International J Secure Digital Information Age. 2009;1(2)."},{"key":"3178_CR13","volume-title":"On sentiment analysis and Opinion Mining, IJRET: International Journal of Research in Engineering and Technology","author":"V Raisa","year":"2013","unstructured":"Raisa V, Jayasreee M. A survey on sentiment analysis and opinion mining. IJRET Int J Res Eng Technol. 2013: 2319\u20131163."},{"key":"3178_CR14","unstructured":"Educion C, Neural Networks. IBM, 2020. [Online]. Available: https:\/\/www.ibm.com\/uk-en\/cloud\/learn\/neural-networks"},{"key":"3178_CR15","unstructured":"Brownlee J. Supervised and unsupervised machine learning algorithms. Mach Learn Mastery. 2020;08."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03178-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03178-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03178-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T13:03:48Z","timestamp":1727701428000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03178-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":15,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["3178"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03178-5","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"914"}}