{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:20Z","timestamp":1750306160389,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2980258.2980304","type":"proceedings-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T12:22:17Z","timestamp":1478089337000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Soft Computing Approaches to Classification of Emails for Sentiment Analysis"],"prefix":"10.1145","author":[{"given":"Pranjal S.","family":"Bogawar","sequence":"first","affiliation":[{"name":"Department of Information Technology, Priyadarshini College of Engineering, R.T.M. Nagpur University"}]},{"given":"K. K.","family":"Bhoyar","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Yeshwantrao Chavhan College of Engineering, R.T.M. Nagpur University"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.17"},{"volume-title":"Language and Gender Author Cohort Analysis of E-mail for Computer Forensics. Digital Forensics Research Workshop (2002)","author":"Vel O.","key":"e_1_3_2_1_2_1","unstructured":"Vel , O. De , Corney, M., Anderson , A. and Mohay , G . 2002 . Language and Gender Author Cohort Analysis of E-mail for Computer Forensics. Digital Forensics Research Workshop (2002) 1--16. DOI=10.1.1.19.8168 Vel, O. De, Corney, M., Anderson, A. and Mohay, G. 2002. Language and Gender Author Cohort Analysis of E-mail for Computer Forensics. Digital Forensics Research Workshop (2002) 1--16. DOI=10.1.1.19.8168"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"e_1_3_2_1_4_1","volume-title":"N.","author":"Al Fe'ar N.","year":"2008","unstructured":"Al Fe'ar , N. , Al Turki , E. , Al Zaid , A. , Al Duwais , M. , Al Sheddi , M. , Al khamees , N. , & Al Drees, N. 2008 . E-Classifier: A Bi-Lingual Email Classification System. Information Technology ITSim 2008 IEEE ( 2008) 2:1--4. DOI= 10.1109\/ITSIM.2008.4631707 Al Fe'ar, N., Al Turki, E., Al Zaid, A., Al Duwais, M., Al Sheddi, M., Al khamees, N., & Al Drees, N. 2008. E-Classifier: A Bi-Lingual Email Classification System. Information Technology ITSim 2008 IEEE (2008) 2:1--4. DOI= 10.1109\/ITSIM.2008.4631707"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2009.739"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, IEEE, 1(11-14","author":"Chen H.","year":"2010","unstructured":"Chen , H. , Zhan , Y. , & Li , Y. 2010 . The Application of Decision Tree in Machine Learning and Chinese email Classification . Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, IEEE, 1(11-14 July 2010) 305--308. DOI= 10.1109\/ICMLC.2010.5581046 Chen, H., Zhan, Y., & Li, Y. 2010. The Application of Decision Tree in Machine Learning and Chinese email Classification. Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, IEEE, 1(11-14 July 2010) 305--308. DOI= 10.1109\/ICMLC.2010.5581046"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.1537"},{"key":"e_1_3_2_1_8_1","article-title":"Automatic mining of threatening e-mail using Ad Infinitum algorithm","author":"Balamurugan A.","year":"2008","unstructured":"Balamurugan , A. , Rajaram , R. , Muthupandian , Athiappan , 2008 . Automatic mining of threatening e-mail using Ad Infinitum algorithm . In International Journal of Information Technology. 14, (12-14 Dec 2008) 81--108. DOI= 10.1142\/S1793840612400089. Balamurugan, A., Rajaram, R., Muthupandian, Athiappan, 2008. Automatic mining of threatening e-mail using Ad Infinitum algorithm. In International Journal of Information Technology. 14, (12-14 Dec 2008) 81--108. DOI= 10.1142\/S1793840612400089.","journal-title":"International Journal of Information Technology. 14, (12-14"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364019"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTD.2010.5645835"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.16"},{"key":"e_1_3_2_1_12_1","volume-title":"Aravind, Athiappan, Bharathiraha, Pandian, M.","author":"Balamurugan S.","year":"2007","unstructured":"Balamurugan , S. a. A ., Aravind, Athiappan, Bharathiraha, Pandian, M. , & Rajaram, R. 2007 . Association Rule Mining for Suspicious Email de tection: A data Mining Approach. Intelligence and Security Informatics IEEE. (23-24 May 2007) 316--328. DOI=10.1109\/ISI.2007.379491 Balamurugan, S. a. A., Aravind, Athiappan, Bharathiraha, Pandian, M., & Rajaram, R. 2007. Association Rule Mining for Suspicious Email detection: A data Mining Approach. Intelligence and Security Informatics IEEE. (23-24 May 2007) 316--328. DOI=10.1109\/ISI.2007.379491"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FGCNS.2008.7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2010.56"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2009.739"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE Congress on Evolutionary Computation, 1778--1783","author":"El-Sayed M.","year":"2009","unstructured":"El-Sayed , M. El-Alfy ( 2009 ). Discovering classification rules for Email Spam Filtering with an Ant Colony Optimization Algorithm . IEEE Congress on Evolutionary Computation, 1778--1783 . DOI= 10.1109\/CEC.2009.4983156 El-Sayed, M.El-Alfy (2009). Discovering classification rules for Email Spam Filtering with an Ant Colony Optimization Algorithm. IEEE Congress on Evolutionary Computation, 1778--1783. DOI= 10.1109\/CEC.2009.4983156"},{"key":"e_1_3_2_1_17_1","volume-title":"Computational Intelligence and Data Mining CIDM '09 IEEE. 2--5. DOI: 10","author":"Saeedian M.","year":"2009","unstructured":"Saeedian , M. , Beigy , H. 2009 . Dynamic Classifier selection using clustering for spam detection . Computational Intelligence and Data Mining CIDM '09 IEEE. 2--5. DOI: 10 .1109\/CIDM.2009.4938633 10.1109\/CIDM.2009.4938633 Saeedian, M., Beigy, H. 2009. Dynamic Classifier selection using clustering for spam detection. Computational Intelligence and Data Mining CIDM '09 IEEE. 2--5. DOI: 10.1109\/CIDM.2009.4938633"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2010.5606466"},{"key":"e_1_3_2_1_19_1","first-page":"572","article-title":"Research and Design of ID3 algorithm Rule-based Anti Spam Email Filtering","volume":"1","author":"Zhang Y.","year":"2011","unstructured":"Zhang , Y. , Ding , L. , Wang , Y. 2011 . Research and Design of ID3 algorithm Rule-based Anti Spam Email Filtering . IEEE. 1 , 572 -- 575 . DOI= 10.1109\/ICSESS.2011.5982380 Zhang, Y., Ding, L., Wang, Y. 2011. Research and Design of ID3 algorithm Rule-based Anti Spam Email Filtering. IEEE. 1, 572--575. DOI= 10.1109\/ICSESS.2011.5982380","journal-title":"IEEE."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.001"},{"key":"e_1_3_2_1_21_1","volume-title":"Patten Classification","author":"Duda R.","unstructured":"Duda , R. , Hart , P. , Stork , D. 1973. Patten Classification . 2 nd Edition.Wiley Duda, R., Hart, P., Stork, D. 1973. Patten Classification. 2nd Edition.Wiley","edition":"2"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02294245"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(84)90020-7"},{"key":"e_1_3_2_1_25_1","volume-title":"The 7th International Days of Statistics and Economics","author":"Elena M.","year":"2013","unstructured":"Elena M. ( 2013 ). Fuzzy C-means clustering in Matlab . The 7th International Days of Statistics and Economics , Prague , Sept 2013. 905--914 Elena M. (2013). Fuzzy C-means clustering in Matlab. The 7th International Days of Statistics and Economics, Prague, Sept 2013. 905--914"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2013.30"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(98)00170-2"},{"key":"e_1_3_2_1_28_1","article-title":"Email Mining","author":"Bogawar P.","year":"2012","unstructured":"Bogawar , P. , Bhoyar , K. 2012 . Email Mining : A Review. IJCSI International Journal of Computer Science Issues. 9 , ( January 2012) 429--434. ijcsi.org\/papers\/IJCSI-9-1-1-429-434.pdf Bogawar, P., Bhoyar, K. 2012. Email Mining: A Review. IJCSI International Journal of Computer Science Issues. 9, (January 2012) 429--434. ijcsi.org\/papers\/IJCSI-9-1-1-429-434.pdf","journal-title":"A Review. IJCSI International Journal of Computer Science Issues. 9"},{"key":"e_1_3_2_1_29_1","volume-title":"Email Statistic Report","author":"Radicati S.","year":"2011","unstructured":"Radicati . S. Email Statistic Report , 2011 -2015. accessed on 1st September 2015 http:\/\/www.radicati.com Radicati. S. Email Statistic Report, 2011-2015. accessed on 1st September 2015 http:\/\/www.radicati.com"},{"key":"e_1_3_2_1_30_1","unstructured":"Cohen W. Enron Email Dataset. https:\/\/www.cs.cmu.edu\/~.\/enron\/  Cohen W. Enron Email Dataset. https:\/\/www.cs.cmu.edu\/~.\/enron\/"},{"key":"e_1_3_2_1_31_1","unstructured":"Shetty J. Adibi J. 2004. The Enron Email dataset Database Schema and brief statistical Report. citeseerx.ist.psu.edu\/viewdoc\/summary? DOI=10.1.1.296.9477  Shetty J. Adibi J. 2004. The Enron Email dataset Database Schema and brief statistical Report. citeseerx.ist.psu.edu\/viewdoc\/summary? DOI=10.1.1.296.9477"},{"volume-title":"Introduction to Neural Networks using Matlab 6.0","author":"Sivanandam S.","key":"e_1_3_2_1_32_1","unstructured":"Sivanandam , S. , Sumathi , S. , Deepa , S. 2011. Introduction to Neural Networks using Matlab 6.0 . The McGraw-Hill Companies , New Delhi . 185--193 Sivanandam, S., Sumathi, S., Deepa, S. 2011. Introduction to Neural Networks using Matlab 6.0. The McGraw-Hill Companies, New Delhi. 185--193"},{"key":"e_1_3_2_1_33_1","unstructured":"Tomilson R. The First Network Email. http:\/\/www.raytheon.com\/news\/rtnwcm\/groups\/public\/documents\/content\/rtn12_tomlinson_email.pdf  Tomilson R. The First Network Email. http:\/\/www.raytheon.com\/news\/rtnwcm\/groups\/public\/documents\/content\/rtn12_tomlinson_email.pdf"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111471"}],"event":{"name":"ICIA-16: International Conference on Informatics and Analytics","acronym":"ICIA-16","location":"Pondicherry India"},"container-title":["Proceedings of the International Conference on Informatics and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2980258.2980304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:51Z","timestamp":1750217991000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":34,"alternative-id":["10.1145\/2980258.2980304","10.1145\/2980258"],"URL":"https:\/\/doi.org\/10.1145\/2980258.2980304","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}