{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:00:39Z","timestamp":1762351239505},"reference-count":35,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"abstract":"<jats:p>A multi-label variant of email classification named ML-EC2 (multi-label email classification using clustering) has been proposed in this work. ML-EC2 is a hybrid algorithm based on text clustering, text classification, frequent-term calculation (based on latent dirichlet allocation), and taxonomic term-mapping technique. It is an example of classification using text clustering technique. It studies the problem where each email cluster represents a single class label while it is associated with set of cluster labels. It is multi-label text-clustering-based classification algorithm in which an email cluster can be mapped to more than one email category when cluster label matches with more than one category term. The algorithm will be helpful when there is a vague idea of topic. The performance parameters Entropy and Davies-Bouldin Index are used to evaluate the designed algorithm.<\/jats:p>","DOI":"10.4018\/ijwltt.2020040102","type":"journal-article","created":{"date-parts":[[2019,12,27]],"date-time":"2019-12-27T18:55:53Z","timestamp":1577472953000},"page":"19-33","source":"Crossref","is-referenced-by-count":18,"title":["ML-EC2"],"prefix":"10.4018","volume":"15","author":[{"given":"Aakanksha","family":"Sharaff","sequence":"first","affiliation":[{"name":"National Institute of Technology, Raipur, India"}]},{"given":"Naresh Kumar","family":"Nagwani","sequence":"additional","affiliation":[{"name":"National Institute of Technology Raipur, Raipur, India"}]}],"member":"2432","reference":[{"key":"IJWLTT.2020040102-0","doi-asserted-by":"crossref","unstructured":"Aloui, A., & Neji, M. (2010). Automatic classification and response of E-mails. Int. J. Digital Soc., 1(1).","DOI":"10.20533\/ijds.2040.2570.2010.0001"},{"key":"IJWLTT.2020040102-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2014.03.014"},{"key":"IJWLTT.2020040102-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.08.007"},{"key":"IJWLTT.2020040102-3","unstructured":"Bekkerman, R. (2004). Automatic categorization of email into folders: Benchmark experiments on Enron and SRI corpora. Academic Press."},{"key":"IJWLTT.2020040102-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.07.146"},{"issue":"9","key":"IJWLTT.2020040102-5","first-page":"548","article-title":"Survey of text mining.","volume":"45","author":"M. W.Berry","year":"2004","journal-title":"Computer Review"},{"key":"IJWLTT.2020040102-6","doi-asserted-by":"publisher","DOI":"10.5121\/ijwest.2012.3301"},{"key":"IJWLTT.2020040102-7","unstructured":"Carmona-Cejudo, J. M., Baena-Garc\u00eda, M., Campo-Avila, J., Morales-Bueno, R., Gama, J., & Bifet, A. (2011, October). Using gnusmail to compare data stream mining methods for on-line email classification. In Proceedings of the Second Workshop on Applications of Pattern Analysis (pp. 12-18). Academic Press."},{"key":"IJWLTT.2020040102-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.12.013"},{"key":"IJWLTT.2020040102-9","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0403-7"},{"key":"IJWLTT.2020040102-10","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.125689"},{"key":"IJWLTT.2020040102-11","doi-asserted-by":"publisher","DOI":"10.1109\/WISA.2014.56"},{"key":"IJWLTT.2020040102-12","unstructured":"Huang, Y., & Mitchell, T. M. (2008). Exploring hierarchical user feedback in email clustering. Email \u201908:Proceedings of the Workshop on Enhanced Messaging-AAAI, (pp. 36-41). Academic Press."},{"key":"IJWLTT.2020040102-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2008.02.023"},{"key":"IJWLTT.2020040102-14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"IJWLTT.2020040102-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.12.005"},{"key":"IJWLTT.2020040102-16","article-title":"Cluster validity measurement techniques.","author":"F.Kov\u00e1cs","year":"2005","journal-title":"6th International symposium of hungarian researchers on computational intelligence"},{"key":"IJWLTT.2020040102-17","author":"A.Kulkarni","year":"2005","journal-title":"Name Discrimination and Email Clustering using Unsupervised Clustering and Labeling of Similar Contexts"},{"key":"IJWLTT.2020040102-18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.16"},{"key":"IJWLTT.2020040102-19","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-006-0024-x"},{"key":"IJWLTT.2020040102-20","unstructured":"McCallum, A. K. (2002). Mallet: A machine learning for language toolkit. Retrieved from http:\/\/mallet.cs.umass.edu\/"},{"key":"IJWLTT.2020040102-21","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.67153"},{"key":"IJWLTT.2020040102-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2004.10.007"},{"key":"IJWLTT.2020040102-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.03.002"},{"key":"IJWLTT.2020040102-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.05.012"},{"key":"IJWLTT.2020040102-25","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515587854"},{"key":"IJWLTT.2020040102-26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1498-8_38"},{"key":"IJWLTT.2020040102-27","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTECH.2011.5942082"},{"key":"IJWLTT.2020040102-28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-00551-5_7"},{"key":"IJWLTT.2020040102-29","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2010.5580695"},{"key":"IJWLTT.2020040102-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.10.013"},{"key":"IJWLTT.2020040102-31","first-page":"178","article-title":"LDA-based document models for ad-hoc retrieval.","author":"X.Wei","year":"2006","journal-title":"Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval"},{"key":"IJWLTT.2020040102-32","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-008-0216-y"},{"key":"IJWLTT.2020040102-33","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1007\/978-81-322-2250-7_65","article-title":"Highly Discriminative Features for Phishing Email Classification by SVD","author":"M.Zareapoor","year":"2015","journal-title":"Information Systems Design and Intelligent Applications"},{"key":"IJWLTT.2020040102-34","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.051"}],"container-title":["International Journal of Web-Based Learning and Teaching Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=246036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T07:53:27Z","timestamp":1651823607000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJWLTT.2020040102"}},"subtitle":["An Algorithm for Multi-Label Email Classification Using Clustering"],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":35,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijwltt.2020040102","relation":{},"ISSN":["1548-1093","1548-1107"],"issn-type":[{"value":"1548-1093","type":"print"},{"value":"1548-1107","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}