Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
The way that email has extraordinary significance in present day business communication is certain. Consistently, a bulk of emails is sent from organizations to clients and suppliers, from representatives to their managers and starting with one colleague then onto the next. In this way there is vast...
| Main Authors: | Arif, Hanafi, Sulaiman, Harun, Enggari, Sofika, Rani, Larissa Navia |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
LPPM UPI YPTK
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/11101/ http://umpir.ump.edu.my/id/eprint/11101/1/Detecting%20Duplicate%20Entry%20in%20Email%20Field%20using%20Alliance%20Rules-based%20Algorithm.pdf http://umpir.ump.edu.my/id/eprint/11101/7/fskkp-2016-arif-Detecting%20Duplicate%20Entry%20in%20Email%20Field1.pdf |
Similar Items
Intuitive content management system via manipulation and duplication with if-else rules classification
by: Chan, Chung Hoong
Published: (2018)
by: Chan, Chung Hoong
Published: (2018)
Duplicate bug report detection using clustering
by: Gopalan, Raj, et al.
Published: (2014)
by: Gopalan, Raj, et al.
Published: (2014)
An ensemble learning method for spam email detection system based on metaheuristic algorithms
by: Behjat, Amir Rajabi
Published: (2015)
by: Behjat, Amir Rajabi
Published: (2015)
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
Detecting Duplication in Students’ Research Data: A Method and Illustration
by: Allen, Peter, et al.
Published: (2015)
by: Allen, Peter, et al.
Published: (2015)
Barnacle: Detecting and characterizing tandem duplications and fusions in transcriptome assemblies
by: Swanson, L., et al.
Published: (2013)
by: Swanson, L., et al.
Published: (2013)
Effectiveness of RSS feed item duplication detection using word matching
by: Tan, Ian K. T., et al.
Published: (2011)
by: Tan, Ian K. T., et al.
Published: (2011)
The contribution of email volume, email management strategies and propensity to worry in predicting email stress among academics
by: Jerejian, Ailsa, et al.
Published: (2013)
by: Jerejian, Ailsa, et al.
Published: (2013)
Email Phishing Detection Model using CNN Model
by: Gurumurthy, M., et al.
Published: (2024)
by: Gurumurthy, M., et al.
Published: (2024)
Phishing Email Detection Technique by using Hybrid Features
by: Lew, May Form, et al.
Published: (2015)
by: Lew, May Form, et al.
Published: (2015)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
The rules of the game in graduate entry nursing: a longitudinal case study
by: Stacey, Gemma, et al.
Published: (2016)
by: Stacey, Gemma, et al.
Published: (2016)
University entry selection framework using rule-based and back-propagation
by: Maharani, Sitti Syarah
Published: (2015)
by: Maharani, Sitti Syarah
Published: (2015)
Duplicating Character in an existing medium into character animation
by: Lucas, Terry, et al.
Published: (2011)
by: Lucas, Terry, et al.
Published: (2011)
An approach to filtering duplicate RFID data streams
by: Mahdin, Hairulnizam, et al.
Published: (2010)
by: Mahdin, Hairulnizam, et al.
Published: (2010)
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
The politics of centre-state conflict: the Sabah experience under the ruling Sabah Alliance (1963-1976)
by: Mohammad Agus Yusoff,
Published: (1999)
by: Mohammad Agus Yusoff,
Published: (1999)
Expanding the clinical picture of the MECP2 Duplication syndrome
by: Lim, Z., et al.
Published: (2017)
by: Lim, Z., et al.
Published: (2017)
Duodenal duplication cyst in an adult: a rare case.
by: Raghunath P,, et al.
Published: (2014)
by: Raghunath P,, et al.
Published: (2014)
Email is evil! Behavioural responses towards permission-based direct email marketing and gender differences
by: Mahmoud, A. B., et al.
Published: (2019)
by: Mahmoud, A. B., et al.
Published: (2019)
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018)
by: Nusratullah, Kajal, et al.
Published: (2018)
Machine learning for email filtering and categorising
by: Tan, Kai Qin
Published: (2023)
by: Tan, Kai Qin
Published: (2023)
Total colorectal duplication in an infant presenting with fecaluria as the initial symptom
by: Ab. Rahman, Norhafiza, et al.
Published: (2019)
by: Ab. Rahman, Norhafiza, et al.
Published: (2019)
Duplication of inferior vena cava- case report of an anatomic variation
by: Abdulrazzaq, Saad Mohammed, et al.
Published: (2019)
by: Abdulrazzaq, Saad Mohammed, et al.
Published: (2019)
Duplication of inferior vena cava-case report of an anatomic variation
by: Abdulrazzaq, Saad Mohammed, et al.
Published: (2019)
by: Abdulrazzaq, Saad Mohammed, et al.
Published: (2019)
Outcome of reconstruction for duplication of the thumb in adults aged over 40.
by: Arumugam, Manohar, et al.
Published: (2011)
by: Arumugam, Manohar, et al.
Published: (2011)
Evaluation of spam detection and prevention frameworks for email and image spam - a state of art
by: Hayati, Pedram, et al.
Published: (2008)
by: Hayati, Pedram, et al.
Published: (2008)
A comparative analysis on three duplication elements in copy-move forgery using patchmatch-based detection method
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023)
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023)
An analysis of Strategic Alliances in Automotive Industry: Case Study of Fiat-Tata Alliance and Fiat-Chrysler Alliance
by: Li, Mingke
Published: (2018)
by: Li, Mingke
Published: (2018)
A study of journal overlaps, duplicates and costs in the field of computer science held in selected Malaysian University Libraries / Ng Siew Ling.
by: Ng, Siew Ling
Published: (2001)
by: Ng, Siew Ling
Published: (2001)
Prevention Mechanism Against Denial Of Service Attack On Duplicate Address Detection Process In Ipv6 Link-Local Networks
by: Ibrahim Al-Ani, Ahmed Khallel
Published: (2020)
by: Ibrahim Al-Ani, Ahmed Khallel
Published: (2020)
Email spam: A comprehensive review of optimize detection methods, challenges, and open research problems
by: Tusher, Ekramul Haque, et al.
Published: (2024)
by: Tusher, Ekramul Haque, et al.
Published: (2024)
Politeness in requests to supervisors in emails / Ali Hallajian
by: Hallajian, Ali
Published: (2014)
by: Hallajian, Ali
Published: (2014)
Factors Involved in Estimating Cost of Email Spam
by: Ridzuan, Farida, et al.
Published: (2010)
by: Ridzuan, Farida, et al.
Published: (2010)
Implementation of secure email server in cloud environment
by: Madi, Nadim K. M., et al.
Published: (2012)
by: Madi, Nadim K. M., et al.
Published: (2012)
A Study On Factors Influencing Email Workflow
by: Chew, Jeen Leng
Published: (2006)
by: Chew, Jeen Leng
Published: (2006)
Email spam filtering technique: challenges and solutions
by: Md Yasin, Sharifah, et al.
Published: (2023)
by: Md Yasin, Sharifah, et al.
Published: (2023)
Email categorization using support vector machine
by: Mohd. Daud, Mariah
Published: (2004)
by: Mohd. Daud, Mariah
Published: (2004)
Networks, partnerships and alliances
by: Butler, Bella
Published: (2011)
by: Butler, Bella
Published: (2011)
Similar Items
-
Intuitive content management system via manipulation and duplication with if-else rules classification
by: Chan, Chung Hoong
Published: (2018) -
Duplicate bug report detection using clustering
by: Gopalan, Raj, et al.
Published: (2014) -
An ensemble learning method for spam email detection system based on metaheuristic algorithms
by: Behjat, Amir Rajabi
Published: (2015) -
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013) -
Detecting Duplication in Students’ Research Data: A Method and Illustration
by: Allen, Peter, et al.
Published: (2015)