Dissertations / Theses on the topic 'Spam detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Spam detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Hao, Shuang. "Early detection of spam-related activity." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53091.
Full textSheikhalishahi, Mina. "Spam campaign detection, analysis, and formalization." Doctoral thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/26935.
Full textLes courriels Spams (courriels indésirables ou pourriels) imposent des coûts annuels extrêmement lourds en termes de temps, d’espace de stockage et d’argent aux utilisateurs privés et aux entreprises. Afin de lutter efficacement contre le problème des spams, il ne suffit pas d’arrêter les messages de spam qui sont livrés à la boîte de réception de l’utilisateur. Il est obligatoire, soit d’essayer de trouver et de persécuter les spammeurs qui, généralement, se cachent derrière des réseaux complexes de dispositifs infectés, ou d’analyser le comportement des spammeurs afin de trouver des stratégies de défense appropriées. Cependant, une telle tâche est difficile en raison des techniques de camouflage, ce qui nécessite une analyse manuelle des spams corrélés pour trouver les spammeurs. Pour faciliter une telle analyse, qui doit être effectuée sur de grandes quantités des courriels non classés, nous proposons une méthodologie de regroupement catégorique, nommé CCTree, permettant de diviser un grand volume de spams en des campagnes, et ce, en se basant sur leur similarité structurale. Nous montrons l’efficacité et l’efficience de notre algorithme de clustering proposé par plusieurs expériences. Ensuite, une approche d’auto-apprentissage est proposée pour étiqueter les campagnes de spam en se basant sur le but des spammeur, par exemple, phishing. Les campagnes de spam marquées sont utilisées afin de former un classificateur, qui peut être appliqué dans la classification des nouveaux courriels de spam. En outre, les campagnes marquées, avec un ensemble de quatre autres critères de classement, sont ordonnées selon les priorités des enquêteurs. Finalement, une structure basée sur le semiring est proposée pour la représentation abstraite de CCTree. Le schéma abstrait de CCTree, nommé CCTree terme, est appliqué pour formaliser la parallélisation du CCTree. Grâce à un certain nombre d’analyses mathématiques et de résultats expérimentaux, nous montrons l’efficience et l’efficacité du cadre proposé.
Spam emails yearly impose extremely heavy costs in terms of time, storage space, and money to both private users and companies. To effectively fight the problem of spam emails, it is not enough to stop spam messages to be delivered to end user inbox or be collected in spam box. It is mandatory either to try to find and persecute the spammers, generally hiding behind complex networks of infected devices, which send spam emails against their user will, i.e. botnets; or analyze the spammer behavior to find appropriate strategies against it. However, such a task is difficult due to the camouflage techniques, which makes necessary a manual analysis of correlated spam emails to find the spammers. To facilitate such an analysis, which should be performed on large amounts of unclassified raw emails, we propose a categorical clustering methodology, named CCTree, to divide large amount of spam emails into spam campaigns by structural similarity. We show the effectiveness and efficiency of our proposed clustering algorithm through several experiments. Afterwards, a self-learning approach is proposed to label spam campaigns based on the goal of spammer, e.g. phishing. The labeled spam campaigns are used to train a classifier, which can be applied in classifying new spam emails. Furthermore, the labeled campaigns, with the set of four more ranking features, are ordered according to investigators priorities. A semiring-based structure is proposed to abstract CCTree representation. Through several theorems we show under some conditions the proposed approach fully abstracts the tree representation. The abstract schema of CCTree, named CCTree term, is applied to formalize CCTree parallelism. Through a number of mathematical analysis and experimental results, we show the efficiency and effectiveness of our proposed framework as an automatic tool for spam campaign detection, labeling, ranking, and formalization.
Xu, Hailu. "Efficient Spam Detection across Online Social Networks." University of Toledo / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1470416658.
Full textWu, Hao. "Detecting spam relays by SMTP traffic characteristics using an autonomous detection system." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/10926.
Full textJaroš, Ján. "Detekce nevyžádaných zpráv v mobilní komunikaci a na sociálních sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236082.
Full textLam, Ho-Yu. "A learning approach to spam detection based on social networks /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?CSED%202007%20LAM.
Full textNachenahalli, Bhuthegowda Bharath Kumar. "Methods for Analyzing the Evolution of Email Spam." Thesis, University of Oregon, 2019. http://hdl.handle.net/1794/24213.
Full textVural, Ickin. "Spamming mobile botnet detection using computational intelligence." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/36775.
Full textDissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Neuwirth, David. "Realizace spamového filtru na bázi umělého imunitního systému." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-236637.
Full textHayati, Pedram. "Addressing the new generation of spam (Spam 2.0) through Web usage models." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/850.
Full textSingh, Kuldeep. "An Investigation of Spam Filter Optimaltiy : based on Signal Detection Theory." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9960.
Full textUnsolicited bulk email, commonly known as spam, represents a significant problem on the Internet. The seriousness of the situation is reflected by the fact that approximately 97% of the total e-mail traffic currently (2009) is spam. To fight this problem, various anti-spam methods have been proposed and are implemented to filter out spam before it gets delivered to recipients, but none of these methods are entirely satisfactory. This thesis analyzes the properties of spam filters from the viewpoint of Signal Detection Theory (SDT). The Bayesian approach of Signal Detection Theory provides a basis for determining the tuning of spam filters from the particular user's point of view and helps in determining the utility which the spam filter provides to the user.
Tan, Enhua. "Spam Analysis and Detection for User Generated Content in Online Social Networks." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334.
Full textSun, Yingcheng. "Topic Modeling and Spam Detection for Short Text Segments in Web Forums." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1575281495398615.
Full textWang, De. "Analysis and detection of low quality information in social networks." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53991.
Full textWashha, Mahdi. "Information quality in online social media and big data collection : an example of Twitter spam detection." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30080/document.
Full textThe popularity of OSM is mainly conditioned by the integrity and the quality of UGC as well as the protection of users' privacy. Based on the definition of information quality as fitness for use, the high usability and accessibility of OSM have exposed many information quality (IQ) problems which consequently decrease the performance of OSM dependent applications. Such problems are caused by ill-intentioned individuals who misuse OSM services to spread different kinds of noisy information, including fake information, illegal commercial content, drug sales, mal- ware downloads, and phishing links. The propagation and spreading of noisy information cause enormous drawbacks related to resources consumptions, decreasing quality of service of OSM-based applications, and spending human efforts. The majority of popular social networks (e.g., Facebook, Twitter, etc) over the Web 2.0 is daily attacked by an enormous number of ill-intentioned users. However, those popular social networks are ineffective in handling the noisy information, requiring several weeks or months to detect them. Moreover, different challenges stand in front of building a complete OSM-based noisy information filtering methods that can overcome the shortcomings of OSM information filters. These challenges are summarized in: (i) big data; (ii) privacy and security; (iii) structure heterogeneity; (iv) UGC format diversity; (v) subjectivity and objectivity; (vi) and service limitations In this thesis, we focus on increasing the quality of social UGC that are published and publicly accessible in forms of posts and profiles over OSNs through addressing in-depth the stated serious challenges. As the social spam is the most common IQ problem appearing over the OSM, we introduce a design of two generic approaches for detecting and filtering out the spam content. The first approach is for detecting the spam posts (e.g., spam tweets) in a real-time stream, while the other approach is dedicated for handling a big data collection of social profiles (e.g., Twitter accounts)
Henke, Márcia. "Deteção de Spam baseada na evolução das características com presença de Concept Drift." Universidade Federal do Amazonas, 2015. http://tede.ufam.edu.br/handle/tede/4708.
Full textApproved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-11-16T18:36:36Z (GMT) No. of bitstreams: 1 Tese - Márcia Henke.pdf: 2984974 bytes, checksum: a103355c1a7895956d40d4fa9422347a (MD5)
Approved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-11-16T18:43:03Z (GMT) No. of bitstreams: 1 Tese - Márcia Henke.pdf: 2984974 bytes, checksum: a103355c1a7895956d40d4fa9422347a (MD5)
Made available in DSpace on 2015-11-16T18:43:03Z (GMT). No. of bitstreams: 1 Tese - Márcia Henke.pdf: 2984974 bytes, checksum: a103355c1a7895956d40d4fa9422347a (MD5) Previous issue date: 2015-03-30
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Electronic messages (emails) are still considered the most significant tools in business and personal applications due to their low cost and easy access. However, e-mails have become a major problem owing to the high amount of junk mail, named spam, which fill the e-mail boxes of users. Among the many problems caused by spam messages, we may highlight the fact that it is currently the main vector for the spread of malicious activities such as viruses, worms, trojans, phishing, botnets, among others. Such activities allow the attacker to have illegal access to penetrating data, trade secrets or to invade the privacy of the sufferers to get some advantage. Several approaches have been proposed to prevent sending unsolicited e-mail messages, such as filters implemented in e-mail servers, spam message classification mechanisms for users to define when particular issue or author is a source of spread of spam and even filters implemented in network electronics. In general, e-mail filter approaches are based on analysis of message content to determine whether or not a message is spam. A major problem with this approach is spam detection in the presence of concept drift. The literature defines concept drift as changes occurring in the concept of data over time, as the change in the features that describe an attack or occurrence of new features. Numerous Intrusion Detection Systems (IDS) use machine learning techniques to monitor the classification error rate in order to detect change. However, when detection occurs, some damage has been caused to the system, a fact that requires updating the classification process and the system operator intervention. To overcome the problems mentioned above, this work proposes a new changing detection method, named Method oriented to the Analysis of the Development of Attacks Characteristics (MECA). The proposed method consists of three steps: 1) classification model training; 2) concept drift detection; and 3) transfer learning. The first step generates classification models as it is commonly conducted in machine learning. The second step introduces two new strategies to avoid concept drift: HFS (Historical-based Features Selection) that analyzes the evolution of the features based on over time historical; and SFS (Similarity-based Features Selection) that analyzes the evolution of the features from the level of similarity obtained between the features vectors of the source and target domains. Finally, the third step focuses on the following questions: what, how and when to transfer acquired knowledge. The answer to the first question is provided by the concept drift detection strategies that identify the new features and store them to be transferred. To answer the second question, the feature representation transfer approach is employed. Finally, the transfer of new knowledge is executed as soon as changes that compromise the classification task performance are identified. The proposed method was developed and validated using two public databases, being one of the datasets built along this thesis. The results of the experiments shown that it is possible to infer a threshold to detect changes in order to ensure the classification model is updated through knowledge transfer. In addition, MECA architecture is able to perform the classification task, as well as the concept drift detection, as two parallel and independent tasks. Finally, MECA uses SVM machine learning algorithm (Support Vector Machines), which is less adherent to the training samples. The results obtained with MECA showed that it is possible to detect changes through feature evolution monitoring before a significant degradation in classification models is achieved.
As mensagens eletrônicas (e-mails) ainda são consideradas as ferramentas de maior prestígio no meio empresarial e pessoal, pois apresentam baixo custo e facilidade de acesso. Por outro lado, os e-mails tornaram-se um grande problema devido à elevada quantidade de mensagens não desejadas, denominadas spam, que lotam as caixas de emails dos usuários. Dentre os diversos problemas causados pelas mensagens spam, destaca-se o fato de ser atualmente o principal vetor de propagação de atividades maliciosas como vírus, worms, cavalos de Tróia, phishing, botnets, dentre outros. Tais atividades permitem ao atacante acesso indevido a dados sigilosos, segredos de negócios ou mesmo invadir a privacidade das vítimas para obter alguma vantagem. Diversas abordagens, comerciais e acadêmicas, têm sido propostas para impedir o envio de mensagens de e-mails indesejados como filtros implementados nos servidores de e-mail, mecanismos de classificação de mensagens de spam para que os usuários definam quando determinado assunto ou autor é fonte de propagação de spam e até mesmo filtros implementados em componentes eletrônicos de rede. Em geral, as abordagens de filtros de e-mail são baseadas na análise do conteúdo das mensagens para determinar se tal mensagem é ou não um spam. Um dos maiores problemas com essa abordagem é a deteção de spam na presença de concept drift. A literatura conceitua concept drift como mudanças que ocorrem no conceito dos dados ao longo do tempo como a alteração das características que descrevem um ataque ou ocorrência de novas características. Muitos Sistemas de Deteção de Intrusão (IDS) usam técnicas de aprendizagem de máquina para monitorar a taxa de erro de classificação no intuito de detetar mudança. Entretanto, quando a deteção ocorre, algum dano já foi causado ao sistema, fato que requer atualização do processo de classificação e a intervenção do operador do sistema. Com o objetivo de minimizar os problemas mencionados acima, esta tese propõe um método de deteção de mudança, denominado Método orientado à Análise da Evolução das Características de Ataques (MECA). O método proposto é composto por três etapas: 1) treino do modelo de classificação; 2) deteção de mudança; e 3) transferência do aprendizado. A primeira etapa emprega modelos de classificação comumente adotados em qualquer método que utiliza aprendizagem de máquina. A segunda etapa apresenta duas novas estratégias para contornar concept drift: HFS (Historical-based Features Selection) que analisa a evolução das características com base no histórico ao longo do tempo; e SFS (Similarity based Features Selection) que observa a evolução das características a partir do nível de similaridade obtido entre os vetores de características dos domínios fonte e alvo. Por fim, a terceira etapa concentra seu objetivo nas seguintes questões: o que, como e quando transferir conhecimento adquirido. A resposta à primeira questão é fornecida pelas estratégias de deteção de mudança, que identificam as novas características e as armazenam para que sejam transferidas. Para responder a segunda questão, a abordagem de transferência de representação de características é adotada. Finalmente, a transferência do novo conhecimento é realizada tão logo mudanças que comprometam o desempenho da tarefa de classificação sejam identificadas. O método MECA foi desenvolvido e validado usando duas bases de dados públicas, sendo que uma das bases foi construída ao longo desta tese. Os resultados dos experimentos indicaram que é possível inferir um limiar para detetar mudanças a fim de garantir o modelo de classificação sempre atualizado por meio da transferência de conhecimento. Além disso, um diferencial apresentado no método MECA é a possibilidade de executar a tarefa de classificação em paralelo com a deteção de mudança, sendo as duas tarefas independentes. Por fim, o MECA utiliza o algoritmo de aprendizagem de máquina SVM (Support Vector Machines), que é menos aderente às amostras de treinamento. Os resultados obtidos com o MECA mostraram que é possível detetar mudanças por meio da evolução das características antes de ocorrer uma degradação significativa no modelo de classificação utilizado.
Prasse, Paul [Verfasser], and Tobias [Akademischer Betreuer] Scheffer. "Pattern recognition for computer security : discriminative models for email spam campaign and malware detection / Paul Prasse ; Betreuer: Tobias Scheffer." Potsdam : Universität Potsdam, 2016. http://d-nb.info/1218793066/34.
Full textHenek, Jan. "Proxy servery v síti Internet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-241977.
Full textAlghamdi, Bandar Abdulrahman. "Topic-based feature selection and a hybrid approach for detecting spammers on twitter." Thesis, Queensland University of Technology, 2020. https://eprints.qut.edu.au/204112/1/Bandar%20Abdulrahman%20A_Alghamdi_Thesis.pdf.
Full textAndla, Christoffer. "Detecting Spam Emails." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200517.
Full textShekar, Chandra. "Detecting Spam in Microblogs." University of Akron / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=akron1311113194.
Full textYounis, Zaki Mohamed. "An ontological approach for monitoring and surveillance systems in unregulated markets." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/an-ontological-approach-for-monitoring-and-surveillance-systems-in-unregulated-markets(056f8010-08b2-4eb0-a75d-5301b899ec90).html.
Full textGoh, Kwang Leng. "Methods for demoting and detecting Web spam." Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1481.
Full textRajdev, Meet. "Fake and Spam Messages: Detecting Misinformation During Natural Disasters on Social Media." DigitalCommons@USU, 2015. https://digitalcommons.usu.edu/etd/4462.
Full textFerreira, Uchoa Marina. "Detecting Fake Reviews with Machine Learning." Thesis, Högskolan Dalarna, Mikrodataanalys, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:du-28133.
Full textKolan, Prakash. "System and Methods for Detecting Unwanted Voice Calls." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5155/.
Full textEkelund, Anders. "Detection and haemodilutive treatment of cerebral arterial vasospasm and delayed ischaemia after aneurysmal subarachnoid haemorrhage." Lund : Lund University, 1999. http://catalog.hathitrust.org/api/volumes/oclc/68945106.html.
Full textLoser, Nichole M. "Malingering Detection Measure Utility and Concordance in a University Accommodation-Seeking Student Population." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/3668.
Full textBreitenmoser, Sabina. "Evaluation and implementation of neural brain activity detection methods for fMRI." Thesis, Linköping University, Department of Biomedical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-3069.
Full textFunctional Magnetic Resonance Imaging (fMRI) is a neuroimaging technique used to study brain functionality to enhance our understanding of the brain. This technique is based on MRI, a painless, noninvasive image acquisition method without harmful radiation. Small local blood oxygenation changes which are reflected as small intensity changes in the MR images are utilized to locate the active brain areas. Radio frequency pulses and a strong static magnetic field are used to measure the correlation between the physical changes in the brain and the mental functioning during the performance of cognitive tasks.
This master thesis presents approaches for the analysis of fMRI data. The constrained Canonical Correlation Analysis (CCA) which is able to exploit the spatio-temporal nature of an active area is presented and tested on real human fMRI data. The actual distribution of active brain voxels is not known in the case of real human data. To evaluate the performance of the diagnostic algorithms applied to real human data, a modified Receiver Operating Characteristics (modified ROC) which deals with this lack of knowledge is presented. The tests on real human data reveal the better detection efficiency with the constrained CCA algorithm.
A second aim of this thesis was to implement the promising technique of constrained CCA into the software environment SPM. To implement the constrained CCA algorithms into the fMRI part of SPM2, a toolbox containing Matlab functions has been programmed for the further use by neurological scientists. The new SPM functionalities to exploit the spatial extent of the active regions with CCA are presented and tested.
Aminmansour, Sina. "Video analytics for the detection of near-miss incidents at railway level crossings and signal passed at danger events." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/112765/1/Sina_Aminmansour_Thesis.pdf.
Full textRiad, Mourad Y. "Detection and analysis of deck cracks in a long span empirically designed bridge deck through embedded sensory systems." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4582.
Full textTitle from document title page. Document formatted into pages; contains xi, 184 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 145-157).
Zhou, Xinxin. "An InGaAlAs-InGaAs two-colour detector, InAs photodiode and Si SPAD for radiation thermometry." Thesis, University of Sheffield, 2014. http://etheses.whiterose.ac.uk/7462/.
Full textTsiampali, Julia [Verfasser], and Ingrid [Gutachter] Span. "Label-free detection of brain tumour cell immunogenicity upon mesenchymal transformation using Raman technology / Julia Tsiampali ; Gutachter: Ingrid Span." Düsseldorf : Universitäts- und Landesbibliothek der Heinrich-Heine-Universität Düsseldorf, 2021. http://d-nb.info/1225932017/34.
Full textTORTAROLO, GIORGIO. "Laser Scanning Microscopy with SPAD Array Detector: Towards a New Class of Fluorescence Microscopy Techniques." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1000654.
Full textAmbardekar, Aditya. "Analysis of BER in optical direct detection DPSK system in the presence of SPM and chromatic dispersion." abstract and full text PDF (UNR users only), 2008. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1460745.
Full textHallman, L. (Lauri). "Single photon detection based devices and techniques for pulsed time-of-flight applications." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526210445.
Full textTiivistelmä Tässä työssä kehitettiin uudentyyppinen, tehostettua "gain-switchingiä" hyödyntävä laserdiodilähetin käytettäväksi yksittäisten fotonien avalanche-ilmaisimien (SPAD) kanssa, ja sitä testattiin pulssin lentoaikaan perustuvassa laseretäisyysmittaussovelluksessa. Useita laserdiodiversioita testattiin ja ohjauselektroniikkaa kehitettiin. Ohjauselektroniikan parannukset mahdollistivat jopa 1 MHz pulssitustaajuuden, kun taas laserin maksimiteho oli noin 5–40 W riippuen laserdiodin dimensioista. Suuri lähtöteho on edullinen varsinkin vahvoissa taustafotoniolosuhteissa ulkona. Laserpulssin pituus vastaa tyypillisen SPAD-ilmaisimen jitteriä tarjoten useita etuja. Uusi laserpulssitinrakenne mahdollistaa esimerkiksi kompaktin etäisyysmittarin 50 m mittausetäisyydelle ulkona aurinkoisessa olosuhteessa mm–cm -mittaustarkkuudella (σ-arvo) yli 10 kHz mittaustahdilla. Yksittäisten fotonien lentoaikamittaustekniikan osoitettiin myös mahdollistavan soodakattilan keon korkeuden mittauksen, jossa on voimakkaasti vaimentavaa ja dispersoivaa savukaasua. Lisäksi portitetun yksittäisten fotonien ilmaisutekniikan osoitettiin hylkäävän fluoresenssin synnyttämiä fotoneita Raman-spektroskoopissa, joka johtaa selvästi parempaan signaali-kohinasuhteeseen. Fotoni-ilmiöitä tutkittiin myös lineaarista valoilmaisinta hyödyntävän pulssin kulkuaikamittaukseen perustuvan lasertutkan tapauksessa. Osoitettiin, että signaalin fotonikohina vaikuttaa optimaaliseen ilmaisinkonfiguraatioon, ja että pulssin ilmaisujitteri voidaan minimoida sopivalla ajoitusdiskriminaattorilla
Lanza, Davide. "Ottimizzazione energetica di un impianto di aria compressa in uno stabilimento industriale: il caso Technogym spa." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Find full textVignetti, Matteo Maria. "Development of a 3D Silicon Coincidence Avalanche Detector (3D-SiCAD) for charged particle tracking." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSEI017/document.
Full textThe objective of this work is to develop a novel position sensitive charged particle detector referred to as "3D Silicon Coincidence Avalanche Detector" (3D-SiCAD). The working principle of this novel device relies on a "time-coincidence" mode detection between a pair of vertically aligned Geiger-mode avalanche diodes, with the aim of achieving negligible noise levels with respect to detectors based on conventional avalanche diodes, such as Silicon Photo-Multipliers (SiPM), and, at the same time, providing single charged particle detection capability thanks to the high charge multiplication gain, inherent of the Geiger-mode operation. A 3D-SiCAD could be particularly suitable for nuclear physics applications, in the field of High Energy Physics experiments and emerging Medical Physics applications such as hadron-therapy and Proton Computed Tomography whose future developments demand unprecedented figures in terms of material budget, noise, spatial resolution, radiation hardness, power consumption and cost-effectiveness. In this work, a 3D-SiCAD demonstrator has been successfully developed and fabricated in the Austria Micro-Systems High-Voltage 0.35 μm CMOS technology by adopting a “flip-chip” approach for the 3D-assembling. The characterization results allowed demonstrating the feasibility of this novel device and validating the expected performances in terms of excellent particle detection efficiency and noise rejection capability with respect to background counts
El, Refaei Ehab Ahmed Mohamed [Verfasser]. "Value of 3-D High Resolution Magnetic Resonance Imaging in Detecting the Offending Vessel in Hemifacial Spasm: Comparison with Intraoperative High Definition Endoscopic Visualization / Ehab Ahmed Mohamed El Refaei." Greifswald : Universitätsbibliothek Greifswald, 2013. http://d-nb.info/1043405194/34.
Full textZhang, Wu Xian, and 張伍賢. "Instagram Spam Detection." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/2ppj9n.
Full textPOONIA, SANDEEP. "EMAIL SPAM DETECTION." Thesis, 2018. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16193.
Full text鍾在豐. "Chinese Spam Detection and Implementation." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/93312610924109849787.
Full textHu, Chen-Chieh, and 胡箴潔. "Detection of redirection spam pages." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/62114119948413140772.
Full text元智大學
資訊管理學系
94
As the Internet scope and business profit grow, many web site administrators make well-designed ways in their homepages. In that way rose SEO and web spam pages. Meanwhile the search engines put the illegal web pages in black lists. In web spam pages the main model is cloaking, but now redirection is increasingly becoming the one of main stream. Our research is going to detect redirection spam pages. First we collected web pages using popular queries and then filtered them by modified browser programs to leave redirection ones alone. Second we manually checked the redirection spam pages and analyzed how the redirection time affected the spam pages. Third we counted the ratio of cloaking used in redirection web pages and the term sizes and link quantities as well. Finally we counted the thresholds of terms and links as judgments by statistics. We hope to rise efficiency and effect to detect redirection spam pages by the ways we mentioned. And the search engines could take more redirection spam pages away to form the black lists.
Nayak, D., and M. R. Sahoo. "Spam detection in collaborative tagging." Thesis, 2014. http://ethesis.nitrkl.ac.in/5959/1/e-126.pdf.
Full textBrown, Kevin Alan. "A comparison of statistical spam detection techniques." 2006. http://digital.library.okstate.edu/etd/umi-okstate-1741.pdf.
Full textHsu, Te-en, and 徐得恩. "A Study of Collaborative Spam Mail Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/84250260377456329835.
Full text國立雲林科技大學
資訊管理系碩士班
92
Email has become one of the most widely used methods of communication, due to its speed, low cost and ease of use. However, with this medium also comes the problem of Unsolicited Bulk Email, or called “spam mail”; the medium is just as useful legitimate user as it is for corporations wanting to advertise. This has is turn led to the requirement that these unwanted emails should be automatically filtered to leave just the relevant ones for the user. This study proposed a method based on multiagent system to collaboratively filter spam from users’ mail stream. The method composed of three parts: a na��ve bayesian classifier for single detection; a voting scheme for computing spam probability from each agent in the committee to final spam probability and a modified reinforcement learning algorithm used for updating reward table. Then, the method was tested by simulation. The result showed that detection rate in collaborative spam detection is higher than single detection and false positive rate is less than single detection.
Chen, Tsung-Hsin, and 陳宗欣. "Implement A SIP-based Spam Detection System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/74385283329957932175.
Full text中華大學
資訊工程學系(所)
96
As Voice over IP (VoIP) is gaining popularity, VoIP has become an important communication tool in the present time. Thus, the security problem of Spam over Internet Telephony (SPIT) will become an important issue. SPIT cannot be treated as the same way of anti-spam problem, since the SPIT is a real-time service; it is more difficult to guard the SPIT than anti-spam. Besides, the lower cost of VoIP communication combined with traditional phone fraudulence will bring more serious social problems. In order to solve the SPIT problem, we proposed an effective SIP-based spam detection system (Social Network based SPIT Detection System;SNSDS). In proposed architecture, we adopt the idea of the relationship of trust between peoples, and integrated the six degrees of separation with the concept of the social network. Also, we apply breadth-first algorithm to search and calculate the confidence degree of caller, and compared with a predefined threshold to decide whether the caller is a legitimate VoIP Callers or no. In the experiment, we can find that the proposed architecture has better performance compared with the method presented by Ram.
Singh, Smriti. "Improved Techniques for Online Review Spam Detection." Thesis, 2015. http://ethesis.nitrkl.ac.in/7972/1/656.pdf.
Full textNarayan, Rohit. "Review Spam Detection Using Machine Learning Techniques." Thesis, 2016. http://ethesis.nitrkl.ac.in/8587/1/2016_MT_214CS2155_Rohit_Narayan.pdf.
Full textHembram, Punya Prava. "Singleton Review Spam Detection Using Semantic Similarity." Thesis, 2016. http://ethesis.nitrkl.ac.in/9106/1/2016_MT_PPHembram.pdf.
Full text