{"id":"https://openalex.org/W2547753597","doi":"https://doi.org/10.1145/2980258.2980304","title":"Soft Computing Approaches to Classification of Emails for Sentiment Analysis","display_name":"Soft Computing Approaches to Classification of Emails for Sentiment Analysis","publication_year":2016,"publication_date":"2016-08-25","ids":{"openalex":"https://openalex.org/W2547753597","doi":"https://doi.org/10.1145/2980258.2980304","mag":"2547753597"},"language":"en","primary_location":{"id":"doi:10.1145/2980258.2980304","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2980258.2980304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Informatics and Analytics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035197203","display_name":"Pranjal S. Bogawar","orcid":null},"institutions":[{"id":"https://openalex.org/I133978751","display_name":"Rashtrasant Tukadoji Maharaj Nagpur University","ror":"https://ror.org/04esgv207","country_code":"IN","type":"education","lineage":["https://openalex.org/I133978751"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pranjal S. Bogawar","raw_affiliation_strings":["Department of Information Technology, Priyadarshini College of Engineering, R.T.M. Nagpur University"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Priyadarshini College of Engineering, R.T.M. Nagpur University","institution_ids":["https://openalex.org/I133978751"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043232541","display_name":"Kishor K. Bhoyar","orcid":"https://orcid.org/0000-0003-2106-1809"},"institutions":[{"id":"https://openalex.org/I133978751","display_name":"Rashtrasant Tukadoji Maharaj Nagpur University","ror":"https://ror.org/04esgv207","country_code":"IN","type":"education","lineage":["https://openalex.org/I133978751"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K. K. Bhoyar","raw_affiliation_strings":["Department of Information Technology, Yeshwantrao Chavhan College of Engineering, R.T.M. Nagpur University"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Yeshwantrao Chavhan College of Engineering, R.T.M. Nagpur University","institution_ids":["https://openalex.org/I133978751"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035197203"],"corresponding_institution_ids":["https://openalex.org/I133978751"],"apc_list":null,"apc_paid":null,"fwci":1.9904,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.90075305,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7705349326133728},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7078297138214111},{"id":"https://openalex.org/keywords/backpropagation","display_name":"Backpropagation","score":0.6720936298370361},{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.6699399352073669},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.6587285995483398},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6259323358535767},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5764553546905518},{"id":"https://openalex.org/keywords/electronic-mail","display_name":"Electronic mail","score":0.5057494640350342},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4980161190032959},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.48192098736763},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4728061258792877},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4477715492248535},{"id":"https://openalex.org/keywords/affinity-propagation","display_name":"Affinity propagation","score":0.4194266200065613},{"id":"https://openalex.org/keywords/fuzzy-clustering","display_name":"Fuzzy clustering","score":0.3614261746406555},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2084910273551941},{"id":"https://openalex.org/keywords/canopy-clustering-algorithm","display_name":"Canopy clustering algorithm","score":0.11558917164802551}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7705349326133728},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7078297138214111},{"id":"https://openalex.org/C155032097","wikidata":"https://www.wikidata.org/wiki/Q798503","display_name":"Backpropagation","level":3,"score":0.6720936298370361},{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.6699399352073669},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.6587285995483398},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6259323358535767},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5764553546905518},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.5057494640350342},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4980161190032959},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.48192098736763},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4728061258792877},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4477715492248535},{"id":"https://openalex.org/C109659709","wikidata":"https://www.wikidata.org/wiki/Q3407504","display_name":"Affinity propagation","level":5,"score":0.4194266200065613},{"id":"https://openalex.org/C17212007","wikidata":"https://www.wikidata.org/wiki/Q5511111","display_name":"Fuzzy clustering","level":3,"score":0.3614261746406555},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2084910273551941},{"id":"https://openalex.org/C104047586","wikidata":"https://www.wikidata.org/wiki/Q5033439","display_name":"Canopy clustering algorithm","level":4,"score":0.11558917164802551}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2980258.2980304","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2980258.2980304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Informatics and Analytics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W175854469","https://openalex.org/W631238529","https://openalex.org/W1649577073","https://openalex.org/W1964126497","https://openalex.org/W1975152892","https://openalex.org/W1975653240","https://openalex.org/W1986427413","https://openalex.org/W1995450389","https://openalex.org/W2014938775","https://openalex.org/W2022266106","https://openalex.org/W2042692308","https://openalex.org/W2066252791","https://openalex.org/W2071629922","https://openalex.org/W2076166325","https://openalex.org/W2100109148","https://openalex.org/W2114449252","https://openalex.org/W2123407642","https://openalex.org/W2132779844","https://openalex.org/W2145983964","https://openalex.org/W2149167588","https://openalex.org/W2154266658","https://openalex.org/W2159706446","https://openalex.org/W2161160262","https://openalex.org/W2165988008","https://openalex.org/W2169756843","https://openalex.org/W2187786553","https://openalex.org/W2373900867","https://openalex.org/W2541512317","https://openalex.org/W2554193495","https://openalex.org/W2604181158","https://openalex.org/W2936393598","https://openalex.org/W6604957736","https://openalex.org/W6620410633","https://openalex.org/W6687108167"],"related_works":["https://openalex.org/W2492910442","https://openalex.org/W2255926860","https://openalex.org/W2901744059","https://openalex.org/W4200527052","https://openalex.org/W2034179494","https://openalex.org/W2340026615","https://openalex.org/W4221100201","https://openalex.org/W3157475202","https://openalex.org/W2020286551","https://openalex.org/W2964398403"],"abstract_inverted_index":{"Email":[0,11,22,46],"is":[1,23,33,88],"a":[2],"fast":[3],"and":[4,44,57,103],"well-liked":[5],"communication":[6],"medium":[7],"on":[8,110],"the":[9,49,67,85,119,129,135,149],"internet.":[10,21],"users":[12],"are":[13,63],"rapidly":[14],"increased":[15],"due":[16],"to":[17,52,65,75,83],"easy":[18],"availability":[19],"of":[20,60,115,138],"used":[24,35,64],"for":[25,36,79,90,113],"personal":[26],"as":[27,29,40,97,117],"well":[28],"official":[30],"communications.":[31],"It":[32],"also":[34],"illegitimate":[37],"activities":[38],"such":[39,96],"phishing,":[41],"spamming,":[42],"abusing,":[43],"threatening.":[45],"mining":[47,62,94],"gives":[48,148],"better":[50],"solution":[51],"this":[53,142],"problem.":[54],"The":[55,72,132],"clustering":[56,102],"classification":[58,114],"methods":[59],"data":[61],"classify":[66],"emails":[68,116],"into":[69],"different":[70],"categories.":[71],"paper":[73,133],"tries":[74],"extract":[76],"effective":[77],"features":[78,112],"investigating":[80],"an":[81],"email":[82],"identify":[84],"sentiment":[86],"which":[87],"helpful":[89],"forensic":[91],"people.":[92],"Data":[93],"approaches":[95],"k-means":[98],"clustering,":[99],"fuzzy":[100],"c-means":[101],"neural":[104,144],"network":[105,145],"backpropagation":[106,146],"algorithm":[107,147],"were":[108],"applied":[109],"extracted":[111],"per":[118],"sentiments":[120],"hidden":[121],"inside":[122],"them.":[123],"Evidence":[124],"can":[125],"be":[126],"generated":[127],"from":[128],"Negative":[130],"sentiments.":[131],"does":[134],"comparative":[136],"analysis":[137],"various":[139],"algorithms.":[140],"For":[141],"problem,":[143],"best":[150],"recognition":[151],"rate.":[152]},"counts_by_year":[{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
