Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7293
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Pruthi, Tanvi | - |
dc.contributor.author | Mohana, Rajni [Guided by] | - |
dc.date.accessioned | 2022-10-06T09:09:11Z | - |
dc.date.available | 2022-10-06T09:09:11Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7293 | - |
dc.description.abstract | There are hundreds of email summarization tools nowadays. One of the challenging issues of email summarization is to determine how to secure email summaries from spoofing and bombing and to provide preventive measures. Email is one of the most ubiquitous applications used on a daily basis by millions of people world-wide, traditionally accessed over a fixed terminal or laptop computer. In the past years, there has been an increasing demand for email access over mobile phones too. Our work focused on providing security review measures and preventing approaches that provide quality email summaries with secure transmissions over the network. A summary of document is a shorter text conveys the most important information from the sources .Summary of the text must contains important information from the documents. This paper presents the design and implementation of a system to summarize e mail messages. The system uses the subject and contents of the e mail message to classify e mails based on user’s activities and generate summary of each incoming message. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Nutshell | en_US |
dc.subject | Summarization | en_US |
dc.title | Email Security and Text Summarization | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Email Security and Text Summarization.pdf | 1.56 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.