Evaluation of Time Complexities of Bayesian Vs Hybridized Word Stemming Techniques for Advanced Fee Fraud Emails Filtering
Keywords:
Time execution, Classification, Spam, Mail, Word stemmingAbstract
Okunade Oluwasogo, Adekunle, Afolorunso Adenrele and Adebayo Adegboyega
Time execution of content-based spam filter was investigated using the Bayesian statistical algorithm against Bayesian statistical algorithm incorporated with a word stemming. The execution time intervals for the algorithms implementation of the two techniques were evaluated by subjecting the filters to manipulated and non-manipulate spam mails. The experiment shown that both single technique (Bayesian) and combined techniques (Bayesian incorporated with word stemming) executed suspicious terms manipulated mails faster (within a short time) compared to non-manipulate suspicious terms mails. Combined algorithms performed better and faster in a sophisticated and manipulated environment. The algorithm is more rugged and performed better when suspicious term/tokens were manipulated to deceit the filter.
Downloads
Published
Issue
Section
Similar Articles
- V. A. Ezekoye, Generation and Storage of Biogas Produced from the Mixture of Cassava Peels and Cow Dung , Communication In Physical Sciences: Vol. 1 No. 1 (2010): VOLUME 1 ISSUE 1
- Bayode Adeyanju, Development and Application of a Novel Bi-functional Heat Treatment Furnace: A Review , Communication In Physical Sciences: Vol. 12 No. 5 (2025): Vol 12 ISSUE 5
- Itoro Esiet Ukpe, Oluwatosin Atala, Olu Smith, Artificial Intelligence and Machine Learning in English Education: Cultivating Global Citizenship in a Multilingual World , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Enock Aninakwah, Isaac Aninakwah , Emmanuel Yeboah Okyere, Quantitative Analysis of Plastic Waste Accumulation in Coastal Ghana: Implications for Waste Management , Communication In Physical Sciences: Vol. 12 No. 3 (2025): VOLUME 12 ISSUE 3
- Edoise Areghan, From Data Breaches to Deepfakes: A Comprehensive Review of Evolving Cyber Threats and Online Risk Management , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Adebayo Adegbenro, Arinze Madueke, Aniedi Ojo, Cynthia Alabi, AI-Driven Wealth Advisory: Machine Learning Models for Personalized Investment Portfolios and Risk Optimization , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Fatima Binta Adamu, Muhammad Bashir Abdullahi, Sulaimon Adebayo Bashir, Abiodun Musa Aibinu, Conceptual Design Of A Hybrid Deep Learning Model For Classification Of Cervical Cancer Acetic Acid Images , Communication In Physical Sciences: Vol. 12 No. 2 (2025): VOLUME 12 ISSUE 2
- David Adetunji Ademilua, Edoise Areghan, AI-Driven Cloud Security Frameworks: Techniques, Challenges, and Lessons from Case Studies , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Abdulateef Oluwakayode Disu, Henry Makinde, Olajide Alex Ajide, Aniedi Ojo, Martin Mbonu, Artificial Intelligence in Investment Banking: Automating Deal Structuring, Market Intelligence, and Client’s Insights Through Machine Learning , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- U. Aletan, Comparison of the Proximate and Mineral Composition of two Cowpea Varieties obtained from Mile 12 Market, Lagos , Communication In Physical Sciences: Vol. 3 No. 1 (2018): VOLUME 3 ISSUE 1
You may also start an advanced similarity search for this article.



