Volume 6 , Issue 2 , PP: 56-64, 2023 | Cite this article as | XML | Html | PDF | Full Length Article
Mohamed Saber 1 * , El-Sayed M. El-Kenawy 2 , Abdelhameed Ibrahim 3 , Marwa M. Eid 4 , Abdelaziz A. Abdelhamid 5
Doi: https://doi.org/10.54216/IJWAC.060205
By use of electronic communication, we are able to communicate a message to the recipient. In this digital age, a collaboration between several people is possible thanks to a variety of digital technologies. This interaction may take place in a variety of media formats, including but not limited to text, images, sound, and language. Today, a person's primary means of communication is their smart gadget, most commonly a cell phone. Spam is another side effect of our increasingly text-based modes of communication. We received a bunch of spam texts on our phones, and we know they're not from anyone we know. The vast majority of businesses nowadays use spam texts to advertise their wares, even when recipients have explicitly requested not to receive such messages. As a rule, there are many more spam emails than genuine ones. We apply text classification approaches to define short messaging service (SMS) and spam filtering in this study, which effectively categorizes messages. In this paper, we use "machine learning algorithms" and metaheuristic optimization to determine what percentage of incoming SMS messages are spam. This is why we used the optimized models to evaluate and contrast many classification strategies for gathering data.
Support vector machine , Neural network , Computer Networks , Decision tree , Voting ensemble , Dipper throated optimization.
[1] Hon, J., 2020. What’S The Difference Between SMS And MMS?. [online] Twigby Help & Support. Available at: <https://twigby.zendesk.com/hc/en-us/articles/115010624828-What-s-the-difference-between-SMS-and-MMS->.
[2] En.wikipedia.org. 2020. Mobile Phone Spam. [online] Available at: <https://en.wikipedia.org/wiki/Mobile_phone_spam> .
[3] SearchMobileComputing. 2020. What Is SMS Spam (Cell Phone Spam Or Short Messaging Service Spam)? - Definition From Whatis.Com. [online] Available at: <https://searchmobilecomputing.techtarget.com/definition/SMS-spam>.
[4] J. Han, M. Kamber. Data Mining Concepts and Techniques. by Elsevier inc., Ed: 2nd, 2006
[5] A. Tiago, Almeida , José María GómezAkebo Yamakami. Contributions to the Study of SMS Spam Filtering. University of Campinas, Sao Paulo, Brazil.
[6] M. Bilal Junaid, Muddassar Farooq. Using Evolutionary Learning Classifiers To Do Mobile Spam (SMS) Filtering. National University of Computer & Emerging Sciences (NUCES) Islamabad, Pakistan.
[7] Inwhee Joe and Hyetaek Shim, "An SMS Spam Filtering System Using Support Vector Machine," Division of Computer Science and Engineering, Hanyang University, Seoul, 133-791 South Korea.
[8] Xu, Qian, Evan Wei Xiang, Qiang Yang, Jiachun Du, and Jieping Zhong. "Sms spam detection using noncontent features." IEEE Intelligent Systems 27, no. 6 (2012): 44-51. Yadav, K., Kumaraguru, P., Goyal, A., Gupta, A., and Naik, V. "SMSAssassin: Crowdsourcing driven mobile-based system for SMS spam filtering," Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, ACM, 2011, pp. 1-6.
[9] Duan, L., Li, N., & Huang, L. (2009). “A new spam short message classification” 2009 First International Workshop on Education Technology and Computer Science, 168-171.
[10] Weka The University of Waikato, Weka 3: Data Mining Software in Java, viewed on 2011 September 14.
[11] Mccallum, A., & Nigam, K. (1998). “A comparison of event models for naive Bayes text classification”. AAAI-98 Workshop on 'Learning for Text Categorization'
[12] Bayesian Network Classifiers in Weka, viewed on 2011 September 14.
[13] Llora, Xavier, and Josep M. Garrell (2001) Evolution of decision trees, edn., Forth Catalan Conference on Artificial Intelligence (CCIA2001).
[14] B. G. Becker. Visualizing Decision Table Classifiers. pages 102- 105, IEEE (1998).
[15] El-Kenawy, El-Sayed M., Seyedali Mirjalili, Fawaz Alassery, Yu-Dong Zhang, Marwa Metwally Eid, Shady Y. El-Mashad, Bandar Abdullah Aloyaydi, Abdelhameed Ibrahim, and Abdelaziz A. Abdelhamid. "Novel Meta-Heuristic Algorithm for Feature Selection, Unconstrained Functions and Engineering Problems." IEEE Access 10 (2022): 40536-40555.
[16] El-kenawy, El-Sayed M., Marwa M. Eid, and Abdelhameed Ibrahim. "Anemia estimation for covid-19 patients using a machine learning model." Journal of Computer Science and Information Systems 17, no. 11 (2021): 2535-1451.
[17] El-Kenawy, El-Sayed M., Marwa Eid, and Alshimaa H. Ismail. "A New Model for Measuring Customer Utility Trust in Online Auctions." International Journal of Computer Applications 975: 8887.
[18] El-kenawy, El-Sayed M., Hattan F. Abutarboush, Ali Wagdy Mohamed, and Abdelhameed Ibrahim. "Advance artificial intelligence technique for designing double T-shaped monopole antenna." CMC-COMPUTERS MATERIALS & CONTINUA 69, no. 3 (2021): 2983-2995.