Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Every
verifies
with
probability
distribution
characteristics.
Once
all
the
characteristics are satisfied in Meta data structure then to allow in inbox. In inbox all the mails
are placed here only trust worthy mails of content.
mining techniques. In total number of mails after performing the preprocessing operation then
to apply here classification techniques. Classification gives the results like recipient and
persistent mails.
Advantages:
1. It can display bad list attackers information.
2. It is reduced the energy levels and cost.
Architecture:
Frontend
Backend
IDE
Operating System
java (jdk1.6.0)
JSP, Servlets
oracle10g
my eclipse 8.0
windows XP
Hardware requirements:
Processor
Pentium IV
Hard Disk
80GB
RAM
2GB