Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Prioritizing Emails and Protect from Spam by Effectively Using Identity and Address Book Features  
  Authors : Venkata SanyasiRao Sasipalli; Krishnam Raju Gottumukkala; K.S. Murthy Naidu
  Cite as:

 

Priority always adds value to activity. Unorganized emails sometimes cause irritation. Most of the time spam or unwanted emails trouble us in reading emails. Some features of email clients are not fully explored to prioritize and organize the emails effectively. Address book can be effectively used to prioritizing emails and also to protect from spam emails. This paper proposes a method to prioritize and organize emails and further separate spam or unwanted emails by utilizing the features of address book in email clients.

 

Published In : IJCSN Journal Volume 5, Issue 3

Date of Publication : June 2016

Pages : 472-476

Figures :05

Tables : 01

Publication Link : Prioritizing Emails and Protect from Spam by Effectively Using Identity and Address Book Features

 

 

 

Venkata SanyasiRao Sasipalli : holds doctorate in Information Engineering from Hiroshima University and an active researcher in interdisciplinary areas of Computer Technology, Electronics & Communications, and Mathematical algorithms.

Krishnam Raju Gottumukkala : an expert in Fluid dynamics, Mathematical algorithms, and Information Technology. He is a professor emeritus of Andhra University and active researcher.

K.S.Murthy Naidu : is an active research director at CECTech and Entrepreneur of ISRO, holds doctorate in Remote Sensing from Andhra University. His research interests include, information technology, remote sensing, bio information technology.

 

 

 

 

 

 

 

Prioritizing Emails, Spam Emails, Email Clients, Header Information, Address Book.

While using the proposed method, each user can have different experience, however, all private domain users enjoy simple and yet powerful plug-in or email client. The methods proposed in this paper can be extended to create more functionality to control spam emails. As the plug-in / client software is proprietary flow-charts and other address book / identify configuration screenshots are not included in this paper. Reader of this paper can simulate a plug-in or client software in a fashion they want to implement. Hence the general idea is presented.

 

 

 

 

 

 

 

 

 

[1] Laura. A. Dabbish, et.al., “Understanding Email Use: Predicting Action on a Message”, Carnegie Mellon University, CHI, 2005, April 2-7, 2005. [2] Douglas Aberdeen, et.al., “The Learning Behind Gmail Priority Inbox” Google Inc., Zurich, Switzerland, 2011. [3] Mary Mallard, “How to Organize Your Email Inbox Today”, Off the Ground, Sep 10, 2014. [4] Email Standards, https://www.fastmail.com/help/technical/standards.html.