To address the current situation where many small enterprises lack efficient management of customer data, this paper proposes a design and implementation plan of a customer relationship management (CRM) system based o...To address the current situation where many small enterprises lack efficient management of customer data, this paper proposes a design and implementation plan of a customer relationship management (CRM) system based on email service. It aims to solve the problems of data dispersion, untimely update and information redundancy in customer management of small and medium-sized enterprises. The system includes four core functional modules: historical email analysis, lead pool management, customer management and email archiving. Through email mining and web crawler technology, the system can extract potential customer information from historical emails and enrich lead data;the lead pool management module supports lead information maintenance, status tracking and conversion of high-value leads;the customer management module realizes the maintenance and dynamic tracking of customer information;the email management module provides the archiving of emails and attachments and the structured storage of basic email information. The system provides automated and intelligent customer information management, improves the work efficiency of sales staff, and provides an efficient customer relationship management solution for enterprises.展开更多
Cognitive biases are commonly used by attackers to manipulate users’psychology in phishing emails.This study systematically analyzes the exploitation of cognitive biases in phishing emails and addresses the following...Cognitive biases are commonly used by attackers to manipulate users’psychology in phishing emails.This study systematically analyzes the exploitation of cognitive biases in phishing emails and addresses the following questions:(1)Which cognitive biases are frequently exploited in phishing emails?(2)How are cognitive biases exploited in phishing emails?(3)How effective are cognitive bias features in detecting phishing emails?(4)How can the exploitation of cognitive biases in phishing emails be modelled?To address these questions,this study constructed a cognitive processing model that explains how attackers manipulate users by leveraging cognitive biases at different cognitive stages.By annotating 482 phishing emails,this study identified 10 common types of cognitive biases and developed corresponding detection models to evaluate the effectiveness of these bias features in phishing email detection.The results show that models incorporating cognitive bias features significantly outperform baseline models in terms of accuracy,recall,and F1 score.This study provides crucial theoretical support for future anti-phishing methods,as a deeper understanding of cognitive biases offers key insights for designing more effective detection and prevention strategies.展开更多
Aiming at the problems of difficult deployment and access of surveillance system server,as well as high operation and maintenance cost,a remote surveillance camera is designed based on RK3566 chip,which is controlled ...Aiming at the problems of difficult deployment and access of surveillance system server,as well as high operation and maintenance cost,a remote surveillance camera is designed based on RK3566 chip,which is controlled and transmits data via email platform.Firstly,to address the impact of environmental factors such as weather and light on image quality,a deep neural network(DNN)image exposure correction network is employed to rectify images with abnormal exposure.Additionally,a back propagation(BP)neural network is utilized to fit a curve relating the brightness difference to the gamma value of images before and after exposure correction,thereby adjusting the gamma value of the camera.Secondly,to enhance the precision of YOLOv5 algorithm in differentiating between anomalies in nighttime imagery,infrared image data are employed,and a context-aware light-weight label assignment head and coordinate attention mechanism are incorporated into the model to augment the model’s detection accuracy and recall rate for small targets.Furthermore,to meet the demand for reporting of abnormal situations in unattended environments,an automatic target identification and reporting process has been designed which combines YOLOv5 algorithm with the frame-difference motion detection algorithm.The camera has been tested for compatibility with the current mainstream commercial email platforms.The mean time required for transmitting a single image file via the email platform is less than 10 s,while the mean time for transmitting a short video is less than 60 s.The BP network’s average training loss is 0.015,and the average testing loss is 0.013,which basically meets the precision requirements for gamma adjustment.The improved YOLOv5 algorithm achieved an mAP@0.5 of 91.5%and a recall rate of 85.5%,effectively enhancing the accuracy of small object detection.展开更多
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se...Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security risks.Current spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data breaches.To address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam emails.This framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual data.This approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated components.The model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the field.These findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection systems.The framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam.展开更多
本文以托福新题型“Write an Email”为研究对象,基于任务型测试理论,探讨其在测评考生书面交际能力中的交际效度。研究引入语用学(礼貌原则、言语行为)和体裁分析(Genre Analysis)框架,系统剖析该题型对语用策略和语篇结构的考查逻辑...本文以托福新题型“Write an Email”为研究对象,基于任务型测试理论,探讨其在测评考生书面交际能力中的交际效度。研究引入语用学(礼貌原则、言语行为)和体裁分析(Genre Analysis)框架,系统剖析该题型对语用策略和语篇结构的考查逻辑。通过对大量学生样本的系统偏误分析,归纳出语用失误和体裁偏误是学习者面临的主要挑战。研究结果为语言测试效度验证与教学实践提供参考,并提出以功能性语块习得和情境化语用意识培养为核心的分层教学框架。展开更多
Mobile agent currently is a hot spot among research fields of Internet technology. The deployment of mo-bile agents over network usually needs extra infrastructure for agent migration and communication,which adds to t...Mobile agent currently is a hot spot among research fields of Internet technology. The deployment of mo-bile agents over network usually needs extra infrastructure for agent migration and communication,which adds to thedifficulty of popularizing MA systems. We present in this paper an Email-box-based mechanism of agent migrationand communication,which is built on top of the formerly developed MOON-EAMS system. This mechanism,basedon Email formatting skills,utilizes Email for data transfer,and offers a loosely coupled option of agent migration andcommunication,which ,compared to related works ,obtains the advantage of easy implementation,and reduces the riskof network connection failure.展开更多
文摘To address the current situation where many small enterprises lack efficient management of customer data, this paper proposes a design and implementation plan of a customer relationship management (CRM) system based on email service. It aims to solve the problems of data dispersion, untimely update and information redundancy in customer management of small and medium-sized enterprises. The system includes four core functional modules: historical email analysis, lead pool management, customer management and email archiving. Through email mining and web crawler technology, the system can extract potential customer information from historical emails and enrich lead data;the lead pool management module supports lead information maintenance, status tracking and conversion of high-value leads;the customer management module realizes the maintenance and dynamic tracking of customer information;the email management module provides the archiving of emails and attachments and the structured storage of basic email information. The system provides automated and intelligent customer information management, improves the work efficiency of sales staff, and provides an efficient customer relationship management solution for enterprises.
文摘Cognitive biases are commonly used by attackers to manipulate users’psychology in phishing emails.This study systematically analyzes the exploitation of cognitive biases in phishing emails and addresses the following questions:(1)Which cognitive biases are frequently exploited in phishing emails?(2)How are cognitive biases exploited in phishing emails?(3)How effective are cognitive bias features in detecting phishing emails?(4)How can the exploitation of cognitive biases in phishing emails be modelled?To address these questions,this study constructed a cognitive processing model that explains how attackers manipulate users by leveraging cognitive biases at different cognitive stages.By annotating 482 phishing emails,this study identified 10 common types of cognitive biases and developed corresponding detection models to evaluate the effectiveness of these bias features in phishing email detection.The results show that models incorporating cognitive bias features significantly outperform baseline models in terms of accuracy,recall,and F1 score.This study provides crucial theoretical support for future anti-phishing methods,as a deeper understanding of cognitive biases offers key insights for designing more effective detection and prevention strategies.
基金Funded by Open Foundation of the State Key Laboratory of Fluid Power and Mechatronic Systems,Zhejiang University,China(No.GZKF-202219)。
文摘Aiming at the problems of difficult deployment and access of surveillance system server,as well as high operation and maintenance cost,a remote surveillance camera is designed based on RK3566 chip,which is controlled and transmits data via email platform.Firstly,to address the impact of environmental factors such as weather and light on image quality,a deep neural network(DNN)image exposure correction network is employed to rectify images with abnormal exposure.Additionally,a back propagation(BP)neural network is utilized to fit a curve relating the brightness difference to the gamma value of images before and after exposure correction,thereby adjusting the gamma value of the camera.Secondly,to enhance the precision of YOLOv5 algorithm in differentiating between anomalies in nighttime imagery,infrared image data are employed,and a context-aware light-weight label assignment head and coordinate attention mechanism are incorporated into the model to augment the model’s detection accuracy and recall rate for small targets.Furthermore,to meet the demand for reporting of abnormal situations in unattended environments,an automatic target identification and reporting process has been designed which combines YOLOv5 algorithm with the frame-difference motion detection algorithm.The camera has been tested for compatibility with the current mainstream commercial email platforms.The mean time required for transmitting a single image file via the email platform is less than 10 s,while the mean time for transmitting a short video is less than 60 s.The BP network’s average training loss is 0.015,and the average testing loss is 0.013,which basically meets the precision requirements for gamma adjustment.The improved YOLOv5 algorithm achieved an mAP@0.5 of 91.5%and a recall rate of 85.5%,effectively enhancing the accuracy of small object detection.
基金funded by the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,Saudi Arabia under Grant No.(GPIP:71-829-2024).
文摘Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security risks.Current spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data breaches.To address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam emails.This framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual data.This approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated components.The model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the field.These findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection systems.The framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam.
文摘本文以托福新题型“Write an Email”为研究对象,基于任务型测试理论,探讨其在测评考生书面交际能力中的交际效度。研究引入语用学(礼貌原则、言语行为)和体裁分析(Genre Analysis)框架,系统剖析该题型对语用策略和语篇结构的考查逻辑。通过对大量学生样本的系统偏误分析,归纳出语用失误和体裁偏误是学习者面临的主要挑战。研究结果为语言测试效度验证与教学实践提供参考,并提出以功能性语块习得和情境化语用意识培养为核心的分层教学框架。
文摘Mobile agent currently is a hot spot among research fields of Internet technology. The deployment of mo-bile agents over network usually needs extra infrastructure for agent migration and communication,which adds to thedifficulty of popularizing MA systems. We present in this paper an Email-box-based mechanism of agent migrationand communication,which is built on top of the formerly developed MOON-EAMS system. This mechanism,basedon Email formatting skills,utilizes Email for data transfer,and offers a loosely coupled option of agent migration andcommunication,which ,compared to related works ,obtains the advantage of easy implementation,and reduces the riskof network connection failure.