Solved

DELPHI BAYES FILTER

Posted on 2007-03-28
3
550 Views
Last Modified: 2013-12-09
Can someone explain me how BAYES filter work and if there is a DELPHI VCL/Library for it ?
0
Comment
Question by:yarek
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 36

Expert Comment

by:grblades
ID: 18825210
This is a good guide and has a basic description of how a bayes filter works.
http://www.paulgraham.com/antispam.html

Also have a look at
http://www.internet-description.com/b/bayes-filter.html
http://en.wikipedia.org/wiki/Bayesian_spam_filtering

The bayes algorithm is only one part of a spam system though. You also need to consider what to do about expiring content from the bayes database.
You can also create your own bayes tokens for other characteristics of the message such as the number of hours ahead or behind actual time the email was sent. A lot of spam is sent with a sent date weeks or more in the past so that type of additional check can be very good. Its that sort of thing which differentiates one bayes based antispam tool from another.
0
 

Author Comment

by:yarek
ID: 18826776
ok, any samples for delphi implementation ?
0
 
LVL 36

Accepted Solution

by:
grblades earned 500 total points
ID: 18827965
No sorry I dont know of any delphi code sites.

There is http://www.hotscripts.com/Detailed/58242.html written in php which is an easy to understand language. You could look at that and convert it to delphi.
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Suggested Courses
Course of the Month9 days, 10 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question