Mining Mailing Lists for Content

Mining Mailing Lists for Content

Mining Mailing Lists for Content by Mario A. Harik B.E. Computer and Communications Engineering American University of Beirut, 2002 Submitted to the Department of Civil and Environmental Engineering in partial fulfillment of the requirements for the degree of MASTER OF ENGINEERING in CIVIL AND ENVIRONMENTAL ENGINEERING at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY JUNE 2003 © 2003 Mario A. Hark. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Author: Department of Civil and (pi*onmental Engineering May 9, 2003 'I Certified by: 7 John Williams Associate Professor o Ci' and Environmental Engineering Thesis Supervisor Accepted by :f Oral Buyukozturk Professor of Civil and Environmental Engineering Chairman, Departmental Committee on Graduate Studies MASSACHUSETTS INSTITUTE OF TECHNOLOGY BARKER JUN 0 2 2003 L- LIBRARIES Mining Mailing Lists for Content by Mario A. Harik Submitted to the Department of Civil and Environmental Engineering on May 9, 2003 in partial fulfillment of the requirements for the degree of Master of Engineering in Civil and Environmental Engineering ABSTRACT In large decentralized institutions such as MIT, finding information about events and activities on a campus-wide basis can be a strenuous task. This is mainly due to the ephemeral nature of events and the inability to impose a centralized information system to all event organizers and target audiences. For the purpose of advertising events, Email is the communication medium of choice. In particular, there is a wide-spread use of electronic mailing lists to publicize events and activities. These can be used as a valuable source for information mining. This dissertation will propose two mining architectures to find category-specific event announcements broadcasted on public MIT mailing lists. At the center of these mining systems is a text classifier that groups Emails based on their textual content. Classification is followed by information extraction where labeled data, such as the event date, is identified and stored along with the Email content in a searchable database. The first architecture is based on a probabilistic classification method, namely naive-Bayes while the second uses a rules-based classifier. A case implementation, FreeFood@MIT, was implemented to expose the results of these classification schemes and is used as a benchmark for recommendations. Thesis Supervisor: John Williams Title: Associate Professor of Civil and Environmental Engineering Mining Mailing Lists for Content ACKNOWLEDGEMENTS I dedicate this thesis to my parents, Adel and Roxanne, for their love, guidance and constant support; to my wonderful brothers, Mel and Marc, for standing by my side. I thank the following people for their valuable contribution: John Williams, for being an encouraging thesis advisor. Eric Adams, Georges Kocur and Kevin Amaratunga for helping me throughout my stay at MIT. Nadim Chehade, for his unwavering support. Hani Harik, for valuable guidance and advice. My family and friends for their care and affection. And all the other wonderful people I met at MIT for their friendship and support. 3 Mining Mailing Lists for Content TABLE OF CONTENTS ABSTRACT....................................................................................................... 2 ACKNOW LEDG EM ENTS......................................................................... ........ 3 TABLE O F CONTENTS............................................................. ................... 4 LIST OF FIGURES.................................................................. .......... ........... 6 LIST O F TABLES ................................................................................................ 7 1 - Introduction ............................................................................................... 8 1.1 Motivation and Problem Description........................................................ 8 1.2 The Proposed Approach ........................................................................... 9 1.3 Chapter Discussions................................................................................ 11 2 - Mailing Lists as a Source of Information........................12 2.1 Using Mailing Lists as a Source of Information...................................... 12 2.2 MIT Mailing Lists and Statistics............................................................. 13 2.3 Accessing the Information on Public MIT Mailing Lists........................14 3 - Text Classification.................................................................................17 3.1 Definition and Terminology.................................................................... 17 3.2 Bayesian Classification........................................................................... 20 3.2.1 Introduction to Bayesian Classification.................................................. 20 3.2.2 Document Representation and Pre-Processing ...................................... 22 3.2.3 The Naive-Bayes Classification ............................................................ 29 3.2.4 Context Specific Tokenization.................................................................33 3.3 Rules-Based Classification.................................................................... 34 3.3.1 Introduction to Rules-Based Classification ............................................. 34 3.3.2 Implementation in the Proposed Mining Approaches .............................. 35 3.4 Classification Performance Evaluation................................................. 36 4- The Proposed M ining A pproaches ........................................................ 40 4.1 The Rules-Based Proposed Approach................................................... 40 4.1.1 Overview of this Approach ..................................................................... 40 4.1.2 Proposed System Architecture............................................................... 41 4 Mining Mailing Lists for Content 4.1.3 System O peration .................................................................................. 43 4.2 The Bayesian Proposed Approach .... ..................................... ...45 4.2.1 O verview of this Approach ..................................................................... 45 4.2.2 Proposed System Architecture............................................................... 45 4.2.3 System O perations ................................................................................ 49 4.3 Information Extraction.. ....... ... ..... .. ............ .................... 51 5 - Performance & Results of a Case Implementation: FreeFood@MIT ... 54 5.1 Overview of FreeFood@MIT............................... 54 5.2 Technologies and Implementation ... ..... ..................................... 55 5.3 Performance of the Rules-Based Architecture..................58 5.4 Performance of the Bayesian Architecture........... ...... ...... 60 5.5 Performance of Information Extraction...........................61 6 - Conclusion...... ................... .... .... .. ...... .. 63 6.1 Summary and Contributions..............................63 6.2 Future Work ....... .................................. 64 BIBILIOGRAPHY............ .......... ....................65 APPENDICES..............................................68 Appendix A: Screenshots of FreeFood@MIT....... ................... 68 Appendix B: List of Listserv Public Mailing Lists at MIT ................ 75 5 Mining Mailing Lists for Content LIST OF FIGURES Figure 1 - General mining approach to finding events......................................... 10 Figure 2 - Emails as input documents to the events mining system................... 16 Figure 3 - The two phases of automatic classification......................................... 19 Figure 4 - A simple Bayesian network.................................................................. 21 Figure 5 - Boolean vector representation of a set of textual documents............24 Figure 6 - The tokenization process ...................................................................... 26 Figure 7 - Pre-processing steps for adequate document representation ........... 28 Figure 8 - Network representing a realistic Bayesian classifier .......................... 30 Figure 9 - Network representing a Naive-Bayes Classifier...................................31 Figure 10 - Rules-based system architecture ..................................................... 43 Figure 11 - Rules-based classification process................................................... 44 Figure 12 - Bayesian system architecture............................................................. 48 Figure 13 - Training the Bayesian classifier........................................................ 49 Figure 14 - Bayesian classification process ........................................................ 50 Figure 15 - Feedback process to improve classification accuracy ..................... 51 Figure 16 - FreeFood@MIT logo........................................................................... 55 Figure 17 - User feedback in event view................................................................56 Figure 18 - Web interface searching......................................................................57 Figure 19 - Sample date extraction from FreeFood@MIT..................................... 62 Figure 20 - The index page of FreeFood@MIT

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    81 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us