Submit Search
Upload
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
•
0 likes
•
2 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i5/IRJET-V9I5447.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET Journal
Fraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
IRJET Journal
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET Journal
Choosing the Right Testing Strategy to Scale up Mobile App Testing.pdf
Choosing the Right Testing Strategy to Scale up Mobile App Testing.pdf
pCloudy
Predictive analytics for mobile apps detailed guide
Predictive analytics for mobile apps detailed guide
FugenX
Mobile App Testing.pdf
Mobile App Testing.pdf
Abanti Aazmin
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
IRJET Journal
mobile app development tool-converted.pdf
mobile app development tool-converted.pdf
KatieLeslove1
Recommended
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET- Discovery of Fraud Apps Utilizing Sentiment Analysis
IRJET Journal
Fraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
IRJET Journal
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET Journal
Choosing the Right Testing Strategy to Scale up Mobile App Testing.pdf
Choosing the Right Testing Strategy to Scale up Mobile App Testing.pdf
pCloudy
Predictive analytics for mobile apps detailed guide
Predictive analytics for mobile apps detailed guide
FugenX
Mobile App Testing.pdf
Mobile App Testing.pdf
Abanti Aazmin
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
IRJET Journal
mobile app development tool-converted.pdf
mobile app development tool-converted.pdf
KatieLeslove1
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
Mobile App
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
eSAT Journals
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
eSAT Journals
A 5 minute guide to delivering Flawless Mobile Apps
A 5 minute guide to delivering Flawless Mobile Apps
Cygnet Infotech
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
Pvrtechnologies Nellore
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data Streams
IRJET Journal
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
DMIMarketing
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET Journal
Allow is the New Block
Allow is the New Block
Sean Dickson
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
DMIMarketing
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023
JoeyNarella
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023
DanielWong515580
IJET-V3I1P2
IJET-V3I1P2
IJET - International Journal of Engineering and Techniques
1 tihify
1 tihify
Solutions IT et Business
Technology Research on customer enagement
Technology Research on customer enagement
Mohammad Emrul Hassan Emon
Implementing AI for improved performance testing – Cuneiform.pdf
Implementing AI for improved performance testing – Cuneiform.pdf
Cuneiform Consulting Pvt Ltd.
7 Factors to Consider While Developing Mobile Apps
7 Factors to Consider While Developing Mobile Apps
99tests
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активности
Sergey Ulankin
Making your mobile testing strategy future-proof
Making your mobile testing strategy future-proof
Nagarro
Mobile App Analytics
Mobile App Analytics
Nynne Silding
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
Mobile App
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
eSAT Journals
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
eSAT Journals
A 5 minute guide to delivering Flawless Mobile Apps
A 5 minute guide to delivering Flawless Mobile Apps
Cygnet Infotech
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
Pvrtechnologies Nellore
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data Streams
IRJET Journal
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
DMIMarketing
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET Journal
Allow is the New Block
Allow is the New Block
Sean Dickson
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
DMIMarketing
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023
JoeyNarella
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023
DanielWong515580
IJET-V3I1P2
IJET-V3I1P2
IJET - International Journal of Engineering and Techniques
1 tihify
1 tihify
Solutions IT et Business
Technology Research on customer enagement
Technology Research on customer enagement
Mohammad Emrul Hassan Emon
Implementing AI for improved performance testing – Cuneiform.pdf
Implementing AI for improved performance testing – Cuneiform.pdf
Cuneiform Consulting Pvt Ltd.
7 Factors to Consider While Developing Mobile Apps
7 Factors to Consider While Developing Mobile Apps
99tests
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активности
Sergey Ulankin
Making your mobile testing strategy future-proof
Making your mobile testing strategy future-proof
Nagarro
Mobile App Analytics
Mobile App Analytics
Nynne Silding
Similar to A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
(20)
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
A 5 minute guide to delivering Flawless Mobile Apps
A 5 minute guide to delivering Flawless Mobile Apps
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data Streams
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
Allow is the New Block
Allow is the New Block
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023
IJET-V3I1P2
IJET-V3I1P2
1 tihify
1 tihify
Technology Research on customer enagement
Technology Research on customer enagement
Implementing AI for improved performance testing – Cuneiform.pdf
Implementing AI for improved performance testing – Cuneiform.pdf
7 Factors to Consider While Developing Mobile Apps
7 Factors to Consider While Developing Mobile Apps
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активности
Making your mobile testing strategy future-proof
Making your mobile testing strategy future-proof
Mobile App Analytics
Mobile App Analytics
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Recently uploaded
(20)
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1719 A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING M. Tarun Kumar1, M. Hemalatha2, K. Pravalika3, CH. Rohit4 1,2,3,4 Final Year B.Tech, CSE, SanketikaVidya Parishad Engineering College, Visakhapatnam, A.P, India. Guided by G.Geetha vaishnavi, Assistant Professor, SVPEC, Visakhapatnam, A.P, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays, due to the increase in the number of mobile applications in the day to day life, it is important to keep track respect to which ones are safe and which ones are not. The goal is to develop a platform to detect fake apps before the user downloads them by using data mining and sentimental analysis. Sentimental analysis is to help in determining the emotional tones behind words that are expressed online. This strategy is useful in monitoring comments or reviews and helps to get a brief idea of the public's opinion on specific issues. The user cannot always get the right or genuine reviews about the product on the period the internet. Here, the system or framework can check for users' sentimental comments on multiple applications and analyze the positive and negative reviews in the form of text data, it can determine whether the app is genuine or not. The manipulation of reviews is one of the key aspects of determining fake apps. Finally, the proposed system will analysis with app data collected from the ApporPlayStorefor a long period. Key Words: Sentimental Analysis, Data mining, Review based evidence, positive and negative Reviews, analyzing reviews. 1. INTRODUCTION With the boom in technology, there's a growth in the utilization of mobiles. There has been a big boom in the improvement of numerous cellular programs on numerous systems along with the famous Android and iOS. Due to its fast boom each day for its normal utilization, income, and developments, it has ended up a full-size assignment in the global enterprise intelligence marketplace. This offers an upward push in the marketplace opposition. The businesses and application builders are having a difficult opposition with one another to show their best product and spend a huge quantity into attracting clients to sustain their future progress. The maximum crucial functionthatperformsisthe client's Reviews and opinions on that precise application that they show up to download. This will be a mannerfor the builders to discover their weak spots and decorate into the improvement of a brand new one preserving thoughts the peoples need. As an ongoing pattern, instead of relying on standard selling arrangements, below the bushes App developers choose to evaluate a few fake manners to deliberately assist their Apps and in the end, control the defined scores on an App store. This is generally performed with the aid of using utilizing so-called "bot ranches" or "human water armed forces" to make bigger the Application downloads reviews and audits in a very quick time. Certain times, only for the upliftment of the builders, they generally tend to lease groups of people who decide to fraud together and offer fake remarks andReviewsoveranapplication. This is thought to be termed crowd turfing. Hence it's miles continually crucial to make sure that earlier than installing an app, the customers are supplied with the right and genuine remarks to keep away from positive mishaps. For this, a computerized answer is needed to conquer and systematically examine the numerous remarks andReviews that are supplied for each application. 1.1 APPLICATIONS TRACKING With cell telephones being a pretty famous need, it's far crucial that suspicious packages need to be marked as fraud if you want to be recognized with the aid of using the shop users. It will be hard for the person to decide the feedback that they scroll beyond or whether the scores they see are a rip-off or an authentic one for his or her benefit. Thereby, we're presenting a machine that will become aware of such fraudulent packages on Play or App shop with the aid of using presenting a holistic view of Reviews fraud detection machine. By thinking about information mining and sentiment analysis, we can get a higher probabilityofgetting real reviews and hence we advocate a machine that intakes evaluations from registered users for an unmarried product or more than one and examine them as advantageous or poor reviews. This also can be beneficial to determine the fraud application and ensure mobile security as well. We provoke the machine with the aid ofusingthinkingabout the mining main consultation or additionallythelivelydurations of the packages. This affects the detection of a nearby anomaly than the global anomaly of the app Reviews. In particular, in this, we first advocate a simple but fruitful calculation to apprehend the main periods of every App depending on its authentic positioning records.Atthispoint, the research of Apps' positioningpractices,unearthsthefaux Apps that frequently have one-of-a-kind positioning examples in each riding consultation contrasted and regular Apps. Furthermore, we check out three sorts of evidence particularly reviews primarily based totally on the aid of using modeling the consolidation of the three statistical hypothesis tests.Regardless,thepositioning-primarilybased
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1720 on total pieces of evidence may be encouraged with the aid of using the App developer's status and a few authentic marketing and marketingeffortsalongwiththe"constrained time markdown". Thus, it's far insufficient to keep in mind simply that the rank is primarily based on confirmations. 1.2 FAKE DETECTION It will be hard for the client to decide the remarks that they look past or whether the appraisals they see are a trick or a veritable one for their advantage. Along these lines, we are proposing a framework that will recognize such deceitful applications on Play or App store by giving an all- encompassing perspective on positioning extortionlocation framework. By considering information mining and feeling examination, we can get a higher likelihood of getting genuine surveys and subsequently we propose a framework that admissions audits from enlisted clients for a solitary item or various and assess them as a good or pessimistic Reviews. This can likewise be helpful to decide the extortion application and guaranteeversatilesecuritytoo.Westart the framework by considering the mining driving meeting or additionally the dynamic times of the applications. This impacts in identifying neighborhood abnormality than the worldwide oddity of the applicationpositioning.Specifically, in this, we initially propose a fundamental yet productive estimation to perceive the main meetings of each App subject to its legitimate situating records. Now, of the examination of Apps' situating rehearses, it observes the phony Apps that routinely have unmistakable situating models in each drivingmeetingdifferentiatedandcustomary Apps. Besides, we assess through three sorts of confirmationsspecificallypositioning-based,Reviews-based, and survey-based by displaying the combinationofthethree through factual theories tests. Notwithstanding, the situating-based confirmations can be impacted by the App designer's status and somecertifiable publicizingendeavors, for example, the "obligedtimemarkdown".Alongtheselines, considering only the position-based confirmations are lacking. Alongside this, the proposed framework presents two kinds of blackmail confirmations subject to Apps Reviews and review history which reflect a few extraordinary examples from Apps. Additionally, a collected technique is used to coordinate every one of the confirmations that are important for distinguishing extortion. To do as such, we assess the proposed framework by utilizing certifiableapplicationinformationgatheredfrom the google play and iOS application store for an extensive period. The paper is isolated into areas that are coordinated as which portray Literature Survey notices. System Architecture examines the working, structure, and calculations utilized. 2. EXISTING METHOD The critical awareness of this mission is upon the sentiment evaluation and information mining to extract the dataset produced. By using this method, we can be capable of deciding the true value of the applications which are provided in Play and App stores. Sucha proposedgadget will comprise a large amount of information set that must be handled and the use of information mining along with visual data will help in carrying out the system. Information or information mining is the manner closer to extricating required records from big informational collections and modifying them right into a justifiable arrangement for sometime later, essentially utilized for some, enterprise primarily based reason. Sentiment Analysis is pitched into this system as a chunk of it. Since it's far the manner closer to inspecting factors and obtaining summary data from them. At an essential dimension, it's far coming across extremityoftheannouncements.Informationisaccumulated from a special internet baseline,transportablepackages,and exchanges which comprise surveys, feedback, and special information recognized by theindividual enterprise.Further right here feeling exam is applied for breaking down the records for destiny upgrades depending on the measurements received through estimation research. The project of sizeable informational collectionsisa vital but difficult issue. Data representation techniques may also assist to attend to the issue. Visual records research has the excess capacity and numerous packages, for example, misrepresentation discovery additionally, records mining will make use of information representationinnovationfora progressed records exam. Data mining is applied in figuring out fraud efficiently and that's what we endorseand putinto effect in this paper. By using diverse information mining strategies and algorithms, it might emerge as less complicated for us to decide our backend retrieval of information. Fraud may be labeled into diverse types which might be the packages of information mining. With the end purpose of grouping, extortion has been separated into four standard classificationsbudgetarymisrepresentation,media communications extortion, PC interruption, and safety misrepresentation. Budgetary extortion is moreover separated into financial institution misrepresentation, securities, and wares extortion, and special varieties of associated extortion which contain economic file extortion, citizen extortion, and the phrase associated misrepresentation, at the same time as Insurance extortion is moreover ordered into scientific coverage misrepresentation, crop safetyextortion,andaccidentsafety extortion. Using the IP to cope with the cell person had been additionally one of the sooner literature surveys which became delivered forwarded. In the transportable software advertisement, theperiodcalledmisrepresentationsoftware is getting prevalent. Nowadays, reputation and anticipation are assuming an essential activity withinside the transportable market. For the identity of extortion audit to the unmarried consumer framework, the Fraud Reviews. The system is proposed. Evaluations are gatheredtopresent a role to every software. Although it had recognized the asset's distinctiveness it wasn't pretty green thinking about
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1721 the truth that IP snooping may be done. ThisIPsnoopinglets the customers alternate their IP cope and permit them to charge an app greater than once. The super mega-celebrity scores which might be furnished for each unmarried software aren't pretty sufficient in figuring out whether or not the app is appropriate to be loaded on the cell or now no longer. As defined that it's now no longer pretty proper to trust into super megacelebrity themselves. It is taken into consideration into analyzing the evaluations greater than scores. Generally, it's far advised to test greater dependable reasserts which include curated 1/3 element evaluations or checking the developer's different apps. Collection of a particular app dataset for a duration of time and differentiating them as superb and bad evaluations.Utilizing fewer phrases withinside the evaluations, that is, the use of the n-gram model (n=2) is greater green for the accuracy of semantic classification. Lesser the phrases, it's far less complicated to classify them in step with their class because of the proposed gadget. 3. PROPOSED METHOD This paper proposes a safeguarded tree-based search plot over the mixed cloud data, which maintains multi- watchword situated search and dynamic technique on the report variety. Specifically, the vector space model and the comprehensively used "term repeat (TF) × switch report repeat (IDF)" model are combined in the documented improvement and request age to give a multi-keyword situated search. To procure highpursuitcapability, wefoster a tree-based document structure and propose an "Insatiable Depthfirst Search" estimationtakingintoaccountthisrecord tree. The safe KNN computation is utilized to encode the record and request vectors, and meanwhile ensure careful significance score assessment between mixed rundown and question vectors. To go against different attacks in different peril models, we fabricate two secure chase plots: the fundamental dynamic multi-watchword situated search (BDMRS) contrive in the known ciphertext model, and the better powerful multi-expression situated search (EDMRS) plot in the acknowledged establishment model. 4. WORKING OF METHODOLOGY From the Literature survey and different beyond proposed structures which had been advanced for this very purpose, the trouble in removing the fraud software remains under work. There are positive works that contain using web Reviews junk mail detection, online evaluation junk mail, and mobile application recommendation or even focuses on the detection of malware withinside the apps earlier than downloading them. Google uses a Fair Play device that is capable of stumbling on the malwarethatisfoundinpositive apps handiest, however, hasn't been efficient sufficient to accomplish that because of the concealing properties. The user may be tricked into downloading software through its Reviews even if it does include positive viruses that may affect the functioning of the mobile. Although there were different present structures, the principle consciousness isn't simply on recommendation or junk mail removal.Some of the strategies may be used for anomalydetectionfromthe ancient score and evaluation records however they aren't fraud shreds of evidence for a positive period. Which the huge increase of apps in stores, it turns into a bulky venture to determine which of the more genuine or not based on the reviews alone. Here we advise a device that entailsdetecting the fraud apps the usage of sentient feedback and facts mining. We can check the user's sentimental comments on multiple applications by comparingthereviewsoftheadmin and the user. By searching into that feedback, we're capable of distinguishing them as tremendous or terrible feedback. With the aggregations of three pieces of evidence:rank- based, Reviews-based, and evaluationprimarilybasedwe're capable of getting a better chance of results. The facts are extracted and processed through the mining leading sessions. The facts are then evaluated at the 3 mentioned pieces of evidence and are concatenated earlier than the cease result. It is vital to brief about sentiment analysis and data mining before continuing further into the proposed system and algorithms. Fig 1. Proposed System Architecture 4.1 DATA MINING There is a huge degree of facts reachable in the Information Industry. This fact is of no usage till it's miles modified over into beneficial information. It is essential to look at this massive degree of facts and pay attention to beneficial information from it. Extraction of information isn't the primary system we ought to perform;factsminingmoreover consists of distinctive strategies, for example, Data Cleaning, Data Integration, Data Transformation, Data Mining,Pattern Evaluation, and Data Presentation. When eachofthesetypes of strategies is finished, we could maximum probable make use of this information in several applications, for example, Fraud Detection, Market Analysis, Production Control, Science Exploration, and so on. Data mining is applied right here to investigate the assessment information with the aid of using the apps. This information is then filtered and
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1722 processed earlier than it can cross through the system of sentiment analysis. The opinions are extracted and outstanding primarily based totally on diverse datasets which might be in the database. Accordingly, the text is evaluated. To be particular, we are the use of textual content information mining which is likewise referred to as textual content mining. From the texts which might be extracted(opinions) it's miles easier to analyze words or clusters of words that are used. 4.2 NLP (Natural Processing Language) While Natural language processing is anything but another science, the innovation is quickly propelling thanks to an expanded interestinhuman-to-machinecorrespondences,in addition to the accessibility of huge information, strong processing, and upgraded calculations. As a human, you might talk and write in English, Spanish or Chinese. In any case, a PC's local language - known as machine code or machine language - is to a great extent immeasurable to the vast majority. At your gadget's most minimal levels, correspondence happensnotwith wordsbut rather through a great many zeros and ones that produce intelligent activities. 4.3 SENTIMENT ANALYSIS Feeling investigation, likewise alluded to as assessment mining, is a way to deal with natural language processing(NLP) that recognizes the profound tone behind an assemblage of text. This is a famous way for associations to decide and order sentiments about an item, administration, or thought. It includes the utilization of informationmining,AI(ML),andman-made brainpower(AI) to dig messages for opinion and emotional data. Opinion investigation frameworks assist associations with get-together bits of knowledge from disorderly and unstructured text that comes from online sources, for example, messages, blog entries, support tickets, web visits, virtual entertainment channels, discussions, and remarks. Calculations supplant manual information handling by executing rule-based, programmed,orcrossovertechniques. Rule-based frameworks perform opinion investigation in light of predefined, dictionary-based rules while programmed frameworks gain from information with AI methods. A mixture feeling examination joins the two methodologies. As well as recognizing feeling, assessment mining can extricate the extremity (or how much energy and cynicism), subject, and assessment holder inside the text. Besides, opinion investigation can be applied to shifting extensions, for example, report, section, sentence, and sub-sentence levels. Merchants that offer opinion examination stages or SaaS items incorporate Brandwatch, Hootsuite, Lexalytics, NetBase, Sprout Social. Organizations that utilize these devices can audit client input all the more routinely and proactively answerchanges ofassessmentinsidethe market. 4.4 ALGORITHM (NAVI BIASED) It is an order strategy because of Bayes' Theorem with a supposition of autonomy among indicators. In straightforward terms, a Naive Bayes classifier accepts that the presence of a specific component in a class is irrelevant to the presence of some other element. For instance, a natural product might be viewed as an apple assuming that it is red, round, and around 3 crawls in breadth. Regardless of whether these elements rely upon one another or upon the presence of different highlights, these properties freely add to the likelihoodthatthisorganic product is an apple and to that end, it is known as 'Innocent'. The credulous Bayes model is not difficult to fabricate and especially helpful for extremely huge informational collections. Alongside straightforwardness, Naive Bayes is known to outflank even exceptionally complexarrangement strategies. Bayes's hypothesis gives an approach to ascertaining the back likelihood of P(c|x) from P(c), P(x), and P(x|c). Above, P(c|x) is the posteriors probability of class (c, target) given predictors (x, attributes). P(c) is the prior probability of class. P(x|c) is the likelihood which is the probability of predictors given class. P(x) is the prior probability of predictors. 4.5 SCORE CALCULATION • Input1: client's remark/review given • Input2: Single and multikeyvalues • Yield: Score principally founded absolutely on the review • Initializescore=0,flag=0 • Select multikey, single-key whereflag=0 • Get the Reviews of singlekey= enteredstring • Get Reviews of multikey=enteredstring • Reviews=(singlekey Reviews or multikeyscore)/2 • Return score values.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1723 5. CONCLUSION As the technology advances so the thinking of people there may be fraud in some applications. Privacy of the user is the main issue while delivering services to the user such application might be malwares or data theft there must be some kind of helping hand to guide user about any new application. This application not only suggests but also provides security to the user in a better way. 6. FUTURE SCOPE In the future, it's planned to review more practical fake substantiation and dissect the idle relationship among standing, review, and rankings. Also, it'll be extended to ranking fraud discoveryapproachwithindispensablemobile App related services, like mobile Apps recommendation, for enhancing the user experience. REFERENCES [1] Raschka, Sebastian, and Vahid Mirjalili. Python machine learning: Machine learning and deep learning with Python, scikit-learn, and TensorFlow 2 Packt Publishing Ltd, 2019. [2] Wells, Joseph T. Corporate fraud handbook: Prevention and detection. John Wiley & Sons, 2011. [3] Bandodkar, S. V., Paradkar, S. S., Dalvi, P. A., Kamat, S., Kenkre, P. S., & Aswale, S. (2020). Fraud AppDetectionUsing Sentiment Analysis. International Journal, 8(8). [4] Chinmai, Nutulapati, Mohammad Nasreen, Meer Shabbir Ali, Parasa Naga Satish Babu, and Shaik Salma Begum. "DETECTION OF FRAUD APPS USING SENTIMENT ANALYSIS" [5] Singh, Jyoti, Lakshita Suthar, Diksha Khabya, Simmi Pachori, Nikita Somani, and Mayank Patel. "FRAUD APP DETECTION" [6] Avayaprathambiha.P,Bharathi.M,Sathiyavani.B,Jayaraj.S “To Detect Fraud Reviews For Mobile Apps Using SVM Classification” International Journal on Recent and Innovation Trends in Computing and Communication,vol. 6, February2018 [7] Suleiman Y. Yerima, SakirSezer, Igor Muttik, “Android Malware Detection Using Parallel Machine Learning Classifiers”,8thInternational ConferenceonNextGeneration Mobile Applications, Services and Technologies,Sept.2014. [8] SidharthGrover,“Malwaredetection:developinga system engineered fair play for enhancing the efficacy of stemming search rank fraud”, International Journal of Technical Innovation in Modern Engineering &Science, Vol. 4, October2018 [9] Patil Rohini, Kale Pallavi, Jathade Pournima, Kudale Kucheta, Prof. Pankaj Agarkar,“MobSafe: Forensic Analysis For Android ApplicationsAndDetection OfFraudAppsUsing Cloud Stack And Data Mining”, International Journal of Advanced Research in Computer Engineering& Technology, Vol. 4, October2015 [10] Mahmudur Rahman, Mizanur Rahman, Bogdan Carbunar, and DuenHorngChau,“Search Rank Fraud and Malware Detection in Google Play”, IEEE Transactions on Knowledge and Data Engineering, Vol. 29, June2017. [11] Dr. R. SubhashiniandAkila G,"Valencearousal similarity based recommendation services ", IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2015. BIOGRAPHIES G. GEETHA VAISHNAVI Currently working as assistant professor from Department of Computer Science and Engineeringat Sanketika Vidya Parishad Engineering. M. TARUN KUMAR Pursuing B-tech fromtheDepartment of Computer Science and Engineering at Sanketika Vidya Parishad Engineering College. M. HEMALATHA Pursuing B-tech fromtheDepartment of Computer Science and Engineering at Sanketika Vidya Parishad Engineering College. K. PRAVALIKA Pursuing B-tech fromtheDepartment of Computer Science and Engineering at Sanketika Vidya Parishad Engineering College.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1724 CH. ROHIT Pursuing B-tech from the Department of Computer Science and Engineering at Sanketika Vidya Parishad Engineering College.
Download now