SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1719
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE
APPLICATIONS USING OPINION MINING
M. Tarun Kumar1, M. Hemalatha2, K. Pravalika3, CH. Rohit4
1,2,3,4 Final Year B.Tech, CSE, SanketikaVidya Parishad Engineering College, Visakhapatnam, A.P, India.
Guided by G.Geetha vaishnavi, Assistant Professor, SVPEC, Visakhapatnam, A.P, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Nowadays, due to the increase in the number of
mobile applications in the day to day life, it is important to
keep track respect to which ones are safe and which ones are
not. The goal is to develop a platform to detect fake apps
before the user downloads them by using data mining and
sentimental analysis. Sentimental analysis is to help in
determining the emotional tones behind words that are
expressed online. This strategy is useful in monitoring
comments or reviews and helps to get a brief idea of the
public's opinion on specific issues. The user cannot always get
the right or genuine reviews about the product on the period
the internet. Here, the system or framework can check for
users' sentimental comments on multiple applications and
analyze the positive and negative reviews in the form of text
data, it can determine whether the app is genuine or not. The
manipulation of reviews is one of the key aspects of
determining fake apps. Finally, the proposed system will
analysis with app data collected from the ApporPlayStorefor
a long period.
Key Words: Sentimental Analysis, Data mining, Review
based evidence, positive and negative Reviews,
analyzing reviews.
1. INTRODUCTION
With the boom in technology, there's a growth in the
utilization of mobiles. There has been a big boom in the
improvement of numerous cellular programs on numerous
systems along with the famous Android and iOS. Due to its
fast boom each day for its normal utilization, income, and
developments, it has ended up a full-size assignment in the
global enterprise intelligence marketplace. This offers an
upward push in the marketplace opposition. The businesses
and application builders are having a difficult opposition
with one another to show their best product and spend a
huge quantity into attracting clients to sustain their future
progress. The maximum crucial functionthatperformsisthe
client's Reviews and opinions on that precise application
that they show up to download. This will be a mannerfor the
builders to discover their weak spots and decorate into the
improvement of a brand new one preserving thoughts the
peoples need. As an ongoing pattern, instead of relying on
standard selling arrangements, below the bushes App
developers choose to evaluate a few fake manners to
deliberately assist their Apps and in the end, control the
defined scores on an App store. This is generally performed
with the aid of using utilizing so-called "bot ranches" or
"human water armed forces" to make bigger the Application
downloads reviews and audits in a very quick time. Certain
times, only for the upliftment of the builders, they generally
tend to lease groups of people who decide to fraud together
and offer fake remarks andReviewsoveranapplication. This
is thought to be termed crowd turfing. Hence it's miles
continually crucial to make sure that earlier than installing
an app, the customers are supplied with the right and
genuine remarks to keep away from positive mishaps. For
this, a computerized answer is needed to conquer and
systematically examine the numerous remarks andReviews
that are supplied for each application.
1.1 APPLICATIONS TRACKING
With cell telephones being a pretty famous need, it's far
crucial that suspicious packages need to be marked as fraud
if you want to be recognized with the aid of using the shop
users. It will be hard for the person to decide the feedback
that they scroll beyond or whether the scores they see are a
rip-off or an authentic one for his or her benefit. Thereby,
we're presenting a machine that will become aware of such
fraudulent packages on Play or App shop with the aid of
using presenting a holistic view of Reviews fraud detection
machine. By thinking about information mining and
sentiment analysis, we can get a higher probabilityofgetting
real reviews and hence we advocate a machine that intakes
evaluations from registered users for an unmarried product
or more than one and examine them as advantageous or
poor reviews. This also can be beneficial to determine the
fraud application and ensure mobile security as well. We
provoke the machine with the aid ofusingthinkingabout the
mining main consultation or additionallythelivelydurations
of the packages. This affects the detection of a nearby
anomaly than the global anomaly of the app Reviews. In
particular, in this, we first advocate a simple but fruitful
calculation to apprehend the main periods of every App
depending on its authentic positioning records.Atthispoint,
the research of Apps' positioningpractices,unearthsthefaux
Apps that frequently have one-of-a-kind positioning
examples in each riding consultation contrasted and regular
Apps. Furthermore, we check out three sorts of evidence
particularly reviews primarily based totally on the aid of
using modeling the consolidation of the three statistical
hypothesis tests.Regardless,thepositioning-primarilybased
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1720
on total pieces of evidence may be encouraged with the aid
of using the App developer's status and a few authentic
marketing and marketingeffortsalongwiththe"constrained
time markdown". Thus, it's far insufficient to keep in mind
simply that the rank is primarily based on confirmations.
1.2 FAKE DETECTION
It will be hard for the client to decide the remarks that they
look past or whether the appraisals they see are a trick or a
veritable one for their advantage. Along these lines, we are
proposing a framework that will recognize such deceitful
applications on Play or App store by giving an all-
encompassing perspective on positioning extortionlocation
framework. By considering information mining and feeling
examination, we can get a higher likelihood of getting
genuine surveys and subsequently we propose a framework
that admissions audits from enlisted clients for a solitary
item or various and assess them as a good or pessimistic
Reviews. This can likewise be helpful to decide the extortion
application and guaranteeversatilesecuritytoo.Westart the
framework by considering the mining driving meeting or
additionally the dynamic times of the applications. This
impacts in identifying neighborhood abnormality than the
worldwide oddity of the applicationpositioning.Specifically,
in this, we initially propose a fundamental yet productive
estimation to perceive the main meetings of each App
subject to its legitimate situating records. Now, of the
examination of Apps' situating rehearses, it observes the
phony Apps that routinely have unmistakable situating
models in each drivingmeetingdifferentiatedandcustomary
Apps. Besides, we assess through three sorts of
confirmationsspecificallypositioning-based,Reviews-based,
and survey-based by displaying the combinationofthethree
through factual theories tests. Notwithstanding, the
situating-based confirmations can be impacted by the App
designer's status and somecertifiable publicizingendeavors,
for example, the "obligedtimemarkdown".Alongtheselines,
considering only the position-based confirmations are
lacking. Alongside this, the proposed framework presents
two kinds of blackmail confirmations subject to Apps
Reviews and review history which reflect a few
extraordinary examples from Apps. Additionally, a collected
technique is used to coordinate every one of the
confirmations that are important for distinguishing
extortion. To do as such, we assess the proposed framework
by utilizing certifiableapplicationinformationgatheredfrom
the google play and iOS application store for an extensive
period. The paper is isolated into areas that are coordinated
as which portray Literature Survey notices. System
Architecture examines the working, structure, and
calculations utilized.
2. EXISTING METHOD
The critical awareness of this mission is upon the sentiment
evaluation and information mining to extract the dataset
produced. By using this method, we can be capable of
deciding the true value of the applications which are
provided in Play and App stores. Sucha proposedgadget will
comprise a large amount of information set that must be
handled and the use of information mining along with visual
data will help in carrying out the system. Information or
information mining is the manner closer to extricating
required records from big informational collections and
modifying them right into a justifiable arrangement for
sometime later, essentially utilized for some, enterprise
primarily based reason. Sentiment Analysis is pitched into
this system as a chunk of it. Since it's far the manner closer
to inspecting factors and obtaining summary data from
them. At an essential dimension, it's far coming across
extremityoftheannouncements.Informationisaccumulated
from a special internet baseline,transportablepackages,and
exchanges which comprise surveys, feedback, and special
information recognized by theindividual enterprise.Further
right here feeling exam is applied for breaking down the
records for destiny upgrades depending on the
measurements received through estimation research.
The project of sizeable informational collectionsisa vital but
difficult issue. Data representation techniques may also
assist to attend to the issue. Visual records research has the
excess capacity and numerous packages, for example,
misrepresentation discovery additionally, records mining
will make use of information representationinnovationfora
progressed records exam. Data mining is applied in figuring
out fraud efficiently and that's what we endorseand putinto
effect in this paper. By using diverse information mining
strategies and algorithms, it might emerge as less
complicated for us to decide our backend retrieval of
information. Fraud may be labeled into diverse types which
might be the packages of information mining. With the end
purpose of grouping, extortion has been separated into four
standard classificationsbudgetarymisrepresentation,media
communications extortion, PC interruption, and safety
misrepresentation. Budgetary extortion is moreover
separated into financial institution misrepresentation,
securities, and wares extortion, and special varieties of
associated extortion which contain economic file extortion,
citizen extortion, and the phrase associated
misrepresentation, at the same time as Insurance extortion
is moreover ordered into scientific coverage
misrepresentation, crop safetyextortion,andaccidentsafety
extortion. Using the IP to cope with the cell person had been
additionally one of the sooner literature surveys which
became delivered forwarded. In the transportable software
advertisement, theperiodcalledmisrepresentationsoftware
is getting prevalent. Nowadays, reputation and anticipation
are assuming an essential activity withinside the
transportable market. For the identity of extortion audit to
the unmarried consumer framework, the Fraud Reviews.
The system is proposed. Evaluations are gatheredtopresent
a role to every software. Although it had recognized the
asset's distinctiveness it wasn't pretty green thinking about
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1721
the truth that IP snooping may be done. ThisIPsnoopinglets
the customers alternate their IP cope and permit them to
charge an app greater than once. The super mega-celebrity
scores which might be furnished for each unmarried
software aren't pretty sufficient in figuring out whether or
not the app is appropriate to be loaded on the cell or now no
longer. As defined that it's now no longer pretty proper to
trust into super megacelebrity themselves. It is taken into
consideration into analyzing the evaluations greater than
scores. Generally, it's far advised to test greater dependable
reasserts which include curated 1/3 element evaluations or
checking the developer's different apps. Collection of a
particular app dataset for a duration of time and
differentiating them as superb and bad evaluations.Utilizing
fewer phrases withinside the evaluations, that is, the use of
the n-gram model (n=2) is greater green for the accuracy of
semantic classification. Lesser the phrases, it's far less
complicated to classify them in step with their class because
of the proposed gadget.
3. PROPOSED METHOD
This paper proposes a safeguarded tree-based search plot
over the mixed cloud data, which maintains multi-
watchword situated search and dynamic technique on the
report variety. Specifically, the vector space model and the
comprehensively used "term repeat (TF) × switch report
repeat (IDF)" model are combined in the documented
improvement and request age to give a multi-keyword
situated search. To procure highpursuitcapability, wefoster
a tree-based document structure and propose an "Insatiable
Depthfirst Search" estimationtakingintoaccountthisrecord
tree. The safe KNN computation is utilized to encode the
record and request vectors, and meanwhile ensure careful
significance score assessment between mixed rundown and
question vectors. To go against different attacks in different
peril models, we fabricate two secure chase plots: the
fundamental dynamic multi-watchword situated search
(BDMRS) contrive in the known ciphertext model, and the
better powerful multi-expression situated search (EDMRS)
plot in the acknowledged establishment model.
4. WORKING OF METHODOLOGY
From the Literature survey and different beyond proposed
structures which had been advanced for this very purpose,
the trouble in removing the fraud software remains under
work. There are positive works that contain using web
Reviews junk mail detection, online evaluation junk mail,
and mobile application recommendation or even focuses on
the detection of malware withinside the apps earlier than
downloading them. Google uses a Fair Play device that is
capable of stumbling on the malwarethatisfoundinpositive
apps handiest, however, hasn't been efficient sufficient to
accomplish that because of the concealing properties. The
user may be tricked into downloading software through its
Reviews even if it does include positive viruses that may
affect the functioning of the mobile. Although there were
different present structures, the principle consciousness
isn't simply on recommendation or junk mail removal.Some
of the strategies may be used for anomalydetectionfromthe
ancient score and evaluation records however they aren't
fraud shreds of evidence for a positive period. Which the
huge increase of apps in stores, it turns into a bulky venture
to determine which of the more genuine or not based on the
reviews alone. Here we advise a device that entailsdetecting
the fraud apps the usage of sentient feedback and facts
mining. We can check the user's sentimental comments on
multiple applications by comparingthereviewsoftheadmin
and the user. By searching into that feedback, we're capable
of distinguishing them as tremendous or terrible feedback.
With the aggregations of three pieces of evidence:rank-
based, Reviews-based, and evaluationprimarilybasedwe're
capable of getting a better chance of results.
The facts are extracted and processed through the mining
leading sessions. The facts are then evaluated at the 3
mentioned pieces of evidence and are concatenated earlier
than the cease result. It is vital to brief about sentiment
analysis and data mining before continuing further into the
proposed system and algorithms.
Fig 1. Proposed System Architecture
4.1 DATA MINING
There is a huge degree of facts reachable in the Information
Industry. This fact is of no usage till it's miles modified over
into beneficial information. It is essential to look at this
massive degree of facts and pay attention to beneficial
information from it. Extraction of information isn't the
primary system we ought to perform;factsminingmoreover
consists of distinctive strategies, for example, Data Cleaning,
Data Integration, Data Transformation, Data Mining,Pattern
Evaluation, and Data Presentation. When eachofthesetypes
of strategies is finished, we could maximum probable make
use of this information in several applications, for example,
Fraud Detection, Market Analysis, Production Control,
Science Exploration, and so on. Data mining is applied right
here to investigate the assessment information with the aid
of using the apps. This information is then filtered and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1722
processed earlier than it can cross through the system of
sentiment analysis. The opinions are extracted and
outstanding primarily based totally on diverse datasets
which might be in the database. Accordingly, the text is
evaluated. To be particular, we are the use of textual content
information mining which is likewise referred to as textual
content mining. From the texts which might be
extracted(opinions) it's miles easier to analyze words or
clusters of words that are used.
4.2 NLP (Natural Processing Language)
While Natural language processing is anything but another
science, the innovation is quickly propelling thanks to an
expanded interestinhuman-to-machinecorrespondences,in
addition to the accessibility of huge information, strong
processing, and upgraded calculations.
As a human, you might talk and write in English, Spanish or
Chinese. In any case, a PC's local language - known as
machine code or machine language - is to a great extent
immeasurable to the vast majority. At your gadget's most
minimal levels, correspondence happensnotwith wordsbut
rather through a great many zeros and ones that produce
intelligent activities.
4.3 SENTIMENT ANALYSIS
Feeling investigation, likewise alluded to as assessment
mining, is a way to deal with natural language
processing(NLP) that recognizes the profound tone behind
an assemblage of text. This is a famous way for associations
to decide and order sentiments about an item,
administration, or thought. It includes the utilization of
informationmining,AI(ML),andman-made brainpower(AI)
to dig messages for opinion and emotional data.
Opinion investigation frameworks assist associations with
get-together bits of knowledge from disorderly and
unstructured text that comes from online sources, for
example, messages, blog entries, support tickets, web visits,
virtual entertainment channels, discussions, and remarks.
Calculations supplant manual information handling by
executing rule-based, programmed,orcrossovertechniques.
Rule-based frameworks perform opinion investigation in
light of predefined, dictionary-based rules while
programmed frameworks gain from information with AI
methods. A mixture feeling examination joins the two
methodologies.
As well as recognizing feeling, assessment mining can
extricate the extremity (or how much energy and cynicism),
subject, and assessment holder inside the text. Besides,
opinion investigation can be applied to shifting extensions,
for example, report, section, sentence, and sub-sentence
levels.
Merchants that offer opinion examination stages or SaaS
items incorporate Brandwatch, Hootsuite, Lexalytics,
NetBase, Sprout Social. Organizations that utilize these
devices can audit client input all the more routinely and
proactively answerchanges ofassessmentinsidethe market.
4.4 ALGORITHM (NAVI BIASED)
It is an order strategy because of Bayes' Theorem with a
supposition of autonomy among indicators. In
straightforward terms, a Naive Bayes classifier accepts that
the presence of a specific component in a class is irrelevant
to the presence of some other element.
For instance, a natural product might be viewed as an apple
assuming that it is red, round, and around 3 crawls in
breadth. Regardless of whether these elements rely upon
one another or upon the presence of different highlights,
these properties freely add to the likelihoodthatthisorganic
product is an apple and to that end, it is known as 'Innocent'.
The credulous Bayes model is not difficult to fabricate and
especially helpful for extremely huge informational
collections. Alongside straightforwardness, Naive Bayes is
known to outflank even exceptionally complexarrangement
strategies.
Bayes's hypothesis gives an approach to ascertaining the
back likelihood of P(c|x) from P(c), P(x), and P(x|c).
Above,
P(c|x) is the posteriors probability of class (c, target) given
predictors (x, attributes).
P(c) is the prior probability of class.
P(x|c) is the likelihood which is the probability of predictors
given class.
P(x) is the prior probability of predictors.
4.5 SCORE CALCULATION
• Input1: client's remark/review given
• Input2: Single and multikeyvalues
• Yield: Score principally founded absolutely on the review
• Initializescore=0,flag=0
• Select multikey, single-key whereflag=0
• Get the Reviews of singlekey= enteredstring
• Get Reviews of multikey=enteredstring
• Reviews=(singlekey Reviews or multikeyscore)/2
• Return score values.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1723
5. CONCLUSION
As the technology advances so the thinking of people there
may be fraud in some applications. Privacy of the user is the
main issue while delivering services to the user such
application might be malwares or data theft there must be
some kind of helping hand to guide user about any new
application. This application not only suggests but also
provides security to the user in a better way.
6. FUTURE SCOPE
In the future, it's planned to review more practical fake
substantiation and dissect the idle relationship among
standing, review, and rankings. Also, it'll be extended to
ranking fraud discoveryapproachwithindispensablemobile
App related services, like mobile Apps recommendation, for
enhancing the user experience.
REFERENCES
[1] Raschka, Sebastian, and Vahid Mirjalili. Python machine
learning: Machine learning and deep learning with Python,
scikit-learn, and TensorFlow 2 Packt Publishing Ltd, 2019.
[2] Wells, Joseph T. Corporate fraud handbook: Prevention
and detection. John Wiley & Sons, 2011.
[3] Bandodkar, S. V., Paradkar, S. S., Dalvi, P. A., Kamat, S.,
Kenkre, P. S., & Aswale, S. (2020). Fraud AppDetectionUsing
Sentiment Analysis. International Journal, 8(8).
[4] Chinmai, Nutulapati, Mohammad Nasreen, Meer Shabbir
Ali, Parasa Naga Satish Babu, and Shaik Salma Begum.
"DETECTION OF FRAUD APPS USING SENTIMENT
ANALYSIS"
[5] Singh, Jyoti, Lakshita Suthar, Diksha Khabya, Simmi
Pachori, Nikita Somani, and Mayank Patel. "FRAUD APP
DETECTION"
[6] Avayaprathambiha.P,Bharathi.M,Sathiyavani.B,Jayaraj.S
“To Detect Fraud Reviews For Mobile Apps Using SVM
Classification” International Journal on Recent and
Innovation Trends in Computing and Communication,vol. 6,
February2018
[7] Suleiman Y. Yerima, SakirSezer, Igor Muttik, “Android
Malware Detection Using Parallel Machine Learning
Classifiers”,8thInternational ConferenceonNextGeneration
Mobile Applications, Services and Technologies,Sept.2014.
[8] SidharthGrover,“Malwaredetection:developinga system
engineered fair play for enhancing the efficacy of stemming
search rank fraud”, International Journal of Technical
Innovation in Modern Engineering &Science, Vol. 4,
October2018
[9] Patil Rohini, Kale Pallavi, Jathade Pournima, Kudale
Kucheta, Prof. Pankaj Agarkar,“MobSafe: Forensic Analysis
For Android ApplicationsAndDetection OfFraudAppsUsing
Cloud Stack And Data Mining”, International Journal of
Advanced Research in Computer Engineering& Technology,
Vol. 4, October2015
[10] Mahmudur Rahman, Mizanur Rahman, Bogdan
Carbunar, and DuenHorngChau,“Search Rank Fraud and
Malware Detection in Google Play”, IEEE Transactions on
Knowledge and Data Engineering, Vol. 29, June2017.
[11] Dr. R. SubhashiniandAkila G,"Valencearousal similarity
based recommendation services ", IEEE International
Conference on Circuit, Power and Computing Technologies,
ICCPCT 2015.
BIOGRAPHIES
G. GEETHA VAISHNAVI
Currently working as assistant
professor from Department of
Computer Science and Engineeringat
Sanketika Vidya Parishad
Engineering.
M. TARUN KUMAR
Pursuing B-tech fromtheDepartment
of Computer Science and Engineering
at Sanketika Vidya Parishad
Engineering College.
M. HEMALATHA
Pursuing B-tech fromtheDepartment
of Computer Science and Engineering
at Sanketika Vidya Parishad
Engineering College.
K. PRAVALIKA
Pursuing B-tech fromtheDepartment
of Computer Science and Engineering
at Sanketika Vidya Parishad
Engineering College.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1724
CH. ROHIT
Pursuing B-tech from the
Department of Computer Science
and Engineering at Sanketika
Vidya Parishad Engineering
College.

More Related Content

Similar to A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING

A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptxA Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptxMobile App
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationseSAT Journals
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’seSAT Journals
 
A 5 minute guide to delivering Flawless Mobile Apps
A 5 minute guide to delivering Flawless Mobile AppsA 5 minute guide to delivering Flawless Mobile Apps
A 5 minute guide to delivering Flawless Mobile AppsCygnet Infotech
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsPvrtechnologies Nellore
 
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsRecommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsIRJET Journal
 
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise AppsDMIMarketing
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile ApplicationsIRJET Journal
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...DMIMarketing
 
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023JoeyNarella
 
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023DanielWong515580
 
Implementing AI for improved performance testing – Cuneiform.pdf
Implementing AI for improved performance testing – Cuneiform.pdfImplementing AI for improved performance testing – Cuneiform.pdf
Implementing AI for improved performance testing – Cuneiform.pdfCuneiform Consulting Pvt Ltd.
 
7 Factors to Consider While Developing Mobile Apps
7 Factors to Consider While Developing Mobile Apps7 Factors to Consider While Developing Mobile Apps
7 Factors to Consider While Developing Mobile Apps99tests
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиSergey Ulankin
 
Making your mobile testing strategy future-proof
Making your mobile testing strategy future-proofMaking your mobile testing strategy future-proof
Making your mobile testing strategy future-proofNagarro
 
Mobile App Analytics
Mobile App AnalyticsMobile App Analytics
Mobile App AnalyticsNynne Silding
 

Similar to A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING (20)

A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptxA Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
 
A 5 minute guide to delivering Flawless Mobile Apps
A 5 minute guide to delivering Flawless Mobile AppsA 5 minute guide to delivering Flawless Mobile Apps
A 5 minute guide to delivering Flawless Mobile Apps
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsRecommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data Streams
 
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part II - Enterprise Apps
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
Essential Guide to Becoming A Mobile App Rock Star - part II - Consumer-facin...
 
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023
 
Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023Complete Guide on How to Build a healthcare app in 2023
Complete Guide on How to Build a healthcare app in 2023
 
IJET-V3I1P2
IJET-V3I1P2IJET-V3I1P2
IJET-V3I1P2
 
1 tihify
1 tihify1 tihify
1 tihify
 
Technology Research on customer enagement
Technology Research on customer enagementTechnology Research on customer enagement
Technology Research on customer enagement
 
Implementing AI for improved performance testing – Cuneiform.pdf
Implementing AI for improved performance testing – Cuneiform.pdfImplementing AI for improved performance testing – Cuneiform.pdf
Implementing AI for improved performance testing – Cuneiform.pdf
 
7 Factors to Consider While Developing Mobile Apps
7 Factors to Consider While Developing Mobile Apps7 Factors to Consider While Developing Mobile Apps
7 Factors to Consider While Developing Mobile Apps
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активности
 
Making your mobile testing strategy future-proof
Making your mobile testing strategy future-proofMaking your mobile testing strategy future-proof
Making your mobile testing strategy future-proof
 
Mobile App Analytics
Mobile App AnalyticsMobile App Analytics
Mobile App Analytics
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1719 A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING M. Tarun Kumar1, M. Hemalatha2, K. Pravalika3, CH. Rohit4 1,2,3,4 Final Year B.Tech, CSE, SanketikaVidya Parishad Engineering College, Visakhapatnam, A.P, India. Guided by G.Geetha vaishnavi, Assistant Professor, SVPEC, Visakhapatnam, A.P, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays, due to the increase in the number of mobile applications in the day to day life, it is important to keep track respect to which ones are safe and which ones are not. The goal is to develop a platform to detect fake apps before the user downloads them by using data mining and sentimental analysis. Sentimental analysis is to help in determining the emotional tones behind words that are expressed online. This strategy is useful in monitoring comments or reviews and helps to get a brief idea of the public's opinion on specific issues. The user cannot always get the right or genuine reviews about the product on the period the internet. Here, the system or framework can check for users' sentimental comments on multiple applications and analyze the positive and negative reviews in the form of text data, it can determine whether the app is genuine or not. The manipulation of reviews is one of the key aspects of determining fake apps. Finally, the proposed system will analysis with app data collected from the ApporPlayStorefor a long period. Key Words: Sentimental Analysis, Data mining, Review based evidence, positive and negative Reviews, analyzing reviews. 1. INTRODUCTION With the boom in technology, there's a growth in the utilization of mobiles. There has been a big boom in the improvement of numerous cellular programs on numerous systems along with the famous Android and iOS. Due to its fast boom each day for its normal utilization, income, and developments, it has ended up a full-size assignment in the global enterprise intelligence marketplace. This offers an upward push in the marketplace opposition. The businesses and application builders are having a difficult opposition with one another to show their best product and spend a huge quantity into attracting clients to sustain their future progress. The maximum crucial functionthatperformsisthe client's Reviews and opinions on that precise application that they show up to download. This will be a mannerfor the builders to discover their weak spots and decorate into the improvement of a brand new one preserving thoughts the peoples need. As an ongoing pattern, instead of relying on standard selling arrangements, below the bushes App developers choose to evaluate a few fake manners to deliberately assist their Apps and in the end, control the defined scores on an App store. This is generally performed with the aid of using utilizing so-called "bot ranches" or "human water armed forces" to make bigger the Application downloads reviews and audits in a very quick time. Certain times, only for the upliftment of the builders, they generally tend to lease groups of people who decide to fraud together and offer fake remarks andReviewsoveranapplication. This is thought to be termed crowd turfing. Hence it's miles continually crucial to make sure that earlier than installing an app, the customers are supplied with the right and genuine remarks to keep away from positive mishaps. For this, a computerized answer is needed to conquer and systematically examine the numerous remarks andReviews that are supplied for each application. 1.1 APPLICATIONS TRACKING With cell telephones being a pretty famous need, it's far crucial that suspicious packages need to be marked as fraud if you want to be recognized with the aid of using the shop users. It will be hard for the person to decide the feedback that they scroll beyond or whether the scores they see are a rip-off or an authentic one for his or her benefit. Thereby, we're presenting a machine that will become aware of such fraudulent packages on Play or App shop with the aid of using presenting a holistic view of Reviews fraud detection machine. By thinking about information mining and sentiment analysis, we can get a higher probabilityofgetting real reviews and hence we advocate a machine that intakes evaluations from registered users for an unmarried product or more than one and examine them as advantageous or poor reviews. This also can be beneficial to determine the fraud application and ensure mobile security as well. We provoke the machine with the aid ofusingthinkingabout the mining main consultation or additionallythelivelydurations of the packages. This affects the detection of a nearby anomaly than the global anomaly of the app Reviews. In particular, in this, we first advocate a simple but fruitful calculation to apprehend the main periods of every App depending on its authentic positioning records.Atthispoint, the research of Apps' positioningpractices,unearthsthefaux Apps that frequently have one-of-a-kind positioning examples in each riding consultation contrasted and regular Apps. Furthermore, we check out three sorts of evidence particularly reviews primarily based totally on the aid of using modeling the consolidation of the three statistical hypothesis tests.Regardless,thepositioning-primarilybased
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1720 on total pieces of evidence may be encouraged with the aid of using the App developer's status and a few authentic marketing and marketingeffortsalongwiththe"constrained time markdown". Thus, it's far insufficient to keep in mind simply that the rank is primarily based on confirmations. 1.2 FAKE DETECTION It will be hard for the client to decide the remarks that they look past or whether the appraisals they see are a trick or a veritable one for their advantage. Along these lines, we are proposing a framework that will recognize such deceitful applications on Play or App store by giving an all- encompassing perspective on positioning extortionlocation framework. By considering information mining and feeling examination, we can get a higher likelihood of getting genuine surveys and subsequently we propose a framework that admissions audits from enlisted clients for a solitary item or various and assess them as a good or pessimistic Reviews. This can likewise be helpful to decide the extortion application and guaranteeversatilesecuritytoo.Westart the framework by considering the mining driving meeting or additionally the dynamic times of the applications. This impacts in identifying neighborhood abnormality than the worldwide oddity of the applicationpositioning.Specifically, in this, we initially propose a fundamental yet productive estimation to perceive the main meetings of each App subject to its legitimate situating records. Now, of the examination of Apps' situating rehearses, it observes the phony Apps that routinely have unmistakable situating models in each drivingmeetingdifferentiatedandcustomary Apps. Besides, we assess through three sorts of confirmationsspecificallypositioning-based,Reviews-based, and survey-based by displaying the combinationofthethree through factual theories tests. Notwithstanding, the situating-based confirmations can be impacted by the App designer's status and somecertifiable publicizingendeavors, for example, the "obligedtimemarkdown".Alongtheselines, considering only the position-based confirmations are lacking. Alongside this, the proposed framework presents two kinds of blackmail confirmations subject to Apps Reviews and review history which reflect a few extraordinary examples from Apps. Additionally, a collected technique is used to coordinate every one of the confirmations that are important for distinguishing extortion. To do as such, we assess the proposed framework by utilizing certifiableapplicationinformationgatheredfrom the google play and iOS application store for an extensive period. The paper is isolated into areas that are coordinated as which portray Literature Survey notices. System Architecture examines the working, structure, and calculations utilized. 2. EXISTING METHOD The critical awareness of this mission is upon the sentiment evaluation and information mining to extract the dataset produced. By using this method, we can be capable of deciding the true value of the applications which are provided in Play and App stores. Sucha proposedgadget will comprise a large amount of information set that must be handled and the use of information mining along with visual data will help in carrying out the system. Information or information mining is the manner closer to extricating required records from big informational collections and modifying them right into a justifiable arrangement for sometime later, essentially utilized for some, enterprise primarily based reason. Sentiment Analysis is pitched into this system as a chunk of it. Since it's far the manner closer to inspecting factors and obtaining summary data from them. At an essential dimension, it's far coming across extremityoftheannouncements.Informationisaccumulated from a special internet baseline,transportablepackages,and exchanges which comprise surveys, feedback, and special information recognized by theindividual enterprise.Further right here feeling exam is applied for breaking down the records for destiny upgrades depending on the measurements received through estimation research. The project of sizeable informational collectionsisa vital but difficult issue. Data representation techniques may also assist to attend to the issue. Visual records research has the excess capacity and numerous packages, for example, misrepresentation discovery additionally, records mining will make use of information representationinnovationfora progressed records exam. Data mining is applied in figuring out fraud efficiently and that's what we endorseand putinto effect in this paper. By using diverse information mining strategies and algorithms, it might emerge as less complicated for us to decide our backend retrieval of information. Fraud may be labeled into diverse types which might be the packages of information mining. With the end purpose of grouping, extortion has been separated into four standard classificationsbudgetarymisrepresentation,media communications extortion, PC interruption, and safety misrepresentation. Budgetary extortion is moreover separated into financial institution misrepresentation, securities, and wares extortion, and special varieties of associated extortion which contain economic file extortion, citizen extortion, and the phrase associated misrepresentation, at the same time as Insurance extortion is moreover ordered into scientific coverage misrepresentation, crop safetyextortion,andaccidentsafety extortion. Using the IP to cope with the cell person had been additionally one of the sooner literature surveys which became delivered forwarded. In the transportable software advertisement, theperiodcalledmisrepresentationsoftware is getting prevalent. Nowadays, reputation and anticipation are assuming an essential activity withinside the transportable market. For the identity of extortion audit to the unmarried consumer framework, the Fraud Reviews. The system is proposed. Evaluations are gatheredtopresent a role to every software. Although it had recognized the asset's distinctiveness it wasn't pretty green thinking about
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1721 the truth that IP snooping may be done. ThisIPsnoopinglets the customers alternate their IP cope and permit them to charge an app greater than once. The super mega-celebrity scores which might be furnished for each unmarried software aren't pretty sufficient in figuring out whether or not the app is appropriate to be loaded on the cell or now no longer. As defined that it's now no longer pretty proper to trust into super megacelebrity themselves. It is taken into consideration into analyzing the evaluations greater than scores. Generally, it's far advised to test greater dependable reasserts which include curated 1/3 element evaluations or checking the developer's different apps. Collection of a particular app dataset for a duration of time and differentiating them as superb and bad evaluations.Utilizing fewer phrases withinside the evaluations, that is, the use of the n-gram model (n=2) is greater green for the accuracy of semantic classification. Lesser the phrases, it's far less complicated to classify them in step with their class because of the proposed gadget. 3. PROPOSED METHOD This paper proposes a safeguarded tree-based search plot over the mixed cloud data, which maintains multi- watchword situated search and dynamic technique on the report variety. Specifically, the vector space model and the comprehensively used "term repeat (TF) × switch report repeat (IDF)" model are combined in the documented improvement and request age to give a multi-keyword situated search. To procure highpursuitcapability, wefoster a tree-based document structure and propose an "Insatiable Depthfirst Search" estimationtakingintoaccountthisrecord tree. The safe KNN computation is utilized to encode the record and request vectors, and meanwhile ensure careful significance score assessment between mixed rundown and question vectors. To go against different attacks in different peril models, we fabricate two secure chase plots: the fundamental dynamic multi-watchword situated search (BDMRS) contrive in the known ciphertext model, and the better powerful multi-expression situated search (EDMRS) plot in the acknowledged establishment model. 4. WORKING OF METHODOLOGY From the Literature survey and different beyond proposed structures which had been advanced for this very purpose, the trouble in removing the fraud software remains under work. There are positive works that contain using web Reviews junk mail detection, online evaluation junk mail, and mobile application recommendation or even focuses on the detection of malware withinside the apps earlier than downloading them. Google uses a Fair Play device that is capable of stumbling on the malwarethatisfoundinpositive apps handiest, however, hasn't been efficient sufficient to accomplish that because of the concealing properties. The user may be tricked into downloading software through its Reviews even if it does include positive viruses that may affect the functioning of the mobile. Although there were different present structures, the principle consciousness isn't simply on recommendation or junk mail removal.Some of the strategies may be used for anomalydetectionfromthe ancient score and evaluation records however they aren't fraud shreds of evidence for a positive period. Which the huge increase of apps in stores, it turns into a bulky venture to determine which of the more genuine or not based on the reviews alone. Here we advise a device that entailsdetecting the fraud apps the usage of sentient feedback and facts mining. We can check the user's sentimental comments on multiple applications by comparingthereviewsoftheadmin and the user. By searching into that feedback, we're capable of distinguishing them as tremendous or terrible feedback. With the aggregations of three pieces of evidence:rank- based, Reviews-based, and evaluationprimarilybasedwe're capable of getting a better chance of results. The facts are extracted and processed through the mining leading sessions. The facts are then evaluated at the 3 mentioned pieces of evidence and are concatenated earlier than the cease result. It is vital to brief about sentiment analysis and data mining before continuing further into the proposed system and algorithms. Fig 1. Proposed System Architecture 4.1 DATA MINING There is a huge degree of facts reachable in the Information Industry. This fact is of no usage till it's miles modified over into beneficial information. It is essential to look at this massive degree of facts and pay attention to beneficial information from it. Extraction of information isn't the primary system we ought to perform;factsminingmoreover consists of distinctive strategies, for example, Data Cleaning, Data Integration, Data Transformation, Data Mining,Pattern Evaluation, and Data Presentation. When eachofthesetypes of strategies is finished, we could maximum probable make use of this information in several applications, for example, Fraud Detection, Market Analysis, Production Control, Science Exploration, and so on. Data mining is applied right here to investigate the assessment information with the aid of using the apps. This information is then filtered and
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1722 processed earlier than it can cross through the system of sentiment analysis. The opinions are extracted and outstanding primarily based totally on diverse datasets which might be in the database. Accordingly, the text is evaluated. To be particular, we are the use of textual content information mining which is likewise referred to as textual content mining. From the texts which might be extracted(opinions) it's miles easier to analyze words or clusters of words that are used. 4.2 NLP (Natural Processing Language) While Natural language processing is anything but another science, the innovation is quickly propelling thanks to an expanded interestinhuman-to-machinecorrespondences,in addition to the accessibility of huge information, strong processing, and upgraded calculations. As a human, you might talk and write in English, Spanish or Chinese. In any case, a PC's local language - known as machine code or machine language - is to a great extent immeasurable to the vast majority. At your gadget's most minimal levels, correspondence happensnotwith wordsbut rather through a great many zeros and ones that produce intelligent activities. 4.3 SENTIMENT ANALYSIS Feeling investigation, likewise alluded to as assessment mining, is a way to deal with natural language processing(NLP) that recognizes the profound tone behind an assemblage of text. This is a famous way for associations to decide and order sentiments about an item, administration, or thought. It includes the utilization of informationmining,AI(ML),andman-made brainpower(AI) to dig messages for opinion and emotional data. Opinion investigation frameworks assist associations with get-together bits of knowledge from disorderly and unstructured text that comes from online sources, for example, messages, blog entries, support tickets, web visits, virtual entertainment channels, discussions, and remarks. Calculations supplant manual information handling by executing rule-based, programmed,orcrossovertechniques. Rule-based frameworks perform opinion investigation in light of predefined, dictionary-based rules while programmed frameworks gain from information with AI methods. A mixture feeling examination joins the two methodologies. As well as recognizing feeling, assessment mining can extricate the extremity (or how much energy and cynicism), subject, and assessment holder inside the text. Besides, opinion investigation can be applied to shifting extensions, for example, report, section, sentence, and sub-sentence levels. Merchants that offer opinion examination stages or SaaS items incorporate Brandwatch, Hootsuite, Lexalytics, NetBase, Sprout Social. Organizations that utilize these devices can audit client input all the more routinely and proactively answerchanges ofassessmentinsidethe market. 4.4 ALGORITHM (NAVI BIASED) It is an order strategy because of Bayes' Theorem with a supposition of autonomy among indicators. In straightforward terms, a Naive Bayes classifier accepts that the presence of a specific component in a class is irrelevant to the presence of some other element. For instance, a natural product might be viewed as an apple assuming that it is red, round, and around 3 crawls in breadth. Regardless of whether these elements rely upon one another or upon the presence of different highlights, these properties freely add to the likelihoodthatthisorganic product is an apple and to that end, it is known as 'Innocent'. The credulous Bayes model is not difficult to fabricate and especially helpful for extremely huge informational collections. Alongside straightforwardness, Naive Bayes is known to outflank even exceptionally complexarrangement strategies. Bayes's hypothesis gives an approach to ascertaining the back likelihood of P(c|x) from P(c), P(x), and P(x|c). Above, P(c|x) is the posteriors probability of class (c, target) given predictors (x, attributes). P(c) is the prior probability of class. P(x|c) is the likelihood which is the probability of predictors given class. P(x) is the prior probability of predictors. 4.5 SCORE CALCULATION • Input1: client's remark/review given • Input2: Single and multikeyvalues • Yield: Score principally founded absolutely on the review • Initializescore=0,flag=0 • Select multikey, single-key whereflag=0 • Get the Reviews of singlekey= enteredstring • Get Reviews of multikey=enteredstring • Reviews=(singlekey Reviews or multikeyscore)/2 • Return score values.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1723 5. CONCLUSION As the technology advances so the thinking of people there may be fraud in some applications. Privacy of the user is the main issue while delivering services to the user such application might be malwares or data theft there must be some kind of helping hand to guide user about any new application. This application not only suggests but also provides security to the user in a better way. 6. FUTURE SCOPE In the future, it's planned to review more practical fake substantiation and dissect the idle relationship among standing, review, and rankings. Also, it'll be extended to ranking fraud discoveryapproachwithindispensablemobile App related services, like mobile Apps recommendation, for enhancing the user experience. REFERENCES [1] Raschka, Sebastian, and Vahid Mirjalili. Python machine learning: Machine learning and deep learning with Python, scikit-learn, and TensorFlow 2 Packt Publishing Ltd, 2019. [2] Wells, Joseph T. Corporate fraud handbook: Prevention and detection. John Wiley & Sons, 2011. [3] Bandodkar, S. V., Paradkar, S. S., Dalvi, P. A., Kamat, S., Kenkre, P. S., & Aswale, S. (2020). Fraud AppDetectionUsing Sentiment Analysis. International Journal, 8(8). [4] Chinmai, Nutulapati, Mohammad Nasreen, Meer Shabbir Ali, Parasa Naga Satish Babu, and Shaik Salma Begum. "DETECTION OF FRAUD APPS USING SENTIMENT ANALYSIS" [5] Singh, Jyoti, Lakshita Suthar, Diksha Khabya, Simmi Pachori, Nikita Somani, and Mayank Patel. "FRAUD APP DETECTION" [6] Avayaprathambiha.P,Bharathi.M,Sathiyavani.B,Jayaraj.S “To Detect Fraud Reviews For Mobile Apps Using SVM Classification” International Journal on Recent and Innovation Trends in Computing and Communication,vol. 6, February2018 [7] Suleiman Y. Yerima, SakirSezer, Igor Muttik, “Android Malware Detection Using Parallel Machine Learning Classifiers”,8thInternational ConferenceonNextGeneration Mobile Applications, Services and Technologies,Sept.2014. [8] SidharthGrover,“Malwaredetection:developinga system engineered fair play for enhancing the efficacy of stemming search rank fraud”, International Journal of Technical Innovation in Modern Engineering &Science, Vol. 4, October2018 [9] Patil Rohini, Kale Pallavi, Jathade Pournima, Kudale Kucheta, Prof. Pankaj Agarkar,“MobSafe: Forensic Analysis For Android ApplicationsAndDetection OfFraudAppsUsing Cloud Stack And Data Mining”, International Journal of Advanced Research in Computer Engineering& Technology, Vol. 4, October2015 [10] Mahmudur Rahman, Mizanur Rahman, Bogdan Carbunar, and DuenHorngChau,“Search Rank Fraud and Malware Detection in Google Play”, IEEE Transactions on Knowledge and Data Engineering, Vol. 29, June2017. [11] Dr. R. SubhashiniandAkila G,"Valencearousal similarity based recommendation services ", IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2015. BIOGRAPHIES G. GEETHA VAISHNAVI Currently working as assistant professor from Department of Computer Science and Engineeringat Sanketika Vidya Parishad Engineering. M. TARUN KUMAR Pursuing B-tech fromtheDepartment of Computer Science and Engineering at Sanketika Vidya Parishad Engineering College. M. HEMALATHA Pursuing B-tech fromtheDepartment of Computer Science and Engineering at Sanketika Vidya Parishad Engineering College. K. PRAVALIKA Pursuing B-tech fromtheDepartment of Computer Science and Engineering at Sanketika Vidya Parishad Engineering College.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1724 CH. ROHIT Pursuing B-tech from the Department of Computer Science and Engineering at Sanketika Vidya Parishad Engineering College.