SlideShare una empresa de Scribd logo
1 de 66
1
PROACTIVE MODERATION AND A
PERSONALISED SYSTEM FOR FRAUD
PRODUCT DETECTION
INTRODUCTION
1.1 PROJECT DESCRIPTION
The continuous growth in the size and use of the World Wide Web imposes new
methods of design and development of online information services. Most Web structures are
becoming complicated and users often miss the goal of their inquiry, or receive ambiguous
results when they try to navigate through them which leadsa user to untrusted websites,
products and links. On the other hand, the E-business sector is rapidly evolving and the needs
for web market places that anticipate the needs of the customers and the trust towards a
product are equally more evident than ever. While people are enjoying the benefits from
online trading, criminals are also taking advantages to conduct fraudulent activities against
honest parties to obtain illegal profits. Therefore the requirement for predicting user needs
and trust providence towards a product in order to improve the usability and user retention of
a website can be addressed by personalizing and using a fraud product detection system.
The application for storage of data has been planned to use the MySQL and all the
user interfaces has been designed using the JSP Technologies. The application takes care of
different modules and their associated functionalities as per the applicable strategies.
1.2 FRAUD PRODUCT DETECTION
Where it was once acceptable for companies to sell their products to very defined and
localized markets within certain logical timeframes, the advent of online shopping has
completely redefined the way companies now market themselves in order to establish a
market presence. However, the introduction of this dynamic medium of conducting business
has brought with it its own complex set of problems. Although many businesses are well
placed to be able to capture the emerging markets thatelectronic commerce can open up,
factors such as widespread concerns about fraud and Internet security have greatly hindered
online business prospects. It must be noted that these concerns are shared by both consumers
2
as well as corporate organizations, which stand to lose sizable amounts from fraudulent
activities. Fraud product detection allows a user or a customer to know about the product
trustworthiness through the other user’s feedback for that product.
1.3 WEB PERSONALISATION
Web personalization is defined as any action that adapts the information or services
provided by a Website to the needs of a user or a set of users, taking advantage of the
knowledge gained from other users’ behavior and individual interests in combination with the
content or it can also be defined as a process of gathering and storing information, analyzing
the information, andtaking the decisionbased on the analysis.
Fraud detection and web personalization are the key technologies needed in various e-
business applications to,
Manage customer organization relationships
Promote products
Manage Web site content
Provide knowledge to the user about the product.
The objective of this application is to “provide users with the trustworthy products
they want or need”.
1.4 PROJECT PURPOSE
i. Improves CustomerSeller relationship in our application, more productive and
engaging.
ii. Valuable to you and your organization, because it drives desired business results such
as increasing visitor response or promoting customer retention.
iii. Most importantly, keep the process simple. Stay focused on the business goals, tackle
manageable projects, measure the success or failure of your changes, and learn from
your mistakes.
iv. Improves the productivity by simplifying access to information
v. More likely to increase salesof trusty companies
3
LITERATURE SURVEY
“Online Modeling of Proactive Moderation System for Auction Fraud Detection”-Liang
Zhang Jie Yang Belle Tseng
Abstract:
We consider the problem of building online machine-learnedmodels for detecting
auction frauds in e-commerce web sites.Since the emergence of the World Wide Web, online
shoppingand online auction have gained more and more popularity.While people are enjoying
the benefits from onlinetrading, criminals are also taking advantages to conductfraudulent
activities against honest parties to obtain illegalprofit. Hence proactive fraud-detection
moderation systemsare commonly applied in practice to detect and prevent suchillegal and
fraud activities. Machine-learned models, especiallythose that are learned online, are able to
catch fraudsmore efficiently and quickly than human-tuned rule-basedsystems. In this paper,
we propose an online probit modelframework which takes online feature selection,
coefficientbounds from human knowledge and multiple instances learninginto account
simultaneously. By empirical experimentson a real-world online auction fraud detection data
we showthat this model can potentially detect more frauds and significantlyreduce customer
complaints compared to severalbaseline models and the human-tuned rule-based system.
4
HARDWARE AND SOFTWARE REQUIREMENTS
3.1 HARDWARE REQUIREMENTS
Processor : Pentium
RAM : 256 MB
3.2 SOFTWARE REQUIREMENTS
Web Server : Apache Tomcat Server
Operating System : Windows
Language : JSP (Java Server Pages)
Database : MySQL Server
One of the fundamental objectives of any project is to collect both the functional and
non-functional requirements. These need to be kept in balance and harmony, as the project
progresses.
Functional Requirements
These are the statements of services that the system should provide, how the system
should react to particular inputs and how the system should behave in particular situations.
Nonfunctional Requirements
These requirements specify criteria that can be used to judge the operation of a
system, rather than specific behaviors. These requirements are often called qualities of a
system. Some of the non-functional requirements include performance, security, user-
interface etc.
Below is the chart of requirements which include both functional and non-functional
Name : Proactive Moderation and A personalized System for Fraud Product
Detection
Purpose :To make user available time with trust worthy products without
spending much of the time in knowing about the product
Inputs :Ratings, Feedback
Outputs :Trustworthy products are made available
Security :Usernames and password to each user
User Interface :Buttons and links on the screen allow the user to control the system.
5
SOFTWARE REQUIREMENT ANALYSIS
4.1 DEFINING THE PROBLEM
4.1.1 Existing System
The traditional online shopping business model allows sellers to sell a product or
service at a preset price, where buyers can choose to purchase without any information
related to the quality of the product. This makes user to make extra time in knowing the
information about the product based on his/her interests which may also frustrate the user and
sometimes lead the user in not buying which indirectly reduces the sales of website.
4.1.2 Proposed system
The proposed system delivers the right content to the right person to maximize
immediate and future business opportunities. This also increases the productivity and sales by
simplifying access to information there by reducing the time to decide whether to trust the
product or not.
4.2 PHASES OF THE APPLICATION
This application requires implicitly or explicitly collecting visitor purchase
information and leveraging that knowledge in your content delivery framework to manipulate
what information you present to users.
The steps include:
(a) Collection of data
(b) Analysis of the collected data, and
(c) Determination of the actions that should be performed.
4.2.1 Collection of data
Whatever method is eventually used to process the data, information about user’s
behavior and products must first be collected.
Explicit data collection refers to any method where the user is asked to provide
feedback or information about product. Often, this begins after a user purchases a product or
used a product. The feedback includes the rating for good, poor delivery, poor manufacturing
or usage or general text about the product. All the information will be collected from different
users and the status of the product will be updates whether to trust or not.
6
4.2.2 Analysis of the collected data
The ways that are employed in order to analyze the collected data include are
Rule-based features:
Human experts with years of experience created many rules to detect whether a user is
fraud or not. It checks whether the product has been or complained as untrusting or fraud.
The trust for particular product(X) can be calculated (in %) by
Trust(X) =100-Fraud(X)
Fraud(X) =No of complaints(X)/ (No of users(X)*0.01)
Selective labeling:
If the fraud score is above a certain level, the case will enter a queue for further
investigation by human experts and the cases whose fraud score are below are determined as
clean by the human expert.
4.2.3 Decision making/Final Recommendation
The decision or the final recommendation after analysis part is to decide whether to
ban the product or to trust the product. If the product is banded by the admin then no user can
view or buy the product hence providing the user only the trustworthy products.
4.3 MODULES AND THEIR FUNCTIONALITIES
The system has been classified into the following modules after a careful analysis,
1. Customer Module
2. Seller Module
3. Administrative Module
4. Complaint Filing
5. Fraud churn
7
4.3.1 Customer Module
A customer is one of the users who wish to shop online. For this purpose the customer
will be provided with a personal account through registration. After successful registration,
he will be provided with a gallery of different products from different sellers which include
the product name, price, sellers’ name etc.While buying a product a customer can view the
percent of trustworthiness towards the product given by other users. After purchasing, a
customer can also file complaint on that product where he feelsuncomfortable provided with
some options like
i. Products purchased by the buyer are not delivered by the seller.
ii. The delivered products do not match the descriptions that were posted by sellers.
iii. Malicious sellers may even post non-existing items with false description to deceive
buyers
iv. General feedback as a complaint
4.3.2 Seller Module
The seller module includes different sellers who wish to sell their products. The seller
needs to be approved by administrator after a seller submits his registration. A seller can add
or delete or modify information about different items.
The different functionalities for seller are
Can add a new a product
Can delete a product
Can place new offers to the product
Can modify information related to the product such as price, basic information etc...
4.3.3 Admin Module
The administrative module includes an admin who acts as an intermediator between
seller and the customer. An Adminis responsible to maintain the website information giving a
trust to the customers. When a complaint is filed in the customer module, the admin takes the
final decision whether to ban the product.If the admin feels all the products from particular
seller mostly are not trusted he can also remove the seller and his related products.
8
4.3.4 Complaint filing
Buyers can file complaints to claim loss if they are recently deceived by fraudulent
sellers. The Administrator views the various types of complaints and the percentage of
various type complaints. The complaints values of a products increase some threshold value
the administrator set the trust ability of the product as Untrusted or banned. If the products set
as banned, the user cannot view the products in the website.
4.3.5 Fraud churn
In this module admin takes the decision whether to continue the seller to sell the
products or not. When some products are labeled as fraud by human experts, it is very likely
that the seller is not trustable and the products too. Hence all the items submitted by the same
seller are labeled as fraud too. So the fraudulent seller along with his/her cases will be
removed from the website immediately once detected.
9
SOFTWARE DESIGN
5.1 UML DIAGRAMS
Unified Modeling Language (UML) is a standardized general-purpose modeling
language in the field of object-oriented software engineering. The Unified Modeling
Language includes a set of graphic notation techniques to create visual models of object-
oriented software-intensive systems.
Unified Modeling Language is used to specify, visualize, modify, construct and
document the artifacts of an object-oriented software-intensive system under development.
We have used three types of diagrams to describe the modules in our project. They are
1. Use case diagrams
2. Sequence diagrams
3. Class diagrams
Use Case Diagrams
Use case diagrams model the functionality of system using actors and use cases.
These diagrams are central to modeling the behavior of a system, a subsystem, or a class.
Sequence Diagrams
A sequence diagram is a kind of interaction diagram that shows how processes
operate with one another and in what order. It is a construct of a Message Sequence chart.
Sequence diagram are sometimes called Event diagrams, event scenarios and timing
diagrams.
Class Diagrams
Class Diagrams is a type of static structure diagram that describes the structure of a
system by showing the system's classes, their attributes, operations (methods) and the
relationships among the classes. It can also be described as a set of objects that share the
same attributes, operations, relationships and semantics.
10
USE CASE DIAGRAM FOR CUSTOMER PURCHASE
Fig 5.1.1 Use case diagram for customer purchase
A customeris provided with a personal account through registration process.once the
account has been created he can login.The customer will be provided with a gallery of
products in which he can select and purchase the products.
Registration
Login
View Products
Purchase Products
Customer
Logout
11
USECASE DIAGRAM FOR CUSTOMER COMPLAINT
Fig 5.1.2 Use case diagram for customer complaint
A customer is provided with a personal account through registration process.once the
account has been created he can login.The customer will be provided with a gallery of
products in which he can select and purchase the products.After purchase the customer can
file a complaint the product in any aspect.
Login
View Products
Purchase Products
Logout
View Offers
Customer
file Complaint
12
USECASE DIAGRAM FOR SELLER
Fig 5.1.3 Use case diagram for seller
A Seller can add or delete or modify information about different items based on the
category. A seller can also provide special offers to the customers to increase the sales.
Login
Offers to Products
Logout
View Products
Seller
Edit information
13
USECASE DIAGRAM FOR ADMIN TO MANAGE SELLERS
Fig 5.1.4 Use case diagram for adminto manage sellers
The administrator maintains the website activities by modifying/adding or deleting the
sellers based on the products they sell.
Login
Logout
View Sellers
Admin
Manage Sellers
14
USECASE DIAGRAM FOR ADMIN
Fig 5.1.5 Use case diagram for admin
When a complaint is filed in the customer module the admin takes the final decision
whether to ban the product or trust or to give sometime. If the admin feels all the products
from particular seller mostly are not trusted he can also remove the seller and his related
products.
Login
continue/block the product
View Complaints
Set trust/untrusted
Admin
Logout
15
SEQUENCE DIAGRAM FOR CUSTOMER REGISTRATION/LOGIN
Fig 5.1.6Sequence diagram for customer registration/login
For registration, the details have to be stored properly and then account will be
created for a user. While logging in, a customer details needs to be validated with the
previous data which has been stored during registration.
Customer GUI register user validate user database
click on register
user details
user created
save user
customer registered successfully
show message
login(usrnm,pswd)
validate user details
check user details
user details
validate user
user valid
login succesful
16
SEQUENCE DIAGRAM FOR APPLICATION
Fig 5.1.7Sequence diagram for application
A customerviews the offers and products and on interest buys the products.The seller
can update/add/delete the product and also provides offers to customers.The admin manages
the seller and takes the decision of which provided need to be in the website.
Customer Seller Database Admin
upload products
place offers
view products
retrieve products
products retrieved
search offers
purchase product
complaint stored in database
retrieve complaints
set block or trust for a product
17
CLASS DIAGRAM FOR APPLICATION
Fig 5.1.8 Class Diagram for application
The Class diagram shows different classes and how they are related.The seller who
sells the product will be managed by the admin who views the products and complaints filed
by the customer.
18
E-R DIAGRAM
Fig: 5.1.9 E-R Diagram
The diagram shows how different entities are related. N number of customers can buy
N products. One admin manages N products who also maintain Nsellers and N sellers can sell
N product which can be purchased by N customers. A customer can also file complaint but
only 1 complaint to one product. This is the how the entire application works
makes
Admin
Customer
Seller
Compliant
Product
manages
buys
Usrn
m pswd
Price
Name
Productid
Mob No
Address
Name
custid
usrnm apwd
Pswrd
username
views
19
5.2 DATABASE DESIGN
Database design is the process of producing a detailed data model of a database.
This logical data model contains all the needed logical and physical design choices and
physical storage parameters needed to generate a design in aData Definition Language, which
can then be used to create a database. A fully attributed data model contains detailed
attributes for each entity.
ADMIN TABLE
ATTRIBUTES TYPE
USERID VARCHAR
PASS VARCHAR
Table: 5.2.1 Admin Table
The above table consists of admin login details. These values will be further used in
validating an admin details avoiding the unauthorized people using the account
20
OFFERS TABLE
Table: 5.2.2 Offers Table
The above table consists of attributes related to Offers. Any complaint towards a
product will also be stored in this product. The values obtained from this table will be used in
calculating the trust for a product.
ATTRIBUTES TYPE
PID Numeric
COMMNAME Varchar
PRONAME Varchar
WARDATE Varchar
PRORATE Varchar
OFFRATE Varchar
OFFDES Varchar
STATUS Varchar
SOLD Varchar
DELIVER Varchar
MISMATCH Varchar
SERVICE Varchar
DAMAGE Varchar
COMPLAINT Varchar
FEED Varchar
ADMINACT Varchar
21
PRODUCTS TABLE
Table: 5.2.3 Products
The above table consists of different details of the product when the customer views
the product. If the seller edits the information the table will be updated.
ATTRIBUTES TYPE
PID Numeric
COMNAME Varchar
PRONAME Varchar
WARDATE Varchar
PROIMAGE long blob
PRORATE Varchar
STATUS Varchar
ADMINACT Varchar
22
PURCHASED TABLE
Table: 5.2.4Purchased
The above table consists of purchasing details of the product by the customer.
Through the PID of the product a product can be uniquely identified
ATTRIBUTES TYPE
PUR_ID Numeric
UID Numeric
UNAME Varchar
PID Numeric
COMNAME Varchar
PRONAME Varchar
WARDATE Varchar
PRORATE Varchar
OFFRATE Varchar
OFFDES Varchar
STATUS Varchar
23
SELLER TABLE
Table: 5.2.5Seller
The above table stores the details of the seller when they get registered. These details
will be further used in validating the user when they login. The status of the seller whether
authorized or not will be known through this table.
ATTRIBUTES TYPE
UID Numeric
NAME Varchar
CNAME Varchar
USERID Numeric
PASS Varchar
MOBILE Varchar
EMAIL Varchar
WEBADD Varchar
DATE Varchar
AUTHORIZE Varchar
24
USER TABLE
Table: 5.2.6User
The above table stores the details of the user when they get registered. These details
will be further used in validating the user when they login.
ATTRIBUTES TYPE
UID Numeric
NAME Varchar
USERID Numeric
PASS Varchar
MOBILE Varchar
EMAIL Varchar
DATE Varchar
25
5.3 DATA FLOW DIAGRAM
A data flow diagram (DFD) is a graphical representation of the "flow" of data through
an information system.
Complete Application Process
Fig: 5.3.1 Dataflow Diagram Showing Complete Application Process
The above dataflow diagram represents the entire system functionality. When the
Customer registers to the application he will be able to buy the products and the administrator
maintains the website activities by modifying/adding or deleting the sellers.A seller can
add/modify/delete the products that are added by him.
Register buys products
Logins supplies products
Website
Activity
Website
Management
Application
Customer
Administrator
Seller
Database
26
Data Flow Diagram for Registration
Fig: 5.3.2 Dataflow Diagram for Registration
The above dataflow diagram represents the registration process. A user when wants to
register he need to give the required details and when any one of the field is left empty or
forgotten by the user or if the password and confirm password are not equal, the interface will
not allow to complete the process until all the fields are properly filled. On successful
completion it shows a message confirming user registration.
User Details
Check if any empty
field
Compare Password
and confirm
Password
Store User details
username password
Show Message
confirming Registration
Database
Member
Store Data
Message to the user
Empty
Not equal
27
CODING
Main page.jsp
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
<title>Auction Fraud</title>
<link href="style.css" rel="stylesheet" media="all" type="text/css" />
</head>
<body>
<div id="wrapper">
<div id="container">
<div id="header">
<div
id="logo"><br><br><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;<strong><font color="#FFFFFF" size="+2" face="Georgia,
Times New Roman, Times, serif"> Online Modeling of Proactive Moderation System
for <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fraud Detection</font></strong></div>
</div>
<div id="navbar">
<ul>
<li><a href="index.html" class="active">Home</a></li>
</ul>
</div>
<div id="main">
<div id="intro">
</div>
28
<div id="text"></div>
<table height="350" align="center" width="700">
<tr bgcolor="#CC3300">
<td width="610" bgcolor="#FBF7E1" valign="top"><p align="justify"><br>
<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<strong><font color="#FF0000" size="+1" face="Courier New">
ONLINE SHOPPING</font></strong><br>
<strong> The E-business sector is rapidly evolving and the needs for web market
places that anticipate the needs of the customers and the trust towards a product are
equally more evident than ever. While people are enjoying the benefits from online
trading, criminals are also taking advantages to conduct fraudulent activities against
honest parties to obtain illegal profits. Therefore the requirement for predicting user
needs and trust providence in order to improve the usability and user retention of a
website can be addressed by personalizing and using a fraud product detection
system.Hence fraud-detection systems are commonly needed to be applied to detect
and prevent such illegal or untrusted products. In this, we propose an online model
framework which takes online feature selection, coefficient bounds from human
knowledge and multiple instances learning into account simultaneously. By empirical
experiments on a real-world we show that this model can potentially meet user needs,
calculate the trust for a product and significantly reduce customer complaints.
</strong></p></td>
<td width="147" bgcolor="#F3ECC2"><table>
<tr>
<td align="center"><font color="#FF0000" size="+1" face="Georgia, Times
New Roman, Times, serif"><strong><img src="images/reg.png" width="35"
height="35">Registration</strong></font></td>
</tr><tr>
<td align="center"><font face="Comic Sans MS" size="3" class="big"><a
href="seller_signup.jsp">Seller</a></font></td>
</tr><tr>
<td align="center"><font face="Comic Sans MS" size="3" class="big"><a
href="user_signup.jsp">User</a></font></td>
</tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr>
29
<tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr>
<td align="center"><font color="#FF0000" size="+1" face="Georgia, Times New
Roman, Times, serif"><strong><img src="images/log1.png" width="35"
height="35"><br>
Login</strong></font></td>
</tr><tr>
<td align="center"><font face="Comic Sans MS" size="+1" class="big"><a
href="seller_log.jsp">Seller</a></font></td>
</tr><tr>
<td align="center"><font face="Comic Sans MS" size="+1" class="big"><a
href="user_log.jsp">User</a></font></td>
</tr><tr>
<td align="center"><font face="Comic Sans MS" size="+1" class="big"><a
href="admin_log.jsp">Admin</a></font></td>
</tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr>
<tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr>
</table></td>
</tr>
</table>
</div>
<div id="columns-wrapper">
</div>
</div>
<div id="footer">
<div id="footer-right">&nbsp;</div>
<div id="footer-left">&nbsp;</div>
<br>
<br>
</div>
</div>
</div>
</body>
</html>
30
ProductDispaly.jsp
<%@ page import="java.sql.*" import="databaseconnection.*"%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
<title>Auction Fraud</title>
<link href="style.css" rel="stylesheet" media="all" type="text/css" />
</head>
<body>
<%
String name=(String)session.getAttribute("name");
String u=(String)session.getAttribute("u");
System.out.println(u);
%>
<div id="wrapper">
<div id="container">
<div id="header"><div id="logo"><br><br><br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<stro
ng><font color="#FFFFFF" size="+2" face="Georgia, Times New Roman, Times,
serif">
31
Online Modeling of Proactive Moderation System for
<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Auction Fraud
Detection</font></strong></div></div>
<div id="navbar">
<ul>
<li><a href="user_home.jsp" >Home</a></li>
<li><a href="my_products.jsp" class="active">My Products</a></li>
<li><a href="index.html">Logout</a></li>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&
nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;<font color="#333366" face="Georgia,
Times New Roman, Times, serif"
size="+1"><strong>welcome:</strong></font>
&nbsp;<font color="#FF0000" face="Georgia, Times New Roman,
Times, serif" size="+1"><strong><%=name%></strong></font>
</ul>
</div>
<div id="main">
<div id="intro">
<div id="text"></div>
<table height="350" align="center" width="700">
32
<tr bgcolor="#CC3300">
<td width="610" bgcolor="#FBF7E1" ><strong><font color="#FF0000" size="+1"
face="Georgia, Times New Roman, Times, serif"><em>My
Products</em></font></strong><br><br><form name="f" action="#"
method="post" onsubmit="return valid()">
<table bgcolor="#FFFFFF" width="700" border="0">
<tr bgcolor="#E4E4F1">
<td align="center"><font color="#110022"><strong>Purchase
ID</strong></font></td>
<td align="center"><font color="#110022"><strong>Company
Name</strong></font></td>
<td align="center"><font color="#110022"><strong>Product
ID</strong></font></td>
<td align="center"><font color="#110022"><strong>Product
Name</strong></font></td>
<td align="center"><font color="#110022"><strong>Warrenty
date</strong></font></td>
<td align="center"><font color="#110022"><strong>Product
Rate</strong></font></td>
<td align="center"><font
color="#110022"><strong>Description</strong></font></td>
<td align="center"><font
color="#110022"><strong>Complaint</strong></font></a></td>
</tr>
<%
33
String pname=null,pid=null,cname=null,purid=null,orate=null,des=null,wdate=null;
ResultSet rs=null;
try
{
Connection con = databasecon.getconnection();
Statement st = con.createStatement();
String qry="select * from purchased where uname='"+name+"' &&
uid='"+u+"'";
rs =st.executeQuery(qry);
while(rs.next())
{
purid=rs.getString("pur_id");
cname=rs.getString("comname");
pid=rs.getString("pid");
pname=rs.getString("proname");
wdate=rs.getString("wardate");
orate=rs.getString("offrate");
des=rs.getString("offdes");
%>
<tr bgcolor="#FFFFCC">
<td align="center"><strong><font color="#FF0000"><%=purid%>
</font></strong></td><td align="center"><strong><font
color="#6300C6"><%=cname%>
34
</font></strong></td>
<td align="center"><strong><font color="#6300C6"><%=pid%>
</font></strong></td>
<td align="center"><strong><font
color="#6300C6"><%=pname%></font></strong></td>
<td align="center"><strong><font
color="#6300C6"><%=wdate%></font></strong></td>
<td align="center"><strong><font
color="#6300C6"><%=orate%></font></strong></td>
<td align="center"><strong><font
color="#6300C6"><%=des%></font></strong></td>
<td align="center"><strong><font color="#6300C6"><a
href="user_complaint.jsp?<%=pid%>"><font
color="#FF0000"><strong>Complaint</strong></font></a></font></strong></td>
</tr>
<%
} }
catch(Exception e1)
{
out.println(e1.getMessage());
}
%>
</table>
</form></td>
</tr>
35
</table>
</div>
<div id="columns-wrapper">
</div>
</div>
<div id="footer">
<div id="footer-right">&nbsp;</div>
<div id="footer-left">&nbsp;</div>
<br><br>
</div>
</div>
</div>
</body>
</html>
36
Trust.jsp
<%@ page import="java.sql.*" import="databaseconnection.*"%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
<title>Auction Fraud</title>
<link href="style.css" rel="stylesheet" media="all" type="text/css" />
<style type="text/css">
#bg
{
background-color:white;
width:50px;
height:100px;
}
</style>
</head>
<body>
<div id="wrapper">
<div id="container">
<div id="header">
<div id="logo"><br>
37
<br><br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<stro
ng><font color="#FFFFFF" size="+2" face="Georgia, Times New Roman, Times,
serif">
Online Modeling of Proactive Moderation System for <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; online
hsopping</font></strong></div>
</div>
<div id="navbar">
<ul>
<li><a href="admin_home.jsp" class="active">Home</a></li>
</ul>
</div>
<div id="main">
<div id="intro">
<div id="text"></div>
<table height="350" align="center" width="700">
<tr bgcolor="#CC3300">
<td width="610" bgcolor="#FBF7E1" align="center"><strong><font
color="#FF3300" size="+1" face="Georgia, Times New Roman, Times, serif"><br>
<br>
Product Survey Status</font></strong><br><br><br>
38
<%
String tpid=request.getQueryString();
String sold=null, del=null,
miss=null,serv=null,dam=null,pname=null,cname=null;
ResultSet rs=null;
try
{
Connection con = databasecon.getconnection();
Statement st = con.createStatement();
String qry="select * from offers where pid='"+tpid+"'";
rs =st.executeQuery(qry);
while(rs.next())
{
pname=rs.getString("proname");
cname=rs.getString("comname");
sold=rs.getString("sold");
del=rs.getString("deliver");
miss=rs.getString("missmatch");
serv =rs.getString("service");
dam =rs.getString("damage");
}
int sold1=Integer.parseInt(sold);
39
int del1=Integer.parseInt(del);
int miss1=Integer.parseInt(miss);
int serv1=Integer.parseInt(serv);
int dam1=Integer.parseInt(dam);
int sum=del1+miss1+serv1+dam1;
Double sum1=sum/((0.01)*(sold1));
//System.out.println(sum1);
double t=50.0;
Double tru=100-sum1;
%>
<fieldset>
<br>
<br>
<table width="513" height="394" cellpadding="5" cellspacing="5">
<tr>
<td width="250"><font face="Georgia, Times New Roman, Times, serif"
color="#330033" size="+1"><strong>Product
ID</strong></font></td>
<td width="162"><font face="Courier New, Courier, mono" size="+2"
color="#FF3300"><strong><%=tpid%></strong></font></td>
</tr><tr>
<td><font face="Georgia, Times New Roman, Times, serif" color="#330033"
size="+1"><strong>
Product Name</strong></font></td>
40
<td><font face="Georgia, Times New Roman, Times, serif" color="#FF0000"
size="+1"><%=pname%></font></td>
</tr>
<tr>
<td><font face="Georgia, Times New Roman, Times, serif" color="#330033"
size="+1"><strong>Company
Name</strong></font></td>
<td><font face="Georgia, Times New Roman, Times, serif" color="#FF0000"
size="+1"><%=cname%></font></td>
</tr><tr>
<td><font face="Georgia, Times New Roman, Times, serif" color="#330033"
size="+1"><strong>Number of Sold
</strong></font></td>
<td><font face="Georgia, Times New Roman, Times, serif" color="#FF0000"
size="+1"><%=sold%></font></td>
</tr>
<tr>
<td><strong><font face="Georgia, Times New Roman, Times, serif"
color="#330033" size="+1">Complaints</font></strong></td>
<td><img src="images/sca1.jpg" width="50" height="100"><img
src="images/bar_red1.jpg" width="50" height="<%=sum1%>">
<br><br><font size="+1" color="#6633FF"><%=sum1%></font>&nbsp;<font
size="+1" color="#FF0000"><strong>%</strong></font></td>
</tr>
<tr><tr>
41
<td><font face="Georgia, Times New Roman, Times, serif" color="#330033"
size="+1"><strong>Trustability</strong></font></td>
<td ><img src="images/sca1.jpg" width="50" height="100"><img
src="images/bar_gree.jpg" width="50" height="<%=tru%>">
<br><br><font size="+1" color="#6633FF"><%=tru%></font>&nbsp;<font
size="+1" color="#FF0000"><strong>%</strong></font></td>
</tr>
<tr></tr>
<tr></tr>
<tr>
<td><a href="admin_home.jsp"><strong><font size="+1" face="Courier
New" color="#FF0000">Back</font></strong></a></td>
<td><a href="more_det.jsp?<%=tpid%>"><strong><font size="+1"
face="Courier New" color="#FF0000">More
Details</font></strong></a></td>
</tr>
</table>
<br>
<br>
</fieldset>
<%
}
catch(Exception e1)
{
42
out.println(e1.getMessage());
}
%>
</td>
</tr>
</table>
</div>
<div id="columns-wrapper">
</div>
</div>
<div id="footer">
<div id="footer-right">&nbsp;</div>
<div id="footer-left">&nbsp;</div>
<br>
<br>
</div>
</div>
</div>
</body>
</html>
43
UserComplaint.jsp
<%@ page import="java.sql.*" import="databaseconnection.*"%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
<title>online shopping</title>
<script type="text/javascript">
function valid()
{
if(document.f.op[0].checked==false&&document.f.op[1].checked==false&&docume
nt.f.op[2].checked==false&&document.f.op[3].checked==false)
{
alert("select Complaint");
return false;
}
var a=document.f.com1.value;
if(a=="")
{
alert("enter Complaint");
document.f.com1.focus();
return false;
}
}
</script>
<link href="style.css" rel="stylesheet" media="all" type="text/css" />
</head>
<body>
<%
String name=(String)session.getAttribute("name");
String pid1=request.getQueryString();
session.setAttribute("pid1",pid1);
44
%>
<div id="wrapper">
<div id="container">
<div id="header">
<div id="logo"><br>
<br>
<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<strong><font color="#FFFFFF" size="+2" face="Georgia, Times New Roman, Times,
serif">
Online Modeling of Proactive Moderation System for <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; online shopping</font></strong></div>
</div>
<div id="navbar">
<ul>
<li><a href="user_home.jsp" >Home</a></li>
<li><a href="my_products.jsp" class="active">My Products</a></li>
<li><a href="index.html">Logout</a></li>
<li><a href="#">Link</a></li>
<li><a href="#">Link</a></li>
<li><a href="#">Link</a></li>-->
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&nbsp;&nbsp;&nbsp;&nbsp;<font color="#333366" face="Georgia, Times New
Roman, Times, serif" size="+1"><strong>welcome:</strong></font>
&nbsp;<font color="#FF0000" face="Georgia, Times New Roman, Times, serif"
size="+1"><strong><%=name%></strong></font>
</ul>
</div>
<div id="main">
45
<div id="intro">
<div id="text"></div>
<table height="350" align="center" width="700">
<tr bgcolor="#CC3300">
<td width="300" bgcolor="#FBF7E1" valign="top"><form name="f"
action="user_com_insert.jsp" method="post" onsubmit="return valid()">
<fieldset>
<legend><font color="#FF0000" size="+2" face="Courier
New"><strong><em>Complaint</em></strong></font></legend>
<table width="271" cellpadding="10" cellspacing="5">
<tr>
<td colspan="2" align="center"><font size="2"><b>
<%
String message=request.getParameter("message");
if(message!=null && message.equalsIgnoreCase("success"))
{
out.println("<font color='red'><blink>Complaint Registered
!</blink></font>");
}
%>
</b></font></td>
</tr>
<tr>
<td><strong><font color="#CC0000" size="+1" face="Georgia, Times New Roman,
Times, serif">complaint about</font></strong></td>
<td><input type="radio" name="op" value="deliver" ><strong><font
color="#330000">Not Delivered</font></strong><br><br><input type="radio"
name="op" value="missmatch">
<strong><font color="#330000">Product Missmatch</font></strong><br>
<br><input type="radio" name="op" value="service"><strong><font
color="#330000">Poor Service</font></strong><br><br><input type="radio"
name="op" value="damage">
<strong><font color="#330000">Product Damaged</font></strong><br>
<br></td>
46
</tr>
<tr>
<td><strong><font color="#CC0000" size="+1" face="Georgia, Times New Roman,
Times, serif">Enter Complaint </font></strong></td>
<td><textarea name="com1" cols="12"></textarea></td>
</tr>
<tr>
<td><input type="reset" name="r" value="clear" class="btn"></td>
<td><input type="submit" name="s" value="submit" class="btn"></td>
</tr>
</table>
</fieldset>
</form></td>
<td width="100" bgcolor="#FBF7E1" align="center"><img src="images/comp.png"
height="150" width="150"></td>
</td>
</tr>
</table>
</div>
<div id="columns-wrapper">
</div>
</div>
<div id="footer">
<div id="footer-right">&nbsp;</div>
<div id="footer-left">&nbsp;</div>
<br><br>
</div>
</div>
</div>
</body>
</html>
47
Authorize.jsp
<%@page
import="com.oreilly.servlet.*,java.sql.*,java.lang.*,databaseconnection.*,java.text.Si
mpleDateFormat,java.util.*,java.io.*,javax.servlet.*, javax.servlet.http.*" %>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>treasure warehouse</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<script type="text/javascript">
</script>
</head>
<body>
<%
Connection con=null;
PreparedStatement psmt1=null;
String a=request.getQueryString();
String tr="Registered";
try{
con=databasecon.getconnection();
psmt1=con.prepareStatement("update seller set authorize='"+tr+"' where
uid='"+a+"'");
psmt1.executeUpdate();
response.sendRedirect("admin_seller.jsp");
}
catch(Exception ex)
{
out.println("Error in connection : "+ex);
}
%>
</body>
</html>
48
TESTING
Testing is the process of trying to discover every conceivable fault or weakness in a work
product. It provides way to check the functionalities of the components, assemblies and or a
finished product. It is the process of exercising the software with the intent of ensuring that
the software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of tests. Each test type addresses specific
testing requirements.
7.1TESTING OBJECTIVES
Testing is a process of executing a program with the intent of finding an error.
A good test has a high probability of finding an as yet undiscovered error.
A successful test is one uncovers an as yet undiscovered error.
7.2 TYPES OF TESTS
7.2.1 System Testing
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration points.
7.2.2 White Box Testing
White Box Testing is a testing in which the software tester has knowledge of the inner
workings, structure and language of the software, or at least its purpose. It is used to test areas
that cannot be reached from a black box level.
7.2.3Black Box Testing
Black Box Testing is testing the software without any knowledge of the inner
workings, structure or language of the module being tested. Black box tests, as most other
kinds of tests, must be written from a definitive source document, such as specification or
requirements documents. It is a testing in which the software under test is treated, as a Black
Box.
49
7.3 TEST CASE ANALYSIS
Some of the test cases and their expected results are:
Test Case
ID Description Expected Result Actual Result
Status
(Pass/Fail)
1
Type Wrong Username
and Password for any
user
An Error message has
to be displayed. It
should prompt for
password
An error message
is displayed
prompting wrong
password
P
2
Type correct Username
and password
Home page should
displayed
Home page is
displayed P
3
Any field regarding to
product adding is not
given
Should prompt for
that specific field
Prompting for the
empty field P
4
Any field left blank
during registration
Should prompt for
completion of
registration
Prompting to enter
the specific field P
5
Click logout Should come to the
Main page
Main page is
displayed if logout
is clicked
P
Table: 7.3.1 Test Case Analysis
50
OUTPUT SCREENS
Main page
Fig: 8.1 Main Page
The above interface is the main page which includes the link for Seller, Customer, and
Admin registrations and login.
51
Seller Login
Fig: 8.2Seller Login
The seller can log into his account by providing his used id and password after he has
successfully completed his registration process.
52
Adding New Products
Fig: 8.3Adding New Products
The seller can only mange the products by adding modifying or deleting the products.
He can also upload the image for the product.
53
Sellers Placing Offers
Fig: 8.4Sellers Placing Offers
The seller can place the offers as necessary to increase the sales by selecting the offers
tab in the menu
54
Seller’s Signup
Fig: 8.5 Seller’s Signup
The seller can log into his account by providing his used id and password after being
authorized by admin for that he need to registered with his details.
55
User Login
Fig: 8.6User Login
The user can log into his account by providing his id and password after being
successfully registered.
56
Search Offers
Fig: 8.7Search Offers
The different offers places by sellers can be viewed by the customers in this page. The
detailed description of the offers and the price decrease is also shown here.
57
Product Details
Fig: 8.8Product Display
This page displays the complete information about the product with the product trust
ability and offers.
58
User Purchased Products
Fig: 8.9User Purchased Products
The user can view the list of all products purchased in the past. He can also go
through the remaining warranty period available on the purchased product.
59
Complaints
Fig: 8.10 Complaints
This page is a complaint page where the user if not satisfied with services provided
then he can choose the type of complaint he wants to file.
60
Admin Login
Fig: 8.11 Admin Login
The admin can log into his account by providing his used id and password. The admin
can only mange the sellers and take the decision of products whether to continue in sales or to
ban the product.
61
All Products
Fig: 8.12All Products
The above pagedisplays all the products registered by different sellers with their status
showing whether the product will be continued in the sales or will be banned.
62
Authorizing New Sellers
Fig: 8.13Authorizing New Sellers
Theadmin can manage the sellers. An Admin can only the authorize the seller after
which a seller can sell their products or otherwise they cannot.
63
Admin Decision
Fig: 8.14 Admin Decision
The admin, upon the complaints received for different customers, can take the
decision on the product.
64
CONCLUSION
Since the emergence of the World Wide Web (WWW), electronic commerce,
commonly known as e-commerce, has become more and more popular,websites benefits
everyone in terms of convenience andprofitability. The traditional online shopping business
model allows sellers to sell a product or service at a preset price, where buyers can choose to
purchase find it to be a good deal but we build online model for fraud product detection while
concentrating on customer needs.In this proposed system we provide the responsibility of
selling the trustful products by the website itself managed by the admin. So when a customer
wishes to buy a product he will get an idea about the product to how much extent he can
believe in that product.If he has faced any problem he can make others aware of that product
by complaining about the product. This model though it cannot be the ideal way of detecting
frauds but it can do the maximum extent in detecting the sellers selling the fraud products.
The true online shopping is that which discovers each customer’s known interests and
needs on an individual level and gives a much more powerful platform from which to
optimize content and offers, a vital key to long-term brand engagement and loyalty.
65
FURTHER ENHANCEMENTS
Regarding to future work, one direction is to include the adjustment of the selection
bias in the online model training process. It has been proven to be very effective for offline
models. The main idea there is to assume all the unlabeled samples have response equal to 0
with a very small weight. Since the unlabeled samples are obtained from an effective
moderation system, it is reasonable to assume that with high probabilities they are non-fraud.
This can be easily extended to too many other applications, such as web spam
detection, content optimization and so forth websites that delivers highly personalized and
trusted experiences top the trafficand revenue rankings across the globe.
Web spam has been an important problem affecting both the consumers and web
service providers since the invention of World Wide Web. So we can attempt to build a spam
detection system for classification of websites as spam or non-spam. Here we try to explore if
the spam web-sites follow certain pattern in terms of the links they are out linked/in linked to
or in terms of contents of such websites. For this, we use various features based on the link
graph or the contents of only the host pages. The benefit of host based labeling instead of
individual page based labeling is that we can cover a larger number of websites to build the
model. We define spamicity as the probability with which a page can be classified as spam (0
for non-spam page and 1 for spam page).
66
BIBLIOGRAPHY
[1] D. Chau and C. Faloutsos, “Fraud detection inelectronic auction”. In European
Web Mining Forum (EWMF 2005), page 87.
[2] Liang Zhang Jie Yang Belle Tseng, “Online Modeling of Proactive Moderation
System for Auction Fraud Detection”,Yahoo! Labs 701 First Ave Sunnyvale,
USA@yahoo-inc.com
[3] Magdalini Eirinaki and Michalis Vazirgiannis,“Web Personalization” Athens
University of Economics and Business. Department of Informatics.
[4] W3Schools Online Web Tutorials.

Más contenido relacionado

La actualidad más candente

Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsNexgen Technology
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...Nexgen Technology
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationseSAT Journals
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиSergey Ulankin
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsShakas Technologies
 
Mobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystemMobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystemSalah Amean
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile ApplicationsIRJET Journal
 
Pindroid - Android Malware Detection Tool
Pindroid - Android Malware Detection Tool Pindroid - Android Malware Detection Tool
Pindroid - Android Malware Detection Tool Akhil Goyal
 
Fraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search RankFraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search Rankijtsrd
 
Metamorphic testing-for-software-quality assessment a study of search engine
Metamorphic testing-for-software-quality assessment a study of search engineMetamorphic testing-for-software-quality assessment a study of search engine
Metamorphic testing-for-software-quality assessment a study of search engineShakas Technologies
 
The rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusThe rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusDaniel Adenew
 
Android Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application StoresAndroid Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application StoresEswar Publications
 
How to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeHow to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeJai Mehta
 
Machine learning for social media analytics
Machine learning for  social media analyticsMachine learning for  social media analytics
Machine learning for social media analyticsJenya Terpil
 
Global employee assessment software market slideshare
Global employee assessment software market slideshareGlobal employee assessment software market slideshare
Global employee assessment software market slideshareSidhantKale1
 
Online social network analysis with machine learning techniques
Online social network analysis with machine learning techniquesOnline social network analysis with machine learning techniques
Online social network analysis with machine learning techniquesHari KC
 

La actualidad más candente (17)

Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
 
Crm updated report
Crm updated reportCrm updated report
Crm updated report
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активности
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Mobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystemMobile apps-user interaction measurement & Apps ecosystem
Mobile apps-user interaction measurement & Apps ecosystem
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
 
Pindroid - Android Malware Detection Tool
Pindroid - Android Malware Detection Tool Pindroid - Android Malware Detection Tool
Pindroid - Android Malware Detection Tool
 
Fraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search RankFraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search Rank
 
Metamorphic testing-for-software-quality assessment a study of search engine
Metamorphic testing-for-software-quality assessment a study of search engineMetamorphic testing-for-software-quality assessment a study of search engine
Metamorphic testing-for-software-quality assessment a study of search engine
 
The rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-VirusThe rise of android malware and efficiency of Anti-Virus
The rise of android malware and efficiency of Anti-Virus
 
Android Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application StoresAndroid Malware Detection in Official and Third Party Application Stores
Android Malware Detection in Official and Third Party Application Stores
 
How to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security KnowledgeHow to Improve Your Mobile App Security Knowledge
How to Improve Your Mobile App Security Knowledge
 
Machine learning for social media analytics
Machine learning for  social media analyticsMachine learning for  social media analytics
Machine learning for social media analytics
 
Global employee assessment software market slideshare
Global employee assessment software market slideshareGlobal employee assessment software market slideshare
Global employee assessment software market slideshare
 
Online social network analysis with machine learning techniques
Online social network analysis with machine learning techniquesOnline social network analysis with machine learning techniques
Online social network analysis with machine learning techniques
 

Similar a main project doument

Online Shopping project report
Online Shopping project report Online Shopping project report
Online Shopping project report Surjeet Art
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating SystemIRJET Journal
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporationDhavamani Prakash
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java projectTutorial Learners
 
Building Information System
Building Information SystemBuilding Information System
Building Information SystemRabia Jabeen
 
Banking Management System Synopsys
Banking Management System SynopsysBanking Management System Synopsys
Banking Management System SynopsysMr. Moms
 
Defect Tracking Tool
Defect Tracking ToolDefect Tracking Tool
Defect Tracking Toolncct
 
Analytics and Self Service
Analytics and Self ServiceAnalytics and Self Service
Analytics and Self ServiceMike Streb
 
The Elaboration of a Strategy in Digital Marketing & Procedures Automation
The Elaboration of a Strategy in Digital Marketing & Procedures AutomationThe Elaboration of a Strategy in Digital Marketing & Procedures Automation
The Elaboration of a Strategy in Digital Marketing & Procedures AutomationEya tborski
 
IRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
IRJET- Spotting and Removing Fake Product Review in Consumer Rating ReviewsIRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
IRJET- Spotting and Removing Fake Product Review in Consumer Rating ReviewsIRJET Journal
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...Milos Pesic
 
Big Data, Analytics and Data Science
Big Data, Analytics and Data ScienceBig Data, Analytics and Data Science
Big Data, Analytics and Data Sciencedlamb3244
 
Customer experience analytics
Customer experience analyticsCustomer experience analytics
Customer experience analyticsAdam Maghrouri
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech applicationnimbleappgenie
 

Similar a main project doument (20)

Proactive moderation
Proactive moderation Proactive moderation
Proactive moderation
 
Online Shopping project report
Online Shopping project report Online Shopping project report
Online Shopping project report
 
fwt-catalyst-overview-FINAL
fwt-catalyst-overview-FINALfwt-catalyst-overview-FINAL
fwt-catalyst-overview-FINAL
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating System
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporation
 
Ad4301161166
Ad4301161166Ad4301161166
Ad4301161166
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java project
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
 
Banking Management System Synopsys
Banking Management System SynopsysBanking Management System Synopsys
Banking Management System Synopsys
 
Defect Tracking Tool
Defect Tracking ToolDefect Tracking Tool
Defect Tracking Tool
 
Analytics and Self Service
Analytics and Self ServiceAnalytics and Self Service
Analytics and Self Service
 
The Elaboration of a Strategy in Digital Marketing & Procedures Automation
The Elaboration of a Strategy in Digital Marketing & Procedures AutomationThe Elaboration of a Strategy in Digital Marketing & Procedures Automation
The Elaboration of a Strategy in Digital Marketing & Procedures Automation
 
IRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
IRJET- Spotting and Removing Fake Product Review in Consumer Rating ReviewsIRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
IRJET- Spotting and Removing Fake Product Review in Consumer Rating Reviews
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
 
Mobile shopping
Mobile shoppingMobile shopping
Mobile shopping
 
Big Data, Analytics and Data Science
Big Data, Analytics and Data ScienceBig Data, Analytics and Data Science
Big Data, Analytics and Data Science
 
Customer experience analytics
Customer experience analyticsCustomer experience analytics
Customer experience analytics
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 

Último

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Último (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 

main project doument

  • 1. 1 PROACTIVE MODERATION AND A PERSONALISED SYSTEM FOR FRAUD PRODUCT DETECTION INTRODUCTION 1.1 PROJECT DESCRIPTION The continuous growth in the size and use of the World Wide Web imposes new methods of design and development of online information services. Most Web structures are becoming complicated and users often miss the goal of their inquiry, or receive ambiguous results when they try to navigate through them which leadsa user to untrusted websites, products and links. On the other hand, the E-business sector is rapidly evolving and the needs for web market places that anticipate the needs of the customers and the trust towards a product are equally more evident than ever. While people are enjoying the benefits from online trading, criminals are also taking advantages to conduct fraudulent activities against honest parties to obtain illegal profits. Therefore the requirement for predicting user needs and trust providence towards a product in order to improve the usability and user retention of a website can be addressed by personalizing and using a fraud product detection system. The application for storage of data has been planned to use the MySQL and all the user interfaces has been designed using the JSP Technologies. The application takes care of different modules and their associated functionalities as per the applicable strategies. 1.2 FRAUD PRODUCT DETECTION Where it was once acceptable for companies to sell their products to very defined and localized markets within certain logical timeframes, the advent of online shopping has completely redefined the way companies now market themselves in order to establish a market presence. However, the introduction of this dynamic medium of conducting business has brought with it its own complex set of problems. Although many businesses are well placed to be able to capture the emerging markets thatelectronic commerce can open up, factors such as widespread concerns about fraud and Internet security have greatly hindered online business prospects. It must be noted that these concerns are shared by both consumers
  • 2. 2 as well as corporate organizations, which stand to lose sizable amounts from fraudulent activities. Fraud product detection allows a user or a customer to know about the product trustworthiness through the other user’s feedback for that product. 1.3 WEB PERSONALISATION Web personalization is defined as any action that adapts the information or services provided by a Website to the needs of a user or a set of users, taking advantage of the knowledge gained from other users’ behavior and individual interests in combination with the content or it can also be defined as a process of gathering and storing information, analyzing the information, andtaking the decisionbased on the analysis. Fraud detection and web personalization are the key technologies needed in various e- business applications to, Manage customer organization relationships Promote products Manage Web site content Provide knowledge to the user about the product. The objective of this application is to “provide users with the trustworthy products they want or need”. 1.4 PROJECT PURPOSE i. Improves CustomerSeller relationship in our application, more productive and engaging. ii. Valuable to you and your organization, because it drives desired business results such as increasing visitor response or promoting customer retention. iii. Most importantly, keep the process simple. Stay focused on the business goals, tackle manageable projects, measure the success or failure of your changes, and learn from your mistakes. iv. Improves the productivity by simplifying access to information v. More likely to increase salesof trusty companies
  • 3. 3 LITERATURE SURVEY “Online Modeling of Proactive Moderation System for Auction Fraud Detection”-Liang Zhang Jie Yang Belle Tseng Abstract: We consider the problem of building online machine-learnedmodels for detecting auction frauds in e-commerce web sites.Since the emergence of the World Wide Web, online shoppingand online auction have gained more and more popularity.While people are enjoying the benefits from onlinetrading, criminals are also taking advantages to conductfraudulent activities against honest parties to obtain illegalprofit. Hence proactive fraud-detection moderation systemsare commonly applied in practice to detect and prevent suchillegal and fraud activities. Machine-learned models, especiallythose that are learned online, are able to catch fraudsmore efficiently and quickly than human-tuned rule-basedsystems. In this paper, we propose an online probit modelframework which takes online feature selection, coefficientbounds from human knowledge and multiple instances learninginto account simultaneously. By empirical experimentson a real-world online auction fraud detection data we showthat this model can potentially detect more frauds and significantlyreduce customer complaints compared to severalbaseline models and the human-tuned rule-based system.
  • 4. 4 HARDWARE AND SOFTWARE REQUIREMENTS 3.1 HARDWARE REQUIREMENTS Processor : Pentium RAM : 256 MB 3.2 SOFTWARE REQUIREMENTS Web Server : Apache Tomcat Server Operating System : Windows Language : JSP (Java Server Pages) Database : MySQL Server One of the fundamental objectives of any project is to collect both the functional and non-functional requirements. These need to be kept in balance and harmony, as the project progresses. Functional Requirements These are the statements of services that the system should provide, how the system should react to particular inputs and how the system should behave in particular situations. Nonfunctional Requirements These requirements specify criteria that can be used to judge the operation of a system, rather than specific behaviors. These requirements are often called qualities of a system. Some of the non-functional requirements include performance, security, user- interface etc. Below is the chart of requirements which include both functional and non-functional Name : Proactive Moderation and A personalized System for Fraud Product Detection Purpose :To make user available time with trust worthy products without spending much of the time in knowing about the product Inputs :Ratings, Feedback Outputs :Trustworthy products are made available Security :Usernames and password to each user User Interface :Buttons and links on the screen allow the user to control the system.
  • 5. 5 SOFTWARE REQUIREMENT ANALYSIS 4.1 DEFINING THE PROBLEM 4.1.1 Existing System The traditional online shopping business model allows sellers to sell a product or service at a preset price, where buyers can choose to purchase without any information related to the quality of the product. This makes user to make extra time in knowing the information about the product based on his/her interests which may also frustrate the user and sometimes lead the user in not buying which indirectly reduces the sales of website. 4.1.2 Proposed system The proposed system delivers the right content to the right person to maximize immediate and future business opportunities. This also increases the productivity and sales by simplifying access to information there by reducing the time to decide whether to trust the product or not. 4.2 PHASES OF THE APPLICATION This application requires implicitly or explicitly collecting visitor purchase information and leveraging that knowledge in your content delivery framework to manipulate what information you present to users. The steps include: (a) Collection of data (b) Analysis of the collected data, and (c) Determination of the actions that should be performed. 4.2.1 Collection of data Whatever method is eventually used to process the data, information about user’s behavior and products must first be collected. Explicit data collection refers to any method where the user is asked to provide feedback or information about product. Often, this begins after a user purchases a product or used a product. The feedback includes the rating for good, poor delivery, poor manufacturing or usage or general text about the product. All the information will be collected from different users and the status of the product will be updates whether to trust or not.
  • 6. 6 4.2.2 Analysis of the collected data The ways that are employed in order to analyze the collected data include are Rule-based features: Human experts with years of experience created many rules to detect whether a user is fraud or not. It checks whether the product has been or complained as untrusting or fraud. The trust for particular product(X) can be calculated (in %) by Trust(X) =100-Fraud(X) Fraud(X) =No of complaints(X)/ (No of users(X)*0.01) Selective labeling: If the fraud score is above a certain level, the case will enter a queue for further investigation by human experts and the cases whose fraud score are below are determined as clean by the human expert. 4.2.3 Decision making/Final Recommendation The decision or the final recommendation after analysis part is to decide whether to ban the product or to trust the product. If the product is banded by the admin then no user can view or buy the product hence providing the user only the trustworthy products. 4.3 MODULES AND THEIR FUNCTIONALITIES The system has been classified into the following modules after a careful analysis, 1. Customer Module 2. Seller Module 3. Administrative Module 4. Complaint Filing 5. Fraud churn
  • 7. 7 4.3.1 Customer Module A customer is one of the users who wish to shop online. For this purpose the customer will be provided with a personal account through registration. After successful registration, he will be provided with a gallery of different products from different sellers which include the product name, price, sellers’ name etc.While buying a product a customer can view the percent of trustworthiness towards the product given by other users. After purchasing, a customer can also file complaint on that product where he feelsuncomfortable provided with some options like i. Products purchased by the buyer are not delivered by the seller. ii. The delivered products do not match the descriptions that were posted by sellers. iii. Malicious sellers may even post non-existing items with false description to deceive buyers iv. General feedback as a complaint 4.3.2 Seller Module The seller module includes different sellers who wish to sell their products. The seller needs to be approved by administrator after a seller submits his registration. A seller can add or delete or modify information about different items. The different functionalities for seller are Can add a new a product Can delete a product Can place new offers to the product Can modify information related to the product such as price, basic information etc... 4.3.3 Admin Module The administrative module includes an admin who acts as an intermediator between seller and the customer. An Adminis responsible to maintain the website information giving a trust to the customers. When a complaint is filed in the customer module, the admin takes the final decision whether to ban the product.If the admin feels all the products from particular seller mostly are not trusted he can also remove the seller and his related products.
  • 8. 8 4.3.4 Complaint filing Buyers can file complaints to claim loss if they are recently deceived by fraudulent sellers. The Administrator views the various types of complaints and the percentage of various type complaints. The complaints values of a products increase some threshold value the administrator set the trust ability of the product as Untrusted or banned. If the products set as banned, the user cannot view the products in the website. 4.3.5 Fraud churn In this module admin takes the decision whether to continue the seller to sell the products or not. When some products are labeled as fraud by human experts, it is very likely that the seller is not trustable and the products too. Hence all the items submitted by the same seller are labeled as fraud too. So the fraudulent seller along with his/her cases will be removed from the website immediately once detected.
  • 9. 9 SOFTWARE DESIGN 5.1 UML DIAGRAMS Unified Modeling Language (UML) is a standardized general-purpose modeling language in the field of object-oriented software engineering. The Unified Modeling Language includes a set of graphic notation techniques to create visual models of object- oriented software-intensive systems. Unified Modeling Language is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intensive system under development. We have used three types of diagrams to describe the modules in our project. They are 1. Use case diagrams 2. Sequence diagrams 3. Class diagrams Use Case Diagrams Use case diagrams model the functionality of system using actors and use cases. These diagrams are central to modeling the behavior of a system, a subsystem, or a class. Sequence Diagrams A sequence diagram is a kind of interaction diagram that shows how processes operate with one another and in what order. It is a construct of a Message Sequence chart. Sequence diagram are sometimes called Event diagrams, event scenarios and timing diagrams. Class Diagrams Class Diagrams is a type of static structure diagram that describes the structure of a system by showing the system's classes, their attributes, operations (methods) and the relationships among the classes. It can also be described as a set of objects that share the same attributes, operations, relationships and semantics.
  • 10. 10 USE CASE DIAGRAM FOR CUSTOMER PURCHASE Fig 5.1.1 Use case diagram for customer purchase A customeris provided with a personal account through registration process.once the account has been created he can login.The customer will be provided with a gallery of products in which he can select and purchase the products. Registration Login View Products Purchase Products Customer Logout
  • 11. 11 USECASE DIAGRAM FOR CUSTOMER COMPLAINT Fig 5.1.2 Use case diagram for customer complaint A customer is provided with a personal account through registration process.once the account has been created he can login.The customer will be provided with a gallery of products in which he can select and purchase the products.After purchase the customer can file a complaint the product in any aspect. Login View Products Purchase Products Logout View Offers Customer file Complaint
  • 12. 12 USECASE DIAGRAM FOR SELLER Fig 5.1.3 Use case diagram for seller A Seller can add or delete or modify information about different items based on the category. A seller can also provide special offers to the customers to increase the sales. Login Offers to Products Logout View Products Seller Edit information
  • 13. 13 USECASE DIAGRAM FOR ADMIN TO MANAGE SELLERS Fig 5.1.4 Use case diagram for adminto manage sellers The administrator maintains the website activities by modifying/adding or deleting the sellers based on the products they sell. Login Logout View Sellers Admin Manage Sellers
  • 14. 14 USECASE DIAGRAM FOR ADMIN Fig 5.1.5 Use case diagram for admin When a complaint is filed in the customer module the admin takes the final decision whether to ban the product or trust or to give sometime. If the admin feels all the products from particular seller mostly are not trusted he can also remove the seller and his related products. Login continue/block the product View Complaints Set trust/untrusted Admin Logout
  • 15. 15 SEQUENCE DIAGRAM FOR CUSTOMER REGISTRATION/LOGIN Fig 5.1.6Sequence diagram for customer registration/login For registration, the details have to be stored properly and then account will be created for a user. While logging in, a customer details needs to be validated with the previous data which has been stored during registration. Customer GUI register user validate user database click on register user details user created save user customer registered successfully show message login(usrnm,pswd) validate user details check user details user details validate user user valid login succesful
  • 16. 16 SEQUENCE DIAGRAM FOR APPLICATION Fig 5.1.7Sequence diagram for application A customerviews the offers and products and on interest buys the products.The seller can update/add/delete the product and also provides offers to customers.The admin manages the seller and takes the decision of which provided need to be in the website. Customer Seller Database Admin upload products place offers view products retrieve products products retrieved search offers purchase product complaint stored in database retrieve complaints set block or trust for a product
  • 17. 17 CLASS DIAGRAM FOR APPLICATION Fig 5.1.8 Class Diagram for application The Class diagram shows different classes and how they are related.The seller who sells the product will be managed by the admin who views the products and complaints filed by the customer.
  • 18. 18 E-R DIAGRAM Fig: 5.1.9 E-R Diagram The diagram shows how different entities are related. N number of customers can buy N products. One admin manages N products who also maintain Nsellers and N sellers can sell N product which can be purchased by N customers. A customer can also file complaint but only 1 complaint to one product. This is the how the entire application works makes Admin Customer Seller Compliant Product manages buys Usrn m pswd Price Name Productid Mob No Address Name custid usrnm apwd Pswrd username views
  • 19. 19 5.2 DATABASE DESIGN Database design is the process of producing a detailed data model of a database. This logical data model contains all the needed logical and physical design choices and physical storage parameters needed to generate a design in aData Definition Language, which can then be used to create a database. A fully attributed data model contains detailed attributes for each entity. ADMIN TABLE ATTRIBUTES TYPE USERID VARCHAR PASS VARCHAR Table: 5.2.1 Admin Table The above table consists of admin login details. These values will be further used in validating an admin details avoiding the unauthorized people using the account
  • 20. 20 OFFERS TABLE Table: 5.2.2 Offers Table The above table consists of attributes related to Offers. Any complaint towards a product will also be stored in this product. The values obtained from this table will be used in calculating the trust for a product. ATTRIBUTES TYPE PID Numeric COMMNAME Varchar PRONAME Varchar WARDATE Varchar PRORATE Varchar OFFRATE Varchar OFFDES Varchar STATUS Varchar SOLD Varchar DELIVER Varchar MISMATCH Varchar SERVICE Varchar DAMAGE Varchar COMPLAINT Varchar FEED Varchar ADMINACT Varchar
  • 21. 21 PRODUCTS TABLE Table: 5.2.3 Products The above table consists of different details of the product when the customer views the product. If the seller edits the information the table will be updated. ATTRIBUTES TYPE PID Numeric COMNAME Varchar PRONAME Varchar WARDATE Varchar PROIMAGE long blob PRORATE Varchar STATUS Varchar ADMINACT Varchar
  • 22. 22 PURCHASED TABLE Table: 5.2.4Purchased The above table consists of purchasing details of the product by the customer. Through the PID of the product a product can be uniquely identified ATTRIBUTES TYPE PUR_ID Numeric UID Numeric UNAME Varchar PID Numeric COMNAME Varchar PRONAME Varchar WARDATE Varchar PRORATE Varchar OFFRATE Varchar OFFDES Varchar STATUS Varchar
  • 23. 23 SELLER TABLE Table: 5.2.5Seller The above table stores the details of the seller when they get registered. These details will be further used in validating the user when they login. The status of the seller whether authorized or not will be known through this table. ATTRIBUTES TYPE UID Numeric NAME Varchar CNAME Varchar USERID Numeric PASS Varchar MOBILE Varchar EMAIL Varchar WEBADD Varchar DATE Varchar AUTHORIZE Varchar
  • 24. 24 USER TABLE Table: 5.2.6User The above table stores the details of the user when they get registered. These details will be further used in validating the user when they login. ATTRIBUTES TYPE UID Numeric NAME Varchar USERID Numeric PASS Varchar MOBILE Varchar EMAIL Varchar DATE Varchar
  • 25. 25 5.3 DATA FLOW DIAGRAM A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. Complete Application Process Fig: 5.3.1 Dataflow Diagram Showing Complete Application Process The above dataflow diagram represents the entire system functionality. When the Customer registers to the application he will be able to buy the products and the administrator maintains the website activities by modifying/adding or deleting the sellers.A seller can add/modify/delete the products that are added by him. Register buys products Logins supplies products Website Activity Website Management Application Customer Administrator Seller Database
  • 26. 26 Data Flow Diagram for Registration Fig: 5.3.2 Dataflow Diagram for Registration The above dataflow diagram represents the registration process. A user when wants to register he need to give the required details and when any one of the field is left empty or forgotten by the user or if the password and confirm password are not equal, the interface will not allow to complete the process until all the fields are properly filled. On successful completion it shows a message confirming user registration. User Details Check if any empty field Compare Password and confirm Password Store User details username password Show Message confirming Registration Database Member Store Data Message to the user Empty Not equal
  • 27. 27 CODING Main page.jsp <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta http-equiv="content-type" content="text/html; charset=iso-8859-1" /> <title>Auction Fraud</title> <link href="style.css" rel="stylesheet" media="all" type="text/css" /> </head> <body> <div id="wrapper"> <div id="container"> <div id="header"> <div id="logo"><br><br><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;<strong><font color="#FFFFFF" size="+2" face="Georgia, Times New Roman, Times, serif"> Online Modeling of Proactive Moderation System for <br> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fraud Detection</font></strong></div> </div> <div id="navbar"> <ul> <li><a href="index.html" class="active">Home</a></li> </ul> </div> <div id="main"> <div id="intro"> </div>
  • 28. 28 <div id="text"></div> <table height="350" align="center" width="700"> <tr bgcolor="#CC3300"> <td width="610" bgcolor="#FBF7E1" valign="top"><p align="justify"><br> <br> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><font color="#FF0000" size="+1" face="Courier New"> ONLINE SHOPPING</font></strong><br> <strong> The E-business sector is rapidly evolving and the needs for web market places that anticipate the needs of the customers and the trust towards a product are equally more evident than ever. While people are enjoying the benefits from online trading, criminals are also taking advantages to conduct fraudulent activities against honest parties to obtain illegal profits. Therefore the requirement for predicting user needs and trust providence in order to improve the usability and user retention of a website can be addressed by personalizing and using a fraud product detection system.Hence fraud-detection systems are commonly needed to be applied to detect and prevent such illegal or untrusted products. In this, we propose an online model framework which takes online feature selection, coefficient bounds from human knowledge and multiple instances learning into account simultaneously. By empirical experiments on a real-world we show that this model can potentially meet user needs, calculate the trust for a product and significantly reduce customer complaints. </strong></p></td> <td width="147" bgcolor="#F3ECC2"><table> <tr> <td align="center"><font color="#FF0000" size="+1" face="Georgia, Times New Roman, Times, serif"><strong><img src="images/reg.png" width="35" height="35">Registration</strong></font></td> </tr><tr> <td align="center"><font face="Comic Sans MS" size="3" class="big"><a href="seller_signup.jsp">Seller</a></font></td> </tr><tr> <td align="center"><font face="Comic Sans MS" size="3" class="big"><a href="user_signup.jsp">User</a></font></td> </tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr>
  • 29. 29 <tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr> <td align="center"><font color="#FF0000" size="+1" face="Georgia, Times New Roman, Times, serif"><strong><img src="images/log1.png" width="35" height="35"><br> Login</strong></font></td> </tr><tr> <td align="center"><font face="Comic Sans MS" size="+1" class="big"><a href="seller_log.jsp">Seller</a></font></td> </tr><tr> <td align="center"><font face="Comic Sans MS" size="+1" class="big"><a href="user_log.jsp">User</a></font></td> </tr><tr> <td align="center"><font face="Comic Sans MS" size="+1" class="big"><a href="admin_log.jsp">Admin</a></font></td> </tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr> <tr></tr><tr></tr><tr></tr><tr></tr><tr></tr><tr></tr> </table></td> </tr> </table> </div> <div id="columns-wrapper"> </div> </div> <div id="footer"> <div id="footer-right">&nbsp;</div> <div id="footer-left">&nbsp;</div> <br> <br> </div> </div> </div> </body> </html>
  • 30. 30 ProductDispaly.jsp <%@ page import="java.sql.*" import="databaseconnection.*"%> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta http-equiv="content-type" content="text/html; charset=iso-8859-1" /> <title>Auction Fraud</title> <link href="style.css" rel="stylesheet" media="all" type="text/css" /> </head> <body> <% String name=(String)session.getAttribute("name"); String u=(String)session.getAttribute("u"); System.out.println(u); %> <div id="wrapper"> <div id="container"> <div id="header"><div id="logo"><br><br><br> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<stro ng><font color="#FFFFFF" size="+2" face="Georgia, Times New Roman, Times, serif">
  • 31. 31 Online Modeling of Proactive Moderation System for <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Auction Fraud Detection</font></strong></div></div> <div id="navbar"> <ul> <li><a href="user_home.jsp" >Home</a></li> <li><a href="my_products.jsp" class="active">My Products</a></li> <li><a href="index.html">Logout</a></li> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;& nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;<font color="#333366" face="Georgia, Times New Roman, Times, serif" size="+1"><strong>welcome:</strong></font> &nbsp;<font color="#FF0000" face="Georgia, Times New Roman, Times, serif" size="+1"><strong><%=name%></strong></font> </ul> </div> <div id="main"> <div id="intro"> <div id="text"></div> <table height="350" align="center" width="700">
  • 32. 32 <tr bgcolor="#CC3300"> <td width="610" bgcolor="#FBF7E1" ><strong><font color="#FF0000" size="+1" face="Georgia, Times New Roman, Times, serif"><em>My Products</em></font></strong><br><br><form name="f" action="#" method="post" onsubmit="return valid()"> <table bgcolor="#FFFFFF" width="700" border="0"> <tr bgcolor="#E4E4F1"> <td align="center"><font color="#110022"><strong>Purchase ID</strong></font></td> <td align="center"><font color="#110022"><strong>Company Name</strong></font></td> <td align="center"><font color="#110022"><strong>Product ID</strong></font></td> <td align="center"><font color="#110022"><strong>Product Name</strong></font></td> <td align="center"><font color="#110022"><strong>Warrenty date</strong></font></td> <td align="center"><font color="#110022"><strong>Product Rate</strong></font></td> <td align="center"><font color="#110022"><strong>Description</strong></font></td> <td align="center"><font color="#110022"><strong>Complaint</strong></font></a></td> </tr> <%
  • 33. 33 String pname=null,pid=null,cname=null,purid=null,orate=null,des=null,wdate=null; ResultSet rs=null; try { Connection con = databasecon.getconnection(); Statement st = con.createStatement(); String qry="select * from purchased where uname='"+name+"' && uid='"+u+"'"; rs =st.executeQuery(qry); while(rs.next()) { purid=rs.getString("pur_id"); cname=rs.getString("comname"); pid=rs.getString("pid"); pname=rs.getString("proname"); wdate=rs.getString("wardate"); orate=rs.getString("offrate"); des=rs.getString("offdes"); %> <tr bgcolor="#FFFFCC"> <td align="center"><strong><font color="#FF0000"><%=purid%> </font></strong></td><td align="center"><strong><font color="#6300C6"><%=cname%>
  • 34. 34 </font></strong></td> <td align="center"><strong><font color="#6300C6"><%=pid%> </font></strong></td> <td align="center"><strong><font color="#6300C6"><%=pname%></font></strong></td> <td align="center"><strong><font color="#6300C6"><%=wdate%></font></strong></td> <td align="center"><strong><font color="#6300C6"><%=orate%></font></strong></td> <td align="center"><strong><font color="#6300C6"><%=des%></font></strong></td> <td align="center"><strong><font color="#6300C6"><a href="user_complaint.jsp?<%=pid%>"><font color="#FF0000"><strong>Complaint</strong></font></a></font></strong></td> </tr> <% } } catch(Exception e1) { out.println(e1.getMessage()); } %> </table> </form></td> </tr>
  • 35. 35 </table> </div> <div id="columns-wrapper"> </div> </div> <div id="footer"> <div id="footer-right">&nbsp;</div> <div id="footer-left">&nbsp;</div> <br><br> </div> </div> </div> </body> </html>
  • 36. 36 Trust.jsp <%@ page import="java.sql.*" import="databaseconnection.*"%> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta http-equiv="content-type" content="text/html; charset=iso-8859-1" /> <title>Auction Fraud</title> <link href="style.css" rel="stylesheet" media="all" type="text/css" /> <style type="text/css"> #bg { background-color:white; width:50px; height:100px; } </style> </head> <body> <div id="wrapper"> <div id="container"> <div id="header"> <div id="logo"><br>
  • 37. 37 <br><br> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<stro ng><font color="#FFFFFF" size="+2" face="Georgia, Times New Roman, Times, serif"> Online Modeling of Proactive Moderation System for <br> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; online hsopping</font></strong></div> </div> <div id="navbar"> <ul> <li><a href="admin_home.jsp" class="active">Home</a></li> </ul> </div> <div id="main"> <div id="intro"> <div id="text"></div> <table height="350" align="center" width="700"> <tr bgcolor="#CC3300"> <td width="610" bgcolor="#FBF7E1" align="center"><strong><font color="#FF3300" size="+1" face="Georgia, Times New Roman, Times, serif"><br> <br> Product Survey Status</font></strong><br><br><br>
  • 38. 38 <% String tpid=request.getQueryString(); String sold=null, del=null, miss=null,serv=null,dam=null,pname=null,cname=null; ResultSet rs=null; try { Connection con = databasecon.getconnection(); Statement st = con.createStatement(); String qry="select * from offers where pid='"+tpid+"'"; rs =st.executeQuery(qry); while(rs.next()) { pname=rs.getString("proname"); cname=rs.getString("comname"); sold=rs.getString("sold"); del=rs.getString("deliver"); miss=rs.getString("missmatch"); serv =rs.getString("service"); dam =rs.getString("damage"); } int sold1=Integer.parseInt(sold);
  • 39. 39 int del1=Integer.parseInt(del); int miss1=Integer.parseInt(miss); int serv1=Integer.parseInt(serv); int dam1=Integer.parseInt(dam); int sum=del1+miss1+serv1+dam1; Double sum1=sum/((0.01)*(sold1)); //System.out.println(sum1); double t=50.0; Double tru=100-sum1; %> <fieldset> <br> <br> <table width="513" height="394" cellpadding="5" cellspacing="5"> <tr> <td width="250"><font face="Georgia, Times New Roman, Times, serif" color="#330033" size="+1"><strong>Product ID</strong></font></td> <td width="162"><font face="Courier New, Courier, mono" size="+2" color="#FF3300"><strong><%=tpid%></strong></font></td> </tr><tr> <td><font face="Georgia, Times New Roman, Times, serif" color="#330033" size="+1"><strong> Product Name</strong></font></td>
  • 40. 40 <td><font face="Georgia, Times New Roman, Times, serif" color="#FF0000" size="+1"><%=pname%></font></td> </tr> <tr> <td><font face="Georgia, Times New Roman, Times, serif" color="#330033" size="+1"><strong>Company Name</strong></font></td> <td><font face="Georgia, Times New Roman, Times, serif" color="#FF0000" size="+1"><%=cname%></font></td> </tr><tr> <td><font face="Georgia, Times New Roman, Times, serif" color="#330033" size="+1"><strong>Number of Sold </strong></font></td> <td><font face="Georgia, Times New Roman, Times, serif" color="#FF0000" size="+1"><%=sold%></font></td> </tr> <tr> <td><strong><font face="Georgia, Times New Roman, Times, serif" color="#330033" size="+1">Complaints</font></strong></td> <td><img src="images/sca1.jpg" width="50" height="100"><img src="images/bar_red1.jpg" width="50" height="<%=sum1%>"> <br><br><font size="+1" color="#6633FF"><%=sum1%></font>&nbsp;<font size="+1" color="#FF0000"><strong>%</strong></font></td> </tr> <tr><tr>
  • 41. 41 <td><font face="Georgia, Times New Roman, Times, serif" color="#330033" size="+1"><strong>Trustability</strong></font></td> <td ><img src="images/sca1.jpg" width="50" height="100"><img src="images/bar_gree.jpg" width="50" height="<%=tru%>"> <br><br><font size="+1" color="#6633FF"><%=tru%></font>&nbsp;<font size="+1" color="#FF0000"><strong>%</strong></font></td> </tr> <tr></tr> <tr></tr> <tr> <td><a href="admin_home.jsp"><strong><font size="+1" face="Courier New" color="#FF0000">Back</font></strong></a></td> <td><a href="more_det.jsp?<%=tpid%>"><strong><font size="+1" face="Courier New" color="#FF0000">More Details</font></strong></a></td> </tr> </table> <br> <br> </fieldset> <% } catch(Exception e1) {
  • 42. 42 out.println(e1.getMessage()); } %> </td> </tr> </table> </div> <div id="columns-wrapper"> </div> </div> <div id="footer"> <div id="footer-right">&nbsp;</div> <div id="footer-left">&nbsp;</div> <br> <br> </div> </div> </div> </body> </html>
  • 43. 43 UserComplaint.jsp <%@ page import="java.sql.*" import="databaseconnection.*"%> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta http-equiv="content-type" content="text/html; charset=iso-8859-1" /> <title>online shopping</title> <script type="text/javascript"> function valid() { if(document.f.op[0].checked==false&&document.f.op[1].checked==false&&docume nt.f.op[2].checked==false&&document.f.op[3].checked==false) { alert("select Complaint"); return false; } var a=document.f.com1.value; if(a=="") { alert("enter Complaint"); document.f.com1.focus(); return false; } } </script> <link href="style.css" rel="stylesheet" media="all" type="text/css" /> </head> <body> <% String name=(String)session.getAttribute("name"); String pid1=request.getQueryString(); session.setAttribute("pid1",pid1);
  • 44. 44 %> <div id="wrapper"> <div id="container"> <div id="header"> <div id="logo"><br> <br> <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><font color="#FFFFFF" size="+2" face="Georgia, Times New Roman, Times, serif"> Online Modeling of Proactive Moderation System for <br> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; online shopping</font></strong></div> </div> <div id="navbar"> <ul> <li><a href="user_home.jsp" >Home</a></li> <li><a href="my_products.jsp" class="active">My Products</a></li> <li><a href="index.html">Logout</a></li> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li>--> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;<font color="#333366" face="Georgia, Times New Roman, Times, serif" size="+1"><strong>welcome:</strong></font> &nbsp;<font color="#FF0000" face="Georgia, Times New Roman, Times, serif" size="+1"><strong><%=name%></strong></font> </ul> </div> <div id="main">
  • 45. 45 <div id="intro"> <div id="text"></div> <table height="350" align="center" width="700"> <tr bgcolor="#CC3300"> <td width="300" bgcolor="#FBF7E1" valign="top"><form name="f" action="user_com_insert.jsp" method="post" onsubmit="return valid()"> <fieldset> <legend><font color="#FF0000" size="+2" face="Courier New"><strong><em>Complaint</em></strong></font></legend> <table width="271" cellpadding="10" cellspacing="5"> <tr> <td colspan="2" align="center"><font size="2"><b> <% String message=request.getParameter("message"); if(message!=null && message.equalsIgnoreCase("success")) { out.println("<font color='red'><blink>Complaint Registered !</blink></font>"); } %> </b></font></td> </tr> <tr> <td><strong><font color="#CC0000" size="+1" face="Georgia, Times New Roman, Times, serif">complaint about</font></strong></td> <td><input type="radio" name="op" value="deliver" ><strong><font color="#330000">Not Delivered</font></strong><br><br><input type="radio" name="op" value="missmatch"> <strong><font color="#330000">Product Missmatch</font></strong><br> <br><input type="radio" name="op" value="service"><strong><font color="#330000">Poor Service</font></strong><br><br><input type="radio" name="op" value="damage"> <strong><font color="#330000">Product Damaged</font></strong><br> <br></td>
  • 46. 46 </tr> <tr> <td><strong><font color="#CC0000" size="+1" face="Georgia, Times New Roman, Times, serif">Enter Complaint </font></strong></td> <td><textarea name="com1" cols="12"></textarea></td> </tr> <tr> <td><input type="reset" name="r" value="clear" class="btn"></td> <td><input type="submit" name="s" value="submit" class="btn"></td> </tr> </table> </fieldset> </form></td> <td width="100" bgcolor="#FBF7E1" align="center"><img src="images/comp.png" height="150" width="150"></td> </td> </tr> </table> </div> <div id="columns-wrapper"> </div> </div> <div id="footer"> <div id="footer-right">&nbsp;</div> <div id="footer-left">&nbsp;</div> <br><br> </div> </div> </div> </body> </html>
  • 47. 47 Authorize.jsp <%@page import="com.oreilly.servlet.*,java.sql.*,java.lang.*,databaseconnection.*,java.text.Si mpleDateFormat,java.util.*,java.io.*,javax.servlet.*, javax.servlet.http.*" %> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <title>treasure warehouse</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <script type="text/javascript"> </script> </head> <body> <% Connection con=null; PreparedStatement psmt1=null; String a=request.getQueryString(); String tr="Registered"; try{ con=databasecon.getconnection(); psmt1=con.prepareStatement("update seller set authorize='"+tr+"' where uid='"+a+"'"); psmt1.executeUpdate(); response.sendRedirect("admin_seller.jsp"); } catch(Exception ex) { out.println("Error in connection : "+ex); } %> </body> </html>
  • 48. 48 TESTING Testing is the process of trying to discover every conceivable fault or weakness in a work product. It provides way to check the functionalities of the components, assemblies and or a finished product. It is the process of exercising the software with the intent of ensuring that the software system meets its requirements and user expectations and does not fail in an unacceptable manner. There are various types of tests. Each test type addresses specific testing requirements. 7.1TESTING OBJECTIVES Testing is a process of executing a program with the intent of finding an error. A good test has a high probability of finding an as yet undiscovered error. A successful test is one uncovers an as yet undiscovered error. 7.2 TYPES OF TESTS 7.2.1 System Testing System testing ensures that the entire integrated software system meets requirements. It tests a configuration to ensure known and predictable results. System testing is based on process descriptions and flows, emphasizing pre-driven process links and integration points. 7.2.2 White Box Testing White Box Testing is a testing in which the software tester has knowledge of the inner workings, structure and language of the software, or at least its purpose. It is used to test areas that cannot be reached from a black box level. 7.2.3Black Box Testing Black Box Testing is testing the software without any knowledge of the inner workings, structure or language of the module being tested. Black box tests, as most other kinds of tests, must be written from a definitive source document, such as specification or requirements documents. It is a testing in which the software under test is treated, as a Black Box.
  • 49. 49 7.3 TEST CASE ANALYSIS Some of the test cases and their expected results are: Test Case ID Description Expected Result Actual Result Status (Pass/Fail) 1 Type Wrong Username and Password for any user An Error message has to be displayed. It should prompt for password An error message is displayed prompting wrong password P 2 Type correct Username and password Home page should displayed Home page is displayed P 3 Any field regarding to product adding is not given Should prompt for that specific field Prompting for the empty field P 4 Any field left blank during registration Should prompt for completion of registration Prompting to enter the specific field P 5 Click logout Should come to the Main page Main page is displayed if logout is clicked P Table: 7.3.1 Test Case Analysis
  • 50. 50 OUTPUT SCREENS Main page Fig: 8.1 Main Page The above interface is the main page which includes the link for Seller, Customer, and Admin registrations and login.
  • 51. 51 Seller Login Fig: 8.2Seller Login The seller can log into his account by providing his used id and password after he has successfully completed his registration process.
  • 52. 52 Adding New Products Fig: 8.3Adding New Products The seller can only mange the products by adding modifying or deleting the products. He can also upload the image for the product.
  • 53. 53 Sellers Placing Offers Fig: 8.4Sellers Placing Offers The seller can place the offers as necessary to increase the sales by selecting the offers tab in the menu
  • 54. 54 Seller’s Signup Fig: 8.5 Seller’s Signup The seller can log into his account by providing his used id and password after being authorized by admin for that he need to registered with his details.
  • 55. 55 User Login Fig: 8.6User Login The user can log into his account by providing his id and password after being successfully registered.
  • 56. 56 Search Offers Fig: 8.7Search Offers The different offers places by sellers can be viewed by the customers in this page. The detailed description of the offers and the price decrease is also shown here.
  • 57. 57 Product Details Fig: 8.8Product Display This page displays the complete information about the product with the product trust ability and offers.
  • 58. 58 User Purchased Products Fig: 8.9User Purchased Products The user can view the list of all products purchased in the past. He can also go through the remaining warranty period available on the purchased product.
  • 59. 59 Complaints Fig: 8.10 Complaints This page is a complaint page where the user if not satisfied with services provided then he can choose the type of complaint he wants to file.
  • 60. 60 Admin Login Fig: 8.11 Admin Login The admin can log into his account by providing his used id and password. The admin can only mange the sellers and take the decision of products whether to continue in sales or to ban the product.
  • 61. 61 All Products Fig: 8.12All Products The above pagedisplays all the products registered by different sellers with their status showing whether the product will be continued in the sales or will be banned.
  • 62. 62 Authorizing New Sellers Fig: 8.13Authorizing New Sellers Theadmin can manage the sellers. An Admin can only the authorize the seller after which a seller can sell their products or otherwise they cannot.
  • 63. 63 Admin Decision Fig: 8.14 Admin Decision The admin, upon the complaints received for different customers, can take the decision on the product.
  • 64. 64 CONCLUSION Since the emergence of the World Wide Web (WWW), electronic commerce, commonly known as e-commerce, has become more and more popular,websites benefits everyone in terms of convenience andprofitability. The traditional online shopping business model allows sellers to sell a product or service at a preset price, where buyers can choose to purchase find it to be a good deal but we build online model for fraud product detection while concentrating on customer needs.In this proposed system we provide the responsibility of selling the trustful products by the website itself managed by the admin. So when a customer wishes to buy a product he will get an idea about the product to how much extent he can believe in that product.If he has faced any problem he can make others aware of that product by complaining about the product. This model though it cannot be the ideal way of detecting frauds but it can do the maximum extent in detecting the sellers selling the fraud products. The true online shopping is that which discovers each customer’s known interests and needs on an individual level and gives a much more powerful platform from which to optimize content and offers, a vital key to long-term brand engagement and loyalty.
  • 65. 65 FURTHER ENHANCEMENTS Regarding to future work, one direction is to include the adjustment of the selection bias in the online model training process. It has been proven to be very effective for offline models. The main idea there is to assume all the unlabeled samples have response equal to 0 with a very small weight. Since the unlabeled samples are obtained from an effective moderation system, it is reasonable to assume that with high probabilities they are non-fraud. This can be easily extended to too many other applications, such as web spam detection, content optimization and so forth websites that delivers highly personalized and trusted experiences top the trafficand revenue rankings across the globe. Web spam has been an important problem affecting both the consumers and web service providers since the invention of World Wide Web. So we can attempt to build a spam detection system for classification of websites as spam or non-spam. Here we try to explore if the spam web-sites follow certain pattern in terms of the links they are out linked/in linked to or in terms of contents of such websites. For this, we use various features based on the link graph or the contents of only the host pages. The benefit of host based labeling instead of individual page based labeling is that we can cover a larger number of websites to build the model. We define spamicity as the probability with which a page can be classified as spam (0 for non-spam page and 1 for spam page).
  • 66. 66 BIBLIOGRAPHY [1] D. Chau and C. Faloutsos, “Fraud detection inelectronic auction”. In European Web Mining Forum (EWMF 2005), page 87. [2] Liang Zhang Jie Yang Belle Tseng, “Online Modeling of Proactive Moderation System for Auction Fraud Detection”,Yahoo! Labs 701 First Ave Sunnyvale, USA@yahoo-inc.com [3] Magdalini Eirinaki and Michalis Vazirgiannis,“Web Personalization” Athens University of Economics and Business. Department of Informatics. [4] W3Schools Online Web Tutorials.