SlideShare una empresa de Scribd logo
1 de 29
Detection of fake online reviews using semi-supervised and supervised learning
By
G.Manoj Kumar
(20BF1F0033)
Under the guidance of
P.LOKESH KUMAR REDDY
Assistant Professor
DEPARTMENT OF COMPUTER APPLICATION
SRI VENKATESWARA COLLEGE OF ENGINEERING
Karakambadi Road, TIRUPATI – 517507
2020– 2022
MCA IV Semester Project II Review Presentation
Contents
 ABSTRACT
 INTRODUCTION
 PROBLEM DEFINITION
 EXISTING SYSTEM
DISADVANTAGES OF EXISTING SYSTEM
 PROPOSED SYSTEM
ADVANTAGES OF PROPOSED SYSTEM
Contents
 SOFTWARE AND HARDWARE REQUIREMENTS
 ALGORITHMS
 MODULES
 ARCHITECTURE
 UML DIAGRAMS
 TESTING STRATEGIES
ABSTRACT
Online reviews have great impact on today’s business and commerce.
Decision making for purchase of online products mostly depends on reviews
given by the users. Hence, opportunistic individuals or groups try to
manipulate product reviews for their own interests. This Project introduces
some semi-supervised and supervised text mining models to detect fake
online reviews as well as compares the efficiency of both techniques on
dataset containing hotel reviews
INTRODUCTION
 Technologies are swiftly evolving. Old innovations are being constantly substituted
with modern and emerging technologies.
 This emerging innovations allow individuals to carry out their work effectively. The
online marketplace is such a technical advancement.
 Through utilising online portals, can shop and make reservations. Before consuming
those goods or facilities, almost every one of us seeks out feedback.
 They also have a huge influence on advertisements and the marketing of goods and
services. Fake web reviews are becoming extremely relevant with the spread of the
online marketplace.
 For the marketing of their own goods, people may create fake reviews that damage the
real consumers.
 Researchers have been exploring several ways to recognise these bogus web reviews.
Some methods are focused on the quality of the article and some are based on the
actions of the consumer who publishes feedback.
PROBLEM DEFINITION
This Project introduces some semi-supervised and supervised text mining models to
detect fake online reviews as well as compares the efficiency of both techniques on
dataset containing hotel reviews.
EXISTING SYSTEM
 Content based methods focus on what is the content of the review. That is the
text of the review or what is told in it. Heydari et al. have attempted to detect
spam review by analyzing the linguistic features of the review.
 Ott used three techniques to perform classification. These three techniques are-
genre identification, detection of psycholinguistic deception and text
categorization.
 Behavior feature based study focuses on the reviewer that includes
characteristics of the person who is giving the review.
 Lim et al. addressed the problem of review spammer detection, or finding users
who are the source of spam reviews. People who post intentional fake reviews
have significantly different behavior than the normal user.
DISADVANTAGES OF EXISTING SYSTEM
 In the existing work, the system uses only to semi-supervised learning.
 Only Text Classification as sentiment text and it never finds fake
PROPOSED SYSTEM
 In the proposed system, each review goes through tokenization process first. Then,
unnecessary words are removed and candidate feature words are generated.
 Each candidate feature words are checked against the dictionary and if its entry is
available in the dictionary then its frequency is counted and added to the column in
the feature vector that corresponds the numeric map of the word.
 Alongside with counting frequency, the length of the review is measured and
added to the feature vector.
 Finally, sentiment score which is available in the data set is added in the feature
vector. We have assigned negative sentiment as zero valued and positive sentiment
as some positive valued in the feature vector.
ADVANTAGES OF PROPOSED SYSTEM
 Detect Unseen Attacks
 Low False Positive rates
 Support Large Datasets
 Able to handle imbalanced Dataset
HARDWARE REQUIREMENTS
 Processor- Intel (R) Core (TM) i3-4200U
 CPU - 1.6GHz
 RAM:4 GB
 Hard Disk: 500 GB.
SOFTWARE REQUIREMENTS
 Operating System - Windows 10
 Server - XAMPP
 Front End - HTML, CSS, JS
 Back end - Python
 Data base - MYSQL
The following the some algorithms used in this project:
1. Naïve Bayes Classifier
ALGORITHMS
In this Proposed System, There are two modules. They are:
1. Service Provider
2. Remote User
MODULES
MODULES DESCRIPTION
In this Project, There are two modules :
Service provider
In this module, login , add movies, view uploaded movies, view positive, view
negative, view neutral, view sentients reviews, view rating results, dislike like results,
view remote users, view movie reviews, view trending movies, view movies
recommended, view fake reviews /ratings, logout
User
In the module, the user will register and then login and do such operations like view all
added movies, view all movies reviews, view trending movies, view your profile, view
all movies recommended, logout
MODULES
SYSTEM ARCHITECTURE
Class Diagram
UML DIAGRAMS
USE CASE DIAGRAM FOR REMOTE USER
UML DIAGRAMS
Register & login
View all Added Movies
View all movies Reviews
View Trending movies
Remote User
View Your Profile
View all Movies Recommended
Log out
USE CASE DIAGRAM FOR SERVICE PROVIDER
UML DIAGRAMS
Login
Add Movies
Add Uploaded Movies
View Positive / Negative / Neutral
Sentiment reviews
View rating Results
Dislike / Like Results
View Remote Users
View Movie Reviews
View Trending Movies
Service Provider
View Movie Recommended
View Fake reviews / Rating
Log out
Sequence diagram
UML DIAGRAMS
Service provider Server Remote User
Login
Register & Login
1. Add movies
2. View uploaded movies
3. View postive / Negative/ netural sentiment reviews
4. View rating results
5. Dislike / Likes results
6. View remote users
7. View movie reviews
8. View tranding movies
9. View movies recommended
10. View fake reviews / rating
11. View all Added movies
12. View all movies reviews
Collaboration diagram
UML DIAGRAMS
: Service
provider
: Server
: Remote
User
View all Added Movies
View all Movies Reviews
View Trending movies
View your profile
View All Movies recommeded
1:
2:
Add Movies
View uploaded movies
View positive / Negitive / Netural
sentiment reviews
View rating results
Dislikes / Likes Results
View Remote Users
View Movies Reviews
View Trending Movies
View movies recommended
View Fake Reviews / Rating
ACTIVITY diagram For Remote User
UML DIAGRAMS
Register & Login
Che
ck Valid
Invalid
View all Added Movies
View all Movies Reviews
Log out
View Trending movies
View your profile
View all Movies recommeded
Activity diagram For Service Provider
UML DIAGRAMS
Login
Che
ck Valid
Invalid
Add Movies
View Uploaded Movies
View Positive / Negative / Neutral
Sentiment Reviews
View rating Results
Dislike / Likes results
View Remote Users
View Movie Reviews
Log out
View Trending Movies
View Movie Recommended
View Fake Reviews / Rating
Deployment diagram
UML DIAGRAMS
admin
server
user
The Common view of testing held by users is that it is preformed to improve that there
are no errors in a program. This is extremely difficult since designer cannot prove to be one
hundred percent accurate
It requires the focus on basic critical factors:
 Planning
 Project and process control
 Risk management
 Organization and professionalism Inspections
 Measurement tools
SYSTEM TESTING
 Level of Testing
The term end-to-end testing is also used in many organizations and tends to refer to a
combination of Systems Testing and Systems Integration Testing. Also, in some organizations the
term Systems Testing is used interchangeably with end-to-end testing.
 Test Plan
Before going for testing, first decide upon the type of testing to be carried out. The
following factors are taken into consideration:
To ensure whether that information properly flows into and out of program.
To find whether the local data structures maintaining their integrity during all steps in an
algorithm execution or not.
SYSTEM TESTING
To ensure that the module operate properly at boundaries established to limit or restrict
progressing.
To find out whether error-handling paths are working correctly or not. To find
out whether the values are correctly updated or not check for validation
Objectives of Testing
 Testing is done to ensure
No bug occurrence in future usage of the Application.
Quality Assurance standard is achieved.
Discover symptoms caused by bugs and provide clear diagnosis so that bugs can be
easily prevented.
SYSTEM TESTING
Test Case Design Techniques
During testing the program to be tested is executed with a set of test cases and output of
the program for the test cases is evaluated to determine if the program is performing as
expected. To accomplish this objectives test case design techniques are used:
 Unit Testing.
 Integration Testing.
 User Acceptance Testing.
 Output Testing.
 Validation Testing.
SYSTEM TESTING
Detection of Fake reviews

Más contenido relacionado

La actualidad más candente

Fake Product Review Monitoring System
Fake Product Review Monitoring SystemFake Product Review Monitoring System
Fake Product Review Monitoring System
ijtsrd
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Selvaraj Seerangan
 
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learning
Parvathi Sanil Nair
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 

La actualidad más candente (20)

Sentiment analysis using ml
Sentiment analysis using mlSentiment analysis using ml
Sentiment analysis using ml
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
 
Fake Product Review Monitoring System
Fake Product Review Monitoring SystemFake Product Review Monitoring System
Fake Product Review Monitoring System
 
Android Based Application Project Report.
Android Based Application Project Report. Android Based Application Project Report.
Android Based Application Project Report.
 
Driver drowsiness detection
Driver drowsiness detectionDriver drowsiness detection
Driver drowsiness detection
 
Daily Expense Tracker
Daily Expense TrackerDaily Expense Tracker
Daily Expense Tracker
 
Software reuse ppt.
Software reuse ppt.Software reuse ppt.
Software reuse ppt.
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learning
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project File
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying
 
Twitter sentiment analysis ppt
Twitter sentiment analysis pptTwitter sentiment analysis ppt
Twitter sentiment analysis ppt
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Sign language recognizer
Sign language recognizerSign language recognizer
Sign language recognizer
 

Similar a Detection of Fake reviews

Different Methodologies For Testing Web Application Testing
Different Methodologies For Testing Web Application TestingDifferent Methodologies For Testing Web Application Testing
Different Methodologies For Testing Web Application Testing
Rachel Davis
 
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docxONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
cherishwinsland
 
Software Requirements Engineering Methodologies
Software Requirements Engineering MethodologiesSoftware Requirements Engineering Methodologies
Software Requirements Engineering Methodologies
Kiran Munir
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
smumbahelp
 

Similar a Detection of Fake reviews (20)

MIT521 software testing (2012) v2
MIT521   software testing  (2012) v2MIT521   software testing  (2012) v2
MIT521 software testing (2012) v2
 
Software testing.pdf
Software testing.pdfSoftware testing.pdf
Software testing.pdf
 
Different Methodologies For Testing Web Application Testing
Different Methodologies For Testing Web Application TestingDifferent Methodologies For Testing Web Application Testing
Different Methodologies For Testing Web Application Testing
 
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docxONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
 
Qa analyst training
Qa analyst training Qa analyst training
Qa analyst training
 
Software Testing Interview Questions For Experienced
Software Testing Interview Questions For ExperiencedSoftware Testing Interview Questions For Experienced
Software Testing Interview Questions For Experienced
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance
 
fake product review monitoring
fake product review monitoringfake product review monitoring
fake product review monitoring
 
Software Testing: History, Trends, Perspectives - a Brief Overview
Software Testing: History, Trends, Perspectives - a Brief OverviewSoftware Testing: History, Trends, Perspectives - a Brief Overview
Software Testing: History, Trends, Perspectives - a Brief Overview
 
Mca se chapter_07_software_validation
Mca se chapter_07_software_validationMca se chapter_07_software_validation
Mca se chapter_07_software_validation
 
Software Requirements Engineering Methodologies
Software Requirements Engineering MethodologiesSoftware Requirements Engineering Methodologies
Software Requirements Engineering Methodologies
 
Software testing
Software testingSoftware testing
Software testing
 
Software testing
Software testingSoftware testing
Software testing
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
IRJET- Hybrid Recommendation System for Movies
IRJET-  	  Hybrid Recommendation System for MoviesIRJET-  	  Hybrid Recommendation System for Movies
IRJET- Hybrid Recommendation System for Movies
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
 
IRJET - Online Product Scoring based on Sentiment based Review Analysis
IRJET - Online Product Scoring based on Sentiment based Review AnalysisIRJET - Online Product Scoring based on Sentiment based Review Analysis
IRJET - Online Product Scoring based on Sentiment based Review Analysis
 
Stm unit1
Stm unit1Stm unit1
Stm unit1
 
Lecture 08 (SQE, Testing, PM, RM, ME).pptx
Lecture 08 (SQE, Testing, PM, RM, ME).pptxLecture 08 (SQE, Testing, PM, RM, ME).pptx
Lecture 08 (SQE, Testing, PM, RM, ME).pptx
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
 

Último

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 

Último (20)

Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 

Detection of Fake reviews

  • 1. Detection of fake online reviews using semi-supervised and supervised learning By G.Manoj Kumar (20BF1F0033) Under the guidance of P.LOKESH KUMAR REDDY Assistant Professor DEPARTMENT OF COMPUTER APPLICATION SRI VENKATESWARA COLLEGE OF ENGINEERING Karakambadi Road, TIRUPATI – 517507 2020– 2022 MCA IV Semester Project II Review Presentation
  • 2. Contents  ABSTRACT  INTRODUCTION  PROBLEM DEFINITION  EXISTING SYSTEM DISADVANTAGES OF EXISTING SYSTEM  PROPOSED SYSTEM ADVANTAGES OF PROPOSED SYSTEM
  • 3. Contents  SOFTWARE AND HARDWARE REQUIREMENTS  ALGORITHMS  MODULES  ARCHITECTURE  UML DIAGRAMS  TESTING STRATEGIES
  • 4. ABSTRACT Online reviews have great impact on today’s business and commerce. Decision making for purchase of online products mostly depends on reviews given by the users. Hence, opportunistic individuals or groups try to manipulate product reviews for their own interests. This Project introduces some semi-supervised and supervised text mining models to detect fake online reviews as well as compares the efficiency of both techniques on dataset containing hotel reviews
  • 5. INTRODUCTION  Technologies are swiftly evolving. Old innovations are being constantly substituted with modern and emerging technologies.  This emerging innovations allow individuals to carry out their work effectively. The online marketplace is such a technical advancement.  Through utilising online portals, can shop and make reservations. Before consuming those goods or facilities, almost every one of us seeks out feedback.  They also have a huge influence on advertisements and the marketing of goods and services. Fake web reviews are becoming extremely relevant with the spread of the online marketplace.  For the marketing of their own goods, people may create fake reviews that damage the real consumers.  Researchers have been exploring several ways to recognise these bogus web reviews. Some methods are focused on the quality of the article and some are based on the actions of the consumer who publishes feedback.
  • 6. PROBLEM DEFINITION This Project introduces some semi-supervised and supervised text mining models to detect fake online reviews as well as compares the efficiency of both techniques on dataset containing hotel reviews.
  • 7. EXISTING SYSTEM  Content based methods focus on what is the content of the review. That is the text of the review or what is told in it. Heydari et al. have attempted to detect spam review by analyzing the linguistic features of the review.  Ott used three techniques to perform classification. These three techniques are- genre identification, detection of psycholinguistic deception and text categorization.  Behavior feature based study focuses on the reviewer that includes characteristics of the person who is giving the review.  Lim et al. addressed the problem of review spammer detection, or finding users who are the source of spam reviews. People who post intentional fake reviews have significantly different behavior than the normal user.
  • 8. DISADVANTAGES OF EXISTING SYSTEM  In the existing work, the system uses only to semi-supervised learning.  Only Text Classification as sentiment text and it never finds fake
  • 9. PROPOSED SYSTEM  In the proposed system, each review goes through tokenization process first. Then, unnecessary words are removed and candidate feature words are generated.  Each candidate feature words are checked against the dictionary and if its entry is available in the dictionary then its frequency is counted and added to the column in the feature vector that corresponds the numeric map of the word.  Alongside with counting frequency, the length of the review is measured and added to the feature vector.  Finally, sentiment score which is available in the data set is added in the feature vector. We have assigned negative sentiment as zero valued and positive sentiment as some positive valued in the feature vector.
  • 10. ADVANTAGES OF PROPOSED SYSTEM  Detect Unseen Attacks  Low False Positive rates  Support Large Datasets  Able to handle imbalanced Dataset
  • 11. HARDWARE REQUIREMENTS  Processor- Intel (R) Core (TM) i3-4200U  CPU - 1.6GHz  RAM:4 GB  Hard Disk: 500 GB.
  • 12. SOFTWARE REQUIREMENTS  Operating System - Windows 10  Server - XAMPP  Front End - HTML, CSS, JS  Back end - Python  Data base - MYSQL
  • 13. The following the some algorithms used in this project: 1. Naïve Bayes Classifier ALGORITHMS
  • 14. In this Proposed System, There are two modules. They are: 1. Service Provider 2. Remote User MODULES
  • 15. MODULES DESCRIPTION In this Project, There are two modules : Service provider In this module, login , add movies, view uploaded movies, view positive, view negative, view neutral, view sentients reviews, view rating results, dislike like results, view remote users, view movie reviews, view trending movies, view movies recommended, view fake reviews /ratings, logout User In the module, the user will register and then login and do such operations like view all added movies, view all movies reviews, view trending movies, view your profile, view all movies recommended, logout MODULES
  • 18. USE CASE DIAGRAM FOR REMOTE USER UML DIAGRAMS Register & login View all Added Movies View all movies Reviews View Trending movies Remote User View Your Profile View all Movies Recommended Log out
  • 19. USE CASE DIAGRAM FOR SERVICE PROVIDER UML DIAGRAMS Login Add Movies Add Uploaded Movies View Positive / Negative / Neutral Sentiment reviews View rating Results Dislike / Like Results View Remote Users View Movie Reviews View Trending Movies Service Provider View Movie Recommended View Fake reviews / Rating Log out
  • 20. Sequence diagram UML DIAGRAMS Service provider Server Remote User Login Register & Login 1. Add movies 2. View uploaded movies 3. View postive / Negative/ netural sentiment reviews 4. View rating results 5. Dislike / Likes results 6. View remote users 7. View movie reviews 8. View tranding movies 9. View movies recommended 10. View fake reviews / rating 11. View all Added movies 12. View all movies reviews
  • 21. Collaboration diagram UML DIAGRAMS : Service provider : Server : Remote User View all Added Movies View all Movies Reviews View Trending movies View your profile View All Movies recommeded 1: 2: Add Movies View uploaded movies View positive / Negitive / Netural sentiment reviews View rating results Dislikes / Likes Results View Remote Users View Movies Reviews View Trending Movies View movies recommended View Fake Reviews / Rating
  • 22. ACTIVITY diagram For Remote User UML DIAGRAMS Register & Login Che ck Valid Invalid View all Added Movies View all Movies Reviews Log out View Trending movies View your profile View all Movies recommeded
  • 23. Activity diagram For Service Provider UML DIAGRAMS Login Che ck Valid Invalid Add Movies View Uploaded Movies View Positive / Negative / Neutral Sentiment Reviews View rating Results Dislike / Likes results View Remote Users View Movie Reviews Log out View Trending Movies View Movie Recommended View Fake Reviews / Rating
  • 25. The Common view of testing held by users is that it is preformed to improve that there are no errors in a program. This is extremely difficult since designer cannot prove to be one hundred percent accurate It requires the focus on basic critical factors:  Planning  Project and process control  Risk management  Organization and professionalism Inspections  Measurement tools SYSTEM TESTING
  • 26.  Level of Testing The term end-to-end testing is also used in many organizations and tends to refer to a combination of Systems Testing and Systems Integration Testing. Also, in some organizations the term Systems Testing is used interchangeably with end-to-end testing.  Test Plan Before going for testing, first decide upon the type of testing to be carried out. The following factors are taken into consideration: To ensure whether that information properly flows into and out of program. To find whether the local data structures maintaining their integrity during all steps in an algorithm execution or not. SYSTEM TESTING
  • 27. To ensure that the module operate properly at boundaries established to limit or restrict progressing. To find out whether error-handling paths are working correctly or not. To find out whether the values are correctly updated or not check for validation Objectives of Testing  Testing is done to ensure No bug occurrence in future usage of the Application. Quality Assurance standard is achieved. Discover symptoms caused by bugs and provide clear diagnosis so that bugs can be easily prevented. SYSTEM TESTING
  • 28. Test Case Design Techniques During testing the program to be tested is executed with a set of test cases and output of the program for the test cases is evaluated to determine if the program is performing as expected. To accomplish this objectives test case design techniques are used:  Unit Testing.  Integration Testing.  User Acceptance Testing.  Output Testing.  Validation Testing. SYSTEM TESTING