SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 866
FAKE PRODUCT REVIEW MONITORING
Madhura N Hegde 1, Sanjeetha K Shetty 2, Sheikh Mohammed Anas 3, Varun K 4
1Assistant Professor, Dept. of Information Science Engineering, Sahyadri College of Engineering and Management,
Karnataka, India
2,3,4Student, Dept. of Information Science Engineering, Sahyadri College of Engineering and Management,
Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Online product review on shopping experience
in social media has promoted users to provide customer
feedback. Nowadays many e-commerce sites allow
customers to write their opinion on the product which they
buy in the form of reviews or ratings. The reviews given by
the customer can build or shatter the good name of the
product. Due to this reason company personnel gets an idea
of standing’s of their product in the market. In order to
demote or promote the product, spiteful reviews or fake
reviews, which are deceptive, are posted in the ecommerce
site. This result will lead to potential financial losses or
larger amount of growth in business. We propose a project
which focuses on detecting fake and spam reviews by using
sentiment analysis and removes out the reviews which
contains vulgar and curse words and make the e-commerce
site fake review free online shopping center.
Key Words: Sentiment analysis, Content similarity,
Review deviation.
1. INTRODUCTION
1.1 Data Mining
Data mining is a process of thoroughly scrutinizing huge
store of data to discover patterns and trends that go beyond
simple analysis. Data mining uses worldly-wise
mathematical algorithms to fragment the data and evaluate
possibility of future event. Opinion mining is a kind of
Natural Language Processing for tracking the attitude of
public about a particular product. A fundamental task in
opinion mining is classifying the polarity of a given text
whether the expressed opinion in a document or a sentence
is positive, negative, or neutral. The birth of Social Media has
brought about enormousinfluenceinall spheresoflife.From
casual comments in Social Networking sites to more
important studies regarding market trends and analyzing
strategies, all which have been possible largely due to rising
impact of Social Media data.Apredominantpieceofstatistics
for most of us during the decision-making process is “what
other people think”. One such form of Social Media data are
Product reviews written by customers reporting their level
of contentment with a specific product. These reviews are
helpful for both individualsandbusinessfirms.Thesereview
systems motivate some people to enter their fake review to
promote some products or downgrade some others. The
main reason for this action is to make more profit by writing
unfaithful reviews and false ratings .So in order to make
products and services trustable, these fake opinionsmust be
detected and removed. Detection techniques are used to
discover fake reviews. The System is developed using three
stages- Preprocessor, Fake review detector and Classifier.
Web scraper is used to extract required data from the
website. Preprocessor is used to filter out abusive reviews
and transform the reviews to a proper format. Fake review
detector detects the fake reviews using sentiment
computing, review deviation and content similarity
techniques and thus reviews are marked fake and genuine.
Finally, the classifier takes labeled and unlabeledsamplesas
input and labels the unlabeled samples.
2. ARCHITECTURE OF THE PROPOSED MODEL
Architecture design gives the real world view of the system.
Fig-1 represents the architecture design of Fake Product
Review Monitoring. The reviews which are part of online
data on websites are scraped by the web crawler. This data
is taken for preprocessing where the data is transformed
into required format and the abusive reviews are removed.
Fake reviews are next identified by Fake Review Detector.
This is taken as training data for the classifier which
classifies fake and genuine reviews.
Fig -1.: Architecture diagram
Data Flow Diagram represents the flow of information or
data in the system. The square boxes represent the entities,
ovals represent the processandnamedarrowsrepresentthe
direction of flow of information.Figureshowsthediagramof
Fake Review Detector. Fig-2 shows the data flow diagram of
Fake Review Detector. It has three entities Fake Review
Detector, FRD WebCrawler and Classifier and three
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 867
processes namely WebScraping, Preprocessing and
FakeReviewDetection.
Fig -2.: Data flow diagram
3. METHODOLOGY
3.1 Sentiment Analysis
Sentiment analysis is used to understand writers emotion.
We define three list of words; positive vocabulary, negative
vocabulary and neutral vocabulary, which consists of
positive, negative and neutral words. Every reviewispassed
to nltk classifier which calculates the sentiment score of the
reviews. The rating is normalized using theequation NRi=Ri
− 3 − (Ri − 3)/2 . The difference between normalized rating
and sentimen score is found. If the calculated difference is
greater than 0.5 the review is considered to be fake.
Psuedo Code for Sentiment Analysis
1: classifierNaiveBayesClassifier.train(train_ set)
2: i <- 0
3: For r1 in review:
4: neg <- 0
5: pos <- 0
6: words <- r1.split(’ ’)
7: For word in words:
8: classResult <- classifier.classify( word feats(word))
9: If classResult == ‘neg’ :
10: neg = neg <- 1
11: End If
12: if classResult == ‘pos’ :
13: pos = pos <- 1
14: End If
15: End For
16: positive <- float(pos) / len(words)
17: negative <- float(neg) / len(words)
18: score <- positive - negative
19: nrating[i] <- rating[i] - 3 - (float(rating[i])-3) / 2
20: If | nrating[i]-score| >0.5
21: label[i] ¡- “fake”
22: End If
23: i <- i + 1
24: End For
3.2 Content Similarity
Content similarity is performed on the reviews given by
same user. We use cosine similarity to obtain similarity of
two reviews. If the cosine value is greater than 0.5 the
review is considered to be fake.
Psuedo Code for Content Similarity
1: j <- 0
2: For r1 in review:
3: i <- 0
4: For r2 in review:
5: text1 <- r1
6: text2 <- r2
7: If ( j <i and (author[i]==author[j])) :
8: If ( j <i and (author[i]==author[j])) :
9: vector1 <- text to vector(text1)
10: vector2 <- text to vector(text2)
11: cosine <- get cosine(vector1, vector2)
12: If cosine >= 0.5 :
13: label[i] <- ”fake”
14: label[j] <- ”fake“
15: End If
16: i <- i+1
17: End For
18: j <- j+1
19: End For
3.3 Review Deviation
Review deviation is based on the theory that if all customers
give less rating and one customer gives high rating or vise
versa, then that rating/review is considered to be fake. First
we calculate average of all the ratings and then we check to
what extent it deviates from the origin. If the deviation is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 868
greater than or equal to 2, then the review is considered to
be fake.
Psuedo Code for Content Similarity
1: sum <- 0
2: n <- 0
3: For r1 in rating:
4: sum <- sum + r1
5: n <- n + 1
6: End For
7: avg <- sum/n
8: For r1 in rating: 9: d <- | r1-avg | 10: If ( d >= 2) :
11: label[i] <- “fake”
12: End If
13: i <- i + 1
14: End For
5. RESULTS
The system developed can detect 111 fake reviews out of
300 reviews. The classifier builtdetected18fake reviewsout
of 52 reviews. The Fig -3 shows graph for the time taken by
the system to process different number of reviews.
Fig -3.: Bar graph: Number of reviews taken v/s Number
of fake reviews detected
Fig -4.: Bar graph: Performance of the system
4. CONCLUSIONS
This work has investigated the user's request and has given
the particular prediction and safety measure for that input.
The K-Means clustering technique was used to find the
clusters and fatality for the flight crash investigation. This
method will also consider other factors like efficiency,
weather impact and schedules of other aircraft. Results
showed that the proposed algorithm obtained prediction
based on user's input with efficiency. The proposed
algorithm also provided improved search results for the
query given by the user. Possible future work is to improve
the efficiency and also increase the count of clusters used.
ACKNOWLEDGEMENT
It is with great satisfaction and euphoria that we are
submitting the paper on “Fake Product Review Monitoring".
We are profoundly indebted to our guide, Mrs. Madhura N.
Hegde, Assistant Professor, Department of Information
Science & Engineering, forinnumerableactsoftimelyadvice,
encouragement and we sincerely express our gratitude. We
also thank her for her constant encouragement and support
extended throughout.
Finally, yet importantly, we express our heartfelt thanks to
our family & friends for their wishes and encouragement
throughout our work.
REFERENCES
[1] Shashank Kumar Chauhan, Anupam Goel, Prafull Goel,
Avishkar Chauhan and Mahendra K Gurve,“Researchon
product review analysis and spam review detection”,
4th International Conference on Signal Processing and
Integrated Networks(SPIN) 2017,ISBN (e):978-1-5090-
2797-2, September-2017, pp. 1104-1109.
[2] Sonu Liza Christopher and H A Rahulnath, “Review
authenticity verification using supervised learning and
reviewer personality traits”, International Conference
on Emerging Technological Trends (ICETT) 2016, ISBN
(e): 978-1-5090-3752-0, pp. 1-7.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 869
[3] Ruxi Yin, Hanshi Wang and Lizhen Liu, “Research of
integrated algorithm establishment of spam detection
system”, 4th International Conference on Computer
Science and Network Technology (ICCSNT) 2015, ISBN
(e): 978-1-4673-8173-4, pp. 390-393 .
[4] Xinkai Yang, “One methodology for spam review
detection based on review coherence metrics”,
International Conference on Intelligent Computing and
Internet of Things 2015, ISBN (e): 978-1-4799-7534-1,
pp. 99-102.
[5] Hamzah Al Najada; Xingquan Zhu, “iSRD: Spam review
detection with imbalanced data distributions”,
Proceedings of the 2014 IEEE 15th International
Conference on Information Reuse and Integration(IEEE
IRI 2014), ISBN (e): 978-1-4799-5880-1.
[6] SP.Rajamohana, Dr.K.Umamaheshwari, M.Dharani,
R.Vedackshya, “A survey on online review SPAM
detection techniques”, International Conference on
Innovations in Green Energy and Healthcare
Technologies(IGEHT)2017,ISBN(e):978-1-5090-5778-
8. ”, International Conference on Innovations in Green
Energy and Healthcare Technologies (IGEHT) 2017,
ISBN(e): 978-1-5090-5778-8.
BIOGRAPHIES
Madhura N. Hegde
Assistant Professor,
Areas of Interest: Data mining, Image
processing.
Sahyadri College of Engineering and
Management
Sanjeetha K Shetty
Student
Sahyadri College of Engineering and
Management
Sheikh Mohammed Anas
Student
Sahyadri College of Engineering and
Management
Varun K
Student
Sahyadri College of Engineering and
Management

Weitere ähnliche Inhalte

Was ist angesagt?

Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm
Bryan Guibijar
 
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
ijtsrd
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
eSAT Publishing House
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysis
sneha penmetsa
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
IJMER
 

Was ist angesagt? (20)

Methods for Sentiment Analysis: A Literature Study
Methods for Sentiment Analysis: A Literature StudyMethods for Sentiment Analysis: A Literature Study
Methods for Sentiment Analysis: A Literature Study
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
IRJET- Opinion Mining and Sentiment Analysis for Online Review
IRJET-  	  Opinion Mining and Sentiment Analysis for Online ReviewIRJET-  	  Opinion Mining and Sentiment Analysis for Online Review
IRJET- Opinion Mining and Sentiment Analysis for Online Review
 
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRSSentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
 
IRJET - Twitter Sentimental Analysis
IRJET -  	  Twitter Sentimental AnalysisIRJET -  	  Twitter Sentimental Analysis
IRJET - Twitter Sentimental Analysis
 
Book recommendation system using opinion mining technique
Book recommendation system using opinion mining techniqueBook recommendation system using opinion mining technique
Book recommendation system using opinion mining technique
 
Tweet sentiment analysis
Tweet sentiment analysisTweet sentiment analysis
Tweet sentiment analysis
 
Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm
 
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector ...
 
Ijebea14 271
Ijebea14 271Ijebea14 271
Ijebea14 271
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET -  	  Sentiment Analysis of Posts and Comments of OSNIRJET -  	  Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
TOWARDS MAKING SENSE OF ONLINE REVIEWS BASED ON STATEMENT EXTRACTION
TOWARDS MAKING SENSE OF ONLINE REVIEWS BASED ON STATEMENT EXTRACTIONTOWARDS MAKING SENSE OF ONLINE REVIEWS BASED ON STATEMENT EXTRACTION
TOWARDS MAKING SENSE OF ONLINE REVIEWS BASED ON STATEMENT EXTRACTION
 
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
 
IRJET- Comparative Study of Classification Algorithms for Sentiment Analy...
IRJET-  	  Comparative Study of Classification Algorithms for Sentiment Analy...IRJET-  	  Comparative Study of Classification Algorithms for Sentiment Analy...
IRJET- Comparative Study of Classification Algorithms for Sentiment Analy...
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysis
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
 

Ähnlich wie IRJET-Fake Product Review Monitoring

Ähnlich wie IRJET-Fake Product Review Monitoring (20)

Review on Sentiment Analysis on Customer Reviews
Review on Sentiment Analysis on Customer ReviewsReview on Sentiment Analysis on Customer Reviews
Review on Sentiment Analysis on Customer Reviews
 
IRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET- Opinion Summarization using Soft Computing and Information RetrievalIRJET- Opinion Summarization using Soft Computing and Information Retrieval
IRJET- Opinion Summarization using Soft Computing and Information Retrieval
 
IRJET - Online Product Scoring based on Sentiment based Review Analysis
IRJET - Online Product Scoring based on Sentiment based Review AnalysisIRJET - Online Product Scoring based on Sentiment based Review Analysis
IRJET - Online Product Scoring based on Sentiment based Review Analysis
 
Recommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data StreamsRecommender System- Analyzing products by mining Data Streams
Recommender System- Analyzing products by mining Data Streams
 
IRJET- Slant Analysis of Customer Reviews in View of Concealed Markov Display
IRJET- Slant Analysis of Customer Reviews in View of Concealed Markov DisplayIRJET- Slant Analysis of Customer Reviews in View of Concealed Markov Display
IRJET- Slant Analysis of Customer Reviews in View of Concealed Markov Display
 
IRJET-Survey on Identification of Top-K Competitors using Data Mining
IRJET-Survey on Identification of Top-K Competitors using Data MiningIRJET-Survey on Identification of Top-K Competitors using Data Mining
IRJET-Survey on Identification of Top-K Competitors using Data Mining
 
SURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSISSURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSIS
 
IRJET- Customer Feedback Analysis using Machine Learning
IRJET-  	  Customer Feedback Analysis using Machine LearningIRJET-  	  Customer Feedback Analysis using Machine Learning
IRJET- Customer Feedback Analysis using Machine Learning
 
Empirical Model of Supervised Learning Approach for Opinion Mining
Empirical Model of Supervised Learning Approach for Opinion MiningEmpirical Model of Supervised Learning Approach for Opinion Mining
Empirical Model of Supervised Learning Approach for Opinion Mining
 
IRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-ShoppingIRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
 
IRJET- Physical Design of Approximate Multiplier for Area and Power Efficiency
IRJET- Physical Design of Approximate Multiplier for Area and Power EfficiencyIRJET- Physical Design of Approximate Multiplier for Area and Power Efficiency
IRJET- Physical Design of Approximate Multiplier for Area and Power Efficiency
 
Sentiment Analysis on Product Reviews Using Supervised Learning Techniques
Sentiment Analysis on Product Reviews Using Supervised Learning TechniquesSentiment Analysis on Product Reviews Using Supervised Learning Techniques
Sentiment Analysis on Product Reviews Using Supervised Learning Techniques
 
IRJET- Analysis of Brand Value Prediction based on Social Media Data
IRJET-  	  Analysis of Brand Value Prediction based on Social Media DataIRJET-  	  Analysis of Brand Value Prediction based on Social Media Data
IRJET- Analysis of Brand Value Prediction based on Social Media Data
 
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedEfficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
 
IRJET- Sentimental Analysis of Product Reviews for E-Commerce Websites
IRJET- Sentimental Analysis of Product Reviews for E-Commerce WebsitesIRJET- Sentimental Analysis of Product Reviews for E-Commerce Websites
IRJET- Sentimental Analysis of Product Reviews for E-Commerce Websites
 
“Electronic Shopping Website with Recommendation System”
“Electronic Shopping Website with Recommendation System”“Electronic Shopping Website with Recommendation System”
“Electronic Shopping Website with Recommendation System”
 
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Online Service Rating Prediction by Removing Paid Users and Jaccard CoefficientOnline Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine Learning
 
Smart Feedback Analysis System
Smart Feedback Analysis SystemSmart Feedback Analysis System
Smart Feedback Analysis System
 
Development and Evaluation of an Employee Performance Appraisal Insight Repor...
Development and Evaluation of an Employee Performance Appraisal Insight Repor...Development and Evaluation of an Employee Performance Appraisal Insight Repor...
Development and Evaluation of an Employee Performance Appraisal Insight Repor...
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Kürzlich hochgeladen (20)

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

IRJET-Fake Product Review Monitoring

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 866 FAKE PRODUCT REVIEW MONITORING Madhura N Hegde 1, Sanjeetha K Shetty 2, Sheikh Mohammed Anas 3, Varun K 4 1Assistant Professor, Dept. of Information Science Engineering, Sahyadri College of Engineering and Management, Karnataka, India 2,3,4Student, Dept. of Information Science Engineering, Sahyadri College of Engineering and Management, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Online product review on shopping experience in social media has promoted users to provide customer feedback. Nowadays many e-commerce sites allow customers to write their opinion on the product which they buy in the form of reviews or ratings. The reviews given by the customer can build or shatter the good name of the product. Due to this reason company personnel gets an idea of standing’s of their product in the market. In order to demote or promote the product, spiteful reviews or fake reviews, which are deceptive, are posted in the ecommerce site. This result will lead to potential financial losses or larger amount of growth in business. We propose a project which focuses on detecting fake and spam reviews by using sentiment analysis and removes out the reviews which contains vulgar and curse words and make the e-commerce site fake review free online shopping center. Key Words: Sentiment analysis, Content similarity, Review deviation. 1. INTRODUCTION 1.1 Data Mining Data mining is a process of thoroughly scrutinizing huge store of data to discover patterns and trends that go beyond simple analysis. Data mining uses worldly-wise mathematical algorithms to fragment the data and evaluate possibility of future event. Opinion mining is a kind of Natural Language Processing for tracking the attitude of public about a particular product. A fundamental task in opinion mining is classifying the polarity of a given text whether the expressed opinion in a document or a sentence is positive, negative, or neutral. The birth of Social Media has brought about enormousinfluenceinall spheresoflife.From casual comments in Social Networking sites to more important studies regarding market trends and analyzing strategies, all which have been possible largely due to rising impact of Social Media data.Apredominantpieceofstatistics for most of us during the decision-making process is “what other people think”. One such form of Social Media data are Product reviews written by customers reporting their level of contentment with a specific product. These reviews are helpful for both individualsandbusinessfirms.Thesereview systems motivate some people to enter their fake review to promote some products or downgrade some others. The main reason for this action is to make more profit by writing unfaithful reviews and false ratings .So in order to make products and services trustable, these fake opinionsmust be detected and removed. Detection techniques are used to discover fake reviews. The System is developed using three stages- Preprocessor, Fake review detector and Classifier. Web scraper is used to extract required data from the website. Preprocessor is used to filter out abusive reviews and transform the reviews to a proper format. Fake review detector detects the fake reviews using sentiment computing, review deviation and content similarity techniques and thus reviews are marked fake and genuine. Finally, the classifier takes labeled and unlabeledsamplesas input and labels the unlabeled samples. 2. ARCHITECTURE OF THE PROPOSED MODEL Architecture design gives the real world view of the system. Fig-1 represents the architecture design of Fake Product Review Monitoring. The reviews which are part of online data on websites are scraped by the web crawler. This data is taken for preprocessing where the data is transformed into required format and the abusive reviews are removed. Fake reviews are next identified by Fake Review Detector. This is taken as training data for the classifier which classifies fake and genuine reviews. Fig -1.: Architecture diagram Data Flow Diagram represents the flow of information or data in the system. The square boxes represent the entities, ovals represent the processandnamedarrowsrepresentthe direction of flow of information.Figureshowsthediagramof Fake Review Detector. Fig-2 shows the data flow diagram of Fake Review Detector. It has three entities Fake Review Detector, FRD WebCrawler and Classifier and three
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 867 processes namely WebScraping, Preprocessing and FakeReviewDetection. Fig -2.: Data flow diagram 3. METHODOLOGY 3.1 Sentiment Analysis Sentiment analysis is used to understand writers emotion. We define three list of words; positive vocabulary, negative vocabulary and neutral vocabulary, which consists of positive, negative and neutral words. Every reviewispassed to nltk classifier which calculates the sentiment score of the reviews. The rating is normalized using theequation NRi=Ri − 3 − (Ri − 3)/2 . The difference between normalized rating and sentimen score is found. If the calculated difference is greater than 0.5 the review is considered to be fake. Psuedo Code for Sentiment Analysis 1: classifierNaiveBayesClassifier.train(train_ set) 2: i <- 0 3: For r1 in review: 4: neg <- 0 5: pos <- 0 6: words <- r1.split(’ ’) 7: For word in words: 8: classResult <- classifier.classify( word feats(word)) 9: If classResult == ‘neg’ : 10: neg = neg <- 1 11: End If 12: if classResult == ‘pos’ : 13: pos = pos <- 1 14: End If 15: End For 16: positive <- float(pos) / len(words) 17: negative <- float(neg) / len(words) 18: score <- positive - negative 19: nrating[i] <- rating[i] - 3 - (float(rating[i])-3) / 2 20: If | nrating[i]-score| >0.5 21: label[i] ¡- “fake” 22: End If 23: i <- i + 1 24: End For 3.2 Content Similarity Content similarity is performed on the reviews given by same user. We use cosine similarity to obtain similarity of two reviews. If the cosine value is greater than 0.5 the review is considered to be fake. Psuedo Code for Content Similarity 1: j <- 0 2: For r1 in review: 3: i <- 0 4: For r2 in review: 5: text1 <- r1 6: text2 <- r2 7: If ( j <i and (author[i]==author[j])) : 8: If ( j <i and (author[i]==author[j])) : 9: vector1 <- text to vector(text1) 10: vector2 <- text to vector(text2) 11: cosine <- get cosine(vector1, vector2) 12: If cosine >= 0.5 : 13: label[i] <- ”fake” 14: label[j] <- ”fake“ 15: End If 16: i <- i+1 17: End For 18: j <- j+1 19: End For 3.3 Review Deviation Review deviation is based on the theory that if all customers give less rating and one customer gives high rating or vise versa, then that rating/review is considered to be fake. First we calculate average of all the ratings and then we check to what extent it deviates from the origin. If the deviation is
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 868 greater than or equal to 2, then the review is considered to be fake. Psuedo Code for Content Similarity 1: sum <- 0 2: n <- 0 3: For r1 in rating: 4: sum <- sum + r1 5: n <- n + 1 6: End For 7: avg <- sum/n 8: For r1 in rating: 9: d <- | r1-avg | 10: If ( d >= 2) : 11: label[i] <- “fake” 12: End If 13: i <- i + 1 14: End For 5. RESULTS The system developed can detect 111 fake reviews out of 300 reviews. The classifier builtdetected18fake reviewsout of 52 reviews. The Fig -3 shows graph for the time taken by the system to process different number of reviews. Fig -3.: Bar graph: Number of reviews taken v/s Number of fake reviews detected Fig -4.: Bar graph: Performance of the system 4. CONCLUSIONS This work has investigated the user's request and has given the particular prediction and safety measure for that input. The K-Means clustering technique was used to find the clusters and fatality for the flight crash investigation. This method will also consider other factors like efficiency, weather impact and schedules of other aircraft. Results showed that the proposed algorithm obtained prediction based on user's input with efficiency. The proposed algorithm also provided improved search results for the query given by the user. Possible future work is to improve the efficiency and also increase the count of clusters used. ACKNOWLEDGEMENT It is with great satisfaction and euphoria that we are submitting the paper on “Fake Product Review Monitoring". We are profoundly indebted to our guide, Mrs. Madhura N. Hegde, Assistant Professor, Department of Information Science & Engineering, forinnumerableactsoftimelyadvice, encouragement and we sincerely express our gratitude. We also thank her for her constant encouragement and support extended throughout. Finally, yet importantly, we express our heartfelt thanks to our family & friends for their wishes and encouragement throughout our work. REFERENCES [1] Shashank Kumar Chauhan, Anupam Goel, Prafull Goel, Avishkar Chauhan and Mahendra K Gurve,“Researchon product review analysis and spam review detection”, 4th International Conference on Signal Processing and Integrated Networks(SPIN) 2017,ISBN (e):978-1-5090- 2797-2, September-2017, pp. 1104-1109. [2] Sonu Liza Christopher and H A Rahulnath, “Review authenticity verification using supervised learning and reviewer personality traits”, International Conference on Emerging Technological Trends (ICETT) 2016, ISBN (e): 978-1-5090-3752-0, pp. 1-7.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 869 [3] Ruxi Yin, Hanshi Wang and Lizhen Liu, “Research of integrated algorithm establishment of spam detection system”, 4th International Conference on Computer Science and Network Technology (ICCSNT) 2015, ISBN (e): 978-1-4673-8173-4, pp. 390-393 . [4] Xinkai Yang, “One methodology for spam review detection based on review coherence metrics”, International Conference on Intelligent Computing and Internet of Things 2015, ISBN (e): 978-1-4799-7534-1, pp. 99-102. [5] Hamzah Al Najada; Xingquan Zhu, “iSRD: Spam review detection with imbalanced data distributions”, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration(IEEE IRI 2014), ISBN (e): 978-1-4799-5880-1. [6] SP.Rajamohana, Dr.K.Umamaheshwari, M.Dharani, R.Vedackshya, “A survey on online review SPAM detection techniques”, International Conference on Innovations in Green Energy and Healthcare Technologies(IGEHT)2017,ISBN(e):978-1-5090-5778- 8. ”, International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT) 2017, ISBN(e): 978-1-5090-5778-8. BIOGRAPHIES Madhura N. Hegde Assistant Professor, Areas of Interest: Data mining, Image processing. Sahyadri College of Engineering and Management Sanjeetha K Shetty Student Sahyadri College of Engineering and Management Sheikh Mohammed Anas Student Sahyadri College of Engineering and Management Varun K Student Sahyadri College of Engineering and Management