A Real Time fraud Rank Identification using Semantic Relation Analysis on Mobile Web Application
Keywords:
Mobile Apps, False Behaviour, Positioning Evidences, Sematic RelationAbstract
Objective: The essential objective of this work is finding a false positioning conduct of mobile applications where mobile application designers may create false confirmations for giving a top positioning for them. The essential objective of this work is to find out the false confirmations present in the positioned mobile apps. This work endeavors to improve the precision of location of false positioning conduct of mobile applications by performing Idea vector based review Proof analysis.
Method: Mobile application positioning false conduct is the biggest issue in the mobile application advancement environment due to the debasement of mobile app’s imperative level. In the existing work, Driving Session Approach based Proof total (LSMEA) is presented to leverage the false positioning activities. This LSM investigation the three types of confirmations such as positioning based, rating based furthermore, review based furthermore, aggregates their Yield finally for recognizing the false positioning conduct of mobile apps. Among the above said evidences, review based Proof is based on client conclusion about the corresponding mobile app. LSM investigation the clients review remarks by utilizing dormant semantic approach which will find the imperative semantic terms from the client review comments. However this method failed to recognize the ideas of semantic terms precisely which might lead to off-base assumption of false positioning behaviour. This problem is overcome in this work by introducing the Idea Vector based Review Proof Investigation (CVREA) which is done by utilizing WordNet tool. Word Net instrument will retrieve the most imperative ideas present in each sentence of client review remarks based on which extortion signature would be computed. Finally, result of these three confirmations would be consolidated together to distinguish the false positioning conduct of mobile apps.
Application/ Improvements: This proposed research approach would be more helpful in the mobile application markets where the number of applications created for the specific reason has been expanded considerably. In this situation, it is required to give truthful furthermore, most popular mobile applications to the clients to increment the notoriety level.
References
Todd Millstein, “RERAN: Timing- and touch-sensitive record and replay for Android”, International Conference on Software Engineering (ICSE) Year: 2013 Pages: 72 – 81.
Jan Ernsting, “Generating App Product Lines in a Model-Driven Cross-Platform Development Approach”, International Conference on System Sciences (HICSS) Year: 2016 Pages: 5803 – 5812.
B. Giles, “Design and Development of Domain Specific Active Libraries with Proxy Applications”, International Conference on Cluster Computing Year: 2015 Pages: 738 – 745.
Josef Spillner, “RAIC Integration for Network Storages on Mobile Devices”, International Conference on Next Generation Mobile Apps, Services and Technologies Year: 2013 Pages: 142 – 147.
Johan Lukkien, “On the False-Positive and False-Negative Behavior of a Soft-State Signaling Protocol”, International Conference on Advanced Information Networking and Applications Year: 2009 Pages: 971 – 979.
S. R. Rotman, “Modeling human false target detection decision behavior in infrared images, using a statistical texture image metric”, 21st IEEE convention of the Year: 2000 Pages: 393 – 397.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
