Classification and Blocking of Spam Users based on Review Using Expected Maximization Algorithm
Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 7
Abstract
An excellent source of collecting the reviews on specific product is various online shopping sites where people share their reviews on products and their shopping experience. People may come through the wrong opinions known as review spam. Therefore, for this it is essential to detect it by some means. In this paper, presents methods for detection of spam users using feature extraction and discretization, in combination with EM algorithm. Our framework can detect multiple spammers by knowing only small set of spammer sets. Proposed method effectively selects relevant features and builds features set to identify the spammers. In this paper, we have blocked the users with fake id or who are predicted as spammer. Keywords: Review spam, un-truthful reviews, opinion spam, rating spam.
Authors and Affiliations
Hema Dewangan, Om Prakash Dewangan, Toran Verma
Determination of Heavy Metal Levels in Eutropius niloticus and Citharinus citharus from Polaku River Near The Liquefied Natural Gas Plant in Bayelsa State
Heavy metal effluents from industries have continued to be a major source of concern due to the effect on the environment and the living organisms around the vicinity. Heavy metal concentrations were determined in fish p...
Hydrochemical characterization of Katana thermals waters, Lake Kivu watershed
Thermal water springs are considered to be important natural sources. Studies was done in the region concerning the geology, geophysics, hydrochemistry but no was concentrated on the hydro-chemical characteristics of the...
Existence of Positive Solution for Nonlinear Third-Order Boundary Value Problem
The nonlinear third-order boundary value problem is studied in this work, where .The existence result of at least one positive solution to above third-order boundary value problem is obtained by using fixed point i...
Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking
Abstract:The analysis of the effectiveness of Leakage Power Analysis (LPA) attacks to cryptographic VLSI circuits on which circuit level countermeasures against Differential Power Analysis (DPA) are adopted. Security met...
The Ediz Eccentric Connectivity Index of Polycyclic Aromatic Hydrocarbons PAHk
Abstract: Let G= (V, E) be molecular graph in which the set of vertices and the set of edges of the graph correspond to the atoms of the molecule and chemical bonds, respectively. The Ediz eccentric connectivity index Eξ...