INVESTGATION OF RANKING RATING AND REVIEW USING STATISTICAL HYPOTHESES TESTS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 4
Abstract
Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list Indeed, it becomes more and more frequent for App developers to use shady means, such a s inflating their Apps’ sales or posting phony App ratings, to commit ranking fraud. While the importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in this area. To this end in this paper, we provide a holistic view of ranking fraud and propose a ranking fraud detection system for mobile Apps. Specifically, we first propose to accurately locate the ranking fraud by mining the active periods, namely leading sessions, of mobile Apps. Such leading sessions can be leveraged for detecting the local anomaly instead of global anomaly of App rankings. Furthermore, we investigate three types of evidences, i.e., ranking based evidences, rating based evidences and review based evidences, by modelling Apps’ ranking, rating and review behaviours through statistical hypotheses tests. In addition, we propose an optimization based aggregation method to integrate all the evidences for fraud detection. Finally, we evaluate the proposed system with real-world App data collected from the iOS App Store for a long time period. In the experiments, w e validate the effectiveness of the proposed system, an d show the scalability of the detection algorithm as well as some regularity of ranking fraud activities.
Authors and Affiliations
Prof. Mariappan. R , Ms. Deivanai. A , Ms. B. Hema , Ms. Thamizharasi. V
Roman Subdivision Domination in Graphs
The subdivision graph S G( ) of a graph G is the graph whose vertex set is the union of the set of vertices and the set of edges of G in which each edge uv is subdivided at once as uw and wv . A Roman dominating...
Voltage Swell mitigation in Wind Farm System
As the wind power penetration into the grid is increasing quickly, the influence of wind turbine on the power quality is becoming an important issue. Wind power penetration is the impact on power system stability....
BLENDING IOT AND BIG DATA ANALYTICS
Internet is continuously evolving and changing. Internet of Things (IoT) can be considered as the future of Internet applications which involves machine to machine learning (M2M). The actionable intelligence can be deri...
INTELLIGENT KEYBOARD: A METHOD FOR TEXT INPUT USING TOUCH SCREEN FOR HINDI DEVANAGARI SCRIPT
Now a days, most of the smart phones having touch screen instead of traditional keypad. The virtual keyboard is replaced with traditional keypad. There are various such keyboards that are present in the market including...
AN IMPROVED HYBRID BINARIZATION TECHNIQUE FOR DEGRADED DOCUMENT DIGITIZATION
In document analysis, binary image representation is essential format. In previous studies, different techniques are implemented and tried and true for different types of degradation in document image. But non...