Professional Documents
Culture Documents
20bf1f0033 - 2nd
20bf1f0033 - 2nd
G.Manoj Kumar
(20BF1F0033)
Under the guidance of
P.LOKESH KUMAR REDDY
Assistant Professor
DEPARTMENT OF COMPUTER APPLICATION
SRI VENKATESWARA COLLEGE OF ENGINEERING
Karakambadi Road, TIRUPATI – 517507
2020– 2022
Contents
ABSTRACT
INTRODUCTION
PROBLEM DEFINITION
EXISTING SYSTEM
PROPOSED SYSTEM
ALGORITHMS
MODULES
ARCHITECTURE
UML DIAGRAMS
TESTING STRATEGIES
ABSTRACT
Technologies are swiftly evolving. Old innovations are being constantly substituted
with modern and emerging technologies.
This emerging innovations allow individuals to carry out their work effectively. The
online marketplace is such a technical advancement.
Through utilising online portals, can shop and make reservations. Before consuming
those goods or facilities, almost every one of us seeks out feedback.
They also have a huge influence on advertisements and the marketing of goods and
services. Fake web reviews are becoming extremely relevant with the spread of the
online marketplace.
For the marketing of their own goods, people may create fake reviews that damage the
real consumers.
Researchers have been exploring several ways to recognise these bogus web reviews.
Some methods are focused on the quality of the article and some are based on the
actions of the consumer who publishes feedback.
PROBLEM DEFINITION
This Project introduces some semi-supervised and supervised text mining models to
detect fake online reviews as well as compares the efficiency of both techniques on
dataset containing hotel reviews.
EXISTING SYSTEM
Content based methods focus on what is the content of the review. That is the
text of the review or what is told in it. Heydari et al. have attempted to detect
spam review by analyzing the linguistic features of the review.
Ott used three techniques to perform classification. These three techniques are-
genre identification, detection of psycholinguistic deception and text
categorization.
Lim et al. addressed the problem of review spammer detection, or finding users
who are the source of spam reviews. People who post intentional fake reviews
have significantly different behavior than the normal user.
DISADVANTAGES OF EXISTING SYSTEM
In the proposed system, each review goes through tokenization process first. Then,
unnecessary words are removed and candidate feature words are generated.
Each candidate feature words are checked against the dictionary and if its entry is
available in the dictionary then its frequency is counted and added to the column
in the feature vector that corresponds the numeric map of the word.
Alongside with counting frequency, the length of the review is measured and
added to the feature vector.
Finally, sentiment score which is available in the data set is added in the feature
vector. We have assigned negative sentiment as zero valued and positive sentiment
as some positive valued in the feature vector.
ADVANTAGES OF PROPOSED SYSTEM
CPU - 1.6GHz
RAM:4 GB
1. Service Provider
2. Remote User
MODULES
MODULES DESCRIPTION
Service provider
In this module, login , add movies, view uploaded movies, view positive, view
negative, view neutral, view sentients reviews, view rating results, dislike like results,
view remote users, view movie reviews, view trending movies, view movies
recommended, view fake reviews /ratings, logout
User
In the module, the user will register and then login and do such operations like view all
added movies, view all movies reviews, view trending movies, view your profile, view
all movies recommended, logout
SYSTEM ARCHITECTURE
UML DIAGRAMS
Class Diagram
Register
name
password
email
address
phone no.
image
Remote user
Service Provider
name
User name
password
Password
email
phone no.
Log in()
address
Add Movies()
image
View Uploaded movies()
View Postive / Negitave / netural Sentiment Reviews()
Register & login()
View Rating Results()
View all Added Movies()
Dislikes / Likes Results()
View all Movies Reviews()
View Remote Users()
View Trending movies()
View Movie Reviews()
View your profile()
View Trending Movies()
View all Movies Recommeded()
View Movie Recommeded()
Log out()
View Fake Reviews / Rating()
Log out()
Login
User name
password
UML DIAGRAMS
Log out
UML DIAGRAMS
USE CASE DIAGRAM FOR SERVICE PROVIDER
Login
Add Movies
Log out
UML DIAGRAMS
Sequence diagram
Login
Register & Login
1. Add movies
Collaboration diagram
Add Movies
View uploaded movies
View positive / Negitive / Netural
sentiment reviews
View rating results
Dislikes / Likes Results
View Remote Users
View Movies Reviews
View Trending Movies
View movies recommended
View Fake Reviews / Rating
1:
: Service : Remote
: Server
provider User
View all Added Movies
View all Movies Reviews 2:
View Trending movies
View your profile
View All Movies recommeded
UML DIAGRAMS
Che
ck Valid
Log out
UML DIAGRAMS
Activity diagram For Service Provider
Login
Invalid
Che
ck Valid
Log out
UML DIAGRAMS
Deployment diagram
admin
user
server
SYSTEM TESTING
The Common view of testing held by users is that it is preformed to improve that there are
no errors in a program. This is extremely difficult since designer cannot prove to be one hundred
percent accurate
Planning
Risk management
Measurement tools
SYSTEM TESTING
Level of Testing
The term end-to-end testing is also used in many organizations and tends to refer to a
combination of Systems Testing and Systems Integration Testing. Also, in some organizations the
term Systems Testing is used interchangeably with end-to-end testing.
Test Plan
Before going for testing, first decide upon the type of testing to be carried out. The following
factors are taken into consideration:
To ensure whether that information properly flows into and out of program.
To find whether the local data structures maintaining their integrity during all steps in an
algorithm execution or not.
SYSTEM TESTING
To ensure that the module operate properly at boundaries established to limit or restrict
progressing.
To find out whether error-handling paths are working correctly or not. To find out
whether the values are correctly updated or not check for validation
Objectives of Testing
During testing the program to be tested is executed with a set of test cases and output
of the program for the test cases is evaluated to determine if the program is performing as
expected. To accomplish this objectives test case design techniques are used:
Unit Testing.
Integration Testing.
Output Testing.
Validation Testing.