0% found this document useful (0 votes)
53 views3 pages

System Analysis

The document discusses the existing and proposed systems for detecting ranking fraud in mobile apps. The existing systems have disadvantages like not being able to extract fraud evidence for a given time period or detect historical fraud. The proposed system aims to develop an approach that investigates review, rating, and ranking behaviors to combine evidence and detect fraud. A feasibility analysis finds the proposed system economically, technically, and socially feasible.

Uploaded by

Divyaprathapraju
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views3 pages

System Analysis

The document discusses the existing and proposed systems for detecting ranking fraud in mobile apps. The existing systems have disadvantages like not being able to extract fraud evidence for a given time period or detect historical fraud. The proposed system aims to develop an approach that investigates review, rating, and ranking behaviors to combine evidence and detect fraud. A feasibility analysis finds the proposed system economically, technically, and socially feasible.

Uploaded by

Divyaprathapraju
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

SYSTEM ANALYSIS

2.1 EXISTING SYSTEM

In the literature, while there are some related work, such as web
ranking spam detection, online review spam detection and mobile App
recommendation, the problem of detecting ranking fraud for mobile Apps is still
under-explored. Generally speaking, the related works of this study can be
grouped into three categories. The first category is about web ranking spam
detection. The second category is focused on detecting online review spam.
Finally, the third category includes the studies on mobile App recommendation

2.1.1 DISADVANTAGES

 Although some of the existing approaches can be used for anomaly detection
from historical rating and review records, they are not able to extract fraud
evidences for a given time period (i.e., leading session).

 Cannot able to detect ranking fraud happened in Apps’ historical leading


sessions

 There is no existing benchmark to decide which leading sessions or Apps


really contain ranking fraud.

2.2 PROPOSED SYSTEM

In today’s era, due to rapid development in the mobile technology and


mobile devices, the applications i.e. mobile apps are being very interesting and
popular concept. As there is large number of mobile Apps, ranking fraud is the
challenging factor in front of the mobile App market. Ranking fraud is the term
used for referring to fraudulent or suspicious activities having the intention of
boosting up the Apps in the popularity list. In fact, App developers are using
tricky means frequently for increasing their Apps sales. The main aim is to
develop such system that find ranking, rating and review behaviours for
investigating review based evidences, rating based evidences and ranking based
evidences and then aggregation based on optimization to combine all the
evidences for detection of fraud.

2.2.1 Advantages

 The proposed framework is scalable and can be extended with other domain
generated evidences for ranking fraud detection.

 Experimental results show the effectiveness of the proposed system, the


scalability of the detection algorithm as well as some regularity of ranking fraud
activities.

 To the best of our knowledge, there is no existing benchmark to decide which


leading sessions or Apps really contain ranking fraud. Thus, we develop four
intuitive baselines and invite five human evaluators to validate.

2.3 FEASIBLITY ANALYSIS

The feasibility of the project is analyzed in this phase and business proposal
is put forth with a very general plan for the project and some cost estimates.
During system analysis the feasibility study of the proposed system is to be
carried out. This is to ensure that the proposed system is not a burden to the
company. For feasibility analysis, some understanding of the major requirements
for the system is essential.

Three key considerations involved in the feasibility analysis are

 Economical Feasibility
 Technical Feasibility
 Social Feasibility

2.3.1 ECONOMICAL FEASIBILITY

This study is carried out to check the economic impact that the system will
have on the organization. The amount of fund that the company can pour into the
research and development of the system is limited. The expenditures must be
justified. Thus the developed system as well within the budget and this was
achieved because most of the technologies used are freely available. Only the
customized products had to be purchased.

2.3.2 TECHNICAL FEASIBILITY

This study is carried out to check the technical feasibility, that is, the
technical requirements of the system. Any system developed must not have a
high demand on the available technical resources. This will lead to high demands
on the available technical resources. This will lead to high demands being placed
on the client. The developed system must have a modest requirement, as only
minimal or null changes are required for implementing this system.

2.3.3 SOCIAL FEASIBILITY

The aspect of study is to check the level of acceptance of the system by


the user. This includes the process of training the user to use the system
efficiently. The user must not feel threatened by the system, instead must accept
it as a necessity. The level of acceptance by the users solely depends on the
methods that are employed to educate the user about the system and to make him
familiar with it. Users’ level of confidence must be raised so that the user is also
able to make some constructive criticism, which is welcomed, as end user is the
final user of the system.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy