Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm

Authors

  • K. V. Shiny Assistant Professor, School of Computing, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India
  • Ashish Kumar Student, School of Computing, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India
  • Ashish Kumar Student, School of Computing, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India
  • A. Harsha Vardhan Student, School of Computing, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India
  • B. Harsha Vardhan Student, School of Computing, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India

Keywords:

mobile phone, apps, website, detecting fraud apps, data mining, internet

Abstract

The huge growth inside the wide variety of cell smartphone customers is also growing the use of cellular programs. Today, users prefer to visit a cellular utility as opposed to a computer. The goal is to increase a device that makes use of sentiment analysis and records mining to come across awful apps earlier than the person downloads them. Sentiment analysis helps decide the emotional tone of phrases expressed on line. This technique is valuable for checking online entertainment and serves to pick out public opinion on positive troubles. A consumer cannot usually find correct or authentic critiques at the net. We can apprehend the person's emotional remarks in lots of applications. Reviews may be fake or actual. By analyzing ratings and evaluations, which encompass comments from customers and administrators, we can determine whether the software is actual or no longer. Using sentiment evaluation and records mining, engines like google can examine sentiment and sentiment round ratings and other texts. Survey control is one of the significant components of application score scams. We used LSTM fashions to predict the outcomes.

Downloads

Download data is not yet available.

Downloads

Published

02-04-2024

Issue

Section

Articles

How to Cite

[1]
K. V. Shiny, A. Kumar, A. Kumar, A. H. Vardhan, and B. H. Vardhan, “Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm”, IJRESM, vol. 7, no. 3, pp. 102–106, Apr. 2024, Accessed: Dec. 30, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2972