scholarly journals Fake Comment Detection of Products

Millions of people all over the world use various kind of websites all over the world, be it Facebook, Twitter or the different shopping websites. They have impacted our life in a great way and specifically the shopping websites have made our life so much easier. To buy different products we don’t need to go anywhere. We can just sit at home and access these websites and order any item that we want to buy and it will be delivered at our home. Now one thing that all of us do before buying any product online is that we see the reviews of that product to know if the product is actually good or not. People used to do it long before the internet was even accessible. Then they used to take reviews directly from other people. This has been going on for a long time. Nowadays people browse thousands reviews available online before finally buying any product and they buy the product only if most of the reviews about the product are positive. It has happened with all of us that we want to buy a product but when we see that it has got many negative reviews , then we do not buy that particular product. Now the sellers know about this mind set of the people and they tend to play with it. What they do is that they hire people for writing fake reviews. These fake reviews can be of two types: 1) Good reviews using which their own product can be sold in big quantity. 2) Bad review so that they can defame some other product which is giving them competition. Many companies hire people so that they can write fake reviews and pay them good amount of money. Fake reviews weather a positive one or a negative one is bad and should not be entertained as it misleads the customer and it may also cause loss to the sellers. So we would like to know about these fake reviews and the people who write them so that we can protect people as well as the sellers from any kind of financial losses.

2017 ◽  
Author(s):  
Marko Kovic

Governments around the world have been trying to implement secure and reliable e-voting (location-independent, individualized voting over the Internet) for a long time, to no avail: E-voting remains fundamentally insecure.This can change with the blockchain technology, an open, transparent, and distributed digital ledger. However, blockchain-based e-voting will only work if the blockchain-based e-voting infrastructure is truly distributed and no one entity, not even the government, controls a majority of it.


Author(s):  
Míriam Antón-Rodríguez ◽  
José-Fernando Díez-Higuera ◽  
Francisco-Javier Díaz-Pernas

The Internet has meant a social revolution, changing forever the way we communicate and how we access to the information. The growing expansion of technology and the development of easier applications have given as a result the high level of popularity achieved by Internet related services, especially the World Wide Web. Using a hypertext system, Web users can select and read in their computers information from all around the world, with no other requirement than an Internet connection and a browser. For a long time, the information available on the Internet has been a series of written texts and 2D pictures (i.e., static information). This sort of information suited many publications, but it was highly unsatisfactory for others, like those related to objects of art, where real volume and interactivity with the user, are of great importance. Here, the possibility of including 3D information in Web pages makes real sense. As we become an increasingly visual society, a way to maintain heritage is to adapt museums to new times. The possibility of not only visiting and knowing the museums nearby but also enabling anybody to visit the building from their homes could be enabled. This would imply the incorporation of the virtual reality (Kim, 2005; Vince, 2004), although today only a few museums allow this kind of visit via Internet. In virtual reality, human actions and experiences that interact with the real world are emulated although, obviously, with some limitations. With virtual reality, the user could walk, examine, and interact with the environment, in contrast to traditional media like television that present excellent graphics but lack interactivity. Although this is not a new idea, it is achieving a wider expression due to the availability of software standards like VRML and X3D. VRML, virtual reality modeling language (Carey, Bell, & Marrin, 1997) is a widespread language for the description of 3D scenes and WWW hyperlinks (an analogy of the HTML for virtual reality). X3D, Extensible 3D (Web3D Consortium, 2004) is the successor of VRML, it is intended to be the universal interchange format for integrated 3D graphics and multimedia. VRML/X3D are, perhaps, most interesting to Internet users eager to discover new interesting sites on the Internet, and for the people that use it like a hobby, but those could also allow us to see a 3D artifact from any angle and perspective, to turn it in any way, manipulate it (Lepouras & Vassilakis, 2005; Petridis et al., 2005)—something totally forbidden in a real museum. This work deals with the design of a system, which allows this interactive Web access to works of art in 3D, as a step in a research project dealing with the design and implementation of a virtual and interactive museum in 3D on the Web. Also, all the associated information like history, architectural data, archaeological data, and culture will be available at the click of a mouse.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


M/C Journal ◽  
1998 ◽  
Vol 1 (1) ◽  
Author(s):  
Joseph Crawfoot

Cities are an important symbol of our contemporary era. They are not just places of commerce, but are emblems of the people who live within them. A significant feature of cities are their meeting places; areas that have either been designed or appropriated by the people. An example of this is the café. Cafés hold a unique place in history, as sites that have witnessed the growth of revolution, relationships great and small, between people and ideas, and more recently, technology. Computers are transcending their place in the private home or office and are now finding their way into café culture. What I am suggesting is that this is bringing about a new way of understanding how cafés foster community and act as media for social interaction. To explore this idea further I will look at the historical background of the café, particularly within Parisian culture. For W. Scott Haine, cities such as Paris have highly influential abilities. As he points out "the Paris milieu determined the consciousness of workers as much as their labor" (114). While specifically related to Paris, Haine is highlighting an important aspect in the relationship between people and the built environment. He suggests that buildings and streets are not just inanimate objects, but structures that shape our habits and our beliefs. Towards the middle of the nineteenth century, Paris was developing a new cultural level, referred to as Bohemia. Derived from the French word for Gypsy (Seigel 5) it was used to denote a class of people who in the eyes of Honoré de Balzac were the talent of the future (Seigel 4). People who would be diplomats, artists, journalists, soldiers, who at that moment existed in a transient state with much social but little material wealth. Emerging within this Bohemian identity were the bourgeois. They were individuals who led a working class existence, they usually held property but more importantly they helped provide the physical environment for Bohemian culture to flourish. Bourgeois society had the money to patronize Bohemian artists. As Seigel says "Bohemian and bourgeois were -- and are -- parts of a single field: they imply, require, and attract each other" (5). Cafés were a site of symbiosis between these two groups. As Seigel points out they were not so much established to create a Bohemian world away from the reality of working life, but to provide a space were the predominantly bourgeois clientèle could be entertained (216). These ideas of entertainment saw the rise of the literary café, a venue not just for drinking and socialization but where potential writers and orators could perform for an audience. Contemporary society has seen a strong decline in Bohemian culture, with the (franchised) café being appropriated by the upper class as a site of lattes and mud cake. Recent developments in Internet technology however have prompted a change in this trend. Whereas in the past cafés had brought about a symbiosis between the classes of Bohemian and bourgeois society they are now becoming sites that foster relationships between the middle class and computer technology. Computers and the Internet have their origins within a privileged community, of government departments, defence forces and universities. It is only in the past three years that Internet technology has moved out of a realm of expert knowledge to achieve a broad level of usage in the average household. Certain barriers still exist though in terms of a person's ability to gain access to this medium. Just as Bohemian culture arose out of a population of educated people lacking skills of manual labor and social status (Seigel 217), computers and Internet culture offer a means for people to go beyond their social boundaries. Cafés were sites for Bohemians to transcend the social, political, and economic dictates that had shaped their lives. In a similar fashion the Internet offers a means for people to explore beyond their physical world. Internet cafés have been growing steadily around the world. What they represent is a change in the concept of social interaction. As in the past with the Paris café and the exchange of ideas, Internet cafés have become places were people can interact not just on a face-to-face basis but also through computer-mediated communication. What this points to is a broadening in the idea of the café as a medium of social interaction. This is where the latte and mud cake trend is beginning to break down. By placing Internet technology within cafés, proprietors are inviting a far greater section of the community within their walls. While these experiences still attract a price tag they suggest a change in the idea that would have seen both the café and the Internet as commodities of the élite. What this is doing is re-invigorating the idea of the streets belonging to the middle class and other sub-cultures, allowing people access to space so that relationships and communities can be formed. References Haine, W. Scott. The World of the Paris Cafe: Sociability amongst the French Working Class 1789 - 1914. Baltimore: Johns Hopkins UP, 1996. Seigel, Jerrold. Bohemian Paris: Culture, Politics and the Boundaries of Bourgeois Life, 1830 - 1930. New York: Penguin Books, 1987. Citation reference for this article MLA style: Joseph Crawfoot. "Cybercafé, Cybercommunity." M/C: A Journal of Media and Culture 1.1 (1998). [your date of access] <http://www.uq.edu.au/mc/9807/cafe.php>. Chicago style: Joseph Crawfoot, "Cybercafé, Cybercommunity," M/C: A Journal of Media and Culture 1, no. 1 (1998), <http://www.uq.edu.au/mc/9807/cafe.php> ([your date of access]). APA style: Joseph Crawfoot. (1998) Cybercafé, cybercommunity. M/C: A Journal of Media and Culture 1(1). <http://www.uq.edu.au/mc/9807/cafe.php> ([your date of access]).


2021 ◽  
Vol 3 (S-1) ◽  
pp. 183-187
Author(s):  
Kalaiselvan P

Different beliefs and practices are found in human life from birth to death. These beliefs are created by the people and are followed and protected by the mother’s community. Man has been living with nature since ancient times. Beliefs appeared in natural human life. Hope can be traced back to ancient Tamils and still prevails in Tamil Nadu today. The hope of seeing the omen in it is found all over the world. Proverbs show that people have faith in omens. Our ancestors wrote the book 'Gauli Shastri' because the lizard omen is very important in our society. The word lizard played a major role in Tamil life during the Sangam period. It is possible to know that people have lived by the benefit of the lizard. There is hope from the public that the sound of the lizard will predict what will happen next. The purpose of this article is to illustrate the lizard word that has been around for a long time in folklore.


Author(s):  
Xiaoni Zhang ◽  
Margaret Myers

Computers and the Internet are now pervasive and essential parts of our lives: we use them at work and at home to gather information, for entertainment, and, increasingly, to do business. The Internet allows people to chat with others from all over the world, to follow the news from every continent, and conveniently to shop online at home or at the office. This book chapter covers two important and related concepts: Web design and e-commerce. The section on Web design starts with the overall picture of the Internet, history, Web authoring tools, design rules as well as introducing some research findings on Web design. E-commerce is introduced with definitions, technological acceptance model, online payment methods, online marketing and future developments.


Author(s):  
José-Fernando. Diez-Higuera ◽  
Francisco-Javier Diaz-Pernas

In the last few years, because of the increasing growth of the Internet, general-purpose clients have achieved a high level of popularity for static consultation of text and pictures. This is the case of the World Wide Web (i.e., the Web browsers). Using a hypertext system, Web users can select and read in their computers information from all around the world, with no other requirement than an Internet connection and a navigation program. For a long time, the information available on the Internet has been series of written texts and 2D pictures (i.e., static information). This sort of information suited many publications, but it was highly unsatisfactory for others, like those related to objects of art, where real volume, and interactivity with the user, are of great importance. Here, the possibility of including 3D information in Web pages makes real sense.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rajeesh Kumar N.V. ◽  
Arun M. ◽  
Baraneetharan E. ◽  
Stanly Jaya Prakash J. ◽  
Kanchana A. ◽  
...  

Purpose Many investigations are going on in monitoring, contact tracing, predicting and diagnosing the COVID-19 disease and many virologists are urgently seeking to create a vaccine as early as possible. Even though there is no specific treatment for the pandemic disease, the world is now struggling to control the spread by implementing the lockdown worldwide and giving awareness to the people to wear masks and use sanitizers. The new technologies, including the Internet of things (IoT), are gaining global attention towards the increasing technical support in health-care systems, particularly in predicting, detecting, preventing and monitoring of most of the infectious diseases. Similarly, it also helps in fighting against COVID-19 by monitoring, contract tracing and detecting the COVID-19 pandemic by connection with the IoT-based smart solutions. IoT is the interconnected Web of smart devices, sensors, actuators and data, which are collected in the raw form and transmitted through the internet. The purpose of this paper is to propose the concept to detect and monitor the asymptotic patients using IoT-based sensors. Design/methodology/approach In recent days, the surge of the COVID-19 contagion has infected all over the world and it has ruined our day-to-day life. The extraordinary eruption of this pandemic virus placed the World Health Organization (WHO) in a hazardous position. The impact of this contagious virus and scarcity among the people has forced the world to get into complete lockdown, as the number of laboratory-confirmed cases is increasing in millions all over the world as per the records of the government. Findings COVID-19 patients are either symptomatic or asymptotic. Symptomatic patients have symptoms such as fever, cough and difficulty in breathing. But patients are also asymptotic, which is very difficult to detect and monitor by isolating them. Originality/value Asymptotic patients are very hazardous because without knowing that they are infected, they might spread the infection to others, also asymptotic patients might be having very serious lung damage. So, earlier prediction and monitoring of asymptotic patients are mandatory to save their life and prevent them from spreading.


2001 ◽  
Vol 1 (3) ◽  
pp. 303-319 ◽  
Author(s):  
THOM FRÜHWIRTH ◽  
SLIM ABDENNADHER

Most cities in Germany regularly publish a booklet called the Mietspiegel. It basically contains a verbal description of an expert system. It allows the calculation of the estimated fair rent for a flat. By hand, one may need a weekend to do this task. With our computerized version, the Munich Rent Advisor, the user just fills in a form in a few minutes, and the rent is calculated immediately. We also extended the functionality and applicability of the Mietspiegel so that the user need not answer all questions on the form. The key to computing with partial information using high-level programming was to use constraint logic programming. We rely on the Internet, and more specifically the World Wide Web, to provide this service to a broad user group, the citizens of Munich and the people who are planning to move to Munich. To process the answers from the questionnaire and return its result, we wrote a small simple stable special-purpose web server directly in ECLiPSe. More than 10,000 people have used our service in the last three years. This article describes the experiences in implementing and using the Munich Rent Advisor. Our results suggest that logic programming with constraints can be an important ingredient in intelligent internet systems.


2020 ◽  
Vol 4 (2) ◽  
pp. 21-39
Author(s):  
Abdul Munir ◽  
Riki Harianto

live streaming is a latest innovation for people to express themselves and exchange ideas. The current social media that is becoming a trend among the people and using live streaming as a means to interact is social media live streaming Bigo live. The existence of bigo live as an internet community forum (Cyber Community) certainly changes in the norms and values ​​adopted by these users, so it cannot be denied that in the internet community (Cyber Community) there are changes and rules that occur . One of them appears an interaction created virtually in the world, where the emergence of a form of deviation that occurs in social media live streaming bigo live, one of which is cyber sexual harassment. The method used in this study uses visual methods. The theory used in this paper is the theory of routine activities where observations take place and observe every bigo live social media user.


Sign in / Sign up

Export Citation Format

Share Document