Demystifying Emerging Trends in Machine Learning -  - E-Book

Demystifying Emerging Trends in Machine Learning E-Book

0,0
85,05 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

Demystifying Emerging Trends in Machine Learning (Volume 2) offers a deep dive into emerging and trending topics in the field of machine learning (ML). This edited volume showcases several machine learning methods for a variety of tasks. A key focus of this volume is the application of text classification for cybersecurity, E-commerce, sentiment analysis, public health and web content analysis.
 
 The 49 chapters highlight a wide variety of machine learning methods including SVNs, K-Means Clustering, CNNs, DCNNs, among others. Each chapter includes accessible information through summaries, discussions and reference lists. This comprehensive volume is essential for students, researchers, and professionals eager to understand the emerging trends reshaping machine learning today.
 
Readership
 
Scholars and professionals interested in machine learning trends and research.
 

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB
MOBI

Seitenzahl: 941

Veröffentlichungsjahr: 2025

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
PREFACE
List of Contributors
A Method Based on Machine Learning to Classify Text for the Field of Cybersecurity
Abstract
Introduction
Related Work
Proposed Work
Preliminary Knowledge
Dataset Description
Machine Learning Algorithms for Text Classification
Naive Bayes
Support Vector Machines
Results and Discussion
Conclusion
References
A Practicable E-commerce-Based Text-Classification System
Abstract
Introduction
Related Work
Proposed Work
Problem Formulation
Dataset Description
System Model
Procedure
Intake
Results and Discussion
Conclusion
References
AI Model for Text Classification Using FastText
Abstract
Introduction
Related Work
Proposed Work
System Model
FastText Model
Results and Discussion
Conclusion
References
An Algorithm for Textual Classification of News Utilizing Artificial Intelligence Technology
Abstract
Introduction
Related Work
Proposed Work
System Model
Level 1
Level 2
Level 3
Preprocessing
Level 1
Level 2
Level 3
News Text Classification
Results and Discussion
Conclusion
References
Analysis of the Sentiment of Tweets Regarding COVID-19 Vaccines Using Natural Language Processing and Machine Learning Sectionification Algorithms
Abstract
Introduction
Related Work
Proposed Work
System Model
Pre-processing
Noise Removal
a) Lowercase Conversion
b) URL Removal
c) Hashtags Removal
d) Special Characters Removal
e) Stop Words Removal
Corrections
Tokenization
Normalization
Stemming
PoS Tagging
ML Techniques
Supervised Machine Learning
Unsupervised Machine Learning
Semi-Supervised Machine Learning
Logistic Regression (LR)
Decision Tree (DT)
Random Forest (RF)
Results and Discussion
Conclusion
References
Classification of Medical Text using ML and DL Techniques
Abstract
Introduction
Related Work
Proposed Work
Problem Formulation
BERT Model
ML and DL Models
ML Methods
DL Methods
Results and Discussion
Conclusion
References
Evaluation of ML and Advanced Deep Learning Text Classification Systems
Abstract
Introduction
Related Work
Proposed Work
Text Classification Methods
Supervised Text Classification
Unsupervised Text Classification
Preprocessing
Data Cleaning and Preprocessing
Lowercasing
Stop Word Removal
Lemmatization
TF-IDF
DCNN with GA for Text Classification
Results and Discussion
Conclusion
References
Machine Learning Method Employed for the Objective of Identifying Text on Tweet Dataset
Abstract
Introduction
Related Work
Proposed Work
Data Collection
Data Preprocessing
Word Embedding
Feature Extraction
Text Classification
Results and Discussion
Conclusion
References
Textual Classification Utilizing the Integration of Semantics and Statistical Methodology
Abstract
Introduction
Related Work
Proposed Work
System Model
GRU
Proposed GRU
Results and Discussion
Conclusion
References
The Use of Machine Learning Techniques to Classify Content on the Web
Abstract
Introduction
Related Work
Proposed Work
System Model
SVM
Proposed Classifier
Results and Discussion
Conclusion
References
Lexical Methods for Identifying Emotions in Text Based on Machine Learning
Abstract
Introduction
Related Work
Proposed Work
Research Gaps
System Model
Word Embedding
Speech Emotion Classification
Results and Discussion
Conclusion
References
Identification of Websites Using an Efficient Method Employing Text Mining Methods
Abstract
Introduction
Related Work
Proposed Work
Research Gaps
System Model
Gathering Website Information & Preprocessing
Feature Extraction using CNN with LSTM
Results and Discussion
Dataset Description
Hyper parameters Description
Description of results
Conclusion
References
Machine Learning-based High-Dimensional Text Document Classification and Clustering
Abstract
Introduction
Related Work
Proposed Work
Background
Machine Learning-Based Text Classification
Preprocessing
Stop Words
Feature Engineering
Feature Clustering
Text Classification
Results and Discussion
Conclusion
References
The Application of an N-Gram Machine Learning Method to the Text Classification of Healthcare Transcriptions
Abstract
Introduction
Related Work
Proposed Work
Problem Statement
Proposed Methodology
Skip-Gram
Results and Discussion
Conclusion
References
Method for Adaptive Combination of Multiple Features for Text Classification in Agriculture
Abstract
Introduction
Related Work
Proposed Work
Background
Text Classification using Bi-GRU & CNN
Results and Discussion
Conclusion
References
Deep Learning-based Text-Retrieval System with Relevance Feedback
Abstract
Introduction
Related Work
Proposed Work
Research Gaps
System Model
ConvNets
Example Scenario:
Results and Discussion
Conclusion
References
Domain Knowledge-based BERT Model with Deep Learning for Text Classification
Abstract
Introduction
Related Work
Proposed Work
Problem Formulation
System Model
Bi-GRU for text classification
Results and Discussion
Conclusion
References
Applying Deep Learning to Classify Massive Amounts of Text Using Convolutional Neural Systems
Abstract
Introduction
Related Work
Proposed Work
System Model
CNN
Results and Discussion
Conclusion
References
An Algorithm for Categorizing Opinions in Text from Various Social Media Platforms
Abstract
Introduction
Related Work
Proposed Work
Overview
Feature Extraction
Multimodal Sentiment Classification
Results and Discussion
Conclusion
References
Text Classification Method for Tracking Rare Events on Twitter
Abstract
Introduction
Related Work
Proposed Work
Research Gaps
Dataset
Data Preprocessing
Feature Extraction and Classification
Results and Discussion
Datasets
Conclusion
References
Text Document Preprocessing and Classification Using SVM and Improved CNN
Abstract
Introduction
Related Work
Proposed Work
CNN with SVM for Text Classification
Results and Discussion
Conclusion
References
Identification of Text Emotions Through the Use of Convolutional Neural Network Models
Abstract
Introduction
Related Work
Proposed Work
Preprocessing
CNN
Convolution Layer
Max Combining Layer
k-max Combining
Combining and Global Combining
Results and Discussion
Conclusion
References
Classification & Clustering of Text Based on Doc2Vec & K-means Clustering based Similarity Measurements
Abstract
Introduction
Related Work
Proposed Work
Data Preparing
Document Demonstration
Document Clustering
Results and Discussion
Conclusion
References
Categorization of COVID-19 Twitter Data Based on an Aspect-Oriented Sentiment Analysis and Fuzzy Logic
Abstract
Introduction
Related Work
Proposed Work
Data Mining of Tweets
Preprocessing and Labeling
Text Classification
Outcomes and Discussion
Conclusion
References
Feature-Level Sentiment Analysis of Data Collected through Electronic Commerce
Abstract
Introduction
Related Work
Proposed Work
Overview
Customer Reviews
Parts-of-Speech tagging
Feature Extraction
Feature Pruning
Classification
Results and Discussion
Conclusion
References
Classification Algorithms for Evaluating Customer Opinions using AI
Abstract
Introduction
Related Work
Proposed Work
Collection and Preprocessing of Data 3.1
Feature Extraction Methods
Text Classification Methods
SVM
Artificial Neural Networks
Naive Bayes
Decision Trees
C4.5. Decision Tree Classifier
KNN
Results and Discussion
Conclusion
References
Analysis of Sentiment Employing the Word2vec with CNN-LSTM Classification System
Abstract
Introduction
Related Work
Proposed Work
In-Depth Information Gathering 3.1.1
Data Preprocessing
Text Classification using CNN-LSTM
Results and Discussion
Conclusion
References
Hadoop-based Twitter Sentiment Analysis Using Deep Learning
Abstract
Introduction
Related Work
Proposed Work
System Overview
Sentiment Analysis using Hadoop
Results and Discussion
Testing environment
Performance metrics
Conclusion
References
A Contrast Between Bert and Word2vec's Approaches to Text Sentiment Analysis
Abstract
Introduction
Related Work
Proposed Work
System Model
Text Preprocessing
• Tokenization
• Removal and corrections
• Replacement
• PoS tagging
Word Embedding
Results and Discussion
Conclusion
References
Text Emotion Categorization Using a Convolutional Recurrent Neural Network Enhanced by an Attention Mechanism-based Skip-Gram Method
Abstract
Introduction
Related Work
Proposed Work
Research Gaps
Skip Gram Model for Text Classification
Attention-based CNN
Attention Maps Estimation Issue
Results and Discussion
Conclusion
References
Multimodal Sentiment Analysis in Text, Images, and GIFs Using Deep Learning
Abstract
Introduction
Related Work
Proposed Work
System Model
Dataset
Multimodal Text Classification
Results and Discussion
Conclusion
References
Public Opinion Regarding COVID-19 Analyzed for Emotion Using Deep Learning Techniques
Abstract
Introduction
Related Work
Proposed Work
System Overview
Dataset Description
Data Preprocessing, Handling, and Tokenization
The VADER Emotion Analyzer
Feature Extraction and Classification
Results and Discussion
Conclusion
References
CNN-based Deep Learning Techniques for Movie Review Analysis of Sentiments
Abstract
Introduction
Related Work
Proposed Work
System Model
CNN for Movies Review Classification
Results and Discussion
Data Collection
Data Normalization
Conclusion
References
Machine Learning and Deep Learning Models for Sentiment Analysis of Product Reviews
Abstract
Introduction
Related Work
Proposed Work
System Model
Data Collection and Processing
Vocabulary Development
DL Models
Proposed DL Model
Results and Discussion
Accessing the Amazon Customer Reviews Dataset
Conclusion
References
Sentiment Analysis of Hotel Reviews Based on Deep Learning
Abstract
Introduction
Contributions
Related Work
Proposed Work
System Model
Brief Outline
Text Preprocessing
Stage 1 - Data Assortment
Stage 2 - Sentimentality Gloss
Stage 3 - Text Cleansing
LSTM-GRU for Text Classification
Results and Discussion
Dataset Description
Conclusion
References
Utilizing Machine Learning for Natural Language Processing to Conduct Sentiment Analysis on Twitter Data in Multiple Languages
Abstract
Introduction
Related Work
Proposed Work
Research Gaps
System Model
LSTM for Tweets Classification
Components of LSTMs
Results and Discussion
Conclusion
References
The Use of Machine Learning to Analyze the Sentiment for Social Media Networks
Abstract
Introduction
Related Work
Proposed Work
System Model
Collecting Initial Data
Preprocessing Phase
Word Embedding
Tweets Classification
Results and Discussion
Conclusion
References
Sentiment Classification of Textual Content using Hybrid DNN and SVM Models
Abstract
Introduction
Related Work
Proposed Work
System Model
Feature Engineering Model
Sentiment Lexicon Layer
BERT Model
Hybrid DNN for Classification
Results and Discussion
Dataset Description
Baseline Methods
Conclusion
References
Big Data Analysis and Information Quality: Challenges, Solutions, and Open Problems
Abstract
Introduction
Literature Review
Proposed Model
Problem Formulation
Proposed Methodology
Big Data Processing Steps
Big data quality challenges and issues
Best practices for managing big data quality
Experimental results
Conclusion
References
Using Deep Learning Techniques to Detect Traffic Information in Social Media Texts
Abstract
Introduction
Related Work
Proposed Work
System Model
Data Collection and Text Pre-processing
Feature Extraction and Word Embedding
Text Classification
Results and Discussion
Conclusion
References
Deep Sentiment Classification in COVID-19 Using LSTM Recurrent Neural Network
Abstract
Introduction
Related work
Proposed Work
System Overview
Preparing the Input Data
Removing Noise and Stop-Words
Classification
Results and Discussion
Conclusion
References
Machine Learning-Based Data Preprocessing as well as Visualization Techniques for Predicting Students' Tasks
Abstract
Introduction
Literature Review
Proposed Model
Problem Formulation
Proposed Methodology
Data Preprocessing
Quality Data
Data Processing Task
ML for Placement Prediction
Experimental results
Conclusion
References
The Prediction of Faults Using Large Amounts of Industrial Data
Abstract
Introduction
Related Work
Proposed Work
System Model
CNN Model
Results and Discussion
Conclusion
References
Comparison Analysis of Logical Regression and Random Forest with Word Embedding Techniques for Twitter Sentiment Analysis
Abstract
Introduction
Literature Review
Proposed Work
Data Collection, Preparation and Cleaning
Vectorization
Vectors of Words
Text Classification Models
Results and Discussion
The Logistic Regression of TF-IDF
Word2Vec Logistic Regression
TF-IDF Random Forest
Word2Vec's Random Forest
Conclusion
References
The Classification of News Articles Through the Use of Deep Learning and the Doc2Vec Modeling
Abstract
Introduction
Related Work
Techniques and Materials
Techniques and Materials
Database Description
Doc2Vec
Naive Bayes
Gauss Naive Bayes
Random Forest
Support Vector Machine
Convolutional Neural Network (CNN)
Results and Discussion
Conclusion
References
Investigating the Utility of Data Mining for Automated Credit Scoring
Abstract
Introduction
Related Work
Proposed Work
Genetic Algorithm
General view of the proposed model
The proposed methodology
Results and Discussion
Running time
Discussion
Conclusion
References
Investigating the Use of Data Mining for Knowledge Discovery
Abstract
Introduction
Related Work
Proposed Work
Graph Construction
Data Retrieval from Constructed Graph
Results and Discussion
Analysis of Retrieved Data 4.2
Conclusion
References
Exploring the Role of Big Data in Predictive Analytics
Abstract
Introduction
RELATED WORKS
PROPOSED WORK
Data Sources and Populations
A Machine Learning Analysis of the Fundamental model
Healthy Habits
Long-term Care
EXPERIMENTAL ANALYSIS
CONCLUSION
References
Implementing Automated Reasoning in Natural Language Processing
Abstract
Introduction
Related Work
Proposed Work
Convolutional Neural Networks
CNN-Based Text Classification
MapReduce-CNN
Results and Discussion
Conclusion
References
Emerging Trends in Computation Intelligence and Disruptive Technologies
(Volume 2)
Demystifying Emerging Trends
in Machine Learning
Edited by
Pankaj Kumar Mishra
Hi-Tech Institute of Engineering and Technology
Ghaziabad, U.P.
India
&
Satya Prakash Yadav
School of Computer Science
Engineering and Technology (SCSET)
Bennett University, Greater Noida, U.P.
India

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the book/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

PREFACE

Artificial intelligence (AI) and machine learning (ML) are revolutionizing the way we approach healthcare and various industries. AI and ML are being used to improve patient outcomes, reduce costs, and increase efficiency in the healthcare industry. AI is also used in medical devices to predict and identify diseases, classify data for disease outbreaks, and optimize medical therapy.

In this book, we explore the role of neural networks in AI and ML in the medical and health sector. Neural networks are being used in oncology to train algorithms that can identify cancerous tissues at the microscopic level with the same accuracy as trained physicians. Various rare diseases may manifest in physical characteristics that can be identified in their premature stages by using facial analysis on patient photos.

The book also explores the role of AI and ML in various industries such as finance, retail, manufacturing, and more. AI is being used to improve customer experience by providing personalized recommendations based on customer data. In manufacturing, AI is being used to optimize supply chain management by predicting demand and reducing waste.

This book is a comprehensive guide for anyone interested in learning about the role of AI and ML in medical, health sectors, and various industries.

Pankaj Kumar Mishra Hi-Tech Institute of Engineering and Technology Ghaziabad, U.P. India &Satya Prakash Yadav School of Computer Science Engineering and Technology (SCSET)

List of Contributors

Ayush GandhiCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaAnsh KatariaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaAkhilesh KaliaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaAbhinav MishraCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaAbhishek SinglaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaAmarpal YadavDepartment of AI, Noida Institute of Engineering & Technology, Greater Noida, Uttar Pradesh, IndiaDikshit SharmaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaDeepak MinhasCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaDarleen GroverCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaDhiraj SinghCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaHimanshu MakhijaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaJaspreet SidhuCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaJagmeet SohalCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Punjab, IndiaJatin KhuranaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaJagtej SinghCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaJaskirat SinghCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaMridula GuptaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaMadhur TanejaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaManpreet SinghCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaManish NagpalCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaMadhur GroverCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaN. SengottaiyanSchool of Computer Science and Engineering, JAIN (Deemed-to-be University), Bangalore, IndiaPratibha SharmaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaPavas SainiCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaPrabhjot KaurCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaPrakriti KapoorCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaPreetjot SinghCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaPrateek GargCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaPratik MahajanCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaRohaila NaazCollege of Computing Science and Information Technology, Teerthanker Mahaveer University, Moradabad, Uttar Pradesh, IndiaRahul MishraCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaRajat SainiCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSiddharth SriramCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSidhant DasCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSorabh SharmaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSukhman GhummanCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSulabh MahajanCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSakshi PandeyCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSimran KalraCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaShubhansh BansalCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSover Singh BishtDepartment of DS, Noida Institute of Engineering & Technology, Greater Noida, Uttar Pradesh, IndiaSaniya KhuranaCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSaket MishraCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSahil SuriCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaSourav RampalCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaT. R. MaheshDepartment of Computer Science and Engineering, JAIN (Deemed-to-be University), Bangalore, India Department of Computer Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, IndiaTarang BhatnagarCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaTarun KapoorCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, IndiaVaibhav KaushikCentre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India

A Method Based on Machine Learning to Classify Text for the Field of Cybersecurity

Siddharth Sriram1,*
1 Centre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India

Abstract

Rapid advancements in networks and computer systems have opened a new door for immoral acts like cybercrime, which threaten public safety, and security, as well as the global economy. The purpose of this proposal is to analyse IP fraud and cyberbullying as two distinct types of cybercrime. The primary goals of this study are to use instances of cybercrime to provide a short examination of cybercrime activities, and the family member principles, and propose a pairing schema. Using the Naive Bayes (NB) & Support Vector Machine (SVM) artificial intelligence techniques, cybercrime instances are categorised according to their ideal qualities. The Twitter data in the Kaggle database has been clustered using K-means. User ID, sign-up date, referral, browser, gender, and age as well as IP address are just a few of the most useful information used to educate the computer. Total 151,113 datasets were used for experimental analysis of the suggested algorithm's performance. The accuracy of the suggested approach, 97%, is higher than that of the current method (NB). The challenge of regression may be easily surmounted with the use of the random forest method for the categorization of the resultant cybercrimes. The planned study uses age categories as the foundation for identifying the different offenses.

Keywords: Cyber security, Machine learning techniques, Text classification.
*Corresponding author Siddharth Sriram: Centre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India; E-mail: [email protected]

Introduction

In order to collect energy from the wake created by oscillating foils, a machine-learning model is constructed. For array deployments of oscillating foils, the function of the wake structure is crucial because the unstable wake significantly affects the performance of downstream foils. User sentiment is gleaned from social media using sentiment analysis [1, 2]. It is a way of organizing the text's ideas into positive, negative, and neutral categories. The outcomes of training and classifying the Twitter dataset have varied depending on the strategy utilized by

the researchers. The algorithm is crucial, especially in time-sensitive industries like airlines and retail [3, 4]. Smartphones, tablets, and other Internet of Things (IoT) devices are frequently used in settings as diverse as the household and the factory. Bluetooth Low Energy (BLE) is used by many of these gadgets as a control or data transmission mechanism [5, 6]. These devices are susceptible to simple attacks because of their lack of robust security mechanisms and the inherent weaknesses in their software as well as communication components. Machine learning is often used for classification purposes [7]. In order to classify images and other remote sensing data, GIS experts often use deep neural network-based classification methods. Graph neural networks (GNNs) can be utilized for identifying geographical features by taking their topology into account, which is useful for data represented as a graph, such as line or polygonal spatial data [8, 9]. Using GNNs to group spatial objects into several categories is suggested in this article. Three alternative methods were tested, two of which depended only on the classification of text and one which combined text classification with a matrix of adjacency. The suggested method's application case was the categorization of planning zones in LSPs [9]. The outcomes of the trials demonstrated the importance of object topological information in enhancing GNNs' classification accuracy. Input characteristics including document length, training data representation format, and network architecture all need to be considered for optimal model performance [10].

Related Work

In this study, we look at 46 different kinematics of oscillation foils to find vortex wakes in pictures of vorticity fields and to adjust the wake parameters according to the input kinematic elements. There are three types of wakes that are classified using a network of convolutional neural networks (CNN) that has lengthy short-term memory units. Utilizing an unsupervised convolutional auto-encoder with [Formula: see text]-means++ clustering, four separate wake patterns are identified, which corroborate the differences in foil kinematics. Future research might use these patterns to predict how foils positioned in the wake would behave and to build optimal foil combinations for tidal energy collecting [11].

In this paper, we provide an optimisation-based machine-learning method for tweet classification. The process consisted of three distinct steps. The process begins with gathering and organising data, then moves on to improving it via feature extraction, and then concludes with reclassifying the revised training set using machine learning methods. Different algorithms provide different results. Sequential minimal optimising with decision trees has been proven to have a high degree of accuracy (89.47%) when compared to other machine learning techniques [12].

In the first part of this essay, we saw how to get unprocessed information on network traffic while simultaneously launching a MitM assault on BLE devices. Second, we investigate the possibility of using machine learning—and specifically a combination of unsupervised and supervised methods—to identify this kind of assault. We reconstructed the model of BLE interactions using two unsupervised approaches and utilised those models to spot suspicious data batches. The packets within each batch were then categorised as either normal or attack using a classification approach based on the Text-CNN technology. The results of our model reconstruction demonstrate that our classification approach is very accurate (0.99), with a low false positive rate (0.03) [13].

We used LIME to explain the model's predictions and a conglomeration of deep learning algorithms (CNN-GRU) to categorize four distinct cardiac arrhythmia kinds as part of this study. A 1D convolutional neural network (CNN) served as the basis for training the model. A well-liked local explanation method, LIME can simulate the behavior of every machine learning system and provide an explanation for it. Unfortunately, LIME is limited to explaining data in tabular, textual, and visual formats. In order to better illustrate LIME on the signal dataset, we advocated for a heat map to be used to draw attention to relevant regions of the heartbeat signals. Our approach also allows for more accurate heartbeat segmentation by accurately extracting characteristics such as the QRS Complex, P Wave, and T Wave from electrocardiogram, or ECG, records. Tests for recall, accuracy, precision, f1 score, as well as area under the receiver operator curve of characteristic (AUC-ROC) were conducted using ECG lead II from the MIT-BIH datasets to evaluate the proposed hybrid model. We directly compare the suggested model to the independent CNN and GRU algorithms to show that it is more accurate and has a better ROC [14].

Corona Virus and Conspiracies Multimedia Analysis Task of the MediaEval 2021 Challenge is dedicated to investigating claims of wrongdoing in relation to the COVID-19 pandemic. Our HCMUS group takes several methods based on various pre-trained models to handle 2 separate jobs. We provide 5 iterations of Task 1 and 1 of Task 2 based on our experiments. While the BERT [5] trained model is included in both runs, the first run also incorporates a subjective assessment for acquiring semantic features prior to training. Our third and fourth runs will be more method-diversified with the use of naïve Bayes classifiers [4] as well as a long short-term memory framework [8]. By combining many ML and DL models, Run 5 is able to perform a multimodal analysis of textual data [3]. A single-run Bayesian categorization approach is used in the final phase of subtask 2. In the end, our approach yields scores of 0.5987 on task 1 as well as 0.3136 on task 2. The author's copyright for this article is valid until 2021 [15].

Proposed Work

Preliminary Knowledge

As a machine learning strategy, text classification aims to automatically classify texts using tags or categories. NLP (natural language processing) text classifiers can quickly sort through massive volumes of text according to user intent, emotions, and themes, far faster than humans can. Emails, chats, websites, social media, reviews on the internet, support tickets, survey results, you name it: they all contribute to an overwhelming amount of data that is difficult for people to process. Imagine attempting to manually handle even a small percentage of the staggering 20 billion messages sent each month between businesses and individuals on Facebook Messenger. It would take an extremely long time and a lot of money. Businesses may get a wealth of knowledge from any and all communication channels, but it can be difficult to sift through the information they receive and identify actionable insights. This is prompting businesses to look at automated options, such as text classification. Text categorization, driven by machine learning, allows you to categorise text in a dependable, scalable, accurate, as well as economical manner. Fig. (1) represents the System Architecture.

Fig. (1)) System Architecture.

Dataset Description

Since we could not find a Spanish-language dataset, we used Facebook's API to compile data on three forms of cyber-aggression in Latin America: racism, violence against women, and violence according to gender identity. We gathered a total of 5,000 comments, but only 2000 were usable since they were free of spam (which we define as texts including uncommon characters, visuals of expression, or hilarious ideas like memes, blank spaces, or irrelevant remarks). Afterward, we classified the feedback (instances) as follows: 700 comments related to sexual orientation-based violence; 700 comments related to violence against women; and 600 comments related to racism.

The act of labelling. We noticed that some academics utilised the Amazon Mechanical Turk website to hire unidentified online employees to manually categorise various types of data (e.g., comments, reviews, words, photographs). Amazon's Mechanical Turk employees found that 2.5% of reviews flagged as “no cyber-bullying” should really be labelled as such, therefore the company reached out to psychology majors at the graduate and undergraduate levels for help with the tagging process.

In light of the above, we opted to have a team of three educators versed in machine-learning algorithms to manually tag the remarks with the help of psychologists versed in assessing and treating incidents of bullying in secondary schools. The psychologists went through the three types of cyber-aggression with the faculty and how to classify comments into the appropriate categories. Each remark was assigned an offensive value based on the criteria of cyber-aggression and a predetermined number scale as part of the labelling procedure. We utilised a scale from 0 to 2 to rank the offensiveness of statements that included sexual assault against women. The same four-point-six-point scale was applied for statements concerning sexual orientation-based violence, with the lowest number indicating the least obscene remarks. Last but not least, racist statements were ranked from least offensive to most offensive using a scale from zero to 10. To this end, we collected a dataset of abusive posts and fed it into our feature selection and training processes. The first column of this data set held the comment or instance, while the second column provided an objectionable value for each comment. In the following, we detail the feature-selection technique and training process algorithms and methodologies employed in this study.

Machine Learning Algorithms for Text Classification

Machine learning classifier training begins with converting text into a machine-readable format. In many cases, this is accomplished with the help of a “bag of words,” a set of words whose frequency in a given set of words is represented by a vector. After information is vectorized, vectors of features for every word sample and tag are used to train a text classification model. The more data it has to learn from, the more precise its forecasts will be. The most popular algorithms for text categorization are waiting, so let's have a look at them:

Naive Bayes

The Naive Bayes approach uses Bayes' Theorem, a classifier based to forecast a text's label using prior information about potentially related circumstances. After determining the likelihood of every tag for the input text, it makes a prediction based on the tag having the greatest likelihood.

Naive Bayes may also be made more effective with the use of other methods:

Getting rid of filler words that nobody ever uses. Words like “able to,” “either,” “else,” “ever,” “etc”.To lemmatize a term is to classify its many derivations under the same heading. Words like “draught,” “drafted,” “draughts,” “drafting,” etc.N-grams: The n-gram denotes the likelihood of occurrence of a single word or a series of words of 'n length' inside a text.TF-IDF: A measure of a word's significance in a text or group of documents, TF-IDF is an abbreviation for “term frequency-inverse document frequency.” It has great potential for scoring words, in that its value rises with the frequency with which a given word occurs in a document rises, but its value falls as the quantity of documents containing that word falls.Forecasters: [X1, X2] and Board: Y To get the posterior probability, one uses the following formula -(1)Accepting the Offer of Limited Responsibility for P(X1,X2/Y=1),(2)Naive Bayes Classifier's posterior probability calculation formula.

Support Vector Machines

The classification system known as Support Vector Machines (SVM) excels in situations when there is a small quantity of data to work with. For each given category, it evaluates all possible vectors and selects the best one. For example, let us pretend that there are two attributes (x and y) and two labels (expensive and cheap) in the data set. There has to be a way to tell which of the two sets of variables (x, y) is more expensive. The support vector machine (SVM) does this by creating a boundary (the decision boundary) between the data points and classifying everything on either side as expensive or cheap. The subspace of a group and the subspace of an outgroup are created when a space is divided in half by a decision boundary. Training text is represented by vectors, and each tag is represented by a set. SVM has the advantage of not needing a large amount of training information to provide correct results, but it does demand more processing power than Naive Bayes to do so. It is a machine learning method that may be used for Regression and Classification, and it is supervised. The number of features, n, determines the number of dimensions in which data points are shown in SVM. The next step in classification is to choose an appropriate hyper-plane that clearly separates the two groups. The hyper-plane has (n minus 1) dimensions in n-dimensional space.

(3)

We presume that categories may be divided into linear subsets. Classification is facilitated by the sign in the equation, while the scale of the equation clarifies the extent to which the observation deviates from the hyper-plane. If the magnitude is large, we may more confidently place it in a certain category. Margin is defined as the minimal distance of points of data from the hyper-plane to either class. For it to be very significant, we need a large safety margin. Therefore, the name “Maximum Margin Classifier” is applied to this hyper-plane. The observations that fall on or outside the boundary and cause the hyper-plane to deform are known as support vectors. The hyper-plane is propped up by the support vectors.

Results and Discussion

Seventy percent, ten percent, and twenty percent of the whole sequence dataset were used for training, validation, and testing, respectively.

To evaluate the models, we used accuracy and macro-weighted F1. The article's claimed accuracy is based on conclusions drawn from the test set. Since it gives an average F1 score while considering the corresponding frequency of each label, the macro-weighted F1 statistics is used when assessing the efficacy of a model on a dataset. Fig. (2) displays comparison analysis of accuracy.

Fig. (2)) Comparison analysis of accuracy. Fig. (3)) Accuracy (a). Sample Size, and (b). Feature Size. Fig. (4)) Comparison analysis of precision. Fig. (5)) Precision (a). Sample Size, and (b). Feature Size.

Fig. (3) depicts accuracy (a). sample size and (b). and feature size. Fig. (4) displays comparison analysis of precision. Fig. (5) represents precision (a). sample size, and (b). feature size, Fig. (6) portrays comparison analysis of recall. Fig. (7) displays recall (a). sample size, and (b). feature size, Fig. (8) shows comparison analysis of F-score, Fig. (9) shows F-score (a). sample size, and (b). feature size. Cross-validation is often used as a measure of a text classifier's effectiveness. The training data are randomly split into sets of equal size. The remaining sets are used to train the text classifier and test its predictions for each set of the same length. By comparing their predictions with human-tagged data, classifiers may reduce the likelihood of producing false positives and negatives.

Fig. (6)) Comparison analysis of Recall. Fig. (7)) Recall (a). Sample Size, and (b). Feature Size. Fig. (8)) Comparison analysis of F-score. Fig. (9)) F-score (a). Sample Size, and (b). Feature Size.

Measures of a classifier's efficacy may be derived from these outcomes:

Accurateness: Proportion of correctly predicted texts with tags.Exactness: Numbers of texts the classifier's prediction for a tag's total number of instances was within the margin of error.Recallotion: The proportion of instances out of the overall amount of cases for which it might have made a prediction, the classifier made a prediction for a given tag.F1 Score: The optimal balance between precision and recollection.

Conclusion

Cybercrime poses a danger to humanity's security, and the global economy because of the quick advancements in networks and computer networks that have opened up new avenues for immoral actions. The proposed work's objective is to categorise cybercrimes into IP fraud analysis and cyberbullying. The main goals of this work are to provide a brief inspection of cyber activities, and their respective underpinnings, and supplying a matching schema via cybercrime occurrences. Cybercrime episodes are grouped based on their ideal qualities using data mining methods called Naive Bayes (NB) as well as Support Vector Machine (SVM). Data from Twitter is extracted from the Kaggle databases using K-means clustering. In order to provide appropriate computer training, it is necessary to collect the majority of relevant data, including customers ID, sign-up time, source, web browser, gender, age, as well as IP address. There are 151,113 data points used in the studies that test how well the approach works. With an accuracy rate of 97%, the suggested approach outperforms the current technique (NB). When it comes to cybercrime categorization, the random forest method is superior to novelty regression. The proposed method classifies the different crimes according to a number of age groups.

References

[1]Kaczmarek I., Iwaniak A., Świetlicka A.. Classification of Spatial Objects with the Use of Graph Neural Networks.ISPRS Int. J. Geoinf.20231238310.3390/ijgi12030083[2]Maguen S., Madden E., Patterson O.V., DuVall S.L., Goldstein L.A., Burkman K., Shiner B.. Measuring Use of Evidence Based Psychotherapy for Posttraumatic Stress Disorder in a Large National Healthcare System.Adm. Policy Ment. Health201845451952910.1007/s10488-018-0850-529450781[3]Nikhath A.K., Subrahmanyam K., Vasavi R.. Building a K-Nearest Neighbor Classifier for Text Categorization2016[4]Benitez M., Tian J., Kelly M., Selvakumaran V., Phelan M., Mazurowski M.A., Lo J.Y., Rubin G.D., Henao R.. Combining deep learning methods and human knowledge to identify abnormalities in computed tomography (CT) reports” Medical Imaging2019[5]Pedro M.A., Baker R., Montalvo O., Nakama A., Gobert J.D.. Using Text Replay Tagging to Produce Detectors of Systematic Experimentation Behavior Patterns.Educational Data Mining2010[6]Sutha S., Kandasamy M.C., Prakash M.N.. Image Retrieval with Relational Semantic Indexing Color and Gray Images2020[7]Sanglikar M.A., Kothari D.C.. Named Entity Recognition System for Hindi Language: A Hybrid Approach2011[8]Yadav S.P., Zaidi S., Nascimento C.D.S., de Albuquerque V.H.C., Chauhan S.S.. Analysis and Design of automatically generating for GPS Based Moving Object Tracking SystemInternational Conference on Artificial Intelligence and Smart Communication (AISC)Greater Noida, India.2023 1510.1109/AISC56616.2023.10085180[9]Almuhareb A., Almutairi W.A., Al-Tuwaijri H., Almubarak A., Khan M.. Recognition of Modern Arabic Poems.J. Softw.20151045446410.17706/jsw.10.4.454-464[10]Yadav S. P., Yadav S.. Mathematical implementation of fusion of medical images in continuous wavelet domainJournal of Advanced Research in dynamical and control system201910104554[11]Ribeiro B.L., Franck J.A.. Machine Learning to Classify Vortex Wakes of Energy Harvesting Oscillating Foils.AIAA J.2022[12]Naresh A., Venkata Krishna P.. An efficient approach for sentiment analysis using machine learning algorithm.Evol. Intell.202114272573110.1007/s12065-020-00429-1[13]Lahmadi A., Duque A., Heraief N., Francq J.. MitM Attack Detection in BLE Networks Using Reconstruction and Classification Machine Learning Techniques.PKDD/ECML Workshops202010.1007/978-3-030-65965-3_10[14]Abdullah T.A., Zahid M.S., Tang T.B., Ali W., Nasser M.. Explainable Deep Learning Model for Cardiac Arrhythmia Classification2022 International Conference on Future Trends in Smart Communities (ICFTSC)8792202210.1109/ICFTSC57269.2022.10039860[15]To T., Nguyen N., Vo D., Le-Pham N., Nguyen H., Tran M.. HCMUS MediaEval 2021: Multi-Model Decision Method Applied on Data Augmentation for COVID-19 Conspiracy Theories Classification.Proceedings of the MediaEval Workshop 2021Dec. 2021152123130

A Practicable E-commerce-Based Text-Classification System

Sidhant Das1,*
1 Centre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India

Abstract

This article examines the features of the dealer's brush list evaluation material in light of research findings on misleading assessment and identification of online purchasing. A Gated Recurrent Unit (GRU) model using keyword weighting is presented as a solution to the issue that it is challenging for the DL model to collect the feature data of the whole assessment text in a false evaluation identifying job. The TF-IDF technique is first used to generate the list of keywords, and then that list's weight is applied to the word vector. Finally, a weighted vector of words is categorised using this method of the model to finish the recognition job of erroneous evaluation, replacing the pooling component of the GRU model with a constrained Boltzmann machine. By using a variety of text categorization algorithms and comparing their results in terms of correctness and performance, this research aspires to represent the practical benefits of applications that use machine learning in the real world. We built a system that can run several text classification algorithms, and we used that system to create models that were educated using actual data taken from E-Commerce, a virtual fashion e-commerce platform. The Convolutional Neural Network technique achieved the greatest mean accuracy of 96.08% (with a range of 85.44% to 99.99%) with an average deviation of 5.65%.

Keywords: Feature extraction with machine learning, Text classification, Text mining.
*Corresponding author Sidhant Das: Centre for Interdisciplinary Research in Business and Technology, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India; E-mail: [email protected]

References

[1]Zhi-ming Q., Jinxian L.. Application of PCFA in Assessing Security Technique in E-Commerce Affairs2009 Second International Symposium on Electronic Commerce and Security413417200910.1109/ISECS.2009.25[2]Liu L.. Investigation on E-Commerce Based on Suffix Trees and Moore’s Law2009 International Conference on Environmental Science and Information Application Technology5275292009[3]Wei C-P., Hu P.J., Dong Y-X.. Managing document categories in e-commerce environments: an evolution-based approach.Eur. J. Inf. Syst.200211320822210.1057/palgrave.ejis.3000429[4]Zhang D., Zhang M.. The Enterprises Logistics Information Platform Framework based on E-Commerce2007 IEEE International Conference on Automation and Logistics880883200710.1109/ICAL.2007.4338689[5]Jian-ning L.. Security scheme for mobile agent-based e-commerce.Journal of Naval University of Engineering20241644550[6]Da-ke D.. Establish E-commerce Platform Based on Mobile Agent.Anhui Nongye Daxue Xuebao2005[7]Yadav S.P., Baalamurugan K., Kumar S.R., Kumar A., Kumar V., Padmanaban S.. Blockchain Security.In Blockchain Security in Cloud Computing, EAI/Springer Innovations in Communication and Computing, Cham: Springer202112010.1007/978-3-030-70501-5_1[8]Khan M.. Fingerprint Biometric-based Self-Authentication and Deniable Authentication Schemes for the Electronic World.IETE Tech. Rev.200926319119510.4103/0256-4602.50703[9]Dang V.D.. Coalition formation and operation in virtual organisations2004[10]Xiao D., Liao X., Tang G., Li C.. Using Chebyshev chaotic map to construct infinite length hash chains2004 International Conference on Communications, Circuits and Systems (IEEE Cat. No.04EX914)2004111112[11]Singh P.D., Wen G.K., Kee D.M., Yee G.S., Ying L.C., Ling F.K., Shammas M., Tandra G.R., Sin L.G.. The impact of AirAsia’s e-commerce websites on its consumer buying behavior.Int. J. Tourism Hosp. Asia Pac202353112125[12]