2023 IEEE Conference on Computer Applications (ICCA)最新文献

筛选
英文 中文
Adult Income Classification using Machine Learning Techniques 使用机器学习技术的成人收入分类
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10181907
Ei Ei Moe, S. Win, Kyi Lai Lai Khine
{"title":"Adult Income Classification using Machine Learning Techniques","authors":"Ei Ei Moe, S. Win, Kyi Lai Lai Khine","doi":"10.1109/ICCA51723.2023.10181907","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181907","url":null,"abstract":"Nowadays, the economic growth of country is often measured by the increasing gross domestic product (GDP). GDP is an effective indicator in the national economic accounting system and has a significant reference function for political decision and regional development. GDP improvement shows economic development level, national income and spending power of a country or region. In actual accounting, three methods can be used to compute GDP namely production, expenditure, or income approach which respectively reflect gross domestic product and its composition from different aspects. This paper is presented to predict the GDP of person based on adult income data with the age from 17 to 90 using popular supervised learning techniques. The models are tested on more than 30000 data records of over forty countries especially United States. The experiments show that the different results between Naïve Bayes, J48 and Random Forest classifiers.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116665358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Algorithm for Myanmar Syllable Segmentation based on the Official Standard Myanmar Unicode Text 基于官方标准缅甸语Unicode文本的缅甸语音节分割算法
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10181391
Sun Thurain Moe, Than Than Nwe
{"title":"An Algorithm for Myanmar Syllable Segmentation based on the Official Standard Myanmar Unicode Text","authors":"Sun Thurain Moe, Than Than Nwe","doi":"10.1109/ICCA51723.2023.10181391","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181391","url":null,"abstract":"The Myanmar language and its characters are complex and do not directly resemble any other language, so current linguistic and NLP theories do not seem to work well for Myanmar script. Syllable segmentation, which is the basic and important level for Myanmar NLP, Myanmar Syllable Segmentation (MSS) Algorithm will be presented in this paper based on the Pyidaungsu font currently designated as the official Myanmar Unicode standard. After several trials and successful removal of confusion, we obtained a set of syllable segmentation rules using 16 vowels and one symbol used in consonant conjuncts. It was found that the rule set using in our proposed algorithm, which is clear and simple enough for the public to understand, can correctly segmented all possible syllable combinations included in Myanmar script.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121280797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Detection using Upper Local Ternary Features with SVM Classification 基于SVM分类的上局部三元特征车辆检测
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10181882
Linn Linn Thike, Thin Lai Lai Thein
{"title":"Vehicle Detection using Upper Local Ternary Features with SVM Classification","authors":"Linn Linn Thike, Thin Lai Lai Thein","doi":"10.1109/ICCA51723.2023.10181882","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181882","url":null,"abstract":"Local Ternary Pattern (LTP) is an extension of Local Binary Pattern (LBP), which is known as a standard textural descriptor for various recognition systems. There are a lot of usages of LBP and LTP in the variety of pattern recognition in different fields. It is also efficient features for vehicle detection, recognition and monitoring. This paper proposed an algorithm that applied the operator to upper LTP (upper-LTP) matrix as feature vector to calculate instead of pattern stream generation. This paper analyzes the accuracy rate between the Complemented- Uniform Local Binary Pattern (Complemented-ULBP) which is our previous work, Uniform Local Binary Pattern (ULBP), simple Local Binary Pattern (LBP) and the proposed system, Upper-LTP, with SVM classification.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121892881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Malicious Users on Twitter Using Topic Modeling 使用主题建模检测Twitter上的恶意用户
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10181604
M. Swe, Nyein Nyein Myo
{"title":"Detecting Malicious Users on Twitter Using Topic Modeling","authors":"M. Swe, Nyein Nyein Myo","doi":"10.1109/ICCA51723.2023.10181604","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181604","url":null,"abstract":"Social networking sites like Twitter, Weibo and Facebook etc. have played a significant role in daily lives of people as they promote innovative ways to connect efficiently and exchange their knowledge. The benefits of these social network services cause them to expand their community rapidly. Most current social network sites face additional issue of coping with unauthorized users and their high levels of violence activities, which distribute fake news, worms and viruses, etc. to the genuine users. Spam distribution degrades user experience and also has a negative effect on server-side functions such as knowledge discovery, user activity analysis and service selection. In this paper, whitelist and blacklist are built which can help to distinguish malicious users and legitimate users. With the aid of blacklist and whitelist, we introduced two new features: malicious probability and legitimate probability. Evaluation has been carried out on the CRESCI-2015 dataset. Three machine learning classifiers like AdaBoost, Bagging and Random Forest. Random Forest obtained the highest 99.7% detection score.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126692805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Churn Prediction Models Using Gradient Boosted Tree and Random Forest Classifiers 使用梯度提升树和随机森林分类器的客户流失预测模型
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10181933
Yu Yu Win, Cing Gel Vung
{"title":"Churn Prediction Models Using Gradient Boosted Tree and Random Forest Classifiers","authors":"Yu Yu Win, Cing Gel Vung","doi":"10.1109/ICCA51723.2023.10181933","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181933","url":null,"abstract":"In the era of a competitive market, every organization has been used a lot of marketing techniques to maximize their profit and to preserve the existing flow of customer relationships with the firm. The cost of attracting a new customer incurs more times than retaining existing ones. Thus, customer relationship management (CRM) analyzers try to know the behavior of customers and find the causes of a customer churning. To produce a list of telecom customers who likely to churn in the future, this paper presents the two churn prediction models using wrapper-based Forward Feature Selection (FFS) with Gradient Boosted Tree and Random Forest classifiers. This work analyzes the FFS with five comparative classifier models based on the telecom data using the KNIME analytics platform and deploys the two most accurate models with a new dataset to predict the future churn. Our models achieve the accuracies of 96.2% and 96.89% respectively.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121562204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Network Intrusion Detection Using Long Short-Term Memory Recurrent Neural Network 基于长短期记忆递归神经网络的物联网网络入侵检测
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10182005
Yee Mon Thant, Mie Mie Su Thwin, Chaw Su Htwe
{"title":"IoT Network Intrusion Detection Using Long Short-Term Memory Recurrent Neural Network","authors":"Yee Mon Thant, Mie Mie Su Thwin, Chaw Su Htwe","doi":"10.1109/ICCA51723.2023.10182005","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10182005","url":null,"abstract":"The Internet of Things (IoT) is the latest technologies for everyday physical devices which the digitally connected to the internet or each other. With the rapidly development of IoT platform, IoT have been encountered many malicious activities. IoT security is one of the most critical issues in developing and implementing of IoT platform. Intrusion Detection System (IDS) play an important role for security solution in IoT network. In our paper, we proposed an effective IDS model for intrusion detection in IoT network by using Long Short-Term Memory Recurrent Neural Network (LSTM RNN). Performance of proposed model to identify correctly the normal and attack has been evaluated on the benchmark intrusion dataset, UNSW-NB15 dataset which applied in the most of IoT intrusion detection research. Moreover, in this survey, we studied the performance of the proposed LSTM RNN IDS model by contrasting the Recurrent Neural Network (simple RNN) algorithm. The experimental results show the efficiency of proposed model with accuracy, precision, recall and F1 score. Our proposed LSTM RNN model outperformed than the simple RNN model to build a highly effective intrusion detection model with accuracy over 99% for IoT network attacks.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127804679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retail Demand Forecasting Using Sequence to Sequence Long Short-Term Memory Networks 基于序列对序列长短期记忆网络的零售需求预测
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10181450
Mon Myat Phyu, M. Khine
{"title":"Retail Demand Forecasting Using Sequence to Sequence Long Short-Term Memory Networks","authors":"Mon Myat Phyu, M. Khine","doi":"10.1109/ICCA51723.2023.10181450","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181450","url":null,"abstract":"Demand forecasting is crucial for a retail business as it can greatly affect everything ranging from promotion, pricing, product assortment and inventory. Building a reliable and useful demand forecasting model is still a challenging task. Machine learning techniques used for demand forecasting including Random Forest Regressor and Support Vector Regressor are inadequate when dealing with time series. Recent works show that Long Short-Term Memory (LSTM) networks can learn non-linear relationships and time-series specific information from retail time series data. In this paper, a methodology based on Sequence to Sequence Long Short-Term Memory (Seq2Seq LSTM) network is proposed to tackle short-term retail demand forecasting problem. The Seq2Seq architecture commonly used for language translation is adapted to retail demand forecasting to improve LSTM's ability of learning long-range temporal dependencies from retail time series data. Experiments are evaluated with different input sequence lengths on store item sales dataset with daily resolution data. Bayesian Optimization is conducted to tune models' hyperparameters and examine whether it could enhance the prediction accuracy of the models. In order to gauge the robustness of the proposed forecasting model, it is compared against Standard LSTM and Vanilla RNN.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Based Ecommerce Model for Myanmar Hotel Industry 基于机器学习的缅甸酒店业电子商务模型
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10181748
Tin Nilar Win, Nang Khine Zar Lwin
{"title":"Machine Learning Based Ecommerce Model for Myanmar Hotel Industry","authors":"Tin Nilar Win, Nang Khine Zar Lwin","doi":"10.1109/ICCA51723.2023.10181748","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181748","url":null,"abstract":"In Ecommerce world, social media becomes very important part for communicating customers to business because business can collect and prepare their industry according to the reviews of the customers through social media network. Ecommerce model is one important model from real business model in which customer can review products or services of the business companies. This model helps to predict and understand the behavior of customers where it supports the improvement quality of industry. In this research paper, Support Vector Machine (SVM), Reduced Error Pruning Tree (REPTree), and Convolutional Neural Network (CNN) classifiers are applied for classification of the travelers 'reviews to improve the Myanmar Hotel Industry. Reviews classification supports for the Ecommerce model to improve the performance of the business industry. Moreover, the performance analysis of the classifiers based on reviews classification are evaluated in this system. The classification result of the CNN classifiers reached 90.85% on this system.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126207554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Conceptual Framework for ICT Policy Development in Myanmar Education Sector 缅甸教育部门信息通信技术政策发展的概念框架
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10181934
Htain Lynn Aung, Nang Saing Moon Kham
{"title":"A Conceptual Framework for ICT Policy Development in Myanmar Education Sector","authors":"Htain Lynn Aung, Nang Saing Moon Kham","doi":"10.1109/ICCA51723.2023.10181934","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181934","url":null,"abstract":"The development of ICT for Education in Myanmar is crucial for digital education transformation and sustainable development to be in line with the targets of the National Education Policy and Global Sustainable Development Goal (SDG) goal-4 commitment. The paper argues for the compliance of ICT Policy in Myanmar Education sector by measuring ICT access, ICT use and skills, and ICT impact for Myanmar Digital Education Transformation and reaching the national sustainable development education goal. In recognition of Myanmar education reform, this has challenges to reach the objective of National Education Law and SDG-4 to apply the modern technology in education and quality education because ICT for Education policy development and digital technology investments are not ready in Myanmar Education. This paper draws on the international practice of ITU-ICT Development Index (IDI) and SABER ICT policy framework for developing the conceptual framework on National ICT policy development in Myanmar Education sector.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116665682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Actionable Static Analysis Code Warnings Identification with SMOTE-based Classification 基于smote分类的可操作静态分析代码警告识别
2023 IEEE Conference on Computer Applications (ICCA) Pub Date : 2023-02-27 DOI: 10.1109/ICCA51723.2023.10181854
Y. Win, Naw Lay Wah
{"title":"Actionable Static Analysis Code Warnings Identification with SMOTE-based Classification","authors":"Y. Win, Naw Lay Wah","doi":"10.1109/ICCA51723.2023.10181854","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181854","url":null,"abstract":"Automatic static code analysis warnings are produced by tools for static code analysis (like FindBugs), but they suffer from an excessive number of false alarms that are ignored by developers. Accurately identifying actionable static analysis code warnings helps developers be more efficient, and the static analysis tool can be made more useful. In reality, static analysis warning datasets have a class imbalance in actionable warning identification since there are a greater number of un-actionable (false alarms) than actionable alarms. Data sampling techniques address the issue of class imbalance in classification, which is a problem with the quality of the collected data. By producing synthetic instances that may be acted upon, the Synthetic Minority Oversampling Technique (SMOTE) and its variations assist in solving the problem of class imbalance. SVM, Random Forest, Naïve Bayes, and Decision Tree classifiers were created as classification models using the eight Java open-source software projects datasets (Cassandra, Jmeter, Commons.lang, Luence-solr, Ant, Tomcat, Maven, and Derby). The performance of the developed models is evaluated using precision, recall, f-measure, ROC and false positive rate. The analysis of the experimental findings revealed that the SMOTE not only addressed the issue of class imbalance but also enhanced the classification performance and reduced the false positive rate of the experimental models when it came to the identification of warnings.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125261903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信