{"title":"Adult Income Classification using Machine Learning Techniques","authors":"Ei Ei Moe, S. Win, Kyi Lai Lai Khine","doi":"10.1109/ICCA51723.2023.10181907","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181907","url":null,"abstract":"Nowadays, the economic growth of country is often measured by the increasing gross domestic product (GDP). GDP is an effective indicator in the national economic accounting system and has a significant reference function for political decision and regional development. GDP improvement shows economic development level, national income and spending power of a country or region. In actual accounting, three methods can be used to compute GDP namely production, expenditure, or income approach which respectively reflect gross domestic product and its composition from different aspects. This paper is presented to predict the GDP of person based on adult income data with the age from 17 to 90 using popular supervised learning techniques. The models are tested on more than 30000 data records of over forty countries especially United States. The experiments show that the different results between Naïve Bayes, J48 and Random Forest classifiers.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116665358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm for Myanmar Syllable Segmentation based on the Official Standard Myanmar Unicode Text","authors":"Sun Thurain Moe, Than Than Nwe","doi":"10.1109/ICCA51723.2023.10181391","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181391","url":null,"abstract":"The Myanmar language and its characters are complex and do not directly resemble any other language, so current linguistic and NLP theories do not seem to work well for Myanmar script. Syllable segmentation, which is the basic and important level for Myanmar NLP, Myanmar Syllable Segmentation (MSS) Algorithm will be presented in this paper based on the Pyidaungsu font currently designated as the official Myanmar Unicode standard. After several trials and successful removal of confusion, we obtained a set of syllable segmentation rules using 16 vowels and one symbol used in consonant conjuncts. It was found that the rule set using in our proposed algorithm, which is clear and simple enough for the public to understand, can correctly segmented all possible syllable combinations included in Myanmar script.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121280797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle Detection using Upper Local Ternary Features with SVM Classification","authors":"Linn Linn Thike, Thin Lai Lai Thein","doi":"10.1109/ICCA51723.2023.10181882","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181882","url":null,"abstract":"Local Ternary Pattern (LTP) is an extension of Local Binary Pattern (LBP), which is known as a standard textural descriptor for various recognition systems. There are a lot of usages of LBP and LTP in the variety of pattern recognition in different fields. It is also efficient features for vehicle detection, recognition and monitoring. This paper proposed an algorithm that applied the operator to upper LTP (upper-LTP) matrix as feature vector to calculate instead of pattern stream generation. This paper analyzes the accuracy rate between the Complemented- Uniform Local Binary Pattern (Complemented-ULBP) which is our previous work, Uniform Local Binary Pattern (ULBP), simple Local Binary Pattern (LBP) and the proposed system, Upper-LTP, with SVM classification.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121892881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Malicious Users on Twitter Using Topic Modeling","authors":"M. Swe, Nyein Nyein Myo","doi":"10.1109/ICCA51723.2023.10181604","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181604","url":null,"abstract":"Social networking sites like Twitter, Weibo and Facebook etc. have played a significant role in daily lives of people as they promote innovative ways to connect efficiently and exchange their knowledge. The benefits of these social network services cause them to expand their community rapidly. Most current social network sites face additional issue of coping with unauthorized users and their high levels of violence activities, which distribute fake news, worms and viruses, etc. to the genuine users. Spam distribution degrades user experience and also has a negative effect on server-side functions such as knowledge discovery, user activity analysis and service selection. In this paper, whitelist and blacklist are built which can help to distinguish malicious users and legitimate users. With the aid of blacklist and whitelist, we introduced two new features: malicious probability and legitimate probability. Evaluation has been carried out on the CRESCI-2015 dataset. Three machine learning classifiers like AdaBoost, Bagging and Random Forest. Random Forest obtained the highest 99.7% detection score.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126692805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Churn Prediction Models Using Gradient Boosted Tree and Random Forest Classifiers","authors":"Yu Yu Win, Cing Gel Vung","doi":"10.1109/ICCA51723.2023.10181933","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181933","url":null,"abstract":"In the era of a competitive market, every organization has been used a lot of marketing techniques to maximize their profit and to preserve the existing flow of customer relationships with the firm. The cost of attracting a new customer incurs more times than retaining existing ones. Thus, customer relationship management (CRM) analyzers try to know the behavior of customers and find the causes of a customer churning. To produce a list of telecom customers who likely to churn in the future, this paper presents the two churn prediction models using wrapper-based Forward Feature Selection (FFS) with Gradient Boosted Tree and Random Forest classifiers. This work analyzes the FFS with five comparative classifier models based on the telecom data using the KNIME analytics platform and deploys the two most accurate models with a new dataset to predict the future churn. Our models achieve the accuracies of 96.2% and 96.89% respectively.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121562204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Network Intrusion Detection Using Long Short-Term Memory Recurrent Neural Network","authors":"Yee Mon Thant, Mie Mie Su Thwin, Chaw Su Htwe","doi":"10.1109/ICCA51723.2023.10182005","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10182005","url":null,"abstract":"The Internet of Things (IoT) is the latest technologies for everyday physical devices which the digitally connected to the internet or each other. With the rapidly development of IoT platform, IoT have been encountered many malicious activities. IoT security is one of the most critical issues in developing and implementing of IoT platform. Intrusion Detection System (IDS) play an important role for security solution in IoT network. In our paper, we proposed an effective IDS model for intrusion detection in IoT network by using Long Short-Term Memory Recurrent Neural Network (LSTM RNN). Performance of proposed model to identify correctly the normal and attack has been evaluated on the benchmark intrusion dataset, UNSW-NB15 dataset which applied in the most of IoT intrusion detection research. Moreover, in this survey, we studied the performance of the proposed LSTM RNN IDS model by contrasting the Recurrent Neural Network (simple RNN) algorithm. The experimental results show the efficiency of proposed model with accuracy, precision, recall and F1 score. Our proposed LSTM RNN model outperformed than the simple RNN model to build a highly effective intrusion detection model with accuracy over 99% for IoT network attacks.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127804679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retail Demand Forecasting Using Sequence to Sequence Long Short-Term Memory Networks","authors":"Mon Myat Phyu, M. Khine","doi":"10.1109/ICCA51723.2023.10181450","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181450","url":null,"abstract":"Demand forecasting is crucial for a retail business as it can greatly affect everything ranging from promotion, pricing, product assortment and inventory. Building a reliable and useful demand forecasting model is still a challenging task. Machine learning techniques used for demand forecasting including Random Forest Regressor and Support Vector Regressor are inadequate when dealing with time series. Recent works show that Long Short-Term Memory (LSTM) networks can learn non-linear relationships and time-series specific information from retail time series data. In this paper, a methodology based on Sequence to Sequence Long Short-Term Memory (Seq2Seq LSTM) network is proposed to tackle short-term retail demand forecasting problem. The Seq2Seq architecture commonly used for language translation is adapted to retail demand forecasting to improve LSTM's ability of learning long-range temporal dependencies from retail time series data. Experiments are evaluated with different input sequence lengths on store item sales dataset with daily resolution data. Bayesian Optimization is conducted to tune models' hyperparameters and examine whether it could enhance the prediction accuracy of the models. In order to gauge the robustness of the proposed forecasting model, it is compared against Standard LSTM and Vanilla RNN.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Based Ecommerce Model for Myanmar Hotel Industry","authors":"Tin Nilar Win, Nang Khine Zar Lwin","doi":"10.1109/ICCA51723.2023.10181748","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181748","url":null,"abstract":"In Ecommerce world, social media becomes very important part for communicating customers to business because business can collect and prepare their industry according to the reviews of the customers through social media network. Ecommerce model is one important model from real business model in which customer can review products or services of the business companies. This model helps to predict and understand the behavior of customers where it supports the improvement quality of industry. In this research paper, Support Vector Machine (SVM), Reduced Error Pruning Tree (REPTree), and Convolutional Neural Network (CNN) classifiers are applied for classification of the travelers 'reviews to improve the Myanmar Hotel Industry. Reviews classification supports for the Ecommerce model to improve the performance of the business industry. Moreover, the performance analysis of the classifiers based on reviews classification are evaluated in this system. The classification result of the CNN classifiers reached 90.85% on this system.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126207554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Conceptual Framework for ICT Policy Development in Myanmar Education Sector","authors":"Htain Lynn Aung, Nang Saing Moon Kham","doi":"10.1109/ICCA51723.2023.10181934","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181934","url":null,"abstract":"The development of ICT for Education in Myanmar is crucial for digital education transformation and sustainable development to be in line with the targets of the National Education Policy and Global Sustainable Development Goal (SDG) goal-4 commitment. The paper argues for the compliance of ICT Policy in Myanmar Education sector by measuring ICT access, ICT use and skills, and ICT impact for Myanmar Digital Education Transformation and reaching the national sustainable development education goal. In recognition of Myanmar education reform, this has challenges to reach the objective of National Education Law and SDG-4 to apply the modern technology in education and quality education because ICT for Education policy development and digital technology investments are not ready in Myanmar Education. This paper draws on the international practice of ITU-ICT Development Index (IDI) and SABER ICT policy framework for developing the conceptual framework on National ICT policy development in Myanmar Education sector.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116665682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Actionable Static Analysis Code Warnings Identification with SMOTE-based Classification","authors":"Y. Win, Naw Lay Wah","doi":"10.1109/ICCA51723.2023.10181854","DOIUrl":"https://doi.org/10.1109/ICCA51723.2023.10181854","url":null,"abstract":"Automatic static code analysis warnings are produced by tools for static code analysis (like FindBugs), but they suffer from an excessive number of false alarms that are ignored by developers. Accurately identifying actionable static analysis code warnings helps developers be more efficient, and the static analysis tool can be made more useful. In reality, static analysis warning datasets have a class imbalance in actionable warning identification since there are a greater number of un-actionable (false alarms) than actionable alarms. Data sampling techniques address the issue of class imbalance in classification, which is a problem with the quality of the collected data. By producing synthetic instances that may be acted upon, the Synthetic Minority Oversampling Technique (SMOTE) and its variations assist in solving the problem of class imbalance. SVM, Random Forest, Naïve Bayes, and Decision Tree classifiers were created as classification models using the eight Java open-source software projects datasets (Cassandra, Jmeter, Commons.lang, Luence-solr, Ant, Tomcat, Maven, and Derby). The performance of the developed models is evaluated using precision, recall, f-measure, ROC and false positive rate. The analysis of the experimental findings revealed that the SMOTE not only addressed the issue of class imbalance but also enhanced the classification performance and reduced the false positive rate of the experimental models when it came to the identification of warnings.","PeriodicalId":110447,"journal":{"name":"2023 IEEE Conference on Computer Applications (ICCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125261903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}