{"title":"Extractive Myanmar News Summarization Using Centroid Based Word Embedding","authors":"Soe Soe Lwin, K. Nwet","doi":"10.1109/AITC.2019.8921386","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921386","url":null,"abstract":"Nowadays, many researches are going on for text summarization because there are a lot of data on the internet and it is required to process, store and manage. Text summarization is a process of distilling important information from the original text and presents that information in the form of summary. The system is proposed to summarize Myanmar news with centroid based method. Centroid based method ranks the sentences based on their similarity to the centroid. Centroid based method uses the bags of words model to represent sentences. Bags of words representation does not capture the semantic relationship between words. To overcome this problem, centroid based method is combined with word embedding representation instead of bags of words in this paper. Experiments were done on Myanmar news dataset. Centroid based on word embedding method gets better performance than centroid based on bags of words method.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134142151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Recognition based on Illumination Invariant Techniques Model","authors":"Hla Myat Maw, S. Thu, M. Mon","doi":"10.1109/AITC.2019.8921027","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921027","url":null,"abstract":"In modern years, face recognition is becoming popular in many applications in different areas being videoconferencing, security, banking, law requirement, and human-computer interaction. The performance of the face verification system depends on many challenges. The Most challenge in face recognition is illumination variations. In this approach, Median Filter, Gabor Filter, and Histogram Equalization are used to reduce the illumination effect of the face images as the preprocessing stage. The extraction of the Eigen faces features use Principal Component Analysis (PCA). After that, recognize face by using multiclass Support Vector Machines. The standard databases of ORL and Yale are used in the experiment. The results show that the system efficiently increased the accuracy of face recognition rate of the system, especially in various lighting situations.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132549862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Price Forecasting by Back Propagation Neural Network Model","authors":"Thura Zaw, Khin Mo Mo Tun, Aung Nway Oo","doi":"10.1109/AITC.2019.8921396","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921396","url":null,"abstract":"The process of predicting what will happen in the future by gathering and analyzing past and current data is referred to as forecasting. When trying to make a good forecasting, Back Propagation Neural Network (BPNN) is constructed with different aspects of viewpoints for the high accuracy of that forecasting. This paper introduces efficient and scalable BPNN model for forecasting, allowing different views on data to fuse the responses of the model in complex and exact forecasting. To exploit the application area of the model, Rice Price Data Set of Pyapon Town in Ayeyarwaddy Division, Republic of the Union of Myanmar was used as case study. Four main factors influenced on rice price and rice production are assumed as input neurons to visible layers of the model. BPNN model with four input factors proves that the accuracy is over 80 percentage.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133475985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Anti-spoofing using Eyes Movement and CNN-based Liveness Detection","authors":"Phoo Pyae Pyae Linn, Ei Chaw Htoon","doi":"10.1109/AITC.2019.8921091","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921091","url":null,"abstract":"Biometric authentication is more and more popular these days. Among authentication techniques, face recognition is the most widely used technique. Face anti-spoofing is the core of the biometric system. Face Anti-spoofing is about prevention of spoofing attack by detecting the face image is live or not before feeding it to the system. In this paper, we propose two streamed line approaches for face anti-spoofing. First approach is detecting of eyes movement and second approach is CNN-based liveness detection by extracting the local features. Experiment demonstrates on comparison of previous works with HTER (Half Total Error Rate) over three datasets: NUAA imposter dataset, Replay Attack and OWN replay dataset which is created in this paper.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming","authors":"May Thet Tun, Dim En Nyaung, Myat Pwint Phyu","doi":"10.1109/AITC.2019.8920960","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920960","url":null,"abstract":"In the information era, the size of network traffic is complex because of massive Internet-based services and rapid amounts of data. The more network traffic has enhanced, the more cyberattacks have dramatically increased. Therefore, cybersecurity intrusion detection has been a challenge in the current research area in recent years. The Intrusion detection system requires high-level protection and detects modern and complex attacks with more accuracy. Nowadays, big data analytics is the main key to solve marketing, security and privacy in an extremely competitive financial market and government. If a huge amount of stream data flows within a short period time, it is difficult to analyze real-time decision making. Performance analysis is extremely important for administrators and developers to avoid bottlenecks. The paper aims to reduce time-consuming by using Apache Kafka and Spark Streaming. Experiments on the UNSWNB-15 dataset indicate that the integration of Apache Kafka and Spark Streaming can perform better in terms of processing time and fault-tolerance on the huge amount of data. According to the results, the fault tolerance can be provided by the multiple brokers of Kafka and parallel recovery of Spark Streaming. And then, the multiple partitions of Apache Kafka increase the processing time in the integration of Apache Kafka and Spark Streaming.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124621878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualization of Twitter Sentiment during the Period of US Banned Huawei","authors":"Nann Hwan Khun, Hninn Aye Thant","doi":"10.1109/AITC.2019.8921014","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921014","url":null,"abstract":"The polarity analysis of sentiments based on users’ expressions on several events has been in much interest for the research. Recently, social media has been popular and it is widely used as a proxy platform to gauge public opinions in real-time. With the growth of microblog sites on the Web, people have started using blog sites like Twitter and other similar social services to express their opinions and emotions on a wide variety of topics. We proposed a visual sentiment analysis framework for US-China trade war related with US banned on Chinese telecoms giant Huawei Technologies. The proposed framework consists of two components, sentiment analysis modeling and geographic visualization. We focus on using Twitter, the most popular microblogging platform, for the task of sentiment analysis by applying lexicon-based approach. This geographic visualization system can help people for better understanding the changes of public sentiment reactions along with the duration and mostly interested regions of Twitter users on this case. In our research, we worked with English language; however, the proposed technique can also be used with any other language.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Partition Around Medoids Algorithm for Large Volume of Data","authors":"N. Y. Aung, Kyawt Kyawt San, Swe Zin Hlaing","doi":"10.1109/AITC.2019.8920955","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920955","url":null,"abstract":"Clustering is a crucial data-mining tool for analyzing valuable information from a massive data volume. Partition Around Medoids (PAM), one of the clustering algorithms that is simple, scalable and can easily implement but sensitive to initial medoids and vast amount of data. Meta-heuristics algorithms such as Ant Colony Optimization algorithm, Bat algorithm, Bees algorithm, etc. used to introduce the combinative in the clustering algorithm that will gives optimum medoids and hence find the better cluster quality. But, the main issue of very large data is in time consumption and lack of quality. To avoid issued of time consumption, existing clustering approaches are run on parallel frameworks. So, this paper proposed the hybrid approach to integrate PAM and Bat which one of meta-heuristic algorithm to obtain optimal initial medoids and PAM to get the better clusters. To handle a large number of datasets for fast and parallel processing, all experiments are done in Apache Spark Framework.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114549289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Domain Oriented Aspect Detection for Student Feedback System","authors":"Nilar Soe, P. Soe","doi":"10.1109/AITC.2019.8921372","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921372","url":null,"abstract":"Opinion Mining becomes popular and seeking the information on online review or feedback system. In conventional opinion mining techniques, it can examine how people feel about the given topic such as positive or negative feeling upon the feedback comments. In current trend, the goal of sentiment analysis is to dig the aspect word that is the fine grained sentiment information on various domains. So, the proposed system aims to analyze the aspect level sentiment analysis on student feedback system. The required feedback data are collected from the University of Computer Studies, Taungoo(UCST). This system uses OpenNLP parser for POS tagging and sentiWordNet lexical resources for defining the wordScore. The Domain Specific Ontology relating to UCST is created in the preprocessing stage of this system which supports the main process Aspect Detection. Finally, the accuracy of this system is measured by precision and recall by applying the Naïve Bayes Classification Approach on the dataset of feedbacks and their opinion. This system will assist the administrator of UCST to evaluate the performance of the University.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125064044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph-based Indexing Method for Searching in RDF Data","authors":"Khin Myat Kyu, Aung Nway Oo","doi":"10.1109/AITC.2019.8920921","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920921","url":null,"abstract":"RDF is a generic graph-based data model of Semantic Web, and SPARQL is a query language for accessing the RDF data. With the increasing size of RDF data, answering complex SPARQL queries is expensive because multiple self-joins are needed to process. In this work, we consider an indexing and searching approach based on the graph structure of RDF data to reduce the number of join operations. It can speed up the queries’ performance and support chain and star shaped SPARQL query. Chain and star shaped subgraphs are extracted from the RDF data graph by considering the structure of edges around each vertex. The subgraphs obtained are stored as the index, named as CS-index. To execute a query, the query is firstly decomposed into query subgraphs based on the common join variable of its all triple patterns. And the query results are retrieved by searching the query subgraphs in CS-index, not in the whole data graph. The proposed index structure and searching approach tend to speed up the query response time by reducing the number of joins. We conduct a performance study on LUBM data set and see that our method outperforms the contest by a few orders of magnitude.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130181308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposal of Yoga Pose Assessment Method Using Pose Detection for Self-Learning","authors":"Maybel Chan Thar, Khine Zar Ne Winn, N. Funabiki","doi":"10.1109/AITC.2019.8920892","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920892","url":null,"abstract":"Nowadays, Yoga is popular around the world. A lot of people are participating in it by themselves through watching TV/videos or teaching each other. However, it is not easy for novice people to find the incorrect parts of their Yoga poses by themselves. In this paper, we propose a Yoga pose assessment method using pose detection to help the self-learning of Yoga. The system first detects a Yoga pose using multi parts detection only with PC camera. Then, it calculates the difference of the specified body angles between the pose of an instructor and that of a user. Then, it calculates the difference of the specified body angles between the pose of an instructor and that of a user, and suggests the correction if larger than the given threshold. The total angle difference values are calculated averagely and defined as performance class level in Table 1. For evaluations, we applied the proposal to three persons with three Yoga poses of basic and easy Yoga poses for beginners and confirmed that it found the incorrect parts of each pose.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114966818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}