{"id":250500,"date":"2024-05-14T15:21:58","date_gmt":"2024-05-14T08:21:58","guid":{"rendered":"https:\/\/as.nida.ac.th\/?page_id=250500"},"modified":"2026-02-12T11:22:37","modified_gmt":"2026-02-12T04:22:37","slug":"working-papers","status":"publish","type":"page","link":"https:\/\/as.nida.ac.th\/en\/working-papers\/","title":{"rendered":"Working Papers"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;off|tablet&#8221; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#ff6d29&#8243; background_image=&#8221;https:\/\/as.nida.ac.th\/storage\/2024\/01\/venture_02.png&#8221; custom_padding=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;60px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-a1027310-177f-434f-a6d4-64bc6bfc2d09%22:%91%22background_color%22%93}&#8221;][et_pb_row use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;4&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;d72c0383-6487-4f2c-ac5c-7d48a6376757&#8243; header_font=&#8221;Chakra Petch|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;60px&#8221; header_line_height=&#8221;1.2em&#8221; header_font_size_tablet=&#8221;50px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 class=\"elementor-heading-title elementor-size-default\">Working Papers<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/as.nida.ac.th\/storage\/2024\/01\/electric-services-38.png&#8221; title_text=&#8221;electric-services-38&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|-15%|||false|false&#8221; custom_margin_tablet=&#8221;|-5%|||false|false&#8221; custom_margin_phone=&#8221;|-5%|||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Staff&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.26.0&#8243; custom_margin=&#8221;|auto|-41px|auto||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.26.0&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#fe6d2a&#8221; text_font_size=&#8221;70px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3 class=\"gb-text gb-text-8099a531\" style=\"text-align: center;\">\u0e04\u0e13\u0e30\u0e2a\u0e16\u0e34\u0e15\u0e34\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c\u0e44\u0e14\u0e49\u0e08\u0e31\u0e14\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e19\u0e33\u0e40\u0e2a\u0e19\u0e2d\u0e1c\u0e25\u0e07\u0e32\u0e19 Working Papers<br \/>\u0e20\u0e32\u0e22\u0e43\u0e15\u0e49\u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e07\u0e32\u0e19\u0e1b\u0e23\u0e30\u0e0a\u0e38\u0e21\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e0a\u0e32\u0e15\u0e34\u0e41\u0e25\u0e30\u0e19\u0e32\u0e19\u0e32\u0e0a\u0e32\u0e15\u0e34 4th NIC \u2013 NIDA Conference, 2025<br \/>National Institute Of Development Administration<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4 style=\"text-align: center;\"><span>\u0e42\u0e14\u0e22\u0e44\u0e14\u0e49\u0e23\u0e31\u0e1a\u0e40\u0e01\u0e35\u0e22\u0e23\u0e15\u0e34\u0e08\u0e32\u0e01 \u0e23\u0e2d\u0e07\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e32\u0e08\u0e32\u0e23\u0e22\u0e4c\u0e14\u0e23.\u0e40\u0e0a\u0e32\u0e27\u0e25\u0e34\u0e15 \u0e08\u0e35\u0e19\u0e2d\u0e19\u0e31\u0e19\u0e17\u0e4c \u0e41\u0e25\u0e30\u0e23\u0e2d\u0e07\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e32\u0e08\u0e32\u0e23\u0e4c \u0e14\u0e23.\u0e19\u0e34\u0e18\u0e34\u0e40\u0e14\u0e0a \u0e04\u0e39\u0e2b\u0e32\u0e17\u0e2d\u0e07\u0e2a\u0e33\u0e24\u0e17\u0e18\u0e34\u0e4c\u0e40\u0e1b\u0e47\u0e19\u0e1c\u0e39\u0e49\u0e27\u0e34\u0e1e\u0e32\u0e01\u0e28\u0e4c\u0e1a\u0e17\u0e04\u0e27\u0e32\u0e21<\/span><\/h4>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/as.nida.ac.th\/storage\/2026\/02\/539949716_1262077699264104_6715374486699383280_n.jpg&#8221; title_text=&#8221;539949716_1262077699264104_6715374486699383280_n&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;565.6px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"gb-element-1b7ca729\"><\/div>\n<div class=\"gb-element-1b7ca729\">\n<h2 class=\"gb-text gb-text-fda71df3 title-line\"><strong>Authors<\/strong><\/h2>\n<p class=\"gb-text\"><span>Mongkol Hunkrajok , Wanrudee Skulpakdee<\/span><br \/>\u0e2d\u0e32\u0e08\u0e32\u0e23\u0e22\u0e4c \u0e04\u0e13\u0e30\u0e2a\u0e16\u0e34\u0e15\u0e34\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15\u0e1e\u0e31\u0e12\u0e19\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c<\/p>\n<\/div>\n<div class=\"gb-element-3d847055\">\n<h2 class=\"gb-text gb-text-643b5825 title-line\"><strong><\/strong><\/h2>\n<h2 class=\"gb-text gb-text-643b5825 title-line\"><strong>Abstract<\/strong><\/h2>\n<p class=\"gb-text\"><span>Recently, non-monotonic rate sequences of pure birth processes have been the focus of much attention in the analysis of count data due to their ability to provide a combination of over-, under-, and equidispersed distributions without the need to reuse covariates (traditional methods). They also permit the modeling of excess counts, a frequent issue arising when using count models based on monotonic rate sequences such as the Poisson, gamma, Weibull, Conway-Maxwell-Poisson (CMP), Faddy (1997), etc. Matrix-exponential approaches have always been used for computing the probabilities for count models based on pure birth processes, although none have been proposed for them as a specific algorithm. It is intractable to calculate these pure birth probabilities numerically in an analytic form because severe numerical cancellations may occur. However, we circumvent this difficulty by exploiting a Taylor series expansion, and then a new analytic form is derived. We developed a simple algorithm for efficiently implementing the new formula and conducted numerical experiments to study the efficiency and accuracy of the developed algorithm. The results indicate that this new approach is faster and more accurate than the matrix-exponential methods.<\/span><\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/as.nida.ac.th\/storage\/2026\/02\/514266770_1262077789264095_1672533909804733123_n.jpg&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;514266770_1262077789264095_1672533909804733123_n&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"gb-element-1b7ca729\">\n<h2 class=\"gb-text gb-text-fda71df3 title-line\"><strong>Authors<\/strong><\/h2>\n<p class=\"gb-text\">\u0e2d\u0e32\u0e19\u0e19\u0e17\u0e4c \u0e2a\u0e38\u0e01\u0e2a\u0e31\u0e01,\u0e40\u0e2d\u0e01\u0e23\u0e31\u0e10 \u0e23\u0e31\u0e10\u0e01\u0e32\u0e0d\u0e08\u0e19\u0e4c<br \/>\u0e19\u0e31\u0e01\u0e28\u0e36\u0e01\u0e29\u0e32 \u0e04\u0e13\u0e30\u0e2a\u0e16\u0e34\u0e15\u0e34\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15\u0e1e\u0e31\u0e12\u0e19\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c<br \/>\u0e2d\u0e32\u0e08\u0e32\u0e23\u0e22\u0e4c \u0e04\u0e13\u0e30\u0e2a\u0e16\u0e34\u0e15\u0e34\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15\u0e1e\u0e31\u0e12\u0e19\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c<\/p>\n<\/div>\n<div class=\"gb-element-3d847055\">\n<h2 class=\"gb-text gb-text-643b5825 title-line\"><strong><\/strong><\/h2>\n<h2 class=\"gb-text gb-text-643b5825 title-line\"><strong>Abstract<\/strong><\/h2>\n<p class=\"gb-text\">\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22\u0e01\u0e4d\u0e32\u0e25\u0e31\u0e07\u0e40\u0e1c\u0e0a\u0e34\u0e0d\u0e1b\u0e31\u0e0d\u0e2b\u0e32\u0e01\u0e32\u0e23\u0e02\u0e32\u0e14\u0e41\u0e04\u0e25\u0e19\u0e41\u0e25\u0e30\u0e01\u0e32\u0e23\u0e01\u0e23\u0e30\u0e08\u0e32\u0e22\u0e15\u0e31\u0e27\u0e44\u0e21\u0e48\u0e2a\u0e21\u0e14\u0e38\u0e25\u0e02\u0e2d\u0e07\u0e41\u0e1e\u0e17\u0e22\u0e4c\u0e40\u0e27\u0e0a\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c\u0e04\u0e23\u0e2d\u0e1a\u0e04\u0e23\u0e31\u0e27 \u0e0b\u0e36\u0e48\u0e07\u0e40\u0e1b\u0e47\u0e19\u0e1a\u0e38\u0e04\u0e25\u0e32\u0e01\u0e23\u0e2a\u0e4d\u0e32\u0e04\u0e31\u0e0d\u0e43\u0e19\u0e23\u0e30\u0e1a\u0e1a\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23\u0e2a\u0e38\u0e02\u0e20\u0e32\u0e1e\u0e1b\u0e10\u0e21\u0e20\u0e39\u0e21\u0e34 \u0e17\u0e48\u0e32\u0e21\u0e01\u0e25\u0e32\u0e07\u0e1a\u0e23\u0e34\u0e1a\u0e17\u0e02\u0e2d\u0e07\u0e2a\u0e31\u0e07\u0e04\u0e21\u0e2a\u0e39\u0e07\u0e27\u0e31\u0e22\u0e41\u0e25\u0e30\u0e20\u0e32\u0e23\u0e30\u0e42\u0e23\u0e04\u0e44\u0e21\u0e48\u0e15\u0e34\u0e14\u0e15\u0e48\u0e2d\u0e40\u0e23\u0e37\u0e49\u0e2d\u0e23\u0e31\u0e07 (NCDs) \u0e17\u0e35\u0e48\u0e40\u0e1e\u0e34\u0e48\u0e21\u0e02\u0e36\u0e49\u0e19 \u0e07\u0e32\u0e19\u0e27\u0e34\u0e08\u0e31\u0e22\u0e19\u0e35\u0e49\u0e21\u0e35\u0e27\u0e31\u0e15\u0e16\u0e38\u0e1b\u0e23\u0e30\u0e2a\u0e07\u0e04\u0e4c\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e1e\u0e31\u0e12\u0e19\u0e32\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e21\u0e37\u0e2d\u0e1e\u0e22\u0e32\u0e01\u0e23\u0e13\u0e4c\u0e04\u0e27\u0e32\u0e21\u0e15\u0e49\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e41\u0e1e\u0e17\u0e22\u0e4c\u0e40\u0e27\u0e0a\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c\u0e04\u0e23\u0e2d\u0e1a\u0e04\u0e23\u0e31\u0e27\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e08\u0e31\u0e07\u0e2b\u0e27\u0e31\u0e14 \u0e23\u0e30\u0e2b\u0e27\u0e48\u0e32\u0e07\u0e1b\u0e35 \u0e1e.\u0e28. 2568\u20132578 \u0e42\u0e14\u0e22\u0e1a\u0e39\u0e23\u0e13\u0e32\u0e01\u0e32\u0e23\u0e41\u0e19\u0e27\u0e17\u0e32\u0e07 Workload Indicators of Staffing Need (WISN) \u0e01\u0e31\u0e1a\u0e40\u0e17\u0e04\u0e19\u0e34\u0e04 Machine Learning (ML) \u0e44\u0e14\u0e49\u0e41\u0e01\u0e48 Random Forest,XGBoost, Gaussian Process Regression \u0e41\u0e25\u0e30 Linear Regression \u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e04\u0e32\u0e14\u0e01\u0e32\u0e23\u0e13\u0e4c\u0e41\u0e19\u0e27\u0e42\u0e19\u0e49\u0e21\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23\u0e2a\u0e38\u0e02\u0e20\u0e32\u0e1e \u0e40\u0e0a\u0e48\u0e19 \u0e08\u0e4d\u0e32\u0e19\u0e27\u0e19\u0e1c\u0e39\u0e49\u0e1b\u0e48\u0e27\u0e22\u0e19\u0e2d\u0e01\u0e41\u0e25\u0e30\u0e1c\u0e39\u0e49\u0e1b\u0e48\u0e27\u0e22 NCDs<\/p>\n<p class=\"gb-text\">\u0e01\u0e32\u0e23\u0e28\u0e36\u0e01\u0e29\u0e32\u0e2d\u0e22\u0e39\u0e48\u0e23\u0e30\u0e2b\u0e27\u0e48\u0e32\u0e07\u0e14\u0e4d\u0e32\u0e40\u0e19\u0e34\u0e19\u0e01\u0e32\u0e23 \u0e42\u0e14\u0e22\u0e43\u0e0a\u0e49\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e17\u0e38\u0e15\u0e34\u0e22\u0e20\u0e39\u0e21\u0e34\u0e08\u0e32\u0e01\u0e2b\u0e25\u0e32\u0e22\u0e41\u0e2b\u0e25\u0e48\u0e07 \u0e40\u0e0a\u0e48\u0e19 \u0e10\u0e32\u0e19\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e02\u0e2d\u0e07\u0e2a\u0e4d\u0e32\u0e19\u0e31\u0e01\u0e07\u0e32\u0e19\u0e2b\u0e25\u0e31\u0e01\u0e1b\u0e23\u0e30\u0e01\u0e31\u0e19\u0e2a\u0e38\u0e02\u0e20\u0e32\u0e1e\u0e41\u0e2b\u0e48\u0e07\u0e0a\u0e32\u0e15\u0e34\u0e2a\u0e4d\u0e32\u0e19\u0e31\u0e01\u0e07\u0e32\u0e19\u0e1b\u0e23\u0e30\u0e01\u0e31\u0e19\u0e2a\u0e31\u0e07\u0e04\u0e21 \u0e01\u0e23\u0e21\u0e1a\u0e31\u0e0d\u0e0a\u0e35\u0e01\u0e25\u0e32\u0e07 \u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e1b\u0e23\u0e30\u0e0a\u0e32\u0e01\u0e23\u0e08\u0e32\u0e01\u0e2a\u0e4d\u0e32\u0e19\u0e31\u0e01\u0e07\u0e32\u0e19\u0e2a\u0e20\u0e32\u0e1e\u0e31\u0e12\u0e19\u0e32\u0e01\u0e32\u0e23\u0e40\u0e28\u0e23\u0e29\u0e10\u0e01\u0e34\u0e08\u0e41\u0e25\u0e30\u0e2a\u0e31\u0e07\u0e04\u0e21\u0e41\u0e2b\u0e48\u0e07\u0e0a\u0e32\u0e15\u0e34\u0e41\u0e25\u0e30\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e20\u0e32\u0e23\u0e30\u0e07\u0e32\u0e19\u0e08\u0e32\u0e01\u0e01\u0e32\u0e23\u0e17\u0e1a\u0e17\u0e27\u0e19\u0e27\u0e23\u0e23\u0e13\u0e01\u0e23\u0e23\u0e21\u0e41\u0e25\u0e30\u0e1c\u0e39\u0e49\u0e40\u0e0a\u0e35\u0e48\u0e22\u0e27\u0e0a\u0e32\u0e0d\u0e23\u0e27\u0e21\u0e16\u0e36\u0e07\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e08\u0e32\u0e01\u0e42\u0e04\u0e23\u0e07\u0e01\u0e32\u0e23\u0e27\u0e34\u0e08\u0e31\u0e22\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e0a\u0e32\u0e15\u0e34\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e27\u0e32\u0e07\u0e41\u0e1c\u0e19\u0e01\u0e4d\u0e32\u0e25\u0e31\u0e07\u0e04\u0e19\u0e41\u0e1e\u0e17\u0e22\u0e4c\u0e40\u0e09\u0e1e\u0e32\u0e30\u0e17\u0e32\u0e07\u0e1c\u0e25\u0e01\u0e32\u0e23\u0e27\u0e34\u0e40\u0e04\u0e23\u0e32\u0e30\u0e2b\u0e4c\u0e08\u0e30\u0e16\u0e39\u0e1e\u0e31\u0e12\u0e19\u0e32\u0e40\u0e1b\u0e47\u0e19\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e21\u0e37\u0e2d\u0e15\u0e49\u0e19\u0e41\u0e1a\u0e1a\u0e43\u0e19\u0e23\u0e39\u0e1b\u0e41\u0e1a\u0e1a Spreadsheet \u0e17\u0e35\u0e48\u0e1b\u0e23\u0e31\u0e1a\u0e43\u0e2b\u0e49\u0e40\u0e2b\u0e21\u0e32\u0e30\u0e01\u0e31\u0e1a\u0e1a\u0e23\u0e34\u0e1a\u0e17\u0e41\u0e15\u0e48\u0e25\u0e30\u0e1e\u0e37\u0e49\u0e19\u0e17\u0e35\u0e48\u0e15\u0e31\u0e27\u0e2d\u0e22\u0e48\u0e32\u0e07 \u0e04\u0e32\u0e14\u0e27\u0e48\u0e32\u0e08\u0e30\u0e0a\u0e48\u0e27\u0e22\u0e2a\u0e19\u0e31\u0e1a\u0e2a\u0e19\u0e38\u0e19\u0e01\u0e32\u0e23\u0e15\u0e31\u0e14\u0e2a\u0e34\u0e19\u0e43\u0e08\u0e40\u0e0a\u0e34\u0e07\u0e19\u0e42\u0e22\u0e1a\u0e32\u0e22\u0e43\u0e19\u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e2a\u0e23\u0e23\u0e01\u0e4d\u0e32\u0e25\u0e31\u0e07\u0e04\u0e19\u0e41\u0e1e\u0e17\u0e22\u0e4c\u0e40\u0e27\u0e0a\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c\u0e04\u0e23\u0e2d\u0e1a\u0e04\u0e23\u0e31\u0e27\u0e44\u0e14\u0e49\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e41\u0e21\u0e48\u0e19\u0e22\u0e4d\u0e32 \u0e22\u0e37\u0e14\u0e2b\u0e22\u0e38\u0e48\u0e19 \u0e41\u0e25\u0e30\u0e22\u0e31\u0e48\u0e07\u0e22\u0e37\u0e19<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/as.nida.ac.th\/storage\/2026\/02\/537658130_1262077859264088_6331376853160236553_n.jpg&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;537658130_1262077859264088_6331376853160236553_n&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"gb-element-1b7ca729\">\n<h2 class=\"gb-text gb-text-fda71df3 title-line\"><strong>Authors<\/strong><\/h2>\n<p class=\"gb-text\">Netnapit Rittisorn , Ekarat Rattagan<br \/>\u0e19\u0e31\u0e01\u0e28\u0e36\u0e01\u0e29\u0e32 \u0e04\u0e13\u0e30\u0e2a\u0e16\u0e34\u0e15\u0e34\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15\u0e1e\u0e31\u0e12\u0e19\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c<br \/>\u0e2d\u0e32\u0e08\u0e32\u0e23\u0e22\u0e4c \u0e04\u0e13\u0e30\u0e2a\u0e16\u0e34\u0e15\u0e34\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15\u0e1e\u0e31\u0e12\u0e19\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c<\/p>\n<\/div>\n<div class=\"gb-element-3d847055\">\n<h2 class=\"gb-text gb-text-643b5825 title-line\"><strong><\/strong><\/h2>\n<h2 class=\"gb-text gb-text-643b5825 title-line\"><strong>Abstract<\/strong><\/h2>\n<p>Corruption in public procurement remains a critical challenge that undermines the integrity, efficiency, and transparency of public budget utilization. Traditional auditing mechanisms often struggle to uncover hidden corruption risks\u2014those embedded within complex, large-scale financial transactions and not immediately visible through surface-level inspection. These risks may manifest as subtle anomalies in disbursement patterns or deviations from standard financial practices.<\/p>\n<p class=\"gb-text\">In the era of digital government, a machine learning (ML) approach offers powerful tools to enhance anomaly detection, uncover irregular spending patterns, and enable data-driven oversight. This study applies an ML-based approach to identify such hidden corruption risks by analyzing quarterly financial and procurement data from Thai government agencies. This study employs an ensemble of four unsupervised anomaly detection models\u2014Isolation Forest, AutoEncoder, Long Short-Term Memory (LSTM), and Long Short-Term Memory AutoEncoder (LSTM-AE)\u2014to leverage their complementary strengths. In addition to deploying these models jointly, their individual performance is also compared to evaluate detection accuracy across different algorithmic approaches. These models aim to uncover patterns that deviate significantly from the norm, revealing potential warning signs often undetectable through manual inspection.<\/p>\n<p>Given the absence of verified ground-truth labels, a consensus-based labeling strategy is adopted: a project is considered a high-confidence anomaly if flagged by at least three out of the four models. Among the tested models, LSTM-AE outperforms others, achieving the highest AUC score (0.998), and proving particularly effective in capturing long-term temporal dependencies in public financial data.<\/p>\n<p>This study demonstrates that a machine learning approach can be applied to public financial management to uncover hidden corruption risks. By combining multiple unsupervised models, the approach offers a scalable tool for detecting red flags across key stages of the budget process\u2014such as approval, expenditure tracking, and auditing. It provides a practical and interpretable framework to support policymakers and oversight bodies in proactively identifying high-risk projects and enhancing transparency in the public sector.<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/as.nida.ac.th\/storage\/2026\/02\/541323835_1262073749264499_7764077610448954556_n.jpg&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;541323835_1262073749264499_7764077610448954556_n&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>Working Papers\u0e04\u0e13\u0e30\u0e2a\u0e16\u0e34\u0e15\u0e34\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c\u0e44\u0e14\u0e49\u0e08\u0e31\u0e14\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e19\u0e33\u0e40\u0e2a\u0e19\u0e2d\u0e1c\u0e25\u0e07\u0e32\u0e19 Working Papers\u0e20\u0e32\u0e22\u0e43\u0e15\u0e49\u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e07\u0e32\u0e19\u0e1b\u0e23\u0e30\u0e0a\u0e38\u0e21\u0e27\u0e34\u0e0a\u0e32\u0e01\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e0a\u0e32\u0e15\u0e34\u0e41\u0e25\u0e30\u0e19\u0e32\u0e19\u0e32\u0e0a\u0e32\u0e15\u0e34 4th NIC \u2013 NIDA Conference, 2025\u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15\u0e1e\u0e31\u0e12\u0e19\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c\u0e42\u0e14\u0e22\u0e44\u0e14\u0e49\u0e23\u0e31\u0e1a\u0e40\u0e01\u0e35\u0e22\u0e23\u0e15\u0e34\u0e08\u0e32\u0e01 \u0e23\u0e2d\u0e07\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e32\u0e08\u0e32\u0e23\u0e22\u0e4c\u0e14\u0e23.\u0e40\u0e0a\u0e32\u0e27\u0e25\u0e34\u0e15 \u0e08\u0e35\u0e19\u0e2d\u0e19\u0e31\u0e19\u0e17\u0e4c \u0e41\u0e25\u0e30\u0e23\u0e2d\u0e07\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e32\u0e08\u0e32\u0e23\u0e4c \u0e14\u0e23.\u0e19\u0e34\u0e18\u0e34\u0e40\u0e14\u0e0a \u0e04\u0e39\u0e2b\u0e32\u0e17\u0e2d\u0e07\u0e2a\u0e33\u0e24\u0e17\u0e18\u0e34\u0e4c\u0e40\u0e1b\u0e47\u0e19\u0e1c\u0e39\u0e49\u0e27\u0e34\u0e1e\u0e32\u0e01\u0e28\u0e4c\u0e1a\u0e17\u0e04\u0e27\u0e32\u0e21 Authors Mongkol Hunkrajok , Wanrudee Skulpakdee\u0e2d\u0e32\u0e08\u0e32\u0e23\u0e22\u0e4c \u0e04\u0e13\u0e30\u0e2a\u0e16\u0e34\u0e15\u0e34\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c \u0e2a\u0e16\u0e32\u0e1a\u0e31\u0e19\u0e1a\u0e31\u0e13\u0e11\u0e34\u0e15\u0e1e\u0e31\u0e12\u0e19\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e28\u0e32\u0e2a\u0e15\u0e23\u0e4c Abstract Recently, non-monotonic rate sequences of pure birth processes have been the focus of much attention in the analysis of count data due to their ability to provide a combination of over-, [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","cybocfi_hide_featured_image":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/pages\/250500"}],"collection":[{"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/comments?post=250500"}],"version-history":[{"count":8,"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/pages\/250500\/revisions"}],"predecessor-version":[{"id":255683,"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/pages\/250500\/revisions\/255683"}],"wp:attachment":[{"href":"https:\/\/as.nida.ac.th\/en\/wp-json\/wp\/v2\/media?parent=250500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}