Loading…
Venue: Virtual Room C clear filter
arrow_back View All Dates
Thursday, April 9
 

9:28am GMT+07

Opening Remarks
Thursday April 9, 2026 9:28am - 9:30am GMT+07

Invited Guest & Session Chair
avatar for Dr. Srikumar Nayak

Dr. Srikumar Nayak

Principal Engineer, Incedo Inc, United States

avatar for Dr. Nitin Dhawas

Dr. Nitin Dhawas

Professor & Dean Academics, Nutan Maharashtra Institute of Engineering and Technology, India

Thursday April 9, 2026 9:28am - 9:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

A Boundary-Driven Lightweight Segmentation Framework for Robust Image Enhancement in CCTV Surveillance
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Jeba Priya J, N. Priya
Abstract - Mental health challenges among young adults require innovative psychoeducational interventions. This study presents the development and preliminary evaluation of Dear Alfred, a serious virtual reality (VR) game designed to enhance emotional self-regulation and intergenerational empathy. Grounded in the Process Model of Emotion Regulation, the game immerses players in a narrative- driven experience addressing elderly isolation. The development followed an iterative methodology, resulting in a playable vertical slice tested on Meta Quest 2 and 3 platforms. This work contributes to the field by proposing a scalable, multidimensional approach at the intersection of psychology, technology, and education, highlighting the specific need for hardware-specific optimization in digital mental health solutions.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

A Decentralized Architecture for Secure Data Sharing Using Blockchain
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Ashwini V. Zadgaonkar, Sonali Potdar, Archana Bopche, Pranali Pawar, Rupali Vairagade, Yogita Hande
Abstract - Time series prediction plays a critical role in monitoring and control of electrical power systems, particularly for detecting frequency fluctuations caused by imbalances between generation and demand. This study proposes an early warning framework for frequency fluctuation events using a hybrid k-Nearest Neighbour (KNN) and Dynamic Time Warping (DTW) approach combined with a global confidence interval based decision mechanism. Electricity frequency data collected from the New Zealand power grid over a six-month period were segmented into training, validation, and testing sequences. Alignment distances between historical and incoming sequences were used to identify precursor patterns indicative of impending frequency disturbances. Experimental results show that the proposed method achieves high warning accuracy with a very low false negative rate, outperforming baseline models such as ARIMA and LSTM. The findings demonstrate that KNN–DTW provides an effective and practical solution for early warning of frequency fluctuations, supporting improved operational reliability in modern power systems.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

Analyzing Socio-Environmental Determinants of Teen Suicide in U.S. Counties using K-Means Clustering based Machine Learning Approach
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Arianna Cobb, Vishnu Kumar
Abstract - Teen suicide remains a significant public health concern in the Unit ed States, with substantial geographic variation across counties. Understanding how socio-environmental and healthcare access factors relate to suicide risk can help identify communities that may benefit from targeted interventions. This study aims to support this effort by analyzing county-level teen suicide patterns using K-means clustering, an unsupervised machine learning technique. A da taset of 248 U.S. counties with reported teen suicide data was constructed using five-year aggregated suicide crude rates (2019-2023) alongside multiple socio environmental and healthcare indicators, including hospitalization rates, mental health provider availability, primary care provider rates, social association rates, uninsured population percentages, poverty levels, food insecurity, and rural population share. K-means clustering was then applied to identify county-level risk profiles. The results reveal two distinct county groups: one characterized by lower suicide rates, greater healthcare provider availability, stronger social as sociations, and lower socioeconomic disadvantage; and another characterized by higher suicide rates, reduced healthcare access, higher poverty and food in security, and greater rural residency. These findings highlight meaningful coun ty-level disparities and demonstrate the utility of machine learning approaches to identify regional risk profiles associated with teen suicide. The results may help inform public health strategies and policy efforts aimed at prioritizing re sources and expanding mental health services in high-risk communities.
Paper Presenter
avatar for Vishnu Kumar

Vishnu Kumar

United States

Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

CodeForge: A Three-Tier Hybrid Framework for Automated Python Code Optimization
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Adhi Sree Praveen Pai, Alaganandha Pradeep, Jeremy Simon Moncey, Josin Kurian Athikalam, Lakshmi K.S.
Abstract - This research investigates the digital footprint of mental health infor mation as it circulates on YouTube. Using a qualitative content analysis ap proach, the study examines 100 selected videos in conjunction with social media analytics to identify recurring patterns in the dissemination of mental health dis course. The findings reveal a mix of misleading or incomplete claims, educa tional resources, personal narratives, and recovery-oriented content, illustrating how mental health discussions shape and amplify user perspectives at both broad (macro) and specific (micro) levels within the evolving field of e-health. To in terpret these dynamics, the analysis applies Gibson’s theory of transactional af fordances, which illuminates key themes of risk, relevance, lived experience, credibility, and social support. By situating these themes within the broader con text of video-sharing platforms, the study underscores the importance of YouTube as a platform for mental health communication. It underscores its role in broader public conversations about health in the digital age. The future re search should investigate mental health discourse from other social media users.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

Performance Analysis of Brain Tumor Classification Using Computer Vision-Based Vision Transformer and Swin Transformer Techniques
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Rahul Singh, Sachin B. Jadhav
Abstract - Cloud cover generally limits the applicability of optical remote sensing images for tasks such as agriculture monitoring and disaster relief. Cloud removal is an inherently difficult problem because of the lack of spatial structures and spectral information. To effectively remove cloud contamination from SAR and optical images, we propose a speckle-aware global cross-attention network. The proposed SAR-optical cloud removal network architecture consists of a dual encoder with a global cross-attention mechanism that allows for effective cross-modal interactions. Additionally, a refining module and symmetric decoders improve the accuracy of the reconstructed image. Furthermore, we propose a speckle-aware gating mechanism to perform speckle filter adaptation. The experimental results affirm that our proposed network outperformed the baseline by increasing Peak Signal-to-Noise Ratio(PSNR) by +0.86 dB, Structural Similarity Index Measure(SSIM) by +0.142, and reducing the spectral distortion of the image. Additionally, we noticed a decrease in the Root Mean Square Error(RMSE) and Spectral Angle Mapper(SAM) values. This infers that selective SAR-Optical fusion with an adaptive noise-aware gating mechanism improves the accuracy of cloud-free optical images and optical remote sensing images.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

Predictive Modelling of Mental Health in Engineering and Medical Students Using Machine Learning Techniques
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Nyuti Bhesania, Khushi Solanki, Bimal Patel, Purvi Prajapati, Priyanka Patel
Abstract - The rapid advancement of information and communication technology (ICT) has accelerated the digital transformation of public sector governance, including tax administration. This study examines the impact of Indonesia’s Core Tax Administration System (Coretax) on micro, small, and medium enterprise (MSME) tax compliance within an ICT–behavioral framework. Using survey data from 300 MSME taxpayers and Structural Equation Modeling–Partial Least Squares (SEM-PLS), the study analyzes the direct and indirect effects of Coretax utilization on tax compliance through administrative efficiency and trust in the tax authority. The results indicate that Coretax utilization has a positive and significant effect on administrative efficiency, trust in the tax authority, and MSME tax compliance. Administrative efficiency and trust also significantly influence compliance, con-firming their mediating roles. These findings demonstrate that digital tax administration functions not only as a technological reform but also as an institutional and behavioral mechanism that reduces compliance burdens and strengthens vol-untary compliance. From a sustainable development perspective, improved MSME tax compliance supports Sustainable Development Goal (SDG) 8 by enhancing domestic revenue mobilization for inclusive economic growth, while the integrative and trust-building role of Coretax reflects SDG 17 through strengthened partnerships among government, technology providers, and taxpayers. This study contributes empirical evidence on digital tax systems in developing economies.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

Readiness Assessment of Electric Vehicle–Driven Green Logistics Practices
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Ajidhashini Thulasidass, M. Suresh
Abstract - Modern railway system increasingly rely on digital technologies such as Communication-Based Train Control (CBTC), European Train Control System (ETCS) and Supervisory Control and Data Acquisition (SCADA) systems, raising significant cyber-security challenges. We have seen 220% increase in attacks over five years from opportunistic ransomware to sophisticated targeted threats. This paper provides an overview of railway cybersecurity and surveys the coverage area considering ICT architectures, cyber threat models, and AI-based defense approaches. 75% of cases employed Distributed Denial of Service (DDoS) tactics while ransomware had affected 54% of the OT environments. We describe a comparative taxonomy of Artificial Intelligence and Ma-chine Learning approaches including the methods based on supervised learning, unsupervised learning, and advanced deep learning practices with detection accuracy as high as 97.46%. However, there exist several challenges: few available public data sets, lack of validation in real-world scenarios, demands for explain ability from that AI system and worries about adversarial robustness. We discuss eight potential research gaps, and future directions focusing on federated learning, digital twin development, multimodal AI fusion and safety-security co-engineering frameworks.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

Socioeconomic Drivers of Supplemental Nutrition Assistance Program (SNAP) Participation in U.S. Urban Communities: A Machine Learning Analysis of Baltimore City
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Vishnu Kumar, Natalia Miranda
Abstract - Food insecurity remains a pressing public health and equity challenge in urban U.S. communities, with the Supplemental Nutrition Assistance Program (SNAP) serving as the primary federal mechanism for alleviating household food hardship. Despite its importance, SNAP participation varies substantially across neighborhoods, reflecting underlying socioeconomic disparities. This study leverages neighborhood-level data from Baltimore City to identify the key socioeconomic drivers of SNAP participation using explainable machine learning (ML) techniques. Three supervised ML models: Decision Tree, Random Forest, and XGBoost were developed and evaluated using standard regression metrics. The Random Forest model demonstrated the strongest predictive performance. Model interpretability was enhanced through Shapley Additive Explanations (SHAP), which quantified the contribution of each feature to predicted SNAP participation. Results indicate that lower income, shorter life expectancy, higher Temporary Assistance for Needy Families (TANF) participation, higher proportions of female-headed households, and lower educational attainment are associated with increased SNAP reliance. These findings highlight the complex interplay be-tween economic deprivation, social vulnerability, and neighborhood-level assistance utilization, offering actionable insights for policymakers and public health practitioners. By combining predictive accuracy with interpretability, explainable ML provides a robust framework for informing evidence-based interventions aimed at reducing food insecurity and promoting equity in urban communities.
Paper Presenter
avatar for Vishnu Kumar

Vishnu Kumar

United States

Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

Study LLMs to Extract Coordinates from 2D Contour Engineering Drawings
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Hector Rafael Morano Okuno
Abstract - This work proposes an intelligent system for automatic food-image-based recognition and calorie estimation to meet the emerging demand for accurate dietary monitoring and personalized nutrition recommendations. Conventional food-logging methods are cumbersome, prone to errors, and mostly fail to capture portion sizes, hence motivating an end-to-end computer vision and depth-based approach. The proposed system utilizes a custom-curated Indian food image dataset of eighty classes, collected, labeled, and preprocessed to make it robust enough to present various variations in lighting, background, etc. A deep learning model was then trained for detecting and classifying food with high precision. The overall classification accuracy achieved by the proposed system is ninety-seven percent. The depth understanding of the detected food regions will provide an approximation of volume and weight, leading to relatively better calorie calculations. Nutritional analysis gets integrated into the system by relating the type and estimated weight of food to the standard nutritional information for detailed insights in terms of calories, proteins, fats, car-bohydrates, fiber, and micronutrient content. The results for evaluation reveal strong detection, minimum estimation error, and efficient real-time processing, which clearly show its applications. In this paper, an approach that combines recognition by image, depth estimation by portion, and nutrition logic capable of leading to a strong solution for diet determination has been introduced.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

9:30am GMT+07

Synthesis and Characterization of TiO2 Nanoparticles for the Detection of Hazardous Gases Using AIML
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - D.Swetha, Senthilkumar Selvaraj, K.M.Madhan Prasanth, D.Nihal
Abstract - The rapid expansion of digital commerce platforms has significantly transformed on- line transactional systems; however, conventional centralized architectures continue to face critical challenges related to security, transparency, data integrity, and trust management. Traditional e-commerce systems rely heavily on centralized databases, making them vulnerable to data tam- pering, unauthorized access, fraudulent transactions, and single points of failure. To address these limitations, this paper proposes a secure, scalable, and modular web-based e-commerce system that is architecturally designed for integration with blockchain technology and smart contracts. The proposed system is implemented using widely adopted web technologies, with a responsive frontend and a robust backend to support essential functionalities such as user authentication, product catalog management, shopping cart operations, order processing, inventory management, and administrative control. The architecture emphasizes separation of concerns, enabling flexibility, maintainability, and future extensibility. A key contribution of this work lies in the incorporation of a blockchain-ready framework that enables immutable transaction recording and enhanced trace- ability across the entire transaction lifecycle. Smart contracts automate transaction validation and order execution. The system also introduces an AI-based anomaly detection mechanism using a Deep Q-Network to detect fraudulent behavior. Experimental validation demonstrates reliable per- formance and scalability.
Paper Presenter
avatar for D.Swetha
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room C Bangkok, Thailand

11:30am GMT+07

Session Chair Concluding Remarks
Thursday April 9, 2026 11:30am - 11:32am GMT+07

Invited Guest & Session Chair
avatar for Dr. Srikumar Nayak

Dr. Srikumar Nayak

Principal Engineer, Incedo Inc, United States

avatar for Dr. Nitin Dhawas

Dr. Nitin Dhawas

Professor & Dean Academics, Nutan Maharashtra Institute of Engineering and Technology, India

Thursday April 9, 2026 11:30am - 11:32am GMT+07
Virtual Room C Bangkok, Thailand

11:32am GMT+07

Session Closing and Information To Authors
Thursday April 9, 2026 11:32am - 11:35am GMT+07

Moderator
Thursday April 9, 2026 11:32am - 11:35am GMT+07
Virtual Room C Bangkok, Thailand

12:13pm GMT+07

Opening Remarks
Thursday April 9, 2026 12:13pm - 12:15pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Junali Jasmine Jena

Dr. Junali Jasmine Jena

Assistant Professor, School of Computer Engineering, Kalinga Institute of Industrial Technology, Odisha, India

Thursday April 9, 2026 12:13pm - 12:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

A Case Study of TikTok’s AI-Driven Recommendations: Transparency, Privacy, and Mitigation Strategies
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Areej Almazroa, Sara Albahlal, Dalia Alswailem, Dhay Altamimi, Aljoharah Aldaej, Heba Kurdi
Abstract - Monitoring marine litter is essential for planetary and human survival. This study proposes a novel framework integrating satellite data and big data analytics to assess marine litter distribution in coastal and oceanic environments. Leveraging open-source imagery from COPERNICUS Sentinel-2 and LANDSAT, the framework utilizes reflectance methodologies and image processing to identify and classify marine debris, focusing on spectral bands from visible blue (490 nm) to short-wave infrared (1610 nm). A pilot case study in San Diego, California, demonstrates the approach’s feasibility. The study explores the potential of microwave radiometry and machine learning for material detection and contour analysis, showing how satellite data can support dynamic and cross-platform monitoring systems. Results validate the use of remote sensing technologies to map plastic debris, providing a replicable methodology that combines emergent (e.g., satellites, drones) and traditional (e.g., sampling) techniques. This approach contributes to a deeper understanding of plastic pollution pathways, sources, and impacts across economic sectors. By generating harmonized data on mismanaged plastic waste, the study informs sustainability strategies and circular economy practices, helping redesign systemic plastic management and supporting local and global environmental governance.
Paper Presenter
avatar for Aljoharah Aldaej

Aljoharah Aldaej

Saudi Arabia

Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

A Robust and Efficient NLP Framework for Enterprise Ticket Classification under Domain Shift and Imbalance
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Sonali S. Gaikwad, Jyotsna S. Gaikwad
Abstract - In this semi-systematic literature review, a detailed study of the role of Human-Computer Interaction (HCI) in creating game-based solutions for Attention-Deficit/Hyperactivity Disorder (ADHD) among children is conducted. Six peer-reviewed research studies were selected. The study demonstrates that HCI can serve as a major therapeutic mechanism by transforming digital platform-based cognitive training into engaging, interactive experiences. These approaches not only improve focus but also enhance the overall effectiveness of interventions. Key findings from the analyzed studies are discussed, and future research directions are proposed, including multimodal hybrid systems with adaptive personalization and accessibility features to further improve outcomes for children with ADHD.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Clinical Risk Scores Demonstrate High Discrimination for Middle Cerebral Artery Aneurysm Rupture in a Single-Center Chinese Cohort: A Hypothesis-Generating Machine Learning Study
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Bharathi A, Mohan Kumar P, Subha B
Abstract - Rupture of an intracranial aneurysm results in catastrophic subarachnoid hemorrhage with a 30–40% fatality rate. Although treatment decisions are guided by clinical risk scores (PHASES, ELAPSS), recent research suggests that morphological analysis and computational fluid dynamics (CFD) may offer better rupture prediction. This study looked at 92 middle cerebral artery aneurysms from the CMHA dataset, which included 71 that had ruptured and 21 that had not. We evaluated four feature sets: Clinical-Basic (13 variables), Clinical-Scores (adding PHASES and ELAPSS; 15 variables), Scores and Morphology (24 variables), and Full (28 variables). We trained logistic regression models using 5- fold cross-validation with a 20% test set. We used bootstrap validation (1000 iterations) and Bonferroni-corrected feature importance analysis to reduce overfitting. The AUC for the Clinical-Basic set was 0.891±0.063. Performance was enhanced to a maximum AUC of 0.976±0.034 by adding PHASES and ELAPSS. The Full model achieved an AUC of 0.981±0.029, with neither morphological nor hemodynamic variables giving much further improvement. Significant variance was revealed by bootstrap analysis (95% CI: 0.764-0.998). At 90% specificity, the test set's AUC was 0.933, but its sensitivity was only 14.3%. The primary contributors were ELAPSS (F=143.2, p<10⁻¹) and PHASES (F=38.4, p<10⁻¹), whereas morphological and hemodynamic characteristics did not exhibit any significant correlations. Clinical scores demonstrated strong discrimination, but CFD-derived parameters offered minimal additional value in this small, imbalanced, single-center group. The wide confidence intervals and class imbalance limit clinical recommendations. Further validation in larger, multicenter studies is necessary.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Data Governance for Sustainable Artificial Intelligence
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Tirupathi Rao Dockara, Manisha Malhotra
Abstract - AI and data platforms are increasingly expected to deliver end-to-end business automation under rapid market and regulatory change. However, prevailing platform construction strategies remain predominantly top-down: teams standardize a generic capability stack and subsequently customize it for heterogeneous domains through code, integration glue, and service forks. This approach amplifies technical debt, fragments governance, and makes continuous adaptation expensive. This paper introduces the Inverse Vertex Pyramid (IVP), a design pattern that reverses the direction of platform derivation. IVP begins at the use-case vertex by conducting rigorous analysis of high-value specialized automation scenarios and generalizes them into explicit, machine-actionable platform descriptors (metadata models, domain ontologies, policy/workflow specifications, and capability contracts) that form a stable, reusable core. Specialization is realized primarily via declarative configuration and policy changes, rather than code rewrites. We formalize IVP as a pattern, propose a reference architecture separating control and execution planes, and provide a comparative analysis against layered architectures, domain-driven design, and microservice platforms. A proof-of-concept walkthrough in regulated claims automation illustrates the generalization mechanism and highlights how IVP can reduce re-engineering, improve governance consistency, and accelerate time-to-market. The paper concludes with limitations, threats to validity, and a research agenda for automated use-case mining, formal verification of policies, and quantitative evaluation of platform agility.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

DRISHTI: An Edge-AI and IoT Multimodal Assistive Navigation System for the Visually Impaired
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Nishant Shah, Ansh Bajpai, Shrivaths S. Nair, Manas Verma K, Sabitha S
Abstract - Digital accessibility in higher education is a key requirement to ensure the inclusion of students with hearing disabilities. However, institutional plat-forms often present barriers that limit autonomy, understanding of information, and full participation. The objective of this study was to evaluate the user experience of students with hearing disabilities on the EVIRTUAL, SGA, and SIS platforms of the Technical University of Manabí, identifying perceptions, accessibility barriers, and improvement proposals. A descriptive, exploratory study with a mixed-methods approach was conducted. The population consisted of seventy-eight students with hearing disabilities registered in the Inclusion Unit, from which an intentional subsample of ten participants was selected. A structured sur-vey with Likert-type scales and a participatory observation form were applied in real interaction situations with the platforms. Quantitative analysis was carried out using descriptive statistics, while qualitative information was organized into thematic categories. The results show that half of the participants achieve full autonomy in the use of the platforms, forty percent require intermittent support, and the rest need constant assistance. Regarding clarity of information and con-tent comprehension, intermediate responses predominate, which reveals recur-rent difficulties. The main barriers identified were a confusing interface, non-intuitive navigation, insufficient visual supports, and the need for external assistance. The study proposes improvements such as customizable subtitles, step-by-step visual guides, an accessibility button, a sign language interpreter avatar, and optimization for mobile devices, aimed at strengthening autonomy and user experience.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Securing E-commerce with Blockchain and Smart Contracts
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Sabarishwaran V, Gomathi K, Andey Phani Vinay, Jagadeeswaran V, Ranjith Kumar M
Abstract - The rapid expansion of digital commerce platforms has significantly transformed on- line transactional systems; however, conventional centralized architectures continue to face critical challenges related to security, transparency, data integrity, and trust management. Traditional e-commerce systems rely heavily on centralized databases, making them vulnerable to data tam- pering, unauthorized access, fraudulent transactions, and single points of failure. To address these limitations, this paper proposes a secure, scalable, and modular web-based e-commerce system that is architecturally designed for integration with blockchain technology and smart contracts. The proposed system is implemented using widely adopted web technologies, with a responsive frontend and a robust backend to support essential functionalities such as user authentication, product catalog management, shopping cart operations, order processing, inventory management, and administrative control. The architecture emphasizes separation of concerns, enabling flexibility, maintainability, and future extensibility. A key contribution of this work lies in the incorporation of a blockchain-ready framework that enables immutable transaction recording and enhanced trace- ability across the entire transaction lifecycle. Smart contracts automate transaction validation and order execution. The system also introduces an AI-based anomaly detection mechanism using a Deep Q-Network to detect fraudulent behavior. Experimental validation demonstrates reliable per- formance and scalability.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Smart Handheld Oscilloscope With Integrated Processing For Real-Time Signal Analysis
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Sowmyashree N, Madhu Sunkanur, Impana M, Suchithra B S, Hemalatha P G
Abstract - The existence of a growing social media has created complex cyber systems in which vast quantities of interactions constitute substantial issues regarding misinformation, privacy invasion, deception of identities, and destructive behavioural tendencies. The regularity of involvement in this type of big systems requires sophisticated systems that are able to judge the motive of the user, content validity and suspicious activities within real time. Overall interest will be to develop a universal trust calculation system that will be more secure and effective in ensuring privacy and increasing the accuracy of suspicious or malicious users in social sites. The proposed Multi-Layer Federated Trust Framework algorithm is a combination of peer-based user reputation scoring, feature-based content authenticity detection, federated trust indicators aggregation, and anomaly detection with the help of behavioural anomalies. These approaches cooperate with secure aggregation and decentralized learning in removing the uncoded information exposure and enable the computation of trust at scale. The proposed algorithm is experimentally confirmed, and the obtained results are 95.2, 94.1, 93.5, and 93.8, corresponding to a minimum latency of 65 ms and a privacy preservation score of 0.98. The general results indicate a viable and holistic response that adds to secure interactions, blocks malicious acts and encourages trust in the actual social media settings.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Statistical Learning Frameworks for Automated Detection and Classification
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Md. Shahidul Islam, Hasina Islam
Abstract - Cross-domain recommendations are imperative in the growing tourism industry and with the increasing means of communication. Preference drift, preference transfer, and unfamiliarity with places have an overbearing impact on recommender systems. Most approaches do not address geometric misalignment across domains, which is essential for cross-domain preference shift analysis in recommendation tasks. We propose Procrustes-Based Contextual Thompson Sampling (P-CTS) for Cross-Domain POI Recommendation, integrating adversarial domain-invariant learning, optimal geometric alignment via Procrustes transformation, and adaptive Thompson Sampling with sleeping bandit management. First, the embeddings are constructed to model the preference drift across the domains. Next, the Procrustes transformation aligns source and target embedding spaces via optimal rotation, scaling, and translation. In the last phase, we initialize Beta priors with similarity-weighted pseudo-counts derived from the aligned embeddings. The experiments on Gowalla and Foursquare across domains demonstrate 5.1% improvements in Precision@5 and 9.75% improvements in cold-start accuracy, suggesting an adaptive exploration-exploitation trade-off.
Paper Presenter
avatar for Hasina Islam

Hasina Islam

Bangladesh

Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

The interaction of convolutional structure and KAN bottlenecks in U-KAN architectures
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Binh Pham Nguyen Thanh, Long Duong Phi, Phung Thi-Kim Nguyen, Nhan Thi Cao
Abstract - The rapid proliferation of Internet of Things (IoT) devices has significantly increased the digital attack surface, which, in turn, has raised network vulnerability to sophisticated Distributed Denial of Service (DDoS) campaigns that could reduce the effectiveness of traditional signature-based Intrusion Detection System (IDS). Furthermore, conventional Machine Learning (ML) approaches are often subject to manual feature engineering and lack the capture of complex spatial and temporal dependencies, which are essential to detect subtle, polymorphic threats. In this regard, the present work proposes a lightweight hybrid Deep Learning (DL) architecture for reliable (DDoS) detection. The proposed approach integrates spatial feature extraction using a Convolutional Neural Network (CNN) with a Bidirectional Long Short-Term Memory (BiLSTM) network to capture temporal correlations, further enhanced by an additive attention mechanism that underlines the importance of flow segments relevant to recognition. To mitigate issues with computational complexity, a two-phase hybrid feature selection approach, a combination of Information Gain (IG) and Dynamic Particle Swarm Optimization (PSO) would be utilized to select an optimal subset of features. The performance of the model was evaluated using the CICDDoS2019 benchmark dataset. The feature selection process was able to reduce the input space from 80 to 17 relevant features. The combined CNN-BiLSTM model, along with threshold optimization, was able to achieve an accuracy of 94.1%, which indicates a significant improvement in the reduction of false negatives and validates the effectiveness of the proposed method in a secure IoT environment.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Weedy and Cultivated Rice Classification During Harvesting Stage Using YOLOv8
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Wani Zahidah Mohd Subari, Shuzlina Abdul-Rahman, Mohamad Faizal Ab Jabal, Sharifalillah Nordin
Abstract - Role-playing games (RPGs) allow the player to take on a specific role and complete different missions during gameplay. Their diversity enables a range of ap-plications beyond entertainment, as they are often used in educational contexts. Learning content can be embedded in common components, such as game fields, tasks, objects, or non-playing characters (NPCs). The paper presents several educational RPGs with their features and characteristics, and existing models of didactic video games. It proposes a two-level metamodel for describing an educational RPG. The metamodel is divided into five main components (world, educational aspects, quest, playing character, and NPCs), and their taxonomies are presented briefly. The authors propose a conceptual model that includes the interrelationships among the components mentioned. In addition, their interpretations and significance for the development of RPG educational games are explained. An example of the metamodel is represented through a quest from a real educational RPG in the field of Chemistry. The presented RPG metamodel improves under-standing and helps to better design, develop, and integrate such games into various learning environments. The presented taxonomy can serve as a useful template for structuring design details.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

2:15pm GMT+07

Session Chair Concluding Remarks
Thursday April 9, 2026 2:15pm - 2:17pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Junali Jasmine Jena

Dr. Junali Jasmine Jena

Assistant Professor, School of Computer Engineering, Kalinga Institute of Industrial Technology, Odisha, India

Thursday April 9, 2026 2:15pm - 2:17pm GMT+07
Virtual Room C Bangkok, Thailand

2:17pm GMT+07

Session Closing and Information To Authors
Thursday April 9, 2026 2:17pm - 2:20pm GMT+07

Moderator
Thursday April 9, 2026 2:17pm - 2:20pm GMT+07
Virtual Room C Bangkok, Thailand

2:58pm GMT+07

Opening Remarks
Thursday April 9, 2026 2:58pm - 3:00pm GMT+07

Invited Guest & Session Chair
avatar for Prof. Ioannis Patias

Prof. Ioannis Patias

Associate Professor, Sofia University "St. Kl. Ohridski", Faculty of Mathematics and Informatics, Bulgaria

avatar for Dr. Deepali Milind Ujalambkar

Dr. Deepali Milind Ujalambkar

Assistant Professor, AISSMS College of Engineering, Maharashtra, India

Thursday April 9, 2026 2:58pm - 3:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

A Hierarchical Latent Retrieval Model for Constant Time Semantic Query Processing
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Prabhat Kumar Gupta, Perumal T, Karthick Pannerselvam
Abstract - Generation Large language models, as well as retrieval-augmented generation (RAG), are highly performing on semantic queries, but with considerable latency as they require embedding computation, a vector similarity search, and generation at inference time. Such delays make them inappropriate in time-sensitive and domain-specific retrieval activities. In this paper, the Hierarchy Latent Retrieval Model (HLRM) which is a deterministic architecture will be introduced and able to answer semantic queries in O(1) constant time. HLRM unites hierarchical semantic routing and semantic hashing so that pre-validated units of knowledge can be directly illuminated without the need to search methods or language model informing of their existence at run time. All computationally expensive processes are done offline, which means that embedding processes or vector databases are not needed to run a query. Milliseconds-response time with very high exact-match accuracy is proved under experimental assessment on an orderly institutional knowledge environment. The findings suggest that HLRM offers an alternative of fast, interpretable, and reliable systems to the generative retrieval systems in non-random settings where precision and response latency is paramount.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

An Efficient Near Collision Attack for Lightweight Stream Cipher – A5/1
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Khedkar Aboli Audumbar, Uday Pandit Khot, Balaji G. Hogade
Abstract - Malicious or compromised internal users can act like normal users with valid login credentials and thus become difficult to detect. As a result of their similarity to normal users, traditional methods of detecting intrusions, have difficulty identifying the subtle and changing behaviors of malicious insiders. This paper introduces a comprehensive User and Entity Behavior Analytics (UEBA) framework to help detect malicious insiders. It works by analyzing activity logs generated by the enterprise. Further it performs data cleaning and feature engineering; creating behavioral profiles for each user based upon the attributes of time, environment, and behavior. These profiles are used to model normal interaction patterns and with the DBLOF algorithm, an outlier score for each profile is created. The outlier score indicates whether or not a given user’s behavior has deviated from normal. In order to make the proposed system adaptable to changing environments over time, it utilizes deep learning algorithms to detect changes in behavior and to increase the accuracy of anomalous behavior detection. The proposed system also enables the ingestion of real-time data, the evaluation of risk, and the display of alerts in a visual format. Thus, providing the scalability and operational performance required to support large-scale organizations. Overall, the proposed system represents a reliable, modular, and understandable UEBA framework. It is capable of accurately detecting malicious insider threats and representing an efficient method for proactively mitigating risks through security operations within enterprises.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

Assessing the Performance of Quantum Machine Learning for Motor Imagery Brain-Computer Interfaces: Consumer Perspective of Wearable Electronics
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Poonam Chaudhary, Rita Chhikara, Nupur Prakash
Abstract - This work addresses the challenge of Isolated Sign Language Recognition (ISLR) on mobile and edge devices, where computational resources, memory, and energy budgets are severely constrained. Existing approaches based on pixel-level three-dimensional convolutional neural networks are computationally expensive and sensitive to background variations, while recurrent models such as Long Short-Term Memory networks suffer from a sequential processing bottleneck that limits parallel execution on modern hardware accelerators. To overcome these limitations, this paper proposes a hybrid Adaptive Graph Convolutional Network (A-GCN) and Transformer architecture that decouples spatial and temporal modeling of skeletal sign representations. The A-GCN employs a learnable adjacency matrix to capture dynamic and semantically meaningful spatial relationships between skeletal landmarks, while the Transformer encoder leverages parallel self-attention to model long-range temporal dependencies without recurrence. Experimental evaluation on the 250-class Google Isolated Sign Language Recognition dataset demonstrates a Top-1 accuracy of 78.90%, outperforming a Bi-LSTM baseline by 6.96%. In addition, the proposed model achieves a throughput of 400.55 frames per second with a latency of 2.50 ms on accelerator hardware and maintained real-time performance on consumer-grade devices. These results demonstrate that landmark-based, parallel architectures enable accurate, real-time, and privacy-preserving sign language recognition suitable for deployment on standard mobile devices.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

Autoregressive Mamba Based Structured State Space Model for Regional Monsoon Rainfall Severity Prediction in Coimbatore
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Subin Simon, Prathilothamai M
Abstract - Deep learning has shown significant potential in medical image classification; however, a systematic comparison of deep feature extraction strategies for multi class diabetic eye disease assessment remains limited. This study presents a comprehensive comparative analysis of seven deep learning architectures, including conventional CNN, pretrained VGG16, Vision Transformer (ViT), Conformer, hybrid CNN ViT, and attention-augmented variants incorporating Squeeze-and-Excitation (SE) and Convolutional Block Attention Module (CBAM). All models are evaluated under a unified preprocessing and training framework to ensure fair performance comparison.The investigation focuses on analyzing how different architectural paradigms capture discriminative local and global retinal features relevant to disease classification. Extensive experiments are conducted on public fundus image datasets using standard evaluation metrics, including accuracy, precision, recall, and F1-score. Experimental results demonstrate that hybrid and attention-integrated architectures outperform standalone CNN and transformer models. In particular, the Conformer architecture achieves the best overall performance, reaching approximately 91% classification accuracy in the four class setting (Diabetic Retinopathy, Glaucoma, Cataract, and Normal), while the CNN ViT model attains approximately 89% accuracy.These findings highlight the effectiveness of combining convolutional operations with global self-attention mechanisms for robust and discriminative feature extraction in automated diabetic eye disease classification.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

CALIBRATION-WEIGHTED ENSEMBLE WITH MCC-OPTIMIZED THRESHOLD FOR LIVER DISEASE PREDICTION
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - M.Murugesen, Priyanka P
Abstract - Deep learning–based medical image models have achieved expert level performance in GPU-based research environments [1–3]. However, relia ble deployment in real clinical systems remains challenging due to constraints related to power consumption, hardware stability, and long-term operation. While prior studies have focused on improving model architectures or hardware accelerators [4,5], relatively limited attention has been devoted to systematical ly managing the transition from GPU-based development to NPU-based de ployment environments. This study formulates the GPU-to-NPU transition as an independent deployment research problem. Rather than proposing a new model architecture, we focus on preserving functional equivalence when trans ferring a validated GPU-trained medical vision model to an NPU-based infer ence environment. The proposed framework consists of reference model fixa tion, intermediate representation (IR)-based conversion [13–15], operator com patibility management, inference pipeline alignment, and output-level function al equivalence validation. The framework is evaluated through deployment of a ResNet-50–based pa thology classification model on a commercial ATOM NPU platform. Experi mental results demonstrate a 99.1% agreement rate (991/1,000 samples) be tween GPU-based and NPU-based inference outputs, confirming consistent de cision behavior despite architectural differences. These findings indicate that deployment reliability depends more on execution environment control and preprocessing alignment than on model architecture modification. By redefining deployment as a structured research problem, this work pro vides a reproducible methodology for translating research-grade medical AI models into energy-efficient NPU inference systems under practical clinical constraints.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

Decoding Tamil Heritage through Segmentation of Stone Inscriptions
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Jayanthi J, P.Uma Maheswari, S.Uma Maheswari, Arun Kumar, Karishma V R
Abstract - The rapid migration of artificial intelligence from cloud platforms to edge-based Internet of Things environments has intensified the demand for transparent and trustworthy decision-making under severe resource constraints. While edge intelligence enables low-latency and privacy-preserving analytics, the opacity of deployed models limits user trust, accountability, and regulatory acceptance. Existing explainability techniques largely assume cloud-level resources, making them unsuitable for real-time and energy-limited edge deployments. In order to close this gap, this work develops an interpretable intelligence framework that is resource-aware and adaptable, specifically designed for limited IoT systems. The suggested approach integrates interpretability directly into the decision-making process, allowing for the generation of faithful, lightweight explanations in addition to predictions while dynamically adjusting to operational context and runtime restrictions. Further balancing local responsiveness with system- level insight aggregation and secure governance is achieved through hierarchical explanation control. Transparency, efficiency, and scalability are all in line with the framework's treatment of explainability as a fundamental system capacity. The study shows that adaptive, deployment-aware explainability can greatly improve edge intelligence's operational reliability and trustworthiness. These insights establish a foundation for building accountable and interpretable AI systems in real-world IoT environments.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

DeepEye: Interpretable Deep Ensemble Framework for Eye Disease Detection with Grad-CAM Visualization Using Eye Disease Image Dataset
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Rimon Kumer Roy, Jannatul Ferdous, Kazi Lutfur Nahar Mithila, Sabbir Islam, Mohammad Zahid Hassan, Sadah Anjum Shanto
Abstract - Early identification of ophthalmic disease is critical to pre serve eyesight. We present DeepEye, a stacking-ensemble framework for multi-disease classification on the Eye Disease Image Dataset (EDID, Mendeley Data). After standardized preprocessing and augmentation, f ive architectures ResNet50, VGG16, DenseNet121, EfficientNet-B4, and Vision Transformer were trained and evaluated. The final ensemble in tegrates the top base models with a logistic regression meta-learner op timized via hyperparameter tuning. On a held-out test set, DeepEye achieves 91.34% accuracy and AUC of 0.9965, outperforming all con stituent models and exhibiting stable gains across cross validation folds. Model transparency is supported with Grad-CAM visualizations that lo calize disease-relevant regions, enhancing clinical interpretability. These results indicate that combining convolutional and transformer backbones within a tuned stacking framework yields a high-accuracy, explainable approach for automated eye disease detection in healthcare settings.
Paper Presenter
avatar for Rimon Kumer Roy

Rimon Kumer Roy

Bangladesh

Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

Drivers and Barriers to Implementing the Internet of Things in the Healthcare Supply Chain in Jordanian Hospitals
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07

Paper Presenter
avatar for Luay Juma

Luay Juma

Jordan

Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

Fraud Detection in E-Wallet Transactions: A Comparative Analysis of XGBoost and Random Forest
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Nguyen Thi Hoi, Vu Thi Anh Hong, Dang Thi Anh Tho, Dang Thuy Linh, Nguyen Khanh Linh
Abstract - The increasing use of renewable energy sources has made the integra tion of Flexible AC transmission system (FACTS) devices into contemporary power systems, an important area of research. The function and effectiveness of FACTS devices in enhancing power quality and preserving stability in traditional power systems and those that significantly count on renewable energy source are comprehensively examined in this study. Variability and unpredictability brought about by renewable energy sources can negatively impact the voltage profile, particularly at high penetration levels. Devices from the Flexible AC Transmis sion System, like the Thyristor-Controlled Series Capacitor (TCSC) & Static Var Compensator (SVC), provide efficient ways to improve system stability and dy namically regulate voltage. This paper investigates a coordinated control strategy of SVC and TCSC for improving voltage profiles in a transmission network with high renewable energy integration. Using an IEEE-14 bus test system, various scenarios of renewable penetration are simulated to analyze the performance of coordinated FACTS operation. The findings show that the suggested coordinated control improves overall system dependability and power transfer capabilities in addition to reducing voltage variations and reactive power imbalances. The study highlights the importance of optimal placement and coordinated tuning of FACTS devices as a cost effective solution for enabling secure and stable opera tion of renewable-rich power grids.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

SUEMas: A Secure Multi-Agent Ecosystem based on LLMs for Integrated University Services using Dynamic Tool Registries
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Josue Piedra, Nelson Piedra
Abstract - Accurate crop production forecasting is essential for sustainable agricultural planning, effective resource management, and long-term food security. Conventional statistical and regression-based models often fail to capture the complex, nonlinear relationships that exist among agro-climatic variables, soil characteristics, and crop yield [1]. To address these limitations, this paper proposes an agentic artificial intelligence (AI)–based framework for crop production analysis that integrates autonomous decision-making with machine learning and deep learning techniques. The proposed framework utilizes agro-climatic and soil parameters such as temperature, humidity, soil moisture, cultivated area, and seasonal information to model crop production behaviour. Three predictive approaches— Linear Regression, Random Forest, and CNN–LSTM—are implemented and evaluated within the agentic framework using Root Mean Square Error (RMSE), Mean Absolute Error (MAE), and the Coefficient of Determination (R2) as performance metrics. Experimental results demonstrate that the Random Forest model significantly outperforms the other models, achieving an RMSE of 0.56, MAE of 0.31, and R2 value of 0.96. These findings highlight the effectiveness of agent-driven machine learning systems in accurately modelling agricultural data and supporting intelligent decision-making for crop yield optimization.
Paper Presenter
avatar for Josue Piedra
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

3:00pm GMT+07

Topology-Aware Botnet Traffic Detection Using Spatiotemporal Graph Neural Networks with Gated Feature Fusion
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Priyanka Halder, Anupam Sinha
Abstract - This study analyzes the extent to which credibility from influencers impacts consumers' buying behavior. The focus will be on how the intention to buy impacts this relationship as the problem is being analyzed in the context of social commerce on TikTok. The study is developed within the framework of Source Credibility Theory which suggests that consumers’ perception and consequent behavior are influenced by the perceived degree of the spokesperson’s Attractiveness, Trustworthiness, and Expertise. The study employs a quantitative explanatory methodology. A purposive sampling technique was used to collect data from a sample of 100 active TikTok users who follow the provided influencer. The analyzed relationships will be quantified using Structural Equation Modelling with Partial Least Squares (SEM-PLS). The research results concluded that influencer credibility increases the intention to buy, but does not increase the purchasing decision. The intention to buy completely mediates the relationship between influencer credibility and purchasing decision. This demonstrates that influencer credibility is a significant factor in the intention to buy behavior, but it is the intention that is essential in order to convert the persuasive influence into actual buying behavior. The study contributes to digital marketing communication research by extending Source Credibility Theory to the context of short-video social commerce platforms.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room C Bangkok, Thailand

5:00pm GMT+07

Session Chair Concluding Remarks
Thursday April 9, 2026 5:00pm - 5:02pm GMT+07

Invited Guest & Session Chair
avatar for Prof. Ioannis Patias

Prof. Ioannis Patias

Associate Professor, Sofia University "St. Kl. Ohridski", Faculty of Mathematics and Informatics, Bulgaria

avatar for Dr. Deepali Milind Ujalambkar

Dr. Deepali Milind Ujalambkar

Assistant Professor, AISSMS College of Engineering, Maharashtra, India

Thursday April 9, 2026 5:00pm - 5:02pm GMT+07
Virtual Room C Bangkok, Thailand

5:02pm GMT+07

Session Closing and Information To Authors
Thursday April 9, 2026 5:02pm - 5:05pm GMT+07

Moderator
Thursday April 9, 2026 5:02pm - 5:05pm GMT+07
Virtual Room C Bangkok, Thailand
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date - 
  • Inaugural Session
  • Physical Technical Session 1A
  • Physical Technical Session 1B
  • Physical Technical Session 1C
  • Physical Technical Session 1D
  • Physical Technical Session 2A
  • Physical Technical Session 2B
  • Physical Technical Session 2C
  • Physical Technical Session 2D
  • Virtual Room 1A
  • Virtual Room 1B
  • Virtual Room 1C
  • Virtual Room 1D
  • Virtual Room 1E
  • Virtual Room 1F
  • Virtual Room 2A
  • Virtual Room 2B
  • Virtual Room 2C
  • Virtual Room 2D
  • Virtual Room 2E
  • Virtual Room 2F
  • Virtual Room 2G
  • Virtual Room 3A
  • Virtual Room 3B
  • Virtual Room 3C
  • Virtual Room 3D
  • Virtual Room 3E
  • Virtual Room 3F
  • Virtual Room 3G
  • Virtual Room 7A
  • Virtual Room 7B
  • Virtual Room 7C
  • Virtual Room 7D
  • Virtual Room 7E
  • Virtual Room 7F
  • Virtual Room 7G
  • Virtual Room 8A
  • Virtual Room 8B
  • Virtual Room 8C
  • Virtual Room 8D
  • Virtual Room 8E
  • Virtual Room 8F
  • Virtual Room 8G
  • Virtual Room 9A
  • Virtual Room 9B
  • Virtual Room 9C
  • Virtual Room 9D
  • Virtual Room 9E
  • Virtual Room 9F
  • Virtual Room 9G
  • Virtual Room_10A
  • Virtual Room_10B
  • Virtual Room_10C
  • Virtual Room_10D
  • Virtual Room_10E
  • Virtual Room_10F
  • Virtual Room_10G
  • Virtual Room_11A
  • Virtual Room_11B
  • Virtual Room_11C
  • Virtual Room_11D
  • Virtual Room_11E
  • Virtual Room_11F
  • Virtual Room_11G
  • Virtual Room_12A
  • Virtual Room_12B
  • Virtual Room_12C
  • Virtual Room_12D
  • Virtual Room_12E
  • Virtual Room_12F
  • Virtual Room_12G