Loading…
Venue: Virtual Room G clear filter
arrow_back View All Dates
Thursday, April 9
 

12:13pm GMT+07

Opening Remarks
Thursday April 9, 2026 12:13pm - 12:15pm GMT+07

Invited Guest & Session Chair
avatar for Prof. Jalpesh Ghumaliya

Prof. Jalpesh Ghumaliya

HOD, Department of Computer Application & Assistant Professor - Department of Computer Engineering, B.H.Gardi College of Engineering & Technology, Gujarat, India

Thursday April 9, 2026 12:13pm - 12:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

A Comparative and Hybrid Study of CNN and Transformer Models for Multi-Class Virus Classification in Transmission Electron Microscopy
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Md Mahmudul Hoque, Md Kawser Islam, Md. Mamunur Rahman Moon, Abdullah Rakib Akand, Md. Hadi Al-amin, H.M. Azrof
Abstract - The automatic recognition of virus particles in transmission electron microscopy (TEM) images remains a demanding task, primarily owing to strong inter-class similarity, scale variability, and pronounced class imbalance. In this study, several convolutional neural networks and transformer-based architectures were comparatively evaluated for the classification of 22 virus categories using the TEM virus dataset. All models were trained under identical preprocessing and optimization conditions, and imbalance effects were mitigated through a weighted crossentropy formulation. Performance was quantified using overall accuracy together with macro-averaged precision, recall, and F1 score. Among standalone models, the Swin Transformer achieved the highest accuracy (0.8831) and macro-F1 score (0.8444), followed by DeiT (accuracy 0.8669). Convolutional architectures exhibited comparatively lower balanced performance, with ResNet50 demonstrating substantial degradation (accuracy 0.5887) under imbalanced conditions. To exploit complementary representational properties, decision-level hybrid strategies were implemented. The performance-weighted hybrid attained an accuracy of 0.8831 and the highest macro-F1 score (0.8528), slightly surpassing the equal-weight hybrid configuration. These observations indicate that architectural heterogeneity contributes to improved inter-class balance without sacrificing overall predictive accuracy. Future work may explore scale-aware representations, feature-level fusion mechanisms, and expanded TEM datasets to further enhance robustness and generalization in virus identification tasks.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

A Dual-Stream Deep Learning Framework for Independent Audio and Video Deepfake Detection
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - SunilKumar Ketineni, Preethi Kandukuri, Hruthik Sreeramaneni, Vivek Bojjagani
Abstract - Phishing continues to pose a serious threat to digital security by ex ploiting human vulnerabilities to steal confidential data through deceptive online interactions. Traditional detection methods often fall short in identifying advanced phishing strategies. This survey presents a comprehensive overview of phishing detection techniques, with a strong focus on modern, multi-layered machine learning and deep learning-based solutions. The proposed layered framework includes four key stages: data collection and preparation, model training, detection and prediction, and explainability. In the first layer, email, URL, and metadata are collected and preprocessed for feature extraction. The second layer involves model training using both machine learning classifiers such as Random Forest, SVM, Naïve Bayes, and KNN and deep learning archi tectures like CNN, RNN, and LSTM. These models feed into the third layer where phishing is detected and classified. Finally, the fourth layer integrates Explainable AI (XAI) methods like LIME, SHAP, and Anchors to enhance model transparency and interpretability. This survey evaluates the effectiveness and limitations of each layer and highlights the need for explainable, scalable, and adaptive phishing detection systems.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

A Hybrid Ensemble and Attention-LSTM Based Credit Card Fraud Detection Framework integrating Cost-Sensitive Learning and Explainability
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - K.Poorani, K Karan, R Seenivasan, V Ramkumar
Abstract - Older email detection technologies have struggled to accurately iden tify malicious emails in the face of the latest techniques attackers use to compro mise victims. While modern solutions perform well in detecting malicious emails, they are not completely foolproof. As a result, malicious emails can still reach a user’s mailbox, necessitating measures to reduce potential harm. This study suggests transforming the decision-making processes of recent algorithms into a white-box model, enabling transparency in decision-making through Ex plainable AI. This is achieved by having the proposed model compute confidence level scores for each email, which users can use to exercise caution if a malicious email slips into their inbox.
Paper Presenter
avatar for K.Poorani
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

Cross-Document Fact Validation: A Transformer-Based Framework for Identifying Factual Inconsistencies
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Nazura Javed, Rida Javed Kutty, Muralidhara B L
Abstract - The increasing availability of online information has made it easier to access diverse sources, but it has also introduced challenges in verifying the reliability and consistency of content. Conflicting statements across different sources often contribute to misinformation and make it difficult to establish factual accuracy. This study focuses on the problem of cross-document contradiction and inconsistency detection as a step toward improving fact verification in textual data. A two-stage pipeline is proposed in which semantically related sentence pairs are first retrieved from documents discussing the same event and then analyzed using Natural Language Inference (NLI) techniques to determine whether they express contradictory information. In contrast to conventional sentence-level contradiction detection, the proposed approach emphasizes document-level comparison to identify inconsistencies across independent sources. Two pre-trained transformer models, DistilBERT (DistilBERT-base-uncased) and RoBERTa (RoBERTa-base), are used for contradiction classification. The approach is evaluated on the SNLI dataset and the PHEME Rumor Dataset, which are widely used benchmarks for NLI and misinformation research. Experimental results show accuracies of 94.50% (F1 score 94.50%) on SNLI and 92.39% (F1-score 92.31%) on PHEME, indicating that the proposed framework is effective in identifying contradictions and supporting cross-document fact validation.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

Dynamic Consistency Drift Management in Distributed Systems
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - B.Purnachandra Rao, Gaurang Jinka
Abstract - Distributed systems rely on data replication across multiple nodes to ensure high availability, fault tolerance, and scalability. While replication improves system reliability, it also introduces temporary inconsistencies between primary and replica nodes during data propagation. This phenomenon, commonly referred to as consistency drift, occurs when distributed nodes maintain slightly different states before synchronization is completed. As distributed infrastructures grow in scale and complexity, consistency drift becomes increasingly significant due to network latency, workload variability, and communication overhead between nodes. Traditional synchronization mechanisms typically rely on static replication intervals or fixed update propagation strategies that do not adapt effectively to dynamic system conditions. Such approaches may allow drift to accumulate before synchronization occurs, resulting in delayed consistency and inefficient resource utilization. Managing consistency drift therefore becomes a critical challenge in distributed computing environments where maintaining accurate and synchronized data states is essential. This research addresses the problem of consistency drift in distributed systems by examining the factors that contribute to state divergence among nodes and exploring mechanisms for dynamic drift management. The proposed framework focuses on monitoring system behavior, including workload intensity, network latency, and node communication patterns, to regulate synchronization behavior more effectively. By enabling adaptive synchronization strategies that respond to real time system conditions, the framework aims to reduce drift accumulation and improve overall data consistency across distributed clusters. Effective management of consistency drift ultimately enhances system reliability, operational stability, and performance in modern distributed computing platforms operating under dynamic workloads.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

Feature Selection for Balanced CICIoT2023 dataset using Machine Learning in IDS
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Suganya Moorthy, Jayakumar Kaliappan
Abstract - Internet of Things (IoT) networks have grown really fast, which has increased the attack surface of cyber attacks by a big mar gin. However, the severely limited computational resources, the hetero geneous architecture, and incomplete or decentralized communications make the IoT environments very susceptible to intrusion attacks, in cluding Distributed Denial of Service (DDoS), spoofing, botnets, and data exfiltration attacks. Older signature-based intrusion detection sys tem (IDS) is not effective in detecting zero-day and dynamic threats. The paper will present a new machine learning-based intrusion detection system, which was developed with IoT networks in mind. The design proposed combines the characteristics of feature search, feature detec tion, and group classification model in order to increase the accuracy of detection as well as reduce the number of computations. Benchmark IoT intrusion datasets that have undergone experimental evaluations prove to be more effective in detection accuracy, false positive rates and scaling than the traditional IDS frameworks. Practical constraints that include the computational overhead of resource-constrained IoT devices, imbal ance of the dataset, and interpretability of the model are addressed. The directions of future research are lightweight federated learning systems, explainable AI system incorporations, and real-time adaptive threat in telligence systems to build better resiliencies of IoT security.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

Federated Learning for Battery State-of-Charge Estimation: A Comparative Study of LSTM Architectures and Aggregation Strategies
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Konstantina Karathanasopoulou, Ioannis Vondikakis, Dimitris Georgiadis, George Dimitrakopoulos
Abstract - Digital signatures are fundamental public-key cryptographic primitives used for message authentication and integrity. A message’s recipient must be able to validate that it comes from the reported sender and hasn’t been altered by anybody else. Pairing-based cryptography provides elegant and efficient mechanisms for constructing compact dig ital signature schemes. Inspired by isogeny structures on elliptic curves, we present a pairing-based digital signature system in this study. Our construction targets classical security settings and is analyzed under standard computational hardness assumptions related to bilinear groups and isogeny-based mappings. We demonstrate that the proposed ap proach attains “existential unforgeability under adaptive chosen-message attacks (UF-CMA)” within the random oracle model and address the construction’s soundness and security. Moreover, the scheme offers com pact public key and signature sizes, making it suitable for lightweight cryptographic applications.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

GreenOps: Energy Efficient Cloud Deployment
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Nirmaladevi J, Kanishka R, Kirthiga B, Lathikasri T R, Ranjani Shree R S
Abstract - The vast implementation of cloud computing has uplifted the modern IT practices by improving scalability, flexibility, and budget efficiency. In contrast, there has been an increase in energy consumption, which results in carbon emissions. This happens because of overusage, overconsumption, overprovisioning, unused capacity, and inefficient data center management. These days, data centers act as the sole contributor to global greenhouse gas (GHG) emissions; therefore, sustainable cloud operations are essential in addressing this challenge. GreenOps, or green operations, defines the cloud deployment and operational practices that take place but also considers the environmental impact; it depicts energy-efficient infrastructure design, optimized resource usage, virtualization, and the integration of renewable energy resources. This survey presents a summary of green cloud computing, including the current trends, challenges, energy-aware scheduling algorithms, and optimization techniques for obtaining energy-efficient cloud deployment.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

Low Grade Glioma Segmentation from FLAIR MR Images using UNet Variants
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Pranaav Contractor, Sanika Ajgaonkar, Nishanth Ravichandran, Satishkumar Chavan
Abstract - This paper examines the interplay between demographic factors and a newly developed behav ioral construct—modern investment curiosity—and how these elements collectively shape finan cial behaviors among higher education faculty. Drawing from survey responses of 145 educators situated in Kollam District, Kerala, India, the study applies descriptive statistical techniques alongside chi-square tests to evaluate four research hypotheses. The data reveals a predominantly risk-averse financial posture among participants, with post-retirement security ranking as the foremost financial goal and bank deposits serving as the dominant investment channel. Statistical testing shows no meaningful relationships between saving patterns and either household size or disability status. A statistically significant positive association emerges between investment cu riosity and ownership of equity or mutual fund products (χ² = 8.40, p < 0.01). Additionally, mar ital status demonstrates a significant relationship with investment curiosity (χ² = 5.28, p < 0.05), where unmarried faculty report higher curiosity levels. These observations are consistent with established frameworks including the Life-Cycle Hypothesis and the Theory of Planned Behav ior, positioning investment curiosity as a relevant psychological factor in financial decision-mak ing. The paper offers practical suggestions for institutional programming and identifies avenues for subsequent scholarly inquiry.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

12:15pm GMT+07

Replication Delay Optimization in Distributed Systems
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - B.Purnachandra Rao, Gaurang Jinka
Abstract - Distributed systems rely on data replication to ensure availability, fault tolerance, and scalability across multiple nodes in modern cloud environments. Replication enables systems to maintain continuity even when individual nodes fail or experience network disruptions. However, replication often introduces synchronization delays between primary and replica nodes, known as replication delay. These delays can cause temporary data inconsistency, stale reads, and increased response latency, degrading application performance and user experience. As infrastructures scale to larger clusters, communication overhead, network latency, and workload variability further amplify replication delays, making efficient synchronization increasingly challenging. Traditional replication mechanisms typically rely on static synchronization intervals or sequential update propagation strategies. These approaches fail to adapt to dynamic network conditions and fluctuating workloads, resulting in inefficient data propagation and delayed consistency across nodes. In large scale systems, such limitations may cause bottlenecks, reduced reliability, and inconsistent states during high workload periods or network congestion. Addressing replication delay is critical for maintaining reliability and consistency in distributed environments. Recent research emphasizes intelligent synchronization mechanisms capable of adapting to changing conditions. Adaptive synchronization strategies that monitor network latency, workload intensity, and node communication patterns offer improvements in replication efficiency. By enabling replication decisions that respond dynamically to system behavior, such approaches reduce synchronization delays and improve data consistency across clusters. Enhanced replication efficiency ultimately strengthens reliability, scalability, and operational performance in modern distributed computing platforms operating under variable workload conditions.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room G Bangkok, Thailand

2:15pm GMT+07

Session Chair Concluding Remarks
Thursday April 9, 2026 2:15pm - 2:17pm GMT+07

Invited Guest & Session Chair
avatar for Prof. Jalpesh Ghumaliya

Prof. Jalpesh Ghumaliya

HOD, Department of Computer Application & Assistant Professor - Department of Computer Engineering, B.H.Gardi College of Engineering & Technology, Gujarat, India

Thursday April 9, 2026 2:15pm - 2:17pm GMT+07
Virtual Room G Bangkok, Thailand

2:17pm GMT+07

Session Closing and Information To Authors
Thursday April 9, 2026 2:17pm - 2:20pm GMT+07

Moderator
Thursday April 9, 2026 2:17pm - 2:20pm GMT+07
Virtual Room G Bangkok, Thailand

2:58pm GMT+07

Opening Remarks
Thursday April 9, 2026 2:58pm - 3:00pm GMT+07

Invited Guest & Session Chair
avatar for Prof. (Dr.) Saurabh Shandilya  

Prof. (Dr.) Saurabh Shandilya  

Professor, Faculty of Computer Engineering, Poornima University, India

Thursday April 9, 2026 2:58pm - 3:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

AI Explainability Framework in Legal Decision Support Systems
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Konstantina Rigou, George Dimitrakopoulos
Abstract - The rapid adoption of Artificial Intelligence (AI) in high-impact domains (healthcare, finance, justice) creates an urgent need for sys tems that are legally compliant, explainable, ethical and transparent. Decision Support Systems (DSS) aim to assist managerial and professional decision-making, yet few works translate legal and ethical principles into concrete technical design constraints for explainable AI (XAI). This paper proposes a Legal Explainability Framework (LEF) that maps legal obligations (General Data Protection Regulation, European Union Artificial Intelligence Act) and ethical principles to measurable XAI requirements and implementation steps, and demonstrates the approach with a prototype using an open legal dataset derived from judgments of the European Court of Human Rights (ECtHR). The results show that legally compliant XAI is not merely a normative aspiration, but a technically feasible and practically implementable design paradigm.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

An Intelligent RAG Based Chatbot for Enhanced and Context Aware User Interaction
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07

Authors - P.Pandiaraja, N.Shiva Kumar, B.Vishnu Vardhan, C.Sevarathi, Charles Prabu V, S.Jagan
Abstract - Retrieval-Augmented Generation (RAG) chatbots represent a significant advancement in intelligent conversational systems, grounded in the prin-ciples of natural communication, accuracy, and reliability. Traditional chatbots are constrained by pre-trained knowledge or rule-based responses, limiting their effectiveness in dynamic and complex real-world scenarios. RAG-based systems integrate information retrieval mechanisms with sophisticated language generation models to identify relevant knowledge in real time and produce contextually appropriate responses. The proposed system employs sentence-transformers (all-MiniLM-L6-v2) for dense vector embeddings and FAISS as the vector data-base backend, enabling fast and semantically accurate document retrieval. Ex-perimen- tal results demonstrate a mean retrieval accuracy of 87.4%, an average response latency of 1.3 s, and a user satisfaction score of 4.2 out of 5, confirm-ing the system’s readiness for real-world deployment.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

Analysis of Decomposition Levels and Vanishing Moments in Wavelet-Based Processing Of Ultrasonic TOFD A-Scan Signals from Austenitic Stainless Steel Weld Pad
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Manjula K, Vijayarekha K, Venkatraman B
Abstract - The fabrication of components across various industries is accom plished through welding. Although welding has been practiced for more than a hundred years, defects may still occur during the welding process. Thus, indus trial standards require welded joints to be inspected and evaluated to ensure their quality and reliability. Conventional ultrasonic testing (UT) has long been widely used in industry for detecting and evaluating defects in weld specimens. Over the last few decades, advances in sensor technology and signal analysis techniques have significantly advanced ultrasonic testing methods. Advanced methods, such as Time Of Flight Diffraction (TOFD), are more likely to detect linear defects. However, one of the major challenges in applying TOFD to the inspection of austenitic stainless steel (ASS) weldments is noise in the signals. Various signal processing approaches have been developed to suppress such noise, each with its own advantages and limitations. In this work, the focus is placed on the applica tion of multi-level discrete wavelet transform (DWT) decompositions with ‘n’- order wavelet filters for de-noising ultrasonic TOFD A-scan signals. The results show that this approach achieves greater improvement in signal-to-noise ratio (SNR) while requiring less computational time.
Paper Presenter
avatar for Manjula K
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

Error Rate Analysis over α-Beaulieu-Xie and α-Beaulieu-Xie Extreme Fading Channels in Additive White Generalized Gaussian Noise
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Likhitha Ragha Ramya Nakka, Anuradha Andra, Appalaswami Ravada, Vinay Kumar Pamula
Abstract - This study uses Roland Barthes' semiotic approach to analyze how meaning is represented in HMNS' Untitled Humans ad on Instagram Reels. Understanding how storytelling campaigns create and communicate meaning has become crucial for successful digital marketing as social media plays a big-ger role in brand communication strategies. This study examines a selection of Instagram Reels content from the official Instagram @hmns account using a qualitative-descriptive methodology, emphasizing how text, sound, and visual components interact to provide multiple interpretations. The study methodically sign how everyday occurrences, human relationships, and nature scenery are turned into symbolic representations of authenticity, freedom, and personal identity using Roland Barthes' three-level semiotic framework: denotation, connotation, and myth. Direct observation and content documentation of Reels recordings are used for data gathering, and triangulation is used for analysis to guarantee validity and thoroughness. Results show that by creating an existential story that prioritizes closeness, introspection, and human connection, the campaign goes beyond traditional product advertising. Authentic, unconstructed life imagery is presented at the denotative level, visual and musical elements evoke emotion and personal memory at the connotative level, and perfume, rather than being a commercial product, becomes a symbol of emotional intimacy and identity exploration at the mythic level.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

Machine Learning based Automated Subjective Answers Evaluation System
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Deepak Mane, Siddhi Dhamal, Shivam Devkar, Divit Maheshwari, Riddhi Kaulage, Diya Nair, Deepak R. More
Abstract - The evaluation of handwritten answers sheet has so many challenges since from many years due to variability in handwriting, linguistic barrier and personal bias. This is very time-consuming method and inconsistent method which highlights the need for automated subjective answers evaluation. Here, proposed automated handwritten answers evaluation system uses TrOCR based handwritten answer detection, NLTK tokenization, WordNet lemmatization and semantic similarity check between teacher’s and student’s answer based on meaning. This advanced multi-model system overcomes traditional keyword matching technique and improves contextual accuracy. This system also overcomes traditional manual checking and results in fast evaluation. The system promotes the fairness, fast and accurate processing. Moreover, the suggested framework removes human fatigue, encourages fair grading, and offers a solution that can be used for large-scale academic tests. The results show that this automated method not only works like a human brain but also makes the evaluation process more fair and open.0
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

Multi-Leaf Crop Disease Detection Using EfficientNet-B0 with Transfer Learning
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Deepak Mane, Deepak R. More, Arya Kale, Ravina Jagtap , Soumya Dubewar , Diya Nair
Abstract - Timely detection of crop diseases is essential to ensuring high agricultural produc- tivity; thus, early and accurate detection has always been a priority for the farmers. So we pro- posed a deep learning based framework that classifies the condition of basil leaves in three cat- egories - wilting, infection by mildew and healthy - through an EfficientNet-B0 convolutional neural network fine-tuned using transfer learning. We leverage a curated dataset of 1,442 plant images available at the Roboflow platform, splitting the dataset into 70% training, 20% valida- tion and 10% testing. Transfer learning was used where we started EfficientNet-B0 with weights learned on large scale ImageNet pretraining. Training was done in two stages: first the whole model was trained with the backbone frozen and only the newly added classification head being trained, followed by unfreeze the last 100 layers and perform fine-tuning to the domain. Leaf orientation and illumination variability were treated by a group of data augmentation methods including random horizontal flipping, rotational transforms, zoom perturbations, and contrast adjustments. The proposed system achieved a remarkable result with high generalization of 96.6% training accuracy and 97.8% test accuracy. The detailed analysis of the confusion matrix and the ROC-AUC curves corroborate faithful multi-class discrimination. A Streamlit-based web interface was also developed to facilitate live inference, farmers and agronomists are now able to make immediate predictions of the disease with confidence estimates. The results showed that the well optimized EfficientNet-B0 model can be a feasible and scalable solution for automated monitoring of crop diseases in the context of smart agriculture.0
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

Night Patrolling System Using CCTV and Real- Time Violence Detection with IoT and AI
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Vinodkumar Bhutnal, Prajwal Vijay Sonawane, Om Vinod Chaudhari, Avinash Golande, Mohit Ashok Tajane, Sujal Kishor Papdeja
Abstract - There is no more pressing issue in modern cities, industries, and public venues than nighttime security, as the conventional approach of patrolling in-person only works well until fatigue and coverage become challenges, when humanity and human error become a finite issue that requires short delay interruptions. Urbanization, increased crime rates, and the inadequacy of current traditional patrolling to provide a sufficient security posture have led to the proposal of an Intelligent Night Patrolling System that uses edge-cloud frameworks, IoT-enabled CCTV camera technology, and artificial intelligence video analytics to significantly reduce the presence gap. This system will provide continuous, real-time proactive surveillance of locations and even be equipped with advanced deep learning models like Cummings Neural Networks (CNNs) and Long Short term Memory (LSTM) to detect suspicious activity, anomalies, intrusions, and violent types of activities. This research introduces the concept of Night Patrolling System designed to assist security personnel during night surveillance.The proposed system achieves an estimated accuraxy of over 90% with a reduced latency , demonstarting it’s effectiveness for a real time survillence applications.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

Real-Time Multimodal Vehicle Type Classification System using Deep learning
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Deepak T. Mane, Deepak R. More, Gopal D. Upadhye, Rucha C. Samant, Hemlata U. Karne, Suraksha Suryawanshi, Prem Borse
Abstract - Efficient vehicle type classification is vital for intelligent transportation systems, traffic monitoring, and urban mobility planning. This paper presents a Real-time Multimodal Vehicle Type Classification System that leverages both visual and acoustic data to identify and categorize vehicles such as cars, buses, trucks, and motorcycles from live video streams. The proposed system integrates CNN-based and Transformer- based models for feature extraction across modalities, enhancing detection robustness under diverse lighting, weather, and traffic conditions. A lightweight preprocessing pipeline performs synchronized frame extraction, audio segmentation, and feature fusion while ensuring minimal latency in real-time environments. The proposed multimodal architecture combines late fusion of visual and audio features to enhance the reliability of classification when either modality is suffering from low visibility or occlusion. Experimental evaluations demonstrate that the proposed framework achieves a classification accuracy of 96.2% at 28 fps, outperforming unimodal baselines with real-time efficiency. This system is deployable for intelligent traffic surveillance, automated tolling, and urban safety analytics.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

Reducing Methane Emissions in Rice Cultivation Using Federated Learning: A Privacy‑Preserving Framework for Climate‑Smart Agriculture
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Shwetha Ramadas, Krutthika Hirebasur Krishnappa, Sudhir Trivedi
Abstract - Methane (CH4) emission from rice paddies is a significant source of greenhouse gas emissions from agriculture. Currently, most models for methane prediction from rice paddies depend on collecting field data and sending it to a server. In this new paradigm, several privacy concerns arise, model scalability is restricted, and a large number of data points are exposed to the attacker. This paper addresses all privacy con cerns by providing an edge-based solution for modeling methane emis sions from rice paddies that leverages data from edge sensors at respec tive locations, while keeping individual sensor data private. The method employs different machine learning (ML) algorithms, including Linear Regression, Random Forest, XGBoost, and a Feedforward Neural Net work (FNN), implemented using TensorFlow Federated (TFF) in both centralized and federated learning (FL) frameworks. The FL-based FNN achieved an R2 score of 0.91, which was superior to both centralized classical and centralized FL models, especially for highly non-IID client side data distributions in sensor datasets. In summary, this paper extends the current literature on modeling methane emissions from rice paddies and provides a comprehensive evaluation of our proposed FL system ar chitecture, an in-depth discussion of the communication resources re quired for FL implementation, and an examination of the effects of abla tion studies on clients’ data heterogeneity. Therefore, the proposed FL approach is efficient and scalable, enabling safe, privacy-preserving modeling of methane emissions from rice paddies to effectively imple ment Climate Smart Agriculture (CSA) and mitigate global warming while supporting sustainable rice cultivation.
Paper Presenter
avatar for Shwetha Ramadas

Shwetha Ramadas

United States

Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

3:00pm GMT+07

Secure Knowledge Based Financial Assistant Using RAG
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07

Authors - P. Pandiaraja, P.Krishna Kishore, E. Ganesh, C. Selvarathi, Charles Prabu V, S. Jagan
Abstract -  Large Language Models have facilitated the development of sophist i-cated smart platforms that are actively leveraged in the provision of financialservices to various classes of customers. This advancement has enabled peopleto obtain individual financial advice. This paper presents a framework for buil d-ing a financial chatbot that incorporates Retrieval Augmented Generation(RAG) technology and several SQL agents to improve reliability. The proposedapproach addresses five fundamental challenges in financial artificial inte ll igence: eradicating hallucinations, obtaining up to date information, utilising u s-er facts to tailor individual suggestions, safeguarding user privacy, and provi d-ing clear explanations. RAG is used to retrieve verified financial knowledge,while SQL agen ts query databases to produce accurate outputs. The solutionprovides advisory responses that are relevant to users and protect sensitive i n-formation through a zero trust security architecture. The system architecture i n-corporates multiple validation check points and is dynamically configured tomeet individual user requirements. Experimental results demonstrate a 96.2%accuracy rate in handling financial queries with a 3.8% error rate and a mean r e-sponse time of 1.5 seconds, outperforming comparable solutio ns. The proposedarchitecture establishes a reliable baseline for financial professionals seekingdependable advisory services.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room G Bangkok, Thailand

5:00pm GMT+07

Session Chair Concluding Remarks
Thursday April 9, 2026 5:00pm - 5:02pm GMT+07

Invited Guest & Session Chair
avatar for Prof. (Dr.) Saurabh Shandilya  

Prof. (Dr.) Saurabh Shandilya  

Professor, Faculty of Computer Engineering, Poornima University, India

Thursday April 9, 2026 5:00pm - 5:02pm GMT+07
Virtual Room G Bangkok, Thailand

5:02pm GMT+07

Session Closing and Information To Authors
Thursday April 9, 2026 5:02pm - 5:05pm GMT+07

Moderator
Thursday April 9, 2026 5:02pm - 5:05pm GMT+07
Virtual Room G Bangkok, Thailand
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date - 
  • Inaugural Session
  • Physical Technical Session 1A
  • Physical Technical Session 1B
  • Physical Technical Session 1C
  • Physical Technical Session 1D
  • Physical Technical Session 2A
  • Physical Technical Session 2B
  • Physical Technical Session 2C
  • Physical Technical Session 2D
  • Virtual Room 1A
  • Virtual Room 1B
  • Virtual Room 1C
  • Virtual Room 1D
  • Virtual Room 1E
  • Virtual Room 1F
  • Virtual Room 2A
  • Virtual Room 2B
  • Virtual Room 2C
  • Virtual Room 2D
  • Virtual Room 2E
  • Virtual Room 2F
  • Virtual Room 2G
  • Virtual Room 3A
  • Virtual Room 3B
  • Virtual Room 3C
  • Virtual Room 3D
  • Virtual Room 3E
  • Virtual Room 3F
  • Virtual Room 3G
  • Virtual Room 7A
  • Virtual Room 7B
  • Virtual Room 7C
  • Virtual Room 7D
  • Virtual Room 7E
  • Virtual Room 7F
  • Virtual Room 7G
  • Virtual Room 8A
  • Virtual Room 8B
  • Virtual Room 8C
  • Virtual Room 8D
  • Virtual Room 8E
  • Virtual Room 8F
  • Virtual Room 8G
  • Virtual Room 9A
  • Virtual Room 9B
  • Virtual Room 9C
  • Virtual Room 9D
  • Virtual Room 9E
  • Virtual Room 9F
  • Virtual Room 9G
  • Virtual Room_10A
  • Virtual Room_10B
  • Virtual Room_10C
  • Virtual Room_10D
  • Virtual Room_10E
  • Virtual Room_10F
  • Virtual Room_10G
  • Virtual Room_11A
  • Virtual Room_11B
  • Virtual Room_11C
  • Virtual Room_11D
  • Virtual Room_11E
  • Virtual Room_11F
  • Virtual Room_11G
  • Virtual Room_12A
  • Virtual Room_12B
  • Virtual Room_12C
  • Virtual Room_12D
  • Virtual Room_12E
  • Virtual Room_12F
  • Virtual Room_12G