Loading…
Type: Virtual Room 2C clear filter
Thursday, April 9
 

12:13pm GMT+07

Opening Remarks
Thursday April 9, 2026 12:13pm - 12:15pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Junali Jasmine Jena

Dr. Junali Jasmine Jena

Assistant Professor, School of Computer Engineering, Kalinga Institute of Industrial Technology, Odisha, India

Thursday April 9, 2026 12:13pm - 12:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

A Case Study of TikTok’s AI-Driven Recommendations: Transparency, Privacy, and Mitigation Strategies
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Areej Almazroa, Sara Albahlal, Dalia Alswailem, Dhay Altamimi, Aljoharah Aldaej, Heba Kurdi
Abstract - Monitoring marine litter is essential for planetary and human survival. This study proposes a novel framework integrating satellite data and big data analytics to assess marine litter distribution in coastal and oceanic environments. Leveraging open-source imagery from COPERNICUS Sentinel-2 and LANDSAT, the framework utilizes reflectance methodologies and image processing to identify and classify marine debris, focusing on spectral bands from visible blue (490 nm) to short-wave infrared (1610 nm). A pilot case study in San Diego, California, demonstrates the approach’s feasibility. The study explores the potential of microwave radiometry and machine learning for material detection and contour analysis, showing how satellite data can support dynamic and cross-platform monitoring systems. Results validate the use of remote sensing technologies to map plastic debris, providing a replicable methodology that combines emergent (e.g., satellites, drones) and traditional (e.g., sampling) techniques. This approach contributes to a deeper understanding of plastic pollution pathways, sources, and impacts across economic sectors. By generating harmonized data on mismanaged plastic waste, the study informs sustainability strategies and circular economy practices, helping redesign systemic plastic management and supporting local and global environmental governance.
Paper Presenter
avatar for Aljoharah Aldaej

Aljoharah Aldaej

Saudi Arabia

Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

A Robust and Efficient NLP Framework for Enterprise Ticket Classification under Domain Shift and Imbalance
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Sonali S. Gaikwad, Jyotsna S. Gaikwad
Abstract - In this semi-systematic literature review, a detailed study of the role of Human-Computer Interaction (HCI) in creating game-based solutions for Attention-Deficit/Hyperactivity Disorder (ADHD) among children is conducted. Six peer-reviewed research studies were selected. The study demonstrates that HCI can serve as a major therapeutic mechanism by transforming digital platform-based cognitive training into engaging, interactive experiences. These approaches not only improve focus but also enhance the overall effectiveness of interventions. Key findings from the analyzed studies are discussed, and future research directions are proposed, including multimodal hybrid systems with adaptive personalization and accessibility features to further improve outcomes for children with ADHD.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Clinical Risk Scores Demonstrate High Discrimination for Middle Cerebral Artery Aneurysm Rupture in a Single-Center Chinese Cohort: A Hypothesis-Generating Machine Learning Study
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Bharathi A, Mohan Kumar P, Subha B
Abstract - Rupture of an intracranial aneurysm results in catastrophic subarachnoid hemorrhage with a 30–40% fatality rate. Although treatment decisions are guided by clinical risk scores (PHASES, ELAPSS), recent research suggests that morphological analysis and computational fluid dynamics (CFD) may offer better rupture prediction. This study looked at 92 middle cerebral artery aneurysms from the CMHA dataset, which included 71 that had ruptured and 21 that had not. We evaluated four feature sets: Clinical-Basic (13 variables), Clinical-Scores (adding PHASES and ELAPSS; 15 variables), Scores and Morphology (24 variables), and Full (28 variables). We trained logistic regression models using 5- fold cross-validation with a 20% test set. We used bootstrap validation (1000 iterations) and Bonferroni-corrected feature importance analysis to reduce overfitting. The AUC for the Clinical-Basic set was 0.891±0.063. Performance was enhanced to a maximum AUC of 0.976±0.034 by adding PHASES and ELAPSS. The Full model achieved an AUC of 0.981±0.029, with neither morphological nor hemodynamic variables giving much further improvement. Significant variance was revealed by bootstrap analysis (95% CI: 0.764-0.998). At 90% specificity, the test set's AUC was 0.933, but its sensitivity was only 14.3%. The primary contributors were ELAPSS (F=143.2, p<10⁻¹) and PHASES (F=38.4, p<10⁻¹), whereas morphological and hemodynamic characteristics did not exhibit any significant correlations. Clinical scores demonstrated strong discrimination, but CFD-derived parameters offered minimal additional value in this small, imbalanced, single-center group. The wide confidence intervals and class imbalance limit clinical recommendations. Further validation in larger, multicenter studies is necessary.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Data Governance for Sustainable Artificial Intelligence
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Tirupathi Rao Dockara, Manisha Malhotra
Abstract - AI and data platforms are increasingly expected to deliver end-to-end business automation under rapid market and regulatory change. However, prevailing platform construction strategies remain predominantly top-down: teams standardize a generic capability stack and subsequently customize it for heterogeneous domains through code, integration glue, and service forks. This approach amplifies technical debt, fragments governance, and makes continuous adaptation expensive. This paper introduces the Inverse Vertex Pyramid (IVP), a design pattern that reverses the direction of platform derivation. IVP begins at the use-case vertex by conducting rigorous analysis of high-value specialized automation scenarios and generalizes them into explicit, machine-actionable platform descriptors (metadata models, domain ontologies, policy/workflow specifications, and capability contracts) that form a stable, reusable core. Specialization is realized primarily via declarative configuration and policy changes, rather than code rewrites. We formalize IVP as a pattern, propose a reference architecture separating control and execution planes, and provide a comparative analysis against layered architectures, domain-driven design, and microservice platforms. A proof-of-concept walkthrough in regulated claims automation illustrates the generalization mechanism and highlights how IVP can reduce re-engineering, improve governance consistency, and accelerate time-to-market. The paper concludes with limitations, threats to validity, and a research agenda for automated use-case mining, formal verification of policies, and quantitative evaluation of platform agility.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

DRISHTI: An Edge-AI and IoT Multimodal Assistive Navigation System for the Visually Impaired
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Nishant Shah, Ansh Bajpai, Shrivaths S. Nair, Manas Verma K, Sabitha S
Abstract - Digital accessibility in higher education is a key requirement to ensure the inclusion of students with hearing disabilities. However, institutional plat-forms often present barriers that limit autonomy, understanding of information, and full participation. The objective of this study was to evaluate the user experience of students with hearing disabilities on the EVIRTUAL, SGA, and SIS platforms of the Technical University of Manabí, identifying perceptions, accessibility barriers, and improvement proposals. A descriptive, exploratory study with a mixed-methods approach was conducted. The population consisted of seventy-eight students with hearing disabilities registered in the Inclusion Unit, from which an intentional subsample of ten participants was selected. A structured sur-vey with Likert-type scales and a participatory observation form were applied in real interaction situations with the platforms. Quantitative analysis was carried out using descriptive statistics, while qualitative information was organized into thematic categories. The results show that half of the participants achieve full autonomy in the use of the platforms, forty percent require intermittent support, and the rest need constant assistance. Regarding clarity of information and con-tent comprehension, intermediate responses predominate, which reveals recur-rent difficulties. The main barriers identified were a confusing interface, non-intuitive navigation, insufficient visual supports, and the need for external assistance. The study proposes improvements such as customizable subtitles, step-by-step visual guides, an accessibility button, a sign language interpreter avatar, and optimization for mobile devices, aimed at strengthening autonomy and user experience.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Securing E-commerce with Blockchain and Smart Contracts
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Sabarishwaran V, Gomathi K, Andey Phani Vinay, Jagadeeswaran V, Ranjith Kumar M
Abstract - The rapid expansion of digital commerce platforms has significantly transformed on- line transactional systems; however, conventional centralized architectures continue to face critical challenges related to security, transparency, data integrity, and trust management. Traditional e-commerce systems rely heavily on centralized databases, making them vulnerable to data tam- pering, unauthorized access, fraudulent transactions, and single points of failure. To address these limitations, this paper proposes a secure, scalable, and modular web-based e-commerce system that is architecturally designed for integration with blockchain technology and smart contracts. The proposed system is implemented using widely adopted web technologies, with a responsive frontend and a robust backend to support essential functionalities such as user authentication, product catalog management, shopping cart operations, order processing, inventory management, and administrative control. The architecture emphasizes separation of concerns, enabling flexibility, maintainability, and future extensibility. A key contribution of this work lies in the incorporation of a blockchain-ready framework that enables immutable transaction recording and enhanced trace- ability across the entire transaction lifecycle. Smart contracts automate transaction validation and order execution. The system also introduces an AI-based anomaly detection mechanism using a Deep Q-Network to detect fraudulent behavior. Experimental validation demonstrates reliable per- formance and scalability.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Smart Handheld Oscilloscope With Integrated Processing For Real-Time Signal Analysis
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Sowmyashree N, Madhu Sunkanur, Impana M, Suchithra B S, Hemalatha P G
Abstract - The existence of a growing social media has created complex cyber systems in which vast quantities of interactions constitute substantial issues regarding misinformation, privacy invasion, deception of identities, and destructive behavioural tendencies. The regularity of involvement in this type of big systems requires sophisticated systems that are able to judge the motive of the user, content validity and suspicious activities within real time. Overall interest will be to develop a universal trust calculation system that will be more secure and effective in ensuring privacy and increasing the accuracy of suspicious or malicious users in social sites. The proposed Multi-Layer Federated Trust Framework algorithm is a combination of peer-based user reputation scoring, feature-based content authenticity detection, federated trust indicators aggregation, and anomaly detection with the help of behavioural anomalies. These approaches cooperate with secure aggregation and decentralized learning in removing the uncoded information exposure and enable the computation of trust at scale. The proposed algorithm is experimentally confirmed, and the obtained results are 95.2, 94.1, 93.5, and 93.8, corresponding to a minimum latency of 65 ms and a privacy preservation score of 0.98. The general results indicate a viable and holistic response that adds to secure interactions, blocks malicious acts and encourages trust in the actual social media settings.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Statistical Learning Frameworks for Automated Detection and Classification
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Md. Shahidul Islam, Hasina Islam
Abstract - Cross-domain recommendations are imperative in the growing tourism industry and with the increasing means of communication. Preference drift, preference transfer, and unfamiliarity with places have an overbearing impact on recommender systems. Most approaches do not address geometric misalignment across domains, which is essential for cross-domain preference shift analysis in recommendation tasks. We propose Procrustes-Based Contextual Thompson Sampling (P-CTS) for Cross-Domain POI Recommendation, integrating adversarial domain-invariant learning, optimal geometric alignment via Procrustes transformation, and adaptive Thompson Sampling with sleeping bandit management. First, the embeddings are constructed to model the preference drift across the domains. Next, the Procrustes transformation aligns source and target embedding spaces via optimal rotation, scaling, and translation. In the last phase, we initialize Beta priors with similarity-weighted pseudo-counts derived from the aligned embeddings. The experiments on Gowalla and Foursquare across domains demonstrate 5.1% improvements in Precision@5 and 9.75% improvements in cold-start accuracy, suggesting an adaptive exploration-exploitation trade-off.
Paper Presenter
avatar for Hasina Islam

Hasina Islam

Bangladesh

Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

The interaction of convolutional structure and KAN bottlenecks in U-KAN architectures
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Binh Pham Nguyen Thanh, Long Duong Phi, Phung Thi-Kim Nguyen, Nhan Thi Cao
Abstract - The rapid proliferation of Internet of Things (IoT) devices has significantly increased the digital attack surface, which, in turn, has raised network vulnerability to sophisticated Distributed Denial of Service (DDoS) campaigns that could reduce the effectiveness of traditional signature-based Intrusion Detection System (IDS). Furthermore, conventional Machine Learning (ML) approaches are often subject to manual feature engineering and lack the capture of complex spatial and temporal dependencies, which are essential to detect subtle, polymorphic threats. In this regard, the present work proposes a lightweight hybrid Deep Learning (DL) architecture for reliable (DDoS) detection. The proposed approach integrates spatial feature extraction using a Convolutional Neural Network (CNN) with a Bidirectional Long Short-Term Memory (BiLSTM) network to capture temporal correlations, further enhanced by an additive attention mechanism that underlines the importance of flow segments relevant to recognition. To mitigate issues with computational complexity, a two-phase hybrid feature selection approach, a combination of Information Gain (IG) and Dynamic Particle Swarm Optimization (PSO) would be utilized to select an optimal subset of features. The performance of the model was evaluated using the CICDDoS2019 benchmark dataset. The feature selection process was able to reduce the input space from 80 to 17 relevant features. The combined CNN-BiLSTM model, along with threshold optimization, was able to achieve an accuracy of 94.1%, which indicates a significant improvement in the reduction of false negatives and validates the effectiveness of the proposed method in a secure IoT environment.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

12:15pm GMT+07

Weedy and Cultivated Rice Classification During Harvesting Stage Using YOLOv8
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Wani Zahidah Mohd Subari, Shuzlina Abdul-Rahman, Mohamad Faizal Ab Jabal, Sharifalillah Nordin
Abstract - Role-playing games (RPGs) allow the player to take on a specific role and complete different missions during gameplay. Their diversity enables a range of ap-plications beyond entertainment, as they are often used in educational contexts. Learning content can be embedded in common components, such as game fields, tasks, objects, or non-playing characters (NPCs). The paper presents several educational RPGs with their features and characteristics, and existing models of didactic video games. It proposes a two-level metamodel for describing an educational RPG. The metamodel is divided into five main components (world, educational aspects, quest, playing character, and NPCs), and their taxonomies are presented briefly. The authors propose a conceptual model that includes the interrelationships among the components mentioned. In addition, their interpretations and significance for the development of RPG educational games are explained. An example of the metamodel is represented through a quest from a real educational RPG in the field of Chemistry. The presented RPG metamodel improves under-standing and helps to better design, develop, and integrate such games into various learning environments. The presented taxonomy can serve as a useful template for structuring design details.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room C Bangkok, Thailand

2:15pm GMT+07

Session Chair Concluding Remarks
Thursday April 9, 2026 2:15pm - 2:17pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Junali Jasmine Jena

Dr. Junali Jasmine Jena

Assistant Professor, School of Computer Engineering, Kalinga Institute of Industrial Technology, Odisha, India

Thursday April 9, 2026 2:15pm - 2:17pm GMT+07
Virtual Room C Bangkok, Thailand

2:17pm GMT+07

Session Closing and Information To Authors
Thursday April 9, 2026 2:17pm - 2:20pm GMT+07

Moderator
Thursday April 9, 2026 2:17pm - 2:20pm GMT+07
Virtual Room C Bangkok, Thailand
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
  • Inaugural Session
  • Physical Technical Session 1A
  • Physical Technical Session 1B
  • Physical Technical Session 1C
  • Physical Technical Session 1D
  • Physical Technical Session 2A
  • Physical Technical Session 2B
  • Physical Technical Session 2C
  • Physical Technical Session 2D
  • Virtual Room 1A
  • Virtual Room 1B
  • Virtual Room 1C
  • Virtual Room 1D
  • Virtual Room 1E
  • Virtual Room 1F
  • Virtual Room 2A
  • Virtual Room 2B
  • Virtual Room 2C
  • Virtual Room 2D
  • Virtual Room 2E
  • Virtual Room 2F
  • Virtual Room 2G
  • Virtual Room 3A
  • Virtual Room 3B
  • Virtual Room 3C
  • Virtual Room 3D
  • Virtual Room 3E
  • Virtual Room 3F
  • Virtual Room 3G
  • Virtual Room 7A
  • Virtual Room 7B
  • Virtual Room 7C
  • Virtual Room 7D
  • Virtual Room 7E
  • Virtual Room 7F
  • Virtual Room 7G
  • Virtual Room 8A
  • Virtual Room 8B
  • Virtual Room 8C
  • Virtual Room 8D
  • Virtual Room 8E
  • Virtual Room 8F
  • Virtual Room 8G
  • Virtual Room 9A
  • Virtual Room 9B
  • Virtual Room 9C
  • Virtual Room 9D
  • Virtual Room 9E
  • Virtual Room 9F
  • Virtual Room 9G
  • Virtual Room_10A
  • Virtual Room_10B
  • Virtual Room_10C
  • Virtual Room_10D
  • Virtual Room_10E
  • Virtual Room_10F
  • Virtual Room_10G
  • Virtual Room_11A
  • Virtual Room_11B
  • Virtual Room_11C
  • Virtual Room_11D
  • Virtual Room_11E
  • Virtual Room_11F
  • Virtual Room_11G
  • Virtual Room_12A
  • Virtual Room_12B
  • Virtual Room_12C
  • Virtual Room_12D
  • Virtual Room_12E
  • Virtual Room_12F
  • Virtual Room_12G