Loading…
Type: Virtual Room_10D clear filter
Saturday, April 11
 

9:28am GMT+07

Opening Remarks
Saturday April 11, 2026 9:28am - 9:30am GMT+07

Invited Guest & Session Chair
avatar for Dr. Yogesh Mali

Dr. Yogesh Mali

Research Dean, Ajeenkya D Y Patil University, Lohegaon, India

Saturday April 11, 2026 9:28am - 9:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

A STUDY IN UNDERSTANDING THE ROLE OF GREEN COMPUTING IN ACHIEVING SUSTAINABLE DEVELOPMENT
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Reepu
Abstract - This paper presents a hybrid diagnostic approach for an engine air-path benchmark characterised by environmental variability, limited labelled faults, and the need for reliable online decisions. The proposed method combines physics-guided residual features with datadriven temporal representation learning. Residuals derived from grey-box relations capture physically meaningful deviations, while a lightweight encoder extracts temporal patterns across operating regimes. To enhance robustness under changing ambient conditions, the model is explicitly conditioned on measured environmental variables and trained to favour stable representations across sessions. An open-set decision policy with calibrated rejection is incorporated to reduce misclassification when encountering unseen fault magnitudes or insufficient evidence. The method is evaluated under the official benchmark protocol using online processing constraints and standard metrics, including false alarm rate, detection rate, isolation rate, detection delay, and computational cost. Results show improved reliability compared to competitive baselines, with lower false alarms, higher detection and isolation performance, and stable behaviour across sessions. The approach remains computationally efficient and suitable for real-time deployment in practical diagnostic pipelines.
Paper Presenter
avatar for Reepu

Reepu

India

Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

Cloud Computing Under Threat: Security Issues and Modern Solution
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Zala Bhargavi Harshadbhai, Priyank D. Doshi
Abstract - Brain tumor classification using MRI is very important for early diagnosis. While convolutional neural networks (CNNs) showed strong performance in medical image analysis, but transformer-based architectures have recently gained popularity because of their ability to model long-range spatial dependencies through self-attention mechanisms. Our work lines up two such models - Vision Transformer and Swin Transformer to see how each handles tumor spot-ting in brain MRIs from the BRISC2025 collection. Same training setup applied to both keep things balanced and evaluated on the official test split for ensuring fairness. The official test set showed that both ViT (99.17 ± 0.26%) and Swin (99.27 ± 0.13%) have nearly identical predictive performance. Despite similar outcomes, their inner workings differ sharply behind the scenes. Swin Trans-former have approximately 40% and inference cost by nearly 50% compared to ViT while maintaining similar accuracy. The study provides insights into the performance and efficiency of trade-offs between global and hierarchical trans-former architectures in medical imaging applications.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

Design of an intelligent warehouse management system at Dobladoras Cotopaxi
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Eduardo J. Lopez, Angelin Y. Alarcon, Marco Riofrio-Morales, Jose E. Naranjo
Abstract - Higher education institutions often face challenges with fragmented student services and the reliance on manual workflows. Although Large Language Models (LLMs) present opportunities for service integration, their application in administrative contexts introduces specific risks, notably “transactional hallucinations” and the potential for unauthorized system actions. To explore potential mitigations for these challenges, this paper presents SUEMas as a proposed alternative: a configuration-driven, multi-agent ecosystem designed to help regulate LLM interactions within university domains. The proposed framework implements a Dynamic Tool Registry aimed at enforcing phase-aware tool exposure, alongside a Closed-World Action Gating mechanism intended to restrict sensitive operations to verified session candidates. Initial evaluations of this proposal indicate that SUEMas can support consistent policy enforcement, achieving high recall in RAG-based tasks under test conditions. Furthermore, the system maintained strong multi-turn coherence while keeping latency low, suggesting that structured security governance might practically coexist with conversational flexibility.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

Digital Tax Administration and MSME Tax Compliance: Evidence from Indonesia’s Core Tax System in Supporting SDG 8 and SDG 17
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Surya Anugrah, Dwi Handarini, Eka Septariana Puspa, Windy Permata Suyono, Sabo Hermawan, Irima Rahmadani, Nazwa Febriyani
Abstract - This paper presents the design, modelling, fabrication flow and analysis of multi-functional photonic crystal (PhC) nano-cavity sensors integrated with cantilever beams and diaphragms on a Silicon-On- Insulator (SOI) platform. The device architecture leverages defect-based two-dimensional PhC nano-cavities to obtain high quality (Q) factors and small mode volumes, while mechanically compliant structures transduce force and pressure into measurable optical resonance shifts. Biochemical and chemical detection is achieved via refractive-index based transduction and temperature sensing via thermo-optic effects. A machinelearning (ML)-assisted calibration and sensitivity enhancement framework is proposed to improve resolution and compensate for fabrication tolerances. Fi-nite-difference time-domain (FDTD) optical simulations and finite-element method (FEM) mechanical simulations validate device performance. Noise analysis, limit-of-detection (LOD) calculations, and comparison against state-of-the-art devices are provided. The architecture is CMOS-compatible and suitable for lab-on-chip photonic sensing applications.
Paper Presenter
avatar for Surya Anugrah

Surya Anugrah

Indonesia

Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

Early Breast Cancer Detection Using Deep Learning Techniques
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Raina Thakkar
Abstract - This work investigates the Evolutionary Matrix Factorization (EMF) model proposed in Evolving Matrix-Factorization-Based Collaborative Filtering Using Genetic Programming. The EMF model employs genetic programming to optimize the matrix product function used in traditional Matrix Factorization recommender systems. The primary objective of this project is to develop a GP-based matrix factorization model that outperforms EMF in prediction accuracy. To facilitate comparison, we first reproduce the EMF model’s results using standardized metrics. Subsequently, we design and implement a custom data structure for GP, along with the full pipeline for reproducible model execution. Finally, we analyze the performance of our proposed model and compare it against EMF, demonstrating its improvements in prediction precision.
Paper Presenter
avatar for Raina Thakkar

Raina Thakkar

Australia

Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

GraphAML-X: Knowledge-Graph AML with Entity Resolution and Audit-Ready Case Reasoning
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Srikumar Nayak
Abstract - Anti–money laundering (AML) monitoring is difficult because suspicious behavior is rarely a single abnormal transaction; it is usually a short sequence of linked transfers across many entities. Standard tabular models miss these links and often produce alerts that are hard to justify during review. To address this, we propose GraphAML-X, a practical pipeline that turns raw transaction logs into a knowledge graph and produces case-level evidence for analysts. The main issue we target is fragmented identity (the same actor appearing under noisy identifiers) and weak case explanations (high scores without clear paths or rule triggers). GraphAML-X first performs entity resolution to merge duplicate accounts and identifiers using rules plus a learned match score, so the graph represents real actors. It then learns temporal graph embeddings from the timeordered transaction network to capture multi-hop laundering patterns such as rapid circulation and hub–spoke behavior. Finally, it combines graph risk with rule-hybrid case reasoning: regulatory red-flag rules propose candidate alerts, and the graph model ranks them while emitting audit-ready evidence (top subgraph paths, key neighbors, and triggered rules) and alert-volume control via a calibrated threshold. Using the Micro-AmlSim dataset, GraphAML-X achieves an AUC-ROC of 0.982 and an AUC-PR of 0.741, improving the strongest baseline GNN by +0.034 AUC-PR. At a fixed alert rate of 1% of transactions, it attains 0.686 recall while reducing false alerts by 18.9% compared to rule-only screening. These results show that GraphAML-X can improve detection while producing reviewable and policy-aligned AML cases.
Paper Presenter
avatar for Srikumar Nayak

Srikumar Nayak

United States

Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

Modeling Annotation-Style Variability for Annotation- Free Skin Lesion Segmentation
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Nguyen Ngoc Dung, Doan Van Thang
Abstract - Memory encryption is a key security requirement for modern computing systems, addressing vulnerabilities between CPUs and main memory. Traditional storage encryption is insufficient for protecting volatile data in RAM, which remains exposed to bus sniffing, cold boot attacks, and side-channel exploits. This paper therefore systematically reviews memory encryption techniques focused on hardware-based solutions like Intel Total Memory Encryption (TME), Multi-Key TME, and AMD Secure Memory Encryption, which provide robust protection while minimising performance overhead. The paper also explores integrity protection via Merkle trees and side-channel countermeasures against Differential Power Analysis and Simple Power Analysis attacks. Additionally, granular memory encryption methods for multi-tenant environments are discussed, highlighting their role in isolating sensitive data across security domains. By examining security guarantees and performance trade-offs, we emphasise the necessity of efficient memory encryption to safeguard against evolving threats targeting the CPU-memory interface, providing hardware engineers a foundation for ensuring data confidentiality and integrity.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

Secure Medical Image Communication in the Post-Quantum Era: Development and Validation of a Comprehensive Dataset for Cryptographic Protocol Testing
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Chaitrasree S, Srinidhi G A
Abstract - The Research will shows how app-based omnichannel ICT-enabled marketing shapes customer engagement and service loyalty in the culinary hospitality industry within an urban emerging-market context. Drawing on an ICT-centered and service-systems perspective, the research conceptualizes mobile applications as integration hubs that coordinate multiple service modes—delivery, dine-in, takeaway, and drive-thru—into a unified customer experience. The study approach was using a quantitative design with a cross-sectional survey of 150 chain-restaurant mobile app users in Jakarta. Structural Equation Modeling (PLS-SEM) were used to analyze the data. The results shows that app-based omnichannel ICT-enabled marketing has a positive and significant effect on customer engagement and service loyalty. Customer engagement also demonstrates a positive effect on service loyalty and mediates the relationship between omnichannel ICT-enabled marketing and loyalty, partially. These findings suggest that perceived ICT integration quality, reflected through consistency, seamlessness, and coordination across service modes, plays a pivotal role in translating technology-enabled service design into relational outcomes. This study contributes to the ICT literature specially in hospitality by extending omnichannel research beyond a marketing-centric perspective and highlighting the strategic role of integrated mobile app infrastructures in high-frequency culinary service environments. Based on a managerial standpoint, the results emphasize the importance of treating mobile applications as core service platforms that support engagement-driven loyalty in chain-restaurant operations.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

Support Vector Regression via Granular Ball Computing Approach
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Pei-Yi Hao
Abstract - Digital transformation is reshaping education systems worldwide, with significant implications for rural and underserved regions. In India, initiatives aligned with the National Education Policy (2020) have promoted online learning platforms, digital classrooms, and technology-enabled teacher training to enhance access, equity, and quality in education. However, rural schools continue to face structural challenges such as limited infrastructure, digital divides, and inadequate teacher preparedness, which influence the effectiveness of digital integration.This conceptual paper examines the transformation of rural education in India from traditional teacher-centred classrooms to digitally enabled learning ecosystems. Grounded in Constructivist Learning Theory, the Technology Acceptance Model (TAM), Diffusion of Innovation Theory, and the TPACK framework, the study proposes an integrated conceptual model linking digital infrastructure, pedagogical innovation, and teacher competence to improved access, engagement, and learning outcomes. The paper argues that digital transformation represents a systemic pedagogical and institutional reform rather than a mere technological shift. Its success depends on inclusive infrastructure development, sustained teacher capacity building, and context-sensitive implementation in rural settings.
Paper Presenter
avatar for Pei-Yi Hao
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

9:30am GMT+07

Toward Sustainable Smart Contract Security: A Comprehensive Survey of Vulnerability Detection Methods and Approaches
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Aryan Dholi and Malathi P
Abstract - Smart contract vulnerabilities have continuously been a major source of threat to blockchain security, with billions of dollars being accounted for losses every year. This review paper delves into over 15 different detection methods utilizing static analysis, dynamic monitoring, machine learning, and hybrid approaches. Sustainability metrics such as the Green Detection Score and the Energy Efficiency Index are first proposed by us to gauge the environmental cost in relation to the accuracy. From our review of 28 papers, we conducted research studies to points out a significant discovery: transformer models reach 0.91 F1-score but use 1,475× more energy than static analyzers. Hybrid approaches present a viable compromise with 0.89 F1-score and 62% energy savings. We thus offer deployment advice, sustainable architecture templates, and a 2030 roadmap for green blockchain security.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room D Bangkok, Thailand

11:30am GMT+07

Session Chair Concluding Remarks
Saturday April 11, 2026 11:30am - 11:32am GMT+07

Invited Guest & Session Chair
avatar for Dr. Yogesh Mali

Dr. Yogesh Mali

Research Dean, Ajeenkya D Y Patil University, Lohegaon, India

Saturday April 11, 2026 11:30am - 11:32am GMT+07
Virtual Room D Bangkok, Thailand

11:32am GMT+07

Session Closing and Information To Authors
Saturday April 11, 2026 11:32am - 11:35am GMT+07

Moderator
Saturday April 11, 2026 11:32am - 11:35am GMT+07
Virtual Room D Bangkok, Thailand
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
  • Inaugural Session
  • Physical Technical Session 1A
  • Physical Technical Session 1B
  • Physical Technical Session 1C
  • Physical Technical Session 1D
  • Physical Technical Session 2A
  • Physical Technical Session 2B
  • Physical Technical Session 2C
  • Physical Technical Session 2D
  • Virtual Room 1A
  • Virtual Room 1B
  • Virtual Room 1C
  • Virtual Room 1D
  • Virtual Room 1E
  • Virtual Room 1F
  • Virtual Room 2A
  • Virtual Room 2B
  • Virtual Room 2C
  • Virtual Room 2D
  • Virtual Room 2E
  • Virtual Room 2F
  • Virtual Room 2G
  • Virtual Room 3A
  • Virtual Room 3B
  • Virtual Room 3C
  • Virtual Room 3D
  • Virtual Room 3E
  • Virtual Room 3F
  • Virtual Room 3G
  • Virtual Room 7A
  • Virtual Room 7B
  • Virtual Room 7C
  • Virtual Room 7D
  • Virtual Room 7E
  • Virtual Room 7F
  • Virtual Room 7G
  • Virtual Room 8A
  • Virtual Room 8B
  • Virtual Room 8C
  • Virtual Room 8D
  • Virtual Room 8E
  • Virtual Room 8F
  • Virtual Room 8G
  • Virtual Room 9A
  • Virtual Room 9B
  • Virtual Room 9C
  • Virtual Room 9D
  • Virtual Room 9E
  • Virtual Room 9F
  • Virtual Room 9G
  • Virtual Room_10A
  • Virtual Room_10B
  • Virtual Room_10C
  • Virtual Room_10D
  • Virtual Room_10E
  • Virtual Room_10F
  • Virtual Room_10G
  • Virtual Room_11A
  • Virtual Room_11B
  • Virtual Room_11C
  • Virtual Room_11D
  • Virtual Room_11E
  • Virtual Room_11F
  • Virtual Room_11G
  • Virtual Room_12A
  • Virtual Room_12B
  • Virtual Room_12C
  • Virtual Room_12D
  • Virtual Room_12E
  • Virtual Room_12F
  • Virtual Room_12G