Loading…
Venue: Virtual Room A clear filter
Thursday, April 9
 

9:28am GMT+07

Opening Remarks
Thursday April 9, 2026 9:28am - 9:30am GMT+07

Invited Guest & Session Chair
avatar for Prof. Najera Umpar

Prof. Najera Umpar

Professor, National University, Philippines

avatar for Dr. Swapnaja Hiray

Dr. Swapnaja Hiray

Assistant Professor, Pune Institute of Computer Technology, Maharashtra, India

Thursday April 9, 2026 9:28am - 9:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

A Hybrid Deep Learning and Graph-Based Framework for Interpretable Medicare Fraud Detection
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Kunam Subba Reddy, Mangavarapu Jahnavi, Kotte Hima Teja, Shaik Kathamma Basheerun, Nama Adarsh
Abstract - Proper estimation of battery state of charge (SOC), state of health (SOH) and state of power (SOP) are vital to safe and efficient operation of photovoltaic (PV)-battery energy storage systems, particularly at highly dynamic profiles in which both charging and discharging is taking place. In this paper, a clear comparative analysis of classical, model-based, and machine-learning-based estimation techniques is performed in terms of a similar 24-h ultra-challenging PV + load current profile, simulating realistic residential microgrids operation. The test profile involves strong directions of current swings, partial charging, and long constant-power discharge, and temperature change. The estimators are implemented and benchmarked such as open-circuit-voltage (OCV)-based SOC estimation, linear Kalman filter (KF), extended Kalman filter (EKF), unscented Kalman filter (UKF), basic machine learning (ridge regression) and support vector machine (SVM). Each of the methods is compared to a high-fidelity model of an electro-thermal battery with capacity degradation and resistance increase with age and temperature. The accuracy of SOC tracking, SOH estimation error, and SOP tracking capability are discussed. It is found that the OCV-based method fails when the loading is dynamic which makes the SOC about constant and SOP highly conservative. KF and EKF are much better SOC trackers but they have greater deviation at high SOC and near bottom-of-discharge. ML and SVM estimators based on Ridge-regression show high SOC accuracy in the entire profile and UKF shows the best overall trade off between SOC accuracy, SOH tracking as well as SOP estimation strength when resistance varies with temperature and with age. The paper discusses the relevance of the collaborative consideration of SOC, SOH, and SOP and shows the advanced filters and ML models can significantly increase the performance of PV-battery applications that require tough operating conditions.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

An Adversarial Evaluation of Stealthy Insider Attacks and UEBA-Based Defensive Detection in Enterprise Environments
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Asmit Patil, Smita Shedbale, Sneha Kumbhar, Ashwini Athawale, Smita Arude, Rohan S. Sapkal, Priya Sharma, Dhanaraj Jadhav
Abstract - The rapid growth of Internet of Things (IoT) deployments in 5G Enhanced Ma-chine-Type Communication (eMTC) networks has significantly increased the network at-tack surface. A major challenge for Network Anomaly Detection Systems (NADS) in this environment is severe class imbalance, where dominant benign traffic obscures rare but high-impact attacks, leading to poor minority-class detection. This paper presents Conf-Gate XGBoost-RF, a two-stage hybrid anomaly detection architecture designed to address this limitation without compromising real-time performance. The framework employs a high-speed XGBoost classifier for initial screening and a confidence-gated mechanism that selectively routes low-confidence predictions to a specialist Random Forest trained on synthetically balanced data. Evaluation on the large-scale CICIoT2023 dataset shows that the proposed model achieves 99.32% accuracy and a Macro F1-score of 0.80, sub-stantially outperforming single-stage baselines. Notably, recall for critical low-volume at-tacks, such as Command Injection, improves by over 34%. With an average inference latency of 0.87 ms, the proposed approach remains compatible with the stringent low-latency requirements of 5G eMTC control signaling, demonstrating a practical balance between computational efficiency and rare-attack sensitivity.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Beyond Accuracy: Comparison of ResNet50 and GWN-Enhanced Models for Brain Tumor MRI Classification with LIME visualization
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Nguyen Thanh Minh Tam, Mai Nhu Yen, Nguyen Quang Huy, Nguyen Thi Nhung, Nguyen Thi Huyen Chau, Nguyen Hoang Phuong, Dong Van He, Bui Xuan Cuong, Vladik Kreinovich
Abstract - The rapid emergence of smart apps in smart environments, industrial automation and cyber-physical systems has demonstrated the intrinsic limitations of conventional design of information and communication technologies. The existing ICT systems are very rigid, centrally controlled and dependent on fixed operation logic and this restricts their dynamism to changing environments and complex system dynamics. Intelligent systems are already urgently in need of architectural paradigms that offer self-education, decentralized intelligence, and autonomous scale-based decision making. The following paper proposes a next-generation Edge-Cloud-AI integrated ICT architecture, which is supposed to service self-learnings and autonomous intelligent systems. The proposed architecture gives a layered intelligence design that utilizes edge level real-time learning, cloud level global optimization, and an autonomy orchestration layer balancing the adaptive behavior in the distributed elements. The architecture enables systems to create operational policies in an autonomous way through the provision of continuous learning feedback and autonomous controls directly within the ICT infrastructure although still be scaled and be reliable. Significant contributions of this work are the definition of a single Edge-Cloud intelligence system, the incorporation of self-learner’s mechanisms along structural layers, and an autonomy-based orchestration model that may be applied to diverse fields of intelligent systems. The proponent architecture is not platform specific and can be applied in a wide range of future intelligent applications that may require resilience, versatility and autonomy.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Comparative Study of LSTM and Transformer Models for Health Mention Detection on Twitter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Nethika Alagarathnam, Dhanushka Jayasinghe, WU Wickramaarachchi
Abstract - Social media platforms, especially Twitter, have become trending sources for public health monitoring, as individuals often share personal experiences related to symptoms, diagnoses, and health concerns. However, detecting personal health mentions (PHMs) in such noisy, short text environments remains challenging. This study investigates about evaluating and comparing three neural architectures including Long Short-Term Memory with word embeddings, a fine tuned Bidirectional Encoder Representations from Transformer model (BERT) and a compact TinyBERT model distilled from BERT. Using a labeled corpus of health related tweets, all models were trained under identical preprocessing, optimization, and evaluation conditions with accuracy, precision, recall, and F1- score assessed on a test set. The results reveal clear performance differences across three architectural paradigms. LSTM baseline demonstrated strong learning on the training set but found significant overfitting and failed to perform on unseen data. But in contrast, the transformer models BERT and TinyBERT delivered a decent balanced performance reflecting the good ability to capture contextual semantics noise in tweets. While BERT achieved the highest overall performance. Notably, TinyBERT provided a competitive and alternate suite for deployment in constrained environment. These findings highlight the effectiveness of transformer architectures for Personal Health Mention detection and practical insights for building efficient and accurate public health monitoring system using social media data.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Conf-Gate XGBoost-RF Hybrid Model for Multi-Class Anomaly Classification in 5G-Enabled eMTC IoT Net-works
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Michael David, Chekwas Ifeanyi Chikezie, Abra-ham Usman Usman, Sulieman Zubair, Henry Ohiani Ohize, Joseph Ojeniyi
Abstract - With the rapid growth of digital communication and multimedia applications, secure transmission and storage of digital images have become critical challenges. Conventional text-based encryption algorithms are often inadequate for image data due to its high redundancy, strong pixel correlation, and large data volume. These characteristics necessitate specialized encryption mechanisms that can provide strong security while maintaining computational efficiency. This paper proposes a robust image encryption framework designed to ensure confidentiality, resistance to cryptographic attacks, and suitability for real-time applications. The proposed approach integrates advanced permutation–diffusion operations with chaos-based key generation to effectively disrupt statistical characteristics inherent in digital images. Chaotic maps with high sensitivity to initial conditions are employed to generate dynamic encryption keys, enhancing key space complexity and resistance against bruteforce and differential attacks. Pixel-level scrambling is combined with nonlinear diffusion operations to eliminate spatial correlations and achieve uniform cipher text distribution. The encryption process is further optimized to support grayscale and color images while preserving computational feasibility. Extensive experimental evaluation is conducted using standard benchmark images to assess security and performance. Statistical analyses, including histogram uniformity, correlation coefficients, information entropy, NPCR, and UACI metrics, demonstrate strong resistance against statistical and differential attacks. Key sensitivity and key space analysis confirm robustness against bruteforce attempts. Performance results indicate that the proposed scheme achieves a favorable balance between security strength and execution efficiency, making it suitable for real-time image protection. The experimental findings validate that the proposed image encryption framework provides enhanced security, scalability, and practicality, offering an effective solution for secure image communication in modern digital environments.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

DCS: A SHAP Enhanced Containment Framework for Stealthy Rogue Nodes in Software Defined Networks
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Vinod B. Maniyat, Arun Kumar B. R, Shreyas A
Abstract - Stealthy rogue components pose as legitimate nodes and progressively deteriorate services, take over flows, or taint network topology, posing serious scalability and security threats to modern SDN networks. High false positive rates, poor interpretability, and static threat assumptions make it difficult for current rule-based and signature-driven detection systems to detect such contextual threats. Based on the Dynamic Containment Score (DCS), a mathematically modelled, context-sensitive metric that measures each network node’s disruptive potential, this work offers a comprehensive behavioural defence paradigm. The framework integrates graph theoretic features, protocol specific entropy, and temporal volatility to compute real time DCS rankings, refined through SHAP based explainability and confidence bounded feature attribution for adaptive detection under concept drift. A multi strategy containment engine, including deception based mitigation, redirects attackers toward synthetic vulnerabilities. Validation on hybrid real world and adversarial traffic demonstrates superior early detection, explainable risk attribution, and efficient mitigation with minimal service disruption.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Detect insider threats from Employee Communications Using NLP
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Saurabh Nimje, Anup Bhitre, Sudhir Agarmore, Utkarsha Pacharaney
Abstract - Insider threat is a great danger to business security because of trust rights granted insiders, it is not easy to notice their malicious or careless work through the available security programs. This paper is going to examine how Natural Language Processing (NLP) can be used to detect insider threats proactively by analyzing the communication of employees such as emails, chat messages, and internal reports. Applying the CERT Insider Threat Dataset and simulated logs, a multi-level system was created, which includes text preprocessing, feature extraction based on sentiments and semantics, and classification of machine learning models- Random Forest Mean Square Error, SVM, and LSTM. Out of them, LSTM model performed best (92.6% accuracy and overall performance) since it was able to capture contextual and sequential patterns of communication. The most notable indicators of behaviors were sentiments of negativity, passively aggressive language, and frequency of communication efficiency, which indicated a high relationship with insider threat. SHAP (Shapley Additive Explanations) was also used in the given research to allow enhancing insights into model decisions. The results prove the viability of NLP-based solutions as scalable, context-sensitive, and explainable systems to detect insider threats extending the understanding of organizations to perceive behavioral anomalies and reduce the risks to a minimum.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Privacy-Preserving Synthetic Data Generation Using Natural Language Processing and Laplace Mechanism
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Maria Jihan Sangil, John Raymond Barajas, Ramnick Lim
Abstract - Government Identity documents have become groundwork for citizen verification, financial inclusion and public service. However unauthorized dis-closure, fraudulent access and frequent misuse of individual's personal information expose gaps in routine verification and wrongful disbursement of welfare benefits which asks the immediate need for a more secure privacy holding approach. Existing infrastructure like DigiLocker takes care of the secure transmission but a factor of privacy exposure is still compromised. The pro-posed model introduces TrustChain based on blockchain framework for decentralized identify verification and secure access. The inducement shifts focus from submission of identity information to authentication by the means of DID (Decentralized Identifiers) ensuring that some personal information will be hid-den to the document requestor. By integrating self sovereign identity principles, distributed storage and cryptographic operations the model enables users to au-thenticate without revealing personal parameters minimizing the risks of identity compromise. Pilot findings are particular not to mention that identity expo-sure is mitigated by such a representation and offers scalability towards integration into the current infrastructures such as Aadhaar connected services and Digital locker. A safe identity space where individuals retain ownership to per-sonal information as organizations and governments achieve acceptable validation.
Paper Presenter
avatar for Maria Jihan Sangil
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

SigNeura: Signature Verification via Siamese–Transformer with Synth-Pressure Map Augmentation
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - K. Subba Reddy, Pasulammagari Jahnavi, Devasam Hema Keerthana, Katreddy Jaswanth Reddy, Dudhekula Abdul Gaffar
Abstract - The investigation of events that have taken place is the foundation of the current law enforcement that uses surveillance videos extensively to identify suspects and the motives of criminals. Wherein, it becomes slow, tiresome, and liable to error when video data is being monitored manually due to the enormously large volumes of data being monitored. To cope with this, it is a need to witness a transition toward the use of automated technologies that are led by AI and deep learning. These systems are able to detect faces, masks, gaits, and ab-normal behavior systematically in adverse environments. The survey will re-view the information about each of the methods that involve face recognition using videos, gait analysis and anomaly detection systems. In addition, efforts are put in direction to present a standardized AI-based surveillance framework of legal multimodal multitask biometric and behaviour identification. The system proposed will focus on a radical reduction of false alarms and offer adequate and prompt intelligence to the law enforcement agencies to speed up investigations.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

The Generative AI Usage and Ethical Guidelines in Graduate Education of Payap University
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Authors - Keerin Nopanitaya, Luo Xiaoyu, Zhu Chunping, Pratya Nuankaew
Abstract - This study examines Generative AI use and ethical guidelines in graduate education at Payap University, Thailand. As large language models increasingly support learning, research, and academic writing, they boost efficiency but raise concerns about accuracy, transparency, and integrity. Using mixed methods, the study gathered questionnaire data and conducted interviews and focus groups with master’s and doctoral students. Results show broad AI use for literature reviews, writing, idea generation, and research, with more advanced use expected to grow. While students report moderate to high skills, many lack strong critical evaluation of AI outputs and practical understanding of ethics. Consistent with international research, key risks stem from limited AI literacy, unclear disclosure, and lack of oversight rather than the technology itself. The study recommends developing an AI literacy framework, clear disclosure standards, and process evaluation for ethical, responsible AI integration while protecting academic quality and integrity.
Paper Presenter
Thursday April 9, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

11:30am GMT+07

Session Chair Concluding Remarks
Thursday April 9, 2026 11:30am - 11:32am GMT+07

Invited Guest & Session Chair
avatar for Prof. Najera Umpar

Prof. Najera Umpar

Professor, National University, Philippines

avatar for Dr. Swapnaja Hiray

Dr. Swapnaja Hiray

Assistant Professor, Pune Institute of Computer Technology, Maharashtra, India

Thursday April 9, 2026 11:30am - 11:32am GMT+07
Virtual Room A Bangkok, Thailand

11:32am GMT+07

Session Closing and Information To Authors
Thursday April 9, 2026 11:32am - 11:35am GMT+07

Moderator
Thursday April 9, 2026 11:32am - 11:35am GMT+07
Virtual Room A Bangkok, Thailand

12:13pm GMT+07

Opening Remarks
Thursday April 9, 2026 12:13pm - 12:15pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Shikha Sharma

Dr. Shikha Sharma

Associate Professor and Head of Department- CSE, Poornima University, India

avatar for Dr. Sreenivasulu Gogula

Dr. Sreenivasulu Gogula

Professor & Head of the Department, Vardhaman College of Engineering, Telangana, India

Thursday April 9, 2026 12:13pm - 12:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Adaptive Hybrid RIME Optimization for Reliable Feature Selection and Photovoltaic MPPT in Dynamic Conditions
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - K.Surya Teja, Immanuel Anupalli, P.Sudheer
Abstract - Maximum power point tracking (MPPT) is a vital module of photovoltaic (PV) systems. Traditional maximum power MPPT techniques struggle in a complex and ever-changing scenarios, and the solar system's output characteristic curve shows multi-peak phenomena owing to dissimilarities in temperature and light concentration. This paper proposes an adaptive hybrid RIME optimization technique which enhances the exploratory capabilities of the method during the initialization phase by integrating tent mapping. The goal is to improve feature selection tasks and MPPT for PV systems under partial shading condition. It uses piecewise mapping to optimize the algorithm's parameters and attack a fair steadiness amongst global exploration and local exploitation. The search method is dynamically adjusted with an adaptive inertia weight introduced, which further increases convergence speed, search efficiency and algorithm's adaptability. In order to reduce computational costs and increase classification accuracy, the hybrid method employs natural-inspired metaheuristics for feature selection, resulting in optimal subsets. When it comes to tracking speed, precision, and stability in the PV MPPT environment, the method beats PSO-BOA, conventional RIME, IRIME and HRIME approaches.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

AI-Driven Health Risk Advisor: A Predictive Approach to Personalized Healthcare
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Gauree Prabhakar Sayam, Supriya Narad
Abstract - Chronic non-communicable diseases like diabetes, heart disease, and obesity continue to increase globally, comprising 74% of all deaths, even as noted by the World Health Organization in the 2025 progress monitor on non-communicable diseases. This work describes the design and deployment of Health Risk Advisor, an AI (artificial intelligence) web application powered by machine learning that predicts early risks and provides personalized recommendations on disease prevention. The integration of ensemble models such as Random Forest and XG-Boost into a rule-based advisory engine allows the application to achieve more than 90% accuracy in making risk classifications, addressing access barriers to healthcare in underserved regions, such as rural India. From architecture and design, healthcare applications and benefits, to ethical AI challenges and considerations, this work discusses every aspect of the new technology using diverse sets of datasets that inform practices as well as recommend ethical AI. Evaluations showed reductions of the burden from NCDs between 20-30% by engaging the application in a preventive healthcare intervention, which is aligned to global health equity goals.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

BREAST CANCER DETECTION IN ULTRASOUND IMAGING USING CLAHE AND ENSEMBLE DEEP LEARNING: A REPLICATION AND ENHANCEMENT STUDY
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Saurabh Nimje, Reena Satpute, Utkarsha Pacharaney, Anup Bhitre
Abstract - Breast cancer is considered as one of the top causes of mortality on women across the world making early and accurate diagnosis a key element in addressing patient outcomes. The work introduces artificial breast instances of cancer detection techniques in ultrasound imaging by means of Contrast Limited Adaptive Histogram Equalization (CLAHE) and ensemble deep learning framework. Data used was a balanced data set comprising of 200 ultrasound images that are made to be benign, malignant, and normal. The CLAHE preprocessing was quite useful in terms of image quality as it provided edge and local contrast enhancement and profited letting the lesions be seen more effectively. A number of the convolutional neural network (CNN) architectures were tuned collectively in an ensemble arrangement with soft voting and weighted averaging, and this produced an improved classification performance. The proposed model returned an accuracy of 93.7%, sensitivity of 92.5%, specificity of 94.5% and AUC of 0.97 even better than the baseline general CNN models and the single CNN models with CLAHE. The findings are indicative of the fact that CLAHE-enhanced ensemble learning is a robust, reproducible, and promising tool in breast cancer detection within ultrasound imaging that holds a great promise in clinical.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

ChatGPT-Enabled IoT at the Edge: A Quantitative Study of Latency, Energy, and Security Under Latest LLM Trends
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Naga Sujitha Vummaneni, Srilakshmi Bharadwaj, Himani Varshney
Abstract - The global healthcare landscape is currently undergoing a radical transformation, driven by the dual catalysts of the post-pandemic necessity for remote care and the rapid proliferation of digital infrastructure in developing economies. This research paper presents a comprehensive study on the design, development, and strategic positioning of a desktop-based "Healthcare Management System with Telemedicine." Developed using the Java ecosystem—specifically Java Swing for the graphical user interface (GUI) and Java Database Connectivity (JDBC) for persistence—the system integrates third-party WebRTC services via Jitsi Meet to facilitate real-time virtual consultations. Unlike purely administrative Hospital Management Systems (HMS), this solution integrates clinical workflows with administrative tasks, offering a unified platform for patient authentication, appointment scheduling, and remote video consultation. This report goes beyond technical implementation to provide an exhaustive analysis of the Indian digital health market, projected to reach USD 106.97 billion by 2033. It critically evaluates market leaders such as Practo, Zocdoc, and Teladoc to identify structural gaps in service delivery, particularly regarding cost-barriers and infrastructure dependency in Tier-2 and Tier-3 cities. By adopting the Prototyping Model of software engineering, the research iteratively addresses requirements for security, usability, and legacy hardware compatibility. The findings suggest that while cloud-native SaaS models dominate the current market, lightweight Java-based desktop solutions offer distinct advantages in data sovereignty, offline capability, and operational stability for resource-constrained healthcare settings. The paper concludes with a roadmap for integrating Artificial Intelligence (AI) for predictive diagnostics and expanding into mobile ecosystems, positioning the developed system as a viable component of the emerging Global Initiative on Digital Health (GIDH).
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Design Principles for Regularized Meta-Learning: A Framework Proposal
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Nevil Dhinoja, Shubh Patel, Binal Kaka
Abstract - Gradient conflicts, computational complexity, and optimization instability are some of the issues with model-agnostic meta-learning, or MAML. We introduce a methodical methodology that integrates three improvement techniques: meta-level regularization, adaptive optimization management, and taskaware gradient. By combining three complimentary mechanisms—task-aware gradient modulation, meta-level regularization, and adaptive optimization management—this work suggests an organized design framework to increase the stability and robustness of MAML-based optimization. The paradigm provides a solid basis for the methodical creation of more reliable and scalable meta-learning systems, even while empirical evaluation is saved for later research.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

FaceIt: A Novel AI Framework for Preliminary Autism Screening Using Facial Imaging
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Liyan Grace Shaji, Lakshmi K.S, Shazil Mohammad Iqbal, Don Basil Saj, Tom Thomas
Abstract - Autism Spectrum Disorder (ASD) is a neurodevelopmental condition that affects skills related to social interaction and communication. Of late, this is estimated to be prevalent in 1 among 100 children, across the world. Unfortunately, our present, diagnostic methods, like ADI-R and ADOS, rely on questionnaires, which render them to be time-consuming, expensive, and skill-dependent. Hence, to address these challenges, FaceIt is developed, which is a Deep Learning-based diagnostic tool that integrates real-time image capture and classification for rapid and accessible ASD screening. The tool efficiently processes facial images captured or uploaded by users, by performing preprocessing steps like cropping and alignment. A Convolutional Neural Network (CNN) extracts facial features to detect ASD, while a Bayesian CNN captures uncertainty in predictions. Its user-friendly interface allows self administration, devoid of professional supervision. The faster and more accessible preliminary screening even facilitates timely follow-up diagnostics if needed, thus making this an optimum solution for widespread use.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Feature Fusion based Enhanced Information Representation for Improved Accuracy of BCRP Inhibition Prediction in Drug Discovery
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Nabeela Kausar, Ramiza Ashraf, Naila Ashraf, Romana Ali
Abstract - The conventional way of preparing an advertisement is an elaborate process incorporating human subjectivity and human resources heavily dependent on creativity. Making advertisements by human effort can be regarded as an inefficient utilization of capital for small to medium-scale businesses due to increased cost of production. Even in current advancements in the development of generative techniques including LLM-based strategies for Advertisement Generation with Prompts, creating apt prompts for the depiction of products requires human expertise, making them less accessible. In order to overcome the challenges presented by the current models, we introduce a fast, affordable, and scalable platform for the automation of advertisement generation for products leveraging the capabilities of pre-trained diffusion models. The proposed system requires no training or fine-tuning since everything is performed at the inference level. The AI-aware system for designing assists in the identification of color schemes and attributes from the images of the products, whereas the descriptions and categories of the items help identify the theme and pattern recommendations for advertisements. These recommendations are channeled through a pre-trained Stable diffusion model guided by the LLaMA language model.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Full-Stack TinyML for Scalable IoT Sensing: A Quantitative Study of Quantization, Sparsity, and Compiler–Runtime Co-Design on Microcontrollers
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Naga Sujitha Vummaneni, Ishan Kumar, Adarsh Mittal
Abstract - Digital evidence is now central to cyber investigations, legal trials, and organizational audits. However, traditional evidence management systems rely heavily on centralized storage, making them vulnerable to unauthorized modifications, insider attacks, and in complete audit trails. This research introduces a Blockchain-Based Evidence Management System designed to secure digital evidence through immutability, transparent verification, and tamper proof storage of evidence hashes. The proposed solution integrates Java FX as a user-friendly interface, MongoDB for storing meta data, SHA-256 for generating unique evidence fingerprints, and the Polygon Mumbai blockchain for permanent registration of hash values. Users can upload evidence, verify its authenticity, and review all actions through a detailed activity log. Experimental results show that blockchain-backed verification reliably identifies tampered evidence and significantly strengthens the chain of custody. The system offers an efficient, scalable, and secure enhancement to traditional evidence-handling methods.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Raspberry Pi–Centric IoT in 2024–2026: A Quantitative Study of Edge Gateway Scaling, Containerized Microservices, and On-Device AI
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Naga Sujitha Vummaneni, Adarsh Mittal, Ishan Kumar
Abstract - The rapid growth of digital platforms has transformed the way individuals buy and sell goods. However, college students still largely depend on informal and unorganized methods for peer-to-peer trading. This paper presents UNIBID, a Java-based online marketplace designed specifically for college students to enable secure, reliable, and efficient product trading within the campus community. The system allows users to register, authenticate, list products, browse products, search and filter items, and perform secure purchase transactions. The backend is implemented using Java [1], while database operations are handled using a reliable database management system. The proposed system eliminates the drawbacks of manual trading such as lack of trust, delay in communication, and absence of product verification. Experimental results show that UNIBID significantly improves transaction speed, transparency, and user convenience compared to traditional methods. The system is scalable, secure, and suitable for deployment in real academic environments.
Paper Presenter
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

UNIBID COLLEGE STUDENT MARKETPLACE PLATFORM
Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Authors - Nishu, Kajal, Pavitra Jangir, Ayush Kumar Gupta, Kiran Dikshit, Ajay, Vishal Shrivastava, Akhil Pandey, Ram Babu Buri, Harveer Choudhary
Abstract - Despite the availability of digital voting systems, prior studies continue to identify gaps such as weak or voter authentication, security vulnerabilities and insufficient fraud prevention mechanisms. This paper presents BotoSafe, a secure and user-centered electronic voting (e-voting) platform developed for student government elections within educational institutions. The system implements multifactor authentication (MFA) using one-time password (OTP) verification and facial recognition with an anti-spoofing mechanism. To ensure the confidentiality and integrity of the voting process we employ the Advanced Encryption Standard in Galois/Counter Mode (AES-GCM). A developmental research design with a quantitative approach was used for the system development and evaluation. A mock election involving 84 students from Western Mindanao State University–Pagadian Campus was conducted, followed by a post-assessment survey. Results from the System Usability Scale (SUS) yielded a score of 72.08, indicating acceptable usability. User responses further showed that the system is easy to use, safe, and trustworthy for student elections. These findings indicate that BotoSafe is a viable e-voting solution for student government elections and may be further enhanced in future studies.
Paper Presenter
avatar for Nishu

Nishu

India

Thursday April 9, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

2:15pm GMT+07

Session Chair Concluding Remarks
Thursday April 9, 2026 2:15pm - 2:17pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Shikha Sharma

Dr. Shikha Sharma

Associate Professor and Head of Department- CSE, Poornima University, India

avatar for Dr. Sreenivasulu Gogula

Dr. Sreenivasulu Gogula

Professor & Head of the Department, Vardhaman College of Engineering, Telangana, India

Thursday April 9, 2026 2:15pm - 2:17pm GMT+07
Virtual Room A Bangkok, Thailand

2:17pm GMT+07

Session Closing and Information To Authors
Thursday April 9, 2026 2:17pm - 2:20pm GMT+07

Moderator
Thursday April 9, 2026 2:17pm - 2:20pm GMT+07
Virtual Room A Bangkok, Thailand

2:58pm GMT+07

Opening Remarks
Thursday April 9, 2026 2:58pm - 3:00pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Ashavaree Das

Dr. Ashavaree Das

Lecturer, Higher College of Technology Dubai, United Arab Emirates

avatar for Dr. Vivek Patil

Dr. Vivek Patil

Assistant Professor, Vishwakarma Institute Of Information Technology, India

Thursday April 9, 2026 2:58pm - 3:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

A Hierarchical Deep Learning Framework for Ciphertext-Only Classification of Cryptographic Algorithms
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Banda Rithija, MV Parth, Haripriya L, Skandan SS, Manju
Abstract - The task of identifying Cryptographic Algorithms from ciphertext is a challenge within digital forensics and security auditing, when there is no knowledge of either the plaintext or the key used. As modern encryption algorithms increase in sophistication, their output becomes indistinguishable from random noise, rendering traditional pattern recognition techniques ineffective. This paper proposes a two-stage Hierarchical Cipher Classifiers, the first stage discriminates among three major Cryptographic Families: Symmetric, Asymmetric, and Hash; the second stage identifies the specific algorithm within those families in the context of six Modern Encryption Standards: Advanced Encryption Standard, Triple Data Encryption Standard, Blowfish, Rivest–Shamir–Adleman, ElGamal, and Secure Hash Algorithm 256-bit. In order to achieve high accuracy, we developed a hybrid feature space consisting of 167 attributes that included both Statistical and Transform- Domain Features.We incorporated SHapley Additive exPlanations (SHAP) into our classifiers to address the concern of the black-box nature of Deep Learning. Empirical Results indicate that the Hierarchical Classifier Structure has produced a substantial reduction in the rate of misclassifications compared to flat classifiers, offering a transparent and effective tool for automated cryptanalysis.
Paper Presenter
avatar for MV Parth
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

AN ADVANCED GRAPH NEURAL NETWORK FRAMEWORK FOR MODELING DYNAMIC CYBER NETWORK TOPOLOGIES AND DETECTING ANOMALOUS BEHAVIORAL PATTERNS.
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Megha Potdar
Abstract - This paper delineates a compact microstrip patch antenna that operates within the frequency range of 6.5 to 8.5 THz and exhibits a resonance frequency of 7.344 THz. The antenna maintains a flat, compact shape that is well-suited for terahertz circuit integration and also incorporates circular and U-shaped patch modifications that enhance radiation efficiency, gain, and band-width. According to the simulation results, the device has a gain of 7.042 dBi, a VSWR of 1.1329, a low return loss of –24.109 dB, and a wide impedance bandwidth of 1.119 THz. It demonstrates consistent radiation patterns and effective impedance matching across the operating frequency range, indicating that the proposed design outperforms conventional THz patch antennas and rep-resents a highly efficient solution for high-speed terahertz communication, im-aging, and sensing applications.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Enhancing E-Commerce Sentiment Analysis Using Fine-Tuned RoBERTa and BERT on Women’s Clothing Reviews
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Babatunde David Ikudehinbu, Atefeh Khazaei, Hamidreza Khaleghzadeh
Abstract - In this paper, we outline the design and implementation of a novel electronic voting kiosk, dubbed BlockVote, which helps counter identity-related fraud and data tampering via biometric and blockchainbased approaches. The proposed system is a standalone embedded system running on an ESP32-S3 SoC-based microcontroller. The system includes a touchscreen display for user input and an optical fingerprint sensor for identity checking. This collected bio-data and voting selection are then integrated in such a manner that a secure transaction is created through cryptography. This is then sent through the Node.js gateway, which leads it to the secure Ethereum-based blockchain network. Such an application of physical verification technologies with blockchain technology ensures that the proposed voting system is more secure than the traditional e-voting machines or e-voting websites. Block-vote is a hybrid security system in which hardware-based verification techniques are combined with blockchain-based data management in a power-saving, compact format. The prototype has shown proof of its functional viability, its module-based construction, and its reliability, particularly in the field of embedded systems. The experimental results demonstrate the system’s high precision, low latency, and robustness against illegitimate use. The suggested framework demonstrates the practical feasibility of blockchain and biometric technology in the creation of trustworthy electronic voting systems that can be used in both urban and rural areas.
Paper Presenter
avatar for Hamidreza Khaleghzadeh
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Enhancing Threat Detection in Cloud Environments Through Temporal Anomaly Modeling
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Deepika K M, Girish Gowda J, Ravi Honnalli, Nikhil S G
Abstract - Cloud computing environments face increasingly sophisticated cyber threats that demand advanced detection mechanisms capable of identifying anomalous behavior in real-time. This study introduces an innovative hybrid temporal anomaly modeling system that integrates Autoregressive Integrated Moving Average (ARIMA) with Long Short-Term Memory (LSTM) networks, augmented by meta-learning fusion strategies. Our method solves the difficult problem of getting high recall rates (>95%) that are needed to keep operational efficiency while reducing missed critical threats. We tested five meta-learning architectures—Logistic Regression, Random Forest, XG-Boost, Gradient Boosting, and Neural Network—along with four rule-based fusion strategies on a large Cloud Anomaly Dataset with 249,595 samples taken from 11 virtual machines over 30 days. The Hybrid-RF (Random Forest) model had the best balance, with a recall of 95.75%, an accuracy of 10.59%, and an F1-score of 11.37%. This was much better than the average in the literature (75-85% recall). We set up the system as a production-ready Flask REST API on Google Cloud Platform, with response times of less than 200 milliseconds. This shows that it is possible to use real-time cloud security monitoring. Our findings demonstrate that metalearning fusion of statistical and deep learning temporal models yields enhanced threat detection capabilities relative to single-model approaches, achieving recall improvements of 10-20% over state-of- the-art methods while adhering to real-time performance constraints.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Evaluating AI-Based Diagnostic Models for Cervical Spinal Stenosis Detection Using Magnetic Resonance Imaging
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Anup Bhitre, Saurabh Nimje, Utkarsha Pacharaney, K. T. Reddy
Abstract - Cervical Spinal Stenosis (CSS) is a progressive spinal disorder caused by narrowing of the spinal canal in the neck, potentially leading to severe neurological damage if undiagnosed. Due to rising CSS cases and the limitations of manual MRI analysis—such as subjectivity, time consumption, and inter-observer variation—there is a growing need for automated, reliable diagnostic tools. This study evaluates and compares four AI models—CNN, ResNet50, SVM, and Random Forest—using 1,200 T2-weighted MRI images processed through normalization, segmentation, and augmentation. Performance was measured using accuracy, precision, recall, F1-score, and AUC-ROC. ResNet50 achieved the highest accuracy (93.6%) and AUC-ROC (0.97), demonstrating superior diagnostic performance. SHAP was used for interpretability, highlighting spinal canal diameter and ligamentum flavum thickening as key diagnostic features. The findings confirm that deep learning, especially ResNet50, offers a scalable, interpretable, and clinically effective method for early CSS detection.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Image Inpainting with Restoration and Resolution Enhancement
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - C Ashik Poojary, Chirag B Jogi, Sanath Shetty, Sandhya P, Mahitha G
Abstract - Image inpainting plays an important role in restoring and reconstructing degraded or damaged images by filling in missing regions. This work proposes a gated convolutional neural network based on a U-Net architecture to achieve perceptually accurate and high-resolution restoration. The model was trained on a large-scale dataset of over 20,000 images generated with the CelebA dataset along with extensive enhancement using artificial damages such as scratches, cracks, random patches, blurring, sepia-toning, and grayscale degradation. The proposed method performs two phases of restoration: context-aware inpainting, followed by resolution enhancement while preserving both global structure and local texture. Quantitative metrics such as PSNR and SSIM were evaluated, and qualitative comparisons demonstrate faithful texture synthesis and tone-consistent fills across color, grayscale, and sepia domains.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Music Control Using Hand Gesture Recognition and Audio-Reactive Visualization
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - D.Nagaraju, Padinjaroot Monesh Raj, G .Likith, K .Kavitha, Thella Muni Chandrika
Abstract - This Gesture recognition technology is studied in this article as it pertains to controlling music wirelessly via a music controller de-vice. The gesture recognition system highlighted in this study is an innovative advancement in this area. In addition to providing the user with an easy-to-use interface for controlling the volume of music with hand motions, This provides a no-contact way to play percussion instruments where users can play from anywhere, either they have good eyesight or not! In addition to providing users with visual experience while using the application, the application also provides users with 3D graphics and animations that dynamically reflect the user’s movement on the screen as they create percussion music through the application. The entire system is created using JavaScript and thus, is completely platform-independent and will work on any recent web browser.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Printify: A Real-Time, Location-Based Service Platform for Document Printing and Digitization, featuring a Progressive Web Application for Shopkeeper Operations
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Aditya Ajitrao Kulkarni, Mayuri Shelke, Saurabh Babasaheb Gonte, Kalpak Sanjay Kedari, Parikshit Balasaheb Jadhav
Abstract - Image inpainting is a basic problem in image restoration that focuses on recovering the missing or damaged areas of an image in a visually plausible and semantically consistent way. However, in practical image restoration tasks like historical photo restoration, images are often degraded by complex damages like cracks, scratches, fading, stains, and tone changes. Conventional image restoration methods relying on interpolation or diffusion have limitations in restoring high-frequency details and global semantic information. This paper presents a gated convolutional neural network with a U-Net structure for effective image inpainting and restoration with resolution enhancement. The proposed network is trained on a large-scale dataset of more than 20,000 synthetically degraded images created from the CelebA dataset, considering various damage patterns like scratches, cracks, random occlusions, blurring, grayscale conversion, and sepia tone transformation. The image restoration process involves two steps: context-aware image inpainting and resolution refinement. The proposed framework is extensively evaluated using PSNR and SSIM metrics for its effectiveness in color, grayscale, and sepia image restoration.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Robust machine learning framework for accurate fault identification in solar photovoltaic systems
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - G Venkata Suresh Reddy, Immanuel Anupalli, P.Sudheer
Abstract - Solar photovoltaic (PV) systems require robust and intelligent problem detection systems to guarantee they continue producing energy effectively as they gain traction as a renewable energy source. In order to detect various defects in photovoltaic (PV) systems operating under nonlinear and noisy conditions, this research presents a data-driven fault classification framework that employs machine learning techniques. Electrical data from photovoltaic (PV) panels, including current-voltage (I-V) and power-voltage (P-V) curves recorded in three distinct operating circumstances (Healthy, Shading, and Open-Circuit), formed the basis of the dataset used for training and testing the model. For each condition, crucial electrical characteristics have been used to characterize the system's electrical behavior, including open-circuit voltage, short-circuit current, maximum power point voltage and current, fill factor, and a handful of statistical statistics. Logistic Regression, Naïve Bayes, and k-Nearest Neighbors (KNN) are the three supervised machine learning methods that were employed to detect various errors. Each model was fine-tuned using hyper parameter tweaking and k-fold cross-validation. The classification performance in the comparative performance analysis was greatest for Logistic Regression (96.09% accuracy, 96.25% precision, 96.49% recall, and 96.36% F1-score). Second place went to the KNN model, which had a 95.47% accuracy rate. In contrast, the Naïve Bayes model maintained its reliability, with an accuracy rate of 94.13%. This demonstrates that it is still effective when dealing with nonlinear data that contains noise. According to the overall results, many machine learning algorithms, especially Logistic Regression, do a great job of finding PV problems in real time. The suggested framework is both efficient and useful for real-world PV monitoring systems because it just needs to measure electrical parameters that are easy to get (I-V and P-V data). Using this strategy for preventative maintenance makes solar systems more reliable and increases their production, which in turn cuts down on power losses.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Stimulation of Secured Agent-to-Agent Communication Protocol with Secure Session Key Management with AI-Based Attack Detection
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Authors - Premanand Ghadekar, Utkarsh Patil, Niraj Ukare, Vansh Bhatt, Rohan Uplenchwar, Shreya Sidnale
Abstract - Traditional multi-agent communication systems rely on fixed security protocols and static message processing pipelines, leaving them vulnerable to advancing cyberattacks and dependent on expensive infrastructure. This paper introduces a Secure Multi-Agent Communicational Protocol designed as a lightweight, affordable framework for small and medium-scale systems to communicate safely without enterpriselevel costs. The current setup depends heavily on predictable session keys, making systems prone to impersonation, replay attacks, token alterations, and man-in-the-middle interceptions. This framework stimulates agentto- agent interactions through three primary components: a predictive security model, a dual-token authentication mechanism, and a protocolaware attack engine. The infrastructure utilizes WebSocket connections integrated with Redis Pub/Sub for real-time messaging. A dynamic session key generation process works alongside a rotating refresh-token system, ensuring that even if a session key is compromised, attackers still require a valid refresh token. The predictive component features a Protocol-Aware XLNet model with a dual-thread structure to examine message sequences and statistical irregularities. A fusion layer integrates these analyses, reporting a Dual-Thread Consistency Score of 0.87 and a 31% gain in early-warning capability. Experimental evaluations demonstrate 93.5% violation sensitivity, 91.7% replay detection accuracy, and 89.3% attack-type classification accuracy. This approach enables timely identification of replay incidents, interceptions, and protocol tampering. Additionally, an independent XGBoost model filters fraudulent links. These enhancements provide substantial gains in early warning capabilities and consistent classification accuracy across various attack categories.
Paper Presenter
Thursday April 9, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

5:00pm GMT+07

Session Chair Concluding Remarks
Thursday April 9, 2026 5:00pm - 5:02pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Ashavaree Das

Dr. Ashavaree Das

Lecturer, Higher College of Technology Dubai, United Arab Emirates

avatar for Dr. Vivek Patil

Dr. Vivek Patil

Assistant Professor, Vishwakarma Institute Of Information Technology, India

Thursday April 9, 2026 5:00pm - 5:02pm GMT+07
Virtual Room A Bangkok, Thailand

5:02pm GMT+07

Session Closing and Information To Authors
Thursday April 9, 2026 5:02pm - 5:05pm GMT+07

Moderator
Thursday April 9, 2026 5:02pm - 5:05pm GMT+07
Virtual Room A Bangkok, Thailand
 
Friday, April 10
 

9:28am GMT+07

Opening Remarks
Friday April 10, 2026 9:28am - 9:30am GMT+07

Invited Guest & Session Chair
avatar for Prof. Michael David

Prof. Michael David

Associate Professor, Federal University of Technology Minna, Nigeria
avatar for Dr. Sandeep A. Thorat

Dr. Sandeep A. Thorat

Controller of Examination, Government College of Engineering Karad, Maharashtra, India

Friday April 10, 2026 9:28am - 9:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

A Design and Study of a DTMF Technology Enabled Water Surface Cleaning Robot
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Senthilkumar Selvaraj, Suresh kumar Chiluka, Swetha D
Abstract - This paper presents the design and construction of a robot that cleans rivers. The robot is designed to be used in situations when it is necessary to remove floating rubbish from bodies of water. Conventional waste-collection techniques, like trash skimmers, boats, and hand cleaning, are usually used close to the edges of rivers, lakes, or ponds. These methods are frequently dangerous, time-consuming, and inconvenient. A water-surface cleaning robot has been created to overcome these constraints and remove trash more effectively, securely, and easily. Using commands sent from a cell phone, the robot moves in different directions while operating on the water's surface. When a call is placed to the phone that is attached to the robot's DTMF decoder, the controller processes the tone signals it receives and then adjusts the motors. A filter mechanism installed on roller belts is used to catch floating material. Waste particles are lifted and collected by the filter setup as the chain assembly moves in response to the motor's rotation. After that, the gathered material is placed in a special storage tank, allowing the water's surface to be continuously and successfully cleaned.
Paper Presenter
Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

A Lightweight Zero-Trust Security Framework for IoT Systems Using ECC Authentication, Trust Scoring, and Machine Learning–Based Attack Detection
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Reena Pal, Premal Patel
Abstract - The quantum computing potential to transform the conventional public key cryptosystems, specifically when they are being implemented on the structure of a cloud, and are operating on sensitive data is especially problematic. In the current paper, we introduce quantumresistant, fully homomorphic encryption (FHE) new homomorphic encryption scheme, to offer secure and scalable cloud data encryption. We solve Learning With Errors (LWE) problems and Ring-LWE problems and include dynamic key management and re encryption protocols to improve better security of multi-users [14]. The results of our Largescale simulations on a cloud testbed show that our design actually has the desired throughput and resource efficiency under horizontal scaling [10] although 60-70% addition of additional latency is noticeable as compared to non-BFT systems. Key to Practicality The paper will offer the much-needed trade-offs of high performance and high security assurances [12].
Paper Presenter
avatar for Reena Pal
Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

A SIFT-Based Classification Method for Traditional Japanese Stencil Images
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Yuuki Ario, Yuyu Araki, Hiroshi Sakamoto
Abstract - Crowd analysis has become a critical component of modern urban and smart surveillance systems, where effective monitoring of densely populated public areas is essential for resource management, emergency response, and public safety. YOLO-based models are popular for detecting a person or an object. In this study, we present a comprehensive objective evaluation analysis of state-of-the-art object detection architectures—YOLOv5, YOLOv8, and YOLOv11. We have implemented YOLO models for detecting groups of people as integrated entities to enable crowd classification based on group size, including individuals, small groups, and large crowds. The evaluation was con-ducted using four diverse benchmark datasets: VSCrowd, Crowd Mall, Crowd11, and NWPU-Crowd, with all images annotated using LabelImg. Each model was rigorously trained and tested under consistent conditions. Experimental results reveal that on the VSCrowd dataset, YOLOv5s achieved an [email protected] of 0.454, while YOLOv5l slightly improved this to 0.459. YOLOv8m demonstrated high performance with an [email protected] of 0.530. On Crowd Dataset, YOLOv5m achieved an [email protected] of 0.300, YOLOv8m obtained 0.306, and YOLOv11m achieved 0.302. These results indicate that newer YOLO architectures provide enhanced detection capabilities in highly crowded scenes, exhibiting better generalization, robustness, and adaptability for real-world crowd analysis applications.
Paper Presenter
Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Comparative Overview of Deep Learning Architectures for Disease Detection in Medicinal Plants
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Sakthi Saranya.S, W.Rose Varuna
Abstract - Agriculture is one of the most important industries that provides for human basic need. To identify medicinal plant diseases using traditional methods, it will take long time. Medicinal Plants such as, Tulsi, Aloe vera, Mint and Ashwagandha play a crucial role in both ancient and modern systems. These plant images were taken into this work. Early identification of diseases in these plants is most important to maintain their medicinal benefit as well as economic value. This study investigates and compares five deep learning architectures, namely ResNet50, DenseNet121, EfficientNet-B0, InceptionV3 and CNN-for classifying leaf diseases in medicinal plants. Moreover, several performance metrics are used for the evaluation of these architectures. This work mainly focuses on determining the most suitable deep learning model for detecting the diseases in medicinal plants.
Paper Presenter
Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Evaluating Explanation Consistency of Explainable Machine Learning Models for Heart Disease Risk Prediction
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Kari Sai Vardhan, Maram Ramakrishna Reddy, Kore Akhil, Modugula Pavan Kumar Reddy, Aaskaran Bishnoi
Abstract - This study evaluates the effectiveness of student-led mobile-first web design implementation for Small and Medium-sized Enterprises (SMEs) using the Bootstrap framework. By applying a project-based information system development model, this study analyzes the technical performance of websites, particularly in terms of layout responsiveness and system metrics such as PageSpeed. A mixed-methods approach was used to collect quantitative data from technical evaluations and qualitative data from student and client feedback. The results indicate that these student-led projects successfully produced highly responsive and high performing websites, significantly enhancing the digital presence of SMEs. The findings underscore the pedagogical efficacy of project-based learning in equipping students with industry-relevant competencies and practical skills in information system development, while simultaneously sup-porting the digital transformation of SMEs.
Paper Presenter
Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Hybrid AI Framework for Smart Energy Grids: DRL-Based Control with Solar Fault Detection
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Kalyani Ghuge, Dhruv Battawar, Om Bhoye, Suhani Buche, Adithiya Anantharaman, Anvay Bavdhankar
Abstract - For the integration of solar systems within the power grid, there is the requirement for smarter systems that are capable of not only detecting faults but also optimizing their performance. The current paper introduces an innovative hybrid method that focuses on the detection of solar thermal faults and adaptive grid control, where the challenge had existed in the separation of the two aspects. This is achieved through the use of a deep learning U-Net model, where different kinds of solar panel fault types, such as single and multi hotspots, are detected from grayscale thermal images. The different kinds of fault types identified are used as a reinforcement learning approach (PPO), where decisions regarding safe and efficient use of the grid are made while considering fault awareness. Higher priority is granted to critical fault types through rewards that use penalties. It also comes with an immediate safety function to isolate faulty panels with zero delay for smooth and efficient function of the solar energy grid.
Paper Presenter
Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

SELF-HEALING REAL-TIME OPERATING SYSTEMS USING REINFORCEMENT LEARNING-BASED RECOVERY POLICIES
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Azad Mohammed Shaik
Abstract - A real-time operating system (RTOS) should be able to recover from interruptions. Since RTOS systems are used in safety-critical environments, this function is essential for ensuring system availability and reliability. However, while many of the current anomaly detection techniques can detect faults, they do not provide any means for recovery. Therefore, in this paper, I propose a self-repairing RTOS framework that utilizes reinforcement learning (RL) to automatically select the best course of action to take when an anomalous event arises. I propose a Q-Learning agent that learns to recover from six types of common faults, including: sensor degradation, stuck sensor, priority inversion, memory leaks, sporadic overloads, and task starvation. The framework is built on FreeRTOS, and the agent utilizes an 8-dimensional state space and the six different types of recovery options available for each fault. The overall success rate of the system was 99.2 % after 5,000 training episodes, with average success rates of 98.0 % and 99.9 % when handling individual faults. The RL agent completely prevented system crashes and returned the system to normal operation within an average of 0.06 ms after an interruption occurred. The training results provide strong evidence that the model learned to operate effectively and consistently, with its success rate improving from 97.0 % during early training stages to 100 % after training was completed. Therefore, this study demonstrates a practical, production-ready method to implement autonomous fault recoveries in RTOSs in automotive applications. To our knowledge, this is the first successful implementation of RL for autonomous, self-repairing behaviors in this area.
Paper Presenter
avatar for Azad Mohammed Shaik

Azad Mohammed Shaik

BSWE Platform Design Engineer, Stellantis, United States

Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

The EPIC-E Framework: A Multi-Dimensional Model for Evaluating the Effectiveness of Dynamic Infographics in Digital News Visualization
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Muchlis Almubaraq, Mohd Norasri Ismail, Norhalina Senan, Larisang, Mutiara Ayu Mawaddah
Abstract - Conventional recipe formats interrupt cooking workflows by requiring repeated attention shifts to external devices. This paper presents Beyond the Cookbook, a Mixed Reality (MR) cooking assistant developed for Meta Quest headsets. The system delivers spatially anchored, context-aware instructions using persistent holographic overlays, synchronized narration, and multimodal interaction including voice commands, controller input, and hand-tracking gestures. By integrating passthrough MR and spatial mapping, the assistant enables hands-free and hygienic guidance directly within the user’s kitchen environment. A usability study with twenty-one participants demonstrates high interaction reliability, instructional clarity, and user confidence. The results validate the feasibility of MR-based procedural learning support in domestic settings.
Paper Presenter
Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Usability and Accessibility on the Website of the Inclusion, Social Equity and Gender Unit of the Technical University of Manabí
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Maricela Pinargote-Ortega, Marely del Rosario Cruz Felipe, Carlos Manuel Lucas Aragundi, Iter Alexander Posligua Solorzano
Abstract - Open data is often associated with objectives linked to fostering innovation and economic growth, political accountability and democratic participation, and public sector efficiency. However, data privacy has been frequently cited as a challenge for open data publication and processing. This paper uses a 9780-row dataset from the 2025 community engagement survey of the Philippine National Police Regional Office 5 to synthesize a privacy-preserving dataset using natural language processing and the Laplace mechanism with a total Privacy Loss Budget (PLB) value of 1. The text dataset fields with the highest privacy risk were replaced with generated topic models and corresponding overall sentiment values. The dataset fields were then categorized into four blocks, grouping variables that require correlations to be preserved. Noise was added to the four blocks using the Laplace mechanism, generating a privacy-preserved synthetic query robust to de-anonymization attacks. The synthesized dataset shows minimal distortion from the original dataset, with mean shifts of less than 0.25, and preserving key variable correlations, while significantly increasing data subject privacy. End-user validation confirmed that the synthetic dataset is suitable for both data sharing and joint processing without sacrificing the accuracy of analysis results. This study demonstrated that a differentially private synthetic data generation pipeline combining natural language processing and the Laplace mechanism (ε = 1) can substantially enhance data subject privacy while preserving the analytical utility of a real-world public sector survey dataset.
Paper Presenter
Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

WaveTrust: Trust-Based Reinforced Routing Protocol against Malicious Node Influence in Underwater Sensor Environments
Friday April 10, 2026 9:30am - 11:30am GMT+07
Authors - Sona Ravindran, K Nattar Kannan
Abstract - This research examines the transfer learning deep learning models in multimodal human activity recognition based on wearable sensor data. Raw IMU signals are converted to Gramian Angular Field (GAF) images to improve the feature representation and tested on WISDM and PAMAP2 datasets of 18 activity classes. Five CNN models, namely VGG16, MobileNetV2, ResNet50, DenseNet121, and EfficientNetB0, are trained and evaluated in the same conditions and measured by classification accuracy, statistical significance, and computation efficiency. GAF representations are always better than raw signals. DenseNet121 and ResNet50 have 99% accuracy, VGG16 and MobileNetV2 perform competitively and EfficientNetB0 performs worse. Most of the differences in performance are statistically significant (p < 0.05).
Paper Presenter
Friday April 10, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

11:30am GMT+07

Session Chair Concluding Remarks
Friday April 10, 2026 11:30am - 11:32am GMT+07

Invited Guest & Session Chair
avatar for Prof. Michael David

Prof. Michael David

Associate Professor, Federal University of Technology Minna, Nigeria
avatar for Dr. Sandeep A. Thorat

Dr. Sandeep A. Thorat

Controller of Examination, Government College of Engineering Karad, Maharashtra, India

Friday April 10, 2026 11:30am - 11:32am GMT+07
Virtual Room A Bangkok, Thailand

11:32am GMT+07

Session Closing and Information To Authors
Friday April 10, 2026 11:32am - 11:35am GMT+07

Moderator
Friday April 10, 2026 11:32am - 11:35am GMT+07
Virtual Room A Bangkok, Thailand

12:13pm GMT+07

Opening Remarks
Friday April 10, 2026 12:13pm - 12:15pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Prashant Suryavanshi

Dr. Prashant Suryavanshi

Principal, Hon Shri Babanrao Pachpute Vichardhara Trust's, Parikrama Polytechnic Kashti. Maharashtra, India.

avatar for Prof. Reena Satpute

Prof. Reena Satpute

Assistant Professor, Faculty of Science and Technology, Datta Meghe Institute of Higher Education & Research (Deemed to be University), Maharashtra, India
Friday April 10, 2026 12:13pm - 12:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

A REVIEW ON FRAMEWORK FOR DETECTION AND PREVENTION OF EMAIL PHISHING ATTACKS
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - Morveen Bamania, Anilkumar Patel, Yassir Farooqui
Abstract - Digital image manipulation has become sophisticated day by day with the help of advanced editing tools. This posing significant challenges to image authenticity verification and raising a critical concern in the field of legal proceedings, social harmony, scientific publications, forensic and law enforcement, healthcare and journalism. In this paper we implement a unique and novel approach for the detection of image forgery. We use Convolutional Autoencoder (CAE) combined with Error Level Analysis (ELA). Our proposed preprocessing pipeline follows the sequence: resize the input image and pass through ELA apply denoise method. Where Gaussian denoising is strategically applied to the ELA output rather than the original image to preserve forgery artifacts while reducing noise. The CAE architecture consists of a four-block encoder that compresses input images into a 128- dimensional latent space, a symmetric decoder for reconstruction, and a fully connected classifier for binary forgery detection. The model is trained using a combined loss function. One is Mean Squared Error (MSE). It helps for reconstruction. The other one is Binary Cross- Entropy (BCE). It improves its ability to correctly classify. Experimental evaluation on the CASIA v2.0 dataset demonstrates the effectiveness of our approach. It is achieving competitive accuracy, precision, recall, and F1-score metrics. The proposed method successfully identifies both copy-move and splicing forgeries. It identifies the forgeries by analyzing compression artifact inconsistencies revealed through ELA.
Paper Presenter
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

AI-Driven Penalty Performance Analysis System: A Multi-Modal Explainable AI Approach for Football Strategy
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - Albert Manamela, Tevin Moodley
Abstract - Student retention is critical for academic quality and institutional effectiveness, especially in programs where foundational natural science courses such as mathematics, physics, and chemistry strongly influence progression and pose significant challenges. Early dropout identification in these contexts requires predictive models that are both accurate and interpretable. This study proposes an interpretable machine learning framework for student dropout prediction using academic, financial, and demographic data. It combines cost-sensitive XGBoost with Shapley Additive exPlanations (SHAP), addressing class imbalance without synthetic oversampling to preserve authentic performance patterns. Using a benchmark dataset from the Polytechnic Institute of Portalegre, the model achieved strong performance (Accuracy = 89.6%, F1 = 0.834, AUC-ROC = 0.934). SHAP analyses identified academic engagement, tuition payment status, and scholarship access as key predictors. The findings support transparent early-warning systems and inform policies to improve retention, strengthen support in science-based learning environments, and promote equitable student outcomes.
Paper Presenter
avatar for Albert Manamela

Albert Manamela

South Africa

Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Automated Generation of High-Level Architectural Diagrams from Embedded System Code using Explainable AI
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - Aqdas Hassan, Farooque Azam, and Muhammad Waseem Anwar
Abstract - The RISC-V Vector Extension (RVV) enables scalable data-parallel processing through a flexible vector length architecture, offers a standardized and scalable approach to vector computing. Derived from an analysis of existing RVV architectures, this paper presents a focused architectural study and implementation of a basic RVV-based vector extension. Unlike complex, high-performance designs, the proposed architecture prioritizes simplicity and clarity, implementing only essential vector arithmetic and memory instructions. The vector extension is integrated with a single-cycle scalar RISC-V core, and instruction decoding is implemented and verified at RTL level. Functional simulation confirms correctness of RVV instruction decoding. This work bridges the gap between theoretical RVV studies and practical step-by-step hardware implementation.
Paper Presenter
avatar for Aqdas Hassan

Aqdas Hassan

Pakistan

Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Development and Strategic Analysis of a Java-Based Healthcare Management System with Integrated WebRTC Telemedicine: Bridging the Digital Divide in Emerging Markets
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - Harshwardhan Singh Rathore, Dev Krishan, Amit, Abhinav Vyas, Harshit Choudhary, Kunal Chittora, Vishal Shrivastava, Ram Babu Buri, Akhil Pandey, Mukesh Mishra
Abstract - Predicting protein–ligand binding affinity is an essential step in early drug discovery. We present Alchemy, a ligand-centric Graph Neural Network (GNN) framework for predicting binding affinities (pKd/pKi) from molecular graphs and a production-ready web interface for easy inference. Using a curated subset of the PDBbind dataset for prototyping and RDKit for cheminformatics preprocessing [6], we implement a message-passing GCN model with global pooling and train it using MSE regression. We evaluate model performance using RMSE, MAE, Pearson and Spearman correlations, and Concordance Index, and compare against docking scores and classical ML baselines. On the demo subset our model achieves an RMSE of X (±Y) and Pearson r of Z (±W) — results that highlight the potential and limitations of ligand-only approaches. We discuss data-scaling, protein incorporation strategies, ablation studies, and provide reproducible code and a web app to facilitate adoption.
Paper Presenter
avatar for Amit

Amit

India

Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

HyperGNNs for Multi-Modal Classification and Severity Analysis of Neurodegenerative Disorders
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - K Bhavish Raju, K Musadiq Pasha, Mohammed Saqlain, Nishaan Padanthaya, Jayashree R
Abstract - Neuro-degenerative disorders, particularly Alzheimer’s Disease (AD), pose a significant challenge in early diagnosis and severity assessment due to overlapping symptoms with conditions such as Mild Cognitive Impairment (MCI) and Cognitively Normal (CN) conditions. Accurate differentiation between these stages is essential for timely intervention but remains difficult due to the progressive and heterogeneous nature of these disorders. Traditional machine learning models struggle to effectively integrate diverse data modalities, such as medical imaging (MRI) and clinical tabular data. This study proposes Hypergraph Neural Networks (HyperGNNs) based framework to enhance multi-modal classification and disease severity modeling. By representing complex patient relationships as hypergraphs, our approach aims to improve diagnostic accuracy, reduce misdiagnosis, and provide an interpretable framework for understanding disease progression. To ensure clinical transparency, we incorporate explainability techniques such as SHAP and Grad-CAM to ensure model transparency, enabling clinicians to understand key features influencing predictions. The model will be evaluated on standard neuro-imaging datasets and clinical records, offering potential applications in personalized medicine and early intervention strategies.
Paper Presenter
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Research Status and Challenges of Electronic Waste Small Component Detection Based on Improved YOLOv8
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - Zhou Xu, Shuzlina Abdul Rahman, Norlina Mohd Sabri, Rogayah Abdul Majid
Abstract - For the integration of solar systems within the power grid, there is the requirement for smarter systems that are capable of not only detecting faults but also optimizing their performance. The current paper introduces an innovative hybrid method that focuses on the detection of solar thermal faults and adaptive grid control, where the challenge had existed in the separation of the two aspects. This is achieved through the use of a deep learning U-Net model, where different kinds of solar panel fault types, such as single and multi hotspots, are detected from grayscale thermal images. The different kinds of fault types identified are used as a reinforcement learning approach (PPO), where decisions regarding safe and efficient use of the grid are made while considering fault awareness. Higher priority is granted to critical fault types through rewards that use penalties. It also comes with an immediate safety function to isolate faulty panels with zero delay for smooth and efficient function of the solar energy grid.
Paper Presenter
avatar for Zhou Xu

Zhou Xu

China

Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

SMART EXPENSES TRACKER: MANAGE EXPENSE SMARTLY
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - Shubhrat Chaursiya, Toshif Mohammed Shaikh, Snehlata, Sangam Kumari, Vishal Shriastava, Ram Babu Buri, Vibhakar Pathak
Abstract - Computational modeling is essential for studying complex pedestrian dynamics under emergency conditions. This paper presents the design and implementation of an Emergency Evacuation Simulator, a robust grid-based modeling tool developed in Java. The system integrates two core components: an Agent-Based Model (ABM) for pedestrian behavior and Cellular Automata (CA) for modeling dynamic hazard propagation (Fire and Smoke spread). A key innovation is the use of an Optimized Breadth-First Search (BFS) algorithm coupled with 8directional pathfinding (Chebyshev distance), which significantly improves path efficiency and movement realism compared to traditional 4-directional methods. The simulator incorporates heterogeneous agents with varying vulnerability levels and features local collision avoidance. Experimental analysis confirms the efficiency of the 8-directional path finding and provides quantitative metrics on evacuation time, rate, and fatality statistics, offering a valuable platform for enhancing building safety protocols and emergency response strategies.
Paper Presenter
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

The Development and Effect of AI-Powered Farmer Support Chatbots.
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - Vedant Khade, Supriya Narad
Abstract - The world agricultural industry is increasingly becoming more complex due to the variability of climate, increasing shortage of resources, and the demand to obtain real-time and localized information. The conventional agricultural extension services that have been hindered by operational limited costs and low ratios of the farmers to experts tend to fail to provide the required advice at the right time and in a more personalized way especially to the smallholder farmers in the remote and resource-limited locations. The present paper examines the new and disruptive position of the AI-based farmer support chatbots as a scalable, effective, and ubiquitous response to this issue. They offer 24/7, multi-lingual, and highly context-sensitive advice on a wide range of issues, including complicated crop management protocols, early pest and disease detection, live market price tracking, and navigation of complicated government subsidy programs, using their sophistication in Natural Language Processing (NLP), advanced Machine Learning (ML) algorithms and Computer Vision (CV). The study conducts a synthesis of the existing technological practices and provides important quantitative evidence, including these findings; (a) large-scale changes in the profitability of farmers, yield maximization, and efficient resource use; (b) the critical analysis of the technical and socio-ethical issues, including the bias of the data, the lack of digital literacy, and the accountability systems. The paper concludes by offering an assumption that although rigorous, responsible, and ethical development is the most important, farmer support chatbots are not merely the instruments of the incremental change, but should be the ones that will radically transform agricultural knowledge dissemination, which will subsequently result in more resilient, productive, and sustainable global food systems.
Paper Presenter
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

The Next Generation of Code Quality Assurance: AI- Accelerated Code Review Platforms
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - Aditya Kasture, Supriya Narad
Abstract - The pace of change of the software development industry is unprecedented as the introduction of AI code generation tools has not only doubled the productivity of developers by up to 55 percent but also introduced the industry with a new problem of exponential growth in the complexity of the code and technical debt. The former techniques of code review are monotonous, infrequent and time consuming. Such an approach cannot validate the mammoth amounts of gains that are evident in an AI-oriented development cycle. The structure, performance, and service of AI-Accelerated Code Review (AACR) Platforms, which we discuss in this paper, would be the last mile of quality control that would be the solution to this so-called paradoxical situation of such engineering productivity. We propose an AACR system, which is built on a Multi-Agent Architecture with Large Language Models (LLM) to accomplish contextual and reasoning problems, custom machine learning (ML) models to evaluate security and performance, and a code graph analysis to obtain a good composition of the codebase. We conclude that median code review time is an option to decrease by 40-60 per- cent with the AACR platforms. Besides, the accuracy of the detection of the defects can also rise in comparison with the old method of analyzing and reviewing of the data manually. The article relies on the primary argument presented in the description above and the debates concerning the unlawful use of AI generated data and the in- creased use of AI.
Paper Presenter
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Urban Scene Intelligence: A Semantic Anchor-and-Expand Framework for Grounded Scene Understanding
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Authors - V. R. Badri Prasad, Shrujana Patil, Shreeraksha, Prathik S. Hanji, S Vikas Vathsal
Abstract - Traditional object detection systems are limited in their ability to capture the complexity of urban scenes, often overlooking critical spatial, contextual, and functional relationships required. This paper introduces Urban Scene Intelligence, a Semantic Anchor-and-Expand (SAE) framework that integrates multi-modal perception, structured scene graph construction, and controlled narrative generation to produce grounded descriptions of urban environments. The proposed modular architecture incorporates OWL-ViT for open-vocabulary object detection, SegFormer for semantic segmentation, DepthAnything for spatial depth estimation, Qwen2-VL for attribute enrichment, and OCR for extracting textual context. Unlike end-to-end multimodal models, the threestage pipeline explicitly separates visual perception, symbolic reasoning, and language generation, thereby improving interpretability and factual grounding. By unifying heterogeneous visual cues into a symbolic representation and generating context-aware descriptions from this representation, the SAE framework establishes a transparent and extensible approach to urban scene understanding in complex real-world environments.
Paper Presenter
Friday April 10, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

2:15pm GMT+07

Session Chair Concluding Remarks
Friday April 10, 2026 2:15pm - 2:17pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Prashant Suryavanshi

Dr. Prashant Suryavanshi

Principal, Hon Shri Babanrao Pachpute Vichardhara Trust's, Parikrama Polytechnic Kashti. Maharashtra, India.

avatar for Prof. Reena Satpute

Prof. Reena Satpute

Assistant Professor, Faculty of Science and Technology, Datta Meghe Institute of Higher Education & Research (Deemed to be University), Maharashtra, India
Friday April 10, 2026 2:15pm - 2:17pm GMT+07
Virtual Room A Bangkok, Thailand

2:17pm GMT+07

Session Closing and Information To Authors
Friday April 10, 2026 2:17pm - 2:20pm GMT+07

Moderator
Friday April 10, 2026 2:17pm - 2:20pm GMT+07
Virtual Room A Bangkok, Thailand

2:58pm GMT+07

Opening Remarks
Friday April 10, 2026 2:58pm - 3:00pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Hamidreza Khaleghzadeh

Dr. Hamidreza Khaleghzadeh

Senior Lecturer, University of Portsmouth, United Kingdom

avatar for Dr. Rakhi Bhardwaj

Dr. Rakhi Bhardwaj

Assistant Professor & Associate Dean R&D, Vishwakarma Institute of Technology, India
Friday April 10, 2026 2:58pm - 3:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

A Comprehensive Survey on Machine Learning and Deep Learning Methods for Vehicle Detection and Classification
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Kashyap Patel, Urvashi Chaudhari, Chirag Patel, Nirav Bhatt
Abstract - Automatic traffic surveillance has a hard time finding and classifying vehicles that are trying to get in the way. To keep an eye on things in real time, you need to be able to tell the difference between cars, trucks, buses, and other types of vehicles. Traffic management systems need to be able to accurately identify vehicles as the number of cars on the road grows. This paper examines various machine learning (ML) and deep learning (DL) techniques employed to identify and categorize vehicles in images and videos. The authors emphasize the significance of algorithms, such as CNNs, YOLO, and AdaBoost, in enhancing detection accuracy and efficiency. This paper examines various published re-search studies to discern methodologies, datasets, and future research directions in vehicle detection and classification, offering insights into the existing techno-logical landscape and its prospective developments.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

A Study on the Integration of Sensor Innovations for Monitoring Brake Pad Wear in Vehicles
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Renukaradya V, Kumar P K
Abstract - Ethylene and vinyl acetate or EVA is a co-polymer used as a substitute for a lot of materials. EVA is a versatile material and it has a lot of applications ranging from electronics, healthcare, footwear, building applications etc. It is mainly used in sport shoes due to its property to absorb shock impact and insulation properties. In addition, EVA is very cost-friendly, produces no odor, and light in weight material. But with overuse of it, the cellular structure chang-es and can affect the shoes' quality and insulation properties. In addition to the cellular structure, the air molecules present in it also collapse. This paper focus-es on the bonding properties of EVA at different temperatures and its dielectric properties under different operating and manufacturing conditions. The upper, bottom, and sides of EVA shoes are exposed to high voltage till the breakdown. The experimentation was done at Electrical HV laboratory on the university campus where a 100kV HVAC testing system is available. This paper presents the tabulated results on the dielectric strength of EVA shoes under varying operating conditions. Additionally, it examines the bonding properties of EVA shoes at different manufacturing temperatures, aiming to predict their lifespan, quality, and finish. The results of these studies are thoroughly discussed within the document.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Detecting Cybersecurity Threats by Integrating Explainable AI with SHAP Interpretability and Strategic Data Sampling
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Norrakith Srisumrith, Sunantha Sodsee
Abstract - The critical need for transparent and trustworthy machine learning in cybersecurity operations drives the development of this integrated Explainable AI (XAI) framework. Our methodology addresses three fundamental challenges in deploying AI for threat detection: handling massive datasets through Strategic Sampling Methodology that preserves class distributions while enabling efficient model development; ensuring experimental rigor via Automated Data Leakage Prevention that systematically identifies and removes contaminated features; and providing operational transparency through Integrated XAI Implementation using SHAP analysis for model-agnostic interpretability across algorithms. Applied to the CIC-IDS2017 dataset, our approach maintains detection efficacy while reducing computational overhead and delivering actionable explanations for security analysts. The framework demonstrates that explainability, computational efficiency, and experimental integrity can be simultaneously achieved, providing a robust foundation for deploying trustworthy AI systems in security operations centers where decision transparency is paramount.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Federated Learning for Fraud Detection Across Financial Institutions
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Amelia Santosh, Bhavika Pradeep, Dhanuvarsha S S, Harisurya Reddy S, Shruthi L
Abstract - Real-time analysis, high accuracy, and robust privacy protection across several institutions are necessary for financial fraud detection. Restrictions on data sharing and non-IID transaction patterns cause traditional centralized models to fail. Graph Neural Networks (GNNs) for anomaly detection and a structured fraud reporting mechanism are integrated in this paper’s federated learning-based fraud detection framework. While GNNs capture intricate relationships between accounts, devices, and transactions, the system allows institutions to jointly train a global model without exchanging raw data. The feasibility of implementing collaborative fraud detection across financial institutions is demonstrated by the experimental results, which show improved fraud detection performance, enhanced recall on minority fraud cases, and effective privacy preservation.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Highly Isolated Dual Port MIMO UWB antenna Development for Wireless Applications
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Killol Pandya, Aneri Pandya, Trushit Upadhyaya, Upesh Patel, Poonam Thanki, Kanwarpreet Kaur
Abstract - The proposed Multiple Input Multiple Output dual-port antenna radiates for Ultra Wide-Band (UWB) applications. The engineered structure exhibits between the 2.10 GHz to 9.5 GHz frequency. The structure consists dual radiating elements which are positioned at certain distance in order to minimize the effect of inter element interference. The radiator is planar and having triangular shape at the upper side to disturb the current path which eventually creates better radiation. A couple of up arrow shaped slots have been created to improve the current distribution. The microstrip feed line is utilized to excite the antenna structure. A partial ground plane with isolating technique was created to receive the UWB response. The middle layer between the radiators and the ground plane is having the FR4 material which is a cost effective for the bulk production. The physical antenna has been developed from the prototype and the results were measured. The simulated results are aligned with the measured results which shows the antenna potential. The primary diversity parameters such as Diversity Gain, Envelope Correlation Coefficient, Channel Capacity Loss and Mean effective gain were also measure and their simulated values fall under the expected span. The developed antenna is well suitable for UWB wireless applications.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Human Perceptions of AI-Driven Personalization: Surveillance, Autonomy, and Trust in Digital Customer Journeys
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Tiurida Lily Anita, Dino Gustaf Leonandri, Mohd. Nor Shahizan Ali
Abstract - In this paper, we address the problem of rainy condition classification in order to allow autonomous systems to ensure safe operation in different weather conditions of rain, especially for drones. The earlier weather condition classification methods are inclined towards using big and computationally costly models and cannot thus be employed in real-time on resource-constrained platforms such as drones and edge devices. The motivation behind this work is to introduce a light-weight, efficient deep model which would be able to classify various rain conditions with low computational cost so that it may be deployed efficiently on low-resource devices. We present a novel CNN architecture and evaluate its performance on a collection of seven distinct rain conditions. The models are bench marked against some of the state-of-the-art pretrained models to demonstrate the compromise between efficiency and accuracy. Performance is evaluated using accuracy, inference time, and model size. The model has accuracy 95.93% with least model size 89.09 KB with inference time of 32.664 ms bridging the gap in lightweight and real-time classification.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Hybrid BERT-LSTM Model with XAI Integration for Reliable Fake News Detection
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Mouniesh V, Sona S, Mariya Ashile K, Karthick Panneerselvam
Abstract - This paper presents the implementation experience of indigenously developed Data Concentrator Units (DCUs) for Advanced Metering Infrastructure (AMI) system. The DCU functions as the last-mile communication bridge between field devices and the Head-End System (HES), enabling efficient data collection, aggregation, and management. By performing local processing and aggregation, it reduces data traffic over the Wide Area Network (WAN), there-by improving communication efficiency, scalability, and reliability. The DCU firmware is designed for flexible communication and secure data handling, sup-porting pluggable WAN and Neighbourhood Area Network (NAN) communication modules compliant with proprietary BHARAT IoT standards, that can be upgraded or replaced without requiring complete system replacement or rede-sign. It also ensures robust data security through AES-GCM-GMAC encryption. The NAN module is implemented using LoRa technology, enhanced through the LoRaPro communication module, which increases payload capacity from the standard 256 bytes to 1 KB using an advanced packet stitching and slicing algorithm that ensures reliable reconstruction of larger messages. The paper discusses the major design and development challenges encountered and the methodologies adopted to address them.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Indigenous Development of Data Concentrator Units (DCUs) for Advanced Metering Infrastructure (AMI)
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Devika K S, Jiju K, Dinesh Kumar R, Ashish Murikingal, Anoop V G
Abstract -This paper presents the implementation experience of indigenously developed Data Concentrator Units (DCUs) for Advanced Metering Infrastructure (AMI) system. The DCU functions as the last-mile communication bridge between field devices and the Head-End System (HES), enabling efficient data collection, aggregation, and management. By performing local processing and aggregation, it reduces data traffic over the Wide Area Network (WAN), there-by improving communication efficiency, scalability, and reliability. The DCU firmware is designed for flexible communication and secure data handling, sup-porting pluggable WAN and Neighbourhood Area Network (NAN) communication modules compliant with proprietary BHARAT IoT standards, that can be upgraded or replaced without requiring complete system replacement or rede-sign. It also ensures robust data security through AES-GCM-GMAC encryption. The NAN module is implemented using LoRa technology, enhanced through the LoRaPro communication module, which increases payload capacity from the standard 256 bytes to 1 KB using an advanced packet stitching and slicing algorithm that ensures reliable reconstruction of larger messages. The paper discusses the major design and development challenges encountered and the methodologies adopted to address them.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

INTRUSION DETECTION USING UNRAVELLED SPATIAL FEATURES IN MULTILAYER PERCEPTRON WITH GRADIENT JACOBIAN ANALYSIS
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Gaurav Kulkarni, Maya Rathore
Abstract -In digital world, cyber-attacks are becoming more sophisticated and popular. The conventional intrusion detection models are not adequate in challenging threat escapes. Importantly, the major reason for increasing demand in the networks, unauthorized access is increasing their interests in these areas. Various network environments and organizations are tackling numerous of attacks on their network at frequent times. Traditionally, various manual methods are used for intrusion detection such as packet and flow analysis, traffic log reviewers and monitoring the security. Nevertheless, the manual techniques for such type of the detections takes too much time and also the result obtained is not up to the mark, so due to this it is difficult to predict all types of attacks and intrusions for network security. To overcome these issues, several conventional researches have concentrated on intrusion detection models to offer effective security to the networks. Conversely, it results with accuracy and speed lacks. For enhancing the intrusion detection, research make use of a Deep Learning (DL) Unravelled Spatial Features in Multilayer Perceptron with Gradient Jacobian Matrix. Gaussian Activation is used to enhance the Intrusion detection system for an effective classification. In the proposed research work we are using the RT-IoT dataset and the final efficiency has been analyzed by using various parameters like overall correctness, actually correct, correctly identified by the model,and the balance between the both values of recall and precision (Harmonic Mean). Furthermore, the current work and the proposed model is developed to contribute to avoid the different cyber threats by timely identifying such type of intrusion in the networks.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Sustained Adoption of QR-Code Payments in Mobile Banking: Evidence from QRIS Users
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Authors - Tiurida Lily Anita, Ali Faik, Muhammad Zilal Hamzah, Hainnuraqma Rahim
Abstract - Web accessibility and usability are fundamental pillars for ensuring effective digital inclusion, especially in higher education institutions committed to equity in access to information. This study aimed to evaluate the usability and accessibility of the website of the Inclusion, Social Equity, and Gender Unit at the Technical University of Manabí, using the WCAG 2.0 guidelines. A mixed methodology with a qualitative and applied approach was employed. Initial results revealed a low level of compliance with accessibility standards, highlighting deficiencies in the principles of perceptibility and operability, such as the absence of alternative descriptions for images and insufficient contrast. After implementing improvements, the website achieved 76% compliance according to a manual review, with notable progress in responsive design and the incorporation of an accessibility toolbar. However, challenges remain regarding the principle of robustness, underscoring the importance of combining automated tools with thorough manual evaluations. Future work will adopt WCAG 2.1 guidelines and integrate advanced assistive technologies to overcome current limitations, promoting a more inclusive and accessible digital environment for all users.
Paper Presenter
Friday April 10, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

5:00pm GMT+07

Session Chair Concluding Remarks
Friday April 10, 2026 5:00pm - 5:02pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Hamidreza Khaleghzadeh

Dr. Hamidreza Khaleghzadeh

Senior Lecturer, University of Portsmouth, United Kingdom

avatar for Dr. Rakhi Bhardwaj

Dr. Rakhi Bhardwaj

Assistant Professor & Associate Dean R&D, Vishwakarma Institute of Technology, India
Friday April 10, 2026 5:00pm - 5:02pm GMT+07
Virtual Room A Bangkok, Thailand

5:02pm GMT+07

Session Closing and Information To Authors
Friday April 10, 2026 5:02pm - 5:05pm GMT+07

Moderator
Friday April 10, 2026 5:02pm - 5:05pm GMT+07
Virtual Room A Bangkok, Thailand
 
Saturday, April 11
 

9:28am GMT+07

Opening Remarks
Saturday April 11, 2026 9:28am - 9:30am GMT+07

Invited Guest & Session Chair
avatar for Azad Mohammed Shaik

Azad Mohammed Shaik

BSWE Platform Design Engineer, Stellantis, United States

avatar for Dr. Bikash Sadhukhan

Dr. Bikash Sadhukhan

Assistant Professor, Department of CSE, Techno International New Town, West Bengal, India

Saturday April 11, 2026 9:28am - 9:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

A Deep Learning and Inventory Optimization Framework to Mitigate Post-Expiry Blood Wastage
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Yohan Ranasinghe, Janice Abeykoon, Samantha Kumara Senavirathna
Abstract - Efficient blood supply chain management is a critical global impera tive in healthcare, yet it is consistently hampered by significant post-expiry blood wastage. This issue, prevalent across diverse healthcare systems, represents a considerable loss of a vital and non-substitutable resource, primarily stemming from challenges in accurate demand forecasting and dynamic inventory coordi nation. To address this pervasive problem, this research proposes and validates a novel data-driven framework. The approach leverages a multivariate deep learn ing forecasting model, specifically a Multivariate Long Short-Term Memory (LSTM) network, integrated into a comprehensive platform designed for proac tive inventory management. The model's development and empirical validation utilize historical blood collection and transfusion data (January 2020 – December 2024) from a cluster center of the National Blood Transfusion Service (NBTS) in Sri Lanka, serving as a representative case study to demonstrate real-world applicability. The framework incorporates multivariate factors such as historical transfusion patterns, seasonal variations, and interdependencies between blood groups to generate more accurate demand predictions. The integrated system, de signed to support real-time inventory monitoring, automated near-expiry track ing, and digital blood request and redistribution mechanisms, aims to align blood supply with anticipated demand. The findings of this research demonstrate that this integrated deep learning and inventory optimization framework significantly improves blood stock utilization, minimizes wastage, and enhances the overall efficiency of blood supply systems. It offers a scalable and ethically governed solution, contributing broadly to efforts in sustainable healthcare delivery world wide.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

A Hybrid Fine-Tuned LLM and RAG-Based Framework for Company-Specific Interview Question Generation
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Rashmi Y Matt, Shreya Srinivasan, Venkata Sravani Revuri, Vismaya Murali, Chandravva Hebbi, Natarajan
Abstract - Preparing for technical interviews has become very challenging for computer science students due to highly competitive hiring environments and the lack of company-specific practice resources. Existing resources and Generative platforms provide generic questions that do not reflect the specific patterns, technical focus areas, or expectations of different requirements.To address this gap, we present a system that combines a structured knowledge-graph-based retrieval module with a fine-tuned LLamA-2-7B model to generate company-specific technical interview questions. The data set contains 28,854 curated questions from 470 companies, which were cleaned and used for finetuning. The proposed framework also integrates an evaluation pipeline using both LLM-as-a-Judge and manual scoring to check validity, clarity, and technical correctness.The fine-tuned LLamA-2-7B model integrated with the knowledge graph retrieval achieved the best performance, which significantly outperformed other generative models in producing contextually appropriate and technically relevant questions. This approach aims to provide students with more targeted preparation resources aligned with real-world hiring expectations.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

A Two-Stage Hierarchical Framework for Early Detection of Stress and Suicide Risk
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Halima Tuj Saydia, Partha Chakraborty
Abstract - The mental health issues, such as stress and suicidal threats, have become a major public health concern for students and young adults. Early identification of such conditions is important for timely interventions and prevention. The study aims to develop a two-stage hierarchical framework to predict stress and suicide risk early. It is based on the questionnaire survey dataset of 1436 responses. The hierarchical method utilizes psychological and lifestyle characteristics gathered through surveys, thereby eliminating the need for physiological sensors. The first stage develops machine learning (ML) models, namely XGBoost, Random Forest (RF), and Support Vector Machine (SVM), to detect stress. These models have achieved an accuracy of 93%, 88%, and 83%, respectively. If the individual is detected as stressed, it moves to the second stage for suicide risk detection. Deep learning (DL) models, mainly Artificial Neural Network (ANN), Deep Neural Network (DNN), and Recurrent Neural Network (RNN), are developed in the second stage. They have achieved accuracy of 94%, 90%, and 89%, respectively. The study presents a scalable, data-driven framework that supports early mental health screening in resource-limited communities.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Comparative Analysis of Quantum Entanglement Techniques for Parkinson’s Disease Detection: Evaluating Encoding Strategies in Quantum Machine Learning
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Satrasala Hari priya, Sabhya Kulkarni, Sindhu Baddela, Spoorthi Krishna Devadiga, Suja CM
Abstract - This paper evaluates the quantum entanglement techniques for the detection of Parkinson’s disease using multimodal clinical data from the PPMI database. Four encoding techniques are evaluated: Amplitude Encoding, Dense Angle, IQP-based Pauli, and Hierarchical. The results of the analysis indicate that accuracy and the efficiency of the circuit are greatly impacted by the entanglement technique. Amplitude Encoding is the most efficient for NISQ computers (92.00% accuracy, 6-depth circuits), while Dense Angle provides the highest accuracy (92.59%). Hierarchical entanglement is the least efficient (80.86%), showing that too much depth causes optimization difficulties. These results provide practical recommendations for the design of quantum circuits for medical diagnosis.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Cyber Intelligence: A Promising Research Field
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Chandan Kumar, Supriya Narad
Abstract - In the contemporary digital landscape, the proliferation of cyber threats has become a pervasive and escalating concern, posing imminent dangers to individuals, businesses, and entire nations. Cyber intelligence emerges as a critical component in the ongoing battle against these threats, involving the systematic gathering, analysis, and dissemination of information pertaining to cyber threats, actors, and vulnerabilities. This research paper aims to provide an insightful examination of the existing landscape of cyber intelligence, delineating its fundamental sub-domains and highlighting areas ripe for future research. The paper begins by delving into the current state of cyber intelligence, emphasizing the dynamic nature of the digital threat landscape. It elucidates the multifaceted challenges posed by cyber threats, underscoring the need for a proactive and adaptive approach to intelligence gathering and analysis. This section also explores contemporary technologies and methodologies employed in cyber intelligence, ranging from advanced analytics and machine learning to threat intelligence platforms.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

ICT-ENABLED HUMAN RESOURCE SUSTAINABILITY IN HIGHER EDUCATION: A REVIEW OF PRACTICES AND CORRELATES IN INDIAN DEEMED UNIVERSITIES
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Shubham Kadam, Chhitij Raj, Pankajkumar Anawade, Deepak Sharma
Abstract - Higher education in India is poised at a junction and change seems to be driven by the issues of quality, access and sustainable development. In this framework, the HR sustain ability is essential for recruiting, hiring and retaining competent employees. This paper discusses ICT enabled practices of Indian deemed universities in the direction of promoting HR sustaina bility. Drawing on Review of literature and theme analysis, it explores e-based practices such as e-recruitment, digital training, online performance management, wellness technologies digital knowledge collaborations platforms. The study reveals that adoption of ICTs promotes effective ness, transparency and inclusivity of HR functions through the maintenance continuous staff de velopment. Nonetheless, other contributors such as leadership support, digital literacy and policy environment were found to significantly influence implementation outcomes. Digital divides, lack of training, data privacy and cost are some of the other concerns highlighted by the review. An overview of future themes in which AI, personalized HR services, and eco- sustainable ICT platforms will play a significant role into developing Future-proofed University.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

INTEGRATING GREEN COMMUNICATION SYSTEMS, SMART ICT, AND HR SUSTAINABILITY INSIGHTS FOR FUTURE-READY UNIVERSITIES
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Mr. Shubham Kishor Kadam, chhitij Raj
Abstract - Increasing demands of universities to become sustainable in their practice and the necessity to compete in the global arena have compelled higher education to the implementation of green communication infrastructure and smart ICT solutions in every facet of the university practice. As an ingredient of this change, there is the HR sustainability: that we will go digital faculty and staff, and at the same time retain them in friendly and efficient and inclusive systems that are environmentally friendly. The emergence of the green communication systems, intelli gent ICT infrastructures, and green HR practices is helping the higher education sector to fund their future in this paper. The article is narrowed down to new practices, such as the hiring without paper, the use of mobile based performance management and virtual training, that is generated under the secondary research and conceptual framework. It also talks about the benefits, chal lenges and opportunities of such system in higher learning institutions. The findings suggest that the effective adoption of the sustainable ICT will help improve the performance of the organiza tions, reducing the impact on the environment to a minimum and being part of the creation of the digitally resilient human resources.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Penetration Testing on Infotainment Head Unit
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Lakshmi BV, Anupriya S, Ningappa B, Diganth SD, RoopaRavish, Prasad B Honnavalli
Abstract - Modern car infotainment head unit has become a highly connected cyber-physical system, incorporating Wi-Fi, Bluetooth, USB ports, and the Controller Area Network (CAN) bus. While such capabilities enhance the user experience, they also raise the susceptibility of the vehicle to attacks, and hence there is a need to assess the security of the vehicle. This paper performs a comprehensive penetration test on an infotainment system, examining wireless, wired, and in-car communication channels. For the Wi-Fi component, we performed a series of attacks such as Distributed Denial-of-Service (DDoS), deauthentication, MAC and IP spoofing attacks, creating fake access points, and WPA-based attacks to determine the robustness of the system against network-level threats. Bluetooth attacks included device snarfing, replay attacks, manual packet injection attacks, and unauthorized access to data. USB attacks were employed to analyze the dangers posed by connected devices, including the extraction of GPS information, log files, SMS messages, and access to the microphone and camera. For the CAN bus, we performed replay attacks, flooding attacks, manual frame injection attacks, and manipulation of sensor information such as humidity and temperature readings. The outcome of each of these attacks indicates that the infotainment system can serve as a means through which attackers gain access to the vehicle's network, and hence the need for enhanced authentication, improved security for the interfaces, and real-time monitoring for security breaches. This paper provides valuable information for enhancing the security of modern car infotainment systems and contributes to the efforts being made in the field of automotive cybersecurity.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

The Role of Artificial Intelligence in Stock Market Prediction: Opportunities and Challenges
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Tejaswini Borkar, Kajal Salampuriya
Abstract - This paper focuses on the product of state of the art artificial intelligence (AI) language models (that is, ChatGPT, Perplexity, and Grok) to generate and test algorithmic trading strategies in financial markets. With such AI tools in the field, the study examines the success of the tools in cases of generating trading signals, synthesizing market sentiment, and helping manage risks both through quantitative backtesting and through qualitative analysis. The conclusion is that though the procedures performed using AI-assisted tactics may be comparable to the findings of the use of conventional algorithmic processes and will outline beneficial information, the findings should undergo tangible verification and cautious human interventions to establish dependability and applicability. Our findings are indicators of the potential of the large language models as an addition to assist traders and researchers and indicate that caution is still necessary to integrate with the long-established quantitative methods and risk management functions.
Paper Presenter
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

9:30am GMT+07

Toward Explainable AI for Medical Negligence Adjudication in India
Saturday April 11, 2026 9:30am - 11:30am GMT+07
Authors - Niraja Jain, Rajeev Kumar, Golnoosh Manteghi
Abstract - Medical negligence litigation in India poses significant challenges to the justice delivery system due to the complexity of clinical evidence, fragmented legal documentation, and limited availability of structured decision-support mechanisms for legal practitioners. These challenges often result in delays, inconsistent legal reasoning, and increased cognitive burden on judges and lawyers handling medico-legal disputes. This paper presents the design and preliminary validation of a Judicial Decision Support System (JDSS) tailored specifically for medical negligence litigation in the Indian legal context. The proposed JDSS leverages advanced Natural Language Processing (NLP) techniques and supervised machine learning models to assist early-stage legal triage through automated case summarization, statutory section prediction, and precedent recommendation. Transformer-based language models are fine-tuned on publicly available Indian legal judgments and augmented with a domain-specific legal–medical ontology to bridge semantic gaps between clinical narratives and legal reasoning. Explainability is embedded at both the model and user-interface levels through attention visualization and feature attribution mechanisms, addressing transparency requirements critical for high-stakes judicial applications. The system has undergone formative evaluation through an exploratory stakeholder survey involving participants from legal, academic, and higher-education ecosystems in India. This evaluation focuses on perceived usefulness, trust, explainability expectations, and institutional readiness for AI-assisted judicial tools, rather than predictive performance. Findings from the survey informed key design choices, particularly the emphasis on explainable AI and modular deployment. While large-scale retrospective evaluation on real-world court data remains part of future work, the current study establishes a methodologically grounded and ethically aligned foundation for AI-assisted judicial decision support in resource-constrained legal environments, with scope for integration into India’s evolving digital judiciary infrastructure.
Paper Presenter
avatar for Niraja Jain

Niraja Jain

Malaysia

Saturday April 11, 2026 9:30am - 11:30am GMT+07
Virtual Room A Bangkok, Thailand

11:30am GMT+07

Session Chair Concluding Remarks
Saturday April 11, 2026 11:30am - 11:32am GMT+07

Invited Guest & Session Chair
avatar for Azad Mohammed Shaik

Azad Mohammed Shaik

BSWE Platform Design Engineer, Stellantis, United States

avatar for Dr. Bikash Sadhukhan

Dr. Bikash Sadhukhan

Assistant Professor, Department of CSE, Techno International New Town, West Bengal, India

Saturday April 11, 2026 11:30am - 11:32am GMT+07
Virtual Room A Bangkok, Thailand

11:32am GMT+07

Session Closing and Information To Authors
Saturday April 11, 2026 11:32am - 11:35am GMT+07

Moderator
Saturday April 11, 2026 11:32am - 11:35am GMT+07
Virtual Room A Bangkok, Thailand

12:13pm GMT+07

Opening Remarks
Saturday April 11, 2026 12:13pm - 12:15pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Archana Pritam Kale

Dr. Archana Pritam Kale

Associate Professor, MES Wadia College of Engineering, India

Saturday April 11, 2026 12:13pm - 12:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

A Disability-Centered Framework for Enhancing Accessibility and Universal Design in WebOPAC Systems: Emphasizing Visually Impaired Users in Thailand
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Thapanapong Sararat, Ratanachote Thienmongkol, Ruethai Nimnoi, Wongpanya S. Nuankaew, Pratya Nuankaew
Abstract - Ensuring equitable access to library information systems is crucial in the digital era, particularly for visually impaired users who rely on assistive technologies. WebOPACs are key gateways to resources, but many remain difficult to use despite referencing accessibility standards. This study proposes a Disability-Centered Framework to improve accessibility and Universal Design in Thailand’s WebOPACs. Developed through design-based research, it integrates international accessibility literature, Universal Design principles, WCAG 2.1, and evaluation insights. The framework emphasizes three components: disability-focused design principles, classification of visually impaired users and needs, and task-specific accessibility requirements across perception, navigation, interaction, and assistive-technology compatibility. It also incorporates Thai linguistic, cultural, and technological conditions to bridge global standards and local implementation. Findings indicate that meaningful accessibility requires iterative testing and ongoing refinement rather than a one-time compliance check. This framework guides libraries, developers, and policymakers in enhancing WebOPAC accessibility and supporting inclusive access for visually impaired users in Thailand.
Paper Presenter
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

AD-GENIUS:Adaptive Diffusion-based GENerative Framework with Intelligent User-guided Styling and LLM-driven prompt reasoning for automated advertisement generation
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Srishti Mathur, Hrishita Patra, Suhani Verma, Dhruva R Prasad, Shylaja S.S
Abstract - The conventional way of preparing an advertisement is an elaborate process incorporating human subjectivity and human resources heavily dependent on creativity. Making advertisements by human effort can be regarded as an inefficient utilization of capital for small to medium-scale businesses due to increased cost of production. Even in current advancements in the development of generative techniques including LLM-based strategies for Advertisement Generation with Prompts, creating apt prompts for the depiction of products requires human expertise, making them less accessible. In order to overcome the challenges presented by the current models, we introduce a fast, affordable, and scalable platform for the automation of advertisement generation for products leveraging the capabilities of pre-trained diffusion models. The proposed system requires no training or fine-tuning since everything is performed at the inference level. The AI-aware system for designing assists in the identification of color schemes and attributes from the images of the products, whereas the descriptions and categories of the items help identify the theme and pattern recommendations for advertisements. These recommendations are channeled through a pre-trained Stable diffusion model guided by the LLaMA language model.
Paper Presenter
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Areca Nut Disease and Ripeness Detection Model
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Sneha Visveswaran, Tanmay Praveen, Vidula Gurudutta, Yamini Sridhar, Chaithra T S5
Abstract - Arecanut crop management has traditionally depended on manual inspection for disease identification and harvest readiness assessment, a method that is both time-consuming and susceptible to human error. This study introduces an automated, image-based system designed to address two primary tasks: disease classification and ripeness assessment. The proposed pipeline initiates with data preparation, including resizing, normalization, and augmentation of arecanut images to enhance model robustness. A convolutional neural network architecture, incorporating additional feature extraction and optimization layers, is utilized to detect disease symptoms. A comparable deep-learning model is trained to classify ripeness stages based on visual characteristics. Model performance is evaluated using accuracy, precision, recall, and F1-score metrics to ensure reliability. The system is implemented via a user-friendly web interface, which allows real-time image uploads and immediate predictions, thereby facilitating practical application for farmers and agricultural stakeholders. This integrated solution provides a scalable and cost-effective approach to improving crop monitoring and supporting data-driven decision-making in arecanut cultivation.
Paper Presenter
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

BotoSafe: A Web-App Voting Platform with Multifactor Authentication and Data Analytics
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Kate Lorreine M. Colot, Anjeneth G. Molina, Freely M. Wasawas, Ferlyn P. Calanda, Shem L. Gonzales, Richard B. Colasito
Abstract - Despite the availability of digital voting systems, prior studies continue to identify gaps such as weak or voter authentication, security vulnerabilities and insufficient fraud prevention mechanisms. This paper presents BotoSafe, a secure and user-centered electronic voting (e-voting) platform developed for student government elections within educational institutions. The system implements multifactor authentication (MFA) using one-time password (OTP) verification and facial recognition with an anti-spoofing mechanism. To ensure the confidentiality and integrity of the voting process we employ the Advanced Encryption Standard in Galois/Counter Mode (AES-GCM). A developmental research design with a quantitative approach was used for the system development and evaluation. A mock election involving 84 students from Western Mindanao State University–Pagadian Campus was conducted, followed by a post-assessment survey. Results from the System Usability Scale (SUS) yielded a score of 72.08, indicating acceptable usability. User responses further showed that the system is easy to use, safe, and trustworthy for student elections. These findings indicate that BotoSafe is a viable e-voting solution for student government elections and may be further enhanced in future studies.
Paper Presenter
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Consumer Trust, Security, and Awareness as Determinants of UPI Adoption among Private Sector Employees in Chandrapur
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Eliza Borkute, Michael Savariapitchai, Vijeyandra Shahu, Deepak Sharma Chetan Parlikar
Abstract - The current study aims to examine the significance of trust, perceived security, and awareness as factors that influence the adoption rate of UPI among private sector employees within the region of Chandrapur. The structured ques tionnaire has been designed to measure the following: a) trust factor regarding data protection and the correctness of the operations; b) perceived security level of UPI; c) awareness and knowledge about UPI functions; d) demographic characteristics related to education level, annual earning capacity, and age; and e) actual level of UPI adoption involving the use rate, continuous use of UPI, recommendations, and its integration with financial activities. Nonparametric statistical methods were used, including Spearman's rank correlation by investi gating the relationships of trust, security perception, awareness, and adoption. Kruskal-Wallis tests were conducted for finding group differences between ed ucation level and usage frequency. The results have accounted for strong, posi tive, and statistically significant associations between consumer trust, perceived security, awareness, and UPI adoption indicators. Education level revealed a partial moderating effect. Educated respondents tend to show higher trust and usage frequency in selected trust dimensions. However, this is not the case in all the aspects of this dimension. Additionally, the frequent users of UPI exhibit greater trust compared to the occasional users.
Paper Presenter
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Enhanced Hybrid Fact-Checking for Believable Fake News Detection
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Tanay Balakrishna, Vishal Kumar Rahul, Yugabharathi E, Samanvi P, Vinay Joshi
Abstract - The rapid spread of online news has made it more difficult to distinguish factually based reporting from misleading content. Many factchecking systems fail to detect false articles that appear professional and realistic, which leads to widespread disinformation. Most models rely on surface characteristics and neglect semantic coherence and factual consistency. An Improved Hybrid Fact-Checking System that combines language understanding, adversarial training, rule-based plausibility checks, and claim level web verification. These components run together in an ensemble model using BERT, BiLSTM, and an XGBoost meta-classifier to merge multiple evidence sources. Experiments on benchmark and curated datasets show an accuracy of 96.84% and a recall of 98%, outperforming existing deep learning methods. The results show that blending linguistic analysis with external verification leads to a robust and interpretable approach for automated fact-checking
Paper Presenter
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Halo CME Detection Using Aditya-L1 SWIS-ASPEX Data with Optimized LSTM Networks
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Shraddha Mankar, Tanishq Thuse, Prasanna Khebade, Ritik Kumar Singh, Shravani Shirpurkar
Abstract - Coronal Mass Ejections (CMEs) occurring in halo configuration are considered one of the most serious threats coming from space weather that can cause disruptions to most of the Earth’s geomagnetic facilities. The present study is about a hybrid machine learning system that detects the halo CMEs and predicts their Earth impact in real-time using the particle data coming from the in-situ India’s Aditya-L1 mission placed at L1 Lagrange point. We apply physics-informed feature extraction from SWIS-ASPEX payload measurements, obtaining alpha-to-proton density ratios, bulk velocity gradients, thermal parameters, and velocity anisotropy indices as CME markings. A Long Short-Term Memory (LSTM) neural network tuned through the Spider Cuckoo Optimization Algorithm processes 24-hour sequential windows of these features to distinguish between CME and non-CME events. The system also includes the modeling of Parker spiral propagation for Earth arrival time estimation and it is made available through a React-based dashboard with explainable AI components. The performance of the system reveals that it achieves a 98% detection rate along with a mean absolute error of 0.001 in the prediction of the normalized impact index. A comparison with historic halo CME catalogs indicates that our method has reduced false alarms by 85% when compared with threshold-based techniques while keeping the recall rate at 90%. The operational version of the system grants a 45-60 minute notification for the arrival of the CME, thus enabling the sensitive infrastructure to take preventive measures.
Paper Presenter
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Project Based Learning and Digitalization Quality (SDG 4 & SDG 8) Evaluating Mobile First Web Design For SMEs
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Sabo Hermawan, Ryna Parlyna, Surya Anugrah, Inkreswari Retno Hardini, Bayu Suhendry, Ria Rahma Nida, Windy Permata Suyono, Nur Lisa Rahmaningtyas, Eka Septariana Puspa, Cornellius Seno Adriano, Alifah Nur Rahmawati
Abstract - Smart parking systems have developed as a critical solution to urban challenges such as traffic congestion, disorganized space utilization, and delays in manual parking searches. This study presents a smart parking framework that employs a Raspberry Pi 4GB, a camera module, and a servo motor for automated parking management. The system integrates a Haar Cascade classifier and YOLOv11 for accurate vehicle detection, while utilizing IR and ultrasonic sensors for obstacle identification. Real-time slot availability is displayed through an LCD interface. To ensure uninterrupted functionality, the system is powered by a solar panel with a rechargeable battery, enabling autonomous operation during power outages. Experimental results validate the reliability of vehicle recognition under varying illumination conditions, efficient gate control, and improved accuracy compared to conventional sensor-based approaches. This design offers a scalable, cost-effective, and energy-sustainable framework for urban parking solutions. Future work includes integration with cloud-based IoT platforms for centralized monitoring, optimization of YOLOv11 through lightweight variants for edge deployment, and extension to multi-level parking facilities with dynamic slot availability updates.
Paper Presenter
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

Student Driven Development of SQL Based Inventory Systems for MSMEs, Integrating ChatGPT and SDG 12
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Sabo Hermawan, Ryna Parlyna, Surya Anugrah, Inkreswari Retno Hardini, Bayu Suhendry, Ria Rahma Nida, Eka Dewi Utari, Nur Lisa Rahmaningtyas, Cornellius Seno Adriano, Alifah Nur Rahmawati
Abstract - This research investigates the performance of transformer-based models, BERT, ALBERT, and RoBERTa, fine-tuned for sentiment classification on the Women’s Clothing E-Commerce Reviews dataset. The overall task was executed under both 3-class and 5-class sentiment classification schemes. Each model was trained under the same conditions and evaluated comprehensively. In the 3-class task, RoBERTa achieved an F1-score of 91.7% and an AUC of 0.967, surpassing previous best-reported results. BERT also showed competitive performance with an F1-score of 90.2% and an AUC of 0.951. These results establish the superior generalisation ability and discriminative power of transformer models, particularly RoBERTa, in classifying sentiment from unstructured review text. ALBERT, while computationally efficient, showed reduced accuracy and AUC, indicating that extensive parameter sharing can hinder fine-grained sentiment resolution. The models exhibit broadly consistent behaviour in the 5-class setting, with RoBERTa maintaining a lead. A modest decline in F1 and AUC is evident, reflecting the greater difficulty introduced by finer class granularity. This research validates transformer architectures in a commercial Natural Language Processing scenario, demonstrating the superiority of transformer-based models over traditional baselines in both accuracy and robustness.
Paper Presenter
avatar for Sabo Hermawan

Sabo Hermawan

Indonesia

Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

12:15pm GMT+07

The Impact of Social Media Influencers on Consumer Preferences and Purchase Intentions: An Empirical Study
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Authors - Jitesh Kriplani, Michael Savariapitchai, Vijeyandra Shahu, Deepak Sharma, Chetan Parlikar
Abstract - The present investigation discusses the influence of social media in fluencers on the choices made by consumers and their buying behavior, espe cially in connection with important personality traits of the influencer, such as emotional engagement, authenticity, and reliability. The scientists conducted a well-organized survey questionnaire that collected primary information from 360 respondents in the Wardha District. Using Spearman's rank correlations re sults indicated strong, positive and statistically significant relationships between influencer behaviors and consumer purchase behaviors indicating that influenc ers have a significant impact on consuming behaviors of consumers. The results of a one-way ANOVA found that perceptions of influencer credibility (includ ing honesty and sponsorship disclosure), as well as perceptions of emotional engagement and authenticity, were significantly different depending on the fre quency of social media use by the participant. The demographic analysis also examined differences in consumer reactions depending on age, gender, and in come, finding no significant difference across age groups, but significant differ ences related to income and gender. The study concludes that consumer en gagement increases with more frequent social media use and influencer effec tiveness is significantly related to the authenticity, transparency, and credibility of the communication. Findings highlighted the need for focused influencer marketing content based on demographics providing empirical evidence of in fluencer marketing on consumer behavior.
Paper Presenter
Saturday April 11, 2026 12:15pm - 2:15pm GMT+07
Virtual Room A Bangkok, Thailand

2:15pm GMT+07

Session Chair Concluding Remarks
Saturday April 11, 2026 2:15pm - 2:17pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Archana Pritam Kale

Dr. Archana Pritam Kale

Associate Professor, MES Wadia College of Engineering, India

Saturday April 11, 2026 2:15pm - 2:17pm GMT+07
Virtual Room A Bangkok, Thailand

2:17pm GMT+07

Session Closing and Information To Authors
Saturday April 11, 2026 2:17pm - 2:20pm GMT+07

Moderator
Saturday April 11, 2026 2:17pm - 2:20pm GMT+07
Virtual Room A Bangkok, Thailand

2:58pm GMT+07

Opening Remarks
Saturday April 11, 2026 2:58pm - 3:00pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Chandrakant D. Kokane

Dr. Chandrakant D. Kokane

Associate Professor, Vishwakarma Institute of Technology, India

Saturday April 11, 2026 2:58pm - 3:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

A Chaos-Based Permutation–Diffusion Framework for Secure and Efficient Digital Image Encryption
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Selvamani K, Saranraj S, Muthusundar SK, Kanimozhi S, Mohana Suganthi N
Abstract - The phishing attack through email remains a significant threat to cybersecurity because the attack has become highly advanced, flexible, and widely spread among individuals and organizations. The phishing tricks, such as personalized social engineering, impersonated identities, and malicious links, have evolved fast and made the traditional email security measures less useful. As such, numerous schemes of email phishing attack detection and prevention have been suggested, combining rule-based approaches with machine learning, deep learning, natural language processing, and sophisticated artificial intelligence systems. This review paper provides a detailed discussion of the currently existing email phishing detection and prevention frameworks, their architectural elements, detection schemes, and preventive schemes. The paper systematically evaluates the conventional, machine learning, and more advanced AI-driven methods with their advantages, weaknesses, and flexibility to the changing phishing threats. The synthesis of existing research trends and unaddressed issues makes the review valuable to researchers and cybersecurity practitioners and will allow building solid, scalable, and intelligent email phishing defense systems.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

A Hybrid Semantic–Linguistic Framework for Clinical Detection of Drug–Drug Interactions and Contraindications
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Mohanad A. Deif, Mohamed A. Hafez, Samar Mouakket, Mohamed
Abstract - Polypharmacy and multiple chronic conditions in older adults increase the likelihood of adverse drug events caused by drug–drug interactions (DDIs) and contraindications. Many clinical decision support systems still have limited ability to use patient context and to exchange knowledge in a consistent semantic form. This study presents a hybrid semantic–linguistic framework for automated DDI detection by combining biomedical natural language processing, ontology-based reasoning, and risk scoring. The framework uses BioBERT to extract relevant information and represents it using RDF knowledge graphs, OWL 2 DL ontologies, and SWRL rules. In an evaluation with 1,000 synthetic patient profiles containing RxNorm-coded medications and SNOMED CTencoded diagnoses, the system identified a wide range of clinically important interaction patterns. Statistical testing showed that age and the number of medications were strongly associated with alert frequency (p < 0.001). These findings suggest that the proposed approach can improve medication safety by providing explainable clinical decision support.
Paper Presenter
avatar for Samar Mouakket

Samar Mouakket

United Arab Emirates

Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

A Quantum-Resistant Security Framework for Real-Time Financial Transaction Systems
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Selvamani K, Kanimozhi S, Muthusundar S K, Saranraj S, Jagadeesh K
Abstract - Multi-object tracking (MOT) is a pillar of many computer vision applications such as video surveillance, self-driving and crowd analysis [1]. The main difficulty does not only exist in correct identification of objects but also in consistent identities of objects in different frames when there is occlusion, camera motion and changes in scene density [14]. The paper introduces a highly advanced MOT system, combining the latest YOLOv8x detector with a modified and improved version of the original ByteTrack association system, which is called RobustBoTSORTTracker [14]. With the new detection quality of YOLOv8x and the robustness of low-confidence detections in ByteTrack, augmented with selective improvements of BoT-SORT including camera motion compensation and exponential moving average smoothing, the proposed system demonstrates significant gains on the MOT15 benchmark [7]. Experimental findings indicate a MOTA of 55.6, IDF1 of 72.2, precision of 74.3 and a recall of 95.7, which is significantly higher than the previous baselines under similar conditions.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Adverse Rainy Condition Classification Using Customize Lightweight CNN Models for UAVs
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Abhay Saxena, Ankit Kumar, Prasant Kumar Sahu
Abstract - In this paper, we address the problem of rainy condition classification in order to allow autonomous systems to ensure safe operation in different weather conditions of rain, especially for drones. The earlier weather condition classification methods are inclined towards using big and computationally costly models and cannot thus be employed in real-time on resource-constrained platforms such as drones and edge devices. The motivation behind this work is to introduce a light-weight, efficient deep model which would be able to classify various rain conditions with low computational cost so that it may be deployed efficiently on low-resource devices. We present a novel CNN architecture and evaluate its performance on a collection of seven distinct rain conditions. The models are bench marked against some of the state-of-the-art pretrained models to demonstrate the compromise between efficiency and accuracy. Performance is evaluated using accuracy, inference time, and model size. The model has accuracy 95.93% with least model size 89.09 KB with inference time of 32.664 ms bridging the gap in lightweight and real-time classification.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Bonding of material and Electrical Properties of EVA shoes under various Physical and Manufacturing conditions
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Arjun Verma, D.K. Chaturvedi
Abstract - Ethylene and vinyl acetate or EVA is a co-polymer used as a substitute for a lot of materials. EVA is a versatile material and it has a lot of applications ranging from electronics, healthcare, footwear, building applications etc. It is mainly used in sport shoes due to its property to absorb shock impact and insulation properties. In addition, EVA is very cost-friendly, produces no odor, and light in weight material. But with overuse of it, the cellular structure chang-es and can affect the shoes' quality and insulation properties. In addition to the cellular structure, the air molecules present in it also collapse. This paper focus-es on the bonding properties of EVA at different temperatures and its dielectric properties under different operating and manufacturing conditions. The upper, bottom, and sides of EVA shoes are exposed to high voltage till the breakdown. The experimentation was done at Electrical HV laboratory on the university campus where a 100kV HVAC testing system is available. This paper presents the tabulated results on the dielectric strength of EVA shoes under varying operating conditions. Additionally, it examines the bonding properties of EVA shoes at different manufacturing temperatures, aiming to predict their lifespan, quality, and finish. The results of these studies are thoroughly discussed within the document.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Development of a Context-based Prompt Generation Framework to Enhance Model-Driven Engineering using Retrieval-Augmented Generation with Large Language Models
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Nasika Ijaz, Farooque Azam, Saliha Ejaz, Muhammad Waseem Anwar
Abstract - Anomaly detection in dynamic cybersecurity networks has been a promising problem that has been addressed using Graph Neural Networks (GNNs). Today’s network topologies are too difficult to handle for traditional methods; the topologies are too dynamic and complex. The main contribution of this study is the evaluation of three GNN models, Graph Convolutional Networks (GCNs), Graph Attention Networks (GATs), and RepographGAN, in terms of effectiveness to detect anomalies in dynamic network environments. Conventional anomaly detection techniques such as logistic regression, support vectors machines (SVM) and decision trees are compared against the models. The results demonstrate that RegraphGAN is superior to the other models in terms of accuracy, precision, recall, F1 score, and AUC-ROC, and is thus very effective at identifying anomalies. However, as computing resources are required for it, a compromise between performance and computing resources is found. Despite the lower accuracy of GCN and GAT, these provide more computationally efficient solutions that are appropriate for real time deployment constraints in such resource constrained environments. The findings provide a basis for future research that can optimize scalability and computational efficiency for large scale applications and in the context suggest the use of GNNs for improving cybersecurity systems.
Paper Presenter
avatar for Nasika Ijaz

Nasika Ijaz

Pakistan

Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Enhancing Password Guessing Efficiency: A Partition-Aware TCN Approach Beyond PGTCN
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Aaqib Hakeem, Akshay V, Parthav Mathu, Kotnada Yogesh, Gokul Kannan Sadasivam
Abstract - Passwords remain one of the most widely deployed authentication mechanisms despite well-documented vulnerabilities to guessing attacks. Recent deep learning approaches, including Password Guessing using Temporal Convolutional Networks (PGTCN), have demonstrated that sequence modeling can effectively capture structural regularities in leaked password corpora. However, practical performance often depends not only on model architecture but also on training stability, batching strategy, and decoding configuration. In this work, we investigate a partition-aware training and generation pipeline built around a single Temporal Convolutional Network (TCN). Rather than introducing additional architectural complexity, the proposed framework emphasizes standardized preprocessing, balanced data partitioning for stable batching, optimized training procedures, and large-batch probabilistic decoding. A lightweight buffering layer is incorporated to decouple generation from evaluation and improve throughput without requiring distributed training infrastructure. Experiments on multiple real-world leaked password datasets show consistent, though modest, improvements in match rate compared to the PGTCN baseline under same-site evaluation. The results suggest that careful optimization and pipeline-level design can yield measurable gains in candidate ordering while maintaining reproducibility and implementation simplicity.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Image Forgery Detection Using Convolutional Autoencoder
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Sushant Maji, Sachin B. Jadhav
Abstract - The offline signature validation by means of hand written signature is also a significant consideration in the financial, legal and ad- ministrative authentication systems. However, this is particularly challenging because of the inaccessibility of dynamic data of handwriting such as pen-pressure and stroke-velocity, and small training samples. The paper describes a modified version of Siamese-Transformer model called SigNeura, which is also improved with Synthetic Pen Pressure Map Generation to refine the accuracy of the verification in the few-shot learning. The adaptive thresholding, and utilization of the stroke-width estimation is applied to obtain synthetic pressure maps and fill in the dynamic information of the synthetic grayscale signatures with the static grayscale signatures. The Siamese network is optimized on discriminative embeddings and Transformer encoders are optimized on triplet long range contextual dependencies. The analysis conducted on benchmarking data using experiments demonstrates that SigNeura is a significantly superior approach than conventional CNN and Siamese-based approaches with a high level of accuracy and resistance to skilled forgeries.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Personality Rights–Based Financial Inclusion through ICT: Reconceptualizing Digital Finance as a Rights-Dependent Process
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Siddharth Joshi, Deepti Kiran, Dev Kumar Yadav, Harshit Sinha, Abhishek Kukreti
Abstract - Artificial Intelligence (AI), as a technology, has the potential to change the manner in which organizations are run in the world. However, small and medium-sized enterprises (SMEs) in the Philippines have unique limitations in the use of AI in running the business. The study aims to explore the perceptions of SME managers in the Philippines on the use of AI, with particular reference to the limitations and facilitators in the use of the technology in the business environment. In this study, the researcher interviewed five SME managers from different sectors, including retail, manufacturing, and service sectors. The researcher used thematic analysis to identify the commonalities in the decisions made by the SME managers on the use of AI in the business environment. The study revealed the perceptions of the SME managers on the use of AI in the business environment in the Philippines, with the limitations and facilitators in the use of the technology in the business environment. The study provides practical insights that can guide strategies aimed at strengthening AI readiness and responsible adoption among SMEs in the Philippines.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

3:00pm GMT+07

Privacy Preservation Techniques in Big Datasets: A Comprehensive Review
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Authors - Ambrish Kumar Sharma, Swati Namdev
Abstract - The volume of data is growing gradually in all around by various sec-tors like e-commerce, stock market, medical, banking, education, social networks (Facebook, Twitter, WhatsApp) and also because of the utilization of the internet and mobile apps. Privacy and security have always been important issues with big datasets. Big datasets may be a collection of facts that has huge and multiplex structure like sensors, emails, weblogs and images. Sensitive information about individuals, which is usually evident or hidden in data, is susceptible to various privacy attacks and high risks of privacy disclosure. Constructing a secure and reliable environment for big dataset requires a distinction between existing approaches so that we can develop a unique solution in future for this that maximizes data privacy. This paper offers insights into the overview of big datasets, big dataset privacy problems and various privacy preservation techniques with comparative study used in big datasets.
Paper Presenter
Saturday April 11, 2026 3:00pm - 5:00pm GMT+07
Virtual Room A Bangkok, Thailand

5:00pm GMT+07

Session Chair Concluding Remarks
Saturday April 11, 2026 5:00pm - 5:02pm GMT+07

Invited Guest & Session Chair
avatar for Dr. Chandrakant D. Kokane

Dr. Chandrakant D. Kokane

Associate Professor, Vishwakarma Institute of Technology, India

Saturday April 11, 2026 5:00pm - 5:02pm GMT+07
Virtual Room A Bangkok, Thailand

5:02pm GMT+07

Session Closing and Information To Authors
Saturday April 11, 2026 5:02pm - 5:05pm GMT+07

Moderator
Saturday April 11, 2026 5:02pm - 5:05pm GMT+07
Virtual Room A Bangkok, Thailand
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
  • Inaugural Session
  • Physical Technical Session 1A
  • Physical Technical Session 1B
  • Physical Technical Session 1C
  • Physical Technical Session 1D
  • Physical Technical Session 2A
  • Physical Technical Session 2B
  • Physical Technical Session 2C
  • Physical Technical Session 2D
  • Virtual Room 1A
  • Virtual Room 1B
  • Virtual Room 1C
  • Virtual Room 1D
  • Virtual Room 1E
  • Virtual Room 1F
  • Virtual Room 2A
  • Virtual Room 2B
  • Virtual Room 2C
  • Virtual Room 2D
  • Virtual Room 2E
  • Virtual Room 2F
  • Virtual Room 2G
  • Virtual Room 3A
  • Virtual Room 3B
  • Virtual Room 3C
  • Virtual Room 3D
  • Virtual Room 3E
  • Virtual Room 3F
  • Virtual Room 3G
  • Virtual Room 7A
  • Virtual Room 7B
  • Virtual Room 7C
  • Virtual Room 7D
  • Virtual Room 7E
  • Virtual Room 7F
  • Virtual Room 7G
  • Virtual Room 8A
  • Virtual Room 8B
  • Virtual Room 8C
  • Virtual Room 8D
  • Virtual Room 8E
  • Virtual Room 8F
  • Virtual Room 8G
  • Virtual Room 9A
  • Virtual Room 9B
  • Virtual Room 9C
  • Virtual Room 9D
  • Virtual Room 9E
  • Virtual Room 9F
  • Virtual Room 9G
  • Virtual Room_10A
  • Virtual Room_10B
  • Virtual Room_10C
  • Virtual Room_10D
  • Virtual Room_10E
  • Virtual Room_10F
  • Virtual Room_10G
  • Virtual Room_11A
  • Virtual Room_11B
  • Virtual Room_11C
  • Virtual Room_11D
  • Virtual Room_11E
  • Virtual Room_11F
  • Virtual Room_11G
  • Virtual Room_12A
  • Virtual Room_12B
  • Virtual Room_12C
  • Virtual Room_12D
  • Virtual Room_12E
  • Virtual Room_12F
  • Virtual Room_12G