04 - 05 February, 2026 | Erbil, Iraq
Venue: Google Platform | Main Hall Time: 10:00 am - 12:00 pm (Iraq Zone)
| Time | Event | Details |
|---|---|---|
| 10:00 - 10:15 | Opening Ceremony | Registration, National Anthem, Enjaz Society Remarks |
| 10:15 - 10:40 | Keynote Speech I | Effectiveness of AI in Learning Prof. Badrul Khan, McWeadon Education, USA |
| 10:45 - 11:10 | Keynote Speech II | The Impact of AI on Enhancing Institutional Work Prof. Dr. Muzhir Shaban Al-Ani, Union of Arab Statisticians, Jordan |
| 11:10 - 11:40 | Keynote Speech III | Cybersecurity as the Guardian of Scientific Research Asst. Prof. Dr. Wasan Adnan Hashim, Al-Qalam University, Iraq |
| 11:40 - 12:00 | Q&A Session | |
Time: 12:00 - 02:15 pm | Papers: 9
| Time | Paper ID | Title |
|---|---|---|
| 12:00-12:15 | ICCES-47 | A Lightweight Multi-Stream Baseline for Multi-Label ECG |
| 12:15-12:30 | ICCES-39 | An Integrated Information Technology Framework for Smart Farming |
| 12:30-12:45 | ICCES-54 | Enhancing Solar Irradiance and Power Forecasting Through Rolling-Window Validation and SHAP-Based Explainability |
| 12:45-1:00 | ICCES-62 | Parkinson's Illness Identification Based on Decision Support System Using EEG Signals |
| 01:00-01:15 | ICCES-42 | A Hybrid PHP–Flask Architecture for Academic Data Collection, Analysis, and Sustainable Development Reporting |
| 01:15-01:30 | ICCES-30 | Analysis Systems of Information Security in Institutions |
| 01:30-01:45 | ICCES-43 | Digital Integrity and the Barrier of Anxiety |
| 01:45-02:00 | ICCES-29 | Modeling and Interpreting Momentum and Liquidity Factors in the Iraqi Stock Market |
| 02:00-02:15 | ICCES-68 | The Effect of the Degree of Corporate Governance Commitment on the Association between Financial Reporting Opacity and Audit Fees |
Time: 12:00 - 03:15 pm | Papers: 13
| Time | Paper ID | Title |
|---|---|---|
| 12:00-12:15 | ICCES-18 | A Generate-then-Translate Framework for High-Fidelity Arabic Image Captioning |
| 12:15-12:30 | ICCES-81 | A Stochastic Predictive Control Framework for Photovoltaic Maximization |
| 12:30-12:45 | ICCES-66 | A Survey on Hybrid GAN-Transformer Models for Image Forgery Detection |
| 12:45-1:00 | ICCES-27 | BeyondConvolutionsYOLOv8withDRFFBasedChannel_Mixingfor Enhanced Drone Detection |
| 01:00-01:15 | ICCES-36 | Bladder Cancer Detection Using Vision Transformer A Survey |
| 01:15-01:30 | ICCES-19 | Bootstrap-Based Estimation of Confidence Intervals for Taguchi Loss Function |
| 01:30-01:45 | ICCES-25 | Comparative Evaluation of FCM, K-Means, and GMM for Brain MRI Segmentation |
| 01:45-02:00 | ICCES-49 | Context-Aware Intelligent Data Integration Approach A practical Hybrid Retrieval Agent |
| 02:00-02:15 | ICCES-41 | Enhancing Iris Recognition System Based on A Pre-Segmentation Step |
| 02:15-02:30 | ICCES-35 | Explainable Federated Learning for Privacy Preserving Type-2 Diabetes Prediction |
| 02:30-02:45 | ICCES-17 | Hybrid Transform-Based Image Compression: A Comprehensive Review |
| 02:45-03:00 | ICCES-22 | Recent Advances in Breast Cancer Diagnosis Using Histopathology and Hyperspectral Imaging |
| 03:00-03:15 | ICCES-63 | Review of Lossy Grayscale Image Compression using Spatial Pixel Based Techniques |
Time: 12:00 - 03:00 pm | Papers: 12
| Time | Paper ID | Title |
|---|---|---|
| 12:00-12:15 | ICCES-57 | A Hybrid Model for Missile Detection Using YOLOv8 and Machine Learning Enhancement |
| 12:15-12:30 | ICCES-58 | A Metaheuristic-Based Stacking Ensemble Learning Framework for JPEG Steganalysis |
| 12:30-12:45 | ICCES-50 | A Review of Recent Advances in Channel State Information Based Multi-User Sensing Using Deep Learning |
| 12:45-1:00 | ICCES-28 | An Enhancement For Promotion Application Using Machine-Learning |
| 01:00-01:15 | ICCES-45 | Development of Design fuzzy logic hierarchy structure by Using Decision Tree Algorithm |
| 01:15-01:30 | ICCES-51 | Literature Survey Deep Reinforcement Learning-Based Optimization for Dynamic Resource Allocation in 5G Mobile Networks |
| 01:30-01:45 | ICCES-78 | PhysioBridge Physiology-Constrained Self-Supervised Foundation Model for Cross-Device ECG–PPG Learning with Conformal Risk Control |
| 01:45-02:00 | ICCES-14 | Routing Multipath for Multiple Objects by Utilizing Genetic Algorithm |
| 02:00-02:15 | ICCES-31 | Stacking Machine Learning with Enhanced Preprocessing Techniques for Oil Well Production Forecasting |
| 02:15-02:30 | ICCES-16 | Compact Dual-Band CP-MIMO Antenna for 5G Laptops Enabling IoT Edge Connectivity |
| 02:30-02:45 | ICCES-72 | DSESA-DL: Dynamic Smart Energy Scheduling Approach in Edge - Cloud computing Platforms |
| 02:45-03:00 | ICCES-20 | Performance Analysis of Precoding with Adaptive Modulation based OFDM schemes in Visible Light communication |
Time: 10:00 - 11:30 am | Papers: 6
| Time | Paper ID | Title |
|---|---|---|
| 10:00-10:15 | ICCES-33 | A Systematic Review on the Use of Artificial Intelligence for Drug Addiction Classification and Prediction |
| 10:15-10:30 | ICCES-59 | AI-Driven Framework for Early Diabetes Prediction |
| 10:30-10:45 | ICCES-33 | Classification of Social Media Addiction in Adolescents Using Artificial Intelligence A Systematic Review |
| 10:45-11:00 | ICCES-74 | Design of an IoT-Enabled Smart Prosthetic Foot with Near Real-Time VR Feedback and Mobile Monitoring |
| 11:00-11:15 | ICCES-75 | Improving the Circuit Realization of Grover's Quantum Search Algorithm by Replacing Hadamard with √(X ) Gates |
| 11:15-11:30 | ICCES-23 | The Role of Digital Intelligence Strategy in Achieving Organizational Prosperity An analytical study of the opinions of a sample of employees at Warith Al-Anbia University |
Time: 10:00 - 01:15 pm | Papers: 13
| Time | Paper ID | Title |
|---|---|---|
| 10:00-10:15 | ICCES-55 | A Critical Theoretical Comparison of DoS and DDoS Attacks Detection and Defense Perspectives |
| 10:15-10:30 | ICCES-56 | A Holistic Survey on DDoS Attack Detection and Mitigation in Software-Defined Networking From Conventional Approaches to Intelligent Frameworks |
| 10:30-10:45 | ICCES-30 | A Review of Innovative Strategies for Mitigating Last-Mile Aggregation Attacks Utilizing Artificial Intelligence |
| 10:45-11:00 | ICCES-52 | AISDVF A System Model for Security Enhancement in VANETs |
| 11:00-11:15 | ICCES-24 | Comparing Some Algorithms for Encryption and Decryption Audio Files |
| 11:15-11:30 | ICCES-82 | Design And Implementation of a Novel Framework for Selecting the Cryptographic Algorithms with Artificial Intelligence Techniques to Enhance the Optimal Security in Network |
| 11:30-11:45 | ICCES-44 | Digital Security Awareness and its Impact on the Sustainability of Digital Marketing Operations: A Field Study on the OpenSooq Platform in Iraq |
| 11:45-12:00 | ICCES-40 | Efficient audio Steganography based on Discrete Cosine Transform and Least Significant Bit Technique |
| 12:00-12:15 | ICCES-15 | Hybrid LSTM-Decision Tree Model for Enhanced Attack Prediction in Fog Computing Environments |
| 12:15-12:30 | ICCES-65 | Hybrid Mobile Threat Analytics Boosting Android Malware Classification via Integrated Static-Dynamic Sandboxing |
| 12:30-12:45 | ICCES-71 | Improve blockchain security Environment based on visual cryptography techniques |
| 12:45-1:00 | ICCES-26 | Improving VPN Security Using FFNN-Based Cybersecurity Models |
| 1:00-1:15 | ICCES-27 | Malware and Cyber Attack Analysis Using Machine Learning A survey |
President and Founder, McWeadon Education, USA
Title: Effectiveness of AI in Learning
Badrul Khan's octagonal E-Learning framework reveals AI's multifaceted effectiveness in education, from personalized pedagogy to ethical governance. While AI drives innovation in adaptive learning and administrative efficiency, its success hinges on balancing technological capabilities with institutional readiness and ethical safeguards.Read Full Bio →
Assistant Secretary-General, Union of Arab Statisticians, Jordan
Title: The Impact of AI on Enhancing Institutional Work
This session discusses the concepts of artificial intelligence, how to employ it in institutional work, the expected benefits, and the challenges facing this work. It includes establishing high-quality data centers and protecting them from hacking, focusing on cooperation in the field of transferring and exchanging knowledge and expertise.Read Full Bio →
Al-Qalam University, Iraq
Title: Cybersecurity as the Guardian of Scientific Research
This presentation highlights the role of cybersecurity as the guardian of scientific research. It examines potential vulnerabilities in cloud platforms, collaborative networks, and AI-assisted processes, while proposing strategies such as encryption, access control, secure data management, and ethical AI practices.Bio Not Available