Conference programme
November 5, 2025 – Day 1: Telecommunications and Networks
| TIME | NAME | TITLE | FORMAT |
| 10:00–10:25 | Maxim Artyushkin | Emerging Computational Paradigms for Antenna Design in the Age of Surrogates and AI | Face-to-Face |
| 10:25–10:50 | Yuriy Lvovich Kim | Rate-Distortion Driven Overfitting of Quality Enhancement Neural Networks for Video Coding | Virtual |
| 10:50–11:15 | Dmitrii Kovalev | QR Decomposition-Based Equalization for OTFS Modulation | Virtual |
| 11:15–11:45 | Coffee Break | ||
| 11:45–12:10 | Andrey Ivanov | Antenna Signal Interpolation for Low-Cost PAPR Reduction | Virtual |
| 12:10–12:35 | Nikola Zlatanov | Complete Covertness in NOMA Using Artificial Noise | Virtual |
| 12:35–13:00 | Danil Rogov | Methodology for Experimental Comparison of Redundancy for QUIC and TCP Protocols | Virtual |
| 13:00–13:25 | Bhoomika Hiremath | Dual Band Dual Port Compact MIMO Antenna for Millimeter Wave Communication | Virtual |
| 13:25–14:10 | Lunch | ||
| 14:10–14:35 | Anna Zhivtsova | Optimizing Delays in Random Access Procedure of DECT-2020 by Estimation of Device States | Face-to-Face |
| 14:35–15:00 - | Ilya Petrovanov | The Transport Coding Model for Delay Reduction in Communication Networks using OMNET++ Toolkit | Face-to-Face |
| 15:00 - 15:25 | Ivan Baksheev | Enumerative Constrained Coding in Two and Three Dimensions | Virtual |
| 15:25 - 16:50 | Karam Салим Mahfod | Inter-frame and Inter-view Quality Enhancement in Distributed Multi-view Video Coding | Virtual |
| 16:50 - 17:15 | Pavel Matrenin | ΛI-Architecture: A Software Design Model Demonstrated on the Example of an Electrical Equipment Diagnostic System | Virtual |
| 17:15 - 17:40 | Yuri Kim | Complexity Reduction of Neural Lossless Data Compression via Cascade Probability Modeling | Virtual |
November 6, 2025 – Day 2: Security, Blockchain, and Control Systems
| TIME | NAME | TITLE | FORMAT |
| 10:00–10:25 | Mirkhon Nurullaev | Adaptive Aggregation for Distributed Industrial Control Systems Anomaly Detection | Virtual |
| 10:25–10:50 | Anna Melman | On the Use of Metaheuristics of Different Classes and an Island Model for Image Steganography | Virtual |
| 10:50–11:15 | Dmitry Tanana | Performance Analysis of Common Browser Extensions for Cryptojacking Detection | Virtual |
| 11:15–11:45 | Coffee Break | ||
| 11:45–12:10 | Yury Yanovich | Blockchain Throughput Optimization under Computational Constraints: Bayesian Optimization Study on Acquisition Functions | Face-to-Face |
| 12:10–12:35 | Ekaterina Pavlova | Scheduler Shall Not Fail: Lightweight, On-Chain Provenance for Bias-Resistant Federated Learning | Face-to-Face |
| 12:35–13:00 | Artyom Kuninets | Riemann–Roch Bases for Arbitrary Elliptic Curve Divisors and Their Application in Cryptography | Face-to-Face |
| 13:00–13:25 | George Nikitin | Core Concepts of Authentication in Satellite Communication Networks: Classical Methods vs. Blockchain Approaches | Face-to-Face |
| 13:25–13:50 | Vjacheslav Zhuravlev | Development of generators with added entropy creating random number generators that generate Borel normal sequences | |
| 13:50–14:30 | Lunch |
November 7, 2025 – Day 3: Coding Theory
| TIME | NAME | TITLE | FORMAT |
| 10:00–10:25 | Vjacheslav Zhuravlev | Development of generators with added entropy creating random number generators that generate Borel normal sequences | Virtual |
| 10:25–10:50 | Berkan Dulek | Linear MMSE Estimation Leads to Information Inequality: An Elementary Proof for the Vector Parameter Case | Face-to-Face |
| 10:50–11:15 | Sergei Fedorenko | The Polynomial-Based Method for the Discrete Fourier Transform Computation over Finite Fields | Face-to-Face |
| 11:15–11:45 | Coffee Break | ||
| 11:45–12:10 | Ivan Mogilnykh | Codes from Layers of Hamming Graphs | Virtual |
| 12:10–12:35 | Tulasi Sowjanya Barika | A Hypergraph-Based Lower Bound on Pliable Index Coding Based on Nested Side-Information Sets | Virtual |
| 12:35–13:00 | Vladimir Morozov | Sampling Rate Optimization for LDPC-Based Information Reconciliation Protocol in QKD | Face-to-Face |
| 13:00–13:25 | Alina Veresova | Construction of LDPC Codes for Single Bursts Correction by Masking | Virtual |
| 13:25–14:10 | Lunch | ||
| 14:10–14:35 | Vladimir Kuzmin | On the Correcting Capability of Hard-Decision Error-and-Erasure Iterative Decoding of LDPC Codes for Data Storage | Face-to-Face |
| 14:35–15:00 | Sergey Portnoy | Design and Performance Analysis of Flexible Concatenated Codes for Secure Transmission | Virtual |
| 15:00–15:25 | Fedor Ivanov | Decoding of Generalized LDPC Codes Using the BCJR Algorithm | Face-to-Face |
| 15:25–15:50 | Grigory Kabatiansky | Analysis of One Chain of McEliece System’s Modifications | Face-to-Face |
| 15:50 - 16:15 | YESHEWAS GETACHEW LULU | Authorship Attribution in Amharic Language Literature using the Ryabko-Savina method | Virtual |