Conference programme

 

November 5, 2025 – Day 1: Telecommunications and Networks

TIME NAME TITLE FORMAT
10:00–10:25 Maxim Artyushkin Emerging Computational Paradigms for Antenna Design in the Age of Surrogates and AI Face-to-Face
10:25–10:50 Yuriy Lvovich Kim Rate-Distortion Driven Overfitting of Quality Enhancement Neural Networks for Video Coding Virtual
10:50–11:15 Dmitrii Kovalev QR Decomposition-Based Equalization for OTFS Modulation Virtual
11:15–11:45   Coffee Break  
11:45–12:10 Andrey Ivanov Antenna Signal Interpolation for Low-Cost PAPR Reduction Virtual
12:10–12:35 Nikola Zlatanov Complete Covertness in NOMA Using Artificial Noise Virtual
12:35–13:00 Danil Rogov Methodology for Experimental Comparison of Redundancy for QUIC and TCP Protocols Virtual
13:00–13:25 Bhoomika Hiremath Dual Band Dual Port Compact MIMO Antenna for Millimeter Wave Communication Virtual
13:25–14:10   Lunch  
14:10–14:35 Anna Zhivtsova Optimizing Delays in Random Access Procedure of DECT-2020 by Estimation of Device States Face-to-Face
14:35–15:00 -  Ilya Petrovanov The Transport Coding Model for Delay Reduction in Communication Networks using OMNET++ Toolkit Face-to-Face
15:00 - 15:25 Ivan Baksheev Enumerative Constrained Coding in Two and Three Dimensions  Virtual
15:25 - 16:50 Karam Салим Mahfod Inter-frame and Inter-view Quality Enhancement in Distributed Multi-view Video Coding Virtual
16:50 - 17:15 Pavel Matrenin ΛI-Architecture: A Software Design Model Demonstrated on the Example of an Electrical Equipment Diagnostic System Virtual
17:15 - 17:40 Yuri Kim Complexity Reduction of Neural Lossless Data Compression via Cascade Probability Modeling Virtual

 

November 6, 2025 – Day 2: Security, Blockchain, and Control Systems

TIME NAME TITLE FORMAT
10:00–10:25 Mirkhon Nurullaev Adaptive Aggregation for Distributed Industrial Control Systems Anomaly Detection Virtual
10:25–10:50 Anna Melman On the Use of Metaheuristics of Different Classes and an Island Model for Image Steganography Virtual
10:50–11:15 Dmitry Tanana Performance Analysis of Common Browser Extensions for Cryptojacking Detection Virtual
11:15–11:45   Coffee Break  
11:45–12:10 Yury Yanovich Blockchain Throughput Optimization under Computational Constraints: Bayesian Optimization Study on Acquisition Functions Face-to-Face
12:10–12:35 Ekaterina Pavlova Scheduler Shall Not Fail: Lightweight, On-Chain Provenance for Bias-Resistant Federated Learning Face-to-Face
12:35–13:00 Artyom Kuninets Riemann–Roch Bases for Arbitrary Elliptic Curve Divisors and Their Application in Cryptography Face-to-Face
13:00–13:25 George Nikitin Core Concepts of Authentication in Satellite Communication Networks: Classical Methods vs. Blockchain Approaches Face-to-Face
13:25–13:50 Vjacheslav Zhuravlev Development of generators with added entropy creating random number generators that generate Borel normal sequences  
13:50–14:30   Lunch  

 

November 7, 2025 – Day 3: Coding Theory

TIME NAME TITLE FORMAT
10:00–10:25 Vjacheslav Zhuravlev Development of generators with added entropy creating random number generators that generate Borel normal sequences Virtual
10:25–10:50 Berkan Dulek Linear MMSE Estimation Leads to Information Inequality: An Elementary Proof for the Vector Parameter Case Face-to-Face
10:50–11:15 Sergei Fedorenko The Polynomial-Based Method for the Discrete Fourier Transform Computation over Finite Fields Face-to-Face
11:15–11:45   Coffee Break  
11:45–12:10 Ivan Mogilnykh Codes from Layers of Hamming Graphs Virtual
12:10–12:35 Tulasi Sowjanya Barika A Hypergraph-Based Lower Bound on Pliable Index Coding Based on Nested Side-Information Sets Virtual
12:35–13:00 Vladimir Morozov Sampling Rate Optimization for LDPC-Based Information Reconciliation Protocol in QKD Face-to-Face
13:00–13:25 Alina Veresova Construction of LDPC Codes for Single Bursts Correction by Masking Virtual
13:25–14:10   Lunch  
14:10–14:35 Vladimir Kuzmin On the Correcting Capability of Hard-Decision Error-and-Erasure Iterative Decoding of LDPC Codes for Data Storage Face-to-Face
14:35–15:00 Sergey Portnoy Design and Performance Analysis of Flexible Concatenated Codes for Secure Transmission Virtual
15:00–15:25 Fedor Ivanov Decoding of Generalized LDPC Codes Using the BCJR Algorithm Face-to-Face
15:25–15:50 Grigory Kabatiansky Analysis of One Chain of McEliece System’s Modifications Face-to-Face
15:50 - 16:15 YESHEWAS GETACHEW LULU Authorship Attribution in Amharic Language Literature using the Ryabko-Savina method Virtual