Skip to content

Commit a3d8548

Browse files
author
aleksandrsokolov
committed
updates
1 parent 631d652 commit a3d8548

File tree

7 files changed

+77
-76
lines changed

7 files changed

+77
-76
lines changed

data/deadlines.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@
1818
"date": "10.07.2025"
1919
},{
2020
"event": "Fee payment deadline",
21-
"oldDate": "01.08.2025",
22-
"date": "15.09.2025"
21+
"oldDate": "15.09.2025",
22+
"date": "19.09.2025"
2323
}, {
2424
"event": "Conference in Moscow",
2525
"important": true,

data/papers_cached.json

Lines changed: 38 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,7 @@
3636
"title": "A New Class of Codes with Error Localization: on improvement of decoding algorithms",
3737
"abstract": "This paper explores a novel reinterpretation of well-established cascade and generalized cascade coding structures, resulting in the development of a fundamentally new class of error localization codes (ELCs). The proposed constructon introduces a third constituent code responsible for localizing errors, which enables effective decoding with reduced complexity and improved performance. Three variations of the coding scheme are presented, including constructions with different outer code lengths and decoding strategies. Simulation results demonstrate that the proposed ELCs achieve near-maximum-likelihood performance while maintaining manageable decoding complexity. In particular, the use of short block codes and structured erasure patterns significantly improves the trade-off between reliability and computational efficiency. The paper concludes with a comparative analysis against polar and Reed\u2013Muller codes and outlines promising directions for further research, including soft decoding strategies, joint coding-modulation schemes, and enhancements to inner code robustness.",
3838
"authors": [
39-
"Nikita Klyuev",
40-
"Andrey Voloshin",
41-
"Sergey Portnoy",
42-
"Sergey Nikitin"
39+
"Victor Zyablov", "Sergey Portnoy", "Sergey Nikitin", "Andrey Voloshin", "Nikita Klyuev"
4340
]
4441
},
4542
{
@@ -112,7 +109,7 @@
112109
"title": "Routing in LEO Mega-Constellations with Dynamic Inter-Satellite Link Delays",
113110
"abstract": "This paper addresses the routing problem in a Low Earth Orbit (LEO) satellite constellation considering known delays on inter-satellite links. Two novel routing algorithms are proposed to minimize latency between any pair of satellites: a modified Dijkstra algorithm and a dynamic programming-based\r\nalgorithm. Experiments have shown that the dynamic programming-based algorithm is optimal in terms of computational complexity.",
114111
"authors": [
115-
"Ruslan Smelyanskiy"
112+
"M. V. Tiushev", "R. L. Smelyansky"
116113
]
117114
},
118115
{
@@ -190,13 +187,13 @@
190187
]
191188
},
192189
{
193-
"id": 3300,
194-
"title": "Detection of coronary artery stenosis using artificial intelligence methods",
195-
"abstract": "Coronary heart disease is a common cardiovascular disease, which is one of\r\n the causes of high mortality in the population. Accurate and timely diagnosis\r\n is crucial for treatment. In this study, a new algorithm for detecting coronary\r\n stenosis of the heart vessels was developed based on the YOLO8m detection\r\n model. A set of X\u2013ray images obtained by selection from video sequences\r\n of the results of performed angiography of the cardiac vessels was used to\r\n train the model. The proposed model demonstrated excellent processing speed\r\n and detection accuracy and achieved F1\u2013score detection accuracy of 98% and\r\n mAP=98.3%, surpassing a number of known results obtained by other researchers.\r\n The proposed stenosis detection algorithm represents a significant achievement\r\n in the field of cardiovascular imaging and computer image processing algorithms.",
190+
"id": 3357,
191+
"title": "Graph-based Model and Practical Algorithm for Combating Cyberattack Threats in DCCN",
192+
"abstract": "Popular open-source frameworks are used today to combat attack threats in DCCNs automatically. However, they cannot visualize logical conditions in the representation of network protocol vulnerabilities in attacks such as ARP poisoning, DNS spoofing, and SYN flooding, and they do not support advanced types of communication such as wireless, vehicle, and tethering communications on networks. To cope with the above shortcomings, we present an AND/OR attack graph-based security model for the DCCNs able to model multiple attack types (e.g., spoofing, man-in-the-middle, among many others). A novel efficient algorithm is suggested to extract the most vulnerable attack paths from AND/OR attack graphs. Unlike previous heuristic pathfinding algorithms, the proposed algorithm works in polynomial time and efficiently handles the cycles of positive length. We demonstrate the efficiency of the proposed model and a novel algorithm on a testbed implementing a network architecture comprising IT and industrial components.",
196193
"authors": [
197-
"Eugene Yu. Shchetinin",
198-
"Leonid Sevastianov",
199-
"Anastasiia Tiutiunnik"
194+
"Eugene (Evgeni) Levner",
195+
"Dmitry Tsadikovich",
196+
"Vladimir Vishnevsky"
200197
]
201198
},
202199
{
@@ -272,6 +269,16 @@
272269
"Denis Leibman"
273270
]
274271
},
272+
{
273+
"id": 3324,
274+
"title": "A Production Inventory System with N-Policy and Enhanced Production Rate",
275+
"abstract": "This paper investigates the role of N-policy in an (s, S) production inventory\r\nsystem with positive service times. Customer arrivals follow a Poisson Process,\r\nwhile service times and production rates are exponentially distributed. The\r\nservice mechanism operates under an N-policy, and to enhance production\r\nefficiency, the production rate increases when the number of customers exceeds\r\nN \u2212 1 and the inventory level falls below min{N, s}. The system is analyzed\r\nusing the Matrix Geometric method, and a necessary and sufficient condition\r\nfor system stability is established. Key performance measures are derived, and\r\na suitable cost function is developed to evaluate system efficiency.",
276+
"authors": [
277+
"Thresiamma N J",
278+
"Salini S Nair",
279+
"Jose K. P."
280+
]
281+
},
275282
{
276283
"id": 3330,
277284
"title": "Queueing Model of a Cell Operation with Retrials and State-Dependent Rate of Requests",
@@ -361,6 +368,7 @@
361368
"title": "\u0410\u0441\u0438\u043c\u043f\u0442\u043e\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0431\u0435\u0441\u043a\u043e\u043d\u0435\u0447\u043d\u043e\u043b\u0438\u043d\u0435\u0439\u043d\u043e\u0439 \u0433\u0435\u0442\u0435\u0440\u043e\u0433\u0435\u043d\u043d\u043e\u0439 \u0421\u041c\u041e \u043f\u0440\u0438 \u0443\u0441\u043b\u043e\u0432\u0438\u0438 \u0440\u0435\u0434\u043a\u0438\u0445 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0439 \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u044b",
362369
"abstract": "\u0412 \u0440\u0430\u0431\u043e\u0442\u0435 \u0440\u0430\u0441\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0433\u0435\u0442\u0435\u0440\u043e\u0433\u0435\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0433\u043e \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u0441 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0447\u0438\u0441\u043b\u043e\u043c \u043a\u0430\u043d\u0430\u043b\u043e\u0432, \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u044e\u0442\u0441\u044f \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u043e\u0439. \u041e\u0442\u043b\u0438\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u044c\u044e \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0442\u043e, \u0447\u0442\u043e \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u044d\u043a\u0441\u043f\u043e\u043d\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0437\u0430\u044f\u0432\u043a\u0438 \u043d\u0435 \u043c\u0435\u043d\u044f\u044e\u0442 \u0441\u0432\u043e\u0438 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u043e\u043a\u043e\u043d\u0447\u0430\u043d\u0438\u044f \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u044f. \u0422\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u043f\u0440\u0438\u0431\u043e\u0440\u044b \u0432 \u0440\u0430\u0441\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0433\u0435\u0442\u0435\u0440\u043e\u0433\u0435\u043d\u043d\u044b\u043c\u0438.\r\n\u0414\u043b\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u043c\u0435\u0442\u043e\u0434 \u0430\u0441\u0438\u043c\u043f\u0442\u043e\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0432 \u0443\u0441\u043b\u043e\u0432\u0438\u0438 \u043f\u0440\u0435\u0434\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u0434\u043a\u0438\u0445 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0439 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0439 \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u044b",
363370
"authors": [
371+
"A. Tarasenko",
364372
"Svetlana Moiseeva",
365373
"Evgeny Polin"
366374
]
@@ -380,6 +388,7 @@
380388
"title": "Performance Analysis of High-altitute Plateforms using Mutli-server Retrial Queues",
381389
"abstract": "High-Altitude Platforms (HAPs) are an emerging class of stratospheric systems designed to provide telecommunications and other services from altitudes typically between 17 km and 25 km.\r\nHAPs can act as communication relays, connecting mobile networks to core networks. \r\n\r\nIn this study, we propose a two-class multi-server retrial queueing model to represent the behavior of HAPs. We analyze the probability that the system's customer population surpasses a large threshold and examine the conditions necessary for the model's stability.",
382390
"authors": [
391+
"Raina Raj",
383392
"Ksenia Zhukova",
384393
"Ruslana Nekrasova",
385394
"Dharmaraja Selvamuthu"
@@ -448,6 +457,7 @@
448457
"Elizaveta Golos",
449458
"Irina Yartseva",
450459
"Yuliya Gaidamaka",
460+
"Elizaveta Gaidamaka",
451461
"Konstantin Samouylov"
452462
]
453463
},
@@ -476,7 +486,8 @@
476486
"abstract": "Tethered unmanned aerial platforms (tUAVs) possess significant advantages over autonomous drones, primarily due to their capability for prolonged continuous operation, making them suitable for diverse applications. Ensuring the reliability of such platforms is paramount, particularly in scenarios where satellite navigation signals are degraded. This study investigates a laser-based local navigation system (LNS) as a novel solution. This study investigates the reliability of such a LNS for tUAVs using risk tree construction and analysis methodology.",
477487
"authors": [
478488
"Nika Ivanova",
479-
"Nikita Kalmykov"
489+
"Nikita Kalmykov",
490+
"Vladimir Vishnevsky"
480491
]
481492
},
482493
{
@@ -580,13 +591,24 @@
580591
"Yaroslav Zotov"
581592
]
582593
},
594+
{
595+
"id": 3300,
596+
"title": "Detection of coronary artery stenosis using artificial intelligence methods",
597+
"abstract": "Coronary heart disease is a common cardiovascular disease, which is one of\r\n the causes of high mortality in the population. Accurate and timely diagnosis\r\n is crucial for treatment. In this study, a new algorithm for detecting coronary\r\n stenosis of the heart vessels was developed based on the YOLO8m detection\r\n model. A set of X\u2013ray images obtained by selection from video sequences\r\n of the results of performed angiography of the cardiac vessels was used to\r\n train the model. The proposed model demonstrated excellent processing speed\r\n and detection accuracy and achieved F1\u2013score detection accuracy of 98% and\r\n mAP=98.3%, surpassing a number of known results obtained by other researchers.\r\n The proposed stenosis detection algorithm represents a significant achievement\r\n in the field of cardiovascular imaging and computer image processing algorithms.",
598+
"authors": [
599+
"Eugene Yu. Shchetinin",
600+
"Leonid Sevastianov",
601+
"Anastasiia Tiutiunnik"
602+
]
603+
},
583604
{
584605
"id": 3604,
585606
"title": "One Approach on Improved Communication Secrecy",
586607
"abstract": "We enhance wireless communication secrecy by embedding a novel fixed-weight masking layer into algebraic error-correcting codes, forcing any eavesdropper to solve a Nearest Codeword Problem with high-weight error while legal receivers remove the mask with a single XOR. We follow a formal channel model that distinguishes legal users from adversaries and show that the fixed-weight mask preserves structural secrecy even against passive eavesdropper attack. Closed-form equivocation bounds are derived. We define and prove the upper bound of the attacker's success probability. Our research confirms negligible secrecy-capacity loss and sub-\u00b5s encoding latency as well as DoS attack protection due to the nature of the design.",
587608
"authors": [
588609
"Andrey Tikhonyuk",
589-
"Sergey Portnoy"
610+
"Sergey Portnoy",
611+
"Victor Zyablov"
590612
]
591613
},
592614
{
@@ -658,9 +680,9 @@
658680
"title": "Dynamic Warehouse Workflow Optimization via Reinforcement Learning: Integrating Q-Learning and Priority-Based Routing",
659681
"abstract": "This paper presents the development of a workflow optimization algorithm for warehouse environments, based on reinforcement learning techniques. The objective is to improve the efficiency of operations such as order picking, routing, and storage by allowing the system to learn optimal strategies through interaction with its environment. This approach utilizes reward-based learning to dynamically adapt to variations in demand, warehouse layout, and resource availability. Experimental results demonstrate significant improvements in throughput and resource utilization compared to traditional heuristic methods, highlighting the potential of reinforcement learning for intelligent and adaptive warehouse management systems.",
660682
"authors": [
661-
"Bienvenue N'dah MOUALE MOUTOUAMA",
662-
"Hector Gibson Kinmanhon Houankpo",
663-
"Dmitry Kozyrev"
683+
"MoualeB.M.N.", "Hector Gibson Kinmanhon Houankpo", "Soro M.", "Dmitry Kozyrev"
684+
685+
664686
]
665687
}
666688
]

data/plenary/krishnamoorthy.md

Lines changed: 11 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,13 @@
11
---
2-
title: "SOME LARGE DEVIATION RESULTS IN REAL LIFE WITH SPECIAL REFERENCE TO QUEUES AND QUEUEING-INVENTORY"
2+
title: "On Queues with Working Breakdown and Interdependence Between Arrival and Service Processes"
33
---
4-
We consider an $G/M/1$ - type queue where inter-arrival times have general distribution, depending on the type of arrival.
5-
Three types of customers arrive to the system.
6-
The first type is genuine customer, second mild destructive (negative customer) which throws out the customer in service but adds nothing and the third one is the most destructive which wipes out all customers from the system. $p_i$ is the probability that the type $i$, $(i = 1, 2, 3)$ customer arrives.
7-
The distribution of the inter-occurrence time of arrivals is generally distributed with $G(.)$ as the distribution function.
8-
Thus $G_i(t)$ is the probability that an arrival takes place and it is of type i where $G_i(t) = p_i G(t)$.
9-
Service time of genuine customers follows exponential distribution.
10-
This system is analysed as a G/M1- type queue which can easily be seen as stable.
11-
12-
Next, we introduce correlated arrival process in the above.
13-
Arrival process is MMAP with representation $(D_0, D-1, D_2, D_3)$.
14-
$D_0$ contains rates of transitions without arrival; its diagonal entries are non-positive and off-diagonal entries, non-negative; $D_1$ has transitions rates of arriving genuine customers; $D_2$, that for negative customers which is not highly destructive and $D_3$, that of the most destructive customers.
15-
Here also $p_i$ stands for the probability of an arrival of type $i$.
16-
This system is always stable.
17-
This system is analysed to find the long run distribution of the system state.
18-
Performance characteristics of the system are also investigated.
4+
In this talk, we consider a single server queueing system with working breakdown.
5+
The arrival and service processes evolve through transitions on the product space of two Markov chains.
6+
Thus the arrival and service processes are interdependent.
7+
The transitions in the product space are governed by a semi-Markov rule with sojourn times in states exponentially distributed.
8+
Server failure occurs according to a Poisson process with rate gamma γ.
9+
The repair time of the server follows exponential distribution with parameter beta β .
10+
During the working breakdown, the server continues serving the customers, but at a low rate.
11+
Simultaneously repair of the server is done. When the repair is completed, the server resumes normal service.
12+
We analyse this model using the matrix geometric method.
13+
Numerical illustrations are provided.

0 commit comments

Comments
 (0)