The Tomsk-IEEE Seminar "The Intellectual Systems of Modeling, Design and Control"

**February 19, 2011**

1. N.S. Mikhailov, "Platform for Development of the Protected Electronic Legally Significant Document System Based on the Thin Client".

2. O.A. Nesterova, "Technologies, Models, and Algorithms of Search in Archives of Medical Data with Use of Contextually-Time Ontology".

**March 5, 2011**

1. S.G. Kataev, "Mathematical Methods and Numerical Algorithms of the Structure Analysis of the Geophysical Data".

2. V.G. Mironova, "Software and Technique of the Security Model for the Nuclear Industry Units".

**March 19, 2011**

1. I.A. Sycheva, "Models and Algorithms of Unsearching Self-Adjustments Control System with the Fixed Parametres of the Adaptive Regulators".

2. O.O Yevsyutin, "Algorithms of the Cellular Automatic Dynamics in Problems of Information Transformations".

**March 26, 2011**

1. A.V. Eryomenko, "Increase Reliability of Identification of PC Users on Dynamics of Password Writing".

2. V.G. Mironova, "Software and Technique of the Security Model for the Nuclear Industry Units".

**April 9, 2011**

1. R.R. Lopatin, "Control of Lowered Electro-Centrifugal Oil Pump in the Wedge Modes".

2. L.L. Egorov, "Practices and Programs for Calculation of the Optimum Zones of the Base Stations of Cellular Communication Networks".

**April 23, 2011**

1. O.V. Vasileva, "The Numerical and Analog Modeling of the Electromagnetic Fields and Electrical Devices with Coaxial Electrode System Based on the Electrical Equivalent Circuits".

2. S.Yu. Iskhakov, "Models and the Algorithmic Support of the Estimation of Functioning of Health Services Network".

**April 30, 2011**

1. E.V. Gorev, "Software and Algorithms of Extrapolation of Meteorological Fields in Mesoscale".

2. S.D. Tiunov, "The Estimation Methods of Affinity of Pronouncing the Another Language Allophones to the Language Standard of Phonemes".

3. E.A. Moshnikov, "The Optimum Choice of Means for the Information Protection".

**September 17, 2011**

1. L.L. Egorov, "Algorithms and Software for Calculation of the Optimum Zones of the Base Stations of Cellular Communication Networks".

2. A.V. Ponizov, "Automation of Examination of Human Hearing Aid by Desing a New Electro-Acoustic Device".

**October 8, 2011**

O.O.Yevsyutin, "Algoritms of Dynamics of the Cellular Automats in the Transformation Information Problems".

**October 22, 2011**

1. P.A. Dudin, "Hybrid Algorithms of the Ant Colony for Identification of Parametres of Fuzzy Systems".

2. S.Yu. Iskhakov, "Models and Algorithmic Maintenance of Estimation of Functioning the Health Service Network".

**October 29, 2011**

1. D.V. Chernykh, "Mathematical and Algorithmic Maintenance of the Voice Processing Based on the Hearing Model".

2. D.V. Kruchinin, "Tests on Simplicity of Natural Number Based on Logarithmic Making Functions".

**November 12, 2011**

1. S.V. Zhary, "Mathematical, Algorithmic Maintain and Software for Systems of Intrawarm Navigation at Treatment of Infringements of the Cardio-rhythm".

2. A.N. Mertvetsov, "Detection of the Geodynamic Phenomena Harbingers Based on Multidimensional Time Series".

**November 15, 2011**

A.V. Ponizov, "Algorithms and Software for Automation of Examination of Human Hearing Aid by Desing a New Electro-Acoustic Device".

**November 22, 2011**

I.S. Kostarev, "Algorithms and Software for Mathematical Modeling of Dispersion and Radiation in the Onboard Equipment for Space Vehicles".

**December 3, 2011**

D.V. Chernykh, "Mathematical and Algorithmic Maintenance of the Voice Processing Based on the Hearing Model".

**December 17, 2011**

1. N.S. Mikhailov, "Subsystem of the Protection Service for the Electronic Legally Significant Document System Based on the Thin Client".

2. S.D. Tiunov, "Models, Algorithms, and Software for the Voice Quality Estimation".

**February 18, 2012**

1. P.I. Tsiporin, "The Mathematical Model and Problem-Focused Software for Optimisation of Equipment of Educational Units".

2. A.V. Ponizov, "Device of Formation of the Test Acoustic Signals for Evaluaion of Hearing Quality".

**March 3, 2012**

1. S.Yu. Iskhakov, "Models and the Algorithmic Maintenance of the Automated Monitoring of Functioning of the Enterprise Local Network".

2. A.S. Kovtun, "Systems and Methods of Monitoring of the Network Infrastructure".

**March 17, 2012**

1. R.F. Nigmatullin, "Mathematical Model, Software, and Algorithmic Maintenance of Voice of Patients with the Articulation Diseases".

2. R.I. Galin, "Model of Interaction between Citizens and Government Authorities".

**March 31, 2012**

1. A.V. Ahaev, "Algorithms and Software for Design of the Expert Systems of Software Choice".

2. D.S. Sinkov, "Algorithms and Software of Identification of the Fuzzy Systems Based on Particle Swarm Method".

3. I.V. Gorbunov, "Algorithms and Software for Identification of Parameters of Fuzzy Systems Based on Hybrid Method of Bee Colonies".

**April 14, 2012**

O.O.Yevsyutin, "Algoritms of Dynamics of the Cellular Automats in the Transformation Information Problems".

**May 19, 2012**

1. V.G. Mironova, "Software and Technique of the Security Model for the Nuclear Industry Units".

2. S.D. Tiunov, "Models, Algorithms, and Software for the Voice Quality Estimation".

**June 2, 2012**

1. N.S. Mikhailov, "Subsystem of the Protection Service for the Electronic Legally Significant Document System Based on the Thin Client".

2. D.V. Chernykh, "Mathematical and Algorithmic Maintenance of the Voice Processing Based on the Hearing Model".

**September 17, 2012**

1. L.L. Egorov, "Algorithms and Software for Calculation of the Optimum Zones of the Base Stations of Cellular Communication Networks".

2. A.V. Ponizov, "Automation of Examination of Human Hearing Aid by Desing a New Electro-Acoustic Device".

**September 22, 2012**

1. A.O. Melkozerov, "Algorithms, Software Complex and Method for Math Modelling and Optimization of Electromagnetic Compatibility of Advanced Spacecraft Board Equipment by Evolutionary Strategies".

2. I.N. Shishkin, "Using of Remote Sensing Data for the Identification and Monitoring of Forest Fires".

**October 13, 2012**

1. A.V. Akhaev, "Algorithms and Software Tools for Building Expert Systems of Software Selection on the Example of "1C: Enterprise. 8".

2. D.S. Sin'kov, "Algorithms and Software Tools for Identification of Fuzzy Systems Based on Method of Particle Swarm".

**October 20, 2012**

1. O.O. Evsyutin, "Models, Algorithms and Software Tools for Compressing Digital Images on the Basis of Cellular Automata ".

2. A.S. Kovtun, "Implementation of a System for Monitoring Network Hardware Using the Methods of Forecasting".

**November 17, 2012**

I.V. Gorbunov, "Algorithms and Software and Tools for Identification of Parameters of Fuzzy Systems Based on Hybrid Method of Bee Colonies".

**November 24, 2012**

1. K.V. Volkov, "Computational Algorithms, Mathematical Models and Software for Vector Signal Analysis".

2. A.G. Sizov, "Mathematical Models, Algorithms and Software Complex for Assessment of the Health Level and Quality of Human Social Life".

**December 22, 2012**

1. A.V. Skorokhodov, "Neural Network Classifier of Clouds from High-Resolution MODIS Data".

2. S.D. Tiunov, "The Models, Algorithms and Software Tools for Assessing the Quality of the Vocal Apparatus".

**March 1, 2013**

Y.A. Shkredov, "Automation of Elevators Dispatching Systems".

**March 2, 2013**

1. S.A. Neymysheva, "Identification and Authentication Model Based on Steganography Algorithms".

2. O.A. Dushanina, "The Main Aspects of the Personal Data Security in Corporate Systems Using".

**March 16, 2013**

A.K. Lukyanov, "Mathematical Methods and Algorithms for Reconstruction of Total CO2 on GOSAT Satellite Data".

**April13, 2013**

1. D.V. Kruchinin, "Tests of Primality of Natural Numbers Based on a Logarithmic Generating Functions".

2. O.O. Evsyutin, "Student Paper Contest and Conference on the Information Security (SIBINFO) Organization".

**April 27, 2013**

1. V.G. Mironova, "Program and Method for Constructing the Model of Security Threats of Confidential Information for Nuclear Industry".

2. R.I. Galin, "Methods for Evaluating the Effectiveness of Government Service Delivery in the Area of Youth Policy".

**May 25, 2013**

1. I.V. Gorbunov, "Algorithms and Software and Tools for Identification of Parameters of Fuzzy Systems Based on Hybrid Method of Bee Colonies".

2. D.S. Sinkov, "Algorithms and Software Tools for Identification of Fuzzy Systems Based on Method of Particle Swarm".

**June 8, 2013**

1. E.T. Ageeva, "Numerical-analytical Method for Modeling of the Informational Channel State with Perturbed Parameters".

2. P.V. Pletnev, "Algorithms and Methods of Propositional Algebra for Assessment of Threats and Risks of Informational Security".

**June 22, 2013**

1. Hoang Van Kuet, "Research and Development of Methods for Security Supporting of Semantic Databases".

2. M.V. Engel, "Algorithms and Software of Information Systems for Calculation of the Characteristics of Atmosphere Needed for Atmospheric Correction of Satellite Images".

**September 21, 2013**

1. I.N. Shishkin, "Using of Remote Sensing Data for the Identification and Monitoring of Forest Fires".

2. I.V. Gorbunov, "Algorithms and Software and Tools for Identification of Parameters of Fuzzy Systems Based on Hybrid Method of Bee Colonies".

**September28, 2013**

O.N. Vilegzhanin, "Mathematical Processing of Experiment Results on the Basis of Operators Projectors and Procedures of the Recurrence Pseudo-Requests".

**October 5, 2013**

1. A.S. Kovtun, "The Implementation of the System for Monitoring Network Equipment Using the Methods of Forecasting".

2. A.K. Lukyanov, "Mathematical Methods and Algorithms for Reconstruction of Total CO_{2} According GOSAT Satellite Instrument".

**October 12, 2013**

1. D.S. Sinkov, "Algorithms and Software for the Identification of Fuzzy Systems Based on the Method of Swarming Particles".

2. A.V. Ahaev, "Algorithms and Software Tools for Building Expert Systems for Software Selection".

**October19, 2013**

1. A.G. Sizov, "Information system for assessing the level of health and quality of the social life of older people and people with disabilities".

2. A.K. Lukyanov, "Mathematical Methods and Algorithms for Reconstruction of total CO_{2} According GOSAT Satellite Instrument".

**October 26, 2013**

M.V. Engel, "Algorithms and Software of Information Systems for Calculation of the Characteristics of Atmosphere Needed for Atmospheric Correction of Satellite Images".

** November 16<, 2013/strong>**

**
**1. S.V. Kirsanov, "Technique for Estimation of Information Security of Objects of Information and Telecommunication Infrastructure of Gas Industry APCS".

2. D.A. Suranova, "Methods, Algorithms and Software Complex for Simulation of Personalized Speech Interaction Between Operator and Computer".

**November 30, 2013**

1. P.V. Malinin, "Application of Projection Methods of Multidimensional Data Analysis for Voice Identification".

2. Hoang Van Kuet, "Research and Development of Tool for Security Support of Semantic Data Base Operation".

**December 7, 2013**

1. A.V. Borovkov, "Algorithms and Software Tools for Building a Pareto Optimal Fuzzy Classifiers".

2. I.A. Rakhmanenko, "Basic Methods and Problems in the Sphere of Speaker Identification by Voice".

** December 14, 2013**

1. D.S. Sinkov, "Algorithms and Software for the Identification of Fuzzy Systems Based on the Method of Swarming Particles".

2. M.A. Sopov, "Protection Estimation Technique for Distributed Systems of Certification Centers".

** December 21, 2013**

1. D.A. Suranova, "Algorithms and Software Complex for Simulation of Personalized Natural Speech Interaction Between Operator and Computer".

2. S.V. Kirsanov, "Technique for Estimation of Information Security of Objects of Information and Telecommunication Infrastructure of APCS of Gas Transportation Companies".

**February 8, 2014**

A.S. Yatsenko, "Information Security Audit of the Informatization Object".

**February 22, 2014**

1. E.N. Gusakova, "Hybrid Algorithms and Software Tools for Building Ensembles of Fuzzy Classifiers and Approximators".

2. D.V. Chernykh, "Mathematical and Algorithmic Tools for Speech Signal Processing Based on Hearing Model".

**March 1, 2014**

1. A.R. Smolina, "Unified Methodic for Performing the Computer and Technical Expertise".

2. S.D. Tiunov, "Numerical Method, Algorithms and Software for the Calculation of the Pitch Frequency in Real Time".

**March 15, 2014**

1. A.O. Shumskaya, "Technique for Artificial Texts Identification".

2. A.Y. Ishakov, "Technique of Strong Authentication in ACS Based on Modern Identification Attributes".

**March 29, 2014**

S.V. Luchkova, "Algorithms and Software for Analysis of Multivariate Data with the Properties of oil Based on Statistical and Fuzzy Modeling".

**April 5, 2014**

O.S. Ternovoy, "Procedure and Tools for Early Detection and Counteraction to Threats of Violation of Information Security as a Result of DDOS Attacks".

**April 19, 2014**

Yilmaz Simsek, (Turkey). "On Generating Functions of the Special Numbers and Polynomials".

**May 17, 2014**

1. A.A. Shelupanov, "250 Anniversary of the Tomsk-IEEE Seminar".

2. A.A. Konev, "Technology for Determining the Level of InformationSecurity".

**May 24, 2014**

1. I.A. Rahmanenko, "Automatic Identification of the Speaker's Voice Using Gaussian Mixtures".

2. D.V. Saveliev, "Allocation and Verification of Critically Important Functions at the Level of Source Code".

**May 31, 2014**

1. I.V. Gorbunov, "Algorithms and software for the identification of Pareto-optimal fuzzy systems based on metaheuristic methods".

2. O.V. Gorskikh, E.M. Pokrovskaya, "Educational strategy of information and communication security of the person".

**June 21, 2014**

1. A.A. Orlov, "Software platform for the implementation of meta-learning on the basis of group accounting of arguments".

2. S.Yu. Iskhakov, "Identification of incidents in complex networks of security systems based on forecasting methods".

**June 28, 2014**

P.V. Malinin, "The use of projection methods of the analysis of multivariate data for voice identification".

**September 13, 2014**

1. A.V. Akhayev, "Models and algorithms for the selection of software products based on ontology and fuzzy measures".

2. M.A. Sopov, "Methodic for security estimation of the distributed system of certification centers".

**September 20, 2014**

1. E.T. Ageev, "Numerical-analytical method for modeling the trajectory characteristics of the signal in the data channel with perturbed parameters".

2. A.A. Orlov, "Models, algorithms and software platform for data mining based on method of group accounting of arguments".

**September 27, 2014**

1. O.S. Ternovoy, "Methods and tools for early detection and counteraction to threats of security breach as a result of DDOS attacks".

2. J.A. Martynov, "Mathematical models and algorithms for organization of route networks of urban passenger transport on the basis of the study of passenger traffic".

**October 4, 2014**

1. A.E. Anfilofev, "Hybrid algorithms and software tools for building fuzzy classifiers".

2. I.V. Gorbunov, "Algorithms and software for the identification of Pareto-optimal fuzzy systems based on metaheuristic methods".

**October 9, 2014**

1. A.A. Golubeva, "Models and algorithms for assessment of the state of linear objects of water and heat networks under uncertainty".

**October 11, 2014**

1. D.V. Kruchinin, "The method of obtaining closed expressions for polynomials based on degrees of generating functions".

2. R.I. Ashirbakiev, "Models, algorithms, and software for the quasi-static simulation of printed circuit boards using numerical methods".

**October 18, 2014**

1. M.A. Sopov, "The methodology of estimating the security of distributed certification centers".

2. S.D. Tiunov, "Model, numerical methods, and software package for voice acoustic analysis".

**November 29, 2014**

1. I.N. Shishkin, "RGB-synthesis selection method for analysis of earth remote sensing data".

2. A.O. Shumskaya, "The technique of artificially created text identification".

**December 6, 2014**

1. A.V. Akhaev, "Methodology, models, and algorithms for the selection of software products based on ontology and fuzzy measures".

2. P.V. Malinin, "The use of multivariable data projection methods analysis to the voice person identification".

**December 20, 2014**

1. M.A. Sopov, "The methodology of estimating the security of distributed certification centers system".

2. S.D. Tiunov, "Model, numerical methods, and software package for voice acoustic analysis in the tasks of phonopathy diagnosis".

**February 7, 2015**

1. D.M. Bokov, "The report of 1st year postgraduate student".

2. A.P. Stefarov, "The standard model formation of the access control rule-breaker in automated systems".

**February 28, 2015**

1. S.S. Kharchenko, "The software package of oncology patients voice rehabilitation after the mouth cavity, oropharynx, and larynx organs surgeries".

2. D.A. Sagaidak, "The protection methods of digital visual information based on dividing the secret to unequal parts and digital watermarks embedding".

**March 14, 2015**

1. A.V. Borovkov, "Classifiers based on intuitionistic fuzzy sets".

2. S.Yu. Iskhakov, "The operation incidents identification of security systems complex network based on prediction".

**March 28, 2015**

1. D.A. Antipov, "The creation of electromagnetic noise generator with the frequencies cutout".

2. A.E. Anfylofev, "The use of weed optimization algorithm for finding the optimal coefficients of the discrete cosine transformation during the embedding information in images".

**April 11, 2015**

1. A.K. Novokhrestov, "The methodology of computer networks security assessment".

2. A.Yu. Yakimuk, "The automation software system of vocal training".

3. A.Yu. Iskhakov, "The methodology of strong authentication in ACS based on modern identification characteristics".

**May 16, 2015**

1. I.V. Stepanov, "Data leak prevention by acoustic and vibration acoustic channel".

2. T.V. Evsyutkin, "Fuzzy neural network classifier of low-contrast objects from satellite data as the example of cirrus clouds".

**May 30, 2015**

1. D.A. Wolf, "Model, numerical and software realization of singular estimation of speech signal pitch frequency".

2. M.O. Shudrak, "The software package for automated vulnerability search in executable code".

**June 2, 2015**

P.S. Dozmorov, "Methods and monitoring equipment of rock grain size composition and permeability".

**June 29, 2015**

1. I.D. Zyrin, "The method of accounting the surface roughness of multilayer microwave integrated circuits based on the low-temperature ceramics".

2. E.A. Morozov, "The endurance life analysis method of unified electronic modules of airborne radio equipment for space applications based on mathematical modeling of heat-proof processes".

**September 12, 2015**

1. N.V. Kovalev, "Methods and algorithms of evaluation the human face characteristics based on the image analysis".

2. A.K. Lukianov, "Mathematical methods and algorithms of total CO_{2} recovery according to the GOSAT satellite data".

**September 26, 2015**

1. E.A. Morozov, "The method of communications electronics equipment fatigue life analysis based on mathematical modeling of thermostable processes".

2. M.O. Shudrak, "Model, algorithms and software systems for automated vulnerability scanning of executable code".

**September 30, 2015**

I.D. Zyrin, "The method of calculation the desired signal parameters considering the surface geometric irregularity of microwave integrated circuits".

**October 2, 2015**

I.A. Kukalo, "Model, methods, and program complex of linear part of main oil pipeline physical security risk management".

**October 10, 2015**

A.I. Kuralenko, "The audit technique of communication system information security".

** November**** 7, 2015**

1. D.M. Bokov, "Method of account for the signal parameter with geometry of the plane microwave intergal circuit".

2. A.E. Anfilofev, "Model, algorithms, and program complex for the automated searching of bugs in the source code".

**November 28, 2015**

1. E.S. Gorbunov, "Cryptopoligon".

2. D.A. Antipov, "The report of 2nd year postgraduate student".

**December 12, 2015**

1. S.Yu. Ishakov, "The methodical ware of incidents identifying process in security system complex networks".

2. T.V. Evsyutkin, "A fuzzy neural network classifier of low-contrast objects based on satellite data in terms of cirrus cover".