
۱۴ آبان - ۱۶ آبان ۱۴۰۴
International Symposium 'Problems of Redundancy in Information and Control Systems'
هنوز دنبالکنندهای وجود ندارد.
نمای کلی
The XIХ International Symposium on Problems of Redundancy in Information and Control Systems (REDUNDANCY 2025) is a hybrid event taking place from November 5-7, 2025, at MIEM HSE in Moscow. The symposium aims to foster cooperation and share the latest scientific and technological achievements in information and communication systems, covering topics such as information and coding theory, telecommunication technologies, Internet of Things systems, data security, blockchain, and control systems.
REDUNDANCY 2025: Call for Papers
The XIХ International Symposium on Problems of Redundancy in Information and Control Systems (REDUNDANCY 2025) is scheduled to take place from 05 to 07 November 2025 at MIEM HSE, Moscow, as a Hybrid Event.
The symposium's primary goal is to strengthen cooperation among representatives of various scientific schools, provide participants with insights into the latest scientific and technological achievements, and facilitate experience-sharing among colleagues.
Topics
The covered topics include, but are not limited to:
- Information and coding theory
- Telecommunication technologies and networks, Internet of Things systems
- Data security, blockchain and control systems
Submission Guidelines
- Registration: Prior to paper submission, authors must register on the official conference site. Submissions are made through the Author's Profile on the official conference site.
- Language: Papers must be submitted in English.
- Scope: Authors are invited to submit papers addressing one of the conference topics.
- Authorship Limit: A single person can be a co-author of no more than 3 papers.
Paper Requirements and Checks
- Template: Papers must adhere to the IEEE style guidelines. Use the IEEE paper template for A4 paper size. For LaTeX users, ensure the
conference mode
is used. - Format: Papers must be submitted exclusively in PDF format. Papers uploaded in other formats (e.g., Word) will not be accepted.
- Abstract: The abstract should provide an insight into the paper's content and must contain 150-250 words.
- Plagiarism: Submitted papers must be new and original. The critical plagiarism level (including self-plagiarism) for automatic verification by CrossCheck Portal is 30%, and it cannot be higher. Papers with a plagiarism level higher than 30% will not be accepted.
- Excessive Self-Citations: It is strongly recommended that references to own authors' works constitute no more than 50% of the entire list of references (and no more than 3 references). If this threshold is exceeded, links to relevant author works must be added as footnote links and not included in the reference list.
- General Formatting: Ensure the paper is formatted properly. Common template violations include using the wrong template (e.g., Journal instead of Conference), single column format, incorrect author information grouping, poor quality figures (less than 300 dpi), remnants of Russian text, and wrong citation style (e.g., GOST instead of IEEE standard). Papers that do not meet guidelines and template will not be accepted.
Reviewing Process
- All reviews are based on submissions following a single-blind process.
- Each paper will be reviewed by at least two reviewers.
- Papers will be rated considering: Relevance and Timeliness, Technical Content and Scientific Rigor, Novelty and Originality, and Quality of Presentation.
- Reviewers will provide comments on Strong and Weak aspects, and Recommended changes.
- Conflicting reviews may require an additional reviewer.
- The final status of a paper will be: Declined, Accepted, or Accepted after Revision.
- Papers status
Accepted after Revision
must be revised carefully according to reviewer comments; otherwise, they will not be accepted. - For
Accepted
papers, minor corrections are recommended based on reviewer comments.
Camera Ready Final Version
- The final version of accepted papers must be submitted to pdf-express before the final submission deadline to validate the paper for inclusion in IEEE Xplore.
- Conference ID:
59964X
- Papers that are not submitted to pdf-express and are not Approved will not be included in the proceedings.
Paper Presentation
- All accepted papers must be presented by one of the co-authors at the Conference Venue. Presentations by third persons should be strongly avoided.
- Presentation text (and/or poster) must be in English.
- Papers that will not be presented at the Conference will be excluded from the proceedings (in accordance with the IEEE Xplore "No-Shows" policy).
IEEE Electronic Copyright Form (eCF)
- After the conference, authors of presented papers will be invited to complete and digitally sign the IEEE Electronic Copyright Form (eCF).
- The corresponding author will receive an email with login details and instructions. Ensure your registered email address is active.
- Once submitted, the eCF cannot be changed. Ensure title, author list, etc., are correct before submitting. Papers without completed copyright forms will not appear in the proceedings or be enrolled in IEEE Xplore.
Publication
- Accepted and presented full papers will be submitted for inclusion into the IEEE Xplore Digital Library, subject to meeting IEEE Xplore’s scope and quality requirements.
- IEEE assures wide distribution of conference proceedings through abstracting and indexing services.
Important Dates
- Full paper submission: 22 Sep 2025
- Acceptance notification: 07 Oct 2025
- Final paper submission: 13 Oct 2025
Conference Fees
- Regular Fee: 15000₽
- IEEE Member: -20%
- Additional paper (same speaker): -30%
- Listener (Face-to-Faces): -50%
- Remote listener: Free
Contact & Support
- E-mail: redundancy@miem.hse.ru
- Phone: All questions about submissions should be emailed.
تاریخهای کنفرانس
Conference Date
۱۴ آبان ۱۴۰۴ → ۱۶ آبان ۱۴۰۴
ارسال مقاله
Full paper submission
۳۱ شهریور ۱۴۰۴
اعلان
Acceptance notification
۱۵ مهر ۱۴۰۴
نسخه نهایی
Final paper submission
۲۱ مهر ۱۴۰۴
رتبه منبع
منبع: CORE2023
رتبه: National Russia
حوزه پژوهشی: Cybersecurity and privacy, Theory of computation