scholarly journals 35-year experience in the functioning of the National Radiation and Epidemiological Registry as a State information system for monitoring the radiological consequences of the Chernobyl accident

Author(s):  
V.K. Ivanov ◽  
◽  
M.A. Maksioutov ◽  
K.A. Tumanov ◽  
E.V. Kochergina ◽  
...  

Thirty five years ago, the All-Union Distributed Registry of Persons Exposed to Radiation as a re-sult of the accident at the Chernobyl Nuclear power plant (Chernobyl Registry) was created. The Computing Center of the Research Institute of Medical Radiology of the USSR Academy of Sci-ences (Obninsk) became the core of the Chernobyl Registry. Their contribution to the creation of the registry was made by all former Soviet republics. Currently, the registry is called the National Radiation and Epidemiological Register (NRER), which is a state information system for personal data of Russian citizens exposed to radiation as a result of radiation accidents and incidents. The NRER is a multi-level system consisting of 85 regional segments in subjects of Russian Federa-tion and 4 departmental sub-registries. Currently, the NRER stores information about 811 thou-sand people, of which 751 thousand people represent the so-called “Chernobyl contingent”. The article presents the description of regulatory framework, organizational structure and technologi-cal approaches to the management of NRER. The article also describes the specific elements and subsystems of the registry that ensure the effective functioning of the NRER system for many years. The final part of the article presents the main results of research on the assessment of the radiological consequences of the Chernobyl disaster, obtained on the basis of the analysis of da-ta accumulated in the NRER for the period 1986-2020.

2019 ◽  
Vol 6 (2) ◽  
pp. 150-158
Author(s):  
Angelika Pechyonkina ◽  
Valentin Selifanov

It’s impossible to imagine a modern information system without virtualized components – servers, remote workstations (VDI), network equipment. The competent approach is necessary to protect these environments. If information system of a company processes information that is subjected to mandatory protection in accordance with requirements of Russian legislation (for example, personal data or information processed in state information systems), then only certified security devices that have passed the procedure of compliance assessment by regulators – the Federal Security Service of Russia and the FSTEC of Russia. The use of these protection means will ensure the required level of information security.


2020 ◽  
Vol 24 (2) ◽  
pp. 73-79
Author(s):  
V. A. Sizov ◽  
D. M. Malinichev ◽  
V. V. Mochalov

The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each other, as well as use a single professional thesaurus that allows understanding and describe information security processes.Currently, state information systems with terminal access devices are used to ensure the realization of the legitimate interests of citizens in information interaction with public authorities [1].One of the types of such systems are public systems [2]. They are designed to provide electronic services to citizens, such as paying taxes, obtaining certificates, filing of applications and other information. The processed personal data may belong to special, biometric, publicly available and other categories [3]. Various categories of personal data, concentrated in a large volume about a large number of citizens, can lead to significant damage as a result of their leakage, which means that this creates information risks.There are several basic types of architectures of state information systems: systems based on the “thin clientpeer-to-peer network systems; file server systems; data processing centers; systems with remote user access; the use of different types of operating systems (heterogeneity of the environment); use of applications independent of operating systems; use of dedicated communication channels [4]. Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". Materials and research methods. The protection of the state information system is regulated by a large number of legal acts that are constantly being improved with changes and additions to the content. At the substantive level, it includes many stages, such as the formation of SIS requirements, the development of a security system, its implementation, and certification. The protected information is processed in order to enforce the law and ensure the functioning of the authorities. The need to protect confidential information is determined by the legislation of the Russian Federation [5, 6]. Therefore, to assess the quality of the regulatory framework of information security for terminal access devices of the state information system, the analysis of the main regulatory legal acts is carried out and on the basis of it, proposals are developed by analogy to improve existing regulatory documents in the field of information security.Results. The paper has developed proposals for improving the regulatory framework of information security for terminal access devices of the state information system- for uniformity and unification, the terms with corresponding definitions are justified for their establishment in the documents of the Federal Service for Technical and Export Control (FSTEC) or Rosstandart;- rules for the formation of requirements for terminals, which should be equivalent requirements for computer equipment in the “Concept for the protection of computer equipment and automated systems from unauthorized access to information ".Conclusion. General recommendations on information protection in state information systems using the “thin client" architecture are proposed, specific threats that are absent in the FSTEC threat bank are justified, and directions for further information security for the class of state information systems under consideration are identified. Due to the large number of stakeholders involved in the coordination and development of unified solutions, a more specific consideration of the problems and issues raised is possible only with the participation of representatives of authorized federal executive bodies and business representatives for discussion.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Hongyun Xie ◽  
Haixia Gu ◽  
Chao Lu ◽  
Jialin Ping

Real-time Simulation (RTS) has long been used in the nuclear power industry for operator training and engineering purposes. And, online simulation (OLS) is based on RTS and with connection to the plant information system to acquire the measurement data in real time for calibrating the simulation models and following plant operation, for the purpose of analyzing plant events and providing indicative signs of malfunctioning. OLS has been applied in certain industries to improve safety and efficiency. However, it is new to the nuclear power industry. A research project was initiated to implement OLS to assist operators in certain critical nuclear power plant (NPP) operations to avoid faulty conditions. OLS models were developed to simulate the reactor core physics and reactor/steam generator thermal hydraulics in real time, with boundary conditions acquired from plant information system, synchronized in real time. The OLS models then were running in parallel with recorded plant events to validate the models, and the results are presented.


1989 ◽  
Vol 14 (5) ◽  
pp. 393-406 ◽  
Author(s):  
Siegfried Treu ◽  
Paul Mullins ◽  
Joel Adams

Author(s):  
E. G. Kovalenko

The article studies the features of monitoring of goods turnover, including marking of goods, as well as turnover in the state information system of monitoring over turnover of goods involved in the relations of the operator issuing the codes, marking, collecting information, its storage and provision. The marking functions are defined: the function of analysis of wholesale and retail turnover, information function, identifying and control functions


2021 ◽  
Vol 19 (3) ◽  
pp. 121-141
Author(s):  
Justyna Olędzka

The purpose of this article is to discuss the trajectory of Belarusian-Lithuanian relations with a particular focus on the period after the 2020 Belarusian presidential election, which resulted in a change in international relations in the region. This was the moment that redefined the Lithuanian-Belarusian relations, which until 2020 were satisfactory for both sides (especially in the economic aspect). However, Lithuania began to pursue a reactive policy of promoting the democratisation of Belarus and provided multi-level support to Belarusian opposition forces. The current problems in bilateral relations (e.g., the future of Belarusian Nuclear Power Plant located in Astravyets) have been put on the agenda for discussion at the EU level, while the instruments of a hybrid conflict in the form of an influx of immigrants into Lithuania, controlled by the Belarusian regime, have become a key issue for the future prospects of relations between Belarus and Lithuania.


Author(s):  
Xuegang Zhang ◽  
Wei Liu ◽  
Hai Chang ◽  
Jianbo Wen ◽  
Yiqian Wu ◽  
...  

For most of the newly built nuclear power plants, the computerized main control rooms (MCR) are adopted. The soft control, the typical feature of computerized Human-Interface System (HIS) in the computerized main control room and mediated by software rather than by direct physical connections, is comprised of safety and non-safety control interface which provides the operators with manual control for component-level, and allows both continuous control of plant process and discrete control of components in nuclear power plant. The safety soft control and information system (SSCIS) is used to give the safety commands to and check the immediate response of the safety process. This paper describes the application of the system design basis, functionality, communication, operation faceplate and system modes for SSCIS which is firstly introduced in CPR1000 nuclear power plant. The design criteria and basic design features of SSCIS is developed to be as the design basis of the design implementation. The ISG-04 ‘Highly-Integrated Control Rooms-Communications issues (HICRc)’ provides acceptable methods for addressing SSCIS communications in digital I&C system design. The NUREG0700 ‘Human-System Interface Design Review Guidelines’ is applied as reference for human factor engineering requirement in the SSCIS design. And the SSCIS design has also fully considered the possible customer usual practice.


2018 ◽  
Vol 14 (10) ◽  
pp. 155014771880671 ◽  
Author(s):  
Tao Li ◽  
Hai Wang ◽  
Yuan Shao ◽  
Qiang Niu

With the rapid growth of indoor positioning requirements without equipment and the convenience of channel state information acquisition, the research on indoor fingerprint positioning based on channel state information is increasingly valued. In this article, a multi-level fingerprinting approach is proposed, which is composed of two-level methods: the first layer is achieved by deep learning and the second layer is implemented by the optimal subcarriers filtering method. This method using channel state information is termed multi-level fingerprinting with deep learning. Deep neural networks are applied in the deep learning of the first layer of multi-level fingerprinting with deep learning, which includes two phases: an offline training phase and an online localization phase. In the offline training phase, deep neural networks are used to train the optimal weights. In the online localization phase, the top five closest positions to the location position are obtained through forward propagation. The second layer optimizes the results of the first layer through the optimal subcarriers filtering method. Under the accuracy of 0.6 m, the positioning accuracy of two common environments has reached, respectively, 96% and 93.9%. The evaluation results show that the positioning accuracy of this method is better than the method based on received signal strength, and it is better than the support vector machine method, which is also slightly improved compared with the deep learning method.


Sign in / Sign up

Export Citation Format

Share Document