telecommunications network
Recently Published Documents


TOTAL DOCUMENTS

467
(FIVE YEARS 92)

H-INDEX

20
(FIVE YEARS 2)

Author(s):  
A. O. Logvencheva

The strategy of economic security of the Russian Federation for the period up to 2030 defines various directions of ensuring economic security, one of which is to improve the activities of control bodies, including the Federal Treasury, which, in turn, is carried out through the application of various measures, in particular, information, which includes the creation and organization of information systems aimed at automating control activities. The presented research is devoted directly to the analysis of the legal regulation of these information systems. The article discusses the legal foundations of the organization and functioning of information systems specified in the Letter of the Ministry of Finance of the Russian Federation No. 02-10-07/74315, namely the GIS of public Finance management “Electronic Budget”, GIS “Official website of the Russian Federation in the information and telecommunications network “Internet” for posting information on the implementation of state (municipal) financial audit (control) in the field of budgetary legal relations” and GIS “Unified Information System in the field of procurement”. In addition, a study of the legal regulation of systems not mentioned by the Ministry of Finance of the Russian Federation among those contributing to the conduct of state financial control is presented — an automated system for planning control and supervisory activities of the Federal Service for Financial and Budgetary Supervision in executable modules and GIS “Standard cloud solution for automation of control (supervisory) activities”. The impossibility of using the second of these systems when carrying out state financial control measures has been established. In conclusion, the specific directions of the use of the considered information systems in carrying out control measures by the Treasury of Russia are presented. 


2021 ◽  
Vol 4 (2) ◽  
pp. 189-194
Author(s):  
Iqbal Kamil Siregar ◽  
Jhonson Efendi Hutagalung ◽  
Bachtiar Efendi ◽  
Herman Saputra

Flood concern everybody in every flood area. It makes the researchers interest to take the research about flood detection system, especially in rivers by using mobile phone facilities. The procedure of this tool is if the flood rise due to overflow of the river, then the river guard will receive SMS to tell the people to anticipate the flood by sounding the alarm until the entire riverbank area. This SMS delivery is via connection to telecommunications network using SMS gateway module. This tool can be used as a flood emergency which is installed at river location points where sensors and control devices are permanently installed. This research has been successful and has been well tested in its implementation.


Author(s):  
Aleksandr Batenkov ◽  
Kirill Batenkov ◽  
Aleksandr Fokin

Introduction: For large and structurally complex telecommunication networks, calculating the connectivity probability turns out to be a very cumbersome and time-consuming process due to the huge number of elements in the resulting expression. The most expedient way out of this situation is a method based on the representation of a network connectivity event in the form of sums of products of incompatible events. However, this method also requires performing additional operations on sets in some cases. Purpose: To eliminate the main disadvantages of the method using multi-variable inversion. Results: It is shown that the connectivity event of a graph should be interpreted as a union of connectivity events of all its subgraphs, which leads to the validity of the expression for the connectivity event of the network in the form of a union of connectivity events of typical subgraphs (path, backbone, and in general, a multi-pole tree) of the original random graph. An iterative procedure is proposed for bringing a given number of connectivity events to the union of independent events by sequentially adding subgraph disjoint events. The possibility of eliminating repetitive routine procedures inherent in methods using multi-variable inversion is proved by considering not the union of connectivity events (incoherence) degenerating into the sum of incompatible products, but the intersection of opposite events, which also leads to a similar sum. However, to obtain this sum, there is no need to perform a multi-variable inversion for each of the terms over all those previously analyzed. Practical relevance: The obtained analytical relations can be applied in the analysis of reliability, survivability or stability of complex telecommunications networks.


2021 ◽  
Vol 7 (2) ◽  
pp. 120-133
Author(s):  
Aditya Kurniawan ◽  
Kholilatul Wardani

Dilihat dari jenis alutsista dan jumlah komponen peralatan pertahanan, Matra Darat Republik Indonesia memiliki komposisi 61% armored vehicles, 15% towed artillery, 14% tanks, 6.5% self-propelled guns dan sisanya adalah rocket projectors. Dilihat dari jenis alutsista yang dimiliki oleh matra darat, keseluruhanya adalah jenis alutsista yang sudah digunakan sejak jaman perang dunia kedua, sehingga untuk alutsista yang memiliki teknologi kendali jarak jauh atau otonom masih belum terlihat dalam data tersebut. Oleh karen itu pengembangan dalam alutsista jenis ini adalah hal strategis untuk dilakukan. Robot mobile kendali jarak jauh yang semi otonom MINION (Mobile mINes Intelligent remOte detoNator) adalah sebuah mobile robot yang dikendalikan jarak jauh dengan jaringan telekomunikasi nirkabel yang berfungsi sebagai mobile mines atau komponen alutsista berbahan peledak yang memiliki daya gempur massif. Robot mobile ini diharapkan menjadi sebuah prototipe alutsista kendali jarak jauh yang akan menambah daya gempur Angkatan Darat Republik Indonesia. Hasil dari penelitian ini diantaranya adalah sebuah prototipe mobile robot (MINION) dengan level TKT 5 dengan kesimpulan pengembangan yaitu 1) Material chassis yang digunakan untuk Minion adalah anodized aluminium yang tahan korosif berbentuk braket modular dengan tebal 2mm, 10mm pitch grid dengan lubang 4mm. 2) roda menggunakan material rubber dan didesain memiliki individual damper / shock absorber pada setiap roda dengan ukuran roda 120 mm x 60 mm untuk meningkatkan traksi pada tanah jenis entisol dan inceptisol 3) catu daya menggunakan baterai lithium polymer 5000mAh tipe 2S 1P 20C dengan kapasitas discharge current sebesar 100A yang akan di charge oleh Polycrystalline solar panel 20wp yang mampu melakukan pengisian baterai Minion sebesar 20% per hari. Judging from the type of defense equipment and the number of components of defense equipment, TNI has a composition of 61% armored vehicles, 15% towed artillery, 14% tanks, 6.5% self-propelled guns and the rest are rocket projectors. Types of defense equipment owned by the ground forces, all of them are types of defense equipment that have been used since the era of the second world war, thus equipment that has remote control or autonomous technology is still not visible in the data. Therefore, the development of this type of defense equipment is strategic and crucial. The semi-autonomous remote-controlled mobile robot MINION (Mobile Mines Intelligent Remote Detonator) is a remote-controlled mobile robot with a wireless telecommunications network that functions as mobile mines or components of explosive defense equipment that have massive firepower. This mobile robot is expected to become a prototype of a remote control defense system that will increase the fighting power of TNI. The results of this study include a prototype mobile robot (MINION) with TKT level 5 with development conclusions as follows 1) Chassis material used for Minion is a modular bracket corrosive resistant anodized aluminum with 2mm thick, 10mm pitch grid and 4mm holes. 2) the wheels are rubber material and designed to have individual dampers / shock absorbers on each wheel with a wheel size of 120 mm x 60 mm to increase traction on entisol and inceptisol soils 3) 5000mAh lithium polymer battery type 2S 1P 20C with discharge capacity current of 100A is used for power supply system charged by a 20wp Polycrystalline solar panel capable of charging the Minion battery by 20% per day.


2021 ◽  
Vol 8 (3) ◽  
pp. 41-48
Author(s):  
Daria A. Petrova ◽  
Ekaterina A. Galchun

The internet information and telecommunications network, due to its accessibility and easy storage and distribution of huge amounts of data, and its ability to search and find information, plays a key role in the implementation of such fundamental rights as freedom of speech and the press. At the same time, there is an increasing risk that materials on the World Wide Web may harm the rights and legitimate interests of individuals, especially the right to privacy. In these conditions of eternal competition between the public and the private, the right to be forgotten arises as a mechanism that allows one to remove or slow the spread of unwanted information. The authors investigate the problem of implementing this relatively new opportunity in the context of finding a balance between the public interest in obtaining information and the private interest in destroying it. It is argued that this category of cases is difficult due to the lack of a unified standard of proof and criteria for evaluating arguments. Based on an analysis of the most important precedents, the most common legal positions on the issue are identified and critically assessed. An increasing priority afforded to public interest and the decreasing requirements for the deletion of information is revealed. The authors consider the emergence of the right to be forgotten as a new mechanism for settling disputes in a pre-trial manner, by allowing one to not completely destroy, but to suspend the dissemination of undesirable information, thereby protecting private interests without violating the legitimate rights of the public. The conclusion is made about the right to be forgotten as a compromise in the conflict of fundamental rights. An approximate list of arguments for applicants and respondents is provided, suitable for practical application in disputes about the right to be forgotten.


Legal Concept ◽  
2021 ◽  
pp. 125-137
Author(s):  
Denis Matytsin ◽  

Introduction: the relevance of the paper is justified by the fact that the civil doctrine regarding the study of the topics of investment transactions made using the financial platform is in the stage of gradual formation. While academic economists are quite actively developing issues of forming new approaches to the remote provision of financial services to a wide range of consumers. The purpose of the study: the paper provides a detailed analysis of Federal Law of July 20, 2020, No. 211-FZ “On Making Financial Transactions Using the Financial Platform”, which entered into force in 2020 and regulates the activities of special legal entities – operators providing investment services to individuals. The aim is to evaluate the effectiveness of the provisions enshrined in Federal Law No. 211-FZ of July 20, 2020, “On Making Financial Transactions Using the Financial Platform”. Analyzing the provisions of the newly adopted document, the author answers the question of whether they facilitate, accelerate and simplify the execution of transactions by a private investor made using the financial platform. The Rules of the financial platform are also analyzed as a legal regulatory basis for the entrepreneurial activity of the operator of the financial platform. Research methods: based on the materialistic worldview, the author uses a combination of general scientific and specific scientific methods. The main research methods are the logical and system-structural methods, the methods of induction and deduction, analysis and synthesis, as well as the formal legal method. Conclusions: it is concluded that the activity of recording data on financial transactions, which the repository (the registrar of financial transactions) must carry out according to Federal Law No. 211-FZ of 20.07.2020, is very cumbersome, complex, and costly, is subject to the risks of improper execution and improper preservation of personal data of consumers of financial services. It is proposed to use the depository and registration platform, which functions as a special electronic service on the website of the Bank of Russia, to record data on financial transactions using the financial platform. It is recommended to record the facts of financial transactions made in the system of a polysubject jurisdictional blockchain. The recommended scheme of polysubject blockchain interaction of entities operating on the territory of the Russian Federation has been developed, which allows each participant of the blockchain to simultaneously receive complete and reliable information on each stage of a financial transaction in the online mode and exclude irrational data transfer related to financial transactions and their participants, reduce the risk of improper storage of personal data of consumers of financial services, etc. It is proved that in Federal Law No. 211-FZ of 20.07.2020 the legislator has created a legal business scheme that is beneficial, first of all, for the operator of the financial platform – an intermediary organization. The amendments and additions to Federal Law No. 211-FZ of 20.07.2020 are proposed. The expediency of borrowing and integrating into the unified federal law “On Making Investment Transactions by Consumers in the Information and Telecommunications Network “Internet” all viable legislative provisions developed in Federal Law No. 211-FZ of 20.07.2020 is justified. This document also proposes to fix a set of rules for regulating remote digital transactions of investment in traditional financial assets, securities, digital financial assets, and derivative financial assets made by retail private investors (individuals) in the Internet information and telecommunications network.


Author(s):  
Meruert Makasheva

The purpose of the article is to give a general description of the main factors of the positive and destructive influence of the information space of the Internet on the personality of a minor, to reflect the reasons for a particular negative influence and the factors that neutralize it. The topic of the elaboration of these problems in science is not sufficient due to the annual increase in risks on the Internet and the absence of a truly effective paradigm of counteraction. The theoretical, methodological and practical significance of the topic is explained by both a positive and objectively critical assessment of the influence of the Internet on these persons, due to the characteristics of a minor personality, a significant number of phenomena of destructive influence and the need to solve problems. The object is an information and telecommunications network Internet, used by minors for the purpose of extracting information, receiving and providing various types of information services. The subject is the destructive impact of the Internet on a minor. The article notes that underage, taking into account the peculiarities of psychophysical development, the specifics of this period of personality formation, predetermines both positive and negative effects of the Internet, including manifested in the dissemination of information on terrorist, extremist, pornographic, suicidal topics, on the promotion of risky behavior, on the consumption of prohibited substances. The author substantiates the leveling of negative factors of influence of the Internet on a minor is possible with normal socialization, harmonious development, which allow him to stay in the real world, regardless of the factors of influence.


2021 ◽  
Vol 7 ◽  
pp. 29-39
Author(s):  
Tsvetelina Simeonova

The paper considers the peculiarities of the SCADA (energy infrastructure management system in the railway infrastructure), as well as issues of the overall dependability in the corporate infrastructure, which is the aim of the study. The study, based on the accepted structure and values of the parameters, examines what depends on and how the readiness factor of a SCADA system changes when the recovery intensity changes and at a fixed failure rate. The results show that with increasing recovery intensity, the readiness factors of the telecommunications network and SCADA system thus defined increase, while reducing the downtime. For a more in-depth study of the overall reliability of the SCADA system, it is necessary to set specific normatively accepted dependability parameters of all connected elements, as well as a real set structure. Based on the fact that with backup resources provided, a defined dependability of the system can be ensured at preset values of the reliability parameters of its components and the backup structure; the opposite problem can also be solved. The proposed approach for studying the reliable behavior of the SCADA system within the corporate infrastructure can be noted as a contribution of the present work and conclusions are made for the practical use of the results.


Author(s):  
I Nyoman Sujana Saputra ◽  
Budi Yuwono

Maintaining the service performance was the responsibility of the service company. As an organization providing telecommunications network services both satellite and terrestrial networks, decreasing service performance was an indication of IT governance problems in the organization. For understanding the extent of the IT governance in the organization, the assessment of capability level was required. COBIT 5 was the framework for assessing IT processes capability level and combined with the ITIL V3 2011 framework. This research methodology begins with problem identification in the organization, determining the ITIL V3 2011 service lifecycle 2011 related to the problem, and mapping ITIL V3 2011 processes with COBIT 5 processes. The mapping results obtained IT processes of COBIT 5 and then selected based on their relevance to the organization's problems and assessed its capability level using the PAM (Process Assessment Model) method which refers to the ISO/IEC 15504 standard. By defining a target of capability level, it can be performed gap analysis, prioritized process improvement, determined KPI (Key Performance Indicators), and provided recommendation activities of each IT process. Based on the assessment of 12 IT processes capability showed that the capability level of IT processes in the organization is level 1 (performed) with 8 processes and level 2 (managed) with 4 processes. To improve it, COBIT 5 has provided guidance and recommendations for each IT process activity.


Author(s):  
N. Voynova ◽  
N. Valkanova

We know many natural sources that create electromagnetic energy such as solar radiation, storms and lightning, electromagnetic radiation from space objects. All this forms the natural electromagnetic background of the Earth. On the other hand, there is no technology, facility, product that uses electric current that does not emit any kind of electromagnetic radiation.  Aim and tasks: Study of the sources of non-ionizing radiation on the territory of Dobrich district in 2020. Aim and tasks: Study of the sources of non-ionizing radiation on the territory of Dobrich district in 2020.  Materials: Sites subject to monitoring according to the schedule for 2020. a total of 26 sites - base stations (BS) of the telecommunications network in Dobrich District. Technical means with which the measurements and method of control of RHI Varna were performed, antenna - isotropic, working frequency band 100 kHz to 3 GHz; uncertainty +/- 20% of the measured value.  Methods: "Methodology for measurement and evaluation of the electromagnetic field in the vicinity of transmitting antennas to mobile communication systems"; Collection of methods for hygienic research; NCHMEH (current NCPHA), Volume IV, Settlement Environment.  Results: From the total of 196 measurements performed in 2020. of exposed parts in areas with high population concentration at different distances to the EMF emitters, show that the lowest measured instantaneous value of power density is <0.1 μW / cm², and the highest - 0.8 μW / cm². In the premises of children's, educational, medical establishments and outdoors the lowest measured instantaneous value is <0.1 μW / cm² and the highest 1.7 μW / cm².  Conclusions: 1. For 2020 the lowest measured instantaneous value is <0.1 μW / cm², and the highest 1.7 μW / cm², which is many times less than the MPC 10 μW / cm².2. of mobile operators do not pose a health risk to the population living and residing near them.


Sign in / Sign up

Export Citation Format

Share Document