Vol 19, No 2 (2025)
3-9 45
Abstract
In this article, we consider the system of quality management of lawmaking in theRussian Federation. Its basic elements are defined: a subsystem of entities with lawmakinginitiative; a subsystem of the process of adoption of normative legal acts (NLA); a subsystem ofgiving legal force to NLA. The subsystem of entities with lawmaking initiative includes entitiesestablished by the Constitution of the Russian Federation. The subsystem of the process ofadoption of NLA includes the following elements: NLA; quality criteria for NLA; methods forassessing the quality of NLA; legal examinations of NLA (more than sixteen); experts; actionsto approve, supplement, amend and reject NLA; assessment of the quality of draft NLA. Thesubsystem of giving legal force to NLA includes entities that carry out actions to make adecision on the approval and publication of NLA. The main tool for quality control(management) of regulatory legal acts, according to the authors, is conducting legalexaminations, therefore they propose a generalized algorithm for assessing the quality ofregulatory legal acts, which contains the following steps: submitting a draft regulatory legal actto the competent authority; examination of the specified regulatory legal act; calculating theindicator of readiness of the regulatory legal act; the stage of completing the inspections of theregulatory legal act, in case of its compliance with the established quality criteria; stages ofgiving the draft regulatory legal act legal force. The paper proposes a general simpleclassification of controlled quality factors in legal examinations, introduces the concept of theindicator of readiness of regulatory legal acts, which is an assessment of the quality of draftregulatory legal acts for compliance with certain quality criteria of regulatory legal acts. As anexample for conducting quality control of lawmaking, the procedures of anti-corruptionexamination (ACE) are selected.
10-24 48
Abstract
This paper provides an overview of the most common methods and methods ofmeasuring dielectric permittivity for the study of liquid dielectrics. The advantages anddisadvantages of these directions are highlighted. The factors that need to be taken into accountwhen performing the study and ways to reduce their impact are considered. Based on theanalysis, the cell design and the method of measurement are proposed.
25-39 35
Abstract
Fullerene is currently attracting considerable attention from researchers because it hasmany applications in various fields. Fullerene molecules have unique structural, electronic andoptical properties that can be used to create optoelectronic devices. Currently, the use offullerenes in photodetectors is actively discussed in the scientific literature. In this regard, thisreview is devoted to organic photodetectors developed using fullerene nanostructures. The latestachievements in the field of fullerene-based organic photodetectors and their application inwireless optical communication systems in the visible wavelength range are considered.
Maxim Sergeevich Shushnov,
Tatyana Vladimirovna Shushnova,
Anna Mikhailovna Onoprienko,
Nadezhda Olegovna Abrosimova
40-55 32
Abstract
The article discusses the parameters of the Thiele-Small and the influence of theirdeviations on the amplitude-frequency characteristics of the bass-refleх speaker system.Particular attention is paid to the methods of practical determination of the equivalent volume oflow -frequency dynamic heads. The absolute accuracy of determining the equivalent volume for methods of additional mass and additional volume has been assessed. The measurement schemeis proposed by the method of additional volume and selection algorithm based on the results ofmeasurements of suitable specimens of low-frequency speaker. The settings of the optimizationproblem of selecting serial specimens or models of low-frequency speakers were performed.
56-63 25
Abstract
The article examines the changing technological ecosystem of young people inconnection with rapid transformations in the technological landscape. The statistics of 2024 onthe main trends in Russian media consumption in the field of video, messengers, socialnetworks, games and e-com are presented. The difference between the behavior of "digitalaborigines" and "digital migrants" in the digital environment is shown. The positive aspects ofthe use of social networks in various spheres of life of modern youth are listed. Special attentionis paid to the risks that social networks carry. The results of a study of youth exposure todestructive content are presented. The ways of forming an anthropological security strategy toneutralize cyber risks are outlined.
64-80 26
Abstract
The article presents a review and analysis of the main methods for synchronizing anOFDM signal using a cyclic prefix (CP) and a training symbol. The results of modelingsynchronization methods over the CPU are presented, and the effectiveness of the consideredmethods in the AWGN channel is shown. Recommendations are given to reduce the dispersionof the obtained estimates through the use of averaging. Methods of synchronization using atraining symbol are considered. A new structure of a training symbol weighted by a pseudo-random code and a method for estimating the time-frequency shift based on it are proposed. Thenew training symbol structure allows for more efficient joint estimation of the frequency andtime offset of an OFDM signal in an ITU-R M.1225 multipath communication channelcompared to the most well-known methods.
81-88 36
Abstract
A software package for automatic classification of aggressive vocabulary in unstructured texts in the information space is considered, taking into account the contextual analysis of statements at the lexical-semantic level and justification for the choice of a vectorizer and the most optimal classification for machine learning.
89-97 36
Abstract
The article presents the results of experimental studies of the relationship between thedegree of expression of fractal (self-similar) properties of the flow of application level events and network traffic in client-server information systems. Based on statistical analysis of networktraffic for various flows of application level events (data accesses), the dependence of thedegree of self-similarity in traffic on the degree of self-similarity in the flow of application levelevents was established.
Elizar Filaretovich Kustov,
Altana Felixovna Khutsaeva,
Anastasia Pavlovna Kiryanova,
Ivan Dmitrievich Ioganson,
Jean-Michel Nikodemovich Dakuo,
Sergey Valentinovich Bezzateev
98-111 64
Abstract
The paper explores approaches to ensuring information security using quantum keydistribution (QKD) in combination with classical cryptographic schemes: the Blom scheme,Key Distribution Pattern (KDP), and the Lagrange scheme. It demonstrates how quantumtechnologies enhance the security and efficiency of these methods. The proposed schemesprovide resilience against attacks by both classical and quantum computers, addressingvulnerabilities in traditional key generation methods. Examples of applications in secure IoTnetworks, cloud computing, and distributed systems are discussed. The results show that thecombination of QKD with cryptographic schemes is a promising solution for the post-quantum era.
ISSN 1998-6920 (Print)