Pavel Petrov - Academia.edu (original) (raw)
Papers by Pavel Petrov
International online journal of primary education, Mar 8, 2024
International journal of interactive mobile technologies, Feb 9, 2024
2020 55th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)
The purpose of the paper is research and development of font visual classification system, that w... more The purpose of the paper is research and development of font visual classification system, that will allow users to work with fonts more effectively, specifically with the use of the required font fetching on pre-screening, employment of the wide range of filters and font management tools application.There were reviewed basic fonts classification approaches with the definition of pivot advantages and disadvantages. After assessing these approaches, it was decided to deploy neural network with the font symbols images as an input.As a result, neural networks driven computer fonts classification system, that allows to classify fonts by slope, basic style and weight according to their graphical representation, was developed and integrated into the font organizer. High classification accuracy of the developed neural network model was confirmed by control tests. Percentage of correctly classified fonts during the system testing reaches 91% in determining weight, 92% in determining basic style, 96% in determining slope. The developed system can be applied to tasks of fonts classification solution as supplement for digital documents structure determination, and as system of font selection for design creation.
Journal of Software, 2018
TEM Journal, Nov 26, 2023
International Journal of Online and Biomedical Engineering (iJOE)
The backup and restore operations are essential part of database system's administration proc... more The backup and restore operations are essential part of database system's administration process. Usually, the size of the database is a major factor that determines numerous practical issues, among which is what backup and recovery methods to be used. However, in addition, there are various types of storage systems (repositories) available in MySQL 8.0, for example MyISAM, Merge, Memory, InnoDB, CSV, Blackhole, Archive and Federated, which in general sense determine how to store each table into at least one file. Each of these storage systems have their own positive and negative characteristics, so when constructing logical archives, it is vital to compare the performance of those various types of repositories.
International Journal of Emerging Technologies in Learning (iJET)
Capacity planning of the infrastructure is a difficult task performed during the virtualization o... more Capacity planning of the infrastructure is a difficult task performed during the virtualization of the IT infrastructure. It is the planning of the necessary hardware to which the existing systems will be transferred, and later the future systems that will work in a virtualized environment. Infrastructure capacity planning in digitalization of educational services is a process in which the IT infrastructure is needed to meet not only the current workload but also the future workload and to follow further requirements. In case the process of planning is well performed, it could more fully support the development of emerging technologies in learning. The traditional IT infrastructure, bound by the physical limitations of the devices, does not meet the requirements for flexible changes, for quick recovery after a problem. This leads to difficult management, to weaknesses in the implementation of educational processes. Virtualization could solve most of these problems for modern IT infr...
ICERI2018 Proceedings, 2018
International Journal of Emerging Technologies in Learning (iJET)
When delivering digitalization of educational services, a specific administration plan should be ... more When delivering digitalization of educational services, a specific administration plan should be established, designed for maximum access, quick recovery from failure, and lowering the length of time it is unavailable, all while guaranteeing good security performance. It should include responsibilities such as providing dedicated servers for digitizing educational services, increasing security by using encryption and security-compliant network protocols, and database administration. To speed up the digitization of educational services, it is recommended that all databases be placed on a single server that will serve as the publisher, and that separate databases be distributed to three different servers that will act as the subscribers.
Ikonomika i Kompûtʺrni Nauki, 2020
The purpose of the article is to consider the issues related to one of the main points in the dev... more The purpose of the article is to consider the issues related to one of the main points in the development of software systems for creating interaction scenarios. The scope of the research includes the approaches in software development - classical and modern, defining the scope of the software system and the business scenarios for interaction with the system. The methods used in the research are analysis and synthesis of different points of view in the literature. The main achievements of the development are that an overview of the research on the topic has been made and an option for creating business scenarios for interaction with the system in a technology start-up company has been proposed. The practical significance of the work is that a practical solution has been proposed in an area that is relatively poorly researched. The main conclusions are that a significant point in designing a software system is the business scenario for interaction with the system, which reflects the ...
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018
The publication presents the results of empirical research on web technologies used in the home p... more The publication presents the results of empirical research on web technologies used in the home pages of the Finland commercial banks authorized under Finland Legislation to carry on commercial banking business and supervised by the Finland Financial Supervisory Authority (FIN-FSA). The home pages of 9 commercial banks were studied. Our survey reveals details about the proportion of the web technologies used in the respective web sites. The mean home page size is around 2.5 MB (±3.7 SD, median - 1.3) and the share of the images is around 41%. The share of the other web components is as follows: JavaScript programs - around 35%, CSS files - 10%, Font files - 7%. The size of the main HTML file is only 7% of the size of whole web page. The mean total number of requests that the web browser makes in order to display the home page is around 64 separate requests - 23 requests for images, 19 for JavaScript, 7 for CSS files, 6 for Font files. Only one of the surveyed web sites is using HTTP...
JOURNAL OF THE UNION OF SCIENTISTS - VARNA, ECONOMIC SCIENCES SERIES, 2018
In this publication, the collected data in the course of a survey are summarized, systemized and ... more In this publication, the collected data in the course of a survey are summarized, systemized and analyzed. The survey is conducted in the autumn of 2018 and is focused on the usage of the HTTPS protocol in the public web sites of Serbian banks. The scope of the survey is limited only to the public site of the particular bank and 27 web sites were explored. All of them belong to Serbian banks, which are licensed by the National Bank of Serbia. The HTTPS protocol in the last years is used as the default protocol by many web applications. The study shows that from all 27 Serbian banks licensed by the Serbian National Bank, 81.5% (22 banks) of the surveyed bank's sites are using HTTPS without problems, 11.1% (3 banks) are using HTTPS with some problems and 7,4% (2 banks) are not using HTTPS at all. From banks that are using HTTPS without any problems, the majority - 72.7% (16 banks) use simple Domain Validation (DV), and the rest - 27.2% (6 banks) use Extended Validation (EV) types ...
The article deals with the stability of a new class of continuous-discrete systems - fuzzy linear... more The article deals with the stability of a new class of continuous-discrete systems - fuzzy linear hybrid impulse automata. Sufficient conditions of stability are obtained. Stability and stability resistance on the part of variables are proved. The cases of cyclic are described. Research conducted by the method of Lyapunov’s functions.
2016 Third International Conference on Artificial Intelligence and Pattern Recognition (AIPR), 2016
In this article the effectiveness of one of the main methods for assisting the information search... more In this article the effectiveness of one of the main methods for assisting the information search in large data sets is analyzed, namely the method based on the social approach. This method analyzes the behavior of multiple users when searching for information, particularly the keywords they use. Based on the obtained results, the relevant algorithms in the searching engines of the organizations can be optimized. The studies are based on data extracted from the databases of two relatively large information systems based at the University in Library Studies and Information Technologies in Sofia, Bulgaria and University of Economics in Varna, Bulgaria. The numerical and experimental results are analyzed and discussed.
International online journal of primary education, Mar 8, 2024
International journal of interactive mobile technologies, Feb 9, 2024
2020 55th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST)
The purpose of the paper is research and development of font visual classification system, that w... more The purpose of the paper is research and development of font visual classification system, that will allow users to work with fonts more effectively, specifically with the use of the required font fetching on pre-screening, employment of the wide range of filters and font management tools application.There were reviewed basic fonts classification approaches with the definition of pivot advantages and disadvantages. After assessing these approaches, it was decided to deploy neural network with the font symbols images as an input.As a result, neural networks driven computer fonts classification system, that allows to classify fonts by slope, basic style and weight according to their graphical representation, was developed and integrated into the font organizer. High classification accuracy of the developed neural network model was confirmed by control tests. Percentage of correctly classified fonts during the system testing reaches 91% in determining weight, 92% in determining basic style, 96% in determining slope. The developed system can be applied to tasks of fonts classification solution as supplement for digital documents structure determination, and as system of font selection for design creation.
Journal of Software, 2018
TEM Journal, Nov 26, 2023
International Journal of Online and Biomedical Engineering (iJOE)
The backup and restore operations are essential part of database system's administration proc... more The backup and restore operations are essential part of database system's administration process. Usually, the size of the database is a major factor that determines numerous practical issues, among which is what backup and recovery methods to be used. However, in addition, there are various types of storage systems (repositories) available in MySQL 8.0, for example MyISAM, Merge, Memory, InnoDB, CSV, Blackhole, Archive and Federated, which in general sense determine how to store each table into at least one file. Each of these storage systems have their own positive and negative characteristics, so when constructing logical archives, it is vital to compare the performance of those various types of repositories.
International Journal of Emerging Technologies in Learning (iJET)
Capacity planning of the infrastructure is a difficult task performed during the virtualization o... more Capacity planning of the infrastructure is a difficult task performed during the virtualization of the IT infrastructure. It is the planning of the necessary hardware to which the existing systems will be transferred, and later the future systems that will work in a virtualized environment. Infrastructure capacity planning in digitalization of educational services is a process in which the IT infrastructure is needed to meet not only the current workload but also the future workload and to follow further requirements. In case the process of planning is well performed, it could more fully support the development of emerging technologies in learning. The traditional IT infrastructure, bound by the physical limitations of the devices, does not meet the requirements for flexible changes, for quick recovery after a problem. This leads to difficult management, to weaknesses in the implementation of educational processes. Virtualization could solve most of these problems for modern IT infr...
ICERI2018 Proceedings, 2018
International Journal of Emerging Technologies in Learning (iJET)
When delivering digitalization of educational services, a specific administration plan should be ... more When delivering digitalization of educational services, a specific administration plan should be established, designed for maximum access, quick recovery from failure, and lowering the length of time it is unavailable, all while guaranteeing good security performance. It should include responsibilities such as providing dedicated servers for digitizing educational services, increasing security by using encryption and security-compliant network protocols, and database administration. To speed up the digitization of educational services, it is recommended that all databases be placed on a single server that will serve as the publisher, and that separate databases be distributed to three different servers that will act as the subscribers.
Ikonomika i Kompûtʺrni Nauki, 2020
The purpose of the article is to consider the issues related to one of the main points in the dev... more The purpose of the article is to consider the issues related to one of the main points in the development of software systems for creating interaction scenarios. The scope of the research includes the approaches in software development - classical and modern, defining the scope of the software system and the business scenarios for interaction with the system. The methods used in the research are analysis and synthesis of different points of view in the literature. The main achievements of the development are that an overview of the research on the topic has been made and an option for creating business scenarios for interaction with the system in a technology start-up company has been proposed. The practical significance of the work is that a practical solution has been proposed in an area that is relatively poorly researched. The main conclusions are that a significant point in designing a software system is the business scenario for interaction with the system, which reflects the ...
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018
The publication presents the results of empirical research on web technologies used in the home p... more The publication presents the results of empirical research on web technologies used in the home pages of the Finland commercial banks authorized under Finland Legislation to carry on commercial banking business and supervised by the Finland Financial Supervisory Authority (FIN-FSA). The home pages of 9 commercial banks were studied. Our survey reveals details about the proportion of the web technologies used in the respective web sites. The mean home page size is around 2.5 MB (±3.7 SD, median - 1.3) and the share of the images is around 41%. The share of the other web components is as follows: JavaScript programs - around 35%, CSS files - 10%, Font files - 7%. The size of the main HTML file is only 7% of the size of whole web page. The mean total number of requests that the web browser makes in order to display the home page is around 64 separate requests - 23 requests for images, 19 for JavaScript, 7 for CSS files, 6 for Font files. Only one of the surveyed web sites is using HTTP...
JOURNAL OF THE UNION OF SCIENTISTS - VARNA, ECONOMIC SCIENCES SERIES, 2018
In this publication, the collected data in the course of a survey are summarized, systemized and ... more In this publication, the collected data in the course of a survey are summarized, systemized and analyzed. The survey is conducted in the autumn of 2018 and is focused on the usage of the HTTPS protocol in the public web sites of Serbian banks. The scope of the survey is limited only to the public site of the particular bank and 27 web sites were explored. All of them belong to Serbian banks, which are licensed by the National Bank of Serbia. The HTTPS protocol in the last years is used as the default protocol by many web applications. The study shows that from all 27 Serbian banks licensed by the Serbian National Bank, 81.5% (22 banks) of the surveyed bank's sites are using HTTPS without problems, 11.1% (3 banks) are using HTTPS with some problems and 7,4% (2 banks) are not using HTTPS at all. From banks that are using HTTPS without any problems, the majority - 72.7% (16 banks) use simple Domain Validation (DV), and the rest - 27.2% (6 banks) use Extended Validation (EV) types ...
The article deals with the stability of a new class of continuous-discrete systems - fuzzy linear... more The article deals with the stability of a new class of continuous-discrete systems - fuzzy linear hybrid impulse automata. Sufficient conditions of stability are obtained. Stability and stability resistance on the part of variables are proved. The cases of cyclic are described. Research conducted by the method of Lyapunov’s functions.
2016 Third International Conference on Artificial Intelligence and Pattern Recognition (AIPR), 2016
In this article the effectiveness of one of the main methods for assisting the information search... more In this article the effectiveness of one of the main methods for assisting the information search in large data sets is analyzed, namely the method based on the social approach. This method analyzes the behavior of multiple users when searching for information, particularly the keywords they use. Based on the obtained results, the relevant algorithms in the searching engines of the organizations can be optimized. The studies are based on data extracted from the databases of two relatively large information systems based at the University in Library Studies and Information Technologies in Sofia, Bulgaria and University of Economics in Varna, Bulgaria. The numerical and experimental results are analyzed and discussed.