Radi Petrov Romansky

Radi Petrov Romansky
Technical University of Sofia | TU · Department of Informatics (Faculty of Appl. Mathematics and Informatics) & Department of Electronics and Electroenergy (Technical College of Sofia)

Doctor of Science (D.Sc.) in Informatics and Computer Science

About

98
Publications
57,027
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
263
Citations
Citations since 2017
44 Research Items
227 Citations
20172018201920202021202220230204060
20172018201920202021202220230204060
20172018201920202021202220230204060
20172018201920202021202220230204060
Introduction
Technical Informatics; Computer Architectures and Computer Modelling; Privacy and Personal Data Protection; Information Security in Complex (Combined) Digital Environments for e-Learning; Cloud Computing & Privacy; etc.
Additional affiliations
March 2018 - present
"The Swiss Innovation Lab”, Swiss Innovation Valley
Position
  • Consultant
December 2015 - November 2019
Technical University of Sofia
Position
  • Vice Rector of Technical University of Sofia (Academic Staff and Coordination)
Description
  • Elected by the Academic Council of TU-Sofia
March 2013 - present
Center for Research and Analysis
Position
  • Consultant
Education
March 1982 - March 1986
Technical University of Sofia
Field of study
  • Computer Engineering
March 1979 - October 1980
Technical University of Sofia
Field of study
  • Applied Mathematics
October 1974 - March 1979
Technical University of Sofia
Field of study
  • Computer Engineering

Publications

Publications (98)
Article
Full-text available
E-business and its basic component e-commerce are components of the modern digital society. The application of contemporary information and communication technologies allows their establishment in social and economic life. The article presents an overview of the main features, models and approaches in building e-business and e-commerce systems. In...
Article
Full-text available
For the effective construction of a network infrastructure, it is recommended to carry out a preliminary investigation of communications and information processing by using suitable methods and tools. In this regard, the article deals with an approach applied in the investigation of network communications in a local network structure based on progr...
Article
Full-text available
Active learning is an alternative to traditional learning, using the capabilities of the global network to access remote information resources. The purpose of the article is to analyse the sources and factors of delay in the implementation of network services and the possibilities of access to distributed information objects depending on their size...
Article
Full-text available
The contemporary digital age is characterized by the massive use of different information technologies and services in the cloud. This raises the following question: “Are personal data processed correctly in global environments?” It is known that there are many requirements that the Data Controller must perform. For this reason, this article presen...
Conference Paper
Full-text available
The communications in a given network structure are related to the generation of network traffic and one possibility for its investigation is to conduct program monitoring with subsequent statistical processing of the registered data. The article presents a study of communication parameters of traffic based on measurement experiments in a universal...
Conference Paper
Full-text available
The performance of computer systems in the joint multiple processing of applications is an important system parameter, as the main role is played by the dispatching strategy. In this reason, this paper deals with investigation of parallel processes dispatching based on mathematical formalization and analytical modelling. Two cases based on the char...
Conference Paper
Full-text available
Computer modeling is one of the approaches for investigation of structures and processes. The main component in the model study is the generation of the input flow, which forms the workload of the system. A random number generator is usually used to model the incoming program units. In this regards, the purpose of the article is to present develope...
Article
Full-text available
The contemporary digital age is characterized by the significant informatization of society and the increasing role of technologies in people's lives, which leads to a change in their behaviour. This is related not only to social communications and free remote access to different information, but also to the virtualization and intellectualization o...
Article
Full-text available
Information servicing of remote client requests in a network environment is highly dependent on the regularity of the traffic and its parameters. With the development of modern digital technologies, the peculiarities of organizing processes to achieve high functionality and good performance with low loss of time and resources are increasing. This n...
Article
Full-text available
The contemporary information society has determined the main priority of digital technologies in maintaining the basic processes in society. It is often emphasized that the main feature of modern society is the accompaniment of information from organizational, commercial, social and legal innovations, including changes in business relations. This d...
Article
Full-text available
The digital era expands the scope and application of information technologies, which also affects the forms of e-learning, motivating the development of combined systems with heterogeneous resources and services, including in the cloud. In this vein, the present article investigates the implementation of a set of procedures for maintaining regulate...
Article
Full-text available
The main goal of the article is to investigate selected communication parameters at the access to remote resources in the digital spice. The goal is to analyse the possible losses in maintaining communication performance which is made based on preliminary mathematical formalization and organization of two types experiments – program monitoring and...
Article
Full-text available
Information security is an important part of the contemporary network world and is directly related to the protection of personal data. Various legal documents on the subject set out basic requirements for ensuring the privacy of users in the digital spice. The article presents a point of view for organization of an adequate data protection to impl...
Book
Full-text available
he contemporary digital age is characterized by the significant informatization of society and the increasing role of technologies in people's lives, which leads to a change in their behaviour. This is related not only to social communications and free remote access to different information, but also to the virtualization and intellectualization of...
Article
Full-text available
The investigation of characteristics of access and use of resources in different distributed environments in the network space is aimed at determining optimal levels for the basic parameters of the supported processes. On the other hand, the continuous informatization of society and the significant penetration of digital technologies in people's ac...
Article
Full-text available
The aim of the article is to review the development of the contemporary information society based on growing informatization of social processes and to systematize the main challenges for user's privacy and personal data protection. In this reason a brief overview of features of digital age based on the main privacy issues is made and the possible...
Conference Paper
Full-text available
The implementation of high-volume calculations requires the use of high-performance computer systems, incl. based on multiple processing in MIMD architectures. A group of representatives of this class of architectures are multicomputer systems (MIMD architects with Distributed Memory - DM MIMD), in which the connection of individual processor nodes...
Article
Full-text available
The main goal of dispatching strategies is to minimize the total time for processing tasks at maximum performance of the computer system, which requires strict regulation of the workload of the processing units. To achieve this, it is necessary to conduct a preliminary study of the applied model for planning. The purpose of this article is to prese...
Conference Paper
Full-text available
Contemporary digital world is based on information and communication technologies for remote access to distributed resources located in different nodes of the global network. Many of these resources are virtual and include technical equipment, program tools, data and other information objects, including personal data. In this respect, the protectio...
Article
Full-text available
The article deals with an approach for program description of procedures for information processing at a micro level in computer spice. The goal is to develop an example workspace with program modules for describing basic micro-operations which will allow conducting a program investigation of procedures for processor data processing. The TryAPL-2 o...
Article
Full-text available
Social interaction is a key feature of human society, and in today's digital world this is facilitated by new technological possibilities. Social communications are even more important in the context of the COVID-19 pandemic, but they must take into account the need to protect personal data and counteract the possible risk of privacy breaches. This...
Article
Full-text available
Informatization is not a new term, but it is at the basis of the information society, allowing through the continuous development of digital technologies to create new opportunities for its continuous improvement. New digital technologies of the 21st century have led to an update of the concept of informatization of society, but also revealed possi...
Article
Full-text available
In the digital age, the role of information technology and computer processes is growing. This requires refining the development of software by optimizing the communications between program components and seeking effective interaction in the implementation of processes. Complex module structures are usually developed, which require high compatibili...
Conference Paper
Full-text available
The contemporary Information Society is based on different digital technologies which are very useful in improving process efficiency, but can also have a negative impact on personal privacy. The purpose of this article is to present an organization of processes in a business system for access managing to different types of resources – public type...
Article
Full-text available
Digital age can be described as a collection of different technological solutions as virtual environments, digital services, intelligent applications, machine learning, knowledge-based systems, etc., determining the specific characteristics of contemporary world globalization, e-communications, information sharing, virtualization, etc. However, the...
Article
Full-text available
Contemporary digital age proposes different opportunities in the public, social, private, and business areas based on remote access to distributed resources placed in virtual, cloud, educational, governmental, business, smart, and so forth environments. In this reason, the e‐governance is realized on the basis of digital communications between diff...
Article
Full-text available
The article deals with technological organization and functional features of a combined e-learning environment based on social and cloud computing. Two subsystems are determined for user access and requests processing with discussion of the principles of access regulation to different information resources. The role of the e-learning management sys...
Conference Paper
Full-text available
The article discusses the organization of model investigation of processes for remote access to the information resources of an organization via the global network. The user as a web client could access the system through a web portal which will check the correct identify and will make registration if he/she is a new client. After this first phase...
Conference Paper
Full-text available
full text is available from http://infotech-bg.com/proceedings
Chapter
Full-text available
Globalization is an important characteristic of the digital age which is based on the informatization of the society as a social-economical and science-technical process for changing the information environment while keeping the rights of citizens and organizations. The key features of the digital age are knowledge orientation, digital representati...
Book
Full-text available
The monograph deals with principles of building computer systems based on various architectural models. Basic principles of classical architecture are presented, aimed at system performance and planning of independent processes. Main focus is on non-traditional computer architectures (pipeline, synchronous parallel architectures, multiprocessors an...
Article
Full-text available
The paper deals with some features of the network technologies in the contemporary digital word and possible problems for privacy and personal data protection of users. The first part of the article discusses the historical aspects of the Information Society creation (informatization as a process in the society) and of the first steps of the privac...
Conference Paper
Full-text available
The article discusses the development of a web based application for clarification of the specific requirements of the Regulation (EU) 2016/679 of the European Parliament and of the Council on the protection of natural persons with the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC, known as Gene...
Conference Paper
Full-text available
The aim of the article is to present the process of designing a web-based application to help understand and implement the new data protection regulation. Preliminary formalization of the designed product was carried out as well as a model investigation by using the Petri nets apparatus is made. The architecture and program realization of the appli...
Book
Full-text available
Книгата представя един преглед на техническите аспекти при реализация на компютърната обработка на информацията и нейната организация в съвременни компютърни среди с универсално приложение. Материалът е структуриран в шест глави, като обхваща проблеми от същността и задачите на информатиката като наука и практика, историческите предпоставки за нейн...
Chapter
Full-text available
Globalization in the contemporary information society outlines new important challenges in privacy and personal data protection that apply to user security in cyberspace. This is also the case e-learning environments, which use new network technologies, such as remote access, distributed processing, information sharing, cloud services, social compu...
Chapter
Full-text available
The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning en...
Conference Paper
Full-text available
The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors’ proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A forma...
Article
Full-text available
This paper is a summary on the opportunities of the contemporary digital environments and proposed services in the network world and discusses some important challenges for the users' privacy and security. The cyber security and personal data protection are important themes discussed in different levels, including European Commission, US Department...
Conference Paper
Full-text available
The purpose of this article is to summarize some specific features of the contemporary digital world and the relation of the new network technologies to the privacy and protection of the individual's life. A brief survey of the actual opportunities of the global network as e-services, cloud and social computing, Internet of Things (IoT), Machine to...
Article
Full-text available
The paper deals with challenges that the contemporary digital technologies should bear in mind to ensure security and privacy for the users creating their personal profiles and processing their personal data. A survey of related works is made based on the references and several important challenges for privacy have been pointed out. The purpose of...
Article
Full-text available
Architecture of combined system for e-learning: model investigation of the processes for protecting information resources. The goal is to present some results from an investigation of the processes for secure access to the information resources in a combined e-learning system. The system is based on two types resources – internal (stored in own mem...
Article
Full-text available
The goal of this article is to introduce an idea for organization of security procedures in a corporative system for accessing and processing different information resources and personal data. Three types of resources could be organized in a business information environment – public (without access restriction or rules), private internal (stored in...
Book
Full-text available
Link for sale: https://www.morebooks.de/store/gb/book/information-servicing-in-distributed-learning-environments/isbn/978-3-330-02932-3; Abstract: The distributed learning (DL) is a model that permits to organize different learning and information resources in a heterogeneous environment with local management. This assumes distributed access to r...
Article
Full-text available
The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning en...
Article
Full-text available
This article discusses several core aspects of security system organization which are able to guarantee efficient protection of corporative resources. These resources could be stored in a common case as an internal subsystem. Recently many enterprises prefer to store them in data centres relying on cloud services. Nevertheless which one of these tw...
Article
Full-text available
This article discusses organization of an extended subsystem for information security which is accomplished with analysis of cloud computing and data centers used by business to store corporative information resources. It is pointed out that the IT security policy should apply adequate technical and organizational measures for personal data protect...
Article
Full-text available
Contemporary Information Society proposes variety of opportunities for communication between users (social networks & social media), different activities and services (cloud computing and mobile cloud computing), sharing information and remote access to distributed resources (blogs & microblogs, data centres, etc.). These functionalities are the fu...
Article
Full-text available
The contemporary digital world based on the global network proposes different opportunities for remote access to distributed environments and shared information, dissemination of specific content, communication between real or virtual users, using cloud services, implementation social contacts, etc. Many of these activities are connected to creatio...
Conference Paper
Full-text available
The paper presents an investigation of secure access to resources and personal data at combined e-learning environment. Conceptual model of the structure is designed after formalization based on state transition diagram. The proposed approach is based on the Markov chain (MC) theory so in this connection analytical definition of Markov model is pre...
Conference Paper
Full-text available
The paper deals with basic principles of information security and privacy that should be taken into account in e-learning environment based on internal and external resources. The idea is to combine traditional e-learning technologies with new opportunities that give mobile applications, cloud service and social computing. These technologies can en...
Conference Paper
Full-text available
Privacy is a fundamental human right of individuals and personal data protection occupies the main part in it. Since the contemporary digital world creates new challenges for information security an e-learning system must follow basic rules ensuring privacy. In this reason the aim of secure access to all resources of an e-learning environment is ve...
Book
Full-text available
A survey of the basic principles and special features of contemporary information technologies (IT) and opportunities for application at business processes organization is made. The book deals with the opportunities of the Information Society presented by global network environments and services (IoT, cloud and social computing, etc.), and IT for a...
Article
Full-text available
The Information Society has created different possibilities for remote access to distributed information resources and communications between users (virtual environments, cloud services, social media, etc.). All these aspects of the globalization make users create their own profile with personal data and publish personal information. Are this data...
Chapter
Full-text available
This draft discusses the features and functions that the Internet must support in order to be as robust and trustworthy as the public switched telephone network (PSTN, http://en.wikipedia.org/wiki/ Public_switched_telephone_network). In general the PSTN-like features and functions include verifiable addressing and numbering, higher privacy and secu...
Conference Paper
Full-text available
Article
Full-text available
article presents some technological aspects of the design of mobile payment system (MPS) as a preliminary phase in the life cycle of software development. Some models for m-payments are summarized and services for mobile communications are discussed. Generalized organization of communications in MPS is presented and formalization of two types of pr...
Conference Paper
Full-text available
Proceedings of the International Scientific Conference UNITECH’13 (ISSN 1313-230X), 22-23 November 2013, pp. II-223 – II-228
Article
Full-text available
The goal of each investigation in the computer area is to optimize the correlation " performance-cost ". The computer structures and processes could be formalized as a collection of different finite sets (system resource) and by stochastic flow for the workload. In this reason a hierarchical procedure for evaluation is discussed and its formal desc...
Book
Full-text available
Книгата предлага един преглед на приложните аспекти на компютърната обработка на информацията и нейната организация в съвременни компютърни среди за общо ползване. Ориентирана е към компютърната организация на информационната обработка и приложните аспекти на компютърните изчисления. Обсъждат се същността и задачите на информатиката като наука и пр...
Article
Full-text available
This article discusses the problem of an evaluation of the remote access to the resources of a Virtual Research Lab (VRL) and information servicing investigation by using queuing model and program simulation. In particular, 3D medium as a component (module) of the VRL is discussed. A formalization of the processes is presented and a queuing model i...
Article
Full-text available
The privacy is an acknowledged right, included in the personal data protection. The increasing role of the information and communication technologies in the new network (information) society determines new requirements to the personal data processing and protection. Cloud computing, with it positive sides, collects more and more personal informatio...
Article
Full-text available
The modelling is a suitable approach to investigate performance factors of computers systems for different applications, but any general formalization of the process should be defined. In this reason, a generalized formal procedure for investigation of discrete systems by using modelling is proposed in the article. The formalization is made based o...
Book
Full-text available
В книгата е направен преглед на основните принципи и особености на съвременните информационни технологии (ИТ) и възможностите за тяхното приложение при организация, провеждане и управление на бизнес-процесите. Представеният в книгата материал обхваща основните направления на развитие на съвременното информационно общество и свързаните с това технол...
Article
Full-text available
This article discusses the problem of an evaluation of the remote access to the resources of a Virtual Research Lab (VRL) and information servicing investigation by using queuing model and program simulation. The results presented here are the final part of general investigation of proposed architecture of the VRL developed in the frame of two year...
Article
Full-text available
The purpose of the virtual laboratory is to propose an intellectual space for organization of the on-line work in specialized field of knowledge. The research presented in this paper is linked with the research carried out within the frame work of a two year scientific project. The main goal of the project team is to develop a Virtual Research Labo...
Article
Full-text available
The paper discusses the problem of building a Virtual Research Laboratory in the field of electronic and computer technologies and in particular the organization of simulation investigation of the proposed architecture of the future distributed environment. The background and the main purpose of this investigation are presented. Queuing models are...
Conference Paper
Full-text available
The virtual laboratories unite different e-learning resources, knowledge and research technologies in common environment in order to obtain new knowledge and carry out experimental work. There are different virtual laboratories in the web world, but our idea is to build international environment for scientific research and e-learning in the field o...
Conference Paper
Full-text available
The paper presents a web-based information system for registration and exchange of digital documents. The main goal of the system is to give a friendly user interface for easy work with basic functions and rapid access to system modules without re-loading of pages. Technologies based on Java and Oracle DB 10g are used for program system realization...
Article
Full-text available
The distributed learning is a model that permits to the different components of the learning process to be situated in the different places of the Internet based educational environment. This assumes distributed access to remote learning resources and using different information blocks from the nodes. In this reason the architectural design of such...
Conference Paper
Full-text available
http://infotech-bg.com/proceedings
Article
Full-text available
The distributed learning is an instructional model that allows instructor, students, and content to be located in different nodes in the global network. The authors’ main idea is to organize a distributed learning environment (DLE) based on information and communication resources of global network in combination with the technologies for virtual re...
Book
Full-text available
Книгата е посветена на принципите при изграждане на компютърни системи на базата на различни архитектурни модели. В този смисъл са разгледани основни компютърни архитектури за организация на последователни, конвейерни, паралелни и разпределени системи. Информацията е структурирана на базата на примерна класификация на системите за обработка на инфо...
Book
Full-text available
Книгата представлява монография за принципите и технологичните проблеми при изграждане на компютърни модели с прилагане на различни методи на базата на единен организационен подход. Направена е класификация на използваните в компютърната област методи за моделиране и е представен формализиран обощен подход за провеждане на моделно изследване. Матер...
Conference Paper
Full-text available
The communications in a network medium depend on the time parameters for access realization and channel occupation. The total communication time has a stochastic nature and an investigation could give assessments for traffic optimization and performance increasing. In this reason, the paper presents an organization of the experiments for network co...
Conference Paper
Full-text available
E-learning processes as a part of a global Information Society (IS) is the main idea, discussed here. Legal frames of e-learning and contemporary requirements for application in e-governance are at the root of the paper. The place of e-learning in this frame is marked and an educational framework is defined. The purpose is to present a practical ap...
Conference Paper
Full-text available
The paper deals with basic security procedures in e-learning systems, which are at the root of data control when a testing subsystem is applied for real estimation of students' knowledge via the Internet. On the basis of identification and authorization schemes, presented hear, each user could be defined independently and at the same time, it is po...
Conference Paper
Full-text available
The paper deals with some educational problems concerning automation of the stochastic modeling and computer systems investigation by using Markov's chains. A specialized educational program environment for mathematical description and analytical solution is designed. The purpose of this system is to describe stochastic processes realized in differ...
Article
Full-text available
The purpose of the paper is to propose a system for self-learning system and checking what students know using different modes of testing via the Internet. The system is realized on the basis of "client-server" technology and deals with three main categories of users with their own access rights. The testing system is designed to work not only via...
Conference Paper
Full-text available
The paper deals with a simulation investigation of a Shared Memory MIMD (SM MIMD) architectural model based on the multistage interconnection network (MIN). The Omega topology for interconnection of the units in the object of the investigation is used. The organization of simulation experiments and evaluation of the basic performance characteristic...
Conference Paper
Full-text available
The purpose of the technical solution is to offer network infrastructure, which is able to meet the requirements of Bulgarian data protection authority for number of users, network traffic for general purposes and special applications, reliability, flexibility, good performance and security.
Conference Paper
Full-text available
The paper deals with some European initiatives for e-Learning as a part of the e-Governance and necessity of information and communication technologies implementation to ensure high level of digital (electronic) servicing. The global information society should be developed and all components of the e-Governance should be united in a common environm...
Conference Paper
Full-text available
1. Introduction The successful management of information processes and distributed servicing in a network medium could be helped by some information about different systems parameters [1]. A good method for obtaining this information is performance indexes measurement, including program monitoring of servicing in TCP/IP based networks [2,3,4]. The...
Article
Full-text available
The advanced computer architectures use two basic approaches to solve problem decision of difference between communication part in processing work and desired level of the system performance – time minimization for instruction phases realization and cache prefetching of data blocks. The paper deals with a possibility for stochastic modeling and inv...
Article
Full-text available
The paper deals with some European initiatives for e-Learning as a part of e-Governance and necessity of information and communication technologies implementation to ensure high level of digital (electronic) servicing. Global information society should be developed and all components of e-Governance should be united in a common environment. The mai...
Article
Full-text available
1. Introduction The array multiprocessor architectures have the property of regularity, enabling a low-cost VLSI implementation, flexible structure and simple control of the execution and communication processes. In this reason the array architecture can be adapted to many applications to achieve high-speed computations (systolic, wave, dataflow, e...
Article
Full-text available
El trabajo que a continuación les presentamos pertenece a una de las Actas del Primer Taller Internacional de Trabajo sobre e-Gobierno y Protección de Datos celebrado en Bulgaria el pasado 23 de septiembre bajo el patrocinio del Ministerio de Administración del Estado de la República de Bulgaria.
Conference Paper
Full-text available
Because the computer processes have a stochastic nature the Markov models are suitable for their mathematical description and analytical investigation. This paper deals with a possibility for analytical description of the system availability using continuous-time Markov chain and evaluation of the reliability level. Two stochastic models for sequen...
Conference Paper
Full-text available
The objective of this paper is to present the application of simulation techniques for organization of experiments for performance investigation of the distributed information servicing. The paper considers the simulation framework, which allows estimating the effectiveness of different approaches for request routing for resource discovering in the...
Conference Paper
Full-text available
This paper examines some aspects of the information servicing in a distributed information-learning environment called DILE. The problems concerning the educational and informational resources sharing between the dispersed users and a resource discovery mechanism in the context of the distributed resource sharing environments are discussed. We pres...
Article
Full-text available
The gap between processor and memory speed appears as a serious bottleneck in improving the performance of the current computers architectures. The prefetch methods appear as one of the most promising way for filling this gap. The known prefetch methods do not distinguish the prefetched data based on their locality in the virtual memory and thus th...
Conference Paper
Full-text available
In this paper is described novel approach for prefetching of stack references. In proposed method the decision which blocks to be prefetched is based on the context of current procedure. The results clearly point that we can effectively prefetch the stack memory references, we have around 50.82% of miss rate reduction compared to the standard N blo...
Book
Full-text available
The book discuses some basic problems of the computer processing organization and use of technical means for presentation, processing, storing and using information in contemporary computer environments. (text bиin the book is in Bulgarian)
Book
Full-text available
The book discuses basic cases and principles of presentation and processing of information in computer systems, the general functional organization of computer environments and application of software in system and applied levels. (text is in Bulgarian)
Book
Full-text available
The book includes two parts - information technologies for development of applications and information systems and architectural features of computer networks and network applications, including information security and e-business / e-commerce. (text in the book is in Bulgarian)

Network

Cited By