Математика и Информатика

https://doi.org/10.53656/math2024-1-6-art

2024/1, стр. 82 - 93

ARTIFICIAL INTELLIGENCE FOR GOOD AND BAD IN CYBER AND INFORMATION SECURITY

Nikolay Kasakliev
OrcID: 0000-0003-4010-144X
E-mail: kasakliev@uni-plovdiv.bg
Department of Computer Science
Faculty of Mathematics and Informatics
University of Plovdiv “Paisii Hilendarski”
4000 Plovdiv Bulgaria
Elena Somova
OrcID: 0000-0003-3393-1058
E-mail: eledel@uni-plovdiv.bg
Department of Computer Science
Faculty of Mathematics and Informatics
University of Plovdiv “Paisii Hilendarski”
4000 Plovdiv Bulgaria
Margarita Gocheva
OrcID: 0000-0002-7739-5915
E-mail: gocheva@uni-plovdiv.bg
Department of Computer Science
Faculty of Mathematics and Informatics
University of Plovdiv “Paisii Hilendarski”
4000 Plovdiv Bulgaria

Резюме: The contemporary digital world handles tremendous of data, which are exposed to a variety of security threats. IT are responsible for the protection of information systems, devices, privacy of the collected data. The paper presents a literature review of cial intelligence (AI) usage in information/cyber security. The main accent set to the security threats and vulnerabilities. Some recommendations been identified to increase the level of information security.

Ключови думи: artificial intelligence; information security; cyber security; security threats

1. Introduction

The digital world gives us constant connectivity across multiple channels and brings with it incredible amounts of transferred data and new forms of data management. As a result, people are constantly being monitored while consuming products, services, and content (Zarsky 2019). These possibilities have given rise to a variety of concerns, which include the protection of information systems, devices, networks, privacy of the collected data, and how they are stored and accessed. To address these concerns IT professionals use measures for information security or cyber security. These branches of computer science are similar but have some specifics.

Information security considers the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to ensure confidentiality, integrity, and availability (Nieles 2017). Cyber security is the practice of securing networks, devices, and data against unauthorized access or illegal usage, as well as the art of maintaining information confidentiality, integrity, and availability whereas cyber defensive mechanisms emerge at the application, network, host, and data levels (Zhang et al. 2022). No matter which aspect is considered, there is certainly an overlap between the two concepts, especially in data protection. According to the National Institute of Standards and Technology (NIST), cyber security is a type of information security, but the two fields are not identical. For example, while information security affects data in print, electronic, or any other form, cyber security refers to only digital or electronic information or data. Therefore, in this study we will discuss security threats that affect both fields.

In recent years, threats to data have increased so much that people and systems have difficulties responding in time to cyberattacks, and therefore a new approach must be taken to improve protection. Today, many software security tools already use AI for incident response, disruption prediction, and performance monitoring. AI is a technology that can learn, understand, and act on the information it receives. It can identify and prioritize risks, enabling security professionals to instantly identify malware on their networks and develop an incident response strategy (Toxirjonovich 2022). (Alhayani et al. 2021) conclude that AI is an effective activity for reducing the impact of cyberattacks.

The main goal of the paper is to present a literature review of the AI usage in information/cyber security. Section 2 shows the research methodology. The main accent is set to the security threats and vulnerabilities as those using AI are discussed mostly in Section 3. The paper ends with a discussion and conclusion of the research (Section 4 and Section 5).

2. Methodology

The methodology of this research was to examine the state-of-art in the area of AI applications in Information/cyber security in two directions – first, security problems in software systems/applications, and second, technological realization of security threats and vulnerabilities.

The research questions to guide the search and analysis of the literature were defined:

RQ1. What are the main security problems in different software systems/applications?

RQ2. What are the major security threats and vulnerabilities faced by AI-powered applications and their technical realization?

RQ3. What are the protective AI approaches and tools in the domain of cyber security?

To collect the research papers, the following criteria were established:

• To use different academic search engines such as Academia.edu, ResearchGate, Google Scholar, and Semantic Scholar.

• Since this scientific field is relatively new, Internet pages with articles on the subjects should also be reviewed.

• The keywords to be searched for are: “AI”, „Cyber threats“, “Cyber security” and “Information Security”.

• Only papers published in the last ten years are selected.

• Only publications written in English are included in this review.

3. AI in cyber security

According Europarl1 AI is the ability of a machine to display human-like capabilities such as reasoning, learning, planning and creativity. As mentioned in (Fetzer 1990) the problem of easy defining has two parts – artificial and intelligence, since securing an adequate grasp of the nature of the artificial would do only as long as we were already in possession of a suitable understanding of the idea of intelligence.

AI is the science and engineering of making intelligent machines, especially intelligent computer programs or systems of all kinds (Adamopoulos et al. 2023). Despite the rapid development, there is a debate as to whether today’s AI systems are capable of thinking and feeling like a humans. A former Google expert claims that the Gemini chatbot is sentient due to the emotions that it expresses reliably and in the right context. Other experts claims that we are far away from the development of artificial general intelligence (AGI) or even that this is in principle impossible (Fjelland 2020). It is related to the task of using computers to understand human intelligence, but AI does not have to confine itself to biologically observable methods (McCarthy 2007).

Over the years, vast amounts of information have been collected to provide correct analysis and predictions (Yang et al. 2023). The development of AI is reaching critical points, increasing the influence of technologies related to virtual and augmented reality and integrating smart tools into various services, objects, and applications. These technologies are neural networks, big data, machine learning, data mining, computer vision, algorithms, and models (Marinov 2017).

3.1. The usage of AI for good and bad

Nowadays, the number of cyberattacks has increased both on different devices (enterprise, desktop, mobile, and IoT) and of different types (computer viruses, DDoS attacks, data breaches, cyberterrorism, phishing, etc.) – see for example Panda security2 .

In the past few years, cybersecurity researchers have started to explore AI approaches to improve cybersecurity. AI technologies, such as machine learning, can be used in cybersecurity to construct smart models for implementing malware classification, intrusion detection and threatening intelligence sensing (Li 2018). Machine learning algorithms are trained using vast amounts of data, including historical threat data and data from the network and endpoints, to identify patterns that are difficult for humans to recognize (Moisset 2023). There is a concern that machine learning methods can easily be manipulated by providing deceptive input, known as adversarial attacks.

By continuously monitoring and analysing patterns, AI algorithms can detect deviations that may indicate potential threats, such as unauthorized access or abnormal user activities (Masum 2023). Likewise, cybercriminals are also using AI to launch increasingly sophisticated cyberattacks while hiding their tracks (Zeadally et al. 2020).

3.2. Main security problems in different applications

Security threats and vulnerabilities appear in different software systems/ applications.

1) Technology based Social engineering. Social Engineering (SE) is considered to be one of the most common problems facing information security today because attacks can be detected but not stopped (Salahdine 2019). SE is a manipulation technique that exploits human error to gain private information, access protected systems, spread malware, or other dangerous activity. SE attacks have many technology-based forms: phishing, vishing, baiting, and pretexting which can be enhanced by the power of AI.

2) Artificial Intelligent Chatbots Usage. One of the applications of AI is the creation of bots. A bot is a computer program that operates as an agent for a user or other program to simulate a human activity (Ukov 2022), while chatbots are computer programs designed only to simulate human conversation (text or speech) through AI, natural language processing, and machine learning technologies (Adamopolou 2020).

Chatbots can be Informative, Conversational, Task-based, and Rule-based (Adamopolou 2020). Today the most popular chatbots are ChatGPT, Google Bard, and Jasper Chat based on Generative AI, which use algorithms to generate new outputs based on the data they have been trained on (Routley 2023).

Chatbots face various security threats, including malicious input, user profiling, contextual attacks, and data breaches. Cybercrime has many aspects and problems in chatbots and can evolve into activities like intellectual property, stealing an identity, violating someone’s privacy, data theft, malware development, phishing, vishing, spam, and misinformation (Bossler 2019). An example of intellectual property infringement is that ChatGPT can now generate Windows 10 and 11 keys for free (Tech desk 2023).

3) Political information security issues. The impact of AI on politics3 will be profound or even can create political upheaval (Gallego 2022). AI may potentially be used to create incredibly persuasive deep fake videos, audio recordings and written content that has the potential to disseminate inaccurate information, fabricate false news stories, and manipulate public sentiment (Thompson 2023).

Some researchers speculated that the ease with which a huge number of texts can be produced to support a political thesis, even an unfounded or a tendentious one, may multiply the manipulation of public opinion (Farina 2023).

The use of AI in politics has its positives. AI systems have the potential to increase political legitimacy by identifying pressing societal issues, forecasting potential policy outcomes, and evaluating policy effectiveness (Starke 2020). Another study finds that it is not easy to predict whether the development of AI-based technologies will radically change the existing political paradigm, but it could empower more diffused forms of political participation beyond elections (Savaget et al. 2019).

4) Disruption of the Information Infrastructure. An organization’s Information infrastructure can be threatened by internal and external threats that can be implemented with the help of AI technologies. Normal business operations may be disrupted, stopped or anomalies may appear that may lead to security disasters even on Critical Information Infrastructures (CII) such as telecommunications, air transportation, the financial sector, the electric power grid, and many other services important for the economy and daily activity (Wilson 2014).

Often security threats are detected by identifying abnormal operations and anomalies. This is done through the use of intrusion detection systems (Kaur 2023) or security events logging. Security log analysis is the process of reviewing automatically computer-generated event logs to proactively identify security threats or other risks. Usually, they rely on signature-based systems that are limited in their ability to identify new and emerging threats or on programmers to manually inspect them by keyword search and regular expression match (Cao 2017). Powered by AI security log analysis can use unsupervised machine learning algorithms that can detect suspicion patterns and anomalies and analyse large volumes of data in real-time (Debnath et al. 2018).

3.3. Security attack threats

The most well-known security attack approaches connected to the AI are DDoS attacks, data theft, malware, phishing emails, vishing, and spam.

1) DDoS attacks. Distributed denial of service (DDoS) attacks has been increasing due to the rapid development of computer networks and cloud infrastructures. According to Microsoft, there were from 680 to 2215 attacks per day in 2022 that they were able to mitigate4 . Usually, botnets play a main role and pose a major threat to network security as they are widely used for many crimes such as DDoS attacks (Hoque 2015). Recently, the rise of AI-based botnets has drawn attention. AI-powered botnets can adapt, learn, and autonomously execute attacks (Dutt 2018). AI-powered botnets can mimic human behaviour, so that traditional security systems struggle to differentiate between legitimate users and malicious bots, allowing these botnets to operate undetected (Rama krishna 2023).

2) Data theft. Personal data, whether printed or electronic, is very important to every user and is protected with regulations such as GDPR that require adequate personal data protection (PDP) systems (Noninska 2022). Attackers use various tools and techniques to steal data including recently developed technologies using AI such as chatbots. ChatGPT’s ability to impersonate others, write flawless text, and create code can be misused by anyone with malicious intent5 . Data theft can be done more easily if chatbots use voice. Recently developed text-to-speech AI models (Microsoft VALL-E) can mimic voices by using audio samples to create a necessary replica. The company claims this chatbot can mimic any voice, including emotional tone, vocal cadence, and even background noise (Richey 2023).

3) Malware development. Researchers have found that AI-powered tools can aid in malware development. For example, in (Ben-Moshe 2022) is stated that a user with a rudimentary knowledge of malicious software could use tools like the AI-based system Codex, which translates natural language to code, to write functional malware in Python.

Ransomware is one of the routine threats to any organization’s data security. It deals with some complex algorithms, and it’s basically designed to block system files and wants ransom to provide the victims with the decryption key so that they can access the blocked content (Singh 2017). Specialists with help from ChatGPT managed to create ransomware code that can encrypt common data format files including running MS SQL database files and saving private (decryption) keys to remote servers (Sockley 2023).

4) Phishing emails. There is a legitimate concern that hackers will use AI-powered tools to write phishing emails that read like they were written by a professional. Researchers (Ben-Moshe 2022) found that ChatGPT could be used to easily create phishing emails.

Recent news shows that hackers are now developing their own malicious tool called WormGPT, which is described as “similar to ChatGPT but has no ethical boundaries or limitations” (Osborne 2023). Its primary use is for phishing and business email compromise (BEC) attacks.

5) Vishing. The term “vishing” is derived from a combination of “voice” and “phishing” (Yeboah-Boateng 2014). Scammers call potential victims, often using prerecorded robocalls, pretending to be a legitimate company to solicit personal information from a victim. With the help of AI-based tools scammers even can generate voices or clone them.

6) Spam. Spam is one of the major problems of today’s Internet, bringing financial damage to companies and annoying individual users (Blanzieri 2008). Criminals who send spam usually take a few minutes to write the text and send it to hundreds and thousands. With generative AI, they can speed up their work by generating spam text instantly. Luckily, AI using Deep Learning Algorithms emerged as a powerful technique for spam detection due to its ability to automatically learn relevant features from raw data (Shoba et al. 2023).

4. Discussion

The paper highlights that AI can be successfully used for various cybersecurity threats. There is a clear need to use AI-related technologies to overcome these threats and develop procedures, policies and tools that can significantly increase information security. Recommendations that can be made in this direction are as follows:

• increase investments in AI-powered network monitoring tools that can track user behaviour, detect anomalies, identify unknown threats, and react accordingly;

• adapt and improve the Information Security Programs (ISP) according to new threats;

• introduce preventive measures such as training users to recognize AIgenerated content, and the importance of human behaviour while using chatbots;

• improve skills of the Information Security Team.

The need to develop a regulatory framework (including Ethical Conduct) for AI developers also comes into focus. Ethical and practical concerns that will be included in the regulatory documents are very important to ensure sustainable and responsible development of the AI applications/systems in all aspects.

The role of AI in information and cyber security cannot be assessed unambiguously. The table 1 shows some of the advantages and disadvantages in the field of information and cyber security.

Table 1. Advantages and disadvantages of AI in information and cyber security

AdvantagesDisadvantagesFasterthreatdetectionAutomatingincidentresponseImprovednetworksecurityImprovedaccuracyandeffi-ciencyofsecuritysystemsBehaviouralanalyticsImprovedAI-enabledauthen-ticationIdentifyingabnormalopera-tionsandanomaliesDatatheftMalwaredevelopmentPrivacybreachesPhishing,vishing,baiting,spamandpretextingenhancedbyAIManipulatingpublicsentimentbydeepfakevideos,audiorecordingsandwrittencontentSophisticatedDDoSattacksAdversarialAttacksbymanipula-tionofmachinelearningmodels

5. Conclusion

The paper explores the potential application of AI to implement cyberattacks of various types, as well as some approaches to detect and overcome them also with the help of AI. The state-of-art review, made of numerous research papers and internet pages, provides the answers to the research questions. The analysis of the review shows that there are legitimate concerns that AI can be successfully used for sophisticated cyber-attacks even by inexperienced cyber criminals. Some recommendations to increase information security are given. The need to develop a regulatory framework for AI developers is also discussed.

NOTES

1. Еuroparl, 2020. What is artificial intelligence and how is it used?

URL: https://europarl.europa.eu/news/en/headlines/society/20200827STO85804/what-is-artificial-intelligence-and-how-is-it-used

2. Panda security, 2021. 11 Emerging Cybersecurity Trends in 2021, panda, 12 April 2021. URL: https://pandasecurity.com/en/mediacenter/tips/cybersecurity-trends

3. Tech desk, 2023. ChatGPT can generate working Windows 11 keys, tribune, 19 June 2023. URL: https://tribune.com.pk/story/2422477/ chatgpt-can-generate-working-windows-11-keys

4. Microsoft security, 2022. DDoS attack trends and insights, 2022 in review. URL: https://microsoft.com/en-us/security/business/securityinsider/wp-content/uploads/2023/03/Security-Insider_DDoS-Infographic.pdf

5. Malwarebytes, 2023. What is ChatGPT? AI Chatbots Security: Are AI chatbots safe to use? URL: https://www.malwarebytes.com/cybersecurity/basics/chatgpt-ai-security

REFERENCES

ADAMOPOULOS, I., ILIAS, A., MAKRIS, C., STAMATIOU, Y., 2023. Intelligent surveillance systems on the Internet of Things based on secure applications with the IBM cloud platform. Int. Jourhal on Information Technologies & Security, vol. 15, no. 2, 2023, pp. 59 – 74. https://doi.org/10.59035/XVRS3592

ADAMOPOULOU, E., MOUSSIADES, L., 2020. An Overview of Chatbot Technology. Artificial Intelligence Applications and Innovations 2020, Neos Marmaras, Greece. https://doi.org/10.1007/978-3-030-49186-4_31

ALHAYANI, B., MOHAMMED, H.S., CHALOOB, I.Z., AHMED, J.S., 2021. Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings. ISSN 2214-7853. https://doi.org/10.1016/j.matpr.2021.02.531

BEN-MOSHE, SH., GEKKER, G., COHEN, G., 2022. AI that can save the day or hack it away. https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/

BLANZIERI, E., BRYL, A., 2008. A survey of learning-based techniques of email spam filtering. Artificial Intelligence Review, vol. 29, pp. 63 – 92. https://doi.org/10.1007/s10462-009-9109-6

BOSSLER, A., BERENBLUM, T., 2019. Introduction: new directions in cybercrime research. Crime and Justice, vol. 42, no. 5, pp. 495 – 499. https://doi.org/10.1080/0735648X.2019.1692426

CAO, Q., QIAO, Y., LYU, Z., 2017. Machine learning to detect anomalies in web log analysis. Proceedings 3rd IEEE ICCC, Chengdu, China, pp. 519 – 523. https://doi.org/10.1109/CompComm.2017.8322600

DEBNATH, B., SOLAIMANI, M., GULZAR, M.A.G, ARORA, N., LUMEZANU, C., XU; BO ZONG, J., ZHANG, H., JIANG, G., KHAN, L., 2018. LogLens: A Real-Time Log Analysis System. IEEE 38th ICDCS, Vienna, Austria, pp. 1052 – 1062. https://doi.org/ 10.1109/ICDCS.2018.00105

DUTT, D., 2018. Reducing the impact of AI-powered bot attacks. https://www.csoonline.com/article/565036/reducing-the-impact-of-aipowered-bot-attacks.html

FARINA, M., LAVAZZA, A., 2023. ChatGPT in society: Emerging issues. Frontiers in Artificial Intelligence, vol. 6. https://doi.org/10.3389/frai.2023.1130913

FETZER, J.H., 1990. What is Artificial Intelligence?. In: Artificial Intelligence: Its Scope and Limits. Studies in Cognitive Systems, vol. 4, pp. 3 – 27. Springer, Dordrecht. ISBN 978-0-7923-0548-4. https://doi.org/10.1007/978-94-009-1900-6_1

FJELLAND, R., 2020. Why general artificial intelligence will not be realized. Humanities & Social Science Communication, vol. 7, art. 10. https://doi.org/10.1057/s41599-020-0494-4

GALLEGO, A., KURER, T., 2022. Automation, Digitalization, and Artificial Intelligence in the Workplace: Implications for Political Behavior. Annual Review of Political Science, vol. 25, pp. 463 – 484. https://doi.org/10.1146/annurev-polisci-051120-104535

HOQUE, N., BHATTACHARYYA, D., KALITA, J., 2015. Botnet in DDoS Attacks: Trends and Challenges. IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2242 – 2270. https://doi.org/10.1109/COMST.2015.2457491

KAUR, R., GABRIJELČIČ, D., KLOBUČAR, T., 2023. Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, vol. 97. https://doi.org/10.1016/j.inffus.2023.101804

LI, J., 2018. Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering, vol.19, pp. 1462 – 1474. https://doi.org/10.1631/FITEE.1800573

MARINOV, R., 2017. Intelligent and Neural Networks. https://ebox.nbu.bg/mascom18/view_lesson.php?id=2

MASUM, M., 2023. AI Cybersecurity, Artificial Intelligence Cybersecurity. https://doi.org/10.13140/RG.2.2.36172.80009

MCCARTHY, J., 2007. What is artificial intelligence?

http://jmc.stanford.edu/artificial-intelligence/what-is-ai/index.html

https://hub.cnetworks.info/wp-content/uploads/2023/07/whatisai.pdf

MOISSET, S., 2023. How Security Analysts Can Use AI in Cybersecurity. https://freecodecamp.org/news/how-to-use-artificial-intelligence-incybersecurity/

NIELES, M., DEMPSEY, K., PILLITTERI, V., 2017. An Introduction to Information Security. NIST Special Publication 800-12 Revision 1. https://doi.org/10.6028/NIST.SP.800-12r1

NONINSKA, I., ROMANSKY, R., 2022. Organization of Technological Structures for Personal Data Protection. International Journal on Information Technologies and Security, vol. 14, no. 1, pp. 97 – 106.

OSBORNE, CH., 2023. WormGPT: What to know about ChatGPT’s malicious cousin. https://zdnet.com/article/wormgpt-what-to-know-about-chatgpts-malicious-cousin

RAMA KRISHNA, S., 2023. The Dark Side Unleashed: The Threat of AI-Powered Botnets. https://www.linkedin.com/pulse/dark-side-unleashed-threat-ai-powered-botnets-dr-s-rama-krishna

RICHEY, E., 2023. 4 ways scammers are using AI chatbots to steal data. https://explore.quantumfiber.com/ways-scammers-use-ai-chatbots-tosteal/

ROUTLEY, N., 2023. What is generative AI? An AI explains. World Economic forum. https://www.weforum.org/agenda/2023/02/generative-ai-explain-algorithms-work

SALAHDINE, F., KAABOUCH, N., 2019. Social Engineering Attacks: A Survey. Future Internet, vol. 11, no. 4. https://doi.org/10.3390/fi11040089

SAVAGET, P., CHIARINI, T., EVANS, S., 2019. Empowering political participation through artificial intelligence. Science and Public Policy, vol. 46, issue 3, pp. 369 – 380. https://doi.org/10.1093/scipol/scy064

SINGH, A.P., 2017. Ransomeware: a high profile attack. IRJET, vol. 04 issue: 02. e-ISSN: 2395 -0056. https://irjet.net/archives/V4/i2/IRJETV4I2365.pdf

STARKE, C., LÜNICH, M., 2020. Artificial intelligence for political decision-making in the European Union: Effects on citizens’ perceptions of input, throughput, and output legitimacy. Data & Policy, vol. 2. https://doi.org/10.1017/dap.2020.19

STOCKLEY, M., 2023. ChatGPT happy to write ransomware, just really bad at it. URL: https://www.malwarebytes.com/blog/news/2023/03/ chatgpt-happy-to-write-ransomware-just-really-bad-at-it

THOMPSON, S., 2023. Artificial intelligence’s impact on elections and democracy could be very real. https://techinformed.com/artificial-intelligences-impact-on-elections-and-democracy-could-be-very-real/

TOXIRJONOVICH, O. N., FOZILOVICH, Y. O., 2022. Artificial Intelligence and its Application in Information Security Management. Central Asian Journal of Theoretical and Applied Science, vol. 3, no. 4, pp. 90 – 97. https://cajotas.centralasianstudies.org/index.php/

CAJOTAS/article/view/451?__cf_chl_tk=zPJTpLHrpTzY3LenW86 sdtvUAfZda5HM04F38DAv2S0-1707907898-0-4069

UKOV, T., TSOCHEV, G., 2022. Machine learning algorithm for intelligent bots in multiplayer video game: A case study. Int. Journal on Information Technologies and Security, vol. 14, no. 4, pp. 67 – 78. http://ijits-bg.com/2022.v14.i4.07

WILSON, C., 2014. Cyber Threats to Critical Information Infrastructure. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York. https://doi.org/10.1007/978-1-4939-0962-9_7

YANG, J., CHEN, Y.-L., POR, L.Y., KU, C.S., 2023. A Systematic Literature Review of Information Security in Chatbots. Applied Sciences, vol. 13. https://doi.org/10.3390/app13116355

YEBOAH-BOATENG, E.O., AMANOR, P.A., 2014. Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices. Emerging Trends in Computing and Information Sciences, vol. 5, no. 4. ISSN 2079-8407.

ZARSKY, T.Z., 2019. Privacy and Manipulation in the Digital Age. Theoretical Inquiries in Law, vol. 20, no. 1, pp. 157 – 188. https://doi.org/10.1515/til-2019-0006

ZEADALLY, S., ADI, E., BAIG, Z., KHAN, I.A., 2020. Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access vol. 8, pp. 23817 – 23837. https://doi.org/10.1109/ACCESS.2020.2968045

ZHANG, Z., HAMADI, H.A., DAMIANI, E., YEUN, C.Y., TAHER, F., 2022. Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. IEEE Access, vol. 10, pp. 93104 – 93139. https://doi.org/10.1109/ACCESS.2022.3204051

2025 година
Книжка 6
ENHANCING STUDENT MOTIVATION AND ACHIEVEMENT THROUGH DIGITAL MIND MAPPING

Mikloš Kovač, Mirjana Brdar, Goran Radojev, Radivoje Stojković

OPTIMIZATION VS BOOSTING: COMPARISON OF STRATEGIES ON EDUCATIONAL DATASETS TO EXPLORE LOW-PERFORMING AT-RISK AND DROPOUT STUDENTS

Ranjit Paul, Asmaa Mohamed, Peren Jerfi Canatalay, Ashima Kukkar, Sadiq Hussain, Arun K. Baruah, Jiten Hazarika, Silvia Gaftandzhieva, Esraa A. Mahareek, Abeer S. Desuky, Rositsa Doneva

ARTIFICIAL INTELLIGENCE AS A TOOL FOR PEDAGOGICAL INNOVATIONS IN MATHEMATICS EDUCATION

Stanka Hadzhikoleva, Maria Borisova, , Borislava Kirilova

Книжка 4
Книжка 3
МОДЕЛИ НА ВЕРОЯТНОСТНИ ПРОСТРАНСТВА В ОЛИМПИАДНИ ЗАДАЧИ

Драгомир Грозев, Станислав Харизанов

Книжка 1
A NOTE ON A GENERALIZED DYNAMICAL SYSTEM OCCURS IN MODELLING “THE BATTLE OF THE SEXES”: CHAOS IN SOCIOBIOLOGY

Nikolay Kyurkchiev, Anton Iliev, Vesselin Kyurkchiev, Angel Golev, Todorka Terzieva, Asen Rahnev

EDUCATIONAL RESOURCES FOR STUDYING MIDSEGMENTS OF TRIANGLE AND TRAPEZOID

Toni Chehlarova1), Neda Chehlarova2), Georgi Gachev

2024 година
Книжка 6
ВЪЗМОЖНОСТИ ЗА ИЗГРАЖДАНЕ НА МЕЖДУПРЕДМЕТНИ ВРЪЗКИ МАТЕМАТИКА – ИНФОРМАТИКА

Елена Каращранова, Ирена Атанасова, Надежда Борисова

Книжка 5
FRAMEWORK FOR DESIGNING VISUALLY ORIENTATED TOOLS TO SUPPORT PROJECT MANAGEMENT

Dalibor Milev, Nadezhda Borisova, Elena Karashtranova

3D ОБРАЗОВАТЕЛЕН ПОДХОД В ОБУЧЕНИЕТО ПО СТЕРЕОМЕТРИЯ

Пеньо Лебамовски, Марияна Николова

Книжка 4
DYNAMICS OF A NEW CLASS OF OSCILLATORS: MELNIKOV’S APPROACH, POSSIBLE APPLICATION TO ANTENNA ARRAY THEORY

Nikolay Kyurkchiev, Tsvetelin Zaevski, Anton Iliev, Vesselin Kyurkchiev, Asen Rahnev

Книжка 3
РАЗСТОЯНИЯ МЕЖДУ ЗАБЕЛЕЖИТЕЛНИ ТОЧКИ И НЕРАВЕНСТВА В ИЗПЪКНАЛ ЧЕТИРИЪГЪЛНИК

Йордан Табов, Станислав Стефанов, Красимир Кънчев, Хаим Хаимов

USING AI TO IMPROVE ANSWER EVALUATION IN AUTOMATED EXAMS

Georgi Cholakov, Asya Stoyanova-Doycheva

Книжка 2
ON INTEGRATION OF STEM MODULES IN MATHEMATICS EDUCATION

Elena Karashtranova, Aharon Goldreich, Nadezhda Borisova

Книжка 1
STUDENT SATISFACTION WITH THE QUALITY OF A BLENDED LEARNING COURSE

Silvia Gaftandzhieva, Rositsa Doneva, Sadiq Hussain, Ashis Talukder, Gunadeep Chetia, Nisha Gohain

MODERN ROAD SAFETY TRAINING USING GAME-BASED TOOLS

Stefan Stavrev, Ivelina Velcheva

ARTIFICIAL INTELLIGENCE FOR GOOD AND BAD IN CYBER AND INFORMATION SECURITY

Nikolay Kasakliev, Elena Somova, Margarita Gocheva

2023 година
Книжка 6
QUALITY OF BLENDED LEARNING COURSES: STUDENTS’ PERSPECTIVE

Silvia Gaftandzhieva, Rositsa Doneva, Sadiq Hussain, Ashis Talukder, Gunadeep Chetia, Nisha Gohain

МОДЕЛ НА ЛЕОНТИЕВ С MS EXCEL

Велика Кунева, Мариян Милев

Книжка 5
AREAS ASSOCIATED TO A QUADRILATERAL

Oleg Mushkarov, Nikolai Nikolov

ON THE DYNAMICS OF A ClASS OF THIRD-ORDER POLYNOMIAL DIFFERENCE EQUATIONS WITH INFINITE NUMBER OF PERIOD-THREE SOLUTIONS

Jasmin Bektešević, Vahidin Hadžiabdić, Midhat Mehuljić, Sadjit Metović, Haris Lulić

СИСТЕМА ЗА ИЗВЛИЧАНЕ И ВИЗУАЛИЗАЦИЯ НА ДАННИ ОТ ИНТЕРНЕТ

Георги Чолаков, Емил Дойчев, Светла Коева

Книжка 4
MULTIPLE REPRESENTATIONS OF FUNCTIONS IN THE FRAME OF DISTANCE LEARNING

Radoslav Božić, Hajnalka Peics, Aleksandar Milenković

INTEGRATED LESSONS IN CALCULUS USING SOFTWARE

Pohoriliak Oleksandr, Olga Syniavska, Anna Slyvka-Tylyshchak, Antonina Tegza, Alexander Tylyshchak

Книжка 3
ПРИЛОЖЕНИЕ НА ЕЛЕМЕНТИ ОТ ГЕОМЕТРИЯТА НА ЧЕТИРИЪГЪЛНИКА ЗА РЕШАВАНЕ НА НЕСТАНДАРТНИ ЗАДАЧИ

Йордан Табов, Веселин Ненков, Асен Велчев, Станислав Стефанов

Книжка 2
Книжка 1
НОВА ФОРМУЛА ЗА ЛИЦЕ НА ЧЕТИРИЪГЪЛНИК (ЧЕТИВО ЗА VII КЛАС)

Йордан Табов, Асен Велчев, Станислав Стефанов, Хаим Хаимов

2022 година
Книжка 6
MOBILE GAME-BASED MATH LEARNING FOR PRIMARY SCHOOL

Margarita Gocheva, Nikolay Kasakliev, Elena Somova

Книжка 5
SECURITY ANALYSIS ON CONTENT MANAGEMENT SYSTEMS

Lilyana Petkova, Vasilisa Pavlova

MONITORING OF STUDENT ENROLMENT CAMPAIGN THROUGH DATA ANALYTICS TOOLS

Silvia Gaftandzhieva, Rositsa Doneva, Milen Bliznakov

TYPES OF SOLUTIONS IN THE DIDACTIC GAME “LOGIC MONSTERS”

Nataliya Hristova Pavlova, Michaela Savova Toncheva

Книжка 4
PERSONAL DATA PROCESSING IN A DIGITAL EDUCATIONAL ENVIRONMENT

Evgeniya Nikolova, Mariya Monova-Zheleva, Yanislav Zhelev

Книжка 3
Книжка 2
STEM ROBOTICS IN PRIMARY SCHOOL

Tsanko Mihov, Gencho Stoitsov, Ivan Dimitrov

A METAGRAPH MODEL OF CYBER PROTECTION OF AN INFORMATION SYSTEM

Emiliya Koleva, Evgeni Andreev, Mariya Nikolova

Книжка 1
CONVOLUTIONAL NEURAL NETWORKS IN THE TASK OF IMAGE CLASSIFICATION

Larisa Zelenina, Liudmila Khaimina, Evgenii Khaimin, D. Khripunov, Inga Zashikhina

INNOVATIVE PROPOSALS FOR DATABASE STORAGE AND MANAGEMENT

Yulian Ivanov Petkov, Alexandre Ivanov Chikalanov

APPLICATION OF MATHEMATICAL MODELS IN GRAPHIC DESIGN

Ivaylo Staribratov, Nikol Manolova

РЕШЕНИЯ НА КОНКУРСНИ ЗАДАЧИ БРОЙ 6, 2021 Г.

Задача 1. Дадени са различни естествени числа, всяко от които има прос- ти делители, не по-големи от . Докажете, че произведението на някои три от тези числа е точен куб. Решение: числата са представим във вида . Нека разгледаме квадрат

2021 година
Книжка 6
E-LEARNING DURING COVID-19 PANDEMIC: AN EMPIRICAL RESEARCH

Margarita Gocheva, Nikolay Kasakliev, Elena Somova

Книжка 5
ПОДГОТОВКА ЗА XXV МЛАДЕЖКА БАЛКАНИАДА ПО МАТЕМАТИКА 2021

Ивайло Кортезов, Емил Карлов, Мирослав Маринов

EXCEL’S CALCULATION OF BASIC ASSETS AMORTISATION VALUES

Vehbi Ramaj, Sead Rešić, Anes Z. Hadžiomerović

EDUCATIONAL ENVIRONMENT AS A FORM FOR DEVELOPMENT OF MATH TEACHERS METHODOLOGICAL COMPETENCE

Olha Matiash, Liubov Mykhailenko, Vasyl Shvets, Oleksandr Shkolnyi

Книжка 4
LEARNING ANALYTICS TOOL FOR BULGARIAN SCHOOL EDUCATION

Silvia Gaftandzhieva, Rositsa Doneva, George Pashev, Mariya Docheva

Книжка 3
THE PROBLEM OF IMAGES’ CLASSIFICATION: NEURAL NETWORKS

Larisa Zelenina, Liudmila Khaimina, Evgenii Khaimin, D. Khripunov, Inga Zashikhina

MIDLINES OF QUADRILATERAL

Sead Rešić, Maid Omerović, Anes Z. Hadžiomerović, Ahmed Palić

ВИРТУАЛЕН ЧАС ПО МАТЕМАТИКА

Севдалина Георгиева

Книжка 2
MOBILE MATH GAME PROTOTYPE ON THE BASE OF TEMPLATES FOR PRIMARY SCHOOL

Margarita Gocheva, Elena Somova, Nikolay Kasakliev, Vladimira Angelova

КОНКУРСНИ ЗАДАЧИ БРОЙ 2/2021 Г.

Краен срок за изпращане на решения: 0 юни 0 г.

РЕШЕНИЯ НА ЗАДАЧИТЕ ОТ БРОЙ 1, 2021

Краен срок за изпращане на решения: 0 юни 0 г.

Книжка 1
СЕДЕМНАДЕСЕТА ЖАУТИКОВСКА ОЛИМПИАДА ПО МАТЕМАТИКА, ИНФОРМАТИКА И ФИЗИКА АЛМАТИ, 7-12 ЯНУАРИ 2021

Диян Димитров, Светлин Лалов, Стефан Хаджистойков, Елена Киселова

ОНЛАЙН СЪСТЕЗАНИЕ „VIVA МАТЕМАТИКА С КОМПЮТЪР“

Петър Кендеров, Тони Чехларова, Георги Гачев

2020 година
Книжка 6
ABSTRACT DATA TYPES

Lasko M. Laskov

Книжка 5
GAMIFICATION IN CLOUD-BASED COLLABORATIVE LEARNING

Denitza Charkova, Elena Somova, Maria Gachkova

NEURAL NETWORKS IN A CHARACTER RECOGNITION MOBILE APPLICATION

L.I. Zelenina, L.E. Khaimina, E.S. Khaimin, D.I. Antufiev, I.M. Zashikhina

APPLICATIONS OF ANAGLIFIC IMAGES IN MATHEMATICAL TRAINING

Krasimir Harizanov, Stanislava Ivanova

МЕТОД НА ДЕЦАТА В БЛОКА

Ивайло Кортезов

Книжка 4
TECHNOLOGIES AND TOOLS FOR CREATING ADAPTIVE E-LEARNING CONTENT

Todorka Terzieva, Valya Arnaudova, Asen Rahnev, Vanya Ivanova

Книжка 3
MATHEMATICAL MODELLING IN LEARNING OUTCOMES ASSESSMENT (BINARY MODEL FOR THE ASSESSMMENT OF STUDENT’S COMPETENCES FORMATION)

L. E. Khaimina, E. A. Demenkova, M. E. Demenkov, E. S. Khaimin, L. I. Zelenina, I. M. Zashikhina

PROBLEMS 2 AND 5 ON THE IMO’2019 PAPER

Sava Grozdev, Veselin Nenkov

Книжка 2
ЗА ВЕКТОРНОТО ПРОСТРАНСТВО НА МАГИЧЕСКИТЕ КВАДРАТИ ОТ ТРЕТИ РЕД (В ЗАНИМАТЕЛНАТА МАТЕМАТИКА)

Здравко Лалчев, Маргарита Върбанова, Мирослав Стоимиров, Ирина Вутова

КОНКУРЕНТНИ ПЕРПЕНДИКУЛЯРИ, ОПРЕДЕЛЕНИ ОТ ПРАВИЛНИ МНОГОЪГЪЛНИЦИ

Йоана Христова, Геновева Маринова, Никола Кушев, Светослав Апостолов, Цветомир Иванов

A NEW PROOF OF THE FEUERBACH THEOREM

Sava Grozdev, Hiroshi Okumura, Deko Dekov

PROBLEM 3 ON THE IMO’2019 PAPER

Sava Grozdev, Veselin Nenkov

Книжка 1
GENDER ISSUES IN VIRTUAL TRAINING FOR MATHEMATICAL KANGAROO CONTEST

Mark Applebaum, Erga Heller, Lior Solomovich, Judith Zamir

KLAMKIN’S INEQUALITY AND ITS APPLICATION

Šefket Arslanagić, Daniela Zubović

НЯКОЛКО ПРИЛОЖЕНИЯ НА ВЪРТЯЩАТА ХОМОТЕТИЯ

Сава Гроздев, Веселин Ненков

2019 година
Книжка 6
DISCRETE MATHEMATICS AND PROGRAMMING – TEACHING AND LEARNING APPROACHES

Mariyana Raykova, Hristina Kostadinova, Stoyan Boev

CONVERTER FROM MOODLE LESSONS TO INTERACTIVE EPUB EBOOKS

Martin Takev, Elena Somova, Miguel Rodríguez-Artacho

ЦИКЛОИДА

Аяпбергенов Азамат, Бокаева Молдир, Чурымбаев Бекнур, Калдыбек Жансуйген

КАРДИОИДА

Евгений Воронцов, Никита Платонов

БОЛГАРСКАЯ ОЛИМПИАДА ПО ФИНАНСОВОЙ И АКТУАРНОЙ МАТЕМАТИКЕ В РОССИИ

Росен Николаев, Сава Гроздев, Богдана Конева, Нина Патронова, Мария Шабанова

КОНКУРСНИ ЗАДАЧИ НА БРОЯ

Задача 1. Да се намерят всички полиноми, които за всяка реална стойност на удовлетворяват равенството Татяна Маджарова, Варна Задача 2. Правоъгълният триъгълник има остри ъгли и , а центърът на вписаната му окръжност е . Точката , лежаща в , е такава, че и . Симетралите

РЕШЕНИЯ НА ЗАДАЧИТЕ ОТ БРОЙ 1, 2019

Задача 1. Да се намерят всички цели числа , за които

Книжка 5
ДЪЛБОКО КОПИЕ В C++ И JAVA

Христина Костадинова, Марияна Райкова

КОНКУРСНИ ЗАДАЧИ НА БРОЯ

Задача 1. Да се намери безкрайно множество от двойки положителни ра- ционални числа Милен Найденов, Варна

РЕШЕНИЯ НА ЗАДАЧИТЕ ОТ БРОЙ 6, 2018

Задача 1. Точката е левият долен връх на безкрайна шахматна дъска. Една муха тръгва от и се движи само по страните на квадратчетата. Нека е общ връх на някои квадратчета. Казва- ме, че мухата изминава пътя между и , ако се движи само надясно и нагоре. Ако точките и са противоположни върхове на правоъгълник , да се намери броят на пътищата, свърз- ващи точките и , по които мухата може да мине, когато: а) и ; б) и ; в) и

Книжка 4
THE REARRANGEMENT INEQUALITY

Šefket Arslanagić

АСТРОИДА

Борислав Борисов, Деян Димитров, Николай Нинов, Теодор Христов

COMPUTER PROGRAMMING IN MATHEMATICS EDUCATION

Marin Marinov, Lasko Laskov

CREATING INTERACTIVE AND TRACEABLE EPUB LEARNING CONTENT FROM MOODLE COURSES

Martin Takev, Miguel Rodríguez-Artacho, Elena Somova

КОНКУРСНИ ЗАДАЧИ НА БРОЯ

Задача 1. Да се реши уравнението . Христо Лесов, Казанлък Задача 2. Да се докаже, че в четириъгълник с перпендикулярни диагонали съществува точка , за която са изпълнени равенствата , , , . Хаим Хаимов, Варна Задача 3. В правилен 13-ъгълник по произволен начин са избрани два диа- гонала. Каква е вероятността избраните диагонали да не се пресичат? Сава Гроздев, София, и Веселин Ненков, Бели Осъм

РЕШЕНИЯ НА ЗАДАЧИТЕ ОТ БРОЙ 5, 2018

Задача 1. Ако и са съвършени числа, за които целите части на числата и са равни и различни от нула, да се намери .

Книжка 3
RESULTS OF THE FIRST WEEK OF CYBERSECURITY IN ARKHANGELSK REGION

Olga Troitskaya, Olga Bezumova, Elena Lytkina, Tatyana Shirikova

DIDACTIC POTENTIAL OF REMOTE CONTESTS IN COMPUTER SCIENCE

Natalia Sofronova, Anatoliy Belchusov

КОНКУРСНИ ЗАДАЧИ НА БРОЯ

Краен срок за изпращане на решения 30 ноември 2019 г.

РЕШЕНИЯ НА ЗАДАЧИТЕ ОТ БРОЙ 4, 2018

Задача 1. Да се намерят всички тройки естествени числа е изпълнено равенството: а)

Книжка 2
ЕЛЕКТРОНЕН УЧЕБНИК ПО ОБЗОРНИ ЛЕКЦИИ ЗА ДЪРЖАВЕН ИЗПИТ В СРЕДАТА DISPEL

Асен Рахнев, Боян Златанов, Евгения Ангелова, Ивайло Старибратов, Валя Арнаудова, Слав Чолаков

ГЕОМЕТРИЧНИ МЕСТА, ПОРОДЕНИ ОТ РАВНОСТРАННИ ТРИЪГЪЛНИЦИ С ВЪРХОВЕ ВЪРХУ ОКРЪЖНОСТ

Борислав Борисов, Деян Димитров, Николай Нинов, Теодор Христов

ЕКСТРЕМАЛНИ СВОЙСТВА НА ТОЧКАТА НА ЛЕМОАН В ЧЕТИРИЪГЪЛНИК

Веселин Ненков, Станислав Стефанов, Хаим Хаимов

A TRIANGLE AND A TRAPEZOID WITH A COMMON CONIC

Sava Grozdev, Veselin Nenkov

КОНКУРСНИ ЗАДАЧИ НА БРОЯ

Христо Лесов, Казанлък Задача 2. Окръжност с диаметър и правоъгълник с диагонал имат общ център. Да се докаже, че за произволна точка M от е изпълне- но равенството . Милен Найденов, Варна Задача 3. В изпъкналия четириъгълник са изпълнени равенства- та и . Точката е средата на диагонала , а , , и са ортоганалните проекции на съответно върху правите , , и . Ако и са средите съответно на отсечките и , да се докаже, че точките , и лежат на една права.

РЕШЕНИЯ НА ЗАДАЧИТЕ ОТ БРОЙ 3, 2018

Задача 1. Да се реши уравнението . Росен Николаев, Дико Суружон, Варна Решение. Въвеждаме означението , където . Съгласно това означение разлежданото уравнение придобива вида не е решение на уравнението. Затова са възможни само случаите 1) и 2) . Разглеж- даме двата случая поотделно. Случай 1): при е изпълнено равенството . Тогава имаме:

Книжка 1
PROBLEM 6. FROM IMO’2018

Sava Grozdev, Veselin Nenkov

РЕШЕНИЯ НА ЗАДАЧИТЕ ОТ БРОЙ 2, 2018

Задача 1. Да се намери най-малкото естествено число , при което куба с целочислени дължини на ръбовете в сантиметри имат сума на обемите, рав- на на Христо Лесов, Казанлък Решение: тъй като , то не е куб на ес- тествено число и затова . Разглеждаме последователно случаите за . 1) При разглеждаме естествени числа и , за които са изпълнени релациите и . Тогава то , т.е. . Освен това откъдето , т.е. .Така получихме, че . Лесно се проверява, че при и няма естествен

КОНКУРСНИ ЗАДАЧИ НА БРОЯ

Задача 1. Да се намерят всички цели числа , за които

2018 година
Книжка 6
„ЭНЦИКЛОПЕДИЯ ЗАМЕЧАТЕЛЬНЫХ ПЛОСКИХ КРИВЫХ“ – МЕЖДУНАРОДНЫЙ СЕТЕВОЙ ИССЛЕДОВАТЕЛЬСКИЙ ПРОЕКТ В РАМКАХ MITE

Роза Атамуратова, Михаил Алфёров, Марина Белорукова, Веселин Ненков, Валерий Майер, Генадий Клековкин, Раиса Овчинникова, Мария Шабанова, Александр Ястребов

A NEW MEANING OF THE NOTION “EXPANSION OF A NUMBER”

Rosen Nikolaev, Tanka Milkova, Radan Miryanov

Книжка 5
ИТОГИ ПРОВЕДЕНИЯ ВТОРОЙ МЕЖДУНАРОДНОЙ ОЛИМПИАДЬI ПО ФИНАНСОВОЙ И АКТУАРНОЙ МАТЕМАТИКЕ СРЕДИ ШКОЛЬНИКОВ И СТУДЕНТОВ

Сава Гроздев, Росен Николаев, Мария Шабанова, Лариса Форкунова, Нина Патронова

LEARNING AND ASSESSMENT BASED ON GAMIFIED E-COURSE IN MOODLE

Mariya Gachkova, Martin Takev, Elena Somova

УЛИТКА ПАСКАЛЯ

Дарья Коптева, Ксения Горская

КОМБИНАТОРНИ ЗАДАЧИ, СВЪРЗАНИ С ТРИЪГЪЛНИК

Росен Николаев, Танка Милкова, Катя Чалъкова

Книжка 4
ЗА ПРОСТИТЕ ЧИСЛА

Сава Гроздев, Веселин Ненков

ИНЦЕНТЪР НА ЧЕТИРИЪГЪЛНИК

Станислав Стефанов

ЭПИЦИКЛОИДА

Инкар Аскар, Камила Сарсембаева

ГИПОЦИКЛОИДА

Борислав Борисов, Деян Димитров, Иван Стефанов, Николай Нинов, Теодор Христов

Книжка 3
ПОЛИНОМИ ОТ ТРЕТА СТЕПЕН С КОЛИНЕАРНИ КОРЕНИ

Сава Гроздев, Веселин Ненков

ЧЕТИРИДЕСЕТ И ПЕТА НАЦИОНАЛНА СТУДЕНТСКА ОЛИМПИАДА ПО МАТЕМАТИКА

Сава Гроздев, Росен Николаев, Станислава Стоилова, Веселин Ненков

Книжка 2
TWO INTERESTING INEQUALITIES FOR ACUTE TRIANGLES

Šefket Arslanagić, Amar Bašić

ПЕРФЕКТНА ИЗОГОНАЛНОСТ В ЧЕТИРИЪГЪЛНИК

Веселин Ненков, Станислав Стефанов, Хаим Хаимов

НЯКОИ ТИПОВЕ ЗАДАЧИ СЪС СИМЕТРИЧНИ ЧИСЛА

Росен Николаев, Танка Милкова, Радан Мирянов

Книжка 1
Драги читатели,

където тези проценти са наполовина, в Източна Европа те са около 25%, в

COMPUTER DISCOVERED MATHEMATICS: CONSTRUCTIONS OF MALFATTI SQUARES

Sava Grozdev, Hiroshi Okumura, Deko Dekov

ВРЪЗКИ МЕЖДУ ЗАБЕЛЕЖИТЕЛНИ ТОЧКИ В ЧЕТИРИЪГЪЛНИКА

Станислав Стефанов, Веселин Ненков

КОНКУРСНИ ЗАДАЧИ НА БРОЯ

Задача 2. Да се докаже, че всяка от симедианите в триъгълник с лице разделя триъгълника на два триъгълника, лицата на които са корени на урав- нението където и са дължините на прилежащите на симедианата страни на три- ъгълника. Милен Найденов, Варна Задача 3. Четириъгълникът е описан около окръжност с център , като продълженията на страните му и се пресичат в точка . Ако е втората пресечна точка на описаните окръжности на триъгълниците и , да се докаже, че Хаим Х

РЕШЕНИЯ НА ЗАДАЧИТЕ ОТ БРОЙ 2, 2017

Задача 1. Да се определи дали съществуват естествени числа и , при които стойността на израза е: а) куб на естествено число; б) сбор от кубовете на две естествени числа; в) сбор от кубовете на три естествени числа. Христо Лесов, Казанлък Решение: при и имаме . Следова- телно случай а) има положителен отговор. Тъй като при число- то се дели на , то при и имаме е естестве- но число. Следователно всяко число от разглеждания вид при деление на дава ос

2017 година
Книжка 6
A SURVEY OF MATHEMATICS DISCOVERED BY COMPUTERS. PART 2

Sava Grozdev, Hiroshi Okumura, Deko Dekov

ТРИ ИНВАРИАНТЫ В ОДНУ ЗАДА

Ксения Горская, Дарья Коптева, Асхат Ермекбаев, Арман Жетиру, Азат Бермухамедов, Салтанат Кошер, Лили Стефанова, Ирина Христова, Александра Йовкова

GAMES WITH

Aldiyar Zhumashov

SOME NUMERICAL SQUARE ROOTS (PART TWO)

Rosen Nikolaev, Tanka Milkova, Yordan Petkov

ЗАНИМАТЕЛНИ ЗАДАЧИ ПО ТЕМАТА „КАРТИННА ГАЛЕРИЯ“

Мирослав Стоимиров, Ирина Вутова

Книжка 5
ВТОРОЙ МЕЖДУНАРОДНЫЙ СЕТЕВОЙ ИССЛЕДОВАТЕЛЬСКИЙ ПРОЕКТ УЧАЩИХСЯ В РАМКАХ MITE

Мария Шабанова, Марина Белорукова, Роза Атамуратова, Веселин Ненков

SOME NUMERICAL SEQUENCES CONCERNING SQUARE ROOTS (PART ONE)

Rosen Nikolaev, Tanka Milkova, Yordan Petkov

Книжка 4
ГЕНЕРАТОР НА ТЕСТОВЕ

Ангел Ангелов, Веселин Дзивев

INTERESTING PROOFS OF SOME ALGEBRAIC INEQUALITIES

Šefket Arslanagić, Faruk Zejnulahi

PROBLEMS ON THE BROCARD CIRCLE

Sava Grozdev, Hiroshi Okumura, Deko Dekov

ПРИЛОЖЕНИЕ НА ЛИНЕЙНАТА АЛГЕБРА В ИКОНОМИКАТА

Велика Кунева, Захаринка Ангелова

СКОРОСТТА НА СВЕТЛИНАТА

Сава Гроздев, Веселин Ненков

Книжка 3
НЯКОЛКО ПРИЛОЖЕНИЯ НА ТЕОРЕМАТА НА МЕНЕЛАЙ ЗА ВПИСАНИ ОКРЪЖНОСТИ

Александра Йовкова, Ирина Христова, Лили Стефанова

НАЦИОНАЛНА СТУДЕНТСКА ОЛИМПИАДА ПО МАТЕМАТИКА

Сава Гроздев, Росен Николаев, Веселин Ненков

СПОМЕН ЗА ПРОФЕСОР АНТОН ШОУРЕК

Александра Трифонова

Книжка 2
ИЗКУСТВЕНА ИМУННА СИСТЕМА

Йоанна Илиева, Селин Шемсиева, Светлана Вълчева, Сюзан Феимова

ВТОРИ КОЛЕДЕН ЛИНГВИСТИЧЕН ТУРНИР

Иван Держански, Веселин Златилов

Книжка 1
ГЕОМЕТРИЯ НА ЧЕТИРИЪГЪЛНИКА, ТОЧКА НА МИКЕЛ, ИНВЕРСНА ИЗОГОНАЛНОСТ

Веселин Ненков, Станислав Стефанов, Хаим Хаимов

2016 година
Книжка 6
ПЕРВЫЙ МЕЖДУНАРОДНЫЙ СЕТЕВОЙ ИССЛЕДОВАТЕЛЬСКИЙ ПРОЕКТ УЧАЩИХСЯ В РАМКАХ MITE

Мария Шабанова, Марина Белорукова, Роза Атамуратова, Веселин Ненков

НЕКОТОРЫЕ ТРАЕКТОРИИ, КОТОРЫЕ ОПРЕДЕЛЕНЫ РАВНОБЕДРЕННЫМИ ТРЕУГОЛЬНИКАМИ

Ксения Горская, Дарья Коптева, Даниил Микуров, Еркен Мудебаев, Казбек Мухамбетов, Адилбек Темирханов, Лили Стефанова, Ирина Христова, Радина Иванова

ПСЕВДОЦЕНТЪР И ОРТОЦЕНТЪР – ЗАБЕЛЕЖИТЕЛНИ ТОЧКИ В ЧЕТИРИЪГЪЛНИКА

Веселин Ненков, Станислав Стефанов, Хаим Хаимов

FUZZY LOGIC

Reinhard Magenreuter

GENETIC ALGORITHM

Reinhard Magenreuter

Книжка 5
NEURAL NETWORKS

Reinhard Magenreuter

Книжка 4
АКТИВНО, УЧАСТВАЩО НАБЛЮДЕНИЕ – ТИП ИНТЕРВЮ

Христо Христов, Христо Крушков

ХИПОТЕЗАТА В ОБУЧЕНИЕТО ПО МАТЕМАТИКА

Румяна Маврова, Пенка Рангелова, Елена Тодорова

Книжка 3
ОБОБЩЕНИЕ НА ТЕОРЕМАТА НА ЧЕЗАР КОШНИЦА

Сава Гроздев, Веселин Ненков

Книжка 2
ОЙЛЕР-ВЕН ДИАГРАМИ ИЛИ MZ-КАРТИ В НАЧАЛНАТА УЧИЛИЩНА МАТЕМАТИКА

Здравко Лалчев, Маргарита Върбанова, Ирина Вутова, Иван Душков

ОБВЪРЗВАНЕ НА ОБУЧЕНИЕТО ПО АЛГЕБРА И ГЕОМЕТРИЯ

Румяна Маврова, Пенка Рангелова

Книжка 1
STATIONARY NUMBERS

Smaiyl Makyshov

МЕЖДУНАРОДНА ЖАУТИКОВСКА ОЛИМПИАДА

Сава Гроздев, Веселин Ненков

2015 година
Книжка 6
Книжка 5
Книжка 4
Книжка 3
МОТИВАЦИОННИТЕ ЗАДАЧИ В ОБУЧЕНИЕТО ПО МАТЕМАТИКА

Румяна Маврова, Пенка Рангелова, Зара Данаилова-Стойнова

Книжка 2
САМОСТОЯТЕЛНО РЕШАВАНЕ НА ЗАДАЧИ С EXCEL

Пламен Пенев, Диана Стефанова

Книжка 1
ГЕОМЕТРИЧНА КОНСТРУКЦИЯ НА КРИВА НА ЧЕВА

Сава Гроздев, Веселин Ненков

2014 година
Книжка 6
КОНКУРЕНТНОСТ, ПОРОДЕНА ОТ ТАНГЕНТИ

Сава Гроздев, Веселин Ненков

Книжка 5
ИНФОРМАТИКА В ШКОЛАХ РОССИИ

С. А. Бешенков, Э. В. Миндзаева

ОЩЕ ЕВРИСТИКИ С EXCEL

Пламен Пенев

ДВА ПОДХОДА ЗА ИЗУЧАВАНЕ НА УРАВНЕНИЯ В НАЧАЛНАТА УЧИЛИЩНА МАТЕМАТИКА

Здравко Лалчев, Маргарита Върбанова, Ирина Вутова

Книжка 4
ОБУЧЕНИЕ В СТИЛ EDUTAINMENT С ИЗПОЛЗВАНЕ НА КОМПЮТЪРНА ГРАФИКА

Христо Крушков, Асен Рахнев, Мариана Крушкова

Книжка 3
ИНВЕРСИЯТА – МЕТОД В НАЧАЛНАТА УЧИЛИЩНА МАТЕМАТИКА

Здравко Лалчев, Маргарита Върбанова

СТИМУЛИРАНЕ НА ТВОРЧЕСКА АКТИВНОСТ ПРИ БИЛИНГВИ ЧРЕЗ ДИНАМИЧЕН СОФТУЕР

Сава Гроздев, Диана Стефанова, Калина Василева, Станислава Колева, Радка Тодорова

ПРОГРАМИРАНЕ НА ЧИСЛОВИ РЕДИЦИ

Ивайло Старибратов, Цветана Димитрова

Книжка 2
ФРАКТАЛЬНЫЕ МЕТО

Валерий Секованов, Елена Селезнева, Светлана Шляхтина

Книжка 1
ЕВРИСТИКА С EXCEL

Пламен Пенев

SOME INEQUALITIES IN THE TRIANGLE

Šefket Arslanagić

2013 година
Книжка 6
Книжка 5
МАТЕМАТИЧЕСКИЕ РЕГАТЬI

Александр Блинков

Книжка 4
Книжка 3
АКАДЕМИК ПЕТЪР КЕНДЕРОВ НА 70 ГОДИНИ

чл. кор. Юлиан Ревалски

ОБЛАЧНИ ТЕХНОЛОГИИ И ВЪЗМОЖНОСТИ ЗА ПРИЛОЖЕНИЕ В ОБРАЗОВАНИЕТО

Сава Гроздев, Иванка Марашева, Емил Делинов

СЪСТЕЗАТЕЛНИ ЗАДАЧИ ПО ИНФОРМАТИКА ЗА ГРУПА Е

Ивайло Старибратов, Цветана Димитрова

Книжка 2
ЕКСПЕРИМЕНТАЛНАТА МАТЕМАТИКА В УЧИЛИЩЕ

Сава Гроздев, Борислав Лазаров

МАТЕМАТИКА С КОМПЮТЪР

Сава Гроздев, Деко Деков

ЕЛИПТИЧЕН АРБЕЛОС

Пролет Лазарова

Книжка 1
ФРАГМЕНТИ ОТ ПАМЕТТА

Генчо Скордев

2012 година
Книжка 6
ДВЕ ДИДАКТИЧЕСКИ СТЪЛБИ

Сава Гроздев, Светлозар Дойчев

ТЕОРЕМА НА ПОНСЕЛЕ ЗА ЧЕТИРИЪГЪЛНИЦИ

Сава Гроздев, Веселин Ненков

ИЗЛИЧАНЕ НА ОБЕКТИВНИ ЗНАНИЯ ОТ ИНТЕРНЕТ

Ивайло Пенев, Пламен Пенев

Книжка 5
ДЕСЕТА МЕЖДУНАРОДНА ОЛИМПИАДА ПО ЛИНГВИСТИКА

д–р Иван А. Держански (ИМИ–БАН)

ТЕОРЕМА НА ВАН ОБЕЛ И ПРИЛОЖЕНИЯ

Тодорка Глушкова, Боян Златанов

МАТЕМАТИЧЕСКИ КЛУБ „СИГМА” В СВЕТЛИНАТА НА ПРОЕКТ УСПЕХ

Сава Гроздев, Иванка Марашева, Емил Делинов

I N M E M O R I A M

На 26 септември 2012 г. след продължително боледуване ни напусна проф. дпн Иван Ганчев Донев. Той е първият професор и първият доктор на науките в България по методика на обучението по математика. Роден е на 6 май 1935 г. в с. Страхилово, В. Търновско. След завършване на СУ “Св. Кл. Охридски” става учител по математика в гр. Свищов. Тук той организира първите кръжоци и със- тезания по математика. През 1960 г. Иван Ганчев печели конкурс за асистент в СУ и още през следващата година започ

Книжка 4
Книжка 3
СЛУЧАЙНО СЪРФИРАНЕ В ИНТЕРНЕТ

Евгения Стоименова

Книжка 2
SEEMOUS OLYMPIAD FOR UNIVERSITY STUDENTS

Sava Grozdev, Veselin Nenkov

EUROMATH SCIENTIFIC CONFERENCE

Sava Grozdev, Veselin Nenkov

FIVE WAYS TO SOLVE A PROBLEM FOR A TRIANGLE

Šefket Arslanagić, Dragoljub Milošević

ПРОПОРЦИИ

Валя Георгиева

ПЪТЕШЕСТВИЕ В СВЕТА НА КОМБИНАТОРИКАТА

Росица Керчева, Румяна Иванова

ПОЛЗОТВОРНА ПРОМЯНА

Ивайло Старибратов

Книжка 1
ЗА ЕЛЕКТРОННОТО ОБУЧЕНИЕ

Даниела Дурева (Тупарова)

МАТЕМАТИКАТА E ЗАБАВНА

Веселина Вълканова

СРАВНЯВАНЕ НА ИЗРАЗИ С КВАДРАТНИ КОРЕНИ

Гинка Бизова, Ваня Лалева