automatica
G. Kondev, D. Nedelev, Key Benefits of Using Predictive Diagnostics in Non-Ferrous Metallurgy

Key Words: Predictive diagnostics; competitiveness; costs; innovation.

Abstract. In today’s highly competitive economic environment, effective predictive maintenance of equipment is critical to ensuring high productivity, product quality, on-time delivery and a safe work environment. Predictive maintenance itself is a well-established approach that uses equipment condition data to predict and project future operating conditions leading to system-wide improvements. Having an integrated, computer-based information management system is a strong competitive advantage over today’s complex manufacturing systems. To automate and optimize these processes, advanced systems including Internet of Things (IoT) modules are often used, which enable intelligent devices to exchange information with each other and with others via the Internet, creating a large-scale network of interconnected devices. Such connectivity helps in cost accounting, production and maintenance planning, environmental compliance data, etc. A successfully implemented system will provide an opportunity for effective communication and coordination of predictive maintenance activities leading to continuous improvements of key indicators.

Read More

informatics
D. Dinev, S. Yordanov, R. Ivanov, G. Mihalev, Low-Cost System for Monitoring the Health of Pregnant Women

Key Words: Pregnancy monitoring; IoT; health tracking; pulse oximetry; heart rate monitoring.

Abstract. Monitoring the health of pregnant women is essential for promoting a safe and successful pregnancy. This paper presents the development of a monitoring system using the ESP32 microcontroller, along with the MAX30205, MAX30100, and BME680 sensors. The ESP32 acts as the core unit for data collection and transmission. The MAX30205 sensor provides precise real-time temperature readings, while the BME680 measures key environmental factors such as humidity, pressure, and gas resistance. Additionally, the MAX30100 monitors pulse rate and blood oxygen levels. Together, these sensors enable comprehensive health monitoring for pregnant women.

Read More

informatics
V. Akivanov, V. Velchev, Remote Measurement and Data Transmission over Public Communication Networks

Key Words: Remote measurement; data transmition; public net communication; WiFi Internet; data base management; web site.

Abstract. Тhe system, described in the article for measurement and remote transmission of data from measuring devices such as water meters, electricity meters and others, contains the following components: periodic measurement, remote transmission of measured data, storing the data in a centralized database server, displaying the current data in tables and graphs, display history of measurements based on stored data in DB. The transmission of the measured data is realized in the following communication media: public networks (A1, Vivacom, Yettel), Internet network.

Read More

informatics
P. Stoianov, G. Bebrov, M. Ivanov, N. Dimitrov, Comparative Analysis of the Advanced Cryptographic Hash Functions

Key Words: Cryptographic; hash-function; comparative analysis; MDC MAC; collision resistance; Message Digest.

Abstract. The paper presents the fundamental role of hash functions in modern cryptography and Network security. To control the integrity of stored or exchanged data, cryptographic hash functions, also called OWHF (OWHF – One Way Hash Functions), are most often used. These functions are not used to protect the data, but to verify its identity.Hash Functions compresses a message of arbitrary length to a message of fixed length called hashcode or Message Digest (MD). According to the purpose they serve, there are two main types of hash functions – MDC and MAC. Keyed hash functions use secret key for computing the digest and these are also known as MAC (Message Authentication Code). The purpose of MAC is to authenticate the data source. MDC (Message Detection Codes) are un-keyed functions and serve to authenticate the data integrity. The three distinctive properties of hash functions are discussed: 1. Preimage resistance – for essentially all pre-specified outputs, it is computationally infeasible to find any input which hashes to that output. 2. 2nd-preimage resistance – it is computationally infeasible to find any second input which has the same output as any specified input. 3. Collision resistance – it is computationally infeasible to find any two distanct inputs whish result to the same output. Defined the fields of application of the hash functions: 1. Data integrity check when exchanging data (file, string, database, etc.). 2. Storing access passwords on sites. 3. Digital signature. 4. Search for identical files and match of data. This paper presents a comparative analysys of hash functions that are curentlu used. The most frequently used functions (MD, SHA, WHIRLPOOL, RIPEMD, MASH-2 etc.) are presented in tabular form. A comparison was made according to some basic characteristics: input message size, output value, conversion method, logical operations used, operations used, etc. On this basis, can be made a decision to use a particular hash function for one purpose or another, according to the specific requirements for input message dimensionality, speed, and degree of security.

Read More

education and qualification
M. Hadjiski, The Necessary Balance between Alternatives in Designing and Using Intelligent Systems or Personalized Engineering Learning

Key Words: Personalized learning; intelligent systems; collaborative approach.

Abstract. The problems of searching for a rational solution in the design and operation of modern intelligent systems for personalized engineering training are considered. Emerging favorable opportunities and implementation risks are analyzed in three main aspects – pedagogical strategies, technological efficiency and system coordination. The existing research and practical experience is insufficient to make informed decisions, especially in the conditions of extremely rapid development of technologies based on artificial intelligence, which are of key importance for personalized learning systems. Given the great complexity of personalized learning systems, only a collaborative approach of teams including researchers, educators, and artificial intelligence specialists would be successful in finding balanced rational solutions.

Read More