Proceedings of the 21st Pan-Hellenic Conference on Informatics最新文献

筛选
英文 中文
Machine Learning Technique in Time Series Prediction of Gross Domestic Product 国内生产总值时间序列预测中的机器学习技术
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139443
Georgios N. Kouziokas
{"title":"Machine Learning Technique in Time Series Prediction of Gross Domestic Product","authors":"Georgios N. Kouziokas","doi":"10.1145/3139367.3139443","DOIUrl":"https://doi.org/10.1145/3139367.3139443","url":null,"abstract":"Artificial intelligence is gaining ground the last years in many scientific sectors with the development of new machine learning techniques. In this research, a machine learning methodology is proposed in the Gross Domestic Product (GDP) time series forecasting. Artificial Neural Networks are implemented in order to develop forecasting models for predicting the Gross Domestic Product. A Feedforward Multilayer Perceptron (FFMLP) was implemented since it is considered as the most suitable in times series forecasting. In order to develop the optimal forecasting model, several network topologies were examined by testing different transfer functions and also different number of neurons in the hidden layers. The results have shown a very precise prediction accuracy regarding the levels of Gross Domestic Product. The proposed technique based on machine learning can be very helpful in public and financial management.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116902873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ToA estimation system for efficient cycling in Smart Cities 智慧城市高效骑行的ToA估算系统
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139412
Theodoros Anagnostopoulos, K. Ntalianis, Christos Skourlas, I. Sosunova, P. Fedchenkov, A. Zaslavsky
{"title":"ToA estimation system for efficient cycling in Smart Cities","authors":"Theodoros Anagnostopoulos, K. Ntalianis, Christos Skourlas, I. Sosunova, P. Fedchenkov, A. Zaslavsky","doi":"10.1145/3139367.3139412","DOIUrl":"https://doi.org/10.1145/3139367.3139412","url":null,"abstract":"Smartphone sensing enables efficient Time-of-Arrival (ToA) estimation of moving cyclists towards traffic lights in a Smart City. GPS sensors locate the actual position of cyclists on their way to traffic lights. Since the constant use of GPS sensors drain the battery of the smartphones there is a need of efficient energy consumption techniques. In this paper we propose a velocity based ToA estimation system to face the GPS energy consumption inefficiency. In addition we aim to enable efficient cycling in Smart Cities by turning traffic lights to green proactively thus achieving overall citizen's wellbeing.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129718053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LIVA: An efficient local breakout scheme for V2V communicatons LIVA:一种高效的V2V通信本地分路方案
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139393
A. Kaloxylos
{"title":"LIVA: An efficient local breakout scheme for V2V communicatons","authors":"A. Kaloxylos","doi":"10.1145/3139367.3139393","DOIUrl":"https://doi.org/10.1145/3139367.3139393","url":null,"abstract":"Vehicle-to-vehicle (V2V) communications over cellular networks has recently attracted significant interest. Existing networks can support some but not all related V2V services. This type of communication is of localized interest since data exchange takes place mainly between neighbouring vehicles. Standardized solutions, force all traffic to pass through the core network adding unnecessary delay and traffic load. Existing solutions to support localized traffic, through local breakout schemes have been already proposed. However, they come along some inefficiencies since they were originally designed for use cases with different characteristics compared to V2V communications. The paper discusses a new scheme, called LIVA, that addresses these inefficiencies by adding a new entity closer to the edge of the network. The paper includes a detailed description of the solution and also it quantifies the gains of this scheme.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130500195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security risks 隐私标志:一个报告和管理隐私和安全风险的众包平台
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139432
V. Vlachos, Y. Stamatiou, Adelina Madhja, S. Nikoletseas
{"title":"Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security risks","authors":"V. Vlachos, Y. Stamatiou, Adelina Madhja, S. Nikoletseas","doi":"10.1145/3139367.3139432","DOIUrl":"https://doi.org/10.1145/3139367.3139432","url":null,"abstract":"Nowadays we are witnessing an unprecedented evolution in how we gather and process information. Technological advances in mobile devices as well as ubiquitous wireless connectivity have brought about new information processing paradigms and opportunities for virtually all kinds of scientific and business activity. These new paradigms rest on three pillars: i) numerous powerful portable devices operated by human intelligence, ubiquitous in space and available, most of the time, ii) unlimited environment sensing capabilities of the devices, and iii) fast networks connecting the devices to Internet information processing platforms and services. These pillars implement the concepts of crowdsourcing and collective intelligence. These concepts describe online services that are based on the massive participation of users and the capabilities of their devices.in order to produce results and information which are \"more than the sum of the part\". The EU project Privacy Flag relies exactly on these two concepts in order to mobilize roaming citizens to contribute, through crowdsourcing, information about risky applications and dangerous web sites whose processing may produce emergent threat patterns, not evident in the contributed information alone, reelecting a collective intelligence action. Crowdsourcing and collective intelligence, in this context, has numerous advantages, such as raising privacy-awareness among people. In this paper we summarize our work in this project and describe the capabilities and functionalities of the Privacy Flag Platform.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Movie SCoRe: Personalized Movie Recommendation on Mobile Devices 电影评分:移动设备上的个性化电影推荐
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139383
H. Papadakis, N. Michalakis, P. Fragopoulou, C. Panagiotakis, A. Malamos
{"title":"Movie SCoRe: Personalized Movie Recommendation on Mobile Devices","authors":"H. Papadakis, N. Michalakis, P. Fragopoulou, C. Panagiotakis, A. Malamos","doi":"10.1145/3139367.3139383","DOIUrl":"https://doi.org/10.1145/3139367.3139383","url":null,"abstract":"Recommender systems try to predict the preferences of users for specific items, based on an analysis of previous consumer behaviour. In this paper, we present Movie SCoRe, a mobile device application for personalized movie recommendation, based on a novel recommendation algorithm. This easy-to-use application allows users to effortlessly specify their preferences by rating already watched movies. The application, in turn, employs the aforementioned state-of-the-art algorithm in order to provide the user with accurate, personalized movie recommendations. In this paper, we describe the design, implementation and functionality of the mobile-based application as well as the basis of the underlying recommendation algorithm.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127631067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intrinsic dimension estimation of the fMRI space via sparsity-promoting matrix factorization: Counting the 'brain cores' of the human brain 通过稀疏促进矩阵分解的fMRI空间的固有维数估计:人脑的“脑核”计数
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139391
H. Georgiou
{"title":"Intrinsic dimension estimation of the fMRI space via sparsity-promoting matrix factorization: Counting the 'brain cores' of the human brain","authors":"H. Georgiou","doi":"10.1145/3139367.3139391","DOIUrl":"https://doi.org/10.1145/3139367.3139391","url":null,"abstract":"Functional Magnetic Resonance Imaging (fMRI) is a powerful non-invasive tool for localizing and analyzing brain activity. This study focuses on one very important aspect of the functional properties of human brain, specifically the estimation of the level of parallelism when performing complex cognitive tasks. Using fMRI as the main modality, the human brain activity is investigated through a purely data-driven signal processing and dimensionality analysis approach. Specifically, the fMRI signal is treated as a multidimensional data space and its intrinsic 'complexity' is studied via sparsity-promoting matrix factorization in the sense of blind-source separation (BSS). One simulated and two real fMRI datasets are used in combination with Independent Component Analysis (ICA) for estimating the intrinsic (true) dimensionality via detection of statistically independent concurrent signal sources. This analysis provides reliable data-driven experimental evidence on the number of independent active brain processes that run concurrently when visual or visuo-motor tasks are performed. The results prove that, although this number is can not be defined as a hard threshold but rather as a continuous range, however when a specific activation level is defined, an estimated number of concurrent processes or the loose equivalent of 'brain cores' can be detected in human brain activity.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129417034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of Vulnerability Severity using Text Mining 基于文本挖掘的漏洞严重性评估
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139390
Georgios Spanos, L. Angelis, Dimitrios Toloudis
{"title":"Assessment of Vulnerability Severity using Text Mining","authors":"Georgios Spanos, L. Angelis, Dimitrios Toloudis","doi":"10.1145/3139367.3139390","DOIUrl":"https://doi.org/10.1145/3139367.3139390","url":null,"abstract":"Software1 vulnerabilities are closely associated with information systems security, a major and critical field in today's technology. Vulnerabilities constitute a constant and increasing threat for various aspects of everyday life, especially for safety and economy, since the social impact from the problems that they cause is complicated and often unpredictable. Although there is an entire research branch in software engineering that deals with the identification and elimination of vulnerabilities, the growing complexity of software products and the variability of software production procedures are factors contributing to the ongoing occurrence of vulnerabilities, Hence, another area that is being developed in parallel focuses on the study and management of the vulnerabilities that have already been reported and registered in databases. The information contained in such databases includes, a textual description and a number of metrics related to vulnerabilities. The purpose of this paper is to investigate to what extend the assessment of the vulnerability severity can be inferred directly from the corresponding textual description, or in other words, to examine the informative power of the description with respect to the vulnerability severity. For this purpose, text mining techniques, i.e. text analysis and three different classification methods (decision trees, neural networks and support vector machines) were employed. The application of text mining to a sample of 70,678 vulnerabilities from a public data source shows that the description itself is a reliable and highly accurate source of information for vulnerability prioritization.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Cross-layer Aware TDD Frame Adaptation for FDD/TDD Carrier Aggregation in LTE-A Systems LTE-A系统中FDD/TDD载波聚合的跨层感知TDD帧自适应
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139370
Apostolos Xenakis, F. Foukalas
{"title":"Cross-layer Aware TDD Frame Adaptation for FDD/TDD Carrier Aggregation in LTE-A Systems","authors":"Apostolos Xenakis, F. Foukalas","doi":"10.1145/3139367.3139370","DOIUrl":"https://doi.org/10.1145/3139367.3139370","url":null,"abstract":"In this paper, we study the aggregation between the FDD and TDD spectrum bands within the context of 3GPP LTE-A system. To be specific, we first provide a cross-layer design analysis to obtain the achievable throughput using the TDD mode for transmission in LTE-A system. Under particular QoS requirements and certain channel conditions, the achievable throughput is derived and evaluated. The QoS requirements originate from the upper layers, where the file size, the TCP window size and the latency for efficient transmission are incorporated in the final formulation. Having obtained the formulation, simulation results highlight the impact of the QoS parameters to different TDD frame formats. We therefore propose a framework for TDD frame adaptation within the LTE-A system. The aim of this framework is to provide the options of choosing different TDD frame formats by calculating the DL:UL subframes ratio under certain channel conditions and QoS requirements. Simulation results are carried out, which reveal the probability of choosing the different TDD frame formats from the system under certain channel conditions and QoS requirements.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129287492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-PreS: Evaluation of Building Evacuation Drills: A Smart Tool to Help Building Evacuation Drill Designers to Find the Optimal Evacuation Pattern E-PreS:建筑疏散演习评估:帮助建筑疏散演习设计者找到最佳疏散模式的智能工具
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139369
Michail Chatzidakis, Michael Loukeris, S. Hadjiefthymiades
{"title":"E-PreS: Evaluation of Building Evacuation Drills: A Smart Tool to Help Building Evacuation Drill Designers to Find the Optimal Evacuation Pattern","authors":"Michail Chatzidakis, Michael Loukeris, S. Hadjiefthymiades","doi":"10.1145/3139367.3139369","DOIUrl":"https://doi.org/10.1145/3139367.3139369","url":null,"abstract":"E-PreS is an EU funded program, which lasted from February, 2015 through December, 2016. It's goal is to provide the building drill evacuation designer with a useful tool, to evaluate specific evacuation scenarios and monitor them in real-time, increase community awareness against natural hazards and build up evacuation confidence while minimizing side effects. It's main target group is the school communities, primarily focusing on earthquake, flood or volcanic eruption drills, but it turned out to be a useful tool for generic use in all types of building evacuation drills. It is compact, user friendly, doesn't require internet connection and it can even function autonomously, without even the need for external electric power presence.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121281941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Affiance Computer Science and Machining Technology for cheap and efficient Solar Energy 面向廉价高效太阳能的计算机科学与加工技术
Proceedings of the 21st Pan-Hellenic Conference on Informatics Pub Date : 2017-09-28 DOI: 10.1145/3139367.3139445
N. Karanikolas, A. Liaramantzas
{"title":"Affiance Computer Science and Machining Technology for cheap and efficient Solar Energy","authors":"N. Karanikolas, A. Liaramantzas","doi":"10.1145/3139367.3139445","DOIUrl":"https://doi.org/10.1145/3139367.3139445","url":null,"abstract":"Our purpose is to investigate / inspirate methods for creating Small Energy Production Systems with reduced cost1. We suggest the integration of machining technology, microcontrollers and software for creating cheap Small Energy Production Systems. Here we investigate the creation of an electricity production small system based on simple machining technology (teeterboard), simple microcontroller (arduino uno) and solar panels. elevation","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133230842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信