{"title":"Conceptualization of Game Based Approaches for Learning and Training on Cyber Security","authors":"Menelaos N. Katsantonis, P. Fouliras, I. Mavridis","doi":"10.1145/3139367.3139415","DOIUrl":"https://doi.org/10.1145/3139367.3139415","url":null,"abstract":"Utilizing game based approaches for learning and training on cyber security is a way to foster innovative methods and effectively train learners in highly-motivating settings. In this work, we investigate related works on such approaches. Our study reveals only a limited set of works focusing on diverse target groups and methodologies and a lack of conceptual analysis and design standards. To this end, we analyse the structure of cyber security learning and training approaches that utilize gamification and game based learning notions; we decompose these approaches into their respective elements; we define their relations; and we construct a concept map of pedagogical and technological elements of game based learning and training approaches on cyber security.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130440803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Greek sign language vocabulary recognition using Kinect","authors":"Nikolaos Gkigkelos, C. Goumopoulos","doi":"10.1145/3139367.3139386","DOIUrl":"https://doi.org/10.1145/3139367.3139386","url":null,"abstract":"Sign language recognition is a challenging problem both when tracking continuous signs (communication mode) or single words (translation mode)1. We have developed a system that can recognize Greek sign language vocabulary in translation mode using Kinect technology. The sensor captures 3D hands movement trajectory and then a set of features in the form of body joints are fed to a classifier to recognize the input sign. Normalization is used to align test and stored trajectories using the dynamic time warping algorithm before matching is done using the Nearest-Neighbor approach. The low computational complexity of the involved algorithms allows for building a system with real-time response times. The system was evaluated with a sample of 5 individuals and is capable of recognizing 15 signs of the Greek sign language. Different configurations were tested and the best accuracy achieved was 99.33%.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114941537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. A. Dinopoulos, E. G. Grylonakis, C. Filelis-Papadopoulos, G. Gravvanis
{"title":"On the numerical solution of Helmholtz-type PDEs using an adaptive complex collocation technique","authors":"P. A. Dinopoulos, E. G. Grylonakis, C. Filelis-Papadopoulos, G. Gravvanis","doi":"10.1145/3139367.3139394","DOIUrl":"https://doi.org/10.1145/3139367.3139394","url":null,"abstract":"In this paper1 we consider the numerical solution of Helmholtz-type Partial Differential Equations in convex polygons, using a numerical technique based on the unified transform method. The key step of this approach is the utilization of the so-called global relation, which is an equation that couples the integral transforms of the given and the unknown boundary data, characterizing a Dirichlet-to-Neumann map. Solving the global relation in the complex k-plane, results in the determination of the missing boundary values, given a computational domain and prescribed boundary conditions. The considered numerical technique depends on the partitioning of the computational domain into a predetermined number of concentric polygons where the solution is required. Starting from the boundaries and proceeding towards the center of the domain, a spatial-marching procedure is used in order to compute the solution at each concentric polygon, using the Dirichlet and Neumann values computed via the global relations. The global relations are solved numerically using a collocation method in the complex k-plane, adapting the k-parameter at each spatial level. Numerical results indicating the applicability of the proposed method are provided, along with discussions concerning the implementation details.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132085925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. C. Theodosiou, Dimitrios Karapiperis, Vassilios S. Verykios
{"title":"Using Wavelets for Matching Records Privately","authors":"T. C. Theodosiou, Dimitrios Karapiperis, Vassilios S. Verykios","doi":"10.1145/3139367.3139371","DOIUrl":"https://doi.org/10.1145/3139367.3139371","url":null,"abstract":"This paper presents a wavelet-based methodology for performing privacy preserving record linkage. The proposed methodology is introduced in a bottom-up approach, starting from simple text matching and extending to actual record linkage. The discrete wavelet transform, along with some privacy preserving operations, is employed to cast text into a numerical sequence of fixed length. Database records are then treated as collections of such numerical sequences. Practical examples and implementation details are provided during all development phases. The method is applied on simulated data of bibliographic records, and results demonstrate that performance is comparable to other successful methodologies.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133885356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Zinas, Sotirios Kontogiannis, G. Kokkonis, S. Valsamidis, I. Kazanidis
{"title":"Proposed open source architecture for Long Range monitoring. The case study of cattle tracking at Pogoniani","authors":"N. Zinas, Sotirios Kontogiannis, G. Kokkonis, S. Valsamidis, I. Kazanidis","doi":"10.1145/3139367.3139437","DOIUrl":"https://doi.org/10.1145/3139367.3139437","url":null,"abstract":"Wireless communications play a significant role in the spread of the Internet of Things. Power consumption, Long range coverage, bandwidth and security are critical factors for the blossom of each wireless technology. This paper presents authors experimentation and implementation journey to open source IoT for animal tracking. Focusing on cows, it describes the LoRaWAN architecture for long range communications and analyses the high level system architecture for cattle tracking. Furthermore, a software application and protocol has been developed and presented.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vangjel Kazllarof, Stamatis Karlos, S. Kotsiantis, M. Xenos
{"title":"Automated hand gesture recognition exploiting Active Learning methods","authors":"Vangjel Kazllarof, Stamatis Karlos, S. Kotsiantis, M. Xenos","doi":"10.1145/3139367.3139414","DOIUrl":"https://doi.org/10.1145/3139367.3139414","url":null,"abstract":"Automated hand gesture recognition is a trend that comes from the mixture of Machine Learning, Human Computer Interaction and Computer Vision fields. Its integration with several aspects of daily life has been proven exceptionally effective, improving the corresponding applications and their availability to larger groups of people. Although such systems are constructed based on generic rules, extra user-based information could be provided for tuning reasons. This work exploits Active Learning theory for enhancing the learning ability of the implemented hand gesture recognition system examining several supervised algorithms. The proposed framework does not demand neither much computational resources nor special equipment, favoring its adoption by both academic institutes and domestic users.1","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130403404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Programming Languages' Energy Consumption: An Empirical Study","authors":"Stefanos Georgiou, M. Kechagia, D. Spinellis","doi":"10.1145/3139367.3139418","DOIUrl":"https://doi.org/10.1145/3139367.3139418","url":null,"abstract":"Motivation: The energy efficiency of it-related products, from the software perspective, has gained vast popularity the recent years and paved a new emerging research field. However, there is limited number of research works regarding the energy consumption of relatively small programming tasks. This knowledge is critical to be known especially in cases where millions of small tasks are running in parallel on multiple devices all around the globe. Goal: In this preliminary study, we aim to identify energy implications of small, independent tasks developed in different programming languages; compiled, semi-compiled, and interpreted ones. Method: To achieve our purpose, we collected, refined, compared, and analyzed a number of implemented tasks from Rosetta Code, that is a publicly available Repository for programming chrestomathy. Results: Our analysis shows that among compiled programming languages such as C, C++, Java, and Go offer the highest energy efficiency for all of our tested tasks compared to C#, VB.Net, and Rust. Regarding interpreted programming languages PHP, Ruby, and JavaScript exhibit the most energy savings compared to Swift, R, Perl, and Python.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching software project management using agile paradigm","authors":"P. Fitsilis, Alex Lekatos","doi":"10.1145/3139367.3139413","DOIUrl":"https://doi.org/10.1145/3139367.3139413","url":null,"abstract":"Agile software engineering methods have recently emerged as a new and different way of developing software as compared to the traditional methodologies. Universities already started to teach agile software engineering, courses on agile methods at the undergraduate and graduate levels however the correct teaching approach is still under research. This study is addressing the problem of agile teaching, its efficiency as perceived by academics and students and finally how the future software developers will acquire the skills required by the software industry. In order to answer to this question a survey was done among current and former computer science students, gathering data from 200 students that attended university in the past 5 years. Most of these students have previously attended a course meant to teach agile methods through the completion of a capstone project and they were required to provide feedback regarding their views on the agile methods used as well as the method of teaching.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121659577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Spathoulas, Paraskevi Vennou, Alexandros Loukidis
{"title":"Privacy preserving platform for profitable mobile crowd sensing and users' adoption","authors":"G. Spathoulas, Paraskevi Vennou, Alexandros Loukidis","doi":"10.1145/3139367.3139403","DOIUrl":"https://doi.org/10.1145/3139367.3139403","url":null,"abstract":"Mobile crowd sensing enables users to collaborate in terms of data collection. In practice, end users collect data through their smart devices and then share it with other users, who find it useful. A data request consists of specific parameters such as location, time or type of data. It is published and users that can fulfill this request send corresponding data, by mainly using their smart-phone as sensing device. While this approach is an interesting alternative when it comes to data collection, it creates a significant privacy concern. In this paper a privacy preserving platform for profitable mobile crowd sensing is presented. Data encryption and bitcoin payments are employed to protect users' privacy. In order to research the users' adoption of such a solution, a survey has been conducted and the results are analyzed.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123122784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing Business Value and Human Determinants: An Empirical Investigation","authors":"N. Kyriakou, E. Loukis","doi":"10.1145/3139367.3139485","DOIUrl":"https://doi.org/10.1145/3139367.3139485","url":null,"abstract":"There are high expectations that cloud computing (CC) can generate sizeable business value (BV) for firms, which includes important benefits, associated with costs reduction, agility enhancement and innovation facilitation and support. However, limited empirical research has been conducted in this direction, in order to investigate to what extent these high expectations are fulfilled, as well as the level of business value that firms realize from CC, and the magnitudes of the specific benefits that firms really obtain from it, as well as their determinants. Our paper contributes to filling this research gap. It investigates the effect of a set of human factors, which concern firm's general human capital, ICT specific human capital, as well the co-operation and relationship between the personnel of the ICT unit and the personnel of the business units, on the BV generated by CC, having as theoretical foundation the 'resource-based view' of the firm theory. For this purpose, we have used data collected through a survey from 115 firms from technologically developed sectors of the Greek economy, from which a CC BV regression model has been estimated. It has been concluded that neither firm's general human capital (quantified by the share of firm's employees having tertiary-level formal education), nor its ICT human capital (quantified by the share of ICT employees), per se impact the BV generated by CC. On the contrary, the relationship and co-operation between the ICT unit personnel and the business units' personnel have a positive effect on the BV from CC usage. Our findings indicate that it is not the mere acquisition of human resources (highly educated business and ICT employees), but their utilization for the development of capability for productive and effective co-operation and relationship among the ICT and business personnel, that can lead to higher levels of BV from CC usage.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"73 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114005241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}