{"title":"Handoff in picocellular mobile networks with fast-moving users: Problems and Solutions","authors":"N. Tselikas","doi":"10.1145/3139367.3139388","DOIUrl":"https://doi.org/10.1145/3139367.3139388","url":null,"abstract":"The paper presents the most important handoff problems in picocellular mobile networks arising from both the native restrictions of such networks as well as from the high velocity of end-users in outdoor environments. It also analyzes various potential solutions by applying handoff schemes specifically designed for these problems. Finally, the proposed solutions are evaluated and the paper presents the corresponding results.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122679797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Information System for Judicial and Public Administration Using Artificial Intelligence and Geospatial Data","authors":"Georgios N. Kouziokas","doi":"10.1145/3139367.3139402","DOIUrl":"https://doi.org/10.1145/3139367.3139402","url":null,"abstract":"The adoption of information technology in judicial and public administration has become a major need nowadays with the rapid growth of information regarding managerial issues. This paper presents an advanced methodology developed by using Information and Communication Technologies (ICT) and artificial intelligence to support decision making in public and judicial administration. A prototype Management Information System for public administration (MISPA) was developed to provide a computerized way of managing geospatial urban, environmental and crime data of an urban area. This system was developed by using several programming languages, a Database Management System (DBMS) and other technologies and programming tools. The proposed system was developed aiming at the systemization and modernization of public, judicial and police authorities that are associated with issues that have to be dealt by studying urban data regarding crime and environmental data and supports decision making based on crime forecasting.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127572134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Petrellis, I. Kosmadakis, M. Vardakas, F. Gioulekas, M. Birbas, A. Lalos
{"title":"Compressing and Filtering Medical Data in a Low Cost Health Monitoring System","authors":"N. Petrellis, I. Kosmadakis, M. Vardakas, F. Gioulekas, M. Birbas, A. Lalos","doi":"10.1145/3139367.3139382","DOIUrl":"https://doi.org/10.1145/3139367.3139382","url":null,"abstract":"Current work evaluates the precision of low-cost medical sensors, which are incorporated in an e-health platform presented recently by the authors. The sensors' accuracy is an important issue that is investigated in this paper in order to highlight the medical cases where the low-cost developed e-health platform can be used in a fairly reliable way. Specifically, the sensor values obtained from the e-health platform were filtered using the methods of moving average window (MAW), Principal component analysis (PCA) and simplified Kalman filter. It is shown that although moving average window achieves a significant error reduction, the produced output introduces a latency penalty in the original sensor signal. Kalman filter exhibits worse performance from both the MAW and the PCA methods. Finally, it is demonstrated that the PCA method sustains advanced compression of about 30% while in the same time reduces the error of the primary signal measurement, thus improving the sensor accuracy.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121269233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christos Kalogirou, Michalis Spyrou, K. Theodosiou, C. Antonopoulos
{"title":"Scheduling Policies for Heterogeneous, Approximate Computing Systems","authors":"Christos Kalogirou, Michalis Spyrou, K. Theodosiou, C. Antonopoulos","doi":"10.1145/3139367.3139428","DOIUrl":"https://doi.org/10.1145/3139367.3139428","url":null,"abstract":"Energy consumption is a primary concern for modern computer systems. Conservative approaches, such as DVFS, which have been used in the past to optimize the performance / power tradeoff have reached their limits. Heterogeneity is a promising approach: devices with different characteristics, each performance- and energy-efficient for specific computational patterns are combined in the same system. Approximate computing is another more disruptive solution: many applications can tolerate controlled quality loss in exchange to significant improvement of performance and energy footprint. In this paper we introduce three scheduling policies that exploit heterogeneity, one of them combining it with approximate computing. These policies can selectively optimize performance, energy consumption, or the tradeoff between energy consumption and quality of results. They monitor the execution of tasks at runtime in order to identify the appropriate mapping of tasks to devices, as well as to control the degree of approximation. Our experimental evaluation indicates that all three policies closely match the effectiveness of the optimal configuration, selected by an \"oracle\".","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125130331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos Athanasopoulos, Georgios Nikoletos, Georgios P. Georgiadis, I. Stamelos, Spiros Skolarikis
{"title":"Process Management in the Greek Public Sector: A case study in the Municipality of Kalamaria","authors":"Konstantinos Athanasopoulos, Georgios Nikoletos, Georgios P. Georgiadis, I. Stamelos, Spiros Skolarikis","doi":"10.1145/3139367.3139467","DOIUrl":"https://doi.org/10.1145/3139367.3139467","url":null,"abstract":"Before initiating a Business Process Re-engineering and Business Process Automation project an organization needs to understand the concept of Business Process Management and the problems that may arise. This usually requires a team of experts to help, evaluate and perform such tasks. The purpose of this paper is to present the overall approach and the specific steps that were taken by the authors to record, manage, re-engineer and automate a few selected processes from the Municipality of Kalamaria.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132912875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontological Definition of Governance Framework for Security Policies in Cloud Environments","authors":"Simeon Veloudis, I. Paraskakis, Christos Petsos","doi":"10.1145/3139367.3139401","DOIUrl":"https://doi.org/10.1145/3139367.3139401","url":null,"abstract":"The cloud computing paradigm enables enterprises to realise significant cost savings whilst boosting their agility and productivity. However, security and privacy concerns generally deter enterprises from migrating their critical data to the cloud. One way to alleviate these concerns, hence bolster the adoption of cloud computing, is to devise adequate security policies that control the manner in which these data are stored and accessed in the cloud. Nevertheless, for enterprises to entrust these policies, a framework capable of providing assurances about their correctness is required. This work proposes such a framework. In particular, it proposes an approach that enables enterprises to define their own view of what constitutes a correct policy through the formulation of an appropriate set of well-formedness constraints. These constraints are expressed ontologically thus enabling---by virtue of semantic inferencing--- automated reasoning about their satisfaction by the policies.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128399031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Panayiotis Kolokythas, Andreas Komninos, Lydia Marini, J. Garofalakis
{"title":"A lightweight algorithm for the emotional classification of crowdsourced venue reviews","authors":"Panayiotis Kolokythas, Andreas Komninos, Lydia Marini, J. Garofalakis","doi":"10.1145/3139367.3139422","DOIUrl":"https://doi.org/10.1145/3139367.3139422","url":null,"abstract":"Finding emotions in text is an area of research with wide-ranging applications. Analysis of sentiment in text can help determine the opinions and affective intent of writers, as well as their attitudes, evaluations and inclinations with respect to various topics. Previous work in sentiment analysis has been done on a variety of text genres, including product and movie reviews, news stories, editorials and opinion articles, or blogs. We describe a lightweight emotion annotation algorithm for identifying emotion category & intensity in reviews written by social media (Foursquare) users. The algorithm is evaluated against human subject performance and is found to compare favourably. This work opens up opportunities for solving the problem of helping user navigate through the plethora of venue reviews in mobile and desktop applications.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128817681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eleni Boumpa, Ioanna Charalampou, Anargyros Gkogkidis, A. Kakarountas
{"title":"Home Assistive System for Dementia","authors":"Eleni Boumpa, Ioanna Charalampou, Anargyros Gkogkidis, A. Kakarountas","doi":"10.1145/3139367.3139435","DOIUrl":"https://doi.org/10.1145/3139367.3139435","url":null,"abstract":"This work proposes an innovative home assisted system, based on the interaction of the stimulus earpiece. It addresses a need of people suffering from dementia as well as their familiars to be recognized by them and have better interaction and collaboration. The project aims not only to people already suffering from dementia at early stages but also people with genetic predisposition who may be trained appropriately to discover and create acoustical stimuli associated to their familiars. The system offers an ubiquitous recognition system, without the need for extensive training of the patient, based on the principles of music therapy and the features of wireless communication. To the best of the authors knowledge, this is the first system of its kind ever reported in the literature.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126385679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning and Images for Malware Detection and Classification","authors":"K. Kosmidis, Christos Kalloniatis","doi":"10.1145/3139367.3139400","DOIUrl":"https://doi.org/10.1145/3139367.3139400","url":null,"abstract":"Detecting malicious code with exact match on collected datasets is becoming a large-scale identification problem due to the existence of new malware variants. Being able to promptly and accurately identify new attacks enables security experts to respond effectively. My proposal is to develop an automated framework for identification of unknown vulnerabilities by leveraging current neural network techniques. This has a significant and immediate value for the security field, as current anti-virus software is typically able to recognize the malware type only after its infection, and preventive measures are limited. Artificial Intelligence plays a major role in automatic malware classification: numerous machine-learning methods, both supervised and unsupervised, have been researched to try classifying malware into families based on features acquired by static and dynamic analysis. The value of automated identification is clear, as feature engineering is both a time-consuming and time-sensitive task, with new malware studied while being observed in the wild.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131263775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rao based watermark detector through two-level hierarchical prior in transform domain","authors":"Antonis Mairgiotis, C. Koliopanos, L. Kondi","doi":"10.1145/3139367.3139444","DOIUrl":"https://doi.org/10.1145/3139367.3139444","url":null,"abstract":"In this work, we propose a transform based blind zero-bit watermark detector, designed based on a hierarchical, two-level image prior. This model is applied through Rao hypothesis test, where we detect the hidden information with unknown amplitude. The proposed method is suitable for wavelet domain watermark detection without the need to estimate the appropriate parameters under the alternative hypothesis. The proposed system shows efficient robustness against a variety of known attacks. The experimental results show that the proposed detector has a good performance with or without attacks in terms of ROC (receiver operating characteristics) curves compared with other known state-of-the-art statistical detectors.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}