{"title":"Energy Balanced Clustering and Data Gathering for Large-Scale Wireless Sensor Networks","authors":"B. Mamalis, Marios Perlitis","doi":"10.1145/3139367.3139425","DOIUrl":"https://doi.org/10.1145/3139367.3139425","url":null,"abstract":"Clustering is an efficient technique for saving energy of wireless sensor networks (WSNs). In this paper a two-level clustering approach is presented, combining a traditional gradient-based clustering technique with an evolutionary optimization technique based on the Gravitational Search Algorithm (GSA), and targeting to improved performance in large-scale WSNs (where typical approaches usually lead to performance degradation). The proposed protocol initially creates energy-balanced multi-hop clusters, where the energy of the sensors increases progressively as getting closer to the cluster head (CH). In the second phase of the protocol an appropriate GSA-based evolutionary algorithm is executed in order to assign groups of CHs to specific 'gateways' for the final data forwarding to the base station (BS). The GSA fitness function is adequately defined taking in account both the distance from the CHs to the gateways and the BS as well as the residual energy of the gateways. Simulation results show the high performance of the proposed scheme as well as its superiority over the native GSA-based approach presented in the literature.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129019204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matthaios Stylianidis, E. Galiotou, C. Sgouropoulou, C. Skourlas
{"title":"Opinion mining using an LVQ neural network","authors":"Matthaios Stylianidis, E. Galiotou, C. Sgouropoulou, C. Skourlas","doi":"10.1145/3139367.3139416","DOIUrl":"https://doi.org/10.1145/3139367.3139416","url":null,"abstract":"Due to the increased use of social media in the past few years, a large volume of data has been accumulated which contains human sentiments and opinions. The field that deals with the automated extraction of opinions is named opinion mining. In this paper, we evaluate the performance of an LVQ neural network on document level analysis using a benchmark movie review dataset. Document-level opinion mining aims at classifying a text, usually as positive or negative based on its overall sentiment. In order to reduce the dimensions of the reviews' vector representations, we use the feature selection method Information Gain. We use an exhaustive grid search for hyperparameter tuning and two methods for performance evaluation: a nested cross validation and a non-nested 10-fold cross validation. We study the performance of our model for different numbers of selected features by Information-Gain.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moukoulis Achilleas, D. Eleni, P. Karypidis, M. Dasygenis
{"title":"Real time detection of suspicious objects in public areas using computer vision","authors":"Moukoulis Achilleas, D. Eleni, P. Karypidis, M. Dasygenis","doi":"10.1145/3139367.3139429","DOIUrl":"https://doi.org/10.1145/3139367.3139429","url":null,"abstract":"This is a paper about a Real Time Object Tracking application based on Computer Vision tools. The Background Subtraction technique (BS Technique) is implemented and used to deal with the object tracking on video feeds.The application can extend an established surveillance system by providing custom alerts of suspicious objects to the operators.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos Mantos, Nikolaos Koungalis, Georgios Demesiotis, P. Oikonomou, Antonios N. Dadaliaris, G. Stamoulis
{"title":"WEVIAN: A Web-based Placement Visualizer / Analyzer","authors":"Konstantinos Mantos, Nikolaos Koungalis, Georgios Demesiotis, P. Oikonomou, Antonios N. Dadaliaris, G. Stamoulis","doi":"10.1145/3139367.3139396","DOIUrl":"https://doi.org/10.1145/3139367.3139396","url":null,"abstract":"One of the most important stages of a typical ASIC (Application-specific integrated circuit) design flow, is physical design. The most prominent step of the aforementioned stage is placement. Major design challenges are regulated while traversing this stage in order to accommodate the final sign-off. Various aspects of the design might be modified during this step, and the primary manner to keep track of these modifications is usually through detailed text reports, concerning universal metrics like density and wire-length, and generic static visualizations, due to the timing overhead it introduces to the overall procedure. However, a detailed and interactive depiction of the final result might provide insights concerning the quality of the final solution and the effectiveness of the applied algorithms. In this paper we present WEVIAN, a web-based placement visualizer/analyzer that enhances the design procedure by adding interactivity and offloading part of the workload to a third-party server.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient RDF Query Processing using Multidimensional Indexing","authors":"Akrivi Vlachou","doi":"10.1145/3139367.3139408","DOIUrl":"https://doi.org/10.1145/3139367.3139408","url":null,"abstract":"Efficient management of RDF data is important due to the increasing number of data sources available in RDF, which fosters interoperability and enables data integration and interlinking. An RDF store maintains data in the form of triples, subject (S), property (P), object (O). A common approach for storing RDF data is to follow a so-called \"one-triples-table\" approach, where all triples are stored in a single table. For efficient data access, multiple one-dimensional clustered indexes (for example B+trees) are built, practically replicating and storing the triples in different sort orders, thus enabling efficient random access based on any subset of SPO. An issue that is largely overlooked in related research is that since triples are 3-dimensional, a natural alternative is to store the triples in a (single) multidimensional index. In this paper, we explore this direction and study the performance of evaluating RDF queries over triples stored in a multidimensional index. We propose an efficient algorithm for processing star group pattern queries on top of a multidimensional index. By means of an extensive evaluation on real-life data sets, we demonstrate the merits of our indexing scheme and the efficiency of our algorithm.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115324318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Kostopoulos, I. Chochliouros, I. Papafili, A. Drakos
{"title":"Enhancing Privacy Using Crowdsourcing Mechanisms","authors":"A. Kostopoulos, I. Chochliouros, I. Papafili, A. Drakos","doi":"10.1145/3139367.3139405","DOIUrl":"https://doi.org/10.1145/3139367.3139405","url":null,"abstract":"Personal data have become a merchandisable asset encouraging various stakeholders to collect data and trade them without the end-user's awareness and acceptance. Privacy Flag combines crowd sourcing, ICT technology and legal expertise in order to enable citizens to monitor and control their privacy with a user friendly solution provided as a smart phone application and a web browser add-on. In this paper, firstly, we focus on collective protection frameworks and tools that intend to address the arising challenges with respect to citizen awareness over data protection. Then, we present the Universal Privacy Risk Area Assessment Methodology, as well as the main functionalities of two Privacy Flag tools we developed; the browser add-on and the smartphone application.1","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121364886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ioannis Mamalikidis, Christos Karapiperis, L. Angelis, Grigorios Tsoumakas, I. Vlahavas
{"title":"Machine Learning Methods for Customer's Payment Acceptance Prediction in an Electricity Distribution Company","authors":"Ioannis Mamalikidis, Christos Karapiperis, L. Angelis, Grigorios Tsoumakas, I. Vlahavas","doi":"10.1145/3139367.3139406","DOIUrl":"https://doi.org/10.1145/3139367.3139406","url":null,"abstract":"In this short paper, we use machine learning methods to maximise the efficiency in the Hellenic Electricity Distribution Network Operator (HEDNO) S.A.'s project management by predicting which upcoming projects are going to be paid by the customer, thus enabling the company to fetch all needed materials in time, and to avoid unwanted delays in the operations of the company.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of Gender Privacy in the use of Cloud Computing Services","authors":"Panayiota Efthymia Michalopoulou, Christos Kalloniatis","doi":"10.1145/3139367.3139397","DOIUrl":"https://doi.org/10.1145/3139367.3139397","url":null,"abstract":"The present study's primary objective is to try to determine whether gender, combined with the educational background of the Internet users, have an effect on the way online privacy is perceived and practiced within the cloud services and specifically in social networking, e-commerce, and online banking. An online questionnaire was distributed through e-mail and the social media (Facebook, LinkedIn, and Google+). Our primary hypothesis is that an interrelationship may exist among a user's gender, educational background, and the way an online user perceives and acts regarding online privacy. An analysis of a representative sample of Greek Internet users revealed that there is an effect by gender on the online users' awareness regarding online privacy, as well as on the way they act upon it. Furthermore, we found that a correlation exists, as well regarding the Educational Background of the users and the issue of online privacy.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129157193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Fuzzy Linguistic 2-Tuples to Collectively Prioritize Software Requirements based on Stakeholders' Evaluations","authors":"V. Gerogiannis, Georgios Tzikas","doi":"10.1145/3139367.3139430","DOIUrl":"https://doi.org/10.1145/3139367.3139430","url":null,"abstract":"Efficient consideration of all stakeholders' needs and perspectives in a software project is a key challenge, especially when prioritizing the software requirements to be developed in the next software release. This paper presents a new requirements prioritization approach that aims to collectively prioritize software requirements based on their ratings expressed from different stakeholders. The proposed approach follows the steps of a value-oriented process in which multiple and possibly distributed stakeholders assess the values of candidate requirements with respect to various prioritization criteria. The approach applies a group-based, fuzzy multi-criteria technique requiring from involved stakeholders to evaluate requirements using linguistic terms. Stakeholders' linguistic evaluations are aggregated to collectively derive more objective and reasonable assessments on the final requirements' priorities1.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129906255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Template matching of a coarse grain reconfigurable architecture datapath using constraint programming","authors":"M. Dasygenis, T. Karpouzis, Konstantinos Stergiou","doi":"10.1145/3139367.3139420","DOIUrl":"https://doi.org/10.1145/3139367.3139420","url":null,"abstract":"A major hindrance on creating the custom datapath is the configuration of the reconfigurable structures, something that has been reported on multiple occasions by the respective authors. We were motivated by the lack of tools for the configuration of such units and created a tool that can accept a control data flow graph of an application and map the user-defined operating templates. Our online tool that operates on the theory of constraint programming is efficient and can map within seconds a full control data flow graph of an application, to the given operating templates.","PeriodicalId":436862,"journal":{"name":"Proceedings of the 21st Pan-Hellenic Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}