Learning Outcomes
The course’s material includes the basic concepts related to system interoperability, and international standards and initiatives on system interoperability. The European Interoperability Framework is analyzed and crrent technologies / standards / standards / specifications are presented for different domains (indicative: eGovernment, eProcurement, eInvoicing, eHealth).
Upon successful completion of the course, the students will be in position to:
- Explain the key concepts related to system interoperability.
- Explain the basic principles of the European Interoperability Framework.
- Apply design methodology for interoperable digital services.
- Evaluate and select the appropriate specifications to ensure interoperability of systems in various eGovernment domains.
Course Contents
- Introduction to systems interoperability
- Basic principles, definitions and benefits
- Main approaches and requirements
- International Standards and Initiatives
- European Interoperability Framework
- Interoperability at organizational, semantic and technical level
- Methodology for designing interoperable digital services
- Interoperable public services
- Interoperability in eProcurement
- Interoperability in eInvoicing
- Interoperability in eHealth
Recommended Readings
- Notes and course slides
- Papers
Learning Outcomes
Web applications are the basis of service provisioning in future internet environments. The course includes both theoretical lectures and laboratory exercises. With the completion of the course, the student will be in position to:
- Understand and become familiar with the key concepts and principles of web and mobile programming, the methodologies and techniques for the development and management of future web applications.
- Know the main design and implementation principles of for the realization of web and mobile information systems.
- Be able to implement code artefacts that enable the development of web and mobile information systems by exploiting the programming techniques and methods analysed during laboratory exercises.
Course Contents
- Introduction.
- Basic concepts
- Functionalities
- Used protocols
- Development of web services and applications.
- Architectures: Client-server and peer-to-peer models, Service Oriented Architectures
- Java Application Programming Interfaces, Sockets
- Design and development of interfaces.
- Asynchronous JavaScript and XML (Ajax)
- Relevant frameworks (jQuery, Bootstrap)
- Multimedia web applications.
- Categories of multimedia services
- Stored audio and video streaming applications
- Real-time interactive web applications
- Quality of service management
- Portable information systems.
- Android Stack
- Architectural design of portable information systems
- Implementation of mobile information systems
- Data analytics and artificial intelligence
- Collection and storage of data through information systems (SQL, NoSQL, Object stores)
- Techniques and frameworks for data analytics (Apache SPARK, Tensorflow, Keras)
- Data management and analytics lifecycle
Moreover, the EVDOXOS system will be utilized to provide additional useful information to the students as well as exercises that respond to the corresponding thematic topics / sessions covered by the course.
Recommended Readings
- D. Gavalas, V. Kasapakis, T. Chatzidimitris, “Mobile Technologies”
- C. Douligeris, R. Mavropodi, E. Kopanaki, A. Karalis, “Technologies and Programming in the Web”
Learning Outcomes
The course seeks to familiarize students with the basic principles governing the use of quantum pheonomena for solving computational problems. It focuses on the presentation of the mathematical background that is required to model quantum phenomena related to computational processes and to the analysis of quantum operations and algorithms capable of being executed by quantum computers. Furthermore, the course analyzes the relation between classical and quantum computations and provides a survey of the many open problems that exist in the quantum computing field. At a more applied level the course describes modern programming environments for quantum computing.
Course Contents
- Mathematical Background
- Elements of Linear Algebra, Elements of Complex Analysis
- Elements of Quantum Mechanics
- Quantum mechanical behavior in electrons and photons (spin, polarization) – Quantum Mechanical Experiments
- Qubits and their Attributes
- Representation, Superposition, Tensor Product, Entanglement, Measurement, Bell’s Inequality
- Classical Logic, Gates and Circuits
- Quantum Gates and Circuits
- Quantum Algorithms
- Deutsch-Josza, Simon, Grover, QFT, Shor
- Programming Environments for Quantum Computing
Recommended Readings
- Nielsen, M. A., Chuang, I. L., Quantum Computation and Quantum Information, Cambridge University Press, 2010.
- Instructor’s Notes
Learning Outcomes
The students upon the successful completion of the course will be able:
- to apply the appropriate techniques for programming and managing database systems
- to know the basic storage and data organization structures.
- to apply query processing, query optimization and transaction management mechanisms.
- to understand the mechanisms that ensure the integrity of the system in the case of multiple concurrent users with access to the same data and database recovery methods in case of failure.
Course Contents
- Introduction to Database Management Systems (DBMSs). Fundamental concepts of DBMSs, database applications, overview of data models.
- Data storage and file organization.
- Query processing methods
- Query optimization methods.
- Transaction management: characteristics of a transaction management system.
- Concurrency Control.
- Database recovery methods.
- Parallel and Distributed databases: design, query processing and transaction management in distributed systems.
Recommended Readings
- Ramakrishnan R. & Gehrke J. (2002): Database Management Systems (3rd Edition), McGraw Hill.
- Elmasri R. & Navathe S.B. (2007): Fundamentals of Database Systems (5th Edition), Addison-Wesley.
Learning Outcomes
The aim of the course is to familiarize students with the concept of security in mobile / wireless communications. Mobile / wireless communications provide mobile users with a wide range of multimedia services that already exist for non-mobile users and stable networking, regardless of location. Along with new prospects, however, mobile / wireless communications raise new concerns about security issues.
Upon successful completion of the course, the student will be able to handle, apply and evaluate the security techniques and measures applied to mobile and wireless environments.
Course Contents
- Wireless security
- WLAN, IEEE 802.11
- Authentication check on IEEE 802.11
- RADIUS & EAP methods
- IEEE 802.1x
- WEP
- IEEE 802.11i, WPA, WPA2 (TKIP, CCMP)
Recommended Readings
- Zhang Y., Zheng J. & Ma M. (2008): Handbook of Research on Wireless Security, Information Science Reference.
- Butty L. & Hubaux J.-P. (2007): Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge University Press.
Learning Outcomes
The aim of the course is to present and analyze the measures implemented on a network infrastructure, the policies adopted by the network administrator to protect the network and its resources against unauthorized access, and the effectiveness (or lack of) of them. The course focuses on the security of wired-fixed networks that use Internet technology. The mechanisms and security protocols that ensure the operation of the above networks and the data of their users are presented and analyzed.
Upon successful completion of the course, the student will be familiarized with and will apply different security measures and techniques applied to wired networks that aim to provide security services to users of a network as well as to its providers.
Course Contents
- Security at lower layers.
- Network layer security solutions.
- Application layer security solutions.
- Key management protocols; identity management protocols.
- Firewalls.
- Trust management.
- Distributed authentication systems and intrusion detection systems.
Recommended Readings
- Stallings W. (2007): Network Security Essentials, Applications and Standards, 3rd Edition, Prentice Hall.
- Kaufman C., Perlman R. & Speciner M. (2002): Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall.
Learning Outcomes
The aim of the course is to enable students to understand the basic principles of electromagnetic systems for wireless communications. By concluding the course, students are able to
- identify, describe and distinguish the basic characteristics of electromagnetic systems describe physical laws of electromagnetism using appropriate mathematical tools
- distinguish the type of antenna and examine its characteristics
- compute metrics which are extensively used in wireless systems and design basic wireless links
- analyze and design more complicated wireless systems
By concluding the lab sessions students are able to
- understand physical phenomenon by using mathematical tools
- identify and apply theory in real world problems
- use professional antenna design tools for the first time
Course Contents
Initially, introductory concepts of the Theory of Electromagnetic Fields are provided (Sources of Electromagnetic Fields, Electrostatic Fields, Dielectric Modes and Boundary Conditions, Permanent Magnetic Fields, Biot-Savart Law, Magnetic Flow Density, Gauss Law, Lorenz Power). Subsequently, electromagnetic waves in space are described (Maxwell equations, sinusoidal time variations, free space conditions and wave equation, uniform plane waves in lossless media, wave polarization). Thereafter, the students are introduced to antenna theory and the fields of radiation (potential functions, wave radiation areas, far field assumption, generic calculation methodology of radiation fields by antennas, basic key antenna features, antenna as a circuit element, antenna effective length). Examples of antennas are then studied (Hertz dipole, linear dipole antenna of arbitrary length, dipole λ/2, small circular loop antenna). Finally, the fundamental elements of electromagnetic wave propagation are examined (frequency bands & services/applications, wave classification, Friis’ equation and Free Space Loss, reflection & transmission, plane-earth model).
Papers, lectures, case-studies, examples and web pages with valuable information are uploaded at the course web page (Evdoxos).
Recommended Readings
- “Wireless Communications” in Greek language, Book code in www.eudoxus.gr: 68393538, Edition: 2nd edition/2017, Authors: Kanatas Athanasios, Pantos Georgios, ISBN: 978-960-491-112-7, Publisher: A.Papasotiriou & Sia I.K.E (1st Book)
- “Antennas – Wireless Links”, Book code in www.eudoxus.gr: 18548842, Edition: 1st edition/2018, Writers: Kapsalis C., Kottis P., ISBN: 960-8050-96-0, Publisher: A. Tziola & Sons S.A. (2nd Book)
Associated scientific Journals
- ΙΕΕΕ Transactions on Antennas & Propagation
- IEEE Communications Magazine
- IEEE Antennas & Wireless Propagation Letters
Learning Outcomes
The objective of this course is to focus on short range communications with emphasis on wireless local area networks (WiFi), adhoc networks, wireless sensor networks and applications.
At the end of this course, students will have acquired advanced/in depth knowledge in the field of Short Range Communications, with particular emphasis on baseband processing physical layer techniques, and Medium Access Control design.
The students will be capable of performing numerical calculations of various wireless parameters, stochastic modelling of wireless transceivers and performance assessment by means of analytical evaluations and simulations. The students will also be capable of comprehending the design principle of Wireless Local Area Networks and Wireless Sensor Networks of Internet of Things applications.
Course Contents
- WiFi techniques, technologies, protocols and standards.
- Short range communications: Personal Area Networks (PAN), Body Area Networks (BAN), Ultra Wide Band communications.
- AdHoc Networks: Physical layer and transceiver design, MAC layer design, connectivity, topologies and routing.
- Wireless Sensor Networks: Information-theoretic bounds on sensor network performance, detection and estimation, cooperative transmission, localization and positioning, energy efficiency.
- Applications: eCommerce, safety, digital home, eHealth.
Recommended Readings
- Behrouz A. Forouzan, “Data Communications and Networking”, Fourth edition, McGraw-Hill, 2007.
- W Stallings, Wireless Communciations and Networks, Pearson, 2004.
- D. Tse, P. Viswanath, Fundamentals of Wireless Communciations, 2005.
- T. S. Rappaport, Wireless communications – Principles and practices, Pearson, 2002.
- Swami A. (Ed.) (2007): Wireless Sensor Networks: Signal Processing and Communications, John Wiley and Sons.
- Kraemer R. & Katz M. (2008): Short-range wireless communications: Emerging technologies and applications, Wiley.
- Andrea Goldsmith, Wireless Communications, Cambridge University Press, 2005.
Learning Outcomes
The students upon the successful completion of the course will be able:
- to evaluate the quality of the data to be analyzed and apply the appropriate data pre-processing techniques,
- to select the appropriate data mining technique based on requirements and data type,
- to design and develop data warehouses,
- to use the appropriate data mining techniques and tools to extract knowledge from data collections,
- to evaluate the quality of data mining results.
Course Contents
- Introduction to the fundamental data mining concepts and techniques: main steps of knowledge and data discovery, requirements of developing data mining approaches.
- Data pre-processing: data cleaning, transformation, dimensionality reduction.
- Data warehouses: multidimensional models, architecture, implementation of data warehouses, OLAP.
- Clustering: partitional, hierarchical, density-based, grid-based, spectral clustering, clustering applications.
- Classification: Bayesian classifiers, decision trees, k-nearest neighbors.
- Association rules: Apriori, representative association rules.
- Quality assessment in data mining: evaluation of classification models, association rules interestingness measures, cluster validity.
- Web mining: link analysis, text mining, web search, PageRank.
Recommended Readings
- Han J. & Kamber M. (2006): Data Mining: Concepts and Techniques, 2nd Edition, Morgan Kaufmann.
- Chakrabarti S. (2002): Mining the Web, Discovering Knowledge from Hypertext Data, Morgan Kaufman Publishers.
Learning Outcomes
The aim of this course is to familiarize students with best practices for the design and implementation of modern innovative telecom systems and applications. The main topics discussed include systematic multi-criteria requirement analysis, transformation of user requirements to architectural specifications and system functionality, design optimization for high performance and QoS, installation and deployment procedures, as well as system validation against initial requirements and specifications. The presented methodologies derive analytically from real case studies of innovative telecommunication systems and applications with extremely high added value and impact (e.g. the European Space Agency SATWAYS project in the field of Air Traffic Control). Students will further gain significant practical experience in the design and implementation of innovative telecommunication systems through exercise solving and development of small projects. Last but not least, the course presents an in-depth commercial feasibility analysis of the developed systems.
At the end of the course, students will be equipped with advanced expert and analytical knowledge for the consistent design, development and validation of innovative embedded telecommunication systems (see Course Content) meeting strict quality requirements regarding the provided telecommunication services. The obtained knowledge will allow the critical and analytical deepening as well as performing innovative research in the broad scientific domain of embedded telecommunication systems and applications.
Students will be capable of:
- transforming user requirements to telecommunication systems architectural specifications and functionality.
- specifying prototype embedded telecommunication systems, including their architectural layering (hardware, embedded software, software), according to specific QoS requirements for the provided services.
- designing and specifying modern voice communication systems for next generation networks.
- designing QoS models involving the end-to-end telecommunication transmission path from service provisioning to the end user, as well as extracting performance requirements and specifications for segments of the end-to-end transmission path.
- optimizing the design of telecommunication systems for high performance and QoS.
- explaining the details of the E-model adaptation and simplification of the discrete noise and advantage parameters in the demanding field of radio voice communications. The E-model (ITU-T Rec. G.107) is a transmission planning tool that provides a prediction of the expected voice quality, as perceived by a typical telephone user, for a complete end-to-end (i.e. mouth-to-ear) telephone connection under conversational conditions.
- exploiting and solving the adapted voice QoS model for extracting system performance design parameters (e.g. for selecting appropriate voice codecs assuming a limited end-to-end delay and the constant values of delay parameters along the telecommunication transmission path segments).
- compiling detailed plans for technical validation of system deliverables against the initial user requirements and system specifications.
- analyzing the satellite link budget for the provisioning of telecommunication services and extracting requirements regarding the underlying telecommunication system.
- analyzing the installation, deployment and operational details of the developed systems.
- compiling workplans, work packages, time schedules, lists of technical deliverables and reports, critical paths, milestones and sample budgets involving R&D projects that design and develop innovative embedded telecommunication systems.
- performing indicative techno-economic studies and commercial feasibility analysis regarding innovative embedded telecommunication systems, including a SWOT analysis (strengths, weaknesses, opportunities, threats).
Course Contents
- Exemplary Innovative telecommunication systems and applications with high added value and impact.
- Systematic multi-criteria requirement analysis.
- Transformation of user requirements to architectural specifications and system functionality.
- Design optimization for high performance and QoS.
- Adaptation and validation of the E-model in the radio communications use case, including satellite transmission. The E-model (ITU-T Rec. G.107) is a transmission planning tool that provides a prediction of the expected voice quality, as perceived by a typical telephone user, for a complete end-to-end (i.e. mouth-to-ear) telephone connection under conversational conditions.
- Exploitation of the voice QoS model for extracting system performance design parameters (e.g. for selecting appropriate voice codecs assuming a limited end-to-end delay and the constant values of delay parameters along the telecommunication transmission path segments).
- Voice communications based on the NGN (Next Generation Network) standard.
- Installation procedures and relevant issues.
- System validation against initial requirements and specifications.
- Commercial feasibility analysis.
- Exercises and programming projects.
Recommended Readings
- Apostolacos S. & Meliones Α. (2014): Satellite IP Radio Communications in Air Traffic Control: Design, Implementation and Evaluation of Telecommunication Systems (in Greek).
- S. Apostolacos, A. Meliones, S. Badessi, G. Stassinopoulos, “Adaptation of the E-model for satellite internet protocol radio calls in Air Traffic Control”, IEEE Transactions on Aerospace and Electronic Systems, 50(1), January 2015.
- S. Apostolacos, M. Manousos, A. Meliones, D. Kavadas, G. Lykakis, A. Manousarides, M. Kardaris, K. Simeakis, Design and Implementation of a Solution for the Provisioning of Converged Remote Tower and Facility Management Services over Satellite IP for Greek Heliports, IEEE Communications Magazine, 46(8), August 2008.