Collaborative Learning Environments

Learning Outcomes

This course introduces students to theoretical and applied research of collaborative learning (CSCL/W) depending in social cognition and social constructivism learning theories (situated learning – cognitive apprenticeship).

On completion of the course, the students will be able:

  • to demonstrate knowledge in designing CSCL/W in educational and business settings.
  • to choose and critically evaluate the perspectives of social & dialectical constructivism:
  • to realize how CSCL/W can facilitate sharing and distributing of knowledge and expertise among community members.
  • to synthesize projects in the context of socio-cognitive and social constructivism models in a CSCL/W.
  • to create CSCL project in schooling, training/vocational environments.
  • to realize the added value of collaboration in global society (multicultural awareness).

Course Contents

  • CSCL/W in educational and working environments for peers in shared/collaborative settings.
  • Socio-Cognitive approaches of learning.
  • The social & dialectical constructivism: CSCL theories, principles, strategies, roles, artifacts/activities.
  • The Vygotskian theory, situated learning, cognitive flexibility theory, cognitive apprenticeship, problem/project-based learning, self-regulated learning, self-directed learning, communities of practice.
  • Shared and distributed knowledge and expertise with peers and community members (community of practices).
  • Authentic assessment in collaborative learning on digital systems related to school/training/vocational environments.

Recommended Readings

Dillenbourg P., Fischer F., Kollar I., Mandl H. & Haake J.M. (2007): Scripting Computer-Supported Collaborative Learning, Springer.

Kobbe L. (2006): Framework on multiple goal dimensions for computer-supported scripts, Kaleidoscope.

Recommended Readings

Barkley, E & Major, C. H. & Cross, K.P. (2016) Collaborative Learning Techniques: A Handbook for College Faculty 2nd Edition, Jossey-Bass.

Goggins, S.P., Jahnke, I. & Wulf, V. (2013). Computer-Supported Collaborative Learning at the Workplace: CSCL@Work, Elesevier.

Sharratt, L.D. & Planche B. M. (2016). Leading Collaborative Learning: Empowering Excellence, Corwin.

 

 

IT-Centric Professional Development

Learning Outcomes

This course introduces students in consulting procedures for the personal and professional development in an IT context. It addresses the needs of students as future workers on ‘how to be involved in a IT workforce community’ by enhancing them to provide emerging professional development opportunities and practices.

On completion of the course, the students will be able to:

    • understand the theoretical background of the consulting (in physical and IT context).
    • select and design the appropriate components for their academic and career path (KPIs).
    • critically evaluate a set of skills for professional development.
    • design and build products/services via appropriate components to an institutional IT context and demands (needs, motivations, attitudes, ethics).
    • compose a personal/professional career plan for further development in the society (KPIs).

Course Contents

  • Basic consulting theories and practices necessary for the development of effective performance on an academic and professional environment in IT business community (Kirkpatrick model, SRL, SDL).
  • Continuing Professional Development programs (CPD).
  • Skills and Competencies.
  • Communication and Collaboration (active listening, verbal, non-verbal, communication).
  • Μentoring and coaching.
  • Personal and affective factors in performing (needs, attitudes, motivation, self-esteem etc.
  • Organizational factors (ethics, leadership).
  • Problem solving, innovation, creativity.
  • Evaluation (KPIs).

Recommended Readings

  • Robinson D. & Robinson J. (2008): Performance Consulting: A practical Guide for HR and Learning Professionals, Berrett-Koehler Publishers.
  • Rosenberg M. (2001): E-Learning Strategies for Delivering Knowledge in the Digital Age, McGraw-Hill.

Advanced Topics in Wireless Communications

Learning Outcomes

This course focuses on wide area wireless networks and addresses advanced topics in physical layer design, multi-carrier systems and wireless standards evolution.

At the end of this course, students will have acquired advanced/in depth knowledge in the field of Wireless Communications, with particular emphasis on wireless channel modelling, Multiple Input Multiple Output systems design, and performance evaluation in terms of capacity.

The students will be capable of performing numerical calculations of various wireless parameters, stochastic modelling of wireless transceivers and performance assessment by means of analytical evaluations and simulations, with main focus on baseband processing and radio resources management.

Course Contents

  • Advanced physical layer design topics: modulation and coding
  • Multiplexing in time, space, frequency, code
  • Multiple Input Multiple Output Systems
  • Multi-carrier systems: OFDM/OFDMA.
  • Radio resource allocation: multi-user communications and scheduling, cross-layer optimization.
  • Wireless standards: 3G evolution, IEEE 802.x, 4G and 5G

Recommended Readings

  • Behrouz A. Forouzan, “Data Communications and Networking”, Fourth edition, McGraw-Hill, 2007
  • W Stallings, Wireless Communciations and Networks, Pearson, 2004.
  • D. Tse, P. Viswanath, Fundamentals of Wireless Communciations, 2005.
  • T. S. Rappaport, Wireless communications – Principles and practices, Pearson, 2002.
  • Harri Holma, Antti Toskala, WCDMA for UMTS: HSPA Evolution and LTE, Wiley, 2010.
  • Andrea Goldsmith, Wireless Communications, Cambridge University Press, 2005.

Systems Simulation

Learning Outcomes

he course presents simulation techniques with particular emphasis on discrete event simulation and applications in computer computational systems and communication networks.

Upon successful completion of the course, the students will be in position to:

  • design system models with the required details level that serves better the problem at hand
  • develop simulation programs in general purpose programming language (e.g C++) to simulate and evaluate the behavior of simpler systems
  • use more sophisticated simulation software for the study and performance evaluation of more complex communication networks and computational systems (e.g network simulator ns3 and CloudSim for cloud computing systems)
  • design experiments, collect measurements and interpret and evaluate simulation results

Course Contents

  • Introduction to dynamic discrete event systems.
  • Development of discrete system models, event-advance design, time-advance design, activity-based design.
  • Pseudorandom number generation, random variables generation.
  • Overview of simulation languages and platforms.
  • Development of simulation programs using general purpose programming languages.
  • Measurement techniques, traffic load and experiment design.
  • Statistical analysis of simulation experiments, transient and steady state, data collection, confidence intervals, variation reduction techniques.
  • Simulation exercises and examples of data networks and cloud computing systems. Theoretical results verification.

Recommended Readings

  1. Roumeliotis and Souravlas, “Simulation Techniques”, Epikentro Publications.
  2. Kouikoglou and Konstantas, “Simulation of Discrete Event Systems”, Disigma Publications, 2016.
  3. Harry Perros, “Computer Simulation Techniques – The Definitive Introduction”, free download from https://people.engr.ncsu.edu/hp/files/simulation.pdf
  4. Averill M. Law and W. David Kelton, “Simulation Modeling and Analysis”, McGraw-Hill, Inc.
  5. NS manual and tutorials, https://www.nsnam.org/documentation/

Advanced Artificial Intelligence Topics

Learning Outcomes

Upon successful completion of this course, students should be able to know and develop basic decision making abilities of intelligent agents who are capable of acting in the real world.

Specifically, students acquire knowledge and the abilities to develop and apply

  • planning algorithms
  • methods for re-planning and computing actions’ schedules for acing in the real world
  • knowledge representation and reasoning with ontologies and real-world data
  • basic principles and algorithms for (simple or advanced) decision making
  • algorithms for learning policies towards acting in the real world

Through a critical view of methods and by acquiring experience in building systems in paradigmatic cases.

Course Contents

  • Basic and advanced planning algorithms
  • Replanning and scheduling actions with duration.
  • Reasoning and representation with ontologies and data
  • Decision making principles and methods
  • Reinforcement learning, introduction.

Recommended Readings

  • Stuart Russel and Peter Norvig. Artificial Intelligenc­e: A Μodern Approach, Prentice Hall, 2nd edition (2003). http://aima.cs.berkeley.edu/.
  • Yoav Shoham, Kevin Leyton-Brown Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations, Cambridge University Press, 2009

Associated scientific Journals

  • Artificial Intelligence, Elsevier, ISSN: 0004-3702
  • Journal of Web Semantics, Elsevier, ISSN: 1570-8268

Advanced Topics in Data Analytics

Learning Outcomes

The students after the successful completion of the course will be able:

  • to model and analyze data with appropriate analysis techniques, assess the quality of input
  • to choose the appropriate exploratory and/or inferential method for analyzing data, and interpret the results contextually.
  • to use supervised and unsupervised learning techniques for solving many analysis problems such as prediction, classification, segmentation.
  • to apply methods for the evaluation of the data analysis results.

Course Contents

  • Collection, preparation and representation of data for analysis
  • Linear, logistic regression
  • Classification Techniques (probabilistic classification, decision trees, support vector machines)
  • Predictive analytics and neural networks
  • Recommender systems
  • Graph analysis (applications on social networks)
  • Text mining – sentiment analysis
  • Evaluation of data analysis results

Recommended Readings

  • Mohammed J. Zaki, Wagner Meira Jr. (2018): Data Mining and Analysis Fundamental Concepts and Algorithms, Cambridge University Press.
  • Jure Leskovec, Anand Rajaraman, Jeffrey David Ullman (2014): Mining massive datasets, Cambridge University Press.
  • Top of Form.
  • Bottom of Form.

Student Placement

Students can choose it only once during undergraduate studies (either the 7th or the 8th semester).

Healthcare Information Systems

Learning Outcomes

The objective of this course is to present fundamentals concepts regarding Healthcare Information Systems (HIS). HIS are described at both conceptual and technical level and types of HIS are studied thoroughly. In addition, best practices regarding HIS architectural design, development methodologies and interoperability are analysed. Challenges and perspectives of HIS are presented with reference to modern digital technologies of data analytics and artificial intelligence. The course will incorporate a significant laboratory component with various digital tools (mainly open source) that allow student to implement HIS.

Upon successful completion of the course the students will be able to:

  • Understand the connection between healthcare systems and healthcare information systems
  • Define the users of information and decision support based on existing data
  • Describe the general functions, objectives and advantages of HIS
  • Describe contemporary architectural trends and HIS, in the form of services provided, for supporting important healthcare processes
  • Compare various HIS characteristics and choose the most appropriate systems for specific needs and operational frameworks
  • Develop HIS, by using open source tools, inventing innovative practices in the fields of medical data architecture and management for their multiple exploitation.

Course Content

  1. Healthcare Information Systems: General characteristics. HIS evolution.
  2. HIS analysis, design and implementation.
  3. Patient-oriented HIS development.
  4. Process-oriented healthcare organizations. Healthcare process and data management.
  5. Specialized HIS. Contribution to provided healthcare services.
  6. HIS architectures, integration and interoperability.
  7. HIS security. Standards and security policies.
  8. Presentation of well-known commercial HIS of the global market regarding electronic health records.
  9. HIS challenges and perspectives. HIS in Greece.
  10. HIS development (analysis, design, implementation, testing, operation, maintenance).

Suggested Bibliography

  • Karen A. Wager, Frances W. Lee and John P. Glaser (2009): Health Care Information Systems: A Practical Approach for Health Care Management, Jossey-Bass.
  • Joseph Tan (2010): Developments in Healthcare Information Systems and Healthcare Informatics: Improving Efficiency and Productivity, IGI Global.
  • Charlotte A. Weaver, Marion J. Ball, George R. Kim, Joan M. Kiel, (2015): Healthcare Information Management Systems: Cases, Strategies, and Solutions, Springer.
  • Sean P. Murphy, (2015), Healthcare Information Security and Privacy, McGraw-Hill Education.
  • Pamela K Oachs, Amy Watters, (2016), Health Information Management: Concepts, Principles, and Practice, American Health Information Management Association.
  • International Journal of Healthcare Information Systems and Informatics (IJHISI), IGI Global
  • International Journal of Healthcare Technology and Management, Inderscience
  • International Journal of Medical Informatics, Elsevier.

Information Systems

Learning Outcomes

This course analyses the five main components of an Information System, the different types of IS and issues associated with the implementation and application of IS. With the completion of the course, the student will be in position:

  • to understand and become familiar with the key concepts and principles of information systems, addressing both architectural and implementation aspects.
  • to know the main characteristics of the programming languages used to implement information systems, as well as the key principles for the interconnection of different application components of an information system.
  • to be able to implement code artefacts that realize information systems.

Course Contents

  • Information system.
  • Hardware component, software component, data component, processes component, human actor component.
  • Information system lifecycles, types of ISs.
  • Critical path analysis, business process analysis, IDEF0, IDEF3, DFD.
  • Business process reengineering, business process improvement, factors influencing IS implementation.
  • The impact of information systems on organisation, practical examples of IS, case studies, IS implementation.

Moreover, the EVDOXOS system is utilized to provide additional useful information to the students as well as exercises that respond to the corresponding thematic topics / sessions covered by the course.

Recommended Readings

  • Stair R. & Reynolds G. (2007): Fundamentals of Information Systems, 4th Edition, Thomson Publications.
  • O’Brien J. (2005): Introduction to Information Systems, McGraw Hill.

Cryptography

Learning Outcomes

The aim of this course is to support the students in learning the principles, concepts and applications of cryptography.
Upon successful completion of the course the student will be able:

  • to handle the basic elements of numerical theory and modular arithmetic
  • to manage cryptographic algorithms and their properties
  • basic cryptographic functions, such as pseudo-random sequences, one-way hash functions, shift and displacement networks and feistel networks.
  • the main features for symmetric and asymmetric cryptography are familiar
  • to handle key management systems and digital signatures

Course Contents

  • Basic definitions and concepts; information security.
  • Symmetric cryptography.
  • Digital signatures.
  • Authentication.
  • Public key cryptography.
  • Hash functions.
  • Integrity checking.
  • Key management and random number generators.

Recommended Readings

  • Schneier B. (1996): Applied Cryptography, 2nd Edition, John Wiley & Sons.
  • Stallings W. (2006): Cryptography and Network Security, 4th Edition, Prentice Hall.