5th Semester

In the 5th semester, students shall choose one of the three Majors:
1. T&N: Major in "Telecommunications & Networks"
2. SDS: Major in "Software & Data Systems"
3. CIS: Major in "Computantial Infrastructures & Services"

In addition,in this semester, except from the 3 core cources, they shall choose also:
• two (2) compulsory courses (CM) of the Major that they have choosed and
• one (1) optional course (Opt) through the list of the courses that is available in all majors.

Core

DS-518 Artificial Intelligence [C] G. Vouros

Learning Outcomes

Upon successful completion of this course, students should be able:

  • to explain fundamental concepts including agents, problem & state/action/spaces, problem solving via search as a model of thinking, heuristics, knowledge representation and reasoning using logic.
  • to select algorithms for problem solving based on problems characteristics, and characteristics of problem & state/action spaces.
  • to evaluate usefulness, advantages and limitations of alternative algorithms and methods towards increasing computational effectiveness of problem solving
  • to modelling problems as constraint problems, or as problems for proving in logic.

Towards the construction of advanced methods of problem solving.

Course Contents

  • Introduction to artificial intelligence, goals, advances, prospects, limitations, and basic notions regarding agents and problem solving
  • Blind search algorithms
  • Informed search algorithms and proofs of finding optimal solutions
  • Heuristic functions and their construction and selection
  • Local search using hill climbing, simulated annealing, local beam search, genetic algorithms
  • Constraint problem solving: From basic to advanced arc consistency techniques
  • Knowledge representation and reasoning in logic
  • Advanced reasoning algorithms
More »

DS-801 Security Policies and Security Management [C] K. Lambrinoudakis , E.L. Makri

Learning Outcomes

The purpose of the course is to familiarize the students with the concepts of the field of information systems security and to acquire knowledge, experience and skills of implementation of information security policies and information security management methodologies.
In this context, the learning outcomes of the course, after its successful completion, are that the students will be able:

  • to understand the problem of information security as a management problem and the need for information security management systems.
  • to know the basic concepts of information security, risk analysis, business continuity, security incident management, and information security measurement.
  • to analyse and evaluate information security risks using the methodology of ISO / IEC 27005: 2011.
  • to design management systems, information security policies, business continuity plans, disaster recovery plans, and information security measurement processes, and justifying his / her choices.

Course Contents

  • Introductory issues: The issue of information security, the need to protect information, information protection framework, standards and standardization, basic concepts of information security.
  • Information security management systems: Information security as a management problem, basic concepts and necessity of information security management systems, ISO 27k series of standards, ISO / IEC 27001: 2013.
  • Risk analysis, assessment and management: The concept of risk, risk management as a methodology, ISO / IEC 27005: 2011.
  • Organizational framework for information security: Security policies, policy hierarchy, feasibility of existence, information security policy, thematic policies, other elements of the organizational framework, desirable policy characteristics, policy cycle, policy development competence.
  • Management of security incidents: Basic concepts – Incident life cycle – Concerns, purpose and objectives of the incident handling process, case types, incident handling group, case management process phases.
  • Business Continuity and Disaster Recovery: Basic concepts, necessity of business continuity planning, types of projects and relationships between them, the disaster recovery planning process, investment level.
  • Security Assurance: Basic concepts, types of security metrics, the security measurement process.
More »

DS-305 Digital Communications [C] G. Efthymoglou

Learning Outcomes

Knowledge of digital modulation generation and detection for baseband and passband telecommunication systems.

Course Contents

  • Telecommunication budget analysis. Filters with zero ISI (Nyquist filters).
  • Noise figure, composite noise figure and noise temperature, calculation of effective receiver temperature.
  • Baseband transmission methods, probability of error for matched filter detection in AWGN.
  • Binary passband modulations: ASK, FSK, and PSK; M-ary signalling: M-FSK, M-PSK, and QAM; demodulation techniques and symbol error probability in AWGN and fading channels.
  • Filters with zero ISI (Nyquist filters).
  • Spectral efficiency of digital modulations.
  • Link Budget according to system specifications.
  • Channel coding, convolutional codes and Viterbi algorithm, performance of convolutional codes in AWGN channel.
  • OFDM transmission and detection.
  • OFDM with cyclic prefix for zero intercarrier interference.
More »

MAJOR IN "COMMUNICATIONS & NETWORKS"

Major in "COMMUNICATIONS & NETWORKS": Compulsory Courses

DS-309 Broadband Networks [CM/T&N] A. Alexiou

Learning Outcomes

The objective of this course is to provide an introduction to broadband technologies and their applications and familiarize students with broadband networks and relevant protocols.

At the end of this course, students will have acquired advanced/in depth knowledge in the field of Broadband Communications Systems, with particular emphasis on baseband processing physical layer techniques, and Medium Access Control design as well as Broadband Networks design and architectures.

The students will be capable of performing numerical calculations of various broadband network parameters, stochastic modelling of transceivers, signal processing algorithm analysis and design and performance assessment by means of analytical evaluations and simulations.

The students will also be capable of comprehending the design principles of a number of Broadband technologies.

Course Contents

  • Introduction to broadband networks, main concepts: bandwidth, transmission basics, switching, multiplexing, spread spectrum, transmission media.
  • Integrated services networks, access networks, core networks, Integrated services networks: integrated services digital networks (ISDN), broadband integrated services digital networks (B-ISDN).
  • Access networks/technologies: public switched telephone networks (PSTN), digital subscriber line (DSL), wireless-access (broadcasting, mobile, fixed-wireless access–FWA), fiber to the curb/home (FTTX).
  • Core networks/technologies: Ethernet, ethernet wide area networks, optical technologies, synchronous optical networks (SONET), wave division multiplexing (WDM), passive optical networks (PONs).
  • Wireless broadband technologies: WiFi, 3G (WCDMA), 4G (LTE, LTE-Advanced), 5G.
More »

DS-321 Computer Networks ΙΙ [CM/T&N] P. Demestichas , A. Galani

Learning Outcomes

The aim of the course “Computer Networks II” is to complement the course “Computer Networks I”, in order for the students to deepen their knowledge in Computer Networks and their functions. In particular, through this course the students will get familiar with the operation of the data link layer, the Medium Access Control (MAC) sub-level and the Logical Link Control (LLC) sub-level.

By completing course of “Computer Networks II”, students will be able to select and apply parity bit, CRC and hamming techniques, as well as information retranslation techniques through the computer network using and the corresponding communication protocols. In addition, students will have the ability to combine their knowledge in the field routing and respectively use the most appropriate protocol according to the needs of the network, based on correction and retransmission techniques, thus developing a critical way of thinking.

Course Contents

  • Introduction to the functionality of the Data Link Layer (DLL), Medium Access Control (MAC) and Logical Link Control (LLC) layers, error control, error detection, error correction, retransmission techniques, error detection techniques.
  • Cyclic Redundancy Codes (CRC), error correction techniques.
  • Hamming techniques, Forward Error Correction (FEC), retransmission techniques.
  • Stop-and-Wait (S&W), Alternating Bit Protocol (ABP), Automatic Repeat Request (ARQ), sliding window techniques, Go Back N (GBN), Soptional Repeat (SRP).
  • MAC protocols; Aloha; Carrier Sense Multiple Access (CSMA); MAC protocols in Wireless
  • LANs/MANs/PANs; ΙΕΕΕ 802; x standards; LLC protocols; 802.2 standard.

In addition, articles, web addresses for useful information, as well as exercises for practicing students are posted in the platform Evdoxos.

More »

Major in "COMMUNICATIONS & NETWORKS": Optional Courses

DS-530 Business Process Management [CM/SDS] G. Vassilacopoulos, F. Malamateniou

Learning Outcomes

The objective of this course is to present fundamental principles of Business Process Management (BPM) and to study various methods and techniques for analyzing, modeling, automating, executing and optimizing business processes. The course will incorporate a laboratory component with well-known BPM software tools that allow students to practice some of the principles addressed.

Upon successful completion of this course student will be able:

  • to create business process models by using BPMN based modelling tools
  • to execute business processes by using Business Process Management Systems
  • to analyze the performance of existing business processes and improve business processes that are not sufficient according to certain criteria
  • to create business process management strategies and business processes implementation plans within organizations

Course Contents

  • Business process definition, intra- and inter-organizational processes. Process-oriented organizations. Build processes’ business models. Virtual enterprises. Business processes and workflows.
  • Process analysis techniques. Qualitative process analysis (e.g. Pareto analysis, value-added analysis, root-cause analysis). Quantitative process analysis (e.g. queuing analysis, simulation). Performance metrics (time, cost, quality).
  • BPM life cycle. Discover, analyze, model, monitor, map, simulate, deploy. Business Process Reengineering-BPR and Business Process Improvement- BPI methodologies. Business Process modeling tools.
  • The BPMN standard for business process modelling.
  • Business process automation. Conceptual and executable process models.
  • Business Processes Management Systems-BPMS (e.g. structure, architecture, standards)
  • Process and activity life cycles. Workflow-based applications
  • Business processes and workflows, workflow categories, workflow dimensions, workflow management, workflow functional requirements, workflow specifications and execution languages.
  • Workflow management using a specific BPMS software tool.
  • Process Analytics. Metrics for evaluating business processes’ performance. Monitoring of standard metrics and process specific, user dined metrics.
  • BPM methodologies (e.g. Six Sigma, Lean)
  • Service-oriented and process-oriented information systems.
More »

DS-803 Network Security [OPT/SEC] C. Xenakis, K. Lambrinoudakis

Learning Outcomes

The aim of the course is to present and analyze the measures implemented on a network infrastructure, the policies adopted by the network administrator to protect the network and its resources against unauthorized access, and the effectiveness (or lack of) of them. The course focuses on the security of wired-fixed networks that use Internet technology. The mechanisms and security protocols that ensure the operation of the above networks and the data of their users are presented and analyzed.

Upon successful completion of the course, the student will be familiarized with and will apply different security measures and techniques applied to wired networks that aim to provide security services to users of a network as well as to its providers.

Course Contents

  • Security at lower layers.
  • Network layer security solutions.
  • Application layer security solutions.
  • Key management protocols; identity management protocols.
  • Firewalls.
  • Trust management.
  • Distributed authentication systems and intrusion detection systems.
More »

DS-405 Digital Image Processing [CM/CIS] I. Maglogiannis , K. Moutselos

Learning Outcomes

Pattern recognition is the scientific field that deals with the assignment of a label to a given input value. An example of pattern recognition is classification, which attempts to assign each input value to one of a given set of classes. The course aims to cover the most popular in the literature techniques for pattern recognition, as they are typically employed in a number of practical applications, such as speech and audio recognition, image and video analysis, biometrics and bioinformatics. The course covers the most commonly used classification algorithms, feature selection techniques, data transformation methods, and data clustering.

Course Contents

  • Introduction to Digital Image Processing
  • 2-D Signals and Systems – Background Information
  • Sampling and Digitization Issues
  • Image Enhancement and Restoration
  • Binary Image Processing – Morphological Operators
  • Image Segmentation – Edge Detection
  • Image Transformations (Fourier, DCT, Hadamard, etc.)
  • Analysis in the frequency domain
  • Digital Image Compression
  • Digital Image Analysis – Computer Vision
  • Texture Analysis – Region of Interests
  • Other areas: eg Watermarking, Information Retrieval, etc.
More »

DS-526 Introduction to Cloud Computing [CM/CIS] D. Kyriazis

Learning Outcomes

The main objective of this course is to introduce concepts related to the analysis, design and implementation of computation and storage clouds. With the completion of the course, the student will be in position:

  • to understand the necessary theoretical background for computing and storage clouds environments.
  • to know the methodologies and technologies for the development of applications that will be deployed and offered through cloud computing environments.
  • to be able to realize cloud infrastructures by using IaaS software, while also developing cloud applications by utilizing PaaS software.

Course Contents

  • Introduction to cloud computing.
  • Objectives, challenges, application domains, advantages.
    • Computational and storage cloud architectures
    • Service level agreements, service lifecycle management
  • Infrastructure deployment, federation and management models.
    • Cloud service model, service provisioning and access models
    • Elasticity and scalability techniques
    • Information, account and billing management
  • Implementation and operation / management of computational clouds.
    • Software as a Service layer
    • Platform as a Service layer
    • Infrastructure as a Service layer
    • Virtualization and resource management
  • Implementation and operation / management of storage clouds.
    • Distributed object storage clouds
    • Data storage and retrieval based on content
    • Computational tasks execution in storage clouds
  • Quality of service approaches.
    • Requirements and parameters classification
    • Monitoring and control mechanisms
    • Quality of service guarantees
  • Laboratory exercises.
    • Google AppEngine
    • OpenStack
    • Apache Hadoop / MapReduce

Moreover, the EVDOXOS system is utilized to provide additional useful information to the students as well as exercises that respond to the corresponding thematic topics / sessions covered by the course.

More »

DS-505 Database Systems [CM/SDS] G. Vassilacopoulos, M. Halkidi , C. Manousopoulos

Learning Outcomes

The students upon the successful completion of the course will be able:

  • to apply the appropriate techniques for programming and managing database systems
  • to know the basic storage and data organization structures.
  • to apply query processing, query optimization and transaction management mechanisms.
  • to understand the mechanisms that ensure the integrity of the system in the case of multiple concurrent users with access to the same data and database recovery methods in case of failure.

Course Contents

  • Introduction to Database Management Systems (DBMSs). Fundamental concepts of DBMSs, database applications, overview of data models.
  • Data storage and file organization.
  • Query processing methods
  • Query optimization methods.
  • Transaction management: characteristics of a transaction management system.
  • Concurrency Control.
  • Database recovery methods.
  • Parallel and Distributed databases: design, query processing and transaction management in distributed systems.
More »

DS-403 Computer Graphics and Virtual Reality [Opt/CIS] N. Sgouros

Learning Outcomes

This course is the basic introductory course in the field of image synthesis through computational systems.

The course material seeks to introduce the students to the basic concepts and algorithms for the computational representation, rendering and interaction with 2D or 3D synthetic digital images aid virtual reality environments. Moreover, the course material refers to the description of modern computational environments for the development of 3D graphics.

The course seeks to make the students understand the ways with which we can design and implement digital images in computational systems.
The successful completion of the course will make students capable of:

  • understanding the basic and important features of image synthesis in computational environments.
  • knowing the major features of the tools and development methods of 2D and 3D image synthesis tools and virtual reality environments.

Course Contents

  • Definition and types of computer graphics systems.
  • Modeling (basic geometric shapes – coordinate systems – geometric transformations, perspective projection).
  • Shading and lighting (color models, modeling of light sources, rendering methods).
  • Programming environments for computer graphics and virtual reality.
More »

DS-206 Compilers [Opt/SDS] N. Sgouros

Learning Outcomes

This course provides an introduction to the principles of analysis and design of programming languages as well as to the ways these principles are applied in modern programming languages. The successful completion of this course will allow students:

  • to understand the basic and important features of the design, implementation and analysis of compiler systems for modern programming languages.
  • to know the basic features of the tools and the development techniques for the creation of modern programming languages.

Course Contents

  • Introduction – Overview of Modern Programming Languages.
  • Language Definition and Design (Regular Expressions – Automata – Context-Free Grammars).
  • Programming Language Structure (Variables, Types and Scoping, Control Flow and Evaluation of Expressions, Subroutines, Iterative and Recursive Processes, Memory Management and Communication).
  • The Compiling/Interpretation Process (Lectical Analysis, Syntactic Analysis, Code Production & Optimization, Linking).
More »

DS-013 Queueing Systems [Opt/T&N] K. Maliatsos

Learning Outcomes

After the successful completion of this course, the student will be able to model queueing systems in the framework of the design, analysis and management of telecommunication networks, computer networks and processing systems. The student will be able to recognize and evaluate alternative choices of methodologies, procedures and queueing models and determine the optimal selection for the evaluation of network and systems performance.

During the laboratory practice, students put the acquired knowledge into practice with the utilization of programming applications in a simulation environment.

Course Contents

  • Structure of queuing systems; arrival process; queues; service systems.
  • Review of relevant probability laws, probability density functions, stochastic processes.
  • Continuous time Markov chains, discrete time Markov chains.
  • Birth – death processes.
  • Poisson processes.
  • Μ/Μ/1; Μ/Μ/κ; Μ/Μ/1/κ; Μ/Μ/κ/κ; Μ/G/1; G/G/1 Models.
  • Networks of queuing systems, Kleinrock approximation, Jackson networks.
  • Applications: students are asked to conduct small projects related to queuing systems and the analytical evaluation of communication and computer systems.

Furthermore, in the platform eclass/Evdoxos lecture notes, exercises and laboratory exercises are posted for the students.

More »

MAJOR IN "SOFTWARE & DATA SYSTEMS"

Major in "SOFTWARE & DATA SYSTEMS": Compulsory Courses

DS-530 Business Process Management [CM/SDS] G. Vassilacopoulos, F. Malamateniou

Learning Outcomes

The objective of this course is to present fundamental principles of Business Process Management (BPM) and to study various methods and techniques for analyzing, modeling, automating, executing and optimizing business processes. The course will incorporate a laboratory component with well-known BPM software tools that allow students to practice some of the principles addressed.

Upon successful completion of this course student will be able:

  • to create business process models by using BPMN based modelling tools
  • to execute business processes by using Business Process Management Systems
  • to analyze the performance of existing business processes and improve business processes that are not sufficient according to certain criteria
  • to create business process management strategies and business processes implementation plans within organizations

Course Contents

  • Business process definition, intra- and inter-organizational processes. Process-oriented organizations. Build processes’ business models. Virtual enterprises. Business processes and workflows.
  • Process analysis techniques. Qualitative process analysis (e.g. Pareto analysis, value-added analysis, root-cause analysis). Quantitative process analysis (e.g. queuing analysis, simulation). Performance metrics (time, cost, quality).
  • BPM life cycle. Discover, analyze, model, monitor, map, simulate, deploy. Business Process Reengineering-BPR and Business Process Improvement- BPI methodologies. Business Process modeling tools.
  • The BPMN standard for business process modelling.
  • Business process automation. Conceptual and executable process models.
  • Business Processes Management Systems-BPMS (e.g. structure, architecture, standards)
  • Process and activity life cycles. Workflow-based applications
  • Business processes and workflows, workflow categories, workflow dimensions, workflow management, workflow functional requirements, workflow specifications and execution languages.
  • Workflow management using a specific BPMS software tool.
  • Process Analytics. Metrics for evaluating business processes’ performance. Monitoring of standard metrics and process specific, user dined metrics.
  • BPM methodologies (e.g. Six Sigma, Lean)
  • Service-oriented and process-oriented information systems.
More »

DS-505 Database Systems [CM/SDS] G. Vassilacopoulos, M. Halkidi , C. Manousopoulos

Learning Outcomes

The students upon the successful completion of the course will be able:

  • to apply the appropriate techniques for programming and managing database systems
  • to know the basic storage and data organization structures.
  • to apply query processing, query optimization and transaction management mechanisms.
  • to understand the mechanisms that ensure the integrity of the system in the case of multiple concurrent users with access to the same data and database recovery methods in case of failure.

Course Contents

  • Introduction to Database Management Systems (DBMSs). Fundamental concepts of DBMSs, database applications, overview of data models.
  • Data storage and file organization.
  • Query processing methods
  • Query optimization methods.
  • Transaction management: characteristics of a transaction management system.
  • Concurrency Control.
  • Database recovery methods.
  • Parallel and Distributed databases: design, query processing and transaction management in distributed systems.
More »

Major in "SOFTWARE & DATA SYSTEMS": Optional Courses

DS-803 Network Security [OPT/SEC] C. Xenakis, K. Lambrinoudakis

Learning Outcomes

The aim of the course is to present and analyze the measures implemented on a network infrastructure, the policies adopted by the network administrator to protect the network and its resources against unauthorized access, and the effectiveness (or lack of) of them. The course focuses on the security of wired-fixed networks that use Internet technology. The mechanisms and security protocols that ensure the operation of the above networks and the data of their users are presented and analyzed.

Upon successful completion of the course, the student will be familiarized with and will apply different security measures and techniques applied to wired networks that aim to provide security services to users of a network as well as to its providers.

Course Contents

  • Security at lower layers.
  • Network layer security solutions.
  • Application layer security solutions.
  • Key management protocols; identity management protocols.
  • Firewalls.
  • Trust management.
  • Distributed authentication systems and intrusion detection systems.
More »

DS-405 Digital Image Processing [CM/CIS] I. Maglogiannis , K. Moutselos

Learning Outcomes

Pattern recognition is the scientific field that deals with the assignment of a label to a given input value. An example of pattern recognition is classification, which attempts to assign each input value to one of a given set of classes. The course aims to cover the most popular in the literature techniques for pattern recognition, as they are typically employed in a number of practical applications, such as speech and audio recognition, image and video analysis, biometrics and bioinformatics. The course covers the most commonly used classification algorithms, feature selection techniques, data transformation methods, and data clustering.

Course Contents

  • Introduction to Digital Image Processing
  • 2-D Signals and Systems – Background Information
  • Sampling and Digitization Issues
  • Image Enhancement and Restoration
  • Binary Image Processing – Morphological Operators
  • Image Segmentation – Edge Detection
  • Image Transformations (Fourier, DCT, Hadamard, etc.)
  • Analysis in the frequency domain
  • Digital Image Compression
  • Digital Image Analysis – Computer Vision
  • Texture Analysis – Region of Interests
  • Other areas: eg Watermarking, Information Retrieval, etc.
More »

DS-526 Introduction to Cloud Computing [CM/CIS] D. Kyriazis

Learning Outcomes

The main objective of this course is to introduce concepts related to the analysis, design and implementation of computation and storage clouds. With the completion of the course, the student will be in position:

  • to understand the necessary theoretical background for computing and storage clouds environments.
  • to know the methodologies and technologies for the development of applications that will be deployed and offered through cloud computing environments.
  • to be able to realize cloud infrastructures by using IaaS software, while also developing cloud applications by utilizing PaaS software.

Course Contents

  • Introduction to cloud computing.
  • Objectives, challenges, application domains, advantages.
    • Computational and storage cloud architectures
    • Service level agreements, service lifecycle management
  • Infrastructure deployment, federation and management models.
    • Cloud service model, service provisioning and access models
    • Elasticity and scalability techniques
    • Information, account and billing management
  • Implementation and operation / management of computational clouds.
    • Software as a Service layer
    • Platform as a Service layer
    • Infrastructure as a Service layer
    • Virtualization and resource management
  • Implementation and operation / management of storage clouds.
    • Distributed object storage clouds
    • Data storage and retrieval based on content
    • Computational tasks execution in storage clouds
  • Quality of service approaches.
    • Requirements and parameters classification
    • Monitoring and control mechanisms
    • Quality of service guarantees
  • Laboratory exercises.
    • Google AppEngine
    • OpenStack
    • Apache Hadoop / MapReduce

Moreover, the EVDOXOS system is utilized to provide additional useful information to the students as well as exercises that respond to the corresponding thematic topics / sessions covered by the course.

More »

DS-309 Broadband Networks [CM/T&N] A. Alexiou

Learning Outcomes

The objective of this course is to provide an introduction to broadband technologies and their applications and familiarize students with broadband networks and relevant protocols.

At the end of this course, students will have acquired advanced/in depth knowledge in the field of Broadband Communications Systems, with particular emphasis on baseband processing physical layer techniques, and Medium Access Control design as well as Broadband Networks design and architectures.

The students will be capable of performing numerical calculations of various broadband network parameters, stochastic modelling of transceivers, signal processing algorithm analysis and design and performance assessment by means of analytical evaluations and simulations.

The students will also be capable of comprehending the design principles of a number of Broadband technologies.

Course Contents

  • Introduction to broadband networks, main concepts: bandwidth, transmission basics, switching, multiplexing, spread spectrum, transmission media.
  • Integrated services networks, access networks, core networks, Integrated services networks: integrated services digital networks (ISDN), broadband integrated services digital networks (B-ISDN).
  • Access networks/technologies: public switched telephone networks (PSTN), digital subscriber line (DSL), wireless-access (broadcasting, mobile, fixed-wireless access–FWA), fiber to the curb/home (FTTX).
  • Core networks/technologies: Ethernet, ethernet wide area networks, optical technologies, synchronous optical networks (SONET), wave division multiplexing (WDM), passive optical networks (PONs).
  • Wireless broadband technologies: WiFi, 3G (WCDMA), 4G (LTE, LTE-Advanced), 5G.
More »

DS-321 Computer Networks ΙΙ [CM/T&N] P. Demestichas , A. Galani

Learning Outcomes

The aim of the course “Computer Networks II” is to complement the course “Computer Networks I”, in order for the students to deepen their knowledge in Computer Networks and their functions. In particular, through this course the students will get familiar with the operation of the data link layer, the Medium Access Control (MAC) sub-level and the Logical Link Control (LLC) sub-level.

By completing course of “Computer Networks II”, students will be able to select and apply parity bit, CRC and hamming techniques, as well as information retranslation techniques through the computer network using and the corresponding communication protocols. In addition, students will have the ability to combine their knowledge in the field routing and respectively use the most appropriate protocol according to the needs of the network, based on correction and retransmission techniques, thus developing a critical way of thinking.

Course Contents

  • Introduction to the functionality of the Data Link Layer (DLL), Medium Access Control (MAC) and Logical Link Control (LLC) layers, error control, error detection, error correction, retransmission techniques, error detection techniques.
  • Cyclic Redundancy Codes (CRC), error correction techniques.
  • Hamming techniques, Forward Error Correction (FEC), retransmission techniques.
  • Stop-and-Wait (S&W), Alternating Bit Protocol (ABP), Automatic Repeat Request (ARQ), sliding window techniques, Go Back N (GBN), Soptional Repeat (SRP).
  • MAC protocols; Aloha; Carrier Sense Multiple Access (CSMA); MAC protocols in Wireless
  • LANs/MANs/PANs; ΙΕΕΕ 802; x standards; LLC protocols; 802.2 standard.

In addition, articles, web addresses for useful information, as well as exercises for practicing students are posted in the platform Evdoxos.

More »

DS-403 Computer Graphics and Virtual Reality [Opt/CIS] N. Sgouros

Learning Outcomes

This course is the basic introductory course in the field of image synthesis through computational systems.

The course material seeks to introduce the students to the basic concepts and algorithms for the computational representation, rendering and interaction with 2D or 3D synthetic digital images aid virtual reality environments. Moreover, the course material refers to the description of modern computational environments for the development of 3D graphics.

The course seeks to make the students understand the ways with which we can design and implement digital images in computational systems.
The successful completion of the course will make students capable of:

  • understanding the basic and important features of image synthesis in computational environments.
  • knowing the major features of the tools and development methods of 2D and 3D image synthesis tools and virtual reality environments.

Course Contents

  • Definition and types of computer graphics systems.
  • Modeling (basic geometric shapes – coordinate systems – geometric transformations, perspective projection).
  • Shading and lighting (color models, modeling of light sources, rendering methods).
  • Programming environments for computer graphics and virtual reality.
More »

DS-206 Compilers [Opt/SDS] N. Sgouros

Learning Outcomes

This course provides an introduction to the principles of analysis and design of programming languages as well as to the ways these principles are applied in modern programming languages. The successful completion of this course will allow students:

  • to understand the basic and important features of the design, implementation and analysis of compiler systems for modern programming languages.
  • to know the basic features of the tools and the development techniques for the creation of modern programming languages.

Course Contents

  • Introduction – Overview of Modern Programming Languages.
  • Language Definition and Design (Regular Expressions – Automata – Context-Free Grammars).
  • Programming Language Structure (Variables, Types and Scoping, Control Flow and Evaluation of Expressions, Subroutines, Iterative and Recursive Processes, Memory Management and Communication).
  • The Compiling/Interpretation Process (Lectical Analysis, Syntactic Analysis, Code Production & Optimization, Linking).
More »

DS-013 Queueing Systems [Opt/T&N] K. Maliatsos

Learning Outcomes

After the successful completion of this course, the student will be able to model queueing systems in the framework of the design, analysis and management of telecommunication networks, computer networks and processing systems. The student will be able to recognize and evaluate alternative choices of methodologies, procedures and queueing models and determine the optimal selection for the evaluation of network and systems performance.

During the laboratory practice, students put the acquired knowledge into practice with the utilization of programming applications in a simulation environment.

Course Contents

  • Structure of queuing systems; arrival process; queues; service systems.
  • Review of relevant probability laws, probability density functions, stochastic processes.
  • Continuous time Markov chains, discrete time Markov chains.
  • Birth – death processes.
  • Poisson processes.
  • Μ/Μ/1; Μ/Μ/κ; Μ/Μ/1/κ; Μ/Μ/κ/κ; Μ/G/1; G/G/1 Models.
  • Networks of queuing systems, Kleinrock approximation, Jackson networks.
  • Applications: students are asked to conduct small projects related to queuing systems and the analytical evaluation of communication and computer systems.

Furthermore, in the platform eclass/Evdoxos lecture notes, exercises and laboratory exercises are posted for the students.

More »

MAJOR IN "COMPUTANTIAL INFRASTRUCTURES & SERVICES"

Major in "COMPUTANTIAL INFRASTRUCTURES & SERVICES": Compulsory Courses

DS-405 Digital Image Processing [CM/CIS] I. Maglogiannis , K. Moutselos

Learning Outcomes

Pattern recognition is the scientific field that deals with the assignment of a label to a given input value. An example of pattern recognition is classification, which attempts to assign each input value to one of a given set of classes. The course aims to cover the most popular in the literature techniques for pattern recognition, as they are typically employed in a number of practical applications, such as speech and audio recognition, image and video analysis, biometrics and bioinformatics. The course covers the most commonly used classification algorithms, feature selection techniques, data transformation methods, and data clustering.

Course Contents

  • Introduction to Digital Image Processing
  • 2-D Signals and Systems – Background Information
  • Sampling and Digitization Issues
  • Image Enhancement and Restoration
  • Binary Image Processing – Morphological Operators
  • Image Segmentation – Edge Detection
  • Image Transformations (Fourier, DCT, Hadamard, etc.)
  • Analysis in the frequency domain
  • Digital Image Compression
  • Digital Image Analysis – Computer Vision
  • Texture Analysis – Region of Interests
  • Other areas: eg Watermarking, Information Retrieval, etc.
More »

DS-526 Introduction to Cloud Computing [CM/CIS] D. Kyriazis

Learning Outcomes

The main objective of this course is to introduce concepts related to the analysis, design and implementation of computation and storage clouds. With the completion of the course, the student will be in position:

  • to understand the necessary theoretical background for computing and storage clouds environments.
  • to know the methodologies and technologies for the development of applications that will be deployed and offered through cloud computing environments.
  • to be able to realize cloud infrastructures by using IaaS software, while also developing cloud applications by utilizing PaaS software.

Course Contents

  • Introduction to cloud computing.
  • Objectives, challenges, application domains, advantages.
    • Computational and storage cloud architectures
    • Service level agreements, service lifecycle management
  • Infrastructure deployment, federation and management models.
    • Cloud service model, service provisioning and access models
    • Elasticity and scalability techniques
    • Information, account and billing management
  • Implementation and operation / management of computational clouds.
    • Software as a Service layer
    • Platform as a Service layer
    • Infrastructure as a Service layer
    • Virtualization and resource management
  • Implementation and operation / management of storage clouds.
    • Distributed object storage clouds
    • Data storage and retrieval based on content
    • Computational tasks execution in storage clouds
  • Quality of service approaches.
    • Requirements and parameters classification
    • Monitoring and control mechanisms
    • Quality of service guarantees
  • Laboratory exercises.
    • Google AppEngine
    • OpenStack
    • Apache Hadoop / MapReduce

Moreover, the EVDOXOS system is utilized to provide additional useful information to the students as well as exercises that respond to the corresponding thematic topics / sessions covered by the course.

More »

Major in "COMPUTANTIAL INFRASTRUCTURES & SERVICES": Optional Courses

DS-530 Business Process Management [CM/SDS] G. Vassilacopoulos, F. Malamateniou

Learning Outcomes

The objective of this course is to present fundamental principles of Business Process Management (BPM) and to study various methods and techniques for analyzing, modeling, automating, executing and optimizing business processes. The course will incorporate a laboratory component with well-known BPM software tools that allow students to practice some of the principles addressed.

Upon successful completion of this course student will be able:

  • to create business process models by using BPMN based modelling tools
  • to execute business processes by using Business Process Management Systems
  • to analyze the performance of existing business processes and improve business processes that are not sufficient according to certain criteria
  • to create business process management strategies and business processes implementation plans within organizations

Course Contents

  • Business process definition, intra- and inter-organizational processes. Process-oriented organizations. Build processes’ business models. Virtual enterprises. Business processes and workflows.
  • Process analysis techniques. Qualitative process analysis (e.g. Pareto analysis, value-added analysis, root-cause analysis). Quantitative process analysis (e.g. queuing analysis, simulation). Performance metrics (time, cost, quality).
  • BPM life cycle. Discover, analyze, model, monitor, map, simulate, deploy. Business Process Reengineering-BPR and Business Process Improvement- BPI methodologies. Business Process modeling tools.
  • The BPMN standard for business process modelling.
  • Business process automation. Conceptual and executable process models.
  • Business Processes Management Systems-BPMS (e.g. structure, architecture, standards)
  • Process and activity life cycles. Workflow-based applications
  • Business processes and workflows, workflow categories, workflow dimensions, workflow management, workflow functional requirements, workflow specifications and execution languages.
  • Workflow management using a specific BPMS software tool.
  • Process Analytics. Metrics for evaluating business processes’ performance. Monitoring of standard metrics and process specific, user dined metrics.
  • BPM methodologies (e.g. Six Sigma, Lean)
  • Service-oriented and process-oriented information systems.
More »

DS-803 Network Security [OPT/SEC] C. Xenakis, K. Lambrinoudakis

Learning Outcomes

The aim of the course is to present and analyze the measures implemented on a network infrastructure, the policies adopted by the network administrator to protect the network and its resources against unauthorized access, and the effectiveness (or lack of) of them. The course focuses on the security of wired-fixed networks that use Internet technology. The mechanisms and security protocols that ensure the operation of the above networks and the data of their users are presented and analyzed.

Upon successful completion of the course, the student will be familiarized with and will apply different security measures and techniques applied to wired networks that aim to provide security services to users of a network as well as to its providers.

Course Contents

  • Security at lower layers.
  • Network layer security solutions.
  • Application layer security solutions.
  • Key management protocols; identity management protocols.
  • Firewalls.
  • Trust management.
  • Distributed authentication systems and intrusion detection systems.
More »

DS-309 Broadband Networks [CM/T&N] A. Alexiou

Learning Outcomes

The objective of this course is to provide an introduction to broadband technologies and their applications and familiarize students with broadband networks and relevant protocols.

At the end of this course, students will have acquired advanced/in depth knowledge in the field of Broadband Communications Systems, with particular emphasis on baseband processing physical layer techniques, and Medium Access Control design as well as Broadband Networks design and architectures.

The students will be capable of performing numerical calculations of various broadband network parameters, stochastic modelling of transceivers, signal processing algorithm analysis and design and performance assessment by means of analytical evaluations and simulations.

The students will also be capable of comprehending the design principles of a number of Broadband technologies.

Course Contents

  • Introduction to broadband networks, main concepts: bandwidth, transmission basics, switching, multiplexing, spread spectrum, transmission media.
  • Integrated services networks, access networks, core networks, Integrated services networks: integrated services digital networks (ISDN), broadband integrated services digital networks (B-ISDN).
  • Access networks/technologies: public switched telephone networks (PSTN), digital subscriber line (DSL), wireless-access (broadcasting, mobile, fixed-wireless access–FWA), fiber to the curb/home (FTTX).
  • Core networks/technologies: Ethernet, ethernet wide area networks, optical technologies, synchronous optical networks (SONET), wave division multiplexing (WDM), passive optical networks (PONs).
  • Wireless broadband technologies: WiFi, 3G (WCDMA), 4G (LTE, LTE-Advanced), 5G.
More »

DS-321 Computer Networks ΙΙ [CM/T&N] P. Demestichas , A. Galani

Learning Outcomes

The aim of the course “Computer Networks II” is to complement the course “Computer Networks I”, in order for the students to deepen their knowledge in Computer Networks and their functions. In particular, through this course the students will get familiar with the operation of the data link layer, the Medium Access Control (MAC) sub-level and the Logical Link Control (LLC) sub-level.

By completing course of “Computer Networks II”, students will be able to select and apply parity bit, CRC and hamming techniques, as well as information retranslation techniques through the computer network using and the corresponding communication protocols. In addition, students will have the ability to combine their knowledge in the field routing and respectively use the most appropriate protocol according to the needs of the network, based on correction and retransmission techniques, thus developing a critical way of thinking.

Course Contents

  • Introduction to the functionality of the Data Link Layer (DLL), Medium Access Control (MAC) and Logical Link Control (LLC) layers, error control, error detection, error correction, retransmission techniques, error detection techniques.
  • Cyclic Redundancy Codes (CRC), error correction techniques.
  • Hamming techniques, Forward Error Correction (FEC), retransmission techniques.
  • Stop-and-Wait (S&W), Alternating Bit Protocol (ABP), Automatic Repeat Request (ARQ), sliding window techniques, Go Back N (GBN), Soptional Repeat (SRP).
  • MAC protocols; Aloha; Carrier Sense Multiple Access (CSMA); MAC protocols in Wireless
  • LANs/MANs/PANs; ΙΕΕΕ 802; x standards; LLC protocols; 802.2 standard.

In addition, articles, web addresses for useful information, as well as exercises for practicing students are posted in the platform Evdoxos.

More »

DS-505 Database Systems [CM/SDS] G. Vassilacopoulos, M. Halkidi , C. Manousopoulos

Learning Outcomes

The students upon the successful completion of the course will be able:

  • to apply the appropriate techniques for programming and managing database systems
  • to know the basic storage and data organization structures.
  • to apply query processing, query optimization and transaction management mechanisms.
  • to understand the mechanisms that ensure the integrity of the system in the case of multiple concurrent users with access to the same data and database recovery methods in case of failure.

Course Contents

  • Introduction to Database Management Systems (DBMSs). Fundamental concepts of DBMSs, database applications, overview of data models.
  • Data storage and file organization.
  • Query processing methods
  • Query optimization methods.
  • Transaction management: characteristics of a transaction management system.
  • Concurrency Control.
  • Database recovery methods.
  • Parallel and Distributed databases: design, query processing and transaction management in distributed systems.
More »

DS-403 Computer Graphics and Virtual Reality [Opt/CIS] N. Sgouros

Learning Outcomes

This course is the basic introductory course in the field of image synthesis through computational systems.

The course material seeks to introduce the students to the basic concepts and algorithms for the computational representation, rendering and interaction with 2D or 3D synthetic digital images aid virtual reality environments. Moreover, the course material refers to the description of modern computational environments for the development of 3D graphics.

The course seeks to make the students understand the ways with which we can design and implement digital images in computational systems.
The successful completion of the course will make students capable of:

  • understanding the basic and important features of image synthesis in computational environments.
  • knowing the major features of the tools and development methods of 2D and 3D image synthesis tools and virtual reality environments.

Course Contents

  • Definition and types of computer graphics systems.
  • Modeling (basic geometric shapes – coordinate systems – geometric transformations, perspective projection).
  • Shading and lighting (color models, modeling of light sources, rendering methods).
  • Programming environments for computer graphics and virtual reality.
More »

DS-206 Compilers [Opt/SDS] N. Sgouros

Learning Outcomes

This course provides an introduction to the principles of analysis and design of programming languages as well as to the ways these principles are applied in modern programming languages. The successful completion of this course will allow students:

  • to understand the basic and important features of the design, implementation and analysis of compiler systems for modern programming languages.
  • to know the basic features of the tools and the development techniques for the creation of modern programming languages.

Course Contents

  • Introduction – Overview of Modern Programming Languages.
  • Language Definition and Design (Regular Expressions – Automata – Context-Free Grammars).
  • Programming Language Structure (Variables, Types and Scoping, Control Flow and Evaluation of Expressions, Subroutines, Iterative and Recursive Processes, Memory Management and Communication).
  • The Compiling/Interpretation Process (Lectical Analysis, Syntactic Analysis, Code Production & Optimization, Linking).
More »

DS-013 Queueing Systems [Opt/T&N] K. Maliatsos

Learning Outcomes

After the successful completion of this course, the student will be able to model queueing systems in the framework of the design, analysis and management of telecommunication networks, computer networks and processing systems. The student will be able to recognize and evaluate alternative choices of methodologies, procedures and queueing models and determine the optimal selection for the evaluation of network and systems performance.

During the laboratory practice, students put the acquired knowledge into practice with the utilization of programming applications in a simulation environment.

Course Contents

  • Structure of queuing systems; arrival process; queues; service systems.
  • Review of relevant probability laws, probability density functions, stochastic processes.
  • Continuous time Markov chains, discrete time Markov chains.
  • Birth – death processes.
  • Poisson processes.
  • Μ/Μ/1; Μ/Μ/κ; Μ/Μ/1/κ; Μ/Μ/κ/κ; Μ/G/1; G/G/1 Models.
  • Networks of queuing systems, Kleinrock approximation, Jackson networks.
  • Applications: students are asked to conduct small projects related to queuing systems and the analytical evaluation of communication and computer systems.

Furthermore, in the platform eclass/Evdoxos lecture notes, exercises and laboratory exercises are posted for the students.

More »