Assessment in Digital Learning

Goal and Learning Outcomes

The course seeks to both conceptualize and redefine the purpose and objectives of the 21st century assessment for learning, as well as to outline modern and easy-to-use techniques and tools used by teachers in modern formal and informal learning environments.

After the successful completion of the course, the students will be able to:

  • State the modern forms of educational evaluation, utilizing educational technologies
  • Understand methodological issues regarding the organization and conduct of quality assessment of the educational process.
  • Utilize modern tools and techniques to evaluate trainees’ performance.
  • Apply a variety of techniques for systematic evaluation of instructional process.



  1. Basic principles of evaluating the quality of educational interventions
  • Formative
  • Holistic-Summative
  1. Principles of Monitoring and Assessing Students’ Performance
  2. Known techniques for evaluating the performance of trainees
  3. Categories of assessment tools
  • Quiz-tests
  • Rubrics
  • Mindmaps
  • Learning Analytics
  • Computational Thinking Assessment tools
  1. Quality Evaluation Techniques for Learning Resources and Learning Systems
  2. Process of creation and application of evaluation techniques and tools.

Suggested Reading

  1. A. Tomlinson & T. R. Moon (2013). Assessment and Student Success in a Differentiated Classroom, Association for Supervision & Curriculum Development, ISBN 1416616179 (ISBN13: 9781416616177)
  2. Cowie, B., Moreland, J. and Otrel-Cass, K. (2013). Expanding Notions of Assessment for Learning. Dordrecht: Springer.


Learning Outcomes

This course provides an introduction to the principles of analysis and design of programming languages as well as to the ways these principles are applied in modern programming languages. The successful completion of this course will allow students:

  • to understand the basic and important features of the design, implementation and analysis of compiler systems for modern programming languages.
  • to know the basic features of the tools and the development techniques for the creation of modern programming languages.

Course Contents

  • Introduction – Overview of Modern Programming Languages.
  • Language Definition and Design (Regular Expressions – Automata – Context-Free Grammars).
  • Programming Language Structure (Variables, Types and Scoping, Control Flow and Evaluation of Expressions, Subroutines, Iterative and Recursive Processes, Memory Management and Communication).
  • The Compiling/Interpretation Process (Lectical Analysis, Syntactic Analysis, Code Production & Optimization, Linking).

Recommended Readings

  • Scott, M. L., Programming Language Pragmatics, 2nd edition, Morgan Kaufmann, 2009
  • Instructor Notes

Digital Image Processing

Learning Outcomes

Digital image processing is used for two distinct purposes: (1) improving the appearance of the image so that it is easier for an observer to interpret and (2) digitally analyzing the image for the purpose of describing, identifying and interpreting the content of an image. image. The course will present the basic algorithms and methodologies for both purposes in the field of space and in the field of frequencies.

Students, upon successful completion of the course, will be able to:

A) Understand basic methodologies and basic knowledge of designing and developing image processing systems

B) Know the stages of digital image processing and analysis (optical sensors, image capture, digitization, transformation, coding, compression, transmission, segmentation, recognition)

C) Analyze problems across different application areas and select the right mechanisms for managing and processing digital images

D) Evaluate digital image processing systems and algorithms

Course Contents

  • Introduction to Digital Image Processing
  • 2-D Signals and Systems – Background Information
  • Sampling and Digitization Issues
  • Image Enhancement and Restoration
  • Binary Image Processing – Morphological Operators
  • Image Segmentation – Edge Detection
  • Image Transformations (Fourier, DCT, Hadamard, etc.)
  • Analysis in the frequency domain
  • Digital Image Compression
  • Digital Image Analysis – Computer Vision
  • Texture Analysis – Region of Interests
  • Other areas: eg Watermarking, Information Retrieval, etc.

Recommended Readings

  • Rafael C. Gonzalez & Richard E. Woods Digital Image Processing CRC Press 4th Edition

Digital Communications

Learning Outcomes

The aim of the course is to study digital modulation and demodulation techniques in baseband and bandpass telecommunication systems. It also presents the detection theory of these signals using the method of matched filtering The course also covers the analytical evaluation of the performance of digital configurations on a communication channel with additive white Gaussian noise (AWGN) and fading. Finally, an introduction of OFDM multi-carrier transmission is introduced.

Upon successful completion of the course the student will be able to:

  • Has become familiar with methods on data transmission at baseband and bandpass
  • Has become familiar with the concepts of ASK, FSK, M-FSK, PSK, DPSK, M-PSK, M-QAM
  • Handle OFDM modulation and demodulation techniques.
  • Make simulation models of digital modulations and evaluates the bit error probability in AWGN.

Course Contents

  • Telecommunication budget analysis. Filters with zero ISI (Nyquist filters).
  • Noise figure, composite noise figure and noise temperature, calculation of effective receiver temperature.
  • Baseband transmission methods, probability of error for matched filter detection in AWGN.
  • Binary passband modulations: ASK, FSK, and PSK; M-ary signalling: M-FSK, M-PSK, and QAM; demodulation techniques and symbol error probability in AWGN and fading channels.
  • Filters with zero ISI (Nyquist filters).
  • Spectral efficiency of digital modulations.
  • Link Budget according to system specifications.
  • Channel coding, convolutional codes and Viterbi algorithm, performance of convolutional codes in AWGN channel.
  • OFDM transmission and detection.
  • OFDM with cyclic prefix for zero intercarrier interference.

Recommended Readings

  • Proakis J. & Salehi M. (2001): Communication Systems Engineering, 2nd Edition, Prentice Hall.
  • Sklar B. (2001): Digital Communications: Fundamentals and Applications, 2nd Edition, Prentice Hall.

Artificial Intelligence

Learning Outcomes

Upon successful completion of this course, students should be able:

  • to explain fundamental concepts including agents, problem & state/action/spaces, problem solving via search as a model of thinking, heuristics, knowledge representation and reasoning using logic.
  • to select algorithms for problem solving based on problems characteristics, and characteristics of problem & state/action spaces.
  • to evaluate usefulness, advantages and limitations of alternative algorithms and methods towards increasing computational effectiveness of problem solving
  • to modelling problems as constraint problems, or as problems for proving in logic.

Towards the construction of advanced methods of problem solving.

Course Contents

  • Introduction to artificial intelligence, goals, advances, prospects, limitations, and basic notions regarding agents and problem solving
  • Blind search algorithms
  • Informed search algorithms and proofs of finding optimal solutions
  • Heuristic functions and their construction and selection
  • Local search using hill climbing, simulated annealing, local beam search, genetic algorithms
  • Constraint problem solving: From basic to advanced arc consistency techniques
  • Knowledge representation and reasoning in logic
  • Advanced reasoning algorithms

Recommended Readings

  • Stuart Russel and Peter Norvig. Artificial Intelligenc­e: A Μodern Approach, Prentice Hall, 2nd edition (2003). Το βιβλίο έχει εκδοθεί στα Ελληνικά από τις εκδόσεις Κλειδάριθμος με τον τίτλο «Τεχνητή Νοημοσύνη: Μια σύγχρονη προσέγγιση».
  • Ι. Βλαχάβα, Π. Κεφαλά, Ν. Βασιλειάδη, Φ. Κόκκορα και Η. Σακελαρίου. Τεχνητή Νοημοσύνη. Εκδοτικός οίκος «Β. Γκιούρδας Εκδοτική – Μονοπρόσωπη ΕΠΕ».
  • Nilsson, N., Artificial Intelligence: A New Synthesis, San Francisco: Morgan Kaufmann, 1998. Nilsson, N., Principles of Artificial Intelligence, San Francisco: Morgan Kaufmann, 1980.David Poole, Alan Mackworth and Randy Goebel. Computational Intelligence: A Logical Approach, Oxford University Press, New York, 1998.
  • Matthew L. Ginsberg. Essentials of Artificial Intelligence, Morgan Kaufmann, 1993.
  • Elaine Rich and Kevin Knight, Artificial Intelligence, 2nd edition, Mc Graw Hill, 1990.
  • Genesereth and N. Nilsson: Logical Foundations of Artificial Intelligence, Morgan Kaufmann, 1987
  • J. Brachman and H.J. Levesque, ”Knowledge Representation and Reasoning”, Morgan Kaufmann, 2004.

Associated scientific Journals

  • Artificial Intelligence, Elsevier, ISSN: 0004-3702
  • Expert Systems with Applications, Elsevier, ISSN: 0957-4174
  • IEEE Trans. On Pattern Analysis and Machine Intelligence, IEEE, ISSN 01628828

Security Policies and Security Management

Learning Outcomes

The purpose of the course is to familiarize the students with the concepts of the field of information systems security and to acquire knowledge, experience and skills of implementation of information security policies and information security management methodologies.
In this context, the learning outcomes of the course, after its successful completion, are that the students will be able:

  • to understand the problem of information security as a management problem and the need for information security management systems.
  • to know the basic concepts of information security, risk analysis, business continuity, security incident management, and information security measurement.
  • to analyse and evaluate information security risks using the methodology of ISO / IEC 27005: 2011.
  • to design management systems, information security policies, business continuity plans, disaster recovery plans, and information security measurement processes, and justifying his / her choices.

Course Contents

  • Introductory issues: The issue of information security, the need to protect information, information protection framework, standards and standardization, basic concepts of information security.
  • Information security management systems: Information security as a management problem, basic concepts and necessity of information security management systems, ISO 27k series of standards, ISO / IEC 27001: 2013.
  • Risk analysis, assessment and management: The concept of risk, risk management as a methodology, ISO / IEC 27005: 2011.
  • Organizational framework for information security: Security policies, policy hierarchy, feasibility of existence, information security policy, thematic policies, other elements of the organizational framework, desirable policy characteristics, policy cycle, policy development competence.
  • Management of security incidents: Basic concepts – Incident life cycle – Concerns, purpose and objectives of the incident handling process, case types, incident handling group, case management process phases.
  • Business Continuity and Disaster Recovery: Basic concepts, necessity of business continuity planning, types of projects and relationships between them, the disaster recovery planning process, investment level.
  • Security Assurance: Basic concepts, types of security metrics, the security measurement process.

Recommended Readings

Associated scientific Journals

  • IEEE Security and Privacy Magazine, IEEE
  • International Journal of Information Security, Springer
  • Computers and Security, Elsevier
  • Requirements Engineering, Springer
  • IEEE Transactions on Software Engineering, IEEE
  • Security and Communication Networks, Wiley

Broadband Networks

Learning Outcomes

The objective of this course is to provide an introduction to broadband technologies and their applications and familiarize students with broadband networks and relevant protocols.

At the end of this course, students will have acquired advanced/in depth knowledge in the field of Broadband Communications Systems, with particular emphasis on baseband processing physical layer techniques, and Medium Access Control design as well as Broadband Networks design and architectures.

The students will be capable of performing numerical calculations of various broadband network parameters, stochastic modelling of transceivers, signal processing algorithm analysis and design and performance assessment by means of analytical evaluations and simulations.

The students will also be capable of comprehending the design principles of a number of Broadband technologies.

Course Contents

  • Introduction to broadband networks, main concepts: bandwidth, transmission basics, switching, multiplexing, spread spectrum, transmission media.
  • Integrated services networks, access networks, core networks, Integrated services networks: integrated services digital networks (ISDN), broadband integrated services digital networks (B-ISDN).
  • Wireline Access networks/technologies: public switched telephone networks (PSTN), digital subscriber line (DSL), wireless-access (broadcasting, mobile, fixed-wireless access–FWA), fiber to the curb/home (FTTX).
  • Core networks/technologies: Ethernet, ethernet wide area networks, optical technologies, synchronous optical networks (SONET), wave division multiplexing (WDM), passive optical networks (PONs).
  • Wireless wide are broadband technologies:  3G (WCDMA), 4G (LTE, LTE-Advanced), 5G.
  • Wireless Local Area Networks: WiFi- IEEE 802.11
  • Internet of Things network infrastructures

Recommended Readings

  • Behrouz A. Forouzan, “Data Communications and Networking”, Fourth edition, McGraw-Hill, 2007
  • W Stallings, Wireless Communciations and Networks, Pearson, 2004.
  • D. Tse, P. Viswanath, Fundamentals of Wireless Communciations, 2005.
  • T. S. Rappaport, Wireless communications – Principles and practices, Pearson, 2002.
  • Russell Τ. (1997): Telecommunication Protocols (McGraw-Hill Education).
  • Cajetan M. Akujuobi, Matthew N.O. Sadiku (1997): Introduction to Broadband Communication Systems, Chapman & Hall/CRC
  • Andrea Goldsmith, Wireless Communications, Cambridge University Press, 2005.

Introduction to Cloud Computing

Learning Outcomes

The main objective of this course is to introduce concepts related to the analysis, design and implementation of computation and storage clouds. With the completion of the course, the student will be in position:

  • to understand the necessary theoretical background for computing and storage clouds environments.
  • to know the methodologies and technologies for the development of applications that will be deployed and offered through cloud computing environments.
  • to be able to realize cloud infrastructures by using IaaS software, while also developing cloud applications by utilizing PaaS software.

Course Contents

  • Introduction to cloud computing.
  • Objectives, challenges, application domains, advantages.
    • Computational and storage cloud architectures
    • Service level agreements, service lifecycle management
  • Infrastructure deployment, federation and management models.
    • Cloud service model, service provisioning and access models
    • Elasticity and scalability techniques
    • Information, account and billing management
  • Implementation and operation / management of computational clouds.
    • Software as a Service layer
    • Platform as a Service layer
    • Infrastructure as a Service layer
    • Virtualization and resource management
  • Implementation and operation / management of storage clouds.
    • Distributed object storage clouds
    • Data storage and retrieval based on content
    • Computational tasks execution in storage clouds
  • Quality of service approaches.
    • Requirements and parameters classification
    • Monitoring and control mechanisms
    • Quality of service guarantees
  • Laboratory exercises.
    • Google AppEngine
    • OpenStack
    • Apache Hadoop / MapReduce

Moreover, the EVDOXOS system is utilized to provide additional useful information to the students as well as exercises that respond to the corresponding thematic topics / sessions covered by the course.

Recommended Readings

  • Α. Velte, T. Velte, R. Elsenpeter, «Cloud Computing: A practical approach»
  • T. Erl, «Cloud Computing: Concepts, Technology & Architecture»
  • B. Sosinsky, «Cloud Computing Bible»G. Reese, «Cloud Application Architectures: Building Applications and Infrastructure in the Cloud»
  • R. Buyya, J. Broberg, A. M. Goscinski, «Cloud Computing, Principles and Paradigms»

Computer Networks II

Learning Outcomes

The aim of the course “Computer Networks II” is to complement the course “Computer Networks I”, in order for the students to deepen their knowledge in Computer Networks and their functions. In particular, through this course the students will get familiar with the operation of the data link layer, the Medium Access Control (MAC) sub-level and the Logical Link Control (LLC) sub-level.

Upon successful completion of the course, the students will be in position to:

  • select and apply parity bit, CRC and hamming techniques,
  • select and apply information retranslation techniques through the computer network,
  • use the corresponding communication protocols,
  • combine their knowledge in the field routing,
  • use the most appropriate protocol according to the needs of the network, based on correction and retransmission techniques, thus developing a critical way of thinking.

Course Contents

  • Section 1: Introduction to the functionality of the Data Link Layer (DLL), Medium Access Control (MAC) and Logical Link Control (LLC) layers, error control, error detection, error correction, retransmission techniques, error detection techniques.
  • Section 2: Cyclic Redundancy Codes (CRC), error correction techniques.
  • Section 3: Hamming techniques, Forward Error Correction (FEC), retransmission techniques.
  • Section 4: Stop-and-Wait (S&W), Alternating Bit Protocol (ABP), Automatic Repeat Request (ARQ), sliding window techniques, Go Back N (GBN), Soptional Repeat (SRP).
  • Section 5: MAC protocols; Aloha; Carrier Sense Multiple Access (CSMA); MAC protocols in Wireless Section 6: LANs/MANs/PANs; ΙΕΕΕ 802; x standards; LLC protocols; 802.2 standard.
  • In addition, articles, web addresses for useful information, as well as exercises for practicing students are posted in the platform Evdoxos.

Recommended Readings

  • Walrand J. (1997): Communication Networks, Prentice Hall.
  • Russell T. (1997): Telecommunications protocols, McGraw-Hill.

Associated scientific Journals

  • ΙΕΕΕ Computer Networks
  • IEEE Communications Magazine
  • EEE Access
  • IEEE Wireless Communications
  • International Journal of Network Management
  • Transactions on Emerging Telecommunications Technologies
  • EURASIP Journal on Wireless Communications and Networking

Business Process Management

Learning Outcomes

The objective of this course is to present fundamental principles of Business Process Management (BPM) and to study various methods and techniques for analyzing, modeling, automating, executing and optimizing business processes. The course will incorporate a laboratory component with well-known BPM software tools that allow students to practice some of the principles addressed.

Upon successful completion of this course student will be able to:

  • Create business process models by using BPMN based modelling tools
  • Execute business processes by using Business Process Management Systems
  • Analyze the performance of existing business processes and improve business processes that are not sufficient according to certain criteria
  • Create business process management strategies and business processes implementation plans within organizations

Course Content

  1. Business process definition, intra- and inter-organizational processes. Process-oriented organizations. Build processes’ business models. Virtual enterprises. Business processes and workflows.
  2. Process analysis techniques. Qualitative process analysis (e.g. Pareto analysis, value-added analysis, root-cause analysis). Quantitative process analysis (e.g. queuing analysis, simulation). Performance metrics (time, cost, quality).
  3. BPM life cycle. Discover, analyze, model, monitor, map, simulate, deploy. Business Process Reengineering-BPR and Business Process Improvement- BPI methodologies. Business Process modeling tools.
  4. The BPMN standard for business process modelling.
  5. Business process automation. Conceptual and executable process models.
  6. Business Processes Management Systems-BPMS (e.g. structure, architecture, standards).
  7. Process and activity life cycles. Workflow-based applications.
  8. Business processes and workflows, workflow categories, workflow dimensions, workflow management, workflow functional requirements, workflow specifications and execution languages.
  9. Workflow management using a specific BPMS software tool.
  10. Process Analytics. Metrics for evaluating business processes’ performance. Monitoring of standard metrics and process specific, user dined metrics.
  11. BPM methodologies (e.g. Six Sigma, Lean).
  12. Service-oriented and process-oriented information systems.

Suggested Bibliography

  • John Jeston and Johan Nelis (2008): Business Process Management, Second Edition: Practical Guidelines to Successful Implementations, Butterworth-Heinemann, Boston, ISBN: 0750669217.
  • Artie Mahal (2010): How Work Gets Done: Business Process Management, Basics and Beyond, Technics Publications, New Jersey, ISBN: 193550407.
  • Matias Weske, (2010): Business Process Management: Concepts, Languages, Architectures, Springer, New York, ISBN: 3642092640.
  • Simha Magal and Jeffry Word (2009): Essentials of Business Processes and Information Systems, Wiley, New York, ISBN: 0470418540.
  • Howard Smith and Peter Fingar (2003): Business Process Management: The third wave. Meghan Kiffer, ISBN: 0929652339.
  • Mark McDonald, (2010): Improving Business Processes, Harvard Business Review Press, Boston, ISBN: 142212973.
  • Business process management Journal, Emerald.
  • International Journal of Business Process Integration and management, Inderscience Publishers.