Structured Representation of Information

Learning Outcomes

The course’s material includes standard technologies and languages of modeling/representation of data/metadata used on the web and web services and how they are implemented in practice with code development in XML, XSL, and XML Schema.

Upon successful completion of the course, the students will be in position to:

  • Explain the basic technologies and languages of data modeling/ representation of data/metadata used on the web and web services.
  • Design and develop programs using XML, XSL and XML Schema.
  • Evaluate metadata modeling and decide whether they follow the given requirements.

Course Contents

  • Introduction to markup languages and semantic web
  • Introduction to XML, basic structure of XML documents
  • Valid XML documents / Use of Document Type Definition (DTD)
  • Presentation of XML documents using CSS
  • XML namespaces
  • Presentation of XML documents using data binding
  • Presentation of XML documents using scripts of Document Object Model (DOM)
  • Transformation and presentation of XML documents using XSLΤ/XSL
  • Modelling of XML documents using XML Schema
  • XML applications

Recommended Readings

  • “XML Guide”, Edition: 1st, Author: S. Holzner, Publisher: M. Gkiourdas, 2009 (1st Book)
  • “XML step by step”, Author: M. J. Young, Publisher: Kleidarithmos Ltd, 2011 (2nd Book)
  • Notes and course slides

Web and Mobile Information Systems

Learning Outcomes

This course addresses concepts and technologies concerning the development of internet systems and applications. With the completion of the course, the student will be in position to:

  • Understand and become familiar with the key concepts and principles of web programming including aspects related to client-server programming, server- and client- side development.
  • Know the background and key concepts governing the web applications by analyzing the pros and cons of architectural and implementation decisions.
  • Be able to implement web applications by using HTML5, CSS3 and Javascript for client-side programming, as well as approaches for server-side programming and use of data stores (including PHP and Node.JS technologies).

Course Contents

  • Web server technologies.
  • Client and server-side programming.
  • Client-side development
    • Hyper Text Markup Language 5 (HTML5)
    • Cascading Style Sheets 3 (CSS3)
    • Javascript
  • Server-side development
    • PHP and MySQL
  • Server deployment/ applications
    • Node.js

Moreover, the EVDOXOS system is utilized to provide additional useful information to the students as well as exercises that respond to the corresponding thematic topics / sessions covered by the course.

Recommended Readings

  • Laura Lemay, Rafe Coburn, Jennifer Kyrnin, «Complete Tutorial of HTML 5, CSS and JavaScript», 2016
  • S. Retalis, G. Tselios, «HTML lessons: From simple to complex», 2012
  • Kavouras, Milis, Xilomenos, Roukounaki, “Distributed systems with Java”, 2014
  • Harvey Deitel, Paul Deitel, «Internet & World Wide Web Programming», 2015

Information Systems Security

Learning Outcomes

The purpose of the course is to acquaint students with the techniques and methods used to ensure the confidentiality, integrity and availability of the data managed by information systems and of the information systems themselves.

In this context, the learning outcomes of the course, after its successful completion, are that the students will be able:

  • to understand the basic concepts of identification and authentication, access control and malware.
  • to know the modern authentication techniques, access control, operating system security, database system security, malware protection, and IT systems.
  • to analyse, evaluate and justify alternative authentication, identity management, and malware protection systems.
  • to design authentication, identity management and access control systems.

Course Contents

  • Identification and Authentication: Authentication Categories, Authentication Data, Authentication Systems, Biometric Systems.
  • Identity management: examples, technologies, data protection.
  • Access control: Access operations, access matrix, access control mechanisms.
  • Security of Operating Systems: Operating System Security Parameters, Operating Systems Security Mechanisms, development of secure OS, case studies (Unix, Windows NT).
  • Database Systems Security: Security requirements, data integrity and system availability, security for sensitive data, multi-level databases, Oracle security.
  • Malware: Classification, types, methods, case studies.
  • System and product security and assurance: Purpose, issues and methods of assurance, assurance criteria, evaluation systems.

Recommended Readings

Associated scientific Journals

  • IEEE Security and Privacy Magazine, IEEE
  • International Journal of Information Security, Springer
  • Computers and Security, Elsevier
  • Requirements Engineering, Springer
  • IEEE Transactions on Software Engineering, IEEE
  • Security and Communication Networks, Wiley

Wireless Communications

Learning Outcomes

The aim of the course is to enable students to understand the basic principles of electromagnetic systems for wireless communications. By concluding the course, students are able to

  • identify, describe and distinguish the basic characteristics of electromagnetic systems describe physical laws of electromagnetism using appropriate mathematical tools
  • distinguish the type of antenna and examine its characteristics
  • compute metrics which are extensively used in wireless systems and design basic wireless links
  • analyze and design more complicated wireless systems

By concluding the lab sessions students are able to

  • understand physical phenomenon by using mathematical tools
  • identify and apply theory in real world problems
  • use professional antenna design tools for the first time

Course Contents

Initially, introductory concepts of the Theory of Electromagnetic Fields are provided (Sources of Electromagnetic Fields, Electrostatic Fields, Dielectric Modes and Boundary Conditions, Permanent Magnetic Fields, Biot-Savart Law, Magnetic Flow Density, Gauss Law, Lorenz Power). Subsequently, electromagnetic waves in space are described (Maxwell equations, sinusoidal time variations, free space conditions and wave equation, uniform plane waves in lossless media, wave polarization). Thereafter, the students are introduced to antenna theory and the fields of radiation (potential functions, wave radiation areas, far field assumption, generic calculation methodology of radiation fields by antennas, basic key antenna features, antenna as a circuit element, antenna effective length). Examples of antennas are then studied (Hertz dipole, linear dipole antenna of arbitrary length, dipole λ/2, small circular loop antenna). Finally, the fundamental elements of electromagnetic wave propagation are examined (frequency bands & services/applications, wave classification, Friis’ equation and Free Space Loss, reflection & transmission, plane-earth model).

Papers, lectures, case-studies, examples and web pages with valuable information are uploaded at the course web page (Evdoxos).

Recommended Readings

  • “Wireless Communications” in Greek language, Book code in www.eudoxus.gr: 68393538, Edition: 2nd edition/2017, Authors: Kanatas Athanasios, Pantos Georgios, ISBN: 978-960-491-112-7, Publisher: A.Papasotiriou & Sia I.K.E (1st Book)
  • “Antennas – Wireless Links”, Book code in www.eudoxus.gr: 18548842, Edition: 1st edition/2018, Writers: Kapsalis C., Kottis P., ISBN: 960-8050-96-0, Publisher: A. Tziola & Sons S.A. (2nd Book)

Associated scientific Journals

  • ΙΕΕΕ Transactions on Antennas & Propagation
  • IEEE Communications Magazine
  • IEEE Antennas & Wireless Propagation Letters