Christos Stergiou

Christos Stergiou

Greece
449 followers 445 connections

About

Christos Stergiou was born in Thessaloniki, Greece. He recently received his Ph.D. from…

Activity

Join now to see all activity

Experience

  • University of Macedonia Graphic
  • -

    Thessaloniki

  • -

    Thessaloniki

  • -

    Kozani, Western Macedonia, Greece

  • -

    Kozani, Western Macedonia, Greece

  • -

    Thessaloniki, Central Macedonia, Greece

  • -

    Pylaia-Chortiatis, Central Macedonia, Greece

  • -

    Grevena, Western Macedonia, Greece

  • -

    Pylaia-Chortiatis, Central Macedonia, Greece

  • -

    Thessaloniki, Central Macedonia, Greece

  • -

    Thessaloniki, Central Macedonia, Greece

  • -

    Thessaloniki, Central Macedonia, Greece

  • -

    Thessaloniki

  • -

    Thessaloniki, Greece

  • -

    Thessaloniki Metropolitan Area

  • -

    Euosmos, Thessaloniki, Greece

  • -

    Euosmos, Thessaloniki

  • -

    Thessaloniki, Greece

  • -

    Thessaloniki, Greece

  • -

    Thessaloniki

  • -

    Epanomi, Thessaoniki

  • -

    Thessaloniki

  • -

    Thessaloniki

  • -

    Thessaloniki

  • -

  • -

  • -

    Thessaloniki

  • -

    Thessaloniki

  • -

    Thessaloniki, Greece

  • -

    Thessaloniki, Greece

  • -

    Thessaloniki, Greece

  • -

    Euosmos, Thessaloniki, Greece

  • -

    Thessaloniki, Greece

  • -

    Thessaloniki, Greece

Education

  • University of Macedonia Graphic

    University of Macedonia

    -

    Activities and Societies: Ph.D. Title: "Efficient and Secure Algorithms for Big Data Handling, Processing, and Delivery in Cloud Computing for Internet of Things Networks"

    Cloud Computing, Big Data, Internet of Things, Wireless Communication

  • -

  • -

    Activities and Societies: -Applying Basic Educational Concepts and Adult Training and Development -Designing and Implementing the Training Needs Assessment Process -The Instructional and Development Design Process -Developing Training Material -Implementing a Training and Development Plan -Designing and Implementing the Evaluation Process

  • -

    Activities and Societies: Management, Economics, Programming, Networking, Web Programming, Information Systems, Accounting, Finance, IT

  • -

    Activities and Societies: Εducational, Psychology, New technologies

    Studied Εducational, Psychology, New technologies.

  • -

    Activities and Societies: Technician of Wired and Wireless Networks

  • -

    Activities and Societies: Computer Programming, Computer Engineering, Technical Support, Networking, Web Programming, Information Systems

  • -

  • -

    Activities and Societies: A Digital Twin scenario of a Blockchain AIoT data management and analysis system over a 6G network

Publications

  • Secure Monitoring System for IoT Healthcare Data in the Cloud

    Applied Sciences MDPI

    Even though the field of medicine has made great strides in recent years, infectious diseases caused by novel viruses that damage the respiratory system continue to plague people all over the world. This type of virus is very dangerous, especially for people with serious long-term breathing problems like asthma, pneumonia, or bronchitis infections. Thus, this paper demonstrates a new secure machine learning monitoring system for a model for virus detection. Our proposed model makes use of four…

    Even though the field of medicine has made great strides in recent years, infectious diseases caused by novel viruses that damage the respiratory system continue to plague people all over the world. This type of virus is very dangerous, especially for people with serious long-term breathing problems like asthma, pneumonia, or bronchitis infections. Thus, this paper demonstrates a new secure machine learning monitoring system for a model for virus detection. Our proposed model makes use of four basic emerging technologies, the Internet of Things (IoT), Wireless Sensor Networks (WSN), Cloud Computing (CC), and Machine Learning (ML), to detect dangerous types of viruses that infect people or animals causing panic worldwide and deregulating human daily life. The proposed system is a robust system that could be established in various buildings, like hospitals, entertainment halls, universities, etc., and will provide accuracy, speed, and privacy for data collected in the detection of viruses.

    Other authors
    See publication
  • Educational Video: from script to creation

    Proceedings of the 12th Panhellenic Conference of the Pedagogical Association of Greece "Greek Pedagogy and Educational Research", 10-12 November, Ioannina, Greece

    In a digital age where the evolution of technology is evident, more and more people worldwide are adopting new technologies in their daily lives. The subjects of this empirical research are students who attend the annual training program in Thessaloniki. Using a questionnaire, their responses were collected from 145 students regarding the creation of an educational video and its use in pedagogical practice.
    The theoretical framework focuses on teacher education. The research concerns the…

    In a digital age where the evolution of technology is evident, more and more people worldwide are adopting new technologies in their daily lives. The subjects of this empirical research are students who attend the annual training program in Thessaloniki. Using a questionnaire, their responses were collected from 145 students regarding the creation of an educational video and its use in pedagogical practice.
    The theoretical framework focuses on teacher education. The research concerns the Educational Technology-Multimedia course where the role of the moving and digital image is prominent and is becoming more and more popular as digital literacy and multimedia spreads.
    The purpose of this research is to evaluate at the end of the year by the students their experience of a new educational intervention devised to be introduced in the Educational Technology-Multimedia course, in the academic year 2022-2023 by the team of teachers. It's about teaching scriptwriting and co-creating work in groups.
    The results of the research showed a clear difference from how they started and how they arrived and from the descriptive data a high satisfaction of the students can be distinguished. These results advocate the adoption of similar educational practices of introducing video into the educational process, but videos that were designed and created by the teachers themselves. This highlights the necessity of teaching it as a good practice.

  • The Integration of 6G and Blockchain into an Efficient AIoT-Based Smart Education Model

    IEEE 6th World Symposium on Communication Engineering (WSCE 2023)

    The technological advances impact the future classrooms and the whole education system. The evolution of 6G promises faster speeds based on terahertz, wireless communication, the leverage of artificial intelligence (AL), virtually reality (VR) and generally a fully connected world. The use of applications of IoT and AIoT improves the education environment, but the intelligent network services undoubtedly gather, store and analyze big data which are vulnerable to attackers. As a solution we may…

    The technological advances impact the future classrooms and the whole education system. The evolution of 6G promises faster speeds based on terahertz, wireless communication, the leverage of artificial intelligence (AL), virtually reality (VR) and generally a fully connected world. The use of applications of IoT and AIoT improves the education environment, but the intelligent network services undoubtedly gather, store and analyze big data which are vulnerable to attackers. As a solution we may consider the technology of blockchain. The trust and security of next generation intelligent networks are essential part of their design. In this article we suggest a data security system based on blockchain for AL applications in 6G networks. First, we present two Al-enabled applications, indoor positioning and mobile payment within the framework of 6G in the university area. We present the efficiency of blockchain in data security for Al-enabled systems using two case studies of indoor positioning system and mobile payment. The 6G system which is fully supported by Al and the integration of this in technology of blockchain, is ensured the security in future wireless communication.

    Other authors
    See publication
  • Revolutionizing Connectivity: The Power of AI, IoT, and Edge Computing for Smart and Autonomous Systems

    IEEE 6th World Symposium on Communication Engineering (WSCE 2023)

    The growing need for data analysis in the industry and smart city sectors highlight the transformative potential of integrating AI, IoT, and edge computing. Through the utilization of AI algorithms and real-time data derived from IoT devices, these systems enable advanced analytical capabilities at the network edge, thus optimizing efficiency and decision-making processes. Furthermore, the adoption of edge computing mitigates latency and transmission concerns and ensures data security, while…

    The growing need for data analysis in the industry and smart city sectors highlight the transformative potential of integrating AI, IoT, and edge computing. Through the utilization of AI algorithms and real-time data derived from IoT devices, these systems enable advanced analytical capabilities at the network edge, thus optimizing efficiency and decision-making processes. Furthermore, the adoption of edge computing mitigates latency and transmission concerns and ensures data security, while the infusion of AI-driven autonomy expands the horizons of applications across sectors such as transportation and manufacturing. However, there are challenges regarding network architecture, data management, and security that need to be addressed in the integrated implementation of AIoT architecture.

    Other authors
    See publication
  • Digital Twin Intelligent System for Industrial Internet of Things-based Big Data Management and Analysis inCloud Environments

    Elsevier's Virtual Reality and Intelligent Hardware

    This work surveys and illustrates multiple open challenges in the field of industrial Internet of Things (IoT)-based Big Data management and analysis in Cloud environments. Challenges arising from the fields of machine learning in cloud infrastructures, artificial intelligence techniques for big data analytics in cloud environments, and federated learning cloud systems are elucidated. Additionally, reinforcement learning, which is a novel technique that allows large cloud-based data centers, to…

    This work surveys and illustrates multiple open challenges in the field of industrial Internet of Things (IoT)-based Big Data management and analysis in Cloud environments. Challenges arising from the fields of machine learning in cloud infrastructures, artificial intelligence techniques for big data analytics in cloud environments, and federated learning cloud systems are elucidated. Additionally, reinforcement learning, which is a novel technique that allows large cloud-based data centers, to allocate more energy-efficient resources is examined. Moreover, we propose an architecture that attempts to combine the features offered by several cloud providers to achieve an energy-efficient industrial IoT-based big data management framework (EEIBDM) established outside of every user in the cloud. IoT data can be integrated with techniques such as reinforcement and federated learning to achieve a digital twin scenario for the virtual representation of industrial IoT-based big data of machines and room temperatures. Furthermore, we propose an algorithm for determining the energy consumption of the infrastructure by evaluating the EEIBDM framework. Finally, future directions for the expansion of this research are discussed.

    Other authors
    See publication
  • Exploitation of Emerging Technologies and Advanced Networks for a Smart Healthcare System

    MDPI Applied Sciences

    Current medical methods still confront numerous limitations and barriers to detect and fight against illnesses and disorders. The introduction of emerging technologies in the healthcare industry is anticipated to enable novel medical techniques for an efficient and effective smart healthcare system. Internet of Things (IoT), Wireless Sensor Networks (WSN), Big Data Analytics (BDA), and Cloud Computing (CC) can play a vital role in the instant detection of illnesses, diseases, viruses, or…

    Current medical methods still confront numerous limitations and barriers to detect and fight against illnesses and disorders. The introduction of emerging technologies in the healthcare industry is anticipated to enable novel medical techniques for an efficient and effective smart healthcare system. Internet of Things (IoT), Wireless Sensor Networks (WSN), Big Data Analytics (BDA), and Cloud Computing (CC) can play a vital role in the instant detection of illnesses, diseases, viruses, or disorders. Complicated techniques such as Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) could provide acceleration in drug and antibiotics discovery. Moreover, the integration of visualization techniques such as Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR) with Tactile Internet (TI), can be applied from the medical staff to provide the most accurate diagnosis and treatment for the patients. A novel system architecture, which combines several future technologies, is proposed in this paper. The objective is to describe the integration of a mixture of emerging technologies in assistance with advanced networks to provide a smart healthcare system that may be established in hospitals or medical centers. Such a system will be able to deliver immediate and accurate data to the medical stuff in order to aim them in order to provide precise patient diagnosis and treatment.

    Other authors
    See publication
  • Αξιοποίηση των νέων τεχνολογιών στο ειδικό σχολείο (Utilization of new technologies in the special school)

    Πελλαίος Παιδαγωγός (Pellaios Pedagogue)

    Στην παρούσα εργασία, αρχικά μελετώνται και παρουσιάζονται οι διάφοροι τρόποι με τους οποίους η τεχνολογία μπορεί να βοηθήσει τους μαθητές με ειδικές ανάγκες. Υπάρχουν πολλές και διαφορετικές περιπτώσεις, οι οποίες σχετίζονται και με το είδος της αναπηρίας. Για αυτό το λόγο, προτείνεται και συνιστάται η χρήση τεχνικών εργαλείων που μπορούν να χρησιμοποιηθούν ως βοήθεια στις διάφορες αναπηρίες, όπως στην αναγνώριση και σύνθεση γραπτού λόγου, όπου μπορεί να διευκολυνθεί η μάθηση των ατόμων με…

    Στην παρούσα εργασία, αρχικά μελετώνται και παρουσιάζονται οι διάφοροι τρόποι με τους οποίους η τεχνολογία μπορεί να βοηθήσει τους μαθητές με ειδικές ανάγκες. Υπάρχουν πολλές και διαφορετικές περιπτώσεις, οι οποίες σχετίζονται και με το είδος της αναπηρίας. Για αυτό το λόγο, προτείνεται και συνιστάται η χρήση τεχνικών εργαλείων που μπορούν να χρησιμοποιηθούν ως βοήθεια στις διάφορες αναπηρίες, όπως στην αναγνώριση και σύνθεση γραπτού λόγου, όπου μπορεί να διευκολυνθεί η μάθηση των ατόμων με διαταραχές που δεν επιτρέπουν την σωστή επεξεργασία οπτικών πληροφοριών. Επομένως, μέσω των νέων τεχνολογιών και τον διαφόρων τεχνολογικών εργαλείων προσφέρεται μια πληθώρα πλεονεκτημάτων στην εκπαιδευτική διαδικασία για παιδιά με ειδικές εκπαιδευτικές ανάγκες και όχι μόνο. Ωστόσο, υπάρχουν και κάποιοι «κίνδυνοι» που πρέπει να προσεχθούν για να αποφευχθούν, καθώς η τεχνολογία δεν έρχεται να αντικαταστήσει τον εκπαιδευτικό, ούτε να αποτελέσει μια μαγική συνταγή ή πανάκεια. Η τεχνολογικές εξελίξεις είναι συμπληρωματικό εργαλείο, όπου σε κάποιες περιπτώσεις είναι μάλιστα αρκετά απαραίτητο, αλλά πρέπει να αξιοποιηθεί σωστά ώστε να προσφέρει τα αντίστοιχα επιθυμητά αποτελέσματα.

    See publication
  • IoT-based Big Data secure management in the Fog over a 6G Wireless Network

    IEEE Internet of Things Journal

    This work proposes an innovative infrastructure of secure scenario which operates in a wireless-mobile 6G network for managing Big Data on Smart Buildings. Count on the rapid growth of telecommunication field new challenges arise. Furthermore, a new type of wireless network infrastructure, the sixth generation (6G), provides all the benefits of its past versions and also improves some issues which its predecessors had. In addition, relative technologies to the telecommunications filed, such as…

    This work proposes an innovative infrastructure of secure scenario which operates in a wireless-mobile 6G network for managing Big Data on Smart Buildings. Count on the rapid growth of telecommunication field new challenges arise. Furthermore, a new type of wireless network infrastructure, the sixth generation (6G), provides all the benefits of its past versions and also improves some issues which its predecessors had. In addition, relative technologies to the telecommunications filed, such as IoT, Cloud Computing and Edge Computing, can operate through a 6G wireless network. Take into account all these, we propose a scenario that try to combine the functions of the Internet of Things with Cloud Computing, Edge Computing and Big Data in order to achieve a Smart and Secure environment. The major purpose of this work is to create a novel and secure Cache Decision System in a wireless network that operates over a Smart Building, which will offer the users safer and efficient environment for browsing the internet, sharing and managing large-scale data in the fog. This CDS consisted of two types of servers, one Cloud Server and one Edge Server. In order to come up with our proposal, we study related cache scenarios systems which are listed, presented, and compared in this work.

    Other authors
    See publication
  • Green Cloud Communication System for Big Data Management

    The 3rd World Symposium on Communication Engineering (WSCE 2020), Thessaloniki, Greece

    This paper makes an effort to survey and study the open challenges in the field of energy-efficient and green Cloud infrastructures. The useful software that offers the possibility to implement and evaluate Cloud environments is CloudSim, which we also use in order to demonstrate and propose our idea. Moreover, we consider the CloudSim’s simulator architecture in order to achieve our proposal. Consequently, we investigate and propose a system framework for better use of Big Data management…

    This paper makes an effort to survey and study the open challenges in the field of energy-efficient and green Cloud infrastructures. The useful software that offers the possibility to implement and evaluate Cloud environments is CloudSim, which we also use in order to demonstrate and propose our idea. Moreover, we consider the CloudSim’s simulator architecture in order to achieve our proposal. Consequently, we investigate and propose a system framework for better use of Big Data management, based on Cloud federated network. Additionally, we propose an algorithm for achieving an energy-efficient resource allocation technique for Big Data management on Green Cloud environment. The experimental results demonstrate that our proposed model has immense potential as it offers significant performance gains regarding the cost saving and the better data management under large workload scenarios.

    Other authors
    See publication
  • InFeMo: Flexible Big Data management through a federated Cloud system

    ACM Transactions on Internet Technology

    This paper introduces and describes a novel architecture scenario based on Cloud Computing and count on the innovative model of Federated Learning. The proposed model named Integrated Federated Model, with acronym InFeMo. InFeMo incorporates all the existing Cloud models with a federated learning scenario, as well as other related technologies that may have integrated use with each other, offering a novel integrated scenario. In addition to this, proposed model is motivated to deliver a more…

    This paper introduces and describes a novel architecture scenario based on Cloud Computing and count on the innovative model of Federated Learning. The proposed model named Integrated Federated Model, with acronym InFeMo. InFeMo incorporates all the existing Cloud models with a federated learning scenario, as well as other related technologies that may have integrated use with each other, offering a novel integrated scenario. In addition to this, proposed model is motivated to deliver a more energy efficient system architecture and environment for the users, which aims to the scope of data management. Also, by applying the InFeMo the user would have less waiting time in every procedure queue. Proposed system was built on the resources made available by Cloud Service Providers (CSPs), by using the PaaS (Platform as a Service) model, in order to be able to handle user requests better and faster. This research tries to fill a scientific gap in the field of federated Cloud systems. Thus, taking advantage of the existing scenarios of FedAvg and CO-OP, we keen to ended up to a new federated scenario that merges these two algorithms, and aiming to has a more efficient model, that it is able to select, depending on the occasion, if it “train” the model locally in client of globally in server.

    Other authors
    See publication
  • Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network

    Springer, Handbook of Computer Networks and Cyber Security: Principles and Paradigms, Multimedia Systems and Applications

    The Cloud Computing (CC) technology refers to an infrastructure in which both data storage and data processing take place outside the mobile device. Furthermore, another new and fast growing technology called Internet of things (IoT) rises in the sector of networks and telecommunications with specific concern in the “modern” area of wireless telecommunication systems. Regarding our recent research, the main goal of the interaction and cooperation between things and objects sent through the…

    The Cloud Computing (CC) technology refers to an infrastructure in which both data storage and data processing take place outside the mobile device. Furthermore, another new and fast growing technology called Internet of things (IoT) rises in the sector of networks and telecommunications with specific concern in the “modern” area of wireless telecommunication systems. Regarding our recent research, the main goal of the interaction and cooperation between things and objects sent through the wireless networks is to fulfill the objective set to them as a combined entity, with the aim to achieve a better environment for the use of Big Data (BD). In addition, counting on the technology of wireless networks, both CC and IoT could be developed rapidly and together. In this paper, we survey IoT and Cloud Computing technologies with focus on security problems that both technologies faced. Particularly, these two aforementioned technologies (i.e., Cloud Computing and IoT) have been compared, with the aim to examine the familiar characteristics and examine and discover the benefits of their integration to secure the use and transmission of Big Data. In conclusion, contributions of CC and IoT technologies and how the CC technology improves the operation of IoT as a base technology for Big Data systems have been presented.

    Other authors
    See publication
  • Internet of Things for Healthcare: Challenges & Perspectives

    New Technologies in Health: Medical, Legal & Ethical Issues

    The purpose of this research work is to motivate researchers in the field to develop novel ideas, applications, laws, regulations, and techniques. Thus, the main objectives of this work are to provide all the useful information needed, so that everyone can adopt and then integrate this information which can lead to novel evolutionary scenarios.

    Other authors
    See publication
  • Advanced Media-based Smart Big Data on Intelligent Cloud Systems

    IEEE Transaction on Sustainable Computing

    Today's advanced media technology preaches an enthralling time that will enormously bear on daily life. Moreover, the rapid raise of wireless communications and networking will ultimately bring advanced media to our lives anytime, anywhere, and on any device. According to the National Institute of Standards and Technology (NIST), Cloud Computing (CC) is a scheme for enabling convenient, on-demand network access to a shared pool of configurable computing pores (for example networks…

    Today's advanced media technology preaches an enthralling time that will enormously bear on daily life. Moreover, the rapid raise of wireless communications and networking will ultimately bring advanced media to our lives anytime, anywhere, and on any device. According to the National Institute of Standards and Technology (NIST), Cloud Computing (CC) is a scheme for enabling convenient, on-demand network access to a shared pool of configurable computing pores (for example networks, applications, storage, servers, and services) which could be promptly foresighted and delivered with minimal management effort or service provider interaction. This paper proposed an efficient algorithm for advanced scalable Media-basedSmart Big Data (3D, Ultra HD) on Intelligent Cloud Computing systems. The proposed encoding algorithmoutperforms the conventional HEVC standard which demonstrated by the performance evaluations. In order to ratify the proposed approach, in addition, a relative study has been carried out. The proposed method could be used and integrated into HEVC, as a Smart Big Data, without violating the standard.

    Other authors
    See publication
  • Recent advances delivered in Mobile Cloud Computing’s Security and Management challenges

    IGI Global, Modern Principles, Practices, and Algorithms for Cloud Security,

    Mobile cloud computing provides an opportunity to restrict the usage of huge hardware infrastructure and to provide access to data, applications, and computational power from every place and in any time with the use of a mobile device. Furthermore, MCC offers a number of possibilities but additionally creates several challenges and issues that need to be addressed as well. Through this work, the authors try to define the most important issues and challenges in the field of MCC technology by…

    Mobile cloud computing provides an opportunity to restrict the usage of huge hardware infrastructure and to provide access to data, applications, and computational power from every place and in any time with the use of a mobile device. Furthermore, MCC offers a number of possibilities but additionally creates several challenges and issues that need to be addressed as well. Through this work, the authors try to define the most important issues and challenges in the field of MCC technology by illustrating the most significant works related to MCC during recent years. Regarding the huge benefits offered by the MCC technology, the authors try to achieve a more safe and trusted environment for MCC users in order to operate the functions and transfer, edit, and manage data and applications, proposing a new method based on the existing AES encryption algorithm, which is, according to the study, the most relevant encryption algorithm to a cloud environment. Concluding, the authors suggest as a future plan to focus on finding new ways to achieve a better integration MCC with other technologies.

    Other authors
    See publication
  • Proposed High Level Architecture of a Smart Interconnected Interactive Classroom

    in Proceedings of IEEE conference SEEDA-CECNSM 2018

    This paper presents the high level architecture of a smart, modern, interactive laboratory-class called Smart Interconnected Interactive Classroom (SIIC). It describes the interoperability of telecommunication technologies, sensors and actuators over a virtual environment that enhances the learning process and experience. In the context of this work novel augmented and virtual services are outlined that can assist e-Learning systems through virtual reality and real-time interactions.

    Other authors
    See publication
  • Security, Privacy & Efficiency of Sustainable Cloud Computing for Big Data & IoT

    Elsevier, Sustainable Computing, Informatics and Systems

    With the significant advances in communication technologies and in many other sectors, also are growing up security and privacy issues. In our research, is introduced a base technology called Cloud Computing (CC) to operate with the Big Data (BD). CC is a technology which refers to the processing power of data in the fog, providing more “green” computational and sustainable computing. Since it is a recently investigated technology, it has many gaps in security and privacy. So, in this paper, we…

    With the significant advances in communication technologies and in many other sectors, also are growing up security and privacy issues. In our research, is introduced a base technology called Cloud Computing (CC) to operate with the Big Data (BD). CC is a technology which refers to the processing power of data in the fog, providing more “green” computational and sustainable computing. Since it is a recently investigated technology, it has many gaps in security and privacy. So, in this paper, we proposed a new system for Cloud Computing integrated with Internet of Things as a base scenario for Big Data. Moreover, we tried to establish an architecture relaying on the security of the network in order to improve the security issues. A solution proposed is installing a security “wall” between the Cloud Server and the Internet, with the aim to eliminate the privacy and security issues. As a result, we consider that CC deals more efficient with the privacy issue of bits transferred through time. Through our proposed system, the interaction and cooperation between things and objects communicate through the wireless networks in order to fulfil the objective set to them as a combined entity. Regarding the major goal of our research, which is the security, a sort survey of IoT and CC presented, with a focus on the security issues of both technologies. In addition to this, we try present the security challenges of the integration of IoT and Cloud Computing with the aim to provide an architecture relaying on the security of the network in order to improve their security issues. Finally, we realize that through our study Cloud Computing could offer a more “green” and efficient fog environment for sustainable computing scenarios.

    Other authors
    See publication
  • Security, Privacy & Efficiency of Sustainable Cloud Computing for Big Data & IoT

    Elsevier, Sustainable Computing, Informatics and Systems

    With the significant advances in communication technologies and in many other sectors, also are growing up security and privacy issues. In our research, is introduced a base technology called Cloud Computing (CC) to operate with the Big Data (BD). CC is a technology which refers to the processing power of data in the fog, providing more “green” computational and sustainable computing. Since it is a recently investigated technology, it has many gaps in security and privacy. So, in this paper, we…

    With the significant advances in communication technologies and in many other sectors, also are growing up security and privacy issues. In our research, is introduced a base technology called Cloud Computing (CC) to operate with the Big Data (BD). CC is a technology which refers to the processing power of data in the fog, providing more “green” computational and sustainable computing. Since it is a recently investigated technology, it has many gaps in security and privacy. So, in this paper, we proposed a new system for Cloud Computing integrated with Internet of Things as a base scenario for Big Data. Moreover, we tried to establish an architecture relaying on the security of the network in order to improve the security issues. A solution proposed is installing a security “wall” between the Cloud Server and the Internet, with the aim to eliminate the privacy and security issues. As a result, we consider that CC deals more efficient with the privacy issue of bits transferred through time. Through our proposed system, the interaction and cooperation between things and objects communicate through the wireless networks in order to fulfil the objective set to them as a combined entity. Regarding the major goal of our research, which is the security, a sort survey of IoT and CC presented, with a focus on the security issues of both technologies. In addition to this, we try present the security challenges of the integration of IoT and Cloud Computing with the aim to provide an architecture relaying on the security of the network in order to improve their security issues. Finally, we realize that through our study Cloud Computing could offer a more “green” and efficient fog environment for sustainable computing scenarios.

    Other authors
    See publication
  • Security and Privacy of Big Data for Social Networking Services in Cloud

    IEEE conference on Computer Communications (IEEE INFOCOM 2018)

    Big Data (BD) is of great importance especially in wireless telecommunications field. Social Networking (SNg) is one more fast-growing technology that allows users to build their profile and could be described as web applications. Both of them face privacy and security issues. In this paper, we survey SNg, BD and Cloud Computing (CC) technology and their basic characteristics, by concentrating on the security issues of those technologies. Specifically, we aim at combining the functionality of…

    Big Data (BD) is of great importance especially in wireless telecommunications field. Social Networking (SNg) is one more fast-growing technology that allows users to build their profile and could be described as web applications. Both of them face privacy and security issues. In this paper, we survey SNg, BD and Cloud Computing (CC) technology and their basic characteristics, by concentrating on the security issues of those technologies. Specifically, we aim at combining the functionality of these two technologies (i.e Big Data and Social Networking) in a CC environment, so that we can analyze the common features and ascertain the advantages of their integration related to security issues. Concluding our research, we present a new system-framework-network in Cloud Environment through which users of various Social Networks (SNs) will be able to exchange data and information, and primarily large-scale data (Big Data), could greatly improve the communication of SN users, and thus become more safe and accurate in a Cloud environment. More specifically, this system would be an intermediate communication node that could be utilized in order to improve the security of SNg’s users through the use of algorithms that can provide more privacy in the data related to BD technology. This method is presented here and also, some measurements and results relative to its use. Finally, the opportunity to create a database through which each user can view the statistics of his interaction with the SNg is further discussed.

    Other authors
    See publication
  • Algorithms for efficient digital media transmission over IoT and cloud networking

    Journal of Multimedia Information System

    In recent years, with the blooming of Internet of Things (IoT) and Cloud Computing (CC), researchers have begun to discover new methods of technological support in all areas (e.g. health, transport, education, etc.). In this paper, in order to achieve a type of network that will provide more intelligent media-data transfer we are studying new technologies, and use various open source tools, such as CC analyzers and simulators. These tools are useful for studying the collection, storage…

    In recent years, with the blooming of Internet of Things (IoT) and Cloud Computing (CC), researchers have begun to discover new methods of technological support in all areas (e.g. health, transport, education, etc.). In this paper, in order to achieve a type of network that will provide more intelligent media-data transfer we are studying new technologies, and use various open source tools, such as CC analyzers and simulators. These tools are useful for studying the collection, storage, management, processing, and analysis of large volumes of data. The simulation platform used is CloudSim and runs on Eclipse. So, after measuring the network performance with CloudSim, we use the Cooja emulator of the Contiki OS to confirm and access more metrics and options. More specifically, we implemented a network topology from a small section of the script of CloudSim with Cooja, so that we can test a single network segment. The results of the experiment show that there are not duplicated packets received. This research could be a start point for better and more efficient media data transmission.

    Other authors
    See publication
  • Advanced Media-based Smart Big Data on Intelligent Cloud Systems

    IEEE Transaction on Sustainable Computing

    Today’s advanced media technology preaches an enthralling time that will enormously bear on daily life. Moreover the rapid raise of wireless communications and networking will ultimately bring advanced media to our lives anytime, anywhere, and on any device. According to National Institute of Standards and Technology (NIST), Cloud Computing (CC) is a scheme for enabling convenient, on-demand network access to a shared pool of configurable computing pores (for example networks, applications…

    Today’s advanced media technology preaches an enthralling time that will enormously bear on daily life. Moreover the rapid raise of wireless communications and networking will ultimately bring advanced media to our lives anytime, anywhere, and on any device. According to National Institute of Standards and Technology (NIST), Cloud Computing (CC) is a scheme for enabling convenient, on-demand network access to a shared pool of configurable computing pores (for example networks, applications, storage, servers and services) which could be promptly foresighted and delivered with minimal management effort or service provider interaction. This paper proposed an efficient algorithm for advanced scalable Media-based Smart Big Data (3D, Ultra HD) on Intelligent Cloud Computing systems. The proposed encoding algorithm outperforms the conventional HEVC standard which demonstrated by the performance evaluations. In order to ratify the proposed approach in addition, a relative study has been carried out. The proposed method could be used and integrated into HEVC, as a Smart Big Data, without violating the standard.

    Other authors
    See publication
  • Efficient IoT-based sensor BIG Data collection-processing and analysis in Smart Buildings

    Future Generation Computer Systems

    Internet of Things (IoT) provides to everyone new types of services in order to improve everyday life. Through this new technology, other recently developed technologies such as Big Data, Cloud Computing, and Monitoring could take part. In this work, we survey the four aforementioned technologies in order to find out their common operations, and combine their functionality, in order to have beneficial scenarios of their use. Despite the boarder concept of a smart city, we will try to…

    Internet of Things (IoT) provides to everyone new types of services in order to improve everyday life. Through this new technology, other recently developed technologies such as Big Data, Cloud Computing, and Monitoring could take part. In this work, we survey the four aforementioned technologies in order to find out their common operations, and combine their functionality, in order to have beneficial scenarios of their use. Despite the boarder concept of a smart city, we will try to investigate new systems for collecting and managing sensors’ data in a smart building which operates in IoT environment. As a bases technology for the proposed sensor management system, a cloud server would be used, collecting the data that produced from each sensor in the smart building. These data are easy to be managed and controlled from distance, by a remote (mobile) device operating on a network set up in IoT technology. As a result, the proposed solutions for collecting and managing sensors’ data in a smart building could lead us in an energy efficient smart building, and thus in a Green Smart Building.

    Other authors
    See publication
  • Algorithms for Big Data in Advanced Communication Systems and Cloud Computing

    19th IEEE Conference on Business Informatics 2017 (CBI2017)

    Communication Systems are becoming significant in many areas of modern everyday life. Through this field several technologies grow and contribute to the improvement of people’s everyday life. Big Data (BD) appears as a technology created and developed through communication systems. Big Data refers to the large-scale amounts of data used, transferred and managed through a network. Due to data usage and even large-scale amounts of data, the use of storage space without restrictions on its use…

    Communication Systems are becoming significant in many areas of modern everyday life. Through this field several technologies grow and contribute to the improvement of people’s everyday life. Big Data (BD) appears as a technology created and developed through communication systems. Big Data refers to the large-scale amounts of data used, transferred and managed through a network. Due to data usage and even large-scale amounts of data, the use of storage space without restrictions on its use becomes necessary. This storage space provided through a technology called Cloud Computing (CC). This technology mentions to a substructure in which data storage and data processing occur in real time outside of the user’s device. This work surveys BD and CC and their basic features, with a focus on
    the security and privacy issues of both technologies. In addition to this, we will try to combine the functionality of BD and CC with the aim to examine the frequent features, and also to discover the benefits related in security issues of their integration.

    Other authors
    See publication
  • Efficient Large-Scale Medical Data (eHealth Big Data) Analytics in Internet of Things

    19th IEEE International Conference on Business Informatics (CBI’17), International Workshop on the Internet of Things and Smart Services (ITSS2017)

    Recent technologies such as Big Data could be used in order to help the improvement of other fields except for the telecommunication field. Due to the Health field, the Big Data technology could contribute with the aim to help for the purpose of analysis and management of the huge amounts of health data. The main objective of this research proposal is an analytical study of the technologies IoT, Cloud Computing (CC) and large-scale data (Big Data) to resolve various issues facing the health…

    Recent technologies such as Big Data could be used in order to help the improvement of other fields except for the telecommunication field. Due to the Health field, the Big Data technology could contribute with the aim to help for the purpose of analysis and management of the huge amounts of health data. The main objective of this research proposal is an analytical study of the technologies IoT, Cloud Computing (CC) and large-scale data (Big Data) to resolve various issues facing the health sector in relation to these technologies. The purpose of the research proposal is the collection of medical (e-health) big data in real time. The collection will be performed by sensor devices and actuators, which will wear patients who suffer from various ailments. Then is following, the transfer of these data through a network to a cloud server. Additionally, these data will be processed in the cloud which makes its analysis so as to become meaningless. By the analysis of these data is done the data mining. Finally, to address the various problems in the health sector, the transfer of the analyzed health data will be held by the devices of the relevant persons. Also, in our study, we will deal with the security of medical data which constitute personal data and must be protected.

    Other authors
    See publication
  • Solutions for Inter-connectivity and Security in a Smart Hospital Building

    15th IEEE International Conference on Industrial Informatics (INDIN 2017)

    The last few years, significant advances provide better solutions for interconnectivity and security in Intelligent Buildings (IBs). An overview of these advances is presented in this paper. Also, in this paper, we presented a patient monitoring system for hospital buildings and a Building Management System (BMS) layered design. Then, we made a comparative analysis of our system over other similar systems and presented the benefits that our approach has. Moreover, we proposed some security…

    The last few years, significant advances provide better solutions for interconnectivity and security in Intelligent Buildings (IBs). An overview of these advances is presented in this paper. Also, in this paper, we presented a patient monitoring system for hospital buildings and a Building Management System (BMS) layered design. Then, we made a comparative analysis of our system over other similar systems and presented the benefits that our approach has. Moreover, we proposed some security solutions that came out from the design and from further research. Also, a comparative analysis of our system over other similar systems is shown in this paper. Then, the benefits of our design are listed and explained. Finally, we have studied and used the Contiki OS and the Cooja emulator, and we have created simulations, which helped us have a more detailed and realistic image of our system. The results from the transmission of the packets of data are significant, since the protocol we use (CoAP), has a very low percentage, if not zero, of the packets, lost. Using the Cooja emulator we track the trafficc in and out of the network in real time. So, it seems to be a very useful tool which offers, except the traffic, diagrams and other metrics which describe our system. As future work, we are going to emulate our entire system with such tools like the Cooja emulator. Then, if the results are the expected, we will move on with the implementation of such a system. This paper will be a start point for better future decisions in designing intelligent building systems.

    Other authors
    See publication
  • Algorithms for Big Data in Advanced Communication Systems and Cloud Computing

    Conference: 19th IEEE Conference on Business Informatics 2017 (CBI2017), At 24-26 July 2017, Thessaloniki, Greece

    Index Terms—Cloud Computing, Big Data, Algorithms, Big Data Applications, Cloud Computing Security

    Other authors
    See publication
  • Architecture for security monitoring in IoT environments

    Conference: The 26th IEEE International Symposium on Industrial Electronics, 19-21 June 2017 Edinburgh, Scotland, UK, At Edinburgh, Scotland, UK

    The focus of this paper is to propose an integration between Internet of Things (IoT) and Video Surveillance, with the aim to satisfy the requirements of the future needs of Video Surveillance, and to accomplish a better use. IoT is a new technology in the sector of telecommunications. It is a network that contains physical objects, items, and devices, which are embedded with sensors and software, thus enabling the objects, and allowing for their data exchange. Video Surveillance systems…

    The focus of this paper is to propose an integration between Internet of Things (IoT) and Video Surveillance, with the aim to satisfy the requirements of the future needs of Video Surveillance, and to accomplish a better use. IoT is a new technology in the sector of telecommunications. It is a network that contains physical objects, items, and devices, which are embedded with sensors and software, thus enabling the objects, and allowing for their data exchange. Video Surveillance systems collect and exchange the data which has been recorded by sensors and cameras, and send it through the network. This paper proposes an innovative topology paradigm which could offer a better use of IoT technology in Video Surveillance systems. Furthermore, the contribution of these technologies provided by Internet of Things features in dealing with the basic types of Video Surveillance technology with the aim to improve their use and to have a better transmission of video data through the network. Additionally, there is a comparison between our proposed topology and relevant proposed topologies focusing in the security issue.

    Keywords—Internet of Things, video surveillance, ΙοΤ, monitoring, network topology, architecture

    Other authors
    See publication
  • Solutions for Inter-connectivity and Security in a Smart Hospital Building

    Conference: The 15th IEEE International Conference on Industrial Informatics (INDIN 2017) to be held in Emden, Germany, 24-26 July, 2017, At Emden, Germany, 24-26 July, 2017

    Keywords— BMS; CoAP; 6LoWPAN; Interoperability; Named Data Networking; Smart Buildings; Security;

    Other authors
    See publication
  • Efficient and secure BIG data delivery in Cloud Computing

    Multimedia Tools and Applications/Springer

    Big Data (BD) is a new technology which rapidly growing in the telecommunications
    sectors, especially in the contemporary field of wireless telecommunications. Another
    technology that grows rapidly in the field of wireless telecommunications is Cloud Computing
    (CC). CC concerns an infrastructure where data storage and processing take place outside of
    the user’s device. Both of them face security and privacy issues in their function. In order to
    improve them and to optimize their…

    Big Data (BD) is a new technology which rapidly growing in the telecommunications
    sectors, especially in the contemporary field of wireless telecommunications. Another
    technology that grows rapidly in the field of wireless telecommunications is Cloud Computing
    (CC). CC concerns an infrastructure where data storage and processing take place outside of
    the user’s device. Both of them face security and privacy issues in their function. In order to
    improve them and to optimize their privacy and security issues conducted the present survey.
    In this paper, we survey BD and CC technology and their basic characteristics, with a focus on
    the security and privacy issues of both technologies. Specifically, we try to combine the
    functionality of the two technologies (i.e BD and CC) with the aim to examine the frequent
    features, and also to discover the benefits related in security issues of their integration.
    Concluding, we present a new method of an algorithm that can be used for the purpose of
    improving Cloud Computing’s security through the use of algorithms that can provide more
    privacy in the data related to Big Data technology. At the end, there is a survey about the
    challenges of the integration of BD and CC related to their security level.

    Other authors
    See publication
  • Secure integration of IoT and Cloud Computing

    Future Generation Computer Systems / Elsevier

    Mobile Cloud Computing is a new technology which refers to an infrastructure where both data
    storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wireless telecommunications. The main goal of the interaction and cooperation between things and objects which sent through the wireless networks is to…

    Mobile Cloud Computing is a new technology which refers to an infrastructure where both data
    storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wireless telecommunications. The main goal of the interaction and cooperation between things and objects which sent through the wireless networks is to fulfill the objective set to them as a combined entity. In addition, there is a rapid development of both technologies, Cloud Computing and Internet of Things, regard the field of wireless communications. In this paper, we present a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Specifically, we combine the two aforementioned technologies (i.e Cloud Computing and IoT) in order to examine the common features, and in order tο discover the benefits of their integration. Concluding, we present the contribution of Cloud Computing to the IoT technology. Thus, it shows how the Cloud Computing technology improves the function of the IoT. Finally, we survey the security challenges of the integration of IoT and Cloud Computing.

    Other authors
    See publication
  • Recent advances delivered by mobile cloud computing and Internet of Τhings for Big data applications: A Survey

    International Journal of Network Management

    The Internet of Things is a new technology which is growing rapidly in the field of telecommunications, and especially in the modern field of wireless telecommunications. The main goal of the interaction and cooperation between things and objects sent through the wireless networks is to fulfil the objective set to them as a combined entity. In addition, based on the technology of wireless networks, both the technologies of Mobile Cloud Computing and Internet of Things develop rapidly. In this…

    The Internet of Things is a new technology which is growing rapidly in the field of telecommunications, and especially in the modern field of wireless telecommunications. The main goal of the interaction and cooperation between things and objects sent through the wireless networks is to fulfil the objective set to them as a combined entity. In addition, based on the technology of wireless networks, both the technologies of Mobile Cloud Computing and Internet of Things develop rapidly. In this paper, we combine the two aforementioned technologies (i.e MCC and IoT) with the technology of the Big Data in order to examine the common features, and tο discover which of the MCC and IoT benefits improve the use of the Big Data Applications. Finally, we present the contribution of MCC and IoT individually to the technology of Big Data.

    Other authors
    See publication
  • Mobile Cloud Computing in 4G Networks (LTE)

    2nd Student Conference of Applied Informatics, Thessaloniki, Greeve

    Mobile Cloud Computing (MCC) refers to an infrastructure where both the data storage and the data processing happen outside of the mobile device. 3GPP Long Term Evolution (LTE) is the name given to the new standard developed by 3GPP to cope with future market requirements. Nowadays LTE/LTE Advanced is the next step in the evolution of 3G systems and the goal is to provide levels of quality similar to those of current wired networks. In this paper, we present a survey of 4G LTE and 4G LTE…

    Mobile Cloud Computing (MCC) refers to an infrastructure where both the data storage and the data processing happen outside of the mobile device. 3GPP Long Term Evolution (LTE) is the name given to the new standard developed by 3GPP to cope with future market requirements. Nowadays LTE/LTE Advanced is the next step in the evolution of 3G systems and the goal is to provide levels of quality similar to those of current wired networks. In this paper, we present a survey of 4G LTE and 4G LTE Advanced communications features with a focus on the enhancement of the current MCC limitations. Specifically, we present the most important features of 4G LTE and 4G LTE Advanced organized in different categories and their contribution in the deployment of MCC applications. Moreover we discuss the major challenges that arise from the – 4G Cellular Network Operators profit for adding computing power to radio access networks such as Energy Efficiency, Mobility, Security Protocol Design, and Radio allocation/ usage - and we present comprehensive comparative analysis of proposed algorithms regarding the improvement of performance and efficiency of 4G LTE/LTE Advanced cellular net!works.

    Other authors

Courses

  • Advansed Digital Communications

    EE5511

  • Advansed Mobile Systems

    EE5512

  • Combined Digital Electronics

    -

  • Compilers

    -

  • Computer Architecture

    -

  • Computer Network Design

    -

  • Computer Networks

    -

  • Computers and Society

    -

  • Cryptology

    -

  • DSP for Communications

    EE5555

  • Data Structures

    -

  • Databases

    -

  • Design of Virtual Networks

    -

  • Digital Signal Processing

    -

  • Dissertation

    EE5500

  • Dissertation

    -

  • Distributed Systems

    -

  • English Terminology I

    -

  • English Terminology II

    -

  • Graduates Seminar

    -

  • High Speed ​​Networks

    -

  • Internet Programming

    -

  • Linear Algebra

    -

  • Management Information Systems

    -

  • Microprocessors - Microcontrollers

    -

  • Multimedia Technologies

    -

  • Numerical Analysis I

    -

  • Numerical Analysis II

    -

  • Operating Systems

    -

  • Probabilities - Statistics

    -

  • Programming I

    -

  • Programming II

    -

  • Project Management

    EE5508

  • RF & Optical Communications

    EE5550

  • Real-Time Web Applications

    -

  • Security of Computer Systems

    -

  • Sequential Digital Electronics

    -

  • Software Engineering

    -

  • Telecommunications

    -

  • Web Technologies

    -

  • Wireless Communications Security

    EE5516

  • Wireless Communications Workshop

    EE5517

  • Wireless Network Technologies

    EE5515

Projects

  • Haptic Project for colour recognition by blind people

    - Present

    In this research, we have implemented a computer program thanks to the XML language for sensing by using haptic/tactile devices of the difference in image color depth. By using Bump Map and tools such as Autodesk's 3D Studio Max, Adobe Photoshop and Adobe Illustrator, we were able to get the desired result. The haptic devices used for the experiments were the PHANTOM Touch and the PHANTOM OImni R of 3D Systems. The programs which were installed and configured properly so as to model the…

    In this research, we have implemented a computer program thanks to the XML language for sensing by using haptic/tactile devices of the difference in image color depth. By using Bump Map and tools such as Autodesk's 3D Studio Max, Adobe Photoshop and Adobe Illustrator, we were able to get the desired result. The haptic devices used for the experiments were the PHANTOM Touch and the PHANTOM OImni R of 3D Systems. The programs which were installed and configured properly so as to model the surfaces, run the experiments, and finally achieve the desired goal are H3D Api, Geomagic_OpenHaptics and OpenHaptics_Developer_Edition. The purpose of this project was to feel different textures, shapes and objects in the images, by using a haptic device. The initial goal was to compile “from scratch” (from beginning) so as to display images on the screen and interact with them through the haptic device.

    Other creators
  • Collection, Processing, and transfering of e-Health Big Data in real time via Internet of Things

    - Present

    The aim of the research proposal is to analyze the Internet of Things, Big Data and Cloud Computing technologies in order to solve the various issues faced by the health sector in relation to these technologies.
    The purpose of the research proposal is to collect real-time medical data (e-health Big Data). The collection will be carried out by sensors and actuators, which will be worn in patients with wearable devices suffering from various conditions. Then they are transferred (in real time)…

    The aim of the research proposal is to analyze the Internet of Things, Big Data and Cloud Computing technologies in order to solve the various issues faced by the health sector in relation to these technologies.
    The purpose of the research proposal is to collect real-time medical data (e-health Big Data). The collection will be carried out by sensors and actuators, which will be worn in patients with wearable devices suffering from various conditions. Then they are transferred (in real time) through our network to a Cloud Server. Additionally, they will be processed in Cloud Computing where they will be analyzed to make sense. From the analysis of these data will be the mining of knowledge. Finally, in order to address the various health problems, we will transfer the analyzed health data (in real time) to smartphones, tablets, PDAs, laptops, and so on) of the responsible persons (doctors, other family members, etc.).
    Additionally, in our research we will also deal with the safety of medical data, which are personal data and must be protected. That is why we will apply innovative methods to codify them. We will also develop and implement a communication protocol that will provide secure transmission of health data, as well as provide encryption using cryptographic algorithms that we will process.

    Other creators
  • Mobile Cloud Computing in 4G Networks (LTE)

    The Mobile Cloud Computing (MCC) relates to a substructure, wherein both data storage and data processing occur outside the mobile device. The 3GPP Long Term Evolution (LTE) is the name given to the new standard developed by 3GPP to meet future market demands. Today, the LTE / LTE Advanced is the next step in the evolution of 3G systems and its goal is to provide quality, similar to the current technology of wired networks. In this paper, we present a survey of the 4G LTE and 4G LTE Advanced…

    The Mobile Cloud Computing (MCC) relates to a substructure, wherein both data storage and data processing occur outside the mobile device. The 3GPP Long Term Evolution (LTE) is the name given to the new standard developed by 3GPP to meet future market demands. Today, the LTE / LTE Advanced is the next step in the evolution of 3G systems and its goal is to provide quality, similar to the current technology of wired networks. In this paper, we present a survey of the 4G LTE and 4G LTE Advanced telecommunication standards focusing on strengthening existing restrictions of MCC. Specifically, we present the most important features of 4G LTE and 4G LTE Advanced, as organized in different categories and their contribution to the development of the MCC applications. Also parousizoume major challenges arising from the 4G Cellular Network Operators Earnings for adding computing power radio frequency networks such as Energy Efficiency, Mobility, Security Protocol Design and Distribution / Use of Radio Frequencies, and we present a comprehensive comparative analysis of the proposed algorithms in improving the performance and effectiveness of the technology 4G LTE / LTE Advanced Cellular Networks.

    See project
  • Smart Interconnected Interactive Classroom

    -

    In the context of this proposal, we suggest the creation of a specialized pedagogical augmented - virtual reality laboratory. In this workshop, there will be a plethora of educational tools/experiments that will use the augmented virtual reality to maximize the learning outcomes. Knowledge will not only be acquired through the traditional teacher-centered way of teaching but through the experiential learning. Primary role in this experiential learning will be given to the sense of touch…

    In the context of this proposal, we suggest the creation of a specialized pedagogical augmented - virtual reality laboratory. In this workshop, there will be a plethora of educational tools/experiments that will use the augmented virtual reality to maximize the learning outcomes. Knowledge will not only be acquired through the traditional teacher-centered way of teaching but through the experiential learning. Primary role in this experiential learning will be given to the sense of touch alongside the sense of hearing and vision. In addition to the physical presence in the laboratory, the student will be able to participate in the laboratory experiments from the Internet. Schools of primary and secondary education will be able to connect to the augmented reality lab via the Internet from their school's computer labs with the help of their teachers and the school's IT teacher. This lab will also be used by people with special needs. The University of Macedonia, since it hosts Postgraduate Programs specializing in Lifelong Learning and Special Needs Education, will be able to use this laboratory to help its students to deepen research into special education. To this end, we propose the creation of a classroom with twenty augmented reality workstations where each station will contain sensors for recording the student's senses and tactile devices for student interaction with the educational material.

    Other creators
  • Communications Systems. Speciality: "Algorithms for Big Data in Telecommunications and Cloud Computing"

    -

    The subject of my doctoral dissertation is the scientific field of Communication Systems and more specifically of the Big Data and Cloud Computing technologies that are related and developed on it. Hence, it resulting the title of my doctoral research, which is "Big Data and Algorithms for Big Data in Telecommunications and Cloud Computing". As can be deduced directly from the title, my doctoral research is mainly related to the study of the management, analysis and transfer of Large Scale Data…

    The subject of my doctoral dissertation is the scientific field of Communication Systems and more specifically of the Big Data and Cloud Computing technologies that are related and developed on it. Hence, it resulting the title of my doctoral research, which is "Big Data and Algorithms for Big Data in Telecommunications and Cloud Computing". As can be deduced directly from the title, my doctoral research is mainly related to the study of the management, analysis and transfer of Large Scale Data in a Cloud Computing environment. This field of research is one of the most up-to-date and special interest fields of the modern era, as the tendency to use both data in general and large-scale data is increasingly being created, especially in an environment outside the user's computer system which is offered through Computational Cloud technology.
    In this dissertation the aim is to analyze the basic principles, methods and algorithms of the Large Scale Data and the Computational Flood, as well as the related technologies in all their possible research implications. Particular emphasis will be placed on the key features of these technologies, focusing on the security and protection issues of the two technologies related to data management, analysis and transfer. In addition, through this PhD research, an attempt will be made to combine the functionality of Big Data and Cloud Computing technologies to examine their "common" features in order to discover the benefits of integrating them into security, protection and privacy in managing, analyzing and transferring data. Thus, an effort will be made to propose new innovative network architecture models that offer a safer and more energy-efficient environment, as well as new innovative methods and algorithms for encrypting and managing Big Data in a Cloud Computing environment through the completion of my research activity.

  • Implementation of Enhanced Reality System, thematic guidance and tactile interactivity in thematic Museums using new technologies (Augmented Interactive Museum)

    -

    The main objective of the present research proposal is to financially support the creation of new services of enhanced guidance and automated visitor guided tour as well as the creation of interactive services of voice guidance and interaction of the Museum with the visitor where this is feasible. In addition, visitors will be able to interact tactically with museum exhibits, which will promote visitor exposure and help specific sections of the population with vision problems or motor problems…

    The main objective of the present research proposal is to financially support the creation of new services of enhanced guidance and automated visitor guided tour as well as the creation of interactive services of voice guidance and interaction of the Museum with the visitor where this is feasible. In addition, visitors will be able to interact tactically with museum exhibits, which will promote visitor exposure and help specific sections of the population with vision problems or motor problems to be able to interact tactically with touch sensitive exhibits, and tour the scattered museums-exhibits-monuments. The pilot application of the proposal will be tested on three thematic axes of the 17th-18th century at the exhibits of the region of Ioannina. In summary, the project will provide an appropriate infrastructure for thematic guidance and interactivity of the visitor using new technologies that will ensure a smooth flow of events and a comprehensive presentation of the events of the 17th-18th century located scattered in the region of Ioannina.

    Other creators
  • New challenges for novel telecommunication network models based on integration scearios of Cloud Computing and Internet of Things with Big Data with the effort of Compressive Sensing

    -

    The purpose of this research program is to create original results and to promote and disseminate specific scientific results. It is therefore necessary that the research results that will emerge will be presented at international conferences organized by scientific associations recognized by the wider research community.

    Other creators
  • Importation the teaching of Information Technology in Education

    -

    Το μάθημα των Ηλεκτρονικών Υπολογιστών είναι πλέον ένα από τα σημαντικότερα μαθήματα στο χώρο της εκπαίδευσης, καθώς στους κόλπους του αναπτύσσονται συνεχώς ειδικότερες τεχνολογίες αιχμής που αφορούν τόσο την καθημερινότητά μας όσο και την εξέλιξη και ανάπτυξη των υπόλοιπων κλάδων.
    Η παρούσα πτυχιακή εργασία με θέμα «Εισαγωγή του μαθήματος Ηλεκτρονικών Υπολογιστών στην εκπαίδευση» πραγματεύεται τον ρόλο του μαθήματος Ηλεκτρονικών Υπολογιστών καθώς και όλων των μαθημάτων του κλάδου της…

    Το μάθημα των Ηλεκτρονικών Υπολογιστών είναι πλέον ένα από τα σημαντικότερα μαθήματα στο χώρο της εκπαίδευσης, καθώς στους κόλπους του αναπτύσσονται συνεχώς ειδικότερες τεχνολογίες αιχμής που αφορούν τόσο την καθημερινότητά μας όσο και την εξέλιξη και ανάπτυξη των υπόλοιπων κλάδων.
    Η παρούσα πτυχιακή εργασία με θέμα «Εισαγωγή του μαθήματος Ηλεκτρονικών Υπολογιστών στην εκπαίδευση» πραγματεύεται τον ρόλο του μαθήματος Ηλεκτρονικών Υπολογιστών καθώς και όλων των μαθημάτων του κλάδου της Πληροφορικής που υπάρχουν στην δευτεροβάθμια εκπαίδευση, αλλά και τις μεθόδους διδασκαλίας τους καθώς και τους διδακτικούς τους στόχους.
    Η υλοποίηση της παρούσας εργασίας έγινε έπειτα από μελέτη σχετικών άρθρων που αφορούν τον κλάδο της πληροφορικής και της εκπαίδευσης, αλλά και τις μεθόδους διδασκαλίας για τα μαθήματα του κλάδου της πληροφορικής που υπάρχουν στο σημερινό πρόγραμμα μαθημάτων όπως και τους διδακτικούς τους στόχους. Επίσης, μελετήθηκαν και διάφορα σχετικά συγγράμματα για να μπορέσει να έρθει εις πέρας η παρούσα πτυχιακή εργασία, τα οποία και πάλι αφορούν τόσο τον τομέα της εκπαίδευσης γενικότερα όσο και τον τομέα της πληροφορικής στην εκπαίδευση ειδικότερα.

  • WiMAX: From Foundations to Applications

    -

    This dissertation is to exploit the opportunities presented by the wireless network of WiMAX, and in particular the possibility that it may serve to us. Historically, mobile WiMAX was developed as a fixed wireless broadband access technology. WiMAX applications are relatively new and there seems to be a lot of scope for further consideration. Deployment of WiMAX has been uneven across the world let alone the European Union. Even more so in Greece where WiMAX has only been deployed in a dozen or…

    This dissertation is to exploit the opportunities presented by the wireless network of WiMAX, and in particular the possibility that it may serve to us. Historically, mobile WiMAX was developed as a fixed wireless broadband access technology. WiMAX applications are relatively new and there seems to be a lot of scope for further consideration. Deployment of WiMAX has been uneven across the world let alone the European Union. Even more so in Greece where WiMAX has only been deployed in a dozen or so main cities and the take up has been sporadic to say the least. One major obstacle to the uneven development of WiMAX is the lack of appropriate investigations that have been made on this and the appropriate facilities that needed.

  • Developing of an e-learning applications entitled "Multimedia Technology"

    -

    The multimedia technology is one of the most important in the field of Information Technology, since within the constantly developed specific advanced technologies transformed into new products and consequently new experiences for consumers and users.
    This dissertation on the subject "Development of e-learning entitled Multimedia Technology" discusses the creation of a methodology for implementing e-learning for the course Multimedia Technology, Department of Informatics and Computer…

    The multimedia technology is one of the most important in the field of Information Technology, since within the constantly developed specific advanced technologies transformed into new products and consequently new experiences for consumers and users.
    This dissertation on the subject "Development of e-learning entitled Multimedia Technology" discusses the creation of a methodology for implementing e-learning for the course Multimedia Technology, Department of Informatics and Computer Technology Annex of Kastoria, TEI of Western Macedonia.
    The implementation of this dissertation made after studying some applications of authoring multimedia content from which finally I chose the application Toolbook Instructor 9.5, to implement the practical part of my dissertation. Also, I studied the slides of the course "Multimedia Technology", of the Seventh semester, of the Department of Informatics and Computer Technology, TEI of Western Macedonia, which was the main source of data that I used, as well as the book "Multimedia Technology" by Tziola Publications, that was my main guide regard to the implementation of the authorship part of the dissertation.

Honors & Awards

  • Top 2% Scientists in the world (prepared by Stanford University USA)

    -

    According to the research findings of “Updated science-wide author databases of standardized citation indicators'', by Stanford University, USA, I have been included in the Top 2% list of Scientists in the world of main subfield discipline, among those that have published at least five papers (https://lnkd.in/dZrmuqWy). Furthermore, I have been included in the list of Top 800 scientists (Top 0.2%) in the world list for the fields of Distributed Computing and Information Systems, and also in the…

    According to the research findings of “Updated science-wide author databases of standardized citation indicators'', by Stanford University, USA, I have been included in the Top 2% list of Scientists in the world of main subfield discipline, among those that have published at least five papers (https://lnkd.in/dZrmuqWy). Furthermore, I have been included in the list of Top 800 scientists (Top 0.2%) in the world list for the fields of Distributed Computing and Information Systems, and also in the list of Top 800 Scientists (Top 0.8%) for the field of Information & Communication Technologies. My rank is 122 in the total of Top 800 Scientists in these fields.

  • Top 2% Scientists in the world (prepared by Stanford University USA)

    -

    According to the research findings of “Updated science-wide author databases of standardized citation indicators'', by Stanford University, USA, I have been included in the Top 2% list of Scientists in the world of main subfield discipline, among those that have published at least five papers (https://lnkd.in/gsuZnKrn). Furthermore, I have been included in the list of Top 800 scientists (Top 0.2%) in the world list for the fields of Distributed Computing and Information Systems, and also in the…

    According to the research findings of “Updated science-wide author databases of standardized citation indicators'', by Stanford University, USA, I have been included in the Top 2% list of Scientists in the world of main subfield discipline, among those that have published at least five papers (https://lnkd.in/gsuZnKrn). Furthermore, I have been included in the list of Top 800 scientists (Top 0.2%) in the world list for the fields of Distributed Computing and Information Systems, and also in the list of Top 800 Scientists (Top 0.8%) for the field of Information & Communication Technologies. My rank is 122 in the total of Top 800 Scientists in these fields.

  • Top 2% Scientists in the world (prepared by Stanford University USA)

    Stanford University USA

    According to the research findings of “Updated science-wide author databases of standardized citation indicators'', by Stanford University, USA, I have been included in the Top 2% list of Scientists in the world of main subfield discipline, among those that have published at least five papers (https://elsevier.digitalcommonsdata.com/datasets/btchxktzyw/3). Furthermore, I have been included in the list of Top 800 scientists (Top 0.2%) in the world list for the fields of Distributed Computing and…

    According to the research findings of “Updated science-wide author databases of standardized citation indicators'', by Stanford University, USA, I have been included in the Top 2% list of Scientists in the world of main subfield discipline, among those that have published at least five papers (https://elsevier.digitalcommonsdata.com/datasets/btchxktzyw/3). Furthermore, I have been included in the list of Top 800 scientists (Top 0.2%) in the world list for the fields of Distributed Computing and Information Systems, and also in the list of Top 800 Scientists (Top 0.8%) for the field of Information & Communication Technologies. My rank is 122 in the total of Top 800 Scientists in these fields.

  • Top 2% Scientists in the world (prepared by Stanford University USA)

    Stanford University, USA

    According to the research findings of “Updated science-wide author databases of standardized citation indicators'', by Stanford University, USA, I have been included in the Top 2% list of Scientists in the world of main subfield discipline, among those that have published at least five papers (https://lnkd.in/dhSwdgB). Furthermore, I have been included in the list of Top 800 scientists (Top 0.2%) in the world list for the fields of Distributed Computing and Information Systems, and also in the…

    According to the research findings of “Updated science-wide author databases of standardized citation indicators'', by Stanford University, USA, I have been included in the Top 2% list of Scientists in the world of main subfield discipline, among those that have published at least five papers (https://lnkd.in/dhSwdgB). Furthermore, I have been included in the list of Top 800 scientists (Top 0.2%) in the world list for the fields of Distributed Computing and Information Systems, and also in the list of Top 800 Scientists (Top 0.8%) for the field of Information & Communication Technologies. My rank is 122 in the total of Top 800 Scientists in these fields.

  • Αward for best Doctoral Student Work

    IEEE CBI 2017

    Αward for best Doctoral Student Work presented to Christos Stergiou for his paper titled "Algorithms for Big Data in Advanced Communication Systems and Cloud Computing" in 19th IEEE Conference on Business Informatics, Thessaloniki, Greece, 24-26 July 2017.
    Award: http://www.mai.uom.gr/frontend/article.php?aid=889&cid=3&t=Wres-leitourgias-Grammateias_31/7/2017
    Link: http://www.mai.uom.gr/files4users/files/VARIOUS/award_cbi2017.pdf

  • Research award

    University of Macedonia

    Research awards of the University of Macedonia for the years 2016, 2017, 2018, 2019.

  • Top 10 most cited papers of the Journal Future Generation Computer Systems

    Elsevier's Future Generation Computer Systems

    Highly-cited work “Secure integration of IoT and Cloud Computing” and "Efficient IoT-based sensor BIG Data collection-processing and analysis in Smart Buildings", published in the journal “Future Generation Computer Systems”' of Elsevier, is in the list of the 10 most cited papers of this journal.
    https://www.journals.elsevier.com/future-generation-computer-systems/most-cited-articles

Languages

  • Greek

    Native or bilingual proficiency

  • English

    Professional working proficiency

More activity by Christos

View Christos’ full profile

  • See who you know in common
  • Get introduced
  • Contact Christos directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Christos Stergiou in Greece

Add new skills with these courses