- Complex Network Analysis Techniques
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Data Mining Algorithms and Applications
- Algorithms and Data Compression
- Spam and Phishing Detection
- Usability and User Interface Design
- Advanced Database Systems and Queries
- Terrorism, Counterterrorism, and Political Violence
- Time Series Analysis and Forecasting
- Web Data Mining and Analysis
- Internet Traffic Analysis and Secure E-voting
- Anomaly Detection Techniques and Applications
- Data Visualization and Analytics
- Multimedia Communication and Technology
- Service-Oriented Architecture and Web Services
- Power Systems and Technologies
- Data Management and Algorithms
- Opinion Dynamics and Social Influence
- Knowledge Management and Sharing
- Recommender Systems and Techniques
- Social Media and Politics
- Lightning and Electromagnetic Phenomena
- Imbalanced Data Classification Techniques
- Data Stream Mining Techniques
Hellenic Air Force
2016-2025
United States Air Force Academy
2011-2023
Earthquake Planning and Protection Organization
2021
West Virginia University
2018
American Jewish Committee
2018
Hellenic Military Academy
2018
University of Calgary
2016-2017
Hellenic American University
2008-2014
School of Pedagogical and Technological Education
2011
Foundation for Research and Technology Hellas
2003-2005
Cloud Computing is evolving as a key technology for sharing resources. Grid Computing, distributed computing, parallel computing and virtualization technologies define the shape of new era. Traditional distance learning systems lack reusability, portability interoperability. This paper sees cloud ecosystem opportunity in designing educational platforms where actors can reuse resources handled by operating systems. To enhance objects interoperability not only API standards should be advocated...
This study addresses the need for scenario-specific drone simulators to enhance research, education, pilot training, and performance evaluation across diverse mission contexts. A gamified simulator was developed joint master's degree program "Security Defence" between Open University of Cyprus (OUC) Hellenic Air Force Academy (HAFA), with a focus on Search Rescue training planning. The balances interface design, physics accuracy, environmental realism support specialized professional...
Suffix arrays form a powerful data structure for pattern detection and matching. In previous work, we presented novel algorithm (COV) which is the only that allows of all repeated patterns in time series by using actual suffix array. However, requirements storing strings even on external media makes use impossible very large series. We have already proved concept Longest Expected Repeated Pattern (LERP) suffices to be stored linear capacity O(n) media. The LERP has analogous complexity, thus...
Abstract Background The first half of 2020 has been marked as the era COVID-19 pandemic which affected world globally in almost every aspect daily life from societal to economical. To prevent spread COVID-19, countries have implemented diverse policies regarding Non-Pharmaceutical Intervention (NPI) measures. This is because stage had limited knowledge about virus and its contagiousness. Also, there was no effective medication or vaccines. paper studies effectiveness measures against deaths...
Abstract—The paper presents a suspicious email detection model which incorporates enhanced feature selection. In the we proposed use of selection strategies along with classification technique for terrorists detection. The presented focuses on evaluation machine learning algorithms such as decision tree (ID3), logistic regression, Nai ve Bayes (NB), and Support Vector Machine (SVM) detecting emails containing content. literature, various achieved good accuracy desired task. However,...
The appropriate modelling of metal–oxide (MO) surge arresters and the determination equivalent circuit parameters are significant issues, since efficient representation dynamic behaviour by models improves quality reliability lightning performance studies. In current work, an optimisation algorithm for evaluation arrester is developed. Optimum model parameter values selected, minimising error between simulated peak residual voltage value this given manufacturer. proposed methodology applied...
Energy consumption predictions are essential and required in the studies of capacity expansion, energy supply strategy, capital investment, revenue analysis market research management. In recent years artificial neural networks (ANN) have attracted much attention many interesting ANN applications been reported power system areas, due to their computational speed, ability handle complex non-linear functions, robustness great efficiency, even cases where full information for studied problem is...
Notice of Violation IEEE Publication Principles<br><br>"Detecting New Trends in Terrorist Networks,"<br> by Uffe Kock Wiil, Nasrullah Memon, and Panagiotis Karampelas<br> the Proceedings 2010 International Conference on Advances Social Networks<br> Analysis Mining (ASONAM), August 2010, pp.435-440<br><br> After careful considered review content authorship this paper a duly constituted expert committee, has been found to be violation IEEE's Principles. <br><br> This copied portions text from...
The signal-to-noise ratio (SNR) is one of the most significant measures performance sigma-delta modulators. An approximate formula for calculation an arbitrary modulator (SDM) has been proposed. Our approach computation does not require modeling and simulation. proposed compared with SNR calculations based on output bitstream obtained by simulations, reasons small discrepancies are explained. suitable fast precise computation. It very useful in design stage, where multiple estimates required.
One of the most frequent causes failure overhead high- and medium-voltage transmission distribution lines is contamination insulators with diverse substances such as saline industrial substances. The mechanically degrades affects electrical characteristics insulating material, leading to flashovers. Periodic maintenance can reduce or even prevent outages caused by contamination. scheduling planned based either on measurements, which are quite expensive time consuming processes experience, a...
This research paper focuses on data mining in time series and its applications financial data. Data-mining attempts to analyze extract valuable information about pattern periodicity, which might be concealed by substantial amounts of unformatted, random information. Such information, however, is great importance as it can used forecast future behavior. In this paper, a new methodology introduced aiming utilize Suffix Arrays instead the commonly structure Trees. Although Arrays, normally,...
In order to evaluate cadets' knowledge on ethics and laws of war, it is extremely important plan, design develop an interactive, role-playing war game simulation. The main objective such a simulation facilitate future officers' education training the subjects International Humanitarian Law, but also provide them-through simulated environment-with analytic tools in understand why so difficult apply Rules Engagement battlefields how effectively face possible dilemmas that could arise real...
In this paper, a new Cluster based Classification Model (CCM) for suspicious email detection and other text classification tasks, is presented. Comparative experiments of the proposed model against traditional models boosting algorithm are also discussed. Experimental results show that CCM outperforms as well task on terrorism domain dataset topic categorization Reuters-21578 20 Newsgroups datasets. The overall finding applying cluster approach to tasks simplifies at same time increases accuracy.
The current paper presents the basic principles and status of E-learning through prism globalization information society. Additionally, a conceptual approach is being presented regarding implementation quick response codes technology in E-learning. case studies QRpedia DBpedia are vessel for innovative use QR education.