Ioannis Tsimperidis

ORCID: 0000-0003-0682-1750
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Biometric Identification and Security
  • Digital Communication and Language
  • Silicon Nanostructures and Photoluminescence
  • Semiconductor Quantum Structures and Devices
  • Semiconductor materials and devices
  • Infrastructure Maintenance and Monitoring
  • Authorship Attribution and Profiling
  • Industrial Vision Systems and Defect Detection
  • Emotion and Mood Recognition
  • Quantum and electron transport phenomena
  • Terahertz technology and applications
  • Semiconductor materials and interfaces
  • Thermography and Photoacoustic Techniques
  • Advanced Malware Detection Techniques
  • Wikis in Education and Collaboration
  • Innovative Human-Technology Interaction
  • Educational Research and Pedagogy
  • Open Education and E-Learning
  • Nanowire Synthesis and Applications
  • Digital and Cyber Forensics
  • Urban Heat Island Mitigation
  • Chalcogenide Semiconductor Thin Films
  • Natural Language Processing Techniques
  • AI and Multimedia in Education

Democritus University of Thrace
2002-2024

International Hellenic University
2021-2024

University of Amsterdam
1993-1998

VSL Dutch Metrology Institute
1995

Abstract Recently, deep learning algorithms have achieved great accuracies in multiple computer vision tasks by using considerable amounts of annotated data. In the case marble surface crack detection, formation such a dataset is challenging. Currently, there are limited crack-related datasets, obstructing development robust inspection models for automated industrial quality control. To resolve this problem, we propose generative Artificial Intelligence (AI) approach, reporting first...

10.1088/2631-8695/adaca7 article EN cc-by Engineering Research Express 2025-01-21

The representation of the physical world is an issue that concerns scientific community studying computer vision, more and more. Recently, research has focused on modern techniques methods photogrammetry stereoscopy with aim reconstructing three-dimensional realistic models high accuracy metric information in a short time. In order to obtain data at relatively low cost, various tools have been developed, such as depth cameras. RGB-D cameras are novel sensing systems capture RGB images along...

10.3390/digital2030022 article EN cc-by Digital 2022-08-13

Cracks can occur on different surfaces such as buildings, roads, aircrafts, etc. The manual inspection of cracks is time-consuming and prone to human error. Machine vision has been used for decades detect defects in materials production lines. However, the detection or segmentation a randomly textured surface, marble, not sufficiently investigated. This work provides an up-to-date systematic exhaustive study marble crack with color images based deep learning (DL) techniques. authors...

10.3390/electronics11203289 article EN Electronics 2022-10-12

Pre-school and first years of primary school provide the basis for future learning in STEM, teachers’ views-confidence are important effective classroom practices. This study investigated views confidence implementing STEM education early years. The participants were 140 Greek teachers who completed an online 35-item questionnaire. Teachers expressed positive-strong perceptions Over 80% sample agreement that they feel comfortable-confident when facilitate inquiry-based activities within...

10.30935/jdet/12971 article EN cc-by Journal of Digital Educational Technology 2023-02-20

In Er-doped silicon we have found direct evidence for the formation of Er-related intermediate state that is a precursor final $4f$-electron excited responsible 0.8 eV luminescence. Time-resolved photoluminescence following band-gap illumination shows disruption this center by THz pulse from free-electron laser. The decay could be directly monitored in double-beam experiment and lifetime approximately 100 \ensuremath{\mu}s has been found. way most characteristic step excitation mechanism Er...

10.1103/physrevlett.81.4748 article EN Physical Review Letters 1998-11-23

Over the past decade, keystroke-based pattern recognition techniques, as a forensic tool for behavioral biometrics, have gained increasing attention. Although number of machine learning-based approaches been proposed, they are limited in terms their capability to recognize and profile set an individual's characteristics. In addition, up today, focus was primarily gender age, which seem be more appropriate commercial applications (such developing software), leaving out from research other...

10.1109/tcyb.2018.2869658 article EN IEEE Transactions on Cybernetics 2018-09-28

In this paper an incident response approach is proposed for handling detections of authentication failures in systems that employ dynamic biometric and more specifically keystroke user recognition. The main component the a multi layer perceptron focusing on age classification user. Empirical findings show classifier can detect subject with probability far from uniform random distribution, making method suitable providing supporting yet circumstantial evidence during e-discovery.

10.4018/ijdcf.2017010101 article EN International Journal of Digital Crime and Forensics 2016-12-21

Keystroke dynamics are used to authenticate users, reveal some of their inherent or acquired characteristics and assess mental physical states. The most common features utilized the time intervals that keys remain pressed required use two consecutive keys. This paper examines which these important how utilization can lead better classification results. To achieve this, an existing dataset consisting 387 logfiles is used, five classifiers exploited users classified by gender age. results,...

10.3390/electronics10070835 article EN Electronics 2021-03-31

Understanding the distinct characteristics of unidentified Internet users is helpful in various contexts, including digital forensics, targeted advertising, and user interaction with services systems. Keystroke dynamics (KD) enables analysis data derived from a user’s typing behaviour on keyboard as one approach to obtain such information. This study conducted experiments developed dataset that recorded samples five different mother tongues determine users’ tongue. Based only few KD features...

10.3390/telecom4030021 article EN cc-by Telecom 2023-07-03

The design of a single-electron AND gate with three inputs is presented for the first time in this paper. operation has been simulated using well-known circuit simulator. Furthermore, stability its studied by constructing free-energy history diagram, and analyzing corresponding three-dimensional plot, Monte Carlo simulation. Simulation verified correct stable gate.

10.1016/s0026-2692(01)00151-3 article EN Microelectronics Journal 2002-03-01

Purpose – The purpose of this paper is to investigate the feasibility identifying gender an author by measuring keystroke duration when typing a message. Design/methodology/approach Three classifiers were constructed and tested. authors empirically evaluated effectiveness using empirical data. used primary data as well publicly available dataset containing keystrokes from different language validate independence assumption. Findings results indicate that it possible identify analyzing...

10.1108/ics-05-2014-0032 article EN Information and Computer Security 2015-06-10

In this paper we investigate the potential of leveraging keystroke analysis - primarily used in user authentication to profiling and identification for forensic investigations. As such, forensics approach proposed will support through integration with offender domain. Early findings show that it was possible identify significant probability conditions means a is performing typing operations.

10.1145/2490257.2490272 article EN 2013-08-13

One of the causes several problems on internet, such as financial fraud, cyber-bullying, and seduction minors, is complete anonymity that a malicious user can maintain. Most methods have been proposed to remove this are either intrusive, or violate privacy, expensive. This paper proposes recognition certain characteristics an unknown through keystroke dynamics, which way person typing. The evaluation method consists three stages: acquisition dynamics data from 118 volunteers during daily use...

10.4018/ijt.2020070103 article EN International Journal of Technoethics 2020-07-01

Summary Information manipulation and cognitive load imposition make the production of deceptive narratives difficult. But little is known about deception, how its mechanisms may help distinguish truthful from deceitful narratives. This study focuses on measurement keystroke dynamics while typing eyewitness testimonies after a baseline assessment. While their narrative, some participants would undergo an auditory load. Results show that liars typed story slower, in less time than when...

10.1002/acp.3743 article EN Applied Cognitive Psychology 2020-09-20

Abstract A single-electron universal Control–Control-Not gate (CCN gate) is presented in this paper. Bits of information are represented by the presence or absence single-electrons at conducting islands. The logic operation CCN as well its XOR, AND, NAND and NOT verified using simulation. stability analysed a Monte Carlo method. Stability analysis free energy diagrams plots verify correct stable gate.

10.1016/j.mejo.2003.12.002 article EN Microelectronics Journal 2004-01-20

Research is constantly turning towards the development of image-based inspection tools that leverage deep learning models to automate surface crack detection in materials. Yet, most efforts involve color imaging which may lead poor models' performance different lighting variations. Thermal images are more constant changes lighting, however, lack crispness details. In this work, thermal-RGB image fusion techniques investigated for accurate marble detection. The proposed method uses a Feature...

10.1109/aiiot58121.2023.10174288 article EN 2022 IEEE World AI IoT Congress (AIIoT) 2023-06-07

The rapid development of information and communication technologies the widespread use Internet has made it imperative to implement advanced user authentication methods based on analysis behavioural biometric data. In contrast traditional techniques, such as simple passwords, these new face challenge authenticating users at more complex levels, even after initial verification. This is particularly important helps address risks possibility forgery disclosure personal unauthorised individuals....

10.3390/eng4040154 article EN cc-by Eng—Advances in Engineering 2023-10-25

Abstract Mobile technology is used by undergraduate students for educational purposes, it supported students’ learning during the pandemic, while mobile may have potential benefits and barriers. This study investigates Greek perceptions on technology-learning barriers in their academic studies. topic of international interest still underexplored Greece. An online questionnaire was completed 212 students, this descriptive-inferential. Students’ regarding major barriers, reveal both external...

10.1007/s44217-023-00068-5 article EN cc-by Discover Education 2023-11-17

Abstract The use of Web-based technologies in education and ways they can improve teaching learning have been the focus interest educational community during recent years. In this regard, wikis are one most promising technologies. Many research studies presented that integrate settings. abundance corresponding work creates need for a systematic survey. survey on content analysis is used to record compare conclusions 110 empirical specific were published from 2014 2021. conducted search was...

10.1007/s44217-024-00150-6 article EN cc-by Discover Education 2024-05-26

Keystroke dynamics is the field of computer science that exploits data derived from way users type. It has been used in authentication systems, identification user characteristics for forensic or commercial purposes, and to identify physical mental state purposes serve human–computer interaction. Studies keystroke have datasets created volunteers recording fixed-text typing free-text typing. Unfortunately, there are not enough available on Internet, especially category, because they contain...

10.3390/info15090511 article EN cc-by Information 2024-08-23
Coming Soon ...