var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/service/mendeley/c69aa657-d754-373c-91b7-64154b7d5d91?jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/service/mendeley/c69aa657-d754-373c-91b7-64154b7d5d91?jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/service/mendeley/c69aa657-d754-373c-91b7-64154b7d5d91?jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoT.\n \n \n \n\n\n \n Deng, X.; Chen, B.; Chen, X.; Pei, X.; Wan, S.; and Goudos, S., K.\n\n\n \n\n\n\n IEEE Transactions on Industrial Informatics, 20(2): 1445-1454. 2024.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoT},\n type = {article},\n year = {2024},\n pages = {1445-1454},\n volume = {20},\n id = {a420b51f-9c22-3e45-a10d-8b1bb76fbb36},\n created = {2023-05-18T08:29:21.620Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-01-24T05:25:22.823Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10128754},\n source_type = {article},\n private_publication = {false},\n abstract = {The Internet of Things (IoT) mainly consists of a large number of Internet-connected devices. The proliferation of untrusted third-party IoT applications has led to an increase in IoT-based malware attacks. In addition, it is infeasible for the IoT devices to support the sophisticated detection systems due to the restricted resources. Edge computing is considered to be promising. It provides solutions to the data security and privacy leakage brought by untrusted third-party IoT applications. In this article, an intelligent trusted and secure edge computing (ITEC) system is proposed for IoT malware detection. In this system, a signature-based preidentification mechanism is built for matching and identifying the malicious behaviors of untrusted third-party IoT applications. A delay strategy is then embedded into the risk detection engine in order to “buy time” for threat analysis and rate-limit the impact of suspicious third-party IoT applications in the system. We conduct extensive experiments to verify the effectiveness of the ITEC system and show that we can achieve accuracies of up to 98.52%.},\n bibtype = {article},\n author = {Deng, Xiaoheng and Chen, Bin and Chen, Xuechen and Pei, Xinjun and Wan, Shaohua and Goudos, Sotirios K},\n doi = {10.1109/TII.2023.3245681},\n journal = {IEEE Transactions on Industrial Informatics},\n number = {2}\n}
\n
\n\n\n
\n The Internet of Things (IoT) mainly consists of a large number of Internet-connected devices. The proliferation of untrusted third-party IoT applications has led to an increase in IoT-based malware attacks. In addition, it is infeasible for the IoT devices to support the sophisticated detection systems due to the restricted resources. Edge computing is considered to be promising. It provides solutions to the data security and privacy leakage brought by untrusted third-party IoT applications. In this article, an intelligent trusted and secure edge computing (ITEC) system is proposed for IoT malware detection. In this system, a signature-based preidentification mechanism is built for matching and identifying the malicious behaviors of untrusted third-party IoT applications. A delay strategy is then embedded into the risk detection engine in order to “buy time” for threat analysis and rate-limit the impact of suspicious third-party IoT applications in the system. We conduct extensive experiments to verify the effectiveness of the ITEC system and show that we can achieve accuracies of up to 98.52%.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Unconventional Array Architectures for Next Generation Wireless Communications.\n \n \n \n \n\n\n \n Anselmi, N.; Goudos, S.; Oliveri, G.; Poli, L.; Rocca, P.; Salucci, M.; and Massa, A.\n\n\n \n\n\n\n Sparse Arrays for Radar, Sonar, and Communications, pages 423-454. IEEE, 2024.\n \n\n\n\n
\n\n\n\n \n \n \"SparseWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2024},\n pages = {423-454},\n websites = {https://ieeexplore.ieee.org/document/10368415},\n publisher = {IEEE},\n id = {05c840b8-fdea-3903-adaa-124b61106250},\n created = {2023-12-22T05:33:37.314Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-12-22T05:33:37.314Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10368415},\n source_type = {inbook},\n private_publication = {false},\n abstract = {Phased arrays have emerged as the most suitable antenna technology for several modern wireless communication applications which require highly flexible and high&#x2010;performing antennas capable of supporting real&#x2010;time adaptive beam reconfiguration, user tracking, and MIMO processing. Achieving these objectives with cost&#x2010;effective phased array layouts is crucial to minimize fabrication and maintenance costs. In recent decades, the need of inexpensive but high&#x2010;performance antenna systems has driven the research towards unconventional array architectures. Accordingly, a wide set of innovative developing design methodologies have been proposed to properly manage the additional degrees of freedoms which are not present in conventional architectures, such as the array element locations in sparse arrays, or the sub&#x2010;array configuration in clustered/tiled arrays. The objective of this Chapter is to review the recent advances and trends in the synthesis of unconventional architectures for wireless applications. Towards this end, the formulation of the associated synthesis problem is discussed, and the theoretical motivations, fundamentals, and applicative guidelines for current state&#x2010;of&#x2010;the&#x2010;art strategies in unconventional phased array synthesis for next generation wireless communications are illustrated.},\n bibtype = {inbook},\n author = {Anselmi, Nicola and Goudos, Sotirios and Oliveri, Giacomo and Poli, Lorenzo and Rocca, Paolo and Salucci, Marco and Massa, Andrea},\n doi = {10.1002/9781394191048.ch14},\n chapter = {Unconventional Array Architectures for Next Generation Wireless Communications},\n title = {Sparse Arrays for Radar, Sonar, and Communications}\n}
\n
\n\n\n
\n Phased arrays have emerged as the most suitable antenna technology for several modern wireless communication applications which require highly flexible and high‐performing antennas capable of supporting real‐time adaptive beam reconfiguration, user tracking, and MIMO processing. Achieving these objectives with cost‐effective phased array layouts is crucial to minimize fabrication and maintenance costs. In recent decades, the need of inexpensive but high‐performance antenna systems has driven the research towards unconventional array architectures. Accordingly, a wide set of innovative developing design methodologies have been proposed to properly manage the additional degrees of freedoms which are not present in conventional architectures, such as the array element locations in sparse arrays, or the sub‐array configuration in clustered/tiled arrays. The objective of this Chapter is to review the recent advances and trends in the synthesis of unconventional architectures for wireless applications. Towards this end, the formulation of the associated synthesis problem is discussed, and the theoretical motivations, fundamentals, and applicative guidelines for current state‐of‐the‐art strategies in unconventional phased array synthesis for next generation wireless communications are illustrated.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Improving DOA Estimation via An Optimal Deep Residual Neural Network Classifier On Uniform Linear Arrays.\n \n \n \n\n\n \n Kassir, H., A.; Kantartzis, N., V.; Lazaridis, P., I.; Sarigiannidis, P.; Goudos, S., K.; Christodoulou, C.; and Zaharis, Z., D.\n\n\n \n\n\n\n IEEE Open Journal of Antennas and Propagation, 5(2): 460-473. 2024.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Improving DOA Estimation via An Optimal Deep Residual Neural Network Classifier On Uniform Linear Arrays},\n type = {article},\n year = {2024},\n keywords = {Correla,Direction-of-arrival estimation,Estimation},\n pages = {460-473},\n volume = {5},\n id = {20f85cb3-000e-34a7-8fc5-7b74c8857c16},\n created = {2024-02-06T05:33:02.320Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-03-26T09:54:46.742Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10421782},\n source_type = {article},\n private_publication = {false},\n abstract = {The main objective of this work is to improve and evaluate the effectiveness of the neural network (NN) architecture in the domain of estimation of direction of arrival (DOA), with an emphasis on a multi-class classification task with grid resolutions of 0.25 and 0.1. Specifically, a comprehensive assessment is performed to determine the competence of a residual NN (ResNet) in predicting the angle of arrival (AOA) of intercepted signals. Such signals are received by a 16-element uniform linear array and are subjected to real-world noise conditions. To this end, the superiority of the ResNet architecture in DOA estimations is substantiated through a comparison analysis with two other highly recognized NNs, namely, the feed-forward NN and the convolutional NN. Numerical results indicate that the ResNet model exhibits notable precision in estimating the AOAs, across various classes within a broad spectrum, along with a rapid temporal response. Finally, it remains consistent and maintains its superior performance even for diverse incoming signals and significantly reduced SNRs.},\n bibtype = {article},\n author = {Kassir, Haya Al and Kantartzis, Nikolaos V and Lazaridis, Pavlos I and Sarigiannidis, Panagiotis and Goudos, Sotirios K and Christodoulou, Christos and Zaharis, Zaharias D},\n doi = {10.1109/OJAP.2024.3362061},\n journal = {IEEE Open Journal of Antennas and Propagation},\n number = {2}\n}
\n
\n\n\n
\n The main objective of this work is to improve and evaluate the effectiveness of the neural network (NN) architecture in the domain of estimation of direction of arrival (DOA), with an emphasis on a multi-class classification task with grid resolutions of 0.25 and 0.1. Specifically, a comprehensive assessment is performed to determine the competence of a residual NN (ResNet) in predicting the angle of arrival (AOA) of intercepted signals. Such signals are received by a 16-element uniform linear array and are subjected to real-world noise conditions. To this end, the superiority of the ResNet architecture in DOA estimations is substantiated through a comparison analysis with two other highly recognized NNs, namely, the feed-forward NN and the convolutional NN. Numerical results indicate that the ResNet model exhibits notable precision in estimating the AOAs, across various classes within a broad spectrum, along with a rapid temporal response. Finally, it remains consistent and maintains its superior performance even for diverse incoming signals and significantly reduced SNRs.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Physics-informed surrogates for electromagnetic dynamics using Transformers and graph neural networks.\n \n \n \n \n\n\n \n Noakoasteen, O.; Christodoulou, C.; Peng, Z.; and Goudos, S., K.\n\n\n \n\n\n\n IET Microwaves, Antennas \\& Propagation, n/a(n/a). 2024.\n \n\n\n\n
\n\n\n\n \n \n \"Physics-informedWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Physics-informed surrogates for electromagnetic dynamics using Transformers and graph neural networks},\n type = {article},\n year = {2024},\n keywords = {electromagnetic wave propagation,finite difference time-domain analysis,neural nets},\n volume = {n/a},\n websites = {https://ietresearch.onlinelibrary.wiley.com/doi/abs/10.1049/mia2.12463},\n id = {5b4cfd1e-032b-34ed-84a2-7fbc394aa0c4},\n created = {2024-02-16T19:48:44.942Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-02-16T19:49:02.737Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {https://doi.org/10.1049/mia2.12463},\n source_type = {article},\n private_publication = {false},\n abstract = {Abstract A novel use case for two data-driven models, namely, a Transformer and a convolutional graph neural network (CGNN) is proposed. The authors propose to use these models for emulating the dynamics of electromagnetic (EM) propagation and scattering. The Transformer translates a past sequence into a future sequence by constructing representations from the past and using it to predict the future, taking all of its own previous predictions as input at each step of prediction. The CGNN updates the current state of attribute vectors of each node by passing it information (messages) from all of its neighbouring nodes. We train these models with FDTD simulations of plane waves propagating and scattering from PEC objects. The authors demonstrate that, within the bounds of computational resources, the Transformer can be utilised as a surrogate for EM dynamics, providing 14× speed-up, while the CGNN can be utilised as a next-frame predictor, providing 9× speed-up. When comparing the accuracy of these two models with the authors’ previously developed Encoder-Recurrent-Decoder (ERD) model, it is observed that the error for both the Transformer and the CGNN remains within the same bound for the ERD model. To the best of the authors’ knowledge, this work is the first to utilise the Transformer as a surrogate for EM dynamics.},\n bibtype = {article},\n author = {Noakoasteen, O and Christodoulou, C and Peng, Z and Goudos, S K},\n doi = {https://doi.org/10.1049/mia2.12463},\n journal = {IET Microwaves, Antennas \\& Propagation},\n number = {n/a}\n}
\n
\n\n\n
\n Abstract A novel use case for two data-driven models, namely, a Transformer and a convolutional graph neural network (CGNN) is proposed. The authors propose to use these models for emulating the dynamics of electromagnetic (EM) propagation and scattering. The Transformer translates a past sequence into a future sequence by constructing representations from the past and using it to predict the future, taking all of its own previous predictions as input at each step of prediction. The CGNN updates the current state of attribute vectors of each node by passing it information (messages) from all of its neighbouring nodes. We train these models with FDTD simulations of plane waves propagating and scattering from PEC objects. The authors demonstrate that, within the bounds of computational resources, the Transformer can be utilised as a surrogate for EM dynamics, providing 14× speed-up, while the CGNN can be utilised as a next-frame predictor, providing 9× speed-up. When comparing the accuracy of these two models with the authors’ previously developed Encoder-Recurrent-Decoder (ERD) model, it is observed that the error for both the Transformer and the CGNN remains within the same bound for the ERD model. To the best of the authors’ knowledge, this work is the first to utilise the Transformer as a surrogate for EM dynamics.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cherry Tree Crown Extraction Using Machine Learning Based on Images from UAVs.\n \n \n \n \n\n\n \n Moysiadis, V.; Siniosoglou, I.; Kokkonis, G.; Argyriou, V.; Lagkas, T.; Goudos, S., K.; and Sarigiannidis, P.\n\n\n \n\n\n\n Agriculture, 14(2). 2024.\n \n\n\n\n
\n\n\n\n \n \n \"CherryWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Cherry Tree Crown Extraction Using Machine Learning Based on Images from UAVs},\n type = {article},\n year = {2024},\n volume = {14},\n websites = {https://www.mdpi.com/2077-0472/14/2/322},\n id = {1900dd7d-bd5f-398a-ac36-0c74dc2d6eb3},\n created = {2024-02-18T20:41:09.160Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-02-18T20:41:09.160Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {agriculture14020322},\n source_type = {article},\n private_publication = {false},\n abstract = {Remote sensing stands out as one of the most widely used operations in the field. In this research area, UAVs offer full coverage of large cultivation areas in a few minutes and provide orthomosaic images with valuable information based on multispectral cameras. Especially for orchards, it is helpful to isolate each tree and then calculate the preferred vegetation indices separately. Thus, tree detection and crown extraction is another important research area in the domain of Smart Farming. In this paper, we propose an innovative tree detection method based on machine learning, designed to isolate each individual tree in an orchard. First, we evaluate the effectiveness of Detectron2 and YOLOv8 object detection algorithms in identifying individual trees and generating corresponding masks. Both algorithms yield satisfactory results in cherry tree detection, with the best F1-Score up to 94.85%. In the second stage, we apply a method based on OTSU thresholding to improve the provided masks and precisely cover the crowns of the detected trees. The proposed method achieves 85.30% on IoU while Detectron2 gives 79.83% and YOLOv8 has 75.36%. Our work uses cherry trees, but it is easy to apply to any other tree species. We believe that our approach will be a key factor in enabling health monitoring for each individual tree.},\n bibtype = {article},\n author = {Moysiadis, Vasileios and Siniosoglou, Ilias and Kokkonis, Georgios and Argyriou, Vasileios and Lagkas, Thomas and Goudos, Sotirios K and Sarigiannidis, Panagiotis},\n doi = {10.3390/agriculture14020322},\n journal = {Agriculture},\n number = {2}\n}
\n
\n\n\n
\n Remote sensing stands out as one of the most widely used operations in the field. In this research area, UAVs offer full coverage of large cultivation areas in a few minutes and provide orthomosaic images with valuable information based on multispectral cameras. Especially for orchards, it is helpful to isolate each tree and then calculate the preferred vegetation indices separately. Thus, tree detection and crown extraction is another important research area in the domain of Smart Farming. In this paper, we propose an innovative tree detection method based on machine learning, designed to isolate each individual tree in an orchard. First, we evaluate the effectiveness of Detectron2 and YOLOv8 object detection algorithms in identifying individual trees and generating corresponding masks. Both algorithms yield satisfactory results in cherry tree detection, with the best F1-Score up to 94.85%. In the second stage, we apply a method based on OTSU thresholding to improve the provided masks and precisely cover the crowns of the detected trees. The proposed method achieves 85.30% on IoU while Detectron2 gives 79.83% and YOLOv8 has 75.36%. Our work uses cherry trees, but it is easy to apply to any other tree species. We believe that our approach will be a key factor in enabling health monitoring for each individual tree.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Leveraging the power of internet of things and artificial intelligence in forest fire prevention, detection, and restoration: A comprehensive survey.\n \n \n \n \n\n\n \n Giannakidou, S.; Radoglou-Grammatikis, P.; Lagkas, T.; Argyriou, V.; Goudos, S.; Markakis, E., K.; and Sarigiannidis, P.\n\n\n \n\n\n\n Internet of Things, 26: 101171. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"LeveragingWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Leveraging the power of internet of things and artificial intelligence in forest fire prevention, detection, and restoration: A comprehensive survey},\n type = {article},\n year = {2024},\n keywords = {Artificial intelligence,Climate change,Forest fires,Fuzzy logic,Internet of things,Resource allocation,Wildfires},\n pages = {101171},\n volume = {26},\n websites = {https://www.sciencedirect.com/science/article/pii/S2542660524001124},\n id = {bdeb6e10-4a7a-3fd1-b4d9-1a5b6010b6df},\n created = {2024-03-26T19:58:42.178Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-03-26T19:58:42.178Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {GIANNAKIDOU2024101171},\n source_type = {article},\n private_publication = {false},\n abstract = {Forest fires are a persistent global problem, causing devastating consequences such as loss of human lives, harm to the environment, and substantial economic losses. To mitigate these impacts, the accurate prediction and early detection of forest fires is critical. In response to this challenge and living in the digital era of Artificial Intelligence (AI) and smart economies, there has been a growing interest in utilising AI mechanisms for forest fire management. This study provides an in-depth examination of the use of AI algorithms in the fight against forest fires. In particular, our paper starts with an overview of the forest fire problem, followed by a comprehensive review of various systems and approaches. This review includes a thorough analysis of the various works that have evaluated the factors that influence fire occurrence and severity, as well as those that focus on fire prediction and detection systems. The paper also explores the use of AI in adapting and restoring after the occurrence of forest fires. The paper concludes with an evaluation of the potential impact of AI on forest fire management and suggestions for future research directions, taking full advantage of novel technologies, such as 5G communications, Software Defined Networking (SDN), digital twins, federated learning and blockchain. Finally, the paper draws lessons and insights on the potential and limitations of AI in forest fire management, highlighting the need for further research and development in this field to maximise its impact and benefits.},\n bibtype = {article},\n author = {Giannakidou, Sofia and Radoglou-Grammatikis, Panagiotis and Lagkas, Thomas and Argyriou, Vasileios and Goudos, Sotirios and Markakis, Evangelos K and Sarigiannidis, Panagiotis},\n doi = {https://doi.org/10.1016/j.iot.2024.101171},\n journal = {Internet of Things}\n}
\n
\n\n\n
\n Forest fires are a persistent global problem, causing devastating consequences such as loss of human lives, harm to the environment, and substantial economic losses. To mitigate these impacts, the accurate prediction and early detection of forest fires is critical. In response to this challenge and living in the digital era of Artificial Intelligence (AI) and smart economies, there has been a growing interest in utilising AI mechanisms for forest fire management. This study provides an in-depth examination of the use of AI algorithms in the fight against forest fires. In particular, our paper starts with an overview of the forest fire problem, followed by a comprehensive review of various systems and approaches. This review includes a thorough analysis of the various works that have evaluated the factors that influence fire occurrence and severity, as well as those that focus on fire prediction and detection systems. The paper also explores the use of AI in adapting and restoring after the occurrence of forest fires. The paper concludes with an evaluation of the potential impact of AI on forest fire management and suggestions for future research directions, taking full advantage of novel technologies, such as 5G communications, Software Defined Networking (SDN), digital twins, federated learning and blockchain. Finally, the paper draws lessons and insights on the potential and limitations of AI in forest fire management, highlighting the need for further research and development in this field to maximise its impact and benefits.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modeling Received Power from 4G and 5G Networks in Greece U sing Machine Learning.\n \n \n \n\n\n \n Rekkas, V., P.; Sotiroudis, S., P.; Tsoulos, G., V.; Athanasiadou, G.; Boursianis, A., D.; Zaharis, Z., D.; Sarigiannids, P.; Christodoulou, C., G.; and Goudos, S., K.\n\n\n \n\n\n\n In 2024 18th European Conference on Antennas and Propagation (EuCAP), pages 1-5, 2024. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Modeling Received Power from 4G and 5G Networks in Greece U sing Machine Learning},\n type = {inproceedings},\n year = {2024},\n keywords = {Radio frequency;Power measurement;5G mobile commun},\n pages = {1-5},\n id = {f11a5ebe-781b-34f8-bbd9-9ffd04ecd658},\n created = {2024-04-28T09:05:51.257Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-04-28T09:05:51.257Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10501053},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Wireless propagation modeling is crucial for designing 5G networks and deploying base stations. Traditional models are constrained by different propagation environments, and deterministic models using ray tracing demand extensive computational resources. In recent years, advances in data-driven artificial intelligence (AI) have significantly improved the fitting of intelligent propagation models for 5G systems. Using artificial intelligence (AI) and substantial measured data, we conduct a comparative study of various machine learning (ML) models to perform accurate regression predictions for Reference Signal Receiving Power (RSRP). The results of the proposed ML models are compared and analyzed, exhibiting great accuracy in the prediction of RSRP values in a diverse range of urban, suburban, and rural environments.},\n bibtype = {inproceedings},\n author = {Rekkas, Vasileios P and Sotiroudis, Sotirios P and Tsoulos, George V and Athanasiadou, Georgia and Boursianis, Achilles D and Zaharis, Zaharias D and Sarigiannids, Panagiotis and Christodoulou, Christos G and Goudos, Sotirios K},\n doi = {10.23919/EuCAP60739.2024.10501053},\n booktitle = {2024 18th European Conference on Antennas and Propagation (EuCAP)}\n}
\n
\n\n\n
\n Wireless propagation modeling is crucial for designing 5G networks and deploying base stations. Traditional models are constrained by different propagation environments, and deterministic models using ray tracing demand extensive computational resources. In recent years, advances in data-driven artificial intelligence (AI) have significantly improved the fitting of intelligent propagation models for 5G systems. Using artificial intelligence (AI) and substantial measured data, we conduct a comparative study of various machine learning (ML) models to perform accurate regression predictions for Reference Signal Receiving Power (RSRP). The results of the proposed ML models are compared and analyzed, exhibiting great accuracy in the prediction of RSRP values in a diverse range of urban, suburban, and rural environments.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Wideband Aperture-Coupled Array Design for Automotive Radar Applications.\n \n \n \n\n\n \n Iliadis, L., A.; Boursianis, A., D.; Sarigiannidis, P.; Zaharis, Z., D.; Sotiroudis, S., P.; Papadopoulou, M., S.; Christodoulou, C., G.; and Goudos, S., K.\n\n\n \n\n\n\n In 2024 18th European Conference on Antennas and Propagation (EuCAP), pages 1-5, 2024. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Wideband Aperture-Coupled Array Design for Automotive Radar Applications},\n type = {inproceedings},\n year = {2024},\n keywords = {Radar antennas;Aperture antennas;Sensor systems;Se},\n pages = {1-5},\n id = {6dd1ceb6-1b74-3d23-975f-a59773cbd1ca},\n created = {2024-04-28T09:05:51.278Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-04-28T09:05:51.278Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10501584},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Advanced driver assistance systems (ADAS) technology has been developed to improve driver safety and is a major part of today's autonomous vehicle functionalities. Automotive radars operate as core sensors in modern ADAS systems since they can detect the speed and range of objects near the vehicle. This work uses a recent variant of the Runge-Kutta algorithm, namely RUN, to design an aperture-coupled antenna array for automotive radars. The proposed array consists of five U-shaped patch elements and achieves low return loss, high gain, and high efficiency at 77 GHz - 81 GHz.},\n bibtype = {inproceedings},\n author = {Iliadis, Lazaros Alexios and Boursianis, Achilles D and Sarigiannidis, Panagiotis and Zaharis, Zaharias D and Sotiroudis, Sotirios P and Papadopoulou, Maria S and Christodoulou, Christos G and Goudos, Sotirios K},\n doi = {10.23919/EuCAP60739.2024.10501584},\n booktitle = {2024 18th European Conference on Antennas and Propagation (EuCAP)}\n}
\n
\n\n\n
\n Advanced driver assistance systems (ADAS) technology has been developed to improve driver safety and is a major part of today's autonomous vehicle functionalities. Automotive radars operate as core sensors in modern ADAS systems since they can detect the speed and range of objects near the vehicle. This work uses a recent variant of the Runge-Kutta algorithm, namely RUN, to design an aperture-coupled antenna array for automotive radars. The proposed array consists of five U-shaped patch elements and achieves low return loss, high gain, and high efficiency at 77 GHz - 81 GHz.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (47)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n TRUE: A Correlation Analysis Approach for Conducting Optimal Routing Metrics in VANETs.\n \n \n \n\n\n \n Bi, Z.; Meng, G.; Hawbani, A.; Goudos, S., K.; Wan, S.; and Zhao, L.\n\n\n \n\n\n\n IEEE Networking Letters, 5(1): 55-58. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {TRUE: A Correlation Analysis Approach for Conducting Optimal Routing Metrics in VANETs},\n type = {article},\n year = {2023},\n pages = {55-58},\n volume = {5},\n id = {523623f9-5df5-3c3f-8719-ffd408603f10},\n created = {2022-11-29T07:13:52.962Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-03-02T21:14:22.422Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9965203},\n source_type = {article},\n private_publication = {false},\n abstract = {In vehicular networks, especially in urban scenarios, road topology-based routing shows great advantages in dealing with the problems of broken links and long delays originating from sparse connections and signal attenuation. However, how road status affect data transmission performance on various routing metrics is still an intricate and vague problem. Concerned with this problem, we propose a correlation analysis approach between road network features and routing metrics (TRUE) to assist in the construction of optimal routing metrics in road-based hierarchical inter-vehicle routing. Simulation results show that TRUE has a strong ability to optimize intermediate road selection.},\n bibtype = {article},\n author = {Bi, Zhenguo and Meng, Guiying and Hawbani, Ammar and Goudos, Sotirios K and Wan, Shaohua and Zhao, Liang},\n doi = {10.1109/LNET.2022.3225297},\n journal = {IEEE Networking Letters},\n number = {1}\n}
\n
\n\n\n
\n In vehicular networks, especially in urban scenarios, road topology-based routing shows great advantages in dealing with the problems of broken links and long delays originating from sparse connections and signal attenuation. However, how road status affect data transmission performance on various routing metrics is still an intricate and vague problem. Concerned with this problem, we propose a correlation analysis approach between road network features and routing metrics (TRUE) to assist in the construction of optimal routing metrics in road-based hierarchical inter-vehicle routing. Simulation results show that TRUE has a strong ability to optimize intermediate road selection.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Wide Band THz Antenna Design Using Salp Swarm Algorithm for 6G Communications Systems.\n \n \n \n \n\n\n \n Goudos, S., K.; and Matin, M., A.\n\n\n \n\n\n\n A Glimpse Beyond 5G in Wireless Networks, pages 255-274. Matin, M., A., editor(s). Springer International Publishing, 2023.\n \n\n\n\n
\n\n\n\n \n \n \"AWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2023},\n pages = {255-274},\n websites = {https://doi.org/10.1007/978-3-031-13786-0_10},\n publisher = {Springer International Publishing},\n city = {Cham},\n id = {7a7b7be0-1304-340d-af83-3c88d5e3297b},\n created = {2022-12-03T07:59:59.456Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-12-03T07:59:59.456Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2023},\n source_type = {inbook},\n private_publication = {false},\n abstract = {The future 6G wireless communications will need the definition of new spectral bands and the employment of novel advanced physical layer solutions. The millimeter-wave (mmWave) frequency bands have been allocated for the fifth generation (5G) of cellular systems, while additional mmWave sub-bands have been assigned as well. The need to support higher data rates than 5G in the order of terabits per second requires more bandwidth. However, the total consecutive available bandwidth in mmWave bands is still less than 10 GHz, so such data rates cannot be supported. In this context, future 6G communication systems require the use of the terahertz communication band (0.1--10 THz). The THz band is envisioned as a critical wireless technology for meeting future demands in 5G and beyond. For several years, there has been a lack of THz transceivers and antennas, so that the THz band has become one of the electromagnetic (EM) spectrum's least studied frequency ranges in terms of wireless communication. However, the need for 6G communication systems has redefined the requirements for THz antennas. In this book chapter, we provide a complete framework for circular polarized antenna design in the low THz band. This optimization framework is based on a swarm intelligence algorithm, namely, the salp swarm algorithm (SSA). The numerical results show that the SSA has been successfully applied in designing antenna with wide band operation and circular polarization.},\n bibtype = {inbook},\n author = {Goudos, Sotirios K and Matin, Mohammad A},\n editor = {Matin, Mohammad Abdul},\n doi = {10.1007/978-3-031-13786-0_10},\n chapter = {Wide Band THz Antenna Design Using Salp Swarm Algorithm for 6G Communications Systems},\n title = {A Glimpse Beyond 5G in Wireless Networks}\n}
\n
\n\n\n
\n The future 6G wireless communications will need the definition of new spectral bands and the employment of novel advanced physical layer solutions. The millimeter-wave (mmWave) frequency bands have been allocated for the fifth generation (5G) of cellular systems, while additional mmWave sub-bands have been assigned as well. The need to support higher data rates than 5G in the order of terabits per second requires more bandwidth. However, the total consecutive available bandwidth in mmWave bands is still less than 10 GHz, so such data rates cannot be supported. In this context, future 6G communication systems require the use of the terahertz communication band (0.1--10 THz). The THz band is envisioned as a critical wireless technology for meeting future demands in 5G and beyond. For several years, there has been a lack of THz transceivers and antennas, so that the THz band has become one of the electromagnetic (EM) spectrum's least studied frequency ranges in terms of wireless communication. However, the need for 6G communication systems has redefined the requirements for THz antennas. In this book chapter, we provide a complete framework for circular polarized antenna design in the low THz band. This optimization framework is based on a swarm intelligence algorithm, namely, the salp swarm algorithm (SSA). The numerical results show that the SSA has been successfully applied in designing antenna with wide band operation and circular polarization.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Novel Deep Learning Model for Medical Report Generation by Inter-Intra Information Calibration.\n \n \n \n\n\n \n Zhang, J.; Shen, X.; Wan, S.; Goudos, S., K.; Wu, J.; Cheng, M.; and Zhang, W.\n\n\n \n\n\n\n IEEE Journal of Biomedical and Health Informatics, 27(10): 5110-5121. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {A Novel Deep Learning Model for Medical Report Generation by Inter-Intra Information Calibration},\n type = {article},\n year = {2023},\n pages = {5110-5121},\n volume = {27},\n id = {a1eaa3ea-6058-3cf4-af46-4731c0af6a4b},\n created = {2023-01-13T18:51:08.741Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-10-06T06:28:09.186Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10016250},\n source_type = {article},\n private_publication = {false},\n abstract = {Automatic generation of medical reports can provide diagnostic assistance to doctors and reduce their workload. To improve the quality of the generated medical reports, injecting auxiliary information through knowledge graphs or templates into the model is widely adopted in previous methods. However, they suffer from two problems: 1) The injected external information is limited in amount and difficult to adequately meet the information needs of medical report generation in content. 2) The injected external information increases the complexity of model and is hard to be reasonably integrated into the generation process of medical reports. Therefore, we propose an Information Calibrated Transformer (ICT) to address the above issues. First, we design a Precursor-information Enhancement Module (PEM), which can effectively extract numerous inter-intra report features from the datasets as the auxiliary information without external injection. And the auxiliary information can be dynamically updated with the training process. Secondly, a combination mode, which consists of PEM and our proposed Information Calibration Attention Module (ICA), is designed and embedded into ICT. In this method, the auxiliary information extracted from PEM is flexibly injected into ICT and the increment of model parameters is small. The comprehensive evaluations validate that the ICT is not only superior to previous methods in the X-Ray datasets, IU-X-Ray and MIMIC-CXR, but also successfully be extended to a CT COVID-19 dataset COV-CTR.},\n bibtype = {article},\n author = {Zhang, Junsan and Shen, Xiuxuan and Wan, Shaohua and Goudos, Sotirios K and Wu, Jie and Cheng, Ming and Zhang, Weishan},\n doi = {10.1109/JBHI.2023.3236661},\n journal = {IEEE Journal of Biomedical and Health Informatics},\n number = {10}\n}
\n
\n\n\n
\n Automatic generation of medical reports can provide diagnostic assistance to doctors and reduce their workload. To improve the quality of the generated medical reports, injecting auxiliary information through knowledge graphs or templates into the model is widely adopted in previous methods. However, they suffer from two problems: 1) The injected external information is limited in amount and difficult to adequately meet the information needs of medical report generation in content. 2) The injected external information increases the complexity of model and is hard to be reasonably integrated into the generation process of medical reports. Therefore, we propose an Information Calibrated Transformer (ICT) to address the above issues. First, we design a Precursor-information Enhancement Module (PEM), which can effectively extract numerous inter-intra report features from the datasets as the auxiliary information without external injection. And the auxiliary information can be dynamically updated with the training process. Secondly, a combination mode, which consists of PEM and our proposed Information Calibration Attention Module (ICA), is designed and embedded into ICT. In this method, the auxiliary information extracted from PEM is flexibly injected into ICT and the increment of model parameters is small. The comprehensive evaluations validate that the ICT is not only superior to previous methods in the X-Ray datasets, IU-X-Ray and MIMIC-CXR, but also successfully be extended to a CT COVID-19 dataset COV-CTR.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Artificial intelligence (AI) and machine learning (ML) for beyond 5G/6G communications.\n \n \n \n \n\n\n \n Matin, M., A.; Goudos, S., K.; Wan, S.; Sarigiannidis, P.; and Tentzeris, E., M.\n\n\n \n\n\n\n EURASIP Journal on Wireless Communications and Networking, 2023(1): 22. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"ArtificialWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Artificial intelligence (AI) and machine learning (ML) for beyond 5G/6G communications},\n type = {article},\n year = {2023},\n pages = {22},\n volume = {2023},\n websites = {https://doi.org/10.1186/s13638-023-02212-z},\n id = {bd675380-17bd-3a33-9abe-39f138069272},\n created = {2023-01-28T11:40:23.293Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-01-28T11:40:23.293Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Matin2023},\n source_type = {JOUR},\n private_publication = {false},\n bibtype = {article},\n author = {Matin, Mohammad Abdul and Goudos, Sotirios K and Wan, Shaohua and Sarigiannidis, Panagiotis and Tentzeris, Emmanouil M},\n doi = {10.1186/s13638-023-02212-z},\n journal = {EURASIP Journal on Wireless Communications and Networking},\n number = {1}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n LoRa-Based IoT Network Assessment in Rural and Urban Scenarios.\n \n \n \n \n\n\n \n Griva, A., I.; Boursianis, A., D.; Wan, S.; Sarigiannidis, P.; Psannis, K., E.; Karagiannidis, G.; and Goudos, S., K.\n\n\n \n\n\n\n Sensors, 23(3). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"LoRa-BasedWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {LoRa-Based IoT Network Assessment in Rural and Urban Scenarios},\n type = {article},\n year = {2023},\n volume = {23},\n websites = {https://www.mdpi.com/1424-8220/23/3/1695},\n id = {75a8678a-622d-379b-ab77-23e17460ca72},\n created = {2023-02-03T21:21:17.488Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-03T21:21:17.488Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {s23031695},\n source_type = {article},\n private_publication = {false},\n abstract = {The implementation of smart networks has made great progress due to the development of the Internet of Things (IoT). LoRa is one of the most prominent technologies in the Internet of Things industry, primarily due to its ability to achieve long-distance transmission while consuming less power. In this work, we modeled different environments and assessed the performances of networks by observing the effects of various factors and network parameters. The path loss model, the deployment area size, the transmission power, the spreading factor, the number of nodes and gateways, and the antenna gain have a significant effect on the main performance metrics such as the energy consumption and the data extraction rate of a LoRa network. In order to examine these parameters, we performed simulations in OMNeT++ using the open source framework FLoRa. The scenarios which were investigated in this work include the simulation of rural and urban environments and a parking area model. The results indicate that the optimization of the key parameters could have a huge impact on the deployment of smart networks.},\n bibtype = {article},\n author = {Griva, Aikaterini I and Boursianis, Achilles D and Wan, Shaohua and Sarigiannidis, Panagiotis and Psannis, Konstantinos E and Karagiannidis, George and Goudos, Sotirios K},\n doi = {10.3390/s23031695},\n journal = {Sensors},\n number = {3}\n}
\n
\n\n\n
\n The implementation of smart networks has made great progress due to the development of the Internet of Things (IoT). LoRa is one of the most prominent technologies in the Internet of Things industry, primarily due to its ability to achieve long-distance transmission while consuming less power. In this work, we modeled different environments and assessed the performances of networks by observing the effects of various factors and network parameters. The path loss model, the deployment area size, the transmission power, the spreading factor, the number of nodes and gateways, and the antenna gain have a significant effect on the main performance metrics such as the energy consumption and the data extraction rate of a LoRa network. In order to examine these parameters, we performed simulations in OMNeT++ using the open source framework FLoRa. The scenarios which were investigated in this work include the simulation of rural and urban environments and a parking area model. The results indicate that the optimization of the key parameters could have a huge impact on the deployment of smart networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Residual Compensation-based Extreme Learning Machine for MIMO-NOMA Receiver.\n \n \n \n\n\n \n Rezwanul Mahmood, M.; Matin, M., A.; Sarigiannidis, P.; Goudos, S., K.; and Karagiannidis, G., K.\n\n\n \n\n\n\n IEEE Access, 11: 13398-13407. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Residual Compensation-based Extreme Learning Machine for MIMO-NOMA Receiver},\n type = {article},\n year = {2023},\n pages = {13398-13407},\n volume = {11},\n id = {1ccac330-42bc-354c-b051-14fca54a9ffd},\n created = {2023-02-07T08:25:38.459Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-15T07:26:56.187Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10038667},\n source_type = {article},\n private_publication = {false},\n abstract = {Extreme learning machine (ELM) uses a simple machine learning (ML) architecture that allows its implementation for smart IoT network operations. However, some inaccuracy lies between the predicted and the actual data during the ELM training, which can be caused due to the limitation of the modeling representation. This paper thus investigates a residual compensation-based ELM (RC-ELM) for its application in designing a receiver for MIMO-NOMA aided IoT systems. In RC-ELM, the base ELM layers determine the relationship between the transmitted and received data and the additional layers of the RC-ELM attempt to compensate the error introduced during the training mechanism. The analysis of the appropriate number of compensation layers for training error minimization is conducted on the basis of the bit error rate (BER) and the error vector magnitude (EVM) performances of the RC-ELM training. A minimum BER improvement of 5% for user 1 and 18% for user 2 is shown with with the aid of RC-ELM for a two-IoT user instance. The EVM is marginally increased by 0.0008% for user 1 and 1.61% for user 2 in training stage. Besides, the RC-ELM receiver is also compared to the minimum mean square error (MMSE), the classic ELM and the trained multilayer perceptron (MLP) receivers in terms of BER and EVM. Both of the ELM receivers show improved performances with respect to the other receivers.},\n bibtype = {article},\n author = {Rezwanul Mahmood, M and Matin, Mohammad Abdul and Sarigiannidis, Panagiotis and Goudos, Sotirios K and Karagiannidis, George K},\n doi = {10.1109/ACCESS.2023.3242917},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n Extreme learning machine (ELM) uses a simple machine learning (ML) architecture that allows its implementation for smart IoT network operations. However, some inaccuracy lies between the predicted and the actual data during the ELM training, which can be caused due to the limitation of the modeling representation. This paper thus investigates a residual compensation-based ELM (RC-ELM) for its application in designing a receiver for MIMO-NOMA aided IoT systems. In RC-ELM, the base ELM layers determine the relationship between the transmitted and received data and the additional layers of the RC-ELM attempt to compensate the error introduced during the training mechanism. The analysis of the appropriate number of compensation layers for training error minimization is conducted on the basis of the bit error rate (BER) and the error vector magnitude (EVM) performances of the RC-ELM training. A minimum BER improvement of 5% for user 1 and 18% for user 2 is shown with with the aid of RC-ELM for a two-IoT user instance. The EVM is marginally increased by 0.0008% for user 1 and 1.61% for user 2 in training stage. Besides, the RC-ELM receiver is also compared to the minimum mean square error (MMSE), the classic ELM and the trained multilayer perceptron (MLP) receivers in terms of BER and EVM. Both of the ELM receivers show improved performances with respect to the other receivers.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Music Deep Learning: Deep Learning Methods for Music Signal Processing - A Review of The State-of-the-Art.\n \n \n \n\n\n \n Moysis, L.; Iliadis, L., A.; Sotiroudis, S., P.; Boursianis, A., D.; Papadopoulou, M., S.; Kokkinidis, K., D.; Volos, C.; Sarigiannidis, P.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n IEEE Access, 11: 17031-17052. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Music Deep Learning: Deep Learning Methods for Music Signal Processing - A Review of The State-of-the-Art},\n type = {article},\n year = {2023},\n pages = {17031-17052},\n volume = {11},\n id = {60a450dc-3571-32f6-a63c-a4419836ab21},\n created = {2023-02-14T08:26:52.047Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-03-02T21:12:07.124Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10043650},\n source_type = {article},\n private_publication = {false},\n abstract = {The discipline of Deep Learning has been recognized for its strong computational tools, which have been extensively used in data and signal processing, with innumerable promising results. Among the many commercial applications of Deep Learning, Music Signal Processing has received an increasing amount of attention over the last decade. This work reviews the most recent developments in Deep Learning in Music signal processing. Two main applications that are discussed are Music Information Retrieval, which spans a plethora of applications, and Music Generation, which can fit a range of musical styles. After a review of both topics, several emerging directions are identified for future research.},\n bibtype = {article},\n author = {Moysis, Lazaros and Iliadis, Lazaros Alexios and Sotiroudis, Sotirios P and Boursianis, Achilles D and Papadopoulou, Maria S and Kokkinidis, Konstantinos-Iraklis D and Volos, Christos and Sarigiannidis, Panagiotis and Nikolaidis, Spiridon and Goudos, Sotirios K},\n doi = {10.1109/ACCESS.2023.3244620},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n The discipline of Deep Learning has been recognized for its strong computational tools, which have been extensively used in data and signal processing, with innumerable promising results. Among the many commercial applications of Deep Learning, Music Signal Processing has received an increasing amount of attention over the last decade. This work reviews the most recent developments in Deep Learning in Music signal processing. Two main applications that are discussed are Music Information Retrieval, which spans a plethora of applications, and Music Generation, which can fit a range of musical styles. After a review of both topics, several emerging directions are identified for future research.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dual-Band Rectifier Circuit Design for IoT Communication in 5G Systems.\n \n \n \n \n\n\n \n Bougas, I., D.; Papadopoulou, M., S.; Boursianis, A., D.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n Technologies, 11(2). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"Dual-BandWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Dual-Band Rectifier Circuit Design for IoT Communication in 5G Systems},\n type = {article},\n year = {2023},\n volume = {11},\n websites = {https://www.mdpi.com/2227-7080/11/2/34},\n id = {f3b85552-fc32-3fb3-9346-8d0abc099493},\n created = {2023-02-24T14:56:51.642Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-24T14:56:51.642Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {technologies11020034},\n source_type = {article},\n private_publication = {false},\n abstract = {Radio-frequency (RF) energy harvesting (EH) is emerging as a reliable and constantly available free energy source. The primary factor determining whether this energy can be utilized is how efficiently it can be collected. In this work, an RF EH system is presented. More particularly, we designed a dual-band RF to DC rectifier circuit at sub-6 GHz in the 5G bands, able to supply low-power sensors and microcontrollers used in agriculture, the military, or health services. The system operates at 3.5 GHz and 5 GHz in the 5G cellular network&rsquo;s frequency band FR1. Numerical results reveal that the system provides maximum power conversion efficiency (PCE) equal to 53% when the output load (sensor or microcontroller) is 1.74 k&Omega; and the input power is 12 dBm.},\n bibtype = {article},\n author = {Bougas, Ioannis D and Papadopoulou, Maria S and Boursianis, Achilles D and Nikolaidis, Spyridon and Goudos, Sotirios K},\n doi = {10.3390/technologies11020034},\n journal = {Technologies},\n number = {2}\n}
\n
\n\n\n
\n Radio-frequency (RF) energy harvesting (EH) is emerging as a reliable and constantly available free energy source. The primary factor determining whether this energy can be utilized is how efficiently it can be collected. In this work, an RF EH system is presented. More particularly, we designed a dual-band RF to DC rectifier circuit at sub-6 GHz in the 5G bands, able to supply low-power sensors and microcontrollers used in agriculture, the military, or health services. The system operates at 3.5 GHz and 5 GHz in the 5G cellular network’s frequency band FR1. Numerical results reveal that the system provides maximum power conversion efficiency (PCE) equal to 53% when the output load (sensor or microcontroller) is 1.74 kΩ and the input power is 12 dBm.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Beam-Selection for 5G/B5G Networks Using Machine Learning: A Comparative Study.\n \n \n \n \n\n\n \n Chatzoglou, E.; and Goudos, S., K.\n\n\n \n\n\n\n Sensors, 23(6). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"Beam-SelectionWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Beam-Selection for 5G/B5G Networks Using Machine Learning: A Comparative Study},\n type = {article},\n year = {2023},\n volume = {23},\n websites = {https://www.mdpi.com/1424-8220/23/6/2967},\n id = {9c58d5f3-49bd-3780-8fb1-7325b4a8abe9},\n created = {2023-03-09T08:27:21.560Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-03-09T08:27:21.560Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {s23062967},\n source_type = {article},\n private_publication = {false},\n abstract = {A challenging problem in millimeter wave (mmWave) communications for the fifth generation of cellular communications and beyond (5G/B5G) is the beam selection problem. This is due to severe attenuation and penetration losses that are inherent in the mmWave band. Thus, the beam selection problem for mmWave links in a vehicular scenario can be solved as an exhaustive search among all candidate beam pairs. However, this approach cannot be assuredly completed within short contact times. On the other hand, machine learning (ML) has the potential to significantly advance 5G/B5G technology, as evidenced by the growing complexity of constructing cellular networks. In this work, we perform a comparative study of using different ML methods to solve the beam selection problem. We use a common dataset for this scenario found in the literature. We increase the accuracy of these results by approximately 30%. Moreover, we extend the given dataset by producing additional synthetic data. We apply ensemble learning techniques and obtain results with about 94% accuracy. The novelty of our work lies in the fact that we improve the existing dataset by adding more synthetic data and by designing a custom ensemble learning method for the problem at hand.},\n bibtype = {article},\n author = {Chatzoglou, Efstratios and Goudos, Sotirios K},\n doi = {10.3390/s23062967},\n journal = {Sensors},\n number = {6}\n}
\n
\n\n\n
\n A challenging problem in millimeter wave (mmWave) communications for the fifth generation of cellular communications and beyond (5G/B5G) is the beam selection problem. This is due to severe attenuation and penetration losses that are inherent in the mmWave band. Thus, the beam selection problem for mmWave links in a vehicular scenario can be solved as an exhaustive search among all candidate beam pairs. However, this approach cannot be assuredly completed within short contact times. On the other hand, machine learning (ML) has the potential to significantly advance 5G/B5G technology, as evidenced by the growing complexity of constructing cellular networks. In this work, we perform a comparative study of using different ML methods to solve the beam selection problem. We use a common dataset for this scenario found in the literature. We increase the accuracy of these results by approximately 30%. Moreover, we extend the given dataset by producing additional synthetic data. We apply ensemble learning techniques and obtain results with about 94% accuracy. The novelty of our work lies in the fact that we improve the existing dataset by adding more synthetic data and by designing a custom ensemble learning method for the problem at hand.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks.\n \n \n \n\n\n \n Goudos, S., K.; Diamantoulakis, P., D.; Boursianis, A., D.; Sarigiannidis, P.; Psannis, K., E.; Matin, M., A.; Wan, S.; and Karagiannidis, G.\n\n\n \n\n\n\n IEEE Access, 11: 30873-30887. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Joint QoS Aware Admission Control and Power Allocation in NOMA Downlink Networks},\n type = {article},\n year = {2023},\n pages = {30873-30887},\n volume = {11},\n id = {1f7aa0d0-b48c-30a0-aef9-d12e8a1519a3},\n created = {2023-03-28T07:18:16.121Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-03-31T06:12:22.302Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10081366},\n source_type = {article},\n private_publication = {false},\n abstract = {In this work, we talk about the problem of joint power allocation and user association based on quality-of-service for non-orthogonal multiple access (NOMA) to downlink networks. The problem is especially difficult due to its non-convex form and the large number of optimization variables, which are solved using two different nature-inspired algorithms with low complexity. We investigate the effect of different network parameters on increasing users. Numerical results show that, for a growing number of users, the problem is becoming increasingly difficult, which indicates the increasing network resources required to solve it. The results of the simulations show that using evolutionary algorithms is a fast and effective way to solve this kind of problem. Moreover, the NOMA advantage over OMA becomes clear as the number of users increases. Evolutionary techniques outperform randomly generated solutions, as expected.},\n bibtype = {article},\n author = {Goudos, Sotirios K and Diamantoulakis, Panagiotis D and Boursianis, Achilles D and Sarigiannidis, Panagiotis and Psannis, Konstantinos E and Matin, Mohammad Abdul and Wan, Shaohua and Karagiannidis, George},\n doi = {10.1109/ACCESS.2023.3262117},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n In this work, we talk about the problem of joint power allocation and user association based on quality-of-service for non-orthogonal multiple access (NOMA) to downlink networks. The problem is especially difficult due to its non-convex form and the large number of optimization variables, which are solved using two different nature-inspired algorithms with low complexity. We investigate the effect of different network parameters on increasing users. Numerical results show that, for a growing number of users, the problem is becoming increasingly difficult, which indicates the increasing network resources required to solve it. The results of the simulations show that using evolutionary algorithms is a fast and effective way to solve this kind of problem. Moreover, the NOMA advantage over OMA becomes clear as the number of users increases. Evolutionary techniques outperform randomly generated solutions, as expected.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Evolutionary Ensemble Learning Pathloss Prediction for 4G and 5G Flying Base Stations with UAVs.\n \n \n \n\n\n \n Sotiroudis, S., P.; Athanasiadou, G.; Tsoulos, G.; Sarigiannidis, P.; Christodoulou, C.; and Goudos, S., K.\n\n\n \n\n\n\n IEEE Transactions on Antennas and Propagation, 71(7): 5994-6005. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Evolutionary Ensemble Learning Pathloss Prediction for 4G and 5G Flying Base Stations with UAVs},\n type = {article},\n year = {2023},\n pages = {5994-6005},\n volume = {71},\n id = {34139781-9126-303f-87e3-e8e989c15c66},\n created = {2023-04-19T07:52:47.805Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-07T12:58:38.863Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10105215},\n source_type = {article},\n private_publication = {false},\n abstract = {The usage of unmanned aerial vehicles (UAVs) as flying base stations (FBSs) for expanding coverage and assisting the terrestrial cellular networks constitutes a promising technology for 5G and beyond. A crucial parameter affecting cellular network design is path loss prediction. An alternative to the accurate, though time-consuming, propagation prediction with deterministic Ray Tracing models could be Machine Learning (ML) based predictions. Ensemble Learning techniques are used in order to optimally combine the predictions of standalone models. That is, they combine the best-performing individual models into a better-performing meta-model. Our proposed method of the evolutionary tuned stacked ensemble optimizes the ensemble as a whole, instead of optimizing its individual base learners. To the best of our knowledge, this is the first time that an evolutionary technique is applied in order to mutually tune an ensemble’s base learners for a path loss modeling problem in electromagnetics. Moreover, we present a model that works in more than one frequency. As opposed to the standard implementation of ensemble learning, our method offers a significant performance boost with low complexity.},\n bibtype = {article},\n author = {Sotiroudis, Sotirios P and Athanasiadou, Georgia and Tsoulos, George and Sarigiannidis, Panagiotis and Christodoulou, Christos and Goudos, Sotirios K},\n doi = {10.1109/TAP.2023.3266784},\n journal = {IEEE Transactions on Antennas and Propagation},\n number = {7}\n}
\n
\n\n\n
\n The usage of unmanned aerial vehicles (UAVs) as flying base stations (FBSs) for expanding coverage and assisting the terrestrial cellular networks constitutes a promising technology for 5G and beyond. A crucial parameter affecting cellular network design is path loss prediction. An alternative to the accurate, though time-consuming, propagation prediction with deterministic Ray Tracing models could be Machine Learning (ML) based predictions. Ensemble Learning techniques are used in order to optimally combine the predictions of standalone models. That is, they combine the best-performing individual models into a better-performing meta-model. Our proposed method of the evolutionary tuned stacked ensemble optimizes the ensemble as a whole, instead of optimizing its individual base learners. To the best of our knowledge, this is the first time that an evolutionary technique is applied in order to mutually tune an ensemble’s base learners for a path loss modeling problem in electromagnetics. Moreover, we present a model that works in more than one frequency. As opposed to the standard implementation of ensemble learning, our method offers a significant performance boost with low complexity.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Post-Processing Fairness Evaluation of Federated Models: An Unsupervised Approach in Healthcare.\n \n \n \n\n\n \n Siniosoglou, I.; Argyriou, V.; Sarigiannidis, P.; Lagkas, T.; Sarigiannidis, A.; Goudos, S., K.; and Wan, S.\n\n\n \n\n\n\n IEEE/ACM Transactions on Computational Biology and Bioinformatics, 20(4): 2518-2529. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Post-Processing Fairness Evaluation of Federated Models: An Unsupervised Approach in Healthcare},\n type = {article},\n year = {2023},\n pages = {2518-2529},\n volume = {20},\n id = {ceadb4d4-9b87-39f0-838a-89ead65f426b},\n created = {2023-04-26T07:48:39.312Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-08-10T16:07:48.611Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10107702},\n source_type = {article},\n private_publication = {false},\n abstract = {Modern Healthcare cyberphysical systems have begun to rely more and more on distributed AI leveraging the power of Federated Learning (FL). Its ability to train Machine Learning (ML) and Deep Learning (DL) models for the wide variety of medical fields, while at the same time fortifying the privacy of the sensitive information that are present in the medical sector, makes the FL technology a necessary tool in modern health and medical systems. Unfortunately, due to the polymorphy of distributed data and the shortcomings of distributed learning, the local training of Federated models sometimes proves inadequate and thus negatively imposes the federated learning optimization process and in extend in the subsequent performance of the rest Federated models. Badly trained models can cause dire implications in the healthcare field due to their critical nature. This work strives to solve this problem by applying a post-processing pipeline to models used by FL. In particular, the proposed work ranks the model by finding how fair they are by discovering and inspecting micro-Manifolds that cluster each neural model's latent knowledge. The produced work applies a completely unsupervised both model and data agnostic methodology that can be leveraged for general model fairness discovery. The proposed methodology is tested against a variety of benchmark DL architectures and in the FL environment, showing an average 8.75% increase in Federated model accuracy in comparison with similar work.},\n bibtype = {article},\n author = {Siniosoglou, Ilias and Argyriou, Vasileios and Sarigiannidis, Panagiotis and Lagkas, Thomas and Sarigiannidis, Antonios and Goudos, Sotirios K and Wan, Shaohua},\n doi = {10.1109/TCBB.2023.3269767},\n journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics},\n number = {4}\n}
\n
\n\n\n
\n Modern Healthcare cyberphysical systems have begun to rely more and more on distributed AI leveraging the power of Federated Learning (FL). Its ability to train Machine Learning (ML) and Deep Learning (DL) models for the wide variety of medical fields, while at the same time fortifying the privacy of the sensitive information that are present in the medical sector, makes the FL technology a necessary tool in modern health and medical systems. Unfortunately, due to the polymorphy of distributed data and the shortcomings of distributed learning, the local training of Federated models sometimes proves inadequate and thus negatively imposes the federated learning optimization process and in extend in the subsequent performance of the rest Federated models. Badly trained models can cause dire implications in the healthcare field due to their critical nature. This work strives to solve this problem by applying a post-processing pipeline to models used by FL. In particular, the proposed work ranks the model by finding how fair they are by discovering and inspecting micro-Manifolds that cluster each neural model's latent knowledge. The produced work applies a completely unsupervised both model and data agnostic methodology that can be leveraged for general model fairness discovery. The proposed methodology is tested against a variety of benchmark DL architectures and in the FL environment, showing an average 8.75% increase in Federated model accuracy in comparison with similar work.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n RIS-Assisted Multi-User MIMO Systems Exploiting Extreme Learning Machine.\n \n \n \n\n\n \n Rezwanul Mahmood, M.; Matin, M., A.; and Goudos, S., K.\n\n\n \n\n\n\n IEEE Access, 11: 47129-47136. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {RIS-Assisted Multi-User MIMO Systems Exploiting Extreme Learning Machine},\n type = {article},\n year = {2023},\n pages = {47129-47136},\n volume = {11},\n id = {524dbc37-d39a-3568-989f-c57fc22b8976},\n created = {2023-05-12T20:53:12.493Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-05-20T12:29:35.636Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10123934},\n source_type = {article},\n private_publication = {false},\n abstract = {Massive multiple-input multiple-output (mMIMO), assisted by reconfigurable intelligent surface (RIS), can ensure reliable and energy-efficient data transmission. However, the receiver design for large-scale networks based on traditional mathematical approaches requires complex statistics. Therefore, in this paper, machine learning (ML) approaches are investigated to design receivers for the RIS-assisted multi-user MIMO (muMIMO) systems to avoid complicated channel information requirements. Extreme learning machine (ELM) is an effective ML tool for MIMO receiver design because it simplifies the learning process. However, the learning performance of the ELM can get affected by the random choice of its hidden layer size. To address this issues, this paper proposes an incremental ELM (I-ELM) based receiver for the RIS-mu-MIMO system. The proposed receiver computes the weights between the hidden and the output layer based on the automated incremental addition of hidden neurons and provided conditions. The suggested receiver is contrasted with the multilayer perceptron (MLP), conventional ELM, and minimum mean square error (MMSE) receivers. The simulation results show that the throughput performance of the proposed receiver is satisfactory.},\n bibtype = {article},\n author = {Rezwanul Mahmood, M and Matin, Mohammad Abdul and Goudos, Sotirios K},\n doi = {10.1109/ACCESS.2023.3275755},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n Massive multiple-input multiple-output (mMIMO), assisted by reconfigurable intelligent surface (RIS), can ensure reliable and energy-efficient data transmission. However, the receiver design for large-scale networks based on traditional mathematical approaches requires complex statistics. Therefore, in this paper, machine learning (ML) approaches are investigated to design receivers for the RIS-assisted multi-user MIMO (muMIMO) systems to avoid complicated channel information requirements. Extreme learning machine (ELM) is an effective ML tool for MIMO receiver design because it simplifies the learning process. However, the learning performance of the ELM can get affected by the random choice of its hidden layer size. To address this issues, this paper proposes an incremental ELM (I-ELM) based receiver for the RIS-mu-MIMO system. The proposed receiver computes the weights between the hidden and the output layer based on the automated incremental addition of hidden neurons and provided conditions. The suggested receiver is contrasted with the multilayer perceptron (MLP), conventional ELM, and minimum mean square error (MMSE) receivers. The simulation results show that the throughput performance of the proposed receiver is satisfactory.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Source detection with multi-label classification.\n \n \n \n\n\n \n Vijayamohanan, J.; Gupta, A.; Noakoasteen, O.; Goudos, S., K.; and Christodoulou, C., G.\n\n\n \n\n\n\n IEEE Open Journal of Signal Processing, 4: 336-345. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Source detection with multi-label classification},\n type = {article},\n year = {2023},\n pages = {336-345},\n volume = {4},\n id = {bb2b6a06-d407-3702-906b-0275720cd5aa},\n created = {2023-05-30T06:00:24.727Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-06-16T05:45:24.765Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10137757},\n source_type = {article},\n private_publication = {false},\n abstract = {Radio source detection through conventional algorithms has been unreliable when trying to solve for large number of sources in the presence of low SINR and less number of snapshots. We address this by reformulating source detection as a multi-class classification problem solved using deep learning frameworks. Incoming waveforms are sampled using a centro-symmetric linear array with omni-directional elements and the normalized upper triangle of the autocorrelation matrix is extracted as the input feature to a modified convolutional neural network with uni-dimensional filters, trained to detect the sources in the presence of both uncorrelated and correlated signals. Two detection algorithms are introduced and referred to as CNNDetector and RadioNet, and subsequently benchmarked against the conventional source detection algorithms. By including pre-processing in forward backward spatial smoothing, RadioNet can also resolve the number of uncorrelated sources in the presence of correlated paths. Finally, the algorithms are stress tested under challenging operational conditions and extensive evaluations are presented showing the efficacy and contributions of the introduced predictive models. To the best of our knowledge, this is the first time the source detection problem has resolved L-1 sources, for an antenna array of L elements using a deep learning framework.},\n bibtype = {article},\n author = {Vijayamohanan, Jayakrishnan and Gupta, Arjun and Noakoasteen, Oameed and Goudos, Sotirios K and Christodoulou, Christos G},\n doi = {10.1109/OJSP.2023.3280854},\n journal = {IEEE Open Journal of Signal Processing}\n}
\n
\n\n\n
\n Radio source detection through conventional algorithms has been unreliable when trying to solve for large number of sources in the presence of low SINR and less number of snapshots. We address this by reformulating source detection as a multi-class classification problem solved using deep learning frameworks. Incoming waveforms are sampled using a centro-symmetric linear array with omni-directional elements and the normalized upper triangle of the autocorrelation matrix is extracted as the input feature to a modified convolutional neural network with uni-dimensional filters, trained to detect the sources in the presence of both uncorrelated and correlated signals. Two detection algorithms are introduced and referred to as CNNDetector and RadioNet, and subsequently benchmarked against the conventional source detection algorithms. By including pre-processing in forward backward spatial smoothing, RadioNet can also resolve the number of uncorrelated sources in the presence of correlated paths. Finally, the algorithms are stress tested under challenging operational conditions and extensive evaluations are presented showing the efficacy and contributions of the introduced predictive models. To the best of our knowledge, this is the first time the source detection problem has resolved L-1 sources, for an antenna array of L elements using a deep learning framework.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Path Loss Modeling for Flying Ad-Hoc Networks:An Ensemble Learning Approach.\n \n \n \n\n\n \n Rekkas, V., P.; Sotiroudis, S., P.; Boursianis, A., D.; Athanasiadou, G.; Tsoulos, G., V.; Christodoulou, C.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 17th European Conference on Antennas and Propagation (EuCAP), pages 1-5, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Path Loss Modeling for Flying Ad-Hoc Networks:An Ensemble Learning Approach},\n type = {inproceedings},\n year = {2023},\n keywords = {Wireless networks;Urban areas;Predictive models;Ra},\n pages = {1-5},\n id = {b3a51d0c-bd3e-392d-a1d9-efae02a3a120},\n created = {2023-06-01T16:42:48.283Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-06-01T16:42:48.283Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10133008},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Several Machine Learning (ML) approaches have been proposed for path loss (PL) prediction in emerging fifth generation and beyond (5G/B5G) cellular communication networks. In the domain of next-generation high-availability communications, flying ad hoc networks (FANETs), which function as clusters of deployable relays or base stations for the on-demand extension of cellular coverage, represent a promising alternative. Thus, the highly accurate path prediction is crucial for the FANETs deployment and for emerging B5G wireless networks design, planning, and optimization. In this paper, we model the path loss in an urban environment for different heights using different ensemble learning approaches. More specifically, we apply five different boosting approaches are, as well a new ensemble model based on a stacked generalization technique for more robust and accurate predictions. The proposed ensemble approaches exhibit great accuracy and efficiency in predicting the path loss for FANETs deployment in cellular networks.},\n bibtype = {inproceedings},\n author = {Rekkas, Vasileios P and Sotiroudis, Sotirios P and Boursianis, Achilles D and Athanasiadou, Georgia and Tsoulos, George V and Christodoulou, Christos and Goudos, Sotirios K},\n doi = {10.23919/EuCAP57121.2023.10133008},\n booktitle = {2023 17th European Conference on Antennas and Propagation (EuCAP)}\n}
\n
\n\n\n
\n Several Machine Learning (ML) approaches have been proposed for path loss (PL) prediction in emerging fifth generation and beyond (5G/B5G) cellular communication networks. In the domain of next-generation high-availability communications, flying ad hoc networks (FANETs), which function as clusters of deployable relays or base stations for the on-demand extension of cellular coverage, represent a promising alternative. Thus, the highly accurate path prediction is crucial for the FANETs deployment and for emerging B5G wireless networks design, planning, and optimization. In this paper, we model the path loss in an urban environment for different heights using different ensemble learning approaches. More specifically, we apply five different boosting approaches are, as well a new ensemble model based on a stacked generalization technique for more robust and accurate predictions. The proposed ensemble approaches exhibit great accuracy and efficiency in predicting the path loss for FANETs deployment in cellular networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modified Bow-Tie Antenna Design Using Artificial Hummingbird Algorithm for Wireless Power Transfer IoT Applications.\n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Griva, A., I.; Rekkas, V., P.; Iliadis, L., A.; Sotiroudis, S., P.; Diamantoulakis, P.; Lagkas, T.; Sarigiannidis, P.; Goudos, S., K.; Christodoulou, C.; and Karagiannidis, G., K.\n\n\n \n\n\n\n In 2023 17th European Conference on Antennas and Propagation (EuCAP), pages 1-5, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Modified Bow-Tie Antenna Design Using Artificial Hummingbird Algorithm for Wireless Power Transfer IoT Applications},\n type = {inproceedings},\n year = {2023},\n keywords = {Wireless communication;Wireless sensor networks;Ti},\n pages = {1-5},\n id = {a8b95a28-76f1-348c-bd35-3abb127967e7},\n created = {2023-06-01T16:42:48.294Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-06-01T16:42:48.294Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10133339},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The advent of the Internet of Things has allowed the re-usability of established techniques combined with emerging technologies. In the TERMINET project, several key-enabling technologies in an IoT ecosystem are explored. The smart farming paradigm is one of the realistic use cases of the project, in which Wireless Power Transfer, assisted by an Unmanned Aerial Vehicle, will be demonstrated as a proof-of-concept, to deliver energy in wireless sensor networks. In this work, we provide a feasible solution of a rectifying antenna module in a rectenna system, which operates in the Wi-Fi 2.4 GHz frequency band. The proposed antenna is optimized by utilizing the Artificial Hummingbird Algorithm. Numerical results demonstrate excellent performance of the proposed antenna, in terms of the key characteristics of reflection coefficient, input impedance, realized gain, and efficiency.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Papadopoulou, Maria S and Griva, Aikaterini I and Rekkas, Vasileios P and Iliadis, Lazaros A and Sotiroudis, Sotirios P and Diamantoulakis, Panagiotis and Lagkas, Thomas and Sarigiannidis, Panagiotis and Goudos, Sotirios K and Christodoulou, Christos and Karagiannidis, George K},\n doi = {10.23919/EuCAP57121.2023.10133339},\n booktitle = {2023 17th European Conference on Antennas and Propagation (EuCAP)}\n}
\n
\n\n\n
\n The advent of the Internet of Things has allowed the re-usability of established techniques combined with emerging technologies. In the TERMINET project, several key-enabling technologies in an IoT ecosystem are explored. The smart farming paradigm is one of the realistic use cases of the project, in which Wireless Power Transfer, assisted by an Unmanned Aerial Vehicle, will be demonstrated as a proof-of-concept, to deliver energy in wireless sensor networks. In this work, we provide a feasible solution of a rectifying antenna module in a rectenna system, which operates in the Wi-Fi 2.4 GHz frequency band. The proposed antenna is optimized by utilizing the Artificial Hummingbird Algorithm. Numerical results demonstrate excellent performance of the proposed antenna, in terms of the key characteristics of reflection coefficient, input impedance, realized gain, and efficiency.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Triple-band Modified Printed Inverted-F Antenna Design for WI-FI-7 Applications.\n \n \n \n\n\n \n Iliadis, L., A.; Rekkas, V., P.; Boursianis, A., D.; Sarigiannidis, P.; Karagiannidis, G., K.; Christodoulou, C.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 17th European Conference on Antennas and Propagation (EuCAP), pages 1-4, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Triple-band Modified Printed Inverted-F Antenna Design for WI-FI-7 Applications},\n type = {inproceedings},\n year = {2023},\n keywords = {Fabrication;Stripline;Optimization methods;Europe;},\n pages = {1-4},\n id = {212fea64-7511-3134-9a2d-1f21c37bb659},\n created = {2023-06-01T16:42:48.414Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-06-01T16:42:48.414Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10133464},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {WI-FI-6/6E is now commercialized and the WI-FI community is currently developing the IEEE 802.11be standard, namely WI-FI-7, which will offer enhanced throughput and higher data rate than its predecessors. In this article, a compact triple-band printed inverted-F (IF) antenna operating at 2.4 GHz, 5 GHz, and 6 GHz frequency bands is designed for WI-FI-7 applications. We design a novel antenna structure that is well-suited for triple-band operation. The core idea is to use a stripline as a feeder that also couples two modified IF designs. A nature-inspired optimization method, namely the artificial hummingbird algorithm (AHA), is used to achieve an optimal design solution for the triple-band IF antenna. Computed results demonstrate that the proposed antenna achieves satisfactory results regarding the reflection coefficient and the realized gain in all the frequency bands of interest.},\n bibtype = {inproceedings},\n author = {Iliadis, Lazaros A and Rekkas, Vasileios P and Boursianis, Achilles D and Sarigiannidis, Panagiotis and Karagiannidis, George K and Christodoulou, Christos and Goudos, Sotirios K},\n doi = {10.23919/EuCAP57121.2023.10133464},\n booktitle = {2023 17th European Conference on Antennas and Propagation (EuCAP)}\n}
\n
\n\n\n
\n WI-FI-6/6E is now commercialized and the WI-FI community is currently developing the IEEE 802.11be standard, namely WI-FI-7, which will offer enhanced throughput and higher data rate than its predecessors. In this article, a compact triple-band printed inverted-F (IF) antenna operating at 2.4 GHz, 5 GHz, and 6 GHz frequency bands is designed for WI-FI-7 applications. We design a novel antenna structure that is well-suited for triple-band operation. The core idea is to use a stripline as a feeder that also couples two modified IF designs. A nature-inspired optimization method, namely the artificial hummingbird algorithm (AHA), is used to achieve an optimal design solution for the triple-band IF antenna. Computed results demonstrate that the proposed antenna achieves satisfactory results regarding the reflection coefficient and the realized gain in all the frequency bands of interest.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Aperture-coupled Bowtie Patch Antenna Design for Autonomous Driving Applications.\n \n \n \n\n\n \n Iliadis, L., A.; Boursianis, A., D.; Rekkas, V., P.; Zaharis, Z., D.; Koulouridis, S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 International Workshop on Antenna Technology (iWAT), pages 1-4, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Aperture-coupled Bowtie Patch Antenna Design for Autonomous Driving Applications},\n type = {inproceedings},\n year = {2023},\n pages = {1-4},\n id = {9bf40190-f2e6-3b51-bea0-84f058c30d2a},\n created = {2023-07-11T05:28:41.625Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-11T05:28:41.625Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10171621},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Autonomous driving will reshape transportation networks, offering at the same time many benefits such as safety, reliable vehicle-to-vehicle communication, and extended telecommunications. For a self-driving vehicle to navigate freely and perceive its environment, it is necessary to be equipped with many sensors. Automotive radars and antenna arrays that operate at 76–81 GHz have been proposed as key elements in future autonomous vehicles. In this work, an aperture-coupled bowtie antenna is designed utilizing hunger games search optimization. The proposed element achieves quite satisfactory values of return loss and gain, as well as broadband operation at 76 GHz - 81 GHz.},\n bibtype = {inproceedings},\n author = {Iliadis, Lazaros A and Boursianis, Achilles D and Rekkas, Vasileios P and Zaharis, Zaharias D and Koulouridis, Stavros and Goudos, Sotirios K},\n doi = {10.1109/iWAT57058.2023.10171621},\n booktitle = {2023 International Workshop on Antenna Technology (iWAT)}\n}
\n
\n\n\n
\n Autonomous driving will reshape transportation networks, offering at the same time many benefits such as safety, reliable vehicle-to-vehicle communication, and extended telecommunications. For a self-driving vehicle to navigate freely and perceive its environment, it is necessary to be equipped with many sensors. Automotive radars and antenna arrays that operate at 76–81 GHz have been proposed as key elements in future autonomous vehicles. In this work, an aperture-coupled bowtie antenna is designed utilizing hunger games search optimization. The proposed element achieves quite satisfactory values of return loss and gain, as well as broadband operation at 76 GHz - 81 GHz.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Construction of Piecewise Chaotic Maps With Tunable Statistical Mean.\n \n \n \n\n\n \n Moysis, L.; Lawnik, M.; Baptista, M., S.; Goudos, S.; and Volos, C.\n\n\n \n\n\n\n In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Construction of Piecewise Chaotic Maps With Tunable Statistical Mean},\n type = {inproceedings},\n year = {2023},\n keywords = {Chaos;Interpolation;Circuits and systems;Time seri},\n pages = {1-4},\n id = {db8e0f10-fa58-3c6b-94ff-115b8e4352cf},\n created = {2023-07-18T07:56:57.161Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-18T07:56:57.161Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10176612},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In numerous chaos based applications, it is often important to use chaotic maps that showcase desirable statistical characteristics, that can improve the performance of the designed architecture. Yet, it is hard to design maps that can achieve the desired statistical properties. Motivated by this, this work considers a family of piecewise chaotic maps, and studies how tuning their parameters can affect the mean value of the generated chaotic trajectories. Such a family of maps can be highly practical in future chaos based applications.},\n bibtype = {inproceedings},\n author = {Moysis, Lazaros and Lawnik, Marcin and Baptista, Murilo S and Goudos, Sotirios and Volos, Christos},\n doi = {10.1109/MOCAST57943.2023.10176612},\n booktitle = {2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n In numerous chaos based applications, it is often important to use chaotic maps that showcase desirable statistical characteristics, that can improve the performance of the designed architecture. Yet, it is hard to design maps that can achieve the desired statistical properties. Motivated by this, this work considers a family of piecewise chaotic maps, and studies how tuning their parameters can affect the mean value of the generated chaotic trajectories. Such a family of maps can be highly practical in future chaos based applications.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Greek Orthodox Church Hymns Recognition Using Deep Learning Techniques.\n \n \n \n\n\n \n Tsakatanis, N.; Iliadis, L., A.; Boursianis, A., D.; Kokkinidis, K., D.; Patronas, G.; Serafeim, P.; Papadopoulou, M., S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-3, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Greek Orthodox Church Hymns Recognition Using Deep Learning Techniques},\n type = {inproceedings},\n year = {2023},\n keywords = {Deep learning;Performance evaluation;Circuits and},\n pages = {1-3},\n id = {dd301592-add8-33ee-a7fb-9162811c4610},\n created = {2023-07-18T07:56:57.194Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-18T07:56:57.194Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10176857},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Deep learning techniques have found numerous applications in the sector of cultural and religious heritage. Greek Orthodox Church hymns are examples of Byzantine religious tradition. Their performance is governed by stringent rules not observed in other cultures. This work trains a novel shallow convolutional neural network to identify Greek Orthodox Church hymns using a private dataset. For ten of the most frequently chanted hymns, the deep learning model achieves over 98% accuracy. AlexNet and MobileNetV2 are trained on the same data to evaluate their performance. Additional analysis is conducted to validate the obtained results.},\n bibtype = {inproceedings},\n author = {Tsakatanis, Nikolaos and Iliadis, Lazaros A and Boursianis, Achilles D and Kokkinidis, Konstantinos-Iraklis D and Patronas, Georgios and Serafeim, Pavlos and Papadopoulou, Maria S and Goudos, Sotirios K},\n doi = {10.1109/MOCAST57943.2023.10176857},\n booktitle = {2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n Deep learning techniques have found numerous applications in the sector of cultural and religious heritage. Greek Orthodox Church hymns are examples of Byzantine religious tradition. Their performance is governed by stringent rules not observed in other cultures. This work trains a novel shallow convolutional neural network to identify Greek Orthodox Church hymns using a private dataset. For ten of the most frequently chanted hymns, the deep learning model achieves over 98% accuracy. AlexNet and MobileNetV2 are trained on the same data to evaluate their performance. Additional analysis is conducted to validate the obtained results.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 5G Core PFCP Intrusion Detection Dataset.\n \n \n \n\n\n \n Amponis, G.; Radoglou-Grammatikis, P.; Nakas, G.; Goudos, S.; Argyriou, V.; Lagkas, T.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {5G Core PFCP Intrusion Detection Dataset},\n type = {inproceedings},\n year = {2023},\n keywords = {Industries;Privacy;Protocols;5G mobile communicati},\n pages = {1-4},\n id = {633736bd-ef3f-3546-be79-385d1ab859a7},\n created = {2023-07-18T07:56:57.424Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-18T07:56:57.424Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10176693},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The rapid evolution of the 5G environments introduces several benefits, such as faster data transfer speeds, lower latency and energy efficiency. However, this situation brings also critical cybersecurity issues, such as the complex and increased attack surface, privacy concerns and the security of the 5G core network functions. Therefore, it is evident that the role of intrusion detection mechanisms empowered with Artificial Intelligence (AI) models is crucial. Therefore, in this paper, we introduce a labelled security dataset called 5GC PFCP Intrusion Detection Dataset. This dataset includes a set of network flow statistics that can be used by AI detection models to recognise cyberattacks against the Packet Forwarding Control Protocol (PFCP). PFCP is used for the N4 interface between the Session Management Function (SMF) and the User Plane Function (UPF) in the 5G core. In particular, four PFCP attacks are investigated in this paper, including the relevant network traffic data in terms of pcap files and the Transmission Control Protocol (TCP)/Internet Protocol (IP) and application-layer statistics. This dataset is already publicly available in IEEE Dataport and Zenodo.},\n bibtype = {inproceedings},\n author = {Amponis, George and Radoglou-Grammatikis, Panagiotis and Nakas, George and Goudos, Sotirios and Argyriou, Vasileios and Lagkas, Thomas and Sarigiannidis, Panagiotis},\n doi = {10.1109/MOCAST57943.2023.10176693},\n booktitle = {2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n The rapid evolution of the 5G environments introduces several benefits, such as faster data transfer speeds, lower latency and energy efficiency. However, this situation brings also critical cybersecurity issues, such as the complex and increased attack surface, privacy concerns and the security of the 5G core network functions. Therefore, it is evident that the role of intrusion detection mechanisms empowered with Artificial Intelligence (AI) models is crucial. Therefore, in this paper, we introduce a labelled security dataset called 5GC PFCP Intrusion Detection Dataset. This dataset includes a set of network flow statistics that can be used by AI detection models to recognise cyberattacks against the Packet Forwarding Control Protocol (PFCP). PFCP is used for the N4 interface between the Session Management Function (SMF) and the User Plane Function (UPF) in the 5G core. In particular, four PFCP attacks are investigated in this paper, including the relevant network traffic data in terms of pcap files and the Transmission Control Protocol (TCP)/Internet Protocol (IP) and application-layer statistics. This dataset is already publicly available in IEEE Dataport and Zenodo.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Energy Consumption Assessment in Refrigeration Equipment: The SmartFridge Project.\n \n \n \n\n\n \n Griva, A., I.; Rekkas, V., P.; Koritsoglou, K.; Sotiroudis, S., P.; Boursianis, A., D.; Papadopoulou, M., S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Energy Consumption Assessment in Refrigeration Equipment: The SmartFridge Project},\n type = {inproceedings},\n year = {2023},\n keywords = {Energy consumption;Circuits and systems;Computatio},\n pages = {1-4},\n id = {e0cfc328-fce9-3bac-b95b-c7dc40e0af89},\n created = {2023-07-18T07:56:57.440Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-18T07:56:57.440Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10176514},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Energy consumption is a key factor in environmental sustainability and the economy. In the next 30 years, global food production will need to increase rapidly and, in this context, refrigeration will play a pivotal role. In the SmartFridge project, several aspects of the operating cycle of refrigeration equipment are explored. Energy consumption reduction is one of the most important use cases of the project. For this reason, this work provides an assessment of three scenarios in a refrigerator model, in which the indoor temperature and moisture, as well as the interior temperature, are explored to quantify their impact on energy consumption.},\n bibtype = {inproceedings},\n author = {Griva, Aikaterini I and Rekkas, Vasileios P and Koritsoglou, Kyriakos and Sotiroudis, Sotirios P and Boursianis, Achilles D and Papadopoulou, Maria S and Goudos, Sotirios K},\n doi = {10.1109/MOCAST57943.2023.10176514},\n booktitle = {2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n Energy consumption is a key factor in environmental sustainability and the economy. In the next 30 years, global food production will need to increase rapidly and, in this context, refrigeration will play a pivotal role. In the SmartFridge project, several aspects of the operating cycle of refrigeration equipment are explored. Energy consumption reduction is one of the most important use cases of the project. For this reason, this work provides an assessment of three scenarios in a refrigerator model, in which the indoor temperature and moisture, as well as the interior temperature, are explored to quantify their impact on energy consumption.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Model-Agnostic Meta-Learning Techniques: A State-of-The-Art Short Review.\n \n \n \n\n\n \n Griva, A., I.; Boursianis, A., D.; Iliadis, L., A.; Sarigiannidis, P.; Karagiannidis, G.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Model-Agnostic Meta-Learning Techniques: A State-of-The-Art Short Review},\n type = {inproceedings},\n year = {2023},\n keywords = {Metalearning;Training;Memory management;Stability},\n pages = {1-4},\n id = {b642cfac-2a91-32a0-b53d-3711424ba326},\n created = {2023-07-18T07:56:57.471Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-18T07:56:57.471Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10176893},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In the last few years, novel meta-learning techniques have established a new field of research. Great emphasis is given to few-shot learning approaches, where the model is trained by using only a few training examples. In this work, a review of several model-agnostic meta-learning methodologies (MAML) is presented. Firstly, we identify and discuss the typical characteristics of the first proposed MAML algorithm. Next, we classify the model-agnostic approaches into three main categories: Regular gradient descent MAML, Hessian-free MAML, and Bayesian MALM, by presenting their advantages and limitations. Finally, we conclude this work with further discussion and highlight the future research directions.},\n bibtype = {inproceedings},\n author = {Griva, Aikaterini I and Boursianis, Achilles D and Iliadis, Lazaros A and Sarigiannidis, Panagiotis and Karagiannidis, George and Goudos, Sotirios K},\n doi = {10.1109/MOCAST57943.2023.10176893},\n booktitle = {2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n In the last few years, novel meta-learning techniques have established a new field of research. Great emphasis is given to few-shot learning approaches, where the model is trained by using only a few training examples. In this work, a review of several model-agnostic meta-learning methodologies (MAML) is presented. Firstly, we identify and discuss the typical characteristics of the first proposed MAML algorithm. Next, we classify the model-agnostic approaches into three main categories: Regular gradient descent MAML, Hessian-free MAML, and Bayesian MALM, by presenting their advantages and limitations. Finally, we conclude this work with further discussion and highlight the future research directions.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Evaluating the Effect of Volatile Federated Timeseries on Modern DNNs: Attention over Long/Short Memory.\n \n \n \n\n\n \n Siniosoglou, I.; Xouveroudis, K.; Argyriou, V.; Lagkas, T.; Goudos, S., K.; Psannis, K., E.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-6, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Evaluating the Effect of Volatile Federated Timeseries on Modern DNNs: Attention over Long/Short Memory},\n type = {inproceedings},\n year = {2023},\n keywords = {Training;Data privacy;Federated learning;Predictiv},\n pages = {1-6},\n id = {e0d313d1-82be-3c1f-828f-0cbb25f80635},\n created = {2023-07-18T07:56:57.495Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-18T07:56:57.495Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10176585},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In regards to the field of trend forecasting in time series, many popular Deep Learning (DL) methods such as Long Short Term Memory (LSTM) models have been the gold standard for a long time. However, depending on the domain and application, it has been shown that a new approach can be implemented and possibly be more beneficial, the Transformer deep neural networks. Moreover, one can incorporate Federated Learning (FL) in order to further enhance the prospective utility of the models, enabling multiple data providers to jointly train on a common model, while maintaining the privacy of their data. In this paper, we use an experimental Federated Learning System that employs both Transformer and LSTM models on a variety of datasets. The sytem receives data from multiple clients and uses federation to create an optimized global model. The potential of Federated Learning in real-time forecasting is explored by comparing the federated approach with conventional local training. Furthermore, a comparison is made between the performance of the Transformer and its equivalent LSTM in order to determine which one is more effective in each given domain, which shows that the Transformer model can produce better results, especially when optimised by the FL process.},\n bibtype = {inproceedings},\n author = {Siniosoglou, Ilias and Xouveroudis, Konstantinos and Argyriou, Vasileios and Lagkas, Thomas and Goudos, Sotirios K and Psannis, Konstantinos E and Sarigiannidis, Panagiotis},\n doi = {10.1109/MOCAST57943.2023.10176585},\n booktitle = {2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n In regards to the field of trend forecasting in time series, many popular Deep Learning (DL) methods such as Long Short Term Memory (LSTM) models have been the gold standard for a long time. However, depending on the domain and application, it has been shown that a new approach can be implemented and possibly be more beneficial, the Transformer deep neural networks. Moreover, one can incorporate Federated Learning (FL) in order to further enhance the prospective utility of the models, enabling multiple data providers to jointly train on a common model, while maintaining the privacy of their data. In this paper, we use an experimental Federated Learning System that employs both Transformer and LSTM models on a variety of datasets. The sytem receives data from multiple clients and uses federation to create an optimized global model. The potential of Federated Learning in real-time forecasting is explored by comparing the federated approach with conventional local training. Furthermore, a comparison is made between the performance of the Transformer and its equivalent LSTM in order to determine which one is more effective in each given domain, which shows that the Transformer model can produce better results, especially when optimised by the FL process.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Real-time Chaos-based Audio Encryption Scheme.\n \n \n \n\n\n \n Kafetzis, I.; Volos, C.; Nistazakis, H., E.; Goudos, S.; and Bardis, N., G.\n\n\n \n\n\n\n In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A Real-time Chaos-based Audio Encryption Scheme},\n type = {inproceedings},\n year = {2023},\n keywords = {Circuits and systems;Chaotic communication;Paralle},\n pages = {1-4},\n id = {e80b3c70-e22d-370a-91a1-6f31a27abc7b},\n created = {2023-07-18T07:56:57.513Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-18T07:56:57.513Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10176599},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This work introduces a chaos based audio encryption scheme, along with its implementation, which works in real time. Initially, a novel chaotic map is introduced, and using this map a Pseudo-Random Bit generator is defined. The encryption scheme is defined based on the above and utilizes parallel computing to encrypt recorded audio "on the fly", rather than collecting the complete recording and encrypting afterwards, making the method suitable for real-time encryption. The security of the proposed method is evaluated via statistical tests. Finally, an Open-Source implementation of the proposed method using Python is given.},\n bibtype = {inproceedings},\n author = {Kafetzis, Ioannis and Volos, Christos and Nistazakis, Hector E and Goudos, Sotirios and Bardis, Nikolaos G},\n doi = {10.1109/MOCAST57943.2023.10176599},\n booktitle = {2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n This work introduces a chaos based audio encryption scheme, along with its implementation, which works in real time. Initially, a novel chaotic map is introduced, and using this map a Pseudo-Random Bit generator is defined. The encryption scheme is defined based on the above and utilizes parallel computing to encrypt recorded audio \"on the fly\", rather than collecting the complete recording and encrypting afterwards, making the method suitable for real-time encryption. The security of the proposed method is evaluated via statistical tests. Finally, an Open-Source implementation of the proposed method using Python is given.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n The Challenges of Music Deep Learning for Traditional Music.\n \n \n \n\n\n \n Moysis, L.; Iliadis, L., A.; Sotiroudis, S., P.; Kokkinidis, K.; Sarigiannidis, P.; Nikolaidis, S.; Volos, C.; Boursianis, A., D.; Babas, D.; Papadopoulou, M., S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-5, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {The Challenges of Music Deep Learning for Traditional Music},\n type = {inproceedings},\n year = {2023},\n keywords = {Deep learning;Training;Databases;Instruments;Music},\n pages = {1-5},\n id = {f2aa4353-85e1-3347-84e2-9d71b11a7449},\n created = {2023-07-18T07:56:57.545Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-18T07:56:57.545Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10176775},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Numerous applications for music listeners, educators, DJs, and musicians have been created over the past decade as the field of Music Deep Learning has expanded. Evidently, the majority of works rely on training their architectures using well-established databases, which consist primarily of Western popular music genres. This creates a deficiency in applications focusing on traditional and regional music, which are vital to preserving culture. As an increasing number of research groups begin to develop works centered on traditional music, several practical challenges for applying deep learning arise. This work discusses these issues and the future of deep learning in the study of traditional music.},\n bibtype = {inproceedings},\n author = {Moysis, Lazaros and Iliadis, Lazaros Alexios and Sotiroudis, Sotirios P and Kokkinidis, Kostas and Sarigiannidis, Panagiotis and Nikolaidis, Spiridon and Volos, Christos and Boursianis, Achilles D and Babas, Dimitrios and Papadopoulou, Maria S and Goudos, Sotirios K},\n doi = {10.1109/MOCAST57943.2023.10176775},\n booktitle = {2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n Numerous applications for music listeners, educators, DJs, and musicians have been created over the past decade as the field of Music Deep Learning has expanded. Evidently, the majority of works rely on training their architectures using well-established databases, which consist primarily of Western popular music genres. This creates a deficiency in applications focusing on traditional and regional music, which are vital to preserving culture. As an increasing number of research groups begin to develop works centered on traditional music, several practical challenges for applying deep learning arise. This work discusses these issues and the future of deep learning in the study of traditional music.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Ensemble Learning Technique for Artificial Intelligence Assisted IVF Applications.\n \n \n \n\n\n \n Vergos, G.; Iliadis, L., A.; Kritopoulou, P.; Papatheodorou, A.; Boursianis, A., D.; Kokkinidis, K., D.; Papadopoulou, M., S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Ensemble Learning Technique for Artificial Intelligence Assisted IVF Applications},\n type = {inproceedings},\n year = {2023},\n keywords = {Deep learning;Circuits and systems;Feature extract},\n pages = {1-4},\n id = {ff531e0d-762d-31fb-bfd2-d2a866ee9b9c},\n created = {2023-07-18T07:56:57.605Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-18T07:56:57.605Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10176690},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In-vitro fertilization (IVF) is considered one of the most effective assisted reproductive approaches. However, it involves a series of complex and expensive procedures, that result in approximately 30% success rate. New technological concepts, like deep learning (DL), are required to increase the success rate while simplifying the procedure. DL techniques can automatically extract valuable features from the available data, can be flexible, and can work efficiently on multiple problems. Motivated by these characteristics, in this work, a DL ensemble model is trained on a private dataset to classify blastocysts’ images. Further analysis is conducted to provide insights for future research.},\n bibtype = {inproceedings},\n author = {Vergos, George and Iliadis, Lazaros Alexios and Kritopoulou, Paraskevi and Papatheodorou, Achilleas and Boursianis, Achilles D and Kokkinidis, Konstantinos-Iraklis D and Papadopoulou, Maria S and Goudos, Sotirios K},\n doi = {10.1109/MOCAST57943.2023.10176690},\n booktitle = {2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n In-vitro fertilization (IVF) is considered one of the most effective assisted reproductive approaches. However, it involves a series of complex and expensive procedures, that result in approximately 30% success rate. New technological concepts, like deep learning (DL), are required to increase the success rate while simplifying the procedure. DL techniques can automatically extract valuable features from the available data, can be flexible, and can work efficiently on multiple problems. Motivated by these characteristics, in this work, a DL ensemble model is trained on a private dataset to classify blastocysts’ images. Further analysis is conducted to provide insights for future research.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Analysis of Public Space in Historic Districts Based on Community Governance and Neural Networks.\n \n \n \n\n\n \n Ding, F.; Ren, Y.; Goudos, S.; and Zhao, Y.\n\n\n \n\n\n\n IEEE Access, 11: 81021-81032. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Analysis of Public Space in Historic Districts Based on Community Governance and Neural Networks},\n type = {article},\n year = {2023},\n pages = {81021-81032},\n volume = {11},\n id = {d088ef88-bfa3-3c62-9f81-a453f69cddb2},\n created = {2023-07-20T21:29:17.978Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-08-08T13:52:58.396Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10188893},\n source_type = {article},\n private_publication = {false},\n abstract = {Based on the perspective of community governance, this paper explores the research path of public space renewal in historic city districts. Taking the historical public space of Lhasa city as an example, this paper analyzes the causes of the characteristics of public space, analyzes the logical relationship between public space and urban renewal and community governance, applies the neural network evaluation model. Firstly employed cell rasterization, indicator classification, and population density estimation to calculate the score for each indicator. And then the principal component extracted by principal component analysis is used as the input node of the neural networkit determines the weight of each indicator by adopting the entropy method, based on which it built a multi-dimensional indicator system to evaluate public space satisfaction of historic District of Lhasa and finally, optimizes the pattern of historical public space of Lhasa city by improving the spatial structure. The aim is to create intelligent living blocks and optimize the life mode of historical blocks. Regarding significance, first, from the human-oriented perspective, the exploration of public space renewal in historic districts is in essence a process in which people develop continuously and their needs are continuously satisfied. This approach can meet the multilevel needs of residents at different stages. Second, from a social perspective, the innovative pattern of community governance can help achieve self-satisfaction within the district, radiate to the surrounding industries, and relieve the pressure of social employment. Third, from the perspective of urban renewal implementation, research on the public space renewal of historic districts can help promote the balance of the social-ecological environment, improve regional governance and promote the high-quality development of cities. The future outlook is presented.},\n bibtype = {article},\n author = {Ding, Fan and Ren, Yunying and Goudos, Sotirios and Zhao, Ya},\n doi = {10.1109/ACCESS.2023.3297507},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n Based on the perspective of community governance, this paper explores the research path of public space renewal in historic city districts. Taking the historical public space of Lhasa city as an example, this paper analyzes the causes of the characteristics of public space, analyzes the logical relationship between public space and urban renewal and community governance, applies the neural network evaluation model. Firstly employed cell rasterization, indicator classification, and population density estimation to calculate the score for each indicator. And then the principal component extracted by principal component analysis is used as the input node of the neural networkit determines the weight of each indicator by adopting the entropy method, based on which it built a multi-dimensional indicator system to evaluate public space satisfaction of historic District of Lhasa and finally, optimizes the pattern of historical public space of Lhasa city by improving the spatial structure. The aim is to create intelligent living blocks and optimize the life mode of historical blocks. Regarding significance, first, from the human-oriented perspective, the exploration of public space renewal in historic districts is in essence a process in which people develop continuously and their needs are continuously satisfied. This approach can meet the multilevel needs of residents at different stages. Second, from a social perspective, the innovative pattern of community governance can help achieve self-satisfaction within the district, radiate to the surrounding industries, and relieve the pressure of social employment. Third, from the perspective of urban renewal implementation, research on the public space renewal of historic districts can help promote the balance of the social-ecological environment, improve regional governance and promote the high-quality development of cities. The future outlook is presented.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Low Complexity Deep Learning Framework for Greek Orthodox Church Hymns Classification.\n \n \n \n \n\n\n \n Iliadis, L., A.; Sotiroudis, S., P.; Tsakatanis, N.; Boursianis, A., D.; Kokkinidis, K., D.; Karagiannidis, G., K.; and Goudos, S., K.\n\n\n \n\n\n\n Applied Sciences, 13(15). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"LowWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Low Complexity Deep Learning Framework for Greek Orthodox Church Hymns Classification},\n type = {article},\n year = {2023},\n volume = {13},\n websites = {https://www.mdpi.com/2076-3417/13/15/8638},\n id = {b75e0835-0dcb-3462-9f3b-87fc317cbde7},\n created = {2023-07-27T09:02:11.118Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-07-27T09:02:11.118Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {app13158638},\n source_type = {article},\n private_publication = {false},\n abstract = {The Byzantine religious tradition includes Greek Orthodox Church hymns, which significantly differ from other cultures&rsquo; religious music. Since the deep learning revolution, audio and music signal processing are often approached as computer vision problems. This work trains from scratch three different novel convolutional neural networks on a hymns dataset to perform hymns classification for mobile applications. The audio data are first transformed into Mel-spectrograms and then fed as input to the model. To study in more detail our models&rsquo; performance, two state-of-the-art (SOTA) deep learning models were trained on the same dataset. Our approach outperforms the SOTA models both in terms of accuracy and their characteristics. Additional statistical analysis was conducted to validate the results obtained.},\n bibtype = {article},\n author = {Iliadis, Lazaros Alexios and Sotiroudis, Sotirios P and Tsakatanis, Nikolaos and Boursianis, Achilles D and Kokkinidis, Konstantinos-Iraklis D and Karagiannidis, George K and Goudos, Sotirios K},\n doi = {10.3390/app13158638},\n journal = {Applied Sciences},\n number = {15}\n}
\n
\n\n\n
\n The Byzantine religious tradition includes Greek Orthodox Church hymns, which significantly differ from other cultures’ religious music. Since the deep learning revolution, audio and music signal processing are often approached as computer vision problems. This work trains from scratch three different novel convolutional neural networks on a hymns dataset to perform hymns classification for mobile applications. The audio data are first transformed into Mel-spectrograms and then fed as input to the model. To study in more detail our models’ performance, two state-of-the-art (SOTA) deep learning models were trained on the same dataset. Our approach outperforms the SOTA models both in terms of accuracy and their characteristics. Additional statistical analysis was conducted to validate the results obtained.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Explainable AI-Based Intrusion Detection in the Internet of Things.\n \n \n \n \n\n\n \n Siganos, M.; Radoglou-Grammatikis, P.; Kotsiuba, I.; Markakis, E.; Moscholios, I.; Goudos, S.; and Sarigiannidis, P.\n\n\n \n\n\n\n In Proceedings of the 18th International Conference on Availability, Reliability and Security, of ARES '23, 2023. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"ExplainableWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Explainable AI-Based Intrusion Detection in the Internet of Things},\n type = {inproceedings},\n year = {2023},\n keywords = {Artificial Intelligence,Cybersecurity,Explainable AI,Internet of Things,Intrusion Detection},\n websites = {https://doi.org/10.1145/3600160.3605162},\n publisher = {Association for Computing Machinery},\n city = {New York, NY, USA},\n series = {ARES '23},\n id = {4bf70973-3b48-3686-8ff2-21c10988dc01},\n created = {2023-08-29T19:40:48.944Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-08-29T19:40:48.944Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10.1145/3600160.3605162},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The revolution of Artificial Intelligence (AI) has brought about a significant evolution in the landscape of cyberattacks. In particular, with the increasing power and capabilities of AI, cyberattackers can automate tasks, analyze vast amounts of data, and identify vulnerabilities with greater precision. On the other hand, despite the multiple benefits of the Internet of Things (IoT), it raises severe security issues. Therefore, it is evident that the presence of efficient intrusion detection mechanisms is critical. Although Machine Learning (ML) and Deep Learning (DL)-based IDS have already demonstrated their detection efficiency, they still suffer from false alarms and explainability issues that do not allow security administrators to trust them completely compared to conventional signature/specification-based IDS. In light of the aforementioned remarks, in this paper, we introduce an AI-powered IDS with explainability functions for the IoT. The proposed IDS relies on ML and DL methods, while the SHapley Additive exPlanations (SHAP) method is used to explain decision-making. The evaluation results demonstrate the efficiency of the proposed IDS in terms of detection performance and explainable AI (XAI).},\n bibtype = {inproceedings},\n author = {Siganos, Marios and Radoglou-Grammatikis, Panagiotis and Kotsiuba, Igor and Markakis, Evangelos and Moscholios, Ioannis and Goudos, Sotirios and Sarigiannidis, Panagiotis},\n doi = {10.1145/3600160.3605162},\n booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security}\n}
\n
\n\n\n
\n The revolution of Artificial Intelligence (AI) has brought about a significant evolution in the landscape of cyberattacks. In particular, with the increasing power and capabilities of AI, cyberattackers can automate tasks, analyze vast amounts of data, and identify vulnerabilities with greater precision. On the other hand, despite the multiple benefits of the Internet of Things (IoT), it raises severe security issues. Therefore, it is evident that the presence of efficient intrusion detection mechanisms is critical. Although Machine Learning (ML) and Deep Learning (DL)-based IDS have already demonstrated their detection efficiency, they still suffer from false alarms and explainability issues that do not allow security administrators to trust them completely compared to conventional signature/specification-based IDS. In light of the aforementioned remarks, in this paper, we introduce an AI-powered IDS with explainability functions for the IoT. The proposed IDS relies on ML and DL methods, while the SHapley Additive exPlanations (SHAP) method is used to explain decision-making. The evaluation results demonstrate the efficiency of the proposed IDS in terms of detection performance and explainable AI (XAI).\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-Enabled Intrusion Detection Systems.\n \n \n \n \n\n\n \n Asimopoulos, D., C.; Radoglou-Grammatikis, P.; Makris, I.; Mladenov, V.; Psannis, K., E.; Goudos, S.; and Sarigiannidis, P.\n\n\n \n\n\n\n In Proceedings of the 18th International Conference on Availability, Reliability and Security, of ARES '23, 2023. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"BreachingWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-Enabled Intrusion Detection Systems},\n type = {inproceedings},\n year = {2023},\n keywords = {Adversarial Attacks,Artificial Intelligence,Cybersecurity,Generative Adversarial Networks,Intrusion Detection},\n websites = {https://doi.org/10.1145/3600160.3605163},\n publisher = {Association for Computing Machinery},\n city = {New York, NY, USA},\n series = {ARES '23},\n id = {64927819-82e8-379b-ad84-ce5403b64172},\n created = {2023-08-29T19:40:48.948Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-08-29T19:40:48.948Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10.1145/3600160.3605163},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In the digital age of the hyper-connected Critical Infrastructures (CIs), the role of the smart electrical grid is crucial, providing several benefits, such as improved grid resilience, efficient energy distribution and smart load and response management. However, despite the several advantages, the rapid evolution of the heterogeneous technologies involved in the smart electrical grid increases the attack surface. In this paper, we focus first our attention on how Artificial Intelligence (AI) can be used to protect the smart electrical grid in terms of detecting efficiently potential cyberattacks and anomalies. Secondly, we investigate how AI can be used to trick AI-enabled detection services, thus resulting in false alarms. In particular, we emphasise on cyberattacks against IEC 60870-5-104, an industrial communication protocol which is widely used in the energy domain. Therefore, a relevant AI-powered Intrusion Detection System (IDS) is provided, utilising strong Machine Learning (ML)/Deep Learning (DL) methods, such as Decision Tree, Random Forest, XGBOOST and deep MultiLayer Perceptron (MLP). On the other hand, we investigate how adversarial attacks can affect the detection performance of the previous IDS. For this purpose, the Fast Gradient Signed Method (FGSM) is examined, and a Conditional Tabular Generative Adversarial Network (CTGAN) adversarial attack generator is implemented. The evaluation results demonstrate the efficiency of the proposed IDS and the aforementioned adversarial attacks.},\n bibtype = {inproceedings},\n author = {Asimopoulos, Dimitrios Christos and Radoglou-Grammatikis, Panagiotis and Makris, Ioannis and Mladenov, Valeri and Psannis, Konstantinos E and Goudos, Sotirios and Sarigiannidis, Panagiotis},\n doi = {10.1145/3600160.3605163},\n booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security}\n}
\n
\n\n\n
\n In the digital age of the hyper-connected Critical Infrastructures (CIs), the role of the smart electrical grid is crucial, providing several benefits, such as improved grid resilience, efficient energy distribution and smart load and response management. However, despite the several advantages, the rapid evolution of the heterogeneous technologies involved in the smart electrical grid increases the attack surface. In this paper, we focus first our attention on how Artificial Intelligence (AI) can be used to protect the smart electrical grid in terms of detecting efficiently potential cyberattacks and anomalies. Secondly, we investigate how AI can be used to trick AI-enabled detection services, thus resulting in false alarms. In particular, we emphasise on cyberattacks against IEC 60870-5-104, an industrial communication protocol which is widely used in the energy domain. Therefore, a relevant AI-powered Intrusion Detection System (IDS) is provided, utilising strong Machine Learning (ML)/Deep Learning (DL) methods, such as Decision Tree, Random Forest, XGBOOST and deep MultiLayer Perceptron (MLP). On the other hand, we investigate how adversarial attacks can affect the detection performance of the previous IDS. For this purpose, the Fast Gradient Signed Method (FGSM) is examined, and a Conditional Tabular Generative Adversarial Network (CTGAN) adversarial attack generator is implemented. The evaluation results demonstrate the efficiency of the proposed IDS and the aforementioned adversarial attacks.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On-Chain and Off-Chain Scalability Techniques.\n \n \n \n \n\n\n \n Cai, T.; Chen, W.; Psannis, K., E.; Goudos, S., K.; Yu, Y.; Zheng, Z.; and Wan, S.\n\n\n \n\n\n\n Blockchain Scalability, pages 81-96. Chen, W.; Zheng, Z.; and Huang, H., editor(s). Springer Nature Singapore, 2023.\n \n\n\n\n
\n\n\n\n \n \n \"BlockchainWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2023},\n pages = {81-96},\n websites = {https://doi.org/10.1007/978-981-99-1059-5_3},\n publisher = {Springer Nature Singapore},\n city = {Singapore},\n id = {7bc3f703-b1c9-3a13-a7b7-770fb028ae4a},\n created = {2023-09-11T17:34:25.794Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-09-11T17:34:25.794Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Cai2023},\n source_type = {inbook},\n private_publication = {false},\n abstract = {In the future of sharing economy, billions of underutilized IoT devices will be deployed to enable a powerful and large-scale sharing market that produces economic, environmental, and social benefits. Given the fact that communications in numerous IoT devices through wireless links are unreliable, blockchain technology, as a promising solution, has emerged to achieve reliable and secure sharing services in a decentralized manner. However, applying blockchain in large-scale wireless networks confronts scalability challenges. This motivates us to propose a real-time, trusted data interactive, and fine-grained transaction supportable sharing framework, the core of which is a novel two-layer scaling blockchain design. In the on-chain layer, sharing-oriented sharding is employed to enable secure and efficient processing of macro-transactions on the chain. In the off-chain layer, cross-zone off-chain channels are set up to provide real-time sharing transactions with high-frequency micro-trading scenarios. Finally, a proof-of-concept case study about electric vehicle sharing data is implemented with experimental results to demonstrate the feasibility of our framework.},\n bibtype = {inbook},\n author = {Cai, Ting and Chen, Wuhui and Psannis, Kostas E and Goudos, Sotirios K and Yu, Yang and Zheng, Zibin and Wan, Shaohua},\n editor = {Chen, Wuhui and Zheng, Zibin and Huang, Huawei},\n doi = {10.1007/978-981-99-1059-5_3},\n chapter = {On-Chain and Off-Chain Scalability Techniques},\n title = {Blockchain Scalability}\n}
\n
\n\n\n
\n In the future of sharing economy, billions of underutilized IoT devices will be deployed to enable a powerful and large-scale sharing market that produces economic, environmental, and social benefits. Given the fact that communications in numerous IoT devices through wireless links are unreliable, blockchain technology, as a promising solution, has emerged to achieve reliable and secure sharing services in a decentralized manner. However, applying blockchain in large-scale wireless networks confronts scalability challenges. This motivates us to propose a real-time, trusted data interactive, and fine-grained transaction supportable sharing framework, the core of which is a novel two-layer scaling blockchain design. In the on-chain layer, sharing-oriented sharding is employed to enable secure and efficient processing of macro-transactions on the chain. In the off-chain layer, cross-zone off-chain channels are set up to provide real-time sharing transactions with high-frequency micro-trading scenarios. Finally, a proof-of-concept case study about electric vehicle sharing data is implemented with experimental results to demonstrate the feasibility of our framework.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Generating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks.\n \n \n \n \n\n\n \n Amponis, G.; Radoglou-Grammatikis, P.; Lagkas, T.; Ouzounidis, S.; Zevgara, M.; Moscholios, I.; Goudos, S.; and Sarigiannidis, P.\n\n\n \n\n\n\n AEU - International Journal of Electronics and Communications, 171: 154913. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"GeneratingWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Generating full-stack 5G security datasets: IP-layer and core network persistent PDU session attacks},\n type = {article},\n year = {2023},\n keywords = {5G datasets,5G testbed,Cybersecurity events,PFCP,Radio access networks},\n pages = {154913},\n volume = {171},\n websites = {https://www.sciencedirect.com/science/article/pii/S1434841123003874},\n id = {f4286754-74b0-34e2-8db5-3d4fdecaf875},\n created = {2023-09-21T15:34:32.157Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-09-28T15:50:14.052Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {AMPONIS2023154913},\n source_type = {article},\n private_publication = {false},\n abstract = {With the increasing number of users accessing the Internet over 5G systems, security concerns have become a major challenge that needs to be addressed. This paper proposes a solution to this challenge by proposing a system to train defenders to handle cyber attacks and develop intrusion detection systems that can timely notify of security events, also within the 5G core itself. This paper builds on our previous contributions on a containerized 5G testbed and proposes a novel set of full-stack attacks targeting networked hosts and 5G Network Functions (NFs) alike. Importantly, we identify the potential to generate persistent Packet Forwarding and Control Protocol (PFCP) Denial of Service (DoS) attacks to deprive end users of connectivity to the data network, even in the event of a handover to another gNodeB. This framework is envisaged to facilitate the generation of highly diverse and realistic datasets, containing malicious GPRS Tunneling Protocol (GTP) and PFCP traffic captured over 5G interfaces, thereby enhancing the security of next-generation networks.},\n bibtype = {article},\n author = {Amponis, George and Radoglou-Grammatikis, Panagiotis and Lagkas, Thomas and Ouzounidis, Savas and Zevgara, Maria and Moscholios, Ioannis and Goudos, Sotirios and Sarigiannidis, Panagiotis},\n doi = {https://doi.org/10.1016/j.aeue.2023.154913},\n journal = {AEU - International Journal of Electronics and Communications}\n}
\n
\n\n\n
\n With the increasing number of users accessing the Internet over 5G systems, security concerns have become a major challenge that needs to be addressed. This paper proposes a solution to this challenge by proposing a system to train defenders to handle cyber attacks and develop intrusion detection systems that can timely notify of security events, also within the 5G core itself. This paper builds on our previous contributions on a containerized 5G testbed and proposes a novel set of full-stack attacks targeting networked hosts and 5G Network Functions (NFs) alike. Importantly, we identify the potential to generate persistent Packet Forwarding and Control Protocol (PFCP) Denial of Service (DoS) attacks to deprive end users of connectivity to the data network, even in the event of a handover to another gNodeB. This framework is envisaged to facilitate the generation of highly diverse and realistic datasets, containing malicious GPRS Tunneling Protocol (GTP) and PFCP traffic captured over 5G interfaces, thereby enhancing the security of next-generation networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Investigating the Relationship of User Acceptance to the Characteristics and Performance of an Educational Software in Byzantine Music.\n \n \n \n \n\n\n \n Kokkinidis, K.; Patronas, G.; Goudos, S., K.; Maikantis, T.; and Nikolaidis, N.\n\n\n \n\n\n\n Information, 14(10). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"InvestigatingWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Investigating the Relationship of User Acceptance to the Characteristics and Performance of an Educational Software in Byzantine Music},\n type = {article},\n year = {2023},\n volume = {14},\n websites = {https://www.mdpi.com/2078-2489/14/10/568},\n id = {e10c0744-0760-3446-9b9a-01e07e282786},\n created = {2023-10-16T04:17:58.720Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-10-16T04:17:58.720Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {info14100568},\n source_type = {article},\n private_publication = {false},\n abstract = {The purpose of this study is to examine the impact of educational software characteristics on software performance through the mediating role of user acceptance. Our approach allows for a deeper understanding of the factors that contribute to the effectiveness of educational software by bridging the fields of educational technology, psychology, and human&ndash;computer interaction, offering a holistic perspective on software adoption and performance. This study is based on a sample collected from public and private education institutes in Northern Greece and on data obtained from 236 users. The statistical method employed is structural equation models (SEMs), via SPSS&mdash;AMOS estimation. The findings of this study suggest that user acceptance and performance appraisal are exceptionally interrelated in regard to educational applications. The study argues that user acceptance is positively related to the performance of educational software and constitutes the nested epicenter mediating construct in the educational software characteristics. Additional findings, such as computer-familiar users and users from the field of choral music, are positively related to the performance of the educational software. Our conclusions help in understanding the psychological and behavioral aspects of technology adoption in the educational setting. Findings are discussed in terms of their practical usefulness in education and further research.},\n bibtype = {article},\n author = {Kokkinidis, Konstantinos-Hercules and Patronas, Georgios and Goudos, Sotirios K and Maikantis, Theodoros and Nikolaidis, Nikolaos},\n doi = {10.3390/info14100568},\n journal = {Information},\n number = {10}\n}
\n
\n\n\n
\n The purpose of this study is to examine the impact of educational software characteristics on software performance through the mediating role of user acceptance. Our approach allows for a deeper understanding of the factors that contribute to the effectiveness of educational software by bridging the fields of educational technology, psychology, and human–computer interaction, offering a holistic perspective on software adoption and performance. This study is based on a sample collected from public and private education institutes in Northern Greece and on data obtained from 236 users. The statistical method employed is structural equation models (SEMs), via SPSS—AMOS estimation. The findings of this study suggest that user acceptance and performance appraisal are exceptionally interrelated in regard to educational applications. The study argues that user acceptance is positively related to the performance of educational software and constitutes the nested epicenter mediating construct in the educational software characteristics. Additional findings, such as computer-familiar users and users from the field of choral music, are positively related to the performance of the educational software. Our conclusions help in understanding the psychological and behavioral aspects of technology adoption in the educational setting. Findings are discussed in terms of their practical usefulness in education and further research.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Artificial Intelligence in Visible Light Positioning for Indoor IoT: A Methodological Review.\n \n \n \n\n\n \n Rekkas, V., P.; Iliadis, L., A.; Sotiroudis, S., P.; Boursianis, A., D.; Sarigiannidis, P.; Plets, D.; Joseph, W.; Wan, S.; Christodoulou, C., G.; Karagiannidis, G., K.; and Goudos, S., K.\n\n\n \n\n\n\n IEEE Open Journal of the Communications Society, 4: 2838-2869. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Artificial Intelligence in Visible Light Positioning for Indoor IoT: A Methodological Review},\n type = {article},\n year = {2023},\n pages = {2838-2869},\n volume = {4},\n id = {c2a0e090-1e7f-3388-98ef-1d432454c8a2},\n created = {2023-10-25T18:24:07.988Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-11-12T19:59:45.960Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10293149},\n source_type = {article},\n private_publication = {false},\n abstract = {Indoor communication and positioning are significant fields of applications for indoor Internet of Things (IoT) given the rapid growth of IoT in smart cities, smart grids, and smart industries. Visible light positioning (VLP) has become more and more attractive for researchers to provide indoor location-aware IoT services. Additionally, artificial intelligence (AI) has attracted considerable research effort to address the challenges in visible-light communication (VLC) systems. This is an emerging technology in next-generation wireless networks. However, despite the rapid progress, the use of AI in localization, navigation, and position estimation is still underexplored in VLC systems, and various research challenges are still open. This methodological review summarizes the research efforts regarding the use of AI in the field of VLP, to improve the position estimation accuracy in both two-dimensional (2D) and three-dimensional (3D) indoor IoT applications. This treatise also presents open issues and potential future directions for motivating further research in the field. Various databases were utilized in this paper: Scopus, Google Scholar, and IEEE Xplore; obtained 88 papers from 2017 to early 2023. Most (68%) of the AI articles in VLP systems are machine learning (ML) methods applied for localization and position estimation in VLC systems, while the other 32% of the research articles focussed on evolutionary algorithms. ML and evolutionary models may present limitations in terms of complexity and time-consuming nature but offer highly accurate, robust, reliable, and cost-effective results in terms of position estimation over conventional approaches.},\n bibtype = {article},\n author = {Rekkas, Vasileios P and Iliadis, Lazaros A and Sotiroudis, Sotirios P and Boursianis, Achilles D and Sarigiannidis, Panagiotis and Plets, David and Joseph, Wout and Wan, Shaohua and Christodoulou, Christos G and Karagiannidis, George K and Goudos, Sotirios K},\n doi = {10.1109/OJCOMS.2023.3327211},\n journal = {IEEE Open Journal of the Communications Society}\n}
\n
\n\n\n
\n Indoor communication and positioning are significant fields of applications for indoor Internet of Things (IoT) given the rapid growth of IoT in smart cities, smart grids, and smart industries. Visible light positioning (VLP) has become more and more attractive for researchers to provide indoor location-aware IoT services. Additionally, artificial intelligence (AI) has attracted considerable research effort to address the challenges in visible-light communication (VLC) systems. This is an emerging technology in next-generation wireless networks. However, despite the rapid progress, the use of AI in localization, navigation, and position estimation is still underexplored in VLC systems, and various research challenges are still open. This methodological review summarizes the research efforts regarding the use of AI in the field of VLP, to improve the position estimation accuracy in both two-dimensional (2D) and three-dimensional (3D) indoor IoT applications. This treatise also presents open issues and potential future directions for motivating further research in the field. Various databases were utilized in this paper: Scopus, Google Scholar, and IEEE Xplore; obtained 88 papers from 2017 to early 2023. Most (68%) of the AI articles in VLP systems are machine learning (ML) methods applied for localization and position estimation in VLC systems, while the other 32% of the research articles focussed on evolutionary algorithms. ML and evolutionary models may present limitations in terms of complexity and time-consuming nature but offer highly accurate, robust, reliable, and cost-effective results in terms of position estimation over conventional approaches.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Chaotic Maps with Tunable Mean Value—Application to a UAV Surveillance Mission.\n \n \n \n \n\n\n \n Moysis, L.; Lawnik, M.; Volos, C.; Baptista, M., S.; and Goudos, S., K.\n\n\n \n\n\n\n Symmetry, 15(12). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"ChaoticWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Chaotic Maps with Tunable Mean Value&mdash;Application to a UAV Surveillance Mission},\n type = {article},\n year = {2023},\n volume = {15},\n websites = {https://www.mdpi.com/2073-8994/15/12/2138},\n id = {3517c130-4648-32ac-ad01-3a1744e9b98e},\n created = {2023-12-01T15:57:57.380Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-12-01T15:57:57.380Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {sym15122138},\n source_type = {article},\n private_publication = {false},\n abstract = {Chaos-related applications are abundant in the literature, and span the fields of secure communications, encryption, optimization, and surveillance. Such applications take advantage of the unpredictability of chaotic systems as an alternative to using true random processes. The chaotic systems used, though, must showcase the statistical characteristics suitable for each application. This may often be hard to achieve, as the design of maps with tunable statistical properties is not a trivial task. Motivated by this, the present study explores the task of constructing maps, where the statistical measures like the mean value can be appropriately controlled by tuning the map&rsquo;s parameters. For this, a family of piecewise maps is considered, with three control parameters that affect the endpoint interpolations. Numerous examples are given, and the maps are studied through a collection of numerical simulations. The maps can indeed achieve a range of values for their statistical mean. Such maps may find extensive use in relevant chaos-based applications. To showcase this, the problem of chaotic path surveillance is considered as a potential application of the designed maps. Here, an autonomous agent follows a predefined trajectory but maneuvers around it in order to imbue unpredictability to potential hostile observers. The trajectory inherits the randomness of the chaotic map used as a seed, which results in chaotic motion patterns. Simulations are performed for the designed strategy.},\n bibtype = {article},\n author = {Moysis, Lazaros and Lawnik, Marcin and Volos, Christos and Baptista, Murilo S and Goudos, Sotirios K},\n doi = {10.3390/sym15122138},\n journal = {Symmetry},\n number = {12}\n}
\n
\n\n\n
\n Chaos-related applications are abundant in the literature, and span the fields of secure communications, encryption, optimization, and surveillance. Such applications take advantage of the unpredictability of chaotic systems as an alternative to using true random processes. The chaotic systems used, though, must showcase the statistical characteristics suitable for each application. This may often be hard to achieve, as the design of maps with tunable statistical properties is not a trivial task. Motivated by this, the present study explores the task of constructing maps, where the statistical measures like the mean value can be appropriately controlled by tuning the map’s parameters. For this, a family of piecewise maps is considered, with three control parameters that affect the endpoint interpolations. Numerous examples are given, and the maps are studied through a collection of numerical simulations. The maps can indeed achieve a range of values for their statistical mean. Such maps may find extensive use in relevant chaos-based applications. To showcase this, the problem of chaotic path surveillance is considered as a potential application of the designed maps. Here, an autonomous agent follows a predefined trajectory but maneuvers around it in order to imbue unpredictability to potential hostile observers. The trajectory inherits the randomness of the chaotic map used as a seed, which results in chaotic motion patterns. Simulations are performed for the designed strategy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Machine Learning for Smart Agriculture: A Comprehensive Survey.\n \n \n \n\n\n \n Mahmood, M., R.; Matin, M., A.; Goudos, S., K.; and Karagiannidis, G.\n\n\n \n\n\n\n IEEE Transactions on Artificial Intelligence,1-22. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Machine Learning for Smart Agriculture: A Comprehensive Survey},\n type = {article},\n year = {2023},\n pages = {1-22},\n id = {647856d0-5ab1-3109-9528-738e4b38510e},\n created = {2023-12-21T07:27:26.479Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-12-21T07:27:26.479Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10367758},\n source_type = {article},\n private_publication = {false},\n abstract = {As communication technologies and equipment evolve, smart assets become smarter. The agricultural industry is also evolving in line with the implementation of modern communication protocols, intelligent sensors, and equipment. This evolution is enabling large-scale agricultural production processes to operate independently, thus, securing the food supply chain for an ever-growing population. Data processing for such a system with multiple heterogeneous sources requires proper management for effective agricultural operations. Recognizing the advantages of Machine Learning(ML) in performing large-scale data processing, researchers are investigating the implementation of ML to design an effective intelligent agricultural architecture. The aim of this paper is to provide a thorough analysis of the state-of-the-art in smart agriculture, open challenges, and guidelines for the development of further enhanced smart agriculture systems. Specifically, we describe how ML is used to create intelligent agricultural systems supported by state-of-the-art technology.},\n bibtype = {article},\n author = {Mahmood, M Rezwanul and Matin, Mohammad Abdul and Goudos, Sotirios K and Karagiannidis, George},\n doi = {10.1109/TAI.2023.3345278},\n journal = {IEEE Transactions on Artificial Intelligence}\n}
\n
\n\n\n
\n As communication technologies and equipment evolve, smart assets become smarter. The agricultural industry is also evolving in line with the implementation of modern communication protocols, intelligent sensors, and equipment. This evolution is enabling large-scale agricultural production processes to operate independently, thus, securing the food supply chain for an ever-growing population. Data processing for such a system with multiple heterogeneous sources requires proper management for effective agricultural operations. Recognizing the advantages of Machine Learning(ML) in performing large-scale data processing, researchers are investigating the implementation of ML to design an effective intelligent agricultural architecture. The aim of this paper is to provide a thorough analysis of the state-of-the-art in smart agriculture, open challenges, and guidelines for the development of further enhanced smart agriculture systems. Specifically, we describe how ML is used to create intelligent agricultural systems supported by state-of-the-art technology.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Comparative Evaluation between Accelerated RISC- V and ARM AI Inference Machines.\n \n \n \n\n\n \n Christofas, V.; Amanatidis, P.; Karampatzakis, D.; Lagkas, T.; Goudos, S., K.; Psannis, K., E.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2023 6th World Symposium on Communication Engineering (WSCE), pages 108-113, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Comparative Evaluation between Accelerated RISC- V and ARM AI Inference Machines},\n type = {inproceedings},\n year = {2023},\n pages = {108-113},\n id = {b8558105-d9de-3640-9fef-4e34f4bf716a},\n created = {2023-12-26T08:10:36.726Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-12-26T08:10:36.726Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10365853},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Embedded AI development has been rapidly im-proving for the past few years and has had a great impact on edge AI networks. However, as neural networks become deeper and deeper it becomes more difficult to execute complicated tasks without sacrificing a good amount of power and performance. In this paper, we make a comparative evaluation between two AI acceleration devices. The first one features a RISC- V 64-bit processor while the other one is ARM powered. These devices are combined with AI co-processors, or ASICs, with computer vision capabilities. Our benchmark consists of a simple classification task split into multiple versions. The results showed that the RISC- V inference machine had 4 times lower consumption while the ARM machine was up to 15 times faster in our largest network. We discuss the results in great detail while keeping our focus on all aspects equally. Finally, we make recommendations based on their usage and application.},\n bibtype = {inproceedings},\n author = {Christofas, Vasileios and Amanatidis, Petros and Karampatzakis, Dimitris and Lagkas, Thomas and Goudos, Sotirios K and Psannis, Konstantinos E and Sarigiannidis, Panagiotis},\n doi = {10.1109/WSCE59557.2023.10365853},\n booktitle = {2023 6th World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n Embedded AI development has been rapidly im-proving for the past few years and has had a great impact on edge AI networks. However, as neural networks become deeper and deeper it becomes more difficult to execute complicated tasks without sacrificing a good amount of power and performance. In this paper, we make a comparative evaluation between two AI acceleration devices. The first one features a RISC- V 64-bit processor while the other one is ARM powered. These devices are combined with AI co-processors, or ASICs, with computer vision capabilities. Our benchmark consists of a simple classification task split into multiple versions. The results showed that the RISC- V inference machine had 4 times lower consumption while the ARM machine was up to 15 times faster in our largest network. We discuss the results in great detail while keeping our focus on all aspects equally. Finally, we make recommendations based on their usage and application.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Image Filtering Techniques for Beam Prediction in a Real-world 6G UAV Scenario.\n \n \n \n\n\n \n Rekkas, V., P.; Sotiroudis, S., P.; Sarigiannids, P.; Psannis, K., E.; Karagiannidis, G., K.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 6th World Symposium on Communication Engineering (WSCE), pages 103-107, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Image Filtering Techniques for Beam Prediction in a Real-world 6G UAV Scenario},\n type = {inproceedings},\n year = {2023},\n pages = {103-107},\n id = {f268d8f0-5dbc-369f-8f2b-578f9352bf40},\n created = {2023-12-26T08:10:36.734Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-12-26T08:10:36.734Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10365979},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Millimeter-wave (mm-wave) and terahertz (THz) communication systems can satisfy the high data rate requirements in 5G, 6G, and beyond networks, but still rely on the use of extensive antenna arrays to guarantee sufficient received signal strength. Many antennas incur high beam training overhead; thus, the narrow beams require adjustment to support highly mobile applications. Deep learning (DL) vision-aided solutions can potentially forecast the optimal beams, leveraging raw RGB images captured at the base station. Image filtering techniques have been widely used in computer vision (CV) to modify and enhance the quality of an image, based on specific rules. This work applies different filters to RGB images for accurate mm-wave/THz beam prediction and feature extraction based on pre-trained convolutional neural networks (CNNs). The assessment of the developed framework is conducted on an actual dataset captured by an unmanned aerial vehicle (UAV) operating in the millimeter-wave (mm-wave) frequency range. The dataset comprises RGB images taken at the base station. Ensemble filtering techniques are also studied, enhancing the beam prediction accuracy of two state-of-the-art (SOTA) DL models.},\n bibtype = {inproceedings},\n author = {Rekkas, Vasileios P and Sotiroudis, Sotirios P and Sarigiannids, Panagiotis and Psannis, Konstantinos E and Karagiannidis, George K and Goudos, Sotirios K},\n doi = {10.1109/WSCE59557.2023.10365979},\n booktitle = {2023 6th World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n Millimeter-wave (mm-wave) and terahertz (THz) communication systems can satisfy the high data rate requirements in 5G, 6G, and beyond networks, but still rely on the use of extensive antenna arrays to guarantee sufficient received signal strength. Many antennas incur high beam training overhead; thus, the narrow beams require adjustment to support highly mobile applications. Deep learning (DL) vision-aided solutions can potentially forecast the optimal beams, leveraging raw RGB images captured at the base station. Image filtering techniques have been widely used in computer vision (CV) to modify and enhance the quality of an image, based on specific rules. This work applies different filters to RGB images for accurate mm-wave/THz beam prediction and feature extraction based on pre-trained convolutional neural networks (CNNs). The assessment of the developed framework is conducted on an actual dataset captured by an unmanned aerial vehicle (UAV) operating in the millimeter-wave (mm-wave) frequency range. The dataset comprises RGB images taken at the base station. Ensemble filtering techniques are also studied, enhancing the beam prediction accuracy of two state-of-the-art (SOTA) DL models.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Improving Communication Systems Through Federated Learning: An Optimization of Decision-Making.\n \n \n \n\n\n \n Stergiou, K., D.; Ishibashi, Y.; Goudos, S., K.; Lagkas, T.; Sarigiannidis, P.; and Psannis, K., E.\n\n\n \n\n\n\n In 2023 6th World Symposium on Communication Engineering (WSCE), pages 45-48, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Improving Communication Systems Through Federated Learning: An Optimization of Decision-Making},\n type = {inproceedings},\n year = {2023},\n pages = {45-48},\n id = {3f17c833-3036-3935-b40f-1c8860191786},\n created = {2023-12-26T08:10:36.852Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-12-26T08:10:36.852Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10365857},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This paper discusses the use of federated learning as a method for optimizing decision-making in communication systems. Federated learning is a machine learning technique that enables the training of models on decentralized data, allowing for the collection and analysis of data from multiple sources while maintaining the privacy and security of the data. This approach is particularly useful in communication systems, as it allows for the optimization of decision-making across a wide range of devices and networks. The paper examines the advantages of federated learning, including the ability to collect a large amount of data from a diverse range of devices, the protection of sensitive data, and the ability to adapt to changing conditions in real-time. The paper also provides specific examples of how federated learning can be used in the optimization of mobile networks and content delivery. The conclusion highlights the growing importance of federated learning in improving communication systems.},\n bibtype = {inproceedings},\n author = {Stergiou, Konstantinos D and Ishibashi, Yutaka and Goudos, Sotirios K and Lagkas, Thomas and Sarigiannidis, Panagiotis and Psannis, Konstantinos E},\n doi = {10.1109/WSCE59557.2023.10365857},\n booktitle = {2023 6th World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n This paper discusses the use of federated learning as a method for optimizing decision-making in communication systems. Federated learning is a machine learning technique that enables the training of models on decentralized data, allowing for the collection and analysis of data from multiple sources while maintaining the privacy and security of the data. This approach is particularly useful in communication systems, as it allows for the optimization of decision-making across a wide range of devices and networks. The paper examines the advantages of federated learning, including the ability to collect a large amount of data from a diverse range of devices, the protection of sensitive data, and the ability to adapt to changing conditions in real-time. The paper also provides specific examples of how federated learning can be used in the optimization of mobile networks and content delivery. The conclusion highlights the growing importance of federated learning in improving communication systems.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Tactile Internet Security System Architecture for Mobile Networks.\n \n \n \n\n\n \n Minopoulos, G.; Kokkonis, G.; Sarigiannidis, P.; Goudos, S.; Ishibashi, Y.; and Psannis, K.\n\n\n \n\n\n\n In 2023 6th World Symposium on Communication Engineering (WSCE), pages 1-6, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Tactile Internet Security System Architecture for Mobile Networks},\n type = {inproceedings},\n year = {2023},\n pages = {1-6},\n id = {e1dcccce-fd08-34a6-a2d2-e6cb3607edb2},\n created = {2023-12-26T08:10:36.857Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-12-26T08:10:36.857Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10365815},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The deficiencies of the Fifth Generation (5G) mobile networks are stimulating vendors to focus on the specifications of the next generation of wireless systems. The efficient integration of the Tactile Internet with mobile networks, like the emerging Sixth Generation (6G) wireless systems, is anticipated to achieve global ubiquitous accessibility, extremely low latency, high reliability, and elevated security for haptic communication. Based on the characteristics of the new generation of mobile networks, a novel system architecture is proposed along with a security framework for the utilization of Tactile Internet applications.},\n bibtype = {inproceedings},\n author = {Minopoulos, Georgios and Kokkonis, Georgios and Sarigiannidis, Panagiotis and Goudos, Sotirios and Ishibashi, Yutaka and Psannis, Konstantinos},\n doi = {10.1109/WSCE59557.2023.10365815},\n booktitle = {2023 6th World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n The deficiencies of the Fifth Generation (5G) mobile networks are stimulating vendors to focus on the specifications of the next generation of wireless systems. The efficient integration of the Tactile Internet with mobile networks, like the emerging Sixth Generation (6G) wireless systems, is anticipated to achieve global ubiquitous accessibility, extremely low latency, high reliability, and elevated security for haptic communication. Based on the characteristics of the new generation of mobile networks, a novel system architecture is proposed along with a security framework for the utilization of Tactile Internet applications.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Intrusion Detection System Modeling Using Machine Learning : A Comparative Study.\n \n \n \n\n\n \n Akritas, X.; Rekkas, V., P.; Sotiroudis, S., P.; Sarigiannids, P.; Psannis, K., E.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 6th World Symposium on Communication Engineering (WSCE), pages 7-14, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Intrusion Detection System Modeling Using Machine Learning : A Comparative Study},\n type = {inproceedings},\n year = {2023},\n pages = {7-14},\n id = {81e968eb-6bd5-3e1b-9981-5e2365a96a2a},\n created = {2023-12-26T08:10:36.858Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-12-26T08:10:36.858Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10365909},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In recent years, the adoption of internet-connected devices has experienced a remarkable surge, fundamentally transforming our everyday routines. Nevertheless, this rapid expansion has also captured the interest of cybercriminals, resulting in a notable rise in both the quantity and complexity of attacks aimed specifically at these devices. In this work, a network intrusion detection system (NIDS) is developed, related to information systems security/cyber security. In this context, various machine learning (ML) methods are utilized, namely k-nearest neighbors (knn), adaptive boosting (Adaboost), gradient tree boosting (GTB), logistic regression (LR), Decision Tree (DT), Naive Baye as well as Bagging and Voting Classifiers. The performance of the ML models is evaluated based on various metrics, exhibiting great accuracy results in classifying the abnormal behaviors in a cyber network.},\n bibtype = {inproceedings},\n author = {Akritas, Xenofon and Rekkas, Vasileios P and Sotiroudis, Sotirios P and Sarigiannids, Panagiotis and Psannis, Konstantinos E and Goudos, Sotirios K},\n doi = {10.1109/WSCE59557.2023.10365909},\n booktitle = {2023 6th World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n In recent years, the adoption of internet-connected devices has experienced a remarkable surge, fundamentally transforming our everyday routines. Nevertheless, this rapid expansion has also captured the interest of cybercriminals, resulting in a notable rise in both the quantity and complexity of attacks aimed specifically at these devices. In this work, a network intrusion detection system (NIDS) is developed, related to information systems security/cyber security. In this context, various machine learning (ML) methods are utilized, namely k-nearest neighbors (knn), adaptive boosting (Adaboost), gradient tree boosting (GTB), logistic regression (LR), Decision Tree (DT), Naive Baye as well as Bagging and Voting Classifiers. The performance of the ML models is evaluated based on various metrics, exhibiting great accuracy results in classifying the abnormal behaviors in a cyber network.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 5GCIDS: An Intrusion Detection System for 5G Core with AI and Explainability Mechanisms.\n \n \n \n\n\n \n Radoglou-Grammatikis, P.; Nakas, G.; Amponis, G.; Giannakidou, S.; Lagkas, T.; Argyriou, V.; Goudos, S.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2023 IEEE Globecom Workshops (GC Wkshps), pages 353-358, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {5GCIDS: An Intrusion Detection System for 5G Core with AI and Explainability Mechanisms},\n type = {inproceedings},\n year = {2023},\n keywords = {Heart;Protocols;5G mobile communication;Intrusion},\n pages = {353-358},\n id = {fdca7556-59ae-33e3-8e9d-5fe4e03947a0},\n created = {2024-03-22T21:40:36.191Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-03-22T21:40:36.191Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10464667},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The progression of fifth-generation (5G) networks provides multiple advantages, such as faster speed, reduced latency and increased capacity. Towards these advancements, it is clear that 5G Core (5GC) represents the heart of a 5G network, providing a variety of new network services such as Ultra-reliable low-latency communication (URLLC) and Massive machine-type communication (mMTC). However, despite the various benefits, 5GC is prone to several cyberthreats that can result in catastrophic effects. In this paper, an Intrusion Detection System (IDS) for 5GC is introduced. The proposed IDS called 5GCIDS adopts Artificial Intelligence (AI) methods in order to detect potential cyberattacks against Packet Forwarding Control Protocol (PFCP), which is utilised for the N4 interface between Session Management Function (SMF) andUser Plane Function (UPF). For the detection process, both Transmission Control Protocol (TCP)/Internet Protocol (IP) flow statistics and application-layer PFCP flow statistics are used. In the second case, we provide a bidirectional flow statistics generator called PFCPFlowMeter. Finally, the detection outcomes are explained as local and global explanations with the TreeSHAP method. The evaluation results demonstrate the efficiency of the proposed IDS.},\n bibtype = {inproceedings},\n author = {Radoglou-Grammatikis, Panagiotis and Nakas, George and Amponis, George and Giannakidou, Sofia and Lagkas, Thomas and Argyriou, Vasileios and Goudos, Sotirios and Sarigiannidis, Panagiotis},\n doi = {10.1109/GCWkshps58843.2023.10464667},\n booktitle = {2023 IEEE Globecom Workshops (GC Wkshps)}\n}
\n
\n\n\n
\n The progression of fifth-generation (5G) networks provides multiple advantages, such as faster speed, reduced latency and increased capacity. Towards these advancements, it is clear that 5G Core (5GC) represents the heart of a 5G network, providing a variety of new network services such as Ultra-reliable low-latency communication (URLLC) and Massive machine-type communication (mMTC). However, despite the various benefits, 5GC is prone to several cyberthreats that can result in catastrophic effects. In this paper, an Intrusion Detection System (IDS) for 5GC is introduced. The proposed IDS called 5GCIDS adopts Artificial Intelligence (AI) methods in order to detect potential cyberattacks against Packet Forwarding Control Protocol (PFCP), which is utilised for the N4 interface between Session Management Function (SMF) andUser Plane Function (UPF). For the detection process, both Transmission Control Protocol (TCP)/Internet Protocol (IP) flow statistics and application-layer PFCP flow statistics are used. In the second case, we provide a bidirectional flow statistics generator called PFCPFlowMeter. Finally, the detection outcomes are explained as local and global explanations with the TreeSHAP method. The evaluation results demonstrate the efficiency of the proposed IDS.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks.\n \n \n \n\n\n \n Nakas, G.; Radoglou-Grammatikis, P.; Amponis, G.; Lagkas, T.; Argyriou, V.; Goudos, S.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2023 IEEE Globecom Workshops (GC Wkshps), pages 347-352, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks},\n type = {inproceedings},\n year = {2023},\n keywords = {Privacy;Protocols;5G mobile communication;Network},\n pages = {347-352},\n id = {e9ab5898-b6f7-39c9-8edc-d24e08a83bf7},\n created = {2024-03-22T21:40:36.192Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-03-22T21:40:36.192Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10464928},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The evolution of fifth-generation (5G) networks represents a significant technological leap towards a seamless and advanced user experience, allowing hyperconnected use cases with faster data transfer, lower latency and better connectivity for a wide range of mobile devices. In particular, a key element of 5G is the 5G Core (5GC) which follows a service-based architecture, enabling network slicing and improved Quality of Service (QoS). However, despite the benefits of 5GC, it also creates important security and privacy concerns. First, 5GC can combine heterogeneous technologies that can increase the growing attack surface. On the other hand, 5G handles a vast amount of sensitive data that may reflect an attractive goal for potential cyberattackers. Based on the previous remarks, in this paper, we introduce 5G-Fuzz. 5G-Fuzz is a smart fuzzer which takes full advantage of historical data in order to fuzz and target the Packet Forwarding Control Protocol (PFCP) communications between the Session Management Function (SMF) and User Plane Function (UPF). For this purpose, two PFCP attacks are used. In contrast to conventional fuzzers, 5G-Fuzz adopts two Generative Adversarial Networks (GANs) in order to identify and generate the appropriate values of Session Endpoint Identifier (SEID) and sequence number (seq) utilised in the PFCP sessions, thus accelerating the PFCP attacks. Finally, 5G-Fuzz composes and replays the malicious PFCP packets against UPF.},\n bibtype = {inproceedings},\n author = {Nakas, George and Radoglou-Grammatikis, Panagiotis and Amponis, George and Lagkas, Thomas and Argyriou, Vasileios and Goudos, Sotirios and Sarigiannidis, Panagiotis},\n doi = {10.1109/GCWkshps58843.2023.10464928},\n booktitle = {2023 IEEE Globecom Workshops (GC Wkshps)}\n}
\n
\n\n\n
\n The evolution of fifth-generation (5G) networks represents a significant technological leap towards a seamless and advanced user experience, allowing hyperconnected use cases with faster data transfer, lower latency and better connectivity for a wide range of mobile devices. In particular, a key element of 5G is the 5G Core (5GC) which follows a service-based architecture, enabling network slicing and improved Quality of Service (QoS). However, despite the benefits of 5GC, it also creates important security and privacy concerns. First, 5GC can combine heterogeneous technologies that can increase the growing attack surface. On the other hand, 5G handles a vast amount of sensitive data that may reflect an attractive goal for potential cyberattackers. Based on the previous remarks, in this paper, we introduce 5G-Fuzz. 5G-Fuzz is a smart fuzzer which takes full advantage of historical data in order to fuzz and target the Packet Forwarding Control Protocol (PFCP) communications between the Session Management Function (SMF) and User Plane Function (UPF). For this purpose, two PFCP attacks are used. In contrast to conventional fuzzers, 5G-Fuzz adopts two Generative Adversarial Networks (GANs) in order to identify and generate the appropriate values of Session Endpoint Identifier (SEID) and sequence number (seq) utilised in the PFCP sessions, thus accelerating the PFCP attacks. Finally, 5G-Fuzz composes and replays the malicious PFCP packets against UPF.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Personalisation of Federated Learning Models Through Knowledge Distillation on Decentralised Data.\n \n \n \n\n\n \n SiniosoGlou, I.; Xouveroudis, K.; Argyriou, V.; Lagkas, T.; Saoulidis, T.; Fragulis, G.; Goudos, S., K.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2023 IEEE Globecom Workshops (GC Wkshps), pages 56-61, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Personalisation of Federated Learning Models Through Knowledge Distillation on Decentralised Data},\n type = {inproceedings},\n year = {2023},\n keywords = {Temperature measurement;Training;Temperature distr},\n pages = {56-61},\n id = {5e950151-c5f9-307c-a7e3-57f248374284},\n created = {2024-03-22T21:40:36.333Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-03-22T21:40:36.333Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10464710},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {A prevalent issue in the field of Machine Learning (ML) remains the extensive time required to train and utilise intricate Machine and Deep Learning (DL) models, optimising them for the various applications that require them. This problem is all the more prevalent in the federated domain, where optimising a model for each different node is a difficult challenge. Towards solving this issue, a lot of techniques have surfaced, aiming at reducing training time and cost, while ensuring optimisation. One of the proposed solutions to address this challenge is Knowledge Distillation, which involves transferring knowledge from a pre-trained complex model to a simpler untrained one. This approach can facilitate the use of smaller models with reduced computational demands, as well as personalise the model with additional local knowledge, enhancing the performance of existing models. The present study delves into the fundamental principles of KD and applies the technique to a selection of ML models, investigating the efficacy of this technique in the local and federated domain. Subsequently, a comparative analysis of the results between the original and optimised, local and federated models is presented. Post-analysis indicates promising results in personalising and optimising the employed models with KD.},\n bibtype = {inproceedings},\n author = {SiniosoGlou, Ilias and Xouveroudis, Konstantinos and Argyriou, Vasileios and Lagkas, Thomas and Saoulidis, Theocharis and Fragulis, George and Goudos, Sotirios K and Sarigiannidis, Panagiotis},\n doi = {10.1109/GCWkshps58843.2023.10464710},\n booktitle = {2023 IEEE Globecom Workshops (GC Wkshps)}\n}
\n
\n\n\n
\n A prevalent issue in the field of Machine Learning (ML) remains the extensive time required to train and utilise intricate Machine and Deep Learning (DL) models, optimising them for the various applications that require them. This problem is all the more prevalent in the federated domain, where optimising a model for each different node is a difficult challenge. Towards solving this issue, a lot of techniques have surfaced, aiming at reducing training time and cost, while ensuring optimisation. One of the proposed solutions to address this challenge is Knowledge Distillation, which involves transferring knowledge from a pre-trained complex model to a simpler untrained one. This approach can facilitate the use of smaller models with reduced computational demands, as well as personalise the model with additional local knowledge, enhancing the performance of existing models. The present study delves into the fundamental principles of KD and applies the technique to a selection of ML models, investigating the efficacy of this technique in the local and federated domain. Subsequently, a comparative analysis of the results between the original and optimised, local and federated models is presented. Post-analysis indicates promising results in personalising and optimising the employed models with KD.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Recognition of Greek Orthodox Hymns Using Audio Fingerprint Techniques.\n \n \n \n\n\n \n Karasavvidis, K.; Kampelopoulos, D.; Moysis, L.; Boursianis, A., D.; Nikolaidis, S.; Sarigiannidis, P.; and Goudos, S., K.\n\n\n \n\n\n\n In 2023 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), pages 1-6, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Recognition of Greek Orthodox Hymns Using Audio Fingerprint Techniques},\n type = {inproceedings},\n year = {2023},\n keywords = {Design automation;Social networking (online);Instr},\n pages = {1-6},\n id = {d2382562-6e31-33e5-83f9-33d882669003},\n created = {2024-03-22T21:40:36.338Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-03-22T21:40:36.338Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10470476},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Audio fingerprinting was originally developed for music song identification, and over the years has been used for many more cases. With fingerprinting, an equivalent signature of the audio signal is saved in a simple form, so that it can be easily compared with another fingerprint. In this work, an audio fingerprinting algorithm is developed for the recognition of Greek Orthodox hymns. The main difference between music songs and Greek Orthodox hymns is the absence of music instruments, as there is only the chanter's voice. The test dataset consists of 10 hymns, and for each hymn there are 5 different performances, creating a dataset of 50 performances. Several tunable parameters of the fingerprinting technique are tested, like the parameters of the Hamming window, the frequency spectrum, the sample duration, and the sample noise, to find the differences in Greek Orthodox hymns. The recognition results for all cases are positive. The algorithm, in most cases, had a high recognition rate. even with noisy samples.},\n bibtype = {inproceedings},\n author = {Karasavvidis, Konstantinos and Kampelopoulos, Dimitris and Moysis, Lazaros and Boursianis, Achilles D and Nikolaidis, Spiridon and Sarigiannidis, Panagiotis and Goudos, Sotirios K},\n doi = {10.1109/SEEDA-CECNSM61561.2023.10470476},\n booktitle = {2023 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)}\n}
\n
\n\n\n
\n Audio fingerprinting was originally developed for music song identification, and over the years has been used for many more cases. With fingerprinting, an equivalent signature of the audio signal is saved in a simple form, so that it can be easily compared with another fingerprint. In this work, an audio fingerprinting algorithm is developed for the recognition of Greek Orthodox hymns. The main difference between music songs and Greek Orthodox hymns is the absence of music instruments, as there is only the chanter's voice. The test dataset consists of 10 hymns, and for each hymn there are 5 different performances, creating a dataset of 50 performances. Several tunable parameters of the fingerprinting technique are tested, like the parameters of the Hamming window, the frequency spectrum, the sample duration, and the sample noise, to find the differences in Greek Orthodox hymns. The recognition results for all cases are positive. The algorithm, in most cases, had a high recognition rate. even with noisy samples.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends.\n \n \n \n\n\n \n Radoglou-Grammatikis, P.; Kioseoglou, E.; Asimopoulos, D.; Siavvas, M.; Nanos, I.; Lagkas, T.; Argyriou, V.; Psannis, K., E.; Goudos, S.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pages 309-314, 2023. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends},\n type = {inproceedings},\n year = {2023},\n keywords = {Cloud computing;Program processors;Weapons;Phishin},\n pages = {309-314},\n id = {67827dd5-966c-3228-afe4-402a9bbb9af0},\n created = {2024-03-26T09:54:46.449Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2024-03-26T09:54:46.449Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10475684},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The evolution of cyberattacks has been significantly impacted by the rise of Artificial Intelligence (AI). In particular, AI-driven attacks leverage Machine Learning (ML) and Deep Learning (DL) methods to automate tasks like identifying vulnerabilities, crafting convincing phishing emails, and evading conventional security measures. These cyberattacks can adapt in real time, making them more elusive and challenging to detect. Furthermore, AI has enabled the development of AI-powered malware that can learn and evolve, making it even more dangerous. As AI continues to evolve, both attackers and defenders are engaged in a relentless arms race, with cybersecurity professionals striving to harness AI for threat detection and response while cybercriminals seek to exploit AI’s capabilities for their malicious purposes. This ongoing battle underscores the need for proactive and adaptive cybersecurity strategies to mitigate the evolving threats posed by AI-driven cyberattacks. Based on the aforementioned remarks, it is evident that efficient and adaptable countermeasures are necessary. In this paper, we focus our attention on Cyber Threat Intelligence (CTI) mechanisms. CTI is the process of collecting, analysing, and sharing information about potential cybersecurity threats to help organisations proactively defend against cyberattacks. In particular, after providing an overview of the CTI use cases, a brief analysis of existing solutions follows, highlighting the current trends and directions for future work in this research field.},\n bibtype = {inproceedings},\n author = {Radoglou-Grammatikis, Panagiotis and Kioseoglou, Elisavet and Asimopoulos, Dimitrios and Siavvas, Miltiadis and Nanos, Ioannis and Lagkas, Thomas and Argyriou, Vasileios and Psannis, Konstantinos E and Goudos, Sotirios and Sarigiannidis, Panagiotis},\n doi = {10.1109/CloudCom59040.2023.00057},\n booktitle = {2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)}\n}
\n
\n\n\n
\n The evolution of cyberattacks has been significantly impacted by the rise of Artificial Intelligence (AI). In particular, AI-driven attacks leverage Machine Learning (ML) and Deep Learning (DL) methods to automate tasks like identifying vulnerabilities, crafting convincing phishing emails, and evading conventional security measures. These cyberattacks can adapt in real time, making them more elusive and challenging to detect. Furthermore, AI has enabled the development of AI-powered malware that can learn and evolve, making it even more dangerous. As AI continues to evolve, both attackers and defenders are engaged in a relentless arms race, with cybersecurity professionals striving to harness AI for threat detection and response while cybercriminals seek to exploit AI’s capabilities for their malicious purposes. This ongoing battle underscores the need for proactive and adaptive cybersecurity strategies to mitigate the evolving threats posed by AI-driven cyberattacks. Based on the aforementioned remarks, it is evident that efficient and adaptable countermeasures are necessary. In this paper, we focus our attention on Cyber Threat Intelligence (CTI) mechanisms. CTI is the process of collecting, analysing, and sharing information about potential cybersecurity threats to help organisations proactively defend against cyberattacks. In particular, after providing an overview of the CTI use cases, a brief analysis of existing solutions follows, highlighting the current trends and directions for future work in this research field.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (42)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Internet of Things (IoT) and Agricultural Unmanned Aerial Vehicles (UAVs) in smart farming: A comprehensive review.\n \n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Diamantoulakis, P.; Liopa-Tsakalidi, A.; Barouchas, P.; Salahas, G.; Karagiannidis, G.; Wan, S.; and Goudos, S., K.\n\n\n \n\n\n\n Internet of Things,100187. 3 2022.\n \n\n\n\n
\n\n\n\n \n \n \"InternetPaper\n  \n \n \n \"InternetWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Internet of Things (IoT) and Agricultural Unmanned Aerial Vehicles (UAVs) in smart farming: A comprehensive review},\n type = {article},\n year = {2022},\n pages = {100187},\n websites = {https://www.sciencedirect.com/science/article/pii/S2542660520300238?via%3Dihub},\n month = {3},\n publisher = {Elsevier},\n day = {7},\n id = {f01d22a6-6cf3-3503-ab3a-8041859fb8be},\n created = {2020-04-28T21:46:19.635Z},\n accessed = {2020-04-29},\n file_attached = {true},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-05-12T20:32:46.665Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Boursianis2022},\n private_publication = {false},\n abstract = {Internet of Things (IoT) and Unmanned Aerial Vehicles (UAVs) are two hot technologies utilized in cultivation fields, which transform traditional farming practices into a new era of precision agriculture. In this paper, we perform a survey of the last research on IoT and UAV technology applied in agriculture. We describe the main principles of IoT technology, including intelligent sensors, IoT sensor types, networks and protocols used in agriculture, as well as IoT applications and solutions in smart farming. Moreover, we present the role of UAV technology in smart agriculture, by analyzing the applications of UAVs in various scenarios, including irrigation, fertilization, use of pesticides, weed management, plant growth monitoring, crop disease management, and field-level phenotyping. Furthermore, the utilization of UAV systems in complex agricultural environments is also analyzed. Our conclusion is that IoT and UAV are two of the most important technologies that transform traditional cultivation practices into a new perspective of intelligence in precision agriculture.},\n bibtype = {article},\n author = {Boursianis, Achilles D. and Papadopoulou, Maria S. and Diamantoulakis, Panagiotis and Liopa-Tsakalidi, Aglaia and Barouchas, Pantelis and Salahas, George and Karagiannidis, George and Wan, Shaohua and Goudos, Sotirios K.},\n doi = {10.1016/J.IOT.2020.100187},\n journal = {Internet of Things}\n}
\n
\n\n\n
\n Internet of Things (IoT) and Unmanned Aerial Vehicles (UAVs) are two hot technologies utilized in cultivation fields, which transform traditional farming practices into a new era of precision agriculture. In this paper, we perform a survey of the last research on IoT and UAV technology applied in agriculture. We describe the main principles of IoT technology, including intelligent sensors, IoT sensor types, networks and protocols used in agriculture, as well as IoT applications and solutions in smart farming. Moreover, we present the role of UAV technology in smart agriculture, by analyzing the applications of UAVs in various scenarios, including irrigation, fertilization, use of pesticides, weed management, plant growth monitoring, crop disease management, and field-level phenotyping. Furthermore, the utilization of UAV systems in complex agricultural environments is also analyzed. Our conclusion is that IoT and UAV are two of the most important technologies that transform traditional cultivation practices into a new perspective of intelligence in precision agriculture.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modelling, Detecting and Mitigating Threats against Industrial Healthcare Systems: A combined SDN and Reinforcement Learning Approach.\n \n \n \n\n\n \n Radoglou-Grammatikis, P.; Robolos, K.; Sarigiannidis, P.; Argyriou, V.; Lagkas, T.; Sarigiannidis, A.; Goudos, S., K.; and Wan, S.\n\n\n \n\n\n\n IEEE Transactions on Industrial Informatics, 18(3): 2041-2052. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Modelling, Detecting and Mitigating Threats against Industrial Healthcare Systems: A combined SDN and Reinforcement Learning Approach},\n type = {article},\n year = {2022},\n pages = {2041-2052},\n volume = {18},\n id = {d87891c9-e1f5-36dd-8a20-46a27de09da1},\n created = {2021-07-02T06:29:13.392Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:49.088Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9470933},\n source_type = {article},\n private_publication = {false},\n abstract = {The rise of the Internet of Medical Things introduces the healthcare ecosystem in a new digital era with multiple benefits, such as remote medical assistance, real-time monitoring, and pervasive control. However, despite the valuable healthcare services, this progression raises significant cybersecurity and privacy concerns. In this article, we focus our attention on the IEC 60 870-5-104 protocol, which is widely adopted in industrial healthcare systems. First, we investigate and assess the severity of the IEC 60 870-5-104 cyberattacks by providing a quantitative threat model, which relies on Attack Defence Trees and Common Vulnerability Scoring System v3.1. Next, we introduce an intrusion detection and prevention system (IDPS), which is capable of discriminating and mitigating automatically the IEC 60 870-5-104 cyberattacks. The proposed IDPS takes full advantage of the machine learning (ML) and software defined networking (SDN) technologies. ML is used to detect the IEC 60 870-5-104 cyberattacks, utilizing 1) Transmission Control Protocol/Internet Protocol network flow statistics and 2) IEC 60 870-5-104 payload flow statistics. On the other side, the automated mitigation is transformed into a multiarmed bandit problem, which is solved through a reinforcement learning method called Thomson sampling and SDN. The evaluation analysis demonstrates the efficiency of the proposed IDPS in terms of intrusion detection accuracy and automated mitigation performance. The detection accuracy and the F1 score of the proposed IDPS reach 0.831 and 0.8258, respectively, while the mitigation accuracy is calculated at 0.923.},\n bibtype = {article},\n author = {Radoglou-Grammatikis, Panagiotis and Robolos, Konstantinos and Sarigiannidis, Panagiotis and Argyriou, Vasileios and Lagkas, Thomas and Sarigiannidis, Antonios and Goudos, Sotirios K and Wan, Shawn},\n doi = {10.1109/TII.2021.3093905},\n journal = {IEEE Transactions on Industrial Informatics},\n number = {3}\n}
\n
\n\n\n
\n The rise of the Internet of Medical Things introduces the healthcare ecosystem in a new digital era with multiple benefits, such as remote medical assistance, real-time monitoring, and pervasive control. However, despite the valuable healthcare services, this progression raises significant cybersecurity and privacy concerns. In this article, we focus our attention on the IEC 60 870-5-104 protocol, which is widely adopted in industrial healthcare systems. First, we investigate and assess the severity of the IEC 60 870-5-104 cyberattacks by providing a quantitative threat model, which relies on Attack Defence Trees and Common Vulnerability Scoring System v3.1. Next, we introduce an intrusion detection and prevention system (IDPS), which is capable of discriminating and mitigating automatically the IEC 60 870-5-104 cyberattacks. The proposed IDPS takes full advantage of the machine learning (ML) and software defined networking (SDN) technologies. ML is used to detect the IEC 60 870-5-104 cyberattacks, utilizing 1) Transmission Control Protocol/Internet Protocol network flow statistics and 2) IEC 60 870-5-104 payload flow statistics. On the other side, the automated mitigation is transformed into a multiarmed bandit problem, which is solved through a reinforcement learning method called Thomson sampling and SDN. The evaluation analysis demonstrates the efficiency of the proposed IDPS in terms of intrusion detection accuracy and automated mitigation performance. The detection accuracy and the F1 score of the proposed IDPS reach 0.831 and 0.8258, respectively, while the mitigation accuracy is calculated at 0.923.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards Fairness-Aware Time-Sensitive Asynchronous Federated Learning for Critical Energy Infrastructure.\n \n \n \n\n\n \n Lu, J.; Liu, H.; Zhang, Z.; Wang, J.; Goudos, S., K.; and Wan, S.\n\n\n \n\n\n\n IEEE Transactions on Industrial Informatics, 18(5): 3462-3472. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Towards Fairness-Aware Time-Sensitive Asynchronous Federated Learning for Critical Energy Infrastructure},\n type = {article},\n year = {2022},\n keywords = {Computa,Resource management,Task analysis,Training},\n pages = {3462-3472},\n volume = {18},\n id = {b4785362-33d6-35b0-94f9-c8718dacc615},\n created = {2021-10-10T06:26:03.048Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-02-04T06:23:20.041Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9560090},\n source_type = {article},\n private_publication = {false},\n abstract = {Critical energy infrastructure (CEI) systems are vital to underpin the national economy and social development, but vulnerable to cyber attack and data privacy leakage when distributed machine learning technologies are deployed on them. Although federated learning (FL) has promoted distributed collaborative learning while keeping natural compliance with the privacy protection, it is tremendously difficult to schedule edge nodes of CEI collaboratively when asynchronous FL tasks are applied in CEI system, since the CEI system must make an irrevocable immediate decision on whether to hire a participant who arrives and departs dynamically without knowing future information. We tackle this issue by designing fairness-aware and time-sensitive task allocation mechanisms in asynchronous FL for CEI. First, we design an optimal multi-dimensional contract to guarantee the reliability, honesty and fairness, and maximize the learning accuracy for the fixed deadline scenario. Second, we design a multi-metric participant recruitment mechanism to control time consumption for the limited budget scenario, prove that the problem of optimizing this mechanism is NP-Hard, and propose an e-approximation algorithm accordingly. Finally, extensive experiments using both real-world data and simulated data further demonstrate the effectiveness and efficiency of our proposed mechanisms compared to the state-of-the-art approaches.},\n bibtype = {article},\n author = {Lu, Jianfeng and Liu, Haibo and Zhang, Zhao and Wang, Jiangtao and Goudos, Sotirios K and Wan, Shaohua},\n doi = {10.1109/TII.2021.3117861},\n journal = {IEEE Transactions on Industrial Informatics},\n number = {5}\n}
\n
\n\n\n
\n Critical energy infrastructure (CEI) systems are vital to underpin the national economy and social development, but vulnerable to cyber attack and data privacy leakage when distributed machine learning technologies are deployed on them. Although federated learning (FL) has promoted distributed collaborative learning while keeping natural compliance with the privacy protection, it is tremendously difficult to schedule edge nodes of CEI collaboratively when asynchronous FL tasks are applied in CEI system, since the CEI system must make an irrevocable immediate decision on whether to hire a participant who arrives and departs dynamically without knowing future information. We tackle this issue by designing fairness-aware and time-sensitive task allocation mechanisms in asynchronous FL for CEI. First, we design an optimal multi-dimensional contract to guarantee the reliability, honesty and fairness, and maximize the learning accuracy for the fixed deadline scenario. Second, we design a multi-metric participant recruitment mechanism to control time consumption for the limited budget scenario, prove that the problem of optimizing this mechanism is NP-Hard, and propose an e-approximation algorithm accordingly. Finally, extensive experiments using both real-world data and simulated data further demonstrate the effectiveness and efficiency of our proposed mechanisms compared to the state-of-the-art approaches.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Blockchain-empowered Decentralized Cross-domain Federated Learning for 5G-enabled UAVs.\n \n \n \n\n\n \n Feng, C.; Liu, B.; Yu, K.; Goudos, S., K.; and Wan, S.\n\n\n \n\n\n\n IEEE Transactions on Industrial Informatics, 18(5): 3582-3592. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Blockchain-empowered Decentralized Cross-domain Federated Learning for 5G-enabled UAVs},\n type = {article},\n year = {2022},\n keywords = {Authentication,Blockchains,Industrial Internet of},\n pages = {3582-3592},\n volume = {18},\n id = {16793254-271c-35d5-9930-cb09add65175},\n created = {2021-10-10T06:26:03.057Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-02-04T06:23:20.088Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9551794},\n source_type = {article},\n private_publication = {false},\n abstract = {Motivated by Industry 4.0, 5G-enabled unmanned aerial vehicles (UAVs; also known as drones) are widely applied in various industries. However, the opening 5G network threatens the safe sharing of data. Especially, privacy leakage will bring serious losses to users. As a new machine learning paradigm, federated learning (FL) avoids privacy leakage by sharing data models instead of raw data. Unfortunately, the traditional FL framework is highly dependent on a centralized aggregation server, which will cause the system to crash if the server is compromised. Unauthorized participants may launch poisoning attacks, thereby reducing the usability of the model. In addition, there are communication barriers when a large number of cross-domain devices collaborate to learn. Q1-1: To address the above issues, a blockchain-empowered decentralized horizontal federated learning framework (BE-DHFL) is proposed. The authentication of cross-domain UAVs is accomplished through a multi-signature smart contract. Global model updates are computed by using a smart contract instead of centralized server. Extensive experimental results show that the proposed scheme achieves a high efficiency of cross-domain authentication and good accuracy},\n bibtype = {article},\n author = {Feng, Chaosheng and Liu, Bin and Yu, Keping and Goudos, Sotirios K and Wan, Shaohua},\n doi = {10.1109/TII.2021.3116132},\n journal = {IEEE Transactions on Industrial Informatics},\n number = {5}\n}
\n
\n\n\n
\n Motivated by Industry 4.0, 5G-enabled unmanned aerial vehicles (UAVs; also known as drones) are widely applied in various industries. However, the opening 5G network threatens the safe sharing of data. Especially, privacy leakage will bring serious losses to users. As a new machine learning paradigm, federated learning (FL) avoids privacy leakage by sharing data models instead of raw data. Unfortunately, the traditional FL framework is highly dependent on a centralized aggregation server, which will cause the system to crash if the server is compromised. Unauthorized participants may launch poisoning attacks, thereby reducing the usability of the model. In addition, there are communication barriers when a large number of cross-domain devices collaborate to learn. Q1-1: To address the above issues, a blockchain-empowered decentralized horizontal federated learning framework (BE-DHFL) is proposed. The authentication of cross-domain UAVs is accomplished through a multi-signature smart contract. Global model updates are computed by using a smart contract instead of centralized server. Extensive experimental results show that the proposed scheme achieves a high efficiency of cross-domain authentication and good accuracy\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Drone-Base-Station for Next-Generation Internet-of-Things: A Comparison of Swarm Intelligence Approaches.\n \n \n \n\n\n \n Pliatsios, D.; Goudos, S., K.; Lagkas, T.; Argyriou, V.; Boulogeorgos, A., A., A.; and Sarigiannidis, P.\n\n\n \n\n\n\n IEEE Open Journal of Antennas and Propagation, 3: 32-47. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Drone-Base-Station for Next-Generation Internet-of-Things: A Comparison of Swarm Intelligence Approaches},\n type = {article},\n year = {2022},\n pages = {32-47},\n volume = {3},\n id = {2ffa50d5-3622-3c11-8374-eda6109e1cd9},\n created = {2021-12-08T07:50:19.295Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:48.904Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9638972},\n source_type = {article},\n private_publication = {false},\n abstract = {The emergence of next-generation Internet-of-Things (NG-IoT) applications introduces several challenges for the sixth-generation (6G) mobile networks, such as massive connectivity, increased network capacity, and extremely low-latency. To countermeasure the aforementioned challenges, ultra-dense networking has been widely identified as a possible solution. However, the dense deployment of base stations (BSs) is not always possible or cost-efficient. Drone-base-stations (DBSs) can facilitate network expansion and efficiently address the requirements of NG-IoT. In addition, due to their flexibility, they can provide on-demand connectivity in emergency scenarios or address temporary increases in network traffic. Nevertheless, the optimal placement of a DBS is not a straightforward task due to the limited energy reserves and the increased signal quality degradation in air-to-ground links. To this end, swarm intelligence approaches can be attractive solutions for determining the optimal position of the DBS in the three-dimensional (3D) space. In this work, we explore well-known swarm intelligence approaches, namely the Cuckoo Search (CS), Elephant Herd Optimization (EHO), Grey Wolf Optimization (GWO), Monarch Butterfly Optimization (MBO), Salp Swarm Algorithm (SSA), and Particle Swarm Optimization (PSO) and investigate their performance and efficiency in solving the aforementioned problem. In particular, we investigate the performance of three scenarios in the presence of different swarm intelligence approaches. Additionally, we carry out non-parametric statistical tests, namely the Friedman and Wilcoxon tests, in order to compare the different approaches.},\n bibtype = {article},\n author = {Pliatsios, Dimitrios and Goudos, Sotirios K and Lagkas, Thomas and Argyriou, Vasileios and Boulogeorgos, Alexandros Apostolos A and Sarigiannidis, Panagiotis},\n doi = {10.1109/OJAP.2021.3133459},\n journal = {IEEE Open Journal of Antennas and Propagation}\n}
\n
\n\n\n
\n The emergence of next-generation Internet-of-Things (NG-IoT) applications introduces several challenges for the sixth-generation (6G) mobile networks, such as massive connectivity, increased network capacity, and extremely low-latency. To countermeasure the aforementioned challenges, ultra-dense networking has been widely identified as a possible solution. However, the dense deployment of base stations (BSs) is not always possible or cost-efficient. Drone-base-stations (DBSs) can facilitate network expansion and efficiently address the requirements of NG-IoT. In addition, due to their flexibility, they can provide on-demand connectivity in emergency scenarios or address temporary increases in network traffic. Nevertheless, the optimal placement of a DBS is not a straightforward task due to the limited energy reserves and the increased signal quality degradation in air-to-ground links. To this end, swarm intelligence approaches can be attractive solutions for determining the optimal position of the DBS in the three-dimensional (3D) space. In this work, we explore well-known swarm intelligence approaches, namely the Cuckoo Search (CS), Elephant Herd Optimization (EHO), Grey Wolf Optimization (GWO), Monarch Butterfly Optimization (MBO), Salp Swarm Algorithm (SSA), and Particle Swarm Optimization (PSO) and investigate their performance and efficiency in solving the aforementioned problem. In particular, we investigate the performance of three scenarios in the presence of different swarm intelligence approaches. Additionally, we carry out non-parametric statistical tests, namely the Friedman and Wilcoxon tests, in order to compare the different approaches.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Artwork Style Recognition Using Vision Transformers and MLP Mixer.\n \n \n \n \n\n\n \n Iliadis, L., A.; Nikolaidis, S.; Sarigiannidis, P.; Wan, S.; and Goudos, S., K.\n\n\n \n\n\n\n Technologies, 10(1). 2022.\n \n\n\n\n
\n\n\n\n \n \n \"ArtworkWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Artwork Style Recognition Using Vision Transformers and MLP Mixer},\n type = {article},\n year = {2022},\n volume = {10},\n websites = {https://www.mdpi.com/2227-7080/10/1/2},\n id = {5607ddde-49a2-37c5-b568-e6aa9341e1cc},\n created = {2021-12-28T07:48:51.980Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-12-28T07:48:51.980Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {technologies10010002},\n source_type = {article},\n private_publication = {false},\n abstract = {Through the extensive study of transformers, attention mechanisms have emerged as potentially more powerful than sequential recurrent processing and convolution. In this realm, Vision Transformers have gained much research interest, since their architecture changes the dominant paradigm in Computer Vision. An interesting and difficult task in this field is the classification of artwork styles, since the artistic style of a painting is a descriptor that captures rich information about the painting. In this paper, two different Deep Learning architectures&mdash;Vision Transformer and MLP Mixer (Multi-layer Perceptron Mixer)&mdash;are trained from scratch in the task of artwork style recognition, achieving over 39% prediction accuracy for 21 style classes on the WikiArt paintings dataset. In addition, a comparative study between the most common optimizers was conducted obtaining useful information for future studies.},\n bibtype = {article},\n author = {Iliadis, Lazaros Alexios and Nikolaidis, Spyridon and Sarigiannidis, Panagiotis and Wan, Shaohua and Goudos, Sotirios K},\n doi = {10.3390/technologies10010002},\n journal = {Technologies},\n number = {1}\n}
\n
\n\n\n
\n Through the extensive study of transformers, attention mechanisms have emerged as potentially more powerful than sequential recurrent processing and convolution. In this realm, Vision Transformers have gained much research interest, since their architecture changes the dominant paradigm in Computer Vision. An interesting and difficult task in this field is the classification of artwork styles, since the artistic style of a painting is a descriptor that captures rich information about the painting. In this paper, two different Deep Learning architectures—Vision Transformer and MLP Mixer (Multi-layer Perceptron Mixer)—are trained from scratch in the task of artwork style recognition, achieving over 39% prediction accuracy for 21 style classes on the WikiArt paintings dataset. In addition, a comparative study between the most common optimizers was conducted obtaining useful information for future studies.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n From Spatial Urban Site Data to Path Loss Prediction: An Ensemble Learning Approach.\n \n \n \n\n\n \n Sotiroudis, S., P.; Boursianis, A., D.; Goudos, S., K.; and Siakavara, K.\n\n\n \n\n\n\n IEEE Transactions on Antennas and Propagation, 70(7): 6101-6105. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {From Spatial Urban Site Data to Path Loss Prediction: An Ensemble Learning Approach},\n type = {article},\n year = {2022},\n pages = {6101-6105},\n volume = {70},\n id = {2f6c0652-e08e-3364-a341-161e90a0f0e4},\n created = {2022-01-01T09:47:42.504Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-28T19:02:21.727Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9667264},\n source_type = {article},\n private_publication = {false},\n abstract = {Machine learning (ML) models have become increasingly popular in the field of path loss prediction. Their performance depends profoundly on the data they use as their input. The work at hand proposes and evaluates new input features for urban propagation. These features were obtained via image processing tools. Moreover, we propose a new two-level ensemble model using the concept of stacked generalization. The proposed model is based on seven different basic ML models. To the best of the authors knowledge, this is the first time that a two-level ensemble method is applied to a modeling problem in electromagnetics. The results demonstrate that the new input features, coupled with the new ensemble, provide improved prediction performance.},\n bibtype = {article},\n author = {Sotiroudis, Sotirios P and Boursianis, Achilles D and Goudos, Sotirios K and Siakavara, Katherine},\n doi = {10.1109/TAP.2021.3138257},\n journal = {IEEE Transactions on Antennas and Propagation},\n number = {7}\n}
\n
\n\n\n
\n Machine learning (ML) models have become increasingly popular in the field of path loss prediction. Their performance depends profoundly on the data they use as their input. The work at hand proposes and evaluates new input features for urban propagation. These features were obtained via image processing tools. Moreover, we propose a new two-level ensemble model using the concept of stacked generalization. The proposed model is based on seven different basic ML models. To the best of the authors knowledge, this is the first time that a two-level ensemble method is applied to a modeling problem in electromagnetics. The results demonstrate that the new input features, coupled with the new ensemble, provide improved prediction performance.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Guest Editorial: Antenna Systems for 5G and Beyond.\n \n \n \n\n\n \n Matin, M., A.; Sharawi, M., S.; Goudos, S., K.; and Zhu, J.\n\n\n \n\n\n\n IEEE Communications Magazine, 60(1): 12-13. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Guest Editorial: Antenna Systems for 5G and Beyond},\n type = {article},\n year = {2022},\n pages = {12-13},\n volume = {60},\n id = {bc5d12eb-be23-380a-a8a4-7de3e0e59b6b},\n created = {2022-02-12T19:23:40.819Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-02-12T19:23:40.819Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9711510},\n source_type = {article},\n private_publication = {false},\n bibtype = {article},\n author = {Matin, Mohammad A and Sharawi, Mohammad S and Goudos, Sotirios K and Zhu, Jiang},\n doi = {10.1109/MCOM.2022.9711510},\n journal = {IEEE Communications Magazine},\n number = {1}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Ensemble Learning for 5G Flying Base Station Path Loss Modelling.\n \n \n \n\n\n \n Sotiroudis, S., P.; Athanasiadou, G.; Tsoulos, G., V.; Christodoulou, C.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 16th European Conference on Antennas and Propagation (EuCAP), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Ensemble Learning for 5G Flying Base Station Path Loss Modelling},\n type = {inproceedings},\n year = {2022},\n keywords = {Cellular networks;Base stations;5G mobile communic},\n pages = {1-4},\n id = {c544733d-cf08-31d1-8cfe-a5f9a4e36b09},\n created = {2022-05-12T20:33:00.967Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-05-12T20:33:00.967Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9768903},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The usage of unmanned aerial vehicles (UAVs) as flying base stations (FBSs) for expanding coverage and assisting the terrestrial cellular networks constitutes a promising technology for 5G and beyond. The wide range of a flying base station's movement may stretch the boundaries of path loss at the receiver's site and induce the occurrence of extreme values. Thus, using machine learning techniques may help in accurate path loss modeling for this case. In this paper, we use a combination of the techniques of ensemble learning and oversampling to provide a satisfactory path loss model for FBSs. The datasets used have been obtained through Ray Tracing simulations.},\n bibtype = {inproceedings},\n author = {Sotiroudis, Sotirios P and Athanasiadou, Georgia and Tsoulos, George V and Christodoulou, Christos and Goudos, Sotirios K},\n booktitle = {2022 16th European Conference on Antennas and Propagation (EuCAP)}\n}
\n
\n\n\n
\n The usage of unmanned aerial vehicles (UAVs) as flying base stations (FBSs) for expanding coverage and assisting the terrestrial cellular networks constitutes a promising technology for 5G and beyond. The wide range of a flying base station's movement may stretch the boundaries of path loss at the receiver's site and induce the occurrence of extreme values. Thus, using machine learning techniques may help in accurate path loss modeling for this case. In this paper, we use a combination of the techniques of ensemble learning and oversampling to provide a satisfactory path loss model for FBSs. The datasets used have been obtained through Ray Tracing simulations.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Frequency Selective Surface Design Using Coot Optimization Algorithm for 5G Applications.\n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Salucci, M.; Polo, A.; Sarigiannidis, P.; Koulouridis, S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 International Workshop on Antenna Technology (iWAT), pages 184-187, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Frequency Selective Surface Design Using Coot Optimization Algorithm for 5G Applications},\n type = {inproceedings},\n year = {2022},\n pages = {184-187},\n id = {3c648906-1ea7-3c81-bf9d-f3d0bb551eeb},\n created = {2022-07-05T18:00:44.383Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:18:57.336Z},\n read = {false},\n starred = {true},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9810997},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The interest in Frequency Selective Surfaces has been raised during the last years, mostly due to the advent of 5G cellular communication networks. As electromagnetic structures with diverse characteristics, FSSs can provide comparative advantages in 5G communication systems. In this paper, we design and optimize an FSS, which acts as an absorber in the 5G NR n78 frequency band. As an optimizer, we utilize a meta-heuristic swarm intelligence algorithm, i.e., the Coot Optimization Algorithm. The selected algorithm performs the optimization method both to the unit cell and the corresponding FSS structure. Computed results demonstrate quite satisfactory performance of the presented FSS design, in terms of the minimum reflection coefficient, the maximum realized gain, and the maximum efficiency making it a promising candidate for 5G applications.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Papadopoulou, Maria S and Salucci, Marco and Polo, Alessandro and Sarigiannidis, Panagiotis and Koulouridis, Stavros and Goudos, Sotirios K},\n doi = {10.1109/iWAT54881.2022.9810997},\n booktitle = {2022 International Workshop on Antenna Technology (iWAT)}\n}
\n
\n\n\n
\n The interest in Frequency Selective Surfaces has been raised during the last years, mostly due to the advent of 5G cellular communication networks. As electromagnetic structures with diverse characteristics, FSSs can provide comparative advantages in 5G communication systems. In this paper, we design and optimize an FSS, which acts as an absorber in the 5G NR n78 frequency band. As an optimizer, we utilize a meta-heuristic swarm intelligence algorithm, i.e., the Coot Optimization Algorithm. The selected algorithm performs the optimization method both to the unit cell and the corresponding FSS structure. Computed results demonstrate quite satisfactory performance of the presented FSS design, in terms of the minimum reflection coefficient, the maximum realized gain, and the maximum efficiency making it a promising candidate for 5G applications.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Guest Editorial Introduction to the Special Issue on Context Prediction of Autonomous Vehicles.\n \n \n \n\n\n \n Wan, S.; Goudos, S., K.; Jolfaei, A.; and Joseph, W.\n\n\n \n\n\n\n IEEE Transactions on Intelligent Transportation Systems, 23(7): 9307-9310. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Guest Editorial Introduction to the Special Issue on Context Prediction of Autonomous Vehicles},\n type = {article},\n year = {2022},\n pages = {9307-9310},\n volume = {23},\n id = {0ba07c71-35ae-328d-b872-d1afd7c3eec2},\n created = {2022-07-13T21:48:26.203Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-13T21:48:26.203Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9826340},\n source_type = {article},\n private_publication = {false},\n bibtype = {article},\n author = {Wan, Shaohua and Goudos, Sotirios K and Jolfaei, Alireza and Joseph, Wout},\n doi = {10.1109/TITS.2022.3185390},\n journal = {IEEE Transactions on Intelligent Transportation Systems},\n number = {7}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Antenna Design for Next-generation Internet-of-Things Nodes using Generative Adversarial Networks.\n \n \n \n\n\n \n Iliadis, Lazaros Alexios, S., K., G.; and Sarigiannidis, P.\n\n\n \n\n\n\n In Proceedings of the 20th International Symposium on applied Electromagnetics and Mechanics, pages 166-167, 2022. ISEM\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Antenna Design for Next-generation Internet-of-Things Nodes using Generative Adversarial Networks},\n type = {inproceedings},\n year = {2022},\n pages = {166-167},\n publisher = {ISEM},\n city = {Thessaloniki, Greece},\n id = {80baf021-6e8b-34b5-804f-0ff0b51299b0},\n created = {2022-07-14T18:38:19.058Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:31:20.930Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {ISEM2022},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The advent of NGIoT next-generation Internet-of-Things (NG-IoT) brings different research challenges and priorities. The identified priorities encompass several components of the IoT stack and, as a result, relate to 6G, Distributed Ledgers, Big Data, Artificial Intelligence, Cyber Security, and Cloud Computing. Especially, the emerging sixth-generation (6G) mobile networks require features like massive connectivity, increased network capacity, and extremely low-latency. Antennas represent a crucial part of the NGIoT ecosystem. Thus, the antenna design for NGIoT nodes is a challenging task. Among others possible design options for the NGIoT case are the microstrip patch antennas. Microstrip patch antennas have played a crucial role in the advancements in mobile and satellite communications, due to their appealing characteristics [1]. However, their design demands many hours of trial-and-error simulations with full-wave electromagnetic solvers. One alternative to this standard procedure is the construction of data-driven approximation models, known as surrogate models. Surrogate models imitate the behavior and the performance of the simulation model as closely as possible while being computationally cheaper to evaluate.},\n bibtype = {inproceedings},\n author = {Iliadis, Lazaros Alexios, Sotirios K. Goudos and Sarigiannidis, Panagiotis},\n booktitle = {Proceedings of the 20th International Symposium on applied Electromagnetics and Mechanics}\n}
\n
\n\n\n
\n The advent of NGIoT next-generation Internet-of-Things (NG-IoT) brings different research challenges and priorities. The identified priorities encompass several components of the IoT stack and, as a result, relate to 6G, Distributed Ledgers, Big Data, Artificial Intelligence, Cyber Security, and Cloud Computing. Especially, the emerging sixth-generation (6G) mobile networks require features like massive connectivity, increased network capacity, and extremely low-latency. Antennas represent a crucial part of the NGIoT ecosystem. Thus, the antenna design for NGIoT nodes is a challenging task. Among others possible design options for the NGIoT case are the microstrip patch antennas. Microstrip patch antennas have played a crucial role in the advancements in mobile and satellite communications, due to their appealing characteristics [1]. However, their design demands many hours of trial-and-error simulations with full-wave electromagnetic solvers. One alternative to this standard procedure is the construction of data-driven approximation models, known as surrogate models. Surrogate models imitate the behavior and the performance of the simulation model as closely as possible while being computationally cheaper to evaluate.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Cloud Computing web-based application for Smart Farming based on microservices architecture.\n \n \n \n\n\n \n Moysiadis, V.; Tsakos, K.; Sarigiannidis, P.; Petrakis, E., G., M.; Boursianis, A., D.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-5, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A Cloud Computing web-based application for Smart Farming based on microservices architecture},\n type = {inproceedings},\n year = {2022},\n keywords = {Smart agriculture;Productivity;Cloud computing;Mac},\n pages = {1-5},\n id = {d118a657-5515-3260-8524-53a1aee7243c},\n created = {2022-07-29T06:57:57.160Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-29T06:57:57.160Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9837727},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The agriculture sector is envisioning a revolution of traditional farming supported by Information and Communications Technologies (ICT) and Cloud Computing is one of them. This tendency is called Smart Farming and promises to boost productivity while reducing production costs and chemical inputs. Cloud Computing aims to provide the necessary resources and the central orchestration of all devices involved in a Smart Farming scenario. To achieve high scalability, usability and performance in Cloud-based applications, we have to move from a monolithic development approach to microservices architecture using cutting edge technologies like containerisation. This paper presents a Smart Farming application based on Cloud Computing that promises to provide useful information to agronomists and farmers to support their decisions based on measurements from ground sensors and images captured from UAVs or ground cameras. Our implementation is based on microservices architecture using Docker Containers as the virtualisation technology. Each microservice runs on a different container and communicates through a RESTful API interface. The proposed architecture is highly scalable in future upgrades and promises high performance and security.},\n bibtype = {inproceedings},\n author = {Moysiadis, Vasileios and Tsakos, Konstantinos and Sarigiannidis, Panagiotis and Petrakis, Euripides G M and Boursianis, Achilles D and Goudos, Sotirios K},\n doi = {10.1109/MOCAST54814.2022.9837727},\n booktitle = {2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n The agriculture sector is envisioning a revolution of traditional farming supported by Information and Communications Technologies (ICT) and Cloud Computing is one of them. This tendency is called Smart Farming and promises to boost productivity while reducing production costs and chemical inputs. Cloud Computing aims to provide the necessary resources and the central orchestration of all devices involved in a Smart Farming scenario. To achieve high scalability, usability and performance in Cloud-based applications, we have to move from a monolithic development approach to microservices architecture using cutting edge technologies like containerisation. This paper presents a Smart Farming application based on Cloud Computing that promises to provide useful information to agronomists and farmers to support their decisions based on measurements from ground sensors and images captured from UAVs or ground cameras. Our implementation is based on microservices architecture using Docker Containers as the virtualisation technology. Each microservice runs on a different container and communicates through a RESTful API interface. The proposed architecture is highly scalable in future upgrades and promises high performance and security.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Comparative Performance of Algorithmic Techniques for Optimizing Dual-Band Rectifier.\n \n \n \n\n\n \n Papadopoulou, M., S.; Boursianis, A., D.; Chatzopoulos, A.; Sarigiannidis, P.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Comparative Performance of Algorithmic Techniques for Optimizing Dual-Band Rectifier},\n type = {inproceedings},\n year = {2022},\n keywords = {RF energy harvesting;rectenna;impedance matching;o},\n pages = {1-4},\n id = {e5a6a85d-17d2-36d8-a10d-bdd5645e0a63},\n created = {2022-07-29T06:57:57.167Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-29T06:57:57.167Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9837645},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Radio Frequency (RF) energy harvesting (EH) is a technique to replenish the source of wireless sensor networks (WSNs). Also, many interdisciplinary fields in the Internet-of-Things (IoT) era use RF-EH, like precision agriculture, biomedical, and robotics. Over the years, various designs have been presented in the literature operating in multi- or wide-band frequencies. Usually, a designed system is optimized using specific goals and optimization parameters to obtain maximization in power conversion efficiency (PCE). In this work, a dual-band RF rectifier system that resonates in the Wi-Fi frequency bands of 2.45 GHz and 5.8 GHz is presented. The proposed system is optimized using four optimization techniques, namely the Gradient algorithm, the Minimax algorithm, the Simulated Annealing, and the Genetic algorithm. A set of comparative results is presented to assess the performance of each technique and to obtain the feasible solution of the proposed design. Numerical results demonstrate that a 42.8% efficiency is achieved, having a 16 dBm input power and a 1.7 kΩ output resistance load.},\n bibtype = {inproceedings},\n author = {Papadopoulou, Maria S and Boursianis, Achilles D and Chatzopoulos, Argyrios and Sarigiannidis, Panagiotis and Nikolaidis, Spyridon and Goudos, Sotirios K},\n doi = {10.1109/MOCAST54814.2022.9837645},\n booktitle = {2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n Radio Frequency (RF) energy harvesting (EH) is a technique to replenish the source of wireless sensor networks (WSNs). Also, many interdisciplinary fields in the Internet-of-Things (IoT) era use RF-EH, like precision agriculture, biomedical, and robotics. Over the years, various designs have been presented in the literature operating in multi- or wide-band frequencies. Usually, a designed system is optimized using specific goals and optimization parameters to obtain maximization in power conversion efficiency (PCE). In this work, a dual-band RF rectifier system that resonates in the Wi-Fi frequency bands of 2.45 GHz and 5.8 GHz is presented. The proposed system is optimized using four optimization techniques, namely the Gradient algorithm, the Minimax algorithm, the Simulated Annealing, and the Genetic algorithm. A set of comparative results is presented to assess the performance of each technique and to obtain the feasible solution of the proposed design. Numerical results demonstrate that a 42.8% efficiency is achieved, having a 16 dBm input power and a 1.7 kΩ output resistance load.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A System-by-Design Approach for Optimal Planning of EM Skins in Smart Urban Areas.\n \n \n \n\n\n \n Salucci, M.; Benoni, A.; Goudos, S., K.; and Massa, A.\n\n\n \n\n\n\n In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A System-by-Design Approach for Optimal Planning of EM Skins in Smart Urban Areas},\n type = {inproceedings},\n year = {2022},\n keywords = {Circuits and systems;Urban areas;Machine learning;},\n pages = {1-4},\n id = {20b74ab4-8b92-3e9a-86b8-9210878cd61f},\n created = {2022-07-29T06:57:57.311Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-29T06:57:57.311Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9837767},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This work deals with the optimal planning of low-cost/low-profile passive and static electromagnetic skins (EMSs) allowing to implement Smart Electromagnetic Environments (SEMEs) in large urban areas. Owing to the high complexity/scale of the EM problem at hand, the planning problem is formulated as a global optimization one efficiently solved thanks to a suitably-customized System-by-Design (SbD) methodology relying on Machine Learning (ML) and Evolutionary Algorithms (EAs). An illustrative example is shown to assess the effectiveness of the proposed SEME planning method in a realistic scenario.},\n bibtype = {inproceedings},\n author = {Salucci, Marco and Benoni, Arianna and Goudos, Sotirios K and Massa, Andrea},\n doi = {10.1109/MOCAST54814.2022.9837767},\n booktitle = {2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n This work deals with the optimal planning of low-cost/low-profile passive and static electromagnetic skins (EMSs) allowing to implement Smart Electromagnetic Environments (SEMEs) in large urban areas. Owing to the high complexity/scale of the EM problem at hand, the planning problem is formulated as a global optimization one efficiently solved thanks to a suitably-customized System-by-Design (SbD) methodology relying on Machine Learning (ML) and Evolutionary Algorithms (EAs). An illustrative example is shown to assess the effectiveness of the proposed SEME planning method in a realistic scenario.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Integration of Information and Communication Technologies in Agriculture for Farm Management and Knowledge Exchange.\n \n \n \n\n\n \n Chaschatzis, C.; Lytos, A.; Bibi, S.; Lagkas, T.; Petaloti, C.; Goudos, S.; Moscholios, I.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Integration of Information and Communication Technologies in Agriculture for Farm Management and Knowledge Exchange},\n type = {inproceedings},\n year = {2022},\n keywords = {Productivity;Technological innovation;Software arc},\n pages = {1-4},\n id = {30408cd0-cf0e-3e84-ba4c-18e0b4d3a289},\n created = {2022-07-29T06:57:57.317Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-29T06:57:57.317Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9837534},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The demographic growth of the last centuries has been followed by a demand for higher productivity of agriculture activities and an increase in the quality of farming products. Modern consumers seek quality by selecting foods containing high concentrations of healthy nutrients (e.g., antioxidants, vitamins, minerals) while also valuing eco-friendly practices and sustainable consumption. In line with the modern social needs, integrating Information Communication Technologies (ICT) solutions could assist in different levels of the agriculture lifecycle, such as crop monitoring, animal production, food safety, and farm management. Two aspects that are often neglected from many ICT solutions are the compilation of different data sources into the proposed software architecture and the facilitation of knowledge exchange between domain experts. In order to fill the gap of knowledge accumulation in this paper we take into consideration the PestNu architecture, as defined in section V that illustrates the different steps that are required for a complete data analysis life cycle into the development and deployment of the OpenHub platform. The OpenHub aims to cover the knowledge hub between experts with different backgrounds and promote the best practices from different users with hands-on experience.},\n bibtype = {inproceedings},\n author = {Chaschatzis, Christos and Lytos, Anastasios and Bibi, Stamatia and Lagkas, Thomas and Petaloti, Christina and Goudos, Sotirios and Moscholios, Ioannis and Sarigiannidis, Panagiotis},\n doi = {10.1109/MOCAST54814.2022.9837534},\n booktitle = {2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n The demographic growth of the last centuries has been followed by a demand for higher productivity of agriculture activities and an increase in the quality of farming products. Modern consumers seek quality by selecting foods containing high concentrations of healthy nutrients (e.g., antioxidants, vitamins, minerals) while also valuing eco-friendly practices and sustainable consumption. In line with the modern social needs, integrating Information Communication Technologies (ICT) solutions could assist in different levels of the agriculture lifecycle, such as crop monitoring, animal production, food safety, and farm management. Two aspects that are often neglected from many ICT solutions are the compilation of different data sources into the proposed software architecture and the facilitation of knowledge exchange between domain experts. In order to fill the gap of knowledge accumulation in this paper we take into consideration the PestNu architecture, as defined in section V that illustrates the different steps that are required for a complete data analysis life cycle into the development and deployment of the OpenHub platform. The OpenHub aims to cover the knowledge hub between experts with different backgrounds and promote the best practices from different users with hands-on experience.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Music Deep Learning: A Survey on Deep Learning Methods for Music Processing.\n \n \n \n\n\n \n Iliadis, L., A.; Sotiroudis, S., P.; Kokkinidis, K.; Sarigiannidis, P.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Music Deep Learning: A Survey on Deep Learning Methods for Music Processing},\n type = {inproceedings},\n year = {2022},\n keywords = {Deep Learning;Music Signal Processing;Music Inform},\n pages = {1-4},\n id = {f646b836-377c-3d2c-8a89-215ab0aad9e1},\n created = {2022-07-29T06:57:57.324Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-29T06:57:57.324Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9837541},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Deep Learning has emerged as a powerful set of computational methods achieving great results in a variety of different tasks. Music signal processing, a field with rich commercial applications, seems to benefit too from this data-driven approach. In this paper a review of the state of the art Deep Learning methods applied on music signal processing is provided. A special focus is given in music information retrieval and music generation. In addition, possible future research directions are discussed.},\n bibtype = {inproceedings},\n author = {Iliadis, Lazaros Alexios and Sotiroudis, Sotirios P and Kokkinidis, Kostas and Sarigiannidis, Panagiotis and Nikolaidis, Spiridon and Goudos, Sotirios K},\n doi = {10.1109/MOCAST54814.2022.9837541},\n booktitle = {2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n Deep Learning has emerged as a powerful set of computational methods achieving great results in a variety of different tasks. Music signal processing, a field with rich commercial applications, seems to benefit too from this data-driven approach. In this paper a review of the state of the art Deep Learning methods applied on music signal processing is provided. A special focus is given in music information retrieval and music generation. In addition, possible future research directions are discussed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Smart Refrigeration Equipment based on IoT Technology for Reducing Power Consumption.\n \n \n \n\n\n \n Koritsoglou, K.; Papadopoulou, M., S.; Boursianis, A., D.; Sarigiannidis, P.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Smart Refrigeration Equipment based on IoT Technology for Reducing Power Consumption},\n type = {inproceedings},\n year = {2022},\n keywords = {Wireless communication;Performance evaluation;Wire},\n pages = {1-4},\n id = {7e0c4927-8eb2-3014-908b-7fcc9059cc06},\n created = {2022-07-29T06:57:57.324Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-29T06:57:57.324Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9837760},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In developed countries, companies active in the food retail sector consume about 20% of the total power required for cooling and are therefore ranked among them with the largest energy footprint after the industries. For this reason, refrigeration equipment manufacturers are increasingly focusing on methods that will reduce the power consumption required for its efficient operation. The solutions that are currently implemented mainly focus on interventions in the development phase of freezer units (better insulation, variable frequency compressors, etc.), which, however, do not adequately address the problem. This paper presents the development of an IoT-based technology device which, using machine learning techniques, aims to reduce the power consumption of refrigeration equipment and consecutively, the energy footprint of food retailers.},\n bibtype = {inproceedings},\n author = {Koritsoglou, Kyriakos and Papadopoulou, Maria S and Boursianis, Achilles D and Sarigiannidis, Panagiotis and Nikolaidis, Spyridon and Goudos, Sotirios K},\n doi = {10.1109/MOCAST54814.2022.9837760},\n booktitle = {2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n In developed countries, companies active in the food retail sector consume about 20% of the total power required for cooling and are therefore ranked among them with the largest energy footprint after the industries. For this reason, refrigeration equipment manufacturers are increasingly focusing on methods that will reduce the power consumption required for its efficient operation. The solutions that are currently implemented mainly focus on interventions in the development phase of freezer units (better insulation, variable frequency compressors, etc.), which, however, do not adequately address the problem. This paper presents the development of an IoT-based technology device which, using machine learning techniques, aims to reduce the power consumption of refrigeration equipment and consecutively, the energy footprint of food retailers.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Rectifier circuit design for 5G energy harvesting applications.\n \n \n \n\n\n \n Bougas, D.; Sarigiannidis, P.; Papadopoulou, M., S.; Nikolaidis, S.; Boursianis, A., D.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Rectifier circuit design for 5G energy harvesting applications},\n type = {inproceedings},\n year = {2022},\n keywords = {Radio frequency;Performance evaluation;5G mobile c},\n pages = {1-4},\n id = {a52decdf-14cf-3327-9327-04e883ed2838},\n created = {2022-07-29T06:57:57.345Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-29T06:57:57.345Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9837524},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The need for electronic devices usage has risen significantly over the years. This has in turn generated greater demands for electricity and in addition for green energy sources. These include Radio-Frequency (RF) energy harvesting. In this concept we design a rectifier circuit for RF to DC conversion suitable for operation at sub-6 GHz 5G bands. Such a circuit can be used to supply low-power electronic devices. The proposed rectifier works at the frequency band FR1 of 5G cellular network and more specifically at 3.5 GHz. The most important problem in the RF energy harvesters is low system efficiency, something that limits the popularity of the power harvest. The proposed design is found to be highly efficient in its current form. Numerical results show that the system in a single-tone signal provides maximum power conversion efficiency equal to 42.5% when the load of the circuit is 1.1 KΩ and the input power reaches 9 dBm. The presented rectifier circuit performs better or equally with similar designs in the literature.},\n bibtype = {inproceedings},\n author = {Bougas, D and Sarigiannidis, Panagiotis and Papadopoulou, Maria S and Nikolaidis, Spyridon and Boursianis, Achilles D and Goudos, Sotirios. K},\n doi = {10.1109/MOCAST54814.2022.9837524},\n booktitle = {2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n The need for electronic devices usage has risen significantly over the years. This has in turn generated greater demands for electricity and in addition for green energy sources. These include Radio-Frequency (RF) energy harvesting. In this concept we design a rectifier circuit for RF to DC conversion suitable for operation at sub-6 GHz 5G bands. Such a circuit can be used to supply low-power electronic devices. The proposed rectifier works at the frequency band FR1 of 5G cellular network and more specifically at 3.5 GHz. The most important problem in the RF energy harvesters is low system efficiency, something that limits the popularity of the power harvest. The proposed design is found to be highly efficient in its current form. Numerical results show that the system in a single-tone signal provides maximum power conversion efficiency equal to 42.5% when the load of the circuit is 1.1 KΩ and the input power reaches 9 dBm. The presented rectifier circuit performs better or equally with similar designs in the literature.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Talking Vine: A Novel Smart Farming Application based on Wireless Distributed Sensing and Communication.\n \n \n \n\n\n \n Polo, A.; Oliveri, G.; Goudos, S., K.; Salucci, M.; and Massa, A.\n\n\n \n\n\n\n In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Talking Vine: A Novel Smart Farming Application based on Wireless Distributed Sensing and Communication},\n type = {inproceedings},\n year = {2022},\n keywords = {distributed wireless sensing;internet of things (I},\n pages = {1-4},\n id = {cbb1ae2f-dd42-318f-bf7f-0ced9e60baea},\n created = {2022-07-29T06:57:57.351Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-29T06:57:57.351Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9837621},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This paper introduces "Talking Vine", a novel service that aims to tighten and "humanize" the relationship between users and IoT-enabled plants by means of distributed wireless sensing and communication technologies. The proposed system is under experimental validation within a farm vineyard in Trentino, Italy.},\n bibtype = {inproceedings},\n author = {Polo, Alessandro and Oliveri, Giacomo and Goudos, Sotirios K and Salucci, Marco and Massa, Andrea},\n doi = {10.1109/MOCAST54814.2022.9837621},\n booktitle = {2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n This paper introduces \"Talking Vine\", a novel service that aims to tighten and \"humanize\" the relationship between users and IoT-enabled plants by means of distributed wireless sensing and communication technologies. The proposed system is under experimental validation within a farm vineyard in Trentino, Italy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The road to 6G: a comprehensive survey of deep learning applications in cell-free massive MIMO communications systems.\n \n \n \n \n\n\n \n Iliadis, L., A.; Zaharis, Z., D.; Sotiroudis, S.; Sarigiannidis, P.; Karagiannidis, G., K.; and Goudos, S., K.\n\n\n \n\n\n\n EURASIP Journal on Wireless Communications and Networking, 2022(1): 68. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"TheWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {The road to 6G: a comprehensive survey of deep learning applications in cell-free massive MIMO communications systems},\n type = {article},\n year = {2022},\n pages = {68},\n volume = {2022},\n websites = {https://doi.org/10.1186/s13638-022-02153-z},\n id = {c43ac614-9e19-3b86-8ff8-e5895adec812},\n created = {2022-08-12T11:11:44.766Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:18:57.331Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {RN481},\n source_type = {article},\n user_context = {Journal Article},\n private_publication = {false},\n abstract = {The fifth generation (5G) of telecommunications networks is currently commercially deployed. One of their core enabling technologies is cellular Massive Multiple-Input-Multiple-Output (M-MIMO) systems. However, future wireless networks are expected to serve a very large number of devices and the current MIMO networks are not scalable, highlighting the need for novel solutions. At this moment, Cell-free Massive MIMO (CF M-MIMO) technology seems to be the most promising idea in this direction. Despite their appealing characteristics, CF M-MIMO systems face their own challenges, such as power allocation and channel estimation. Deep Learning (DL) has been successfully employed to a wide range of problems in many different research areas, including wireless communications. In this paper, a review of the state-of-the-art DL methods applied to CF M-MIMO communications systems is provided. In addition, the basic characteristics of Cell-free networks are introduced, along with the presentation of the most commonly used DL models. Finally, future research directions are highlighted.},\n bibtype = {article},\n author = {Iliadis, Lazaros Alexios and Zaharis, Zaharias D and Sotiroudis, Sotirios and Sarigiannidis, Panagiotis and Karagiannidis, George K and Goudos, Sotirios K},\n doi = {10.1186/s13638-022-02153-z},\n journal = {EURASIP Journal on Wireless Communications and Networking},\n number = {1}\n}
\n
\n\n\n
\n The fifth generation (5G) of telecommunications networks is currently commercially deployed. One of their core enabling technologies is cellular Massive Multiple-Input-Multiple-Output (M-MIMO) systems. However, future wireless networks are expected to serve a very large number of devices and the current MIMO networks are not scalable, highlighting the need for novel solutions. At this moment, Cell-free Massive MIMO (CF M-MIMO) technology seems to be the most promising idea in this direction. Despite their appealing characteristics, CF M-MIMO systems face their own challenges, such as power allocation and channel estimation. Deep Learning (DL) has been successfully employed to a wide range of problems in many different research areas, including wireless communications. In this paper, a review of the state-of-the-art DL methods applied to CF M-MIMO communications systems is provided. In addition, the basic characteristics of Cell-free networks are introduced, along with the presentation of the most commonly used DL models. Finally, future research directions are highlighted.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Scalable On-Chain and Off-Chain Blockchain for Sharing Economy in Large-Scale Wireless Networks.\n \n \n \n\n\n \n Cai, T.; Chen, W.; Psannis, K., E.; Goudos, S., K.; Yu, Y.; Zheng, Z.; and Wan, S.\n\n\n \n\n\n\n IEEE Wireless Communications, 29(3): 32-38. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Scalable On-Chain and Off-Chain Blockchain for Sharing Economy in Large-Scale Wireless Networks},\n type = {article},\n year = {2022},\n pages = {32-38},\n volume = {29},\n id = {6936cb24-0415-3c2a-95b9-8ff3b379e927},\n created = {2022-08-17T09:35:05.138Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:49.133Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9857806},\n source_type = {article},\n private_publication = {false},\n abstract = {In the future sharing economy, billions of underutilized IoT devices will be deployed to enable a powerful and large-scale sharing market that produces economic, environmental, and social benefits. Given the fact that communications in numerous IoT devices through wireless links are unreliable, blockchain technology, as a promising solution, has emerged to achieve reliable and secure sharing services in a decentralized manner. However, applying blockchain in large-scale wireless networks confronts scalability challenges. This motivates us to propose a real-time, trusted data interactive, and fine-grained transaction supportable sharing framework, the core of which is a novel two-layer scaling blockchain design. In the on-chain layer, sharing-oriented sharding is employed to enable secure and efficient processing of macro-transactions on the chain. In the off-chain layer, cross-zone off-chain channels are set up to provide real-time sharing transactions with high-frequency micro-trading scenarios. Finally, a proof-of-concept case study of electric vehicle sharing data is implemented with experimental results to demonstrate the feasibility of our framework.},\n bibtype = {article},\n author = {Cai, Ting and Chen, Wuhui and Psannis, Kostas E and Goudos, Sotirios K and Yu, Yang and Zheng, Zibin and Wan, Shaohua},\n doi = {10.1109/MWC.004.2100616},\n journal = {IEEE Wireless Communications},\n number = {3}\n}
\n
\n\n\n
\n In the future sharing economy, billions of underutilized IoT devices will be deployed to enable a powerful and large-scale sharing market that produces economic, environmental, and social benefits. Given the fact that communications in numerous IoT devices through wireless links are unreliable, blockchain technology, as a promising solution, has emerged to achieve reliable and secure sharing services in a decentralized manner. However, applying blockchain in large-scale wireless networks confronts scalability challenges. This motivates us to propose a real-time, trusted data interactive, and fine-grained transaction supportable sharing framework, the core of which is a novel two-layer scaling blockchain design. In the on-chain layer, sharing-oriented sharding is employed to enable secure and efficient processing of macro-transactions on the chain. In the off-chain layer, cross-zone off-chain channels are set up to provide real-time sharing transactions with high-frequency micro-trading scenarios. Finally, a proof-of-concept case study of electric vehicle sharing data is implemented with experimental results to demonstrate the feasibility of our framework.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards 6G: Deep Learning in Cell-Free Massive MIMO.\n \n \n \n\n\n \n Iliadis, L., A.; Zaharis, Z., D.; Sotiroudis, S., P.; Sarigiannidis, P.; Karagiannidis, G., K.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2022, pages 269-273, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Towards 6G: Deep Learning in Cell-Free Massive MIMO},\n type = {inproceedings},\n year = {2022},\n keywords = {6G,Cell-Free Massive MIMO,Deep learning,User-centric Cell-Free Massive MIMO},\n pages = {269-273},\n id = {2096b7e9-63f8-3873-b334-e8ea5135fc9d},\n created = {2022-08-25T07:30:49.796Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:12:36.358Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n source_type = {INPROCEEDINGS},\n private_publication = {false},\n abstract = {Massive Multiple-Input-Multiple-Output (MIMO) technology is considered a crucial part of the fifth generation (5G) telecommunications systems. However, moving towards sixth generation (6G) wireless networks, novel solutions have to be incorporated into the current telecommunications' systems. Cell-free Massive MIMO and especially the user-centric approach, seems to be the most promising idea to this direction at this moment. Nevertheless, there are many open issues to be resolved. Deep Learning has been successfully applied to a wide range of problems in many different fields, including wireless communications. In this paper, a review of the state-of-The-Art Deep Learning methods applied to Cell-free Massive MIMO communications systems is provided. In addition future research directions are discussed.},\n bibtype = {inproceedings},\n author = {Iliadis, Lazaros Alexios and Zaharis, Zaharias D and Sotiroudis, Sotirios P and Sarigiannidis, Panagiotis and Karagiannidis, George K and Goudos, Sotirios K},\n doi = {10.1109/BlackSeaCom54372.2022.9858306},\n booktitle = {2022 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2022}\n}
\n
\n\n\n
\n Massive Multiple-Input-Multiple-Output (MIMO) technology is considered a crucial part of the fifth generation (5G) telecommunications systems. However, moving towards sixth generation (6G) wireless networks, novel solutions have to be incorporated into the current telecommunications' systems. Cell-free Massive MIMO and especially the user-centric approach, seems to be the most promising idea to this direction at this moment. Nevertheless, there are many open issues to be resolved. Deep Learning has been successfully applied to a wide range of problems in many different fields, including wireless communications. In this paper, a review of the state-of-The-Art Deep Learning methods applied to Cell-free Massive MIMO communications systems is provided. In addition future research directions are discussed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Comprehensive Review on Artificial Intelligence/Machine Learning Algorithms for Empowering the Future IoT Toward 6G Era.\n \n \n \n\n\n \n Mahmood, M., R.; Matin, M., A.; Sarigiannidis, P.; and Goudos, S., K.\n\n\n \n\n\n\n IEEE Access, 10: 87535-87562. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {A Comprehensive Review on Artificial Intelligence/Machine Learning Algorithms for Empowering the Future IoT Toward 6G Era},\n type = {article},\n year = {2022},\n pages = {87535-87562},\n volume = {10},\n id = {896ba4d7-1771-3ddb-a7c6-584d66ee6720},\n created = {2022-08-27T07:39:28.911Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:48.977Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9861650},\n source_type = {article},\n private_publication = {false},\n abstract = {The evolution of the wireless network systems over decades has been providing new services to the users with the help of innovative network and device technologies. In recent times, the 5G network systems are about to be deployed which creates the opportunity to realize massive connectivity with high throughput, low latency, high energy efficiency and security. It also focuses on providing massive Internet of Things (IoT) network connectivity as well as services for good health, large-scale agricultural and industrial production, intelligent traffic control and electricity generation, transmission and distribution systems. However, the ever-increasing number of user devices is directing the researchers towards beyond 5G systems to allocate these user devices with higher bandwidth. Researches on the 6G wireless network systems have already begun to provide higher bandwidth availability for densely connected larger network devices with QoS surety. Researchers are leveraging artificial intelligence (AI)/machine learning (ML) for enhancing future IoT network operations and services. This paper attempts to discuss AI/ML algorithms that can help in developing energy efficient, secured and effective IoT network operations and services. In particular, our article concentrates on the major issues and factors that influence the design of the communication systems for future IoT with the integration of AI/ML. It also highlights application domains, including smart healthcare, smart agriculture, smart transportation, smart grid and smart industry that can operate efficiently and securely. Finally, this paper ends with the discussion on future research scopes with these algorithms in addressing the open issues of the future IoT network systems.},\n bibtype = {article},\n author = {Mahmood, M Rezwanul and Matin, Mohammad Abdul and Sarigiannidis, Panagiotis and Goudos, Sotirios K},\n doi = {10.1109/ACCESS.2022.3199689},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n The evolution of the wireless network systems over decades has been providing new services to the users with the help of innovative network and device technologies. In recent times, the 5G network systems are about to be deployed which creates the opportunity to realize massive connectivity with high throughput, low latency, high energy efficiency and security. It also focuses on providing massive Internet of Things (IoT) network connectivity as well as services for good health, large-scale agricultural and industrial production, intelligent traffic control and electricity generation, transmission and distribution systems. However, the ever-increasing number of user devices is directing the researchers towards beyond 5G systems to allocate these user devices with higher bandwidth. Researches on the 6G wireless network systems have already begun to provide higher bandwidth availability for densely connected larger network devices with QoS surety. Researchers are leveraging artificial intelligence (AI)/machine learning (ML) for enhancing future IoT network operations and services. This paper attempts to discuss AI/ML algorithms that can help in developing energy efficient, secured and effective IoT network operations and services. In particular, our article concentrates on the major issues and factors that influence the design of the communication systems for future IoT with the integration of AI/ML. It also highlights application domains, including smart healthcare, smart agriculture, smart transportation, smart grid and smart industry that can operate efficiently and securely. Finally, this paper ends with the discussion on future research scopes with these algorithms in addressing the open issues of the future IoT network systems.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Antenna Array Design Using Differential Evolution with Ranking-Based Mutation Operators.\n \n \n \n \n\n\n \n Goudos, S., K.; and Mohamed, A., W.\n\n\n \n\n\n\n Handbook of Nature-Inspired Optimization Algorithms: The State of the Art: Volume I: Solving Single Objective Bound-Constrained Real-Parameter Numerical Optimization Problems, pages 243-263. Mohamed, A.; Oliva, D.; and Suganthan, P., N., editor(s). Springer International Publishing, 2022.\n \n\n\n\n
\n\n\n\n \n \n \"HandbookWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2022},\n pages = {243-263},\n websites = {https://doi.org/10.1007/978-3-031-07512-4_9},\n publisher = {Springer International Publishing},\n city = {Cham},\n id = {eff16c19-29ef-3afe-bf8f-cacb5dacd439},\n created = {2022-09-02T17:10:23.421Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-09-02T17:10:23.421Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2022},\n source_type = {inbook},\n private_publication = {false},\n abstract = {The topic of designing linear arrays with design limitations such as the minimum and maximum distance between two adjacent elements is addressed in this book chapter. We apply a design framework based on Differential Evolution (DE) with ranking-based mutation operators. This DE variant uses a different mutation operator than the original DE. The basic idea in this DE variant is to probabilistically select the vectors for the mutation operator based on their ranking in the current population instead of using a random selection mechanism which is the case in the original DE. We perform a comparative study on four different linear array design cases among different DE variants with and without ranking-based mutation operator. The results indicate the ranking-based mutation operator gives an additional advantage to design process. The ranking-based DE variants obtain in general better results and seem to obtain faster convergence as well.},\n bibtype = {inbook},\n author = {Goudos, Sotirios K and Mohamed, Ali Wagdy},\n editor = {Mohamed, Ali and Oliva, Diego and Suganthan, Ponnuthurai Nagaratnam},\n doi = {10.1007/978-3-031-07512-4_9},\n chapter = {Antenna Array Design Using Differential Evolution with Ranking-Based Mutation Operators},\n title = {Handbook of Nature-Inspired Optimization Algorithms: The State of the Art: Volume I: Solving Single Objective Bound-Constrained Real-Parameter Numerical Optimization Problems}\n}
\n
\n\n\n
\n The topic of designing linear arrays with design limitations such as the minimum and maximum distance between two adjacent elements is addressed in this book chapter. We apply a design framework based on Differential Evolution (DE) with ranking-based mutation operators. This DE variant uses a different mutation operator than the original DE. The basic idea in this DE variant is to probabilistically select the vectors for the mutation operator based on their ranking in the current population instead of using a random selection mechanism which is the case in the original DE. We perform a comparative study on four different linear array design cases among different DE variants with and without ranking-based mutation operator. The results indicate the ranking-based mutation operator gives an additional advantage to design process. The ranking-based DE variants obtain in general better results and seem to obtain faster convergence as well.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dual-Band Frequency Selective Surface Design Using Artificial Hummingbird Algorithm.\n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Koulouridis, S.; Georgiadis, A.; Tentzeris, M., M.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI), pages 982-983, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Dual-Band Frequency Selective Surface Design Using Artificial Hummingbird Algorithm},\n type = {inproceedings},\n year = {2022},\n keywords = {Radio frequency;Performance evaluation;Frequency s},\n pages = {982-983},\n id = {13724281-7933-39ef-88c7-b5c4f88d4bcb},\n created = {2022-09-23T05:26:05.981Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-09-23T05:26:05.981Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9886108},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In this work, the design and optimization of an FSS device are presented for dual-band operation in the frequency bands of LTE-2600 and 5G-FR1 cellular communication net-works. The proposed FSS device is designed by utilizing a recently introduced swarm-based meta-heuristic, namely the artificial hummingbird algorithm. The obtained numerical results of the proposed FSS device exhibit resonances at the frequency bands of interest, and quite acceptable values of gain and efficiency. Its overall performance makes it a suitable candidate for a receiving module of a rectenna in RF energy harvesting applications.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Papadopoulou, Maria S and Koulouridis, Stavros and Georgiadis, Apostolos and Tentzeris, Manos M and Goudos, Sotirios K},\n doi = {10.1109/AP-S/USNC-URSI47032.2022.9886108},\n booktitle = {2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI)}\n}
\n
\n\n\n
\n In this work, the design and optimization of an FSS device are presented for dual-band operation in the frequency bands of LTE-2600 and 5G-FR1 cellular communication net-works. The proposed FSS device is designed by utilizing a recently introduced swarm-based meta-heuristic, namely the artificial hummingbird algorithm. The obtained numerical results of the proposed FSS device exhibit resonances at the frequency bands of interest, and quite acceptable values of gain and efficiency. Its overall performance makes it a suitable candidate for a receiving module of a rectenna in RF energy harvesting applications.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A hybrid CNN-NGBoost model for probabilistic image-driven path loss prediction.\n \n \n \n\n\n \n Sotiroudis, S., P.; Goudos, S., K.; and Christodoulou, C.\n\n\n \n\n\n\n In 2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI), pages 898-899, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A hybrid CNN-NGBoost model for probabilistic image-driven path loss prediction},\n type = {inproceedings},\n year = {2022},\n keywords = {Roads;Conferences;Estimation;Predictive models;Pro},\n pages = {898-899},\n id = {26bb987b-a91d-3bf5-9d2d-5d52df6e5174},\n created = {2022-09-23T05:26:05.982Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-09-23T05:26:05.982Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9886672},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {We propose a hybrid model for probabilistic path loss prediction, based on the footprint of the urban built-up area. A Convolutional Neural Network (CNN) is being deployed in order to extract information regarding the built-up area in the form of a feature vector. The extracted features are then processed from a Natural Gradient Boosting (NGBoost) regressor, who is inherently capable of performing probabilistic prediction. That is, along with point estimations of the received path loss value, the CNN-NGBoost model additionally calculates the prediction interval which covers a user-defined percentage of the prediction distribution. The proposed model can therefore assist network engineers in calculating the risk of their decisions about network coverage.},\n bibtype = {inproceedings},\n author = {Sotiroudis, Sotirios P and Goudos, Sotirios K and Christodoulou, Christos},\n doi = {10.1109/AP-S/USNC-URSI47032.2022.9886672},\n booktitle = {2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI)}\n}
\n
\n\n\n
\n We propose a hybrid model for probabilistic path loss prediction, based on the footprint of the urban built-up area. A Convolutional Neural Network (CNN) is being deployed in order to extract information regarding the built-up area in the form of a feature vector. The extracted features are then processed from a Natural Gradient Boosting (NGBoost) regressor, who is inherently capable of performing probabilistic prediction. That is, along with point estimations of the received path loss value, the CNN-NGBoost model additionally calculates the prediction interval which covers a user-defined percentage of the prediction distribution. The proposed model can therefore assist network engineers in calculating the risk of their decisions about network coverage.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Detecting coherent sources with deep learning.\n \n \n \n\n\n \n Vijayamohanan, J.; Gupta, A.; Goudos, S.; and Christodoulou, C.\n\n\n \n\n\n\n In 2022 IEEE USNC-URSI Radio Science Meeting (Joint with AP-S Symposium), pages 98-99, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Detecting coherent sources with deep learning},\n type = {inproceedings},\n year = {2022},\n keywords = {Deep learning;Radio frequency;Transforms;Interfere},\n pages = {98-99},\n id = {97c7142b-cba5-3014-9e69-1f5a4c3af047},\n created = {2022-09-23T05:26:06.123Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-09-23T05:26:06.123Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9887433},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Detecting correlated sources in a dynamic radio frequency (RF) environment is both challenging and critical to antenna array processing. We introduce a deep learning framework capable of detecting both correlated and uncorrelated radio frequency sources in the presence of ambient noise and multiple interference signals. The auto-correlation matrix is extracted from the received signal matrix and spatially smoothed using forward-backward averaging. The processed signal is then used as an input to a ResNet34 architecture which detects the number of sources present in the sampled waveform. We transform the source detection problem into a one-vs-all binary classification problem where, the machine predicts a binary label corresponding to the number of detected sources. The designed framework is trained and evaluated on simulation data closely replicating real-time RF environments.},\n bibtype = {inproceedings},\n author = {Vijayamohanan, Jayakrishnan and Gupta, Arjun and Goudos, Sotirios and Christodoulou, Christos},\n doi = {10.23919/USNC-URSI52669.2022.9887433},\n booktitle = {2022 IEEE USNC-URSI Radio Science Meeting (Joint with AP-S Symposium)}\n}
\n
\n\n\n
\n Detecting correlated sources in a dynamic radio frequency (RF) environment is both challenging and critical to antenna array processing. We introduce a deep learning framework capable of detecting both correlated and uncorrelated radio frequency sources in the presence of ambient noise and multiple interference signals. The auto-correlation matrix is extracted from the received signal matrix and spatially smoothed using forward-backward averaging. The processed signal is then used as an input to a ResNet34 architecture which detects the number of sources present in the sampled waveform. We transform the source detection problem into a one-vs-all binary classification problem where, the machine predicts a binary label corresponding to the number of detected sources. The designed framework is trained and evaluated on simulation data closely replicating real-time RF environments.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Wideband Antenna Design for 5G mmWave Applications Using Enhanced Adaptive Differential Evolution.\n \n \n \n\n\n \n Goudos, S., K.; Boursianis, A.; Mohamed, A., W.; Salucci, M.; Koulouridis, S.; and Christodoulou, C.\n\n\n \n\n\n\n In 2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI), pages 63-64, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Wideband Antenna Design for 5G mmWave Applications Using Enhanced Adaptive Differential Evolution},\n type = {inproceedings},\n year = {2022},\n keywords = {Slot antennas;5G mobile communication;Shape;Adapti},\n pages = {63-64},\n id = {cb9ca4d4-3516-38f2-a747-63dba657a1f5},\n created = {2022-09-23T05:26:06.153Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-09-23T05:26:06.153Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9886187},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Antenna design for 5G mmwave applications is a challenging task. Moreover, if the design specifications require wideband behavior the problem becomes more complex. In this paper, we address the above presented design problem by introducing a new modified E-shaped patch antenna that has an additional third slot. We present a design procedure based on Enhanced Adaptive Differential Evolution. The numerical results show that the obtained best design presents wideband behavior that covers the whole frequency range 2 (FR2) zone and expands up to 60GHz.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K and Boursianis, Achilles and Mohamed, Ali Wagdy and Salucci, Marco and Koulouridis, Stavros and Christodoulou, Christos},\n doi = {10.1109/AP-S/USNC-URSI47032.2022.9886187},\n booktitle = {2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI)}\n}
\n
\n\n\n
\n Antenna design for 5G mmwave applications is a challenging task. Moreover, if the design specifications require wideband behavior the problem becomes more complex. In this paper, we address the above presented design problem by introducing a new modified E-shaped patch antenna that has an additional third slot. We present a design procedure based on Enhanced Adaptive Differential Evolution. The numerical results show that the obtained best design presents wideband behavior that covers the whole frequency range 2 (FR2) zone and expands up to 60GHz.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Online Examination and Self-Assessment Tool for EM Teaching.\n \n \n \n\n\n \n Polo, A.; Anselmi, N.; Azaro, R.; Oliveri, G.; Poli, L.; Rocca, P.; Salucci, M.; Ahmadi, H.; Huang, J.; Li, P.; Li, M.; Goudos, S., K.; Yang, S.; and Massa, A.\n\n\n \n\n\n\n In 2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI), pages 1572-1573, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Online Examination and Self-Assessment Tool for EM Teaching},\n type = {inproceedings},\n year = {2022},\n keywords = {Conferences;Education;Electromagnetics},\n pages = {1572-1573},\n id = {21d62f77-336d-3213-9acb-dd2182056da8},\n created = {2022-09-23T05:26:06.170Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-09-23T05:26:06.170Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9887198},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In the framework of modern electromagnetic (EM) education, a showcase of the most recent advances in the development of E-XAM, an online examination and self-assessment web platform created by the teaching staff of the ELEDIA Research Center of the University of Trento, Italy, is provided.},\n bibtype = {inproceedings},\n author = {Polo, Alessandro and Anselmi, Nicola and Azaro, Renzo and Oliveri, Giacomo and Poli, Lorenzo and Rocca, Paolo and Salucci, Marco and Ahmadi, Hanen and Huang, Jin and Li, Peng and Li, Maokun and Goudos, Sotirios K and Yang, Shiwen and Massa, Andrea},\n doi = {10.1109/AP-S/USNC-URSI47032.2022.9887198},\n booktitle = {2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/URSI)}\n}
\n
\n\n\n
\n In the framework of modern electromagnetic (EM) education, a showcase of the most recent advances in the development of E-XAM, an online examination and self-assessment web platform created by the teaching staff of the ELEDIA Research Center of the University of Trento, Italy, is provided.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Design of Antennas through Artificial Intelligence: State-of-the-Art and Challenges.\n \n \n \n\n\n \n Goudos, S., K.; Diamantoulakis, P., D.; Matin, M., A.; Sarigiannidis, P.; Wan, S.; and Karagiannidis, G., K.\n\n\n \n\n\n\n IEEE Communications Magazine, 60(12): 96-102. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Design of Antennas through Artificial Intelligence: State-of-the-Art and Challenges},\n type = {article},\n year = {2022},\n pages = {96-102},\n volume = {60},\n id = {9ade5bd5-781e-3dfc-abc9-9de20f1e7418},\n created = {2022-09-27T06:14:06.234Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-12-13T09:03:37.161Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9903377},\n source_type = {article},\n private_publication = {false},\n abstract = {Antenna is a critical part of the RF front end of a communication system. In this study, we present some of the major applications of artificial intelligence (AI) to antenna design. We review the previous research and applications of several AI techniques such as evolutionary algorithms,machine learning, and knowledge representation ontologies. Applications may vary from antenna design to antenna features evaluation in a research field, which is rapidly growing. Finally, we summarize the challenges of new AI techniques in antenna design based on the current state-of-the-art and predict its future research directions.},\n bibtype = {article},\n author = {Goudos, Sotirios K and Diamantoulakis, Panagiotis D and Matin, Mohammad A and Sarigiannidis, Panagiotis and Wan, Shaohua and Karagiannidis, George K},\n doi = {10.1109/MCOM.006.2200124},\n journal = {IEEE Communications Magazine},\n number = {12}\n}
\n
\n\n\n
\n Antenna is a critical part of the RF front end of a communication system. In this study, we present some of the major applications of artificial intelligence (AI) to antenna design. We review the previous research and applications of several AI techniques such as evolutionary algorithms,machine learning, and knowledge representation ontologies. Applications may vary from antenna design to antenna features evaluation in a research field, which is rapidly growing. Finally, we summarize the challenges of new AI techniques in antenna design based on the current state-of-the-art and predict its future research directions.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Detection of Macrolepiota Procera Mushrooms Using Machine Learning.\n \n \n \n\n\n \n Chaschatzis, C.; Karaiskou, C.; Goudos, S., K.; Psannis, K., E.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2022 5th World Symposium on Communication Engineering (WSCE), pages 74-78, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Detection of Macrolepiota Procera Mushrooms Using Machine Learning},\n type = {inproceedings},\n year = {2022},\n pages = {74-78},\n id = {b6b39c27-d749-3af7-b46e-8ead2e99fbb5},\n created = {2022-10-26T19:55:08.423Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-10-26T19:55:08.423Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9916046},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The overpopulation of the latest centuries and recent technological advancements in the primary sector increased demand for improved productivity and product quality in agricultural activities. Modern customers value eco-friendly activities and sustainable consumption. Thus they choose foods with high concentrations of nutritious ingredients. Machine learning algorithms enable the implementation of numerous potential solutions in precision agriculture in conjunction with new potent mechanisms. One algorithm that offers high-precision real-time object identifications is the YOLOv5 (You Only Look Once). Furthermore, to improve the resilience of precision agriculture, this work presents experimental findings from the machine learning algorithm (Yolov5) on a unique dataset based on mushroom crops, such as Macrolepiota Procera species.},\n bibtype = {inproceedings},\n author = {Chaschatzis, Christos and Karaiskou, Chrysoula and Goudos, Sotirios K and Psannis, Konstantinos E and Sarigiannidis, Panagiotis},\n doi = {10.1109/WSCE56210.2022.9916046},\n booktitle = {2022 5th World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n The overpopulation of the latest centuries and recent technological advancements in the primary sector increased demand for improved productivity and product quality in agricultural activities. Modern customers value eco-friendly activities and sustainable consumption. Thus they choose foods with high concentrations of nutritious ingredients. Machine learning algorithms enable the implementation of numerous potential solutions in precision agriculture in conjunction with new potent mechanisms. One algorithm that offers high-precision real-time object identifications is the YOLOv5 (You Only Look Once). Furthermore, to improve the resilience of precision agriculture, this work presents experimental findings from the machine learning algorithm (Yolov5) on a unique dataset based on mushroom crops, such as Macrolepiota Procera species.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 5G-Enabled NetApp for Predictive Maintenance in Critical Infrastructures.\n \n \n \n\n\n \n Giannakidou, S.; Radoglou-Grammatikis, P.; Koussouris, S.; Pertselakis, M.; Kanakaris, N.; Lekidis, A.; Kaltakis, K.; Koidou, M., P.; Metallidou, C.; Psannis, K., E.; Goudos, S.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2022 5th World Symposium on Communication Engineering (WSCE), pages 129-132, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {5G-Enabled NetApp for Predictive Maintenance in Critical Infrastructures},\n type = {inproceedings},\n year = {2022},\n pages = {129-132},\n id = {4e638a9f-fc1a-341e-9578-2cda833df620},\n created = {2022-10-26T19:55:08.432Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-10-26T19:55:08.432Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9916037},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Predictive Maintenance in critical infrastructure is a fundamental tool for predicting a failure in advance and for avoiding catastrophic equipment damage that can be prevented and the time-consuming repair scheduling can be executed in time. Artificial Intelligence (AI) based predictive maintenance utilises intelligent data for accurate predictions in order to make immediate interventions on critical assets. In this paper, we propose a 5G-enabled Network Application (NetApp) for predictive maintenance in energy-related critical infrastructures. The proposed NetApp consists of several containerised components responsible for retrieving time-series operational data from a power plant and detecting potential outliers/anomalies regarding the operation of energy generators. For the anomaly detection process, an autoencoder is used. The evaluation results demonstrate the efficiency of the proposed NetApp.},\n bibtype = {inproceedings},\n author = {Giannakidou, Sofia and Radoglou-Grammatikis, Panagiotis and Koussouris, Sotirios and Pertselakis, Minas and Kanakaris, Nikolaos and Lekidis, Alexios and Kaltakis, Konstantinos and Koidou, Maria P and Metallidou, Chrysi and Psannis, Konstantinos E and Goudos, Sotirios and Sarigiannidis, Panagiotis},\n doi = {10.1109/WSCE56210.2022.9916037},\n booktitle = {2022 5th World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n Predictive Maintenance in critical infrastructure is a fundamental tool for predicting a failure in advance and for avoiding catastrophic equipment damage that can be prevented and the time-consuming repair scheduling can be executed in time. Artificial Intelligence (AI) based predictive maintenance utilises intelligent data for accurate predictions in order to make immediate interventions on critical assets. In this paper, we propose a 5G-enabled Network Application (NetApp) for predictive maintenance in energy-related critical infrastructures. The proposed NetApp consists of several containerised components responsible for retrieving time-series operational data from a power plant and detecting potential outliers/anomalies regarding the operation of energy generators. For the anomaly detection process, an autoencoder is used. The evaluation results demonstrate the efficiency of the proposed NetApp.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Artificial Intelligence of Things; Remote Robot System Interacts with Humans and Vice Versa During Pandemic.\n \n \n \n\n\n \n Metallidou, C.; Psannis, K., E.; Sarigiannidis, P.; Michalas, A.; Vergados, D., D.; and Goudos, S.\n\n\n \n\n\n\n In 2022 5th World Symposium on Communication Engineering (WSCE), pages 79-83, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Artificial Intelligence of Things; Remote Robot System Interacts with Humans and Vice Versa During Pandemic},\n type = {inproceedings},\n year = {2022},\n pages = {79-83},\n id = {1d27e6dd-0dc4-3326-a8ad-4ae080f5e8ff},\n created = {2022-10-26T19:55:08.602Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-10-26T19:55:08.602Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9916048},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Nowadays., the advancement of artificial intelligence has led to the application of robotic systems in the industry, especially in the hotel industry, with a view to providing intelligent, automated and luxury services. At the same time, the knowledge gained from the Covid19 pandemic outbreak that convulses the world community, highlights the issue of sustainability in the hotel industry, solved by utilizing artificial intelligence achievements, remote robot systems, so as to guarantee reliability and security of a hotel's functionality, by providing not only convenient accommodation to guests, but safety, as well. In this paper, we focus on the development of a remote robot system, utilizing the Internet of Things, that has various kinds of sensors and cameras. Both the owners of the hotel and the guests can collaborate with the robot efficiently and accurately, since the robot is able to react with them. Specifically, the developed robot is able to serve clients, by providing them with hotel supplies and by giving them any requested information. In return, the guests are requested to give feedback to the robot upon check out. In addition, the robot browses throughout the hotel to inspect the normal and efficient functionality of all technical systems. The developed robot is also a Covid19 inspector, since it inspects whether one's pandemic measures are applied among guests in public areas and in case of a patient, the robot detects people connected to the patient, isolates the patient and gives medical care, food and supplies, so as to prevent humans from closely contacting the patient.},\n bibtype = {inproceedings},\n author = {Metallidou, Chrysi and Psannis, Kostas E and Sarigiannidis, Panagiotis and Michalas, Angelos and Vergados, Dimitrios D and Goudos, Sotirios},\n doi = {10.1109/WSCE56210.2022.9916048},\n booktitle = {2022 5th World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n Nowadays., the advancement of artificial intelligence has led to the application of robotic systems in the industry, especially in the hotel industry, with a view to providing intelligent, automated and luxury services. At the same time, the knowledge gained from the Covid19 pandemic outbreak that convulses the world community, highlights the issue of sustainability in the hotel industry, solved by utilizing artificial intelligence achievements, remote robot systems, so as to guarantee reliability and security of a hotel's functionality, by providing not only convenient accommodation to guests, but safety, as well. In this paper, we focus on the development of a remote robot system, utilizing the Internet of Things, that has various kinds of sensors and cameras. Both the owners of the hotel and the guests can collaborate with the robot efficiently and accurately, since the robot is able to react with them. Specifically, the developed robot is able to serve clients, by providing them with hotel supplies and by giving them any requested information. In return, the guests are requested to give feedback to the robot upon check out. In addition, the robot browses throughout the hotel to inspect the normal and efficient functionality of all technical systems. The developed robot is also a Covid19 inspector, since it inspects whether one's pandemic measures are applied among guests in public areas and in case of a patient, the robot detects people connected to the patient, isolates the patient and gives medical care, food and supplies, so as to prevent humans from closely contacting the patient.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards Illumination-aware Visible Light Positioning Network Planning.\n \n \n \n\n\n \n Bastiaens, S.; Goudos, S.; Joseph, W.; and Plets, D.\n\n\n \n\n\n\n In 2022 IEEE 12th International Conference on Indoor Positioning and Indoor Navigation (IPIN), pages 1-8, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Towards Illumination-aware Visible Light Positioning Network Planning},\n type = {inproceedings},\n year = {2022},\n pages = {1-8},\n id = {8a269d97-182e-3bcb-951c-0ee103b5e7c9},\n created = {2022-10-27T15:20:22.899Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-10-27T15:20:22.899Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9918127},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {A Visible Light Positioning (VLP) network planner holds tremendous economic potential in that it permits designing a roll-out within given cost, illuminance and accuracy bounds. In this manuscript, the Speed-constrained Multi-objective Particle Swarm Optimization (SMPSO) algorithm is applied to simultaneously optimise a roll-out's maintained illuminance and positioning error, by varying the placement of the VLP-enabled LED transmitters. With simulations that differ in positioning and/or environment parameters, the important illuminance-positioning trade-off is revealed. The corresponding Pareto fronts and LED arrangements are studied. Guidelines regarding where to place the LEDs and which LEDs to select for positioning are provided.},\n bibtype = {inproceedings},\n author = {Bastiaens, Sander and Goudos, Sotirios and Joseph, Wout and Plets, David},\n doi = {10.1109/IPIN54987.2022.9918127},\n booktitle = {2022 IEEE 12th International Conference on Indoor Positioning and Indoor Navigation (IPIN)}\n}
\n
\n\n\n
\n A Visible Light Positioning (VLP) network planner holds tremendous economic potential in that it permits designing a roll-out within given cost, illuminance and accuracy bounds. In this manuscript, the Speed-constrained Multi-objective Particle Swarm Optimization (SMPSO) algorithm is applied to simultaneously optimise a roll-out's maintained illuminance and positioning error, by varying the placement of the VLP-enabled LED transmitters. With simulations that differ in positioning and/or environment parameters, the important illuminance-positioning trade-off is revealed. The corresponding Pareto fronts and LED arrangements are studied. Guidelines regarding where to place the LEDs and which LEDs to select for positioning are provided.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Efficient Peer-to-Peer Unicasting for VANET Architectures via Enhanced Monolithic Protocols.\n \n \n \n\n\n \n Amponis, G.; Lagkas, T.; Karampatzakis, D.; Radoglou-Grammatikis, P.; Argyriou, V.; Moscholios, I.; Goudos, S.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), pages 1-8, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Efficient Peer-to-Peer Unicasting for VANET Architectures via Enhanced Monolithic Protocols},\n type = {inproceedings},\n year = {2022},\n keywords = {Protocols;Processor scheduling;Social networking (,Real Time Communications},\n pages = {1-8},\n id = {11787134-f740-392c-80e6-63b6f66e4fa4},\n created = {2022-11-03T08:18:40.656Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-11-03T08:18:40.656Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9932897},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {With the advent of vehicular networks and the corresponding requirements, developers are faced with new challenges associated with fundamental protocol attributes and capabilities. In our work, we consider ESP-NOW: a connectionless WiFi communication protocol developed by Espressif and featuring short packet (up to 250 bytes) transmission. It is different from more traditional WiFi protocols, as the upper five layers of the Open Systems Interconnection (OSI) stack are simplified to a single monolithic layer. The data does not need to travel through all the OSI-or Transmission Control Protocol (TCP)-specific layers, which measurably reduces over-head, processing delay all while increasing system responsiveness. The presented work targets the considerable research gap in regards to this protocol and constitutes an attempt to dissect it and provide experimental results, which prove to be promising for highly mobile clusters. Relevant developments find great applicability in ad hoc and vehicular communications, where real-time connectivity and sufficient coverage are pivotal in supporting reliable networking. In this paper, we also investigate the usage of a modified 802.11 standard to enable long-range and low-power interfacing amongst networked vehicular nodes.},\n bibtype = {inproceedings},\n author = {Amponis, George and Lagkas, Thomas and Karampatzakis, Dimitris and Radoglou-Grammatikis, Panagiotis and Argyriou, Vasileios and Moscholios, Ioannis and Goudos, Sotirios and Sarigiannidis, Panagiotis},\n doi = {10.1109/SEEDA-CECNSM57760.2022.9932897},\n booktitle = {2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)}\n}
\n
\n\n\n
\n With the advent of vehicular networks and the corresponding requirements, developers are faced with new challenges associated with fundamental protocol attributes and capabilities. In our work, we consider ESP-NOW: a connectionless WiFi communication protocol developed by Espressif and featuring short packet (up to 250 bytes) transmission. It is different from more traditional WiFi protocols, as the upper five layers of the Open Systems Interconnection (OSI) stack are simplified to a single monolithic layer. The data does not need to travel through all the OSI-or Transmission Control Protocol (TCP)-specific layers, which measurably reduces over-head, processing delay all while increasing system responsiveness. The presented work targets the considerable research gap in regards to this protocol and constitutes an attempt to dissect it and provide experimental results, which prove to be promising for highly mobile clusters. Relevant developments find great applicability in ad hoc and vehicular communications, where real-time connectivity and sufficient coverage are pivotal in supporting reliable networking. In this paper, we also investigate the usage of a modified 802.11 standard to enable long-range and low-power interfacing amongst networked vehicular nodes.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Visible Light Positioning: A Machine Learning Approach.\n \n \n \n\n\n \n Rekkas, V., P.; Sotiroudis, S.; Plets, D.; Joseph, W.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), pages 1-5, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Visible Light Positioning: A Machine Learning Approach},\n type = {inproceedings},\n year = {2022},\n keywords = {Radio frequency;Social networking (online);Two dim},\n pages = {1-5},\n id = {449f0aca-60e2-3ab3-9150-d52b765b3e80},\n created = {2022-11-03T08:18:41.079Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-11-03T08:18:41.079Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9932981},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Visible light positioning (VLP) systems have experienced substantial revolutionary progress over the past year because they can offer great positioning accuracy without needing any additional infrastructure, as conventional radio-frequency (RF)-based systems. Received signal strength (RSS)-based VLP systems are a promising approach to many indoor positioning estimation problems, but still suffer from difficulty in providing high accuracy and reliability. A potential solution to these challenges is to combine VLP systems, and machine learning (ML) approaches to enhance the position prediction accuracy in two-dimensional (2-D) spaces, or more complex problems. In this paper, we propose a ML approach to accurately predict the 2-D indoor position of a mobile receiver (eg. an automated guided vehicles-AGV), based on the measured RSS values of 4 photodiodes (PDs) forming a star architecture. We examine and evaluate the performance of different ML learners applied to the above-described problem. The proposed ML and Neural Network (NN) methods exhibit great accuracy results in predicting the 2-D coordinates of a PD-based receiver.},\n bibtype = {inproceedings},\n author = {Rekkas, Vasileios P and Sotiroudis, Sotirios and Plets, David and Joseph, Wout and Goudos, Sotirios K},\n doi = {10.1109/SEEDA-CECNSM57760.2022.9932981},\n booktitle = {2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)}\n}
\n
\n\n\n
\n Visible light positioning (VLP) systems have experienced substantial revolutionary progress over the past year because they can offer great positioning accuracy without needing any additional infrastructure, as conventional radio-frequency (RF)-based systems. Received signal strength (RSS)-based VLP systems are a promising approach to many indoor positioning estimation problems, but still suffer from difficulty in providing high accuracy and reliability. A potential solution to these challenges is to combine VLP systems, and machine learning (ML) approaches to enhance the position prediction accuracy in two-dimensional (2-D) spaces, or more complex problems. In this paper, we propose a ML approach to accurately predict the 2-D indoor position of a mobile receiver (eg. an automated guided vehicles-AGV), based on the measured RSS values of 4 photodiodes (PDs) forming a star architecture. We examine and evaluate the performance of different ML learners applied to the above-described problem. The proposed ML and Neural Network (NN) methods exhibit great accuracy results in predicting the 2-D coordinates of a PD-based receiver.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Enhancing the robustness of object detection via 6G vehicular edge computing.\n \n \n \n \n\n\n \n Chen, C.; Yao, G.; Wang, C.; Goudos, S.; and Wan, S.\n\n\n \n\n\n\n Digital Communications and Networks, 8(6): 923-931. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"EnhancingWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Enhancing the robustness of object detection via 6G vehicular edge computing},\n type = {article},\n year = {2022},\n keywords = {6G,Feature fusion,Model compression,Model deployment,Object detection,Vehicular edge computing},\n pages = {923-931},\n volume = {8},\n websites = {https://www.sciencedirect.com/science/article/pii/S235286482200222X},\n id = {57bcd283-0a53-32b8-975d-fa232b9cca9a},\n created = {2022-11-12T15:18:12.089Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-03-09T16:19:40.004Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {CHEN2022},\n source_type = {article},\n private_publication = {false},\n abstract = {Academic and industrial communities have been paying significant attention to the 6th Generation (6G) wireless communication systems after the commercial deployment of 5G cellular communications. Among the emerging technologies, Vehicular Edge Computing (VEC) can provide essential assurance for the robustness of Artificial Intelligence (AI) algorithms to be used in the 6G systems. Therefore, in this paper, a strategy for enhancing the robustness of AI model deployment using 6G-VEC is proposed, taking the object detection task as an example. This strategy includes two stages: model stabilization and model adaptation. In the former, the state-of-the-art methods are appended to the model to improve its robustness. In the latter, two targeted compression methods are implemented, namely model parameter pruning and knowledge distillation, which result in a trade-off between model performance and runtime resources. Numerical results indicate that the proposed strategy can be smoothly deployed in the onboard edge terminals, where the introduced trade-off outperforms the other strategies available.},\n bibtype = {article},\n author = {Chen, Chen and Yao, Guorun and Wang, Chenyu and Goudos, Sotirios and Wan, Shaohua},\n doi = {https://doi.org/10.1016/j.dcan.2022.10.013},\n journal = {Digital Communications and Networks},\n number = {6}\n}
\n
\n\n\n
\n Academic and industrial communities have been paying significant attention to the 6th Generation (6G) wireless communication systems after the commercial deployment of 5G cellular communications. Among the emerging technologies, Vehicular Edge Computing (VEC) can provide essential assurance for the robustness of Artificial Intelligence (AI) algorithms to be used in the 6G systems. Therefore, in this paper, a strategy for enhancing the robustness of AI model deployment using 6G-VEC is proposed, taking the object detection task as an example. This strategy includes two stages: model stabilization and model adaptation. In the former, the state-of-the-art methods are appended to the model to improve its robustness. In the latter, two targeted compression methods are implemented, namely model parameter pruning and knowledge distillation, which result in a trade-off between model performance and runtime resources. Numerical results indicate that the proposed strategy can be smoothly deployed in the onboard edge terminals, where the introduced trade-off outperforms the other strategies available.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Path Loss Prediction Modelling for Next-generation Internet-of-Things Applications Using Different Boosting Machine Learning Methods.\n \n \n \n\n\n \n Rekkas, V., P.; Sotiroudis, S., P.; Athanasiadou, G.; Sarigiannidis, P.; Tsoulos, G., V.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 Panhellenic Conference on Electronics & Telecommunications (PACET), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Path Loss Prediction Modelling for Next-generation Internet-of-Things Applications Using Different Boosting Machine Learning Methods},\n type = {inproceedings},\n year = {2022},\n pages = {1-4},\n id = {bab5d79d-83fc-38f7-9371-352da9f5941d},\n created = {2022-12-15T16:46:56.437Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-12-15T16:46:56.437Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9976383},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Wireless channel propagation characteristics are crucial for wireless network systems. The accuracy of the path loss (PL) prediction determines the quality of the received signal and optimization of wireless communication networks.In this paper, we apply and compare various machine learning (ML) boosting methods for the prediction of path loss in cellular communications using a flying base station (FBS). We use a ray tracing technique to obtain the dataset for the training process of the models. The work at hand generates prediction models, based on five different boosting ML learners to accurately predict the path loss of an unmanned aerial vehicle (UAV). The proposed approach exhibits great accuracy and efficiency in predicting the path loss.},\n bibtype = {inproceedings},\n author = {Rekkas, Vasileios P and Sotiroudis, Sotirios P and Athanasiadou, Georgia and Sarigiannidis, Panagiotis and Tsoulos, George V and Goudos, Sotirios K},\n doi = {10.1109/PACET56979.2022.9976383},\n booktitle = {2022 Panhellenic Conference on Electronics & Telecommunications (PACET)}\n}
\n
\n\n\n
\n Wireless channel propagation characteristics are crucial for wireless network systems. The accuracy of the path loss (PL) prediction determines the quality of the received signal and optimization of wireless communication networks.In this paper, we apply and compare various machine learning (ML) boosting methods for the prediction of path loss in cellular communications using a flying base station (FBS). We use a ray tracing technique to obtain the dataset for the training process of the models. The work at hand generates prediction models, based on five different boosting ML learners to accurately predict the path loss of an unmanned aerial vehicle (UAV). The proposed approach exhibits great accuracy and efficiency in predicting the path loss.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards Securing Next-Generation Networks: Attacking 5G Core/RAN Testbed.\n \n \n \n\n\n \n Amponis, G.; Radoglou-Grammatikis, P.; Lagkas, T.; Ouzounidis, S.; Zevgara, M.; Moscholios, I.; Goudos, S.; and Sarigiannidis, P.\n\n\n \n\n\n\n In 2022 Panhellenic Conference on Electronics & Telecommunications (PACET), pages 1-4, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Towards Securing Next-Generation Networks: Attacking 5G Core/RAN Testbed},\n type = {inproceedings},\n year = {2022},\n pages = {1-4},\n id = {6bbf7ce4-2276-3a2f-9534-43507d7e7a73},\n created = {2022-12-15T16:47:15.012Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-12-15T16:47:15.012Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9976365},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {As the networking and communications landscape moves towards 5G and an increasing number of users are already accessing the Internet over 5G systems at an increasing pace, security issues rise and the corresponding vulnerabilities are in need of being addressed. The work presented in this paper constitutes an attempt at addressing the issue of training defenders capable of tackling cyberattacks and detection systems capable of timely notifying of security events. The key contribution of this paper is the proposal of a fully containerized testbed, incorporating a 5G cellular core, a radio access network (RAN), a set of potentially vulnerable hosts, and the appropriate entry points as interfaces. Attackers and defenders alike, can perform attacks or implement defensive measures correspondingly, without needing to exit the established sandbox. The developed testbed and emulation framework is envisaged to pave the path towards facilitating the generation of realistic datasets containing malicious traffic captured over 5G tunnels for enhancing the security of next generation networks.},\n bibtype = {inproceedings},\n author = {Amponis, George and Radoglou-Grammatikis, Panagiotis and Lagkas, Thomas and Ouzounidis, Savvas and Zevgara, Maria and Moscholios, Ioannis and Goudos, Sotirios and Sarigiannidis, Panagiotis},\n doi = {10.1109/PACET56979.2022.9976365},\n booktitle = {2022 Panhellenic Conference on Electronics & Telecommunications (PACET)}\n}
\n
\n\n\n
\n As the networking and communications landscape moves towards 5G and an increasing number of users are already accessing the Internet over 5G systems at an increasing pace, security issues rise and the corresponding vulnerabilities are in need of being addressed. The work presented in this paper constitutes an attempt at addressing the issue of training defenders capable of tackling cyberattacks and detection systems capable of timely notifying of security events. The key contribution of this paper is the proposal of a fully containerized testbed, incorporating a 5G cellular core, a radio access network (RAN), a set of potentially vulnerable hosts, and the appropriate entry points as interfaces. Attackers and defenders alike, can perform attacks or implement defensive measures correspondingly, without needing to exit the established sandbox. The developed testbed and emulation framework is envisaged to pave the path towards facilitating the generation of realistic datasets containing malicious traffic captured over 5G tunnels for enhancing the security of next generation networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Radio Frequency Energy Harvesting System and the Utilization of Blockchain Technologies in Agriculture.\n \n \n \n\n\n \n Krystallidou, E.; Boursianis, A.; Diamantoulakis, P.; Goudos, S.; Karagiannidis, G.; Siachamis, G.; Stavropoulos, G.; Ioannidis, D.; and Tzovaras, D.\n\n\n \n\n\n\n In CEUR Workshop Proceedings, volume 3293, pages 100 – 105, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Radio Frequency Energy Harvesting System and the Utilization of Blockchain Technologies in Agriculture},\n type = {inproceedings},\n year = {2022},\n pages = {100 – 105},\n volume = {3293},\n id = {e5da8b9a-7e77-3bd8-a78b-826ff13ffc59},\n created = {2022-12-20T18:28:54.180Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-12-20T18:28:54.180Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Krystallidou2022100},\n source_type = {conference},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Krystallidou, Evdokia and Boursianis, Achilles and Diamantoulakis, Panagiotis and Goudos, Sotirios and Karagiannidis, George and Siachamis, Giorgos and Stavropoulos, Georgios and Ioannidis, Dimosthenis and Tzovaras, Dimitrios},\n booktitle = {CEUR Workshop Proceedings}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Patch Antenna Design using Artificial Intelligence Methods for 4G/5G Applications.\n \n \n \n\n\n \n Iliadis, L., A.; Zaharis, Z., D.; Sotiroudis, S., P.; Sarigiannidis, P.; Christodoulou, C.; and Goudos, S., K.\n\n\n \n\n\n\n In 2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC), pages 497-500, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Patch Antenna Design using Artificial Intelligence Methods for 4G/5G Applications},\n type = {inproceedings},\n year = {2022},\n pages = {497-500},\n id = {e5eed56a-3208-3d01-abea-a8d1e3e54a75},\n created = {2023-01-21T08:16:30.213Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-01-21T08:16:30.213Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {10014971},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The advent of fifth generation wireless communications (5G), highlights the need for new priorities in research. Especially, the growing mobile networks require abilities for mas-sive connectivity, advanced security, increased network capacity and extremely low-latency. Antennas play a crucial part of this ecosystem, thus, their design is a challenging task. In this work, a Boundary - Seeking Generative Adversarial Network is trained to serve as a surrogate model for the design of a patch antenna with random slots and two operating frequencies at 2.6 GHz and 3.5 GHz, making it suitable for 4G/5G applications. The outcome of the trained model is used as an initial population for further op-timization using the biogeography-based optimization algorithm. The final design achieves $S_11=-37$ dB and $S_11=-33$ dB at 2.6 GHz and 3.5 GHz respectively.},\n bibtype = {inproceedings},\n author = {Iliadis, Lazaros Alexios and Zaharis, Zaharias D and Sotiroudis, Sotirios P and Sarigiannidis, Panagiotis and Christodoulou, Christos and Goudos, Sotirios K},\n doi = {10.1109/WPMC55625.2022.10014971},\n booktitle = {2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC)}\n}
\n
\n\n\n
\n The advent of fifth generation wireless communications (5G), highlights the need for new priorities in research. Especially, the growing mobile networks require abilities for mas-sive connectivity, advanced security, increased network capacity and extremely low-latency. Antennas play a crucial part of this ecosystem, thus, their design is a challenging task. In this work, a Boundary - Seeking Generative Adversarial Network is trained to serve as a surrogate model for the design of a patch antenna with random slots and two operating frequencies at 2.6 GHz and 3.5 GHz, making it suitable for 4G/5G applications. The outcome of the trained model is used as an initial population for further op-timization using the biogeography-based optimization algorithm. The final design achieves $S_11=-37$ dB and $S_11=-33$ dB at 2.6 GHz and 3.5 GHz respectively.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (36)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n An Enhanced and Secure Cloud Infrastructure for e-Health Data Transmission.\n \n \n \n\n\n \n Memos, V., A.; Psannis, K., E.; Goudos, S., K.; and Kyriazakos, S.\n\n\n \n\n\n\n Wireless Personal Communications, 117(1): 109-127. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {An Enhanced and Secure Cloud Infrastructure for e-Health Data Transmission},\n type = {article},\n year = {2021},\n keywords = {Cloud model infrastructure,Cloud security,Layered cloud architecture,Mathematical model,Virtualization,e-Health},\n pages = {109-127},\n volume = {117},\n id = {c20fbb10-376f-3ae7-af04-fbf2833c2880},\n created = {2020-02-29T16:57:43.214Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.470Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Memos2019},\n private_publication = {false},\n abstract = {The daily rapid malware growth and spread has enforced the security community of antivirus companies to introduce cloud computing technology to their existing protection methods so as to be able to deal with efficiently the active malware threats. A new hybrid security model, based on cloud computing, should be developed to offer optimized protection to the connected users. In this research, we describe our proposed cloud infrastructure and analyze it with mathematical models to export significant diagrams about various metrics. Our cloud model architecture consists of four layers: the master cloud server, the slave servers, the virtual subservers and the users connected to the cloud. Experimental results demonstrate that our proposed layered cloud architecture verifies the trust of its implementation and establishment, due to the fact that it makes the current architecture more lightweight, efficient and secure for e-health data transmission.},\n bibtype = {article},\n author = {Memos, Vasileios A. and Psannis, Kostas E. and Goudos, Sotirios K. and Kyriazakos, Sofoklis},\n doi = {10.1007/s11277-019-06874-1},\n journal = {Wireless Personal Communications},\n number = {1}\n}
\n
\n\n\n
\n The daily rapid malware growth and spread has enforced the security community of antivirus companies to introduce cloud computing technology to their existing protection methods so as to be able to deal with efficiently the active malware threats. A new hybrid security model, based on cloud computing, should be developed to offer optimized protection to the connected users. In this research, we describe our proposed cloud infrastructure and analyze it with mathematical models to export significant diagrams about various metrics. Our cloud model architecture consists of four layers: the master cloud server, the slave servers, the virtual subservers and the users connected to the cloud. Experimental results demonstrate that our proposed layered cloud architecture verifies the trust of its implementation and establishment, due to the fact that it makes the current architecture more lightweight, efficient and secure for e-health data transmission.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multi-object tracking by mutual supervision of CNN and particle filter.\n \n \n \n\n\n \n Xia, Y.; Qu, S.; Goudos, S.; Bai, Y.; and Wan, S.\n\n\n \n\n\n\n Personal and Ubiquitous Computing, 25(6): 979-988. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Multi-object tracking by mutual supervision of CNN and particle filter},\n type = {article},\n year = {2021},\n keywords = {Intelligent transportation systems,Multi-object tracking,Neural networks,Object detection,Particle filters},\n pages = {979-988},\n volume = {25},\n id = {5ad7bec1-1808-3700-9389-9d3919e40da2},\n created = {2020-02-29T16:57:43.783Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.349Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Xia2019},\n private_publication = {false},\n abstract = {In the multi-object tracking process, a long-term tracking algorithm for traffic scene based on deep learning is proposed to handle several challenging problems, such as the complex variation of background illumination, change of pixel due to partial occlusion, cumulative error and the short-term disappearance of the target. Firstly, we train a CNN to identify and determine the target bounding box in a traffic scene. Secondly, we use a particle filter (PF) as the tracker to implement the preliminary multi-object tracking. Finally, the multi-object tracking trajectory then is generated by the mutual supervision of the PF tracker and CNN detector. In order to evaluate the experimental results, we use the forward-backward (FB) error of our tracker at a certain moment. The experimental results show that the method can track single and multi-objects in long-term tracking in real-time. For the situation of target disappearance and reappearance, the proposed algorithm can also recover its long-term tracking.},\n bibtype = {article},\n author = {Xia, Yu and Qu, Shiru and Goudos, Sotirios and Bai, Yu and Wan, Shaohua},\n doi = {10.1007/s00779-019-01278-1},\n journal = {Personal and Ubiquitous Computing},\n number = {6}\n}
\n
\n\n\n
\n In the multi-object tracking process, a long-term tracking algorithm for traffic scene based on deep learning is proposed to handle several challenging problems, such as the complex variation of background illumination, change of pixel due to partial occlusion, cumulative error and the short-term disappearance of the target. Firstly, we train a CNN to identify and determine the target bounding box in a traffic scene. Secondly, we use a particle filter (PF) as the tracker to implement the preliminary multi-object tracking. Finally, the multi-object tracking trajectory then is generated by the mutual supervision of the PF tracker and CNN detector. In order to evaluate the experimental results, we use the forward-backward (FB) error of our tracker at a certain moment. The experimental results show that the method can track single and multi-objects in long-term tracking in real-time. For the situation of target disappearance and reappearance, the proposed algorithm can also recover its long-term tracking.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Smart Irrigation System for Precision Agriculture - The AREThOU5A IoT Platform.\n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Gotsis, A.; Wan, S.; Sarigiannidis, P.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n IEEE Sensors Journal, 21(16): 17539-17547. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Smart Irrigation System for Precision Agriculture - The AREThOU5A IoT Platform},\n type = {article},\n year = {2021},\n keywords = {IoT technology,precision agriculture,radio frequency energy harvesting,smart irrigation},\n pages = {17539-17547},\n volume = {21},\n id = {33809ee4-e959-3c1a-9909-fa1f3234f8c0},\n created = {2020-10-30T21:19:07.417Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.237Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Boursianis2020},\n source_type = {ARTICLE},\n private_publication = {false},\n abstract = {Agriculture 4.0, as the future of farming technology, includes several key enabling technologies towards sustainable agriculture. The use of state-of-the-art technologies, such as the Internet of Things, transform traditional cultivation practices, like irrigation, to modern solutions of precision agriculture. In this paper, we present in detail the subsystems and the architecture of an intelligent irrigation system for precision agriculture, the AREThOU5A IoT platform. We describe the operation of the IoT node that is utilized in the platform. Moreover, we apply the radiofrequency energy harvesting technique to the presented IoT platform, as an alternative technique to deliver power to the IoT node of the platform. To this end, we fabricate and validate a rectenna module for radiofrequency energy harvesting. Experimental results of the fabricated rectenna exhibit a satisfactory performance as a harvester of ambient sources in an outdoor environment.},\n bibtype = {article},\n author = {Boursianis, Achilles D and Papadopoulou, Maria S and Gotsis, Antonis and Wan, Shaohua and Sarigiannidis, Panagiotis and Nikolaidis, Spyridon and Goudos, Sotirios K},\n doi = {10.1109/JSEN.2020.3033526},\n journal = {IEEE Sensors Journal},\n number = {16}\n}
\n
\n\n\n
\n Agriculture 4.0, as the future of farming technology, includes several key enabling technologies towards sustainable agriculture. The use of state-of-the-art technologies, such as the Internet of Things, transform traditional cultivation practices, like irrigation, to modern solutions of precision agriculture. In this paper, we present in detail the subsystems and the architecture of an intelligent irrigation system for precision agriculture, the AREThOU5A IoT platform. We describe the operation of the IoT node that is utilized in the platform. Moreover, we apply the radiofrequency energy harvesting technique to the presented IoT platform, as an alternative technique to deliver power to the IoT node of the platform. To this end, we fabricate and validate a rectenna module for radiofrequency energy harvesting. Experimental results of the fabricated rectenna exhibit a satisfactory performance as a harvester of ambient sources in an outdoor environment.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multiband Patch Antenna Design Using Nature-Inspired Optimization Method.\n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Pierezan, J.; Mariani, V., C.; Coelho, L., S.; Sarigiannidis, P.; Koulouridis, S.; and Goudos, S., K.\n\n\n \n\n\n\n IEEE Open Journal of Antennas and Propagation, 2: 151-162. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Multiband Patch Antenna Design Using Nature-Inspired Optimization Method},\n type = {article},\n year = {2021},\n pages = {151-162},\n volume = {2},\n id = {2e880cca-1d3f-3eea-9167-6316cc07c7f7},\n created = {2021-03-06T21:46:42.527Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.036Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9311660},\n source_type = {article},\n private_publication = {false},\n abstract = {Radio frequency energy harvesting has attracted considerable interest as a technique of enabling self-powered wireless networks. This technique faces several challenges, such as the receiving and the rectifying modules of a rectenna system. Multiband antennas provide several comparative advantages against the goal of maximizing the amount of energy harvesting. In this work, we present a multiband microstrip patch antenna with three slits operating in the LoRaWAN (Long Range Wide Area Network) and the cellular (GSM-1800 and UMTS) communication frequency bands. A feasible solution of the antenna is obtained by the application of a recently introduced nature-inspired optimization technique, namely the Coyote Optimization Algorithm. The proposed antenna operates satisfactorily in the LoRaWAN (Long Range Wide Area Network) and the cellular (GSM-1800 and UMTS) communication frequency bands. Measured results of the proposed antenna exhibit an acceptable performance (multiband frequency operation, maximum gain of 3.94 dBi, broadside operation) and demonstrate features of operation, which make it a strong candidate for various RF energy harvesting applications.},\n bibtype = {article},\n author = {Boursianis, A D and Papadopoulou, M S and Pierezan, J and Mariani, V C and Coelho, L S and Sarigiannidis, P and Koulouridis, S and Goudos, S K},\n doi = {10.1109/OJAP.2020.3048495},\n journal = {IEEE Open Journal of Antennas and Propagation}\n}
\n
\n\n\n
\n Radio frequency energy harvesting has attracted considerable interest as a technique of enabling self-powered wireless networks. This technique faces several challenges, such as the receiving and the rectifying modules of a rectenna system. Multiband antennas provide several comparative advantages against the goal of maximizing the amount of energy harvesting. In this work, we present a multiband microstrip patch antenna with three slits operating in the LoRaWAN (Long Range Wide Area Network) and the cellular (GSM-1800 and UMTS) communication frequency bands. A feasible solution of the antenna is obtained by the application of a recently introduced nature-inspired optimization technique, namely the Coyote Optimization Algorithm. The proposed antenna operates satisfactorily in the LoRaWAN (Long Range Wide Area Network) and the cellular (GSM-1800 and UMTS) communication frequency bands. Measured results of the proposed antenna exhibit an acceptable performance (multiband frequency operation, maximum gain of 3.94 dBi, broadside operation) and demonstrate features of operation, which make it a strong candidate for various RF energy harvesting applications.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Fusing Diverse Input Modalities for Path Loss Prediction: A Deep Learning Approach.\n \n \n \n\n\n \n Sotiroudis, S., P.; Sarigiannidis, P.; Goudos, S., K.; and Siakavara, K.\n\n\n \n\n\n\n IEEE Access, 9: 30441-30451. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Fusing Diverse Input Modalities for Path Loss Prediction: A Deep Learning Approach},\n type = {article},\n year = {2021},\n pages = {30441-30451},\n volume = {9},\n id = {30b9dfbb-f91b-3cf1-b95b-d259b43ab11f},\n created = {2021-03-06T21:46:42.541Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:54.997Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9354618},\n source_type = {article},\n private_publication = {false},\n abstract = {Tabular data and images have been used from machine learning models as two diverse types of inputs, in order to perform path loss predictions in urban areas. Different types of models are applied on these distinct modes of input information. The work at hand tries to incorporate both modes of input data within a single prediction model. It therefore manipulates and transforms the vectors of tabular data into images. Each feature of the tabular data vector is spread into several pixels, corresponding to the calculated importance of the particular feature. The resulting synthetic images are then fused with images representing selected regions of the area's map. Compound pseudoimages, having channels of both map-based and tabular data-based images, are then being used as inputs for a Convolutional Neural Network (CNN), which predicts the path loss value at a specific point of the area of interest. The results are clearly better than those obtained from models based on a single mode of input data, as well as from the results produced by other bimodal-input approaches. This approach could be applied for path loss prediction in urban environments for several state-of-art wireless networks like 5G and Internet of Things (IoT).},\n bibtype = {article},\n author = {Sotiroudis, S P and Sarigiannidis, P and Goudos, S K and Siakavara, K},\n doi = {10.1109/ACCESS.2021.3059589},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n Tabular data and images have been used from machine learning models as two diverse types of inputs, in order to perform path loss predictions in urban areas. Different types of models are applied on these distinct modes of input information. The work at hand tries to incorporate both modes of input data within a single prediction model. It therefore manipulates and transforms the vectors of tabular data into images. Each feature of the tabular data vector is spread into several pixels, corresponding to the calculated importance of the particular feature. The resulting synthetic images are then fused with images representing selected regions of the area's map. Compound pseudoimages, having channels of both map-based and tabular data-based images, are then being used as inputs for a Convolutional Neural Network (CNN), which predicts the path loss value at a specific point of the area of interest. The results are clearly better than those obtained from models based on a single mode of input data, as well as from the results produced by other bimodal-input approaches. This approach could be applied for path loss prediction in urban environments for several state-of-art wireless networks like 5G and Internet of Things (IoT).\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Multiobjective Ant Lion Approaches Applied to Electromagnetic Device Optimization.\n \n \n \n \n\n\n \n Pierezan, J.; Coelho, L., d., S.; Mariani, V., C.; Goudos, S., K.; Boursianis, A., D.; Kantartzis, N., V.; Antonopoulos, C., S.; and Nikolaidis, S.\n\n\n \n\n\n\n Technologies, 9(2). 2021.\n \n\n\n\n
\n\n\n\n \n \n \"MultiobjectiveWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Multiobjective Ant Lion Approaches Applied to Electromagnetic Device Optimization},\n type = {article},\n year = {2021},\n volume = {9},\n websites = {https://www.mdpi.com/2227-7080/9/2/35},\n id = {41169a1e-cb0d-3731-ad1d-dd48d1e348fe},\n created = {2021-05-11T07:47:00.215Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-05-11T07:48:06.292Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {technologies9020035},\n source_type = {article},\n private_publication = {false},\n abstract = {Nature-inspired metaheuristics of the swarm intelligence field are a powerful approach to solve electromagnetic optimization problems. Ant lion optimizer (ALO) is a nature-inspired stochastic metaheuristic that mimics the hunting behavior of ant lions using steps of random walk of ants, building traps, entrapment of ants in traps, catching preys, and re-building traps. To extend the classical single-objective ALO, this paper proposes four multiobjective ALO (MOALO) approaches using crowding distance, dominance concept for selecting the elite, and tournament selection mechanism with different schemes to select the leader. Numerical results from a multiobjective constrained brushless direct current (DC) motor design problem show that some MOALO approaches present promising performance in terms of Pareto-optimal solutions.},\n bibtype = {article},\n author = {Pierezan, Juliano and Coelho, Leandro dos S and Mariani, Viviana C and Goudos, Sotirios K and Boursianis, Achilles D and Kantartzis, Nikolaos V and Antonopoulos, Christos. S and Nikolaidis, Spiridon},\n doi = {10.3390/technologies9020035},\n journal = {Technologies},\n number = {2}\n}
\n
\n\n\n
\n Nature-inspired metaheuristics of the swarm intelligence field are a powerful approach to solve electromagnetic optimization problems. Ant lion optimizer (ALO) is a nature-inspired stochastic metaheuristic that mimics the hunting behavior of ant lions using steps of random walk of ants, building traps, entrapment of ants in traps, catching preys, and re-building traps. To extend the classical single-objective ALO, this paper proposes four multiobjective ALO (MOALO) approaches using crowding distance, dominance concept for selecting the elite, and tournament selection mechanism with different schemes to select the leader. Numerical results from a multiobjective constrained brushless direct current (DC) motor design problem show that some MOALO approaches present promising performance in terms of Pareto-optimal solutions.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Designing Smart Electromagnetic Environments for Next-Generation Wireless Communications.\n \n \n \n \n\n\n \n Massa, A.; Benoni, A.; Da Rù, P.; Goudos, S., K.; Li, B.; Oliveri, G.; Polo, A.; Rocca, P.; and Salucci, M.\n\n\n \n\n\n\n Telecom, 2(2): 213-221. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"DesigningWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Designing Smart Electromagnetic Environments for Next-Generation Wireless Communications},\n type = {article},\n year = {2021},\n pages = {213-221},\n volume = {2},\n websites = {https://www.mdpi.com/2673-4001/2/2/14},\n id = {4eb62331-46cf-39ef-baef-bc0c14f23d03},\n created = {2021-05-12T10:38:24.400Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-05-12T10:38:24.400Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {telecom2020014},\n source_type = {article},\n private_publication = {false},\n abstract = {The design of a smart electromagnetic (EM) environment for next-generation wireless communication systems is addressed in this work. The proposed approach aims at synthesizing a desired EM field distribution over a target region, where the receiving terminals are located, through the opportunistic exploitation of the complex scattering interactions between the EM field generated by a reconfigurable primary source and the objects/scatterers present in the environment, which behave as application-driven passive metastructures. The effectiveness and the potentialities of the proposed design methodology are assessed with a proof-of-concept numerical result obtained by means of advanced and reliable simulation tools.},\n bibtype = {article},\n author = {Massa, Andrea and Benoni, Arianna and Da Rù, Pietro and Goudos, Sotirios K and Li, Baozhu and Oliveri, Giacomo and Polo, Alessandro and Rocca, Paolo and Salucci, Marco},\n doi = {10.3390/telecom2020014},\n journal = {Telecom},\n number = {2}\n}
\n
\n\n\n
\n The design of a smart electromagnetic (EM) environment for next-generation wireless communication systems is addressed in this work. The proposed approach aims at synthesizing a desired EM field distribution over a target region, where the receiving terminals are located, through the opportunistic exploitation of the complex scattering interactions between the EM field generated by a reconfigurable primary source and the objects/scatterers present in the environment, which behave as application-driven passive metastructures. The effectiveness and the potentialities of the proposed design methodology are assessed with a proof-of-concept numerical result obtained by means of advanced and reliable simulation tools.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Triple-Band Single-Layer Rectenna for Outdoor RF Energy Harvesting Applications.\n \n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Koulouridis, S.; Rocca, P.; Georgiadis, A.; Tentzeris, M., M.; and Goudos, S., K.\n\n\n \n\n\n\n Sensors, 21(10). 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Triple-BandWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Triple-Band Single-Layer Rectenna for Outdoor RF Energy Harvesting Applications},\n type = {article},\n year = {2021},\n volume = {21},\n websites = {https://www.mdpi.com/1424-8220/21/10/3460},\n id = {1175a958-8750-3d71-99e2-26a8f9a68d95},\n created = {2021-05-24T06:03:36.140Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-05-24T06:03:36.140Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {s21103460},\n source_type = {article},\n private_publication = {false},\n abstract = {A triple-band single-layer rectenna for outdoor RF energy applications is introduced in this paper. The proposed rectenna operates in the frequency bands of LoRa, GSM-1800, and UMTS-2100 networks. To obtain a triple-band operation, a modified E-shaped patch antenna is used. The receiving module (antenna) of the rectenna system is optimized in terms of its reflection coefficient to match the RF-to-DC rectifier. The final geometry of the proposed antenna is derived by the application of the Moth Search Algorithm and a commercial electromagnetic solver. The impedance matching network of the proposed system is obtained based on a three-step process, including the minimization of the reflection coefficient versus frequency, as well as the minimization of the reflection coefficient variations and the maximization of the DC output voltage versus RF input power. The proposed RF-to-DC rectifier is designed based on the Greinacher topology. The designed rectenna is fabricated on a single layer of FR-4 substrate. Measured results show that our proposed rectenna can harvest RF energy from outdoor (ambient and dedicated) sources with an efficiency of greater than 52%.},\n bibtype = {article},\n author = {Boursianis, Achilles D and Papadopoulou, Maria S and Koulouridis, Stavros and Rocca, Paolo and Georgiadis, Apostolos and Tentzeris, Manos M and Goudos, Sotirios K},\n doi = {10.3390/s21103460},\n journal = {Sensors},\n number = {10}\n}
\n
\n\n\n
\n A triple-band single-layer rectenna for outdoor RF energy applications is introduced in this paper. The proposed rectenna operates in the frequency bands of LoRa, GSM-1800, and UMTS-2100 networks. To obtain a triple-band operation, a modified E-shaped patch antenna is used. The receiving module (antenna) of the rectenna system is optimized in terms of its reflection coefficient to match the RF-to-DC rectifier. The final geometry of the proposed antenna is derived by the application of the Moth Search Algorithm and a commercial electromagnetic solver. The impedance matching network of the proposed system is obtained based on a three-step process, including the minimization of the reflection coefficient versus frequency, as well as the minimization of the reflection coefficient variations and the maximization of the DC output voltage versus RF input power. The proposed RF-to-DC rectifier is designed based on the Greinacher topology. The designed rectenna is fabricated on a single layer of FR-4 substrate. Measured results show that our proposed rectenna can harvest RF energy from outdoor (ambient and dedicated) sources with an efficiency of greater than 52%.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Chaotic Jaya Approaches to Solving Electromagnetic Optimization Benchmark Problems.\n \n \n \n \n\n\n \n Coelho, L., d., S.; Mariani, V., C.; Goudos, S., K.; Boursianis, A., D.; Kokkinidis, K.; and Kantartzis, N., V.\n\n\n \n\n\n\n Telecom, 2(2): 222-231. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"ChaoticWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Chaotic Jaya Approaches to Solving Electromagnetic Optimization Benchmark Problems},\n type = {article},\n year = {2021},\n pages = {222-231},\n volume = {2},\n websites = {https://www.mdpi.com/2673-4001/2/2/15},\n id = {ede5df4b-bd9f-3e30-ba8d-b3b2c90c79b9},\n created = {2021-06-02T19:26:42.020Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-06-02T19:26:42.020Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {telecom2020015},\n source_type = {article},\n private_publication = {false},\n abstract = {The Jaya optimization algorithm is a simple, fast, robust, and powerful population-based stochastic metaheuristic that in recent years has been successfully applied in a variety of global optimization problems in various application fields. The essential idea of the Jaya algorithm is that the searching agents try to change their positions toward the best obtained solution by avoiding the worst solution at every generation. The important difference between Jaya and other metaheuristics is that Jaya does not require the tuning of its control, except for the maximum number of iterations and population size parameters. However, like other metaheuristics, Jaya still has the dilemma of an appropriate tradeoff between its exploration and exploitation abilities during the evolution process. To enhance the convergence performance of the standard Jaya algorithm in the continuous domain, chaotic Jaya (CJ) frameworks based on chaotic sequences are proposed in this paper. In order to obtain the performance of the standard Jaya and CJ approaches, tests related to electromagnetic optimization using two different benchmark problems are conducted. These are the Loney’s solenoid benchmark and a brushless direct current (DC) motor benchmark. Both problems are realized to evaluate the effectiveness and convergence rate. The simulation results and comparisons with the standard Jaya algorithm demonstrated that the performance of the CJ approaches based on Chebyshev-type chaotic mapping and logistic mapping can be competitive results in terms of both efficiency and solution quality in electromagnetics optimization.},\n bibtype = {article},\n author = {Coelho, Leandro dos S and Mariani, Viviana C and Goudos, Sotirios K and Boursianis, Achilles D and Kokkinidis, Konstantinos and Kantartzis, Nikolaos V},\n doi = {10.3390/telecom2020015},\n journal = {Telecom},\n number = {2}\n}
\n
\n\n\n
\n The Jaya optimization algorithm is a simple, fast, robust, and powerful population-based stochastic metaheuristic that in recent years has been successfully applied in a variety of global optimization problems in various application fields. The essential idea of the Jaya algorithm is that the searching agents try to change their positions toward the best obtained solution by avoiding the worst solution at every generation. The important difference between Jaya and other metaheuristics is that Jaya does not require the tuning of its control, except for the maximum number of iterations and population size parameters. However, like other metaheuristics, Jaya still has the dilemma of an appropriate tradeoff between its exploration and exploitation abilities during the evolution process. To enhance the convergence performance of the standard Jaya algorithm in the continuous domain, chaotic Jaya (CJ) frameworks based on chaotic sequences are proposed in this paper. In order to obtain the performance of the standard Jaya and CJ approaches, tests related to electromagnetic optimization using two different benchmark problems are conducted. These are the Loney’s solenoid benchmark and a brushless direct current (DC) motor benchmark. Both problems are realized to evaluate the effectiveness and convergence rate. The simulation results and comparisons with the standard Jaya algorithm demonstrated that the performance of the CJ approaches based on Chebyshev-type chaotic mapping and logistic mapping can be competitive results in terms of both efficiency and solution quality in electromagnetics optimization.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Enhancing Machine Learning Models for Path Loss Prediction Using Image Texture Techniques.\n \n \n \n\n\n \n Sotiroudis, S.; Siakavara, K.; Koudouridis, G.; Sarigiannidis, P.; and Goudos, S.\n\n\n \n\n\n\n IEEE Antennas and Wireless Propagation Letters, 20(8): 1443-1447. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Enhancing Machine Learning Models for Path Loss Prediction Using Image Texture Techniques},\n type = {article},\n year = {2021},\n pages = {1443-1447},\n volume = {20},\n id = {1c519433-0f4d-3fe9-8333-a601230551cc},\n created = {2021-06-08T05:49:54.194Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:54.838Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9446586},\n source_type = {article},\n private_publication = {false},\n abstract = {The performance of machine learning (ML)-based path loss models relies heavily on the data they use at their inputs. Feature engineering is, therefore, essential for the model's success. In this letter, at hand, we extract a new set of input features, based on image texture. The image that we use represents the footprint of the urban built-up area, where the gray scale values of the building blocks are analogue to their heights. We extract texture information by applying the segmentation-based fractal texture analysis algorithm on the orthogonal area that is bounded between the transmitter and the receiver. To the best of our knowledge this is the first time that such a technique is applied to a path loss modeling problem in electromagnetics. The algorithm, thus, delivers a new set of features, based on the image's texture, which eventually reveal the built-up profile of the area. These new features are injected to an already existing feature set. Comparative analysis shows that the addition of texture-based features leads to enhanced predictions, for a diverse set of transmitter heights, ML algorithms, and performance metrics.},\n bibtype = {article},\n author = {Sotiroudis, Sotirios and Siakavara, Katherine and Koudouridis, George and Sarigiannidis, Panagiotis and Goudos, Sotirios},\n doi = {10.1109/LAWP.2021.3086180},\n journal = {IEEE Antennas and Wireless Propagation Letters},\n number = {8}\n}
\n
\n\n\n
\n The performance of machine learning (ML)-based path loss models relies heavily on the data they use at their inputs. Feature engineering is, therefore, essential for the model's success. In this letter, at hand, we extract a new set of input features, based on image texture. The image that we use represents the footprint of the urban built-up area, where the gray scale values of the building blocks are analogue to their heights. We extract texture information by applying the segmentation-based fractal texture analysis algorithm on the orthogonal area that is bounded between the transmitter and the receiver. To the best of our knowledge this is the first time that such a technique is applied to a path loss modeling problem in electromagnetics. The algorithm, thus, delivers a new set of features, based on the image's texture, which eventually reveal the built-up profile of the area. These new features are injected to an already existing feature set. Comparative analysis shows that the addition of texture-based features leads to enhanced predictions, for a diverse set of transmitter heights, ML algorithms, and performance metrics.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Emerging Evolutionary Algorithms for Antennas and Wireless Communications.\n \n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n of Electromagnetic WavesSciTech Publishing, Incorporated, 2021.\n \n\n\n\n
\n\n\n\n \n \n \"EmergingWebsite\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@book{\n title = {Emerging Evolutionary Algorithms for Antennas and Wireless Communications},\n type = {book},\n year = {2021},\n websites = {https://books.google.gr/books?id=xroJzgEACAAJ},\n publisher = {SciTech Publishing, Incorporated},\n series = {Electromagnetic Waves},\n id = {62f9e369-7654-309c-aca2-f7d9bbe88b2d},\n created = {2021-07-02T06:29:13.488Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:39:28.618Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2021emerging},\n source_type = {book},\n private_publication = {false},\n abstract = {Several evolutionary algorithms (EAs) have emerged in recent decades that mimic the behaviour and evolution of biological entities. EAs are widely used to solve single and multi-objective optimization engineering problems. EAs have also been applied to a variety of microwave components, antenna design, radar design, and wireless communications problems. These techniques, among others, include genetic algorithms (GAs), evolution strategies (ES), particle swarm optimization (PSO), differential evolution (DE), and ant colony optimization (ACO). In addition, new innovative algorithms that are not only biology-based but also physics-based or music-based are also emerging, as are hybrid combinations of EAs. The use of evolutionary algorithms is having an increasing impact on antenna design and wireless communications problems. EAs combined with numerical methods in electromagnetics have obtained significant and successful results. This book aims to present some of the emerging EAs and their variants. Chapter 1 introduces the optimization methods in general and the evolutionary algorithms. Chapter 2 presents briefly some of the most popular evolutionary algorithms, such as particle swarm optimization (PSO), differential evolution (DE), and ant colony optimization (ACO) as well as some emerging ones. Chapter 3 focuses on antenna array synthesis, which constitutes a wide range of antenna design problems. Chapter 4 gives an overview of patch antenna design using evolutionary algorithms. Chapter 5 presents design cases from different microwave structure cases. Chapter 6 discusses on various representative design problems in wireless communications. Chapter 7 deals with design cases for 5G and beyond.},\n bibtype = {book},\n author = {Goudos, S K}\n}
\n
\n\n\n
\n Several evolutionary algorithms (EAs) have emerged in recent decades that mimic the behaviour and evolution of biological entities. EAs are widely used to solve single and multi-objective optimization engineering problems. EAs have also been applied to a variety of microwave components, antenna design, radar design, and wireless communications problems. These techniques, among others, include genetic algorithms (GAs), evolution strategies (ES), particle swarm optimization (PSO), differential evolution (DE), and ant colony optimization (ACO). In addition, new innovative algorithms that are not only biology-based but also physics-based or music-based are also emerging, as are hybrid combinations of EAs. The use of evolutionary algorithms is having an increasing impact on antenna design and wireless communications problems. EAs combined with numerical methods in electromagnetics have obtained significant and successful results. This book aims to present some of the emerging EAs and their variants. Chapter 1 introduces the optimization methods in general and the evolutionary algorithms. Chapter 2 presents briefly some of the most popular evolutionary algorithms, such as particle swarm optimization (PSO), differential evolution (DE), and ant colony optimization (ACO) as well as some emerging ones. Chapter 3 focuses on antenna array synthesis, which constitutes a wide range of antenna design problems. Chapter 4 gives an overview of patch antenna design using evolutionary algorithms. Chapter 5 presents design cases from different microwave structure cases. Chapter 6 discusses on various representative design problems in wireless communications. Chapter 7 deals with design cases for 5G and beyond.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Applying One Class Classification for Leak Detection in Noisy Industrial Pipelines.\n \n \n \n\n\n \n Kampelopoulos, D.; Kousiopoulos, G., P.; Karagiorgos, N.; Konstantakos, V.; Goudos, S.; and Nikolaidis, S.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-4, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Applying One Class Classification for Leak Detection in Noisy Industrial Pipelines},\n type = {inproceedings},\n year = {2021},\n keywords = {acoustic sensors,feature extraction,industrial pipelines,leak detection,machine learning,one class classification},\n pages = {1-4},\n id = {5450b4ab-9ff2-3afd-a98d-651f4196cfab},\n created = {2021-07-29T14:17:13.743Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.207Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493355},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In this work, a machine learning approach is proposed for the problem of leak detection in noisy industrial pipelines. The traditional multi-class or binary classification approaches depend on the fact that real training data are required. However, in real pipeline scenarios the data generation for the leak class relies on measurements of artificially generated leaks which are different in nature than actual ones. Also, some pipelines are not equipped with the components to generate these leaks and in some cases, it is difficult to acquire a large and balanced leak dataset. Thus, in this paper, a set of one class classification models are applied that do not require training with real leak data. In this study's case, four one class classification models are trained on a single class representing the pipeline's normal operating noise. Seven time and frequency domain features are extracted from the raw acoustic data acquired by a set of accelerometers. The trained models are then tested on a new dataset containing leak and noise measurements. This dataset is used to evaluate each model's ability to detect leaks as well as the effect that some introduced parameters have on their performance. Overall, high levels of accuracy are exhibited, and all models are able to distinguish between noise and leak data.},\n bibtype = {inproceedings},\n author = {Kampelopoulos, Dimitrios and Kousiopoulos, Georgios Panagiotis and Karagiorgos, Nikolaos and Konstantakos, Vasileios and Goudos, Sotirios and Nikolaidis, Spyridon},\n doi = {10.1109/MOCAST52088.2021.9493355},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n In this work, a machine learning approach is proposed for the problem of leak detection in noisy industrial pipelines. The traditional multi-class or binary classification approaches depend on the fact that real training data are required. However, in real pipeline scenarios the data generation for the leak class relies on measurements of artificially generated leaks which are different in nature than actual ones. Also, some pipelines are not equipped with the components to generate these leaks and in some cases, it is difficult to acquire a large and balanced leak dataset. Thus, in this paper, a set of one class classification models are applied that do not require training with real leak data. In this study's case, four one class classification models are trained on a single class representing the pipeline's normal operating noise. Seven time and frequency domain features are extracted from the raw acoustic data acquired by a set of accelerometers. The trained models are then tested on a new dataset containing leak and noise measurements. This dataset is used to evaluate each model's ability to detect leaks as well as the effect that some introduced parameters have on their performance. Overall, high levels of accuracy are exhibited, and all models are able to distinguish between noise and leak data.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Design of Unit Cells for Intelligent Reflection Surfaces Based on Transparent Materials.\n \n \n \n\n\n \n Chalkidis, S.; Vassos, E.; Boursianis, A., D.; Feresidis, A.; and Goudos, S., K.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-4, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Design of Unit Cells for Intelligent Reflection Surfaces Based on Transparent Materials},\n type = {inproceedings},\n year = {2021},\n keywords = {IRS (reconfigurable intelligent surfaces),ITO,metasurfaces,unit cell},\n pages = {1-4},\n id = {8333bc48-fdcb-39bd-92d0-35550a729463},\n created = {2021-07-29T14:17:13.745Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.183Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493335},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Intelligent reflection surfaces (IRS) facilitate wireless environments by increasing spectrum and energy efficiencies. IRS will be considered a key element in 5G and Beyond cellular networks. IRS design is based on the unit cells. In this paper, we present the design of unit cells based on transparent materials at millimetre-wave frequencies. The transparency of the surface is achieved by using materials such as Indium tin oxide (ITO) and quartz. Simulations have been carried out using CST microwave studio to evaluate the reflection characteristics of the proposed unit cells. Simulations suggest a maximum shift in the reflection phase up to 336° for variation in the dimensions of the unit cell with low reflection losses at 60GHz for 5G and Beyond Wireless Networks.},\n bibtype = {inproceedings},\n author = {Chalkidis, Savvas and Vassos, Evangelos and Boursianis, Achilles D and Feresidis, Alexandros and Goudos, Sotirios K},\n doi = {10.1109/MOCAST52088.2021.9493335},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n Intelligent reflection surfaces (IRS) facilitate wireless environments by increasing spectrum and energy efficiencies. IRS will be considered a key element in 5G and Beyond cellular networks. IRS design is based on the unit cells. In this paper, we present the design of unit cells based on transparent materials at millimetre-wave frequencies. The transparency of the surface is achieved by using materials such as Indium tin oxide (ITO) and quartz. Simulations have been carried out using CST microwave studio to evaluate the reflection characteristics of the proposed unit cells. Simulations suggest a maximum shift in the reflection phase up to 336° for variation in the dimensions of the unit cell with low reflection losses at 60GHz for 5G and Beyond Wireless Networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A NB-IoT based platform for smart irrigation in vineyard.\n \n \n \n\n\n \n Liopa-Tsakalidi, A.; Thomopoulos, V.; Barouchas, P.; Kavga, A.; Boursianis, A., D.; Goudos, S., K.; Kalamaras, G.; Gotsis, A.; and Maliatsos, K.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-4, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A NB-IoT based platform for smart irrigation in vineyard},\n type = {inproceedings},\n year = {2021},\n keywords = {IoT,NB-IoT,Vineyards,irrigation,sensors},\n pages = {1-4},\n id = {71c26d55-3686-36ee-bcc0-ab9e5ef2b356},\n created = {2021-07-29T14:17:13.797Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.378Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493381},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {A novel prototype NB-IoT-based quasi-smart water management platform for irrigation is proposed. The prototype has been deployed in a vineyard in Peta village, Greece, as part of the AREThOU5A project. An IoT framework for regularly and accurately tracking the status of soil hydration and reporting it to a centralized entity for further processing since water needs are directly related to soil moisture is proposed. The framework is based on specialized IoT hardware that includes low-cost microcontrollers with integrated sensor interfaces and telecommunication modems, open-source applications, open and standardized data transfer protocols, with low capital and operating costs. In the vineyard, an IoT end-node have been placed. Each node: i) collects soil moisture and temperature samples at a depth of 20 cm, ii) is battery-powered and has a battery life of several months on a single charge, and iii) connects to the system back-end via NB-IoT. The sensor measurements from the IoT nodes are forwarded to a cloud-based infrastructure using the Constrained Application Protocol (CoAP)/IPv6 protocol using a public mobile network. Data is maintained on a cloud backend and can be accessed in real-time via dashboards from any Internet-connected individual. In terms of hardware integration, operating solutions, networking and connectivity support, the proposed platform offers numerous novel features.},\n bibtype = {inproceedings},\n author = {Liopa-Tsakalidi, Aglaia and Thomopoulos, Vasileios and Barouchas, Pantelis and Kavga, Angeliki and Boursianis, Achilles D and Goudos, Sotirios K and Kalamaras, Georgios and Gotsis, Antonis and Maliatsos, Konstantinos},\n doi = {10.1109/MOCAST52088.2021.9493381},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n A novel prototype NB-IoT-based quasi-smart water management platform for irrigation is proposed. The prototype has been deployed in a vineyard in Peta village, Greece, as part of the AREThOU5A project. An IoT framework for regularly and accurately tracking the status of soil hydration and reporting it to a centralized entity for further processing since water needs are directly related to soil moisture is proposed. The framework is based on specialized IoT hardware that includes low-cost microcontrollers with integrated sensor interfaces and telecommunication modems, open-source applications, open and standardized data transfer protocols, with low capital and operating costs. In the vineyard, an IoT end-node have been placed. Each node: i) collects soil moisture and temperature samples at a depth of 20 cm, ii) is battery-powered and has a battery life of several months on a single charge, and iii) connects to the system back-end via NB-IoT. The sensor measurements from the IoT nodes are forwarded to a cloud-based infrastructure using the Constrained Application Protocol (CoAP)/IPv6 protocol using a public mobile network. Data is maintained on a cloud backend and can be accessed in real-time via dashboards from any Internet-connected individual. In terms of hardware integration, operating solutions, networking and connectivity support, the proposed platform offers numerous novel features.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Advanced Teaching in Electromagnetics at the ELEDIA Research Center.\n \n \n \n\n\n \n Polo, A.; Ahmadi, H.; Goudos, S., K.; Hu, J.; Huang, J.; Khan, M.; Li, B.; Li, M.; Oliveri, G.; Rocca, P.; Salucci, M.; Yang, F.; Yang, S.; and Massa, A.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-3, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Advanced Teaching in Electromagnetics at the ELEDIA Research Center},\n type = {inproceedings},\n year = {2021},\n keywords = {communication systems,electromagnetic (EM) engineering,self-evaluation,teaching},\n pages = {1-3},\n id = {8286c38c-c92c-3198-8053-2cbbda55f22a},\n created = {2021-07-29T14:17:13.893Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.247Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493402},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {An entire long-term educational framework has been designed and implemented by the ELEDIA Research Center to (i) renew the way of teaching electromagnetics (EM) and modern communication systems to future engineers and (ii) increase students' self-confidence and admiration of the applicative and technological aspects of Maxwell's equations. According to authors' expectations and students' feedback, such a training ecosystem will help a computer-naive generation in developing a more natural engineer-oriented thinking mechanism and attitude for continuously adapting to technological advances in EM leading-edge research and industry.},\n bibtype = {inproceedings},\n author = {Polo, Alessandro and Ahmadi, Hanen and Goudos, Sotirios K and Hu, Jun and Huang, Jin and Khan, Moman and Li, Baozhu and Li, Maokun and Oliveri, Giacomo and Rocca, Paolo and Salucci, Marco and Yang, Fan and Yang, Shiwen and Massa, Andrea},\n doi = {10.1109/MOCAST52088.2021.9493402},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n An entire long-term educational framework has been designed and implemented by the ELEDIA Research Center to (i) renew the way of teaching electromagnetics (EM) and modern communication systems to future engineers and (ii) increase students' self-confidence and admiration of the applicative and technological aspects of Maxwell's equations. According to authors' expectations and students' feedback, such a training ecosystem will help a computer-naive generation in developing a more natural engineer-oriented thinking mechanism and attitude for continuously adapting to technological advances in EM leading-edge research and industry.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dual-Band Frequency Selective Surface Design Using Harris Hawks Optimization.\n \n \n \n\n\n \n Boursianis, A., D.; Salucci, M.; Koulouridis, S.; Georgiadis, A.; Tentzeris, M.; and Goudos, S., K.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-4, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Dual-Band Frequency Selective Surface Design Using Harris Hawks Optimization},\n type = {inproceedings},\n year = {2021},\n keywords = {Frequency selective surface,Harris Hawk Optimization,RF energy harvesting,dual-slot,optimization method},\n pages = {1-4},\n id = {0b83bdf6-94cf-37ec-837c-f1f35b21e9ab},\n created = {2021-07-29T14:17:13.913Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.207Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493382},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Frequency Selective Surfaces (FSSs) are periodic structures that are designed to reflect, absorb or transmit electromagnetic fields in a variable frequency range. Their performance is strongly dependent on their fundamental structure, i.e. the unit cell. In this paper, we exploit the characteristic of absorption to design a dual-band FSS suitable for indoor RF energy harvesting systems. We combine an optimization technique by utilizing the Harris Hawk Optimization (HHO) algorithm and a high-frequency electromagnetic solver to optimize the geometry of the unit cell and the overall FSS. The proposed system operates in the frequency bands of Wi-Fi 2.4 GHz and Wi-Fi 5 GHz. Numerical results demonstrate that the optimized FSS exhibits quite satisfactory results and makes it a suitable candidate for RF energy harvesting applications.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Salucci, Marco and Koulouridis, Stavros and Georgiadis, Apostolos and Tentzeris, Manos and Goudos, Sotirios K},\n doi = {10.1109/MOCAST52088.2021.9493382},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n Frequency Selective Surfaces (FSSs) are periodic structures that are designed to reflect, absorb or transmit electromagnetic fields in a variable frequency range. Their performance is strongly dependent on their fundamental structure, i.e. the unit cell. In this paper, we exploit the characteristic of absorption to design a dual-band FSS suitable for indoor RF energy harvesting systems. We combine an optimization technique by utilizing the Harris Hawk Optimization (HHO) algorithm and a high-frequency electromagnetic solver to optimize the geometry of the unit cell and the overall FSS. The proposed system operates in the frequency bands of Wi-Fi 2.4 GHz and Wi-Fi 5 GHz. Numerical results demonstrate that the optimized FSS exhibits quite satisfactory results and makes it a suitable candidate for RF energy harvesting applications.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Performance Evaluation of LoRa Networks in an Open Field Cultivation Scenario.\n \n \n \n\n\n \n Griva, A.; Boursianis, A., D.; Wan, S.; Sarigiannidis, P.; Karagiannidis, G.; and Goudos, S., K.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-5, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Performance Evaluation of LoRa Networks in an Open Field Cultivation Scenario},\n type = {inproceedings},\n year = {2021},\n keywords = {Data Extraction Rate,Internet of Things (IoT),Long Range (LoRa),Network Energy Consumption,Smart Agriculture},\n pages = {1-5},\n id = {7407cdb8-3c82-399a-9e58-0fe2366f3872},\n created = {2021-07-29T14:17:13.915Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.078Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493416},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The employment of Internet of Things (IoT) technology in agriculture could be beneficial in managing the cultivation production in a highly-customizable way. LoRa (Long Range) is one of the most important technologies in cultivation fields mainly thanks to its ability to provide long-range transmission and low power consumption. In this paper, we evaluate the performance of LoRa networks in an open field cultivation scenario via simulations using FLoRa, an open-source framework in OMNeT++. The number of nodes, the number of gateways, the antenna gain, and the size of the deployment area have a considerable impact on both the data extraction rate and the energy consumption of a LoRa network. Our results show that the optimization of the parameters that affect the performance of a LoRa network could transform traditional agriculture into a new perspective of smart cultivation. Finally, we evaluate the impact of the density and the geometric characteristics of three types of crop (tomatoes, grapes, apples) on the number of intersections that were caused by the insertion of physical objects-obstacles in a LoRa network.},\n bibtype = {inproceedings},\n author = {Griva, Aikaterini and Boursianis, Achilles D and Wan, Shaouha and Sarigiannidis, Panagiotis and Karagiannidis, George and Goudos, Sotirios K},\n doi = {10.1109/MOCAST52088.2021.9493416},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n The employment of Internet of Things (IoT) technology in agriculture could be beneficial in managing the cultivation production in a highly-customizable way. LoRa (Long Range) is one of the most important technologies in cultivation fields mainly thanks to its ability to provide long-range transmission and low power consumption. In this paper, we evaluate the performance of LoRa networks in an open field cultivation scenario via simulations using FLoRa, an open-source framework in OMNeT++. The number of nodes, the number of gateways, the antenna gain, and the size of the deployment area have a considerable impact on both the data extraction rate and the energy consumption of a LoRa network. Our results show that the optimization of the parameters that affect the performance of a LoRa network could transform traditional agriculture into a new perspective of smart cultivation. Finally, we evaluate the impact of the density and the geometric characteristics of three types of crop (tomatoes, grapes, apples) on the number of intersections that were caused by the insertion of physical objects-obstacles in a LoRa network.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Unsupervised Machine Learning in 6G Networks -State-of-the-art and Future Trends.\n \n \n \n\n\n \n Rekkas, V., P.; Sotiroudis, S.; Sarigiannidis, P.; Karagiannidis, G., K.; and Goudos, S., K.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-4, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Unsupervised Machine Learning in 6G Networks -State-of-the-art and Future Trends},\n type = {inproceedings},\n year = {2021},\n keywords = {6G,Artificial Intelligence,Sixth Generation,Unsupervised Machine Learning,Wireless Communications},\n pages = {1-4},\n id = {f02dff54-9a75-33a1-9063-a50026635b76},\n created = {2021-07-29T14:17:13.919Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.045Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493388},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Wireless communication systems play a very crucial role for business, commercial, health and safety applications. With the commercial deployment of fifth generation (5G), academic and industrial research focuses on the sixth generation (6G) of wireless communication systems. Artificial Intelligence (AI) and especially Machine Learning (ML), will be a key component of 6G systems. Here, we present an up-to-date review of future 6G wireless systems and the role of unsupervised ML techniques in them.},\n bibtype = {inproceedings},\n author = {Rekkas, Vasileios P and Sotiroudis, Sotirios and Sarigiannidis, Panagiotis and Karagiannidis, George K and Goudos, Sotirios K},\n doi = {10.1109/MOCAST52088.2021.9493388},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n Wireless communication systems play a very crucial role for business, commercial, health and safety applications. With the commercial deployment of fifth generation (5G), academic and industrial research focuses on the sixth generation (6G) of wireless communication systems. Artificial Intelligence (AI) and especially Machine Learning (ML), will be a key component of 6G systems. Here, we present an up-to-date review of future 6G wireless systems and the role of unsupervised ML techniques in them.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Comparing Machine Learning Methods for Air-to-Ground Path Loss Prediction.\n \n \n \n\n\n \n Vergos, G.; Sotiroudis, S., P.; Athanasiadou, G.; Tsoulos, G., V.; and Goudos, S., K.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-4, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Comparing Machine Learning Methods for Air-to-Ground Path Loss Prediction},\n type = {inproceedings},\n year = {2021},\n keywords = {AdaBoost,Random Forest,Support Vector Regression,k-Nearest Neighbors,machine learning,mobile communications,path loss,ray tracing},\n pages = {1-4},\n id = {04eed7d3-9f3b-368e-8977-cfcd9034ad4c},\n created = {2021-07-29T14:17:13.999Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.205Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493374},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Machine Learning-based models gain increasingly momentum regarding the problem of path loss prediction. The work at hand deploys four machine learning algorithms (k Nearest Neighbors - kNN, Support Vector Regression - SVR, Random Forest - RF and AdaBoost), in order to simulate the radio coverage provided from a flying base station in the greek city of Tripolis. Their comparison shows that tree-based ensemble models (RF and AdaBoost) can be used as fast and reliable alternatives to the Ray Tracing technique.},\n bibtype = {inproceedings},\n author = {Vergos, George and Sotiroudis, Sotirios P and Athanasiadou, Georgia and Tsoulos, George V and Goudos, Sotirios K},\n doi = {10.1109/MOCAST52088.2021.9493374},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n Machine Learning-based models gain increasingly momentum regarding the problem of path loss prediction. The work at hand deploys four machine learning algorithms (k Nearest Neighbors - kNN, Support Vector Regression - SVR, Random Forest - RF and AdaBoost), in order to simulate the radio coverage provided from a flying base station in the greek city of Tripolis. Their comparison shows that tree-based ensemble models (RF and AdaBoost) can be used as fast and reliable alternatives to the Ray Tracing technique.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n On the Resource Allocation of Hierarchical NOMA for Fog-RAN with Energy Harvesting.\n \n \n \n\n\n \n Papanikolaou, V., K.; Mitsiou, N., A.; Diamantoulakis, P., D.; Goudos, S., K.; and Karagiannidis, G., K.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-4, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {On the Resource Allocation of Hierarchical NOMA for Fog-RAN with Energy Harvesting},\n type = {inproceedings},\n year = {2021},\n keywords = {convex optimization,energy harvesting,hierarchical noma,non-orthogonal multiple access (noma),resource allocation},\n pages = {1-4},\n id = {630c0920-1ac2-31cd-97c8-860ffd5c4036},\n created = {2021-07-29T14:17:14.046Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.359Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493358},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In this paper, we introduce a multiple access protocol, termed hierarchical non-orthogonal multiple access (HiNOMA), optimized for fog-radio access networks (F-RANs). Resource allocation optimization is deemed critical in order to guarantee the users' fairness in the network, while energy efficiency can be increased through energy harvesting (EH) at the user equipment (UE) nodes. Therefore, the HiNOMA protocol with energy harvesting capabilities is examined for F-RANs, leading to the optimization of the proportional fairness metric. Finally, numerical results reveal the effectiveness of the joint design and the interesting trade-off between harvested power and achievable rate in the case of F-RAN.},\n bibtype = {inproceedings},\n author = {Papanikolaou, Vasilis K and Mitsiou, Nikos A and Diamantoulakis, Panagiotis D and Goudos, Sotirios K and Karagiannidis, George K},\n doi = {10.1109/MOCAST52088.2021.9493358},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n In this paper, we introduce a multiple access protocol, termed hierarchical non-orthogonal multiple access (HiNOMA), optimized for fog-radio access networks (F-RANs). Resource allocation optimization is deemed critical in order to guarantee the users' fairness in the network, while energy efficiency can be increased through energy harvesting (EH) at the user equipment (UE) nodes. Therefore, the HiNOMA protocol with energy harvesting capabilities is examined for F-RANs, leading to the optimization of the proportional fairness metric. Finally, numerical results reveal the effectiveness of the joint design and the interesting trade-off between harvested power and achievable rate in the case of F-RAN.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Medical Data Encryption based on a Modified Sinusoidal 1D Chaotic Map and Its Microcontroller Implementation.\n \n \n \n\n\n \n Iatropoulos, A.; Moysis, L.; Giakoumis, A.; Volos, C.; Ouannas, A.; and Goudos, S.\n\n\n \n\n\n\n In 2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021, pages 1-4, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Medical Data Encryption based on a Modified Sinusoidal 1D Chaotic Map and Its Microcontroller Implementation},\n type = {inproceedings},\n year = {2021},\n keywords = {Chaos,eeg,microcontroller,prbg,signal encryption},\n pages = {1-4},\n id = {b60c7d87-adbf-3f12-883f-e7ab504d8a2b},\n created = {2021-07-29T14:17:14.117Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.154Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9493422},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This work considers a modification of the map proposed in Wang et al. (2020), by replacing its fixed term by a squared hyperbolic tangent term. The modified map is studied and is shown to have a plethora of chaos related phenomena, like period doubling route to chaos, crisis, antimonotonicity, and an infinite number of equilibrium points inside a bounded domain. Then, a pseudo-random bit generator is designed from the given map and it is applied to the encryption of medical data. Specifically, an electrophysiological signal is considered. The resulting design is finally implemented on a 32 bit microcontroller.},\n bibtype = {inproceedings},\n author = {Iatropoulos, Apostolos and Moysis, Lazaros and Giakoumis, Aggelos and Volos, Christos and Ouannas, Adel and Goudos, Sotirios},\n doi = {10.1109/MOCAST52088.2021.9493422},\n booktitle = {2021 10th International Conference on Modern Circuits and Systems Technologies, MOCAST 2021}\n}
\n
\n\n\n
\n This work considers a modification of the map proposed in Wang et al. (2020), by replacing its fixed term by a squared hyperbolic tangent term. The modified map is studied and is shown to have a plethora of chaos related phenomena, like period doubling route to chaos, crisis, antimonotonicity, and an infinite number of equilibrium points inside a bounded domain. Then, a pseudo-random bit generator is designed from the given map and it is applied to the encryption of medical data. Specifically, an electrophysiological signal is considered. The resulting design is finally implemented on a 32 bit microcontroller.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Metaheuristic Optimization of LED Locations for Visible Light Positioning Network Planning.\n \n \n \n\n\n \n Bastiaens, S.; Goudos, S., K.; Joseph, W.; and Plets, D.\n\n\n \n\n\n\n IEEE Transactions on Broadcasting, 67(4): 894-908. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Metaheuristic Optimization of LED Locations for Visible Light Positioning Network Planning},\n type = {article},\n year = {2021},\n pages = {894-908},\n volume = {67},\n id = {6c460b5f-fe37-32ef-993b-0d3306f0700d},\n created = {2021-08-04T21:01:51.763Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:54.834Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9505014},\n source_type = {article},\n private_publication = {false},\n abstract = {Optical Wireless Communication (OWC) is being explored for application in the next-generation broadcasting networks, where possessing accurately determined user locations becomes increasingly important. Received signal strength (RSS) Visible Light Positioning (VLP)-based localisation systems aim to deliver these centimetre-level location data at a low cost by featuring but a single photodiode (PD). Maximising the VLP accuracy requires optimising the LED transmitter locations, which is missing currently. An evolutionary optimisation algorithm is proposed to determine the optimal LED locations and the associated positioning error values for various configurations. The sensitivity of the planning on the number of VLP-enabled LEDs, the LEDs’ characteristics, the room dimensions and the positioning parameters is investigated. Experimental data, i.e., two datasets with 1572 measurement points each, serve to validate the simulations.},\n bibtype = {article},\n author = {Bastiaens, Sander and Goudos, Sotirios K and Joseph, Wout and Plets, David},\n doi = {10.1109/TBC.2021.3099734},\n journal = {IEEE Transactions on Broadcasting},\n number = {4}\n}
\n
\n\n\n
\n Optical Wireless Communication (OWC) is being explored for application in the next-generation broadcasting networks, where possessing accurately determined user locations becomes increasingly important. Received signal strength (RSS) Visible Light Positioning (VLP)-based localisation systems aim to deliver these centimetre-level location data at a low cost by featuring but a single photodiode (PD). Maximising the VLP accuracy requires optimising the LED transmitter locations, which is missing currently. An evolutionary optimisation algorithm is proposed to determine the optimal LED locations and the associated positioning error values for various configurations. The sensitivity of the planning on the number of VLP-enabled LEDs, the LEDs’ characteristics, the room dimensions and the positioning parameters is investigated. Experimental data, i.e., two datasets with 1572 measurement points each, serve to validate the simulations.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Federated Intrusion Detection In NG-IoT Healthcare Systems: An Adversarial Approach.\n \n \n \n \n\n\n \n Siniosoglou, I.; Sarigiannidis, P.; Argyriou, V.; Lagkas, T.; Goudos, S., K.; and Poveda, M.\n\n\n \n\n\n\n In ICC 2021 - IEEE International Conference on Communications, pages 1-6, 6 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"FederatedWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Federated Intrusion Detection In NG-IoT Healthcare Systems: An Adversarial Approach},\n type = {inproceedings},\n year = {2021},\n pages = {1-6},\n websites = {https://ieeexplore.ieee.org/document/9500578/},\n month = {6},\n publisher = {IEEE},\n id = {5855fb78-adc8-333f-a942-66225905c340},\n created = {2021-08-06T20:20:42.843Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.030Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9500578},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In recent years and with the advancement of IoT networks, malicious intrusions aiming at disrupting the services and getting access to confidential information in medical environments is ever progressing. To that end, this paper proposes a Federated Layered Architecture to be used in Medical Cyber-Physical Systems (MCPS) Networks that entails the creation of multiple aggregation layers to induce further security to the model training process. Moreover, two Deep Adversarial Neural Networks (GANs) are presented for use with data found in the MCPS environment. The evaluation of the presented work showed that the models trained in the Federated system have an increase in their ability to detect possible intrusions in the MCPS network than the commonly trained models.},\n bibtype = {inproceedings},\n author = {Siniosoglou, Ilias and Sarigiannidis, Panagiotis and Argyriou, Vasilis and Lagkas, Thomas and Goudos, Sotirios K and Poveda, Maria},\n doi = {10.1109/ICC42927.2021.9500578},\n booktitle = {ICC 2021 - IEEE International Conference on Communications}\n}
\n
\n\n\n
\n In recent years and with the advancement of IoT networks, malicious intrusions aiming at disrupting the services and getting access to confidential information in medical environments is ever progressing. To that end, this paper proposes a Federated Layered Architecture to be used in Medical Cyber-Physical Systems (MCPS) Networks that entails the creation of multiple aggregation layers to induce further security to the model training process. Moreover, two Deep Adversarial Neural Networks (GANs) are presented for use with data found in the MCPS environment. The evaluation of the presented work showed that the models trained in the Federated system have an increase in their ability to detect possible intrusions in the MCPS network than the commonly trained models.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n High-Efficiency Triple-Band RF-to-DC Rectifier Primary Design for RF Energy-Harvesting Systems.\n \n \n \n \n\n\n \n Papadopoulou, M., S.; Boursianis, A., D.; Volos, C., K.; Stouboulos, I., N.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n Telecom, 2(3): 271-284. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"High-EfficiencyWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {High-Efficiency Triple-Band RF-to-DC Rectifier Primary Design for RF Energy-Harvesting Systems},\n type = {article},\n year = {2021},\n pages = {271-284},\n volume = {2},\n websites = {https://www.mdpi.com/2673-4001/2/3/18},\n id = {76414c4a-7843-31dc-a77d-defce50a6395},\n created = {2021-08-09T14:25:42.716Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-08-09T14:25:42.716Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {telecom2030018},\n source_type = {article},\n private_publication = {false},\n abstract = {Radio Frequency (RF) energy harvesting has been emerged as a potentially reliable method to replace the costly and difficult to maintain source of low-power wireless sensor networks. A plethora of dual-band rectifier designs has been proposed in the literature operating in various frequency bands. In this paper, a triple-band RF-to-DC rectifier that operates in the frequency bands of LoRaWAN, GSM-900, and WiFi 2.4 GHz is presented. The system is composed of an impedance-matching circuit, an RF-to-DC rectifier, that converts the ambient RF energy into DC voltage able to feed low-power devices, and an output load. The proposed system resonates at three different frequencies of 866 MHz, 948 MHz and 2423 MHz, which fall within the aforementioned frequency bands of interest. The feasible solution of the proposed system was based on a dual-band rectifier operating in the frequency bands of LoRaWAN and GSM-900. A series of shunt stubs was utilized in the initial design to form the feasible solution of the proposed system. The proposed triple-band rectifier was optimized using a powerful optimization algorithm, i.e., the genetic algorithm. The overall system exhibited improved characteristics compared to the initial design in terms of its resonance. Numerical results demonstrated that the overall system exhibited an efficiency of 81% with 3.23 V of the output voltage, for an input power of 0 dBm and a load of 13 kOhm.},\n bibtype = {article},\n author = {Papadopoulou, Maria S and Boursianis, Achilles D and Volos, Christos K and Stouboulos, Ioannis N and Nikolaidis, Spyridon and Goudos, Sotirios K},\n doi = {10.3390/telecom2030018},\n journal = {Telecom},\n number = {3}\n}
\n
\n\n\n
\n Radio Frequency (RF) energy harvesting has been emerged as a potentially reliable method to replace the costly and difficult to maintain source of low-power wireless sensor networks. A plethora of dual-band rectifier designs has been proposed in the literature operating in various frequency bands. In this paper, a triple-band RF-to-DC rectifier that operates in the frequency bands of LoRaWAN, GSM-900, and WiFi 2.4 GHz is presented. The system is composed of an impedance-matching circuit, an RF-to-DC rectifier, that converts the ambient RF energy into DC voltage able to feed low-power devices, and an output load. The proposed system resonates at three different frequencies of 866 MHz, 948 MHz and 2423 MHz, which fall within the aforementioned frequency bands of interest. The feasible solution of the proposed system was based on a dual-band rectifier operating in the frequency bands of LoRaWAN and GSM-900. A series of shunt stubs was utilized in the initial design to form the feasible solution of the proposed system. The proposed triple-band rectifier was optimized using a powerful optimization algorithm, i.e., the genetic algorithm. The overall system exhibited improved characteristics compared to the initial design in terms of its resonance. Numerical results demonstrated that the overall system exhibited an efficiency of 81% with 3.23 V of the output voltage, for an input power of 0 dBm and a load of 13 kOhm.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Encoding Spectral-Spatial Features for Hyperspectral Image Classification in the Satellite Internet of Things System.\n \n \n \n \n\n\n \n Lv, N.; Han, Z.; Chen, C.; Feng, Y.; Su, T.; Goudos, S.; and Wan, S.\n\n\n \n\n\n\n Remote Sensing, 13(18). 2021.\n \n\n\n\n
\n\n\n\n \n \n \"EncodingWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Encoding Spectral-Spatial Features for Hyperspectral Image Classification in the Satellite Internet of Things System},\n type = {article},\n year = {2021},\n volume = {13},\n websites = {https://www.mdpi.com/2072-4292/13/18/3561},\n id = {14020eb8-e387-3f51-b986-c61bb0fdb0c6},\n created = {2021-09-10T05:43:09.489Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-09-10T05:43:09.489Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {rs13183561},\n source_type = {article},\n private_publication = {false},\n abstract = {Hyperspectral image classification is essential for satellite Internet of Things (IoT) to build a large scale land-cover surveillance system. After acquiring real-time land-cover information, the edge of the network transmits all the hyperspectral images by satellites with low-latency and high-efficiency to the cloud computing center, which are provided by satellite IoT. A gigantic amount of remote sensing data bring challenges to the storage and processing capacity of traditional satellite systems. When hyperspectral images are used in annotation of land-cover application, data dimension reduction for classifier efficiency often leads to the decrease of classifier accuracy, especially the region to be annotated consists of natural landform and artificial structure. This paper proposes encoding spectral-spatial features for hyperspectral image classification in the satellite Internet of Things system to extract features effectively, namely attribute profile stacked autoencoder (AP-SAE). Firstly, extended morphology attribute profiles EMAP is used to obtain spatial features of different attribute scales. Secondly, AP-SAE is used to extract spectral features with similar spatial attributes. In this stage the program can learn feature mappings, on which the pixels from the same land-cover class are mapped as closely as possible and the pixels from different land-cover categories are separated by a large margin. Finally, the program trains an effective classifier by using the network of the AP-SAE. Experimental results on three widely-used hyperspectral image (HSI) datasets and comprehensive comparisons with existing methods demonstrate that our proposed method can be used effectively in hyperspectral image classification.},\n bibtype = {article},\n author = {Lv, Ning and Han, Zhen and Chen, Chen and Feng, Yijia and Su, Tao and Goudos, Sotirios and Wan, Shaohua},\n doi = {10.3390/rs13183561},\n journal = {Remote Sensing},\n number = {18}\n}
\n
\n\n\n
\n Hyperspectral image classification is essential for satellite Internet of Things (IoT) to build a large scale land-cover surveillance system. After acquiring real-time land-cover information, the edge of the network transmits all the hyperspectral images by satellites with low-latency and high-efficiency to the cloud computing center, which are provided by satellite IoT. A gigantic amount of remote sensing data bring challenges to the storage and processing capacity of traditional satellite systems. When hyperspectral images are used in annotation of land-cover application, data dimension reduction for classifier efficiency often leads to the decrease of classifier accuracy, especially the region to be annotated consists of natural landform and artificial structure. This paper proposes encoding spectral-spatial features for hyperspectral image classification in the satellite Internet of Things system to extract features effectively, namely attribute profile stacked autoencoder (AP-SAE). Firstly, extended morphology attribute profiles EMAP is used to obtain spatial features of different attribute scales. Secondly, AP-SAE is used to extract spectral features with similar spatial attributes. In this stage the program can learn feature mappings, on which the pixels from the same land-cover class are mapped as closely as possible and the pixels from different land-cover categories are separated by a large margin. Finally, the program trains an effective classifier by using the network of the AP-SAE. Experimental results on three widely-used hyperspectral image (HSI) datasets and comprehensive comparisons with existing methods demonstrate that our proposed method can be used effectively in hyperspectral image classification.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Emerging Swarm Intelligence Algorithms and Their Applications in Antenna Design: The GWO, WOA, and SSA Optimizers.\n \n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Salucci, M.; Polo, A.; Sarigiannidis, P.; Psannis, K.; Mirjalili, S.; Koulouridis, S.; and Goudos, S., K.\n\n\n \n\n\n\n Applied Sciences, 11(18). 2021.\n \n\n\n\n
\n\n\n\n \n \n \"EmergingWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Emerging Swarm Intelligence Algorithms and Their Applications in Antenna Design: The GWO, WOA, and SSA Optimizers},\n type = {article},\n year = {2021},\n volume = {11},\n websites = {https://www.mdpi.com/2076-3417/11/18/8330},\n id = {f8e33846-e1ba-366d-bfb3-159796a7aa15},\n created = {2021-09-10T05:43:09.493Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-09-10T05:43:09.493Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {app11188330},\n source_type = {article},\n private_publication = {false},\n abstract = {Swarm Intelligence (SI) Algorithms imitate the collective behavior of various swarms or groups in nature. In this work, three representative examples of SI algorithms have been selected and thoroughly described, namely the Grey Wolf Optimizer (GWO), the Whale Optimization Algorithm (WOA), and the Salp Swarm Algorithm (SSA). Firstly, the selected SI algorithms are reviewed in the literature, specifically for optimization problems in antenna design. Secondly, a comparative study is performed against widely known test functions. Thirdly, such SI algorithms are applied to the synthesis of linear antenna arrays for optimizing the peak sidelobe level (pSLL). Numerical tests show that the WOA outperforms the GWO and the SSA algorithms, as well as the well-known Particle Swarm Optimizer (PSO), in terms of average ranking. Finally, the WOA is exploited for solving a more computational complex problem concerned with the synthesis of an dual-band aperture-coupled E-shaped antenna operating in the 5G frequency bands.},\n bibtype = {article},\n author = {Boursianis, Achilles D and Papadopoulou, Maria S and Salucci, Marco and Polo, Alessandro and Sarigiannidis, Panagiotis and Psannis, Konstantinos and Mirjalili, Seyedali and Koulouridis, Stavros and Goudos, Sotirios K},\n doi = {10.3390/app11188330},\n journal = {Applied Sciences},\n number = {18}\n}
\n
\n\n\n
\n Swarm Intelligence (SI) Algorithms imitate the collective behavior of various swarms or groups in nature. In this work, three representative examples of SI algorithms have been selected and thoroughly described, namely the Grey Wolf Optimizer (GWO), the Whale Optimization Algorithm (WOA), and the Salp Swarm Algorithm (SSA). Firstly, the selected SI algorithms are reviewed in the literature, specifically for optimization problems in antenna design. Secondly, a comparative study is performed against widely known test functions. Thirdly, such SI algorithms are applied to the synthesis of linear antenna arrays for optimizing the peak sidelobe level (pSLL). Numerical tests show that the WOA outperforms the GWO and the SSA algorithms, as well as the well-known Particle Swarm Optimizer (PSO), in terms of average ranking. Finally, the WOA is exploited for solving a more computational complex problem concerned with the synthesis of an dual-band aperture-coupled E-shaped antenna operating in the 5G frequency bands.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Application of the Whale Optimization Algorithm to Antenna Design for mm-Wave 5G Communications Systems.\n \n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Wideband, Multiband, and Smart Antenna Systems, pages 251-267. Matin, M., A., editor(s). Springer International Publishing, 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Wideband,Website\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2021},\n pages = {251-267},\n websites = {https://doi.org/10.1007/978-3-030-74311-6_8},\n publisher = {Springer International Publishing},\n city = {Cham},\n id = {fdd827e1-b600-3854-9836-d318e20ecbad},\n created = {2021-09-25T15:20:07.126Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-09-25T15:20:07.126Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2021},\n source_type = {inbook},\n private_publication = {false},\n abstract = {The new expected fifth generation (5G) communication systems will serve users with several Gbps data rates and will allow running new applications from mobile devices. In order to do so, several design challenges must be met. One of these is the antenna design and fabrication for 5G mobile devices, especially in the millimeter-wave frequencies. In this chapter, we address the above issue by designing a patch antennas for mm-wave frequencies. We apply a design procedure based on a new nature-inspired algorithm the Whale Optimization Algorithm (WOA), which is based on the social behavior of humpback whales. We design the antenna using the WOA algorithm. The numerical results show the applicability and validity of the proposed design framework.},\n bibtype = {inbook},\n author = {Goudos, Sotirios K},\n editor = {Matin, Mohammad Abdul},\n doi = {10.1007/978-3-030-74311-6_8},\n chapter = {Application of the Whale Optimization Algorithm to Antenna Design for mm-Wave 5G Communications Systems},\n title = {Wideband, Multiband, and Smart Antenna Systems}\n}
\n
\n\n\n
\n The new expected fifth generation (5G) communication systems will serve users with several Gbps data rates and will allow running new applications from mobile devices. In order to do so, several design challenges must be met. One of these is the antenna design and fabrication for 5G mobile devices, especially in the millimeter-wave frequencies. In this chapter, we address the above issue by designing a patch antennas for mm-wave frequencies. We apply a design procedure based on a new nature-inspired algorithm the Whale Optimization Algorithm (WOA), which is based on the social behavior of humpback whales. We design the antenna using the WOA algorithm. The numerical results show the applicability and validity of the proposed design framework.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Novel Design Framework for Dual-Band Frequency Selective Surfaces Using Multi-Variant Differential Evolution.\n \n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Nikolaidis, S.; Sarigiannidis, P.; Psannis, K.; Georgiadis, A.; Tentzeris, M., M.; and Goudos, S., K.\n\n\n \n\n\n\n Mathematics, 9(19): 2381. 9 2021.\n \n\n\n\n
\n\n\n\n \n \n \"NovelWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Novel Design Framework for Dual-Band Frequency Selective Surfaces Using Multi-Variant Differential Evolution},\n type = {article},\n year = {2021},\n pages = {2381},\n volume = {9},\n websites = {https://www.mdpi.com/2227-7390/9/19/2381},\n month = {9},\n day = {25},\n id = {2e43fee7-a130-3353-91cb-5642145a4e1b},\n created = {2021-09-25T15:20:07.158Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-10-23T12:19:59.906Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {math9192381},\n source_type = {article},\n private_publication = {false},\n abstract = {Frequency Selective Surfaces (FSSs) have become increasingly popular during the last years due to their combined characteristics, which meet, in general, the requirements of the next-generation wireless communication networks. In this work, a cross-platform design framework for FSS structures is presented and evaluated by utilizing a recently introduced evolutionary optimization algorithm, namely, the Multi-Variant Differential Evolution (MVDE). To the best of the authors knowledge, this is the first time that the MVDE algorithm is applied to a design problem in Electromagnetics. The proposed design framework is described in detail and the utilized evolutionary algorithm is assessed in terms of its performance by applying several benchmark functions. In this context, the MVDE is comparatively evaluated against other popular evolutionary algorithms. Moreover, it is applied to the design and optimization of two different representative examples of FSS structures based on three use cases of unit cell geometry. Optimization results indicate the efficacy of the proposed framework by quantifying the performance of the designed FSS structures in terms of several system metrics. The optimized FSS structures exhibit dual-band operation and quite acceptable results in the ISM frequency bands of 2.45 GHz and 5.8 GHz.},\n bibtype = {article},\n author = {Boursianis, Achilles D and Papadopoulou, Maria S and Nikolaidis, Spyridon and Sarigiannidis, Panagiotis and Psannis, Konstantinos and Georgiadis, Apostolos and Tentzeris, Manos M and Goudos, Sotirios K},\n doi = {10.3390/math9192381},\n journal = {Mathematics},\n number = {19}\n}
\n
\n\n\n
\n Frequency Selective Surfaces (FSSs) have become increasingly popular during the last years due to their combined characteristics, which meet, in general, the requirements of the next-generation wireless communication networks. In this work, a cross-platform design framework for FSS structures is presented and evaluated by utilizing a recently introduced evolutionary optimization algorithm, namely, the Multi-Variant Differential Evolution (MVDE). To the best of the authors knowledge, this is the first time that the MVDE algorithm is applied to a design problem in Electromagnetics. The proposed design framework is described in detail and the utilized evolutionary algorithm is assessed in terms of its performance by applying several benchmark functions. In this context, the MVDE is comparatively evaluated against other popular evolutionary algorithms. Moreover, it is applied to the design and optimization of two different representative examples of FSS structures based on three use cases of unit cell geometry. Optimization results indicate the efficacy of the proposed framework by quantifying the performance of the designed FSS structures in terms of several system metrics. The optimized FSS structures exhibit dual-band operation and quite acceptable results in the ISM frequency bands of 2.45 GHz and 5.8 GHz.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n State-of-the-Art Techniques in RF Energy Harvesting Circuits.\n \n \n \n \n\n\n \n Bougas, I., D.; Papadopoulou, M., S.; Boursianis, A., D.; Kokkinidis, K.; and Goudos, S., K.\n\n\n \n\n\n\n Telecom, 2(4): 369-389. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"State-of-the-ArtWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {State-of-the-Art Techniques in RF Energy Harvesting Circuits},\n type = {article},\n year = {2021},\n pages = {369-389},\n volume = {2},\n websites = {https://www.mdpi.com/2673-4001/2/4/22},\n id = {9f74cc3d-d68b-3024-b64e-ae15797f56ec},\n created = {2021-10-23T12:20:32.698Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-10-23T12:20:32.698Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {telecom2040022},\n source_type = {article},\n private_publication = {false},\n abstract = {The exigency for continuous use of electrical devices has created greater demands for electricity along with more efficient transmission techniques. Energy from natural resources can be solar, thermal, vibration, friction, or Radio Frequencies (RF) signals. This state-of-the-art work provides a summary of RF energy harvesting techniques and can be used as a guide for the manufacture of RF energy scavenging modules. The use of Radio Frequency (RF) Energy Harvesting (EH) technique contributes to the development of autonomous energy devices and sensors. A rectenna system includes three main units: the receiving antenna, the impedance matching network, and the rectifier. We thoroughly analyze how to design a rectenna system with special emphasis given on the design of the rectifier. At the same time many works of the last 10 years are presented. This review article categorizes the used topologies depending on the type of antennas, IMNs, and rectifiers and comparatively presents their advantages and disadvantages.},\n bibtype = {article},\n author = {Bougas, Ioannis D and Papadopoulou, Maria S and Boursianis, Achilles D and Kokkinidis, Konstantinos and Goudos, Sotirios K},\n doi = {10.3390/telecom2040022},\n journal = {Telecom},\n number = {4}\n}
\n
\n\n\n
\n The exigency for continuous use of electrical devices has created greater demands for electricity along with more efficient transmission techniques. Energy from natural resources can be solar, thermal, vibration, friction, or Radio Frequencies (RF) signals. This state-of-the-art work provides a summary of RF energy harvesting techniques and can be used as a guide for the manufacture of RF energy scavenging modules. The use of Radio Frequency (RF) Energy Harvesting (EH) technique contributes to the development of autonomous energy devices and sensors. A rectenna system includes three main units: the receiving antenna, the impedance matching network, and the rectifier. We thoroughly analyze how to design a rectenna system with special emphasis given on the design of the rectifier. At the same time many works of the last 10 years are presented. This review article categorizes the used topologies depending on the type of antennas, IMNs, and rectifiers and comparatively presents their advantages and disadvantages.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Machine Learning in Beyond 5G/6G Networks—State-of-the-Art and Future Trends.\n \n \n \n \n\n\n \n Rekkas, V., P.; Sotiroudis, S.; Sarigiannidis, P.; Wan, S.; Karagiannidis, G., K.; and Goudos, S., K.\n\n\n \n\n\n\n Electronics, 10(22). 2021.\n \n\n\n\n
\n\n\n\n \n \n \"MachineWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Machine Learning in Beyond 5G/6G Networks—State-of-the-Art and Future Trends},\n type = {article},\n year = {2021},\n volume = {10},\n websites = {https://www.mdpi.com/2079-9292/10/22/2786},\n id = {b28122ad-c8e8-3691-a272-92ca4c2e6ed2},\n created = {2021-11-14T16:10:44.752Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2021-11-14T16:10:44.752Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {electronics10222786},\n source_type = {article},\n private_publication = {false},\n abstract = {Artificial Intelligence (AI) and especially Machine Learning (ML) can play a very important role in realizing and optimizing 6G network applications. In this paper, we present a brief summary of ML methods, as well as an up-to-date review of ML approaches in 6G wireless communication systems. These methods include supervised, unsupervised and reinforcement techniques. Additionally, we discuss open issues in the field of ML for 6G networks and wireless communications in general, as well as some potential future trends to motivate further research into this area.},\n bibtype = {article},\n author = {Rekkas, Vasileios P and Sotiroudis, Sotirios and Sarigiannidis, Panagiotis and Wan, Shaohua and Karagiannidis, George K and Goudos, Sotirios K},\n doi = {10.3390/electronics10222786},\n journal = {Electronics},\n number = {22}\n}
\n
\n\n\n
\n Artificial Intelligence (AI) and especially Machine Learning (ML) can play a very important role in realizing and optimizing 6G network applications. In this paper, we present a brief summary of ML methods, as well as an up-to-date review of ML approaches in 6G wireless communication systems. These methods include supervised, unsupervised and reinforcement techniques. Additionally, we discuss open issues in the field of ML for 6G networks and wireless communications in general, as well as some potential future trends to motivate further research into this area.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Large Scale Global Optimization Algorithms for IoT Networks: A Comparative Study.\n \n \n \n\n\n \n Goudos, S., K.; Boursianis, A., D.; Mohamed, A., W.; Wan, S.; Sarigiannidis, P.; Karagiannidis, G., K.; and Suganthan, P., N.\n\n\n \n\n\n\n In 2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), pages 272-279, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Large Scale Global Optimization Algorithms for IoT Networks: A Comparative Study},\n type = {inproceedings},\n year = {2021},\n pages = {272-279},\n id = {1737f950-6aeb-3a06-9f3a-b0f79e82e06b},\n created = {2021-11-19T18:01:12.685Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.247Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9600023},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The advent of Internet of Things (IoT) has bring a new era in communication technology by expanding the current inter-networking services and enabling the machine-to-machine communication. IoT massive deployments will create the problem of optimal power allocation. The objective of the optimization problem is to obtain a feasible solution that minimizes the total power consumption of the WSN, when the error probability at the fusion center meets certain criteria. This work studies the optimization of a wireless sensor network (WNS) at higher dimensions by focusing to the power allocation of decentralized detection. More specifically, we apply and compare four algorithms designed to tackle Large scale global optimization (LSGO) problems. These are the memetic linear population size reduction and semi-parameter adaptation (MLSHADE-SPA), the contribution-based cooperative coevolution recursive differential grouping (CBCC-RDG3), the differential grouping with spectral clustering-differential evolution cooperative coevolution (DGSC-DECC), and the enhanced adaptive differential evolution (EADE). To the best of the authors knowledge, this is the first time that LSGO algorithms are applied to the optimal power allocation problem in IoT networks. We evaluate the algorithms performance in several different cases by applying them in cases with 300, 600 and 800 dimensions.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K and Boursianis, Achilles D and Mohamed, Ali Wagdy and Wan, Shaohua and Sarigiannidis, Panagiotis and Karagiannidis, George K and Suganthan, Ponnuthurai N},\n doi = {10.1109/DCOSS52077.2021.00052},\n booktitle = {2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS)}\n}
\n
\n\n\n
\n The advent of Internet of Things (IoT) has bring a new era in communication technology by expanding the current inter-networking services and enabling the machine-to-machine communication. IoT massive deployments will create the problem of optimal power allocation. The objective of the optimization problem is to obtain a feasible solution that minimizes the total power consumption of the WSN, when the error probability at the fusion center meets certain criteria. This work studies the optimization of a wireless sensor network (WNS) at higher dimensions by focusing to the power allocation of decentralized detection. More specifically, we apply and compare four algorithms designed to tackle Large scale global optimization (LSGO) problems. These are the memetic linear population size reduction and semi-parameter adaptation (MLSHADE-SPA), the contribution-based cooperative coevolution recursive differential grouping (CBCC-RDG3), the differential grouping with spectral clustering-differential evolution cooperative coevolution (DGSC-DECC), and the enhanced adaptive differential evolution (EADE). To the best of the authors knowledge, this is the first time that LSGO algorithms are applied to the optimal power allocation problem in IoT networks. We evaluate the algorithms performance in several different cases by applying them in cases with 300, 600 and 800 dimensions.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Online EM Teaching: E-XAM tool for Students' Self-Evaluation and Final Assessment.\n \n \n \n\n\n \n Polo, A.; Anselmi, N.; Azaro, R.; Gottardi, G.; Hannan, M., A.; Oliveri, G.; Poli, L.; Rocca, P.; Salucci, M.; Ahmadi, H.; Huang, J.; Li, P.; Li, M.; Goudos, S., K.; Yang, S.; and Massa, A.\n\n\n \n\n\n\n In 2021 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (APS/URSI), pages 1477-1478, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Online EM Teaching: E-XAM tool for Students' Self-Evaluation and Final Assessment},\n type = {inproceedings},\n year = {2021},\n pages = {1477-1478},\n id = {5de38ce9-a2c4-3329-8943-4c495099afca},\n created = {2022-02-17T06:58:20.570Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:39:01.809Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9704286},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This work presents a novel tool for supporting and simplifying electromagnetic (EM) teaching activities related to students' self-evaluation and final examination. The proposed approach has been experimentally validated within the Bachelor course “Electromagnetic Fields” and was recently applied to all courses provided by the ELEDIA Research Center teaching staff.},\n bibtype = {inproceedings},\n author = {Polo, Alessandro and Anselmi, Nicola and Azaro, Renzo and Gottardi, Giorgio and Hannan, Mohammad Abdul and Oliveri, Giacomo and Poli, Lorenzo and Rocca, Paolo and Salucci, Marco and Ahmadi, Hanen and Huang, Jin and Li, Peng and Li, Maokun and Goudos, Sotirios K and Yang, Shiwen and Massa, Andrea},\n doi = {10.1109/APS/URSI47566.2021.9704286},\n booktitle = {2021 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (APS/URSI)}\n}
\n
\n\n\n
\n This work presents a novel tool for supporting and simplifying electromagnetic (EM) teaching activities related to students' self-evaluation and final examination. The proposed approach has been experimentally validated within the Bachelor course “Electromagnetic Fields” and was recently applied to all courses provided by the ELEDIA Research Center teaching staff.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Implantable Antenna Design Using Improved Grey Wolf Optimizer Algorithm.\n \n \n \n\n\n \n Boursianis, A., D.; Goudos, S., K.; Matthaiou, M.; Koulouridis, S.; and Salucci, M.\n\n\n \n\n\n\n In 2021 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (APS/URSI), pages 801-802, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Implantable Antenna Design Using Improved Grey Wolf Optimizer Algorithm},\n type = {inproceedings},\n year = {2021},\n pages = {801-802},\n id = {aad0e845-0ea4-3fb5-aa22-edaad02b896b},\n created = {2022-02-17T06:58:20.670Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T17:35:55.015Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9704184},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Medical implanted sensors coupled with antennas are sought in order to wirelessly transmit crucial health info and operate in a complex environment. Such antennas need to operate in a lossy environment, be robust when embedded in various body types, do not interact with the device electronics, and have very small physical sizes. To satisfy conflicting requirements multiple geometrical parameters should be tuned. While physical insight is always needed, optimization is the key factor for a successful design. Towards this goal, unconventional design techniques like evolutionary algorithms can be used. In this paper, we apply the improved grey wolf optimizer (IGWO) for implantable antenna design.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Goudos, Sotirios K and Matthaiou, Maria and Koulouridis, Stavros and Salucci, Marco},\n doi = {10.1109/APS/URSI47566.2021.9704184},\n booktitle = {2021 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (APS/URSI)}\n}
\n
\n\n\n
\n Medical implanted sensors coupled with antennas are sought in order to wirelessly transmit crucial health info and operate in a complex environment. Such antennas need to operate in a lossy environment, be robust when embedded in various body types, do not interact with the device electronics, and have very small physical sizes. To satisfy conflicting requirements multiple geometrical parameters should be tuned. While physical insight is always needed, optimization is the key factor for a successful design. Towards this goal, unconventional design techniques like evolutionary algorithms can be used. In this paper, we apply the improved grey wolf optimizer (IGWO) for implantable antenna design.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Communication and Security Issues in Online Learning during the COVID-19 Pandemic.\n \n \n \n\n\n \n Metallidou, C.; Psannis, K., E.; Goudos, S.; Sarigiannidis, P.; and Ishibashi, Y.\n\n\n \n\n\n\n In 2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN), pages 538-544, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Communication and Security Issues in Online Learning during the COVID-19 Pandemic},\n type = {inproceedings},\n year = {2021},\n keywords = {Learning systems;COVID-19;Privacy;Pandemics;Confer},\n pages = {538-544},\n id = {d34010ca-7ae6-3a33-8a86-bdd3f8f974c1},\n created = {2022-04-04T06:02:05.706Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-04-04T06:02:05.706Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9673972},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This era is characterized by the rapid evolution of technology and its application in all sectors of day to day life. At the same time, the outbreak of the COVID-19 pandemic has highlighted the distance education as vital, compulsory and worldwide, for Educational Institutions. The attainments of technology are set at the service of education and the problem of security and privacy in online learning is emerged. This paper focuses on the development of a secure online learning system, which utilizes edge computing and privacy mechanisms, such as trust evaluation from direct and indirect observations. The proposed system provides to the Educational Institutions the advantage of conducting online courses, by ensuring privacy in communication for students, professors and the organization.},\n bibtype = {inproceedings},\n author = {Metallidou, Chrysi and Psannis, Kostas E and Goudos, Sotirios and Sarigiannidis, Panagiotis and Ishibashi, Yutaka},\n doi = {10.1109/ICICN52636.2021.9673972},\n booktitle = {2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)}\n}
\n
\n\n\n
\n This era is characterized by the rapid evolution of technology and its application in all sectors of day to day life. At the same time, the outbreak of the COVID-19 pandemic has highlighted the distance education as vital, compulsory and worldwide, for Educational Institutions. The attainments of technology are set at the service of education and the problem of security and privacy in online learning is emerged. This paper focuses on the development of a secure online learning system, which utilizes edge computing and privacy mechanisms, such as trust evaluation from direct and indirect observations. The proposed system provides to the Educational Institutions the advantage of conducting online courses, by ensuring privacy in communication for students, professors and the organization.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Diverse Implementations of the Lorenz System for Teaching Non-Linear Chaotic Circuits.\n \n \n \n\n\n \n Papadopoulou, M., S.; Rusyn, V.; Boursianis, A., D.; Sarigiannidis, P.; Psannis, K.; and Goudos, S., K.\n\n\n \n\n\n\n In 2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN), pages 416-420, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Diverse Implementations of the Lorenz System for Teaching Non-Linear Chaotic Circuits},\n type = {inproceedings},\n year = {2021},\n keywords = {Visualization;Chaotic communication;Simulation;Edu},\n pages = {416-420},\n id = {60d003ef-4033-346f-b521-3b8d4960f2f0},\n created = {2022-04-04T06:02:05.803Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-04-04T06:02:05.803Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9674018},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {It is common knowledge that nature exhibits nonlinear behavior, generally. As a result, non-linear phenomena play a vital role in the control systems in terms of engineering. That is the main reason for considering teaching nonlinear circuits in science and engineering undergraduate programs. In this paper, we present a well-known system that exhibits chaotic behavior. We quote the state equations and mathematical analysis of the Lorenz system. Afterward, we demonstrate simulation results to study and analyze the dynamic behavior of the overall system. The examples indicate a variety of ways in which chaotic behavior can arise in electronic circuits. Finally, we introduce an Arduino-based implementation of the Lorenz system. The comparison between the simulation and experimental results indicates the chaotic dynamics of the system.},\n bibtype = {inproceedings},\n author = {Papadopoulou, Maria S and Rusyn, Volodymyr and Boursianis, Achilles D and Sarigiannidis, Panagiotis and Psannis, Konstantinos and Goudos, Sotirios K},\n doi = {10.1109/ICICN52636.2021.9674018},\n booktitle = {2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)}\n}
\n
\n\n\n
\n It is common knowledge that nature exhibits nonlinear behavior, generally. As a result, non-linear phenomena play a vital role in the control systems in terms of engineering. That is the main reason for considering teaching nonlinear circuits in science and engineering undergraduate programs. In this paper, we present a well-known system that exhibits chaotic behavior. We quote the state equations and mathematical analysis of the Lorenz system. Afterward, we demonstrate simulation results to study and analyze the dynamic behavior of the overall system. The examples indicate a variety of ways in which chaotic behavior can arise in electronic circuits. Finally, we introduce an Arduino-based implementation of the Lorenz system. The comparison between the simulation and experimental results indicates the chaotic dynamics of the system.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Efficient Integration of XR with Haptic Feedback and 5G Networks.\n \n \n \n\n\n \n Minopoulos, G.; Psannis, K., E.; Goudos, S.; Nikolaidis, S.; Kokkonis, G.; and Ishibashi, Y.\n\n\n \n\n\n\n In 2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN), pages 240-244, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Efficient Integration of XR with Haptic Feedback and 5G Networks},\n type = {inproceedings},\n year = {2021},\n keywords = {Cellular networks;Wireless communication;5G mobile},\n pages = {240-244},\n id = {7af86c49-a991-3d34-9ef0-3c3a897e6139},\n created = {2022-04-04T06:02:05.870Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-04-04T06:02:05.870Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9674010},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The speedy development of immersive technologies and unexpected situations like the COVID-19 pandemic are expected to boost the application of extended reality (XR) in tourism. Virtualization techniques can create a virtual environment identical to the real one, giving to the user the feeling of actually being there. The aim of haptic systems is to enhance the degree of immersion into a virtual environment by intensifying the skill of physical interaction with people and objects in the distant space. The advancement of cellular networks enables haptic data transmission over high data rate and low latency wireless communication to create ambient haptic experience. The contribution of this research is to describe how XR and haptics are able to reshape tourism industry and present insights for tourism involved parties.},\n bibtype = {inproceedings},\n author = {Minopoulos, Georgios and Psannis, Konstantinos E and Goudos, Sotirios and Nikolaidis, Spiridon and Kokkonis, Georgios and Ishibashi, Yutaka},\n doi = {10.1109/ICICN52636.2021.9674010},\n booktitle = {2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)}\n}
\n
\n\n\n
\n The speedy development of immersive technologies and unexpected situations like the COVID-19 pandemic are expected to boost the application of extended reality (XR) in tourism. Virtualization techniques can create a virtual environment identical to the real one, giving to the user the feeling of actually being there. The aim of haptic systems is to enhance the degree of immersion into a virtual environment by intensifying the skill of physical interaction with people and objects in the distant space. The advancement of cellular networks enables haptic data transmission over high data rate and low latency wireless communication to create ambient haptic experience. The contribution of this research is to describe how XR and haptics are able to reshape tourism industry and present insights for tourism involved parties.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (30)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Faster R-CNN for multi-class fruit detection using a robotic vision system.\n \n \n \n\n\n \n Wan, S.; and Goudos, S.\n\n\n \n\n\n\n Computer Networks, 168. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Faster R-CNN for multi-class fruit detection using a robotic vision system},\n type = {article},\n year = {2020},\n keywords = {Deep learning,Faster R-CNN,Image region selection,Multi-class fruit detection},\n volume = {168},\n id = {463b1407-edd0-33e4-835b-5338e4bb3a80},\n created = {2020-02-29T16:57:41.948Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.910Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Wan2020},\n private_publication = {false},\n abstract = {An accurate and real-time image based multi-class fruit detection system is important for facilitating higher level smart farm tasks such as yield mapping and robotic harvesting. Robotic harvesting can reduce the costs of labour and increase fruit quality. This paper proposes a deep learning framework for multi-class fruits detection based on improved Faster R-CNN. The proposed framework includes fruits image library creation, data argumentation, improved Faster RCNN model generation, and performance evaluation. This work is a pioneer to create a multi-labeled and knowledge-based outdoor orchard image library using 4000 images in the real world. Also, improvement of the convolutional and pooling layers is achieved to have a more accurate and faster detection. The test results show the proposed algorithm has achieved higher detecting accuracy and lower processing time than the traditional detectors, which has excellent potential to build an autonomous and real-time harvesting or yield mapping/estimation system.},\n bibtype = {article},\n author = {Wan, Shaohua and Goudos, Sotirios},\n doi = {10.1016/j.comnet.2019.107036},\n journal = {Computer Networks}\n}
\n
\n\n\n
\n An accurate and real-time image based multi-class fruit detection system is important for facilitating higher level smart farm tasks such as yield mapping and robotic harvesting. Robotic harvesting can reduce the costs of labour and increase fruit quality. This paper proposes a deep learning framework for multi-class fruits detection based on improved Faster R-CNN. The proposed framework includes fruits image library creation, data argumentation, improved Faster RCNN model generation, and performance evaluation. This work is a pioneer to create a multi-labeled and knowledge-based outdoor orchard image library using 4000 images in the real world. Also, improvement of the convolutional and pooling layers is achieved to have a more accurate and faster detection. The test results show the proposed algorithm has achieved higher detecting accuracy and lower processing time than the traditional detectors, which has excellent potential to build an autonomous and real-time harvesting or yield mapping/estimation system.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cognitive Radio Engine Design for IoT Using Monarch Butterfly Optimization and Fuzzy Decision Making.\n \n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Internet of Things, pages 81-100. Matin, M., A., editor(s). Springer International Publishing, 2020.\n \n\n\n\n
\n\n\n\n \n \n \"InternetWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2020},\n keywords = {Cognitive radio (CR),Evolutionary algorithms,Monarch butterfly optimization (MBO),Optimization methods},\n pages = {81-100},\n websites = {https://doi.org/10.1007/978-3-030-42573-9_7},\n publisher = {Springer International Publishing},\n city = {Cham},\n id = {bd7017ed-30ca-3b71-8775-cd52a8f5851b},\n created = {2020-04-28T21:53:35.012Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.659Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2020b},\n source_type = {Inbook},\n private_publication = {false},\n abstract = {The Internet of Things (IoT) paradigm expands the current Internet and enables communication through machine to machine (M2M), while posing new challenges. Cognitive Radio (CR) Systems have received much attention over the last decade, because of their ability to flexibly adapt their transmission parameters to their changing environment. Current technology trends are shifting to the adaptability of Cognitive Radio Networks (CRNs) into IoT. The determination of the appropriate transmission parameters for a given wireless channel environment is the main feature of a cognitive radio engine. For wireless multicarrier transceivers, the problem becomes high dimensional due to the large number of decision variables required. Evolutionary Algorithms (EAs) are suitable techniques to solve the above-mentioned problem. In this chapter, we propose a new approach for designing a CR engine for wireless multicarrier transceivers using monarch butterfly optimization (MBO). Moreover, we also apply a modified MBO version that includes a Greedy strategy and a self-adaptive Crossover operator, called Greedy Crossover MBO (GCMBO). Additionally, the CR engine also uses a fuzzy decision maker for obtaining the best compromised solution. The simulation results show that the GCMBO driven CR engine can obtain better results than the original MBO and outperform other popular algorithms. Moreover, GCMBO is more efficient when applied to high-dimensional problems in cases of multicarrier system.},\n bibtype = {inbook},\n author = {Goudos, Sotirios K},\n editor = {Matin, Mohammad Abdul},\n doi = {10.1007/978-3-030-42573-9_7},\n chapter = {Cognitive Radio Engine Design for IoT Using Monarch Butterfly Optimization and Fuzzy Decision Making},\n title = {Internet of Things}\n}
\n
\n\n\n
\n The Internet of Things (IoT) paradigm expands the current Internet and enables communication through machine to machine (M2M), while posing new challenges. Cognitive Radio (CR) Systems have received much attention over the last decade, because of their ability to flexibly adapt their transmission parameters to their changing environment. Current technology trends are shifting to the adaptability of Cognitive Radio Networks (CRNs) into IoT. The determination of the appropriate transmission parameters for a given wireless channel environment is the main feature of a cognitive radio engine. For wireless multicarrier transceivers, the problem becomes high dimensional due to the large number of decision variables required. Evolutionary Algorithms (EAs) are suitable techniques to solve the above-mentioned problem. In this chapter, we propose a new approach for designing a CR engine for wireless multicarrier transceivers using monarch butterfly optimization (MBO). Moreover, we also apply a modified MBO version that includes a Greedy strategy and a self-adaptive Crossover operator, called Greedy Crossover MBO (GCMBO). Additionally, the CR engine also uses a fuzzy decision maker for obtaining the best compromised solution. The simulation results show that the GCMBO driven CR engine can obtain better results than the original MBO and outperform other popular algorithms. Moreover, GCMBO is more efficient when applied to high-dimensional problems in cases of multicarrier system.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Teaching Electromagnetics to Next-Generation Engineers - The ELEDIA Recipe- The ELEDIA teaching style.\n \n \n \n\n\n \n Massa, A.; Anselmi, N.; Dallasta, L.; Gottardi, G.; Goudos, S., K.; Hannan, M., A.; Huang, J.; Li, M.; Oliveri, G.; Poli, L.; Polo, A.; Rocca, P.; Salas-Sanchez, A., A.; Salucci, M.; and Yang, S.\n\n\n \n\n\n\n IEEE Antennas and Propagation Magazine, 62(2): 50-61. 4 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Teaching Electromagnetics to Next-Generation Engineers - The ELEDIA Recipe- The ELEDIA teaching style},\n type = {article},\n year = {2020},\n keywords = {Antenn,Education,Mathematical model,Solid modeling},\n pages = {50-61},\n volume = {62},\n month = {4},\n id = {5448a0b6-6566-3a6d-bdc9-d134d5031286},\n created = {2020-05-07T07:01:20.068Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.124Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Massa2020},\n source_type = {ARTICLE},\n private_publication = {false},\n abstract = {Innovative teaching methods that address paramount challenges in modern electromagnetic (EM) engineering education are presented. An entire ecosystem of novel and interconnected strategies and tools has been developed by the ELEDIA Research Center to build a long-term educational and training framework for future EM professionals. According to an ELEDIA 'recipe,' students acquire higher self-confidence and admiration for the innovative applicative and technological aspects of Maxwell's equations in everyday life. Moreover, they gradually grow engineering thought mechanisms/attitudes and high-level (HL) professional skills thanks to novel examination (exam) approaches and extracurricular experiences that bridge the gap between academics and industry. Quantitative metrics are reported to highlight the success of the proposed strategies, taking the students' feedback into account as well.},\n bibtype = {article},\n author = {Massa, Andrea and Anselmi, Nicola and Dallasta, Luca and Gottardi, Giorgio and Goudos, Sotirios K and Hannan, Mohammad Abdul and Huang, Jin and Li, Maokun and Oliveri, Giacomo and Poli, Lorenzo and Polo, Alessandro and Rocca, Paolo and Salas-Sanchez, Aaron A and Salucci, Marco and Yang, Shiwen},\n doi = {10.1109/MAP.2020.2970307},\n journal = {IEEE Antennas and Propagation Magazine},\n number = {2}\n}
\n
\n\n\n
\n Innovative teaching methods that address paramount challenges in modern electromagnetic (EM) engineering education are presented. An entire ecosystem of novel and interconnected strategies and tools has been developed by the ELEDIA Research Center to build a long-term educational and training framework for future EM professionals. According to an ELEDIA 'recipe,' students acquire higher self-confidence and admiration for the innovative applicative and technological aspects of Maxwell's equations in everyday life. Moreover, they gradually grow engineering thought mechanisms/attitudes and high-level (HL) professional skills thanks to novel examination (exam) approaches and extracurricular experiences that bridge the gap between academics and industry. Quantitative metrics are reported to highlight the success of the proposed strategies, taking the students' feedback into account as well.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Deep learning for radio propagation: Using image-driven regression to estimate path loss in urban areas.\n \n \n \n \n\n\n \n Sotiroudis, S., P.; Goudos, S., K.; and Siakavara, K.\n\n\n \n\n\n\n ICT Express, 6(3): 160-165. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"DeepWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Deep learning for radio propagation: Using image-driven regression to estimate path loss in urban areas},\n type = {article},\n year = {2020},\n keywords = {Artificial intelligence,Deep learning,Image-driven regression,Path loss prediction,Radio propagation},\n pages = {160-165},\n volume = {6},\n websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85084997260&doi=10.1016%2Fj.icte.2020.04.008&partnerID=40&md5=dbf1450e20b6a4f5ebf544586e8c1dfa},\n id = {699f7e9c-18af-3386-b156-0443c32f5b0d},\n created = {2020-08-31T20:28:48.320Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.068Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Sotiroudis2020a},\n source_type = {ARTICLE},\n private_publication = {false},\n abstract = {Radio propagation modeling and path loss prediction have been the subject of many machine learning-based estimation attempts. Our current work uses deep learning for the task in question, trying to exploit the potential of applying convolutional neural networks in order to perform predictions based on images. A comparison between data-driven and image-driven estimations has been carried out in order to assess the proposed method. The results show that an appropriately chosen image can, per se, be treated as an alternative to a vector of tabular data and produce reliable predictions. The effect of the image's size has also been examined.},\n bibtype = {article},\n author = {Sotiroudis, Sotirios P and Goudos, Sotirios K and Siakavara, Katherine},\n doi = {10.1016/j.icte.2020.04.008},\n journal = {ICT Express},\n number = {3}\n}
\n
\n\n\n
\n Radio propagation modeling and path loss prediction have been the subject of many machine learning-based estimation attempts. Our current work uses deep learning for the task in question, trying to exploit the potential of applying convolutional neural networks in order to perform predictions based on images. A comparison between data-driven and image-driven estimations has been carried out in order to assess the proposed method. The results show that an appropriately chosen image can, per se, be treated as an alternative to a vector of tabular data and produce reliable predictions. The effect of the image's size has also been examined.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Wearable 5-Gigahertz Wi-Fi Antenna Design Using Whale Optimization Algorithm.\n \n \n \n \n\n\n \n Boursianis, A., D.; Koulouridis, S.; Georgoulas, D.; and Goudos, S., K.\n\n\n \n\n\n\n In 14th European Conference on Antennas and Propagation, EuCAP 2020, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"WearableWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Wearable 5-Gigahertz Wi-Fi Antenna Design Using Whale Optimization Algorithm},\n type = {inproceedings},\n year = {2020},\n keywords = {nature-inspired algorithms,printed inverted-F antenna,wearable antennas,whale optimization algorithm},\n websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85088652910&doi=10.23919%2FEuCAP48036.2020.9135735&partnerID=40&md5=0e00f909e78d1feb587eb5253f41089f},\n id = {5568cb7c-b645-3d8d-870e-801f76f1bd87},\n created = {2020-08-31T20:28:48.321Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.081Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Boursianis2020d},\n source_type = {CONFERENCE},\n private_publication = {false},\n abstract = {In this paper, we design an antenna for wearable wireless applications. The proposed antenna is a planar inverted- F antenna (PIFA) for operation at 5 GHz. The antenna design procedure is accomplished using a new nature inspired algorithm, the Whale optimization Algorithm. Numerical results exhibit the applicability and validity of the proposed design framework.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Koulouridis, Stavros and Georgoulas, Dimitrios and Goudos, Sotirios K},\n doi = {10.23919/EuCAP48036.2020.9135735},\n booktitle = {14th European Conference on Antennas and Propagation, EuCAP 2020}\n}
\n
\n\n\n
\n In this paper, we design an antenna for wearable wireless applications. The proposed antenna is a planar inverted- F antenna (PIFA) for operation at 5 GHz. The antenna design procedure is accomplished using a new nature inspired algorithm, the Whale optimization Algorithm. Numerical results exhibit the applicability and validity of the proposed design framework.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modelling Ray Tracing Propagation Data Using Different Machine Learning Algorithms.\n \n \n \n \n\n\n \n Goudos, S., K.; Athanasiadou, G.; Tsoulos, G., V.; and Rekkas, V.\n\n\n \n\n\n\n In 14th European Conference on Antennas and Propagation, EuCAP 2020, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"ModellingWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Modelling Ray Tracing Propagation Data Using Different Machine Learning Algorithms},\n type = {inproceedings},\n year = {2020},\n keywords = {Random Forest,Ray tracing,Support Vector Regression,k-Nearest Neighbors,mobile communications},\n websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85088630520&doi=10.23919%2FEuCAP48036.2020.9135639&partnerID=40&md5=448e25203d908932d9803ee5bea5bb94},\n id = {14451e24-75d9-3db2-a504-a0b3cc6ba392},\n created = {2020-08-31T20:28:48.387Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.903Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2020a},\n source_type = {CONFERENCE},\n private_publication = {false},\n abstract = {In this paper, we apply different machine learning methods for the prediction of path loss in urban environment for cellular communications with unmanned aerial vehicles (UAVs). We generate the training set using a ray tracing technique assuming a flying base station at different heights within the city of Tripolis, Greece. We produce prediction models for the path loss using three different learners the k-Nearest Neighbors (kNN), the Support Vector Regression (SVR)and the Random Forest (RF). The obtained numerical results are compared with the original data from the test dataset using representative performance indicators and overall they exhibit good precision.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K and Athanasiadou, Georgia and Tsoulos, George V and Rekkas, Vasileios},\n doi = {10.23919/EuCAP48036.2020.9135639},\n booktitle = {14th European Conference on Antennas and Propagation, EuCAP 2020}\n}
\n
\n\n\n
\n In this paper, we apply different machine learning methods for the prediction of path loss in urban environment for cellular communications with unmanned aerial vehicles (UAVs). We generate the training set using a ray tracing technique assuming a flying base station at different heights within the city of Tripolis, Greece. We produce prediction models for the path loss using three different learners the k-Nearest Neighbors (kNN), the Support Vector Regression (SVR)and the Random Forest (RF). The obtained numerical results are compared with the original data from the test dataset using representative performance indicators and overall they exhibit good precision.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Differential Evolution in Waveform Design for Wireless Power Transfer.\n \n \n \n \n\n\n \n Doanis, P.; Boursianis, A., D.; Huillery, J.; Bréard, A.; Duroc, Y.; and Goudos, S., K.\n\n\n \n\n\n\n Telecom, 1(2): 96-113. 8 2020.\n \n\n\n\n
\n\n\n\n \n \n \"DifferentialWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Differential Evolution in Waveform Design for Wireless Power Transfer},\n type = {article},\n year = {2020},\n keywords = {channel state information,evolutionary algorithms,waveform design,wireless power transfer},\n pages = {96-113},\n volume = {1},\n websites = {http://dx.doi.org/10.3390/telecom1020008},\n month = {8},\n publisher = {MDPI AG},\n id = {629c7fa7-57f3-3838-a160-59f2e87511b2},\n created = {2020-08-31T20:28:48.394Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.246Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Doanis2020a},\n source_type = {article},\n private_publication = {false},\n abstract = {The technique of transmitting multi-tone signals in a radiative Wireless Power Transfer (WPT) system can significantly increase its end-to-end power efficiency. The optimization problem in this system is to tune the transmission according to the receiver rectenna’s nonlinear behavior and the Channel State Information (CSI). This is a non-convex problem that has been previously addressed by Sequential Convex Programming (SCP) algorithms. Nonetheless, SCP algorithms do not always attain globally optimal solutions. To this end, in this paper, we evaluate a set of Evolutionary Algorithms (EAs) with several characteristics. The performance of the optimized multi-tone transmission signals in a WPT system is assessed by means of numerical simulations, utilizing a simplified Single Input Single Output (SISO) model. From the model evaluation, we can deduce that EAs can be successfully applied to the waveform design optimization problem. Moreover, from the presented results, we can derive that EAs can obtain the optimal solutions in the tested cases.},\n bibtype = {article},\n author = {Doanis, Pavlos and Boursianis, Achilles D and Huillery, Julien and Bréard, Arnaud and Duroc, Yvan and Goudos, Sotirios K},\n doi = {10.3390/telecom1020008},\n journal = {Telecom},\n number = {2}\n}
\n
\n\n\n
\n The technique of transmitting multi-tone signals in a radiative Wireless Power Transfer (WPT) system can significantly increase its end-to-end power efficiency. The optimization problem in this system is to tune the transmission according to the receiver rectenna’s nonlinear behavior and the Channel State Information (CSI). This is a non-convex problem that has been previously addressed by Sequential Convex Programming (SCP) algorithms. Nonetheless, SCP algorithms do not always attain globally optimal solutions. To this end, in this paper, we evaluate a set of Evolutionary Algorithms (EAs) with several characteristics. The performance of the optimized multi-tone transmission signals in a WPT system is assessed by means of numerical simulations, utilizing a simplified Single Input Single Output (SISO) model. From the model evaluation, we can deduce that EAs can be successfully applied to the waveform design optimization problem. Moreover, from the presented results, we can derive that EAs can obtain the optimal solutions in the tested cases.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Feature Importances: A Tool to Explain Radio Propagation and Reduce Model Complexity.\n \n \n \n \n\n\n \n Sotiroudis, S., P.; Goudos, S., K.; and Siakavara, K.\n\n\n \n\n\n\n Telecom, 1(2): 114-125. 8 2020.\n \n\n\n\n
\n\n\n\n \n \n \"FeatureWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Feature Importances: A Tool to Explain Radio Propagation and Reduce Model Complexity},\n type = {article},\n year = {2020},\n keywords = {Random Forest,XGBoost,feature importances,feature selection,machine learning,path loss,radio propagation},\n pages = {114-125},\n volume = {1},\n websites = {http://dx.doi.org/10.3390/telecom1020009},\n month = {8},\n publisher = {MDPI AG},\n id = {006b80d1-55bb-390a-ac89-01c1adcdbf72},\n created = {2020-08-31T20:28:48.447Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.280Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Sotiroudis2020},\n source_type = {article},\n private_publication = {false},\n abstract = {Machine learning models have been widely deployed to tackle the problem of radio propagation. In addition to helping in the estimation of path loss, they can also be used to better understand the details of various propagation scenarios. Our current work exploits the inherent ranking of feature importances provided by XGBoost and Random Forest as a means of indicating the contribution of the underlying propagation mechanisms. A comparison between two different transmitter antenna heights, revealing the associated propagation profiles, is made. Feature selection is then implemented, leading to models with reduced complexity, and consequently reduced training and response times, based on the previously calculated importances.},\n bibtype = {article},\n author = {Sotiroudis, Sotirios P and Goudos, Sotirios K and Siakavara, Katherine},\n doi = {10.3390/telecom1020009},\n journal = {Telecom},\n number = {2}\n}
\n
\n\n\n
\n Machine learning models have been widely deployed to tackle the problem of radio propagation. In addition to helping in the estimation of path loss, they can also be used to better understand the details of various propagation scenarios. Our current work exploits the inherent ranking of feature importances provided by XGBoost and Random Forest as a means of indicating the contribution of the underlying propagation mechanisms. A comparison between two different transmitter antenna heights, revealing the associated propagation profiles, is made. Feature selection is then implemented, leading to models with reduced complexity, and consequently reduced training and response times, based on the previously calculated importances.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Application of biogeography-based optimization to antennas and wireless communications.\n \n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Encyclopedia of Information Science and Technology, Fifth Edition, pages 950-966. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"EncyclopediaWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2020},\n pages = {950-966},\n websites = {http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3479-3.ch066},\n id = {161eef54-d120-37eb-a773-16e320c275f7},\n created = {2020-08-31T20:37:33.523Z},\n accessed = {2020-08-31},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.108Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2021a},\n private_publication = {false},\n bibtype = {inbook},\n author = {Goudos, Sotirios K.},\n doi = {10.4018/978-1-7998-3479-3.ch066},\n chapter = {Application of biogeography-based optimization to antennas and wireless communications},\n title = {Encyclopedia of Information Science and Technology, Fifth Edition}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dual-Band Single-Layered Modified E-shaped Patch Antenna for RF Energy Harvesting Systems.\n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n In ECCTD 2020 - 24th IEEE European Conference on Circuit Theory and Design, pages 1-4, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Dual-Band Single-Layered Modified E-shaped Patch Antenna for RF Energy Harvesting Systems},\n type = {inproceedings},\n year = {2020},\n keywords = {E-shaped patch antenna,energy harvesting,optimization method,radio frequency,salp swarm algorithm},\n pages = {1-4},\n id = {7e34edc9-f961-37c9-8833-4951170f9b38},\n created = {2020-10-30T21:19:07.415Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.664Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Boursianis2020a},\n source_type = {INPROCEEDINGS},\n private_publication = {false},\n abstract = {Radio Frequency Energy Harvesting (RF EH) is an alternative, yet well-promising technique to deliver power in electronic circuits of wireless sensor networks that require small amounts of energy. The design of the receiving module (antenna) in RF EH systems is a demanding and, in most cases, a complex task. As a result, an optimization method is often required. In this paper, we apply The Salp Swarm Algorithm to design and optimize a receiving module (dual-band modified E-shaped antenna) for RF EH systems. The proposed antenna operates in the frequency bands of LTE-2600 and 5G NR mobile communication networks. Numerical results exhibit a satisfactory operation of the optimized antenna as a receiving module in an RF EH system.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Papadopoulou, Maria S and Nikolaidis, Spyridon and Goudos, Sotirios K},\n doi = {10.1109/ECCTD49232.2020.9218354},\n booktitle = {ECCTD 2020 - 24th IEEE European Conference on Circuit Theory and Design}\n}
\n
\n\n\n
\n Radio Frequency Energy Harvesting (RF EH) is an alternative, yet well-promising technique to deliver power in electronic circuits of wireless sensor networks that require small amounts of energy. The design of the receiving module (antenna) in RF EH systems is a demanding and, in most cases, a complex task. As a result, an optimization method is often required. In this paper, we apply The Salp Swarm Algorithm to design and optimize a receiving module (dual-band modified E-shaped antenna) for RF EH systems. The proposed antenna operates in the frequency bands of LTE-2600 and 5G NR mobile communication networks. Numerical results exhibit a satisfactory operation of the optimized antenna as a receiving module in an RF EH system.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Waveform Design for Optimal Wireless Power Transfer Using Evolutionary Algorithms.\n \n \n \n\n\n \n Doanis, P.; Boursianis, A., D.; Huillery, J.; Bréard, A.; Duroc, Y.; and Goudos, S., K.\n\n\n \n\n\n\n In 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Waveform Design for Optimal Wireless Power Transfer Using Evolutionary Algorithms},\n type = {inproceedings},\n year = {2020},\n pages = {1-4},\n id = {5b73e836-5c20-3c25-8fd7-c1c4ac7f5185},\n created = {2020-10-30T21:19:07.576Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:17.935Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Doanis2020},\n source_type = {INPROCEEDINGS},\n private_publication = {false},\n abstract = {One of the possible ways to increase the end-to-end power transfer efficiency in a radiative Wireless Power Transfer (WPT) system is by transmitting multi-tone signals optimized according to the receiver rectenna's nonlinear behavior and the Channel State Information (CSI). This optimization problem is a non-convex problem that has been tackled in the past with Sequential Convex Programming (SCP) algorithms. Since SCP algorithms do not guarantee to track the globally optimal solutions, there is interest in applying some other optimization methods to this problem. Here we apply various Evolutionary Algorithms (EAs) with different characteristics. The performance of the designed waveforms is evaluated in Matlab, using a simplified Single Input Single Output (SISO) system model. EAs are successfully applied to waveform design for WPT and seem to track the optimal solutions in the tested cases. Moreover, the effectiveness of the SCP-QCLP method is verified.},\n bibtype = {inproceedings},\n author = {Doanis, P and Boursianis, A D and Huillery, J and Bréard, A and Duroc, Y and Goudos, S K},\n doi = {10.1109/MOCAST49295.2020.9200277},\n booktitle = {2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n One of the possible ways to increase the end-to-end power transfer efficiency in a radiative Wireless Power Transfer (WPT) system is by transmitting multi-tone signals optimized according to the receiver rectenna's nonlinear behavior and the Channel State Information (CSI). This optimization problem is a non-convex problem that has been tackled in the past with Sequential Convex Programming (SCP) algorithms. Since SCP algorithms do not guarantee to track the globally optimal solutions, there is interest in applying some other optimization methods to this problem. Here we apply various Evolutionary Algorithms (EAs) with different characteristics. The performance of the designed waveforms is evaluated in Matlab, using a simplified Single Input Single Output (SISO) system model. EAs are successfully applied to waveform design for WPT and seem to track the optimal solutions in the tested cases. Moreover, the effectiveness of the SCP-QCLP method is verified.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Pareto-Optimal Resource Allocation in Wireless Powered Networks.\n \n \n \n\n\n \n Bouzinis, P., S.; Vranas, C., K.; Papanikolaou, V., K.; Diamantoulakis, P., D.; Goudos, S., K.; and Karagiannidis, G., K.\n\n\n \n\n\n\n In 2020 9th International Conference on Modern Circuits and Systems Technologies, MOCAST 2020, pages 1-4, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Pareto-Optimal Resource Allocation in Wireless Powered Networks},\n type = {inproceedings},\n year = {2020},\n keywords = {Multi-objective optimization (MOO),Non-orthogonal multiple access (NOMA),Pareto front,Wireless powered networks (WPNs)},\n pages = {1-4},\n id = {e47b990d-25d2-31a6-8911-30970fd847de},\n created = {2020-10-30T21:19:07.603Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:12.922Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Bouzinis2020},\n source_type = {INPROCEEDINGS},\n private_publication = {false},\n abstract = {In this paper, the uplink of a wireless-powered network is investigated. More specifically, we focus on simultaneously maximizing the sum-throughput and minimum throughput of the network's users, for the case of non-orthogonal multiple access (NOMA) and time-division multiple access (TDMA), by optimizing the allocated time to energy harvesting and information transmission. Since this problem belongs to the category of multi-objective optimization, we transform it into a singleobjective problem, via the scalarization approach, aiming to obtain the Pareto Front. The proposed methodology facilitates the evaluation of the trade-off between the considered conflicted metrics. Finally, simulation results validate the effectiveness of the proposed methodology and provide useful insights for the network's performance.},\n bibtype = {inproceedings},\n author = {Bouzinis, Pavlos S and Vranas, Christos K and Papanikolaou, Vasilis K and Diamantoulakis, Panagiotis D and Goudos, Sotirios K and Karagiannidis, George K},\n doi = {10.1109/MOCAST49295.2020.9200276},\n booktitle = {2020 9th International Conference on Modern Circuits and Systems Technologies, MOCAST 2020}\n}
\n
\n\n\n
\n In this paper, the uplink of a wireless-powered network is investigated. More specifically, we focus on simultaneously maximizing the sum-throughput and minimum throughput of the network's users, for the case of non-orthogonal multiple access (NOMA) and time-division multiple access (TDMA), by optimizing the allocated time to energy harvesting and information transmission. Since this problem belongs to the category of multi-objective optimization, we transform it into a singleobjective problem, via the scalarization approach, aiming to obtain the Pareto Front. The proposed methodology facilitates the evaluation of the trade-off between the considered conflicted metrics. Finally, simulation results validate the effectiveness of the proposed methodology and provide useful insights for the network's performance.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Triple-band Inverted-F Antenna Using QR-OBL TLBO Algorithm for RF Energy Harvesting Applications.\n \n \n \n\n\n \n Karampatea, A.; Boursianis, A., D.; Goudos, S., K.; and Siakavara, K.\n\n\n \n\n\n\n In 2020 9th International Conference on Modern Circuits and Systems Technologies, MOCAST 2020, pages 1-4, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Triple-band Inverted-F Antenna Using QR-OBL TLBO Algorithm for RF Energy Harvesting Applications},\n type = {inproceedings},\n year = {2020},\n keywords = {Inverted-F antenna,Quasi-Reflected Opposition Based Learning,RF energy harvesting,Teaching Learning Optimization Algorithm,optimization method.},\n pages = {1-4},\n id = {ca4d3aad-023b-3a27-b00f-fcda503a2644},\n created = {2020-10-30T21:19:07.669Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.074Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Karampatea2020},\n source_type = {INPROCEEDINGS},\n private_publication = {false},\n abstract = {Radio Frequency Energy Harvesting (RF EH) is one of the popular emerging techniques in wireless sensor networks that can sufficiently supply low power electronic circuits. With the evolution of Internet of Things (IoT) technology, which exhibits an exponentially positive growth rate over the last years, RF EH can play a primary role in the next-generation wireless networks. In this paper, we apply an optimization technique by utilizing the Quasi-Reflected (QR) variant of opposition Based Learning (OBL) technique in Teaching Learning Based optimization (TLBO) algorithm to design a triple-band Inverted-F antenna (IFA) for RF energy harvesting applications. The proposed antenna is operating in the cellular communication frequency bands of EGSM-900 and GSM-1800, as well as at the Long Term Evolution (LTE) telecommunication networks frequency band of LTE-2600. Simulation results demonstrate that the designed antenna has features of operation which make it suitable for RF EH applications.},\n bibtype = {inproceedings},\n author = {Karampatea, Apostolia and Boursianis, Achilles D and Goudos, Sotirios K and Siakavara, Katherine},\n doi = {10.1109/MOCAST49295.2020.9200251},\n booktitle = {2020 9th International Conference on Modern Circuits and Systems Technologies, MOCAST 2020}\n}
\n
\n\n\n
\n Radio Frequency Energy Harvesting (RF EH) is one of the popular emerging techniques in wireless sensor networks that can sufficiently supply low power electronic circuits. With the evolution of Internet of Things (IoT) technology, which exhibits an exponentially positive growth rate over the last years, RF EH can play a primary role in the next-generation wireless networks. In this paper, we apply an optimization technique by utilizing the Quasi-Reflected (QR) variant of opposition Based Learning (OBL) technique in Teaching Learning Based optimization (TLBO) algorithm to design a triple-band Inverted-F antenna (IFA) for RF energy harvesting applications. The proposed antenna is operating in the cellular communication frequency bands of EGSM-900 and GSM-1800, as well as at the Long Term Evolution (LTE) telecommunication networks frequency band of LTE-2600. Simulation results demonstrate that the designed antenna has features of operation which make it suitable for RF EH applications.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Machine Learning Model Comparison for Leak Detection in Noisy Industrial Pipelines.\n \n \n \n\n\n \n Kampelopoulos, D.; Papastavrou, G., N.; Kousiopoulos, G., P.; Karagiorgos, N.; Goudos, S., K.; and Nikolaidis, S.\n\n\n \n\n\n\n In 2020 9th International Conference on Modern Circuits and Systems Technologies, MOCAST 2020, pages 1-4, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Machine Learning Model Comparison for Leak Detection in Noisy Industrial Pipelines},\n type = {inproceedings},\n year = {2020},\n keywords = {Data-acquisition,Feature extraction,Leak detection,Machine learning,Model accuracy,Model analysis,Noisy environments},\n pages = {1-4},\n id = {c89eb35c-79ea-327f-9a98-b80fc1cfce97},\n created = {2020-10-30T21:19:07.732Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.659Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Kampelopoulos2020},\n source_type = {INPROCEEDINGS},\n private_publication = {false},\n abstract = {In this paper, two machine learning techniques are applied and compared in order to model leak detection in pipelines in noisy environments. A set of accelerometers, mounted on the surface of the pipes, was deployed for the data acquisition process. Measurements of noise during normal operating conditions were recorded as well as measurements of leaks, generated on various distances from the sensors. Using these measurement data, a training set was created from their time-domain and frequency-domain features. The leak detection process is then modeled as a binary classification problem (leak detection or not). For this problem, two machine learning classification techniques were evaluated, the support vector machines and the decision trees. The results for each learner are compared with the original data from the test dataset using representative performance indicators and, overall, high levels of accuracy are achieved.},\n bibtype = {inproceedings},\n author = {Kampelopoulos, Dimitrios and Papastavrou, George N and Kousiopoulos, George P and Karagiorgos, Nikolaos and Goudos, Sotirios K and Nikolaidis, Spyridon},\n doi = {10.1109/MOCAST49295.2020.9200261},\n booktitle = {2020 9th International Conference on Modern Circuits and Systems Technologies, MOCAST 2020}\n}
\n
\n\n\n
\n In this paper, two machine learning techniques are applied and compared in order to model leak detection in pipelines in noisy environments. A set of accelerometers, mounted on the surface of the pipes, was deployed for the data acquisition process. Measurements of noise during normal operating conditions were recorded as well as measurements of leaks, generated on various distances from the sensors. Using these measurement data, a training set was created from their time-domain and frequency-domain features. The leak detection process is then modeled as a binary classification problem (leak detection or not). For this problem, two machine learning classification techniques were evaluated, the support vector machines and the decision trees. The results for each learner are compared with the original data from the test dataset using representative performance indicators and, overall, high levels of accuracy are achieved.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Novel Chaotic System with Application to Secure Communications.\n \n \n \n\n\n \n Moysis, L.; Volos, C.; Stouboulos, I.; Goudos, S.; Cicek, S.; Pham, V., T.; and Mishra, V., K.\n\n\n \n\n\n\n In 2020 9th International Conference on Modern Circuits and Systems Technologies, MOCAST 2020, pages 1-4, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A Novel Chaotic System with Application to Secure Communications},\n type = {inproceedings},\n year = {2020},\n keywords = {CSK modulation,Chaos,Hidden attractor,Secure communications},\n pages = {1-4},\n id = {c8d3d6dd-c53e-3a9e-9c46-b6d6eb2bb906},\n created = {2020-10-30T21:30:05.381Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:12.963Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n source_type = {INPROCEEDINGS},\n private_publication = {false},\n abstract = {In this work, a novel three dimensional chaotic system with is proposed. The system has no linear terms and a line equilibrium, so it belongs to the category of systems with hidden attractors. The system's dynamical behavior is analysed through its bifurcations diagrams and maximum Lyapunov exponent diagram. Then, the system is applied to the problem of secure communications using the Symmetric Chaos Shift Keying modulation method.},\n bibtype = {inproceedings},\n author = {Moysis, Lazaros and Volos, Christos and Stouboulos, Ioannis and Goudos, Sotirios and Cicek, Serdar and Pham, Viet Thanh and Mishra, Vikas K},\n doi = {10.1109/MOCAST49295.2020.9200286},\n booktitle = {2020 9th International Conference on Modern Circuits and Systems Technologies, MOCAST 2020}\n}
\n
\n\n\n
\n In this work, a novel three dimensional chaotic system with is proposed. The system has no linear terms and a line equilibrium, so it belongs to the category of systems with hidden attractors. The system's dynamical behavior is analysed through its bifurcations diagrams and maximum Lyapunov exponent diagram. Then, the system is applied to the problem of secure communications using the Symmetric Chaos Shift Keying modulation method.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 3D Placement of Drone-mounted Remote Radio Head for Minimum Transmission Power under Connectivity Constraints.\n \n \n \n\n\n \n Pliatsios, D.; Sarigiannidis, P.; Goudos, S., K.; and Psannis, K.\n\n\n \n\n\n\n IEEE Access,1. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {3D Placement of Drone-mounted Remote Radio Head for Minimum Transmission Power under Connectivity Constraints},\n type = {article},\n year = {2020},\n pages = {1},\n id = {a18e7d68-e0f5-3d39-9446-2e97eff60251},\n created = {2020-11-03T11:16:48.098Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.508Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9245517},\n source_type = {article},\n private_publication = {false},\n abstract = {Dense small cell deployment in a cloud radio access network (C-RAN) is an effective approach to satisfy the increasing requirements of the emerging fifth generation (5G) mobile networks. Nevertheless, the optimal deployment of small cells is not always possible due to certain limitations, such as the existence of backbone infrastructure and appropriate power supply. In addition, the increased throughput requirements in a certain area may be temporal, such as in the case of an event such as a sports match or a concert. To this end, the leverage of multiple drone-mounted remote radio heads (D-RRHs), coupled with advanced user scheduling and multiplexing schemes, can be a promising asset in provisioning an on-demand and dynamic C-RAN. Nevertheless, finding the optimal placement of the D-RRHs, under certain quality of service (QoS) constraints can be challenging. In this work, we propose a D-RRH placement approach that minimizes the transmission power by optimally placing the D-RRH. We formulate the placement optimization problem and decouple it into two separate sub-problems, namely the horizontal placement and the vertical placement problems. An implementation of the Weiszfeld algorithm is utilized in order to solve the horizontal placement problem by finding the point that minimizes the sum distances. The vertical placement problem is calculated as a function of the optimal elevation angle and the radius of the coverage area. In order to evaluate the performance of the proposed approach, we carried out extensive evaluations and compare our proposed approach against two similar approaches. The evaluation results show the feasibility of the proposed approach in minimizing the required transmission power and maintaining fairly good performance in terms of user connectivity.},\n bibtype = {article},\n author = {Pliatsios, D and Sarigiannidis, P and Goudos, S K and Psannis, K},\n doi = {10.1109/ACCESS.2020.3034881},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n Dense small cell deployment in a cloud radio access network (C-RAN) is an effective approach to satisfy the increasing requirements of the emerging fifth generation (5G) mobile networks. Nevertheless, the optimal deployment of small cells is not always possible due to certain limitations, such as the existence of backbone infrastructure and appropriate power supply. In addition, the increased throughput requirements in a certain area may be temporal, such as in the case of an event such as a sports match or a concert. To this end, the leverage of multiple drone-mounted remote radio heads (D-RRHs), coupled with advanced user scheduling and multiplexing schemes, can be a promising asset in provisioning an on-demand and dynamic C-RAN. Nevertheless, finding the optimal placement of the D-RRHs, under certain quality of service (QoS) constraints can be challenging. In this work, we propose a D-RRH placement approach that minimizes the transmission power by optimally placing the D-RRH. We formulate the placement optimization problem and decouple it into two separate sub-problems, namely the horizontal placement and the vertical placement problems. An implementation of the Weiszfeld algorithm is utilized in order to solve the horizontal placement problem by finding the point that minimizes the sum distances. The vertical placement problem is calculated as a function of the optimal elevation angle and the radius of the coverage area. In order to evaluate the performance of the proposed approach, we carried out extensive evaluations and compare our proposed approach against two similar approaches. The evaluation results show the feasibility of the proposed approach in minimizing the required transmission power and maintaining fairly good performance in terms of user connectivity.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Combined Ray-tracing/FDTD and Network planner methods for the design of massive MIMO networks.\n \n \n \n\n\n \n Matalatala, M.; Shikhantsov, S.; Deruyck, M.; Tanghe, E.; Plets, D.; Goudos, S.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n IEEE Access, 8: 206371-206387. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Combined Ray-tracing/FDTD and Network planner methods for the design of massive MIMO networks},\n type = {article},\n year = {2020},\n pages = {206371-206387},\n volume = {8},\n id = {a5920c42-b819-3e77-9e15-bec2708c8751},\n created = {2020-11-03T11:16:48.108Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:55:13.533Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9246544},\n source_type = {article},\n private_publication = {false},\n abstract = {The design of a massive MIMO network requires a channel model that captures the Spatio-temporal dimensions of the propagation environment. In this paper, we propose a novel method combining Hybrid Raytracing - Finite difference time domain (FDTD) and network planner tools to address this requirement. This method provides accurate and realistic EMF exposure models for the design of a massive MIMO network. Using this method, we proceed with the optimization of the BS's locations under the low power consumption and low EMF exposure constraints. Assuming equal preference of the optimization objectives, the simulations show that the uplink localized 10g dose appears to be the dominant factor of the localized 10g EMF exposure. Moreover, a massive MIMO network designed to serve 224 simultaneous active users at the same time-frequency resource is subject to an increase of the total whole-body dose (2 times higher in downlink and +18% in uplink), compared to a design with 14 active users. However, in the same conditions, the downlink localized 10g dose reduces (20 times lower) whereas the uplink localized 10g dose increases (+23%) in comparison with the scenario with fewer users (14). Besides, the electromagnetic field strength in all locations obtained with this new method is 2 times weaker compared to a 4G LTE network, while complying with the international guidelines.},\n bibtype = {article},\n author = {Matalatala, M and Shikhantsov, S and Deruyck, M and Tanghe, E and Plets, D and Goudos, S and Martens, L and Joseph, W},\n doi = {10.1109/ACCESS.2020.3035317},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n The design of a massive MIMO network requires a channel model that captures the Spatio-temporal dimensions of the propagation environment. In this paper, we propose a novel method combining Hybrid Raytracing - Finite difference time domain (FDTD) and network planner tools to address this requirement. This method provides accurate and realistic EMF exposure models for the design of a massive MIMO network. Using this method, we proceed with the optimization of the BS's locations under the low power consumption and low EMF exposure constraints. Assuming equal preference of the optimization objectives, the simulations show that the uplink localized 10g dose appears to be the dominant factor of the localized 10g EMF exposure. Moreover, a massive MIMO network designed to serve 224 simultaneous active users at the same time-frequency resource is subject to an increase of the total whole-body dose (2 times higher in downlink and +18% in uplink), compared to a design with 14 active users. However, in the same conditions, the downlink localized 10g dose reduces (20 times lower) whereas the uplink localized 10g dose increases (+23%) in comparison with the scenario with fewer users (14). Besides, the electromagnetic field strength in all locations obtained with this new method is 2 times weaker compared to a 4G LTE network, while complying with the international guidelines.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modified Printed Bow-Tie Antenna for RF Energy Harvesting Applications.\n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2020 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), volume 1, pages 67-71, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Modified Printed Bow-Tie Antenna for RF Energy Harvesting Applications},\n type = {inproceedings},\n year = {2020},\n pages = {67-71},\n volume = {1},\n id = {f43c0f11-c2b0-3d05-8074-c9a8c5095644},\n created = {2020-12-22T20:40:32.141Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:17.840Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9245049},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {As the power requirements of electronic systems in wireless sensor networks are progressively reducing, radio frequency (RF) energy harvesting (EH) technique is becoming increasingly interesting during the last years. In this paper, we design and optimize a modified printed bow-tie antenna, operating in the frequency band of 5G NR mobile communication networks. For the optimization process, we have selected the Monarch Butterfly Algorithm that combines swarm intelligence and evolutionary characteristics. Computed results exhibit a quite acceptable performance of the optimized antenna as an RF energy harvester in the desired frequency band.},\n bibtype = {inproceedings},\n author = {Boursianis, A D and Papadopoulou, M S and Nikolaidis, S and Goudos, S K},\n doi = {10.1109/MTTW51045.2020.9245049},\n booktitle = {2020 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW)}\n}
\n
\n\n\n
\n As the power requirements of electronic systems in wireless sensor networks are progressively reducing, radio frequency (RF) energy harvesting (EH) technique is becoming increasingly interesting during the last years. In this paper, we design and optimize a modified printed bow-tie antenna, operating in the frequency band of 5G NR mobile communication networks. For the optimization process, we have selected the Monarch Butterfly Algorithm that combines swarm intelligence and evolutionary characteristics. Computed results exhibit a quite acceptable performance of the optimized antenna as an RF energy harvester in the desired frequency band.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dual-Band Rectifier Design for Ambient RF Energy Harvesting.\n \n \n \n\n\n \n Papadopoulou, M., S.; Boursianis, A., D.; Goudos, S., K.; and Psannis, K.\n\n\n \n\n\n\n In 2020 3rd World Symposium on Communication Engineering (WSCE), pages 7-11, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Dual-Band Rectifier Design for Ambient RF Energy Harvesting},\n type = {inproceedings},\n year = {2020},\n pages = {7-11},\n id = {f0c872fe-cfcd-3032-a496-dc417a961ddc},\n created = {2020-12-22T20:40:32.147Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:17.846Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9275569},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The design of a wireless sensor network (WSN) has several key points to consider. Power management and battery charging, especially when is applied in a harsh environment, are crucial parameters. In this paper, we present an RF energy harvesting system that converts ambient AC electromagnetic energy into DC voltage, which is applicable to supply low power devices. The circuit harvests and reuses ambient wireless energy for several applications. The proposed system resonates in the frequency bands of 4G (2.67 GHz) and 5G (3.591 GHz) mobile communication systems. Numerical results demonstrate that the overall system in a two-tone signal exhibits maximum power conversion efficiency equal to 78.1%, when the load of the circuit is 2 kOhms and the input power reaches 6 dBm. In a single-tone configuration, the maximum achieved efficiency is 56.11% at 2.67 GHz and 57.95% at 3.591 GHz, accordingly.},\n bibtype = {inproceedings},\n author = {Papadopoulou, M S and Boursianis, A D and Goudos, S K and Psannis, K},\n doi = {10.1109/WSCE51339.2020.9275569},\n booktitle = {2020 3rd World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n The design of a wireless sensor network (WSN) has several key points to consider. Power management and battery charging, especially when is applied in a harsh environment, are crucial parameters. In this paper, we present an RF energy harvesting system that converts ambient AC electromagnetic energy into DC voltage, which is applicable to supply low power devices. The circuit harvests and reuses ambient wireless energy for several applications. The proposed system resonates in the frequency bands of 4G (2.67 GHz) and 5G (3.591 GHz) mobile communication systems. Numerical results demonstrate that the overall system in a two-tone signal exhibits maximum power conversion efficiency equal to 78.1%, when the load of the circuit is 2 kOhms and the input power reaches 6 dBm. In a single-tone configuration, the maximum achieved efficiency is 56.11% at 2.67 GHz and 57.95% at 3.591 GHz, accordingly.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Novel Chaotic System with a Line Equilibrium: Analysis and Its Applications to Secure Communication and Random Bit Generation.\n \n \n \n\n\n \n Moysis, L.; Volos, C.; Stouboulos, I.; Goudos, S.; Çiçek, S.; Pham, V.; and Mishra, V., K.\n\n\n \n\n\n\n Telecom, 1(3): 283–296. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {A Novel Chaotic System with a Line Equilibrium: Analysis and Its Applications to Secure Communication and Random Bit Generation},\n type = {article},\n year = {2020},\n pages = {283–296},\n volume = {1},\n id = {85a19f7f-cb17-396f-98d0-c30d4a8ae5d7},\n created = {2020-12-22T20:40:32.324Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:48.956Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {moysis2020a},\n source_type = {article},\n private_publication = {false},\n abstract = {In this study, a novel two-parameter, three-dimensional chaotic system is constructed. The system has no linear terms and its equilibrium is a line, so it is a system with hidden attractors. The system is first studied by computation of its bifurcation diagrams and diagram of Lyapunov exponents. Then, the system is applied to two encryption related problems. First, the problem of secure communications is considered, using the symmetric chaos shift keying modulation method. Here, the states of the chaotic system are combined with a binary information signal in order to mask it, safely transmit it through a communication channel, and successfully reconstruct the information at the receiver end. In the second problem, the states of the system are utilized to design a simple rule to generate a bit sequence that possesses random properties, and is thus suitable for encryption related applications. For both applications, simulations are performed through Matlab to verify the soundness of the designs.},\n bibtype = {article},\n author = {Moysis, Lazaros and Volos, Christos and Stouboulos, Ioannis and Goudos, Sotirios and Çiçek, Serdar and Pham, Viet-Thanh and Mishra, Vikas K},\n journal = {Telecom},\n number = {3}\n}
\n
\n\n\n
\n In this study, a novel two-parameter, three-dimensional chaotic system is constructed. The system has no linear terms and its equilibrium is a line, so it is a system with hidden attractors. The system is first studied by computation of its bifurcation diagrams and diagram of Lyapunov exponents. Then, the system is applied to two encryption related problems. First, the problem of secure communications is considered, using the symmetric chaos shift keying modulation method. Here, the states of the chaotic system are combined with a binary information signal in order to mask it, safely transmit it through a communication channel, and successfully reconstruct the information at the receiver end. In the second problem, the states of the system are utilized to design a simple rule to generate a bit sequence that possesses random properties, and is thus suitable for encryption related applications. For both applications, simulations are performed through Matlab to verify the soundness of the designs.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n State-of-the-Art Technologies in RF Energy Harvesting Circuits – A Review.\n \n \n \n\n\n \n Bougas, I., D.; Papadopoulou, M., S.; Psannis, K.; Sarigiannidis, P.; and Goudos, S., K.\n\n\n \n\n\n\n In 2020 3rd World Symposium on Communication Engineering (WSCE), pages 18-22, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {State-of-the-Art Technologies in RF Energy Harvesting Circuits – A Review},\n type = {inproceedings},\n year = {2020},\n pages = {18-22},\n id = {a597a66d-fa7f-3001-9367-edc1126613d5},\n created = {2020-12-22T20:40:32.327Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:17.611Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9275507},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Nowadays electricity is undoubtedly one of the most important goods. Over the years, the dependence of people on electrical devices has sharply increased. The need for continuous use of these devices has created greater demand for electricity as well as more efficient transmission techniques. Environmental energy scavenging, as well as wireless transmission, is an increasing research field during the last years. The use of Radio Frequency (RF) Energy Harvesting (EH) technique contributes to the development of autonomous energy devices and sensors, to reduce the need of supplying them with power by using batteries or the mains. In this paper, the state-of-the-art technologies of radio frequency energy harvesting are discussed and analyzed.},\n bibtype = {inproceedings},\n author = {Bougas, I D and Papadopoulou, M S and Psannis, K and Sarigiannidis, P and Goudos, S K},\n doi = {10.1109/WSCE51339.2020.9275507},\n booktitle = {2020 3rd World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n Nowadays electricity is undoubtedly one of the most important goods. Over the years, the dependence of people on electrical devices has sharply increased. The need for continuous use of these devices has created greater demand for electricity as well as more efficient transmission techniques. Environmental energy scavenging, as well as wireless transmission, is an increasing research field during the last years. The use of Radio Frequency (RF) Energy Harvesting (EH) technique contributes to the development of autonomous energy devices and sensors, to reduce the need of supplying them with power by using batteries or the mains. In this paper, the state-of-the-art technologies of radio frequency energy harvesting are discussed and analyzed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multiband Patch Antenna Design for RF Energy Harvesting Applications Using Coyote Optimization Algorithm.\n \n \n \n\n\n \n Boursianis, A., D.; Georgoulas, D.; Papadopoulou, M.; Karampatea, A.; S, M.; Pierezan, J.; Mariani, V., C.; Coelho, L., S.; Siakavara, A.; and Goudos, S., K.\n\n\n \n\n\n\n In 14th European Conference on Antennas and Propagation, EuCAP 2020, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Multiband Patch Antenna Design for RF Energy Harvesting Applications Using Coyote Optimization Algorithm},\n type = {inproceedings},\n year = {2020},\n id = {c81b204e-fcdf-3c2e-80b6-224e4a34d408},\n created = {2023-01-02T11:46:06.174Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:31:20.925Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Eucap2020B},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Radio frequency energy harvesting is a relatively recent and quite interesting technique for delivering adequate amounts of energy in low power consumption wireless networks. This technique faces several challenges, with most of them are related to the antenna design of the harvesting system. In this paper, we address to these challenges by designing a multiband microstrip patch antenna with three slits. The proposed antenna operates in the LoRaWAN (Long RangeWide Area Network) and the cellular (GSM-1800 and UMTS) communication frequency bands. Numerical results demonstrate a satisfactory performance of the proposed patch antenna as an energy harvester in radio frequency environments.},\n bibtype = {inproceedings},\n author = {Boursianis, A D and Georgoulas, D and Papadopoulou, M and Karampatea, A and S, M and Pierezan, J and Mariani, V C and Coelho, L S and Siakavara, A and Goudos, S K},\n booktitle = {14th European Conference on Antennas and Propagation, EuCAP 2020}\n}
\n
\n\n\n
\n Radio frequency energy harvesting is a relatively recent and quite interesting technique for delivering adequate amounts of energy in low power consumption wireless networks. This technique faces several challenges, with most of them are related to the antenna design of the harvesting system. In this paper, we address to these challenges by designing a multiband microstrip patch antenna with three slits. The proposed antenna operates in the LoRaWAN (Long RangeWide Area Network) and the cellular (GSM-1800 and UMTS) communication frequency bands. Numerical results demonstrate a satisfactory performance of the proposed patch antenna as an energy harvester in radio frequency environments.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n MIMO Antenna Design for 5G Communication Systems Using Salp Swarm Algorithm.\n \n \n \n\n\n \n Boursianis, A., D.; Goudos, S., K.; Yioultsis, T., V.; Siakavara, K.; and Rocca, P.\n\n\n \n\n\n\n In 2020 International Workshop on Antenna Technology (iWAT), pages 1-3, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {MIMO Antenna Design for 5G Communication Systems Using Salp Swarm Algorithm},\n type = {inproceedings},\n year = {2020},\n keywords = {5G mobile communications;bow tie antenna;MIMO ante},\n pages = {1-3},\n id = {5ad9d891-8d34-3663-a8b5-d378d18b32bc},\n created = {2023-02-11T16:29:15.624Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:15.624Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9083886},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Multiple Input Multiple Output (MIMO) antennas will be a part of every new user device in 5G networks. In this paper, we design a MIMO antenna for 5G networks using a nature-inspired algorithm, namely the Salp Swarm Algorithm (SSA). We select a bow tie antenna as the element of the MIMO operating in n257 frequency band (center frequency at 28GHz). Firstly, we design and optimize the antenna element using the SSA algorithm. Secondly, a MIMO antenna is designed using the optimal dimensions of the antenna element. Numerical results demonstrate that the proposed MIMO antenna has a small size and exhibits wideband operation in the desired frequency band.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Goudos, Sotirios K and Yioultsis, Traianos V and Siakavara, Katherine and Rocca, Paolo},\n doi = {10.1109/iWAT48004.2020.1570618331},\n booktitle = {2020 International Workshop on Antenna Technology (iWAT)}\n}
\n
\n\n\n
\n Multiple Input Multiple Output (MIMO) antennas will be a part of every new user device in 5G networks. In this paper, we design a MIMO antenna for 5G networks using a nature-inspired algorithm, namely the Salp Swarm Algorithm (SSA). We select a bow tie antenna as the element of the MIMO operating in n257 frequency band (center frequency at 28GHz). Firstly, we design and optimize the antenna element using the SSA algorithm. Secondly, a MIMO antenna is designed using the optimal dimensions of the antenna element. Numerical results demonstrate that the proposed MIMO antenna has a small size and exhibits wideband operation in the desired frequency band.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dual-Band RF-to-DC Rectifier with High Efficiency for RF Energy Harvesting Applications.\n \n \n \n\n\n \n Papadopoulou, M., S.; Boursianis, A., D.; Skoufa, A.; Volos, C., K.; Stouboulos, I., N.; Nikolaidis, S.; and Goudos, S., K.\n\n\n \n\n\n\n In 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Dual-Band RF-to-DC Rectifier with High Efficiency for RF Energy Harvesting Applications},\n type = {inproceedings},\n year = {2020},\n keywords = {Radio frequency;Dual band;Schottky diodes;Impedanc},\n pages = {1-4},\n id = {ff74cbd8-d08d-37b8-a0d7-cc29f74bc0aa},\n created = {2023-02-11T16:29:15.628Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:15.628Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9200262},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Radio Frequency (RF) energy harvesting is emerging as a potentially reliable method to replace the costly and, difficult to maintain, source of low-power wireless sensors networks. In this paper, a dual-band RF-to-DC rectifier, that operates at LoRaWAN and GSM-900 cellular communication frequency bands, is presented. The system is composed of an impedance matching circuit, an RF-to-DC rectifier, that converts the ambient RF energy into DC voltage able to feed low power devices, and an output load. The proposed system resonates at two different frequencies of 866 MHz and 937 MHz. Numerical results demonstrate that the overall system exhibits an efficiency of 80% with 4.32 V of output voltage at 0 dBm of input power.},\n bibtype = {inproceedings},\n author = {Papadopoulou, Maria S and Boursianis, Achilles D and Skoufa, Anastasia and Volos, Christos K and Stouboulos, Ioannis N and Nikolaidis, Spyridon and Goudos, Sotirios K},\n doi = {10.1109/MOCAST49295.2020.9200262},\n booktitle = {2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n Radio Frequency (RF) energy harvesting is emerging as a potentially reliable method to replace the costly and, difficult to maintain, source of low-power wireless sensors networks. In this paper, a dual-band RF-to-DC rectifier, that operates at LoRaWAN and GSM-900 cellular communication frequency bands, is presented. The system is composed of an impedance matching circuit, an RF-to-DC rectifier, that converts the ambient RF energy into DC voltage able to feed low power devices, and an output load. The proposed system resonates at two different frequencies of 866 MHz and 937 MHz. Numerical results demonstrate that the overall system exhibits an efficiency of 80% with 4.32 V of output voltage at 0 dBm of input power.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Big Data against Security Threats: The SPEAR Intrusion Detection System.\n \n \n \n\n\n \n Pliatsios, D.; Sarigiannidis, P.; Psannis, K.; Goudos, S., K.; Vitsas, V.; and Moscholios, I.\n\n\n \n\n\n\n In 2020 3rd World Symposium on Communication Engineering (WSCE), pages 12-17, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Big Data against Security Threats: The SPEAR Intrusion Detection System},\n type = {inproceedings},\n year = {2020},\n keywords = {Smart grids;Big Data;Feature extraction;Intrusion},\n pages = {12-17},\n id = {40dfb634-7d92-36f1-9c18-248f08a63bab},\n created = {2023-02-11T16:29:15.757Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:15.757Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9275580},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The environmental concerns, the limited availability of conventional energy sources, the integration of alternative energy sources and the increasing number of power-demanding appliances change the way electricity is generated and distributed. Smart Grid (SG) is an appealing concept, which was developed in response to the emerging issues of electricity generation and distribution. By leveraging the latest advancements of Information and Communication Technologies (ICT), it offers significant benefits to energy providers, retailers and consumers. Nevertheless, SG is vulnerable to cyber attacks, that could cause critical economic and ecological consequences. Traditional Intrusion Detection Systems (IDSs) are becoming less efficient in detecting and mitigating cyberattacks, due to their limited capabilities of analyzing the exponentially increasing volume of network traffic. In this paper, we present the Secure and PrivatE smArt gRid (SPEAR) platform, which features a Big Data enabled IDS that timely detects and identifies cyber attacks against SG components. In order to validate the efficiency of the SPEAR platform regarding the protection of critical infrastructure, we installed the platform in a small wind power plant.},\n bibtype = {inproceedings},\n author = {Pliatsios, Dimitrios and Sarigiannidis, Panagiotis and Psannis, Konstantinos and Goudos, Sotirios K and Vitsas, Vasileios and Moscholios, Ioannis},\n doi = {10.1109/WSCE51339.2020.9275580},\n booktitle = {2020 3rd World Symposium on Communication Engineering (WSCE)}\n}
\n
\n\n\n
\n The environmental concerns, the limited availability of conventional energy sources, the integration of alternative energy sources and the increasing number of power-demanding appliances change the way electricity is generated and distributed. Smart Grid (SG) is an appealing concept, which was developed in response to the emerging issues of electricity generation and distribution. By leveraging the latest advancements of Information and Communication Technologies (ICT), it offers significant benefits to energy providers, retailers and consumers. Nevertheless, SG is vulnerable to cyber attacks, that could cause critical economic and ecological consequences. Traditional Intrusion Detection Systems (IDSs) are becoming less efficient in detecting and mitigating cyberattacks, due to their limited capabilities of analyzing the exponentially increasing volume of network traffic. In this paper, we present the Secure and PrivatE smArt gRid (SPEAR) platform, which features a Big Data enabled IDS that timely detects and identifies cyber attacks against SG components. In order to validate the efficiency of the SPEAR platform regarding the protection of critical infrastructure, we installed the platform in a small wind power plant.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Chaotic Motion Control of a Mobile Robot Using a Memory Technique.\n \n \n \n\n\n \n Petavratzis, E.; Moysis, L.; Volos, C.; Gupta, M., K.; Stouboulos, I.; and Goudos, S.\n\n\n \n\n\n\n In 2020 24th International Conference on System Theory, Control and Computing (ICSTCC), pages 506-511, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Chaotic Motion Control of a Mobile Robot Using a Memory Technique},\n type = {inproceedings},\n year = {2020},\n keywords = {Robots;Chaotic communication;Generators;Physics;Co},\n pages = {506-511},\n id = {f8ee1941-066c-36a2-8764-2cdbcadab96b},\n created = {2023-02-11T16:29:15.760Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:15.760Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9259721},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This work addresses the problem of chaotic path planning, using a memory technique to improve performance. In this application, the dynamics of a chaotic system are utilized to generate a series of navigation commands using a simple rule. These commands are then used by an autonomous robot to explore an area. This navigation strategy can bring overall area coverage, but with numerous revisits to the same cells. Here, a memory technique is applied to limit the chaotic motion to cells with the least number of visits, leading to overall improvement in performance. Numerical simulations are performed to evaluate the path planning strategy.},\n bibtype = {inproceedings},\n author = {Petavratzis, Eleftherios and Moysis, Lazaros and Volos, Christos and Gupta, Mahendra Kumar and Stouboulos, Ioannis and Goudos, Sotirios},\n doi = {10.1109/ICSTCC50638.2020.9259721},\n booktitle = {2020 24th International Conference on System Theory, Control and Computing (ICSTCC)}\n}
\n
\n\n\n
\n This work addresses the problem of chaotic path planning, using a memory technique to improve performance. In this application, the dynamics of a chaotic system are utilized to generate a series of navigation commands using a simple rule. These commands are then used by an autonomous robot to explore an area. This navigation strategy can bring overall area coverage, but with numerous revisits to the same cells. Here, a memory technique is applied to limit the chaotic motion to cells with the least number of visits, leading to overall improvement in performance. Numerical simulations are performed to evaluate the path planning strategy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dualband Patch Antenna Design Using Binary Grey Wolf Optimizer.\n \n \n \n\n\n \n Goudos, S., K.; Boursianis, A.; Salucci, M.; and Rocca, P.\n\n\n \n\n\n\n In 2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting, pages 1777-1778, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Dualband Patch Antenna Design Using Binary Grey Wolf Optimizer},\n type = {inproceedings},\n year = {2020},\n keywords = {Patch antennas;Meetings;Dual band;Evolutionary com},\n pages = {1777-1778},\n id = {f2347984-b3db-3de8-8701-03853db45671},\n created = {2023-02-11T16:29:15.768Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:15.768Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9330100},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Various antenna design problems are discrete-valued. To address these problems, binary-coded algorithms suited for combinatorial optimization problems are required. Grey Wolf Optimizer (GWO) is a recently proposed evolutionary algorithm based on grey wolves' behavior. Although GWO was originally designed for real-valued problems, discrete versions also exist. In this paper, we apply a binary GWO algorithm (bGWO) for arbitrary-shaped dual-band patch antenna design. Computational results demonstrate that bGWO is quite efficient and can be further applied to discrete valued problems in electromagnetics.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K and Boursianis, Achilles and Salucci, Marco and Rocca, Paolo},\n doi = {10.1109/IEEECONF35879.2020.9330100},\n booktitle = {2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting}\n}
\n
\n\n\n
\n Various antenna design problems are discrete-valued. To address these problems, binary-coded algorithms suited for combinatorial optimization problems are required. Grey Wolf Optimizer (GWO) is a recently proposed evolutionary algorithm based on grey wolves' behavior. Although GWO was originally designed for real-valued problems, discrete versions also exist. In this paper, we apply a binary GWO algorithm (bGWO) for arbitrary-shaped dual-band patch antenna design. Computational results demonstrate that bGWO is quite efficient and can be further applied to discrete valued problems in electromagnetics.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modified Patch Antenna Design Using Moth Search Algorithm for RF Energy Harvesting Applications.\n \n \n \n\n\n \n Boursianis, A., D.; Koulouridis, S.; Rocca, P.; and Goudos, S., K.\n\n\n \n\n\n\n In 2020 International Workshop on Antenna Technology (iWAT), pages 1-3, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Modified Patch Antenna Design Using Moth Search Algorithm for RF Energy Harvesting Applications},\n type = {inproceedings},\n year = {2020},\n keywords = {patch antenna;RF energy harvesting;moth search alg},\n pages = {1-3},\n id = {c52d292b-8c9d-35e4-a753-fed0f491b482},\n created = {2023-02-11T16:29:15.805Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:15.805Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9083891},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Radio frequency energy harvesting is a well-promising technique to power wireless sensor network devices that require small amounts of energy to operate. It can be utilized as an alternative technique for power-constrained systems, such as wireless sensor networks with limited battery lifetime, by extending their energy supply. In outdoor environments, the dominant ambient radio wave sources are the broadcasting and the mobile communication networks. In this paper, we apply an optimization technique by utilizing Moth Search algorithm to design a modified microstrip patch antenna of three varying slots. The proposed antenna exhibits tuning operation in the LoRa (Long Range) and the cellular communications frequency bands of GSM-1800 and UMTS. Numerical results exhibit an acceptable performance of the proposed antenna for RF energy harvesting applications.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Koulouridis, Stavros and Rocca, Paolo and Goudos, Sotirios K},\n doi = {10.1109/iWAT48004.2020.1570609565},\n booktitle = {2020 International Workshop on Antenna Technology (iWAT)}\n}
\n
\n\n\n
\n Radio frequency energy harvesting is a well-promising technique to power wireless sensor network devices that require small amounts of energy to operate. It can be utilized as an alternative technique for power-constrained systems, such as wireless sensor networks with limited battery lifetime, by extending their energy supply. In outdoor environments, the dominant ambient radio wave sources are the broadcasting and the mobile communication networks. In this paper, we apply an optimization technique by utilizing Moth Search algorithm to design a modified microstrip patch antenna of three varying slots. The proposed antenna exhibits tuning operation in the LoRa (Long Range) and the cellular communications frequency bands of GSM-1800 and UMTS. Numerical results exhibit an acceptable performance of the proposed antenna for RF energy harvesting applications.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks.\n \n \n \n\n\n \n Goudos, S., K.; Diamantoulakis, P., D.; Boursianis, A., D.; Papanikolaou, V., K.; and Karagiannidis, G., K.\n\n\n \n\n\n\n In 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST), pages 1-4, 2020. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks},\n type = {inproceedings},\n year = {2020},\n keywords = {NOMA;Resource management;Interference;Silicon carb},\n pages = {1-4},\n id = {a1b1b843-4718-3113-b96d-97eddc84bab1},\n created = {2023-02-11T16:29:15.808Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:15.808Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {9200248},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {In this paper, we address the problem of joint user association and power allocation for non-orthogonal multiple access (NOMA) networks with multiple base stations (BSs). A user grouping procedure into orthogonal clusters, as well as an allocation of different physical resource blocks (PRBs) is considered. The problem of interest is mathematically described using the maximization of the weighted sum rate. We apply two different swarm intelligence algorithms, namely, the recently introduced Grey Wolf Optimizer (GWO), and the popular Particle Swarm Optimization (PSO), in order to solve this problem. Numerical results demonstrate that the above-described problem can be satisfactorily addressed by both algorithms.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K and Diamantoulakis, Panagiotis D and Boursianis, Achilles D and Papanikolaou, Vasilis K and Karagiannidis, George K},\n doi = {10.1109/MOCAST49295.2020.9200248},\n booktitle = {2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST)}\n}
\n
\n\n\n
\n In this paper, we address the problem of joint user association and power allocation for non-orthogonal multiple access (NOMA) networks with multiple base stations (BSs). A user grouping procedure into orthogonal clusters, as well as an allocation of different physical resource blocks (PRBs) is considered. The problem of interest is mathematically described using the maximization of the weighted sum rate. We apply two different swarm intelligence algorithms, namely, the recently introduced Grey Wolf Optimizer (GWO), and the popular Particle Swarm Optimization (PSO), in order to solve this problem. Numerical results demonstrate that the above-described problem can be satisfactorily addressed by both algorithms.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A LoRaWAN-based IoT Platform for Smart Irrigation in Olive Groves - Abstract.\n \n \n \n \n\n\n \n Liopa-Tsakalidi, A.; Thomopoulos, V.; Barouchas, P.; Boursianis, A.; Goudos, S., K.; Kalamaras, G.; Karydas, S.; Gotsis, A., G.; and Maliatsos, K.\n\n\n \n\n\n\n In Vlontzos, G.; and Koutsou, S., editor(s), Proceedings of the 9th International Conference on Information and Communication Technologies in Agriculture, Food and Environment (HAICTA 2020), Thessaloniki, Greece, September 24-27, 2020, volume 2761, of CEUR Workshop Proceedings, pages 213-214, 2020. CEUR-WS.org\n \n\n\n\n
\n\n\n\n \n \n \"AWebsite\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {A LoRaWAN-based IoT Platform for Smart Irrigation in Olive Groves - Abstract},\n type = {inproceedings},\n year = {2020},\n pages = {213-214},\n volume = {2761},\n websites = {http://ceur-ws.org/Vol-2761/HAICTA%5C_2020%5C_paper32.pdf},\n publisher = {CEUR-WS.org},\n series = {CEUR Workshop Proceedings},\n id = {811adcc5-bd42-3301-b5f4-c2db244d84e8},\n created = {2023-02-11T20:58:33.389Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T20:58:33.389Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {DBLP:conf/haicta/Liopa-Tsakalidi20},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Irrigation is the major cause of water consumption in agriculture. It contributes to\nincreasing crop productivity, but it is also a means to the preservation of water\nresources. Therefore, advancing the rational exploitation of water through smart\nirrigation in agriculture is essential for improving crop yield, decreasing costs, and\ncontributing to environmental sustainability. The intense use of Information and\nCommunication Technologies (ICT) has the potential to reduce the amount of water\nsupplied to the crop. The Internet of Things (IoT) is the natural choice for irrigation\napplications, even though the integration of different hardware, software and\nconnectivity technologies required for making it work seamlessly in practice, while\nkeeping the cost at reasonable levels, is still at an early stage. Low-Power Wide-Area\nAccess (LPWA) is considered an emerging class of connectivity technology,\nencompassing radio protocols capable of covering large geographic areas, while\ndelivering multiple years of operation for devices running on batteries with a single\ncharge. LPWA technologies have the potential to provide a step change in the\nenablement of energy efficient IoT applications. In this respect, LPWA networks are\ncurrently one of the most suitable approach for end-to-end connectivity in the farming\ndomain. LoRaWAN is probably one of the most promising LPWA technologies,\nwhich offers long range, low power consumption, and secure data transmission, over\nlicense-free frequency bands. It can achieve data transmission ranges up to 15 km in\nopen areas using a single gateway, and is supported by a wide community of industrial\nplayers, academics, IoT makers, and software developers.},\n bibtype = {inproceedings},\n author = {Liopa-Tsakalidi, Aglaia and Thomopoulos, Vasileios and Barouchas, Pantelis and Boursianis, Achilles and Goudos, Sotirios K and Kalamaras, Georgios and Karydas, Stathis and Gotsis, Antonis G and Maliatsos, Konstantinos},\n editor = {Vlontzos, George and Koutsou, Stavriani},\n booktitle = {Proceedings of the 9th International Conference on Information and Communication Technologies in Agriculture, Food and Environment (HAICTA 2020), Thessaloniki, Greece, September 24-27, 2020}\n}
\n
\n\n\n
\n Irrigation is the major cause of water consumption in agriculture. It contributes to\nincreasing crop productivity, but it is also a means to the preservation of water\nresources. Therefore, advancing the rational exploitation of water through smart\nirrigation in agriculture is essential for improving crop yield, decreasing costs, and\ncontributing to environmental sustainability. The intense use of Information and\nCommunication Technologies (ICT) has the potential to reduce the amount of water\nsupplied to the crop. The Internet of Things (IoT) is the natural choice for irrigation\napplications, even though the integration of different hardware, software and\nconnectivity technologies required for making it work seamlessly in practice, while\nkeeping the cost at reasonable levels, is still at an early stage. Low-Power Wide-Area\nAccess (LPWA) is considered an emerging class of connectivity technology,\nencompassing radio protocols capable of covering large geographic areas, while\ndelivering multiple years of operation for devices running on batteries with a single\ncharge. LPWA technologies have the potential to provide a step change in the\nenablement of energy efficient IoT applications. In this respect, LPWA networks are\ncurrently one of the most suitable approach for end-to-end connectivity in the farming\ndomain. LoRaWAN is probably one of the most promising LPWA technologies,\nwhich offers long range, low power consumption, and secure data transmission, over\nlicense-free frequency bands. It can achieve data transmission ranges up to 15 km in\nopen areas using a single gateway, and is supported by a wide community of industrial\nplayers, academics, IoT makers, and software developers.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (25)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Joint power allocation and user association in non-orthogonal multiple access networks: An evolutionary approach.\n \n \n \n\n\n \n Goudos, S.\n\n\n \n\n\n\n Physical Communication, 37. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Joint power allocation and user association in non-orthogonal multiple access networks: An evolutionary approach},\n type = {article},\n year = {2019},\n keywords = {5G,Evolutionary algorithms,NOMA,Non-orthogonal multiple access,Power control,User association},\n volume = {37},\n id = {763fb5d0-03c4-3c3e-8fa0-d7fef5616e9c},\n created = {2020-02-29T16:57:41.756Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-05-12T20:32:45.805Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Goudos2019g},\n private_publication = {false},\n abstract = {© 2019 Elsevier B.V. In this paper, the problem of joint power allocation and user association is studied for non-orthogonal multiple access (NOMA) downlink networks with multiple base stations (BSs). We consider that users are grouped into orthogonal clusters to allocate into different physical resource blocks (PRBs). The problem is formulated using two different utility functions. The first is the maximization of the weighted sum rate and the other is the maximization of the minimum achievable user rate. We apply two different evolutionary algorithms in order to solve this problem. Namely, the recently introduced Salp Swarm Algorithm (SSA) and the popular Particle Swarm Optimization (PSO). The simulation results show that the above-described problem can be effectively solved by both algorithms. SSA is more efficient in average than PSO. The effect of increasing the number of user is also studied. In this case the problem becomes more difficult to solve, which indicates that more network resources are required.},\n bibtype = {article},\n author = {Goudos, S.K.},\n doi = {10.1016/j.phycom.2019.100841},\n journal = {Physical Communication}\n}
\n
\n\n\n
\n © 2019 Elsevier B.V. In this paper, the problem of joint power allocation and user association is studied for non-orthogonal multiple access (NOMA) downlink networks with multiple base stations (BSs). We consider that users are grouped into orthogonal clusters to allocate into different physical resource blocks (PRBs). The problem is formulated using two different utility functions. The first is the maximization of the weighted sum rate and the other is the maximization of the minimum achievable user rate. We apply two different evolutionary algorithms in order to solve this problem. Namely, the recently introduced Salp Swarm Algorithm (SSA) and the popular Particle Swarm Optimization (PSO). The simulation results show that the above-described problem can be effectively solved by both algorithms. SSA is more efficient in average than PSO. The effect of increasing the number of user is also studied. In this case the problem becomes more difficult to solve, which indicates that more network resources are required.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of an Ensemble Method to UAV Power Modeling for Cellular Communications.\n \n \n \n\n\n \n Goudos, S., K.; and Athanasiadou, G.\n\n\n \n\n\n\n IEEE Antennas and Wireless Propagation Letters, 18(11): 2340-2344. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Application of an Ensemble Method to UAV Power Modeling for Cellular Communications},\n type = {article},\n year = {2019},\n keywords = {Bagging,boosting,ensemble learning,machine learning,mobile communications,unmanned aerial vehicle (UAV)},\n pages = {2340-2344},\n volume = {18},\n id = {2ccc581a-afcb-3e46-91ff-1b19f9b1a718},\n created = {2020-02-29T16:57:41.990Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.736Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2019f},\n private_publication = {false},\n abstract = {In this letter, we apply ensemble learning methods for the prediction of the ground (cellular base station) to air (flying node) received signal strength (RSS) at different heights, for future mobile communications. We model the RSS using different ensemble methods. Moreover, we propose a new ensemble method that combines results from five different methods. The proposed method also uses a recently introduced evolutionary algorithm, the Salp Swarm Algorithm, for weight optimization. The proposed method outperforms all the other methods and common ensemble methods. In this context, the produced results are compared to measurements using representative performance indices and exhibit satisfactory accuracy.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Athanasiadou, Georgia},\n doi = {10.1109/LAWP.2019.2926784},\n journal = {IEEE Antennas and Wireless Propagation Letters},\n number = {11}\n}
\n
\n\n\n
\n In this letter, we apply ensemble learning methods for the prediction of the ground (cellular base station) to air (flying node) received signal strength (RSS) at different heights, for future mobile communications. We model the RSS using different ensemble methods. Moreover, we propose a new ensemble method that combines results from five different methods. The proposed method also uses a recently introduced evolutionary algorithm, the Salp Swarm Algorithm, for weight optimization. The proposed method outperforms all the other methods and common ensemble methods. In this context, the produced results are compared to measurements using representative performance indices and exhibit satisfactory accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Neural Networks and Random Forests: A Comparison Regarding Prediction of Propagation Path Loss for NB-IoT Networks.\n \n \n \n\n\n \n Sotiroudis, S., P.; Goudos, S., K.; and Siakavara, K.\n\n\n \n\n\n\n In 2019 8th International Conference on Modern Circuits and Systems Technologies, MOCAST 2019, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Neural Networks and Random Forests: A Comparison Regarding Prediction of Propagation Path Loss for NB-IoT Networks},\n type = {inproceedings},\n year = {2019},\n keywords = {artificial neural networks,path loss prediction,radio propagation,random forests},\n id = {26283152-f0cc-30b0-8062-d06652933f21},\n created = {2020-02-29T16:57:42.173Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.289Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Sotiroudis2019},\n private_publication = {false},\n abstract = {The prediction of propagation path loss is of great importance for all aspects of mobile communication. Machine learning methods, such as Artificial Neural Networks and Random Forests, can play a key role for its estimation. A comparison between the two methods for the frequencies of 900 MHz and 1800 MHz is being carried out in the work at hand. Both methods led to similar results.},\n bibtype = {inproceedings},\n author = {Sotiroudis, Sotirios P. and Goudos, Sotirios K. and Siakavara, Katherine},\n doi = {10.1109/MOCAST.2019.8741751},\n booktitle = {2019 8th International Conference on Modern Circuits and Systems Technologies, MOCAST 2019}\n}
\n
\n\n\n
\n The prediction of propagation path loss is of great importance for all aspects of mobile communication. Machine learning methods, such as Artificial Neural Networks and Random Forests, can play a key role for its estimation. A comparison between the two methods for the frequencies of 900 MHz and 1800 MHz is being carried out in the work at hand. Both methods led to similar results.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modelling Received Signal Power in Modern Mobile Communications with UAVs Using Ensemble Learning.\n \n \n \n\n\n \n Goudos, S., K.; Tsoulos, G., V.; and Athanasiadou, G.\n\n\n \n\n\n\n In 13th European Conference on Antennas and Propagation, EuCAP 2019, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Modelling Received Signal Power in Modern Mobile Communications with UAVs Using Ensemble Learning},\n type = {inproceedings},\n year = {2019},\n keywords = {UAV,bagging,boosting.,ensemble learing,mobile communications},\n id = {42bb84ee-54b8-3f98-abf6-ee53ac49cd3c},\n created = {2020-02-29T16:57:42.220Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.943Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2019e},\n private_publication = {false},\n abstract = {In this paper, we apply ensemble learning methods for the prediction of received signal strength (RSS) in mobile communications The training set is obtained by experimental data measurements taken from a unmanned aerial vehicle (UAV). We model the RSS using two different ensemble methods. One of these achieves better performance than a neural network in previous work. In this context, the produced results are compared to measurements using representative performance indices and exhibit satisfactory accuracy.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Tsoulos, George V. and Athanasiadou, Georgia},\n booktitle = {13th European Conference on Antennas and Propagation, EuCAP 2019}\n}
\n
\n\n\n
\n In this paper, we apply ensemble learning methods for the prediction of received signal strength (RSS) in mobile communications The training set is obtained by experimental data measurements taken from a unmanned aerial vehicle (UAV). We model the RSS using two different ensemble methods. One of these achieves better performance than a neural network in previous work. In this context, the produced results are compared to measurements using representative performance indices and exhibit satisfactory accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Prediction of Received Signal Power in Mobile Communications Using Different Machine Learning Algorithms:A Comparative Study.\n \n \n \n\n\n \n Karra, D.; Goudos, S., K.; Tsoulos, G., V.; and Athanasiadou, G.\n\n\n \n\n\n\n In 5th Panhellenic Conference on Electronics and Telecommunications, PACET 2019, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Prediction of Received Signal Power in Mobile Communications Using Different Machine Learning Algorithms:A Comparative Study},\n type = {inproceedings},\n year = {2019},\n keywords = {UAV,cellular communications,ensemble learning,machine learning,voting regressor},\n id = {7ef523a6-cbcc-3e09-88ec-6b94d94f1756},\n created = {2020-02-29T16:57:43.173Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.386Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Karra2019},\n private_publication = {false},\n abstract = {In this paper, we apply and compare various machine learning techniques to predict the received signal strength (RSS) in cellular communications. We generate the training set using experimental measurements from an unmanned aerial vehicle (UAV). We make a prediction model for the RSS using five base learners. We create a new ensemble method that averages the results from these five base learners. The proposed model outperforms all the original base learners. The obtained numerical results are compared with the original data from the test dataset using representative performance indicators and exhibit good precision.},\n bibtype = {inproceedings},\n author = {Karra, Despoina and Goudos, Sotirios K. and Tsoulos, George V. and Athanasiadou, Georgia},\n doi = {10.1109/PACET48583.2019.8956271},\n booktitle = {5th Panhellenic Conference on Electronics and Telecommunications, PACET 2019}\n}
\n
\n\n\n
\n In this paper, we apply and compare various machine learning techniques to predict the received signal strength (RSS) in cellular communications. We generate the training set using experimental measurements from an unmanned aerial vehicle (UAV). We make a prediction model for the RSS using five base learners. We create a new ensemble method that averages the results from these five base learners. The proposed model outperforms all the original base learners. The obtained numerical results are compared with the original data from the test dataset using representative performance indicators and exhibit good precision.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Low-Cost Dual-Band E-shaped Patch Antenna for Energy Harvesting Applications Using Grey Wolf Optimizer.\n \n \n \n\n\n \n Boursianis, A., D.; Goudos, S., K.; Yioultsis, T., V.; and Siakavara, K.\n\n\n \n\n\n\n In 13th European Conference on Antennas and Propagation, EuCAP 2019, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Low-Cost Dual-Band E-shaped Patch Antenna for Energy Harvesting Applications Using Grey Wolf Optimizer},\n type = {inproceedings},\n year = {2019},\n keywords = {E-shaped antenna,Energy harvesting,Grey Wolf Optimizer (GWO) algorithm,LoRaWAN,Mobile communications,Patch antenna},\n id = {f5b42c30-98a3-3c57-b463-2022e1308f9d},\n created = {2020-02-29T16:57:43.226Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:48.809Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Boursianis2019b},\n private_publication = {false},\n abstract = {Radio frequency energy harvesting is a well promising technique for proactive energy replenishment in next-generation wireless networks. To meet the challenging requirements of power consumption in future wireless networks, new antennas must be designed. In this paper, we refer to the antenna design problem for energy harvesting applications, by introducing a low-cost dual-band E-shaped patch antenna that operates at LoRaWAN and mobile communication frequency bands. The designed antenna is tuned at two different frequencies (866 MHz, 937 MHz) with a satisfactory bandwidth for both frequency bands.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D. and Goudos, Sotirios K. and Yioultsis, Traianos V. and Siakavara, Katherine},\n booktitle = {13th European Conference on Antennas and Propagation, EuCAP 2019}\n}
\n
\n\n\n
\n Radio frequency energy harvesting is a well promising technique for proactive energy replenishment in next-generation wireless networks. To meet the challenging requirements of power consumption in future wireless networks, new antennas must be designed. In this paper, we refer to the antenna design problem for energy harvesting applications, by introducing a low-cost dual-band E-shaped patch antenna that operates at LoRaWAN and mobile communication frequency bands. The designed antenna is tuned at two different frequencies (866 MHz, 937 MHz) with a satisfactory bandwidth for both frequency bands.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Patch Antenna Design for C2C Communication Systems Using Monarch Butterfly Optimization.\n \n \n \n\n\n \n Boursianis, A., D.; Goudos, S., K.; Kantartzis, N., V.; and Koulouridis, S.\n\n\n \n\n\n\n In 2019 International Workshop on Antenna Technology, iWAT 2019, pages 239-241, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Patch Antenna Design for C2C Communication Systems Using Monarch Butterfly Optimization},\n type = {inproceedings},\n year = {2019},\n keywords = {C2C communication,E-shaped patch antenna,meta-heuristic algorithm,monarch butterfly optimization},\n pages = {239-241},\n id = {5cddbe75-501f-30a7-b891-5b411808ffa1},\n created = {2020-02-29T16:57:43.258Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.481Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Boursianis2019a},\n private_publication = {false},\n abstract = {This paper describes an E-shaped patch antenna design which is suitable for Car-to-Car (C2C) communication. The antenna design is obtained by applying a simple and efficient optimization technique, called Monarch Butterfly Optimization. Simulation results demonstrate quite satisfactory values of the antenna's operational bandwidth, maximum gain, and 3 dB beam-width.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D. and Goudos, Sotirios K. and Kantartzis, Nikolaos V. and Koulouridis, Stavros},\n doi = {10.1109/IWAT.2019.8730626},\n booktitle = {2019 International Workshop on Antenna Technology, iWAT 2019}\n}
\n
\n\n\n
\n This paper describes an E-shaped patch antenna design which is suitable for Car-to-Car (C2C) communication. The antenna design is obtained by applying a simple and efficient optimization technique, called Monarch Butterfly Optimization. Simulation results demonstrate quite satisfactory values of the antenna's operational bandwidth, maximum gain, and 3 dB beam-width.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Fast design of multiband fractal antennas through a system-by-design approach for NB-IoT applications.\n \n \n \n\n\n \n Salucci, M.; Anselmi, N.; Goudos, S.; and Massa, A.\n\n\n \n\n\n\n Eurasip Journal on Wireless Communications and Networking, 2019(1). 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Fast design of multiband fractal antennas through a system-by-design approach for NB-IoT applications},\n type = {article},\n year = {2019},\n keywords = {Antenna synthesis,Fractals,Internet of Things (IoT),Multi-band antennas,Optimization,System-by-design},\n volume = {2019},\n id = {d72f75ae-5d76-3177-83b0-33e6b28437a2},\n created = {2020-02-29T16:57:43.274Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.098Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Salucci2019},\n private_publication = {false},\n abstract = {The efficient design of compact antennas operating over multiple bands suitable for the Internet of Things (IoT) is addressed by means of an instance of the system-by-design (SbD) paradigm. More specifically, an iterative strategy that combines different software modules for the search spaceexploration, the fast physicalmodeling of the radiators, and the quality evaluation of the guess solutions is proposed. To enable such a SbD instance, an innovative strategy that exploits an orthogonal array (OA) scheme to determine the training set of a Learning-by-Example (LBE) algorithm based on a support vector regressor (SVR) is introduced for the efficient physicalmodeling of the layout to be optimized. The features and the potentialities of the proposed methodological approach are assessed in different applicative scenarios by considering representative numerical and experimental validation examples.},\n bibtype = {article},\n author = {Salucci, Marco and Anselmi, Nicola and Goudos, Sotirios and Massa, Andrea},\n doi = {10.1186/s13638-019-1386-4},\n journal = {Eurasip Journal on Wireless Communications and Networking},\n number = {1}\n}
\n
\n\n\n
\n The efficient design of compact antennas operating over multiple bands suitable for the Internet of Things (IoT) is addressed by means of an instance of the system-by-design (SbD) paradigm. More specifically, an iterative strategy that combines different software modules for the search spaceexploration, the fast physicalmodeling of the radiators, and the quality evaluation of the guess solutions is proposed. To enable such a SbD instance, an innovative strategy that exploits an orthogonal array (OA) scheme to determine the training set of a Learning-by-Example (LBE) algorithm based on a support vector regressor (SVR) is introduced for the efficient physicalmodeling of the layout to be optimized. The features and the potentialities of the proposed methodological approach are assessed in different applicative scenarios by considering representative numerical and experimental validation examples.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Communication protocols for the IoT-based smart grid.\n \n \n \n\n\n \n Goudos, S., K.; Sarigiannidis, P.; Dallas, P., I.; and Kyriazakos, S.\n\n\n \n\n\n\n Power Systems, pages 55-83. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2019},\n pages = {55-83},\n issue = {9783030031695},\n id = {9539ed5c-8916-3310-b5a0-8db0aac93e22},\n created = {2020-02-29T16:57:43.313Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.225Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2019d},\n private_publication = {false},\n abstract = {The Internet of Things (IoT) is the communications paradigm that can provide the potential of ultimate communication. The IoT paradigm describes communication not only human to human (H2H) but also machine to machine (M2M) without the need of human interference. The Smart Grid (SG) is the new paradigm that enables highly efficient energy production, transport, and consumption along the whole chain, from the source to the user. SG is the combination of the classical power grid with emerging communication and information technologies. IoT based smart grid will be one of the largest instantiation of the IoT in the next future. In this chapter, we examine, review and present the current IoT enabler technologies for smart grid applications, starting from the physical layer to the application and data layer.},\n bibtype = {inbook},\n author = {Goudos, Sotirios K. and Sarigiannidis, Panagiotis and Dallas, Panagiotis I. and Kyriazakos, Sofoklis},\n doi = {10.1007/978-3-030-03640-9_4},\n chapter = {Communication protocols for the IoT-based smart grid},\n title = {Power Systems}\n}
\n
\n\n\n
\n The Internet of Things (IoT) is the communications paradigm that can provide the potential of ultimate communication. The IoT paradigm describes communication not only human to human (H2H) but also machine to machine (M2M) without the need of human interference. The Smart Grid (SG) is the new paradigm that enables highly efficient energy production, transport, and consumption along the whole chain, from the source to the user. SG is the combination of the classical power grid with emerging communication and information technologies. IoT based smart grid will be one of the largest instantiation of the IoT in the next future. In this chapter, we examine, review and present the current IoT enabler technologies for smart grid applications, starting from the physical layer to the application and data layer.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of New hybrid jaya grey Wolf optimizer to antenna design for 5G communications systems.\n \n \n \n\n\n \n Goudos, S., K.; Yioultsis, T., V.; Boursianis, A., D.; Psannis, K., E.; and Siakavara, K.\n\n\n \n\n\n\n IEEE Access, 7: 71061-71071. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Application of New hybrid jaya grey Wolf optimizer to antenna design for 5G communications systems},\n type = {article},\n year = {2019},\n keywords = {5G,Grey Wolf Optimizer,Jaya algorithm,evolutionary algorithms,mmWave,mobile communications,optimization methods,patch antenna},\n pages = {71061-71071},\n volume = {7},\n id = {d6c25c77-e1bd-3a2f-86ac-8ce962fb472a},\n created = {2020-02-29T16:57:43.798Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.829Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2019c},\n private_publication = {false},\n abstract = {The new expected fifth generation (5G) communication systems will serve users with data rates of several Gbps and will allow running new applications in mobile devices. In order to do so, several design challenges have to be met. One of these is the antenna design and fabrication for the 5G mobile devices, especially in the millimeter wave frequencies. In this paper, we address the above issue by designing two different antennas for 3.7 and 26 GHz. We apply a design procedure based on a new proposed evolutionary algorithm, the Grey Wolf Optimizer-Jaya (GWO-Jaya), which combines features from both GWO and Jaya. We evaluate the new algorithm on a set of widely exploited benchmark functions. We design both antennas using the new proposed algorithm. Moreover, we evaluate their performance characteristics through fabrication and measurements. Both antennas are circularly polarized at an acceptable bandwidth and also exhibit wide-band behavior. In both cases, simulation and measurement results are in good agreement.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Yioultsis, Traianos V. and Boursianis, Achilles D. and Psannis, Kostas E. and Siakavara, Katherine},\n doi = {10.1109/ACCESS.2019.2919116},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n The new expected fifth generation (5G) communication systems will serve users with data rates of several Gbps and will allow running new applications in mobile devices. In order to do so, several design challenges have to be met. One of these is the antenna design and fabrication for the 5G mobile devices, especially in the millimeter wave frequencies. In this paper, we address the above issue by designing two different antennas for 3.7 and 26 GHz. We apply a design procedure based on a new proposed evolutionary algorithm, the Grey Wolf Optimizer-Jaya (GWO-Jaya), which combines features from both GWO and Jaya. We evaluate the new algorithm on a set of widely exploited benchmark functions. We design both antennas using the new proposed algorithm. Moreover, we evaluate their performance characteristics through fabrication and measurements. Both antennas are circularly polarized at an acceptable bandwidth and also exhibit wide-band behavior. In both cases, simulation and measurement results are in good agreement.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Novel Methodology for Designing Antenna Arrays with Reduced Number of Elements Based on Differential Evolution with Ranking-Based Mutation Operators.\n \n \n \n\n\n \n Goudos, S., K.; Boursianis, A.; Siakavara, K.; Kantartzis, N.; and Psannis, K., E.\n\n\n \n\n\n\n In 2018 International Applied Computational Electromagnetics Society Symposium in China, ACES-China 2018, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Novel Methodology for Designing Antenna Arrays with Reduced Number of Elements Based on Differential Evolution with Ranking-Based Mutation Operators},\n type = {inproceedings},\n year = {2019},\n id = {2caa4d5a-cb3a-3407-9bbe-741dfc596ec5},\n created = {2020-02-29T16:57:43.831Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.347Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2019b},\n private_publication = {false},\n abstract = {This paper addresses the problem of designing linear arrays with reduced number of elements and design constraints including the minimum and maximum distance between two adjacent elements. The proposed design method is based on Differential Evolution (DE) with ranking-based mutation operators. In this case, some of the vectors in the mutation operator are probabilistically selected according to their ranking in the current population instead of recurring to a random selection as in the original DE. A comparative study among different DE algorithms is carried out to define the optimum element geometry and set of excitations that produce the desired pattern with a reduced number of elements. The results show that DE enhanced with ranking-based mutation operator is highly efficient and outperforms the common DE variants.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Boursianis, Achilles and Siakavara, Katherine and Kantartzis, Nikolaos and Psannis, Kostas E.},\n doi = {10.23919/ACESS.2018.8669304},\n booktitle = {2018 International Applied Computational Electromagnetics Society Symposium in China, ACES-China 2018}\n}
\n
\n\n\n
\n This paper addresses the problem of designing linear arrays with reduced number of elements and design constraints including the minimum and maximum distance between two adjacent elements. The proposed design method is based on Differential Evolution (DE) with ranking-based mutation operators. In this case, some of the vectors in the mutation operator are probabilistically selected according to their ranking in the current population instead of recurring to a random selection as in the original DE. A comparative study among different DE algorithms is carried out to define the optimum element geometry and set of excitations that produce the desired pattern with a reduced number of elements. The results show that DE enhanced with ranking-based mutation operator is highly efficient and outperforms the common DE variants.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Analysis, Synchronization and Microcontroller Implementation of a Generalized Hyperjerk System, with Application to Secure Communications Using a Descriptor Observer.\n \n \n \n\n\n \n Moysis, L.; Volos, C.; Takhi, H.; Kemih, K.; Goudos, S.; and Nistazakis, H., E.\n\n\n \n\n\n\n In 5th Panhellenic Conference on Electronics and Telecommunications, PACET 2019, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Analysis, Synchronization and Microcontroller Implementation of a Generalized Hyperjerk System, with Application to Secure Communications Using a Descriptor Observer},\n type = {inproceedings},\n year = {2019},\n keywords = {Chaos synchronization,descriptor systems,hyperjerk system,microcontroller implementation,observer design},\n id = {1e7044b6-32fa-39fd-aff0-a38504af5e52},\n created = {2020-02-29T16:57:44.818Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.084Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Moysis2019b},\n private_publication = {false},\n abstract = {This work proposes a novel hyperjerk system, as a generalization of a hyperjerk system proposed by Dalkiran and Sprott. Initially an analysis of the dynamical behavior of the system is performed. Then, the system is applied to the problem of secure communications. This is done by considering the transmitting signal as an additional state, leading to a rectangular descriptor system, for which an observer is designed, thus achieving synchronization and safe input reconstruction. The design is illustrated through numerical simulations and a microcontroller implementation.},\n bibtype = {inproceedings},\n author = {Moysis, Lazaros and Volos, Christos and Takhi, Hocine and Kemih, Karim and Goudos, Sotirios and Nistazakis, Hector E.},\n doi = {10.1109/PACET48583.2019.8956261},\n booktitle = {5th Panhellenic Conference on Electronics and Telecommunications, PACET 2019}\n}
\n
\n\n\n
\n This work proposes a novel hyperjerk system, as a generalization of a hyperjerk system proposed by Dalkiran and Sprott. Initially an analysis of the dynamical behavior of the system is performed. Then, the system is applied to the problem of secure communications. This is done by considering the transmitting signal as an additional state, leading to a rectangular descriptor system, for which an observer is designed, thus achieving synchronization and safe input reconstruction. The design is illustrated through numerical simulations and a microcontroller implementation.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Guest Editorial: Special Cluster on Machine Learning Applications in Electromagnetics, Antennas, and Propagation.\n \n \n \n\n\n \n Bayraktar, Z.; Anagnostou, D., E.; Goudos, S., K.; Campbell, S., D.; Werner, D., H.; and Massa, A.\n\n\n \n\n\n\n 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{\n title = {Guest Editorial: Special Cluster on Machine Learning Applications in Electromagnetics, Antennas, and Propagation},\n type = {misc},\n year = {2019},\n source = {IEEE Antennas and Wireless Propagation Letters},\n pages = {2220-2224},\n volume = {18},\n issue = {11},\n id = {fd9dbf44-e78f-3610-be7d-f40767faf6b5},\n created = {2020-02-29T16:57:44.822Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.412Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Bayraktar2019},\n private_publication = {false},\n bibtype = {misc},\n author = {Bayraktar, Zikri and Anagnostou, DImitris E. and Goudos, Sotirios K. and Campbell, Sawyer D. and Werner, Douglas H. and Massa, Andrea},\n doi = {10.1109/LAWP.2019.2945426}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Synchronization of a Chaotic System with Line Equilibrium using a Descriptor Observer for Secure Communication.\n \n \n \n\n\n \n Moysis, L.; Volos, C.; Pham, V., T.; Goudos, S.; Stouboulos, I.; and Gupta, M., K.\n\n\n \n\n\n\n In 2019 8th International Conference on Modern Circuits and Systems Technologies, MOCAST 2019, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Synchronization of a Chaotic System with Line Equilibrium using a Descriptor Observer for Secure Communication},\n type = {inproceedings},\n year = {2019},\n keywords = {Descriptor systems,chaos synchronization,hidden attractor,observer design,secure communication},\n id = {df3cb83d-aa72-3c33-98b6-af28cabf16e7},\n created = {2020-02-29T16:57:44.870Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.244Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Moysis2019a},\n private_publication = {false},\n abstract = {The problem of secure communication is considered for a chaotic system with hidden attractor, through the observer design approach for descriptor systems. By considering the transmitted signal as an additional state, the nonlinear system is rewritten as a semilinear rectangular descriptor system, for which an observer is constructed. The observer synchronization is feasible under some rank conditions on the system matrices, a common assumption on the nonlinearities and the feasibility of an LMI. The design scheme is showcased through numerical simulations.},\n bibtype = {inproceedings},\n author = {Moysis, Lazaros and Volos, Christos and Pham, Viet Thanh and Goudos, Sotirios and Stouboulos, Ioannis and Gupta, Mahendra Kumar},\n doi = {10.1109/MOCAST.2019.8742059},\n booktitle = {2019 8th International Conference on Modern Circuits and Systems Technologies, MOCAST 2019}\n}
\n
\n\n\n
\n The problem of secure communication is considered for a chaotic system with hidden attractor, through the observer design approach for descriptor systems. By considering the transmitted signal as an additional state, the nonlinear system is rewritten as a semilinear rectangular descriptor system, for which an observer is constructed. The observer synchronization is feasible under some rank conditions on the system matrices, a common assumption on the nonlinearities and the feasibility of an LMI. The design scheme is showcased through numerical simulations.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Radio Environment Maps for 5G Cognitive Radio Network.\n \n \n \n\n\n \n Kakalou, I.; Psannis, K.; Goudos, S., K.; Yioultsis, T., V.; Kantartzis, N., V.; and Ishibashi, Y.\n\n\n \n\n\n\n In 2019 8th International Conference on Modern Circuits and Systems Technologies, MOCAST 2019, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Radio Environment Maps for 5G Cognitive Radio Network},\n type = {inproceedings},\n year = {2019},\n keywords = {5G,Cognitive Radio,Network Function Virtualization,REM,SDN},\n id = {11b55a91-0bf4-3271-ad27-d52ada5f5939},\n created = {2020-02-29T16:57:44.873Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.950Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Kakalou2019},\n private_publication = {false},\n abstract = {Radio Environment Maps (REMs) have been introduced as a powerful tool in Cognitive Radio Networks to manage inter-transmitter interference. In the evolution of 5G heterogeneous ecosystem REMs are forced to be transformed to a more powerful tool hosting the diverse needs of an immense network. This paper reviews REMs and proposes an enhanced REM architecture for integration in the 5G network.},\n bibtype = {inproceedings},\n author = {Kakalou, Ioanna and Psannis, Kostas and Goudos, Sotirios K. and Yioultsis, Traianos V. and Kantartzis, Nikolaos V. and Ishibashi, Yutaka},\n doi = {10.1109/MOCAST.2019.8741554},\n booktitle = {2019 8th International Conference on Modern Circuits and Systems Technologies, MOCAST 2019}\n}
\n
\n\n\n
\n Radio Environment Maps (REMs) have been introduced as a powerful tool in Cognitive Radio Networks to manage inter-transmitter interference. In the evolution of 5G heterogeneous ecosystem REMs are forced to be transformed to a more powerful tool hosting the diverse needs of an immense network. This paper reviews REMs and proposes an enhanced REM architecture for integration in the 5G network.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Artificial Neural Network Optimal Modeling and Optimization of UAV Measurements for Mobile Communications Using the L-SHADE Algorithm.\n \n \n \n\n\n \n Goudos, S., K.; Tsoulos, G., V.; Athanasiadou, G.; Batistatos, M., C.; Zarbouti, D.; and Psannis, K., E.\n\n\n \n\n\n\n IEEE Transactions on Antennas and Propagation, 67(6): 4022-4031. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Artificial Neural Network Optimal Modeling and Optimization of UAV Measurements for Mobile Communications Using the L-SHADE Algorithm},\n type = {article},\n year = {2019},\n keywords = {Artificial neural network (ANN),cellular communications,differential evolution (DE),optimization methods,unmanned aerial vehicle (UAV)},\n pages = {4022-4031},\n volume = {67},\n id = {87a504a8-eeac-3ac2-ab15-5c1687465e6d},\n created = {2020-02-29T16:57:44.914Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.401Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2019a},\n private_publication = {false},\n abstract = {Channel modeling of wireless communications from unmanned aerial vehicles (UAVs) is an emerging research challenge. In this paper, we propose a solution to this issue by applying a new framework for the prediction of received signal strength (RSS) in mobile communications based on artificial neural networks (ANNs). The experimental data measurements are taken with a UAV at different altitudes. We apply several evolutionary algorithms (EAs) in conjunction with the Levenberg-Marquardt (LM) backpropagation algorithm in order to train different ANNs and in particular the L-SHADE algorithm, which self-adapts control parameters and dynamically adjusts population size. Five new hybrid training methods are designed by combining LM with self-adaptive differential evolution (DE) strategies. These new training methods obtain better performance to ANN weight optimization than the original LM method. The received results are compared with the real values using representative ANN performance indices and exhibit satisfactory accuracy.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Tsoulos, George V. and Athanasiadou, Georgia and Batistatos, Michael C. and Zarbouti, Dimitra and Psannis, Kostas E.},\n doi = {10.1109/TAP.2019.2905665},\n journal = {IEEE Transactions on Antennas and Propagation},\n number = {6}\n}
\n
\n\n\n
\n Channel modeling of wireless communications from unmanned aerial vehicles (UAVs) is an emerging research challenge. In this paper, we propose a solution to this issue by applying a new framework for the prediction of received signal strength (RSS) in mobile communications based on artificial neural networks (ANNs). The experimental data measurements are taken with a UAV at different altitudes. We apply several evolutionary algorithms (EAs) in conjunction with the Levenberg-Marquardt (LM) backpropagation algorithm in order to train different ANNs and in particular the L-SHADE algorithm, which self-adapts control parameters and dynamically adjusts population size. Five new hybrid training methods are designed by combining LM with self-adaptive differential evolution (DE) strategies. These new training methods obtain better performance to ANN weight optimization than the original LM method. The received results are compared with the real values using representative ANN performance indices and exhibit satisfactory accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multi-cell Massive MIMO Network Optimization towards power consumption in Suburban Scenarios.\n \n \n \n\n\n \n Matalatala, M.; Deruyck, M.; Tanghe, E.; Goudos, S.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n In 2018 Global Information Infrastructure and Networking Symposium, GIIS 2018, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Multi-cell Massive MIMO Network Optimization towards power consumption in Suburban Scenarios},\n type = {inproceedings},\n year = {2019},\n keywords = {5G,capacity-based deployment tool,coverage,energy efficiency,massive MIMO (Multiple Input Multiple Output),power consumption},\n id = {6825c723-16c1-350c-8358-52f301c0e272},\n created = {2020-02-29T16:57:44.918Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.826Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Matalatala2019a},\n private_publication = {false},\n abstract = {In this paper, we propose a simulation-based method to design low power multi-cell multi-user massive MIMO network by optimizing the positions of the base stations. Two realistic outdoor suburban areas have been considered in Ghent, Belgium (Europe) and Kinshasa, the Democratic Republic of Congo (Africa), in which the power consumption, the energy efficiency, the network capacity and the multiplexing gain are investigated and compared with LTE networks. The results of the simulations demonstrated that massive MIMO networks provide better performance in the crowded scenario where user's mobility is relatively low. A massive MIMO BS consumes 5-8 times less power than the LTE networks, with a pilot reuse pattern of 3 that helps obtaining a good tradeoff between the higher bit rate requested and the low power requirements in cellular environment.},\n bibtype = {inproceedings},\n author = {Matalatala, Michel and Deruyck, Margot and Tanghe, Emmeric and Goudos, Sotirios and Martens, Luc and Joseph, Wout},\n doi = {10.1109/GIIS.2018.8635742},\n booktitle = {2018 Global Information Infrastructure and Networking Symposium, GIIS 2018}\n}
\n
\n\n\n
\n In this paper, we propose a simulation-based method to design low power multi-cell multi-user massive MIMO network by optimizing the positions of the base stations. Two realistic outdoor suburban areas have been considered in Ghent, Belgium (Europe) and Kinshasa, the Democratic Republic of Congo (Africa), in which the power consumption, the energy efficiency, the network capacity and the multiplexing gain are investigated and compared with LTE networks. The results of the simulations demonstrated that massive MIMO networks provide better performance in the crowded scenario where user's mobility is relatively low. A massive MIMO BS consumes 5-8 times less power than the LTE networks, with a pilot reuse pattern of 3 that helps obtaining a good tradeoff between the higher bit rate requested and the low power requirements in cellular environment.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Novel Design Approach for 5G Massive MIMO and NB-IoT Green Networks Using a Hybrid Jaya-Differential Evolution Algorithm.\n \n \n \n\n\n \n Goudos, S.; Deruyck, M.; Plets, D.; Martens, L.; Psannis, K.; Sarigiannidis, P.; and Joseph, W.\n\n\n \n\n\n\n IEEE Access, 7. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A Novel Design Approach for 5G Massive MIMO and NB-IoT Green Networks Using a Hybrid Jaya-Differential Evolution Algorithm},\n type = {article},\n year = {2019},\n keywords = {4G,5G,Massive MIMO,NB-IoT,evolutionary algorithms,green networks,hybrid networks,network design,network planning,power consumption},\n volume = {7},\n id = {8f088628-9586-360d-8198-ab753b9973bf},\n created = {2020-02-29T16:57:45.226Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-05-12T20:32:46.684Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Goudos2019},\n private_publication = {false},\n abstract = {© 2013 IEEE. Our main objective is to reduce power consumption by responding to the instantaneous bit rate demand by the user for 4th Generation (4G) and 5th Generation (5G) Massive MIMO network configurations. Moreover, we present and address the problem of designing green LTE networks with the Internet of Things (IoT) nodes. We consider the new NarrowBand-IoT (NB-IoT) wireless technology that will emerge in current and future access networks. In this context, we apply emerging evolutionary algorithms in the context of green network design. We investigate three different cases to show the performance of the new proposed algorithm, namely the 4G, 5G Massive MIMO, and the NB-IoT technologies. More specifically, we investigate the Teaching-Learning-Optimization (TLBO), the Jaya algorithm, the self-adaptive differential evolution jDE algorithm, and other hybrid algorithms. We introduce a new hybrid algorithm named Jaya-jDE that uses concepts from both Jaya and jDE algorithms in an effective way. The results show that 5G Massive MIMO networks require about 50% less power consumption than the 4G ones, and the NB-IoT in-band deployment requires about 10% less power than guard-band deployment. Moreover, Jaya-jDE emerges as the best algorithm based on the results.},\n bibtype = {article},\n author = {Goudos, S.K. and Deruyck, M. and Plets, D. and Martens, L. and Psannis, K.E. and Sarigiannidis, P. and Joseph, W.},\n doi = {10.1109/ACCESS.2019.2932042},\n journal = {IEEE Access}\n}
\n
\n\n\n
\n © 2013 IEEE. Our main objective is to reduce power consumption by responding to the instantaneous bit rate demand by the user for 4th Generation (4G) and 5th Generation (5G) Massive MIMO network configurations. Moreover, we present and address the problem of designing green LTE networks with the Internet of Things (IoT) nodes. We consider the new NarrowBand-IoT (NB-IoT) wireless technology that will emerge in current and future access networks. In this context, we apply emerging evolutionary algorithms in the context of green network design. We investigate three different cases to show the performance of the new proposed algorithm, namely the 4G, 5G Massive MIMO, and the NB-IoT technologies. More specifically, we investigate the Teaching-Learning-Optimization (TLBO), the Jaya algorithm, the self-adaptive differential evolution jDE algorithm, and other hybrid algorithms. We introduce a new hybrid algorithm named Jaya-jDE that uses concepts from both Jaya and jDE algorithms in an effective way. The results show that 5G Massive MIMO networks require about 50% less power consumption than the 4G ones, and the NB-IoT in-band deployment requires about 10% less power than guard-band deployment. Moreover, Jaya-jDE emerges as the best algorithm based on the results.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multi-objective optimization of massive MIMO 5G wireless networks towards power consumption, uplink and downlink exposure.\n \n \n \n\n\n \n Matalatala, M.; Deruyck, M.; Shikhantsov, S.; Tanghe, E.; Plets, D.; Goudos, S.; Psannis, K., E.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n Applied Sciences (Switzerland), 9(22). 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Multi-objective optimization of massive MIMO 5G wireless networks towards power consumption, uplink and downlink exposure},\n type = {article},\n year = {2019},\n keywords = {5G,Exposure,Massive MIMO,Multi-objective,Optimization},\n volume = {9},\n id = {b1078d78-9bf3-3b89-ba8c-cc7117e7c593},\n created = {2020-02-29T16:57:45.401Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.144Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Matalatala2019},\n private_publication = {false},\n abstract = {The rapid development of the number of wireless broadband devices requires that the induced uplink exposure be addressed during the design of the future wireless networks, in addition to the downlink exposure due to the transmission of the base stations. In this paper, the positions and power levels of massive MIMO-LTE (Multiple Input Multiple Output-Long Term Evolution) base stations are optimized towards low power consumption, low downlink and uplink electromagnetic exposure and maximal user coverage. A suburban area in Ghent, Belgium has been considered. The results show that the higher the number of BS antenna elements, the fewer number of BSs the massive MIMO network requires. This leads to a decrease of the downlink exposure (-12% for the electric field and-32% for the downlink dose) and an increase of the uplink exposure (+70% for the uplink dose), whereas both downlink and uplink exposure increase with the number of simultaneous served users (+174% for the electric field and +22% for the uplink SAR). The optimal massive MIMO network presenting the better trade-off between the power consumption, the total dose and the user coverage has been obtained with 37 64-antenna BSs. Moreover, the level of the downlink electromagnetic exposure (electric field) of the massive MIMO network is 5 times lower than the 4G reference scenario.},\n bibtype = {article},\n author = {Matalatala, Michel and Deruyck, Margot and Shikhantsov, Sergei and Tanghe, Emmeric and Plets, David and Goudos, Sotirios and Psannis, Kostas E. and Martens, Luc and Joseph, Wout},\n doi = {10.3390/APP9224974},\n journal = {Applied Sciences (Switzerland)},\n number = {22}\n}
\n
\n\n\n
\n The rapid development of the number of wireless broadband devices requires that the induced uplink exposure be addressed during the design of the future wireless networks, in addition to the downlink exposure due to the transmission of the base stations. In this paper, the positions and power levels of massive MIMO-LTE (Multiple Input Multiple Output-Long Term Evolution) base stations are optimized towards low power consumption, low downlink and uplink electromagnetic exposure and maximal user coverage. A suburban area in Ghent, Belgium has been considered. The results show that the higher the number of BS antenna elements, the fewer number of BSs the massive MIMO network requires. This leads to a decrease of the downlink exposure (-12% for the electric field and-32% for the downlink dose) and an increase of the uplink exposure (+70% for the uplink dose), whereas both downlink and uplink exposure increase with the number of simultaneous served users (+174% for the electric field and +22% for the uplink SAR). The optimal massive MIMO network presenting the better trade-off between the power consumption, the total dose and the user coverage has been obtained with 37 64-antenna BSs. Moreover, the level of the downlink electromagnetic exposure (electric field) of the massive MIMO network is 5 times lower than the 4G reference scenario.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Advancing Rational Exploitation of Water Irrigation Using 5G-IoT Capabilities: The AREThOU5A Project.\n \n \n \n\n\n \n Boursianis, A., D.; Papadopoulou, M., S.; Damantoulakis, P.; Karampatea, A.; Doanis, P.; Geourgoulas, D.; Skoufa, A.; Valavanis, D.; Apostolidis, C.; Babas, D., G.; Baltzis, K., B.; Kaifas, T., N.; Siozios, K.; Siskos, S.; Samaras, T.; Siakavara, K.; Nikolaidis, S.; Goudos, S., K.; Liopa-Tsakalidi, A.; Barouchas, P.; Kasimis, I.; Kalamaras, G.; Merkouris, D.; Perrakis, G.; Tsirogiannis, C.; Gotsis, A.; and Maliatsos, K.\n\n\n \n\n\n\n In 2019 IEEE 29th International Symposium on Power and Timing Modeling, Optimization and Simulation, PATMOS 2019, pages 127-132, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Advancing Rational Exploitation of Water Irrigation Using 5G-IoT Capabilities: The AREThOU5A Project},\n type = {inproceedings},\n year = {2019},\n keywords = {Internet of Things,Low-power wide-access technology,RF energy harvesting,Smart Agriculture},\n pages = {127-132},\n id = {53ca9c71-16e3-3b0b-b916-4fe3bb33a9ab},\n created = {2020-02-29T16:57:45.444Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.276Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Boursianis2019},\n private_publication = {false},\n abstract = {Water scarcity and desertification are considered to be among the greatest challenges of humanity over the coming decades. Worldwide, agriculture accounts to 69% of total water usage, while industry accounts for 23%, and urban use to 8%. In Greece, a rural development model and poor farming practices have resulted in an overwhelming 83% of total water consumption to be directed to farming uses. Furthermore, excessive use of water in agriculture combined with existing pesticides and fertilizers usage levels creates exponential problems in the water cycle in Greece. Taking into account the above challenges, the AREThOU5A Project aims to exploit the state-of-the-art technologies and, in particular, the emerging developments in the field of Internet of Things (IoT) as a means to promote rational use of water resources in agriculture. In particular, AREThOU5A Project aims at accelerating penetration of low-power wide-access (LPWA) technologies through a series of research and innovation actions focusing on the design, development, operation and commercial exploitation of relevant hardware/software IoT applications. Preliminary results of the AREThOU5A Project are depicted and future remarks are outlined.},\n bibtype = {inproceedings},\n author = {Boursianis, A. D. and Papadopoulou, M. S. and Damantoulakis, P. and Karampatea, A. and Doanis, P. and Geourgoulas, D. and Skoufa, A. and Valavanis, D. and Apostolidis, C. and Babas, D. G. and Baltzis, K. B. and Kaifas, T. N. and Siozios, K. and Siskos, S. and Samaras, T. and Siakavara, K. and Nikolaidis, S. and Goudos, S. K. and Liopa-Tsakalidi, A. and Barouchas, P. and Kasimis, I. and Kalamaras, G. and Merkouris, D. and Perrakis, G. and Tsirogiannis, C. and Gotsis, A. and Maliatsos, K.},\n doi = {10.1109/PATMOS.2019.8862146},\n booktitle = {2019 IEEE 29th International Symposium on Power and Timing Modeling, Optimization and Simulation, PATMOS 2019}\n}
\n
\n\n\n
\n Water scarcity and desertification are considered to be among the greatest challenges of humanity over the coming decades. Worldwide, agriculture accounts to 69% of total water usage, while industry accounts for 23%, and urban use to 8%. In Greece, a rural development model and poor farming practices have resulted in an overwhelming 83% of total water consumption to be directed to farming uses. Furthermore, excessive use of water in agriculture combined with existing pesticides and fertilizers usage levels creates exponential problems in the water cycle in Greece. Taking into account the above challenges, the AREThOU5A Project aims to exploit the state-of-the-art technologies and, in particular, the emerging developments in the field of Internet of Things (IoT) as a means to promote rational use of water resources in agriculture. In particular, AREThOU5A Project aims at accelerating penetration of low-power wide-access (LPWA) technologies through a series of research and innovation actions focusing on the design, development, operation and commercial exploitation of relevant hardware/software IoT applications. Preliminary results of the AREThOU5A Project are depicted and future remarks are outlined.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Analysis of a Chaotic System with Line Equilibrium and Its Application to Secure Communications Using a Descriptor Observer.\n \n \n \n \n\n\n \n Moysis, L.; Volos, C.; Pham, V., T.; Goudos, S.; Stouboulos, I.; Gupta, M., K.; and Mishra, V., K.\n\n\n \n\n\n\n Technologies, 7(4). 2019.\n \n\n\n\n
\n\n\n\n \n \n \"AnalysisWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Analysis of a Chaotic System with Line Equilibrium and Its Application to Secure Communications Using a Descriptor Observer},\n type = {article},\n year = {2019},\n volume = {7},\n websites = {%3CGo,to},\n id = {0796f5e6-6d33-384b-b429-957f8b69d891},\n created = {2020-03-03T08:54:40.413Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T12:37:16.050Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Moysis2019},\n source_type = {article},\n private_publication = {false},\n abstract = {In this work a novel chaotic system with a line equilibrium is presented. First, a dynamical analysis on the system is performed, by computing its bifurcation diagram, continuation diagram, phase portraits and Lyapunov exponents. Then, the system is applied to the problem of secure communication. We assume that the transmitted signal is an additional state. For this reason, the nonlinear system is rewritten in a rectangular descriptor form and then an observer is constructed for achieving synchronization and input reconstruction. If we assume some rank conditions (on the nonlinearities and the solvability of a linear matrix inequality (LMI)) on the system matrices then the observer synchronization can be feasible. We evaluate and demonstrate our approach with specific numerical results.},\n bibtype = {article},\n author = {Moysis, L and Volos, C and Pham, V T and Goudos, S and Stouboulos, I and Gupta, M K and Mishra, V K},\n doi = {10.3390/technologies7040076},\n journal = {Technologies},\n number = {4}\n}
\n
\n\n\n
\n In this work a novel chaotic system with a line equilibrium is presented. First, a dynamical analysis on the system is performed, by computing its bifurcation diagram, continuation diagram, phase portraits and Lyapunov exponents. Then, the system is applied to the problem of secure communication. We assume that the transmitted signal is an additional state. For this reason, the nonlinear system is rewritten in a rectangular descriptor form and then an observer is constructed for achieving synchronization and input reconstruction. If we assume some rank conditions (on the nonlinearities and the solvability of a linear matrix inequality (LMI)) on the system matrices then the observer synchronization can be feasible. We evaluate and demonstrate our approach with specific numerical results.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Energy Efficient Modulation Scheme for Body-Centric Terahertz (THz) Nanonetworks dagger.\n \n \n \n \n\n\n \n Vavouris, A., K.; Dervisi, F., D.; Papanikolaou, V., K.; Diamantoulakis, P., D.; Karagiannidis, G., K.; and Goudos, S., K.\n\n\n \n\n\n\n Technologies, 7(1). 2019.\n \n\n\n\n
\n\n\n\n \n \n \"AnWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {An Energy Efficient Modulation Scheme for Body-Centric Terahertz (THz) Nanonetworks dagger},\n type = {article},\n year = {2019},\n volume = {7},\n websites = {%3CGo,to},\n id = {0bbfd758-217d-3e6d-8f80-fc6b094e9808},\n created = {2020-03-03T08:54:40.426Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T12:37:16.041Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Vavouris2019},\n source_type = {article},\n private_publication = {false},\n abstract = {In body-centric communications, energy efficiency is a critical performance metric, while the achievable data rate is not of primary concern. In this paper we present a novel modulation scheme, which can be efficiently used in body-centric terahertz (THz) nanonetworks. The proposed scheme is a combination of the time-spread On-Off keying (TS–OOK) and the pulse position modulation (PPM) and presents lower energy consumption, compared to other existing methods as TS–OOK, at a minor cost to the data rate. Furthermore, another important aspect is that the proposed modulation scheme can be effectively used to mitigate the impact of the specific kind of noise in THz body-centric communications, thus leading to better error performance. Finally, we present analytical and simulation results in order to compare the new scheme with the existing TS–OOK.},\n bibtype = {article},\n author = {Vavouris, A K and Dervisi, F D and Papanikolaou, V K and Diamantoulakis, P D and Karagiannidis, G K and Goudos, S K},\n doi = {10.3390/technologies7010014},\n journal = {Technologies},\n number = {1}\n}
\n
\n\n\n
\n In body-centric communications, energy efficiency is a critical performance metric, while the achievable data rate is not of primary concern. In this paper we present a novel modulation scheme, which can be efficiently used in body-centric terahertz (THz) nanonetworks. The proposed scheme is a combination of the time-spread On-Off keying (TS–OOK) and the pulse position modulation (PPM) and presents lower energy consumption, compared to other existing methods as TS–OOK, at a minor cost to the data rate. Furthermore, another important aspect is that the proposed modulation scheme can be effectively used to mitigate the impact of the specific kind of noise in THz body-centric communications, thus leading to better error performance. Finally, we present analytical and simulation results in order to compare the new scheme with the existing TS–OOK.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of Opposition Teaching Learning Based Optimization for 5G Communication Systems Antenna Design.\n \n \n \n\n\n \n Boursianis, A., D.; Sotirios K. Goudos; Yioultsis, T., V.; and Siakavara, K.\n\n\n \n\n\n\n In Proceedings of the 22nd International Conference on the Computation of Electromagnetic Fields, 2019. COMPUMAG\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Application of Opposition Teaching Learning Based Optimization for 5G Communication Systems Antenna Design},\n type = {inproceedings},\n year = {2019},\n publisher = {COMPUMAG},\n city = {Paris, France},\n id = {c1e8f8bc-cbb3-3cc3-bb1e-4ad1e56fb5d7},\n created = {2022-07-14T18:38:19.213Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T12:33:11.595Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {bgys19},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {To address the complex optimization problem of antenna design for 5G wireless communication systems, we enhance the Teaching Learning Based Optimization (TLBO) algorithm with Opposition Based Learning (OBL). In this paper, we obtain new TLBO algorithms with different OBL variants. The different opposition schemes are evaluated in order to find the variant with the best performance. Numerical simulation results show that the current optimum opposition scheme outperforms the other algorithms and achieves the highest average ranking. Moreover, the COO-TLBO variant is applied in the design of aperture-coupled E-shaped patch antenna. Preliminary results demonstrate very satisfactory values of return loss in the desired frequencies of 5G wireless communication systems.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles D and Sotirios K. Goudos, undefined and Yioultsis, Traianos V and Siakavara, Katherine},\n booktitle = {Proceedings of the 22nd International Conference on the Computation of Electromagnetic Fields}\n}
\n
\n\n\n
\n To address the complex optimization problem of antenna design for 5G wireless communication systems, we enhance the Teaching Learning Based Optimization (TLBO) algorithm with Opposition Based Learning (OBL). In this paper, we obtain new TLBO algorithms with different OBL variants. The different opposition schemes are evaluated in order to find the variant with the best performance. Numerical simulation results show that the current optimum opposition scheme outperforms the other algorithms and achieves the highest average ranking. Moreover, the COO-TLBO variant is applied in the design of aperture-coupled E-shaped patch antenna. Preliminary results demonstrate very satisfactory values of return loss in the desired frequencies of 5G wireless communication systems.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Binary Grey Wolf Optimizer with Migration Operator for Discrete-Valued Antenna Design Problems.\n \n \n \n\n\n \n Sotirios K. Goudos; Boursianis, A., D.; Kantartzis, N., V.; Yioultsis, T., V.; Antonopoulos, C., S.; and Hybrid, A.\n\n\n \n\n\n\n In Proceedings of the 22nd International Conference on the Computation of Electromagnetic Fields, 2019. COMPUMAG\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Binary Grey Wolf Optimizer with Migration Operator for Discrete-Valued Antenna Design Problems},\n type = {inproceedings},\n year = {2019},\n publisher = {COMPUMAG},\n city = {Paris, France},\n id = {4608552e-5660-3772-bb6e-18a5d010e582},\n created = {2022-07-14T18:38:19.221Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T12:33:11.624Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {gbkyah19},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Several antenna design problems are discrete-valued. To address these problems binary-coded algorithms suited for combinatorial optimization problems are required. Grey Wolf Optimizer (GWO) is a recently proposed evolutionary algorithm based on grey wolves’ behavior. Although GWO was originally designed for real-valued problems, discrete versions also exist. In this paper, we propose a novel binary GWO algorithm that also uses a migration operator like in Biogeography Based Optimization (BBO). This new hybrid algorithm bGWO-BBO has been applied to several discrete valued problems in electromagnetics. These include array thinning, and a design case of an arbitrary-shaped dual-band patch antenna. The results show that bGWO-BBO is very efficient and outperforms other popular binary algorithms.},\n bibtype = {inproceedings},\n author = {Sotirios K. Goudos, undefined and Boursianis, Achilles D and Kantartzis, Nikolaos V and Yioultsis, Traianos V and Antonopoulos, Christos S and Hybrid, A},\n booktitle = {Proceedings of the 22nd International Conference on the Computation of Electromagnetic Fields}\n}
\n
\n\n\n
\n Several antenna design problems are discrete-valued. To address these problems binary-coded algorithms suited for combinatorial optimization problems are required. Grey Wolf Optimizer (GWO) is a recently proposed evolutionary algorithm based on grey wolves’ behavior. Although GWO was originally designed for real-valued problems, discrete versions also exist. In this paper, we propose a novel binary GWO algorithm that also uses a migration operator like in Biogeography Based Optimization (BBO). This new hybrid algorithm bGWO-BBO has been applied to several discrete valued problems in electromagnetics. These include array thinning, and a design case of an arbitrary-shaped dual-band patch antenna. The results show that bGWO-BBO is very efficient and outperforms other popular binary algorithms.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Introducing Quantum Tunneling Optimization in electromagnetics,The Constraint Relaxation Approach.\n \n \n \n\n\n \n Kaifas, T., N.; Babas, D., G.; and Goudos, S., K.\n\n\n \n\n\n\n In 13th European Conference on Antennas and Propagation, EuCAP 2019, 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Introducing Quantum Tunneling Optimization in electromagnetics,The Constraint Relaxation Approach},\n type = {inproceedings},\n year = {2019},\n id = {affab330-d981-313a-8332-327d2e553033},\n created = {2023-01-02T11:46:06.286Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T12:25:57.587Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2019f},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {There are two major categories of optimization algorithms employed in EM problems. They are the gradient based and the metaheuristic, (mainly evolution), based algorithms. In the work at hand we use both gradient and metaheuristic algorithms but the latter are not evolutionary. The contributed idea is based on another paradigm drawn from the laws of quantum physics and entails the integration of quantum tunneling concepts into a basic gradient search. It is well known in Quantum Mechanics that, Quantum Tunneling transforms local barriers into (semi-) transparent boundaries allowing the gradient search to pass through and continue to the global extremum. To the authors’ knowledge this is only physical phenomenon able to achieve the non-convex to convex transformation, (by going through and not over the barriers), and as such it deserves thorough study. Our work proves that gradient search equipped with quantum tunneling can be pulled out of the basin of a local extremum to provide high quality optimization results. In the current study we contribute the introduction of quantum tunneling in electromagnetics under the Constraint Relaxation Approach and provide proof of its potential.},\n bibtype = {inproceedings},\n author = {Kaifas, Theodoros N and Babas, Dimitrios G and Goudos, Sotirios K},\n booktitle = {13th European Conference on Antennas and Propagation, EuCAP 2019}\n}
\n
\n\n\n
\n There are two major categories of optimization algorithms employed in EM problems. They are the gradient based and the metaheuristic, (mainly evolution), based algorithms. In the work at hand we use both gradient and metaheuristic algorithms but the latter are not evolutionary. The contributed idea is based on another paradigm drawn from the laws of quantum physics and entails the integration of quantum tunneling concepts into a basic gradient search. It is well known in Quantum Mechanics that, Quantum Tunneling transforms local barriers into (semi-) transparent boundaries allowing the gradient search to pass through and continue to the global extremum. To the authors’ knowledge this is only physical phenomenon able to achieve the non-convex to convex transformation, (by going through and not over the barriers), and as such it deserves thorough study. Our work proves that gradient search equipped with quantum tunneling can be pulled out of the basin of a local extremum to provide high quality optimization results. In the current study we contribute the introduction of quantum tunneling in electromagnetics under the Constraint Relaxation Approach and provide proof of its potential.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (22)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Artificial neural network optimal modelling of received signal strength in mobile communications using UAV measurements.\n \n \n \n\n\n \n Goudos, S., K.; Tsoulos, G.; and Athanasiadou, G.\n\n\n \n\n\n\n In IET Conference Publications, volume 2018, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Artificial neural network optimal modelling of received signal strength in mobile communications using UAV measurements},\n type = {inproceedings},\n year = {2018},\n keywords = {ANN,DE,LM,Mobile communications,Propagation prediction,UAV},\n volume = {2018},\n issue = {CP741},\n id = {a365915c-1912-3029-9777-6e4a4da3262f},\n created = {2020-02-29T16:57:42.220Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.449Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2018e},\n private_publication = {false},\n abstract = {In this paper, we apply an alternative procedure for the prediction of received signal strength in mobile communications based on Artificial Neural Networks (ANN). We use experimental data measurements taken from an unmanned aerial vehicle (UAV) for ANN training. We apply several evolutionary algorithms (EAs) in conjunction with the Levenberg-Marquardt (LM) backpropagation algorithm in order to train different ANNs. We design two new hybrid training methods by combing LM with self-adaptive Differential Evolution (DE) strategies. These new training methods achieve better convergence of neural network weight optimization than the original LM method. The received results are compared to the real values using representative ANN performance indices and exhibit satisfactory accuracy.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Tsoulos, George and Athanasiadou, Georgia},\n doi = {10.1049/cp.2018.1079},\n booktitle = {IET Conference Publications}\n}
\n
\n\n\n
\n In this paper, we apply an alternative procedure for the prediction of received signal strength in mobile communications based on Artificial Neural Networks (ANN). We use experimental data measurements taken from an unmanned aerial vehicle (UAV) for ANN training. We apply several evolutionary algorithms (EAs) in conjunction with the Levenberg-Marquardt (LM) backpropagation algorithm in order to train different ANNs. We design two new hybrid training methods by combing LM with self-adaptive Differential Evolution (DE) strategies. These new training methods achieve better convergence of neural network weight optimization than the original LM method. The received results are compared to the real values using representative ANN performance indices and exhibit satisfactory accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Users Association in Ultra Dense THz Networks.\n \n \n \n\n\n \n Boulogeorgos, A., A., A.; Goudos, S., K.; and Alexiou, A.\n\n\n \n\n\n\n In IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, volume 2018-June, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Users Association in Ultra Dense THz Networks},\n type = {inproceedings},\n year = {2018},\n volume = {2018-June},\n id = {a34e30be-407c-3ea5-87ee-5c165e6ee61f},\n created = {2020-02-29T16:57:42.268Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.178Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Boulogeorgos2018},\n private_publication = {false},\n abstract = {In this paper, we formulate a novel throughput aware user association scheme for ultra dense terahertz (THz) networks. In more detail, we introduce a user association problem, which takes into account the THz channel particularities, the directivity of the BSs' and UEs' antennas, as well as their position and the UEs' minimum rate requirements. Moreover, we provide the solution framework, which is based on the grey wolf optimizer (GWO) and returns the optimal user association table. Finally, we present comparative simulation results, which validate the superiority of the proposed framework against the commonly-used particle swarm optimizer (PSO) approach.},\n bibtype = {inproceedings},\n author = {Boulogeorgos, Alexandros Apostolos A. and Goudos, Sotirios K. and Alexiou, Angeliki},\n doi = {10.1109/SPAWC.2018.8445950},\n booktitle = {IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC}\n}
\n
\n\n\n
\n In this paper, we formulate a novel throughput aware user association scheme for ultra dense terahertz (THz) networks. In more detail, we introduce a user association problem, which takes into account the THz channel particularities, the directivity of the BSs' and UEs' antennas, as well as their position and the UEs' minimum rate requirements. Moreover, we provide the solution framework, which is based on the grey wolf optimizer (GWO) and returns the optimal user association table. Finally, we present comparative simulation results, which validate the superiority of the proposed framework against the commonly-used particle swarm optimizer (PSO) approach.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multi-objective optimization in 5G wireless networks with massive MIMO.\n \n \n \n\n\n \n Goudos, S., K.; Diamantoulakis, P., D.; and Karagiannidis, G., K.\n\n\n \n\n\n\n IEEE Communications Letters, 22(11): 2346-2349. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Multi-objective optimization in 5G wireless networks with massive MIMO},\n type = {article},\n year = {2018},\n keywords = {5G,MIMO communications,cellular network,energy efficiency,optimization techniques},\n pages = {2346-2349},\n volume = {22},\n id = {80d9cec6-2b5a-309b-98a9-5b9d4f492f29},\n created = {2020-02-29T16:57:42.270Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.496Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2018d},\n private_publication = {false},\n abstract = {The integration of massive multiple-input multiple-output systems in the fifth generation (5G) of wireless networks requires the simultaneous consideration of several conflicting objectives, in order to achieve optimal performance and operation. In this letter, we present a complete optimization framework, which is based on multi-objective evolutionary algorithms (MOEAs), namely, non-dominated sorting genetic algorithm-II and speed-constrained multi-objective particle swarm optimization. In addition, we use a decision maker for the selection of a solution vector that achieves the best compromise solution. The results illustrate that MOEAs are particularly promising techniques for solving such multi-objective problems in 5G networks.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Diamantoulakis, Panagiotis D. and Karagiannidis, George K.},\n doi = {10.1109/LCOMM.2018.2868663},\n journal = {IEEE Communications Letters},\n number = {11}\n}
\n
\n\n\n
\n The integration of massive multiple-input multiple-output systems in the fifth generation (5G) of wireless networks requires the simultaneous consideration of several conflicting objectives, in order to achieve optimal performance and operation. In this letter, we present a complete optimization framework, which is based on multi-objective evolutionary algorithms (MOEAs), namely, non-dominated sorting genetic algorithm-II and speed-constrained multi-objective particle swarm optimization. In addition, we use a decision maker for the selection of a solution vector that achieves the best compromise solution. The results illustrate that MOEAs are particularly promising techniques for solving such multi-objective problems in 5G networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Particle swarm optimization as applied to electromagnetic design problems.\n \n \n \n\n\n \n Goudos, S., K.; Zaharis, Z., D.; and Baltzis, K., B.\n\n\n \n\n\n\n International Journal of Swarm Intelligence Research, 9(2): 47-82. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Particle swarm optimization as applied to electromagnetic design problems},\n type = {article},\n year = {2018},\n keywords = {Electromagnetics,Inertia weight PSO,Particle swarm optimization,Social behavior},\n pages = {47-82},\n volume = {9},\n id = {65b2b810-5964-3b5b-911a-019f6a0965ae},\n created = {2020-02-29T16:57:42.320Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.225Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2018c},\n private_publication = {false},\n abstract = {Particle swarm optimization (PSO) is a swarm intelligence algorithm inspired by the social behavior of birds flocking and fish schooling. Numerous PSO variants have been proposed in the literature for addressing different problem types. In this article, the authors apply different PSO variants to common design problems in electromagnetics. They apply the Inertia Weight PSO (IWPSO), the Constriction Factor PSO (CFPSO), and the Comprehensive Learning Particle Swarm Optimization (CLPSO) algorithms to real-valued optimization problems, i.e. microwave absorber design, and linear array synthesis. Moreover, the authors use discrete PSO optimizers such as the binary PSO (binPSO) and the Boolean PSO with a velocity mutation (BPSO-vm) in order to solve discrete-valued optimization problems, i.e. patch antenna design. Additionally, the authors apply and compare binPSO with different transfer functions to thinning array design problems. In the case of a multi-objective optimization problem, they apply two multi-objective PSO variants to dual-band base station antenna optimization for mobile communications. Namely, these are the Multi-Objective PSO (MOPSO) and the Multi-Objective PSO with Fitness Sharing (MOPSO-fs) algorithms. Finally, the authors conclude the paper by providing a discussion on future trends and the conclusion.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Zaharis, Zaharias D. and Baltzis, Konstantinos B.},\n doi = {10.4018/IJSIR.2018040104},\n journal = {International Journal of Swarm Intelligence Research},\n number = {2}\n}
\n
\n\n\n
\n Particle swarm optimization (PSO) is a swarm intelligence algorithm inspired by the social behavior of birds flocking and fish schooling. Numerous PSO variants have been proposed in the literature for addressing different problem types. In this article, the authors apply different PSO variants to common design problems in electromagnetics. They apply the Inertia Weight PSO (IWPSO), the Constriction Factor PSO (CFPSO), and the Comprehensive Learning Particle Swarm Optimization (CLPSO) algorithms to real-valued optimization problems, i.e. microwave absorber design, and linear array synthesis. Moreover, the authors use discrete PSO optimizers such as the binary PSO (binPSO) and the Boolean PSO with a velocity mutation (BPSO-vm) in order to solve discrete-valued optimization problems, i.e. patch antenna design. Additionally, the authors apply and compare binPSO with different transfer functions to thinning array design problems. In the case of a multi-objective optimization problem, they apply two multi-objective PSO variants to dual-band base station antenna optimization for mobile communications. Namely, these are the Multi-Objective PSO (MOPSO) and the Multi-Objective PSO with Fitness Sharing (MOPSO-fs) algorithms. Finally, the authors conclude the paper by providing a discussion on future trends and the conclusion.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A low cost wide band and circularly polarized modifed half e-shaped patch antenna for 5G mobile communications.\n \n \n \n\n\n \n Goudos, S., K.; Yioultsis, T., V.; Dalidou, K.; and Siakavara, K.\n\n\n \n\n\n\n In IET Conference Publications, volume 2018, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A low cost wide band and circularly polarized modifed half e-shaped patch antenna for 5G mobile communications},\n type = {inproceedings},\n year = {2018},\n keywords = {5G,Half E-shaped,Jaya algorithm,MmWave,Mobile communications,Patch antennas},\n volume = {2018},\n issue = {CP741},\n id = {cb6de174-148a-3488-9da7-23f3abbe59b6},\n created = {2020-02-29T16:57:43.331Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.903Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2018b},\n private_publication = {false},\n abstract = {The upcoming ſfth generation (5G) technology for mobile communications will offer multi-Gbps data rates for each user. Such data rates require wide spectrum, which is available at millimeter wave frequencies. In order to meet the challenging 5G requirements new antennas have to be designed. In this paper, we address the antenna design problem for 5G mobile communications by designing a low cost half-E-shaped patch antenna that operates at 25GHz. The designed antenna is circularly polarized at a satisfactory bandwidth and also exhibits wide band behavior.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Yioultsis, Traianos V. and Dalidou, Krystalia and Siakavara, Katherine},\n doi = {10.1049/cp.2018.1200},\n booktitle = {IET Conference Publications}\n}
\n
\n\n\n
\n The upcoming ſfth generation (5G) technology for mobile communications will offer multi-Gbps data rates for each user. Such data rates require wide spectrum, which is available at millimeter wave frequencies. In order to meet the challenging 5G requirements new antennas have to be designed. In this paper, we address the antenna design problem for 5G mobile communications by designing a low cost half-E-shaped patch antenna that operates at 25GHz. The designed antenna is circularly polarized at a satisfactory bandwidth and also exhibits wide band behavior.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Realizing 5G vision through Cloud RAN: technologies, challenges, and trends.\n \n \n \n\n\n \n Pliatsios, D.; Sarigiannidis, P.; Goudos, S.; and Karagiannidis, G.\n\n\n \n\n\n\n Eurasip Journal on Wireless Communications and Networking, 2018(1). 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Realizing 5G vision through Cloud RAN: technologies, challenges, and trends},\n type = {article},\n year = {2018},\n keywords = {5G,Cloud Radio Access Network,Common Public Radio Interface,Network function virtualization,Software-defined networking},\n volume = {2018},\n id = {11967d37-e19e-3b14-9d92-1e8321520d76},\n created = {2020-02-29T16:57:43.355Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T16:29:16.705Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Pliatsios2018},\n private_publication = {false},\n abstract = {© 2018, The Author(s). Achieving the fifth-generation (5G) vision will introduce new technology innovations and substantial changes in delivering cutting-edge applications and services in current mobile and cellular networks. The Cloud Radio Access Network (C-RAN) concept emerged as one of the most compelling architectures to meet the requirements of the 5G vision. In essence, C-RAN provides an advanced mobile network architecture which can leverage challenging features such as network resource slicing, statistical multiplexing, energy efficiency, and high capacity. The realization of C-RAN is achieved by innovative technologies such as the software-defined networking (SDN) and the network function virtualization (NFV). While SDN technology brings the separation of the control and data planes in the playground, supporting thus advanced traffic engineering techniques such as load balancing, the NFV concept offers high flexibility by allowing network resource sharing in a dynamic way. Although SDN and NFV have many advantages, a number of challenges have to be addressed before the commercial deployment of 5G implementation. In addition, C-RAN introduces a new layer in the mobile network, denoted as the fronthaul, which is adopted from the recent research efforts in the fiber-wireless (Fi-Wi) paradigm. As the fronthaul defines a link between a baseband unit (BBU) and a remote radio unit (RRU), various technologies can be used for this purpose such as optical fibers and millimeter-wave (mm-wave) radios. In this way, several challenges are highlighted which depend on the technology used. In the light of the aforementioned remarks, this paper compiles a list of challenges and open issues of the emerging technologies that realize the C-RAN concept. Moreover, comparative insights between the current and future state of the C-RAN concept are discussed. Trends and advances of those technologies are also examined towards shedding light on the proliferation of 5G through the C-RAN concept.},\n bibtype = {article},\n author = {Pliatsios, D. and Sarigiannidis, P. and Goudos, S. and Karagiannidis, G.K.},\n doi = {10.1186/s13638-018-1142-1},\n journal = {Eurasip Journal on Wireless Communications and Networking},\n number = {1}\n}
\n
\n\n\n
\n © 2018, The Author(s). Achieving the fifth-generation (5G) vision will introduce new technology innovations and substantial changes in delivering cutting-edge applications and services in current mobile and cellular networks. The Cloud Radio Access Network (C-RAN) concept emerged as one of the most compelling architectures to meet the requirements of the 5G vision. In essence, C-RAN provides an advanced mobile network architecture which can leverage challenging features such as network resource slicing, statistical multiplexing, energy efficiency, and high capacity. The realization of C-RAN is achieved by innovative technologies such as the software-defined networking (SDN) and the network function virtualization (NFV). While SDN technology brings the separation of the control and data planes in the playground, supporting thus advanced traffic engineering techniques such as load balancing, the NFV concept offers high flexibility by allowing network resource sharing in a dynamic way. Although SDN and NFV have many advantages, a number of challenges have to be addressed before the commercial deployment of 5G implementation. In addition, C-RAN introduces a new layer in the mobile network, denoted as the fronthaul, which is adopted from the recent research efforts in the fiber-wireless (Fi-Wi) paradigm. As the fronthaul defines a link between a baseband unit (BBU) and a remote radio unit (RRU), various technologies can be used for this purpose such as optical fibers and millimeter-wave (mm-wave) radios. In this way, several challenges are highlighted which depend on the technology used. In the light of the aforementioned remarks, this paper compiles a list of challenges and open issues of the emerging technologies that realize the C-RAN concept. Moreover, comparative insights between the current and future state of the C-RAN concept are discussed. Trends and advances of those technologies are also examined towards shedding light on the proliferation of 5G through the C-RAN concept.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Phased Antenna Array Design using Shuffled Frog-Leaping Algorithm.\n \n \n \n\n\n \n Boursianis, A.; Patakakis, K.; Goudos, S., K.; Salucci, M.; and Massa, A.\n\n\n \n\n\n\n In 2018 IEEE Antennas and Propagation Society International Symposium and USNC/URSI National Radio Science Meeting, APSURSI 2018 - Proceedings, pages 1845-1846, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Phased Antenna Array Design using Shuffled Frog-Leaping Algorithm},\n type = {inproceedings},\n year = {2018},\n pages = {1845-1846},\n id = {d2164b4c-b7e2-3082-b683-0542086e8183},\n created = {2020-02-29T16:57:43.851Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.571Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Boursianis2018},\n private_publication = {false},\n abstract = {In this paper, we present a new meta-heuristic approach (memetic algorithm) to address multi-objective problems in planar phased arrays. Memetic algorithms are hybrid algorithms that combine the benefits of a global search evolutionary algorithm with a local search method. The Shuffled Frog-Leaping Algorithm (SFLA) consists of a virtual population of frogs partitioned into different memeplexes. It performs a memetic evolution within the memeplex (local search) and a shuffling mix process between memeplexes (global search) to deliver optimum solutions in optimization problems. Derived results show improved characteristics of the antenna array.},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles and Patakakis, Kostas and Goudos, Sotirios K. and Salucci, Marco and Massa, Andrea},\n doi = {10.1109/APUSNCURSINRSM.2018.8609068},\n booktitle = {2018 IEEE Antennas and Propagation Society International Symposium and USNC/URSI National Radio Science Meeting, APSURSI 2018 - Proceedings}\n}
\n
\n\n\n
\n In this paper, we present a new meta-heuristic approach (memetic algorithm) to address multi-objective problems in planar phased arrays. Memetic algorithms are hybrid algorithms that combine the benefits of a global search evolutionary algorithm with a local search method. The Shuffled Frog-Leaping Algorithm (SFLA) consists of a virtual population of frogs partitioned into different memeplexes. It performs a memetic evolution within the memeplex (local search) and a shuffling mix process between memeplexes (global search) to deliver optimum solutions in optimization problems. Derived results show improved characteristics of the antenna array.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A novel design approach for NB-IoT networks using hybrid teaching-learning optimization.\n \n \n \n\n\n \n Goudos, S., K.; Deruyck, M.; Plets, D.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n In IET Conference Publications, volume 2018, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A novel design approach for NB-IoT networks using hybrid teaching-learning optimization},\n type = {inproceedings},\n year = {2018},\n keywords = {Evolutionary algorithms,Green networks,LTE,NB-IoT,Power consumption,Teaching- learning optimization},\n volume = {2018},\n issue = {CP741},\n id = {10f9f811-3684-3201-be8b-46a3959c8e20},\n created = {2020-02-29T16:57:43.882Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.062Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2018a},\n private_publication = {false},\n abstract = {In this paper, we present and address the problem of designing green LTE networks with Internet of Things (IoT) nodes. We consider the new NarrowBand-IoT (NB-IoT) wireless technology that will emerge in current and future access networks. The main objective is to reduce power consumption by responding to the instantaneous bit rate demand by the user and the IoT node. In this context, we apply emerging evolutionary algorithms to the above problem. More specifcally, we apply the Teaching-Learning-Optimization (TLBO), the Jaya algorithm, and a hybrid algorithm. This hybrid algorithm named TLBO-Jaya uses concepts from both algorithms in an effective way. We compare and discuss the preliminary results of these algorithms.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Deruyck, Margot and Plets, David and Martens, Luc and Joseph, Wout},\n doi = {10.1049/cp.2018.1056},\n booktitle = {IET Conference Publications}\n}
\n
\n\n\n
\n In this paper, we present and address the problem of designing green LTE networks with Internet of Things (IoT) nodes. We consider the new NarrowBand-IoT (NB-IoT) wireless technology that will emerge in current and future access networks. The main objective is to reduce power consumption by responding to the instantaneous bit rate demand by the user and the IoT node. In this context, we apply emerging evolutionary algorithms to the above problem. More specifcally, we apply the Teaching-Learning-Optimization (TLBO), the Jaya algorithm, and a hybrid algorithm. This hybrid algorithm named TLBO-Jaya uses concepts from both algorithms in an effective way. We compare and discuss the preliminary results of these algorithms.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Evaluation of an Artificial Neural Network Approach for Timing Modeling of CMOS Gates.\n \n \n \n\n\n \n Goudos, S.; Karagiorgos, N.; Ntogramatzi, M.; Messaris, I.; and Nikolaidis, S.\n\n\n \n\n\n\n In 2018 IEEE 28th International Symposium on Power and Timing Modeling, Optimization and Simulation, PATMOS 2018, pages 169-176, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Evaluation of an Artificial Neural Network Approach for Timing Modeling of CMOS Gates},\n type = {inproceedings},\n year = {2018},\n keywords = {component,formatting,insert,style,styling},\n pages = {169-176},\n id = {73aa0c65-2936-329d-9158-7214bfa8076e},\n created = {2020-02-29T16:57:43.902Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.772Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2018},\n private_publication = {false},\n abstract = {The development of reliable and fast timing models for CMOS logic gates is a significant task for the IC technology. Analytical approaches have been proposed to accelerate timing analysis while keeping the accuracy in acceptable levels. However, the complexity of the analytical modeling procedure increases as we are moving towards new technology nodes influencing mostly the provided accuracy. The artificial neural network (ANN) approach could be a solution to this complexity. In this paper, the use of ANNs for timing modeling of CMOS gates is evaluated. Several different ANNs schemes are developed, optimized and studied regarding their accuracy, resource requirements and speed. Moreover, we design a new training method by combing the Particle Swarm Optimization (PSO) a meta-heuristic algorithm in conjunction with the Levenberg-Marquardt (LM) backpropagation algorithm. The outcomes show that the new training method obtains better results that the LM algorithm. The efficiency of adopting a common neural network structure, letting the coefficients to distinguish between the different logic gates is investigated.},\n bibtype = {inproceedings},\n author = {Goudos, S. and Karagiorgos, N. and Ntogramatzi, M. and Messaris, I. and Nikolaidis, S.},\n doi = {10.1109/PATMOS.2018.8464162},\n booktitle = {2018 IEEE 28th International Symposium on Power and Timing Modeling, Optimization and Simulation, PATMOS 2018}\n}
\n
\n\n\n
\n The development of reliable and fast timing models for CMOS logic gates is a significant task for the IC technology. Analytical approaches have been proposed to accelerate timing analysis while keeping the accuracy in acceptable levels. However, the complexity of the analytical modeling procedure increases as we are moving towards new technology nodes influencing mostly the provided accuracy. The artificial neural network (ANN) approach could be a solution to this complexity. In this paper, the use of ANNs for timing modeling of CMOS gates is evaluated. Several different ANNs schemes are developed, optimized and studied regarding their accuracy, resource requirements and speed. Moreover, we design a new training method by combing the Particle Swarm Optimization (PSO) a meta-heuristic algorithm in conjunction with the Levenberg-Marquardt (LM) backpropagation algorithm. The outcomes show that the new training method obtains better results that the LM algorithm. The efficiency of adopting a common neural network structure, letting the coefficients to distinguish between the different logic gates is investigated.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SDN-based QoS provisioning and interference management in heterogeneous CRN.\n \n \n \n\n\n \n Kakalou, I.; Psannis, K.; Siakavara, K.; Goudos, S., K.; and Ishibashi, Y.\n\n\n \n\n\n\n In 2018 7th International Conference on Modern Circuits and Systems Technologies, MOCAST 2018, pages 1-4, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {SDN-based QoS provisioning and interference management in heterogeneous CRN},\n type = {inproceedings},\n year = {2018},\n keywords = {Heterogeneous Cognitive Radio Networks,Software Defined Network},\n pages = {1-4},\n id = {3388d5e4-e5a5-3e33-9179-af1528187380},\n created = {2020-02-29T16:57:43.945Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.836Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Kakalou2018},\n private_publication = {false},\n abstract = {Cognitive Radio is a promising technology to maximize spectrum efficiency that can be applied to dense residential infrastructure and heterogeneous networks. This paper proposes a Software Defined Networking (SDN) system model for coordinated adaptive spectrum sharing and interference management; the SDN system model leverages the fact that Primary User (PU) network traffic is bursty with an optimal reinforcement learning scheme and takes into account network topology information and data rate requirements of active flows. The scheme learns PU traffic, and as a result, it optimizes spectrum brokerage to the active flows for QoS provisioning and performs interference mitigation.},\n bibtype = {inproceedings},\n author = {Kakalou, Ioanna and Psannis, Kostas and Siakavara, Katherine and Goudos, Sotirios K. and Ishibashi, Yutaka},\n doi = {10.1109/MOCAST.2018.8376585},\n booktitle = {2018 7th International Conference on Modern Circuits and Systems Technologies, MOCAST 2018}\n}
\n
\n\n\n
\n Cognitive Radio is a promising technology to maximize spectrum efficiency that can be applied to dense residential infrastructure and heterogeneous networks. This paper proposes a Software Defined Networking (SDN) system model for coordinated adaptive spectrum sharing and interference management; the SDN system model leverages the fact that Primary User (PU) network traffic is bursty with an optimal reinforcement learning scheme and takes into account network topology information and data rate requirements of active flows. The scheme learns PU traffic, and as a result, it optimizes spectrum brokerage to the active flows for QoS provisioning and performs interference mitigation.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multiobjective lightining search applied to Jiles-Atherton hysteresis model parameter estimation.\n \n \n \n\n\n \n Dos Santos Coelho, L.; Pierezan, J.; Batistela, N., J.; Leite, J., V.; and Goudos, S., K.\n\n\n \n\n\n\n In 2018 7th International Conference on Modern Circuits and Systems Technologies, MOCAST 2018, pages 1-4, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Multiobjective lightining search applied to Jiles-Atherton hysteresis model parameter estimation},\n type = {inproceedings},\n year = {2018},\n keywords = {Hysteresis model,lightning search,multiobjective optimization,parameters identification,vector hysteresis},\n pages = {1-4},\n id = {626dd844-ecc3-3fe2-b846-7617cf18b99e},\n created = {2020-02-29T16:57:43.959Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.898Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {DosSantosCoelho2018},\n private_publication = {false},\n abstract = {Hysteresis is a fundamental property commonly encountered in physical systems of a wide variety of engineering and science fields and the parameters determination and/or optimization of hysteresis dynamical models is an essential approach for adequate hysteretic material simulations. In magnetic vector hysteresis models as the Jiles-Atherton (J-A) the work increases in complexity since one must solve a nonlinear system with a relative large number of design variables. In this context, fitting methods based on efficient stochastic optimization metaheuristics is an attractive solution to solv problems related to the phenomena of nonlinear hysteresis applications. In this study, an improved multiobjective lightning search algorithm (IMLSA), a stochastic optimization metaheuristic algorithm, is introduced for solving J-A hysteresis model parameter estimation. The proposed IMLSA based on a mutation operator of the differential evolution is validated using measured hysteresis data from a rotational single sheet tester. In addition, thorough examination of comparison results of IMLSA with optimization results using a multiobjective lightning search showed that the performance of the IMLSA is promising in parameters estimation of nonlinear hysteretic J-A models.},\n bibtype = {inproceedings},\n author = {Dos Santos Coelho, Leandro and Pierezan, Juliano and Batistela, Nelson Jhoe and Leite, Jean Vianei and Goudos, Sotirios K.},\n doi = {10.1109/MOCAST.2018.8376583},\n booktitle = {2018 7th International Conference on Modern Circuits and Systems Technologies, MOCAST 2018}\n}
\n
\n\n\n
\n Hysteresis is a fundamental property commonly encountered in physical systems of a wide variety of engineering and science fields and the parameters determination and/or optimization of hysteresis dynamical models is an essential approach for adequate hysteretic material simulations. In magnetic vector hysteresis models as the Jiles-Atherton (J-A) the work increases in complexity since one must solve a nonlinear system with a relative large number of design variables. In this context, fitting methods based on efficient stochastic optimization metaheuristics is an attractive solution to solv problems related to the phenomena of nonlinear hysteresis applications. In this study, an improved multiobjective lightning search algorithm (IMLSA), a stochastic optimization metaheuristic algorithm, is introduced for solving J-A hysteresis model parameter estimation. The proposed IMLSA based on a mutation operator of the differential evolution is validated using measured hysteresis data from a rotational single sheet tester. In addition, thorough examination of comparison results of IMLSA with optimization results using a multiobjective lightning search showed that the performance of the IMLSA is promising in parameters estimation of nonlinear hysteretic J-A models.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n LTE measurements for flying relays.\n \n \n \n\n\n \n Batistatos, M., C.; Tsoulos, G., V.; Zarbouti, D., A.; Athanasiadou, G., E.; and Goudos, S., K.\n\n\n \n\n\n\n In 2018 7th International Conference on Modern Circuits and Systems Technologies, MOCAST 2018, pages 1-4, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {LTE measurements for flying relays},\n type = {inproceedings},\n year = {2018},\n keywords = {4G/5G networks,Flying relays,LTE,UAV},\n pages = {1-4},\n id = {51feac1a-f5d0-3c90-8864-5a362ef91437},\n created = {2020-02-29T16:57:44.010Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.221Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Batistatos2018},\n private_publication = {false},\n abstract = {Future cellular networks promise high data rates, ubiquitous services everywhere and flexibility. UAV-assisted networks is a promising system architecture that enables network coverage extension and capacity enhancement. The quality of the backhaul link between the flying node and the ground base station is of a great importance for the system performance. Key performance factors for the quality of the backhaul connection are the signal strength and interference levels at the aerial flying node. In order to study the feasibility of such a scenario, a measurement campaign was held using a quadcopter flying over a mid-sized town, measuring the levels of the LTE signal and interference in the air. Results show that the number of the available LTE cells which could be used as a backhaul connection, fluctuates as the UAV ascends to higher altitudes. Altitudes of 60m and 150m offer more handover options, with at least a guaranteed basic 4G data rate, while 40m or 120m are good choices for realizing high capacity backhaul links. At 40m the potential aerial node has good chances to provide high capacity links and have more handover options. At very high altitudes, although the number of the reliable cells decreases, the UAV still detects candidate cells for establishing a 4G connection and provide acceptable QoS.},\n bibtype = {inproceedings},\n author = {Batistatos, Michael C. and Tsoulos, George V. and Zarbouti, Dimitra A. and Athanasiadou, Georgia E. and Goudos, Sotirios K.},\n doi = {10.1109/MOCAST.2018.8376626},\n booktitle = {2018 7th International Conference on Modern Circuits and Systems Technologies, MOCAST 2018}\n}
\n
\n\n\n
\n Future cellular networks promise high data rates, ubiquitous services everywhere and flexibility. UAV-assisted networks is a promising system architecture that enables network coverage extension and capacity enhancement. The quality of the backhaul link between the flying node and the ground base station is of a great importance for the system performance. Key performance factors for the quality of the backhaul connection are the signal strength and interference levels at the aerial flying node. In order to study the feasibility of such a scenario, a measurement campaign was held using a quadcopter flying over a mid-sized town, measuring the levels of the LTE signal and interference in the air. Results show that the number of the available LTE cells which could be used as a backhaul connection, fluctuates as the UAV ascends to higher altitudes. Altitudes of 60m and 150m offer more handover options, with at least a guaranteed basic 4G data rate, while 40m or 120m are good choices for realizing high capacity backhaul links. At 40m the potential aerial node has good chances to provide high capacity links and have more handover options. At very high altitudes, although the number of the reliable cells decreases, the UAV still detects candidate cells for establishing a 4G connection and provide acceptable QoS.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Spiral inductor design based on fireworks optimization combined with free search.\n \n \n \n\n\n \n Jeronymo, D., C.; Leite, J., V.; Mariani, V., C.; Dos Santos Coelho, L.; and Goudos, S., K.\n\n\n \n\n\n\n In 2018 7th International Conference on Modern Circuits and Systems Technologies, MOCAST 2018, pages 1-4, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Spiral inductor design based on fireworks optimization combined with free search},\n type = {inproceedings},\n year = {2018},\n keywords = {fireworks optimization,optimization,radio frequency,spiral inductor,stochastic metaheuristics},\n pages = {1-4},\n id = {6adea789-431e-3a6b-9ee5-c4a3481cbfc9},\n created = {2020-02-29T16:57:44.044Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.543Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Jeronymo2018},\n private_publication = {false},\n abstract = {Over the decades, metaheuristics, such as evolutionary and swarm intelligence paradigmms have been efficiently applied to solve real world engineering problems. Spiral inductors are widely used in radio frequency applications, such as voltage controlled oscillators, telemetry, matching networks and low noise amplifiers. However, the good performance of the spiral inductors represents a designing challenge. Metaheuristic method can be applied, in order to meet the design requirements of a spiral inductor. In this paper, an improved fireworks optimization algorithm (IFOA) combined with free search (FS) and opposition-based learning is proposed. The new algorithm is validated to optimize the number of turns for the spiral, the width of the turns, the separation between turns and the diameter for the inner-most turn of a spiral inductor which operates at 95 MHz. Simulation results indicate the promising performance of the improved FOA when compared with the classical FOA and a genetic algorithm in spiral inductors design application.},\n bibtype = {inproceedings},\n author = {Jeronymo, Daniel Cavalcanti and Leite, Jean Vianei and Mariani, Viviana Cocco and Dos Santos Coelho, Leandro and Goudos, Sotirios K.},\n doi = {10.1109/MOCAST.2018.8376558},\n booktitle = {2018 7th International Conference on Modern Circuits and Systems Technologies, MOCAST 2018}\n}
\n
\n\n\n
\n Over the decades, metaheuristics, such as evolutionary and swarm intelligence paradigmms have been efficiently applied to solve real world engineering problems. Spiral inductors are widely used in radio frequency applications, such as voltage controlled oscillators, telemetry, matching networks and low noise amplifiers. However, the good performance of the spiral inductors represents a designing challenge. Metaheuristic method can be applied, in order to meet the design requirements of a spiral inductor. In this paper, an improved fireworks optimization algorithm (IFOA) combined with free search (FS) and opposition-based learning is proposed. The new algorithm is validated to optimize the number of turns for the spiral, the width of the turns, the separation between turns and the diameter for the inner-most turn of a spiral inductor which operates at 95 MHz. Simulation results indicate the promising performance of the improved FOA when compared with the classical FOA and a genetic algorithm in spiral inductors design application.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Joint optimization towards power consumption and electromagnetic exposure for Massive MIMO 5G networks.\n \n \n \n\n\n \n Matalatala, M.; Deruyck, M.; Tanghe, E.; Goudos, S.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 2018-Septe, pages 1208-1214, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Joint optimization towards power consumption and electromagnetic exposure for Massive MIMO 5G networks},\n type = {inproceedings},\n year = {2018},\n pages = {1208-1214},\n volume = {2018-Septe},\n id = {3e42220e-5c0a-37eb-94d2-b1b65f7faab4},\n created = {2020-02-29T16:57:44.968Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.849Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Matalatala2018},\n private_publication = {false},\n abstract = {In the next generation of wireless communication networks, Massive MIMO remains the appropriate technology to provide higher throughput to the users with incredible gains in terms of power consumption and energy efficiency. However, current research rarely considers the electromagnetic field exposure during the network design phase. In this paper, we propose a simulation-based method that enables an optimal design of the massive MIMO 5G networks with respect to both power consumption and electromagnetic field exposure. The results of the simulations show that the massive MIMO network achieves the same performance in terms of users coverage with 10 times less power consumption and an electric field strength 17 times weaker in comparison with the traditional 4G network.},\n bibtype = {inproceedings},\n author = {Matalatala, Michel and Deruyck, Margot and Tanghe, Emmeric and Goudos, Sotirios and Martens, Luc and Joseph, Wout},\n doi = {10.1109/PIMRC.2018.8580818},\n booktitle = {IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC}\n}
\n
\n\n\n
\n In the next generation of wireless communication networks, Massive MIMO remains the appropriate technology to provide higher throughput to the users with incredible gains in terms of power consumption and energy efficiency. However, current research rarely considers the electromagnetic field exposure during the network design phase. In this paper, we propose a simulation-based method that enables an optimal design of the massive MIMO 5G networks with respect to both power consumption and electromagnetic field exposure. The results of the simulations show that the massive MIMO network achieves the same performance in terms of users coverage with 10 times less power consumption and an electric field strength 17 times weaker in comparison with the traditional 4G network.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Spectrum Allocation in Next Generation Radio Networks using Emerging Nature-inspired Algorithms.\n \n \n \n\n\n \n Tegou, T., I.; Siakavara, K.; Nikolaidis, S.; Goudos, S., K.; Vergados, D., D.; Sarigiannidis, P.; and Obaidat, M.\n\n\n \n\n\n\n In 2018 11th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2018, 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Spectrum Allocation in Next Generation Radio Networks using Emerging Nature-inspired Algorithms},\n type = {inproceedings},\n year = {2018},\n id = {aa855703-fefd-3b95-a5d3-3dbf27d3d593},\n created = {2020-02-29T16:57:45.265Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.240Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Tegou2018a},\n private_publication = {false},\n abstract = {The key task of a cognitive radio network (CRN) is the effective allocation of spectrum resources according to user needs and requirements. In order to maximize the utilization of the available spectrum, a dynamic allocation of available channels to secondary users is needed. This problem is known as the spectrum allocation problem and it is a combinatorial optimization problem. A possible optimization algorithm that can be applied is chaotic biogeography-based optimization (CBBO). In this paper, a thorough assessment of CBBO is performed in the sense of comparing CBBO with other popular algorithms. According to the simulation results, the CBBO algorithm outperforms competing algorithms in terms of average convergence rate and accuracy.},\n bibtype = {inproceedings},\n author = {Tegou, Thomas I. and Siakavara, Katherine and Nikolaidis, Spiros and Goudos, Sotirios K. and Vergados, Dimitrios D. and Sarigiannidis, Panagiotis and Obaidat, Mohammad},\n doi = {10.1109/CSNDSP.2018.8471797},\n booktitle = {2018 11th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2018}\n}
\n
\n\n\n
\n The key task of a cognitive radio network (CRN) is the effective allocation of spectrum resources according to user needs and requirements. In order to maximize the utilization of the available spectrum, a dynamic allocation of available channels to secondary users is needed. This problem is known as the spectrum allocation problem and it is a combinatorial optimization problem. A possible optimization algorithm that can be applied is chaotic biogeography-based optimization (CBBO). In this paper, a thorough assessment of CBBO is performed in the sense of comparing CBBO with other popular algorithms. According to the simulation results, the CBBO algorithm outperforms competing algorithms in terms of average convergence rate and accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n MIMO antenna selection using biogeography-based optimization with nonlinear migration models.\n \n \n \n\n\n \n Fountoukidis, K., C.; Kalialakis, C.; Psannis, K., E.; Siakavara, K.; Goudos, S., K.; Sarigiannidis, P.; and Obaidat, M.\n\n\n \n\n\n\n International Journal of Communication Systems, 31(17). 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {MIMO antenna selection using biogeography-based optimization with nonlinear migration models},\n type = {article},\n year = {2018},\n keywords = {ant colony optimization,antenna selection,biogeography-based optimization,evolutionaryr algorithms,genetic algorithm,multiple-input multiple-output systems},\n volume = {31},\n id = {12b4d4ec-74aa-349a-ab0b-5c79a6e60d5e},\n created = {2020-02-29T16:57:45.278Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.499Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Fountoukidis2018},\n private_publication = {false},\n abstract = {This papers deals with the problem of antenna selection (AS) for a multiple-input multiple-output (MIMO) wireless system under the constraint of the channel capacity maximization. The biogeography-based optimization (BBO) algorithm is applied on the joint transmitter and receiver AS problem. Moreover, the performance of different BBO migration models is compared with a real valued genetic algorithm (RVGA) as well as with the ant colony optimization (ACO). Representative simulation scenarios are provided in detail, involving selection of 2 × 4,3 × 5,4 × 6,8 × 8 antennas in a 16 × 16 MIMO system. The numerical results demonstrate the efficiency and the applicability of the BBO algorithm in modern MIMO wireless systems.},\n bibtype = {article},\n author = {Fountoukidis, Konstantinos C. and Kalialakis, Christos and Psannis, Kostas E. and Siakavara, Katherine and Goudos, Sotirios K. and Sarigiannidis, Panagiotis and Obaidat, Mohammad},\n doi = {10.1002/dac.3813},\n journal = {International Journal of Communication Systems},\n number = {17}\n}
\n
\n\n\n
\n This papers deals with the problem of antenna selection (AS) for a multiple-input multiple-output (MIMO) wireless system under the constraint of the channel capacity maximization. The biogeography-based optimization (BBO) algorithm is applied on the joint transmitter and receiver AS problem. Moreover, the performance of different BBO migration models is compared with a real valued genetic algorithm (RVGA) as well as with the ant colony optimization (ACO). Representative simulation scenarios are provided in detail, involving selection of 2 × 4,3 × 5,4 × 6,8 × 8 antennas in a 16 × 16 MIMO system. The numerical results demonstrate the efficiency and the applicability of the BBO algorithm in modern MIMO wireless systems.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation.\n \n \n \n\n\n \n Tegou, T., I.; Tsiflikiotis, A.; Vergados, D., D.; Siakavara, K.; Nikolaidis, S.; Goudos, S., K.; Sarigiannidis, P.; and Obaidat, M.\n\n\n \n\n\n\n IET Networks, 7(5): 328-335. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation},\n type = {article},\n year = {2018},\n pages = {328-335},\n volume = {7},\n id = {44455405-e983-3385-88b1-ffc88a03db2a},\n created = {2020-02-29T16:57:45.343Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.158Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Tegou2018},\n private_publication = {false},\n abstract = {Cognitive radio networks are a promising technology for the improvement of the spectrum utilisation. The basic idea is to maximise the utilisation of the available spectrum by dynamically assigning available channels to secondary users. This problem known as the spectrum allocation problem is non-deterministic polynomial-time hard (NP-hard). Chaotic biogeographybased optimisation (CBBO) is a recently proposed evolutionary algorithm that can be applied to the above-mentioned problem. The authors compare CBBO with other popular algorithms in different spectrum allocation problem cases. The results show that CBBO performs in general better or similar to the other algorithms.},\n bibtype = {article},\n author = {Tegou, Thomas I. and Tsiflikiotis, Antonios and Vergados, Dimitrios D. and Siakavara, Katherine and Nikolaidis, Spiros and Goudos, Sotirios K. and Sarigiannidis, Panagiotis and Obaidat, Mohammad},\n doi = {10.1049/iet-net.2017.0264},\n journal = {IET Networks},\n number = {5}\n}
\n
\n\n\n
\n Cognitive radio networks are a promising technology for the improvement of the spectrum utilisation. The basic idea is to maximise the utilisation of the available spectrum by dynamically assigning available channels to secondary users. This problem known as the spectrum allocation problem is non-deterministic polynomial-time hard (NP-hard). Chaotic biogeographybased optimisation (CBBO) is a recently proposed evolutionary algorithm that can be applied to the above-mentioned problem. The authors compare CBBO with other popular algorithms in different spectrum allocation problem cases. The results show that CBBO performs in general better or similar to the other algorithms.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Evaluation of the Equivalent Inverter Modeling Approach.\n \n \n \n\n\n \n Messaris, I.; Galani, C.; Ntogramatzi, M.; Karagiorgos, N.; Chaourani, P.; Tzormpatzoglou, A.; Goudos, S.; and Nikolaidis, S.\n\n\n \n\n\n\n Circuits, Systems, and Signal Processing, 37(7): 2665-2693. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {An Evaluation of the Equivalent Inverter Modeling Approach},\n type = {article},\n year = {2018},\n keywords = {CCS compatible,CMOS gate modeling,Equivalent inverter,Simulation,Timing/power characterization},\n pages = {2665-2693},\n volume = {37},\n id = {35a9fabd-c02d-3054-8aab-1b88c573da87},\n created = {2020-02-29T16:57:45.363Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.711Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Messaris2018},\n private_publication = {false},\n abstract = {Accurate modeling of CMOS logic gates for timing and power characterization is a very important task in integrated circuits technology since it facilitates significantly the design phase. Parametric models provide flexibility in determining the circuit performance in various design corners. However, the direct analysis of a complex CMOS gate aiming in an analytical and parametric model is a difficult and cumbersome task. An alternative way to model these gates is by using the equivalent inverter approach. According to this, an inverter with appropriate transistor widths is defined in order to present the same response with the complex gate it models. The challenge with this approach is to propose a simple method to predict the appropriate transistor widths of the equivalent inverter. Then, an analytical model for the CMOS inverter can be used to provide estimates for the complex gates. In this paper, a macro-modeling method is proposed for determining the transistor widths of the equivalent inverter and a technique for providing parametric expressions for these widths in terms of input transition time, output capacitive load, initial transistor width, supply voltage and temperature. A tool is developed to provide timing and power characterizations for the cells of a digital cell library, much faster than conventional numerical circuit simulators. The results prove the efficiency of the equivalent inverter approach in modeling complex gates.},\n bibtype = {article},\n author = {Messaris, Ioannis and Galani, Christina and Ntogramatzi, Maria and Karagiorgos, Nikolaos and Chaourani, Panagiotis and Tzormpatzoglou, Andreas and Goudos, Sotirios and Nikolaidis, Spyridon},\n doi = {10.1007/s00034-017-0692-5},\n journal = {Circuits, Systems, and Signal Processing},\n number = {7}\n}
\n
\n\n\n
\n Accurate modeling of CMOS logic gates for timing and power characterization is a very important task in integrated circuits technology since it facilitates significantly the design phase. Parametric models provide flexibility in determining the circuit performance in various design corners. However, the direct analysis of a complex CMOS gate aiming in an analytical and parametric model is a difficult and cumbersome task. An alternative way to model these gates is by using the equivalent inverter approach. According to this, an inverter with appropriate transistor widths is defined in order to present the same response with the complex gate it models. The challenge with this approach is to propose a simple method to predict the appropriate transistor widths of the equivalent inverter. Then, an analytical model for the CMOS inverter can be used to provide estimates for the complex gates. In this paper, a macro-modeling method is proposed for determining the transistor widths of the equivalent inverter and a technique for providing parametric expressions for these widths in terms of input transition time, output capacitive load, initial transistor width, supply voltage and temperature. A tool is developed to provide timing and power characterizations for the cells of a digital cell library, much faster than conventional numerical circuit simulators. The results prove the efficiency of the equivalent inverter approach in modeling complex gates.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Optimization of Antenna Design Problems Using Binary Differential Evolution.\n \n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Handbook of Research on Emergent Applications of Optimization Algorithms, pages 614-636. Vasant, P.; Alparslan-Gok, S., Z.; and Weber, G., editor(s). IGI Global, 2018.\n \n\n\n\n
\n\n\n\n \n \n \"HandbookWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2018},\n pages = {614-636},\n websites = {https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2990-3.ch026},\n publisher = {IGI Global},\n city = {Hershey, PA, USA},\n id = {d942cf71-7119-3524-a01e-a1ddc94604f1},\n created = {2023-02-11T21:26:03.981Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:26:03.981Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Vasant2018},\n source_type = {incollection},\n private_publication = {false},\n abstract = {Differential Evolution (DE) is a popular evolutionary algorithm that has been applied to several antenna design problems. However, DE is best suited for continuous search spaces. Therefore, in order to apply it to combinatorial optimization problems for antenna design a binary version of the DE algorithm has to be used. In this chapter, the author presents a design technique based on Novel Binary DE (NBDE). The main benefit of NBDE is reserving the DE updating strategy to binary space. This chapter presents results from design cases that include array thinning, phased array design with discrete phase shifters, and conformal array design with discrete excitations based on NBDE.},\n bibtype = {inbook},\n author = {Goudos, Sotirios K},\n editor = {Vasant, Pandian and Alparslan-Gok, Sirma Zeynep and Weber, Gerhard-Wilhelm},\n doi = {10.4018/978-1-5225-2990-3.ch026},\n chapter = {Optimization of Antenna Design Problems Using Binary Differential Evolution},\n title = {Handbook of Research on Emergent Applications of Optimization Algorithms}\n}
\n
\n\n\n
\n Differential Evolution (DE) is a popular evolutionary algorithm that has been applied to several antenna design problems. However, DE is best suited for continuous search spaces. Therefore, in order to apply it to combinatorial optimization problems for antenna design a binary version of the DE algorithm has to be used. In this chapter, the author presents a design technique based on Novel Binary DE (NBDE). The main benefit of NBDE is reserving the DE updating strategy to binary space. This chapter presents results from design cases that include array thinning, phased array design with discrete phase shifters, and conformal array design with discrete excitations based on NBDE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Biogeography-Based Optimization Applied to Wireless Communications Problems.\n \n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Encyclopedia of Information Science and Technology, Fourth Edition, pages 5967-5980. Khosrow-Pour D.B.A., M., editor(s). IGI Global, 2018.\n \n\n\n\n
\n\n\n\n \n \n \"EncyclopediaWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2018},\n pages = {5967-5980},\n websites = {https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2255-3.ch519},\n publisher = {IGI Global},\n city = {Hershey, PA, USA},\n id = {67edbf84-2863-31fc-9714-9f74226b9e9e},\n created = {2023-02-11T21:26:04.074Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:26:04.074Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {KhosrowPour2018},\n source_type = {incollection},\n private_publication = {false},\n bibtype = {inbook},\n author = {Goudos, Sotirios K},\n editor = {Khosrow-Pour D.B.A., Mehdi},\n doi = {10.4018/978-1-5225-2255-3.ch519},\n chapter = {Biogeography-Based Optimization Applied to Wireless Communications Problems},\n title = {Encyclopedia of Information Science and Technology, Fourth Edition}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Optimization of Antenna Arrays and Microwave Filters Using Differential Evolution Algorithms.\n \n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Encyclopedia of Information Science and Technology, Fourth Edition, pages 6595-6608. Khosrow-Pour D.B.A., M., editor(s). IGI Global, 2018.\n \n\n\n\n
\n\n\n\n \n \n \"EncyclopediaWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2018},\n pages = {6595-6608},\n websites = {https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2255-3.ch572},\n publisher = {IGI Global},\n city = {Hershey, PA, USA},\n id = {3fd24ec2-d256-308e-9e41-a7c3aaa2f6a6},\n created = {2023-02-11T21:26:04.282Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:26:04.282Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {KhosrowPour2018a},\n source_type = {incollection},\n private_publication = {false},\n bibtype = {inbook},\n author = {Goudos, Sotirios K},\n editor = {Khosrow-Pour D.B.A., Mehdi},\n doi = {10.4018/978-1-5225-2255-3.ch572},\n chapter = {Optimization of Antenna Arrays and Microwave Filters Using Differential Evolution Algorithms},\n title = {Encyclopedia of Information Science and Technology, Fourth Edition}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Swarm intelligence algorithms for antenna design and wireless communications.\n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Swarm Intelligence - Volume 3: Applications, pages 755-784. Institution of Engineering and Technology, 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2018},\n pages = {755-784},\n publisher = {Institution of Engineering and Technology},\n id = {deb0d02b-53a3-30b2-a287-fe71a5653608},\n created = {2023-02-11T21:26:04.316Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:26:04.316Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2018},\n source_type = {incollection},\n private_publication = {false},\n bibtype = {inbook},\n author = {Goudos, Sotirios K},\n doi = {10.1049/pbce119h_ch26},\n chapter = {Swarm intelligence algorithms for antenna design and wireless communications},\n title = {Swarm Intelligence - Volume 3: Applications}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Antenna Design Using Binary Differential Evolution: Application to discrete-valued design problems.\n \n \n \n\n\n \n Goudos, S.\n\n\n \n\n\n\n IEEE Antennas and Propagation Magazine, 59(1): 74-93. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Antenna Design Using Binary Differential Evolution: Application to discrete-valued design problems.},\n type = {article},\n year = {2017},\n pages = {74-93},\n volume = {59},\n id = {22407a46-785b-339c-8787-90359847f71b},\n created = {2020-02-29T16:57:41.757Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.475Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2017d},\n private_publication = {false},\n abstract = {Several antenna design problems are discrete valued. Particle swarm optimization (PSO) and differential evolution (DE) are popular evolutionary algorithms that have been applied to a number of design problems in electromagnetics. However, both PSO and DE are best suited for continuous search spaces. Therefore, to apply these to binary-coded combinatorial optimization problems, binary versions of the aforementioned algorithms must be used. In this article, we introduce a design technique based on novel binary DE (NBDE). The main benefit of NBDE is reserving the DE updating strategy to binary space.},\n bibtype = {article},\n author = {Goudos, Sotirios},\n doi = {10.1109/MAP.2016.2630041},\n journal = {IEEE Antennas and Propagation Magazine},\n number = {1}\n}
\n
\n\n\n
\n Several antenna design problems are discrete valued. Particle swarm optimization (PSO) and differential evolution (DE) are popular evolutionary algorithms that have been applied to a number of design problems in electromagnetics. However, both PSO and DE are best suited for continuous search spaces. Therefore, to apply these to binary-coded combinatorial optimization problems, binary versions of the aforementioned algorithms must be used. In this article, we introduce a design technique based on novel binary DE (NBDE). The main benefit of NBDE is reserving the DE updating strategy to binary space.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of Opposition-Based Learning concepts for arbitrary patch antenna design for wireless communications.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; and Kalialakis, C.\n\n\n \n\n\n\n In 2017 International Workshop on Antenna Technology: Small Antennas, Innovative Structures, and Applications, iWAT 2017, pages 171-174, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Application of Opposition-Based Learning concepts for arbitrary patch antenna design for wireless communications},\n type = {inproceedings},\n year = {2017},\n keywords = {Biogeography based optimization,Opposition-based learning,Patch antenna},\n pages = {171-174},\n id = {e62c2754-bbaa-3bd1-b240-f9066f9d3270},\n created = {2020-02-29T16:57:42.320Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.744Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2017c},\n private_publication = {false},\n abstract = {We present an arbitrary-shaped patch antenna design procedure. The design technique is based on a variant of Biogeography Based Optimization (BBO) algorithm. In this paper, we apply Opposition-Based Learning (OBL) concepts for antenna design. More specifically, we use a new Modified Biogeography Based Optimization (BBO) algorithm enhanced with OBL techniques. The preliminary results of the proposed method indicate the advantages and applicability of our approach.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Kalialakis, Christos},\n doi = {10.1109/IWAT.2017.7915350},\n booktitle = {2017 International Workshop on Antenna Technology: Small Antennas, Innovative Structures, and Applications, iWAT 2017}\n}
\n
\n\n\n
\n We present an arbitrary-shaped patch antenna design procedure. The design technique is based on a variant of Biogeography Based Optimization (BBO) algorithm. In this paper, we apply Opposition-Based Learning (OBL) concepts for antenna design. More specifically, we use a new Modified Biogeography Based Optimization (BBO) algorithm enhanced with OBL techniques. The preliminary results of the proposed method indicate the advantages and applicability of our approach.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Hybrid teaching-learning optimization of wireless sensor networks.\n \n \n \n\n\n \n Tsiflikiotis, A.; Goudos, S., K.; and Karagiannidis, G., K.\n\n\n \n\n\n\n Transactions on Emerging Telecommunications Technologies, 28(11). 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Hybrid teaching-learning optimization of wireless sensor networks},\n type = {article},\n year = {2017},\n volume = {28},\n id = {15685eb2-8e1e-3d54-8da7-7e10e0a1f4c4},\n created = {2020-02-29T16:57:42.383Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.494Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Tsiflikiotis2017},\n private_publication = {false},\n abstract = {This paper deals with the power allocation of decentralized detection in an optimal wireless sensor network (WSN). The main objective is to find a solution that minimizes the total power consumed by the WSN, so that the error probability at the fusion center would be below a certain threshold. More specifically, we propose a novel stochastic optimization algorithm, called the TLBO-Jaya algorithm, which is a hybrid form of two recently proposed algorithms, ie, the teaching-learning–based optimization (TLBO) and Jaya algorithms. The proposed optimization solution is evaluated for several WSN cases and compared with results from the literature. Additionally, it is compared with both the TLBO and Jaya algorithms, the heat transfer search algorithm, and the popular particle swarm optimization. Numerical results show that the proposed algorithm performs better than other well-known algorithms in almost all tested cases.},\n bibtype = {article},\n author = {Tsiflikiotis, Antonios and Goudos, Sotirios K. and Karagiannidis, George K.},\n doi = {10.1002/ett.3194},\n journal = {Transactions on Emerging Telecommunications Technologies},\n number = {11}\n}
\n
\n\n\n
\n This paper deals with the power allocation of decentralized detection in an optimal wireless sensor network (WSN). The main objective is to find a solution that minimizes the total power consumed by the WSN, so that the error probability at the fusion center would be below a certain threshold. More specifically, we propose a novel stochastic optimization algorithm, called the TLBO-Jaya algorithm, which is a hybrid form of two recently proposed algorithms, ie, the teaching-learning–based optimization (TLBO) and Jaya algorithms. The proposed optimization solution is evaluated for several WSN cases and compared with results from the literature. Additionally, it is compared with both the TLBO and Jaya algorithms, the heat transfer search algorithm, and the popular particle swarm optimization. Numerical results show that the proposed algorithm performs better than other well-known algorithms in almost all tested cases.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Passive UHF RFID tags with specific printed antennas for dielectric and metallic objects applications.\n \n \n \n\n\n \n Siakavara, K.; Goudos, S.; Theopoulos, A.; and Sahalos, J.\n\n\n \n\n\n\n Radioengineering, 26(3): 735-745. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Passive UHF RFID tags with specific printed antennas for dielectric and metallic objects applications},\n type = {article},\n year = {2017},\n keywords = {Printed antennas,RFID tags,Spiral antennas},\n pages = {735-745},\n volume = {26},\n id = {684ada74-5bc6-37b1-aa13-12d94813fde4},\n created = {2020-02-29T16:57:43.380Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.673Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Siakavara2017},\n private_publication = {false},\n abstract = {Design process and respective results for the synthesis of specific Radiofrequency Identification (RFID) tag antennas, suitable for dielectric and metallic objects, are presented. The antennas were designed for the UHF (865 MHz-869 MHz) band and their basic configuration is that of the printed spiral type. Six modification steps to the classical spiral layout are proposed and it was proved that they can lead to tags with high readability and reading distances up to 10 m when designed for dielectric object and up to 7 m in the case of metallic objects. The results of the measurements of the fabricated tags are explained via theoretical evaluations which take into account reflection phenomena, which are present in a real environment at which the tags are used.},\n bibtype = {article},\n author = {Siakavara, Katherine and Goudos, Sotirios and Theopoulos, Argiris and Sahalos, John},\n doi = {10.13164/re.2017.0735},\n journal = {Radioengineering},\n number = {3}\n}
\n
\n\n\n
\n Design process and respective results for the synthesis of specific Radiofrequency Identification (RFID) tag antennas, suitable for dielectric and metallic objects, are presented. The antennas were designed for the UHF (865 MHz-869 MHz) band and their basic configuration is that of the printed spiral type. Six modification steps to the classical spiral layout are proposed and it was proved that they can lead to tags with high readability and reading distances up to 10 m when designed for dielectric object and up to 7 m in the case of metallic objects. The results of the measurements of the fabricated tags are explained via theoretical evaluations which take into account reflection phenomena, which are present in a real environment at which the tags are used.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A dual band antenna based on a Quarter Mode Substrate Integrated Waveguide.\n \n \n \n\n\n \n Alvarez, M.; Kalialakis, C.; Mira, F.; and Goudos, S., K.\n\n\n \n\n\n\n In 2017 6th International Conference on Modern Circuits and Systems Technologies, MOCAST 2017, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A dual band antenna based on a Quarter Mode Substrate Integrated Waveguide},\n type = {inproceedings},\n year = {2017},\n keywords = {Antennas,Cavity Antennas,Dual Band Antennas,Substrate Integrated Waveguides},\n id = {4303c602-34b1-3f69-b979-5c251152d270},\n created = {2020-02-29T16:57:43.402Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.115Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Alvarez2017},\n private_publication = {false},\n abstract = {In this work, a new dual band antenna is presented. The antenna is implemented on a quarter mode Substrate Integrated Waveguide (SIW) technology by introducing a slit shaped modification. The dual band antenna concept has been demonstrated for the 2.4GHz and 5GHz WiFi bands but the approach is readily applicable to centimeter and millimeter wave applications due to the low loss characteristics of SIW. Good agreement has been observed between simulations and measurements on a prototype.},\n bibtype = {inproceedings},\n author = {Alvarez, Marc and Kalialakis, Christos and Mira, Fermin and Goudos, Sotirios K.},\n doi = {10.1109/MOCAST.2017.7937621},\n booktitle = {2017 6th International Conference on Modern Circuits and Systems Technologies, MOCAST 2017}\n}
\n
\n\n\n
\n In this work, a new dual band antenna is presented. The antenna is implemented on a quarter mode Substrate Integrated Waveguide (SIW) technology by introducing a slit shaped modification. The dual band antenna concept has been demonstrated for the 2.4GHz and 5GHz WiFi bands but the approach is readily applicable to centimeter and millimeter wave applications due to the low loss characteristics of SIW. Good agreement has been observed between simulations and measurements on a prototype.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A preliminary coverage study in millimeter wave bands for 5G communication networks.\n \n \n \n\n\n \n Kaitatzis, C.; Boursianis, A.; Goudos, S., K.; and Dallas, P., I.\n\n\n \n\n\n\n In 2017 6th International Conference on Modern Circuits and Systems Technologies, MOCAST 2017, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A preliminary coverage study in millimeter wave bands for 5G communication networks},\n type = {inproceedings},\n year = {2017},\n keywords = {5G communication networks,millimeter wave bands,radio propagation models},\n id = {afa9b638-a033-36d6-8444-d2a2c739cafe},\n created = {2020-02-29T16:57:43.422Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:48.776Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Kaitatzis2017},\n private_publication = {false},\n abstract = {In this paper, we make a preliminary coverage study for base stations (BS) in millimeter wave bands based on recently proposed propagation models. More specifically, we compute the cell radius and the coverage area of a future fifth generation (5G) cellular network based on the Close-In (CI) and the Alpha-Beta-Gamma (ABG) radio propagation models. Also, the required base station density is calculated corresponding to urban, suburban and rural regions.},\n bibtype = {inproceedings},\n author = {Kaitatzis, C. and Boursianis, A. and Goudos, S. K. and Dallas, P. I.},\n doi = {10.1109/MOCAST.2017.7937634},\n booktitle = {2017 6th International Conference on Modern Circuits and Systems Technologies, MOCAST 2017}\n}
\n
\n\n\n
\n In this paper, we make a preliminary coverage study for base stations (BS) in millimeter wave bands based on recently proposed propagation models. More specifically, we compute the cell radius and the coverage area of a future fifth generation (5G) cellular network based on the Close-In (CI) and the Alpha-Beta-Gamma (ABG) radio propagation models. Also, the required base station density is calculated corresponding to urban, suburban and rural regions.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Cognitive Radio Engine Design for IoT Using Real-Coded Biogeography-Based Optimization and Fuzzy Decision Making.\n \n \n \n\n\n \n Paraskevopoulos, A.; Dallas, P., I.; Siakavara, K.; and Goudos, S., K.\n\n\n \n\n\n\n Wireless Personal Communications, 97(2): 1813-1833. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Cognitive Radio Engine Design for IoT Using Real-Coded Biogeography-Based Optimization and Fuzzy Decision Making},\n type = {article},\n year = {2017},\n keywords = {Biogeography-based optimization (BBO),Cognitive radio (CR),Evolutionary algorithms,Fuzzy decision making,Real-coded biogeography-based optimization (RCBBO)},\n pages = {1813-1833},\n volume = {97},\n id = {61fe89e9-023b-3a45-be16-fc2200337f21},\n created = {2020-02-29T16:57:43.448Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.113Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Paraskevopoulos2017},\n private_publication = {false},\n abstract = {The Internet of Things (IoT) paradigm expands the current Internet and enables communication through machine to machine, while posing new challenges. Cognitive radio (CR) Systems have received much attention over the last decade, because of their ability to flexibly adapt their transmission parameters to their changing environment. Current technology trends are shifting to the adaptability of cognitive radio networks into IoT. The determination of the appropriate transmission parameters for a given wireless channel environment is the main feature of a cognitive radio engine. For wireless multicarrier transceivers, the problem becomes high dimensional due to the large number of decision variables required. Evolutionary algorithms are suitable techniques to solve the above-mentioned problem. In this paper, we design a CR engine for wireless multicarrier transceivers using real-coded biogeography-based optimization (RCBBO). The CR engine also uses a fuzzy decision maker for obtaining the best compromised solution. RCBBO uses a mutation operator in order to improve the diversity of the population and enhance the exploration ability of the original BBO algorithm. The simulation results show that the RCBBO driven CR engine can obtain better results than the original BBO and outperform results from the literature. Moreover, RCBBO is more efficient when applied to high-dimensional problems in cases of multicarrier system.},\n bibtype = {article},\n author = {Paraskevopoulos, Athanasios and Dallas, Panagiotis I. and Siakavara, Katherine and Goudos, Sotirios K.},\n doi = {10.1007/s11277-017-4646-9},\n journal = {Wireless Personal Communications},\n number = {2}\n}
\n
\n\n\n
\n The Internet of Things (IoT) paradigm expands the current Internet and enables communication through machine to machine, while posing new challenges. Cognitive radio (CR) Systems have received much attention over the last decade, because of their ability to flexibly adapt their transmission parameters to their changing environment. Current technology trends are shifting to the adaptability of cognitive radio networks into IoT. The determination of the appropriate transmission parameters for a given wireless channel environment is the main feature of a cognitive radio engine. For wireless multicarrier transceivers, the problem becomes high dimensional due to the large number of decision variables required. Evolutionary algorithms are suitable techniques to solve the above-mentioned problem. In this paper, we design a CR engine for wireless multicarrier transceivers using real-coded biogeography-based optimization (RCBBO). The CR engine also uses a fuzzy decision maker for obtaining the best compromised solution. RCBBO uses a mutation operator in order to improve the diversity of the population and enhance the exploration ability of the original BBO algorithm. The simulation results show that the RCBBO driven CR engine can obtain better results than the original BBO and outperform results from the literature. Moreover, RCBBO is more efficient when applied to high-dimensional problems in cases of multicarrier system.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Survey of IoT Key Enabling and Future Technologies: 5G, Mobile IoT, Sematic Web and Applications.\n \n \n \n\n\n \n Goudos, S., K.; Dallas, P., I.; Chatziefthymiou, S.; and Kyriazakos, S.\n\n\n \n\n\n\n Wireless Personal Communications, 97(2): 1645-1675. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A Survey of IoT Key Enabling and Future Technologies: 5G, Mobile IoT, Sematic Web and Applications},\n type = {article},\n year = {2017},\n keywords = {5G,Internet of Things,LTE,Semantic Web,Smart City},\n pages = {1645-1675},\n volume = {97},\n id = {fc8392fb-e4d3-371c-8188-7f493cf7b658},\n created = {2020-02-29T16:57:43.464Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.491Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2017b},\n private_publication = {false},\n abstract = {The Internet of Things (IoT) is the communications paradigm that can provide the potential of ultimate communication. The IoT paradigm describes communication not only human to human (H2H) but also machine to machine (M2M) without the need of human interference. In this paper, we examine, review and present the current IoT technologies starting from the physical layer to the application and data layer. Additionally, we focus on future IoT key enabling technologies like the new fifth generation (5G) networks and Semantic Web. Finally, we present main IoT application domains like smart cities, transportation, logistics, and healthcare.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Dallas, Panagiotis I. and Chatziefthymiou, Stella and Kyriazakos, Sofoklis},\n doi = {10.1007/s11277-017-4647-8},\n journal = {Wireless Personal Communications},\n number = {2}\n}
\n
\n\n\n
\n The Internet of Things (IoT) is the communications paradigm that can provide the potential of ultimate communication. The IoT paradigm describes communication not only human to human (H2H) but also machine to machine (M2M) without the need of human interference. In this paper, we examine, review and present the current IoT technologies starting from the physical layer to the application and data layer. Additionally, we focus on future IoT key enabling technologies like the new fifth generation (5G) networks and Semantic Web. Finally, we present main IoT application domains like smart cities, transportation, logistics, and healthcare.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Antenna selection for MIMO systems using biogeography based optimization.\n \n \n \n\n\n \n Fountoukidis, K., C.; Siakavara, K.; Goudos, S., K.; and Kalialakis, C.\n\n\n \n\n\n\n In 2017 International Workshop on Antenna Technology: Small Antennas, Innovative Structures, and Applications, iWAT 2017, pages 319-322, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Antenna selection for MIMO systems using biogeography based optimization},\n type = {inproceedings},\n year = {2017},\n keywords = {Ant colony optimization (ACO),Antenna selection (AS),Biogeography-based optimization (BBO),Evolutionary algorithms (EA),Genetic algorithm (GA),Multiple-input multiple-output (MIMO) systems},\n pages = {319-322},\n id = {f30eb608-8f43-3e99-822f-c6adf60e085e},\n created = {2020-02-29T16:57:43.493Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.746Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Fountoukidis2017},\n private_publication = {false},\n abstract = {In this work, we solve a problem of antenna selection (AS) for a multiple-input multiple-output (MIMO) system under the constraint of the channel capacity maximization. The biogeography-based optimization (BBO) algorithm is applied on the joint transmitter and receiver AS for the channel capacity function. We apply different BBO migration models for simulated channels. The comparisons with other popular evolutionary algorithms such as the genetic algorithm (GA) and the ant colony optimization (ACO) show the efficiency and the applicability of the BBO algorithm. Results are given for three representative scenarios involving selection of 2×4, 3×5, 4×6 antennas in a 16×16 MIMO system.},\n bibtype = {inproceedings},\n author = {Fountoukidis, Konstantinos C. and Siakavara, Katherine and Goudos, Sotirios K. and Kalialakis, Christos},\n doi = {10.1109/IWAT.2017.7915390},\n booktitle = {2017 International Workshop on Antenna Technology: Small Antennas, Innovative Structures, and Applications, iWAT 2017}\n}
\n
\n\n\n
\n In this work, we solve a problem of antenna selection (AS) for a multiple-input multiple-output (MIMO) system under the constraint of the channel capacity maximization. The biogeography-based optimization (BBO) algorithm is applied on the joint transmitter and receiver AS for the channel capacity function. We apply different BBO migration models for simulated channels. The comparisons with other popular evolutionary algorithms such as the genetic algorithm (GA) and the ant colony optimization (ACO) show the efficiency and the applicability of the BBO algorithm. Results are given for three representative scenarios involving selection of 2×4, 3×5, 4×6 antennas in a 16×16 MIMO system.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Optimization of Power Consumption in 4G LTE Networks Using a Novel Barebones Self-adaptive Differential Evolution Algorithm.\n \n \n \n\n\n \n Goudos, S., K.; Deruyck, M.; Plets, D.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n Telecommunication Systems, 66(1): 109-120. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Optimization of Power Consumption in 4G LTE Networks Using a Novel Barebones Self-adaptive Differential Evolution Algorithm},\n type = {article},\n year = {2017},\n keywords = {Barebones differential evolution,Base stations,Coverage,Differential evolution,LTE,Power consumption},\n pages = {109-120},\n volume = {66},\n id = {48cb9a50-1966-3e27-a2ab-4171f984177b},\n created = {2020-02-29T16:57:44.075Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.316Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2017a},\n private_publication = {false},\n abstract = {The power consumption of wireless access networks is an important issue. In this paper, the power consumption of Long Term Evolution (LTE) base stations is optimized. We consider the city of Ghent, Belgium with 75 possible LTE base station locations. We optimize the network towards two objectives: the coverage maximization and the power consumption minimization. We propose a new Barebones Self-adaptive Differential Evolution. The results of the proposed method indicate the advantages and applicability of our approach.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Deruyck, Margot and Plets, David and Martens, Luc and Joseph, Wout},\n doi = {10.1007/s11235-017-0279-2},\n journal = {Telecommunication Systems},\n number = {1}\n}
\n
\n\n\n
\n The power consumption of wireless access networks is an important issue. In this paper, the power consumption of Long Term Evolution (LTE) base stations is optimized. We consider the city of Ghent, Belgium with 75 possible LTE base station locations. We optimize the network towards two objectives: the coverage maximization and the power consumption minimization. We propose a new Barebones Self-adaptive Differential Evolution. The results of the proposed method indicate the advantages and applicability of our approach.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Evolutionary design of a dual band E-shaped patch antenna for 5G mobile communications.\n \n \n \n\n\n \n Goudos, S., K.; Tsiflikiotis, A.; Babas, D.; Siakavara, K.; Kalialakis, C.; and Karagiannidis, G., K.\n\n\n \n\n\n\n In 2017 6th International Conference on Modern Circuits and Systems Technologies, MOCAST 2017, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Evolutionary design of a dual band E-shaped patch antenna for 5G mobile communications},\n type = {inproceedings},\n year = {2017},\n keywords = {5G,TLBO algorithm,dual-band operation,mmWave,mobile communications,patch antennas},\n id = {d4ddd908-8ed1-301e-8427-435ddd09270b},\n created = {2020-02-29T16:57:44.972Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.736Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2017},\n private_publication = {false},\n abstract = {Fifth generation (5G) wireless technology is a promising solution for multi-Gbps data rates in future mobile communications. The new devices are expected to operate at millimeter wave frequencies. To address the 5G requirements novel antennas have to be developed. In this paper the Teaching-Learning-Optimization (TLBO) algorithm is applied in order to design a dual-band E-shaped patch antenna. The geometrical parameters of the aperture-coupled antenna are the inputs of the optimization algorithm. The method gives acceptable design solutions achieving simultaneously S11 minimization and low VSWR at the frequencies of interest (25GHz and 37GHz).},\n bibtype = {inproceedings},\n author = {Goudos, S. K. and Tsiflikiotis, A. and Babas, D. and Siakavara, K. and Kalialakis, C. and Karagiannidis, G. K.},\n doi = {10.1109/MOCAST.2017.7937640},\n booktitle = {2017 6th International Conference on Modern Circuits and Systems Technologies, MOCAST 2017}\n}
\n
\n\n\n
\n Fifth generation (5G) wireless technology is a promising solution for multi-Gbps data rates in future mobile communications. The new devices are expected to operate at millimeter wave frequencies. To address the 5G requirements novel antennas have to be developed. In this paper the Teaching-Learning-Optimization (TLBO) algorithm is applied in order to design a dual-band E-shaped patch antenna. The geometrical parameters of the aperture-coupled antenna are the inputs of the optimization algorithm. The method gives acceptable design solutions achieving simultaneously S11 minimization and low VSWR at the frequencies of interest (25GHz and 37GHz).\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Experimental optimization of exposure index and quality of service in WLAN networks.\n \n \n \n\n\n \n Plets, D.; Vermeeren, G.; De Poorter, E.; Moerman, I.; Goudos, S., K.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n Radiation Protection Dosimetry, 175(3): 394-405. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Experimental optimization of exposure index and quality of service in WLAN networks},\n type = {article},\n year = {2017},\n pages = {394-405},\n volume = {175},\n id = {57944ad9-035e-3b21-a595-78a4f254d248},\n created = {2020-02-29T16:57:45.315Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.163Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Plets2017},\n private_publication = {false},\n abstract = {This paper presents the first real-life optimization of the Exposure Index (EI). A genetic optimization algorithm is developed and applied to three real-life Wireless Local Area Network scenarios in an experimental testbed. The optimization accounts for downlink, uplink and uplink of other users, for realistic duty cycles, and ensures a sufficient Quality of Service to all users. EI reductions up to 97.5% compared to a reference configuration can be achieved in a downlink-only scenario, in combination with an improved Quality of Service. Due to the dominance of uplink exposure and the lack of WiFi power control, no optimizations are possible in scenarios that also consider uplink traffic. However, future deployments that do implement WiFi power control can be successfully optimized, with EI reductions up to 86% compared to a reference configuration and an EI that is 278 times lower than optimized configurations under the absence of power control.},\n bibtype = {article},\n author = {Plets, David and Vermeeren, Günter and De Poorter, Eli and Moerman, Ingrid and Goudos, Sotirios K. and Martens, Luc and Joseph, Wout},\n doi = {10.1093/rpd/ncw363},\n journal = {Radiation Protection Dosimetry},\n number = {3}\n}
\n
\n\n\n
\n This paper presents the first real-life optimization of the Exposure Index (EI). A genetic optimization algorithm is developed and applied to three real-life Wireless Local Area Network scenarios in an experimental testbed. The optimization accounts for downlink, uplink and uplink of other users, for realistic duty cycles, and ensures a sufficient Quality of Service to all users. EI reductions up to 97.5% compared to a reference configuration can be achieved in a downlink-only scenario, in combination with an improved Quality of Service. Due to the dominance of uplink exposure and the lack of WiFi power control, no optimizations are possible in scenarios that also consider uplink traffic. However, future deployments that do implement WiFi power control can be successfully optimized, with EI reductions up to 86% compared to a reference configuration and an EI that is 278 times lower than optimized configurations under the absence of power control.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Performance Comparison of 4G and Massive MIMO Network Configurations Using Heuristic and Metaheuristic Approaches.\n \n \n \n\n\n \n Sotirios Goudos; Deruyck, M.; Plets, D.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n In 2017 11th European Conference on Antennas and Propagation (EUCAP) (EuCAP 2017), pages 3172-3176, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Performance Comparison of 4G and Massive MIMO Network Configurations Using Heuristic and Metaheuristic Approaches},\n type = {inproceedings},\n year = {2017},\n pages = {3172-3176},\n city = {Paris, France},\n id = {744466d4-55a1-3f0b-bfab-0a4c3ca32df5},\n created = {2022-07-14T18:38:19.111Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-14T18:38:19.111Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goud1703:Performance},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The reduction of power consumption in wireless access networks is a challenging and important issue, which will also play an important role in future cellular systems. Massive MIMO (multiple-input multiple-output) is one of the key technologies to handle orders of magnitude more data traffic and to be included in the fifth generation (5G) cellular systems. In this paper, we compare 4G and Massive MIMO network configurations. Our main objective is to reduce power consumption by responding to the instantaneous bit rate demand by the user. We study the application of a capacity-based heuristic and an evolutionary algorithm (EA) to the above-mentioned network design problem. Moreover, we introduce a new hybrid approach that uses both an EA and concepts from the capacity-based heuristic. We compare and discuss the preliminary results of both technologies.},\n bibtype = {inproceedings},\n author = {Sotirios Goudos, undefined and Deruyck, Margot and Plets, David and Martens, Luc and Joseph, Wout},\n booktitle = {2017 11th European Conference on Antennas and Propagation (EUCAP) (EuCAP 2017)}\n}
\n
\n\n\n
\n The reduction of power consumption in wireless access networks is a challenging and important issue, which will also play an important role in future cellular systems. Massive MIMO (multiple-input multiple-output) is one of the key technologies to handle orders of magnitude more data traffic and to be included in the fifth generation (5G) cellular systems. In this paper, we compare 4G and Massive MIMO network configurations. Our main objective is to reduce power consumption by responding to the instantaneous bit rate demand by the user. We study the application of a capacity-based heuristic and an evolutionary algorithm (EA) to the above-mentioned network design problem. Moreover, we introduce a new hybrid approach that uses both an EA and concepts from the capacity-based heuristic. We compare and discuss the preliminary results of both technologies.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (12)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A novel generalized oppositional biogeography-based optimization algorithm: Application to peak to average power ratio reduction in OFDM systems.\n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Open Mathematics, 14(1): 705-722. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A novel generalized oppositional biogeography-based optimization algorithm: Application to peak to average power ratio reduction in OFDM systems},\n type = {article},\n year = {2016},\n keywords = {Biogeography-based optimization (BBO),Combinatorial optimization,Evolutionary algorithms,OFDM,Opposition based Learning,PAPR,PTS},\n pages = {705-722},\n volume = {14},\n id = {4df91578-6d66-39b8-bed3-65efda26a959},\n created = {2020-02-29T16:57:41.805Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.721Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2016g},\n private_publication = {false},\n abstract = {A major drawback of orthogonal frequency division multiplexing (OFDM) signals is the high value of peak to average power ratio (PAPR). Partial transmit sequences (PTS) is a popular PAPR reduction method with good PAPR reduction performance, but its search complexity is high. In this paper, in order to reduce PTS search complexity we propose a new technique based on biogeography-based optimization (BBO). More specifically, we present a new Generalized Oppositional Biogeography Based Optimization (GOBBO) algorithm which is enhanced with Oppositional Based Learning (OBL) techniques. We apply both the original BBO and the new Generalized Oppositional BBO (GOBBO) to the PTS problem. The GOBBO-PTS method is compared with other PTS schemes for PAPR reduction found in the literature. The simulation results show that GOBBO and BBO are in general highly efficient in producing significant PAPR reduction and reducing the PTS search complexity.},\n bibtype = {article},\n author = {Goudos, Sotirios K.},\n doi = {10.1515/math-2016-0066},\n journal = {Open Mathematics},\n number = {1}\n}
\n
\n\n\n
\n A major drawback of orthogonal frequency division multiplexing (OFDM) signals is the high value of peak to average power ratio (PAPR). Partial transmit sequences (PTS) is a popular PAPR reduction method with good PAPR reduction performance, but its search complexity is high. In this paper, in order to reduce PTS search complexity we propose a new technique based on biogeography-based optimization (BBO). More specifically, we present a new Generalized Oppositional Biogeography Based Optimization (GOBBO) algorithm which is enhanced with Oppositional Based Learning (OBL) techniques. We apply both the original BBO and the new Generalized Oppositional BBO (GOBBO) to the PTS problem. The GOBBO-PTS method is compared with other PTS schemes for PAPR reduction found in the literature. The simulation results show that GOBBO and BBO are in general highly efficient in producing significant PAPR reduction and reducing the PTS search complexity.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Design of Large Thinned Arrays Using Different Biogeography-Based Optimization Migration Models.\n \n \n \n\n\n \n Goudos, S., K.; and Sahalos, J., N.\n\n\n \n\n\n\n International Journal of Antennas and Propagation, 2016. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Design of Large Thinned Arrays Using Different Biogeography-Based Optimization Migration Models},\n type = {article},\n year = {2016},\n volume = {2016},\n id = {d705b4e2-e27f-3a6b-a1ae-756c32971a9d},\n created = {2020-02-29T16:57:41.997Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.276Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2016f},\n private_publication = {false},\n abstract = {Array thinning is a common discrete-valued combinatorial optimization problem. Evolutionary algorithms are suitable techniques for above-mentioned problem. Biogeography-Based Optimization (BBO), which is inspired by the science of biogeography, is a stochastic population-based evolutionary algorithm (EA). The original BBO uses a linear migration model to describe how species migrate from one island to another. Other nonlinear migration models have been proposed in the literature. In this paper, we apply BBO with four different migration models to five different large array design cases. Additionally we compare results with five other popular algorithms. The problems dimensions range from 150 to 300. The results show that BBO with sinusoidal migration model generally performs better than the other algorithms. However, these results are considered to be indicative and do not generally apply to all optimization problems in antenna design.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Sahalos, John N.},\n doi = {10.1155/2016/5359298},\n journal = {International Journal of Antennas and Propagation}\n}
\n
\n\n\n
\n Array thinning is a common discrete-valued combinatorial optimization problem. Evolutionary algorithms are suitable techniques for above-mentioned problem. Biogeography-Based Optimization (BBO), which is inspired by the science of biogeography, is a stochastic population-based evolutionary algorithm (EA). The original BBO uses a linear migration model to describe how species migrate from one island to another. Other nonlinear migration models have been proposed in the literature. In this paper, we apply BBO with four different migration models to five different large array design cases. Additionally we compare results with five other popular algorithms. The problems dimensions range from 150 to 300. The results show that BBO with sinusoidal migration model generally performs better than the other algorithms. However, these results are considered to be indicative and do not generally apply to all optimization problems in antenna design.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Optimal power allocation in wireless sensor networks using emerging nature-inspired algorithms.\n \n \n \n\n\n \n Tsiflikiotis, A.; and Goudos, S., K.\n\n\n \n\n\n\n In 2016 5th International Conference on Modern Circuits and Systems Technologies, MOCAST 2016, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Optimal power allocation in wireless sensor networks using emerging nature-inspired algorithms},\n type = {inproceedings},\n year = {2016},\n keywords = {cat swarm optimization,cuckoo search,optimal power allocation,particle swarm optimization,wireless sensor network},\n id = {d9d77a12-3e69-3515-a9d3-baa1b6cb953b},\n created = {2020-02-29T16:57:42.052Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.702Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Tsiflikiotis2016},\n private_publication = {false},\n abstract = {Optimal power allocation problem for decentralized detection in a wireless sensor network (WSN) is presented. Our goal is to find a numerical solution for the optimal power allocation scheme that minimizes the total power spent by the wireless sensor network so that the detection error probability is below a desired value. We evaluate and compare the performance of two emerging nature inspired algorithms like the Cat Swarm Optimization (CSO), and the Cuckoo Search (CS). Both are also compared with the popular Particle Swarm Optimization (PSO) algorithm. The results show that PSO provides slightly better solutions when the network consists of a small number of sensors, while CSO outperforms the other algorithms as the number of sensors increases.},\n bibtype = {inproceedings},\n author = {Tsiflikiotis, Antonios and Goudos, Sotirios K.},\n doi = {10.1109/MOCAST.2016.7495127},\n booktitle = {2016 5th International Conference on Modern Circuits and Systems Technologies, MOCAST 2016}\n}
\n
\n\n\n
\n Optimal power allocation problem for decentralized detection in a wireless sensor network (WSN) is presented. Our goal is to find a numerical solution for the optimal power allocation scheme that minimizes the total power spent by the wireless sensor network so that the detection error probability is below a desired value. We evaluate and compare the performance of two emerging nature inspired algorithms like the Cat Swarm Optimization (CSO), and the Cuckoo Search (CS). Both are also compared with the popular Particle Swarm Optimization (PSO) algorithm. The results show that PSO provides slightly better solutions when the network consists of a small number of sensors, while CSO outperforms the other algorithms as the number of sensors increases.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A comparative study of different biogeography based optimization migration models performance on antenna array thinning problems.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n In 2016 International Conference on High Performance Computing and Simulation, HPCS 2016, pages 270-277, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A comparative study of different biogeography based optimization migration models performance on antenna array thinning problems},\n type = {inproceedings},\n year = {2016},\n keywords = {Linear array synthesis,array thinning,biogeography based optimization,evolutionary algorithms,migration models,optimization methods},\n pages = {270-277},\n id = {c443f0a9-c008-3c88-81c2-554dc64b79e4},\n created = {2020-02-29T16:57:42.381Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.985Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2016e},\n private_publication = {false},\n abstract = {Biogeography-Based Optimization (BBO) which is inspired by the science of biogeography, is a stochastic population-based Evolutionary Algorithm (EA). The original BBO uses a linear migration model to describe how species migrate from one island to another. Other non-linear migration models have been proposed in the literature. A popular combinatorial optimization problem in antenna design is array thinning. The purpose of this paper to study the performance of these models on antenna array thinning problems. We apply BBO with four different migration models to five different array design cases. The problems dimensions range from 50 to 300. The results show that BBO with sinusoidal migration model generally performs better than the other models. However, these results are considered to be indicative and do not generally apply to all optimization problems in antenna design.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Sahalos, John N.},\n doi = {10.1109/HPCSim.2016.7568346},\n booktitle = {2016 International Conference on High Performance Computing and Simulation, HPCS 2016}\n}
\n
\n\n\n
\n Biogeography-Based Optimization (BBO) which is inspired by the science of biogeography, is a stochastic population-based Evolutionary Algorithm (EA). The original BBO uses a linear migration model to describe how species migrate from one island to another. Other non-linear migration models have been proposed in the literature. A popular combinatorial optimization problem in antenna design is array thinning. The purpose of this paper to study the performance of these models on antenna array thinning problems. We apply BBO with four different migration models to five different array design cases. The problems dimensions range from 50 to 300. The results show that BBO with sinusoidal migration model generally performs better than the other models. However, these results are considered to be indicative and do not generally apply to all optimization problems in antenna design.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Evolutionary algorithms applied to antennas and propagation: A review of state of the art.\n \n \n \n\n\n \n Goudos, S., K.; Kalialakis, C.; and Mittra, R.\n\n\n \n\n\n\n 2016.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{\n title = {Evolutionary algorithms applied to antennas and propagation: A review of state of the art},\n type = {misc},\n year = {2016},\n source = {International Journal of Antennas and Propagation},\n volume = {2016},\n id = {754a5ca7-2cb5-3b1a-9b79-de13856a6a59},\n created = {2020-02-29T16:57:42.583Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.563Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2016d},\n private_publication = {false},\n abstract = {A review of evolutionary algorithms (EAs) with applications to antenna and propagation problems is presented. EAs have emerged as viable candidates for global optimization problems and have been attracting the attention of the research community interested in solving real-world engineering problems, as evidenced by the fact that very large number of antenna design problems have been addressed in the literature in recent years by using EAs. In this paper, our primary focus is on Genetic Algorithms (GAs), Particle Swarm Optimization (PSO), and Differential Evolution (DE), though we also briefly review other recently introduced nature-inspired algorithms. An overview of case examples optimized by each family of algorithms is included in the paper.},\n bibtype = {misc},\n author = {Goudos, Sotirios K. and Kalialakis, Christos and Mittra, Raj},\n doi = {10.1155/2016/1010459}\n}
\n
\n\n\n
\n A review of evolutionary algorithms (EAs) with applications to antenna and propagation problems is presented. EAs have emerged as viable candidates for global optimization problems and have been attracting the attention of the research community interested in solving real-world engineering problems, as evidenced by the fact that very large number of antenna design problems have been addressed in the literature in recent years by using EAs. In this paper, our primary focus is on Genetic Algorithms (GAs), Particle Swarm Optimization (PSO), and Differential Evolution (DE), though we also briefly review other recently introduced nature-inspired algorithms. An overview of case examples optimized by each family of algorithms is included in the paper.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A software tool for aging analysis of the CMOS inverter based on hot carrier degradation modeling.\n \n \n \n\n\n \n Messaris, I.; Goudos, S., K.; Nikolaidis, S.; and Dimitriadis, C., A.\n\n\n \n\n\n\n In 2016 5th International Conference on Modern Circuits and Systems Technologies, MOCAST 2016, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A software tool for aging analysis of the CMOS inverter based on hot carrier degradation modeling},\n type = {inproceedings},\n year = {2016},\n keywords = {Degradation model,MATLAB GUI,hot-carrier effect,n-FinFETs},\n id = {6a050bf2-67f9-364e-982e-f639d210ba87},\n created = {2020-02-29T16:57:43.520Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.919Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Messaris2016},\n private_publication = {false},\n abstract = {It has been made clear that the presence of hot carriers triggers a series of physical processes that affects the FD-SOI and FinFET device characteristics under normal circuit operation. These effects cumulatively build up over prolonged periods, causing the circuit to age with time, resulting in performance degradations that may eventually lead to circuit failure. In this paper we tackle with the HC effects using a software tool that is able to quantify the HC induced degradation of the devices in a design, and furthermore predict the lifetime of the corresponding circuit. We present the Graphical User Interface (GUI) and we give examples of tool operation.},\n bibtype = {inproceedings},\n author = {Messaris, I. and Goudos, S. K. and Nikolaidis, S. and Dimitriadis, C. A.},\n doi = {10.1109/MOCAST.2016.7495148},\n booktitle = {2016 5th International Conference on Modern Circuits and Systems Technologies, MOCAST 2016}\n}
\n
\n\n\n
\n It has been made clear that the presence of hot carriers triggers a series of physical processes that affects the FD-SOI and FinFET device characteristics under normal circuit operation. These effects cumulatively build up over prolonged periods, causing the circuit to age with time, resulting in performance degradations that may eventually lead to circuit failure. In this paper we tackle with the HC effects using a software tool that is able to quantify the HC induced degradation of the devices in a design, and furthermore predict the lifetime of the corresponding circuit. We present the Graphical User Interface (GUI) and we give examples of tool operation.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Optimizing wireless access networks towards power consumption: Influence of the optimization algorithm.\n \n \n \n\n\n \n Deruyck, M.; Plets, D.; Martens, L.; Joseph, W.; and Goudos, S., K.\n\n\n \n\n\n\n In 2016 International Conference on High Performance Computing and Simulation, HPCS 2016, pages 261-265, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Optimizing wireless access networks towards power consumption: Influence of the optimization algorithm},\n type = {inproceedings},\n year = {2016},\n keywords = {LTE-A,energy efficiency,network design,optimization algorithm,power consumption,wireless access networks},\n pages = {261-265},\n id = {bcc6b70a-83ca-3a89-9ff9-0b317fced2af},\n created = {2020-02-29T16:57:44.091Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.494Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Deruyck2016},\n private_publication = {false},\n abstract = {Nowadays, wireless access networks are already amongst the top power consumers in the ICT (Information and Communication Technology) sector. As it expected that these networks will further expand in the future due to the extreme growth in mobile devices and the high bit rate demand of the applications running on these devices, it is important to consider power consumption as a key parameter in the network design phase. In this paper, two optimization algorithms are proposed: a capacity-based heuristic which aims to reduce power consumption by responding to the instantaneous bit rate demand by the user and an evolutionary opposition-based learning algorithm focusing on the joint-optimization of power consumption and geometrical coverage. Applying both algorithms on a realistic suburban case in Ghent, Belgium, show that both algorithms are able to design an LTE-A network consuming only 24% and 29%, respectively, of the power consumed by the reference scenario which is representative for today's networks. The evolutionary algorithm outperforms the capacity-based algorithm by obtaining a 5% lower power consumption, while the capacity-based heuristic has a 2 to 3% higher coverage. Future research in joint-optimization algorithms of energy and network performance is definitely needed.},\n bibtype = {inproceedings},\n author = {Deruyck, Margot and Plets, David and Martens, Luc and Joseph, Wout and Goudos, Sotirios K.},\n doi = {10.1109/HPCSim.2016.7568344},\n booktitle = {2016 International Conference on High Performance Computing and Simulation, HPCS 2016}\n}
\n
\n\n\n
\n Nowadays, wireless access networks are already amongst the top power consumers in the ICT (Information and Communication Technology) sector. As it expected that these networks will further expand in the future due to the extreme growth in mobile devices and the high bit rate demand of the applications running on these devices, it is important to consider power consumption as a key parameter in the network design phase. In this paper, two optimization algorithms are proposed: a capacity-based heuristic which aims to reduce power consumption by responding to the instantaneous bit rate demand by the user and an evolutionary opposition-based learning algorithm focusing on the joint-optimization of power consumption and geometrical coverage. Applying both algorithms on a realistic suburban case in Ghent, Belgium, show that both algorithms are able to design an LTE-A network consuming only 24% and 29%, respectively, of the power consumed by the reference scenario which is representative for today's networks. The evolutionary algorithm outperforms the capacity-based algorithm by obtaining a 5% lower power consumption, while the capacity-based heuristic has a 2 to 3% higher coverage. Future research in joint-optimization algorithms of energy and network performance is definitely needed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Evolutionary Algorithms Applied to Antennas and Propagation: Emerging Trends and Applications.\n \n \n \n\n\n \n Goudos, S., K.; Anagnostou, D., E.; Kalialakis, C.; Vasant, P.; and Nikolaou, S.\n\n\n \n\n\n\n 2016.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{\n title = {Evolutionary Algorithms Applied to Antennas and Propagation: Emerging Trends and Applications},\n type = {misc},\n year = {2016},\n source = {International Journal of Antennas and Propagation},\n volume = {2016},\n id = {414269e1-c32d-392f-89dc-767ca7cdfd44},\n created = {2020-02-29T16:57:44.141Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.921Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2016c},\n private_publication = {false},\n bibtype = {misc},\n author = {Goudos, Sotirios K. and Anagnostou, Dimitris E. and Kalialakis, Christos and Vasant, Pandian and Nikolaou, Symeon},\n doi = {10.1155/2016/5279647}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Optimization of power consumption in wireless access networks using Differential Evolution with eigenvector based crossover operator.\n \n \n \n\n\n \n Goudos, S., K.; Deruyck, M.; Plets, D.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n In 2016 10th European Conference on Antennas and Propagation, EuCAP 2016, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Optimization of power consumption in wireless access networks using Differential Evolution with eigenvector based crossover operator},\n type = {inproceedings},\n year = {2016},\n keywords = {LTE,base station,coverage,differential evolution,network planning,power consumption},\n id = {3c07b195-5c09-3d53-8e8f-c2a8fafe8c69},\n created = {2020-02-29T16:57:44.152Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.742Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2016b},\n private_publication = {false},\n abstract = {The power consumption of wireless access networks is an important issue. In this paper, the power consumption of LTE base stations is optimized. We consider the city of Ghent, Belgium with 75 possible LTE base station locations. We optimize the network towards two objectives: the coverage maximization and the power consumption minimization. We propose a design framework based on Differential Evolution with eigenvector-based crossover operator. The results of the proposed method indicate the advantages and applicability of our approach.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Deruyck, Margot and Plets, David and Martens, Luc and Joseph, Wout},\n doi = {10.1109/EuCAP.2016.7481359},\n booktitle = {2016 10th European Conference on Antennas and Propagation, EuCAP 2016}\n}
\n
\n\n\n
\n The power consumption of wireless access networks is an important issue. In this paper, the power consumption of LTE base stations is optimized. We consider the city of Ghent, Belgium with 75 possible LTE base station locations. We optimize the network towards two objectives: the coverage maximization and the power consumption minimization. We propose a design framework based on Differential Evolution with eigenvector-based crossover operator. The results of the proposed method indicate the advantages and applicability of our approach.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of opposition-based learning concepts in reducing the power consumption in wireless access networks.\n \n \n \n\n\n \n Goudos, S., K.; Deruyck, M.; Plets, D.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n In 2016 23rd International Conference on Telecommunications, ICT 2016, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Application of opposition-based learning concepts in reducing the power consumption in wireless access networks},\n type = {inproceedings},\n year = {2016},\n id = {4e821804-cc63-3d8d-99c9-1b589475f103},\n created = {2020-02-29T16:57:44.194Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.785Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2016a},\n private_publication = {false},\n abstract = {The reduction of power consumption in wireless access networks is a challenging and important issue. In this paper, we apply Opposition-Based Learning (OBL) concepts for reducing the power consumption of LTE base stations. More specifically, we present a new Modified Biogeography Based Optimization (BBO) algorithm enhanced with OBL techniques. We apply both the original BBO and the new Modified Opposition BBO (MOBBO) to network design cases to the city of Ghent, Belgium, with 75 possible LTE base station locations. We optimize the network towards two objectives: coverage maximization and power consumption minimization. Preliminary results indicate the advantages and applicability of our approach.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Deruyck, Margot and Plets, David and Martens, Luc and Joseph, Wout},\n doi = {10.1109/ICT.2016.7500426},\n booktitle = {2016 23rd International Conference on Telecommunications, ICT 2016}\n}
\n
\n\n\n
\n The reduction of power consumption in wireless access networks is a challenging and important issue. In this paper, we apply Opposition-Based Learning (OBL) concepts for reducing the power consumption of LTE base stations. More specifically, we present a new Modified Biogeography Based Optimization (BBO) algorithm enhanced with OBL techniques. We apply both the original BBO and the new Modified Opposition BBO (MOBBO) to network design cases to the city of Ghent, Belgium, with 75 possible LTE base station locations. We optimize the network towards two objectives: coverage maximization and power consumption minimization. Preliminary results indicate the advantages and applicability of our approach.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of Gbest-guided artificial bee colony algorithm to passive UHF RFID tag design.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; Theopoulos, A.; Vafiadis, E., E.; and Sahalos, J., N.\n\n\n \n\n\n\n International Journal of Microwave and Wireless Technologies, 8(3): 537-545. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Application of Gbest-guided artificial bee colony algorithm to passive UHF RFID tag design},\n type = {article},\n year = {2016},\n keywords = {Antennas and propagation for wireless systems,RFID and sensors},\n pages = {537-545},\n volume = {8},\n id = {a52a0c9b-467b-31d0-8529-c7b7754a7ca5},\n created = {2020-02-29T16:57:44.305Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.713Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2016},\n private_publication = {false},\n abstract = {In this paper, new planar spiral antennas with meander lines and loads for passive Radiofrequency identification tag application at ultra-high-frequency band are designed and optimized using the global best (gbest)-guided Artificial Bee Colony (GABC) algorithm. The GABC is an improved Artificial Bee Colony algorithm, which includes gbest solution information into the search equation to improve the exploitation. The optimization goals are antenna size minimization, gain maximization, and conjugate matching. The antenna dimensions were optimized and evaluated in conjunction with commercial software FEKO. GABC is compared with other popular algorithms. The optimization results produced show that GABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Theopoulos, Argiris and Vafiadis, Elias E. and Sahalos, John N.},\n doi = {10.1017/S1759078715000902},\n journal = {International Journal of Microwave and Wireless Technologies},\n number = {3}\n}
\n
\n\n\n
\n In this paper, new planar spiral antennas with meander lines and loads for passive Radiofrequency identification tag application at ultra-high-frequency band are designed and optimized using the global best (gbest)-guided Artificial Bee Colony (GABC) algorithm. The GABC is an improved Artificial Bee Colony algorithm, which includes gbest solution information into the search equation to improve the exploitation. The optimization goals are antenna size minimization, gain maximization, and conjugate matching. The antenna dimensions were optimized and evaluated in conjunction with commercial software FEKO. GABC is compared with other popular algorithms. The optimization results produced show that GABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Application of Artificial Bee Colony Algorithms to Antenna Design Problems for RFID Applications.\n \n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n Handbook of Research on Modern Optimization Algorithms and Applications in Engineering and Economics, pages 236-265. Vasant, P.; Weber, G.; and Dieu, V., N., editor(s). IGI Global, 2016.\n \n\n\n\n
\n\n\n\n \n \n \"HandbookWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2016},\n pages = {236-265},\n websites = {https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-9644-0.ch009},\n publisher = {IGI Global},\n city = {Hershey, PA, USA},\n id = {a423beff-3725-3e1b-82d3-1ff82120bb85},\n created = {2023-02-11T21:19:22.292Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:19:22.292Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Vasant2016},\n source_type = {incollection},\n private_publication = {false},\n abstract = {In this chapter, the Artificial Bee Colony (ABC) algorithm and its variants are presented and applied to spiral antennas design for RFID tag application at the UHF band. The ABC variants include the Improved ABC (I-ABC), which is an improved version of the original ABC algorithm. The I-ABC introduces the best-so-far solution, inertia weight and acceleration coefficients to modify the search process. Furthermore, another ABC variant is the Gbest ABC (ABC), which includes global best (gbest) solution information into the search equation to improve the exploitation. These algorithms are applied to antenna design where the optimization goals are antenna size minimization, gain maximization, and conjugate matching. The algorithms performance is compared with other popular evolutionary algorithms. The optimization results produced show that the ABC family of algorithms is a powerful tool that can be efficiently applied to antenna design problems.},\n bibtype = {inbook},\n author = {Goudos, Sotirios K and Siakavara, Katherine and Sahalos, John N},\n editor = {Vasant, Pandian and Weber, Gerhard-Wilhelm and Dieu, Vo Ngoc},\n doi = {10.4018/978-1-4666-9644-0.ch009},\n chapter = {Application of Artificial Bee Colony Algorithms to Antenna Design Problems for RFID Applications},\n title = {Handbook of Research on Modern Optimization Algorithms and Applications in Engineering and Economics}\n}
\n
\n\n\n
\n In this chapter, the Artificial Bee Colony (ABC) algorithm and its variants are presented and applied to spiral antennas design for RFID tag application at the UHF band. The ABC variants include the Improved ABC (I-ABC), which is an improved version of the original ABC algorithm. The I-ABC introduces the best-so-far solution, inertia weight and acceleration coefficients to modify the search process. Furthermore, another ABC variant is the Gbest ABC (ABC), which includes global best (gbest) solution information into the search equation to improve the exploitation. These algorithms are applied to antenna design where the optimization goals are antenna size minimization, gain maximization, and conjugate matching. The algorithms performance is compared with other popular evolutionary algorithms. The optimization results produced show that the ABC family of algorithms is a powerful tool that can be efficiently applied to antenna design problems.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Shaped beam pattern synthesis of antenna arrays using composite differential evolution with eigenvector-based crossover operator.\n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n International Journal of Antennas and Propagation, 2015. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Shaped beam pattern synthesis of antenna arrays using composite differential evolution with eigenvector-based crossover operator},\n type = {article},\n year = {2015},\n volume = {2015},\n id = {bb49542f-88ac-379a-8a68-aa2dc581a754},\n created = {2020-02-29T16:57:41.806Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.582Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2015c},\n private_publication = {false},\n abstract = {This paper addresses the problem of designing shaped beam patterns with arbitrary arrays subject to constraints. The constraints could include the sidelobe level suppression in specified angular intervals, the mainlobe halfpower beamwidth, and the predefined number of elements. In this paper, we propose a new Differential Evolution algorithm, which combines Composite DE with an eigenvector-based crossover operator (CODE-EIG). This operator utilizes eigenvectors of covariance matrix of individual solutions, which makes the crossover rotationally invariant. We apply this novel design method to shaped beam pattern synthesis for linear and conformal arrays. We compare this algorithm with other popular algorithms and DE variants. The results show CODE-EIG outperforms the other DE algorithms in terms of statistical results and convergence speed.},\n bibtype = {article},\n author = {Goudos, Sotirios K.},\n doi = {10.1155/2015/295012},\n journal = {International Journal of Antennas and Propagation}\n}
\n
\n\n\n
\n This paper addresses the problem of designing shaped beam patterns with arbitrary arrays subject to constraints. The constraints could include the sidelobe level suppression in specified angular intervals, the mainlobe halfpower beamwidth, and the predefined number of elements. In this paper, we propose a new Differential Evolution algorithm, which combines Composite DE with an eigenvector-based crossover operator (CODE-EIG). This operator utilizes eigenvectors of covariance matrix of individual solutions, which makes the crossover rotationally invariant. We apply this novel design method to shaped beam pattern synthesis for linear and conformal arrays. We compare this algorithm with other popular algorithms and DE variants. The results show CODE-EIG outperforms the other DE algorithms in terms of statistical results and convergence speed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Design of load-ended spiral antennas for RFID UHF passive tags using improved artificial bee colony algorithm.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n AEU - International Journal of Electronics and Communications, 69(1): 206-214. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Design of load-ended spiral antennas for RFID UHF passive tags using improved artificial bee colony algorithm},\n type = {article},\n year = {2015},\n keywords = {Artificial bee colony optimization,Evolutionary algorithms,Optimization methods,RFID tag design,Swarm intelligence},\n pages = {206-214},\n volume = {69},\n id = {2db54d33-d275-3b62-bbd1-4276ec1e380c},\n created = {2020-02-29T16:57:42.630Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.584Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2015b},\n private_publication = {false},\n abstract = {In this paper, new planar spiral antennas for passive RFID tag application at UHF band are designed and optimized using a new artificial bee colony (ABC) algorithm. We apply the improved ABC (I-ABC), which is an improved version of the original ABC algorithm. The I-ABC introduces the best-so-far solution, inertia weight and acceleration coefficients to modify the search process. The optimization goals are antenna size minimization, gain maximization and conjugate matching. The antenna dimensions were optimized and evaluated using I-ABC in conjunction with commercial EM software. We compare the I-ABC with the original ABC algorithm. The obtained results show that both algorithms are powerful optimizers that can be efficiently applied to tag antenna design problems. I-ABC produces better results than the original ABC algorithm in terms of solution accuracy and success rate. RFID tags with dimensions less than 3 cm, maximum gain that reaches the value of 1.46dBi and read distance more than 10m were among those obtained by the algorithm.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Sahalos, John N.},\n doi = {10.1016/j.aeue.2014.09.008},\n journal = {AEU - International Journal of Electronics and Communications},\n number = {1}\n}
\n
\n\n\n
\n In this paper, new planar spiral antennas for passive RFID tag application at UHF band are designed and optimized using a new artificial bee colony (ABC) algorithm. We apply the improved ABC (I-ABC), which is an improved version of the original ABC algorithm. The I-ABC introduces the best-so-far solution, inertia weight and acceleration coefficients to modify the search process. The optimization goals are antenna size minimization, gain maximization and conjugate matching. The antenna dimensions were optimized and evaluated using I-ABC in conjunction with commercial EM software. We compare the I-ABC with the original ABC algorithm. The obtained results show that both algorithms are powerful optimizers that can be efficiently applied to tag antenna design problems. I-ABC produces better results than the original ABC algorithm in terms of solution accuracy and success rate. RFID tags with dimensions less than 3 cm, maximum gain that reaches the value of 1.46dBi and read distance more than 10m were among those obtained by the algorithm.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A multi-objective approach to indoor wireless heterogeneous networks planning.\n \n \n \n\n\n \n Goudos, S., K.; Plets, D.; Liu, N.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n In 2015 9th European Conference on Antennas and Propagation, EuCAP 2015, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A multi-objective approach to indoor wireless heterogeneous networks planning},\n type = {inproceedings},\n year = {2015},\n keywords = {Indoor wireless network planning,Pareto optimization,biogeography-based optimization,exposure minimization,heterogeneous networks,multi-objective optimization},\n id = {a5e0b4d4-7743-3b91-9a97-1688a118e20d},\n created = {2020-02-29T16:57:44.201Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.055Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2015a},\n private_publication = {false},\n abstract = {We present a multi-objective optimization approach for indoor wireless network planning subject to constraints for exposure minimization, coverage maximization and power consumption minimization. We consider heterogeneous networks consisting of WiFi Access Points (APs) and Long Term Evolution (LTE) femtocells. We propose a design framework based on Multi-objective Biogeography-based Optimization (MOBBO). The results of the proposed method indicate the advantages and applicability of the multi-objective approach.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Plets, David and Liu, Ning and Martens, Luc and Joseph, Wout},\n booktitle = {2015 9th European Conference on Antennas and Propagation, EuCAP 2015}\n}
\n
\n\n\n
\n We present a multi-objective optimization approach for indoor wireless network planning subject to constraints for exposure minimization, coverage maximization and power consumption minimization. We consider heterogeneous networks consisting of WiFi Access Points (APs) and Long Term Evolution (LTE) femtocells. We propose a design framework based on Multi-objective Biogeography-based Optimization (MOBBO). The results of the proposed method indicate the advantages and applicability of the multi-objective approach.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A multi-objective approach to indoor wireless heterogeneous networks planning based on biogeography-based optimization.\n \n \n \n\n\n \n Goudos, S., K.; Plets, D.; Liu, N.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n Computer Networks, 91: 564-576. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A multi-objective approach to indoor wireless heterogeneous networks planning based on biogeography-based optimization},\n type = {article},\n year = {2015},\n keywords = {Biogeography-based optimization,Exposure minimization,Heterogeneous networks,Indoor wireless network planning,Multi-objective optimization,Pareto optimization},\n pages = {564-576},\n volume = {91},\n id = {d767e04d-5d52-36c5-854d-41d6a8697560},\n created = {2020-02-29T16:57:44.241Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.082Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2015},\n private_publication = {false},\n abstract = {In this paper, we present a multi-objective optimization approach for indoor wireless network planning subject to constraints for exposure minimization, coverage maximization and power consumption minimization. We consider heterogeneous networks consisting of WiFi access points (APs) and long term evolution (LTE) femtocells. We propose a design framework based on multi-objective biogeography-based optimization (MOBBO). We apply the MOBBO algorithm to network planning design cases in a real office environment. To validate this approach we compare results with other multi-objective algorithms like the nondominated sorting genetic algorithm-II (NSGA-II) and the generalized differential evolution (GDE3) algorithm. The results of the proposed method indicate the advantages and applicability of the multi-objective approach.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Plets, David and Liu, Ning and Martens, Luc and Joseph, Wout},\n doi = {10.1016/j.comnet.2015.08.037},\n journal = {Computer Networks}\n}
\n
\n\n\n
\n In this paper, we present a multi-objective optimization approach for indoor wireless network planning subject to constraints for exposure minimization, coverage maximization and power consumption minimization. We consider heterogeneous networks consisting of WiFi access points (APs) and long term evolution (LTE) femtocells. We propose a design framework based on multi-objective biogeography-based optimization (MOBBO). We apply the MOBBO algorithm to network planning design cases in a real office environment. To validate this approach we compare results with other multi-objective algorithms like the nondominated sorting genetic algorithm-II (NSGA-II) and the generalized differential evolution (GDE3) algorithm. The results of the proposed method indicate the advantages and applicability of the multi-objective approach.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multi-objective network planning optimization algorithm: human exposure, power consumption, cost, and capacity.\n \n \n \n\n\n \n Liu, N.; Plets, D.; Goudos, S., K.; Martens, L.; and Joseph, W.\n\n\n \n\n\n\n Wireless Networks, 21(3): 841-857. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Multi-objective network planning optimization algorithm: human exposure, power consumption, cost, and capacity},\n type = {article},\n year = {2015},\n keywords = {Coverage,Exposure,Indoor wireless network planning,Optimization algorithm,Power consumption,WiFi (IEEE 802.11n)},\n pages = {841-857},\n volume = {21},\n id = {16f1fdbb-8fd8-3806-a0c7-473150c70548},\n created = {2020-02-29T16:57:44.252Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.528Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Liu2015},\n private_publication = {false},\n abstract = {Due to the huge popularity of wireless networks, future designs will not only consider the provided capacity, but also the induced exposure, the corresponding power consumption, and the economic cost. As these requirements are contradictory, it is not straightforward to design optimal wireless networks. Those contradicting demands have to satisfy certain requirements in practice. In this paper, a combination of two algorithms, a genetic algorithm and a quasi-particle swarm optimization, is developed, yielding a novel hybrid algorithm that generates further optimizations of indoor wireless network planning solutions, which is named hybrid indoor genetic optimization algorithm. The algorithm is compared with a heuristic network planner and composite differential evolution algorithm for three scenarios and two different environments. Results show that our hybrid-algorithm is effective for optimization of wireless networks which satisfy four demands: maximum coverage for a user-defined capacity, minimum power consumption, minimal cost, and minimal human exposure.},\n bibtype = {article},\n author = {Liu, Ning and Plets, David and Goudos, Sotirios K. and Martens, Luc and Joseph, Wout},\n doi = {10.1007/s11276-014-0822-y},\n journal = {Wireless Networks},\n number = {3}\n}
\n
\n\n\n
\n Due to the huge popularity of wireless networks, future designs will not only consider the provided capacity, but also the induced exposure, the corresponding power consumption, and the economic cost. As these requirements are contradictory, it is not straightforward to design optimal wireless networks. Those contradicting demands have to satisfy certain requirements in practice. In this paper, a combination of two algorithms, a genetic algorithm and a quasi-particle swarm optimization, is developed, yielding a novel hybrid algorithm that generates further optimizations of indoor wireless network planning solutions, which is named hybrid indoor genetic optimization algorithm. The algorithm is compared with a heuristic network planner and composite differential evolution algorithm for three scenarios and two different environments. Results show that our hybrid-algorithm is effective for optimization of wireless networks which satisfy four demands: maximum coverage for a user-defined capacity, minimum power consumption, minimal cost, and minimal human exposure.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SNMP Performance Measurements Using Open Source Software.\n \n \n \n\n\n \n Logaras, E.; Voutsas, V.; Kaitatzis, C.; Goudos, S., K.; and Kalialakis, C., F.\n\n\n \n\n\n\n In MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {SNMP Performance Measurements Using Open Source Software},\n type = {inproceedings},\n year = {2015},\n id = {c3557d22-3de7-3216-b149-dedf50a3a45e},\n created = {2023-02-11T21:11:00.493Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.493Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {logaras2015snmp},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Logaras, Evangelos and Voutsas, Vassilios and Kaitatzis, Christos and Goudos, Sotirios K and Kalialakis, Christos F},\n booktitle = {MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Software Tool in MATLAB for Spectrum Sensing in Cognitive Radio.\n \n \n \n\n\n \n Logaras, E.; and Goudos, S., K.\n\n\n \n\n\n\n In MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {A Software Tool in MATLAB for Spectrum Sensing in Cognitive Radio},\n type = {inproceedings},\n year = {2015},\n id = {257c0750-d8ee-3478-8c45-4166c9d34868},\n created = {2023-02-11T21:11:00.524Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.524Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {logaras2015k},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Logaras, Evangelos and Goudos, Sotirios K},\n booktitle = {MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A survey of IoT: Architecture, Applications and Future Vision.\n \n \n \n\n\n \n Chatziefthymiou, S.; and Goudos, S., K.\n\n\n \n\n\n\n In MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {A survey of IoT: Architecture, Applications and Future Vision},\n type = {inproceedings},\n year = {2015},\n id = {279002ad-890e-3869-b9f7-827acf0c29bf},\n created = {2023-02-11T21:11:00.684Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.684Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {chatziefthymiou2015k},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Chatziefthymiou, Styliani and Goudos, Sotirios K},\n booktitle = {MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Antenna Selection in MIMO Systems using Evolutionary Algorithms.\n \n \n \n\n\n \n Fountoukidis, K.; and Goudos, S., K.\n\n\n \n\n\n\n In MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Antenna Selection in MIMO Systems using Evolutionary Algorithms},\n type = {inproceedings},\n year = {2015},\n id = {183c89be-105a-399a-8fab-04163273a1ee},\n created = {2023-02-11T21:11:00.735Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.735Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {fountoukidis2015k},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Fountoukidis, Konstantinos and Goudos, Sotirios K},\n booktitle = {MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Optimization of Cognitive Radio Systems using Nature Inspired Algorithms.\n \n \n \n\n\n \n Paraskeuopoulos, A.; and Goudos, S., K.\n\n\n \n\n\n\n In MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Optimization of Cognitive Radio Systems using Nature Inspired Algorithms},\n type = {inproceedings},\n year = {2015},\n id = {c2488817-852d-3ff1-8941-733b4f82cda2},\n created = {2023-02-11T21:11:00.897Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.897Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {paraskeuopoulos2015k},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Paraskeuopoulos, Athanasios and Goudos, Sotirios K},\n booktitle = {MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n CMOS Digital Gate Pre-Characterization Using Equivalent Inverters.\n \n \n \n\n\n \n Galani, C.; Tsormpatzoglou, A.; Messaris, I.; M. Ntogramatzi; Karagiorgos, N.; Goudos, S.; and Nikolaidis, S.\n\n\n \n\n\n\n In MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {CMOS Digital Gate Pre-Characterization Using Equivalent Inverters},\n type = {inproceedings},\n year = {2015},\n id = {e81eaa62-5c34-3c1b-b83b-41ea5db917ef},\n created = {2023-02-11T21:11:00.912Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.912Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {ch2015galani},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Galani, Ch. and Tsormpatzoglou, A and Messaris, I and M. Ntogramatzi, undefined and Karagiorgos, N and Goudos, S and Nikolaidis, S},\n booktitle = {MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Spectrum Allocation using Evolutionary Algorithms.\n \n \n \n\n\n \n Tegou, T.; and Goudos, S., K.\n\n\n \n\n\n\n In MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Spectrum Allocation using Evolutionary Algorithms},\n type = {inproceedings},\n year = {2015},\n id = {21f9aa39-d410-3891-8f1e-02bc1f32080a},\n created = {2023-02-11T21:11:00.928Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.928Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {tegou2015k},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Tegou, Thomas and Goudos, Sotirios K},\n booktitle = {MOCAST 2015, Proceedings of the 4th International Conference on Modern Circuits and Systems Technologies, Thessaloniki, Greece}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Self-Adaptive Differential Evolution Algorithms for Wireless Communications and the Antenna and Microwave Design Problems.\n \n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Encyclopedia of Information Science and Technology, Third Edition, pages 5754-5766. Khosrow-Pour D.B.A., M., editor(s). IGI Global, 2015.\n \n\n\n\n
\n\n\n\n \n \n \"EncyclopediaWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2015},\n pages = {5754-5766},\n websites = {https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5888-2.ch568},\n publisher = {IGI Global},\n city = {Hershey, PA, USA},\n id = {abc09895-b2a0-3a73-9e5e-0c67f290356e},\n created = {2023-02-11T21:19:22.354Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:19:22.354Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {KhosrowPour2015},\n source_type = {incollection},\n private_publication = {false},\n bibtype = {inbook},\n author = {Goudos, Sotirios K},\n editor = {Khosrow-Pour D.B.A., Mehdi},\n doi = {10.4018/978-1-4666-5888-2.ch568},\n chapter = {Self-Adaptive Differential Evolution Algorithms for Wireless Communications and the Antenna and Microwave Design Problems},\n title = {Encyclopedia of Information Science and Technology, Third Edition}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Optimizing meandered spiral antennas for RFID tags using gbest-guided Artificial Bee Colony algorithm.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n In 8th European Conference on Antennas and Propagation, EuCAP 2014, pages 2962-2965, 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Optimizing meandered spiral antennas for RFID tags using gbest-guided Artificial Bee Colony algorithm},\n type = {inproceedings},\n year = {2014},\n keywords = {Antenna,Measurement,Propagation},\n pages = {2962-2965},\n id = {cee89fdf-97f5-3168-baa9-e08c0182341e},\n created = {2020-02-29T16:57:42.641Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:48.921Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2014a},\n private_publication = {false},\n abstract = {In this paper, new planar spiral antennas with meander lines and loads for passive RFID tag application at UHF band are designed and optimized using the gbest-guided Artificial Bee Colony (GABC) algorithm. The GABC is an improved ABC algorithm, which includes global best (gbest) solution information into the search equation to improve the exploitation. The optimization goals are antenna size minimization, gain maximization, and conjugate matching. The antenna dimensions were optimized and evaluated in conjunction with FEKO. The optimization results produced show that GABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Sahalos, John N.},\n doi = {10.1109/EuCAP.2014.6902449},\n booktitle = {8th European Conference on Antennas and Propagation, EuCAP 2014}\n}
\n
\n\n\n
\n In this paper, new planar spiral antennas with meander lines and loads for passive RFID tag application at UHF band are designed and optimized using the gbest-guided Artificial Bee Colony (GABC) algorithm. The GABC is an improved ABC algorithm, which includes global best (gbest) solution information into the search equation to improve the exploitation. The optimization goals are antenna size minimization, gain maximization, and conjugate matching. The antenna dimensions were optimized and evaluated in conjunction with FEKO. The optimization results produced show that GABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Novel spiral antenna design using artificial bee colony optimization for UHF RFID Applications.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Antennas and Wireless Propagation Letters, 13: 528-531. 2014.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Novel spiral antenna design using artificial bee colony optimization for UHF RFID Applications},\n type = {article},\n year = {2014},\n keywords = {Artificial bee colony optimization,conjugate matching,evolutionary algorithms,gain maximization,optimization methods,radio frequency identification (RFID) tag design,swarm intelligence},\n pages = {528-531},\n volume = {13},\n id = {e1bf4ae7-846c-3d0f-97cb-75334bc1d47e},\n created = {2020-02-29T16:57:42.737Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.917Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2014},\n private_publication = {false},\n abstract = {In this letter, a new planar spiral antenna for passive radio frequency identification (RFID) tag application at UHF band is designed and optimized using the Artificial Bee Colony (ABC) algorithm. The optimization goals are antenna size minimization, gain maximization, conjugate matching, and in consequence the maximization of the read range. The antenna dimensions were optimized and evaluated using ABC in conjunction with commercial electromagnetic (EM) software. The comparison of the results obtained by ABC to respective ones of other popular evolutionary algorithms show that ABC can be efficiently applied to tag antenna design problems. To validate the theoretical results, designed RFID tags were fabricated, and their reading efficiency was evaluated experimentally. The results of simulation and those received via measurements prove that the proposed method for the design of passive RFID tag antennas is efficient, as antennas with dimensions less than 3 cm, gain that reaches the value of 1.6 dBi, and read range about 6 m were obtained. © 2002-2011 IEEE.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Sahalos, John N.},\n doi = {10.1109/LAWP.2014.2311653},\n journal = {IEEE Antennas and Wireless Propagation Letters}\n}
\n
\n\n\n
\n In this letter, a new planar spiral antenna for passive radio frequency identification (RFID) tag application at UHF band is designed and optimized using the Artificial Bee Colony (ABC) algorithm. The optimization goals are antenna size minimization, gain maximization, conjugate matching, and in consequence the maximization of the read range. The antenna dimensions were optimized and evaluated using ABC in conjunction with commercial electromagnetic (EM) software. The comparison of the results obtained by ABC to respective ones of other popular evolutionary algorithms show that ABC can be efficiently applied to tag antenna design problems. To validate the theoretical results, designed RFID tags were fabricated, and their reading efficiency was evaluated experimentally. The results of simulation and those received via measurements prove that the proposed method for the design of passive RFID tag antennas is efficient, as antennas with dimensions less than 3 cm, gain that reaches the value of 1.6 dBi, and read range about 6 m were obtained. © 2002-2011 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An analytical model for the CMOS inverter.\n \n \n \n\n\n \n Chaourani, P.; Messaris, I.; Fasarakis, N.; Ntogramatzi, M.; Goudos, S.; and Nikolaidis, S.\n\n\n \n\n\n\n In 2014 24th International Workshop on Power and Timing Modeling, Optimization and Simulation, PATMOS 2014, 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {An analytical model for the CMOS inverter},\n type = {inproceedings},\n year = {2014},\n keywords = {CCS technology,Inverter modeling,output current model,simulation,timing model,transistor current model},\n id = {d6356e63-ad24-3bdb-8143-363d36ef6f36},\n created = {2020-02-29T16:57:45.020Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.249Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Chaourani2014},\n private_publication = {false},\n abstract = {A new analytical model for the CMOS inverter is introduced. This model results by solving analytically the differential equation which describes the inverter operation. It uses new simplified transistor current expressions which are developed taking into account the nanoscale effects and also considering temperature as a parameter. Expressions for the output voltage are derived, which are then used for capturing the output and supply currents, making the model compatible with CCS technology requirements. The proposed model is parametric according to the input signal slew, output load, transistor widths, supply voltage, temperature and process parameters. It presents an average error less than 3% for the typical case.},\n bibtype = {inproceedings},\n author = {Chaourani, P. and Messaris, I. and Fasarakis, N. and Ntogramatzi, M. and Goudos, S. and Nikolaidis, S.},\n doi = {10.1109/PATMOS.2014.6951894},\n booktitle = {2014 24th International Workshop on Power and Timing Modeling, Optimization and Simulation, PATMOS 2014}\n}
\n
\n\n\n
\n A new analytical model for the CMOS inverter is introduced. This model results by solving analytically the differential equation which describes the inverter operation. It uses new simplified transistor current expressions which are developed taking into account the nanoscale effects and also considering temperature as a parameter. Expressions for the output voltage are derived, which are then used for capturing the output and supply currents, making the model compatible with CCS technology requirements. The proposed model is parametric according to the input signal slew, output load, transistor widths, supply voltage, temperature and process parameters. It presents an average error less than 3% for the typical case.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Evolutionary Algorithms for Wireless Communications — A Review of the State-of-the art.\n \n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Contemporary Issues in Wireless Communications. Khatib, M., editor(s). IntechOpen, 2014.\n \n\n\n\n
\n\n\n\n \n \n \"ContemporaryWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2014},\n websites = {https://doi.org/10.5772/59147},\n publisher = {IntechOpen},\n city = {Rijeka},\n chapter = {Evolutionary Algorithms for Wireless Communications — A Review of the State-of-the art},\n id = {c7484d46-00d3-3149-8a59-60728c7371e5},\n created = {2023-02-11T21:19:22.468Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:19:22.468Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2014},\n source_type = {incollection},\n private_publication = {false},\n bibtype = {inbook},\n author = {Goudos, Sotirios K},\n editor = {Khatib, Mutamed},\n doi = {10.5772/59147},\n title = {Contemporary Issues in Wireless Communications}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Modified spiral RFID tag antenna optimal design using Artificial Bee Colony optimization.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n In European Microwave Week 2013, EuMW 2013 - Conference Proceedings; EuMC 2013: 43rd European Microwave Conference, pages 1255-1258, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Modified spiral RFID tag antenna optimal design using Artificial Bee Colony optimization},\n type = {inproceedings},\n year = {2013},\n keywords = {RFID tag design,artificial bee colony optimization,conjugate matching,evolutionary algorithms,gain maximaztion,optimization methods,swarm intellingence},\n pages = {1255-1258},\n id = {2a2b3957-7c51-3b62-9dff-a8836db95d39},\n created = {2020-02-29T16:57:42.754Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.290Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2013c},\n private_publication = {false},\n abstract = {In this paper, new modified planar spiral antennas with meander lines for passive RFID tag application at UHF band are designed and optimized using the Artificial Bee Colony (ABC) algorithm. The optimization goals are antenna size minimization, gain maximization and conjugate matching. The antenna dimensions were optimized and evaluated using ABC in conjunction with FEKO. The optimization results produced show that ABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems. © 2013 European Microwave Association.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Sahalos, John N.},\n booktitle = {European Microwave Week 2013, EuMW 2013 - Conference Proceedings; EuMC 2013: 43rd European Microwave Conference}\n}
\n
\n\n\n
\n In this paper, new modified planar spiral antennas with meander lines for passive RFID tag application at UHF band are designed and optimized using the Artificial Bee Colony (ABC) algorithm. The optimization goals are antenna size minimization, gain maximization and conjugate matching. The antenna dimensions were optimized and evaluated using ABC in conjunction with FEKO. The optimization results produced show that ABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems. © 2013 European Microwave Association.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Synthesis of miniaturized load-ended spiral antennas for UHF passive tags.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n In Proceedings of the 2013 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, IEEE APWC 2013, pages 927-930, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Synthesis of miniaturized load-ended spiral antennas for UHF passive tags},\n type = {inproceedings},\n year = {2013},\n pages = {927-930},\n id = {050d650b-8dc3-3ce0-8528-e62979dd49a4},\n created = {2020-02-29T16:57:42.806Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.273Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2013b},\n private_publication = {false},\n abstract = {In this paper, new planar spiral antennas for passive RFID tag application at UHF band are designed and optimized using the Artificial Bee Colony (ABC) algorithm. The optimization goals are antenna size minimization, gain maximization and conjugate matching. The antenna dimensions were optimized and evaluated using ABC in conjunction with commercial EM software. The optimization results produced show that ABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems. RFID tags with dimensions less than 4cm, maximum gain that reaches the value of 1.83 dBi and read distance more than 10m were among those obtained by the algorithm. © 2013 IEEE.},\n bibtype = {inproceedings},\n author = {Goudos, S. K. and Siakavara, K. and Sahalos, J. N.},\n doi = {10.1109/APWC.2013.6624919},\n booktitle = {Proceedings of the 2013 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, IEEE APWC 2013}\n}
\n
\n\n\n
\n In this paper, new planar spiral antennas for passive RFID tag application at UHF band are designed and optimized using the Artificial Bee Colony (ABC) algorithm. The optimization goals are antenna size minimization, gain maximization and conjugate matching. The antenna dimensions were optimized and evaluated using ABC in conjunction with commercial EM software. The optimization results produced show that ABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems. RFID tags with dimensions less than 4cm, maximum gain that reaches the value of 1.83 dBi and read distance more than 10m were among those obtained by the algorithm. © 2013 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Novel spiral antennas design using swarm intelligence for passive UHF RFID tags.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n In 2013 7th European Conference on Antennas and Propagation, EuCAP 2013, pages 3223-3227, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Novel spiral antennas design using swarm intelligence for passive UHF RFID tags},\n type = {inproceedings},\n year = {2013},\n keywords = {RFID tag design,artificial bee colony optimization,conjugate matching,evolutionary algorithms,gain maximaztion,optimization methods,swarm intellingence},\n pages = {3223-3227},\n id = {86ede209-2de9-3067-9a42-6b3c81e2be30},\n created = {2020-02-29T16:57:42.810Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.864Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2013a},\n private_publication = {false},\n abstract = {In this paper, new planar spiral antennas for passive RFID tag application at UHF band are designed and optimized using the Artificial Bee Colony (ABC) algorithm. The optimization goals are antenna size minimization, gain maximization and conjugate matching. The antenna dimensions were optimized and evaluated using ABC in conjunction with commercial EM software. Furthermore, a theoretical analysis of the spiral antennas was performed. The input impedance of the printed spiral, was calculated approximately via the Transmission Line Model and the electromotive force induced along the spirals. The theoretical results seem to be in good agreement with the EM solver results. The optimization results produced show that ABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems. RFID tags with dimensions less than 4cm, gain that reaches the value of 2 dBi and read distance about 11.7m were among those obtained by the algorithm. © 2013 EurAAP.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Sahalos, John N.},\n booktitle = {2013 7th European Conference on Antennas and Propagation, EuCAP 2013}\n}
\n
\n\n\n
\n In this paper, new planar spiral antennas for passive RFID tag application at UHF band are designed and optimized using the Artificial Bee Colony (ABC) algorithm. The optimization goals are antenna size minimization, gain maximization and conjugate matching. The antenna dimensions were optimized and evaluated using ABC in conjunction with commercial EM software. Furthermore, a theoretical analysis of the spiral antennas was performed. The input impedance of the printed spiral, was calculated approximately via the Transmission Line Model and the electromotive force induced along the spirals. The theoretical results seem to be in good agreement with the EM solver results. The optimization results produced show that ABC is a powerful optimization algorithm that can be efficiently applied to tag antenna design problems. RFID tags with dimensions less than 4cm, gain that reaches the value of 2 dBi and read distance about 11.7m were among those obtained by the algorithm. © 2013 EurAAP.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modeling by optimal Artificial Neural Networks the prediction of propagation path loss in urban environments.\n \n \n \n\n\n \n Sotiroudis, S., P.; Goudos, S., K.; Gotsis, K., A.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n In Proceedings of the 2013 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, IEEE APWC 2013, pages 599-602, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Modeling by optimal Artificial Neural Networks the prediction of propagation path loss in urban environments},\n type = {inproceedings},\n year = {2013},\n pages = {599-602},\n id = {e296bf6e-25c8-328a-8a23-dea234a952a8},\n created = {2020-02-29T16:57:44.349Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.937Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Sotiroudis2013b},\n private_publication = {false},\n abstract = {In this paper we present an alternative procedure for the prediction of propagation path loss in urban environments, which is based on Artificial Neural Networks (ANN). The goal of this work is to synthesize and model ANNs which would require entering at the input nodes a detailed and the same time small amount of information about the propagation environment. We apply the Differential Evolution (DE) algorithm, in conjunction with the Levenberg-Marquardt backpropagation algorithm in order to train different ANNs. The combined DE-LM method achieves better convergence of neural network weight optimization. We present two different ANN design cases with different number of input nodes. The general performance of the both ANNs shows their effectiveness to yield results with satisfactory accuracy in short time. The received results are compared to the respective ones yielded by the Ray-Tracing model and exhibit satisfactory accuracy. © 2013 IEEE.},\n bibtype = {inproceedings},\n author = {Sotiroudis, S. P. and Goudos, S. K. and Gotsis, K. A. and Siakavara, K. and Sahalos, J. N.},\n doi = {10.1109/APWC.2013.6624896},\n booktitle = {Proceedings of the 2013 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, IEEE APWC 2013}\n}
\n
\n\n\n
\n In this paper we present an alternative procedure for the prediction of propagation path loss in urban environments, which is based on Artificial Neural Networks (ANN). The goal of this work is to synthesize and model ANNs which would require entering at the input nodes a detailed and the same time small amount of information about the propagation environment. We apply the Differential Evolution (DE) algorithm, in conjunction with the Levenberg-Marquardt backpropagation algorithm in order to train different ANNs. The combined DE-LM method achieves better convergence of neural network weight optimization. We present two different ANN design cases with different number of input nodes. The general performance of the both ANNs shows their effectiveness to yield results with satisfactory accuracy in short time. The received results are compared to the respective ones yielded by the Ray-Tracing model and exhibit satisfactory accuracy. © 2013 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Optimal Artificial Neural Network design for propagation path-loss prediction using adaptive evolutionary algorithms.\n \n \n \n\n\n \n Sotiroudis, S.; Goudos, S.; Gotsis, K.; Siakavara, K.; and Sahalos, J.\n\n\n \n\n\n\n In 2013 7th European Conference on Antennas and Propagation, EuCAP 2013, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Optimal Artificial Neural Network design for propagation path-loss prediction using adaptive evolutionary algorithms},\n type = {inproceedings},\n year = {2013},\n keywords = {Differential Evolution,Neural Network,Self-adaptive Differential Evolution,evolutionary algorithms,mobile communications,optimization methods,propagation path-loss},\n id = {86994c56-5c35-31a9-a615-806779420894},\n created = {2020-02-29T16:57:44.368Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:48.894Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Sotiroudis2013a},\n private_publication = {false},\n abstract = {In this paper we present an alternative procedure for the prediction of propagation path loss in urban environments, which is based on Artificial Neural Networks (ANN). The size of a neural network must be defined before it can be trained for any application. We apply different adaptive Differential Evolution (DE) algorithms, in order to design an optimal ANN for path loss propagation prediction. We present two different ANN design cases with two and three hidden layers respectively. The general performance of the both ANN shows their effectiveness to yield results with satisfactory accuracy in short time. The received results are compared to the respective ones yielded by the Ray-Tracing model and exhibit satisfactory accuracy. © 2013 EurAAP.},\n bibtype = {inproceedings},\n author = {Sotiroudis, S.P. and Goudos, S.K. and Gotsis, K.A. and Siakavara, K. and Sahalos, J.N.},\n booktitle = {2013 7th European Conference on Antennas and Propagation, EuCAP 2013}\n}
\n
\n\n\n
\n In this paper we present an alternative procedure for the prediction of propagation path loss in urban environments, which is based on Artificial Neural Networks (ANN). The size of a neural network must be defined before it can be trained for any application. We apply different adaptive Differential Evolution (DE) algorithms, in order to design an optimal ANN for path loss propagation prediction. We present two different ANN design cases with two and three hidden layers respectively. The general performance of the both ANN shows their effectiveness to yield results with satisfactory accuracy in short time. The received results are compared to the respective ones yielded by the Ray-Tracing model and exhibit satisfactory accuracy. © 2013 EurAAP.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A multi-objective approach to subarrayed linear antenna arrays design based on memetic differential evolution.\n \n \n \n\n\n \n Goudos, S., K.; Gotsis, K., A.; Siakavara, K.; Vafiadis, E., E.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Transactions on Antennas and Propagation, 61(6): 3042-3052. 2013.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A multi-objective approach to subarrayed linear antenna arrays design based on memetic differential evolution},\n type = {article},\n year = {2013},\n keywords = {Differential evolution,Pareto optimization,generalized differential evolution,genetic algorithms,linear array synthesis,memetic algorithms,multi-objective optimization,phase control,subarrayed arrays},\n pages = {3042-3052},\n volume = {61},\n id = {9c2db870-6804-3838-8b39-05054dd03cd3},\n created = {2020-02-29T16:57:44.423Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.485Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2013},\n private_publication = {false},\n abstract = {In this paper we present a multi-objective optimization approach to subarrayed linear antenna arrays design. We define this problem as a bi-objective one. We consider two objective functions for directivity maximization and sidelobe level minimization. Memetic algorithms (MAs) are hybrid algorithms that combine the benefits of a global search Evolutionary Algorithm (EA) with a local search method. In this paper, we introduce a new memetic multi-objective evolutionary algorithm namely the memetic generalized differential evolution (MGDE3). This algorithm is a memetic extension of the popular generalized differential evolution (GDE3) algorithm. Another popular MOEA is the nondominated sorting genetic algorithm-II (NSGA-II). MGDE3, GDE3 and NSGA-II are applied to the synthesis of uniform and nonuniform subarrayed linear arrays, providing an extensive set of solutions for each design case. Depending on the desired array characteristics, the designer can select the most suitable solution. The results of the proposed method are compared with those reported in the literature, indicating the advantages and applicability of the multi-objective approach. © 2013 IEEE.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Gotsis, Konstantinos A. and Siakavara, Katherine and Vafiadis, Elias E. and Sahalos, John N.},\n doi = {10.1109/TAP.2013.2254437},\n journal = {IEEE Transactions on Antennas and Propagation},\n number = {6}\n}
\n
\n\n\n
\n In this paper we present a multi-objective optimization approach to subarrayed linear antenna arrays design. We define this problem as a bi-objective one. We consider two objective functions for directivity maximization and sidelobe level minimization. Memetic algorithms (MAs) are hybrid algorithms that combine the benefits of a global search Evolutionary Algorithm (EA) with a local search method. In this paper, we introduce a new memetic multi-objective evolutionary algorithm namely the memetic generalized differential evolution (MGDE3). This algorithm is a memetic extension of the popular generalized differential evolution (GDE3) algorithm. Another popular MOEA is the nondominated sorting genetic algorithm-II (NSGA-II). MGDE3, GDE3 and NSGA-II are applied to the synthesis of uniform and nonuniform subarrayed linear arrays, providing an extensive set of solutions for each design case. Depending on the desired array characteristics, the designer can select the most suitable solution. The results of the proposed method are compared with those reported in the literature, indicating the advantages and applicability of the multi-objective approach. © 2013 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of a composite differential evolution algorithm in optimal neural network design for propagation path-loss prediction in mobile communication systems.\n \n \n \n\n\n \n Sotiroudis, S., P.; Goudos, S., K.; Gotsis, K., A.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Antennas and Wireless Propagation Letters, 12: 364-367. 2013.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Application of a composite differential evolution algorithm in optimal neural network design for propagation path-loss prediction in mobile communication systems},\n type = {article},\n year = {2013},\n keywords = {Differential evolution (DE),evolutionary algorithms (EAs),mobile communications,neural network,optimization methods,propagation path loss,self-adaptive differential evolution},\n pages = {364-367},\n volume = {12},\n id = {ffa84700-6eea-3597-9970-445c14670b1a},\n created = {2020-02-29T16:57:44.466Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.119Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Sotiroudis2013},\n private_publication = {false},\n abstract = {In this letter, we present an alternative procedure for the prediction of propagation path loss in urban environments, which is based on artificial neural networks (ANNs). The correct selection of a neural network size can increase its response speed and therefore increase the overall system performance. We apply a recently proposed Differential Evolution (DE) algorithm, namely the Composite DE (CoDE) in order to design an optimal ANN for path-loss propagation prediction. CoDE uses three different trial-vector generation strategies with three preset control parameter settings. We compare CoDE with other popular DE strategies. We present two different ANN design cases with two and three hidden layers, respectively. The general performance of both the ANNs shows their effectiveness to yield results with satisfactory accuracy in short time. The received results are compared to the respective ones yielded by the ray-tracing model and exhibit satisfactory accuracy. © 2002-2011 IEEE.},\n bibtype = {article},\n author = {Sotiroudis, Sotirios P. and Goudos, Sotirios K. and Gotsis, Konstantinos A. and Siakavara, Katherine and Sahalos, John N.},\n doi = {10.1109/LAWP.2013.2251994},\n journal = {IEEE Antennas and Wireless Propagation Letters}\n}
\n
\n\n\n
\n In this letter, we present an alternative procedure for the prediction of propagation path loss in urban environments, which is based on artificial neural networks (ANNs). The correct selection of a neural network size can increase its response speed and therefore increase the overall system performance. We apply a recently proposed Differential Evolution (DE) algorithm, namely the Composite DE (CoDE) in order to design an optimal ANN for path-loss propagation prediction. CoDE uses three different trial-vector generation strategies with three preset control parameter settings. We compare CoDE with other popular DE strategies. We present two different ANN design cases with two and three hidden layers, respectively. The general performance of both the ANNs shows their effectiveness to yield results with satisfactory accuracy in short time. The received results are compared to the respective ones yielded by the ray-tracing model and exhibit satisfactory accuracy. © 2002-2011 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n On the worst-case whole-body SAR assessment due to far-field exposure.\n \n \n \n\n\n \n Boursianis, A.; Markakis, I.; Goudos, S., K.; and Samaras, T.\n\n\n \n\n\n\n In Abstract Collection of BioEM 2013, PB-72, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {On the worst-case whole-body SAR assessment due to far-field exposure},\n type = {inproceedings},\n year = {2013},\n id = {1fdbc171-b363-3a6a-82b0-4aa7ee652b54},\n created = {2023-02-11T21:11:00.684Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.684Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {boursianis2013ontheworstcase},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Boursianis, Achilles and Markakis, Ioannis and Goudos, Sotirios K and Samaras, Theodoros},\n booktitle = {Abstract Collection of BioEM 2013, PB-72}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Application of multi-objective evolutionary algorithms to antenna and microwave design problems.\n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Multidisciplinary Computational Intelligence Techniques: Applications in Business, Engineering, and Medicine, pages 75-101. 2012.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2012},\n pages = {75-101},\n id = {91bb1039-1187-340d-b168-bd920b09ebf6},\n created = {2020-02-29T16:57:41.859Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.496Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2012b},\n private_publication = {false},\n abstract = {Antenna and microwave design problems are, in general, multi-objective. Multi-objective Evolutionary Algorithms (MOEAs) are suitable optimization techniques for solving such problems. Particle Swarm Optimization (PSO) and Differential Evolution (DE) have received increased interest from the electromagnetics community. The fact that both algorithms can efficiently handle arbitrary optimization problems has made them popular for solving antenna and microwave design problems. This chapter presents three different state-of-the-art MOEAs based on PSO and DE, namely: the Multi-objective Particle Swarm Optimization (MOPSO), the Multi-objective Particle Swarm Optimization with fitness sharing (MOPSO-fs), and the Generalized Differential Evolution (GDE3). Their applications to different design cases from antenna and microwave problems are reported. These include microwave absorber, microwave filters and Yagi-uda antenna design. The algorithms are compared and evaluated against other evolutionary multi-objective algorithms like Nondominated Sorting Genetic Algorithm-II (NSGAII). The results show the advantages of using each algorithm. © 2012, IGI Global.},\n bibtype = {inbook},\n author = {Goudos, Sotirios K.},\n doi = {10.4018/978-1-4666-1830-5.ch006},\n chapter = {Application of multi-objective evolutionary algorithms to antenna and microwave design problems},\n title = {Multidisciplinary Computational Intelligence Techniques: Applications in Business, Engineering, and Medicine}\n}
\n
\n\n\n
\n Antenna and microwave design problems are, in general, multi-objective. Multi-objective Evolutionary Algorithms (MOEAs) are suitable optimization techniques for solving such problems. Particle Swarm Optimization (PSO) and Differential Evolution (DE) have received increased interest from the electromagnetics community. The fact that both algorithms can efficiently handle arbitrary optimization problems has made them popular for solving antenna and microwave design problems. This chapter presents three different state-of-the-art MOEAs based on PSO and DE, namely: the Multi-objective Particle Swarm Optimization (MOPSO), the Multi-objective Particle Swarm Optimization with fitness sharing (MOPSO-fs), and the Generalized Differential Evolution (GDE3). Their applications to different design cases from antenna and microwave problems are reported. These include microwave absorber, microwave filters and Yagi-uda antenna design. The algorithms are compared and evaluated against other evolutionary multi-objective algorithms like Nondominated Sorting Genetic Algorithm-II (NSGAII). The results show the advantages of using each algorithm. © 2012, IGI Global.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Particle swarm optimization algorithms applied to antenna and microwave design problems.\n \n \n \n\n\n \n Goudos, S., K.; Zaharis, Z., D.; and Baltzis, K., B.\n\n\n \n\n\n\n Swarm Intelligence for Electric and Electronic Engineering, pages 100-126. 2012.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2012},\n pages = {100-126},\n id = {e610d14c-80a9-346a-bf2d-76f472cd05ca},\n created = {2020-02-29T16:57:42.677Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.323Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2012a},\n private_publication = {false},\n abstract = {Particle Swarm Optimization (PSO) is an evolutionary optimization algorithm inspired by the social behavior of birds flocking and fish schooling. Numerous PSO variants have been proposed in the literature for addressing different problem types. In this chapter, the authors apply different PSO variants to common antenna and microwave design problems. The Inertia Weight PSO (IWPSO), the Constriction Factor PSO (CFPSO), and the Comprehensive Learning Particle Swarm Optimization (CLPSO) algorithms are applied to real-valued optimization problems. Correspondingly, discrete PSO optimizers such as the binary PSO (binPSO) and the Boolean PSO with velocity mutation (BPSO-vm) are used to solve discrete-valued optimization problems. In case of a multi-objective optimization problem, the authors apply two multi-objective PSO variants. Namely, these are the Multi-Objective PSO (MOPSO) and the Multi-Objective PSO with Fitness Sharing (MOPSO-fs) algorithms. The design examples presented here include microwave absorber design, linear array synthesis, patch antenna design, and dual-band base station antenna optimization. The conclusion and a discussion on future trends complete the chapter. © 2013, IGI Global.},\n bibtype = {inbook},\n author = {Goudos, Sotirios K. and Zaharis, Zaharias D. and Baltzis, Konstantinos B.},\n doi = {10.4018/978-1-4666-2666-9.ch006},\n chapter = {Particle swarm optimization algorithms applied to antenna and microwave design problems},\n title = {Swarm Intelligence for Electric and Electronic Engineering}\n}
\n
\n\n\n
\n Particle Swarm Optimization (PSO) is an evolutionary optimization algorithm inspired by the social behavior of birds flocking and fish schooling. Numerous PSO variants have been proposed in the literature for addressing different problem types. In this chapter, the authors apply different PSO variants to common antenna and microwave design problems. The Inertia Weight PSO (IWPSO), the Constriction Factor PSO (CFPSO), and the Comprehensive Learning Particle Swarm Optimization (CLPSO) algorithms are applied to real-valued optimization problems. Correspondingly, discrete PSO optimizers such as the binary PSO (binPSO) and the Boolean PSO with velocity mutation (BPSO-vm) are used to solve discrete-valued optimization problems. In case of a multi-objective optimization problem, the authors apply two multi-objective PSO variants. Namely, these are the Multi-Objective PSO (MOPSO) and the Multi-Objective PSO with Fitness Sharing (MOPSO-fs) algorithms. The design examples presented here include microwave absorber design, linear array synthesis, patch antenna design, and dual-band base station antenna optimization. The conclusion and a discussion on future trends complete the chapter. © 2013, IGI Global.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Reducing the number of elements in linear arrays using biogeography-based optimization.\n \n \n \n\n\n \n Goudos, S., K.; Baltzis, K., B.; Siakavara, K.; Samaras, T.; Vafiadis, E.; and Sahalos, J., N.\n\n\n \n\n\n\n In Proceedings of 6th European Conference on Antennas and Propagation, EuCAP 2012, pages 1615-1618, 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Reducing the number of elements in linear arrays using biogeography-based optimization},\n type = {inproceedings},\n year = {2012},\n keywords = {Biogeograpy-based optimization,array synthesis,linear array design,nonuniform array,sparse array},\n pages = {1615-1618},\n id = {119467af-f9bc-3f2d-92b6-0dcfbbaa98b8},\n created = {2020-02-29T16:57:45.024Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.656Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2012},\n private_publication = {false},\n abstract = {This paper addresses the problem of designing nonuniform linear arrays with reduced number of elements. The synthesis of such arrays has several practical applications in cases where cost and weight reduction is important. The proposed design method is based on Biogeography-based Optimization (BBO). We apply the BBO algorithm in order to find the optimum element positions and amplitudes that produce a desired pattern with a reduced number of elements. Additional design constraints include the minimum and maximum distance between two adjacent elements. Design cases found in the literature are compared with those found by BBO. The results show that BBO is highly efficient in producing the desired radiation pattern using a minimum number of elements. © 2012 IEEE.},\n bibtype = {inproceedings},\n author = {Goudos, S. K. and Baltzis, K. B. and Siakavara, K. and Samaras, T. and Vafiadis, E. and Sahalos, J. N.},\n doi = {10.1109/EuCAP.2012.6206314},\n booktitle = {Proceedings of 6th European Conference on Antennas and Propagation, EuCAP 2012}\n}
\n
\n\n\n
\n This paper addresses the problem of designing nonuniform linear arrays with reduced number of elements. The synthesis of such arrays has several practical applications in cases where cost and weight reduction is important. The proposed design method is based on Biogeography-based Optimization (BBO). We apply the BBO algorithm in order to find the optimum element positions and amplitudes that produce a desired pattern with a reduced number of elements. Additional design constraints include the minimum and maximum distance between two adjacent elements. Design cases found in the literature are compared with those found by BBO. The results show that BBO is highly efficient in producing the desired radiation pattern using a minimum number of elements. © 2012 IEEE.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Application of boolean PSO with adaptive velocity mutation to the design of optimal linear antenna arrays excited by uniformamplitude current distribution.\n \n \n \n\n\n \n Zaharis, Z., D.; Goudos, S., K.; and Yioultsis, T., V.\n\n\n \n\n\n\n Journal of Electromagnetic Waves and Applications, 25(10): 1422-1436. 2011.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Application of boolean PSO with adaptive velocity mutation to the design of optimal linear antenna arrays excited by uniformamplitude current distribution},\n type = {article},\n year = {2011},\n pages = {1422-1436},\n volume = {25},\n id = {d1536169-d77e-3db6-9d68-2d9f787647a5},\n created = {2020-02-29T16:57:42.848Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.442Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Zaharis2011},\n private_publication = {false},\n abstract = {This paper presents a new optimization technique for the design of linear antenna arrays. The proposed technique is based on a novel variant of PSO called Boolean PSO with Adaptive Velocity Mutation. The antenna arrays are optimized under requirements for maximizing the power gain at a desired direction and minimizing the side lobe level of the radiation pattern. The impedance-matching condition of all the array elements is also required by the algorithm. The optimization technique has been developed considering that the array elements are excited by uniform-amplitude current distribution. The radiation characteristics of the antenna array are extracted by using the method of moments. The technique has been applied in several broadside and non-broadside cases of collinear wire-dipole antenna arrays and seems to be capable of improving the radiation characteristics of the antenna arrays in practice. © 2011 VSP.},\n bibtype = {article},\n author = {Zaharis, Z. D. and Goudos, S. K. and Yioultsis, T. V.},\n doi = {10.1163/156939311796351632},\n journal = {Journal of Electromagnetic Waves and Applications},\n number = {10}\n}
\n
\n\n\n
\n This paper presents a new optimization technique for the design of linear antenna arrays. The proposed technique is based on a novel variant of PSO called Boolean PSO with Adaptive Velocity Mutation. The antenna arrays are optimized under requirements for maximizing the power gain at a desired direction and minimizing the side lobe level of the radiation pattern. The impedance-matching condition of all the array elements is also required by the algorithm. The optimization technique has been developed considering that the array elements are excited by uniform-amplitude current distribution. The radiation characteristics of the antenna array are extracted by using the method of moments. The technique has been applied in several broadside and non-broadside cases of collinear wire-dipole antenna arrays and seems to be capable of improving the radiation characteristics of the antenna arrays in practice. © 2011 VSP.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Design of optimum gain pyramidal horn using self-adaptive differential evolution algorithms.\n \n \n \n\n\n \n Pappas, D.; Goudos, S., K.; Baltzis, K., B.; and Siakavara, K.\n\n\n \n\n\n\n International Journal of RF and Microwave Computer-Aided Engineering, 21(1): 59-66. 2011.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Design of optimum gain pyramidal horn using self-adaptive differential evolution algorithms},\n type = {article},\n year = {2011},\n keywords = {differential evolution,evolutionary algorithms,optimum gain antenna,pyramidal horn design},\n pages = {59-66},\n volume = {21},\n id = {2aec0192-0f58-3554-be59-808d66f25691},\n created = {2020-02-29T16:57:43.540Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.741Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Pappas2011},\n private_publication = {false},\n abstract = {In this work, we apply classical and new self-adaptive differential evolution (DE) algorithms to the design of optimum gain pyramidal horns. The application of DE algorithms to pyramidal horn design allows the accurate calculation of their physical dimensions in a short amount of time. Moreover, self-adaptive DE does not require the prespecified choice of control parameters reducing significantly the users' effort. Representative examples demonstrate the applicability of our proposal. Our study shows that self-adaptive DE algorithms outperform or produce similar results with other methods in the literature in terms of solution accuracy and convergence speed. © 2010 Wiley Periodicals, Inc.},\n bibtype = {article},\n author = {Pappas, Dimitrios and Goudos, Sotirios K. and Baltzis, Konstantinos B. and Siakavara, Katherine},\n doi = {10.1002/mmce.20487},\n journal = {International Journal of RF and Microwave Computer-Aided Engineering},\n number = {1}\n}
\n
\n\n\n
\n In this work, we apply classical and new self-adaptive differential evolution (DE) algorithms to the design of optimum gain pyramidal horns. The application of DE algorithms to pyramidal horn design allows the accurate calculation of their physical dimensions in a short amount of time. Moreover, self-adaptive DE does not require the prespecified choice of control parameters reducing significantly the users' effort. Representative examples demonstrate the applicability of our proposal. Our study shows that self-adaptive DE algorithms outperform or produce similar results with other methods in the literature in terms of solution accuracy and convergence speed. © 2010 Wiley Periodicals, Inc.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Sparse linear array synthesis with multiple constraints using differential evolution with strategy adaptation.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; Samaras, T.; Vafiadis, E., E.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Antennas and Wireless Propagation Letters, 10: 670-673. 2011.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Sparse linear array synthesis with multiple constraints using differential evolution with strategy adaptation},\n type = {article},\n year = {2011},\n keywords = {Differential evolution (DE),genetic algorithms (GAs),linear array design,sidelobe suppression,sparse array synthesis,unequally spaced array},\n pages = {670-673},\n volume = {10},\n id = {d505c09d-29a1-35dc-8270-469c0d394f20},\n created = {2020-02-29T16:57:44.488Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.537Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2011c},\n private_publication = {false},\n abstract = {This letter addresses the problem of designing sparse linear arrays with multiple constraints. The constraints could include the minimum and maximum distance between two adjacent elements, the total array length, the sidelobe level suppression in specified angular intervals, the main-lobe beamwidth, and the predefined number of elements. Our design method is based on differential evolution (DE) with strategy adaptation. We apply a DE algorithm (SaDE) that uses previous experience in both trial vector generation strategies and control parameter tuning. Design cases found in the literature are compared to those found by SaDE and other DE algorithms. The results show that fewer objective-function evaluations are required than those reported in the literature to obtain better designs. SaDE also outperforms the other DE algorithms in terms of statistical results. © 2011 IEEE.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Samaras, Theodoros and Vafiadis, Elias E. and Sahalos, John N.},\n doi = {10.1109/LAWP.2011.2161256},\n journal = {IEEE Antennas and Wireless Propagation Letters}\n}
\n
\n\n\n
\n This letter addresses the problem of designing sparse linear arrays with multiple constraints. The constraints could include the minimum and maximum distance between two adjacent elements, the total array length, the sidelobe level suppression in specified angular intervals, the main-lobe beamwidth, and the predefined number of elements. Our design method is based on differential evolution (DE) with strategy adaptation. We apply a DE algorithm (SaDE) that uses previous experience in both trial vector generation strategies and control parameter tuning. Design cases found in the literature are compared to those found by SaDE and other DE algorithms. The results show that fewer objective-function evaluations are required than those reported in the literature to obtain better designs. SaDE also outperforms the other DE algorithms in terms of statistical results. © 2011 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Self-adaptive differential evolution applied to real-valued antenna and microwave design problems.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; Samaras, T.; Vafiadis, E., E.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Transactions on Antennas and Propagation, 59(4): 1286-1298. 2011.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Self-adaptive differential evolution applied to real-valued antenna and microwave design problems},\n type = {article},\n year = {2011},\n keywords = {Differential evolution (DE),evolutionary algorithms (EAs),linear array synthesis,microwave filter design,optimization methods,particle swarm optimization (PSO),patch antenna design},\n pages = {1286-1298},\n volume = {59},\n id = {3e91a309-c25b-343e-8d8b-9017f81a4d23},\n created = {2020-02-29T16:57:44.513Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.660Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2011b},\n private_publication = {false},\n abstract = {Particle swarm optimization (PSO) is an evolutionary algorithm based on the bird fly. Differential evolution (DE) is a vector population based stochastic optimization method. The fact that both algorithms can handle efficiently arbitrary optimization problems has made them popular for solving problems in electromagnetics. In this paper, we apply a design technique based on a self-adaptive DE (SADE) algorithm to real-valued antenna and microwave design problems. These include linear-array synthesis, patch-antenna design and microstrip filter design. The number of unknowns for the design problems varies from 6 to 60. We compare the self-adaptive DE strategy with popular PSO and DE variants. We evaluate the algorithms' performance regarding statistical results and convergence speed. The results obtained for different problems show that the DE algorithms outperform the PSO variants in terms of finding best optima. Thus, our results show the advantages of the SADE strategy and the DE in general. However, these results are considered to be indicative and do not generally apply to all optimization problems in electromagnetics. © 2006 IEEE.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Siakavara, Katherine and Samaras, Theodoros and Vafiadis, Elias E. and Sahalos, John N.},\n doi = {10.1109/TAP.2011.2109678},\n journal = {IEEE Transactions on Antennas and Propagation},\n number = {4}\n}
\n
\n\n\n
\n Particle swarm optimization (PSO) is an evolutionary algorithm based on the bird fly. Differential evolution (DE) is a vector population based stochastic optimization method. The fact that both algorithms can handle efficiently arbitrary optimization problems has made them popular for solving problems in electromagnetics. In this paper, we apply a design technique based on a self-adaptive DE (SADE) algorithm to real-valued antenna and microwave design problems. These include linear-array synthesis, patch-antenna design and microstrip filter design. The number of unknowns for the design problems varies from 6 to 60. We compare the self-adaptive DE strategy with popular PSO and DE variants. We evaluate the algorithms' performance regarding statistical results and convergence speed. The results obtained for different problems show that the DE algorithms outperform the PSO variants in terms of finding best optima. Thus, our results show the advantages of the SADE strategy and the DE in general. However, these results are considered to be indicative and do not generally apply to all optimization problems in electromagnetics. © 2006 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A comparative study of common and self-adaptive Differential Evolution strategies on numerical benchmark problems.\n \n \n \n\n\n \n Goudos, S., K.; Baltzis, K., B.; Antoniadis, K.; Zaharis, Z., D.; and Hilas, C., S.\n\n\n \n\n\n\n In Procedia Computer Science, volume 3, pages 83-88, 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A comparative study of common and self-adaptive Differential Evolution strategies on numerical benchmark problems},\n type = {inproceedings},\n year = {2011},\n keywords = {Adaptive parameter control,Benchmark functions,Differential Evolution,Global optimization},\n pages = {83-88},\n volume = {3},\n id = {56432921-baf2-3a89-95df-1c1a6e3f5869},\n created = {2020-02-29T16:57:44.545Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.685Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2011a},\n private_publication = {false},\n abstract = {Differential Evolution (DE) is a population-based stochastic global optimization technique that requires the adjustment of a very few parameters in order to produce results. However, the control parameters involved in DE are highly dependent on the optimization problem; in practice, their fine-tuning is not always an easy task. The self-adaptive differential evolution (SADE) variants are those that do not require the pre-specified choice of control parameters. On the contrary, control parameters are self-adapted by using the previous learning experience. In this paper, we discuss and evaluate popular common and self-adaptive differential evolution (DE) algorithms. In particular, we present an empirical comparison between two self-adaptive DE variants and common DE methods. In order to assure a fair comparison, we test the methods by using a number of well-known unimodal and multimodal, separable and non-separable, benchmark optimization problems for different dimensions and population size. The results show that SADE variants outperform, or at least produce similar results, to common differential evolution algorithms in terms of solution accuracy and convergence speed. The advantage of using the self-adaptive methods is that the user does not need to adjust control parameters. Therefore, the total computational effort is significantly reduced. © 2010 Published by Elsevier Ltd.},\n bibtype = {inproceedings},\n author = {Goudos, S. K. and Baltzis, K. B. and Antoniadis, K. and Zaharis, Z. D. and Hilas, C. S.},\n doi = {10.1016/j.procs.2010.12.015},\n booktitle = {Procedia Computer Science}\n}
\n
\n\n\n
\n Differential Evolution (DE) is a population-based stochastic global optimization technique that requires the adjustment of a very few parameters in order to produce results. However, the control parameters involved in DE are highly dependent on the optimization problem; in practice, their fine-tuning is not always an easy task. The self-adaptive differential evolution (SADE) variants are those that do not require the pre-specified choice of control parameters. On the contrary, control parameters are self-adapted by using the previous learning experience. In this paper, we discuss and evaluate popular common and self-adaptive differential evolution (DE) algorithms. In particular, we present an empirical comparison between two self-adaptive DE variants and common DE methods. In order to assure a fair comparison, we test the methods by using a number of well-known unimodal and multimodal, separable and non-separable, benchmark optimization problems for different dimensions and population size. The results show that SADE variants outperform, or at least produce similar results, to common differential evolution algorithms in terms of solution accuracy and convergence speed. The advantage of using the self-adaptive methods is that the user does not need to adjust control parameters. Therefore, the total computational effort is significantly reduced. © 2010 Published by Elsevier Ltd.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Unequally spaced arrays synthesis using Self-adaptive Differential Evolution.\n \n \n \n\n\n \n Goudos, S., K.; Nanos, A., A.; Samaras, T.; Siakavara, K.; Vafiadis, E.; and Sahalos, J., N.\n\n\n \n\n\n\n In Proceedings of the 5th European Conference on Antennas and Propagation, EUCAP 2011, pages 983-986, 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Unequally spaced arrays synthesis using Self-adaptive Differential Evolution},\n type = {inproceedings},\n year = {2011},\n pages = {983-986},\n id = {609db08c-ce41-3c0c-822e-058bdece2b5d},\n created = {2020-02-29T16:57:45.077Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.730Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2011},\n private_publication = {false},\n abstract = {In this paper we present uniformly excited unequally spaced linear-array synthesis with sidelobe suppression. We apply different evolutionary algorithms like Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Differential Evolution (DE) variants to position-only and position-phase synthesis. The DE algorithms include the common DE/rand/1/bin and the Self-adaptive strategies. The results on different problems show that the DE algorithms outperform the other algorithms in terms of finding best optima. The Self-adaptive DE produces similar or better results than the classical DE algorithm. The obtained results indicate the advantages of this approach. © 2011 EurAAP.},\n bibtype = {inproceedings},\n author = {Goudos, S. K. and Nanos, A. A. and Samaras, T. and Siakavara, K. and Vafiadis, E. and Sahalos, J. N.},\n booktitle = {Proceedings of the 5th European Conference on Antennas and Propagation, EUCAP 2011}\n}
\n
\n\n\n
\n In this paper we present uniformly excited unequally spaced linear-array synthesis with sidelobe suppression. We apply different evolutionary algorithms like Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Differential Evolution (DE) variants to position-only and position-phase synthesis. The DE algorithms include the common DE/rand/1/bin and the Self-adaptive strategies. The results on different problems show that the DE algorithms outperform the other algorithms in terms of finding best optima. The Self-adaptive DE produces similar or better results than the classical DE algorithm. The obtained results indicate the advantages of this approach. © 2011 EurAAP.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Distance learning technology and service support in Greece: the case study of the aristotle university over the last decade.\n \n \n \n \n\n\n \n Agorogianni, A., Z.; Zaharis, Z., D.; Anastasiadou, S., D.; and Goudos, S., K.\n\n\n \n\n\n\n Education and Information Technologies, 16(1): 25-39. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"DistanceWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Distance learning technology and service support in Greece: the case study of the aristotle university over the last decade},\n type = {article},\n year = {2011},\n pages = {25-39},\n volume = {16},\n websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096079124&doi=10.1007%2Fs10639-009-9110-3&partnerID=40&md5=0bdcd906615129a3c1fdedc1d2d881ac},\n id = {70c1a235-bf41-35e8-a7af-3c77cd6e4ddd},\n created = {2022-07-14T18:38:19.062Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-07-14T18:38:19.062Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Agorogianni201125},\n source_type = {article},\n private_publication = {false},\n bibtype = {article},\n author = {Agorogianni, A Z and Zaharis, Z D and Anastasiadou, S D and Goudos, S K},\n doi = {10.1007/s10639-009-9110-3},\n journal = {Education and Information Technologies},\n number = {1}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Multi-objective Approach to subarrayed linear antenna arrays design.\n \n \n \n\n\n \n Goudos, S., K.; Gotsis, K., A.; Siakavara, K.; Vafiadis, E., E.; and Sahalos, J., N.\n\n\n \n\n\n\n In Proceedings of the 2011 URSI General Assembly and Scientific Symposium, Istanbul, Turkey on August 13-20, 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {A Multi-objective Approach to subarrayed linear antenna arrays design},\n type = {inproceedings},\n year = {2011},\n id = {39d3fb97-ca49-3b29-a4e5-8c8b6fcb437d},\n created = {2023-02-11T21:11:00.727Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.727Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2011multiobjective},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, S K and Gotsis, K A and Siakavara, K and Vafiadis, E E and Sahalos, J N},\n booktitle = {Proceedings of the 2011 URSI General Assembly and Scientific Symposium, Istanbul, Turkey on August 13-20}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Solving Semantic Interoperability Conflicts in Cross-Border E-Government Services.\n \n \n \n \n\n\n \n Mocan, A.; Facca, F., M.; Loutas, N.; Peristeras, V.; Goudos, S., K.; and Tarabanis, K.\n\n\n \n\n\n\n Semantic Services, Interoperability and Web Applications: Emerging Concepts, pages 1-47. Sheth, A., editor(s). IGI Global, 2011.\n \n\n\n\n
\n\n\n\n \n \n \"SemanticWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2011},\n pages = {1-47},\n websites = {https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-593-3.ch001},\n publisher = {IGI Global},\n city = {Hershey, PA, USA},\n id = {598347e8-eed3-3f74-9046-142e58d8e3e3},\n created = {2023-02-11T21:19:22.085Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:19:22.085Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Sheth2011},\n source_type = {incollection},\n private_publication = {false},\n abstract = {Interoperability is one of the most challenging problems in modern cross-organizational information systems, which rely on heterogeneous information and process models. Interoperability becomes very important for e-Government information systems that support cross-organizational communication especially in a cross-border setting. The main goal in this context is to seamlessly provide integrated services to the user (citizen). In this paper we focus on Pan European e-Services and issues related with their integration. Our analysis uses basic concepts of the generic public service model of the Governance Enterprise Architecture (GEA) and of the Web Service Modeling Ontology (WSMO), to express the semantic description of the e-services. Based on the above, we present a mediation infrastructure capable of resolving semantic interoperability conflicts at a pan-European level. We provide several examples to illustrate both the need to solve such semantic conflicts and the actual solutions we propose.},\n bibtype = {inbook},\n author = {Mocan, Adrian and Facca, Federico M and Loutas, Nikolaos and Peristeras, Vassilios and Goudos, Sotirios K and Tarabanis, Konstantinos},\n editor = {Sheth, Amit},\n doi = {10.4018/978-1-60960-593-3.ch001},\n chapter = {Solving Semantic Interoperability Conflicts in Cross-Border E-Government Services},\n title = {Semantic Services, Interoperability and Web Applications: Emerging Concepts}\n}
\n
\n\n\n
\n Interoperability is one of the most challenging problems in modern cross-organizational information systems, which rely on heterogeneous information and process models. Interoperability becomes very important for e-Government information systems that support cross-organizational communication especially in a cross-border setting. The main goal in this context is to seamlessly provide integrated services to the user (citizen). In this paper we focus on Pan European e-Services and issues related with their integration. Our analysis uses basic concepts of the generic public service model of the Governance Enterprise Architecture (GEA) and of the Web Service Modeling Ontology (WSMO), to express the semantic description of the e-services. Based on the above, we present a mediation infrastructure capable of resolving semantic interoperability conflicts at a pan-European level. We provide several examples to illustrate both the need to solve such semantic conflicts and the actual solutions we propose.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Development and evaluation of a VisSim/Comm based minimum shift keying simulator.\n \n \n \n\n\n \n Baltzis, K., B.; and Goudos, S., K.\n\n\n \n\n\n\n In AIP Conference Proceedings, volume 1203, pages 661-666, 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Development and evaluation of a VisSim/Comm based minimum shift keying simulator},\n type = {inproceedings},\n year = {2010},\n keywords = {Minimum shift keying,Simulation,Transceiver,Virtual laboratory,VisSim/Comm},\n pages = {661-666},\n volume = {1203},\n id = {501c5ad6-9723-3fb2-b83d-92dec0e4fd9f},\n created = {2020-02-29T16:57:42.070Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.706Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Baltzis2010},\n private_publication = {false},\n abstract = {One of the most prominent data transmission techniques in modern digital communications is minimum shift keying (MSK) modulation. In recent years, the method has gained popularity due to several features highly desirable in telecommunications. In this paper, we develop an MSK transceiver in the VisSim/Comm simulation environment. The main benefit of our proposal is the detailed and realistic representation of the transceiver; in contrast to MSK building blocks in the simulation libraries, users can gain information in time and spectral domain at any point in the structure. We present a detailed description of the simulator and give representative examples that exhibit the simulator's performance and accuracy. We also discuss an educational application of the simulator. In that way physics students can study the simulator characteristics and evaluate its efficiency. © 2009 American Institute of Physics.},\n bibtype = {inproceedings},\n author = {Baltzis, Konstantinos B. and Goudos, Sotirios K.},\n doi = {10.1063/1.3322531},\n booktitle = {AIP Conference Proceedings}\n}
\n
\n\n\n
\n One of the most prominent data transmission techniques in modern digital communications is minimum shift keying (MSK) modulation. In recent years, the method has gained popularity due to several features highly desirable in telecommunications. In this paper, we develop an MSK transceiver in the VisSim/Comm simulation environment. The main benefit of our proposal is the detailed and realistic representation of the transceiver; in contrast to MSK building blocks in the simulation libraries, users can gain information in time and spectral domain at any point in the structure. We present a detailed description of the simulator and give representative examples that exhibit the simulator's performance and accuracy. We also discuss an educational application of the simulator. In that way physics students can study the simulator characteristics and evaluate its efficiency. © 2009 American Institute of Physics.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Pareto optimal microwave filter design using multiobjective differential evolution.\n \n \n \n\n\n \n Goudos, S., K.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Transactions on Antennas and Propagation, 58(1): 132-144. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Pareto optimal microwave filter design using multiobjective differential evolution},\n type = {article},\n year = {2010},\n keywords = {Dielectric filters,Differential evolution (DE),Generalized differential evolution (GDE),Microwave filter design,Multiobjective optimization (MO),Open loop ring resonator (OLRR) filter,Pareto optimization,Particle swarm optimization (PSO)},\n pages = {132-144},\n volume = {58},\n id = {a1965839-02d2-34e2-89ec-d596e3a3da50},\n created = {2020-02-29T16:57:42.117Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.273Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2010f},\n private_publication = {false},\n abstract = {Microwave filters play an important role in modern wireless communications. A novel method for the design of multilayer dielectric and open loop ring resonator (OLRR) filters under constraints is presented. The proposed design method is based on generalized differential evolution (GDE3), which is a multiobjective extension of differential evolution (DE). GDE3 algorithm can be applied for global optimization to any engineering problem with an arbitrary number of objective and constraint functions. GDE3 is compared against other evolutionary multiobjective algorithms like nondominated sorting genetic algorithm-II (NSGA-II), multiobjective particle swarm optimization (MOPSO) and multiobjective particle swarm optimization with fitness sharing (MOPSO-fs) for a number of microwave filter design cases. In the multilayer dielectric filter design case a predefined database of low loss dielectric materials is used. The results indicate the advantages of this approach and the applicability of this design method.© 2009 IEEE.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Sahalos, John N.},\n doi = {10.1109/TAP.2009.2032100},\n journal = {IEEE Transactions on Antennas and Propagation},\n number = {1}\n}
\n
\n\n\n
\n Microwave filters play an important role in modern wireless communications. A novel method for the design of multilayer dielectric and open loop ring resonator (OLRR) filters under constraints is presented. The proposed design method is based on generalized differential evolution (GDE3), which is a multiobjective extension of differential evolution (DE). GDE3 algorithm can be applied for global optimization to any engineering problem with an arbitrary number of objective and constraint functions. GDE3 is compared against other evolutionary multiobjective algorithms like nondominated sorting genetic algorithm-II (NSGA-II), multiobjective particle swarm optimization (MOPSO) and multiobjective particle swarm optimization with fitness sharing (MOPSO-fs) for a number of microwave filter design cases. In the multilayer dielectric filter design case a predefined database of low loss dielectric materials is used. The results indicate the advantages of this approach and the applicability of this design method.© 2009 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of semantic web technology in e-business: Case studies in public domain data knowledge representation.\n \n \n \n\n\n \n Goudos, S., K.; Peristeras, V.; and Tarabanis, K.\n\n\n \n\n\n\n Volume 3 . Encyclopedia of E-Business Development and Management in the Global Economy, pages 983-994. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2010},\n pages = {983-994},\n volume = {3},\n id = {e2af9339-7581-39d2-9229-be4ff2c2c208},\n created = {2020-02-29T16:57:42.706Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.500Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2010e},\n private_publication = {false},\n bibtype = {inbook},\n author = {Goudos, Sotirios K. and Peristeras, Vassilios and Tarabanis, Konstantinos},\n doi = {10.4018/978-1-61520-611-7.ch099},\n chapter = {Application of semantic web technology in e-business: Case studies in public domain data knowledge representation},\n title = {Encyclopedia of E-Business Development and Management in the Global Economy}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of a differential evolution algorithm with strategy adaptation to the design of multi-band microwave filters for wireless communications.\n \n \n \n\n\n \n Goudos, S., K.; Zaharis, Z., D.; and Yioultsis, T., V.\n\n\n \n\n\n\n Progress in Electromagnetics Research, 109: 123-137. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Application of a differential evolution algorithm with strategy adaptation to the design of multi-band microwave filters for wireless communications},\n type = {article},\n year = {2010},\n pages = {123-137},\n volume = {109},\n id = {0270d039-a70e-3b31-8520-d0d9b7db013d},\n created = {2020-02-29T16:57:42.872Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.341Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2010d},\n private_publication = {false},\n abstract = {In this paper, we present a new method for the design of multi-band microstrip filters. The proposed design method is based on Differential Evolution (DE) with strategy adaptation. This self-adaptive DE (SaDE) uses previous experience in both trial vector generation strategies and control parameter tuning. We apply this algorithm to two design cases of dual and tri-band filters for WiFi and WiMax applications. We select the Open Loop Ring Resonator (OLRR) filters, which are comprised of two uniform microstrip lines and pairs of open loops between them. The results indicate the advantages of this approach and the applicability of this design method.},\n bibtype = {article},\n author = {Goudos, S. K. and Zaharis, Z. D. and Yioultsis, T. V.},\n doi = {10.2528/PIER10081704},\n journal = {Progress in Electromagnetics Research}\n}
\n
\n\n\n
\n In this paper, we present a new method for the design of multi-band microstrip filters. The proposed design method is based on Differential Evolution (DE) with strategy adaptation. This self-adaptive DE (SaDE) uses previous experience in both trial vector generation strategies and control parameter tuning. We apply this algorithm to two design cases of dual and tri-band filters for WiFi and WiMax applications. We select the Open Loop Ring Resonator (OLRR) filters, which are comprised of two uniform microstrip lines and pairs of open loops between them. The results indicate the advantages of this approach and the applicability of this design method.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of Taguchi's optimization method and self-adaptive differential evolution to the synthesis of linear antenna arrays.\n \n \n \n\n\n \n Dib, N.; Goudos, S., K.; and Muhsen, H.\n\n\n \n\n\n\n Progress in Electromagnetics Research, 102: 159-180. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Application of Taguchi's optimization method and self-adaptive differential evolution to the synthesis of linear antenna arrays},\n type = {article},\n year = {2010},\n pages = {159-180},\n volume = {102},\n id = {d1d26c82-9b34-3e9d-9b64-cbe5bad281cc},\n created = {2020-02-29T16:57:42.914Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.980Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Dib2010},\n private_publication = {false},\n abstract = {In this paper, the problem of designing linear antenna arrays for specific radiation properties is dealt with. The design problem is modeled as a single optimization problem. The objectives of this work are to minimize the maximum side lobe level (SLL) and perform null steering for isotropic linear antenna arrays by controlling different parameters of the array elements (position, amplitude, and phase). The optimization is performed using two techniques: Taguchi's optimization method and the self-adaptive differential evolution (SADE) technique. The advantage of Taguchi's optimization technique is the ability of solving problems with a high degree of complexity using a small number of experiments in the optimization process Taguchi's method is easy to implement and converges to the desired goal quickly in comparison with gradient-based methods and particle swarm optimization (PSO) Results obtained using Taguchi's method are in very good agreement with those obtained using the SADE technique.},\n bibtype = {article},\n author = {Dib, N. and Goudos, S. K. and Muhsen, H.},\n doi = {10.2528/PIER09122306},\n journal = {Progress in Electromagnetics Research}\n}
\n
\n\n\n
\n In this paper, the problem of designing linear antenna arrays for specific radiation properties is dealt with. The design problem is modeled as a single optimization problem. The objectives of this work are to minimize the maximum side lobe level (SLL) and perform null steering for isotropic linear antenna arrays by controlling different parameters of the array elements (position, amplitude, and phase). The optimization is performed using two techniques: Taguchi's optimization method and the self-adaptive differential evolution (SADE) technique. The advantage of Taguchi's optimization technique is the ability of solving problems with a high degree of complexity using a small number of experiments in the optimization process Taguchi's method is easy to implement and converges to the desired goal quickly in comparison with gradient-based methods and particle swarm optimization (PSO) Results obtained using Taguchi's method are in very good agreement with those obtained using the SADE technique.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Pareto optimal yagi-uda antenna design using multi-objective differential evolution.\n \n \n \n\n\n \n Goudos, S., K.; Siakavara, K.; Vafiadis, E., E.; and Sahalos, J., N.\n\n\n \n\n\n\n Progress in Electromagnetics Research, 105: 231-251. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Pareto optimal yagi-uda antenna design using multi-objective differential evolution},\n type = {article},\n year = {2010},\n pages = {231-251},\n volume = {105},\n id = {63c32e7c-e8e7-321c-8f59-381750b39439},\n created = {2020-02-29T16:57:43.585Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.610Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2010c},\n private_publication = {false},\n abstract = {Antenna design problems often require the optimization of several conflicting objectives such as gain maximization, sidelobe level (SLL) reduction and input impedance matching. Multi-objective Evolutionary Algorithms (MOEAs) are suitable optimization techniques for solving such problems. An efficient algorithm is Generalized Differential Evolution (GDE3), which is a multi-objective extension of Differential Evolution (DE). The GDE3 algorithm can be applied to global optimization of any engineering problem with an arbitrary number of objective and constraint functions. Another popular MOEA is Nondominated Sorting Genetic Algorithm-II (NSGA-II). Both GDE3 and NSGA-II are applied to Yagi-Uda antenna design under specified constraints. The numerical solver used for antenna parameters calculations is SuperNEC, an object-oriented version of the numerical electromagnetic code (NEC-2). Three different Yagi-Uda antenna designs are considered and optimized. Pareto fronts are produced for both algorithms. The results indicate the advantages of this approach and the applicability of this design method.},\n bibtype = {article},\n author = {Goudos, S. K. and Siakavara, K. and Vafiadis, E. E. and Sahalos, J. N.},\n doi = {10.2528/PIER10052302},\n journal = {Progress in Electromagnetics Research}\n}
\n
\n\n\n
\n Antenna design problems often require the optimization of several conflicting objectives such as gain maximization, sidelobe level (SLL) reduction and input impedance matching. Multi-objective Evolutionary Algorithms (MOEAs) are suitable optimization techniques for solving such problems. An efficient algorithm is Generalized Differential Evolution (GDE3), which is a multi-objective extension of Differential Evolution (DE). The GDE3 algorithm can be applied to global optimization of any engineering problem with an arbitrary number of objective and constraint functions. Another popular MOEA is Nondominated Sorting Genetic Algorithm-II (NSGA-II). Both GDE3 and NSGA-II are applied to Yagi-Uda antenna design under specified constraints. The numerical solver used for antenna parameters calculations is SuperNEC, an object-oriented version of the numerical electromagnetic code (NEC-2). Three different Yagi-Uda antenna designs are considered and optimized. Pareto fronts are produced for both algorithms. The results indicate the advantages of this approach and the applicability of this design method.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Cell-to-switch assignment in cellular networks using barebones particle swarm optimization.\n \n \n \n\n\n \n Goudos, S., K.; Baltzis, K., B.; Bachtsevanidis, C.; and Sahalos, J., N.\n\n\n \n\n\n\n IEICE Electronics Express, 7(4): 254-260. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Cell-to-switch assignment in cellular networks using barebones particle swarm optimization},\n type = {article},\n year = {2010},\n keywords = {Barebones PSO,Cell assignment,Cellular networks,Integer programming,PSO},\n pages = {254-260},\n volume = {7},\n id = {f00a6c45-3836-3e7d-99d6-55f5c4383003},\n created = {2020-02-29T16:57:43.605Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.750Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2010b},\n private_publication = {false},\n abstract = {Cell assignment is an important issue in the area of resource management in cellular networks. The problem is an NP-hard one and requires efficient search techniques for its solution in real-time. In this letter, in order to minimize the cabling and handoff costs, we use two novel discrete particle swarm optimization (PSO) algorithms, the barebones (BB) and the exploiting barebones (BBExp) PSO variants. The impact of network and algorithm parameters on the solution accuracy and computational cost of the methods is investigated. Comparisons with optimization methods in the literature demonstrate the benefits of our proposal. © IEICE 2010.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Baltzis, Konstantinos B. and Bachtsevanidis, Christos and Sahalos, John N.},\n doi = {10.1587/elex.7.254},\n journal = {IEICE Electronics Express},\n number = {4}\n}
\n
\n\n\n
\n Cell assignment is an important issue in the area of resource management in cellular networks. The problem is an NP-hard one and requires efficient search techniques for its solution in real-time. In this letter, in order to minimize the cabling and handoff costs, we use two novel discrete particle swarm optimization (PSO) algorithms, the barebones (BB) and the exploiting barebones (BBExp) PSO variants. The impact of network and algorithm parameters on the solution accuracy and computational cost of the methods is investigated. Comparisons with optimization methods in the literature demonstrate the benefits of our proposal. © IEICE 2010.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Aperture array model for rapid assessment of Base Station Antennas near field based on half power beam width equivalence.\n \n \n \n\n\n \n Nanos, A., A.; Goudos, S., K.; Siakavara, K.; Samaras, T.; and Sahalos, J., N.\n\n\n \n\n\n\n In EuCAP 2010 - The 4th European Conference on Antennas and Propagation, 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Aperture array model for rapid assessment of Base Station Antennas near field based on half power beam width equivalence},\n type = {inproceedings},\n year = {2010},\n id = {1b08b0f8-aba8-3310-b0b6-d3299902e76c},\n created = {2020-02-29T16:57:44.565Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.489Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Nanos2010},\n private_publication = {false},\n abstract = {In this work a fast method is presented, for the approximate estimation of the near field in the vicinity of mobile Base Station Antennas (BSA) comprised of reflector type unit cells. The method is based on the substitution of each unit cell of the BSA with a uniformly excited rectangular aperture of suitable dimensions, so that both have equal half power beam widths in the two main radiation planes. The method utilizes the fast numerical evaluation of the near field of uniformly excited apertures, and comes as an enhancement to similar synthetic based model.},\n bibtype = {inproceedings},\n author = {Nanos, Apostolos A. and Goudos, Sotirios K. and Siakavara, Katherine and Samaras, Theodoros and Sahalos, John N.},\n booktitle = {EuCAP 2010 - The 4th European Conference on Antennas and Propagation}\n}
\n
\n\n\n
\n In this work a fast method is presented, for the approximate estimation of the near field in the vicinity of mobile Base Station Antennas (BSA) comprised of reflector type unit cells. The method is based on the substitution of each unit cell of the BSA with a uniformly excited rectangular aperture of suitable dimensions, so that both have equal half power beam widths in the two main radiation planes. The method utilizes the fast numerical evaluation of the near field of uniformly excited apertures, and comes as an enhancement to similar synthetic based model.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Wideband E-shaped patch antenna design for wireless communications using self-adaptive differential evolution.\n \n \n \n\n\n \n Goudos, S., K.; Nanos, A., A.; Samaras, T.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n In EuCAP 2010 - The 4th European Conference on Antennas and Propagation, 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Wideband E-shaped patch antenna design for wireless communications using self-adaptive differential evolution},\n type = {inproceedings},\n year = {2010},\n id = {cbc6abe1-e5ab-3cff-9855-3a5206e974dc},\n created = {2020-02-29T16:57:44.598Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.083Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Goudos2010a},\n private_publication = {false},\n abstract = {Wideband E-shaped patch antenna design is presented. The design technique is based on a self-adaptive Differential Evolution (DE) algorithm. In order to evaluate the algorithm's performance we compare results with three other common evolutionary algorithms regarding statistical results and convergence speed. The results show that the self-adaptive DE algorithm outerperforms other global optimizers like Particle swarm optimization (PSO) variants and the DE rand/1/bin strategy. Therefore, the results indicate the advantages of this approach and the applicability of this design method to other optimization problems in electromagnetics.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Nanos, Apostolos A. and Samaras, Theodoros and Siakavara, Katherine and Sahalos, John N.},\n booktitle = {EuCAP 2010 - The 4th European Conference on Antennas and Propagation}\n}
\n
\n\n\n
\n Wideband E-shaped patch antenna design is presented. The design technique is based on a self-adaptive Differential Evolution (DE) algorithm. In order to evaluate the algorithm's performance we compare results with three other common evolutionary algorithms regarding statistical results and convergence speed. The results show that the self-adaptive DE algorithm outerperforms other global optimizers like Particle swarm optimization (PSO) variants and the DE rand/1/bin strategy. Therefore, the results indicate the advantages of this approach and the applicability of this design method to other optimization problems in electromagnetics.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of a comprehensive learning particle swarm optimizer to unequally spaced linear array synthesis with sidelobe level suppression and null control.\n \n \n \n\n\n \n Goudos, S., K.; Moysiadou, V.; Samaras, T.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Antennas and Wireless Propagation Letters, 9: 125-129. 2010.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Application of a comprehensive learning particle swarm optimizer to unequally spaced linear array synthesis with sidelobe level suppression and null control},\n type = {article},\n year = {2010},\n keywords = {Array synthesis,Comprehensive learning particle swarm optimizer (C,Genetic algorithms (GAs),Linear array design,Null control,Particle swarm optimization (PSO),Sidelobe suppression},\n pages = {125-129},\n volume = {9},\n id = {9d2a5145-9eac-3cf6-81c0-0c1ea5443e7e},\n created = {2020-02-29T16:57:44.617Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.127Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2010},\n private_publication = {false},\n abstract = {We present unequally spaced linear array synthesis with sidelobe suppression under constraints to beamwidth and null control using a design technique based on a Comprehensive Learning Particle Swarm Optimizer (CLPSO). CLPSO utilizes a new learning strategy that achieves the goal to accelerate the convergence of the classical PSO. Numerical examples are compared to the existing array designs in the literature and to those found by the other evolutionary algorithms. The synthesis examples that are presented show that the CLPSO algorithm outperforms the common PSO algorithms and a real-coded genetic algorithm (GA). © 2006 IEEE.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Moysiadou, Vasiliki and Samaras, Theodoros and Siakavara, Katherine and Sahalos, John N.},\n doi = {10.1109/LAWP.2010.2044552},\n journal = {IEEE Antennas and Wireless Propagation Letters}\n}
\n
\n\n\n
\n We present unequally spaced linear array synthesis with sidelobe suppression under constraints to beamwidth and null control using a design technique based on a Comprehensive Learning Particle Swarm Optimizer (CLPSO). CLPSO utilizes a new learning strategy that achieves the goal to accelerate the convergence of the classical PSO. Numerical examples are compared to the existing array designs in the literature and to those found by the other evolutionary algorithms. The synthesis examples that are presented show that the CLPSO algorithm outperforms the common PSO algorithms and a real-coded genetic algorithm (GA). © 2006 IEEE.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Design of Microwave broadband absorbers using a self-adaptive differential evolution algorithm.\n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n International Journal of RF and Microwave Computer-Aided Engineering, 19(3): 364-372. 2009.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Design of Microwave broadband absorbers using a self-adaptive differential evolution algorithm},\n type = {article},\n year = {2009},\n keywords = {Evolutionary algorithms,Microwave absorber design,Multilayer coatings,Particle swarm optimization differential evolution,Radar absorbing materials},\n pages = {364-372},\n volume = {19},\n id = {f145d4e4-7359-3b29-8a3b-32e1d350e792},\n created = {2020-02-29T16:57:41.897Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.343Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2009b},\n private_publication = {false},\n abstract = {Microwave broadband absorber design for a desired frequency and angle range is presented. The design technique is based on a self-adaptive Differential Evolution (DE) algorithm. Numerical examples are compared with the existing in the literature and with those found by the other evolutionary algorithms. The results show that the new DE algorithm version outerperforms other global optimizers like Particle swarm optimization (PSO) variants and the classical DE algorithm. © 2008 Wiley Periodicals, Inc. Int J RF and Microwave CAE 19: 364-372, 2009.},\n bibtype = {article},\n author = {Goudos, Sotirios K.},\n doi = {10.1002/mmce.20357},\n journal = {International Journal of RF and Microwave Computer-Aided Engineering},\n number = {3}\n}
\n
\n\n\n
\n Microwave broadband absorber design for a desired frequency and angle range is presented. The design technique is based on a self-adaptive Differential Evolution (DE) algorithm. Numerical examples are compared with the existing in the literature and with those found by the other evolutionary algorithms. The results show that the new DE algorithm version outerperforms other global optimizers like Particle swarm optimization (PSO) variants and the classical DE algorithm. © 2008 Wiley Periodicals, Inc. Int J RF and Microwave CAE 19: 364-372, 2009.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Model-driven eGovernment interoperability: A review of the state of the art.\n \n \n \n\n\n \n Peristeras, V.; Tarabanis, K.; and Goudos, S., K.\n\n\n \n\n\n\n 2009.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@misc{\n title = {Model-driven eGovernment interoperability: A review of the state of the art},\n type = {misc},\n year = {2009},\n source = {Computer Standards and Interfaces},\n keywords = {Data modelling,Domain modelling,Ontologies,Process modelling,Semantic web,eGovernment interoperability},\n pages = {613-628},\n volume = {31},\n issue = {4},\n id = {597bd958-a346-3a3e-9e4e-74f2ec191808},\n created = {2020-02-29T16:57:42.940Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.917Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Peristeras2009a},\n private_publication = {false},\n abstract = {This paper reviews the state of the art in the area of enhancing eGovernment interoperability by using common models and/or ontologies. This area has currently become a very active research field. We identify and present a significant number (> 40) of relevant efforts. These initiatives are grouped into categories based on the owner, scope and modelling perspective of each project. We then focus on the cases that build generic and universal eGovernment representations and models. We analyse, evaluate and rate them using an additional set of criteria. We end up with conclusions and possible directions for the exploitation and usage of these models. © 2008 Elsevier B.V. All rights reserved.},\n bibtype = {misc},\n author = {Peristeras, Vassilios and Tarabanis, Konstantinos and Goudos, Sotirios K.},\n doi = {10.1016/j.csi.2008.09.034}\n}
\n
\n\n\n
\n This paper reviews the state of the art in the area of enhancing eGovernment interoperability by using common models and/or ontologies. This area has currently become a very active research field. We identify and present a significant number (> 40) of relevant efforts. These initiatives are grouped into categories based on the owner, scope and modelling perspective of each project. We then focus on the cases that build generic and universal eGovernment representations and models. We analyse, evaluate and rate them using an additional set of criteria. We end up with conclusions and possible directions for the exploitation and usage of these models. © 2008 Elsevier B.V. All rights reserved.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An ontological representation of public services: Models, technologies and use cases.\n \n \n \n\n\n \n Peristeras, V.; Goudos, S., K.; Loutas, N.; and Tarabanis, K.\n\n\n \n\n\n\n Journal of Web Engineering, 8(3): 245-267. 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {An ontological representation of public services: Models, technologies and use cases},\n type = {article},\n year = {2009},\n keywords = {OWL,Ontology,Public administration service provision,Semantic discovery,Semantic web applications,eGovernment},\n pages = {245-267},\n volume = {8},\n id = {30d7c6fd-19d3-3d29-8a86-7372ea9d11d5},\n created = {2020-02-29T16:57:43.562Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.090Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Peristeras2009},\n private_publication = {false},\n abstract = {This paper presents our effort to "ontologize" a conceptual public service model in order to express in a formal way domain specific semantics and create a reusable service ontology for eGovernment applications. The conceptual model we have used comes from a broader public administration domain modeling effort, called Governance Enterprise Architecture (GEA). With this as a starting point, we document our experience of using the Web Ontology Language (OWL) for the ontological representation of the model. Moreover, we present a use case and a platform that is based and uses this ontology for the discovery of eGovernment services. These services are discovered by semantically matching citizens' profiles with formally described public services. The proposed domain ontology is reusable and can be exploited by a variety of semantic web applications for eGovernment whenever a formal and standardized model for public services is needed. © Rinton Press.},\n bibtype = {article},\n author = {Peristeras, Vassilios and Goudos, Sotirios K. and Loutas, Nikolaos and Tarabanis, Konstantinos},\n journal = {Journal of Web Engineering},\n number = {3}\n}
\n
\n\n\n
\n This paper presents our effort to \"ontologize\" a conceptual public service model in order to express in a formal way domain specific semantics and create a reusable service ontology for eGovernment applications. The conceptual model we have used comes from a broader public administration domain modeling effort, called Governance Enterprise Architecture (GEA). With this as a starting point, we document our experience of using the Web Ontology Language (OWL) for the ontological representation of the model. Moreover, we present a use case and a platform that is based and uses this ontology for the discovery of eGovernment services. These services are discovered by semantically matching citizens' profiles with formally described public services. The proposed domain ontology is reusable and can be exploited by a variety of semantic web applications for eGovernment whenever a formal and standardized model for public services is needed. © Rinton Press.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Level change detection in time series using higher order statistics.\n \n \n \n\n\n \n Hilas, C., S.; Rekanos, I., T.; Goudos, S., K.; Mastorocostas, P., A.; and Sahalos, J., N.\n\n\n \n\n\n\n In DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings, 2009. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Level change detection in time series using higher order statistics},\n type = {inproceedings},\n year = {2009},\n keywords = {Change point detection,Heuristic methods,Higher order statistics,Interrupted time series},\n id = {b8f8910a-3e71-3c3b-9c67-72971b9d49bd},\n created = {2020-02-29T16:57:44.657Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.295Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Hilas2009},\n private_publication = {false},\n abstract = {Changes in the level of a time series are usually attributed to an intervention that interrupts its evolution. The resulting time series are referred to as interrupted time series and they are studied in order to measure, e.g. the impact of new laws or medical treatments. In the present paper a heuristic method for level change detection in non-stationary time series is presented. The method uses higher order statistics, namely the skewness and the kurtosis, and can identify both the existence of a change in the level of the time series as well as the time point it has happened. The technique is tested with both simulated and real world data and is straightforward applicable to the detection of outliers in time series. © 2009 IEEE.},\n bibtype = {inproceedings},\n author = {Hilas, C. S. and Rekanos, I. T. and Goudos, S. K. and Mastorocostas, P. A. and Sahalos, J. N.},\n doi = {10.1109/ICDSP.2009.5201260},\n booktitle = {DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings}\n}
\n
\n\n\n
\n Changes in the level of a time series are usually attributed to an intervention that interrupts its evolution. The resulting time series are referred to as interrupted time series and they are studied in order to measure, e.g. the impact of new laws or medical treatments. In the present paper a heuristic method for level change detection in non-stationary time series is presented. The method uses higher order statistics, namely the skewness and the kurtosis, and can identify both the existence of a change in the level of the time series as well as the time point it has happened. The technique is tested with both simulated and real world data and is straightforward applicable to the detection of outliers in time series. © 2009 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A comparative study of particle swarm optimization and differential evolution on radar absorbing materials design for EMC applications.\n \n \n \n\n\n \n Goudos, S., K.; Zaharis, Z., D.; Baltzis, K., B.; Hilas, C., S.; and Sahalos, J., N.\n\n\n \n\n\n\n In 2009 International Symposium on Electromagnetic Compatibility - EMC Europe, 2009. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A comparative study of particle swarm optimization and differential evolution on radar absorbing materials design for EMC applications},\n type = {inproceedings},\n year = {2009},\n keywords = {Differential evolution,Evolutionary algorithms,Microwave absorber design,Multi-layer coatings,Particle swarm optimization,Radar absorbing materials},\n id = {d626d22b-e4a1-32f6-bb46-45a76cd4d7fb},\n created = {2020-02-29T16:57:44.685Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.951Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Goudos2009a},\n private_publication = {false},\n abstract = {Radar Absorbing Materials (RAM) design for a desired frequency and angle range is presented. We evaluate the performance of Particle Swarm Optimization (PSO) and Differential Evolution (DE) regarding their applicability to absorber design. The results show that the DE algorithm outerperforms PSO variants. © 2009 IEEE.},\n bibtype = {inproceedings},\n author = {Goudos, S. K. and Zaharis, Z. D. and Baltzis, K. B. and Hilas, C. S. and Sahalos, J. N.},\n doi = {10.1109/EMCEUROPE.2009.5189697},\n booktitle = {2009 International Symposium on Electromagnetic Compatibility - EMC Europe}\n}
\n
\n\n\n
\n Radar Absorbing Materials (RAM) design for a desired frequency and angle range is presented. We evaluate the performance of Particle Swarm Optimization (PSO) and Differential Evolution (DE) regarding their applicability to absorber design. The results show that the DE algorithm outerperforms PSO variants. © 2009 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Pareto optimal design of dual-band base station antenna arrays using multi-objective particle swarm optimization with fitness sharing.\n \n \n \n\n\n \n Goudos, S., K.; Zaharis, Z., D.; Kampitaki, D., G.; Rekanos, I., T.; and Hilas, C., S.\n\n\n \n\n\n\n IEEE Transactions on Magnetics, 45(3): 1522-1525. 2009.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Pareto optimal design of dual-band base station antenna arrays using multi-objective particle swarm optimization with fitness sharing},\n type = {article},\n year = {2009},\n keywords = {Dual-band antenna array design,Multi-objective optimization,Pareto optimization,Particle swarm optimization},\n pages = {1522-1525},\n volume = {45},\n id = {8d1be6ac-f5e9-3f06-b050-88c0dc4a723f},\n created = {2020-02-29T16:57:44.717Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.629Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2009},\n private_publication = {false},\n abstract = {The design of dual-band base station antennas under constraints for mobile communications is addressed in this paper. Given the antenna geometry, the method of moments (MoM) is used to compute the antenna characteristics. Two distinct multi-objective evolutionary algorithms are applied in order to find the Pareto front of the feasible solutions that satisfy the design constraints. In the present work, the Multi-Objective Particle Swarm Optimization with fitness sharing (MOPSO-fs) is compared with the Nondominated Sorting Genetic Algorithm-II (NSGA-II) in order to optimize the antenna geometry. Two design cases are presented. The first case is a five-element array operating in GSM1800/UMTS frequency bands. The second base station antenna array consists of six elements operating in UMTS/WLAN (2.4 GHz) frequency bands. © 2006 IEEE.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Zaharis, Zaharias D. and Kampitaki, Dimitra G. and Rekanos, Ioannis T. and Hilas, Costas S.},\n doi = {10.1109/TMAG.2009.2012695},\n journal = {IEEE Transactions on Magnetics},\n number = {3}\n}
\n
\n\n\n
\n The design of dual-band base station antennas under constraints for mobile communications is addressed in this paper. Given the antenna geometry, the method of moments (MoM) is used to compute the antenna characteristics. Two distinct multi-objective evolutionary algorithms are applied in order to find the Pareto front of the feasible solutions that satisfy the design constraints. In the present work, the Multi-Objective Particle Swarm Optimization with fitness sharing (MOPSO-fs) is compared with the Nondominated Sorting Genetic Algorithm-II (NSGA-II) in order to optimize the antenna geometry. Two design cases are presented. The first case is a five-element array operating in GSM1800/UMTS frequency bands. The second base station antenna array consists of six elements operating in UMTS/WLAN (2.4 GHz) frequency bands. © 2006 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Solving semantic interoperability conflicts in cross-border E-government services.\n \n \n \n\n\n \n Mocan, A.; Facca, F., M.; Loutas, N.; Peristeras, V.; Goudos, S., K.; and Tarabanis, K.\n\n\n \n\n\n\n International Journal on Semantic Web and Information Systems, 5(1): 1-47. 2009.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Solving semantic interoperability conflicts in cross-border E-government services},\n type = {article},\n year = {2009},\n keywords = {Data integration,IT in public administration,Knowledge integration,Ontologies,Semantic matching,Web applications},\n pages = {1-47},\n volume = {5},\n id = {70789606-30c4-3813-b7b3-1a64f17d0aff},\n created = {2020-02-29T16:57:45.085Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.901Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Mocan2009},\n private_publication = {false},\n abstract = {Interoperability is one of the most challenging problems in modern cross-organizational information systems, which rely on heterogeneous information and process models. Interoperability becomes very important for e-Government information systems that support cross-organizational communication especially in a cross-border setting. The main goal in this context is to seamlessly provide integrated services to the user (citizen). In this paper we focus on Pan European e-Services and issues related with their integration. Our analysis uses basic concepts of the generic public service model of the Governance Enterprise Architecture (GEA) and of the Web Service Modeling Ontology (WSMO), to express the semantic description of the e-services. Based on the above, we present a mediation infrastructure capable of resolving semantic interoperability conflicts at a pan-European level. We provide several examples to illustrate both the need to solve such semantic conflicts and the actual solutions we propose. [Article copies are available for purchase from InfoSci-on-Demand.com]. Copyright © 2009, IGI Global.},\n bibtype = {article},\n author = {Mocan, Adrian and Facca, Federico M. and Loutas, Nikolaos and Peristeras, Vassilios and Goudos, Sotirios K. and Tarabanis, Konstantinos},\n doi = {10.4018/jswis.2009010101},\n journal = {International Journal on Semantic Web and Information Systems},\n number = {1}\n}
\n
\n\n\n
\n Interoperability is one of the most challenging problems in modern cross-organizational information systems, which rely on heterogeneous information and process models. Interoperability becomes very important for e-Government information systems that support cross-organizational communication especially in a cross-border setting. The main goal in this context is to seamlessly provide integrated services to the user (citizen). In this paper we focus on Pan European e-Services and issues related with their integration. Our analysis uses basic concepts of the generic public service model of the Governance Enterprise Architecture (GEA) and of the Web Service Modeling Ontology (WSMO), to express the semantic description of the e-services. Based on the above, we present a mediation infrastructure capable of resolving semantic interoperability conflicts at a pan-European level. We provide several examples to illustrate both the need to solve such semantic conflicts and the actual solutions we propose. [Article copies are available for purchase from InfoSci-on-Demand.com]. Copyright © 2009, IGI Global.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Thinned planar array design using boolean PSO with velocity mutation.\n \n \n \n\n\n \n Deligkaris, K., V.; Zaharis, Z., D.; Kampitaki, D., G.; Goudos, S., K.; Rekanos, I., T.; and Spasos, M., N.\n\n\n \n\n\n\n IEEE Transactions on Magnetics, 45(3): 1490-1493. 2009.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Thinned planar array design using boolean PSO with velocity mutation},\n type = {article},\n year = {2009},\n keywords = {Artificial immune system,Particle swarm optimization (PSO),Planar arrays,Thinned arrays},\n pages = {1490-1493},\n volume = {45},\n id = {6ce6ac36-8482-3b05-b990-d05bb0c87e68},\n created = {2020-02-29T16:57:45.121Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.191Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Deligkaris2009},\n private_publication = {false},\n abstract = {The design of thinned planar microstrip arrays under specific constraints concerning the impedance-matching condition of the array elements and the radiation pattern is presented. The radiation characteristics of the structure are extracted by applying the method-of-moments. The array design is based on a novel optimization method, which is a modified version of the boolean particle swarm optimization that employs velocity mutation (BPSO-vm). Apart from the optimization of the array geometry, the proposed method is applicable to other discrete-variable optimization problems. Moreover, the planar array design is coped with by means of other techniques, namely, a binary coded Genetic Algorithm, the binary Particle Swarm Optimization, and the Boolean PSO. The comparison of the above methods and the BPSO-vm shows the efficiency of the proposed technique. © 2006 IEEE.},\n bibtype = {article},\n author = {Deligkaris, Kosmas V. and Zaharis, Zaharias D. and Kampitaki, Dimitra G. and Goudos, Sotirios K. and Rekanos, Ioannis T. and Spasos, Michalis N.},\n doi = {10.1109/TMAG.2009.2012687},\n journal = {IEEE Transactions on Magnetics},\n number = {3}\n}
\n
\n\n\n
\n The design of thinned planar microstrip arrays under specific constraints concerning the impedance-matching condition of the array elements and the radiation pattern is presented. The radiation characteristics of the structure are extracted by applying the method-of-moments. The array design is based on a novel optimization method, which is a modified version of the boolean particle swarm optimization that employs velocity mutation (BPSO-vm). Apart from the optimization of the array geometry, the proposed method is applicable to other discrete-variable optimization problems. Moreover, the planar array design is coped with by means of other techniques, namely, a binary coded Genetic Algorithm, the binary Particle Swarm Optimization, and the Boolean PSO. The comparison of the above methods and the BPSO-vm shows the efficiency of the proposed technique. © 2006 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Telecommunications Network Planning and Operations Management in an Academic Environment: The Case Study of the Aristotle University of Thessaloniki.\n \n \n \n \n\n\n \n Goudos, S., K.; Agorogianni, A., Z.; and Zaharis, Z., D.\n\n\n \n\n\n\n Handbook of Research on Telecommunications Planning and Management for Business, pages 615-633. Lee, I., editor(s). IGI Global, 2009.\n \n\n\n\n
\n\n\n\n \n \n \"HandbookWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{\n type = {inbook},\n year = {2009},\n pages = {615-633},\n websites = {https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-194-0.ch040},\n publisher = {IGI Global},\n city = {Hershey, PA, USA},\n id = {8e105eb6-9e47-3854-a2f8-6237a7e07e63},\n created = {2023-02-11T21:19:22.082Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:19:22.082Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Lee2009},\n source_type = {incollection},\n private_publication = {false},\n abstract = {Network planning and management in a large organization such as a university, is a complex task. A large university is an inherently demanding environment in terms of telecommunications services offered and technologies used. This chapter presents and discusses network management and planning issues in the Aristotle University of Thessaloniki, Greece. Examples of network management procedures are given. We present the data model for service provision. The network expansion and cost reduction case studies are discussed. A SWOT analysis about University’s Telecommunications Center is given. Finally, we discuss the migration analysis for future upgrades that will fully enable the use of emerging technologies such as Voice over IP (VoIP).},\n bibtype = {inbook},\n author = {Goudos, Sotirios K and Agorogianni, Angeliki Z and Zaharis, Zaharias D},\n editor = {Lee, In},\n doi = {10.4018/978-1-60566-194-0.ch040},\n chapter = {Telecommunications Network Planning and Operations Management in an Academic Environment: The Case Study of the Aristotle University of Thessaloniki},\n title = {Handbook of Research on Telecommunications Planning and Management for Business}\n}
\n
\n\n\n
\n Network planning and management in a large organization such as a university, is a complex task. A large university is an inherently demanding environment in terms of telecommunications services offered and technologies used. This chapter presents and discusses network management and planning issues in the Aristotle University of Thessaloniki, Greece. Examples of network management procedures are given. We present the data model for service provision. The network expansion and cost reduction case studies are discussed. A SWOT analysis about University’s Telecommunications Center is given. Finally, we discuss the migration analysis for future upgrades that will fully enable the use of emerging technologies such as Voice over IP (VoIP).\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n EMI reduction and ICs optimal arrangement inside high-speed networking equipment using particle swarm optimization.\n \n \n \n\n\n \n Goudos, S., K.; Rekanos, I., T.; and Sahalos, S., N.\n\n\n \n\n\n\n IEEE Transactions on Electromagnetic Compatibility, 50(3 PART 2): 586-596. 2008.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {EMI reduction and ICs optimal arrangement inside high-speed networking equipment using particle swarm optimization},\n type = {article},\n year = {2008},\n keywords = {Electromagnetic interference (EMI),Monte Carlo simulation,Numerical techniques,Particle swarm optimization (PSO),Printed circuit board (PCB) design},\n pages = {586-596},\n volume = {50},\n id = {94c0ed3b-e08c-3b44-8763-53b4beb677b5},\n created = {2020-02-29T16:57:42.955Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.858Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2008},\n private_publication = {false},\n abstract = {In this paper, a numerical approach to the modeling of electromagnetic interference (EMI) from the emissions of integrated circuits (ICs) and printed circuit boards (PCBs), inside rectangular metallic enclosures of communication devices, is presented. The ICs are modeled as small magnetic dipoles, and their interaction with the enclosures are formulated by means of dyadic Green's functions. Given the probability distribution describing the magnetic dipole sources, a Monte Carlo simulation is employed to derive the electric current density on the metallic walls as well as to perform a worse-case analysis. The EMI in a network switch and a network router are investigated by means of sources-device models developed for each one of the devices. These models are based on data obtained from magnetic probe measurements in various types of network equipment. Finally, the particle swarm optimization algorithm is utilized to indicate the optimal arrangement of ICs that results in significant reduction of the electric current density induced on the metallic walls. © 2008 IEEE.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Rekanos, Ioannis T. and Sahalos, Sotirios N.},\n doi = {10.1109/TEMC.2008.924389},\n journal = {IEEE Transactions on Electromagnetic Compatibility},\n number = {3 PART 2}\n}
\n
\n\n\n
\n In this paper, a numerical approach to the modeling of electromagnetic interference (EMI) from the emissions of integrated circuits (ICs) and printed circuit boards (PCBs), inside rectangular metallic enclosures of communication devices, is presented. The ICs are modeled as small magnetic dipoles, and their interaction with the enclosures are formulated by means of dyadic Green's functions. Given the probability distribution describing the magnetic dipole sources, a Monte Carlo simulation is employed to derive the electric current density on the metallic walls as well as to perform a worse-case analysis. The EMI in a network switch and a network router are investigated by means of sources-device models developed for each one of the devices. These models are based on data obtained from magnetic probe measurements in various types of network equipment. Finally, the particle swarm optimization algorithm is utilized to indicate the optimal arrangement of ICs that results in significant reduction of the electric current density induced on the metallic walls. © 2008 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A conceptual analysis of semantic conflicts in pan-European e-government services.\n \n \n \n\n\n \n Peristeras, V.; Loutas, N.; Goudos, S., K.; and Tarabanis, K.\n\n\n \n\n\n\n Journal of Information Science, 34(6): 877-891. 2008.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A conceptual analysis of semantic conflicts in pan-European e-government services},\n type = {article},\n year = {2008},\n keywords = {Cross-border services,Pan-European e-government services,Pan-European public services,Semantic conflict types,Semantic interoperability},\n pages = {877-891},\n volume = {34},\n id = {dd3db816-a893-32ac-afe2-17d34af2d0be},\n created = {2020-02-29T16:57:43.664Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.271Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Peristeras2008},\n private_publication = {false},\n abstract = {This paper presents research in Pan-European Public Services (PEPS) and Pan-European E-Government Services (PEGS). We examine different types of semantic interoperability issues that may arise when actors, information and services from different Member States (MS) need to cooperate and/or interoperate during the public service provision process. The semantic conflict types that arise in these cases are identified and classified according to a typology that is based on the combination of a known classification for semantic conflicts and domain specific concepts from the Governance Enterprise Architecture object model. This conceptual modelling describes and organizes the problem space, documents the requirements and can thus provide the basis for engineering solutions to resolve the identified conflicts. © CILIP.},\n bibtype = {article},\n author = {Peristeras, Vassilios and Loutas, Nikolaos and Goudos, Sotirios K. and Tarabanis, Konstantinos},\n doi = {10.1177/0165551508091012},\n journal = {Journal of Information Science},\n number = {6}\n}
\n
\n\n\n
\n This paper presents research in Pan-European Public Services (PEPS) and Pan-European E-Government Services (PEGS). We examine different types of semantic interoperability issues that may arise when actors, information and services from different Member States (MS) need to cooperate and/or interoperate during the public service provision process. The semantic conflict types that arise in these cases are identified and classified according to a typology that is based on the combination of a known classification for semantic conflicts and domain specific concepts from the Governance Enterprise Architecture object model. This conceptual modelling describes and organizes the problem space, documents the requirements and can thus provide the basis for engineering solutions to resolve the identified conflicts. © CILIP.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Thinned Planar Array Design Using Boolean PSO with Velocity Mutation.\n \n \n \n\n\n \n Deligkaris, K., V.; Zaharis, Z., D.; Kampitaki, D., G.; Goudos, S., K.; Rekanos, I., T.; and Spasos, M., N.\n\n\n \n\n\n\n In Proceedings of the 13th Biennial IEEE Conference on Electromagnetic Field Computation (CEFC2008), pages 324, 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Thinned Planar Array Design Using Boolean PSO with Velocity Mutation},\n type = {inproceedings},\n year = {2008},\n pages = {324},\n id = {4587981d-9b97-3d16-9673-0aeb2a50f8a6},\n created = {2023-02-11T21:11:00.677Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.677Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {deligkaris2008thinned},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Deligkaris, Kosmas V and Zaharis, Zaharias D and Kampitaki, Dimitra G and Goudos, Sotirios K and Rekanos, Ioannis T and Spasos, Michalis N},\n booktitle = {Proceedings of the 13th Biennial IEEE Conference on Electromagnetic Field Computation (CEFC2008)}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Pareto Optimal Design of Dual Band Base Station Antenna Arrays Using Multi-Objective Particle Swarm Optimization with Fitness Sharing.\n \n \n \n\n\n \n Goudos, S., K.; Zaharis, Z., D.; Kampitaki, D., G.; Rekanos, I., T.; and Hilas, C., S.\n\n\n \n\n\n\n In Proceedings of the 13th Biennial IEEE Conference on Electromagnetic Field Computation (CEFC2008), pages 472, 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Pareto Optimal Design of Dual Band Base Station Antenna Arrays Using Multi-Objective Particle Swarm Optimization with Fitness Sharing},\n type = {inproceedings},\n year = {2008},\n pages = {472},\n id = {b7019b1a-6fbc-3fdd-b006-414de8d5c607},\n created = {2023-02-11T21:11:00.694Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:11:00.694Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2008pareto},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K and Zaharis, Zaharias D and Kampitaki, Dimitra G and Rekanos, Ioannis T and Hilas, Costas S},\n booktitle = {Proceedings of the 13th Biennial IEEE Conference on Electromagnetic Field Computation (CEFC2008)}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (17)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A versatile software tool for microwave planar radar absorbing materials design using global optimization algorithms.\n \n \n \n\n\n \n Goudos, S.\n\n\n \n\n\n\n Materials and Design, 28(10). 2007.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A versatile software tool for microwave planar radar absorbing materials design using global optimization algorithms},\n type = {article},\n year = {2007},\n keywords = {CAD tool,Microwave multi-layer absorber design,Particle swarm optimization,Radar absorbing materials},\n volume = {28},\n id = {2d648526-4fb9-37e5-b41b-5a1d1fb17bef},\n created = {2020-02-29T16:57:41.902Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-05-12T20:32:46.180Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007k},\n private_publication = {false},\n abstract = {A computer-aided design (CAD) tool for the design of planar multi-layer coatings with high absorption for a desired frequency and angle range is presented. The tool uses deterministic and evolutionary optimization design methods. Both single and multi-objective design algorithms can be used and a single absorber design or the Pareto front can be found accordingly. A novel design technique utilizing PSO is also presented. A user-defined or a pre-defined design case can be selected interchangeably. The choice of selecting materials from pre-defined database is also available. The tool can be useful for both educational and research purposes. The efficiency of the tool is demonstrated through several design cases that are in agreement with existing literature data. © 2006 Elsevier Ltd. All rights reserved.},\n bibtype = {article},\n author = {Goudos, S.K.},\n doi = {10.1016/j.matdes.2006.10.016},\n journal = {Materials and Design},\n number = {10}\n}
\n
\n\n\n
\n A computer-aided design (CAD) tool for the design of planar multi-layer coatings with high absorption for a desired frequency and angle range is presented. The tool uses deterministic and evolutionary optimization design methods. Both single and multi-objective design algorithms can be used and a single absorber design or the Pareto front can be found accordingly. A novel design technique utilizing PSO is also presented. A user-defined or a pre-defined design case can be selected interchangeably. The choice of selecting materials from pre-defined database is also available. The tool can be useful for both educational and research purposes. The efficiency of the tool is demonstrated through several design cases that are in agreement with existing literature data. © 2006 Elsevier Ltd. All rights reserved.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Application of a particle swarm optimizer to the design of microwave broadband absorbers.\n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n WSEAS Transactions on Communications, 6(2): 312-317. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Application of a particle swarm optimizer to the design of microwave broadband absorbers},\n type = {article},\n year = {2007},\n keywords = {Microwave absorber design,Multi-layer coatings,Particle swarm optimization,Radar absorbing materials},\n pages = {312-317},\n volume = {6},\n id = {91be0c63-97a8-32c0-87b2-61f4113d8e76},\n created = {2020-02-29T16:57:41.943Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.466Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007j},\n private_publication = {false},\n abstract = {Microwave broadband absorber design for a desired frequency and angle range is presented. The novel design technique is based on a Particle swarm optimization (PSO) algorithm. PSO is an evolutionary optimization algorithm based on the bird fly. Several design cases are presented. Numerical results are compared with the existing in the literature. Finally the advantages of this approach and the applicability of this design method are discussed.},\n bibtype = {article},\n author = {Goudos, Sotirios K.},\n journal = {WSEAS Transactions on Communications},\n number = {2}\n}
\n
\n\n\n
\n Microwave broadband absorber design for a desired frequency and angle range is presented. The novel design technique is based on a Particle swarm optimization (PSO) algorithm. PSO is an evolutionary optimization algorithm based on the bird fly. Several design cases are presented. Numerical results are compared with the existing in the literature. Finally the advantages of this approach and the applicability of this design method are discussed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Numerical modeling and measurements of radiated emissions from integrated circuits inside telecommunications equipment.\n \n \n \n\n\n \n Goudos, S., K.; and Hilas, C., S.\n\n\n \n\n\n\n WSEAS Transactions on Communications, 6(4): 499-504. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Numerical modeling and measurements of radiated emissions from integrated circuits inside telecommunications equipment},\n type = {article},\n year = {2007},\n keywords = {Electromagnetic compatibility,Electromagnetic interference,Green's functions calculation,Magnetic probe measurements,Numerical modeling},\n pages = {499-504},\n volume = {6},\n id = {11724eba-3614-3a83-aca5-1d2b46a63d1a},\n created = {2020-02-29T16:57:42.122Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.571Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007i},\n private_publication = {false},\n abstract = {A numerical approach to the modeling of Electromagnetic Interference (EMI) from the emissions of Integrated Circuits (ICs) inside rectangular metallic enclosures of communications devices is presented. The ICs are modeled as small magnetic or electric dipoles. Radiated emissions from ICs are examined and measured using magnetic probes on various types of network equipment. Based on these measurements source amplitude and existence probabilistic models are created. Closed form expressions for the induced electric field on the metallic walls are given. Electric field calculation examples show the major trends in a multiple source system and help perform a worst-case analysis. The applications of the above approach to the PCB design process are discussed.},\n bibtype = {article},\n author = {Goudos, S. K. and Hilas, C. S.},\n journal = {WSEAS Transactions on Communications},\n number = {4}\n}
\n
\n\n\n
\n A numerical approach to the modeling of Electromagnetic Interference (EMI) from the emissions of Integrated Circuits (ICs) inside rectangular metallic enclosures of communications devices is presented. The ICs are modeled as small magnetic or electric dipoles. Radiated emissions from ICs are examined and measured using magnetic probes on various types of network equipment. Based on these measurements source amplitude and existence probabilistic models are created. Closed form expressions for the induced electric field on the metallic walls are given. Electric field calculation examples show the major trends in a multiple source system and help perform a worst-case analysis. The applications of the above approach to the PCB design process are discussed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A semantic web approach for mapping citizen profiles to public administration services based on Governance Enterprise Architecture (GEA) model.\n \n \n \n\n\n \n Goudos, S., K.; Peristeras, V.; and Tarabanis, K.\n\n\n \n\n\n\n WSEAS Transactions on Information Science and Applications, 4(6): 1283-1289. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A semantic web approach for mapping citizen profiles to public administration services based on Governance Enterprise Architecture (GEA) model},\n type = {article},\n year = {2007},\n keywords = {E-Government,Governance Enterprise Architecture,OWL,Semantic matching,Semantic web},\n pages = {1283-1289},\n volume = {4},\n id = {e646e150-27de-31ee-a08e-22f66f0607b9},\n created = {2020-02-29T16:57:42.986Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.041Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007h},\n private_publication = {false},\n abstract = {This paper discusses the common public administration problem of matching a citizen's needs with the available public services. The Governance Enterprise Architecture (GEA) object model, a technology independent data model for public administration domain, is used in conjunction with semantic web technologies. An ontology representation of the above object model in OWL Web Ontology Language is created. This ontology serves as the knowledge base for a semantic web application. The input to the application consists of the user profile, while the output returned consists of the public services that match the specified profile.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Peristeras, Vassilios and Tarabanis, Konstantinos},\n journal = {WSEAS Transactions on Information Science and Applications},\n number = {6}\n}
\n
\n\n\n
\n This paper discusses the common public administration problem of matching a citizen's needs with the available public services. The Governance Enterprise Architecture (GEA) object model, a technology independent data model for public administration domain, is used in conjunction with semantic web technologies. An ontology representation of the above object model in OWL Web Ontology Language is created. This ontology serves as the knowledge base for a semantic web application. The input to the application consists of the user profile, while the output returned consists of the public services that match the specified profile.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A semantic web application for public administration using OWL for public domain data knowledge representation.\n \n \n \n\n\n \n Goudos, S., K.; Peristeras, V.; and Tarabanis, K.\n\n\n \n\n\n\n WSEAS Transactions on Information Science and Applications, 4(4): 725-730. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A semantic web application for public administration using OWL for public domain data knowledge representation},\n type = {article},\n year = {2007},\n keywords = {E-government,OWL,Public administration,Semantic web},\n pages = {725-730},\n volume = {4},\n id = {540e924a-bb14-32b2-a3c4-816b9e2a40e3},\n created = {2020-02-29T16:57:43.004Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.912Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007g},\n private_publication = {false},\n abstract = {This paper contributes to the more general problem of supplying the citizen with the correct information from public administration in a quick and easy way. Specifically, getting the information about all the benefits that someone is entitled to is a very complex task in many countries. To address this problem, a domain ontology is created. The ontology is used as the knowledge base for a semantic application that uses a reasoner. This latter component queries the knowledge base through a web interface by receiving the user's profile as input, and providing as output the benefits that match the specified profile. The application is highly reconfigurable in order to easily accommodate legislation changes. Moreover, the application is transferable to a large number of similar service provision cases in the public administration domain. In light of these, the advantages of semantic web technology and its application to the e-government domain are presented.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Peristeras, Vassilios and Tarabanis, Konstantinos},\n journal = {WSEAS Transactions on Information Science and Applications},\n number = {4}\n}
\n
\n\n\n
\n This paper contributes to the more general problem of supplying the citizen with the correct information from public administration in a quick and easy way. Specifically, getting the information about all the benefits that someone is entitled to is a very complex task in many countries. To address this problem, a domain ontology is created. The ontology is used as the knowledge base for a semantic application that uses a reasoner. This latter component queries the knowledge base through a web interface by receiving the user's profile as input, and providing as output the benefits that match the specified profile. The application is highly reconfigurable in order to easily accommodate legislation changes. Moreover, the application is transferable to a large number of similar service provision cases in the public administration domain. In light of these, the advantages of semantic web technology and its application to the e-government domain are presented.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Web based laboratory in electromagnetic compatibility using a java applet.\n \n \n \n\n\n \n Goudos, S., K.; Samaras, T.; and Sahalos, J., N.\n\n\n \n\n\n\n Computer Applications in Engineering Education, 14(4): 269-280. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Web based laboratory in electromagnetic compatibility using a java applet},\n type = {article},\n year = {2007},\n keywords = {Electromagnetic compatibility,Lava applets,Virtual laboratory,Web-based training},\n pages = {269-280},\n volume = {14},\n id = {d70b55d4-d2cc-3a0c-bfc5-bd3763c4745d},\n created = {2020-02-29T16:57:43.030Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.699Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007f},\n private_publication = {false},\n abstract = {A web based virtual laboratory in electromagnetic compatibility using a lava applet is presented. The Java applet makes use of Green's functions calculations inside a rectangular cavity. The induced electric fields and surface currents on cavity walls are calculated and visualized in a user-friendly manner. Various source configurations are examined. A number of laboratory exercises using the applet is given. © 2006 Wiley Periodicals, Inc.},\n bibtype = {article},\n author = {Goudos, S. K. and Samaras, T. and Sahalos, J. N.},\n doi = {10.1002/cae.20087},\n journal = {Computer Applications in Engineering Education},\n number = {4}\n}
\n
\n\n\n
\n A web based virtual laboratory in electromagnetic compatibility using a lava applet is presented. The Java applet makes use of Green's functions calculations inside a rectangular cavity. The induced electric fields and surface currents on cavity walls are calculated and visualized in a user-friendly manner. Various source configurations are examined. A number of laboratory exercises using the applet is given. © 2006 Wiley Periodicals, Inc.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n On the orthogonal nonuniform synthesis from a set of uniform linear arrays.\n \n \n \n\n\n \n Goudos, S., K.; Miaris, G., S.; Siakavara, K.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Antennas and Wireless Propagation Letters, 6: 313-315. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {On the orthogonal nonuniform synthesis from a set of uniform linear arrays},\n type = {article},\n year = {2007},\n keywords = {Analog beamforming,Array synthesis,Linear array design,Orthogonal method},\n pages = {313-315},\n volume = {6},\n id = {23830dba-5cdd-3d48-bbee-59157e4a0fc8},\n created = {2020-02-29T16:57:43.626Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.082Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007e},\n private_publication = {false},\n abstract = {Synthesis of uniform linear arrays by using the orthogonal method is presented. Composing functions similar to that of Woodward-Lawson technique are used. In Woodward-Lawson technique, sampling of the desired pattern is made. In this letter, instead of sampling, the orthogonal method is applied. The number of composing functions can be the same as or different than the elements of the arrays. Also, the progressive phase of each function can be derived in several ways. Numerical examples for the synthesis of different array patterns are presented, and the results show the usefulness of the method. © 2007 IEEE.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Miaris, George S. and Siakavara, Katherine and Sahalos, John N.},\n doi = {10.1109/LAWP.2007.899915},\n journal = {IEEE Antennas and Wireless Propagation Letters}\n}
\n
\n\n\n
\n Synthesis of uniform linear arrays by using the orthogonal method is presented. Composing functions similar to that of Woodward-Lawson technique are used. In Woodward-Lawson technique, sampling of the desired pattern is made. In this letter, instead of sampling, the orthogonal method is applied. The number of composing functions can be the same as or different than the elements of the arrays. Also, the progressive phase of each function can be derived in several ways. Numerical examples for the synthesis of different array patterns are presented, and the results show the usefulness of the method. © 2007 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Semantic interoperability conflicts in paneuropean public services.\n \n \n \n\n\n \n Peristeras, V.; Loutas, N.; Goudos, S.; and Tarabanis, K.\n\n\n \n\n\n\n In Proceedings of the 15th European Conference on Information Systems, ECIS 2007, pages 2173-2184, 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Semantic interoperability conflicts in paneuropean public services},\n type = {inproceedings},\n year = {2007},\n keywords = {Cross-border services,GEA object model,Pan-European EGovernment Service,Pan-European Public Services,Semantic conflict types,Semantic gateway,Semantic interoperability},\n pages = {2173-2184},\n id = {1b1d7cd3-f29d-35ec-8906-177bff5ee866},\n created = {2020-02-29T16:57:43.650Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.739Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Peristeras2007},\n private_publication = {false},\n abstract = {This work presents ongoing research in Pan-European Public Services (PEPS) and Pan-European EGovernment Services (PEGS). This field of work is relatively new and has attracted the attention of the European Commission and of many research organizations and businesses as well. The semantic interoperability issues that may arise when a citizen of one Member State requests a public service from the public administration of another Member State are examined in this paper. The semantic conflict types that may arise in this case are identified and classified according to the Governance Enterprise Architecture (GEA) object model concepts. This conceptual modeling can be the basis for the building of a semantic gateway that will resolve these issues at a pan-European level.},\n bibtype = {inproceedings},\n author = {Peristeras, Vassilios and Loutas, Nikolaos and Goudos, Sotirios and Tarabanis, Konstantinos},\n booktitle = {Proceedings of the 15th European Conference on Information Systems, ECIS 2007}\n}
\n
\n\n\n
\n This work presents ongoing research in Pan-European Public Services (PEPS) and Pan-European EGovernment Services (PEGS). This field of work is relatively new and has attracted the attention of the European Commission and of many research organizations and businesses as well. The semantic interoperability issues that may arise when a citizen of one Member State requests a public service from the public administration of another Member State are examined in this paper. The semantic conflict types that may arise in this case are identified and classified according to the Governance Enterprise Architecture (GEA) object model concepts. This conceptual modeling can be the basis for the building of a semantic gateway that will resolve these issues at a pan-European level.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Facilitating the semantic discovery of eGovernment services: The SemanticGov portal.\n \n \n \n\n\n \n Loutas, N.; Peristeras, V.; Goudos, S., K.; and Tarabanis, K.\n\n\n \n\n\n\n In Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC, pages 157-164, 2007. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Facilitating the semantic discovery of eGovernment services: The SemanticGov portal},\n type = {inproceedings},\n year = {2007},\n pages = {157-164},\n id = {db57c3fc-1708-3b3f-8a66-42da98824d82},\n created = {2020-02-29T16:57:43.692Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.290Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Loutas2007},\n private_publication = {false},\n abstract = {In this paper we propose a way to facilitate the issue of discovering the eGovernment services that address a citizen's need. This approach is implemented in an application, which we call a semantic portal. The semantic portal is part of our SemanticGov project architecture. The portal's components and its architecture are presented and explained. The portal's conceptual modeling is based on the generic public service object model of Governance Enterprise Architecture (GEA) while Web Service Modeling Ontology (WSMO) is used as the semantic web services framework for application implementation. . We describe the ontologies required using the Web Service Modeling Language (WSML). The reasoning tasks are performed accordingly using a WSML reasoner. Goals are WSMO elements that describe aspects related to user desires. The input to the application consists of information regarding the user's profile, i.e. age, marital status etc., while the output is a concrete WSMO Goal that expresses the citizen's need. This Goal is forwarded to the discovery engine, which has to discover all the services that address this Goal and return them to the citizen. ©2008 IEEE.},\n bibtype = {inproceedings},\n author = {Loutas, Nikolaos and Peristeras, Vassilios and Goudos, Sotirios K. and Tarabanis, Konstantinos},\n doi = {10.1109/EDOCW.2007.12},\n booktitle = {Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC}\n}
\n
\n\n\n
\n In this paper we propose a way to facilitate the issue of discovering the eGovernment services that address a citizen's need. This approach is implemented in an application, which we call a semantic portal. The semantic portal is part of our SemanticGov project architecture. The portal's components and its architecture are presented and explained. The portal's conceptual modeling is based on the generic public service object model of Governance Enterprise Architecture (GEA) while Web Service Modeling Ontology (WSMO) is used as the semantic web services framework for application implementation. . We describe the ontologies required using the Web Service Modeling Language (WSML). The reasoning tasks are performed accordingly using a WSML reasoner. Goals are WSMO elements that describe aspects related to user desires. The input to the application consists of information regarding the user's profile, i.e. age, marital status etc., while the output is a concrete WSMO Goal that expresses the citizen's need. This Goal is forwarded to the discovery engine, which has to discover all the services that address this Goal and return them to the citizen. ©2008 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A public administration domain ontology for semantic discovery of eGovernment services.\n \n \n \n\n\n \n Goudos, S., K.; Peristeras, V.; Loutas, N.; and Tarabanis, K.\n\n\n \n\n\n\n In 2007 2nd International Conference on Digital Information Management, ICDIM, volume 1, pages 260-265, 2007. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {A public administration domain ontology for semantic discovery of eGovernment services},\n type = {inproceedings},\n year = {2007},\n pages = {260-265},\n volume = {1},\n id = {69a01730-97ff-32d9-a415-f4f70bbb0f1f},\n created = {2020-02-29T16:57:43.713Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.104Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007d},\n private_publication = {false},\n abstract = {In this paper we present a top level Public Administration (PA) domain ontology. For this purpose we employ the generic public service object model of the Governance Enterprise Architecture (GEA) providing PA domain specific semantics. We represent this service model using the Web Ontology Language (OWL). This domain ontology may serve as the knowledge base for eGovernment semantic web applications. A sample application is presented that finds the public services that can be executed by a citizen based on his/hers profile using semantic discovery. The input to the application consists of the user profile, while the output returned consists of the public services that match the specified profile. ©2007 IEEE.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Peristeras, Vassilios and Loutas, Nikolaos and Tarabanis, Konstantinos},\n doi = {10.1109/ICDIM.2007.4444233},\n booktitle = {2007 2nd International Conference on Digital Information Management, ICDIM}\n}
\n
\n\n\n
\n In this paper we present a top level Public Administration (PA) domain ontology. For this purpose we employ the generic public service object model of the Governance Enterprise Architecture (GEA) providing PA domain specific semantics. We represent this service model using the Web Ontology Language (OWL). This domain ontology may serve as the knowledge base for eGovernment semantic web applications. A sample application is presented that finds the public services that can be executed by a citizen based on his/hers profile using semantic discovery. The input to the application consists of the user profile, while the output returned consists of the public services that match the specified profile. ©2007 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Optimization of integrated circuits placement for electric field reduction inside telecommunications equipment using Monte Carlo simulation and parallel recombinative simulated annealing.\n \n \n \n\n\n \n Goudos, S., K.; Zaharis, Z., D.; Lazaridis, P., I.; and Gallion, P., B.\n\n\n \n\n\n\n Microwave and Optical Technology Letters, 49(12): 3049-3055. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Optimization of integrated circuits placement for electric field reduction inside telecommunications equipment using Monte Carlo simulation and parallel recombinative simulated annealing},\n type = {article},\n year = {2007},\n keywords = {Electromagnetic compatibility,Genetic algorithms,Green's functions calculation,Monte Carlo simulation,Parallel programming,Simulated annealing},\n pages = {3049-3055},\n volume = {49},\n id = {dfbe5cf3-aaa2-3dd7-8835-cc1dc369ce66},\n created = {2020-02-29T16:57:43.736Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.743Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007c},\n private_publication = {false},\n abstract = {This article presents a novel approach to the modeling and reduction of electromagnetic interference (EMI) caused by radiated emissions of integrated circuits (ICs) inside rectangular metallic enclosures of telecommunications devices. This type of analysis applies for several types of modern telecommunications equipment found in highspeed networks as well as in mobile communications. A generic model of such a device is created. The ICs are modeled as small electric dipoles and their interaction with the enclosure walls is studied by using the dyadic Green's functions. The electric field on the enclosure walls is computed and its reduction is studied as optimization problem using evolutionary algorithms. Two algorithms are employed: Genetic algorithms (GAs) and parallel recombinative simulated annealing (PRSA). PRSA is a hybrid evolutionary strategy that inherits properties from both GAs and simulated annealing. Monte Carlo simulation is subsequently applied to the optimization results to derive the electric field on the metallic walls and also to perform a worst-case analysis. The applications of the above approach in early PCB design process are discussed. © 2007 Wiley Periodicals, Inc.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Zaharis, Zaharias D. and Lazaridis, Pavios I. and Gallion, Philippe B.},\n doi = {10.1002/mop.22893},\n journal = {Microwave and Optical Technology Letters},\n number = {12}\n}
\n
\n\n\n
\n This article presents a novel approach to the modeling and reduction of electromagnetic interference (EMI) caused by radiated emissions of integrated circuits (ICs) inside rectangular metallic enclosures of telecommunications devices. This type of analysis applies for several types of modern telecommunications equipment found in highspeed networks as well as in mobile communications. A generic model of such a device is created. The ICs are modeled as small electric dipoles and their interaction with the enclosure walls is studied by using the dyadic Green's functions. The electric field on the enclosure walls is computed and its reduction is studied as optimization problem using evolutionary algorithms. Two algorithms are employed: Genetic algorithms (GAs) and parallel recombinative simulated annealing (PRSA). PRSA is a hybrid evolutionary strategy that inherits properties from both GAs and simulated annealing. Monte Carlo simulation is subsequently applied to the optimization results to derive the electric field on the metallic walls and also to perform a worst-case analysis. The applications of the above approach in early PCB design process are discussed. © 2007 Wiley Periodicals, Inc.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Public administration domain ontology for a semantic web services E-government framework.\n \n \n \n\n\n \n Goudos, S., K.; Loutas, N.; Peristeras, V.; and Tarabanis, K.\n\n\n \n\n\n\n In Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007, pages 270-277, 2007. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Public administration domain ontology for a semantic web services E-government framework},\n type = {inproceedings},\n year = {2007},\n pages = {270-277},\n id = {07e7c817-86e2-3ecd-b179-a74d6f90a4c1},\n created = {2020-02-29T16:57:43.753Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:01.905Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007b},\n private_publication = {false},\n abstract = {In this paper we present a generic Public Administration (PA) domain ontology. We define a formal model for a Public Administration service on the basis of the Web Service Modeling Ontology (WSMO). For this purpose we employ the generic public service object model of the Governance Enterprise Architecture (GEA) providing PA domain specific semantics. We describe the ontology using the Web Service Modeling Language (WSML). This domain ontology is implemented in order to be used in semantic web services architecture for e-government. © 2007 IEEE.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K. and Loutas, Nikolaos and Peristeras, Vassilios and Tarabanis, Konstantinos},\n doi = {10.1109/SCC.2007.89},\n booktitle = {Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007}\n}
\n
\n\n\n
\n In this paper we present a generic Public Administration (PA) domain ontology. We define a formal model for a Public Administration service on the basis of the Web Service Modeling Ontology (WSMO). For this purpose we employ the generic public service object model of the Governance Enterprise Architecture (GEA) providing PA domain specific semantics. We describe the ontology using the Web Service Modeling Language (WSML). This domain ontology is implemented in order to be used in semantic web services architecture for e-government. © 2007 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dynamic workflow generation with semantic web services: A case study in public administration service provision.\n \n \n \n\n\n \n Goudos, S.; Peristeras, V.; Tektonidis, D.; Tambouris, E.; and Tarabanis, K.\n\n\n \n\n\n\n In ICEG 2007 - 3rd International Conference on e-Government, pages 121-130, 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {Dynamic workflow generation with semantic web services: A case study in public administration service provision},\n type = {inproceedings},\n year = {2007},\n keywords = {BPEL4WS,Dynamic workflow generation,OWL-S,Public service provision,Semantic Web Services,UDDI},\n pages = {121-130},\n id = {afc72d38-bb72-3608-88eb-9c04f1cf1155},\n created = {2020-02-29T16:57:44.317Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.387Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007a},\n private_publication = {false},\n abstract = {In this paper we present an automated workflow service composition framework for the Public Administration (PA) domain. We define a conceptual model for a Public Administration service workflow. This model can be implemented using existing web service technologies. In the PA domain complex services exist that require inputs evaluated from other services. Such a nested service type can be implemented using an automatic web service workflow composition. Semantic service discovery, which is based on service inputs and outputs, is also used. The final result is the complete service workflow that can be executed in any web service process engine. Our approach is based on a semantically enriched UDDI registry and an automated workflow composition of complex services. A real-life example of our framework is given for a complex Public Administration service in Greece.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios and Peristeras, Vassilios and Tektonidis, Dimitrios and Tambouris, Efthimios and Tarabanis, Konstantinos},\n booktitle = {ICEG 2007 - 3rd International Conference on e-Government}\n}
\n
\n\n\n
\n In this paper we present an automated workflow service composition framework for the Public Administration (PA) domain. We define a conceptual model for a Public Administration service workflow. This model can be implemented using existing web service technologies. In the PA domain complex services exist that require inputs evaluated from other services. Such a nested service type can be implemented using an automatic web service workflow composition. Semantic service discovery, which is based on service inputs and outputs, is also used. The final result is the complete service workflow that can be executed in any web service process engine. Our approach is based on a semantically enriched UDDI registry and an automated workflow composition of complex services. A real-life example of our framework is given for a complex Public Administration service in Greece.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Dielectric filter optimal design suitable for microwave communications by using multiobjective evolutionary algorithms.\n \n \n \n\n\n \n Goudos, S., K.; Zaharis, Z., D.; Salazar-Lechuga, M.; Lazaridis, P., I.; and Gallion, P., B.\n\n\n \n\n\n\n Microwave and Optical Technology Letters, 49(10): 2324-2329. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Dielectric filter optimal design suitable for microwave communications by using multiobjective evolutionary algorithms},\n type = {article},\n year = {2007},\n keywords = {Dielectric filters,Evolutionary programming,Genetic algorithms,Microwave filters,Mutltiobjective optimization,Pareto optimization,Particle swarm optimization},\n pages = {2324-2329},\n volume = {49},\n id = {770ad387-f475-378e-8412-d867b856ff74},\n created = {2020-02-29T16:57:44.756Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:03.892Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2007},\n private_publication = {false},\n abstract = {A multiobjective evolutionary technique is applied to design dielectric filters useful in microwave communications technology. The optimal geometry of the filters is derived by utilizing two different multiobjective optimization algorithms. The first one is the Nondominated Sorting Genetic Algorithm-II (NSGA-II). which is a popular multiobjective genetic algorithm. The second algorithm is based tin multiobjective Particle Swarm Optimization with fitness sharing (MOPSO-fs). MOPSO-fs algorithm is a novel Pareto PSO algorithm that produces the Pareto front in a fast and efficient way. In the present work, MOPSO-fs is compared with NSGA-II to optimize the geometry of the filters under specific requirements concerning the frequency response of the filters. Several examples are studied to exhibit the efficiency of the multiobjective evolutionary optimizers and also the ability of the technique to derive optimal structures that can be used in practice. © 2007 Wiley Periodicals. Inc.},\n bibtype = {article},\n author = {Goudos, S. K. and Zaharis, Z. D. and Salazar-Lechuga, M. and Lazaridis, P. I. and Gallion, P. B.},\n doi = {10.1002/mop.22755},\n journal = {Microwave and Optical Technology Letters},\n number = {10}\n}
\n
\n\n\n
\n A multiobjective evolutionary technique is applied to design dielectric filters useful in microwave communications technology. The optimal geometry of the filters is derived by utilizing two different multiobjective optimization algorithms. The first one is the Nondominated Sorting Genetic Algorithm-II (NSGA-II). which is a popular multiobjective genetic algorithm. The second algorithm is based tin multiobjective Particle Swarm Optimization with fitness sharing (MOPSO-fs). MOPSO-fs algorithm is a novel Pareto PSO algorithm that produces the Pareto front in a fast and efficient way. In the present work, MOPSO-fs is compared with NSGA-II to optimize the geometry of the filters under specific requirements concerning the frequency response of the filters. Several examples are studied to exhibit the efficiency of the multiobjective evolutionary optimizers and also the ability of the technique to derive optimal structures that can be used in practice. © 2007 Wiley Periodicals. Inc.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n WSMO-PA: Formal specification of public administration service model on semantic web service ontology.\n \n \n \n\n\n \n Xia, W.; Vitvar, T.; Peristeras, V.; Mocan, A.; Goudos, S., K.; and Tarabanis, K.\n\n\n \n\n\n\n In Proceedings of the Annual Hawaii International Conference on System Sciences, 2007. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {WSMO-PA: Formal specification of public administration service model on semantic web service ontology},\n type = {inproceedings},\n year = {2007},\n id = {e38fa0e3-441a-3fd7-bf87-36dcef46761a},\n created = {2020-02-29T16:57:45.135Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.062Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Xia2007},\n private_publication = {false},\n abstract = {In this paper we define a formal model for a Public Administration service on the basis of the Web Service Modeling Ontology (WSMO). For this purpose we employ the generic public service object model of the Governance Enterprise Architecture (GEA) providing a PA domain specific semantics. We investigate conceptual mappings between PA entities and WSMO elements, and on the real-world use case present the detailed formal PA service model based on the WSMO service model. © 2007 IEEE.},\n bibtype = {inproceedings},\n author = {Xia, Wang and Vitvar, Tomas and Peristeras, Vassilios and Mocan, Adrian and Goudos, Sotirios K. and Tarabanis, Konstantinos},\n doi = {10.1109/HICSS.2007.618},\n booktitle = {Proceedings of the Annual Hawaii International Conference on System Sciences}\n}
\n
\n\n\n
\n In this paper we define a formal model for a Public Administration service on the basis of the Web Service Modeling Ontology (WSMO). For this purpose we employ the generic public service object model of the Governance Enterprise Architecture (GEA) providing a PA domain specific semantics. We investigate conceptual mappings between PA entities and WSMO elements, and on the real-world use case present the detailed formal PA service model based on the WSMO service model. © 2007 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A public administration reference domain ontology in the web service modeling language.\n \n \n \n \n\n\n \n Loutas, N.; Goudos, S., K.; Peristeras, V.; and Tarabanis, K., A.\n\n\n \n\n\n\n In Cushing, J., B.; and Pardo, T., A., editor(s), Proceedings of the 8th Annual International Conference on Digital Government Research, Bridging Disciplines \\& Domains, DG.O 2007, Philadelphia, Pennsylvania, USA, May 20-23, 2007, volume 228, of ACM International Conference Proceeding Series, pages 238-239, 2007. Digital Government Research Center\n \n\n\n\n
\n\n\n\n \n \n \"AWebsite\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {A public administration reference domain ontology in the web service modeling language},\n type = {inproceedings},\n year = {2007},\n pages = {238-239},\n volume = {228},\n websites = {http://dl.acm.org/citation.cfm?id=1248498},\n publisher = {Digital Government Research Center},\n series = {ACM International Conference Proceeding Series},\n id = {529deb69-600a-329b-8a81-6915ea315868},\n created = {2023-02-11T21:08:08.952Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:08:08.952Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {DBLP:conf/dgo/LoutasGPT07},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Loutas, Nikos and Goudos, Sotirios K and Peristeras, Vassilios and Tarabanis, Konstantinos A},\n editor = {Cushing, Judith Bayard and Pardo, Theresa A},\n booktitle = {Proceedings of the 8th Annual International Conference on Digital Government Research, Bridging Disciplines \\& Domains, DG.O 2007, Philadelphia, Pennsylvania, USA, May 20-23, 2007}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Distributed Enterprise Information System for Cross-Border eGovernment Service Provision.\n \n \n \n\n\n \n Tambouris, E.; Peristeras, V.; Goudos, S., K.; and Tarabanis, K., A.\n\n\n \n\n\n\n In Arabnia, H., R.; and Bahrami, A., editor(s), Proceedings of the 2007 International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government, EEE 2007, June 25-28, 2007, Las Vegas, Nevada, USA, pages 264-268, 2007. CSREA Press\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {A Distributed Enterprise Information System for Cross-Border eGovernment Service Provision},\n type = {inproceedings},\n year = {2007},\n pages = {264-268},\n publisher = {CSREA Press},\n id = {7dc699a5-8485-308c-8713-395f52c1b551},\n created = {2023-02-11T21:08:09.223Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:08:09.223Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {DBLP:conf/csreaEEE/TambourisPGT07},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Tambouris, Efthimios and Peristeras, Vassilios and Goudos, Sotirios K and Tarabanis, Konstantinos A},\n editor = {Arabnia, Hamid R and Bahrami, Azita},\n booktitle = {Proceedings of the 2007 International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government, EEE 2007, June 25-28, 2007, Las Vegas, Nevada, USA}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Calculation and modeling of EMI from integrated circuits inside high-speed network devices.\n \n \n \n\n\n \n Goudos, S., K.\n\n\n \n\n\n\n Radioengineering, 15(4): 2-8. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Calculation and modeling of EMI from integrated circuits inside high-speed network devices},\n type = {article},\n year = {2006},\n keywords = {Electromagnetic interference,Monte carlo simulation,Numerical techniques,Printed circuit board design},\n pages = {2-8},\n volume = {15},\n id = {9e8609c9-ebd9-3c1a-a125-7c5bd2f09235},\n created = {2020-02-29T16:57:41.854Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.100Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2006b},\n private_publication = {false},\n abstract = {This work presents a numerical approach to the modeling of Electromagnetic Interference (EMI) from the emissions of ICs and PCBs inside rectangular metallic enclosures of network devices. The ICs are modeled as small magnetic and electric dipoles. Their interaction with the enclosures is studied with the dyadic Green's functions. Several calculation examples of surface current density on the metallic walls are given due to dipoles parallel to all directions. A Probabilistic Model is created from magnetic probe measurements in various types of router devices. Monte Carlo simulation is applied in order to perform a worst-case analysis. The applications of the above ap-proach in PCB design are discussed.},\n bibtype = {article},\n author = {Goudos, Sotirios K.},\n journal = {Radioengineering},\n number = {4}\n}
\n
\n\n\n
\n This work presents a numerical approach to the modeling of Electromagnetic Interference (EMI) from the emissions of ICs and PCBs inside rectangular metallic enclosures of network devices. The ICs are modeled as small magnetic and electric dipoles. Their interaction with the enclosures is studied with the dyadic Green's functions. Several calculation examples of surface current density on the metallic walls are given due to dipoles parallel to all directions. A Probabilistic Model is created from magnetic probe measurements in various types of router devices. Monte Carlo simulation is applied in order to perform a worst-case analysis. The applications of the above ap-proach in PCB design are discussed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Microwave absorber optimal design using multi-objective particle swarm optimization.\n \n \n \n\n\n \n Goudos, S., K.; and Sahalos, J., N.\n\n\n \n\n\n\n Microwave and Optical Technology Letters, 48(8): 1553-1558. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Microwave absorber optimal design using multi-objective particle swarm optimization},\n type = {article},\n year = {2006},\n keywords = {Microwave absorber design,Multiobjective optimization,Multiobjective particle swarm optimization,Pareto optimization,Particle swarm optimization},\n pages = {1553-1558},\n volume = {48},\n id = {f7b67208-da08-3a92-aef7-0499c79768b3},\n created = {2020-02-29T16:57:42.168Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.767Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2006a},\n private_publication = {false},\n abstract = {The design of planar multilayer coatings with high absorption for a desired range of frequencies and angles is presented. The design technique is based on multiobjective particle swarm optimization (MOPSO). Particle swarm optimization (PSO) is an evolutionary optimization algorithm based on bird flight. Multiobjective PSO (MOPSO) is a Pareto PSO algorithm which produces the Pareto front fast and efficiently. MOPSO is used for several design cases and is compared with multiobjective genetic algorithms. Numerical results that are also compared with those existing in the literature show the advantages of this approach and the applicability of this design method. © 2006 Wiley Periodicals, Inc.},\n bibtype = {article},\n author = {Goudos, S. K. and Sahalos, J. N.},\n doi = {10.1002/mop.21727},\n journal = {Microwave and Optical Technology Letters},\n number = {8}\n}
\n
\n\n\n
\n The design of planar multilayer coatings with high absorption for a desired range of frequencies and angles is presented. The design technique is based on multiobjective particle swarm optimization (MOPSO). Particle swarm optimization (PSO) is an evolutionary optimization algorithm based on bird flight. Multiobjective PSO (MOPSO) is a Pareto PSO algorithm which produces the Pareto front fast and efficiently. MOPSO is used for several design cases and is compared with multiobjective genetic algorithms. Numerical results that are also compared with those existing in the literature show the advantages of this approach and the applicability of this design method. © 2006 Wiley Periodicals, Inc.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A semantic web application for matching a citizen's profile to entitled public services.\n \n \n \n\n\n \n Goudos, S.; Peristeras, V.; and Tarabanis, K.\n\n\n \n\n\n\n In ICEG 2006 - 2nd International Conference on e-Government, pages 90-98, 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{\n title = {A semantic web application for matching a citizen's profile to entitled public services},\n type = {inproceedings},\n year = {2006},\n keywords = {Matching profiles,OWL,Public administration,Semantic web},\n pages = {90-98},\n id = {e4be3a87-428d-3ae6-8ecb-f838386ad0bd},\n created = {2020-02-29T16:57:42.585Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.004Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2006},\n private_publication = {false},\n abstract = {This paper contributes to the more general problem of supplying the citizen with the correct information from the public administration in a quick and easy way. Specifically, getting the information about all the benefits that someone is entitled of is a very complex task in many countries. To address this problem, a domain ontology is first created in OWL (Web Ontology Language). The ontology is used as the knowledge base for a semantic application that uses a reasoner. This latter queries the knowledge base through a web interface by receiving the user's profile as input, and providing the benefits that match to the specified profile as output. A list of the required documents and the procedure for receiving the various benefits from the appropriate service provider is also returned. In this way, a complex procedure is simplified and a serious overload on the client's side (being business or citizen). is relaxed The application is highly reconfigurable in order to e.g. easily accommodate legislation changes. It accommodates law changes by ontology modifications. Moreover, the application is transferable to a large number of similar service provision cases in the public administration domain. In light of these, the advantages of semantic web technology and their application to the e-government domain are discussed.},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios and Peristeras, Vassilios and Tarabanis, Konstantinos},\n booktitle = {ICEG 2006 - 2nd International Conference on e-Government}\n}
\n
\n\n\n
\n This paper contributes to the more general problem of supplying the citizen with the correct information from the public administration in a quick and easy way. Specifically, getting the information about all the benefits that someone is entitled of is a very complex task in many countries. To address this problem, a domain ontology is first created in OWL (Web Ontology Language). The ontology is used as the knowledge base for a semantic application that uses a reasoner. This latter queries the knowledge base through a web interface by receiving the user's profile as input, and providing the benefits that match to the specified profile as output. A list of the required documents and the procedure for receiving the various benefits from the appropriate service provider is also returned. In this way, a complex procedure is simplified and a serious overload on the client's side (being business or citizen). is relaxed The application is highly reconfigurable in order to e.g. easily accommodate legislation changes. It accommodates law changes by ontology modifications. Moreover, the application is transferable to a large number of similar service provision cases in the public administration domain. In light of these, the advantages of semantic web technology and their application to the e-government domain are discussed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Seasonal decomposition and forecasting of telecommunication data: A comparative case study.\n \n \n \n\n\n \n Hilas, C., S.; Goudos, S., K.; and Sahalos, J., N.\n\n\n \n\n\n\n Technological Forecasting and Social Change, 73(5): 495-509. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Seasonal decomposition and forecasting of telecommunication data: A comparative case study},\n type = {article},\n year = {2006},\n keywords = {Call data pattern recognition,Forecast evaluation,Model selection,Seasonal adjustment,Time series},\n pages = {495-509},\n volume = {73},\n id = {7fa58d5e-5622-36fd-b989-a5965df6cd25},\n created = {2020-02-29T16:57:43.049Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:08:48.917Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Hilas2006},\n private_publication = {false},\n abstract = {In this paper, forecasting models for the monthly outgoing telephone calls in a University Campus are presented. The data have been separated in the categories of international and national calls as well as calls to mobile phones. The total number of calls has also been analyzed. Three different methods, namely the Seasonal Decomposition, Exponential Smoothing Method and SARIMA Method, have been used. Forecasts with 95% confidence intervals were calculated for each method and compared with the actual data. The outcome of this work can be used to predict future demands for the telecommunications network of the University. © 2005 Elsevier Inc. All rights reserved.},\n bibtype = {article},\n author = {Hilas, Constantinos S. and Goudos, Sotirios K. and Sahalos, John N.},\n doi = {10.1016/j.techfore.2005.07.002},\n journal = {Technological Forecasting and Social Change},\n number = {5}\n}
\n
\n\n\n
\n In this paper, forecasting models for the monthly outgoing telephone calls in a University Campus are presented. The data have been separated in the categories of international and national calls as well as calls to mobile phones. The total number of calls has also been analyzed. Three different methods, namely the Seasonal Decomposition, Exponential Smoothing Method and SARIMA Method, have been used. Forecasts with 95% confidence intervals were calculated for each method and compared with the actual data. The outcome of this work can be used to predict future demands for the telecommunications network of the University. © 2005 Elsevier Inc. All rights reserved.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n On the base stations antenna system design for mobile communications.\n \n \n \n\n\n \n Miaris, G., S.; Siachalou, E.; Samaras, T.; Goudos, S., K.; Vafiadis, E.; and Panas, S.\n\n\n \n\n\n\n Electrical Engineering, 88(2): 157-163. 2006.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {On the base stations antenna system design for mobile communications},\n type = {article},\n year = {2006},\n keywords = {Base station antennas,Beam forming,Beam tilting,Mobile communications,Orthogonal method},\n pages = {157-163},\n volume = {88},\n id = {dccaba78-404c-3e28-b9d0-810c40319881},\n created = {2020-02-29T16:57:45.174Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.058Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Miaris2006},\n private_publication = {false},\n abstract = {The design of a base station antenna for mobile communications is presented. The orthogonal method (OM) is applied under constraints on nulls of the radiation pattern. In the synthesis process the mutual coupling between the elements of the antenna array could be taken into account. Beam tilting and direction of arrival are also considered. The whole design is completed by implementing a special architecture of the antenna. Finally, some examples show the applicability of our technique.},\n bibtype = {article},\n author = {Miaris, George S. and Siachalou, Eleftheria and Samaras, Theodoros and Goudos, Sotirios K. and Vafiadis, Elias and Panas, Stavros},\n doi = {10.1007/s00202-004-0267-x},\n journal = {Electrical Engineering},\n number = {2}\n}
\n
\n\n\n
\n The design of a base station antenna for mobile communications is presented. The orthogonal method (OM) is applied under constraints on nulls of the radiation pattern. In the synthesis process the mutual coupling between the elements of the antenna array could be taken into account. Beam tilting and direction of arrival are also considered. The whole design is completed by implementing a special architecture of the antenna. Finally, some examples show the applicability of our technique.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards Semantic Web Services for Public Administration based on the Web Service Modeling Ontology (WSMO) and the Governance Enterprise Architecture (GEA).\n \n \n \n\n\n \n Peristeras, V.; Mocan, A.; Vitvar, T.; Nazir, S.; Goudos, S.; and Tarabanis, K.\n\n\n \n\n\n\n In Proceedings of International EGOV Conference 2006 (DEXA), Poland, Trauner Verlag, Electronic Government, pages 155-162, 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Towards Semantic Web Services for Public Administration based on the Web Service Modeling Ontology (WSMO) and the Governance Enterprise Architecture (GEA)},\n type = {inproceedings},\n year = {2006},\n pages = {155-162},\n id = {e99ddc6e-3111-34c0-a253-ec5a33d859e7},\n created = {2023-02-11T21:08:09.087Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:08:09.087Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {peristeras2006towards},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Peristeras, Vassilios and Mocan, Adrian and Vitvar, Tomas and Nazir, Sanullah and Goudos, Sotirios and Tarabanis, Konstantinos},\n booktitle = {Proceedings of International EGOV Conference 2006 (DEXA), Poland, Trauner Verlag, Electronic Government}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n EMI from ICs and PCBs inside High Speed Networking Equipment,.\n \n \n \n\n\n \n Goudos, S., K.; Hilas, C., S.; Rekanos, J.; and Sahalos, J., N.\n\n\n \n\n\n\n In EMC Europe 2006 International Symposium on Electromagnetic Compatibility, pages 437-442, 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {EMI from ICs and PCBs inside High Speed Networking Equipment,},\n type = {inproceedings},\n year = {2006},\n pages = {437-442},\n id = {4c48b9ef-dfca-3471-af9a-b626915e5ac9},\n created = {2023-02-11T21:08:09.206Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:08:09.206Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2006emi},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, S K and Hilas, C S and Rekanos, J and Sahalos, J N},\n booktitle = {EMC Europe 2006 International Symposium on Electromagnetic Compatibility}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Mapping Citizen Profiles to Public Administration Services Using Ontology Implementations of the Governance Enterprise Architecture (GEA) models.\n \n \n \n\n\n \n Goudos, S., K.; Peristeras, V.; and Tarabanis, K.\n\n\n \n\n\n\n In Proceedings of 3rd Annual European Semantic Web Conference, pages 25-37, 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Mapping Citizen Profiles to Public Administration Services Using Ontology Implementations of the Governance Enterprise Architecture (GEA) models},\n type = {inproceedings},\n year = {2006},\n pages = {25-37},\n id = {4930e682-5284-39d2-9f3e-fa795c98a0d9},\n created = {2023-02-11T21:08:09.214Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:08:09.214Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2006mapping},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K and Peristeras, Vassilios and Tarabanis, Konstantinos},\n booktitle = {Proceedings of 3rd Annual European Semantic Web Conference}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Framework of Public Administration Domain Data Interoperability Using Semantic Web Technology.\n \n \n \n\n\n \n Goudos, S., K.; Peristeras, V.; and Tarabanis, K.\n\n\n \n\n\n\n In Proceedings of Interoperability for Enterprise Software and Applications Conference 2006 (I-ESA 06), Bordeaux, France, 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {A Framework of Public Administration Domain Data Interoperability Using Semantic Web Technology},\n type = {inproceedings},\n year = {2006},\n id = {b4519eca-d22f-372b-83f1-ac28dbd159dd},\n created = {2023-02-11T21:08:09.217Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:08:09.217Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2006framework},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, Sotirios K and Peristeras, Vassileios and Tarabanis, Konstantinos},\n booktitle = {Proceedings of Interoperability for Enterprise Software and Applications Conference 2006 (I-ESA 06), Bordeaux, France}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Design of Broadband Radar Absorbing Materials using Particle Swarm Optimization.\n \n \n \n\n\n \n Goudos, S., K.; and Sahalos, J., N.\n\n\n \n\n\n\n In EMC Europe 2006 International Symposium on Electromagnetic Compatibility, pages 1111-1116, 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Design of Broadband Radar Absorbing Materials using Particle Swarm Optimization},\n type = {inproceedings},\n year = {2006},\n pages = {1111-1116},\n id = {05bd3161-62a0-3fde-bbcd-d1726ea4be80},\n created = {2023-02-11T21:08:09.219Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:08:09.219Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2006design},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, S K and Sahalos, J N},\n booktitle = {EMC Europe 2006 International Symposium on Electromagnetic Compatibility}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A test lab for the performance analysis of TCP over ethernet LAN on windows operating system.\n \n \n \n\n\n \n Gotsis, K., A.; Goudos, S., K.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Transactions on Education, 48(2): 318-328. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {A test lab for the performance analysis of TCP over ethernet LAN on windows operating system},\n type = {article},\n year = {2005},\n keywords = {Benchmarking,Computer networks,IPv6,Network performance,Network traffic,Throughput,Transmission control protocol/internet protocol (T},\n pages = {318-328},\n volume = {48},\n id = {895c9b97-e746-3a3f-a8e7-47390a0f3175},\n created = {2020-02-29T16:57:43.073Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:02.714Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Gotsis2005},\n private_publication = {false},\n abstract = {A test laboratory for the performance analysis of the Transmission Control Protocol (TCP) and the teaching of its basic concepts is proposed. The laboratory environment is a small Ethernet local area network (LAN) with PCs running different versions of the Windows operating system (95/98/NT/2000). To support the Internet Protocol Version 6 (IPv6) for Windows and to improve flexibility, the Netperf TCP software tool has been modified. Based on the modified Netperf and a protocol analyzer, students perform traffic measurements on a real network. Various aspects of the Microsoft TCP implementation for Windows are discovered and clearly explained. The IPv6 for Windows 2000 is also examined, and comparisons with IPv4 are made. © 2005 IEEE.},\n bibtype = {article},\n author = {Gotsis, Konstantinos A. and Goudos, Sotirios K. and Sahalos, John N.},\n doi = {10.1109/TE.2004.842897},\n journal = {IEEE Transactions on Education},\n number = {2}\n}
\n
\n\n\n
\n A test laboratory for the performance analysis of the Transmission Control Protocol (TCP) and the teaching of its basic concepts is proposed. The laboratory environment is a small Ethernet local area network (LAN) with PCs running different versions of the Windows operating system (95/98/NT/2000). To support the Internet Protocol Version 6 (IPv6) for Windows and to improve flexibility, the Netperf TCP software tool has been modified. Based on the modified Netperf and a protocol analyzer, students perform traffic measurements on a real network. Various aspects of the Microsoft TCP implementation for Windows are discovered and clearly explained. The IPv6 for Windows 2000 is also examined, and comparisons with IPv4 are made. © 2005 IEEE.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Wireless corner: On mobile communications smart base-station system design.\n \n \n \n\n\n \n Miaris, G.; Siachalou, E.; Samaras, T.; Goudos, S.; Vafiadis, E.; and Panas, S.\n\n\n \n\n\n\n IEEE Antennas and Propagation Magazine, 47(2): 139-144. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Wireless corner: On mobile communications smart base-station system design},\n type = {article},\n year = {2005},\n keywords = {Antenna arrays,Direction of arrival estimation,Land mobile radio cellular systems,Land mobile radio equipment,Microstrip arrays,Shaped beam antennas,Smart antennas},\n pages = {139-144},\n volume = {47},\n id = {373273e7-3f54-38e8-baf8-d92038009db4},\n created = {2020-02-29T16:57:45.217Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.526Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Miaris2005},\n private_publication = {false},\n abstract = {A design technique for mobile base-station antennas is presented. Beam tilting to avoid intersymbol interference is considered, and the orthogonal method (OM) under constraints on the radiation pattern is applied. The adaptive architecture of the mobile system, in conjunction with the direction of arrival (DoA) and the least mean square algorithms, is explained. A set of useful examples shows the applicability of the whole design.},\n bibtype = {article},\n author = {Miaris, George and Siachalou, Eleftheria and Samaras, Theodoros and Goudos, Sotirios and Vafiadis, Elias and Panas, Stavros},\n doi = {10.1109/MAP.2005.1487814},\n journal = {IEEE Antennas and Propagation Magazine},\n number = {2}\n}
\n
\n\n\n
\n A design technique for mobile base-station antennas is presented. Beam tilting to avoid intersymbol interference is considered, and the orthogonal method (OM) under constraints on the radiation pattern is applied. The adaptive architecture of the mobile system, in conjunction with the direction of arrival (DoA) and the least mean square algorithms, is explained. A set of useful examples shows the applicability of the whole design.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Orthosynthesis : On the Beamforming from a set of Uniform Linear Arrays by the Orthogonal Method.\n \n \n \n\n\n \n Margaritis, H.; Goudos, S.; Miaris, G., S.; Samaras, T.; and Sahalos, J., N.\n\n\n \n\n\n\n Journal of Applied Electromagnetism, 7: 9-12. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Orthosynthesis : On the Beamforming from a set of Uniform Linear Arrays by the Orthogonal Method},\n type = {article},\n year = {2005},\n pages = {9-12},\n volume = {7},\n id = {26d98767-94c6-3e5b-834c-eb48d5292132},\n created = {2020-03-03T08:46:35.487Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-05-12T20:32:43.614Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Margaritis2005},\n source_type = {article},\n private_publication = {false},\n bibtype = {article},\n author = {Margaritis, H and Goudos, S and Miaris, G S and Samaras, T and Sahalos, J N},\n journal = {Journal of Applied Electromagnetism}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2004\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n On the design of switched-beam wideband base stations.\n \n \n \n\n\n \n Siachalou, E.; Vafiadis, E.; Goudos, S., S.; Samaras, T.; Koukourlis, C., S.; and Panas, S.\n\n\n \n\n\n\n IEEE Antennas and Propagation Magazine, 46(1): 158-167. 2004.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {On the design of switched-beam wideband base stations},\n type = {article},\n year = {2004},\n keywords = {Adaptive arrays,Broadband communication,Butler matrix,Land mobile radio cellular systems,Land mobile radio equipment,Signal processing antennas,Smart antennas,Wireless networks},\n pages = {158-167},\n volume = {46},\n id = {57772e47-3156-3a12-a6ee-86b360ede08b},\n created = {2020-02-29T16:57:45.180Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.256Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Siachalou2004},\n private_publication = {false},\n abstract = {A switched-beam base-station antenna is presented. The antenna is an improvement on the Butler matrix. The input ports of the antenna are excited with equal or unequal amplitudes. The feed network is analyzed and presented in a simple manner. The antenna comprises the main part of a base station, and is useful for broadband communications. The architecture of the base station is described, and the services that can be provided are given. Finally, comments are made about the tradeoffs and benefits of the antenna is comparison to the classical Butler-matrix switched-beam and adaptive arrays.},\n bibtype = {article},\n author = {Siachalou, Eleftheria and Vafiadis, Elias and Goudos, Sotirios S. and Samaras, Theodoros and Koukourlis, Christos S. and Panas, Stavros},\n doi = {10.1109/MAP.2004.1296180},\n journal = {IEEE Antennas and Propagation Magazine},\n number = {1}\n}
\n
\n\n\n
\n A switched-beam base-station antenna is presented. The antenna is an improvement on the Butler matrix. The input ports of the antenna are excited with equal or unequal amplitudes. The feed network is analyzed and presented in a simple manner. The antenna comprises the main part of a base station, and is useful for broadband communications. The architecture of the base station is described, and the services that can be provided are given. Finally, comments are made about the tradeoffs and benefits of the antenna is comparison to the classical Butler-matrix switched-beam and adaptive arrays.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Computer tool for EM planar absorber design.\n \n \n \n\n\n \n Goudos, S., K.; Samaras, T.; and Sahalos, J., N.\n\n\n \n\n\n\n In EMC Europe 2004 International Symposium on Electromagnetic Compatibility, Eindhoven, 2004. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {A Computer tool for EM planar absorber design},\n type = {inproceedings},\n year = {2004},\n id = {3132818a-d8df-3447-b0c4-f542a616d20c},\n created = {2023-02-11T21:03:57.133Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:03:57.133Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2004computer},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, S K and Samaras, T and Sahalos, J N},\n booktitle = {EMC Europe 2004 International Symposium on Electromagnetic Compatibility, Eindhoven}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Web-based visualization of electric fields and currents inside a rectangular cavity.\n \n \n \n\n\n \n Goudos, S., K.; Samaras, T.; and Sahalos, J., N.\n\n\n \n\n\n\n In EMC Europe 2004 International Symposium on Electromagnetic Compatibility, Eindhoven, 2004. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Web-based visualization of electric fields and currents inside a rectangular cavity},\n type = {inproceedings},\n year = {2004},\n id = {bf46b164-2a9b-311c-b1f3-f772d14d9d62},\n created = {2023-02-11T21:03:57.290Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:03:57.290Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2004webbased},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, S K and Samaras, T and Sahalos, J N},\n booktitle = {EMC Europe 2004 International Symposium on Electromagnetic Compatibility, Eindhoven}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2003\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Numerical approaches for EMI reduction of ICs and PCBs inside metallic enclosures.\n \n \n \n \n\n\n \n Goudos, S.; Samaras, T.; Vafiadis, E.; and Sahalos, J.\n\n\n \n\n\n\n In IEEE International Symposium on Electromagnetic Compatibility (EMC), pages 513-516 Vol.1, 2003. Ieee\n \n\n\n\n
\n\n\n\n \n \n \"NumericalWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Numerical approaches for EMI reduction of ICs and PCBs inside metallic enclosures},\n type = {inproceedings},\n year = {2003},\n pages = {513-516 Vol.1},\n websites = {%3CGo},\n publisher = {Ieee},\n id = {6f8c8659-6591-33c8-aff3-a790477b08f9},\n created = {2020-03-03T08:46:35.431Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T20:59:41.564Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2003},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {This work presents a numerical approach to the reduction of Electromagnetic Interference (EMI) from the emissions of 1Cs and PCBs inside rectangular metallic enclosures. The ICs are modeled as small magnetic dipoles. Their interaction with the enclosures is studied with the dyadic Green's functions. The Monte Carlo procedure in conjunction with optimization techniques is used in order to achieve optimal placement configurations for the ICs. by minimizing the electric current density on the metallic walls. The applications of the above approach in PCB design are discussed.},\n bibtype = {inproceedings},\n author = {Goudos, S and Samaras, T and Vafiadis, E and Sahalos, J.N.},\n doi = {10.1109/icsmc2.2003.1428305},\n booktitle = {IEEE International Symposium on Electromagnetic Compatibility (EMC)}\n}
\n
\n\n\n
\n This work presents a numerical approach to the reduction of Electromagnetic Interference (EMI) from the emissions of 1Cs and PCBs inside rectangular metallic enclosures. The ICs are modeled as small magnetic dipoles. Their interaction with the enclosures is studied with the dyadic Green's functions. The Monte Carlo procedure in conjunction with optimization techniques is used in order to achieve optimal placement configurations for the ICs. by minimizing the electric current density on the metallic walls. The applications of the above approach in PCB design are discussed.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2002\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Monte Carlo simulation for the prediction of the emission level from multiple sources inside shielded enclosures.\n \n \n \n\n\n \n Goudos, S.; Vafiadis, E.; and Sahalos, J.\n\n\n \n\n\n\n IEEE Transactions on Electromagnetic Compatibility, 44(2). 2002.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Monte Carlo simulation for the prediction of the emission level from multiple sources inside shielded enclosures},\n type = {article},\n year = {2002},\n keywords = {EMC,EMI,Electrical equipment enclosures,Green's function,Monte Carlo methods,PCB design,Simulated annealing},\n volume = {44},\n id = {50b091ed-dbae-3bd1-b5c1-f6f930d7e620},\n created = {2020-02-29T16:57:43.100Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-05-12T20:32:45.679Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Goudos2002},\n private_publication = {false},\n abstract = {The emission level from multiple sources inside shielded enclosures is presented. Fields are expressed through the dyadic Green's function. Integrated circuits are modeled as electric and magnetic dipoles. Induced electric current magnitudes on the walls of the enclosures are analytically calculated. Probabilistic models based on measurement data for various source configurations are derived and Monte Carlo simulations are produced. The results are used for the prediction of possible emission margins. Applications in PCB design are discussed and suggestions are made.},\n bibtype = {article},\n author = {Goudos, S.K. and Vafiadis, E.E. and Sahalos, J.N.},\n doi = {10.1109/TEMC.2002.1003394},\n journal = {IEEE Transactions on Electromagnetic Compatibility},\n number = {2}\n}
\n
\n\n\n
\n The emission level from multiple sources inside shielded enclosures is presented. Fields are expressed through the dyadic Green's function. Integrated circuits are modeled as electric and magnetic dipoles. Induced electric current magnitudes on the walls of the enclosures are analytically calculated. Probabilistic models based on measurement data for various source configurations are derived and Monte Carlo simulations are produced. The results are used for the prediction of possible emission margins. Applications in PCB design are discussed and suggestions are made.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Direct solution and Monte Carlo simulation of the inverse problem in two-layered half-space.\n \n \n \n\n\n \n Mertzanides, I.; Goudos, S.; and Sahalos, J.\n\n\n \n\n\n\n Electrical Engineering, 84(1). 2002.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Direct solution and Monte Carlo simulation of the inverse problem in two-layered half-space},\n type = {article},\n year = {2002},\n volume = {84},\n id = {32c730f7-c453-3b61-8065-91dabbeff668},\n created = {2020-02-29T16:57:43.128Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-05-12T20:32:46.431Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Mertzanides2002},\n private_publication = {false},\n abstract = {A direct method is developed for determining the dielectric properties and thickness of lossy two-layered media. The technique is based on the study of the frequency response of the complex reflection coefficient. The frequency span must contain at least two adjacent extreme values of the real part of the input impedance. Monte Carlo simulations were produced in order to test the accuracy of the method. Applications in hydrology, engineering and environmental geology are discussed.},\n bibtype = {article},\n author = {Mertzanides, I.C. and Goudos, S.K. and Sahalos, J.N.},\n doi = {10.1007/s002020100081},\n journal = {Electrical Engineering},\n number = {1}\n}
\n
\n\n\n
\n A direct method is developed for determining the dielectric properties and thickness of lossy two-layered media. The technique is based on the study of the frequency response of the complex reflection coefficient. The frequency span must contain at least two adjacent extreme values of the real part of the input impedance. Monte Carlo simulations were produced in order to test the accuracy of the method. Applications in hydrology, engineering and environmental geology are discussed.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Orthogonal advanced methods for antennas: The ORAMA computer tool.\n \n \n \n\n\n \n Miaris, G.; Goudos, S.; Lakovidis, C.; Vafiadis, E.; and Sahalos, J.\n\n\n \n\n\n\n IEEE Antennas and Propagation Magazine, 44(5). 2002.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Orthogonal advanced methods for antennas: The ORAMA computer tool},\n type = {article},\n year = {2002},\n keywords = {Antenna arrays,Antenna radiation patterns,Linear arrays},\n volume = {44},\n id = {bd2db0ca-da23-397e-9501-479082fc6386},\n created = {2020-02-29T16:57:44.772Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2022-05-12T20:32:47.232Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Miaris2002},\n private_publication = {false},\n abstract = {A computer tool (ORAMA) for the synthesis of linear antenna arrays is presented. The Orthogonal Method (OM) and the Orthogonal Perturbation (OP) Method are used. The Orthogonal Method derives the excitations of the elements of the array, while the Orthogonal Perturbation Method quantizes the excitation and determines the position of the elements. The user has the options to select the array geometry, the case study for a specific desired pattern, the method to be used, and the element type. Several design cases with various constraints are presented. ORAMA [a demo of the software is available at http://rcl.physics.auth.gr] has been designed as a Windows MDI application for the academic classroom, as well as for professional antenna engineers. A set of examples for different array patterns shows the usefulness of the tool.},\n bibtype = {article},\n author = {Miaris, G.S. and Goudos, S.K. and Lakovidis, Chr. and Vafiadis, E. and Sahalos, J.N.},\n doi = {10.1109/MAP.2002.1077777},\n journal = {IEEE Antennas and Propagation Magazine},\n number = {5}\n}
\n
\n\n\n
\n A computer tool (ORAMA) for the synthesis of linear antenna arrays is presented. The Orthogonal Method (OM) and the Orthogonal Perturbation (OP) Method are used. The Orthogonal Method derives the excitations of the elements of the array, while the Orthogonal Perturbation Method quantizes the excitation and determines the position of the elements. The user has the options to select the array geometry, the case study for a specific desired pattern, the method to be used, and the element type. Several design cases with various constraints are presented. ORAMA [a demo of the software is available at http://rcl.physics.auth.gr] has been designed as a Windows MDI application for the academic classroom, as well as for professional antenna engineers. A set of examples for different array patterns shows the usefulness of the tool.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Orthosynthesis: On the Beamforming from a set of Uniform Linear Arrays by the Orthogonal Method.\n \n \n \n\n\n \n Margaritis, H.; Goudos, S., K.; Miaris, G., S.; and Sahalos, J., N.\n\n\n \n\n\n\n In URSI 2002 General Assembly, Session B8, 2002. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Orthosynthesis: On the Beamforming from a set of Uniform Linear Arrays by the Orthogonal Method},\n type = {inproceedings},\n year = {2002},\n id = {d3f287a7-3f68-30cb-93cc-f74c088bb68f},\n created = {2023-02-11T21:03:57.096Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:03:57.096Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {margaritis2002orthosynthesis},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Margaritis, H and Goudos, S K and Miaris, G S and Sahalos, J N},\n booktitle = {URSI 2002 General Assembly, Session B8}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Placement of ICs on PCBs inside Rectangular Enclosures using Stochastic and Optimization Approaches.\n \n \n \n\n\n \n Goudos, S., K.; Samaras, T.; Vafiadis, E.; and Sahalos, J., N.\n\n\n \n\n\n\n In URSI 2002 General Assembly, Session E6, 2002. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Placement of ICs on PCBs inside Rectangular Enclosures using Stochastic and Optimization Approaches},\n type = {inproceedings},\n year = {2002},\n id = {916af0fb-851b-3d49-b51f-da04688ed9b2},\n created = {2023-02-11T21:03:57.294Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T21:03:57.294Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {goudos2002placement},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, S K and Samaras, T and Vafiadis, E and Sahalos, J N},\n booktitle = {URSI 2002 General Assembly, Session E6}\n}
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2001\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n On the quantized excitation and the geometry synthesis of a linear array by the orthogonal method.\n \n \n \n\n\n \n Goudos, S., K.; Miaris, G., S.; and Sahalos, J., N.\n\n\n \n\n\n\n IEEE Transactions on Antennas and Propagation, 49(2): 298-303. 2001.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {On the quantized excitation and the geometry synthesis of a linear array by the orthogonal method},\n type = {article},\n year = {2001},\n keywords = {Antenna arrays,Antenna radiation patterns,Antenna theory},\n pages = {298-303},\n volume = {49},\n id = {17f005ba-22ff-3d48-b815-e92e728aa48b},\n created = {2020-02-29T16:57:43.162Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:04.061Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Goudos2001},\n private_publication = {false},\n abstract = {A method for the geometry synthesis of a linear array is presented. We start from an initial array with quantized amplitudes. After this, we perturb the element positions by combining an iterative technique with the orthogonal method. The final position of the elements is found from the last iteration where the desired approximation of the pattern is obtained. Arrays with more constraints on the pattern need more quantized amplitudes. Several examples for different cases show the applicability of our method.},\n bibtype = {article},\n author = {Goudos, Sotirios K. and Miaris, George S. and Sahalos, John N.},\n doi = {10.1109/8.914297},\n journal = {IEEE Transactions on Antennas and Propagation},\n number = {2}\n}
\n
\n\n\n
\n A method for the geometry synthesis of a linear array is presented. We start from an initial array with quantized amplitudes. After this, we perturb the element positions by combining an iterative technique with the orthogonal method. The final position of the elements is found from the last iteration where the desired approximation of the pattern is obtained. Arrays with more constraints on the pattern need more quantized amplitudes. Several examples for different cases show the applicability of our method.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ORAMA A Computer Tool for Linear Antenna Design.\n \n \n \n\n\n \n Miaris, G., S.; Goudos, S., K.; Iakovidis, C.; Vafiadis, E.; and Sahalos, J., N.\n\n\n \n\n\n\n In 8th International Conference on Advances in Communications and Control (COMCON8), pages 317-328, 2001. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {ORAMA A Computer Tool for Linear Antenna Design},\n type = {inproceedings},\n year = {2001},\n pages = {317-328},\n id = {24c5f366-722b-3812-84cf-8d67c6c148cf},\n created = {2023-02-11T20:58:33.234Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T20:58:33.234Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {miaris2001iakovidis},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {The progressive improvement of the feed networks and the continuous reduction of their cost have permitted the usage of nonuniform antenna arrays with fewer difficulties. One of the promising methods for the design of the above nonuniform antenna arrays is the Orthogonal Method (OM).\nORAMA is a computer tool based on OM and designed for synthesis of linear antenna arrays on the Microsoft Windows platform. OR.A.M.A comes from the initials of the words ORthogonal Advanced Method for Antennas. ORAMA, spelled ORAMA, is a Greek word meaning vision. In the present version mutual coupling between elements of the arrays is not taken into account. However with ORAMA excellent pattern predictions for different element types can be made.\nThe antenna array can be designed for different types and positions of the elements, depending on the needs. Elements such as dipoles, microstrips, horns etc are common in most wireless applications.\nIn the current version parallel and identical elements are taken into account. In this paper the simplicity of the procedure for a set of interesting applications will be presented.},\n bibtype = {inproceedings},\n author = {Miaris, G S and Goudos, S K and Iakovidis, Chr. and Vafiadis, E and Sahalos, J N},\n booktitle = {8th International Conference on Advances in Communications and Control (COMCON8)}\n}
\n
\n\n\n
\n The progressive improvement of the feed networks and the continuous reduction of their cost have permitted the usage of nonuniform antenna arrays with fewer difficulties. One of the promising methods for the design of the above nonuniform antenna arrays is the Orthogonal Method (OM).\nORAMA is a computer tool based on OM and designed for synthesis of linear antenna arrays on the Microsoft Windows platform. OR.A.M.A comes from the initials of the words ORthogonal Advanced Method for Antennas. ORAMA, spelled ORAMA, is a Greek word meaning vision. In the present version mutual coupling between elements of the arrays is not taken into account. However with ORAMA excellent pattern predictions for different element types can be made.\nThe antenna array can be designed for different types and positions of the elements, depending on the needs. Elements such as dipoles, microstrips, horns etc are common in most wireless applications.\nIn the current version parallel and identical elements are taken into account. In this paper the simplicity of the procedure for a set of interesting applications will be presented.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2000\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Calculation of induced field and surface current due to multiple internal magnetic dipoles inside a rectangular cavity.\n \n \n \n\n\n \n Goudos, S.; and Sahalos, J.\n\n\n \n\n\n\n In Proceedings of the Second International Symposium of Trans Black Sea Region on Applied Electromagnetism, pages 70, 2000. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Calculation of induced field and surface current due to multiple internal magnetic dipoles inside a rectangular cavity},\n type = {inproceedings},\n year = {2000},\n pages = {70},\n id = {f0d6ed46-8672-38a7-99dd-ca1526b4ee8c},\n created = {2020-03-03T08:46:35.431Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.601Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Goudos2000a},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, S.K. and Sahalos, J.N.},\n doi = {10.1109/aem.2000.943230},\n booktitle = {Proceedings of the Second International Symposium of Trans Black Sea Region on Applied Electromagnetism}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Green's functions computation of the EMI due to electric dipole sources inside a rectangular cavity.\n \n \n \n\n\n \n Goudos, S.; and Sahalos, J.\n\n\n \n\n\n\n In Proceedings of the Second International Symposium of Trans Black Sea Region on Applied Electromagnetism, pages 69, 2000. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Green's functions computation of the EMI due to electric dipole sources inside a rectangular cavity},\n type = {inproceedings},\n year = {2000},\n pages = {69},\n id = {14e95f6e-cde3-3675-a597-8803c77ccd9d},\n created = {2020-03-03T08:46:35.483Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T18:54:05.414Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n citation_key = {Goudos2000},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inproceedings},\n author = {Goudos, S.K. and Sahalos, J.N.},\n doi = {10.1109/aem.2000.943229},\n booktitle = {Proceedings of the Second International Symposium of Trans Black Sea Region on Applied Electromagnetism}\n}
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Orthosynthesis: on the Beamforming from a Set of Uniform Linear Arrays by the Orthogonal Method.\n \n \n \n\n\n \n Miaris, G., S.; Margaritis, H.; Goudos, S.; and Sahalos, J., N.\n\n\n \n\n\n\n In Proceedings of the AP2000 Millennium Conference on Antennas and Propagation, 2000. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{\n title = {Orthosynthesis: on the Beamforming from a Set of Uniform Linear Arrays by the Orthogonal Method},\n type = {inproceedings},\n year = {2000},\n id = {7351b7f4-76c9-3750-be63-6a0b249bf1a0},\n created = {2023-02-11T20:58:33.219Z},\n file_attached = {false},\n profile_id = {c69aa657-d754-373c-91b7-64154b7d5d91},\n last_modified = {2023-02-11T20:58:33.219Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {miaris2000orthosynthesis},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Synthesis methods for linear antenna arrays have been extensively studied in the last decades; the existence of a long series of papers is enough to emphasize the importance of the area. Most of the procedures allow the synthesis of narrow-beam or low sidelobe patterns or the maximization of an index (gain, SNR) subject to one or several constraints. Excellent textbooks in the international literature present several treatments on the synthesis problem. Among them we notice the Fourier method, the Schelkunov procedure, the Dolph – Chebyshev synthesis, the Taylor and Elliot methods and the Woodward synthesis. The Orthogonal Method (OM) was introduced and extensively used by Unz and Sahalos in many antenna synthesis problems. Our effort in this work is the application of the above method for beam - forming through multiple beams.\n\nThe procedure starts from a set of overlapped non-orthogonal beams, which are produced from uniformly excited linear arrays with different phase shifting. In other words the desired pattern comes from the summation of M patterns of uniformly illuminated N element linear arrays. The M functions, which produce the pattern, perform the functional basis of the M dimensional vector space where the pattern is expressed. The above basis is not orthogonal and a procedure similar to that of Gram – Schmidt can orthonormalize it. Using the trivial well-known procedure one can arrive at the formulas that give the weights of each uniformly illuminated array. In the last step the element excitations that form the desired pattern of the array are found.\n\nThe success of the synthesis depends on several factors. Among them the most important are the number N of the elements of the array and the number M of the basis functions. The geometry and the phase difference also play a dominant role. By combining the above the optimum ones for the synthesis of a desired pattern can be found.\n\nSeveral examples for Chebyshev, cosecant – squared, Taylor and Bayliss patterns will be presented. Our examples will be compared with those given by other methods. Also the steps of our procedure and its advantages over other techniques will be analyzed.\n\nFinally some ideas for the application of the method for beam scanning systems will be exhibited.},\n bibtype = {inproceedings},\n author = {Miaris, G S and Margaritis, H and Goudos, S and Sahalos, J N},\n booktitle = {Proceedings of the AP2000 Millennium Conference on Antennas and Propagation}\n}
\n
\n\n\n
\n Synthesis methods for linear antenna arrays have been extensively studied in the last decades; the existence of a long series of papers is enough to emphasize the importance of the area. Most of the procedures allow the synthesis of narrow-beam or low sidelobe patterns or the maximization of an index (gain, SNR) subject to one or several constraints. Excellent textbooks in the international literature present several treatments on the synthesis problem. Among them we notice the Fourier method, the Schelkunov procedure, the Dolph – Chebyshev synthesis, the Taylor and Elliot methods and the Woodward synthesis. The Orthogonal Method (OM) was introduced and extensively used by Unz and Sahalos in many antenna synthesis problems. Our effort in this work is the application of the above method for beam - forming through multiple beams.\n\nThe procedure starts from a set of overlapped non-orthogonal beams, which are produced from uniformly excited linear arrays with different phase shifting. In other words the desired pattern comes from the summation of M patterns of uniformly illuminated N element linear arrays. The M functions, which produce the pattern, perform the functional basis of the M dimensional vector space where the pattern is expressed. The above basis is not orthogonal and a procedure similar to that of Gram – Schmidt can orthonormalize it. Using the trivial well-known procedure one can arrive at the formulas that give the weights of each uniformly illuminated array. In the last step the element excitations that form the desired pattern of the array are found.\n\nThe success of the synthesis depends on several factors. Among them the most important are the number N of the elements of the array and the number M of the basis functions. The geometry and the phase difference also play a dominant role. By combining the above the optimum ones for the synthesis of a desired pattern can be found.\n\nSeveral examples for Chebyshev, cosecant – squared, Taylor and Bayliss patterns will be presented. Our examples will be compared with those given by other methods. Also the steps of our procedure and its advantages over other techniques will be analyzed.\n\nFinally some ideas for the application of the method for beam scanning systems will be exhibited.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);