P. Stavroulakis

Technical University of Crete, La Canée, Crete, Greece

Are you P. Stavroulakis?

Claim your profile

Publications (25)13.28 Total impact

  • P. Stavroulakis, N. Farsaris, T.D. Xenos
    [Show abstract] [Hide abstract]
    ABSTRACT: A transmitter independent receiver network (TIRN) is a network of radar receivers that operates in an area without cooperating with a particular radar transmitter, but rather using transmitters of opportunity (TOA) in order to detect and track airborne, ballistic or surface targets. In this paper a brief vulnerability analysis is given in both the detection/tracking and the communication subsystems of such a network. Electronic Defense (ED) solutions and interference avoidance techniques are given. A TIRN is mostly based in silent (low emission) operation and redundancy techniques. It is briefly described in the introduction. In the following paragraphs dealing with jamming techniques and is discussed, for both the detection and communication subsystems, comparing the results with the classic radar equivalent where applicable. It is finally concluded that such a network less vulnerable than conventional radars in most cases and in some cases even detect possible jammer effectively, at a fraction of the cost of classic radar network.
    Signal Processing, Communications and Networking, 2008. ICSCN '08. International Conference on; 02/2008
  • Source
    N.J. Farsaris, P.P. Stavroulakis, T.D. Xenos
    [Show abstract] [Hide abstract]
    ABSTRACT: A transmitter independent receiver network (TIRN) is a network of radar receivers that operates in an area without cooperating with a particular radar transmitter, but rather using transmitters of opportunity (TOA) in order to detect and track airborne, ballistic or surface targets. In this paper a brief vulnerability analysis is given in both the detection/tracking and the communication subsystems of such a network. Electronic defense (ED) solutions and interference avoidance techniques are given. A TIRN is mostly based in silent (low emission) operation and redundancy techniques. It is briefly described in the introduction. In the following paragraphs dealing with jamming techniques and is discussed, for both the detection and communication subsystems, comparing the results with the classic radar equivalent where applicable. It is finally concluded that such a network less vulnerable than conventional radars in most cases and in some cases even detect possible jammer effectively, at a fraction of the cost of classic radar network.
    Electromagnetic Compatibility and Electromagnetic Ecology, 2007 7th International Symposium on; 07/2007
  • Source
    NIKOS J. FARSARIS, THOMAS D. XENOS, PETER P. STAVROULAKIS
    [Show abstract] [Hide abstract]
    ABSTRACT: In certain naval and coast guard security operations a video must be transmitted from an aerial platform - aircraft, helicopter, unmanned aerial vehicle or airship - to a surface station in real time. In this paper the radio channel characteristics and the antenna systems needed are examined in order to achieve a robust direct communication channel with enough bandwidth between the airborne vehicle and the base station. Simulation and experimental work has shown that for a reliable operation, diversity (spatial or frequency) techniques must be used in order to achieve the most reliable link between a moving and a stationary platform over any terrain, and any troposphere conditions.
    01/2007;
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a neural network model for routing in the space segment of a Satellite Personal Communication System. At first, a proper energy function is constructed from the constraints of the system, which are clearly indicated. The combinatorial nature of the problem is clearly shown and hence a properly modified Hopfield neural network can be easily applied to provide increased survivability and thus improve security.
    Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006; 01/2006
  • Nikos J. Farsaris, Thomas D. Xenos, Peter P. Stavroulakis
    [Show abstract] [Hide abstract]
    ABSTRACT: A totally passive multistatic radar or Transmitter-Independent Receiver Network (TIRN) [1], can be defined as a number of independent bistatic receivers [2], connected to a communication network, in order to detect and track targets in their coverage area using the signal(s) of non-cooperative transmitter(s). In this paper, an Angle of Arrival (AOA) method of transmitter and target detection is investigated. Linear systems of equations are extracted, and then solved by recurrent Artificial Neural Networks (ANN) for detection and tracking of moving and ballistic targets. These linear systems are often over determined by using a redundant number of receivers in order to achieve a minimal false alarm probability and increase the survivability of the TIRN. Finally it is shown that practical ANN designs are attractive and simple solutions for an AOA based TIRN for moving target tracking purposes, combining fast and robust convergence, ease of design and construction and - in case of adequate redundancy - adequate survivability.
    Proceedings of the 9th WSEAS International Conference on Communications; 07/2005
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Using the idea of probabilistic routing, calls in an ant based decentralized scheme are not routed according to the largest probabilities in the pheromone tables but randomly according to these probabilities. This principle can be particularly helpful in order to further minimize possible node congestion problems. An additional incorporation of the antipheromone mechanism in the operation of artificial ants helps in better biasing the network. This paper examines the behaviour of such a routing scheme using a proper set of suitable metrics.
    International Journal of Communication Systems 01/2004; · 1.11 Impact Factor
  • Peter Stavroulakis
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, an attempt has been made to provide an exposition of the results on interference suppression techniques developed at least over the last twenty years. Most of the relevant work over this period is included in Stavroulakis (Stavroulakis, Interference Analysis of Communication Systems. IEEE: New York, 1980; Stavroulakis, Wireless Local Loops. Wiley: London, 2001; Stavroulakis, Third Generation Mobile Telecommunication Systems. Springer: Berlin, 2001; Stavroulakis, Interference Analysis and Reduction for Wireless Communications. Artech House: London, 2002; Stavroulakis, Moorthy, Conference Records NTC '79, vol. 3, Washington, DC, 1979; 52.3.1–52.3.5). Interference suppression/cancelling techniques have followed exactly the path of the field of wireless communications over the years. The decade of the 1980s concentrated on techniques applicable mainly to satellite communications whereas the decade of the 1990s concentrated on techniques that provided solutions to mobile communication interference/fading problems. This survey will point out and explain the most fundamental contributions, which opened new directions in the field of interference suppression, and undoubtedly will provide a basis for new researchers for further contributions. Copyright © 2003 John Wiley & Sons, Ltd.
    International Journal of Satellite Communications and Networking 01/2003; 21(1):1 - 12. · 0.54 Impact Factor
  • Source
    Harilaos G. Sandalidis, Peter Stavroulakis
    [Show abstract] [Hide abstract]
    ABSTRACT: Chapter 3 describes fixed channel assignment schemes in cellular networks, with emphasis on recent heuristic algorithms that apply genetic algorithms, tabu search, neural networks, fuzzy logic and other heuristics in solving problems. Dynamic channel assignment, channel borrowing and hybrid channel assignment problems are also discussed.
    02/2002;
  • [Show abstract] [Hide abstract]
    ABSTRACT: Swarm intelligence is a new challenging branch of artificial life which takes advantage of the collective behaviour of animals with limited intellectual faculties (insects, flocking birds, schools of fish) to solve algorithmically complex problems. Recently a new routing method based on the way that ants are communicating with each other has been applied to solve routing problems in telecommunication networks. This paper examines the behavior of an ant based decentralised router using an adequate set of commonly acceptable and some newly introduced metrics.
    Soft Computing 01/2001; 5:313-317. · 1.30 Impact Factor
  • I.S. Barbounakis, P. Stavroulakis, J. Gardiner
    [Show abstract] [Hide abstract]
    ABSTRACT: Various PSK modulations as well as minimum shift keying (MSK) have achieved great improvements in the signal-to-noise ratio by utilising the nonredundant error correction (NEC) technique. The cost for this improvement is neither an increase in bandwidth nor an increase in transmission power, but some extra complexity in the receiver. The receiver is only equipped with a bank of differential detectors and a simple error detection/correction circuit, whose complexity depends on the correction capability that the transmit-receive system must have. Here, it is proved that it is possible to differentially detect correlative, nonsymmetric continuous-phase frequency modulations such as tamed frequency modulation (TFM) with NEC receivers. TFM has not been used as much as MSK until now owing to its generation difficulties, but its main advantages of constant envelope and of very high spectrum efficiency make it a perfect candidate to work upon. Hence, TFM is first contaminated with additive white Gaussian noise and is subsequently detected through a single-error-correcting NEC receiver. Both the theoretical analysis and the computer simulations show that substantial error probability reduction is achieved over differentially detected TFM systems
    IEE Proceedings - Communications 07/2000; · 0.32 Impact Factor
  • I.S. Barbounakis, P. Stavroulakis, J.G. Gardiner
    [Show abstract] [Hide abstract]
    ABSTRACT: Cellular systems are characterized both by a great subscriber base and very limited frequency spectrum resources. Techniques such as frequency reuse, directional antennas, advanced speech and channel coding, power control etc. have been studied and proposed as solutions to increase the capacity. Modulations other than binary (GMSK) and quaternary (π/4-DQPSK) have not been widely adopted until lately. The most important reasons for this are the low signal-to-noise ratios encountered in the macrocells and the multipath fading, which may prove completely destructive for the signal. The receiver is consequently obstructed from recovering reliable amplitude and phase references resulting in irreducible error rates for highly efficient modulations such as QAM. With this paper, we attempt to introduce star QAM properly encoded at the transmitter. In addition, the adaptation of the star QAM to the requirements of the NEC receivers, already tested with MPSK modulations, opens new areas of applications that need higher efficiency. The performance improvement derived from Monte-Carlo simulations is a strong indication of what it is going to follow in the area
    Vehicular Technology Conference Proceedings, 2000. VTC 2000-Spring Tokyo. 2000 IEEE 51st; 02/2000
  • [Show abstract] [Hide abstract]
    ABSTRACT: An efficient model for ATM routing in the IRIDIUM system is presented in this paper. The model tries to be as realistic as possible. A proper energy function is constructed from the constraints of the ATM routing concept which are clearly indicated. The combinatorial nature of the problem is clearly shown and a properly modified Hopfield neural network can be easily applied and give adequate solutions
    Vehicular Technology Conference Proceedings, 2000. VTC 2000-Spring Tokyo. 2000 IEEE 51st; 02/2000
  • [Show abstract] [Hide abstract]
    ABSTRACT: Channel allocation schemes in a cellular network can be modeled as combinatorial optimization problems. Genetic algorithms (GAs) have been shown to be effective and robust tools in providing adequate solutions of such problems. This paper investigates the application of GAs to two common assignment strategies from the field of cellular communications: the dynamic (DCA) and the borrowing channel assignment (BCA). In both schemes, channel allocation is formulated as a discrete energy minimization problem and can be put in proper genetic representation. A computer simulation model examines the performance of the proposed GA-DCA and GA-BCA schemes for uniform and non-uniform traffic distributions under the effect of cochannel and adjacent channel interference constraints.
    Mathematics and Computers in Simulation 01/2000; 51(3):273-286. · 0.84 Impact Factor
  • P. Stavroulakis, C.P. Kakkavas, H.G. Sandalidis
    [Show abstract] [Hide abstract]
    ABSTRACT: The study of image compression has been risen dramatically. Many new ideas have come out with impressive results. Since images can be regarded as two-dimensional signals with the independent variables being the coordinates of two-dimensional space, many digital compression techniques can be extended, for instance from one-dimensional signals. This paper presents the most used still and video image compression techniques
    Signal Processing Proceedings, 2000. WCCC-ICSP 2000. 5th International Conference on; 01/2000
  • [Show abstract] [Hide abstract]
    ABSTRACT: Three established channel allocation schemes for cellular networks are compared using some commonly acceptable quality-of-service measures. These schemes assign channels on an efficient and robust heuristic technique, derived from the well known family of evolutionary algorithms, called combinatorial evolution strategy. Their performance is examined through a simulation using a realistic cellular network model
    IEE Proceedings - Communications 11/1999; · 0.32 Impact Factor
  • H G Sandalidis, P P Stavroulakis, J Rodriguez-Tellez
    [Show abstract] [Hide abstract]
    ABSTRACT: The demand for more efficient and fast channel allocation techniques in cellular systems increases day by day. Borrowing channel assignment (BCA) was introduced in the literature as a compromise between the classic fixed and dynamic channel allocation schemes. This paper examines the behavior of three heuristic BCA techniques based alternatively on a Hopfield neural network, an efficient evolutionary algorithm named combinatorial evolution strategy (CES) and a third heuristic which combines the basic advantages of the two above computational intelligence methods. By considering some specific assumptions that follows an ideal cellular mobile model, BCA is formulated as a combinatorial optimization problem. The above heuristics have been extensively applied to solve efficiently such problems in the past. Simulation results, derived for uniform and nonuniform traffic load conditions, are used to compare these BCA schemes each other as also with other well-established allocation techniques.
    IEEE Transactions on Neural Networks 02/1999; 10(1):176-81. · 2.95 Impact Factor
  • IEEE Transactions on Neural Networks. 01/1999; 10:176-181.
  • Source
    H.G. Sandalidis, P.P. Stavroulakis, J. Rodriguez-Tellez
    [Show abstract] [Hide abstract]
    ABSTRACT: Modern cellular mobile communications systems are characterized by a high degree of capacity. Consequently, they have to serve the maximum possible number of calls while the number of channels per cell is limited. The objective of channel allocation is to assign a required number of channels to each cell such that both efficient frequency spectrum utilization is provided and interference effects are minimized. Channel assignment is therefore an important operation of resource management and its efficient implementation increases the fidelity, capacity, and quality of service of cellular systems. Most channel allocation strategies are based on deterministic methods, however, which result in implementation complexity that is prohibitive for the traffic demand envisaged for the next generation of mobile systems. An efficient heuristic technique capable of handling channel allocation problems is introduced as an alternative. The method is called a combinatorial evolution strategy (CES) and belongs to the general heuristic optimization techniques known as evolutionary algorithms (EAs). Three alternative allocation schemes operating deterministically, namely the dynamic channel assignment (DCA), the hybrid channel assignment (HCA), and the borrowing channel assignment (BCA), are formulated as combinatorial optimization problems for which CES is applicable. Simulations for representative cellular models show the ability of this heuristic to yield sufficient solutions. These results will encourage the use of this method for the development of a heuristic channel allocation controller capable of coping with the traffic and spectrum management demands for the proper operation of the next generation of cellular systems
    IEEE Transactions on Evolutionary Computation 12/1998; · 4.81 Impact Factor
  • H.G. Sandalidis, P.P. Stavroulakis, J. Rodriguez-Tellez
    [Show abstract] [Hide abstract]
    ABSTRACT: Computational intelligence methods such as neural networks (NNs) and evolutionary algorithms (EAs) have found a wide use in the field of communications. This paper examines and compares two specific heuristic techniques: the Hopfield NN and the combinatorial evolution strategy (CES) concerning their application to a borrowing channel assignment (BCA) strategy in cellular networks. At first, a cellular mobile model is constructed. By considering specific assumptions, BCA becomes a combinatorial optimization problem and may be solved by these two specific methods. Simulation results, derived for uniform and nonuniform traffic distributions, are presented and show the ability of these heuristics to handle such problems
    Vehicular Technology Conference, 1998. VTC 98. 48th IEEE; 06/1998
  • I.S. Barbounakis, P. Stavroulakis
    [Show abstract] [Hide abstract]
    ABSTRACT: Duobinary coded minimum shift keying (MSK) makes use of partial response signalling to achieve an efficient power spectrum. Therefore, it is a suitable candidate for applications of digital data transmission where spectrum efficiency is an important consideration. On the other hand this type of signalling, apart from reducing the out-of-band radiation, helps increase the symbol error rate. Nonredundant error correction (NEC) as an error correction technique based upon the principle of phase continuity of a broad class of signals, has been extensively used with MPSK modulation schemes in order to improve the signal-to-noise ratio. A little more complex receiver structure consisting of a bank of differential detectors not only detects errors but it also affords to correct them without any bandwidth or power increase. The results are encouraging in environments which are contaminated with Gaussian noise, intersymbol interference as well as cochannel interference. In this paper, such a receiver of duobinary MSK is proposed. It, utilises the bit sequence detected from the phase difference between alternate signalling intervals, along with the output bit sequence of the conventional differential detector to improve the error rate performance in accordance with a convolutional error-correcting code concept. Hence, the application of NEC to duobinary FSK is proposed, analysed and theoretically evaluated in detail assuming an AWGN environment. Computer simulated results of BER performance of this scheme are given. Moreover, an extension of duobinary MSK for use of multilevel input data is proposed
    Global Telecommunications Conference, 1998. GLOBECOM 98. The Bridge to Global Integration. IEEE; 02/1998