Dimitrios A. Karras

Dimitrios A. Karras
Verified
Dimitrios verified their affiliation via an institutional email.
Verified
Dimitrios verified their affiliation via an institutional email.
National and Kapodistrian University of Athens | uoa · General

Prof.

About

315
Publications
25,649
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,645
Citations
Introduction
Prof. D.A. Karras, PhD holds Diploma,M.Sc.&PhD Electrical&Electronic Eng. from NTUA,Greece. He is with the National & Kapodistrian University of Athens, Greece, School of Science, Dept. General, Assoc.prof. Intelligent and Distributed Systems, Digital Systems and Signal Proc. He has >95 refereed journal publications and >195 in refereed Conferences. Editor in chief of several journals. He has >3400 citations, H/G-indices 26/71 (Google Scholar), in the top 5% of researchers (ResearchGate).
Additional affiliations
September 2002 - July 2010
Hellenic Open University
Position
  • Visiting Prof. Informatics and Networking
March 2004 - present
Technological Educational Institute of Chalkida
Position
  • Prof. Digital Systems
October 2002 - July 2010
Hellenic Open University
Position
  • Communication Networks
Education
June 1989 - January 1995
National Technical University of Athens
Field of study
  • Electrical Engineering and Computer Science
November 1977 - February 1985
National Technical University of Athens
Field of study
  • Electrical Engineering, Telecommunications

Publications

Publications (315)
Article
Full-text available
A new approach is presented to neural network simulation and training that is based on the use of general purpose optimization software. This approach requires that the training problem should be formulated as the minimization of a cost function of the network weights. This cost function is a user written code called by the optimization system, whi...
Article
Full-text available
This paper aims at investigating a novel solution to the problem of defect detection from images, that can find applications in the design of robust quality control systems for the production of furniture, textile, integrated circuits, etc. The suggested solution focuses on detecting defects from their wavelet transformation and vector quantization...
Article
Full-text available
This paper aims at investigating a novel solution to the problem of defect detection from images using the Support Vector Machines (SVM) classification approach, that can find applications in the design of robust quality control systems for the production of furniture, textile, integrated circuits, etc. The suggested solution focuses on detecting d...
Article
Full-text available
We present an approach to the detection of tumors in colonoscopic video. It is based on a new color feature extraction scheme to represent the different regions in the frame sequence. This scheme is built on the wavelet decomposition. The features named as color wavelet covariance (CWC) are based on the covariances of second-order textural measures...
Article
paper suggests a novel methodology for building robust information processing systems based on wavelets and Artificial Neural Networks (ANN) to be applied either in The efficiency of such systems is increased when they simultaneously use input information in types of input.
Article
Full-text available
Population growth has led to the increase of different types of medication, burden on nurses and pharmacy clerks. Studies have shown that on an average a person takes about five different types of medication for any illness. This medication has led to several other medication errors as the patient is taking wrong medicine at the wrong time in a day...
Article
Full-text available
Developments in the medical field have opened the opportunity to conduct analyses on a personalized patient level. One of the important analyses that can be conducted is the cellular response to engineered materials, and the most appropriate non-invasive methods are imaging. These images of the cells are unstained brightfield images, as they are ac...
Article
Full-text available
Purpose – My goal in conducting this study is to clarify and present the relationship and strong connections between the innovation index and the B2C E-Commerce index worldwide, as a response to the new normalcy, because innovation and B2C E-commerce issues, as well as quality and quality management, have been subject to an increasing interest all...
Article
Corruption is a very negative phenomenon, which distorts markets and harms economic growth. Corruption has its side of supply and demand. Both supply and demand for corruption are influenced by many factors. The purpose of this article is to identify some macroeconomic and institutional factors that lead to the demand for corruption in the Western...
Conference Paper
In the quickly changing world of blockchain technology, it is critical to guarantee the security of the self-executing contracts, written in programming languages like Solidity called smart contracts. Not all security vulnerabilities in smart contracts will be found by human code reviews and security audits using traditional methods. Deep learning...
Book
This volume comprises the select proceedings of the 3rd International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC 2023). The content focuses on big data and cloud computing and the application of artificial intelligence, robotics and engineering, the Internet of Things, and sensor technology. Some of the topics covere...
Chapter
Nowadays, Metaverse continues to be a boon for virtual space. The word Metaverse was coined by Neal Stephenson in his science fiction novel “Snow Crash.” It has become the next iteration of the internet. Metaverse is defined as a distinct, ubiquitous, deeply engaged, insistent, 3D virtual space where we can virtually create a life better than the p...
Article
In this article we report a novel TE01δ Dielectric Resonator which is excited by a modified spilt ring resonator. Unlike traditional dielectric resonators which require specialist fabrication techniques to achieve precise High-Q dielectric properties the proposed method simply relies on the design of TE01δ Dielectric Resonator on FR4 material and m...
Article
This study presents a method for measuring the permittivity of dielectric materials using a whispering gallery mode ring resonator. By detecting changes in coupling resulting from variations in resonant frequency caused by alterations in dielectric constant, the method offers a reliable means of characterizing dielectric properties. Operating withi...
Poster
Full-text available
Book title: Wireless Sensor Networks in Agriculture and Food Industries Tentative table of contents  Utilization of Processing Technologies  Application of Radio Frequency Identification (RFID) Technology for Ensuring the Quality and Safety of Products  Artificial Intelligence as an Innovative Technology in Food Industry  Application of Wireles...
Article
Full-text available
Parasites continue to plague the world with millions of victims. Malaria is a frequent and serious parasite infection, especially in tropical areas, caused by Plasmodium and spread by mosquitoes. Protozoan parasites spread cryptosporidiosis and giardiasis through contaminated food and water. Both disorders cause gastroenteric symptoms of varying in...
Article
Full-text available
The purpose of this article is to identify some macroeconomic and institutional factors that lead to the demand for corruption in the Western Balkans. Corruption is a very negative phenomenon that distorts markets and harms economic growth. Corruption has its side of supply and demand. Both the supply and demand for corruption are influenced by man...
Chapter
The aim of this paper is to investigate and discuss issues on the design and performance evaluation of Android applications concerning alarming systems that would serve users in emergency or dangerous situations to be able to send text messages in real time giving information about their location and about their needs in searching for help. The use...
Poster
Full-text available
Title of the Book: “Revolutionizing Healthcare: AI Integration with IoT for Enhanced Patient Outcomes” In this age of progress, the combination of Artificial Intelligence (AI) and the Internet of Things (IoT) has emerged as a game changer, in the healthcare sector. This book aims to delve into the impact that the convergence of AI and IoT can have...
Book
Full-text available
Nowadays, we are seeing a host of powerful IoT technologies, Big Data Solutions, AI algorithms, Machine Learning models, and Deep Learning frameworks, Cloud storages, Cybersecurity aimed at replicating or replacing the human brain capabilities in computing and communication devices. Therefore, human is eager to leverage the most multi-faceted IoT-b...
Chapter
Pragmatic Internet of Everything (IOE) has emerged as a powerful paradigm for representing and solving complex problems. This reference demonstrates how to coordinate behaviour among a collection of semi-autonomous problem-solving agents: how they can coordinate their knowledge, goals and plans to act together, to solve joint problems, or to make i...
Poster
Full-text available
Solutions for Industrial Internet of Things (IIoT) Sustainability: Over the past few years, IoT has become ubiquitous across a wide range of industries. The Internet of Things has proven its worth by facilitating low-cost, high-efficiency communication between things and devices, thus enhancing our society and industries. The Internet of Things is...
Article
Sustainable development is nowadays a key concern and major issue in scientific, political and decision making discussions in national and international organizations, enterprises and societies at all levels. Moreover, it has been emerged as a major multidisciplinary research field for all sciences including formal sciences, natural sciences, engin...
Conference Paper
Presently, the global proliferation of Internet of Things (IoT) devices and applications has accelerated owing to their advantages in enhancing the business and industrial environment, as well as the daily lives of individuals. Nevertheless, IoT devices are vulnerable to malevolent network traffic, which can lead to undesirable outcomes and disrupt...
Chapter
The book aims to provide a deeper understanding of the synergistic impact of Artificial intelligence (AI) and the Internet of Things (IoT) for disease detection. It presents a collection of topics designed to explain methods to detect different diseases in humans and plants. Chapters are edited by experts in IT and machine learning, and are structu...
Article
Full-text available
In nowadays, communications are expanding in very high rates. New technologies are being born and some of them are taking so much importance in people’s lives. In a situation where people’s needs are getting more complicated and everybody’s lifestyle is advancing to another level, bigger and better infrastructure is needed. Managing all this proces...
Article
Full-text available
In nowadays, communications are expanding in very high rates. New technologies are being born and some of them are taking so much importance in people’s lives. In a situation where people’s needs are getting more complicated and everybody’s lifestyle is advancing to another level, bigger and better infrastructure is needed. Managing all this proces...
Article
Conventional lifestyles and working methods are motivated by rising trends and new technologies to form smart cities. Distributed chains are growing to computerize with a highly complicated framework. It is becoming an essential source of additional advantages in today's digital and smart city. Customers or users of smart cities are highly concerne...
Conference Paper
Full-text available
Sustainable Development Goals were adopted by countries in 2016, as a way to fight poverty, protect the planet and ensure sustainable de­velopment, while Foreign Direct Investments are inflows of investments that are very important for host countries, especially those in development. They enable the transfer of technology, create new jobs, provide...
Article
Full-text available
In this paper, optimisation models and heuristic algorithms that address the off-line survivability-supported Traffic Engineering (TE) problem in multi-service backbone networks are presented. In such networks traffic demands with different Quality of Service (QoS) and survivability requirements (e.g. existence of a node disjoint backup path for ea...
Conference Paper
There will be nine billion people on the planet by the year 2050, according to most estimates, thus agricultural output must rise steadily. In order to deal with the increasing population, agricultural chores must be mechanized and automated. The autonomous and safe navigation of ground robots has been one of the most difficult challenges in their...
Conference Paper
Intelligent Systems are of many types. This work focuses mainly about the autonomous drones and UAVs. Only for military objectives were Unmanned Aerial Vehicles (UAV) invented and developed. They have lately increased in use, nevertheless, in the civil applications this study shall examine. This technology has a wide range of applications, includin...
Conference Paper
The boom of the technological area has given rise to numerous new applications that actually rule the entire world. Some of them mainly are the social media networks like the Twitter, Gmail and Facebook. Lot of text and content are received to millions of people across the work. It has become very essential to be surer whether the content is fake,...
Conference Paper
Floods are the most common natural disaster. This is because the climate is changing a lot and there aren't enough dams. Every year, floods cause a lot of damage to people, animals, and property. The first 72 hours after a disaster are the most important and life-threatening. This means that rescue efforts must start right away and move quickly. Fo...
Article
Full-text available
Recent years have seen a surge in interest in the investigation of various recommender systems that are based on social networks. Because users' preferences are likely to be similar to or influenced by those of their connected friends, the integration of the social relationships that already exist between users has the potential to improve the accu...
Article
Full-text available
Data Science and Artificial Intelligence play a major role in the nowadays fourth industrial revolution of Robotics, Artificial Intelligence and big Data. The purpose of this editorial is to identify the progress, the trends, the open problems and challenges of these research fields in a comprehensive way, so that an overview is provided that would...
Conference Paper
According to ISOC reports, IPv6 deployment continues to increase around the world. Nowadays, IPv6 growth is increasing exponentially thanks to its new features: more efficient routing, a huge number of IP addresses, more secure end-to-end connectivity, high quality of service, easy network configuration, etc. According to the RIPE NCC website IPv6...
Article
Full-text available
Recent technological developments indicate possible advancements in supply chain management (SCM). These innovations have attracted a lot of interest from industries including logistics, manufacturing, packaging, and transportation. The conventional systems, however, use centralised servers to control all operations, including the exchange of raw m...
Article
Full-text available
Background: The advancement of cancer research has been facilitated through freely available cancer literature, databases, and tools. The age of genomics and big data has given rise to the need for cooperation and data sharing in order to make efficient use of this new information in the COVID-19 pandemic. Although there are many databases for canc...
Article
Full-text available
Channel bonding is considered by the IEEE 802.11ac amendment to improve wireless local area network (WLAN) performance. In this article, the channel bonding and aggregation method were proposed to increase wireless local area network performance (WLANs). It combines many channels (or lanes) to boost the capacity of modem traffic. Channel bonding is...
Article
Full-text available
In the last few years, a great deal of interesting research has been achieved on automatic facial emotion recognition (FER). FER has been used in a number of ways to make human-machine interactions better, including human center computing and the new trends of emotional artificial intelligence (EAI). Researchers in the EAI field aim to make compute...
Article
Full-text available
Nowadays, traffic congestion and increasing road accidents have become a major concern for both developed and developing countries. To overcome this challenge, an internet of things- (IoT-) based Vehicular Ad Hoc Network (VANET) system is proposed in which vehicles interact with other vehicles and infrastructure. These self-organized ad hoc vehicle...
Article
Full-text available
One of the most difficult challenges of multimedia transmission during the last two decades has been the retrieval of degraded or missing regions of images and videos while maintaining satisfactory perceptual accuracy. The objective is to retrieve lost data by using the similarity between frames. Usually, error concealment (EC) schemes depend on re...
Article
Full-text available
To improve the speed of global optimization algorithm, a class of global optimization algorithms for intelligent electromechanical control system with improved filling function is proposed. By attaching the intelligent managing system improving algorithm and the filling function procedure, the algorithm can stand out from the current particular opt...
Article
Full-text available
The aim of this research is to solve the problem that the intrusion detection model of industrial control system has low detection rate and detection efficiency against various attacks, a method of optimizing BP neural network based on Adaboost algorithm is proposed. Firstly, principal component analysis (PCA) is used to preprocess the original dat...
Article
Full-text available
Nowadays it has become more and more important to reach a destination in a short time, in the shortest path between all the options and possibilities. This need is addressed by different search engines like google maps for example and it is common sense that the user is expecting the result in the least amount of time. The scope of this publication...
Article
Full-text available
Background: The advancement of cancer research has been facilitated through freely available cancer literature, databases and tools. The age of genomics and big data has given rise to the need for cooperation and data sharing in order to make efficient use of this new information in the COVID-19 pandemic. Although there are many databases for canc...
Preprint
Full-text available
BACKGROUND The advancement of cancer research has been facilitated through freely available cancer literature, databases, and tools. The age of genomics and big data has given rise to the need for cooperation and data sharing in order to make efficient use of this new information in the COVID-19 pandemic. Although there are many databases for cance...
Preprint
Full-text available
The aim of this research is to solve the problem that the intrusion detection model of industrial control system has low detection rate and detection efficiency against various attacks, a method of optimizing BP neural network based on Adaboost algorithm is proposed. Firstly, principal component analysis (PCA) is used to preprocess the original dat...
Article
Full-text available
Web 2.0 has given to all people the right to become a representative of a huge cast of informal media. The importance of this power is getting more evident everyday. Every social media actor can influence the rest of the world by one’s own opinions, feelings, and thoughts generously shared on multiple media. This information belonging to various fi...
Article
Full-text available
1) Background: Nowadays, technological advancement plays a key role in the economic uplift of developing countries, and it is paramount that the youth of these countries are well-equipped with both vocational and technical skills to bring about sustainability in their careers. (2) Methods: The present study aims to investigate the perception gap be...
Conference Paper
The art of hiding a secret message and transmitted to a receiver known as Steganography. So, that eavesdropper cannot find the content of message. The main aim of Steganography is unauthorized person cannot access the message. So, the information can be transmitted from sender to receiver without any detection by hackers. Cryptography technique in...
Chapter
The understanding of Business Process modelling is an essential approach for an Organization or Enterprise to achieve set objectives and improve its operations. Recent development has shown the importance of representing processes to carry out continuous improvement. One important aspect of enterprise modelling is actually its involvement in compet...
Article
Full-text available
This paper presents an experimental analysis and discussion on implementation issues with regards to the performance of message authentication algorithms in embedded applications. Two such algorithms, namely, MD5 and SHA-1 are investigated when implemented into two different platforms: 1. 32-Bit Processors (Intel processor (Pentium III processor at...
Article
Full-text available
It is known that OFDM and CDMA modulation techniques are used in modern wireless communication networks as important modules of the relevant transmitters and receivers. There are several reports in the literature comparing these techniques in different conditions and simulation setups making quite difficult the overall cross-comparison. The goal of...
Conference Paper
Although Business process modelling is an increasingly popular research area for both organisations and enterprises due to its usefulness in optimizing resources management, business reengineering and business performance, it is not yet widely accepted in Small and Medium size Enterprises (SMEs), which are vital for sustainable economy development....
Article
Full-text available
While cloud computing infrastructures proliferates in nowadays computing and communications technology there are few reports investigating models for their security. In this paper, new efficient models are developed and evaluated for analyzing the security-related behavior of cloud computing architectures and networks comprising complex interconnec...
Article
Full-text available
A novel non-linear signal prediction method is presented using non linear signal analysis and deterministic chaos techniques in combination with an improved local reconstruction methodology and multi-layer neural networks for a diode resonator chaotic circuit generated time series forecasting. Multisim is used to simulate the circuit and show the p...
Chapter
Wireless Sensor Networks (WSNs) have a plethora of modern applications in our world and are also very promising and suitable for future applications. Critical issues such as clustering, organization, event scheduling (for transmitting and receiving), power consumption, routing, time response, etc., have been studied and analyzed in the literature....