
Georgios Tsaramirsis- Doctor of Philosophy
- King Abdulaziz University
Georgios Tsaramirsis
- Doctor of Philosophy
- King Abdulaziz University
About
79
Publications
26,231
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,114
Citations
Introduction
George Tsaramirsis currently works at the Department of Information Technology, King Abdulaziz University. George does research in Virtual reality, Robotics and software engineering
Current institution
Publications
Publications (79)
Recent advances in computing power triggered the use of artificial intelligence in image analysis in life sciences. To train these algorithms, a large enough set of certified labeled data is required. The trained neural network is then capable of producing accurate instance segmentation results that will then need to be re‐assembled into the origin...
The fourth industrial revolution, also known as Industry 4.0, has been impacted by the advancements of various technological areas, including microsatellites. The Internet of Space Things (IoST) and Space Sensor Networks (SSNs) are generally integrated into microsatellites as well as Internet of Things (IoT) devices that have recently been used in...
Drones have become more popular in recent years and this technology has dramatically advanced. Drones are starting to become essential tools in many operations such as surveillance, delivery, and more. A communication system is an essential challenge in drones that determines the drone’s capabilities of guiding, positioning, controlling, and transm...
Aerial manipulation of objects has a number of advantages as it is not limited by the morphology of the terrain. One of the main problems of the aerial payload process is the lack of real-time prediction of the interaction between the gripper of the aerial robot and the payload. This paper introduces a digital twin (DT) approach based on impedance...
Mobile robotics are currently designed to be worked in difficult and complicated conditions of applications such as disasters and dangerous areas in industries. Such types of robots need to protect themselves from damage against unexpected effects. In this paper we propose five different prosthetic parts, which can be installed on the mobile robots...
A Wearable Robotic Knee (WRK) is a mobile device designed to assist disabled individuals in moving freely in undefined environments without external support. An advanced controller is required to track the output trajectory of a WRK device in order to resolve uncertainties that are caused by modeling errors and external disturbances. During the per...
Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identifie...
Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Foru...
Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum...
Smart grids are popular areas of research as they are an essential component of smart cities, smart homes, IoT, and other popular research areas. Scientific experiments in smart grids may be conducted by researchers who may have limited experience in the field or limited budget or come from different disciplines. This paper is aimed for such a rese...
Simulation is an essential interactive computer tool that can be applied to monitor systems graphically. A simulation of motion is presented in this study to support the control of Segway Robot Transportation Platform (SRTP). The introduced system provides simulation of the SRTP using MATLAB. The nonlinear dynamic equations of the motion for the Se...
The process of controlling a Flexible Joint Robot Manipulator (FJRM) requires additional sensors for measuring the state variables of flexible joints. Therefore, taking the elasticity into account adds a lot of complexity as all the additional sensors must be taken into account during the control process. This paper proposes a nonlinear observer th...
Fabricating objects with desired mechanical properties by utilizing 3D printing methods can be expensive and time-consuming, especially when based only on a trial-and-error test modus operandi. Digital twins (DT) can be proposed as a solution to understand, analyze and improve the fabricated item, service system or production line. However, the dev...
A typical higher education institute classically has all the five major constituents, i.e. current students, alumni, faculty members, employers and industrial advisory board. Expectations of the rest of the constituents are fully dependent on the faculty members, as they play a pivotal and backbone role in building up an educational institute, to a...
The use of innovative and sophisticated malware definitions poses a serious threat to computer-based information systems. Such malware is adaptive to the existing security solutions and often works without detection. Once malware completes its malicious activity, it self-destructs and leaves no obvious signature for detection and forensic purposes....
Robotic manipulators are widely used in applications that require fast and precise motion. Such devices, however, are prompt to nonlinear control issues due to the flexibility in joints and the friction in the motors within the dynamics of their rigid part. To address these issues, the Linear Matrix Inequalities (LMIs) and Parallel Distributed Comp...
Robotic manipulators are widely used in applications that require fast and precise motion. Such devices, however, are prompt to nonlinear control issues due to the flexibility in joints and the friction in the motors within the dynamics of their rigid part. To address these issues, the Linear Matrix Inequalities (LMIs) and Parallel Distributed Comp...
The mobile malware is scaling up in terms of numbers and in degree of sophistication. The analysis of mobile malware is challenging for several reasons e.g., mobile apps are context aware and use the device resources which can pose greater risks for their security. In this work, a novel approach for the analysis of mobile malware is explored. The m...
Business and IT strategy alignment is a complex dynamic process in which organizations are in a position to enable extensive IT capabilities to achieve their business objectives. This interdependence is amplified by the COVID-19 crisis, which makes the integration of IT and business strategies more important than ever. This paper mainly aims to con...
The need for green energy and minimization of emissions has pushed automakers to cleaner transportation means. Electric vehicles market share is increasing annually at a high rate and is expected to grow even more. This paper aims to review the energy management systems and strategies introduced at literature including all the different approaches...
This paper proposed an innovative mechanical design using the Rocker-bogie mechanism for resilient Trash-Collecting Robots. Mask-RCNN, YOLOV4, and YOLOv4-tiny were experimented on and analyzed for trash detection. The Trash-Collecting Robot was developed to be completely autonomous as it was able to detect trash, move towards it, and pick it up whi...
During the last two years, the COVID-19 pandemic continues to wreak havoc in many areas of the world, as the infection spreads through person-to-person contact. Transmission and prognosis, once infected, are potentially influenced by many factors, including indoor air pollution. Particulate Matter (PM) is a complex mixture of solid and/or liquid pa...
This paper looks into the emerging trends of makerspaces and outsourced 3D printing services, and examines the natural progression between them. Also, by presenting survey empirical data, it investigates the reasons why individual users and enterprises have started to choose such services and the benefits acquired from this choice, that lead to the...
Demosaicking is the way toward reproducing a full hued picture from a deficient shaded picture. The single sensor doesn't catch all hues for a single pixel. To address this, a color filter array (CFA) is utilized to get a hued picture from a single sensor. The created picture from CFA is called a mosaic picture. In this research, we utilize special...
The autonomous navigation of an Unmanned Aerial Vehicle (UAV) relies heavily on the navigation sensors. The UAV’s level of autonomy depends upon the various navigation systems, such as state measurement, mapping, and obstacle avoidance. Selecting the correct components is a critical part of the design process. However, this can be a particularly di...
Aerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature o...
Due to the emergence of the novel human coronavirus disease (COVID-19), human life is jeopardized. Normal livelihood and economy have been disrupted due to safety concerns associated with the viral dissemination. The pandemic has instilled fear in people due to the lack of understanding and the impact an infection could have. In addition, laborator...
Smart grid data traffic behaves in a similar way to computer network data traffic and they are vulnerable to the same security risks. This paper presents a methodology for the real-time determination of adaptive estimates of router traffic-rate demand every five-minutes, as well as for the evolution of the estimated demand starting from zero during...
In this paper, a data mining model on a hybrid deep learning framework is designed to diagnose the medical conditions of patients infected with the coronavirus disease 2019 (COVID-19) virus. The hybrid deep learning model is designed as a combination of convolutional neural network (CNN) and recurrent neural network (RNN) and named as DeepSense met...
Over the last decade, a significant increase has been observed in the use of web-based Information systems that process sensitive information, e.g., personal , financial, medical. With this increased use, the security of such systems became a crucial aspect to ensure safety, integrity and authenticity of the data. To achieve the objectives of data...
Web scraping is the process of extracting data from web pages and it is an essential part for the generation of datasets. Currently the field is dominated by capable commercial applications, however, there is always a need for web crawling and web scraping applications for custom projects. Developing fit for purpose tools for retrieving and structu...
Monitoring what application or type of applications running on a computer or a cluster without violating the privacy of the users can be challenging, especially when we may not have operator access to these devices, or specialized software. Smart grids and Internet of things (IoT) devices can provide power consumption data of connected individual d...
Monitoring what application or type of applications running on a computer or a cluster without violating the privacy of the users can be challenging, especially when we may not have operator access to these devices, or specialized software. Smart grids and Internet of things (IoT) devices can provide power consumption data of connected individual d...
Featured Application
The results of this work have been used in a development of a prototype computer game.
Abstract
Computer-controlled virtual characters are essential parts of most virtual environments and especially computer games. Interaction between these virtual agents and human players has a direct impact on the believability of and immers...
Parkinson Disease (PD) is a kind of neural disorder that affects a range of people. This disease has continuously growing stages to halt entire neural activities of any people. There are many techniques proposed to detect and predict PD using medical symptoms and measurements. The medical measurements provided by different experiments must be effec...
Steganography aims to hide the messages from unauthorized persons for various purposes, e.g., military correspondence, financial transaction data. Securing the data during transmission is of utmost importance these days. The confidentiality, integrity, and availability of the data are at risk because of the emerging technologies and complexity in s...
Olfaction can enhance the experience of music, films, computer games and virtual reality applications. However, this area is less explored than other areas such as computer graphics and audio. Most advanced olfactory displays are designed for a specific experiment, they are hard to modify and extend, expensive, and/or can deliver a very limited num...
Algorithms for measuring semantic similarity between Gene Ontology (GO) terms has become a popular area of research in bioinformatics as it can help to detect functional associations between genes and potential impact to the health and well-being of humans, animals, and plants. While the focus of the research is on the design and improvement of GO...
Variant approaches used to release scents in most recent olfactory displays rely on time for decision making. The applicability of such an approach is questionable in scenarios like video games or virtual reality applications, where the specific content is dynamic in nature and thus not known in advance. All of these are required to enhance the exp...
Software Product Lines (SPLs) can aid modern ecosystems by rapidly developing large-scale software applications. SPLs produce new software products by combining existing components that are considered as features. Selection of features is challenging due to the large number of competing candidate features to choose from, with different properties,...
Although olfaction can enhance the user’s experience in virtual environments, the approach is not widely utilized by virtual contents. This is because the olfaction displays are either not aware of the content in the virtual world or they are application specific. Enabling wide context awareness is possible through the use of image recognition via...
The multilingual interface for C++project aims to help students at the early stages to learn programming while bypassing
the language barrier. Additionally, it can aid in the transfer of skills gained by the students to C++. The proposed interface utilizes
the pre-processor commands of C++ and offers a simplified syntax and translate the keywords...
Realization of navigation in virtual environments remains a challenge as it involves complex operating conditions. Decomposition of such complexity is attainable by fusion of sensors and machine learning techniques. Identifying the right combination of sensory information and the appropriate machine learning technique is a vital ingredient for tran...
Abstract:
Water distillation factories are crucial for many nations that depend on them for clean water. However, there are many approaches that can be used. From a business point of view, each of them has its own benefits and drawbacks. While more than one methods can be applied to the same problem some of them are more applicable than the others...
Software product lines (SPL) can speed up the production of software through the auto-generation of products and related subproducts, reducing the need for developer involvement. There are some proposals for defining the requirements for SPL, but they do not propose any method for identifying the eco-systems required for a successful life cycle of...
One of the key activities in software product line engineering (SPLE) is the software product management. The shared artifacts of the SPL management is focused on to enable software adaptation and reuse. Considerable improvements are expected in terms of the time it takes to take a product to market, improved flexibility, and reduction in costs, co...
The presence of faulty valves has been studied in literature with various machine learning approaches. The impact of using fault data only to train the system could solve the class imbalance problem in the machine learning approach. The datasets used for fault detection contain many independent variables, where the salient ones were selected using...
The business world nowadays is constantly on the lookout to adopt business frameworks which contribute in significant cost and resource usage efficiencies. Frameworks such as PRINCE2® and ITIL® are key players in the project management and service management arena. The definitions of models for these frameworks are high-level indicating a lack of f...
Objectives: The objective of this paper is to explore how mixed reality can be enhanced with actual understanding of the recognized objects. Methods: This paper will conceptually utilize a method called MEASUR semantic analysis and explain how it can improve the semantic understanding of the environment. The paper explains how a MEASUR Ontology Cha...
This paper describes a software tool aimed to improve teaching effectiveness. The tool is utilizing virtual reality technologies such as OCULUS RIFT, Virtual reality helmet and Unity3D game engine in an attempt to simulate a virtual classroom experience. The tool focuses on offering an asynchronous distance learning experience to the students via a...
Purpose
This paper aims to take the challenge to propose a novel modelling approach named Change Risk Assessment Model (CRAM), which will contribute significantly to the missing formality of business models especially in the change risk assessment area and decision-making. Organisational change risks are assessed with the aid of analytic hierarchy...
The primary aim of this project is to investigate if various every day human activities can be replaced by autonomous intelligent systems. Robotics, initially designed for assisting people, turned out to be much expensive for small but time consuming home activities. The challenge in this project is to prove that even with low cost gear an intellig...
Water distillation factories are crucial for many nations that depend on them for clean water. However, there are many approaches that can be used. From a business point of view, each of them has its own benefits and drawbacks. While more than one methods can be applied to the same problem some of them are more applicable than the others depending...
Smart parking can be regarded as a part of IoT application using wireless sensors nodes. The scope of this paper is to present a smart parking solution utilizing a min-max detection algorithm. Based on this algorithm, we performed an experiment using a smart parking area in a Smart City in Riyadh, Saudi Arabia. Numerical results presented, verify 9...
MEASUR Ontology Charts are used over the past 30+ years to elicit and specify user's requirements in an accurate and precise form. However, these models are hard to develop manually as they require the analyst to go through documentation, usually written in a natural language and identify all the actors, entities and associations of the system. Thi...
This paper study the applicability of the SCRUM agile project management methodology to teams that contain humans and other intelligent entities such as robots, non-playable characters in video games and other autonomous intelligent systems. The paper includes an example that shows how humans and autonomous intelligent systems can work together in...
The router through traffic load tools which monitor network links, such as Multi Router Traffic Grapher (MRTG), gives information for the aggregate or cumulative sum (CUMSUM) values of the user’s bandwidth demand at the end of regular intervals, starting with a low handshake value at the beginning of every interval. However, there is no information...
The gene encoding cystatin E/M, CST6, is a Class II tumor suppressor. Using bioinformatics tools for database mining and virtual gene expression profiling, the authors showed that CST6 is differentially expressed in various types of cancer. Moreover, epigenetic silencing mediated by hypermethylation of the CpG island located at the CST6 promoter wa...
MEASUR's Semantic Analysis is a method for requirements analysis and representation. Semantic Analysis appears to have a number of benefits to information systems development. Among its main strengths is that it produces stable software design that is easy to be expended to accommodate future changes. However, it is not widely used, mainly because...
MEASUR’s ontology charts are the product of MEASUR’s semantic analysis; a requirements analysis method used to capture the ontological dependencies of an information system. These charts can be transformed to databases and to database schemas, class diagrams, component architecture diagrams and prototype systems. This paper shows how MEASUR’s ontol...
The science of modem project management is not new and what seems to have changed over the past decade are the ways of applying theory into practice. This has had as a consequence the need to standardise and structure different project management methods in a detailed, documented and formal manner. On the other hand, change management mostly observ...
Risk Management has been at the heart of every kind of project; from its simplest form to its
most complex structure. Best practice in project management dictates that the creation and
maintenance of a Risk Register is a must-have in order to monitor and control risks throughout
the endeavour of achieving project targets. The absence of Risk Manage...
Project Management has long established the need for risk management techniques to be utilised in the succinct identification and mitigation of associated risks in projects. Such techniques aim at the reconciliation of countervailing project activities to reduce scope creep, increase the probability of on-time and within-budget delivery. Uncontroll...
Counter controlled and condition controlled are main categories of iterative statements, with "for", "while" and "do while" loops dominating the field. While there are clear distinctions between them, it is not uncommon for a programmer to practically convert a condition controlled loop to do counter controlled task or vice versa. For instance, the...
Cloud Computing is an on-demand suite of infrastructure, server,
storage, applications and information, which anybody, individuals,
businesses or corporations can rent for a fee. Introduction of Cloud
Computing has created a technological storm, similar to the mobile
communication technology in the first decade of the 21st century. As
the readily a...
UML2 Component diagrams are mainly used to provide information about the technical architecture of the information system. The paper shows how a component diagram can be auto-generated from an ontology chart evolved from Semantic Analysis. A crowd management case study has been selected for its complexity and its capacity to illustrate all the prop...
Model Driven Architecture (MDA) is one of many competing techniques that have the potential to contribute towards the development of better software systems. However the business support at Computation-Independent Model (CIM) level does not necessarily allow the development teams to utilize its power and it might become difficult to bridge the gap...
Semantic analysis (SAM) is a business analysis method designed to capture system requirements. While these requirements may be represented as text, the method also advocates the use of ontology charts to formally denote the system's required roles, relationships and forms of communication. The method works as follows: initially the problem must be...
MDA has been well developed and nowadays many tools allow the transformation of a Platform Independent Model to P latform Specific Model and moreover to programming code. MDA is based on the assumption that the PIM is valid and it accurately reflects the system to be as well as that the target system will add value to the business. However none of...