
Klimis Ntalianis- University of West Attica
Klimis Ntalianis
- University of West Attica
About
106
Publications
19,340
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
551
Citations
Introduction
Current institution
Publications
Publications (106)
Several of our Czech colleagues have brought to our attention a publication available at [1]. We wish to express our concern regarding the inclusion of references to WSEAS in this publication. These references are factually incorrect and misleading. In reality, WSEAS has no connection to the content or context described. The report, titled “Predato...
This report examines the "WSEAS Transactions on Power Systems" to determine whether it meets the criteria of a legitimate, highquality scientific journal. By analyzing its editorial policies, peer review process, indexing status, impact factor, and expert testimonials, this study establishes that the journal is not predatory but rather a reputable...
WSEAS has shifted away from directly publishing conference proceedings, they collaborate with reputable publishers like IEEE for certain conferences. Historically, WSEAS published its own conference proceedings. However, recent information indicates that WSEAS no longer publishes conference proceedings directly. Instead, they recommend conferences...
Critical infrastructures play a central role in the welfare of contemporary societies and they should properly function 24/7. Since their role is so important, they regularly become targets of malicious parties, terrorists, industrial spies, and even hostile governments. In this paper, the scenario of cyber or physical attacks to CIs from tiny auto...
Protection of urban critical infrastructures (CIs) from GPS-denied, bomb-carrying kamikaze drones (G-B-KDs) is very challenging. Previous approaches based on drone jamming, spoofing, communication interruption and hijacking cannot be applied in the case under examination, since G-B-KDs are uncontrolled. On the other hand, drone capturing schemes an...
The purpose of this study is to investigate health care consumers' perceptions of the presence of a smartphone application that provides: (a) information on the waiting time in the Emergency Department (ED), (b) the available medical specializations per hospital, and (c) guidance in emergency instances.The study's sample included 121 people who use...
Presents research works in the field of sentiment analysis and deep learning
Provides original works presented at ICSADL 2022 held in Songkhla, Thailand
Serves as a reference for researchers and practitioners in academia and industry
Balancing energy consumption to prolong the life of a wireless sensor network is a challenging issue for researchers. Most of the energy of a sensor node is consumed in transmitting the data from the sensor node to sink and receiving data from other sensor nodes in multi-hop transmission. That is because the energy consumption is directly proportio...
This paper focuses on new technologies in education, especially aesthetics and cosmetology. The rapid development of technology and the pandemic of Covid19 demonstrated the need for the integration of information and communication technologies (ICT), supporting the educational practice and changing the traditional way of learning. At the same time...
We will try to prove in this study that WSEAS does not have any relation with fake and predatory publishers. In this article we use the criteria of Megan O'Donnell in the web site https://instr.iastate.libguides.com/predatory/id for Predatory Publishers, [1] .Mihiretu Kebede, Anna E. Schmaus-Klughammer and Brook Tesfaye Tekle in their recent articl...
In the last decades, some publishers are intensively exploiting the model of open access publishing. During the last several years, studies have shown that there was a substantial increase in the number of fake publishers and hijacked journals. These cyber criminals make money by stealing the identities of legitimate journals and collecting the art...
Critical infrastructures are assets of invaluable importance, essential for the whole world. Since they serve core functions of our societies, they often become targets of terrorists. Many critical infrastructures are vulnerable, due to their short distance from public roads and in the past years, several vehicle-bomb incidents have been recorded....
In this paper, the parameters that shape online reputation of a company and the two-way relation between the effect reputation has on consumer behavior and the effect consumer behavior has on reputation are examined. The contribution of this work lies in the fact that it concerns Greek consumers. Moreover, it is important to highlight the particula...
This book is a collection of papers presented at the International Conference on Intelligent Computing, Information and Control Systems (ICICCS 2020). It encompasses various research works that help to develop and advance the next-generation intelligent computing and control systems. The book integrates the computational intelligence and intelligen...
This article discusses the concept of blockchain and its application to public administration research as a tool to increase trust in the government. The contribution of this article is that it unveils the advantages and disadvantages of blockchain so that both decision-makers (who intend to adopt this innovative technology to increase the transpar...
Purpose-The purpose of this paper is to contribute to the exploration of crowdsourcing's usage in the public sector by tracings its conceptual structure, application's advantages and potential adoption from the government's or the citizen's side. Design/methodology/approach-A systematic narrative literature review is the suggested method, which cap...
The current article discusses the concept of government as a service through the use of cloud computing which is managed from a public community, such as the citizens of a municipality. It suggests a potential architecture of a gamified community cloud in order to transform cloud computing management to an enjoyable and valuable experience. The arc...
The Conference MMCTSE 2020 was in collaboration with the Journal “WSEAS Transactions on Business and Economics”. In this paper, the Metrics, the Peer Review and some statistical results of this Journal: “WSEAS Transactions on Business and Economics” is outlined.
In recent years there has been a growing demand for online services. These web services include online shopping and booking, internet telephony, audio and video streaming, email, social networking, information retrieval and more. In an effort to meet the ever increasing demands of these various applications, the e-service providers strive to provid...
From past decades, Computational intelligence embraces a number of nature-inspired computational techniques which mainly encompasses fuzzy sets, genetic algorithms, artificial neural networks and hybrid neuro-fuzzy systems to address the computational complexities such as uncertainties, vagueness and stochastic nature of various computational probl...
This book presents the proceedings of the International Conference on Computing Networks, Big Data and IoT [ICCBI 2019], held on December 19–20, 2019 at the Vaigai College of Engineering, Madurai, India.
Recent years have witnessed the intertwining development of the Internet of Things and big data, which are increasingly deployed in computer netwo...
The mobile revolution is changing the way we interact with the people and things around us. Proximity awareness, the ability to actively/passively and continuously search for relevant value in one’s physical/virtual proximity, is at the core of this phenomenon.
In this paper an innovative geographical locations’ rating scheme is presented, which is based on crowdsensing and crowdsourcing. People sense their surrounding space and submit evaluations through: (a) a smartphone application, and (b) a prototype website. Both have been implemented using state-of-art technologies. Evaluations are pairs of feeling...
Purpose
This paper aims to propose an elementary approach towards the measurement of a globoidal cam profile used in an automatic tool changer (ATC) of computer numerical control (CNC) machines.
Design/methodology/approach
A simple and unique online method has been designed for the profile metrology of the cam. This simple methodology will repla...
Crowdsourcing has been extensively used in the private sector and recently adopted by the public sector. The current paper discusses the use of the mobile crowdsourcing in the public administration from both managerial and technological perspectives by exploring its current use and research challenges. The authors classify the mobile crowdsourcing...
During the last decade Twitter has undergone a massive growth and several algorithms have been proposed for analysing its content. A common challenge is identifying user interests. In this work, we focus on personalizing the consumption of tweets by taking into consideration the tweets profile of each user (average tweet). In particular for each us...
The evolution of artificial intelligence boosts its usage in the private sector, however the public sector seems to lag behind. There are specific reasons which prevent the public servants and the citizens from using this innovative technology. This paper first identifies the advantages and potential challenges for the implementation of the artific...
This book reports on advanced theories and methods in three related fields of research: applied physics, system science and computers. The first part covers applied physics topics, such as lasers and accelerators; fluid dynamics, optics and spectroscopy, among others. It also addresses astrophysics, security, and medical and biological physics. The...
This book reports on advanced theories and methods in three related fields of research: applied physics, system science and computers. It is organized in three parts, the first of which covers applied physics topics, including lasers and accelerators; condensed matter, soft matter and materials science; nanoscience and quantum engineering; atomic,...
Internet of Things (IoT) technology enables the transformation of urban habitation towards Smart Cities. 70% of human habitation will live in Smart Cities by 2050. IoT is the backbone technology of Smart Cities enabling new services through certain structural parameters. One such parameter is the smart way of living which aims in providing all the...
Internet of Things (IoT) enables Smart Cities (SC) with novel services for the citizens’ well-being. A Smart Parking (SP) system is an important part of the SC infrastructure, which enables the efficient handling of the demanding SC traffic congestion conditions. Such a system also protects the urban environment towards a green ecosystem. In this p...
A large number of companies, organizations and other entities collect and elaborate personal data from people, which are frequently published for research or other promotional purposes. This paper deals with the effective anonymization, in applications that store data in relational databases. The optimum choice of a privacy model along with its app...
With reference to the current issue of energy efficiency of residential buildings, the aim of this research is to analyze the possible influence of the energy performance component on the property prices formation. The study sample consists of two hundred residential units recently sold and located in the city of Bari (Italy). The implemented metho...
The current paper explores the implementation of gamification in the government as a way to win back trust from the citizens. The motivation of the citizens to interact with the public authorities through e-government, requires a suitable gamification framework. Octalysis framework is chosen among the available gamification frameworks due to its mo...
As regards the assessment of the market values of properties that compose real estate portfolios, in this research an automated valuation model has been proposed and tested. In particular, the method defined allows to provide for objective, reliable and "quick" valuations of the assets in the phases of periodic reviews of the property values.
Aimin...
Earth population is moving towards urban areas forming Smart Cities (SC). Waste management is a component of SCs. We consider a SC which contains a distribution of waste bins and a distribution of waste trucks located in the SC sectors. Bins and trucks are enabled with IoT sensors and actuators. Prior approaches focus mainly on the dynamic scheduli...
In this paper, a new representation for the chi-squared distribution has been derived over wireless sensor networks (WSN). The underlying correlated data proliferation protocols have strong influence on performance of the deployed system. A proposed model has been deployed to investigate the WSN system over the data proliferation aspect. Initially,...
This book reports on advanced theories and methods in three related fields of research: applied physics, system science and computers. It is organized in two main parts, the first of which covers applied physics topics, including lasers and accelerators; condensed matter, soft matter and materials science; nanoscience and quantum engineering; atomi...
Smartphone sensing enables efficient Time-of-Arrival (ToA) estimation of moving cyclists towards traffic lights in a Smart City. GPS sensors locate the actual position of cyclists on their way to traffic lights. Since the constant use of GPS sensors drain the battery of the smartphones there is a need of efficient energy consumption techniques. In...
In this paper a mass appraisal methodology for the periodic reviews of the market values of special properties that constitute the asset balance of relevant real estate portfolios has been developed. Using the information published by Italian databases, a study sample of office properties of medium and large size, located in the city of Milan (Ital...
In this paper a novel content relatedness algorithm for social media content is proposed, based on the Explicit Semantic Analysis (ESA) technique. The proposed scheme takes into consideration social interactions. In particular starting from the vector space representation model, similarity is expressed by a summation of term weight products. In thi...
Plain rotation, scaling, and/or translation (RST) of an image can lead to loss of watermark synchronization and thus authentication failure with standard techniques. The block-based approaches in particular, albeit strong against frequency and cropping attacks, are sensitive to geometric distortions due to the need for repositioning the blocks’ rec...
In this paper an innovative social media content ranking scheme is proposed. The proposed unsupervised architecture takes into consideration user-content interactions, since social media posts receive likes, comments and shares from friends and other users. Additionally the influence of each user is modeled, based on the centrality theory. Towards...
During the last decade social media have greatly flourished, reaching rapidly the amazing figures of today. According to the Search Engine Journal (http://www.searchenginejournal.com/25-insane-social-media-facts/79645/): (a) currently 684,478 pieces of content are shared on Facebook every minute, (b) people are spending 1 out of every 7 minutes on...
In this paper, online human life summarization is performed, based on multimedia content, published on social media. The life summaries are also automatically annotated with events, persons, places etc. Towards this direction, initially a content preparation module is activated that includes an intelligent wrapper. The content preparation module sc...
In this paper two efficient unsupervised video object segmentation approaches are proposed and thoroughly compared in terms of computational cost and quality of segmentation results. Both methods are based on the exploitation of depth information, estimated for stereoscopic pairs of frames. In particular, in both schemes an occlusion compensated di...
In this paper two efficient unsupervised video object
segmentation approaches are proposed and thoroughly
compared. Both methods are based on the exploitation of
depth information, estimated from stereoscopic pairs. Depth
is a more efficient semantic descriptor of visual content, since
usually an object is located on one depth plane. However,
depth...
The success of contemporary surveillance systems depends on their cost and their ability to automatically and correctly interpret events that take place in an observed environment. Correct decisions enhance the situation awareness of an operator, while wrong ones lead to false or no alarms, damaging the system's credibility. In this paper a low-cos...
In this paper a fully automatic scheme for embedding visually
recognizable watermark patterns to video objects is proposed.
The architecture consists of 3 main modules. During the first
module unsupervised video object extraction is performed, by
analyzing stereoscopic pairs of frames. In the second module
each video object is decomposed into three...
An automatic video-object oriented steganographic system is proposed for biometrics authentication over error-prone networks. Initially, the host video object is automatically extracted through analysis of videoconference sequences. Next, the biometric pattern corresponding to the segmented video object is encrypted by a chaotic cipher module. Afte...
This paper proposes an integrated framework for analyzing human actions in video streams. Despite most current approaches
that are just based on automatic spatiotemporal analysis of sequences, the proposed method introduces the implicit user-in-the-loop
concept for dynamically mining semantics and annotating video streams. This work sets a new and...
In this article, a prototype Greek text to Greek Sign Language (GSL) conversion system is presented. The system is integrated into an educational platform that addresses the needs of teaching GSL grammar and was developed within the SYNENNOESE project (Efthimiou et al. 2004a. Developing an e-learning platform for the Greek sign language. In: K. Mie...
Current low-level feature-based CBIR methods do not provide meaningful results on non-annotated content. On the other hand
manual annotation is both time/money consuming and user-dependent. To address these problems in this paper we present an automatic
annotation approach by clustering, in an unsupervised way, clickthrough data of search engines....
Marketing campaigns are an important marketing process that support the communication of brands and products to the wide public. Although a campaign may be significantly different from another, the main steps have been outlined by marketing experts, making a formal representation of the campaign workflow possible. In this paper, we advocate that us...
This paper proposes an integrated framework for analyzing human actions in video streams. Despite most current approaches that are just based on automatic spatiotemporal analysis of sequences, the proposed method introduces the implicit user-in-the-loop concept for dynamically mining semantics and annotating video streams. This work sets a new and...
Many science and engineering problems can be formulated as optimization problems that are governed by contact distributions (multi-time Pfaff evolution systems) and by cost functionals expressed as multiple integrals or curvilinear integrals. Our paper ...
Content analysis technologies give more and more emphasis on multimedia semantics. However most watermarking systems are frame-oriented
and do not focus on the protection of semantic regions. As a result, they fail to protect semantic content especially in case
of the copy-paste attack. In this framework, a novel unsupervised semantic region waterm...
In this paper we address some of the issues commonly encountered in automatic image annotation systems such as simultaneous labeling with keywords corresponding to both abstract terms and object classes, multiple keyword assignment, and low accuracy of labeling due to concurrent categorization to multiple classes. We propose a hierarchical classifi...
A novel approach is presented in this paper for improving the performance of neural network classifiers in video object tracking applications, based on a retraining procedure at the user level. The procedure includes (a) a retraining algorithm for adapting the network weights to the current conditions, (b) semantically meaningful object extraction...
In this paper we present a novel approach for facilitating dyslexic children in learning to read fluently. We explain the motivation, general idea and initial results in terms of user requirements and system architecture. Unlike previously presented approaches, the aim of this system is to monitor the progress and perspectives of a dyslexic user an...
In this paper, an interactive framework for efficient browsing and transmission of video sequences is presented, based on an optimal content-based video decomposition scheme. In particular each video file is analyzed to provide a multiscale structure of different "content resolution levels". This structure can be seen as a tree structure, each leve...
We describe a neuron multi-layered architecture that extracts landmark points of high curvature from 2d shapes and resembles
the visual pathway of primates. We demonstrate how the rotated orientation specific receptive fields of the simple neurons
that were discovered by Hubel and Wiesel can perform landmark point detection on the 2d contour of the...
A novel human video object watermarking scheme is proposed in this paper, providing copyright protection of semantic content.
The proposed method focuses on the existence of face and body regions within an initial image, however other cases can also
be addressed. Initially detection of human video objects is achieved using two adaptive 2-D Gaussian...
A robust video object based watermarking scheme, based on Zernike and Hu moments, is proposed in this paper. Firstly, a human
video object detector is applied to the initial image. Zernike and the Hu moments of each human video object are estimated
and an invariant function for watermarking is incorporated. Then, the watermark is generated modifyin...
A novel video object based watermarking scheme is proposed in this paper, providing copyright protection of the semantic content. To achieve this goal, an adaptive two-dimensional Gaussian model of skin color distribution is initially used in order to detect face and body regions within the initial image. An invariant watermark is then designed and...
The increasing popularity of multimedia applications creates an increasing need for secure storage and transmission techniques. Especially wireless communications, which can be easily intercepted, should be protected by eavesdroppers. Towards this direction, several encryption schemes have been proposed in literature, however most of them do not co...
In this paper a wavelet-based steganographic method is proposed for robust short-message hiding. The message is embedded into the most significant wavelet coefficients of a cover image to provide invisibility and resistance against lossy transmission over cellular networks, compression or other distortion. The architecture consists of three modules...
In this paper an optimized and efficient technique for keyframes extraction of video sequences is proposed, which leads to selection of a meaningful set of video frames for each given shot. Initially for each frame, the singular value decomposition method is applied and a diagonal matrix is produced, containing the singular values of the frame. Aft...
The increasing popularity of multimedia applications creates an increasing need for secure storage and transmission techniques. Especially wireless communications (satellite, mobile, RF), which can be easily intercepted, should be protected by unauthorized persons. Towards this direction several encryption schemes have been proposed in literature,...
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia files as binary large objects, without taking into consideration regions of semantic information. These regions may need better protection or can be the only regions that...
In this paper, a scheme for multiresolution organization of video content is proposed that enables fast browsing and effective transmission of video files. The scheme results in the construction of a five-layer tree structure. At layer 0 the root-node contains an advertising image of the whole sequence. Each node of layer 1 represents a class of sh...
In this paper, a fully automatic scheme for hiding digital watermarks into videoconference objects is proposed. Initially,
a face and body detection module is implemented in order to provide an initial estimation of the foreground object. Next,
each foreground object is decomposed using the Shape Adaptive Discrete Wavelet Transform (SA-DWT). Afterw...
An automatic video-object based steganographic system is proposed in this paper for multiuse message hiding. Initially video objects from different images are selected and for each video object a message is embedded into its most significant wavelet coefficients to provide invisibility and resistance against lossy transmission or other distortion....
In this paper efficient performance generalization of neural network classifiers is accomplished, for unsupervised video object
segmentation in videoconference/videophone sequences. Each time conditions change, a retraining phase is activated and the
neural network classifier is adapted to the new environment. During retraining both the former and...
A fully automatic system for embedding visually recognizable watermark patterns to video objects is proposed. The architecture consists of 3 main modules. In the first module, unsupervised video object extraction is performed, by analyzing stereoscopic pairs of frames. Then each video object is decomposed into three levels with ten subbands, using...
In this paper a 3-module automatic watermarking system is proposed, which embeds visually recognizable patterns to video objects (VO). During the first module efficient unsupervised video object extraction is performed. In the second module the DWT is applied to the extracted VO to produce ten subbands and three pairs of subbands are formed. Next Q...
Two unsupervised video object segmentation techniques are proposed and are compared in terms of computational cost and segmentation quality. Both methods are based on the exploitation of depth information. In particular a depth segments map is initially estimated by analyzing a stereoscopic pair of frames and applying a segmentation algorithm. Next...
A wavelet-based steganographic method is proposed for robust message hiding. The message is embedded into the most significant wavelet coefficients of a cover image to provide invisibility and resistance against lossy transmission, compression or other distortion. The architecture consists of three modules. In the first module, the initial message...
Two efficient unsupervised video object segmentation approaches are proposed and then extensively compared in terms of computational cost and quality of segmentation results. Both methods exploit depth information. In particular a depth segments map is initially estimated by analyzing a stereoscopic pair of frames and applying a segmentation algori...
In this paper constrained gradient vector flow (GVF) field
generation is performed, for fast and accurate unsupervised stereoscopic
semantic segmentation. The scheme utilizes the information provided by a
depth segments map, produced by stereo analysis methods and
incorporation of a segmentation algorithm. Then a Canny edge detector is
applied to t...
An adaptive neural network architecture is proposed in this paper, for efficient video object segmentation and tracking in
stereoscopic sequences. The scheme includes: (A) A retraining algorithm that optimally adapts the network weights to the current
conditions and simultaneously minimally degrades the previous network knowledge. (B) A semanticall...
An efficient system for unsupervised structuring of stereoscopic
sequences is presented. It generates links between similar VOPs (video
object planes) of different shots. Particularly after shot cut
detection, for each shot, a fast, unsupervised VOP detection and
tracking algorithm is applied. Then for each of the foreground VOPs of a
frame, a feat...
A multiscale video content organization scheme is proposed for
fast browsing and efficient transmission of video sequences. The scheme
leads to construction of a five-layer tree structure. At layer 0 the
root-node is located, connected to all nodes of layer 1, each
corresponding to a class of shots. Then every class of shot is expanded
at layer 2....
In this paper an efficient scheme for automatic organization of stereo-captured video sequences is presented, which exploits foreground VOP information of frames. More specifically after shot cut detection, for each frame of a shot, a fast, unsupervised foreground VOP extraction algorithm is applied, based on depth information and normalized Motion...
applications (e.g. videoconference, robotvision, emergency detection) as they generally demand considerable human effort. On the other hand unsupervisedtechniques provide effectual results only when the adopted homogeneity criterion is satisfied by the analyzed sequence.Their main advantage is that they do not require human intervention.Several tec...
this paper, an efficient optimal relevancefeedback mechanism is presented to improve theperformance of a content-based image retrievalsystem. In particular, the algorithm is based on anoptimal weight updating strategy, which regulatesthe importance of each image descriptor to theretrieval response. The weights are updated so thatthe correlation bet...
Current multimedia databases contain a wealth of information in the form of audiovisual, as well as text data. Even though efficient search algorithms have been developed for either media, there still exists the need for abstract presentation and summarization of the results of database users' queries. Moreover, multimedia retrieval systems should...
An efficient technique for summarization of stereoscopic video
sequences is presented, which extracts a small but meaningful set of
video frames using a content-based sampling algorithm. The proposed
video-content representation provides the capability of browsing digital
stereoscopic video sequences and performing more efficient content-based
quer...
This paper presents an efficient technique for unsupervised content-based segmentation in stereoscopic video sequences by appropriately combined different content descriptors in a hierarchical framework. Three main modules are involved in the proposed scheme; extraction of reliable depth information, image partition into color and depth regions and...
The video coding standard MPEG-4 is enabling content-based
functionalities by the introduction of video object planes (VOPs) which
represent semantically meaningful objects. A novel fast, unsupervised
semantic segmentation scheme is presented for stereoscopic sequences,
which utilizes the provided depth information. Each stereo pair is first
analyz...
A modified snake-based scheme is presented for unsupervised stereoscopic semantic segmentation. The scheme utilizes the provided depth information and the power of active contours to adjust to object edges. Each stereo pair is analyzed and a depth map is constructed. Then a multiresolution implementation of the recursive shortest spanning tree (RSS...