Kyriakos Ovaliadis

Kyriakos Ovaliadis
Technological Educational Institute of Kavala | TEIKAV · Department of Electrical Engineering

Doctor of Engineering

About

15
Publications
17,973
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
125
Citations

Publications

Publications (15)
Article
Full-text available
In our paper we discuss how elements of algebraic hyperstructure theory can be used in the context of underwater wireless sensor networks (UWSN). We present a mathematical model which makes use of the fact that when deploying nodes or operating the network we, from the mathematical point of view, regard an operation (or a hyperoperation) and a bina...
Article
Full-text available
It is generally accepted today that security implementations on networking infrastructures are highly necessary. Specifically, when organization and corporal networks interconnect to the internet for financial transactions and valuable data administration, counter measures for unwanted attacks must be installed. This paper examines the network secu...
Article
Full-text available
The profile management of nanomaterials requires a complicated synergy between component function and shape, material, process, and costs. This study attempts to uncover these relationships by grouping nanomaterial profile components with matching characteristics using cluster analysis. The analysis resulted in the identification of 11 distinct clu...
Article
Full-text available
In this paper the analysis for Bit error ratio (BER) with BPSK modulation scheme in Additive White Gaussian Noise (AWGN) channel is performed. The bit error probability curve is simulated using Matlab. The complete BPSK system is implemented in Matlab/Simulink environment. The behavior of the system is simulated and the results obtained are present...
Conference Paper
We discuss some challenges of underwater wireless sensor networks (UWSN) and show that in the architecture of commonly used types of UWSNs certain hyperstructure concepts, which make use of ordering, can be naturally identified.
Article
With the fast development of modern communication techniques, the demand for reliable high data rate transmission is increased significantly. Different modulation techniques allow researchers to send different bits per symbol achieving different and higher throughputs or efficiencies. Because of its efficiency in power and bandwidth, M-ary Quadratu...
Article
Full-text available
Micromagnetic simulations are an important tool for the investigation of magnetic materials. Micromagnetic software uses various techniques to solve differential equations, partial or ordinary, involved in the dynamic simulations. Euler, Runge-Kutta, Adams, and BDF (Backward Differentiation Formulae) are some of the methods used for this purpose. I...
Conference Paper
Energy efficiency is an important issue during the design and the overall performance evaluation of an UWSN system. Clustering sensor nodes have proven to be an effective method to improve the load balancing and scalability of the network while minimizing the system's overall energy consumption. In this paper, a new clustering algorithm is proposed...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSN) have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for...
Article
A new Underwater Sensor Simulation Tool (USNeT) is proposed in this paper which has been designed and implementedassuming the conditions that affect underwater communication. This system provides real-time process based simulation and supports three-dimensional deployment. USNeT follows the object-oriented design style and all network entities are...
Article
Full-text available
The flooding method, which is used by many mobile ad-hoc routing protocols, is a process in which a route request packet (RREQ) is broadcasted from a source node to other nodes in the network. This often results in unnecessary re-transmissions, causing packet collisions and congestion in the network, a phenomenon called broadcast storm. This articl...
Article
Full-text available
In wireless sensor networks power consumption is a crucial issue because most of the sensor nodes operate using batteries. The purpose of this paper is to evaluate four routing protocols (OLSR, AODV, DSR, DSDV) in different wireless sensor network (WSN) scales regarding the power consumption and mobility factor. In small networks with less than 10...
Article
Full-text available
Ad-hoc routing protocols use a number of algorithms for route discovery. Some use flooding in which a route request packet (RREQ) is broadcasted from a source node to other nodes in the network. This often leads to unnecessary retransmissions, causing congestion and packet collisions in the network, a phenomenon called a broadcast storm. This paper...
Article
Full-text available
In an energy-constrained underwater system environment it is very important to find ways to improve the life expectancy ofthe sensors. Compared to the sensors of a terrestrial Ad Hoc Wireless Sensor Network (WSN), underwater sensors cannotuse solar energy to recharge the batteries, and it is difficult to replace the batteries in the sensors. This p...

Network

Cited By