Nikolaos G. Bardis

Nikolaos G. Bardis
Hellenic Army Academy · Department of Military Sciences- Mathematics and Engineering Sciences Sectror - Informatics LAB

Professor

About

98
Publications
33,091
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
385
Citations
Citations since 2017
30 Research Items
223 Citations
2017201820192020202120222023010203040506070
2017201820192020202120222023010203040506070
2017201820192020202120222023010203040506070
2017201820192020202120222023010203040506070
Introduction
My research interest includes,development of methods&tools for cybersecurity and security systems.Reliability-Survivability issues of information warfare systems, weaknesses/design of S-boxes, generators & Hash functions for military applications are studied. Zero Knowledge Authentication for multi-user systems with high security level such as IoT&Cloud commercial - military applications are developed.Error detection & correction codes during transmission to telecommunication systems are studied
Additional affiliations
January 2007 - December 2007
National Centre for Scientific Research “Demokritos” (NCSR)- Institute of Informatics & Telecommunications
Position
  • Senior Researcher
Description
  • - Research entitled "Control system for reactor for production of biofuels from microalgae" - Research entitled "Visual analysis and recognition of gestures for sign language modeling and application in robot remote control" - Research entitled "Recognition of spontaneous speech"
January 2004 - December 2004
National Centre for Scientific Research “Demokritos” (NCSR)- Institute of Informatics & Telecommunications,
Position
  • Senior Researcher
Description
  • - Research entitled "Management of roadside assistance vehicles with GIS systems based on Artificial Intelligence innovative technologies"
Education
December 1995 - January 1999
National Technical University of Ukraine Kyiv Polytechnic Institute
Field of study
  • Complex of Computers Systems, Intelligent Systems and Networks
September 1989 - June 1995
National Technical University of Ukraine Kyiv Polytechnic Institute
Field of study
  • Complex of Computers Systems, Intelligent Systems and Networks

Publications

Publications (98)
Article
Full-text available
This paper presents the functional specifications of a training platform for use in the training of cadets and serving officers. The game aims to teach trainees that their decisions need to be based both on strategic goals as well as on constraints imposed by international law concerning rules of engagement, ethical codes of conduct or environmenta...
Article
Full-text available
The aim of this paper is to provide a different approach in the educational process, introducing "The Theatre of Mind"-a term that we use instead of the term tabletop Role Playing Games (tRPGs)-as a powerful interdisciplinary educational tool with a view to cultivating and developing the emotional intelligence of students. According to this approac...
Article
Full-text available
Information and communication technologies and IT-based systems are, on the one side, a mean for energy systems and grids monitoring, control and instrumentation, power low management and safety ensuring. On the other side, IT-based systems, networks and infrastructures are weighty consumers of energy and other resources. The most challengeable IT...
Article
Full-text available
The aim of this paper is to present a different viewpoint on the educational process through the usage of-adjusted to educational needs-RPGs (Role Playing Games), emphasizing on an interdisciplinary teaching in both cognitive and social-emotional level, which will offer intervention and simultaneously the improvement of the academic weaknesses for...
Chapter
The dependence of everyday human endeavours to information systems of different sorts is continuously increasing, simultaneously as important activities such as work and healthcare are evolving so as to exploit the capabilities of computers and networks. At the same time, malicious cyber activities are becoming ever more often and more destructive...
Article
Full-text available
The aim of this paper is to shed new light on an innovative teaching strategy and specifically presents the comparison between the use of Role Playing and the use of Role-Playing Games (RPGs) in the educational procedure emphasizing on the unique characteristics of the latter. I will present the theoretical framework of Role Playing and RPGs as wel...
Chapter
This chapter presents an overview of the problem of survivability of information systems, along with solutions that are currently available to designers of such systems. The notion of survivability in the context of cybersecurity over multi-user distributed information systems is defined, which is set as the target of cyber defense to prevent the a...
Article
Full-text available
The article presents the architecture of multi-level information-analytical system (IAS) based on the neural modules network (NMN). This network consists of neural modules which are placed at the three levels (local, region and nation geographically distributed medical centers). Procedures of learning and collectiverelearning of neural modules cons...
Article
Full-text available
An algorithmic approach for the assessment of the survivability is proposed that is based on Lanchester's modified deterministic model. Methods are suggested for increasing the available time capability for nuclear power plant monitoring and coverage, using the required or a limited number of the operable drones,. Dependencies of the variance betwe...
Article
Full-text available
The paper is aimed at analyzing of the classical McEliece and Niederreiter cryptosystems as well as the Quasi-Cyclic MDPC McEliece cipher in a context of the post-quantum network security. Theoretical foundations of the aforesaid cryptographic schemes are considered. The characteristics of the given cryptosystems and other asymmetric encryption sch...
Article
Cloud based storage is being widely used as a viable solution to the problem of data storage in contexts where financial and practical considerations prohibit the use of locally based hardware and software resources. User reservations and legal constraints however have given rise to questions about the verifiability of the integrity of the stored d...
Article
The scattering problem of a time-harmonic electromagnetic plane wave by a dielectric ellipsoid with a perfectly conductive confocal ellipsoidal core is considered. A method for solving an inverse electromagnetic scattering problem for the layered ellipsoid using near-field data or far-field data is presented. The size and the orientation of the lay...
Poster
The proceedings will be Published in the Journal of Physics: Conference Series - IOPscience http://iopscience.iop.org/journal/1742-6596 The Journal of Physics (IOP) is indexed in * ISI Conference Proceedings Citation Index- Science (CPCI-S) * Scopus * EI Compendex * Inspec * Google Scholar So, after the conference the accepted and presented pape...
Chapter
Full-text available
The information revolution has caused many aspects of human activity to critically depend on a wide variety of physically existing or virtual technological achievements such as electronic devices, computer systems, algorithms, cloud resources, artificial intelligence hardware and software entities etc. Many of these systems are used in highly sensi...
Conference Paper
Full-text available
Speech recognition systems allow human – machine communication to acquire an intuitive nature that approaches the simplicity of inter – human communication. Small vocabulary speech recognition is a subset of the overall speech recognition problem, where only a small number of words need to be recognized. Speaker independent small vocabulary recogni...
Chapter
Full-text available
The rapid advances of communication technologies that aim to increase the information transmission speeds, aggravate problems of reliable data exchanges. Especially the expansion of the use of wireless telecommunications technologies is accompanied by a noticeable increase of the intensity of the electromagnetic field and consequently by an increas...
Conference Paper
This article proposes an approach that accelerates the realization of strict remote user identification using non reversible Galois field transformation. The proposed approach is based on using finite field arithmetic to replace the usual modular arithmetic. The application of this efficient method that was developed using Galois Fields, renders fe...
Conference Paper
Full-text available
Internet of things (IoT) gets more spread, and large number of smart things are connect to the Internet. In this regard, increases energy consumption. The devices of the IoT can be affected by special attacks on the power supply system, DDos attacks, spy attacks. The purpose of research is to develop and research an availability model of IoT system...
Chapter
Full-text available
In this chapter, methods for securely performing the calculations required for fundamental modular arithmetic operations, namely multiplication and exponentiation using mobile, embedded, remote or distant computational resources, are proposed that offer the possibility for green information processing system development. These methods are targeted...
Chapter
Full-text available
Crises are complex phenomena, whereby a long-term situation produces short-term but extremely alerting incidents. Such a crisis is caused by the wave of Middle Eastern refugees and immigrants, attempting to find refuge in European countries. This crisis exhibits an obvious humanitarian component, but also severely adverse environmental effects. A s...
Chapter
Full-text available
Crises are complex phenomena, whereby a long-term situation produces short-term but extremely alerting incidents. Such a crisis is caused by the wave of Middle Eastern refugees and immigrants, attempting to find refuge in European countries. This crisis exhibits an obvious humanitarian component, but also severely adverse environmental effects. A s...
Article
Full-text available
The work highlights the most important principles of software reliability management (SRM). The SRM concept construes a basis for developing a method of requirements correctness improvement. The method assumes that complicated requirements contain more actual and potential design faults/defects. The method applies a newer metric to evaluate the req...
Article
Full-text available
Loss of synchronization is a common source of errors in asynchronous data channels. Minute differences in the operating frequencies between the transmitter and the receiver result in data bits being lost or false bits being inserted. This paper presents an innovative technique, especially designed for detecting and correcting errors of this type. D...
Conference Paper
Full-text available
One of the key subsystems from point of view of security of the complex IoT system is the smart business center (SB?) system. Some problems the design and operation of the SBC system are analyzed. When analysis of safety of the IoT system must take into account the reliability and security of the system at several levels: the level of sensors, the...
Conference Paper
Full-text available
This paper proposes an innovative technique for correcting transmission burst errors in data transmitted over amplitude modulated channels suffering from strong electromagnetic interference, such as encountered in military situations. Efficiency is achieved by separating the error detection from the correction process and using different codes for...
Conference Paper
Full-text available
In this paper a method for the performing the calculations required for modular exponentiation using remote or distant computational resources. This method is targeted to the paradigm of cloud computing resources and provides security by avoiding the disclosure to the cloud resource, of either the data or the user secret key. The proposed method op...
Conference Paper
Full-text available
A common problem we face during our trials to discover new coverage models is the trade off we have to make between the accuracy of the results and the solution times. The more accurate results we produce the more time we need to discover the solution of the problem. In real life there are categories of problems where high accuracy of the results i...
Conference Paper
Full-text available
This paper introduces a seven-term novel 3-D chaotic system with three quadratic nonlinearities and discusses its qualitative properties. The new 3-D chaotic system has three unstable equilibrium points. The Lyapunov exponents of the new chaotic system are obtained as L1 = 2.71916, L2 = 0 and L3 = –13.72776. Hence, the maximal Lyapunov exponent (ML...
Article
Full-text available
The aim of this paper is to present how the Regional Balancing Mechanism (RBM) can be facilitated by a specially developed software solution. RBM ensures up-ward regulation in power deficient area and down-ward regulation in power surplus area at Regional Market for Balancing Energy (RMBE) prices. The RBM proposed solution for both the day–ahead an...
Article
Full-text available
Information Society aims to promote innovation in the context of governmental and enterprise information systems and participation of the majority of the general population. An important prerequisite for the penetration and widespread use of Information Society technologies is to enhance the perception of security that these technologies offer with...
Article
Full-text available
Via the present study, it was attempted to explore which of the widely used Web 2.0 tools (blogs, wikis, social networks and typical hypermedia) and which of several pedagogical techniques (lip – reading, video – sign language and learning activities) are appropriate to use for learning purpose for deaf and hard of hearing people. The methodology t...
Conference Paper
Full-text available
This article proposes an approach that accelerates the realization of user identification schemes that follow the principle of zero knowledge. The proposed approach is based on using finite field arithmetic to replace the usual modular arithmetic approaches. The application of this efficient method that was developed using Galois Fields, renders fe...
Conference Paper
Full-text available
A very important issue during decision making is the choice of the appropriate strategy so as to locate facilities. Generally, there are two different cases for locating a facility. In the first case we locate facilities assuming that there are no competitors in the area. In this case, we can use one of the well known covering models, such as the m...
Conference Paper
Full-text available
In the present work, the chaotic motion control of a mobile robot is studied, in order to cover a terrain with unpredictable way. The proposed control strategy is based on a chaotic path planning generator. As a chaotic generator, we have used three different nonlinear dynamical systems, the Chua oscillator, the Lorenz system, and a nonlinear circu...
Conference Paper
Full-text available
An innovative method for formulating non-linear, one-way Boolean transformations is presented. These transformations are used at the core of an efficient implementation of the theoretically strict concept of zero knowledge identification of users. This implementation uses one-way non-linear Boolean transformations instead of operations on large num...
Article
Full-text available
An innovative approach to error detection and correction is presented that permits accelerated performance with reduced computational complexity as compared to Reed - Solomon codes, while using the same number of bits for error control. The approach is based on the mathematical operation of binary multiplication without carry. The mathematical back...
Article
Full-text available
This paper investigates a simple and effective method for the correction of errors that occur in bursts during data transmission in low – frequency channels but also during data storage in magnetic and optical disks. The specific technique is based on the binary weighted checksum which is computed with logical operations. It is shown that the solut...
Article
Full-text available
Digital Ecosystems are largely driven by capabilities and infrastructures offered by cyber engineering, such as security, trust and risk containment. This paper seeks to promote trust in the reliability of cyber infrastructure systems by introducing an innovative technique for efficient correction of burst errors that have been caused by single or...
Conference Paper
Full-text available
Digital Ecosystems are largely driven by capabilities and infrastructures offered by cyber engineering, such as security, trust and risk containment. This paper seeks to promote trust in the reliability of cyber infrastructure systems by introducing an innovative technique for efficient correction of burst errors that have been caused by single or...
Conference Paper
Full-text available
An innovative approach to error detection and correction is presented that permits accelerated performance with reduced computational complexity as compared to Reed - Solomon codes, while using the same number of bits for error control. The approach is based on the mathematical operation of binary multiplication without carry. The mathematical back...
Conference Paper
In this paper techniques for the polymorphic implementation of Rijndael algorithm on microcontrollers and smart-cards have been developed. The analysis of algorithm's characteristics and basic cipher operations with respect to the requirement of their polymorphic implementation is performed. It has been shown that polymorphic implementation of oper...
Conference Paper
Full-text available
Knowledge Management, Information Systems, E-Learning, and Sustainability Research Communications in Computer and Information Science Volume 111, 2010, pp 582-590 Springer In this paper a new approach to increase the effectiveness of the errors detection using check sum during the data transmission based on the optimization of coding with special...
Conference Paper
Full-text available
A new algorithm is proposed for the software implementation of modular multiplication, which uses pre-computations with a constant module. The developed modular multiplication algorithm provides high performance in comparison with the already known algorithms, and is oriented at the variable value of the module, especially with the software impleme...
Chapter
Full-text available
In this paper a new approach to increase the effectiveness of the errors detection using check sum during the data transmission based on the optimization of coding with special differential Boolean transformations is proposed. A method for obtaining such transformations are developed and examples of coding for check sum functions is given.
Chapter
Full-text available
A new algorithm is proposed for the software implementation of modular multiplication, which uses pre-computations with a constant module. The developed modular multiplication algorithm provides high performance in comparison with the already known algorithms, and is oriented at the variable value of the module, especially with the software impleme...
Conference Paper
Full-text available
User authentication procedures are a computer system's first line of defense against malicious attacks that could potentially jeopardize its availability and reliability. Computational complexity considerations may prevent system designers from implementing efficient authentication procedures. This paper presents a robust two level authentication p...
Chapter
Full-text available
This work focuses on the use of computer simulations and computer games for the training of prospective and serving Armed Forces officers. A study of the use of computer simulations and games for teaching and training in the context of both the Armed Forces and civilian applications is presented. The study leads to high level specifications for the...
Article
Full-text available
This paper studies the problem of increasing the efficiency in controlling burst errors that are caused by external noise in the context of digital data transmission. For this purpose, the utilization of special weighted check sum modification has been proposed. Indeed, an algorithm for burst error control is presented and its use is illustrated vi...
Article
Full-text available
In this article, an innovative method is proposed for the realisation of zero knowledge subscriber identification schemes that is suitable for multimedia content distribution applications. The fundamental principle underlying the proposed method is the concept of using one-way Boolean functions as transformations for the zero knowledge identificati...
Book
Full-text available
Lighting is a field of society in which a significant consumption of energy is made, almost 20% of the total electricity produced in different ways being used in street lighting, for lighting commercial and public buildings, for industrial lighting or for residential lighting. Research has continuously identified new types of lamps and lighting equ...
Conference Paper
Full-text available
In this paper a new approach is proposed to increase the performance of the operation of error control on data transmission. Specifically, a hardware structure for parallel cyclic redundancy check (CRC) calculation is developed to speed up the error control operation of data transmission. Based on a study of the properties of both CRC and check sum...
Conference Paper
Full-text available
Despite the fact that mobile phone's security measures have been increased during the last years, users don't take the necessary measures to avoid a possible unauthorized access and/or sensitive data retrieval from their mobile phone. In order to investigate this issue, in this paper, we present the results of a survey conducted in the University o...
Conference Paper
Full-text available
True random number generators can significantly contribute to the development of high security cryptographic schemes, such as those required for use in military applications. This article presents some the results of an innovative method for the generation of truly random number sequences, based on environmental noise measurements. The statistical...
Conference Paper
Full-text available
True random number generators can significantly contribute to the development of high security cryptographic schemes, such as those required for use in military applications. This article presents some the results of an innovative method for the generation of truly random number sequences, based on environmental noise measurements. The statistical...
Article
Full-text available
Two important obstacles averting the widespread adoption of knowledge society and e-government technologies in communities are distrust in their reliability and fear of the costs to be incurred. In order to overcome these obstacles, algorithmic advances are required that improve reliability of information systems without increasing their cost. In t...
Article
Full-text available
An approach is presented for the correction of errors that appear during the transmission of information. This approach is based on the analysis of the information that is contained in the difference between the transmitter-side and the receiver-side weighted checksum. The approach is applied for the development of an algorithm for the correction o...
Article
Full-text available
In this article, an innovative method is proposed for the realisation of zero knowledge subscriber identification schemes that is suitable for multimedia content distribution applications. The fundamental principle underlying the proposed method is the concept of using one-way Boolean functions as transformations for the zero knowledge identificati...
Article
Full-text available
Computer Systems used in Military and other challenging applications, are often exposed to increased levels of electromagnetic radiation. Embedded systems falling in this category often suffer from this exposure due to the operation of the device to which they belong. Consequently data communications within such devices need to be protected against...
Article
Full-text available
In this paper a new approach is presented for key management access and sharing secret keys between certified users of a group. Such schemes are referred to as Symmetric Key Management Systems. The concept of information lifecycle management is first presented and analysed in the context of data storage efficiency. This concept is then extended for...
Conference Paper
Full-text available
Many science and engineering problems can be formulated as optimization problems that are governed by contact distributions (multi-time Pfaff evolution systems) and by cost functionals expressed as multiple integrals or curvilinear integrals. Our paper ...
Article
Full-text available
Rezumat. Transformatoarele de curent reprezintă o soluţie tradiţională pentru măsurarea puterii electrice active şi reactive şi a energiei în reţelele electrice. Transformatoarele permit măsurarea valorii rms, dar, în cazul măsurărilor puterii şi energiei, numai valorile mari nu sunt suficiente pentru a susţine şi măsurarea fazei. Se pot observa er...
Article
Full-text available
In this article, a study is presented that aims at the development of a prototype system for the secure real-time exchange of messages between users of workstations connected to the same TCP/IP network. The security is provided based on the AES prototype cryptographic algorithm. An advanced key management scheme is used within this system that enha...
Article
Full-text available
In this paper the technological aspects are presented concerning the error detection during digital data transmission and storage and its effectiveness needed for military applications. Also an analysis in theoretical level is completed for the effectiveness of error detection during digital data transmission and storage in information systems. Fin...
Article
Full-text available
This article presents the design and implementation of a software application for the provision of secure real time communication services between workstations, based on the AES prototype cryptographic algorithm and an advanced secret key management system. The application has been designed based on the requirements of a military unit, so as to all...
Article
Full-text available
Computer Systems used in Military and other challenging applications, are often exposed to increased levels of electromagnetic radiation. Embedded systems falling in this category often suffer from this exposure due to the operation of the device to which they belong. Consequently data communications within such devices need to be protected against...
Article
A new algorithm is proposed for software implementation of modular multiplication, which uses pre-computations with a constant module. The developed algorithm of modular multiplication provides high productivity in comparison with the known algorithms, oriented at the variable value of module, especially with the software implementation on the low...
Article
Full-text available
In the various banking systems around the world there are different types of bank notes whose classification according to their type is a time-consuming process if it is to be done manually by some person. Also such a classification done by a collaborating person usually does not provide the suitable safety required by the banking associations. In...
Conference Paper
Full-text available
E-learning technologies have extensively been adopted by institutions, such as universities and schools, either as facilitators to traditional teaching methods or as autonomous ones. Teaching material and methods have accordingly been developed for many academic disciplines, especially within the computer science. Since students of computing school...
Conference Paper
Full-text available
Urban solid waste management is one of the most demanding issues of today's urban areas, requiring large investments for efficient daily collection. Decision makers in the field face many complex decisions varying from solid waste collection to strategy development for the entire urban solid waste management process. Although several researchers ha...
Article
Full-text available
Urban solid waste management is one of the most demanding issues of today's urban areas, requiring large investments for efficient daily collection. Decision makers in the field face many complex decisions varying from solid waste collection to strategy development for the entire urban solid waste management process. Although several researchers ha...
Article
Full-text available
In this paper an analysis and realization of Data Transmission Control based on Boolean Transformation for increasing the reliability of checksum and echoplex error detection has been proposed. Such transformations are used to amplify single errors and decrease the probability of undetected errors. The efficiency of the Boolean transformations in c...
Article
Full-text available
In this paper a new way of increasing the reliability of echoplex error detection by using avalanche Boolean transformations has been proposed. In echoplex scheme such transformations are used as error amplifier and decrease the probability of undetected errors. The analysis of efficiency of avalanche Boolean transformations utilization in echoplex...
Article
In this paper a new approach for designing Boolean functions that satisfy the Strict Avalanche Criterion (SAC) is presented. The advantage of the suggested approach is the simplicity of its realization and the significant greater number of the generated functions compared to the known methods. The formalized procedure for construction of nonbalance...