Panagiotis G. Sarigiannidis

Panagiotis G. Sarigiannidis
University of Western Macedonia | UOWM · Department of Electrical and Computer Engineering

PhD
Coordinating projects, advancing high-quality research, leveraging the outputs to the market through the spin-off...

About

265
Publications
80,541
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,275
Citations
Introduction
Prof. Panagiotis Sarigiannidis is the Director of the ITHACA lab (https://ithaca.ece.uowm.gr/), co-founder of the 1st spin-off of the University of Western Macedonia: MetaMind Innovations P.C. (https://metamind.gr), and Associate Professor in the Department of Electrical and Computer Engineering in the University of Western Macedonia, Kozani, Greece.

Publications

Publications (265)
Article
Full-text available
Through the extensive study of transformers, attention mechanisms have emerged as potentially more powerful than sequential recurrent processing and convolution. In this realm, Vision Transformers have gained much research interest, since their architecture changes the dominant paradigm in Computer Vision. An interesting and difficult task in this...
Article
Full-text available
Recent technological developments in the primary sector and machine learning algorithms allow the combined application of many promising solutions in precision agriculture. For example, the YOLOv5 (You Only Look Once) and ResNet Deep Learning architecture provide high-precision real-time identifications of objects. The advent of datasets from diffe...
Article
Full-text available
In this paper we study a mobility-aware call admission control algorithm in a mobile hotspot. To this end, a vehicle is considered which has an access point with a fixed capacity. The vehicle alternates between stop and moving phases. When the vehicle is in the stop phase, it services new and handover calls by prioritizing them via a probabilistic...
Article
Full-text available
The emergence of next-generation internet-of-things (NG-IoT) applications introduces several challenges for the sixth-generation (6G) mobile networks, such as massive connectivity, increased network capacity, and extremely low-latency. To countermeasure the aforementioned challenges, ultra-dense networking has been widely identified as a possible s...
Article
Full-text available
Early and objective autism spectrum disorder (ASD) assessment, as well as early intervention are particularly important and may have long term benefits in the lives of ASD people. ASD assessment relies on subjective rather on objective criteria, whereas advances in research point to up-to-date procedures for early ASD assessment comprising eye-trac...
Article
The fifth generation (5G) of cellular communications is one of the key enabling technologies of the future and current information society. 5G network systems will serve users with data rates of several Gbps and will allow running new applications in mobile devices. In order to do so, several technical challenges have to be met. Machine learning (M...
Article
Full-text available
Artificial Intelligence (AI) and especially Machine Learning (ML) can play a very important role in realizing and optimizing 6G network applications. In this paper, we present a brief summary of ML methods, as well as an up-to-date review of ML approaches in 6G wireless communication systems. These methods include supervised, unsupervised and reinf...
Article
Full-text available
The technological leaps of artificial intelligence (AI) and the rise of machine learning have triggered significant progress in a plethora of natural language processing (NLP) and natural language understanding tasks. One of these tasks is argumentation mining which has received significant interest in recent years and is regarded as a key domain f...
Article
Full-text available
In the era of digital economies, the smart electrical grid has provided numerous benefits, such as two-way communication, pervasive control and self-healing. However, this evolution raises severe cybersecurity and privacy risks that can lead to disastrous effects. False data injection attacks, large-scale denial of service and unauthorised access r...
Article
Full-text available
Internet of Things (IoT) is a concept adopted in nearly every aspect of human life, leading to an explosive utilization of intelligent devices. Notably, such solutions are especially integrated in the industrial sector, to allow the remote monitoring and control of critical infrastructure. Such global integration of IoT solutions has led to an expa...
Article
Full-text available
The technological leap of smart technologies and the Internet of Things has advanced the conventional model of the electrical power and energy systems into a new digital era, widely known as the Smart Grid. The advent of Smart Grids provides multiple benefits, such as self-monitoring, self-healing and pervasive control. However, it also raises cruc...
Article
Full-text available
Frequency Selective Surfaces (FSSs) have become increasingly popular during the last years due to their combined characteristics, which meet, in general, the requirements of the next-generation wireless communication networks. In this work, a cross-platform design framework for FSS structures is presented and evaluated by utilizing a recently intro...
Article
Full-text available
In this paper, a cloud radio access network (C-RAN) is considered where the baseband units form a pool of computational resource units and are separated from the remote radio heads (RRHs). Based on their radio capacity, the RRHs may form one or many clusters: a single cluster when all RRHs have the same capacity and multi-clusters where RRHs of the...
Article
Full-text available
Swarm Intelligence (SI) Algorithms imitate the collective behavior of various swarms or groups in nature. In this work, three representative examples of SI algorithms have been selected and thoroughly described, namely the Grey Wolf Optimizer (GWO), the Whale Optimization Algorithm (WOA), and the Salp Swarm Algorithm (SSA). Firstly, the selected SI...
Article
Full-text available
With the introduction of UAVs to networking, ad hoc communications have evolved past confinement to the terrestrial grid and have moved towards aerial meshes. Until now, Flying Ad-hoc Networks (FANETs) have been relying on strictly layered communication protocols for their function and routing, a tradition set by conventional networks. With layers...
Article
Full-text available
In this paper, a cloud radio access network (C-RAN) is considered where the remote radio heads (RRHs) are separated from the baseband units which form a common pool of computational resource units. Depending on their capacity, the RRHs may form one or more clusters. Each RRH accommodates multiservice traffic, i.e., calls from different service-clas...
Article
Full-text available
A considerable percentage of Internet of Things end-devices are characterised by mobility, a feature that adds extra complexity to protocols used in Wireless Sensor Networks. LoRa is one of the newly introduced wireless sensor protocols, capable of delivering messages in long distances and consuming low energy, features that make it proper for low...
Research
Full-text available
This Special Issue will cover a wide range of IIoT cybersecurity and privacy solutions, combining a plethora of emerging technologies. Please find more information at the following link: https://www.mdpi.com/journal/electronics/special_issues/Cybersecurity_Next_Generation
Conference Paper
Full-text available
The rise of the Industrial Internet of Things (IIoT) plays a crucial role in the era of hyper-connected digital economies. Despite the valuable benefits, such as increased resiliency, self-monitoring and pervasive control, IIoT raises severe cybersecurity and privacy risks, allowing cyberattackers to exploit a plethora of vulnerabilities and weakne...
Article
Full-text available
The rapid evolution of the smart technologies has digitised the electrical grid into a new paradigm called smart grid (SG). Despite the multiple benefits, this reality raises severe cybersecurity concerns. SPEAR provides a global cybersecurity solution, which (a) detects SG-related cyberthreats, (b) provides an advanced forensic readiness framework...
Conference Paper
According to Diagnostic and Statistical Manual of Mental Disorders, Autism spectrum disorder (ASD) is a developmental disorder characterised by reduced social interaction and communication, and by restricted, repetitive, and stereotyped behaviour . An important characteristic of autism, referred in several diagnostic tests, is a deficit in eye gaze...
Article
Full-text available
In 5G and beyond telecommunication infrastructures a crucial challenge in achieving the strict Key Performance Indicators (KPIs) regarding capacity, latency, and guaranteed quality of service, is the efficient handling of the fronthaul bottleneck. This part of the next generation networks is expected to comprise the New Radio (NR) access and the Ne...
Chapter
Over the past decades, video games have become a mainstream form of entertainment and are increasingly used for other purposes such as education or health. This paper surveys recent research and practice in Collision detection in computer gaming that is the detection when two or more objects collide with each other and it plays a crucial role in al...
Article
Full-text available
In this work, we propose the use of an advanced multiple access technique and its joint design with adaptive task offloading, in order to reduce delay and energy consumption. More specifically, the use of generalized hybrid orthogonal/non-orthogonal multiple access (OMA/NOMA) for MEC is introduced, which is theoretically superior to other alternati...
Research
Full-text available
The objective of this Special Issue is to bring together the state-of-the-art research contributions that address challenges in contemporary networks design, dimensioning and optimization towards the 6G networks.
Article
Full-text available
The industry practice of machining hard metal parts using CNC lathe turning machines is through grinding and milling procedures. The typical practice for quality control is through manual inspection, as automated solutions are difficult to integrate in production and do not reach the same level of accuracy. In this scope, the proposed system aims t...
Article
Full-text available
Developments in the field of neural networks, deep learning, and increases in computing systems’ capacity have allowed for a significant performance boost in scene semantic information extraction algorithms and their respective mechanisms. The work presented in this paper investigates the performance of various object classification- recognition fr...
Article
Special Issue Information Dear Colleagues, The use of mm-Wave in 5G wireless communications will mitigate the spectrum shortage in current 4G cellular communication systems that operate at frequencies below 6 GHz. However, the increasing number of new applications such as virtual/augmented reality (VR/AR), autonomous driving, Internet of Things (I...
Chapter
The rise of microgrids in defence applications, as a greener, more economical and efficient source of energy and the consequential softwarization of networks, has led to the emerge of various cyber-threats. The danger of cyber-attacks in defence microgrid facilities cannot be neglected nor undermined, due to the severe consequences that they can ca...
Conference Paper
Ultra-low latency connections for a massive number of devices are one of the main requirements of the next-generation tactile Internet-of-Things (TIoT). Grant-free non-orthogonal multiple access (GF-NOMA) is a novel paradigm that leverages the advantages of grant-free access and non-orthogonal transmissions, to deliver ultra-low latency connectivit...
Article
Full-text available
The rise of the Internet of Medical Things (IoMT) introduces the healthcare ecosystem in a new digital era withmultiple benefits, such as remote medical assistance, real-time monitoring and pervasive control. However, despite the valuable healthcare services, this progression raises significant cybersecurity and privacy concerns. In this paper, we...
Article
Full-text available
Unmanned aerial vehicles (UAVs) in the role of flying anchor nodes have been proposed to assist the localisation of terrestrial Internet of Things (IoT) sensors and provide relay services in the context of the upcoming 6G networks. This paper considered the objective of tracing a mobile IoT device of unknown location, using a group of UAVs that wer...
Article
The performance of machine learning-based path loss models relies heavily on the data they use at their inputs. Feature engineering is therefore essential for the models success. In the work at hand, we extract a new set of input features, based on image texture. The image that we use represents the footprint of the urban built-up area, where the g...
Conference Paper
Dynamic dual-hop relaying network topologies that enable access to end-users through intermediate individual and commercial, static as well as moving, infrastructures are expected to become fundamental pillars of the sixth-generation wireless systems. Their main requirement is to ensure end-users information privacy. Motivated by this, the current...
Article
Full-text available
The interconnected and heterogeneous nature of the next-generation Electrical Grid (EG), widely known as Smart Grid (SG), bring severe cybersecurity and privacy risks that can also raise domino effects against other Critical Infrastructures (CIs). In this paper, we present an Intrusion Detection System (IDS) specially designed for the SG environmen...
Article
Full-text available
The technological leap of smart technologies has brought the conventional electrical grid in a new digital era called Smart Grid (SG), providing multiple benefits, such as two-way communication, pervasive control and self-healing. However, this new reality generates significant cybersecurity risks due to the heterogeneous and insecure nature of SG....
Chapter
The rise of the Information and Communication Technology (ICT) and especially of the Internet of things (IoT) introduces significant benefits in multiple aspects of the human ecosystem, such as health, energy, transport, and commerce. Despite the provided social and economic advances offered by this new reality, new cyber-security risks related to...
Article
Full-text available
Intentional islanding is a corrective procedure that aims to protect the stability of the power system during an emergency, by dividing the grid into several partitions and isolating the elements that would cause cascading failures. This paper proposes a deep learning method to solve the problem of intentional islanding in an end-to-end manner. Two...
Preprint
Full-text available
The advent of Internet of Things (IoT) has bring a new era in communication technology by expanding the current inter-networking services and enabling the machine-to-machine communication. IoT massive deployments will create the problem of optimal power allocation. The objective of the optimization problem is to obtain a feasible solution that mini...
Article
Full-text available
Tabular data and images have been used from machine learning models as two diverse types of inputs, in order to perform path loss predictions in urban areas. Different types of models are applied on these distinct modes of input information. The work at hand tries to incorporate both modes of input data within a single prediction model. It therefor...
Conference Paper
In recent years and with the advancement of IoT networks, malicious intrusions aiming at disrupting the services and getting access to confidential information in medical environments is ever progressing. To that end, this paper proposes a Federated Layered Architecture to be used in Medical CyberPhysical Systems (MCPS) Networks that entails the cr...
Conference Paper
Full-text available
The rapid evolution of the Internet of Medical Things (IoMT) introduces the healthcare ecosystem into a new reality consisting of smart medical devices and applications that provide multiple benefits, such as remote medical assistance, timely administration of medication, real-time monitoring, preventive care and health education. However, despite...
Conference Paper
Internet of Things (IoT) technology such as intelligent devices, sensors, actuators and wearables have been integrated in the healthcare industry, thus contributing in the creation of smart hospitals and remote assistance environments. Ensuring the eHealth network adopts the appropriate security measures in order to effectively protect sensitive pa...
Article
Full-text available
Climate change is emerging as a major threat to farming, food security and the livelihoods of millions of people across the world. Agriculture is strongly affected by climate change due to increasing temperatures, water shortage, heavy rainfall and variations in the frequency and intensity of excessive climatic events such as floods and droughts. F...
Article
Full-text available
Radio frequency energy harvesting has attracted considerable interest as a technique of enabling self-powered wireless networks. This technique faces several challenges, such as the receiving and the rectifying modules of a rectenna system. Multiband antennas provide several comparative advantages against the goal of maximizing the amount of energy...
Article
Full-text available
With the development of more advanced and efficient control algorithms and communication architectures, UAVs and networks thereof (swarms) now find applications in nearly all possible environments and scenarios. There exist numerous schemes which accommodate routing for such networks, many of which are specifically designed for distinct use-cases....
Article
Full-text available
A multi-cluster cloud radio access network (C-RAN) is considered in this paper where the remote radio heads (RRHs) form different clusters. A cluster includes RRHs that have the same radio resource unit capacity. In addition, all RRHs are separated from the common pool of computational resource units named baseband units. Each RRH accommodates call...
Article
Full-text available
Smart Farming is the new term in the agriculture sector, aiming to transform the traditional techniques to innovative solutions based on Information Communication Technologies (ICT). Concretely, technologies like Unmanned Aerial Vehicles (UAVs), Unmanned Ground Vehicles (UGVs), Image Processing, Machine Learning, Big Data, Cloud Computing, and Wire...
Article
Nowadays electricity is undoubtedly one of the most important goods. Over the years, the dependence of people on electrical devices has sharply increased. The need for continuous use of these devices has created greater demand for electricity as well as more efficient transmission techniques. Environmental energy scavenging, as well as wireless tra...
Article
The employment of Low-Power Wide Area Networks (LPWANs) has proven quite beneficial to the advancement of the Internet of Things (IoT) paradigm. The utilization of low power but long range communication links of the LoRaWAN technology promises low energy consumption, while ensuring sufficient throughput. However, due to LoRa’s original scheduling p...