No abstract available.
Proceeding Downloads
Rapid Implementation of Embedded Systems using Xilinx Zynq Platform
In any digital system design, it is crucial to achieve the lowest time-to-market possible. Indeed, that need has pushed large FPGA manufacturers to produce SoCs which will implement reprogrammable logic along with CPU and DSP cores. Especially, during ...
Source-Level Compiler Optimizations for High-Level Synthesis
With high-level synthesis becoming the preferred method for hardware design, tools that operate on high-level programming languages and optimize hardware output are crucial for successful synthesis. In high-level synthesis, conventional programming ...
Heuristics for Iterative Detailed Standard Cell Placement
- Panagiotis Oikonomou,
- Maria G. Koziri,
- Antonios N. Dadaliaris,
- Yannis Hatzaras,
- Evangelia Nerantzaki,
- Georgios I. Stamoulis
In cell placement a number of cells with rectangular shapes, must be placed inside a chip area so that no cells overlap and a target function is optimized. In standard cell placement all rectangles have the same width and the chip area is split into ...
Leveraging Parallelization Opportunities by an Online CAD Tool
High-performance computing utilizes many ranks and threads exploiting contemporary parallel and distributing processing architectures. Parallelizing an application is not a straightforward task as it is commonly admitted among all the researchers with ...
Enhanced Tetris Legalization
- Antonios N. Dadaliaris,
- Evangelia Nerantzaki,
- Panagiotis Oikonomou,
- Yannis Hatzaras,
- Angeliki-Olympia Troumpoulou,
- Ioannis Arvanitakis,
- Georgios I. Stamoulis
Legalization and detailed placement methods for standard cell designs, are two of the most notable topics in current VLSI research. Being the final steps in a classic placement procedure they must be efficient in terms of the delay overhead they ...
SER Analysis of Multiple Transient Faults in Combinational Logic
In the VLSI field, reliability of chips is a major issue and it becomes more significant considering the continuous technology down-scaling. Modern chips are extremely sensitive to various factors such as radiation and, thus, it is crucial to implement ...
IoT Architecture for Monitoring Wine Fermentation Process of Debina Variety Semi-Sparkling Wine
This paper proposes a new system architecture and HTTP communication mechanism called Smart Barrel System (Wine-SBS) for the process of monitoring Debina varietal sparkling wine fermenting conditions, produced at the area of Zitsa Epirus, Greece. The ...
A two layer supervisor scheme for ring manufacturing production chains
A generic model for a ring production chain with various manufacturing machines and a mobile robotic system is modelled as a finite deterministic automaton. The desired behavior of the plant is prescribed as a desired language. The properties of the ...
On Security Provision in Demanding Cyberphysical Bluetooth based Systems
During the last few years, short range wireless communication technologies are increasingly utilized in highly demanding applications characterized by strict performance and security demands. Among various respective communication technologies Bluetooth ...
RF low energy monitoring protocol and system architecture for location based sensor measurements
In this paper, we propose a new protocol for sensors Frequency Shift Keying data transmission named RF-Tania protocol and a mobile application in order to test our protocol. This protocol focuses on Energy Efficiency and it is based on an existent open ...
Communication Security & Cyberbullying: A Review of the Legal Issues
The research of legal issues concerning the Cyberspace is complex because it requires not only legal but also technical knowledge. The present paper examines the challenges and answers stemming from three main research questions: a) are there gaps in ...
A Review of Continuous Authentication Using Behavioral Biometrics
The present study carries out a literature review on the topic of Continuous Authentication (CA) using behavioral biometrics. CA systems have been proposed in order to solve the shortcomings of other user authentication methods. CA processes are ...
Methods for Peak to Average Power Ratio Reduction on SCFDMA
Single Carrier Frequency Division Multiple Access (SCFDMA) is currently adopted by 3GPP in the LTE cellular systems for the uplink due to its high data rate and low peak-to-average power-ratio (PAPR). In this work, the PAPR for IFDMA (Interleaved ...
Gamifying e-learning as a Means of Overcoming Its Deficiencies
In the last 20 years computers have been playing an increasingly important part in all aspects of everyday life, changing the way people understand but mostly the way people do things. Education, an integral part of every person's life, could not have ...
S.A.T.E.P.: Synchronous-Asynchronous Tele-education Platform
S.A.T.E.P.: Synchronous-Asynchronous Tele-education Platform is a software application for educational purposes, with a lot of parametrizing (configuration) features written entirely from scratch. It aims at the training and examination of computer ...
Reputation Mechanisms in on-line Social Networks: The case of an Influence Estimation System in Twitter
Online social networks have changed the way people communicate, create content and share it via online social actions. In order for users to engage in a social network application, they need mechanisms that will help them to find other users that they ...
Drivers of Candidates' Social Media Popularity in the 2014 European Parliamentary Elections in Greece
The purpose of the present study is to investigate the main antecedents of candidates' popularity on social media. Herein, social media popularity was measured based on the number of Facebook page likes, Twitter followers, and YouTube video views. Our ...
Design and Development of a Learning Management System for Vocational Education
In this paper, we present the initial design and implementation of a Learning Management System (L.M.S.) targeting to support Vocational Lyceum students with their laboratory courses. We address the support of laboratory courses for vocational High ...
Automata-Based Programming for the Development of a Web based Application: A Case Study
The software design of web based applications using the automata-based programming approach is studied. An indicative case study is developed. The case is the Web Based Application of an Innovation and Entrepreneurship Unit. The software is modelled ...
Loan Evaluation Applying Artificial Neural Networks
The research presented pertains to the evaluation of loans' performance, using soft computing techniques and more specifically Artificial Neural Networks (ANN). Given the economic situation in Europe in the last few years, it is very important for the ...