Τμήμα Εφαρμοσμένης Πληροφορικής
Σχολή Επιστημών Πληροφορίας

Program of studies




acad.year 2015-2016

Applied Informatics - Technology Management: 1st year
[Semester 1] [Semester 2] 
AI - Applied Informatics
[Semester 3] [Semester 4] 
[Semester 5] [Semester 6] [Semester 7] [Semester 8] 
TM - Technology Management
[Semester 3] [Semester 4] 
[Semester 5] [Semester 6] [Semester 7] [Semester 8] 

Semester 7
Study Direction: AI - Applied Informatics   


BUSINESS INNOVATION AND PRODUCTIVITY (ΠΛ0611-3) up.gif
Stiakakis Emmanuil    Vlachopoulou Maro     

Objective
(a) To investigate business innovation as competitive advantage source, (b) to acquire knowledge with regard to productivity, (c) to comprehend the way in which innovation development and productivity increase contribute to competitiveness improvement of businesses.ContentIntroduction to the concepts of business innovation and productivity,New economy and innovation management (the importance of innovation management, the determinants of innovation, characteristics of an innovative company in the new economy),Technology, innovation, and economy (knowledge economy, the importance of technology in innovation development, technological progress, innovation and economic development),Productivity measurement methods (business inputs and outputs, methods and techniques for the measurement of productivity at micro level),Innovation and productivity as competitiveness empowerment tools (competitive advantage, competitiveness in the new economy, the ways in which innovation development and productivity increase contribute to competitive advantage establishment).
Content



COMPUTATION THEORY AND AUTOMATA (ΠΛ0506-1) up.gif
Refanidis Ioannis     
Objective
To be able (a) to recognize abstract models of computation? (b) to identify various classes of computational problems? (c) to formally describe problems.

Content
Alphabets and languages. Regular expressions. Regular languages. Non-regular languages. Context-free grammars. Context-sensitive grammars.
Automata. Finite automata. Deterministic and non-deterministic automata. Push-down automata. Turing machines.
Church thesis. Turing decidable and acceptable languages. Universal Turing machine. Non-computability. Non-solvable problems.


CRYPTOGRAPHY (ΠΛ0618) up.gif
Petridou Sofia    Stephanides George     

Objective
Introduction to modern cryptology.
Content
Classical cryptography - simple cryptosystems.  Cryptanalysis.  Cryptographic hash functions.  Symmetric cryptography. Asymmetric cryptography. Key management. Digital signatures. Cryptographic protocols.



EDUCATIONAL PROGRAMMING ENVIRONMENTS AND LANGUAGES (ΠΛ0726) up.gif
Satratzemi Maria     

Objective
The aim of the course is to present the necessity for the development of systems and methodologies for the support of learning and teaching of programming, and particularly the two prevailing programming examples: procedural and object-oriented.ContentSynopsis of difficulties, errors and erroneous perceptions/misapprehensions of students in introductory programming courses. Instructive situations to overcome the difficulties of novice programmers. Classification of various approaches of teaching programming and the educational tools that have been developed in the frame of each approach. Educational programming environments and micro-languages: Bluej, DrJava, JEROO, JGRASP, Karel the Robot, objectkarel, Alice, scratch- a programming language for all.Educational robotics, LegoMindstorms and programming language and environments



GAME THEORY (ΠΛ0722) up.gif
Refanidis Ioannis     

Objective
To be able to (a) recognize and model game situations, (b) solve games through the identification of Nash equilibriums, (c) use Game Theory to interpret real-world situations.ContentGame representation. Normal/Strategic form. Extended form.Strategies. Domination and its resolution.Nash equilibrium. Cournot duopoly. Cartels. The commons tragedy. Mixed strategies.Expected utility. Risk aversion.Games with non-concurrent actions. Backward induction. Perfect Nash equilibrium for subgames.Repeated games. Finite and infinite games. Firing strategies. Lenient strategies. The common theorem. Dynamic games.Moral hazard. Incentives theories.Games with incomplete information. Bayes-Nash equilibrium. Mechanism design. Revelation principle. Auctions.
Content



INTERNATIONAL ECONOMICS (ΠΛ0309-2) up.gif
Katsouli-Katou Helen     

Objective
Upon completion of this course, students should be able to:(a) Understand the basic principles of International Economics(b) Identify the main theories of International Economics(c) Apply the methodologies of International Economics on real cases(d) Use the tools of International Economics in decision - makingContent- International economic exchange (theories and empirical foundations of international trade and factor movements, public barriers to trade and protection, developing the institutional framework of international trade, international enterprises)- Trade and developing countries- International monetary relationships (currency market, determination of exchange rate, balance of payments, adjustment mechanisms of the balance of payments, international monetary system)- Current international economic problems
Content



INTERNET LAW (ΠΛ0725) up.gif
Alexandropoulou Evgenia     

Objective
The lesson aims to familiarize students with the basic legal framework related to the Internet. It concerns the rights and obligations of Internet users, the enforcement of legal sanctions in the case of infringement of this, as well as the role of the Internet as a means of communication.ContentThe content concentrates on: the basic legal framework related to e-communications and more specifically to the Internet ; the confidentiality of  e-communications; personal data protection in e-communications; legal issues concerning blogs and social networks; domain names; copyright and the Internet;  e-crime.
Content



LOGISTICS INFORMATION SYSTEMS (ΠΛ0819) up.gif
Madas Michail     

Objective
The course aims to present topics related to the planning, operation and decision support in logistics and supply chain management. Special emphasis is placed on the use of quantitative methods for the modelling and solution of relevant logistical and supply chain problems, as well as the application of emerging technologies and information systems in logistics and supply chain management.
Content
The course covers the following thematic sections: i) introduction, structure and basic concepts of Supply Chain Management (SCM), ii) main and supporting logistical functions, iii) warehousing, iv) facility location, v) supply chain modelling, vi) information systems in logistics and SCM and vii) advanced topics and emerging trends in SCM. The course includes laboratory sessions on the use of software for the optimization of SCM decisions and operations.



NETWORKS AND INTERNET APPLICATIONS SECURITY (ΠΛ0825) up.gif
Mavridis Ioannis     

Objective
The student will (a) gain familiarity with protection requirements of modern information and communication systems, (b) learn the fundamental cryptology-based techniques for securing data processing and transmission over the Internet, (c) acquire experience on applying the above techniques in laboratory conditions.ContentBasic concepts (Network and Internet security issues, Types of attacks and countermeasures, Comparison of security technologies)Introduction to Cryptography (Terminology, Types of cryptographic systems and features of their components, Key-stream generators)Classic Cryptographic Algorithms and Cryptanalysis (Caesar, Vigenere, One Time Pad / Vernam, ROT13, Transposition algorithms, Substitution algorithms, Application examples with CRYPTOOL)Modern Symmetric Cryptographic Algorithms and Cryptanalysis (DES, 3-DES, ΑΕS, IDEA, RC2, RC4, etc, Modes of Operation (ECB, CBC, OFB, CFB), Application examples with CRYPTOOL)Modern Asymmetric Cryptographic Algorithms and Cryptanalysis (Diffie-Hellman, ECDH, RSA, ECC, Application examples with CRYPTOOL)Integrity Mechanisms (CBC-MAC, HMAC, OWHF, CRHF, MD5, SHA, DSA, ECDSA, etc, Application examples with CRYPTOOL)Applications of Cryptography (message digests, digital signatures, digital certificates, etc)Certification Infrastructures (Components and Features of Public Key Infrastructures - PKIs)Protection of Digital Communications (S/MIME, PGP, Kerberos, SSL/TLS, IPsec, etc)Protocols for Secure Transactions over the Internet (eCash, CAFE, NetCash, CyberCoin, CyberCash, iKP, SET, etc)Wired Network and Web Applications Security (Issues, Critical vulnerabilities, Types of attacks, Case studies)Firewalls and IDSs (Kinds of mechanisms, Architectures, Case studies)Wireless Network security (Operational features and security issues, Protection mechanisms and protocols (WEP, WPA, ΙΕΕΕ 802.11i, etc), Techniques and types of attacks, Case studies)
Content



OPERATIONS RESEARCH (ΠΛ0814-1) up.gif
Hristu - Varsakelis Dimitrios    Samaras Nikolaos     

Objective
To (a) understand some of the fundamental principles and theory which concern important classes of optimization problems, and (b) gain the ability to formulate and solve optimization problems using analytical and computational techniques.
Content
Linear vector spacesOptimizing functions of a vector variableOptimization with equality constraints - Langrange multipliersOptimization with inequality constraints - Karush-Kuhn-Tucker theoremInteger programming - Branch & Bound methodComputational OptimizationDiscrete-time dynamical systems - Dynamic Programming



PARALLEL PROCESSING (ΠΛ0705-1) up.gif
Margaritis Konstantinos     

Objective
Students must be able to: a) design simple parallel algorithms and transform them to programs using a parallel programming language b) use parallel programming environments, debugging and performance evaluation methods. c) understand the differences and similarities of the two basic parallel programming models, that is shared and distributed memory architectures. Progarmming in OpenMP and MPI, using Eclipse PTP for visualization and performance evaluation.Content
Content



SPECIAL SUBJECTS IN ACCOUNTING (ΠΛ0510) up.gif
Stavropoulos Antonios    Vazakidis Athanasios     

Objective
This course is aiming to: ? Enable students familiar with the essentials of the Value Added Tax (VAT), listing - intrastat. ? Enable students aware of labour relationships in Greece with references on topics such as industrials, payroll, and insurance.? Enable students capable of posting entries in accounting books (first, second and third class of categorization), and at the same time aware in relation to the composition of the periodical and annual VAT statements. ? Enable students aware of real situations related to the termination of contracts (relationship between employees and employers), and VAT.ContentThis course examines the application of the Value Added Tax (VAT) to companies belonged to one of the three classes of books keeping in Greece accordingly with Greek  general accepted accounting principles. In this framework the tax treatment of companies with a significant magnitude of entrepreneurial transactions, imports and exports inside and outside the European community is also analyzed.  Additionally, issues related to the Greek law of labor such as recruitment, payroll, leave, holiday with pay, bonus of Christmas and Easter, maternity leave and redundancy pay are attributed. The lectures of this course combine theoretical examples and case studies which are solving using hand written and the use of software.
Content



Thesis Project up.gif