George Delaportas | Kingston University, London (original) (raw)

Uploads

Papers by George Delaportas

Research paper thumbnail of Design and implementation of a secure web application

Discussion and analysis of a scenario where a demo web application that acts as a profile manager... more Discussion and analysis of a scenario where a demo web application that acts as a profile manager is assessed from a security point of view. We will design and develop the test web application and we will perform a vulnerability assessment throughout all the technologies applied, in order to identify possible security weaknesses and exploits.

Research paper thumbnail of Application of a robotic arm to an automated multi-recording process

International workshop on …, 2004

... Sze, SM, 'Semiconductor Sensors', John Wiley &a... more ... Sze, SM, 'Semiconductor Sensors', John Wiley & Sons, New York, 1994. Ventzas, DE, Tsitsipis P, Kalovrektis K, Varzakas K, (1998) 'Microcontroller Control of anElectro-Pneumatic Manipulator', Euriscon 98, SIRES/IEEE/CSS, June, pp.98. ...

Research paper thumbnail of Geeks Artificial Neural Network (G.A.N.N)

A 2.5 years research that I did as an undergraduate student at T.E.I of Lamia. This paper analyze... more A 2.5 years research that I did as an undergraduate student at T.E.I of Lamia. This paper analyzes current ANN solutions and discovers problems and limitations. Then it proposes an entirely new approach and a new type of ANN, the G.A.N.N, with a set of new mathematical models and rules.

Research paper thumbnail of Design and Implementation of A Secure Web Application

Discussion and analysis of a scenario where a demo web application that acts as a profile manager... more Discussion and analysis of a scenario where a demo web application that acts as a profile manager is assessed from a security point of view. We will design and develop the test web application and we will perform a vulnerability assessment throughout all the technologies applied, in order to identify possible security weaknesses and exploits.

Research paper thumbnail of xDSL Signal Encoding Efficiency

Digital Subscriber Line is a data communications technology that transmits data faster over the s... more Digital Subscriber Line is a data communications technology that transmits data faster over the simple copper telephone lines. The signal encoding of xDSL technology is illustrated by a set of modulation techniques. This journal will overview the xDSL technology and will discuss subjects on the efficiency of these modulation techniques.

Research paper thumbnail of Analysis on Common Network Attacks and Vulnerability Scanners

The aim of this paper is to analyze some common network attacks and try to figure out the reason ... more The aim of this paper is to analyze some common network attacks and try to figure out the reason and ways they were made possible with the help of a few well known vulnerability scanners, port scanners and sniffers. These tools will be introduced and briefly analyzed first. The main part of the paper will talk about risk management, assessment and analysis. It will also present common network attacks and introduce some useful tools. Finally, in the last parts we will discuss and conclude providing some logical assumptions.

Research paper thumbnail of Application of A Robotic Arm to An Automated Multi-Recording Process

This paper describes a construction of a robotic system, which is useful for recording multiple C... more This paper describes a construction of a robotic system, which is useful for recording multiple CDs or DVDs with almost any type of PC. The robotic system considered in this work is composed of three-link arm and four-joint. Its dynamic architecture can lead to a fully automated process with less or no need of human interaction. Its ability to adapt on almost every environment makes it flexible.

Research paper thumbnail of Design and implementation of a secure web application

Discussion and analysis of a scenario where a demo web application that acts as a profile manager... more Discussion and analysis of a scenario where a demo web application that acts as a profile manager is assessed from a security point of view. We will design and develop the test web application and we will perform a vulnerability assessment throughout all the technologies applied, in order to identify possible security weaknesses and exploits.

Research paper thumbnail of Application of a robotic arm to an automated multi-recording process

International workshop on …, 2004

... Sze, SM, 'Semiconductor Sensors', John Wiley &a... more ... Sze, SM, 'Semiconductor Sensors', John Wiley & Sons, New York, 1994. Ventzas, DE, Tsitsipis P, Kalovrektis K, Varzakas K, (1998) 'Microcontroller Control of anElectro-Pneumatic Manipulator', Euriscon 98, SIRES/IEEE/CSS, June, pp.98. ...

Research paper thumbnail of Geeks Artificial Neural Network (G.A.N.N)

A 2.5 years research that I did as an undergraduate student at T.E.I of Lamia. This paper analyze... more A 2.5 years research that I did as an undergraduate student at T.E.I of Lamia. This paper analyzes current ANN solutions and discovers problems and limitations. Then it proposes an entirely new approach and a new type of ANN, the G.A.N.N, with a set of new mathematical models and rules.

Research paper thumbnail of Design and Implementation of A Secure Web Application

Discussion and analysis of a scenario where a demo web application that acts as a profile manager... more Discussion and analysis of a scenario where a demo web application that acts as a profile manager is assessed from a security point of view. We will design and develop the test web application and we will perform a vulnerability assessment throughout all the technologies applied, in order to identify possible security weaknesses and exploits.

Research paper thumbnail of xDSL Signal Encoding Efficiency

Digital Subscriber Line is a data communications technology that transmits data faster over the s... more Digital Subscriber Line is a data communications technology that transmits data faster over the simple copper telephone lines. The signal encoding of xDSL technology is illustrated by a set of modulation techniques. This journal will overview the xDSL technology and will discuss subjects on the efficiency of these modulation techniques.

Research paper thumbnail of Analysis on Common Network Attacks and Vulnerability Scanners

The aim of this paper is to analyze some common network attacks and try to figure out the reason ... more The aim of this paper is to analyze some common network attacks and try to figure out the reason and ways they were made possible with the help of a few well known vulnerability scanners, port scanners and sniffers. These tools will be introduced and briefly analyzed first. The main part of the paper will talk about risk management, assessment and analysis. It will also present common network attacks and introduce some useful tools. Finally, in the last parts we will discuss and conclude providing some logical assumptions.

Research paper thumbnail of Application of A Robotic Arm to An Automated Multi-Recording Process

This paper describes a construction of a robotic system, which is useful for recording multiple C... more This paper describes a construction of a robotic system, which is useful for recording multiple CDs or DVDs with almost any type of PC. The robotic system considered in this work is composed of three-link arm and four-joint. Its dynamic architecture can lead to a fully automated process with less or no need of human interaction. Its ability to adapt on almost every environment makes it flexible.