Theodoros Kostis

Theodoros Kostis

Location
Greece
Industry
Research

As a LinkedIn member, you'll join 300 million other professionals who are sharing connections, ideas, and opportunities.

  • See who you and Theodoros Kostis know in common
  • Get introduced to Theodoros Kostis
  • Contact Theodoros Kostis directly

View Theodoros's full profile

Theodoros Kostis's Overview

Connections

500+ connections

Theodoros Kostis' Certifications

  • Chartered Electrical Engineer (CEng MIEE)

    • Engineering Council United Kingdom
    • March 2004
  • Instructor Competencies Professional Certificate: Standard Level

    • The International Board of Standards for Training, Performance and Instruction
    • April 2006
  • Radioelectrology Licence Class A

    • Hellenic State - Ministry of Transport
    • April 2005
  • Electrical Installations Licence - All Types & Categories

    • Hellenic State - Athens Prefecture
    • July 2005

Theodoros Kostis' Skills & Expertise

  1. Radar
  2. Electronic Warfare
  3. Research
  4. Simulations
  5. Software Engineering
  6. Electronics
  7. Signal Processing
  8. Image Processing
  9. Matlab
  10. Algorithms
  11. Programming
  12. C
  13. Computer Science
  14. Systems Engineering
  15. Machine Learning
  16. LaTeX
  17. C++
  18. Artificial Intelligence
  19. Pattern Recognition
  20. Fortran
  21. Mathematical Modeling
  22. Data Mining
  23. Physics
  24. Statistics
  25. Simulink
  26. Data Analysis
  27. Optimization
  28. Python
  29. Numerical Analysis
  30. Computer Vision
  31. Modeling
  32. Mathematica
  33. Theory
  34. Science
  35. Semantic Web
  36. Distributed Systems
  37. R&D
  38. Remote Sensing
  39. VHDL
  40. Monte Carlo Simulation
  41. Linux
  42. Lecturing
  43. Operations Research
  44. Sensors
  45. Human Computer Interaction
  46. University Teaching
  47. UML
  48. Embedded Systems
  49. Statistical Signal Processing
  50. Digital Signal Processors

View All (50) Skills View Fewer Skills

Theodoros Kostis' Publications

  • Simulator-defined Radar Countermeasure System (Sim-dRCS) Proof of Concept for Deception in Air Defense at Sea

    • SAGE
    • February 9, 2011
    Authors: Theodoros Kostis

    Modern air defense at sea doctrines need to consider the emerging technology of software-defined radar. In this manner the surveillance and tracking abilities of imaging radar are implemented in software. Concurrently there exists the need to forge the other side of the same coin. The Software-defined Radar Countermeasure System (S-dRCS) might be a solution for confusing adversary radar operators. In this spirit the current contribution is the proof of concept for a S-dRCS special case called the Simulator-defined Radar Countermeasure System (Sim-dRCS). The simulator approach for imaging radar countermeasures is preferred because it provides a bespoke generation of the required signals valid for a diverse set of adversary observers, which are considered to be Inverse Synthetic Aperture Radar systems. The simulator receives input from the sensors of the Sim-dRCS and then crafts false targets matched to the heading and velocity vectors of the threat. In this case the countermeasure output is a battleship-class false naval target. The achievement of verisimility enhancement is the main requirement in order to support this deceptive stratagem.

  • Angular glint effects generation for false naval target verisimility requirements

    • IOP
    • September 4, 2009
    Authors: Theodoros Kostis

    A stimulating problem in the generation of coherent countermeasures for high range resolution radar systems is the inclusion of angular glint effects in the preparation of the false target mask. Since angular glint is representative of extended naval targets, this inclusion increases the credibility factor of the decoy playback signal at the adversary radar-operator station. In this paper, the ability of an interferometric inverse synthetic aperture radar (InISAR) simulator to provide a proof of concept towards the clarification of this challenging task is ascertained. The solution consists of three novel vector representations of the generated data, which are proven to behave according to the laws of physics governing the glint phenomenon. The first depiction is the angular glint injection at the target which is followed by the representation of the wavefront distortion at the radar. A value-added time procession integration of the target in pure roll motion provides an expected by ISAR theory side-view image of the naval extended false target. The effectiveness of the proposed approach through verification and validation of the results by using the method of pictorial evidence is established. A final argument is raised on the usage of this software tool for actual obfuscation and deception actions for air defence at sea applications.

  • Cross-References: Angular glint effects generation for false naval target verisimility requirements

    • Journal to Journal Cross References
    • February 3, 2012
    Authors: Theodoros Kostis

    1. 2010, Polarization discrimination of multi-false-target jamming based on pattern difference structure of sum and difference beam, Dai Huanyao; Li Yongzhen; Wang Xuesong; Xiao Shunping Journal of Aerospace Electronic Warfare, Issue 5, Page 19-22.

    2. 2011 Interferometric Isar Three-Dimensional Imaging Using One Antenna,
    C Liu, X Gao, W Jiang… - Progress In Electromagnetics Research, 2011 - jpier.org

    3. 2011, Novel discrimination method of digital deceptive jamming in mono-pulse radar,
    H Dai, X Wang… - Systems Engineering and Electronics, …, 2011 - ieeexplore.ieee.org

    4. 2011, Squint-mode InISAR imaging based on nonlinear least square and coordinates transform, Liu C L, He F, Gao X Z, et al., Sci China Tech Sci., Volume 54, Number 12, 3332-3340,
    doi: 10.1007/s11431-011-4515-9
    http://www.springerlink.com/content/y6551n7368214g52/references/

    5. 2011, Review of Interferometric ISAR Imaging, Liu C L, He F, Gao X Z, et al., Signal Processing, Vol. 27, No.5, May.

    6. 2012, Novel reference range selection method in InISAR imaging, Chenglan Liu et al, Jrn Systems Eng & Electronics, Vol. 23, No.4, pp. 512-521.

  • Inverse Synthetic Aperture Radar Simulator Implementation for an Extended Naval Target for Electronic Warfare Applications

    • United Kingdom Simulation Society
    • May 1, 2009
    Authors: Theodoros Kostis

    Airborne Inverse Synthetic Aperture Radar systems provide excellent surveillance abilities for imaging naval targets. Considering this as a maritime surveillance threat we derive a simulator system in this paper that can be used to synthesize false targets that would appear as credible military fleets.

  • ISAR Simulators as Software-defined Countermeasure Systems

    • LAP Lambert Academic Publishing
    • September 15, 2010
    Authors: Theodoros Kostis

    Modern air defence at sea doctrines call for new shipborne surveillance and tracking systems that are based on software implementations, like software-defined radar systems. This thesis contributes to investigations in the context of the ever-demanding need to forge the other side of the same coin which is countermeasures implementation for electronic protection from high range resolution sensors based again on software-defined radar concepts and principles. The first part of this thesis looks at the problem of devising countermeasures for the protection of naval targets. The second part of the thesis is focused on the amalgamation of software and radar engineering in order to increase the verisimility issues of false targets. The remainder of the thesis is then focused on further investigations in the field of computer networks warfare. The thesis concludes with the statement that the acquired Software-defined Countermeasure Systems concepts and techniques can be used in an effective and adaptable manner in order to provide deception countermeasures for both electronic warfare and computer networks warfare fields, which both are elements of the domain of information warfare.

  • Security by Obfuscation and Deception for Electronic & Computer Networks Warfare

    • InTech
    • February 1, 2010
    Authors: Theodoros Kostis

    Theodoros G. Kostis (2010). Inverse Synthetic Aperture Radar Simulators as Software-defined Countermeasure Systems: Security by Obfuscation and Deception for Electronic & Computer Networks Warfare, Modelling Simulation and Optimization, Gregorio Romero Rey and Luisa Martinez Muneta (Ed.), ISBN: 978-953-307-048-3.

  • Interferometric Inverse Synthetic Aperture Radar Simulator Software: Re-Usability Analysis for Air Defence at Sea Electronic Warfare Applications

    • NATO Research & Technology Organisation - SET136, Lisbon, Portugal.
    • June 15, 2009

    Modern air defence at sea doctrines call for new shipborne surveillance and tracking systems that are based on software implementations, like software-defined radar systems. This paper contributes to investigations in the context of the ever-demanding need to forge the other side of the same coin which is countermeasures implementation for electronic protection from high range resolution sensors based again on software-defined radar concepts and principles. We ascertain the ability of our Interferometric Inverse Synthetic Aperture Radar (InISAR) simulator to provide a proof of concept towards the creation of a software-defined countermeasure system concept that can produce false targets with realistic properties suited to the prevalent situational awareness conditions.

  • False Naval Target Verisimility Issues for Imaging Radar Deception

    • NATO Research & Technology Organisation - SET160, Athens, Greece.
    • October 11, 2010

    The art of creating coherent countermeasures for high range resolution radar systems is complicated and fascinating. For the field of deception for imaging radar the product of this artistic effort is demanded to produce an effective solution by the academic and military communities. In this case the term art is the collection of requirements that define the tools that result in the creation of ISAR images that depict false extended targets. The novelty in this paper is the analysis of how the application of different verisimility levels influences the opposition in the domain of air defence at sea

  • Decision Support Subsystem for the Sim-dRCS Concept

    • NATO Research & Technology Organisation - SET160, Athens, Greece.
    • October 11, 2010

    Military naval targets are difficult to hide from electromagnetic and acoustic sensors. Especially for microwave wavelengths they can be resolved in their superstructure details with an ISAR system. This ability generally provides positive classification and in some cases concrete identification information from a considerable distance between adversary radar and friendly naval platforms.

    Our proposed solution is the concept of the simulator defined radar countermeasure system (Sim-dRCS). The principle of operation is the creation of multiple false naval targets that are as similar as possible to the real friendly naval asset. The simulator approach is preferred because it can provide the advantage of quick and bespoke duplication of the prevalent situational awareness to a virtual world. In other words the creation of the false naval targets are custom-built to the adversary heading and velocity vectors.

  • Future Requirements for Deception in Naval Defence

    • 9th European Conference on Information Warfare & Security
    • July 1, 2010

    Military naval targets are difficult to hide. For radar wavelengths they are extended targets to a surveillance Inverse Synthetic Aperture Radar (ISAR) system that can resolve their superstructure details and provide classification and even identification tasks from a very far distance. But the need to hide from adversary threats is always there. The proposed solution is a Simulator-defined Radar Countermeasure System (Sim-dRCS).

  • An Interferometric ISAR System Model for Automatic Target Identification

    • European Conference on Synthetic Aperture Radar (EUSAR) 2006
    • May 1, 2006
    Authors: Theodoros Kostis

    Air-to-sea surveillance and tracking systems that provide rapid and positive identification of uncooperative and stealthy targets are connected with Inverse Synthetic Aperture Radar concepts and techniques. ISAR (or Range-Doppler) has several shortcomings that could be dealt with the contribution of a Phase Comparison Monopulse system. This paper presents the possible output for the height dimension of a ship target coming from a hybrid InISAR (Radio Frequency Interferometer-ISAR) system.

  • Glint Effects Simulation for an Extended Naval Target Using an Interferometric Inverse Synthetic Aperture Radar System Model

    • European Conference on Synthetic Aperture Radar (EUSAR) 2008
    • May 1, 2008
    Authors: Theodoros Kostis

    This paper presents outcomes of the FB-16 prediction and modelling software package regarding glint effects for an extended naval target of considerable length and superstructure dimensions. The FB-16 package is a modular simulator system made up of a three-dimensional multiple scatterers multiple layers model of a battleship class vessel as viewed by a High Range Resolution Radar System. The current novelty is the introduction of an add-on module that simulates the glint effect assuming two dominant scatterers in different heights for each resolution cell. Results are presented for different radar-target distances that would benefit the theoretical explanation of the case under consideration for academic and novel system conception purposes.

  • Applying Simulator-defined Radar Countermeasure Systems Techniques to Computer Network Security Issues

    • 3rd UKSim European Symposium on Computer Modeling and Simulation
    • November 25, 2009

    Electronic Warfare and Computer Network Warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generation of false naval targets for the purpose of security by obscurity in the field of electronic warfare. This paper proposes that the experience and expertise of creating simulator-defined false naval targets is very beneficial to the field of security by obscurity for computer network warfare.

  • Stealth Aircrafts: Steganography in the Skies

    • Hellenic Military Academy Scientific Conference
    • April 6, 2012

    A stealth airplane is not invisible. Stealth is a passive low observability technique that alters an airplane’s identity in order not to be detected by an adversary as a target of high interest. We might detect a similarity with the field of steganography, which is the conduct of secretive communications without raising suspicions. With this information hiding method messages are encapsulated in objects of different identity in order to pass unhindered through hostile environments just like a stealth plane’s electromagnetic signature is changed in order to pass for a non-interesting target on an opponent’s radar system. In this communication we compare stealth aircraft elements to steganography theory for the purpose of better understanding these concepts in a military perspective.

  • Quality Assurance Practices for Distant Supervision of Postgraduate Academic Projects

    • Hellenic Military Academy 2nd AMIMS Conference 11-12 Apr 2013
    • February 8, 2013
  • Automatic Identification System Stated Requirements for Naval Transponder Security Assurance

    • Hellenic Military Academy 2nd AMIMS Conference 11-12 Apr 2013
    • February 8, 2013
  • Wind Turbines & Weather Radar: A Review of the Problem

    • ICASM 2013 - WSEAS International Conference on Applied & Computational Mathematics
    • May 9, 2013

    Doppler Radars and Wind Turbines have an asymbiotic relationship. Both wish to exist in the same environment of space and time but when doing so wind turbines pose great problems to Doppler radars. This is important because Doppler radars are found in weather stations and air traffic control systems. In this paper we will describe the operation of a Doppler weather radar and particularly explain its visibility potentials. Then we will explain why this visibility potential can be interfered by the modulations produced by the wind turbines and pose such great problems to the Doppler radar’s operation. During this process we will make a state of the art review by referring to characteristic current bibliography and references about this issue. We finally pitch our theoretical opinion about the solution of the wind turbine interference problem.

  • Technologies for Border Control

    • EXPOSEC DEFENCEWORLD 2013
    • April 3, 2013

    Speech given regarding technologies for Border Control.

  • Book Review of "Pulse Doppler Radar" by Clive Alabaster.

    • IEEE Aerospace & Systems Magazine, Issue 11.
    • November 1, 2013
    Authors: Theodoros Kostis

    Enter the Guild of Pulse Doppler Radar!

    Having studied this new book by Clive Alabaster once at Cranfield University but now at White Horse Radar, entitled Pulse Doppler Radar, I can say that I have learned about pulse Doppler radar. Truly I have becomea member of the guild of pulse Doppler radar engineers that really know how this radar sees with its electromagnetic eyes. So do you want to be taught how to see with electromagnetic pulse Doppler radar eyes? Do you want to control the practice of this craft? After having studied this book you will have become a member of the pulse Doppler radar Guild!

View Theodoros Kostis’ full profile to...

  • See who you and Theodoros Kostis know in common
  • Get introduced to Theodoros Kostis
  • Contact Theodoros Kostis directly

View Theodoros's full profile

Viewers of this profile also viewed...