+ All Categories
Home > Documents > ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three...

ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three...

Date post: 22-Sep-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
16
ADITESS LTD BUSINESS PORTFOLIO Interested parties should contact: Managing Director Mr. Nikolaos Koutras Tel: +357 22250959 Mobile: +357 97884142 Fax: +357 22250957 [email protected] www.aditess.com
Transcript
Page 1: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

ADITESS LTD

BUSINESS PORTFOLIO

Interested parties should contact:

Managing Director Mr. Nikolaos Koutras

Tel: +357 22250959

Mobile: +357 97884142

Fax: +357 22250957

[email protected]

www.aditess.com

Page 2: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

ADITESS INTRODUCTION

ADITESS -Advanced Integrated Technology Solutions & Services Ltd is a Cyprus-based Small

Medium Enterprise (SME) established in 2011. ADITESS is a scientific, consulting, and

research company whose purpose is to conduct theoretical and applied research and to

produce studies, at strategic and tactical level, on issues concerning Security policies, Critical

Infrastructure Protection, Transportation and Cargo Security, Border Management and to

develop state of the art applied Security Solutions in the above mentioned areas.

ADITESS has the ability to provide advisory and consulting services to various Government

Organizations and to other Public and Private authorities on these same issues.

Our staff is composed of dedicated and experienced professionals who have outstanding

professional and academic experience in the area of Homeland Security, and have been

involved in EU Research Programs as well as national and international projects for several

years. Consisting and cooperating with consultants - researchers with professional and

academic experience and a long-standing history in proposal preparation, project management

and R&D activities, ADITESS LTD is at the forefront of our offering with clients stemming

from a multitude of technological domains, such as Security, Defense, Information and

Communication Technologies. Furthermore a number of our researchers come with military

and police forces background in IT Security, Electronic Warfare (EW) and Signal Intelligence

(SIGINT) in large-scale National and NATO led operations, over the last fifteen years. This field

experience is enhanced by high academic knowledge especially in the security (IT, Electro-

optics, Communication, etc.) system’s area.

ADITESS members decided to join their complementary skills in order to offer a large portfolio

of services and support activities as well as technical expertise in both R&D and commercial

activities.

Our business philosophy is to adhere to the needs and requirements of our clients,

providing high quality customer satisfaction, leading to a loyal and expanding customer

following. ADITESS’ goal is to fully support its Clients to identify their specific needs, plan,

implement and deliver projects successfully.

We intend to work closely with our Clients providing a complete range of project delivery

services and expert advice throughout any project life cycle.

ADITESS - Advanced Integrated Technology Solutions & Services Ltd is a private company

limited by shares.

Registration Number: HE298153, Registration Authority: Cyprus/ Registrar of Companies

Registration Date: 06 /12/2011, Office: Byzantiou 40, 2064 Nicosia, Cyprus

FP7 PIC Number: 954502214

Page 3: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

ADITESS BUSINESS PORTOFOLIO

1. SECURITY CONSULTING ACTIVITIES

ADITESS is dedicated to delivering world-class value enhancing advice and services to our

clients. The Consulting team provides highly qualified experts to help our clients proactively and

efficiently address key business demands and issues.

ADITESS security consulting service offerings include the following areas:

Strategic Security Planning

Risk Management and Business Continuity

System Analysis and Design

Security Plans and Policies

Review, assess, and modify existing security plans

Risk Assessment

Risk Management

Business continuity

Laws and regulations

Staff Training

ADITESS provides best practice security planning and review/assessment of existing security

plans to major organizations and governments internationally, enabling them to implement cost

effective security solutions to safeguard installations, assets, staff, and clients.

ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets are: Operations, Systems, and People. All three facets are equally important.

Since people conduct security, not systems, it is important to ensure that the right procedures are in place, with the right people, and the right training. In fact “operations”, “systems” and “people” must be inter-compatible and synchronized in order to produce real-life, practical and measurable results.

Page 4: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

2. R&D ACTIVITIES

ADITESS LTD is a scientific, consulting and research company, whose purpose is to conduct

theoretical and applied research and to produce studies, in strategic and tactical levels. It covers

issues concerning security policies, aftermath on crisis events, emergency management

situations, critical infrastructure protection, transportation security and border management

(monitoring and surveillance), state-of-the-art modeling solutions and monitoring equipment for

border security. ADITESS LTD has the ability to provide advisory and consulting services in the

broader area of Security, Safety and Protection, and to issue after-action reports and

lessons learned to various Government Organizations and other Public and Private authorities.

ADITESS, among other activities, is also offering comprehensive services for the organization

and coordination of EC FP7, the Horizon 2020 or various National R&D proposals and research

projects in the field of Security, ICT, Aeronautics (UAVs), Communications, Transportation and

Environment. ADITESS has developed an expertise in projects related to the referenced fields.

Ever since the company has strategically positioned itself between the academia, SME’ and the

government, benefiting from research and training most importantly. ADITESS forms

sustainable collaborations and partnerships with a number of universities, private not-for-profit

research centers and laboratories.

Analyses of some of the R&D activities and products that ADITESS has explored from 2011 till

today are described below:

2.1 Unmanned Aerial Vehicles (UAV)

ADITESS has developed during research and design phases a variety of UAV systems, a new

concept in UAV market: designed from existing cots platforms or from ADITESS design, in order

to minimize the development cost. As it was derived from general aviation standards, it is

optimized for reduced cost of operations. The Mini-UAV systems could also prepare for

navigation in controlled civilian airspace and for compliance to certification requirements that will

become applicable to all UAS addressing homeland security applications and flight operations in

European sky.

Source: ADITESS LTD

Page 5: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

2.2. Remote Sensing & Photogrammetry

ADITESS offers high quality remote sensing and photogrammetric products using satellites

images and digital air-photos acquired by aircraft and/or Unmanned Aerial Vehicles (UAV). We

are capable of managing small, medium and large scale projects, providing world-class services

in the appropriate time to support at least the following applications:

Medium to large scale (including cadastral) mapping

3D Visualization and representation

3D city models

View shed or Light of Sight analysis

Security Planning

Crisis Management

Disasters/Floods

Search & Rescue (SAR)

Border security- Illegal Immigration

Monitoring / Recording of the environment

Fire Crisis Management

Viewing Pipeline, Construction Sites or other structures (e.g. roads)

Nuclear Detection or poisonous gases

Protection from Oil Spills

Source: ADITESS LTD

Page 6: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

2.3 Software Engineering

Our software engineers have many years of academic and industry experience in software

design and implementation. ADITESS has the capacity to assist at all stages of the software

development process, starting from the initial design phase, followed by the implementation,

testing, and final deployment. We are able to handle a wide range of software projects, from

purely backend systems to mobile applications.

Our Experience

Large-scale and real-time systems

Database systems (PostgreSQL, MySQL)

Distributed systems and parallel architectures (MPI, OpenMP, CUDA)

Automated data collection and extraction

Cloud computing and High Performance Computing

Machine Learning toolkits (Weka, Shogun, Spider)

Java, C++, Perl, Python, Scheme, MATLAB

GNU/Linux environment and open source packages

Apache HTTP Server, Apache Lucene, Apache Tomcat, Apache DB

Algorithm and Data Structure optimization

2.4 Machine Learning

In the hands of experts, machine learning is a powerful tool which can be used for data analytics, pattern recognition, and prediction. ADITESS scientists use state-of-the-art machine learning algorithms and successfully apply them to diverse fields, turning raw data into valuable information, and most importantly into insight and understanding. Big data analytics has become essential practice for modern businesses as it uncovers knowledge which is otherwise concealed in vast collections of data. Data mining and machine learning can be used to discover anomalies, enhance productivity, maximize efficiency, and to forecast opportunities.

Our Research

Support Vector Machines (SVM), Neural Networks

Decision Trees, Random Forests

Data pre-processing, feature extraction, feature selection

Self-organizing maps (SOM) and clustering

Natural Language Processing and Text Mining and summarization

Business and Financial predictions

Image recognition and speech recognition

Medical diagnostics from biomedical imaging

Kernel methods

Page 7: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

Source: ADITESS LTD

Speaker-independent speech recognition using time-frequency image kernels: the word

“eight” is correctly recognized by giving emphasis to noise-robust features.

2.5 Ad Hoc Wireless Networks

We strongly believe that the future of data networks lays with wireless networking technologies.

We are just at the beginning of a new age for inter-home networking, medical treatment,

surveillance systems and many other future applications based on Ad-hoc wireless technology.

However, to be able to utilize wireless Ad-hoc networks, several requirements within the

following research areas need to be met: QoS, security, and mobility.

Our Research Mobile and Vehicular Ad-hoc Networks (MANETs-VANETs)

Sensor Networks

Software tools for wireless network design and performance evaluation

Quality of Experience (network centric and end-user perceived QoE)

End-to-end Quality of Service (QoS) algorithms and design

Video Quality Assessment Methods

Adaptive transmission protocols for video streaming applications

Security Algorithms

Cross Layer Design

2.6 Network Simulations

Simulation has always been a valuable tool for experimentation and validation of models,

architectures and mechanisms in the field of networking. In order to study and validate new

wired and wireless architectures, protocols and services in ADITESS we use the Network

Simulator ns-2 and ns-3, which are highly accepted by the research community.

The Network Simulator (NS) is a discrete event simulator targeted at networking research. NS

provides substantial support for simulation of TCP, routing, multicast protocols over wired and

wireless (local and satellite) networks, and Ad Hoc networking. ADITESS researchers using NS

are able to design new solutions, test their functionality and performance and compare them

with other existing solutions. NS simplifies the test and evaluation procedure in a controlled

Page 8: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

environment; it is cost effective and provides a deep insight in our design before the actual

experimentations with real world models.

Our Research

Modeling new designs and solutions

Simulation and evaluation of new solutions

Video transmission simulation tools

Simulation software development

Assessing Video Quality of Experience (QoE)

2.7 Decision Support Tools

Our software engineers have developed complete easily adaptable and ready to use end to end solutions employing the following state of the art tools and methods:

Web Semantics to model and automatically analyze critical infrastructure status with the associated Information Communications Technology (ICT) system requirements and vulnerabilities;

Service Oriented Architectures (SOA) and related technologies to provide dynamic, adaptable and manageable ICT systems and components and decision support tools;

Application of these technologies to Critical Infrastructure operation and protection.

Moreover substantial expertise on the creation and development of:

Ontology’s (and ontology driven models) for modeling of complex critical infrastructure including physical processes and ICT components, to capture their requirements, behavior and compositional nature;

System dependability metrics and agreements, and dynamic governance mechanisms, including dynamic trust management;

Page 9: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

System composition mechanisms allowing dynamic discovery and interconnection of component services;

Intelligent Decision Support Systems using semantic models and stream reasoners (such as C-SPARQL) to provide enhanced situational awareness of system status and threats.

Our intelligent Decision Support Systems (iDSS) and methods rely on:

Proven Advanced Complex Event Processing algorithms.

Probabilistic methods such as adaptive Kalman Filtering for fast data streaming and smoothing/prediction

Decentralized Semantic Monitoring in conjunction with graph theoretic notions to capture the dynamics of realistic event driven situations.

Stream reasoning algorithms using stream data sampling and filtering and RDF streaming with incremental reasoning procedures for complex real time situational analytics.

Dynamic and real time threat risk assessment and analysis using innovative mathematical methodologies and Machine learning algorithms (including Bayesian networks and inference and Monte Carlo simulations and Markov Chain modeling techniques).

Applications include but are not limited to: Oil drilling platforms, Critical Infrastructures Protection, Health Monitoring of large industrial units, Physical processes in the chemical and petroleum industry, Health applications and management optimization, UAV coordination and real time health monitoring, distributed power systems and transmission, sensor web networks. 2.8 Transportation Planning and Engineering 2.8.1 Statistical, operational research and computational intelligence modeling

Efficient traffic management becomes more and more essential nowadays, as traffic congestion

becomes one of the thorniest problems of today’s society. In this direction, statistical,

econometric and computational intelligence methods have been developed in order to forecast

traffic status in a short time horizon. In addition, operational research, which is the application of

advanced analytical methods to help make better decisions, assists many times in real-time

traffic management when decisions have to be taken quickly.

Our Research

Applications to short-term traffic forecasting

Applications in Large Scale Optimization Problem Formulation and Solving with

additional particular focus on Emergency Response

Applications in Freeway Operations Optimization and Management under typical or

atypical conditions.

Page 10: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

2.8.2 Vehicle and pedestrian tracking and microscopic modeling

For the better embedding of complexity of the traffic flow laws, many microscopic models have been developed to detect and simulate the behavior of vehicles and pedestrians. Microscopic traffic flow models simulate every single vehicle-driver and pedestrian unit, so the dynamic variables of the models represent microscopic properties like their position and velocity. These days, many microscopic models include decision-making rules achieving high accuracy in predicting the user’s decision in route choice, choice of public transportation, etc.

Our Research

Kinematic characteristics and interactions of powered-two-wheelers filtering and

overtaking in urban arterials

Survival modeling of the overtaking duration in two lane highways

Modeling microscopic freeway traffic using cusp catastrophe theory

Pedestrian tracking and microscopic modeling in Metro Stations and Airports

Source: ADITESS LTD (left) & www.trafficwareinc.com (right)

Page 11: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

2.8.3 Traffic operations, transportation planning, energy and environmental planning

Generally, transportation planning includes design, evaluation and application of transport

facilities. Examples of these applications are the construction or extension of urban arterials or

highways, the planning of public transport lines and the planning of reducing the traffic pollution

and the fuel consumption.

Source: ADITESS LTD

Our Research

Transportation Modeling and forecasting (four-step planning models).

Congestion pricing for energy efficient urban networks

Traffic flow evolution effects to nitrogen dioxides predictability in large metropolitan

areas

Demand Modeling and Forecasting, Mode Choice Modeling

Public Transportation Planning and Scheduling

Urban traffic flow determinants of the environmental quality in metropolitan areas

Climate change and its impact on transportation infrastructures

Recurrence quantification analysis in maximum monthly precipitation based on

atmospheric circulation

Nonlinear and recurrence quantification analysis in extreme precipitation time series

under present and future climatic conditions

Page 12: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

2.8.4 Asset management and Feasibility and Benefit Cost Analyses

One of the most necessary steps that should take place in every transportation project is the cost-benefit analysis. Through this process, the analyst manages to calculate and compare the costs and benefits of a project, a policy or a decision. It aims to justify whether an investment is worthwhile or not (feasibility analysis) and offers an assessed framework to compare the candidate projects.

Source: ADITESS LTD

Our Research

Development of Asset Management Systems, with extensions for managing assets

under emergency conditions

Feasibility and Benefit Cost Analyses of Transportation Related Projects

Risk Analyses of Transportation Projects

Transportation Service Pricing and Fare Policy Analysis

Page 13: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

3. FP7 R&D Funding Projects (Sec Call)

3.1 SEC-2013.1.6-3: ZONeSEC/ Towards an EU framework for the security of

Widezones (Dec 2014)

Grant Agreement Number: 607292

ADITESS provide the mini-UAV systems and participate in the development of the EU

framework tool /platform

3.2 SEC-2013.4.1-4: IMPRESS/Improving Preparedness and Response of HEalth

Services in major crises” (May 2014)

Grant Agreement Number: 608078

ADITESS provide the Hospital Data warehouse solution

3.3 SEC-2013.7.2-1: P-REACT / Petty cRiminality diminution through sEarch and

Analysis in multi source video Capturing and archiving plaTform (Apr 2014)

Grant Agreement Number: 607881

ADITESS provide the Cloud-Based Archive, Multi-Source Video Integration and the speech

– sound recognition algorithms

4. FP7 R&D Funding Projects (CIPS – ISEC Call)

4.1 HOME/2013/ISEC/AG/INT : Illegal use of Internet (INT) (Sep 2014)

Cyprus Cybercrime Center - 3CE

Grant Agreement Number: 30-CE-0649141/00-83

Aditess provides the training material and the e-learning platform

4.2 HOME/2013/CIPS/AG : Prevention, Preparedness and Consequence Management

of Terrorism and Other Security Related Risks (July 2014)

European Surface Transport Operators Forum – EUSTO

Grant Agreement Number: 30-CE-0646898/00-75

Aditess provides risk analysis in CI operations, the web page and repository management

of the project

4.3 HOME/2013/ISEC/INT/: Illegal use of Internet (INT) (Jylu 2014)

Engaging Users in Preventing and Fighting Cyber Crime – UINFC2

Page 14: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

Grant Agreement Number: 30-CE-0652070/00-76

Aditess provides software development, web solution, Internet marketing, social media

content analysis and the knowledge management platform of the project

5. Commercial Projects

5.1 Photogrammetric and Remote Sensing

ADITESS with the support of other companies from 2013 already provides services, to

various Hellenic Organizations, regarding Photogrammetric and Remote Sensing

applications. We also provide in the area of UAVs high-precision mapping and aerial

photography services and products for civil, security and military applications with our

technical experts.

Source ADITESS LTD: Ortho photos applications

Page 15: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

5.2 SSM NATURE Project

ADITESS as subcontractor in 2014 provided the AP-M-1S800 multirotor platform to a

consortium and primary the appropriate organizations of Vlore/Albania for environmental

operations.

Source ADITESS LTD: Class training

6. Commercial Products

6.1 The Versatile Media Content Management System VMCMS-GE

In 2015 ADITESS lunch the VMCMS-GE system. The VMCMS-GE is a content management

system for the efficient management, archiving, fast-indexing and processing of multimedia

content through a modular architecture. The VMCMS-GE has been designed by ADITESS as a

result of our holistic strategy considering the key aspects of functional and creative design while

also servicing the needs for scalability by exploiting the cloud characteristics. The platform is

designed to fit the needs of a wide range of users through secure, yet, easy to deploy interfaces

and a user-friendly graphical environment. VMCMS-GE is characterized for its highly scalable,

flexible and customizable design which minimize deployment times.

The efficient management of data is accomplished with the use of user-defined metadata tags

whose addition and removal is an easy task while the high customization of the platform allows

integration with any cloud solution. Most importantly and having identified the need for security

and data protection, the platform supports data encryption, secure communication channels and

permission types.

The implementation of custom user privileges is also possible; in cases where the pre-defined

classes do not fully fulfill the requirements.

Page 16: ADITESS LTD BUSINESS PORTFOLIO€¦ · ADITESS’ approach to Security involves addressing three different facets separately, but also in conjunction with each other. These facets

Byzantiou 40, Nicosia , 2064 , Cyprus www.aditess.com

VMCMS-GE may serve as a solution in many applications and different domains, due to this,

contains built in mechanisms that allow the designation of application-specific queries that may

combine external as well as internal information. The platform is also capable of efficiently

managing heterogeneous multimedia content and processing through pre-installed analytics

modules. The processing module supports several existing containers and formats for

multimedia while additional modules may be added through the analytics repository module.


Recommended