13 research outputs found

    Anomaly-based network intrusion detection methods

    Get PDF
    The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization of our results. The WEKA is a collection of machine learning algorithms for data mining tasks

    Interactive VoiceXML module into SIP-based warning distribution system

    Get PDF
    This article discusses the use of the Voice Extensible Markup Language (VoiceXML, VXML) to create a complex voice menu in danger alert communication system. The system was created as a part of research at Department of Telecommunications at the VSB - Technical University of Ostrava. Creating a voice menu provides end-users more information about the impending danger as well as instructions on how to behave in a given situation. If users receive a pre-recorded warning message in the form of a phone call, it will provide a telephone number on which they can obtain more information. In order to achieve the desired functionality, we had to use open-source PBX Asterisk, the VoiceGlue package which features both the VoiceXML interpreter and the Text-to-Speech (TTS) moduleScopus14934433

    Exploiting secure performance of full-duplex decode and forward in optimal relay selection networks

    Get PDF
    In the presence of an illegitimate user, we investigate the secrecy outage probability (SOP) of the optimal relay selection (ORS) networks by applying decode-and-forward (DnF) based full-duplex (FD) relaying mode. The closed-form expressions for the allocations of the end-to-end signal-to-interference-plus-noise ratio (SINR) in each wireless network are derived as well as the closed-form expression for the exact SOP of the proposed ORS system is presented under Rayleigh fading schemes. As an important achievement, SOP is also compared between orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA) schemes. Our results reveal that the SOP of the suggested scheme can be considerably influenced by several parameters involved, including the number of relays, the average signal-to-noise ratio (SNR) of eavesdropper links, transmit power and the average residual self-interference (SI) enforced on the FD relays.Web of Science244767

    Testování číslicového systému s využitín DF grafu

    No full text
    Import 05/04/2007PrezenčníNeuveden

    Bezdemontážní diagnostický systém elektronického regulátoru lokomotivy

    No full text
    Import 20/04/2006Prezenční výpůjčkaVŠB - Technická univerzita Ostrava. Fakulta elektrotechniky a informatiky

    Generování testů pro DF graf

    No full text

    Danger alert communication system

    Get PDF
    This article discusses a danger alert system created as a part of research project of EU seventh framework programme. The aim of the system is to distribute pre-recorded voice messages in order to alert the called party to danger. This article describes individual technologies which the application uses for its operation as well as issues relating to hardware requirements and transfer line bandwidth load. The article also describes new algorithms which had to be developed in order to ensure the reliability of the system

    Objective assessment of IP video calls with Asterisk

    Get PDF
    The paper deals with an objective assessment of IP video calls transmission over GSM and UMTS networks. Video transmission is affected by many factors in mobile network. Among these factors belong packet loss, latency and transmission rate of the mobile network. Network properties were simulated by Simena network simulator. Our team have developed a unique technique for finding defects in video appearing in video calls. This technique is built on modified Asterisk SW PBX with enabled video recording and playback functions. Transmitted video files are compared with original video file by means of size of transmitted video file and in-video-defects. We are using MSU VQMT software for finding in video defects; more precisely we are using VQM method for comparing two video sources

    Fundamental frequency extraction method using central clipping and its importance for the classification of emotional state

    Get PDF
    The paper deals with a classification of emotional state. We implemented a method for extracting the fundamental speech signal frequency by means of a central clipping and examined a correlation between emotional state and fundamental speech frequency. For this purpose, we applied an approach of exploratory data analysis. The ANOVA (Analysis of variance) test confirmed that a modification in the speaker's emotional state changes the fundamental frequency of human vocal tract. The main contribution of the paper lies in investigation, of central clipping method by the ANOVA

    Video files recording and playback with VoiceXML

    Get PDF
    The paper deals with SW PBX Asterisk and with features supporting video calls but our primary object is not switching video calls but their automatic recording and replaying. Asterisk is open source telephone exchange which brings capability for audio and video calls but does not allow recording and playback of video files. We have implemented these capabilities and our solution is designed for customers using mobile smartphones. End-users can record a video directly on server. The video files are saved in a directory and a list of these files is generated. Names on the list are read to users by means of the speech synthesis, and subsequently the DTMF key input is used to make the choice. We applied VoiceXML for this purpose and the Interactive voice response as a tool enabling browsing in the directory and playback the selected video. Nowadays, we record video on memory card inside mobile phone but our presented solution offers an option to store the video on server in real-time, for end-user is simple to make a call and video is being automatically recorded.Scopus35435
    corecore