13 research outputs found
Anomaly-based network intrusion detection methods
The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization of our results. The WEKA is a collection of machine learning algorithms for data mining tasks
Interactive VoiceXML module into SIP-based warning distribution system
This article discusses the use of the Voice Extensible Markup Language (VoiceXML, VXML) to create a complex voice menu in danger alert communication system. The system was created as a part of research at Department of Telecommunications at the VSB - Technical University of Ostrava. Creating a voice menu provides end-users more information about the impending danger as well as instructions on how to behave in a given situation. If users receive a pre-recorded warning message in the form of a phone call, it will provide a telephone number on which they can obtain more information. In order to achieve the desired functionality, we had to use open-source PBX Asterisk, the VoiceGlue package which features both the VoiceXML interpreter and the Text-to-Speech (TTS) moduleScopus14934433
Exploiting secure performance of full-duplex decode and forward in optimal relay selection networks
In the presence of an illegitimate user, we investigate the secrecy outage probability (SOP) of the optimal relay selection (ORS) networks by applying decode-and-forward (DnF) based full-duplex (FD) relaying mode. The closed-form expressions for the allocations of the end-to-end signal-to-interference-plus-noise ratio (SINR) in each wireless network are derived as well as the closed-form expression for the exact SOP of the proposed ORS system is presented under Rayleigh fading schemes. As an important achievement, SOP is also compared between orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA) schemes. Our results reveal that the SOP of the suggested scheme can be considerably influenced by several parameters involved, including the number of relays, the average signal-to-noise ratio (SNR) of eavesdropper links, transmit power and the average residual self-interference (SI) enforced on the FD relays.Web of Science244767
Bezdemontážní diagnostický systém elektronického regulátoru lokomotivy
Import 20/04/2006Prezenční výpůjčkaVŠB - Technická univerzita Ostrava. Fakulta elektrotechniky a informatiky
Danger alert communication system
This article discusses a danger alert
system created as a part of research project of EU
seventh framework programme. The aim of the
system is to distribute pre-recorded voice messages
in order to alert the called party to danger. This
article describes individual technologies which the
application uses for its operation as well as issues
relating to hardware requirements and transfer line
bandwidth load. The article also describes new
algorithms which had to be developed in order to
ensure the reliability of the system
Objective assessment of IP video calls with Asterisk
The paper deals with an objective assessment of IP video calls transmission over GSM and UMTS networks. Video transmission is affected by many factors in mobile network. Among these factors belong packet loss, latency and transmission rate of the mobile network. Network properties were simulated by Simena network simulator. Our team have developed a unique technique for finding defects in video appearing in video calls. This technique is built on modified Asterisk SW PBX with enabled video recording and playback functions. Transmitted video files are compared with original video file by means of size of transmitted video file and in-video-defects. We are using MSU VQMT software for finding in video defects; more precisely we are using VQM method for comparing two video sources
Fundamental frequency extraction method using central clipping and its importance for the classification of emotional state
The paper deals with a classification of emotional state. We implemented a method for extracting the fundamental speech signal frequency by means of a central clipping and examined a correlation between emotional state and fundamental speech frequency. For this purpose, we applied an approach of exploratory data analysis. The ANOVA (Analysis of variance) test confirmed that a modification in the speaker's emotional state changes the fundamental frequency of human vocal tract. The main contribution of the paper lies in investigation, of central clipping method by the ANOVA
Video files recording and playback with VoiceXML
The paper deals with SW PBX Asterisk and with features supporting video calls but our primary object is
not switching video calls but their automatic recording and replaying. Asterisk is open source telephone exchange
which brings capability for audio and video calls but does not allow recording and playback of video files. We have
implemented these capabilities and our solution is designed for customers using mobile smartphones. End-users can
record a video directly on server. The video files are saved in a directory and a list of these files is generated. Names on
the list are read to users by means of the speech synthesis, and subsequently the DTMF key input is used to make the
choice. We applied VoiceXML for this purpose and the Interactive voice response as a tool enabling browsing in the
directory and playback the selected video. Nowadays, we record video on memory card inside mobile phone but our
presented solution offers an option to store the video on server in real-time, for end-user is simple to make a call and
video is being automatically recorded.Scopus35435