A remote security exercise system for beginners considering scalability and simplicity

Author(s):  
Masato Yamanouchi ◽  
Kozue Nojiri ◽  
Hideki Sunahara
Keyword(s):  
Author(s):  
Peter Day ◽  
Asoke K. Nandi

Robust Automatic Speaker Verification has become increasingly desirable in recent years with the growing trend toward remote security verification procedures for telephone banking, bio-metric security measures and similar applications. While many approaches have been applied to this problem, Genetic Programming offers inherent feature selection and solutions that can be meaningfully analyzed, making it well suited for this task. This chapter introduces a Genetic Programming system to evolve programs capable of speaker verification and evaluates its performance with the publicly available TIMIT corpora. Also presented are the effects of a simulated telephone network on classification results which highlight the principal advantage, namely robustness to both additive and convolutive noise.


2019 ◽  
Vol 1176 ◽  
pp. 052026
Author(s):  
Xiao Liu ◽  
Guozhen Shi ◽  
Jinpo Fan

2014 ◽  
Vol 889-890 ◽  
pp. 671-675 ◽  
Author(s):  
Jun Jin Yang ◽  
Cheng Hua Fu ◽  
Zi Qi Dong

This paper presents a remote security system based on the Internet of things. The system uses S3C2440 as the control core, Linux operating system as the software platform, combined with remote security system construction of GPRS communication technology. The system introduces V4L2 camera video capture process based on Linux operating system, the GPRS module alarm information sending and receiving process, and the project of Android platform video monitoring software. At last, experiments show the system can monitor designated area. When meeting a critical situation,it will automatically alarm. It is of far-reaching significance.


2014 ◽  
Vol 513-517 ◽  
pp. 1268-1273
Author(s):  
R. Raghavendran ◽  
B. Ragupathi

A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software on remote resources. Giving full superuser permissions to customers eases the installation and use of user software, but it may lead to security issues. The providers usually delegate the task of keeping virtual machines up to date to the customers, while the customers expect the providers to perform this task. Consequently, a large number of virtual machines (either running or dormant) are not patched against the latest software vulnerabilities. The approach presented in this article deals with these problems by helping users as well as providers to keep virtual machines up to date. Prior to the update step, it is crucial to know which software is actually outdated or affected by remote security vulnerabilities. While these tasks seem to be straight forward, developing a solution that handles multiple software repositories from different vendors and identifies the correct packages is a challenging task. The Update Checker presented in this article identifies outdated software packages in virtual machines, regardless if the virtual machine is running or dormant on disk. The proposed Online Penetration Suite performs pre-rollout scans of virtual machines for security vulnerabilities using established techniques and prevents execution of flawed virtual machines.


2012 ◽  
Vol 2 (2) ◽  
pp. 1-22
Author(s):  
Peter Day ◽  
Asoke K. Nandi

Robust Automatic Speaker Verification has become increasingly desirable in recent years with the growing trend toward remote security verification procedures for telephone banking, bio-metric security measures and similar applications. While many approaches have been applied to this problem, Genetic Programming offers inherent feature selection and solutions that can be meaningfully analyzed, making it well suited for this task. This article introduces a Genetic Programming system to evolve programs capable of speaker verification and evaluates its performance with the publicly available TIMIT corpora. Also presented are the effects of a simulated telephone network on classification results which highlight the principal advantage, namely robustness to both additive and convolutive noise.


Author(s):  
Anders Carlsson ◽  
Rune Gustavsson ◽  
Leo Truksans ◽  
Martens Balodis
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document