endpoint detection
Recently Published Documents


TOTAL DOCUMENTS

311
(FIVE YEARS 49)

H-INDEX

17
(FIVE YEARS 2)

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Zhang Shufang

In this paper, a system for automatic detection and correction of mispronunciation of native Chinese learners of English by speech recognition technology is designed with the help of radiomagnetic pronunciation recording devices and computer-aided software. This paper extends the standard pronunciation dictionary by predicting the phoneme confusion rules in the language learner’s pronunciation that may lead to mispronunciation and generates an extended pronunciation dictionary containing the standard pronunciation of each word and the possible mispronunciation variations, and automatic speech recognition uses the extended pronunciation dictionary to detect and diagnose the learner’s mispronunciation of phonemes and provides real-time feedback. It is generated by systematic crosslinguistic phonological comparative analysis of the differences in phoneme pronunciation with each other, and a data-driven approach is used to do automatic phoneme recognition of learner speech and analyze the mapping relationship between the resulting mispronunciation and the corresponding standard pronunciation to automatically generate additional phoneme confusion rules. In this paper, we investigate various aspects of several issues related to the automatic correction of English pronunciation errors based on radiomagnetic pronunciation recording devices; design the general block diagram of the system, etc.; and discuss some key techniques and issues, including endpoint detection, feature extraction, and the system’s study of pronunciation standard algorithms, analyzing their respective characteristics. Finally, we design and implement a model of an automatic English pronunciation error correction system based on a radiomagnetic pronunciation recording device. Based on the characteristics of English pronunciation, the correction algorithm implemented in this system uses the similarity and pronunciation duration ratings based on the log posterior probability, which combines the scores of both, and standardizes this system scoring through linear mapping. This system can achieve the purpose of automatic recognition of English mispronunciation correction and, at the same time, improve the user’s spoken English pronunciation to a certain extent.


2021 ◽  
Vol 2021 ◽  
pp. 1-23
Author(s):  
Matilda Rhode ◽  
Pete Burnap ◽  
Adam Wedgbury

Perimeter-based detection is no longer sufficient for mitigating the threat posed by malicious software. This is evident as antivirus (AV) products are replaced by endpoint detection and response (EDR) products, the latter allowing visibility into live machine activity rather than relying on the AV to filter out malicious artefacts. This paper argues that detecting malware in real-time on an endpoint necessitates an automated response due to the rapid and destructive nature of some malware. The proposed model uses statistical filtering on top of a machine learning dynamic behavioural malware detection model in order to detect individual malicious processes on the fly and kill those which are deemed malicious. In an experiment to measure the tangible impact of this system, we find that fast-acting ransomware is prevented from corrupting 92% of files with a false positive rate of 14%. Whilst the false-positive rate currently remains too high to adopt this approach as-is, these initial results demonstrate the need for a detection model that is able to act within seconds of the malware execution beginning; a timescale that has not been addressed by previous work.


Author(s):  
Yafei Wang ◽  
Wen Bin

Aiming at the problem of inadequate positioning accuracy of sound endpoints by the dual-element single-threshold endpoint detection algorithm and the single-element dual-threshold endpoint detection algorithm in the process of locating the sound source of weather modification bombs at high altitudes during artificial weather modification, a multi-element dual threshold endpoint detection algorithm. First, according to the characteristics of high-altitude explosion of weather modification bombs and ground reception, the sound signal is filtered and denoised, divided into frames, and windowed. Then, the time-domain feature short-term energy, short-term zero-crossing rate and frequency domain feature short-term information entropy of each frame of the sound signal are calculated, and double thresholds are set for detection. In this way, the start and end points of the explosion sound in the collected sound signal are found, and the data is imported into the positioning algorithm for processing, and then the explosion point of the weather modification bombs in the high air is located. The test results show that the method can accurately distinguish the end point of effective explosion sound, and has practical application value for the location of the sound source of the high-altitude explosion point of the weather modification bombs.


2021 ◽  
Vol 2062 (1) ◽  
pp. 012013
Author(s):  
Harmionee Kaur ◽  
Richa Tiwari

Abstract The need for cybersecurity has increased manifold over the past decade due to an unprecedented shift towards digital. With the increase in the number and sophistication of threats, cybersecurity experts have been forced to seek out new and efficient ways to secure endpoints on a network. Machine learning provides one such solution. This paper discusses how IoT devices are threatened and the need for endpoint security. It overviews different Machine learning-based intrusion detection systems that are currently in use e.g., STAT, Haystack, etc., and other Endpoint Detection and Response Techniques.


2021 ◽  
Vol MA2021-02 (14) ◽  
pp. 658-658
Author(s):  
Rebecca Pauline Schmitt ◽  
Carlos R. Perez ◽  
Jessica N. McDow ◽  
Jaime L. McClain ◽  
Matthew B. Jordan ◽  
...  

2021 ◽  
Vol 1 (3) ◽  
pp. 387-421
Author(s):  
George Karantzas ◽  
Constantinos Patsakis

Advanced persistent threats pose a significant challenge for blue teams as they apply various attacks over prolonged periods, impeding event correlation and their detection. In this work, we leverage various diverse attack scenarios to assess the efficacy of EDRs against detecting and preventing APTs. Our results indicate that there is still a lot of room for improvement as state-of-the-art EDRs fail to prevent and log the bulk of the attacks that are reported in this work. Additionally, we discuss methods to tamper with the telemetry providers of EDRs, allowing an adversary to perform a more stealth attack.


Sign in / Sign up

Export Citation Format

Share Document