V I A T. D e v e l o p e r ' s. v 0. 4

Size: px
Start display at page:

Download "V I A T. D e v e l o p e r ' s. v 0. 4"

Transcription

1 V I A T D e v e l o p e r ' s G u i d e v 0. 4 Verfahren zur Identikation und Abwehr von Telefon-SPAM (Translation: Method for the Identication and Blocking of Telephone-SPAM ) Prof. Dr. Heiko Knospe M.Sc. Dirk Lentzen Dipl.-Ing.(FH) Gary Grutzek Prof. Dr. Christoph Pörschmann M.Sc. Julian Strobl Dipl.-Ing.(FH) Bernhard Mainka Institute of Communications Engineering Department of IT Security December 12, 2012

2 Project Partners: In cooperation with: Acknowledgments: A part of this work was carried out during an internship with Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE, Wachtberg, Germany. We would especially like to thank Frank Kurth for his support. For more information visit:

3 Contents 1 Introduction 1 2 Software Pre-Requirements GNU General Public License (GPL) Debian GNU/Linux 64 Bit Boost Library v1.48 with Boost Log v PostgreSQL v8.4 Database YapHash - Yet Another Perceptual Hash WaveLash - Wavelet Audio Hashing Installation Usage Documentation callx - Call Extractor Installation Usage Documentation featurex - Feature Extractor Installation Usage Documentation indexd - Index-Based Search Daemon Installation Usage Documentation mld - Matchlist Analyzer Daemon Installation Usage Documentation VirtualBox Appliance: VIAT.ova Debian GNU/Linux 64 Bit User Accounts Network Conguration Additional Packages Boost Library v1.48 with Boost Log v PostgreSQL v8.4 Database FrameWave Asterisk A and B Communication Servers Directories Usage A Basic Example... 19

4 3.2.2 Clear The Blacklist Create Your Own Call Scenarios References iii List of Figures 1 VIAT Database Scheme VIAT Testing Environment VIAT Testing Environment opened in terminal PostgreSQL administration tool opened in web browser Call ow from Asterisk A (left) to Asterisk B (right) Partial output of indexd.log with a similarity of 40% between the two calls Information about blocked caller in Asterisk A (left) List of Listings 1 Conguration le for Index-Based Search Daemon Conguration le for Matchlist Analyzer Daemon Network conguration: /etc/network/interfaces Example conguration for callles: /home/viat/scenario/minimal/congmake-callles-demo.pl Example conguration for calls: /home/viat/scenario/minimal/cong-makecalls-demo.pl

5 1 Introduction VIAT means Verfahren zur Identikation und Abwehr von Telefon-SPAM which translates to Method for the Identication and Blocking of Telephone-SPAM. VIAT is a research project (period of time: July December 2012) of the Cologne University of Applied Sciences (project management) in cooperation with the TU Braunschweig, the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE and the companies IPTEGO GmbH and Sirrix AG. The project is signicantly nanced by the Federal Ministry of Education and Research and supported by the involved companies. Telephone-SPAM is characterized by bulk unsolicited calls. The SPAMer attempts to initiate a voice session and relays a prerecorded message if the callee answers. The prevalent Voice over IP (VoIP) technology provides convenient tools and low-priced possibilities to place a large number of SPAM calls. This document is organized as follows: In the next section we introduce our written and open sourced software and which pre-requirements should be met to get the software going. After that we describe our released VirtualBox Appliance which is already congured and with which you can easily use and test our prototype. You can even take your own audio material and create your own call scenarios. Finally the papers that we have written, are listed.

6 2 Software 2.1 Pre-Requirements In this section the software and other requirements are shown which you need to get our software going GNU General Public License (GPL) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FIT- NESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see < Debian GNU/Linux 64 Bit All our software was developed on Debian GNU/Linux 64 Bit systems. It might be that you get our software working on other operating systems, but in the following it'll be explained for fresh debian installation. You should at least install the build-essential package, if not already done: sudo apt get i n s t a l l build e s s e n t i a l If you're just interested in YapHash (see section 2.2) and/or featurex (see section 2.4), you're good to go and you can skip the next sections. 2

7 2.1.3 Boost Library v1.48 with Boost Log v1.1 Become a superuser: sudo su Now download Boost and Boost Log: wget http : / / downloads. s o u r c e f o r g e. net /\ p r o j e c t / boost / boost / / boost_1_48_0. t a r. gz wget http : / / downloads. s o u r c e f o r g e. net /\ p r o j e c t / boost l o g / boost log 1.1. z i p Extract both: t a r xvzf boost_1_48_0. t a r. gz unzip boost log 1.1. z i p Copy the log directories into the boost installation directory: cp r boost log 1.1/ boost / l o g boost_1_48_0/ boost / cp r boost log 1.1/ l i b s / l o g boost_1_48_0/ l i b s / Finally build and install it: cd boost_1_48_0/. / bootstrap. sh show l i b r a r i e s. / bootstrap. sh with l i b r a r i e s=a l l \ p r e f i x =/usr i n c l u d e d i r=/usr / i n c l u d e l i b d i r =/usr / l i b. / bjam i n s t a l l Become a normal user again: e x i t 3

8 2.1.4 PostgreSQL v8.4 Database Installation and Conguration To get callx (see section 2.3), indexd (see section 2.5) and mld (see section 2.6) going you need a PostgreSQL database. Install it with root privileges (you need the dev-library for compiling our sources): sudo apt get i n s t a l l p o s t g r e s q l l i b p q 5 libpq dev First of all we have to allow certain IP addresses to connect. There we have to edit: sudo nano / e t c / p o s t g r e s q l /8.4/ main/ p o s t g r e s q l. conf and delete the '#' before listen_addresses. There you can type in the IP addresses you want or just leave 'localhost'. Next we need to add a user and an actual database. E.g. we have an user on our debian called viat and we want to add that user and create a database which is also called viat. First of all we need to be a superuser: sudo su p o s t g r e s and connect to the database server: p s q l template1 Now set the actual SQL commands, where mypassword is a password of your choice (hit enter after each line): CREATE USER v i a t WITH PASSWORD ' mypassword ' ; CREATE DATABASE v i a t ; GRANT ALL PRIVILEGES ON DATABASE v i a t TO v i a t ; Quit the psql-terminal with: 4

9 \q and become a normal user again: e x i t Finally we can restart the service to get all changes working: sudo s e r v i c e p o s t g r e s q l r e s t a r t VIAT database scheme and download our database scheme: In gure 1 you can see the database scheme. Become user viat sudo su v i a t ; wget https : / / raw. github. com/ v i a t / S t u f f / master /db scheme v1. 0. s q l Now connect to the empty database: p s q l d v i a t U v i a t Finally import the SQL commands: \ i db scheme v1. 0. s q l You see some information (just ignore the rst errors: These are DROP TABLE commands in case the is an old environment). You can check everything with: \d 5

10 +caller.* v_caller_blacklist +caller, caller_blacklist(): from +caller_blacklist.caller_id not in (select caller_id from caller_whitelist) AND caller_blacklist.caller_id=caller.id(): where +callee.uri +caller_id v_callee_whitelist +callee, callee_whitelist(): from +callee_whitelist.callee_id=callee.id(): where call +id #id: serial +id +caller_id: integer = not null +timestamp: timestamp +id +processed: smallint = -1 +indexed: smallint = 0 +call_id +matched_call_id +call_id +caller_id caller_blacklist matchlist +call_id: integer +matched_call_id: integer +length_query: smallint = not null +actual_mismatches: smallint = not null +offset_position: smallint = not null +processed: smallint = -1 +caller_id: integer +call_id: integer +old_call_id: integer +timestamp: timestamp +reason: varchar(50) caller +id #id: serial +id +name: varchar(60) +uri: varchar(100) +id +caller_id caller_whitelist +caller_id: integer callee +id #id: serial +uri: varchar(100) +callee_id callee_whitelist +callee_id: integer Figure 1: VIAT Database Scheme. 2.2 YapHash - Yet Another Perceptual Hash YapHash is a perceptual ngerprint for audio identication purposes. YapHash is part of the VIAT project and therefore developed for detecting telephone-spam. Although it's been optimized for speech content, it could also be used for music. Standard cryptographic hash functions have the property that minimal alterations of input data signicantly change the resulting hash value. Robust audio hashes in contrast produce identical or nearby hash values for similar input data. In particular, the audio hashes should be invariant to (certain) content degradations and hence permit a perceptual audio comparison and an ecient identication of a specic recording. Dierent recordings with similar content, e.g. identical words or phrases, or from the same speaker are not identied. The YapHash ngerprint is based on the spectrogram and Mel-frequency-cepstrumcoecients (MFCC). The sign of the dierences in between the frequency bands form a compact yet robust audio hash. 6

11 2.2.1 WaveLash - Wavelet Audio Hashing WaveLash is an addon to YapHash. Instead of using FFT and MFCCs, a J-level wavelet transform with a specic wavelet is performed. A major part of the hash is created by calculating the dierences of the variances and one bit by calculating the zero crossing rate. The resulting bit lengths of the hash values is congurable (see below). To use WaveLash, uncomment the line #define WAVELASH in main.cpp and compile the source code Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t /YapHash. g i t First install GSL - GNU Scientic Library v1.9 by changing into YapHash/gsl-1.9 and running:. / c o n f i g u r e ; make ; sudo make i n s t a l l ; Change either into YapHash/sources/Match/ or into YapHash/sources/YapHash/ and then run: make c l e a n ; make a l l ; Usage YapHash is currently a command line tool and expects at least two arguments; First is the conguration le e.g. hash.cfg, second is the input wave le. To specify the output path a third argument can be passed optionally. Example: 7

12 . / YapHash hash. c f g SPIT_01_ABEIER. wav f o u t f i l e. csv For testing purposes, an additional tool for matching audio hashes has been provided. The maximum number n of matches for two of the aboves hashes is computed. An n-match means that n vectors including their relative time osets coincide. Example:. / Match o u t f i l e 1. csv o u t f i l e 2. csv Documentation 2.3 callx - Call Extractor Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t / c a l l x. g i t Usage Documentation 2.4 featurex - Feature Extractor Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t / f e a t u r e x. g i t 8

13 2.4.2 Usage Documentation 2.5 indexd - Index-Based Search Daemon The indexd (Index Daemon) is a background process which receives new ngerprints from featurex over sockets and performs a quick search in all previous ngerprints. Therefore the ngerprints are stored and maintained in an index-like structure with the feature classes in the dictionary and tuples of call identier and position of occurrence in the postings lists. These postings list are also called inverted les or inverted list and the search method basically intersects these list with some fault-tolerance mechanisms Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t / indexd. g i t From here change into indexd/release/ and type the following and hit enter to build the software: make c l e a n ; make j 4 a l l Where -j4 is optional for using four threads while compiling Usage Since indexd is a background daemon an easy way to start it is to run the following on the command line: 9

14 . / indexd indexd. conf You can pass the conguration le as argument. Otherwise indexd expects the conguration le to be /etc/viat/indexd.conf. Conguration shown in listing 1. An example for a conguration le with all congurable parameters is Listing 1: Conguration le for Index-Based Search Daemon. 1 ########################################################################### 2 ############# Configuration f i l e f o r Index Based Search Daemon ############ 3 ########################################################################### 4 5 # S p e c i f y d i r e c t o r y to run daemon and f o r l o g g i n g output 6 LOG_DIR =. / 7 PID_DIR =. / 8 9 # Receive new f i n g e r p r i n t s 10 SOCKET_ADDR = SOCKET_PORT = # Connection s t r i n g f o r database 14 # ( connection s t r i n g has to be between quotes e. g. "dbname=v i a t "! ) 15 CONNINFO = " host = dbname=v i a t user=v i a t " # Fuzzy search ( no : 0, yes : other ) 18 FUZZY = 0 19 # Number o f matches 20 N = # Maximal time s h i f t i n samples (>= 0) 22 MAX_OFFSET = # Maximal number o f elements per query ( p o s i t i o n, f e a t u r e ) 25 # ( query, memory a l l o c a t i o n ) 26 NUMELEMOFEACHQUERY = # Logging l e v e l 29 # 1 : FATAL 30 # 2 : ERROR 31 # 3 : WARNING 32 # 4 : INFO 33 # 5 : DEBUG ( search ) 34 # 6 : TRACE ( search algorithm output ) 35 LOG_LEVEL = 4 10

15 Logging by using tail: The logging output is in the congured directory. You can follow the output t a i l f indexd. l o g Process Identier (PID) type: To quit the daemon is very easy using the PID. For example k i l l ` cat indexd. pid ` and hit enter Documentation 2.6 mld - Matchlist Analyzer Daemon The mld (Matchlist Analyzer Daemon) is a background process which check the 'matchlist' table in the database and lls the 'caller_blacklist' to be able to block a certain caller Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t /mld. g i t From here change into mld/release/ and type the following and hit enter to build the software: make c l e a n ; make j 4 a l l Where -j4 is optional for using four threads while compiling. 11

16 2.6.2 Usage Since mld is a background daemon an easy way to start it is to run the following on the command line:. / mld mld. conf You can pass the conguration le as argument. Otherwise mld expects the conguration le to be /etc/viat/mld.conf. Conguration shown in listing 2. An example for a conguration le with all congurable parameters is Listing 2: Conguration le for Matchlist Analyzer Daemon. 1 ########################################################################### 2 ############# Configuration f i l e f o r Matchlist Analyzer Daemon ############ 3 ########################################################################### 4 5 # S p e c i f y d i r e c t o r y to run daemon 6 LOG_DIR =. / 7 PID_DIR =. / 8 9 # Connection s t r i n g f o r database 10 # ( connection s t r i n g has to be between quotes e. g. "dbname=v i a t "! ) 11 CONNINFO = " host = dbname=v i a t user=v i a t " # P o l l i n g database time to p r o c e s s m a t c h l i s t ( in m i l l i s e c o n d s ) 14 SLEEP = # How equal c a l l s have to be to get b l a c k l i s t e d ( in percent ) 17 BLACKLIST_PERCENT = 85 Logging by using tail: The logging output is in the congured directory. You can follow the output t a i l f mld. l o g 12

17 Process Identier (PID) type: To quit the daemon is very easy using the PID. For example k i l l ` cat mld. pid ` and hit enter Documentation The software documentation was created with Doxygen v and can be seen by opening html/index.htm in a browser. 13

18 3 VirtualBox Appliance: VIAT.ova Asterisk A eth0: :5060 Kamailio eth0: :5060 Asterisk B eth0: :5060 Call flow --> Blacklist check Call flow (copy) PostgreSQL Call data callx eth0, promiscuous mode Blacklist data Audio Fingerprints indexd eth0: :3000 featurex eth0: :3000 Figure 2: VIAT Testing Environment. In gure 2 you can see the VIAT testing environment. There are two Asterisk communication servers. One for call generation called Asterisk A and one for call termination called Asterisk B. The SIP Express Router (SER) Kamailio transfers the calls between these servers, if the caller is not on the Blacklist. From a copy of the network stream the audio data is extracted 1 (see section 2.3) and the audio ngerprint is computed (see sections 2.2 and 2.4). After that the ngerprints are compared against all previous ngerprints (see section 2.5) and the information about possible equal or similar audio data is stored in the PostgreSQL database. With this information the Blacklist in the database is lled (see section 2.6). 1 Not yet integrated. The call extraction is handled by a perl-script which monitors the folder /var/spool/asterisk/monitor/. It writes the call metadata to the database and passes the audio material to featurex. The script is at /script/vmfd.pl. 14

19 3.1 Debian GNU/Linux 64 Bit The virtual machine is a Debian GNU/Linux 64 Bit system. In the following we describe the changes we have made to a fresh debian installation. Security updates have been installed on November 2, User Accounts We have two users. On the hand the standard superuser root and an additional user viat, which should be taken to control the virtual machine and our system. The password for both accounts is: viat Network Conguration We modied the network conguration to reach the scenario described in gure 2. You can see the changes in listing Additional Packages Some additional packages have been installed: openssh s e r v e r p o s t g r e s q l l i b p q 5 libpq dev a s t e r i s k libdatetime format iso8601 p e r l The openssh-server is for an easy connection e.g. via terminal to the virtual machine. The packages postgresql, libpq5 and libpq-dev are for the PostgreSQL database (see section and 3.1.5), where the last one is needed for compiling our sources. The last two packages asterisk and libdatetime-format-iso8601-perl are for the open source telephony software Asterisk (see section 3.1.7). 15

20 Listing 3: Network conguration: /etc/network/interfaces. 1 allow ho tpl ug eth0 2 i f a c e eth0 i n e t dhcp 3 4 auto eth0 : 0 5 i f a c e eth0 : 0 i n e t s t a t i c 6 address netmask auto eth0 : 1 10 i f a c e eth0 : 1 i n e t s t a t i c 11 address netmask auto eth0 : 2 15 i f a c e eth0 : 2 i n e t s t a t i c 16 address netmask auto eth0 : 3 20 i f a c e eth0 : 3 i n e t s t a t i c 21 address netmask auto eth0 : 4 25 i f a c e eth0 : 4 i n e t s t a t i c 26 address netmask Boost Library v1.48 with Boost Log v1.1 For further information about the installation process see section The libraries are stored in /usr/lib/ and have the format libboost_*.a resp. libboost_*.so. The header les are in a new directory in /usr/include/boost PostgreSQL v8.4 Database For further information about the installation process, the created database, tables and users see section In gure 1 you can see which information is stored in the database. 16

21 3.1.6 FrameWave Framewave is a free and open-source collection of popular image and signal processing routines designed to accelerate application development, debugging, multi-threading and optimization on x86-class processor platforms. 2 The shared libraries object can be found at /usr/lib/ starting with fw*. The libraries are needed by featurex (see section 2.4) Asterisk A and B Communication Servers We have two Asterisk servers in our testing environment. One for call generation Asterisk A and one for call termination Asterisk B (see gure 2), so that we can simulate a full call ow. Each Asterisk server needs its own network interface, so that we can passively extract the SIP and RTP data (see section 2.3). Therefore we created two virtual network interfaces. The interface eth0:0 is for Asterisk A and the interface eth0:1 is for Asterisk B (see gure 2 and listing 3). To start two instances of the asterisk software, we have two modied start scripts /etc/init.d/asta and /etc/init.d/astb. Furthermore we removed the default start script and added our two modied ones. This way you always have the Asterisk A and Asterisk B running at startup. For every instance we have new directories for the running directory: drwxr xr x 2 v i a t v i a t / var /run/ asta drwxr xr x 2 v i a t v i a t / var /run/ astb and the conguration directory: drwxr xr x 2 v i a t v i a t / e t c / asta drwxr xr x 2 v i a t v i a t / e t c / astb

22 Finally we created two new executables: / usr / sbin / asta / usr / sbin / astb and you can connect to the specic instance by passing the -r argument! Directories All directories are owned by viat. The conguration les of our software can be found in /etc/viat/, logging output is in /var/log/viat/ and pid-les are in /var/run/viat/. The conguration les of the Asterisk instances can be found in /etc/asta/ and /etc/astb/, logging output in /var/log/asta/ and /var/log/astb/ and the pid-les in /var/run/asta/ and /var/run/astb/. The transferred audio material (.wav) can be found in the directories /var/spool/asta/ and /var/spool/astb/. 3.2 Usage When starting the image two things will automatically open. On the one hand a couple of terminals with which you can control our environment (see gure 3). In the top section you can see the console of Asterisk A and Asterisk B. Theses are just for output. Later we will see our call ow and blocked calls here. In the middle section is the output of indexd (see section 2.5). If you are interested in the search algorithm, you will get some information in [1]. The bottom section is for actually control our system. We have prepared some scripts for you to get our system easily running. One the other hand you see the PostgreSQL administration tool opened in a browser (see gure 4). Username and password are both viat. In the beginning the database is empty. After running our system a little while interesting tables are matchlist, where you can see the search output about similar calls; the call table with metadata about all calls and of course the caller_blacklist, where the SER Kamailio gets its information about blocking certain callers. 18

23 Figure 3: VIAT Testing Environment opened in terminal. Figure 4: PostgreSQL administration tool opened in web browser A Basic Example To get you started very fast, we provide an example called minimal. Just run from the /script directory and see what happens:. / make c a l l s. sh /home/ v i a t / s c e n a r i o / minimal demo 19

24 Two calls are transmitted. In the top section you see the call ow from Asterisk A to Asterisk B (see gure 5). When the calls are nished the search (see section 2.5) is per- Figure 5: Call ow from Asterisk A (left) to Asterisk B (right). formed and we get a similarity between these two calls (see gure 6). The result says that Figure 6: Partial output of indexd.log with a similarity of 40% between the two calls. the actual mismatches are 60 and since the ngerprint length of each call is 100, the two calls have 40 features in the right distance in common. We can also see this information in the database table matchlist. With this information the table caller_blacklist is lled, since we require a similarity of at least 15% (see section 2.6). Note: Although the audio material came from dierent callers, our system recognizes the similarity and is able to block both callers! We can now try to make the two calls again, but now we are blocked (see gure 7). Even Figure 7: Information about blocked caller in Asterisk A (left). 20

25 if we would take other call les we wouldn't get through. Play The Audio Files levels and a little delay of 100 ms. Play the audio les and observe that they only dier in noise totem /home/ v i a t / data / minimal /SPIT_01_1. wav totem /home/ v i a t / data / minimal /SPIT_01_d100_n20p. wav Monitor The Packets We installed Wireshark for you. Just start it as root, e.g. gksudo wireshark and monitor the loopback device lo. To get the VoIP trac only, set the lter: s i p or rtp and hit Apply Clear The Blacklist If you just want to clear the blacklist but not restart our system, you can use the PostgreSQL Administration Tool (see gure 4). Just click caller_blacklist and then Empty. Done! Create Your Own Call Scenarios Create Call Files see in listing 4. First of all we need a conguration le similar to the example you Finally we change in the /script directory and run the following command: 21

26 Listing 4: Example conguration for callles: /home/viat/scenario/minimal/congmake-callles-demo.pl. 1 inpath => '/home/ v i a t / data /minimal ', 2 outpath => '/home/ v i a t / s c e n a r i o / minimal / c a l l f i l e s ', 3 c a l l f i l e n a m e => ' minimal ', 4 template => '/home/ v i a t / s c e n a r i o / template. c a l l ', 5 media_files => [ 'wav ', 'mp3 ', 'gsm ' ], 6 m i n c a l l e r => , 7 maxcaller => , 8 m i n c a l l e e => 9100, 9 maxcallee => 9999,. / create c a l l f i l e s. pl c o n f i g f i l e =\ /home/ v i a t / s c e n a r i o / minimal / config make c a l l f i l e s demo. pl 22

27 Starting Calls We need a conguration le to simulate our call ow tting our needs. You can see an example in listing 5. Listing 5: Example conguration for calls: /home/viat/scenario/minimal/cong-makecalls-demo.pl. 1 inpath => '/home/ v i a t / s c e n a r i o / minimal / c a l l f i l e s / ', 2 tmppath => '/home/ v i a t / s c e n a r i o / minimal /tmp ', 3 outpath => '/ var / s p o o l / asta / outgoing ', 4 # 0=play each f i l e j u s t once, 1=r e p l a y s are p o s s i b l e 5 mitzuruecklegen => 0, 6 # f i l e e x t e n s i o n o f c a l l f i l e s 7 c a l l _ f i l e s => ' c a l l ', 8 # s t a r t time o f s i m u l a t i o n 9 s t a r t t i m e => ' T11 : 0 0 : 0 0 ', 10 # seconds o f simulated time s l i c e 11 t i c k t i m e => 5, 12 # time o f time s l i c e r e a l i t y 13 t i c k l e n g t h => 5, 14 # maximum number o f c a l l s per t i c k 15 #call_max => 15, 16 # minimal number o f c a l l s per t i c k 17 #call_ min => 5, 18 # l e v e l o f debug output 19 verbose => 3, 20 hour_ loads => [ 21 1, 1, 1, 1, 1, 1, # 00:00 05: , 1, 1, 1, 1, 1, # 06:00 11: , 1, 1, 1, 1, 1, # 12:00 17: , 1, 1, 1, 1, 1 # 18:00 24:00 25 ], 26 # number o f c a l l s per t i c k in busyhour 27 busyhour_calls => 2, 28 # I n f l u e n c e o f randomness? 10 e q u a l s to rand_ factor => 0, 30 # play c a l l f i l e s randomly? 0=play c a l l f i l e s in order, 1=play randomly 31 random => 0, From the /script directory just run:. / make c a l l s. sh /home/ v i a t / s c e n a r i o / minimal demo 23

28 References [1] J. Strobl, G. Grutzek, B. Mainka, and H. Knospe, An Ecient Search Method for the Content-Based Identication of Telephone-SPAM, in IEEE International Conference on Communications (ICC), pp , june [2] G. Grutzek, J. Strobl, B. Mainka, F. Kurth, C. Poerschmann, and H. Knospe, A Perceptual Hash for the Identication of Telephone Speech, in 2012 ITG Fachtagung Sprachkommunikation, september [3] D. Lentzen, G. Grutzek, H. Knospe, and C. Poerschmann, Content-Based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results, in IEEE International Conference on Communications (ICC), pp , june [4] J. Strobl, F. Kurth, G. Grutzek, and H. Knospe, Eziente Identikation von Telefon- Spam, in Fortschritte der Akustik - DAGA 2011, DEGA e.v., pp , [5] G. Grutzek, C. Poerschmann, and H. Knospe, Vergleich spektraler Merkmale zur Identikation von Telefon SPAM, in Fortschritte der Akustik - DAGA 2010, DEGA e.v., pp , [6] H. Knospe and C. Poerschmann, Ein neues Verfahren zur Identikation und Abwehr von Telefon-SPAM, in Scientic Reports of the Cologne University of Applied Sciences, Proceedings des XXI. Deutsch-Polnischen Seminars, pp. 4953, [7] C. Poerschmann and H. Knospe, Spectral Analysis of Audio Signals for the Identication of Spam Over IP Telephony, in Proceedings of the NAG/DAGA 2009, DEGA e.v, pp , [8] C. Poerschmann and H. Knospe, Analyse spektraler Parameter des Audiosignals zur Identikation und Abwehr von Telefon-SPAM, in Sicherheit 2008, Lecture Notes in Informatics, Proceedings Sicherheit 2008, Gesellschaft für Informatik, vol. P-128, pp , iii

29 [9] C. Poerschmann and H. Knospe, Analysis of Spectral Parameters of Audio Signals for the Identication of Spam Over IP Telephony, in The Fifth Conference on and Anti-Spam, pp , iv

Databases through Python-Flask and MariaDB

Databases through Python-Flask and MariaDB 1 Databases through Python-Flask and MariaDB Tanmay Agarwal, Durga Keerthi and G V V Sharma Contents 1 Python-flask 1 1.1 Installation.......... 1 1.2 Testing Flask......... 1 2 Mariadb 1 2.1 Software

More information

ST-Links. SpatialKit. Version 3.0.x. For ArcMap. ArcMap Extension for Directly Connecting to Spatial Databases. ST-Links Corporation.

ST-Links. SpatialKit. Version 3.0.x. For ArcMap. ArcMap Extension for Directly Connecting to Spatial Databases. ST-Links Corporation. ST-Links SpatialKit For ArcMap Version 3.0.x ArcMap Extension for Directly Connecting to Spatial Databases ST-Links Corporation www.st-links.com 2012 Contents Introduction... 3 Installation... 3 Database

More information

Replication cluster on MariaDB 5.5 / ubuntu-server. Mark Schneider ms(at)it-infrastrukturen(dot)org

Replication cluster on MariaDB 5.5 / ubuntu-server. Mark Schneider ms(at)it-infrastrukturen(dot)org Mark Schneider ms(at)it-infrastrukturen(dot)org 2012-05-31 Abstract Setting of MASTER-SLAVE or MASTER-MASTER replications on MariaDB 5.5 database servers is neccessary for higher availability of data and

More information

Geodatabase Best Practices. Dave Crawford Erik Hoel

Geodatabase Best Practices. Dave Crawford Erik Hoel Geodatabase Best Practices Dave Crawford Erik Hoel Geodatabase best practices - outline Geodatabase creation Data ownership Data model Data configuration Geodatabase behaviors Data integrity and validation

More information

Introduction to Portal for ArcGIS. Hao LEE November 12, 2015

Introduction to Portal for ArcGIS. Hao LEE November 12, 2015 Introduction to Portal for ArcGIS Hao LEE November 12, 2015 Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration options Portal for ArcGIS + ArcGIS for

More information

Introduction to Portal for ArcGIS

Introduction to Portal for ArcGIS Introduction to Portal for ArcGIS Derek Law Product Management March 10 th, 2015 Esri Developer Summit 2015 Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration

More information

Yes, the Library will be accessible via the new PULSE and the existing desktop version of PULSE.

Yes, the Library will be accessible via the new PULSE and the existing desktop version of PULSE. F R E Q U E N T L Y A S K E D Q U E S T I O N S THE LIBRARY GENERAL W H A T I S T H E L I B R A R Y? The Library is the new, shorter, simpler name for the Business Development (Biz Dev) Library. It s your

More information

Administrivia. Course Objectives. Overview. Lecture Notes Week markem/cs333/ 2. Staff. 3. Prerequisites. 4. Grading. 1. Theory and application

Administrivia. Course Objectives. Overview. Lecture Notes Week markem/cs333/ 2. Staff. 3. Prerequisites. 4. Grading. 1. Theory and application Administrivia 1. markem/cs333/ 2. Staff 3. Prerequisites 4. Grading Course Objectives 1. Theory and application 2. Benefits 3. Labs TAs Overview 1. What is a computer system? CPU PC ALU System bus Memory

More information

Portal for ArcGIS: An Introduction

Portal for ArcGIS: An Introduction Portal for ArcGIS: An Introduction Derek Law Esri Product Management Esri UC 2014 Technical Workshop Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration

More information

NV-DVR09NET NV-DVR016NET

NV-DVR09NET NV-DVR016NET NV-DVR09NET NV-DVR016NET !,.,. :,.!,,.,!,,, CMOS/MOSFET. : 89/336/EEC, 93/68/EEC, 72/23/EEC,.,,. Novus Security Sp z o.o... 4 1. NV-DVR09NET NV-DVR016NET. 2.,. 3.,... 4... ( ) /. 5..... 6.,,.,. 7.,.. 8.,,.

More information

From BASIS DD to Barista Application in Five Easy Steps

From BASIS DD to Barista Application in Five Easy Steps Y The steps are: From BASIS DD to Barista Application in Five Easy Steps By Jim Douglas our current BASIS Data Dictionary is perfect raw material for your first Barista-brewed application. Barista facilitates

More information

Senior astrophysics Lab 2: Evolution of a 1 M star

Senior astrophysics Lab 2: Evolution of a 1 M star Senior astrophysics Lab 2: Evolution of a 1 M star Name: Checkpoints due: Friday 13 April 2018 1 Introduction This is the rst of two computer labs using existing software to investigate the internal structure

More information

Fundamentals of Computational Science

Fundamentals of Computational Science Fundamentals of Computational Science Dr. Hyrum D. Carroll August 23, 2016 Introductions Each student: Name Undergraduate school & major Masters & major Previous research (if any) Why Computational Science

More information

Tox Issues with virtualenv GNU Guix guix-tox. Guix-tox. A functional version of tox. Cyril Roelandt January 30, /35

Tox Issues with virtualenv GNU Guix guix-tox. Guix-tox. A functional version of tox. Cyril Roelandt January 30, /35 A functional version of tox cyril@redhat.com January 30, 2016 1/35 OpenStack developer at Red Hat since 2013 developer 2/35 1 2 Only Python packages can be installed Reproducibility One package manager

More information

K D A A M P L I F I E R S F I R M W A R E U S E R G U I D E

K D A A M P L I F I E R S F I R M W A R E U S E R G U I D E K D A A M P L I F I E R S F I R M W A R E U S E R G U I D E T A B L E O F C O N T E N T S S E C T I O N 1 : P R E PA R I N G Y O U R F I L E S Via Network Router 3 S E C T I O N 2 : A C C E S S I N G T

More information

From BASIS DD to Barista Application in Five Easy Steps

From BASIS DD to Barista Application in Five Easy Steps Y The steps are: From BASIS DD to Barista Application in Five Easy Steps By Jim Douglas our current BASIS Data Dictionary is perfect raw material for your first Barista-brewed application. Barista facilitates

More information

Exploiting Virtual Observatory and Information Technology: Techniques for Astronomy

Exploiting Virtual Observatory and Information Technology: Techniques for Astronomy Exploiting Virtual Observatory and Information Technology: Techniques for Astronomy Lecture #6 Goal: VO Workflows Science Usage Nicholas Walton AstroGrid Project Scientist Institute of Astronomy, The University

More information

Software BioScout-Calibrator June 2013

Software BioScout-Calibrator June 2013 SARAD GmbH BioScout -Calibrator 1 Manual Software BioScout-Calibrator June 2013 SARAD GmbH Tel.: ++49 (0)351 / 6580712 Wiesbadener Straße 10 FAX: ++49 (0)351 / 6580718 D-01159 Dresden email: support@sarad.de

More information

SOMIM: An open-source program code for the numerical Search for Optimal Measurements by an Iterative Method

SOMIM: An open-source program code for the numerical Search for Optimal Measurements by an Iterative Method SOMIM: An open-source program code for the numerical Search for Optimal Measurements by an Iterative Method Kean Loon Lee, 1,2 Jiangwei Shang, 1 Wee Kang Chua, 4 Shiang Yong Looi, 5 and Berthold-Georg

More information

WeatherHub2 Quick Start Guide

WeatherHub2 Quick Start Guide WeatherHub2 Quick Start Guide Table of Contents 1 Introduction... 1 2 Packing List... 1 3 Connections... 1 4 IP Addressing... 2 5 Browser Access... 3 6 System Info... 3 7 Weather Station Settings... 4

More information

Leveraging Web GIS: An Introduction to the ArcGIS portal

Leveraging Web GIS: An Introduction to the ArcGIS portal Leveraging Web GIS: An Introduction to the ArcGIS portal Derek Law Product Management DLaw@esri.com Agenda Web GIS pattern Product overview Installation and deployment Configuration options Security options

More information

Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment

Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment July 24, 2012 ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS")

More information

EUROPEAN MIDDLEWARE INITIATIVE

EUROPEAN MIDDLEWARE INITIATIVE EUROPEAN MIDDLEWARE INITIATIVE MYPROXY YAIM ADMINISTRATOR GUIDE Document version: 1.0.2-1 EMI Component Version: 1.x 1/10 This work is co-funded by the European Commission as part of the EMI project under

More information

Geodatabase: Best Practices. Robert LeClair, Senior Instructor

Geodatabase: Best Practices. Robert LeClair, Senior Instructor Geodatabase: Best Practices Robert LeClair, Senior Instructor Agenda Geodatabase Creation Data Ownership Data Model Data Configuration Geodatabase Behaviors Data Validation Extending Performance Geodatabase

More information

Socket Programming. Daniel Zappala. CS 360 Internet Programming Brigham Young University

Socket Programming. Daniel Zappala. CS 360 Internet Programming Brigham Young University Socket Programming Daniel Zappala CS 360 Internet Programming Brigham Young University Sockets, Addresses, Ports Clients and Servers 3/33 clients request a service from a server using a protocol need an

More information

Extending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing

Extending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing Extending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing MISP Project @MISPProject TLP:WHITE MISP Training - @SWITCH - 20161206 Why we want to go more modular...

More information

Administering your Enterprise Geodatabase using Python. Jill Penney

Administering your Enterprise Geodatabase using Python. Jill Penney Administering your Enterprise Geodatabase using Python Jill Penney Assumptions Basic knowledge of python Basic knowledge enterprise geodatabases and workflows You want code Please turn off or silence cell

More information

GPS Mapping with Esri s Collector App. What We ll Cover

GPS Mapping with Esri s Collector App. What We ll Cover GPS Mapping with Esri s Collector App Part 1: Overview What We ll Cover Part 1: Overview and requirements Part 2: Preparing the data in ArcGIS for Desktop Part 3: Build a web map in ArcGIS Online Part

More information

Portal for ArcGIS: An Introduction. Catherine Hynes and Derek Law

Portal for ArcGIS: An Introduction. Catherine Hynes and Derek Law Portal for ArcGIS: An Introduction Catherine Hynes and Derek Law Agenda Web GIS pattern Product overview Installation and deployment Configuration options Security options and groups Portal for ArcGIS

More information

Infrastructure Automation with Salt

Infrastructure Automation with Salt Infrastructure Automation with Salt Sean McGrath 10th November 2016 About Research IT Where I work as a systems administrator http://www.tchpc.tcd.ie/ Ireland s premier High Performance Computing Centre

More information

Deep-dive into PyMISP MISP - Malware Information Sharing Platform & Threat Sharing

Deep-dive into PyMISP MISP - Malware Information Sharing Platform & Threat Sharing Deep-dive into PyMISP MISP - Malware Information Sharing Platform & Threat Sharing Team CIRCL http://www.misp-project.org/ Twitter: @MISPProject MISP Training @ Helsinki 20180423 Context MISP is complex

More information

Account Setup. STEP 1: Create Enhanced View Account

Account Setup. STEP 1: Create Enhanced View Account SpyMeSatGov Access Guide - Android DigitalGlobe Imagery Enhanced View How to setup, search and download imagery from DigitalGlobe utilizing NGA s Enhanced View license Account Setup SpyMeSatGov uses a

More information

Bloomsburg University Weather Viewer Quick Start Guide. Software Version 1.2 Date 4/7/2014

Bloomsburg University Weather Viewer Quick Start Guide. Software Version 1.2 Date 4/7/2014 Bloomsburg University Weather Viewer Quick Start Guide Software Version 1.2 Date 4/7/2014 Program Background / Objectives: The Bloomsburg Weather Viewer is a weather visualization program that is designed

More information

CHEOPS Feasibility Checker Guidelines

CHEOPS Feasibility Checker Guidelines CHEOPS Feasibility Checker Guidelines Open a terminal and run the following commands (USERNAME as provided by the SOC - UNIGE): ssh X USERNAME@isdc-nx00.isdc.unige.ch ssh X USERNAME@tichpsmps00 /cheops_sw/mps_test/bin/mps_client

More information

GIS Functions and Integration. Tyler Pauley Associate Consultant

GIS Functions and Integration. Tyler Pauley Associate Consultant GIS Functions and Integration Tyler Pauley Associate Consultant Contents GIS in AgileAssets products Displaying data within AMS Symbolizing the map display Display on Bing Maps Demo- Displaying a map in

More information

SeCQC: An open-source program code for the numerical. Search for the classical Capacity of Quantum Channels

SeCQC: An open-source program code for the numerical. Search for the classical Capacity of Quantum Channels SeCQC: An open-source program code for the numerical Search for the classical C apacity of Quantum C hannels Jiangwei Shang, 1 Kean Loon Lee, 1,2 and Berthold-Georg Englert 1,3 1 Centre for Quantum Technologies

More information

Overview. Everywhere. Over everything.

Overview. Everywhere. Over everything. Cadenza Desktop Cadenza Web Cadenza Mobile Cadenza Overview. Everywhere. Over everything. The ultimate GIS and reporting suite. Provide, analyze and report data efficiently. For desktop, web and mobile.

More information

One platform for desktop, web and mobile

One platform for desktop, web and mobile One platform for desktop, web and mobile Search and filter Get access to all data thematically filter data in context factually and spatially as well as display it dynamically. Export a selection or send

More information

Reaxys Pipeline Pilot Components Installation and User Guide

Reaxys Pipeline Pilot Components Installation and User Guide 1 1 Reaxys Pipeline Pilot components for Pipeline Pilot 9.5 Reaxys Pipeline Pilot Components Installation and User Guide Version 1.0 2 Introduction The Reaxys and Reaxys Medicinal Chemistry Application

More information

SuperCELL Data Programmer and ACTiSys IR Programmer User s Guide

SuperCELL Data Programmer and ACTiSys IR Programmer User s Guide SuperCELL Data Programmer and ACTiSys IR Programmer User s Guide This page is intentionally left blank. SuperCELL Data Programmer and ACTiSys IR Programmer User s Guide The ACTiSys IR Programmer and SuperCELL

More information

Collaborative WRF-based research and education enabled by software containers

Collaborative WRF-based research and education enabled by software containers Collaborative WRF-based research and education enabled by software containers J. Hacker, J. Exby, K. Fossell National Center for Atmospheric Research Contributions from Tim See (U. North Dakota) 1 Why

More information

Tryton Technical Training

Tryton Technical Training Tryton Technical Training N. Évrard B 2CK September 18, 2015 N. Évrard (B 2 CK) Tryton Technical Training September 18, 2015 1 / 56 Overview and Installation Outline 1 Overview and Installation Tryton

More information

Lightcloud Application

Lightcloud Application Controlling Your Lightcloud System Lightcloud Application Lightcloud Application Navigating the Application Devices Device Settings Organize Control Energy Scenes Schedules Demand Response Power Up State

More information

Configuring LDAP Authentication in iway Service Manager

Configuring LDAP Authentication in iway Service Manager Configuring LDAP Authentication in iway Service Manager LDAP authentication in iway Service Manager (ism) allows ism to authenticate against LDAP and associate an LDAP ism role to the user. ism includes

More information

TECDIS and TELchart ECS Weather Overlay Guide

TECDIS and TELchart ECS Weather Overlay Guide 1 of 24 TECDIS and TELchart ECS provides a very advanced weather overlay feature, using top quality commercial maritime weather forecast data available as a subscription service from Jeppesen Marine. The

More information

ECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University

ECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University ECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University Prof. Sunil P Khatri (Lab exercise created and tested by Ramu Endluri, He Zhou and Sunil P

More information

ArcGIS Pro Q&A Session. NWGIS Conference, October 11, 2017 With John Sharrard, Esri GIS Solutions Engineer

ArcGIS Pro Q&A Session. NWGIS Conference, October 11, 2017 With John Sharrard, Esri GIS Solutions Engineer ArcGIS Pro Q&A Session NWGIS Conference, October 11, 2017 With John Sharrard, Esri GIS Solutions Engineer jsharrard@esri.com ArcGIS Desktop The applications ArcGIS Pro ArcMap ArcCatalog ArcScene ArcGlobe

More information

ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D

ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D ArcGIS Earth is ArcGIS Earth is a lightweight globe desktop application that helps you explore any part of the world and investigate

More information

Geographical Databases: PostGIS. Introduction. Creating a new database. References

Geographical Databases: PostGIS. Introduction. Creating a new database. References Geographical Databases: PostGIS Introduction PostGIS is an extension of PostgresSQL for storing and analyzing spatial data. It defines data types and operations to process (mostly) vector data. It has

More information

SteelSmart System Cold Formed Steel Design Software Download & Installation Instructions

SteelSmart System Cold Formed Steel Design Software Download & Installation Instructions Step 1 - Login or Create an Account at the ASI Portal: Login: https://portal.appliedscienceint.com/account/login Create Account: https://portal.appliedscienceint.com/account/register 2 0 1 7 A p p l i

More information

Evaluating Physical, Chemical, and Biological Impacts from the Savannah Harbor Expansion Project Cooperative Agreement Number W912HZ

Evaluating Physical, Chemical, and Biological Impacts from the Savannah Harbor Expansion Project Cooperative Agreement Number W912HZ Evaluating Physical, Chemical, and Biological Impacts from the Savannah Harbor Expansion Project Cooperative Agreement Number W912HZ-13-2-0013 Annual Report FY 2018 Submitted by Sergio Bernardes and Marguerite

More information

MapOSMatic: city maps for the masses

MapOSMatic: city maps for the masses MapOSMatic: city maps for the masses Thomas Petazzoni Libre Software Meeting July 9th, 2010 Outline 1 The story 2 MapOSMatic 3 Behind the web page 4 Pain points 5 Future work 6 Conclusion Thomas Petazzoni

More information

Converting workflows from ArcSDE Command line in ArcGIS 10.3.x

Converting workflows from ArcSDE Command line in ArcGIS 10.3.x Best Practices for Converting workflows from ArcSDE Command line in ArcGIS 10.3.x Melissa Jarman & George Thompson Esri Support Services Summary of Session History Going forward New tools Why migrate?

More information

The File Geodatabase API. Craig Gillgrass Lance Shipman

The File Geodatabase API. Craig Gillgrass Lance Shipman The File Geodatabase API Craig Gillgrass Lance Shipman Schedule Cell phones and pagers Please complete the session survey we take your feedback very seriously! Overview File Geodatabase API - Introduction

More information

Geodatabase Essentials Part One - Intro to the Geodatabase. Jonathan Murphy Colin Zwicker

Geodatabase Essentials Part One - Intro to the Geodatabase. Jonathan Murphy Colin Zwicker Geodatabase Essentials Part One - Intro to the Geodatabase Jonathan Murphy Colin Zwicker Session Path The Geodatabase - What is it? - Why use it? - What types are there? Inside the Geodatabase Advanced

More information

Geodatabase Programming with Python John Yaist

Geodatabase Programming with Python John Yaist Geodatabase Programming with Python John Yaist DevSummit DC February 26, 2016 Washington, DC Target Audience: Assumptions Basic knowledge of Python Basic knowledge of Enterprise Geodatabase and workflows

More information

ISU GIS CENTER S ARCSDE USER'S GUIDE AND DATA CATALOG

ISU GIS CENTER S ARCSDE USER'S GUIDE AND DATA CATALOG ISU GIS CENTER S ARCSDE USER'S GUIDE AND DATA CATALOG 2 TABLE OF CONTENTS 1) INTRODUCTION TO ARCSDE............. 3 2) CONNECTING TO ARCSDE.............. 5 3) ARCSDE LAYERS...................... 9 4) LAYER

More information

Foundations of Computation

Foundations of Computation The Australian National University Semester 2, 2018 Research School of Computer Science Tutorial 1 Dirk Pattinson Foundations of Computation The tutorial contains a number of exercises designed for the

More information

Business DIY:Building Enterprise Infrastructure on Linux Part 1. Session L975. David Boyes Sine Nomine Associates

Business DIY:Building Enterprise Infrastructure on Linux Part 1. Session L975. David Boyes Sine Nomine Associates Business DIY:Building Enterprise Infrastructure on Linux Part 1 Session L975 David Boyes Sine Nomine Associates Handouts Handouts for this session are not on the CD but are available for download from:

More information

ArcGIS Enterprise: What s New. Philip Heede Shannon Kalisky Melanie Summers Shreyas Shinde

ArcGIS Enterprise: What s New. Philip Heede Shannon Kalisky Melanie Summers Shreyas Shinde ArcGIS Enterprise: What s New Philip Heede Shannon Kalisky Melanie Summers Shreyas Shinde ArcGIS Enterprise is the new name for ArcGIS for Server ArcGIS Enterprise Software Components ArcGIS Server Portal

More information

ON SITE SYSTEMS Chemical Safety Assistant

ON SITE SYSTEMS Chemical Safety Assistant ON SITE SYSTEMS Chemical Safety Assistant CS ASSISTANT WEB USERS MANUAL On Site Systems 23 N. Gore Ave. Suite 200 St. Louis, MO 63119 Phone 314-963-9934 Fax 314-963-9281 Table of Contents INTRODUCTION

More information

Using the EartH2Observe data portal to analyse drought indicators. Lesson 4: Using Python Notebook to access and process data

Using the EartH2Observe data portal to analyse drought indicators. Lesson 4: Using Python Notebook to access and process data Using the EartH2Observe data portal to analyse drought indicators Lesson 4: Using Python Notebook to access and process data Preface In this fourth lesson you will again work with the Water Cycle Integrator

More information

Geodatabase An Introduction

Geodatabase An Introduction 2013 Esri International User Conference July 8 12, 2013 San Diego, California Technical Workshop Geodatabase An Introduction David Crawford and Jonathan Murphy Session Path The Geodatabase What is it?

More information

Troubleshooting Replication and Geodata Services. Liz Parrish & Ben Lin

Troubleshooting Replication and Geodata Services. Liz Parrish & Ben Lin Troubleshooting Replication and Geodata Services Liz Parrish & Ben Lin AGENDA: Troubleshooting Replication and Geodata Services Overview Demo Troubleshooting Q & A Overview of Replication Liz Parrish What

More information

YYT-C3002 Application Programming in Engineering GIS I. Anas Altartouri Otaniemi

YYT-C3002 Application Programming in Engineering GIS I. Anas Altartouri Otaniemi YYT-C3002 Application Programming in Engineering GIS I Otaniemi Overview: GIS lectures & exercise We will deal with GIS application development in two lectures. Because of the versatility of GIS data models

More information

Geodatabase Programming with Python

Geodatabase Programming with Python DevSummit DC February 11, 2015 Washington, DC Geodatabase Programming with Python Craig Gillgrass Assumptions Basic knowledge of python Basic knowledge enterprise geodatabases and workflows Please turn

More information

Flight Utilities Metar Reader version 3.1 by Umberto Degli Esposti

Flight Utilities  Metar Reader version 3.1 by Umberto Degli Esposti Flight Utilities http://www.flightutilities.com Metar Reader version 3.1 by Umberto Degli Esposti 1 Description The program allows inserting a Metar, to load it from a disk or from internet and to show

More information

CLX000 Technical Manual (v5.7x)

CLX000 Technical Manual (v5.7x) CLX000 Technical Manual (v5.7x) CSS Electronics (Updated 2018-04-24) Figure 1: CL1000, CL2000 & CL3000 Updated: 2018-04-24 Contents 1 About This Document 1 2 Introduction 2 3 Technical Specification 2

More information

USER S MANUAL 1D Seismic Site Response Analysis Example University of California: San Diego August 30, 2017

USER S MANUAL 1D Seismic Site Response Analysis Example   University of California: San Diego August 30, 2017 USER S MANUAL 1D Seismic Site Response Analysis Example http://www.soilquake.net/ucsdsoilmodels/ University of California: San Diego August 30, 2017 Table of Contents USER'S MANUAL TABLE OF CONTENTS Page

More information

Lab Manual for ICEN 553/453 Cyber-Physical Systems Fall 2018

Lab Manual for ICEN 553/453 Cyber-Physical Systems Fall 2018 Lab Manual for ICEN 553/453 Cyber-Physical Systems Fall 2018 Prof. Dola Saha Assistant Professor Department of Electrical & Computer Engineering University at Albany, SUNY Chapter 1 Setup Headless Raspberry

More information

Troubleshooting Replication and Geodata Service Issues

Troubleshooting Replication and Geodata Service Issues Troubleshooting Replication and Geodata Service Issues Ken Galliher & Ben Lin Esri UC 2014 Demo Theater Tech Session Overview What is Geodatabase Replication Replication types Geodata service replication

More information

ECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University

ECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University ECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University Prof. Sunil P. Khatri Lab exercise created and tested by: Abbas Fairouz, Ramu Endluri, He Zhou,

More information

The conceptual view. by Gerrit Muller University of Southeast Norway-NISE

The conceptual view. by Gerrit Muller University of Southeast Norway-NISE by Gerrit Muller University of Southeast Norway-NISE e-mail: gaudisite@gmail.com www.gaudisite.nl Abstract The purpose of the conceptual view is described. A number of methods or models is given to use

More information

Appendix 4 Weather. Weather Providers

Appendix 4 Weather. Weather Providers Appendix 4 Weather Using weather data in your automation solution can have many benefits. Without weather data, your home automation happens regardless of environmental conditions. Some things you can

More information

Enabling Web GIS. Dal Hunter Jeff Shaner

Enabling Web GIS. Dal Hunter Jeff Shaner Enabling Web GIS Dal Hunter Jeff Shaner Enabling Web GIS In Your Infrastructure Agenda Quick Overview Web GIS Deployment Server GIS Deployment Security and Identity Management Web GIS Operations Web GIS

More information

User-Materials in ANSYS

User-Materials in ANSYS User-Materials in ANSYS Holzapfel-Model l lfor Soft Tissues Prof. Dr.-Ing A. Fritsch Possibilities of user programming ANSYS User Programmable Features (UPF) are capabilities you can use to write your

More information

/home/thierry/columbia/msongsdb/tutorials/tutorial4/tutorial4.py January 25,

/home/thierry/columbia/msongsdb/tutorials/tutorial4/tutorial4.py January 25, /home/thierry/columbia/msongsdb/tutorials/tutorial4/tutorial4.py January 25, 2011 1 26 """ 27 Thierry Bertin - Mahieux ( 2010) Columbia University 28 tb2332@ columbia. edu 29 30 This code demo the use

More information

Leveraging ArcGIS Online Elevation and Hydrology Services. Steve Kopp, Jian Lange

Leveraging ArcGIS Online Elevation and Hydrology Services. Steve Kopp, Jian Lange Leveraging ArcGIS Online Elevation and Hydrology Services Steve Kopp, Jian Lange Topics An overview of ArcGIS Online Elevation Analysis Using Elevation Analysis Services in ArcGIS for Desktop Using Elevation

More information

Scripting Languages Fast development, extensible programs

Scripting Languages Fast development, extensible programs Scripting Languages Fast development, extensible programs Devert Alexandre School of Software Engineering of USTC November 30, 2012 Slide 1/60 Table of Contents 1 Introduction 2 Dynamic languages A Python

More information

GIS Software. Evolution of GIS Software

GIS Software. Evolution of GIS Software GIS Software The geoprocessing engines of GIS Major functions Collect, store, mange, query, analyze and present Key terms Program collections of instructions to manipulate data Package integrated collection

More information

Discrete-event simulations

Discrete-event simulations Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;

More information

Introduction to ArcGIS Server Development

Introduction to ArcGIS Server Development Introduction to ArcGIS Server Development Kevin Deege,, Rob Burke, Kelly Hutchins, and Sathya Prasad ESRI Developer Summit 2008 1 Schedule Introduction to ArcGIS Server Rob and Kevin Questions Break 2:15

More information

Extending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing

Extending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing Extending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing Alexandre Dulaunoy Andras Iklody TLP:WHITE June 16, 2016 Why we want to go more modular... Ways to extend

More information

Innovation. The Push and Pull at ESRI. September Kevin Daugherty Cadastral/Land Records Industry Solutions Manager

Innovation. The Push and Pull at ESRI. September Kevin Daugherty Cadastral/Land Records Industry Solutions Manager Innovation The Push and Pull at ESRI September 2004 Kevin Daugherty Cadastral/Land Records Industry Solutions Manager The Push and The Pull The Push is the information technology that drives research and

More information

Motors Automation Energy Transmission & Distribution Coatings. Servo Drive SCA06 V1.5X. Addendum to the Programming Manual SCA06 V1.

Motors Automation Energy Transmission & Distribution Coatings. Servo Drive SCA06 V1.5X. Addendum to the Programming Manual SCA06 V1. Motors Automation Energy Transmission & Distribution Coatings Servo Drive SCA06 V1.5X SCA06 V1.4X Series: SCA06 Language: English Document Number: 10003604017 / 01 Software Version: V1.5X Publication Date:

More information

USER S MANUAL. 1D Seismic Site Response Analysis Example. University of California: San Diego.

USER S MANUAL. 1D Seismic Site Response Analysis Example.  University of California: San Diego. USER S MANUAL 1D Seismic Site Response Analysis Example http://www.soilquake.net/ucsdsoilmodels/ University of California: San Diego August 2, 2017 Table of Contents USER'S MANUAL TABLE OF CONTENTS Page

More information

APBS electrostatics in VMD - Software. APBS! >!Examples! >!Visualization! >! Contents

APBS electrostatics in VMD - Software. APBS! >!Examples! >!Visualization! >! Contents Software Search this site Home Announcements An update on mailing lists APBS 1.2.0 released APBS 1.2.1 released APBS 1.3 released New APBS 1.3 Windows Installer PDB2PQR 1.7.1 released PDB2PQR 1.8 released

More information

T R A I N I N G M A N U A L 1. 9 G H Z C D M A P C S 80 0 M H Z C D M A /A M P S ( T R I - M O D E ) PM325

T R A I N I N G M A N U A L 1. 9 G H Z C D M A P C S 80 0 M H Z C D M A /A M P S ( T R I - M O D E ) PM325 T R A I N I N G M A N U A L 1. 9 G H Z C D M A P C S 80 0 M H Z C D M A /A M P S ( T R I - M O D E ) PM325 Slide. Click. Send the pic O P E R AT I N G I N S T RU C T I O N S H e a d s e t Ja c k S e l

More information

ARGUS.net IS THREE SOLUTIONS IN ONE

ARGUS.net IS THREE SOLUTIONS IN ONE OVERVIEW H i g h l y c o n f i g u r a b l e s o f t w a r e a c c o m m o d a t e s a w i d e r a n g e o f c o l l e c t i o n s T h r e e s o l u t i o n s c o v e r P o r t a l s, C o l l e c t i o

More information

SDS developer guide. Develop distributed and parallel applications in Java. Nathanaël Cottin. version

SDS developer guide. Develop distributed and parallel applications in Java. Nathanaël Cottin. version SDS developer guide Develop distributed and parallel applications in Java Nathanaël Cottin sds@ncottin.net http://sds.ncottin.net version 0.0.3 Copyright 2007 - Nathanaël Cottin Permission is granted to

More information

Arboretum Explorer: Using GIS to map the Arnold Arboretum

Arboretum Explorer: Using GIS to map the Arnold Arboretum Arboretum Explorer: Using GIS to map the Arnold Arboretum Donna Tremonte, Arnold Arboretum of Harvard University 2015 Esri User Conference (UC), July 22, 2015 http://arboretum.harvard.edu/explorer Mission

More information

E23: Hotel Management System Wen Yunlu Hu Xing Chen Ke Tang Haoyuan Module: EEE 101

E23: Hotel Management System Wen Yunlu Hu Xing Chen Ke Tang Haoyuan Module: EEE 101 E23: Hotel Management System Author: 1302509 Zhao Ruimin 1301478 Wen Yunlu 1302575 Hu Xing 1301911 Chen Ke 1302599 Tang Haoyuan Module: EEE 101 Lecturer: Date: Dr.Lin December/22/2014 Contents Contents

More information

Arup Nanda Starwood Hotels

Arup Nanda Starwood Hotels Arup Nanda Starwood Hotels Why Analyze The Database is Slow! Storage, CPU, memory, runqueues all affect the performance Know what specifically is causing them to be slow To build a profile of the application

More information

Lesser Sunda - Banda Seascape Atlas

Lesser Sunda - Banda Seascape Atlas Lesser Sunda - Banda Seascape Atlas Report prepared for the development of online interactive map for Lesser Sunda Banda Seascape by WorldFish December 2014 http://sbsatlas.reefbase.org Page 1 of 8 Table

More information

ISSP User Guide CY3207ISSP. Revision C

ISSP User Guide CY3207ISSP. Revision C CY3207ISSP ISSP User Guide Revision C Cypress Semiconductor 198 Champion Court San Jose, CA 95134-1709 Phone (USA): 800.858.1810 Phone (Intnl): 408.943.2600 http://www.cypress.com Copyrights Copyrights

More information

ECEN 651: Microprogrammed Control of Digital Systems Department of Electrical and Computer Engineering Texas A&M University

ECEN 651: Microprogrammed Control of Digital Systems Department of Electrical and Computer Engineering Texas A&M University ECEN 651: Microprogrammed Control of Digital Systems Department of Electrical and Computer Engineering Texas A&M University Prof. Mi Lu TA: Ehsan Rohani Laboratory Exercise #4 MIPS Assembly and Simulation

More information

AMS 132: Discussion Section 2

AMS 132: Discussion Section 2 Prof. David Draper Department of Applied Mathematics and Statistics University of California, Santa Cruz AMS 132: Discussion Section 2 All computer operations in this course will be described for the Windows

More information

M E R C E R W I N WA L K T H R O U G H

M E R C E R W I N WA L K T H R O U G H H E A L T H W E A L T H C A R E E R WA L K T H R O U G H C L I E N T S O L U T I O N S T E A M T A B L E O F C O N T E N T 1. Login to the Tool 2 2. Published reports... 7 3. Select Results Criteria...

More information

Building Inflation Tables and CER Libraries

Building Inflation Tables and CER Libraries Building Inflation Tables and CER Libraries January 2007 Presented by James K. Johnson Tecolote Research, Inc. Copyright Tecolote Research, Inc. September 2006 Abstract Building Inflation Tables and CER

More information

Quick Start Guide New Mountain Visit our Website to Register Your Copy (weatherview32.com)

Quick Start Guide New Mountain Visit our Website to Register Your Copy (weatherview32.com) Quick Start Guide New Mountain Visit our Website to Register Your Copy (weatherview32.com) Page 1 For the best results follow all of the instructions on the following pages to quickly access real-time

More information