V I A T. D e v e l o p e r ' s. v 0. 4
|
|
- Preston Small
- 5 years ago
- Views:
Transcription
1 V I A T D e v e l o p e r ' s G u i d e v 0. 4 Verfahren zur Identikation und Abwehr von Telefon-SPAM (Translation: Method for the Identication and Blocking of Telephone-SPAM ) Prof. Dr. Heiko Knospe M.Sc. Dirk Lentzen Dipl.-Ing.(FH) Gary Grutzek Prof. Dr. Christoph Pörschmann M.Sc. Julian Strobl Dipl.-Ing.(FH) Bernhard Mainka Institute of Communications Engineering Department of IT Security December 12, 2012
2 Project Partners: In cooperation with: Acknowledgments: A part of this work was carried out during an internship with Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE, Wachtberg, Germany. We would especially like to thank Frank Kurth for his support. For more information visit:
3 Contents 1 Introduction 1 2 Software Pre-Requirements GNU General Public License (GPL) Debian GNU/Linux 64 Bit Boost Library v1.48 with Boost Log v PostgreSQL v8.4 Database YapHash - Yet Another Perceptual Hash WaveLash - Wavelet Audio Hashing Installation Usage Documentation callx - Call Extractor Installation Usage Documentation featurex - Feature Extractor Installation Usage Documentation indexd - Index-Based Search Daemon Installation Usage Documentation mld - Matchlist Analyzer Daemon Installation Usage Documentation VirtualBox Appliance: VIAT.ova Debian GNU/Linux 64 Bit User Accounts Network Conguration Additional Packages Boost Library v1.48 with Boost Log v PostgreSQL v8.4 Database FrameWave Asterisk A and B Communication Servers Directories Usage A Basic Example... 19
4 3.2.2 Clear The Blacklist Create Your Own Call Scenarios References iii List of Figures 1 VIAT Database Scheme VIAT Testing Environment VIAT Testing Environment opened in terminal PostgreSQL administration tool opened in web browser Call ow from Asterisk A (left) to Asterisk B (right) Partial output of indexd.log with a similarity of 40% between the two calls Information about blocked caller in Asterisk A (left) List of Listings 1 Conguration le for Index-Based Search Daemon Conguration le for Matchlist Analyzer Daemon Network conguration: /etc/network/interfaces Example conguration for callles: /home/viat/scenario/minimal/congmake-callles-demo.pl Example conguration for calls: /home/viat/scenario/minimal/cong-makecalls-demo.pl
5 1 Introduction VIAT means Verfahren zur Identikation und Abwehr von Telefon-SPAM which translates to Method for the Identication and Blocking of Telephone-SPAM. VIAT is a research project (period of time: July December 2012) of the Cologne University of Applied Sciences (project management) in cooperation with the TU Braunschweig, the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE and the companies IPTEGO GmbH and Sirrix AG. The project is signicantly nanced by the Federal Ministry of Education and Research and supported by the involved companies. Telephone-SPAM is characterized by bulk unsolicited calls. The SPAMer attempts to initiate a voice session and relays a prerecorded message if the callee answers. The prevalent Voice over IP (VoIP) technology provides convenient tools and low-priced possibilities to place a large number of SPAM calls. This document is organized as follows: In the next section we introduce our written and open sourced software and which pre-requirements should be met to get the software going. After that we describe our released VirtualBox Appliance which is already congured and with which you can easily use and test our prototype. You can even take your own audio material and create your own call scenarios. Finally the papers that we have written, are listed.
6 2 Software 2.1 Pre-Requirements In this section the software and other requirements are shown which you need to get our software going GNU General Public License (GPL) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FIT- NESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see < Debian GNU/Linux 64 Bit All our software was developed on Debian GNU/Linux 64 Bit systems. It might be that you get our software working on other operating systems, but in the following it'll be explained for fresh debian installation. You should at least install the build-essential package, if not already done: sudo apt get i n s t a l l build e s s e n t i a l If you're just interested in YapHash (see section 2.2) and/or featurex (see section 2.4), you're good to go and you can skip the next sections. 2
7 2.1.3 Boost Library v1.48 with Boost Log v1.1 Become a superuser: sudo su Now download Boost and Boost Log: wget http : / / downloads. s o u r c e f o r g e. net /\ p r o j e c t / boost / boost / / boost_1_48_0. t a r. gz wget http : / / downloads. s o u r c e f o r g e. net /\ p r o j e c t / boost l o g / boost log 1.1. z i p Extract both: t a r xvzf boost_1_48_0. t a r. gz unzip boost log 1.1. z i p Copy the log directories into the boost installation directory: cp r boost log 1.1/ boost / l o g boost_1_48_0/ boost / cp r boost log 1.1/ l i b s / l o g boost_1_48_0/ l i b s / Finally build and install it: cd boost_1_48_0/. / bootstrap. sh show l i b r a r i e s. / bootstrap. sh with l i b r a r i e s=a l l \ p r e f i x =/usr i n c l u d e d i r=/usr / i n c l u d e l i b d i r =/usr / l i b. / bjam i n s t a l l Become a normal user again: e x i t 3
8 2.1.4 PostgreSQL v8.4 Database Installation and Conguration To get callx (see section 2.3), indexd (see section 2.5) and mld (see section 2.6) going you need a PostgreSQL database. Install it with root privileges (you need the dev-library for compiling our sources): sudo apt get i n s t a l l p o s t g r e s q l l i b p q 5 libpq dev First of all we have to allow certain IP addresses to connect. There we have to edit: sudo nano / e t c / p o s t g r e s q l /8.4/ main/ p o s t g r e s q l. conf and delete the '#' before listen_addresses. There you can type in the IP addresses you want or just leave 'localhost'. Next we need to add a user and an actual database. E.g. we have an user on our debian called viat and we want to add that user and create a database which is also called viat. First of all we need to be a superuser: sudo su p o s t g r e s and connect to the database server: p s q l template1 Now set the actual SQL commands, where mypassword is a password of your choice (hit enter after each line): CREATE USER v i a t WITH PASSWORD ' mypassword ' ; CREATE DATABASE v i a t ; GRANT ALL PRIVILEGES ON DATABASE v i a t TO v i a t ; Quit the psql-terminal with: 4
9 \q and become a normal user again: e x i t Finally we can restart the service to get all changes working: sudo s e r v i c e p o s t g r e s q l r e s t a r t VIAT database scheme and download our database scheme: In gure 1 you can see the database scheme. Become user viat sudo su v i a t ; wget https : / / raw. github. com/ v i a t / S t u f f / master /db scheme v1. 0. s q l Now connect to the empty database: p s q l d v i a t U v i a t Finally import the SQL commands: \ i db scheme v1. 0. s q l You see some information (just ignore the rst errors: These are DROP TABLE commands in case the is an old environment). You can check everything with: \d 5
10 +caller.* v_caller_blacklist +caller, caller_blacklist(): from +caller_blacklist.caller_id not in (select caller_id from caller_whitelist) AND caller_blacklist.caller_id=caller.id(): where +callee.uri +caller_id v_callee_whitelist +callee, callee_whitelist(): from +callee_whitelist.callee_id=callee.id(): where call +id #id: serial +id +caller_id: integer = not null +timestamp: timestamp +id +processed: smallint = -1 +indexed: smallint = 0 +call_id +matched_call_id +call_id +caller_id caller_blacklist matchlist +call_id: integer +matched_call_id: integer +length_query: smallint = not null +actual_mismatches: smallint = not null +offset_position: smallint = not null +processed: smallint = -1 +caller_id: integer +call_id: integer +old_call_id: integer +timestamp: timestamp +reason: varchar(50) caller +id #id: serial +id +name: varchar(60) +uri: varchar(100) +id +caller_id caller_whitelist +caller_id: integer callee +id #id: serial +uri: varchar(100) +callee_id callee_whitelist +callee_id: integer Figure 1: VIAT Database Scheme. 2.2 YapHash - Yet Another Perceptual Hash YapHash is a perceptual ngerprint for audio identication purposes. YapHash is part of the VIAT project and therefore developed for detecting telephone-spam. Although it's been optimized for speech content, it could also be used for music. Standard cryptographic hash functions have the property that minimal alterations of input data signicantly change the resulting hash value. Robust audio hashes in contrast produce identical or nearby hash values for similar input data. In particular, the audio hashes should be invariant to (certain) content degradations and hence permit a perceptual audio comparison and an ecient identication of a specic recording. Dierent recordings with similar content, e.g. identical words or phrases, or from the same speaker are not identied. The YapHash ngerprint is based on the spectrogram and Mel-frequency-cepstrumcoecients (MFCC). The sign of the dierences in between the frequency bands form a compact yet robust audio hash. 6
11 2.2.1 WaveLash - Wavelet Audio Hashing WaveLash is an addon to YapHash. Instead of using FFT and MFCCs, a J-level wavelet transform with a specic wavelet is performed. A major part of the hash is created by calculating the dierences of the variances and one bit by calculating the zero crossing rate. The resulting bit lengths of the hash values is congurable (see below). To use WaveLash, uncomment the line #define WAVELASH in main.cpp and compile the source code Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t /YapHash. g i t First install GSL - GNU Scientic Library v1.9 by changing into YapHash/gsl-1.9 and running:. / c o n f i g u r e ; make ; sudo make i n s t a l l ; Change either into YapHash/sources/Match/ or into YapHash/sources/YapHash/ and then run: make c l e a n ; make a l l ; Usage YapHash is currently a command line tool and expects at least two arguments; First is the conguration le e.g. hash.cfg, second is the input wave le. To specify the output path a third argument can be passed optionally. Example: 7
12 . / YapHash hash. c f g SPIT_01_ABEIER. wav f o u t f i l e. csv For testing purposes, an additional tool for matching audio hashes has been provided. The maximum number n of matches for two of the aboves hashes is computed. An n-match means that n vectors including their relative time osets coincide. Example:. / Match o u t f i l e 1. csv o u t f i l e 2. csv Documentation 2.3 callx - Call Extractor Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t / c a l l x. g i t Usage Documentation 2.4 featurex - Feature Extractor Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t / f e a t u r e x. g i t 8
13 2.4.2 Usage Documentation 2.5 indexd - Index-Based Search Daemon The indexd (Index Daemon) is a background process which receives new ngerprints from featurex over sockets and performs a quick search in all previous ngerprints. Therefore the ngerprints are stored and maintained in an index-like structure with the feature classes in the dictionary and tuples of call identier and position of occurrence in the postings lists. These postings list are also called inverted les or inverted list and the search method basically intersects these list with some fault-tolerance mechanisms Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t / indexd. g i t From here change into indexd/release/ and type the following and hit enter to build the software: make c l e a n ; make j 4 a l l Where -j4 is optional for using four threads while compiling Usage Since indexd is a background daemon an easy way to start it is to run the following on the command line: 9
14 . / indexd indexd. conf You can pass the conguration le as argument. Otherwise indexd expects the conguration le to be /etc/viat/indexd.conf. Conguration shown in listing 1. An example for a conguration le with all congurable parameters is Listing 1: Conguration le for Index-Based Search Daemon. 1 ########################################################################### 2 ############# Configuration f i l e f o r Index Based Search Daemon ############ 3 ########################################################################### 4 5 # S p e c i f y d i r e c t o r y to run daemon and f o r l o g g i n g output 6 LOG_DIR =. / 7 PID_DIR =. / 8 9 # Receive new f i n g e r p r i n t s 10 SOCKET_ADDR = SOCKET_PORT = # Connection s t r i n g f o r database 14 # ( connection s t r i n g has to be between quotes e. g. "dbname=v i a t "! ) 15 CONNINFO = " host = dbname=v i a t user=v i a t " # Fuzzy search ( no : 0, yes : other ) 18 FUZZY = 0 19 # Number o f matches 20 N = # Maximal time s h i f t i n samples (>= 0) 22 MAX_OFFSET = # Maximal number o f elements per query ( p o s i t i o n, f e a t u r e ) 25 # ( query, memory a l l o c a t i o n ) 26 NUMELEMOFEACHQUERY = # Logging l e v e l 29 # 1 : FATAL 30 # 2 : ERROR 31 # 3 : WARNING 32 # 4 : INFO 33 # 5 : DEBUG ( search ) 34 # 6 : TRACE ( search algorithm output ) 35 LOG_LEVEL = 4 10
15 Logging by using tail: The logging output is in the congured directory. You can follow the output t a i l f indexd. l o g Process Identier (PID) type: To quit the daemon is very easy using the PID. For example k i l l ` cat indexd. pid ` and hit enter Documentation 2.6 mld - Matchlist Analyzer Daemon The mld (Matchlist Analyzer Daemon) is a background process which check the 'matchlist' table in the database and lls the 'caller_blacklist' to be able to block a certain caller Installation Optionally create and change into a new directory. Get the sources via git: g i t c l o n e g i t : / / github. com/ v i a t /mld. g i t From here change into mld/release/ and type the following and hit enter to build the software: make c l e a n ; make j 4 a l l Where -j4 is optional for using four threads while compiling. 11
16 2.6.2 Usage Since mld is a background daemon an easy way to start it is to run the following on the command line:. / mld mld. conf You can pass the conguration le as argument. Otherwise mld expects the conguration le to be /etc/viat/mld.conf. Conguration shown in listing 2. An example for a conguration le with all congurable parameters is Listing 2: Conguration le for Matchlist Analyzer Daemon. 1 ########################################################################### 2 ############# Configuration f i l e f o r Matchlist Analyzer Daemon ############ 3 ########################################################################### 4 5 # S p e c i f y d i r e c t o r y to run daemon 6 LOG_DIR =. / 7 PID_DIR =. / 8 9 # Connection s t r i n g f o r database 10 # ( connection s t r i n g has to be between quotes e. g. "dbname=v i a t "! ) 11 CONNINFO = " host = dbname=v i a t user=v i a t " # P o l l i n g database time to p r o c e s s m a t c h l i s t ( in m i l l i s e c o n d s ) 14 SLEEP = # How equal c a l l s have to be to get b l a c k l i s t e d ( in percent ) 17 BLACKLIST_PERCENT = 85 Logging by using tail: The logging output is in the congured directory. You can follow the output t a i l f mld. l o g 12
17 Process Identier (PID) type: To quit the daemon is very easy using the PID. For example k i l l ` cat mld. pid ` and hit enter Documentation The software documentation was created with Doxygen v and can be seen by opening html/index.htm in a browser. 13
18 3 VirtualBox Appliance: VIAT.ova Asterisk A eth0: :5060 Kamailio eth0: :5060 Asterisk B eth0: :5060 Call flow --> Blacklist check Call flow (copy) PostgreSQL Call data callx eth0, promiscuous mode Blacklist data Audio Fingerprints indexd eth0: :3000 featurex eth0: :3000 Figure 2: VIAT Testing Environment. In gure 2 you can see the VIAT testing environment. There are two Asterisk communication servers. One for call generation called Asterisk A and one for call termination called Asterisk B. The SIP Express Router (SER) Kamailio transfers the calls between these servers, if the caller is not on the Blacklist. From a copy of the network stream the audio data is extracted 1 (see section 2.3) and the audio ngerprint is computed (see sections 2.2 and 2.4). After that the ngerprints are compared against all previous ngerprints (see section 2.5) and the information about possible equal or similar audio data is stored in the PostgreSQL database. With this information the Blacklist in the database is lled (see section 2.6). 1 Not yet integrated. The call extraction is handled by a perl-script which monitors the folder /var/spool/asterisk/monitor/. It writes the call metadata to the database and passes the audio material to featurex. The script is at /script/vmfd.pl. 14
19 3.1 Debian GNU/Linux 64 Bit The virtual machine is a Debian GNU/Linux 64 Bit system. In the following we describe the changes we have made to a fresh debian installation. Security updates have been installed on November 2, User Accounts We have two users. On the hand the standard superuser root and an additional user viat, which should be taken to control the virtual machine and our system. The password for both accounts is: viat Network Conguration We modied the network conguration to reach the scenario described in gure 2. You can see the changes in listing Additional Packages Some additional packages have been installed: openssh s e r v e r p o s t g r e s q l l i b p q 5 libpq dev a s t e r i s k libdatetime format iso8601 p e r l The openssh-server is for an easy connection e.g. via terminal to the virtual machine. The packages postgresql, libpq5 and libpq-dev are for the PostgreSQL database (see section and 3.1.5), where the last one is needed for compiling our sources. The last two packages asterisk and libdatetime-format-iso8601-perl are for the open source telephony software Asterisk (see section 3.1.7). 15
20 Listing 3: Network conguration: /etc/network/interfaces. 1 allow ho tpl ug eth0 2 i f a c e eth0 i n e t dhcp 3 4 auto eth0 : 0 5 i f a c e eth0 : 0 i n e t s t a t i c 6 address netmask auto eth0 : 1 10 i f a c e eth0 : 1 i n e t s t a t i c 11 address netmask auto eth0 : 2 15 i f a c e eth0 : 2 i n e t s t a t i c 16 address netmask auto eth0 : 3 20 i f a c e eth0 : 3 i n e t s t a t i c 21 address netmask auto eth0 : 4 25 i f a c e eth0 : 4 i n e t s t a t i c 26 address netmask Boost Library v1.48 with Boost Log v1.1 For further information about the installation process see section The libraries are stored in /usr/lib/ and have the format libboost_*.a resp. libboost_*.so. The header les are in a new directory in /usr/include/boost PostgreSQL v8.4 Database For further information about the installation process, the created database, tables and users see section In gure 1 you can see which information is stored in the database. 16
21 3.1.6 FrameWave Framewave is a free and open-source collection of popular image and signal processing routines designed to accelerate application development, debugging, multi-threading and optimization on x86-class processor platforms. 2 The shared libraries object can be found at /usr/lib/ starting with fw*. The libraries are needed by featurex (see section 2.4) Asterisk A and B Communication Servers We have two Asterisk servers in our testing environment. One for call generation Asterisk A and one for call termination Asterisk B (see gure 2), so that we can simulate a full call ow. Each Asterisk server needs its own network interface, so that we can passively extract the SIP and RTP data (see section 2.3). Therefore we created two virtual network interfaces. The interface eth0:0 is for Asterisk A and the interface eth0:1 is for Asterisk B (see gure 2 and listing 3). To start two instances of the asterisk software, we have two modied start scripts /etc/init.d/asta and /etc/init.d/astb. Furthermore we removed the default start script and added our two modied ones. This way you always have the Asterisk A and Asterisk B running at startup. For every instance we have new directories for the running directory: drwxr xr x 2 v i a t v i a t / var /run/ asta drwxr xr x 2 v i a t v i a t / var /run/ astb and the conguration directory: drwxr xr x 2 v i a t v i a t / e t c / asta drwxr xr x 2 v i a t v i a t / e t c / astb
22 Finally we created two new executables: / usr / sbin / asta / usr / sbin / astb and you can connect to the specic instance by passing the -r argument! Directories All directories are owned by viat. The conguration les of our software can be found in /etc/viat/, logging output is in /var/log/viat/ and pid-les are in /var/run/viat/. The conguration les of the Asterisk instances can be found in /etc/asta/ and /etc/astb/, logging output in /var/log/asta/ and /var/log/astb/ and the pid-les in /var/run/asta/ and /var/run/astb/. The transferred audio material (.wav) can be found in the directories /var/spool/asta/ and /var/spool/astb/. 3.2 Usage When starting the image two things will automatically open. On the one hand a couple of terminals with which you can control our environment (see gure 3). In the top section you can see the console of Asterisk A and Asterisk B. Theses are just for output. Later we will see our call ow and blocked calls here. In the middle section is the output of indexd (see section 2.5). If you are interested in the search algorithm, you will get some information in [1]. The bottom section is for actually control our system. We have prepared some scripts for you to get our system easily running. One the other hand you see the PostgreSQL administration tool opened in a browser (see gure 4). Username and password are both viat. In the beginning the database is empty. After running our system a little while interesting tables are matchlist, where you can see the search output about similar calls; the call table with metadata about all calls and of course the caller_blacklist, where the SER Kamailio gets its information about blocking certain callers. 18
23 Figure 3: VIAT Testing Environment opened in terminal. Figure 4: PostgreSQL administration tool opened in web browser A Basic Example To get you started very fast, we provide an example called minimal. Just run from the /script directory and see what happens:. / make c a l l s. sh /home/ v i a t / s c e n a r i o / minimal demo 19
24 Two calls are transmitted. In the top section you see the call ow from Asterisk A to Asterisk B (see gure 5). When the calls are nished the search (see section 2.5) is per- Figure 5: Call ow from Asterisk A (left) to Asterisk B (right). formed and we get a similarity between these two calls (see gure 6). The result says that Figure 6: Partial output of indexd.log with a similarity of 40% between the two calls. the actual mismatches are 60 and since the ngerprint length of each call is 100, the two calls have 40 features in the right distance in common. We can also see this information in the database table matchlist. With this information the table caller_blacklist is lled, since we require a similarity of at least 15% (see section 2.6). Note: Although the audio material came from dierent callers, our system recognizes the similarity and is able to block both callers! We can now try to make the two calls again, but now we are blocked (see gure 7). Even Figure 7: Information about blocked caller in Asterisk A (left). 20
25 if we would take other call les we wouldn't get through. Play The Audio Files levels and a little delay of 100 ms. Play the audio les and observe that they only dier in noise totem /home/ v i a t / data / minimal /SPIT_01_1. wav totem /home/ v i a t / data / minimal /SPIT_01_d100_n20p. wav Monitor The Packets We installed Wireshark for you. Just start it as root, e.g. gksudo wireshark and monitor the loopback device lo. To get the VoIP trac only, set the lter: s i p or rtp and hit Apply Clear The Blacklist If you just want to clear the blacklist but not restart our system, you can use the PostgreSQL Administration Tool (see gure 4). Just click caller_blacklist and then Empty. Done! Create Your Own Call Scenarios Create Call Files see in listing 4. First of all we need a conguration le similar to the example you Finally we change in the /script directory and run the following command: 21
26 Listing 4: Example conguration for callles: /home/viat/scenario/minimal/congmake-callles-demo.pl. 1 inpath => '/home/ v i a t / data /minimal ', 2 outpath => '/home/ v i a t / s c e n a r i o / minimal / c a l l f i l e s ', 3 c a l l f i l e n a m e => ' minimal ', 4 template => '/home/ v i a t / s c e n a r i o / template. c a l l ', 5 media_files => [ 'wav ', 'mp3 ', 'gsm ' ], 6 m i n c a l l e r => , 7 maxcaller => , 8 m i n c a l l e e => 9100, 9 maxcallee => 9999,. / create c a l l f i l e s. pl c o n f i g f i l e =\ /home/ v i a t / s c e n a r i o / minimal / config make c a l l f i l e s demo. pl 22
27 Starting Calls We need a conguration le to simulate our call ow tting our needs. You can see an example in listing 5. Listing 5: Example conguration for calls: /home/viat/scenario/minimal/cong-makecalls-demo.pl. 1 inpath => '/home/ v i a t / s c e n a r i o / minimal / c a l l f i l e s / ', 2 tmppath => '/home/ v i a t / s c e n a r i o / minimal /tmp ', 3 outpath => '/ var / s p o o l / asta / outgoing ', 4 # 0=play each f i l e j u s t once, 1=r e p l a y s are p o s s i b l e 5 mitzuruecklegen => 0, 6 # f i l e e x t e n s i o n o f c a l l f i l e s 7 c a l l _ f i l e s => ' c a l l ', 8 # s t a r t time o f s i m u l a t i o n 9 s t a r t t i m e => ' T11 : 0 0 : 0 0 ', 10 # seconds o f simulated time s l i c e 11 t i c k t i m e => 5, 12 # time o f time s l i c e r e a l i t y 13 t i c k l e n g t h => 5, 14 # maximum number o f c a l l s per t i c k 15 #call_max => 15, 16 # minimal number o f c a l l s per t i c k 17 #call_ min => 5, 18 # l e v e l o f debug output 19 verbose => 3, 20 hour_ loads => [ 21 1, 1, 1, 1, 1, 1, # 00:00 05: , 1, 1, 1, 1, 1, # 06:00 11: , 1, 1, 1, 1, 1, # 12:00 17: , 1, 1, 1, 1, 1 # 18:00 24:00 25 ], 26 # number o f c a l l s per t i c k in busyhour 27 busyhour_calls => 2, 28 # I n f l u e n c e o f randomness? 10 e q u a l s to rand_ factor => 0, 30 # play c a l l f i l e s randomly? 0=play c a l l f i l e s in order, 1=play randomly 31 random => 0, From the /script directory just run:. / make c a l l s. sh /home/ v i a t / s c e n a r i o / minimal demo 23
28 References [1] J. Strobl, G. Grutzek, B. Mainka, and H. Knospe, An Ecient Search Method for the Content-Based Identication of Telephone-SPAM, in IEEE International Conference on Communications (ICC), pp , june [2] G. Grutzek, J. Strobl, B. Mainka, F. Kurth, C. Poerschmann, and H. Knospe, A Perceptual Hash for the Identication of Telephone Speech, in 2012 ITG Fachtagung Sprachkommunikation, september [3] D. Lentzen, G. Grutzek, H. Knospe, and C. Poerschmann, Content-Based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results, in IEEE International Conference on Communications (ICC), pp , june [4] J. Strobl, F. Kurth, G. Grutzek, and H. Knospe, Eziente Identikation von Telefon- Spam, in Fortschritte der Akustik - DAGA 2011, DEGA e.v., pp , [5] G. Grutzek, C. Poerschmann, and H. Knospe, Vergleich spektraler Merkmale zur Identikation von Telefon SPAM, in Fortschritte der Akustik - DAGA 2010, DEGA e.v., pp , [6] H. Knospe and C. Poerschmann, Ein neues Verfahren zur Identikation und Abwehr von Telefon-SPAM, in Scientic Reports of the Cologne University of Applied Sciences, Proceedings des XXI. Deutsch-Polnischen Seminars, pp. 4953, [7] C. Poerschmann and H. Knospe, Spectral Analysis of Audio Signals for the Identication of Spam Over IP Telephony, in Proceedings of the NAG/DAGA 2009, DEGA e.v, pp , [8] C. Poerschmann and H. Knospe, Analyse spektraler Parameter des Audiosignals zur Identikation und Abwehr von Telefon-SPAM, in Sicherheit 2008, Lecture Notes in Informatics, Proceedings Sicherheit 2008, Gesellschaft für Informatik, vol. P-128, pp , iii
29 [9] C. Poerschmann and H. Knospe, Analysis of Spectral Parameters of Audio Signals for the Identication of Spam Over IP Telephony, in The Fifth Conference on and Anti-Spam, pp , iv
Databases through Python-Flask and MariaDB
1 Databases through Python-Flask and MariaDB Tanmay Agarwal, Durga Keerthi and G V V Sharma Contents 1 Python-flask 1 1.1 Installation.......... 1 1.2 Testing Flask......... 1 2 Mariadb 1 2.1 Software
More informationST-Links. SpatialKit. Version 3.0.x. For ArcMap. ArcMap Extension for Directly Connecting to Spatial Databases. ST-Links Corporation.
ST-Links SpatialKit For ArcMap Version 3.0.x ArcMap Extension for Directly Connecting to Spatial Databases ST-Links Corporation www.st-links.com 2012 Contents Introduction... 3 Installation... 3 Database
More informationReplication cluster on MariaDB 5.5 / ubuntu-server. Mark Schneider ms(at)it-infrastrukturen(dot)org
Mark Schneider ms(at)it-infrastrukturen(dot)org 2012-05-31 Abstract Setting of MASTER-SLAVE or MASTER-MASTER replications on MariaDB 5.5 database servers is neccessary for higher availability of data and
More informationGeodatabase Best Practices. Dave Crawford Erik Hoel
Geodatabase Best Practices Dave Crawford Erik Hoel Geodatabase best practices - outline Geodatabase creation Data ownership Data model Data configuration Geodatabase behaviors Data integrity and validation
More informationIntroduction to Portal for ArcGIS. Hao LEE November 12, 2015
Introduction to Portal for ArcGIS Hao LEE November 12, 2015 Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration options Portal for ArcGIS + ArcGIS for
More informationIntroduction to Portal for ArcGIS
Introduction to Portal for ArcGIS Derek Law Product Management March 10 th, 2015 Esri Developer Summit 2015 Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration
More informationYes, the Library will be accessible via the new PULSE and the existing desktop version of PULSE.
F R E Q U E N T L Y A S K E D Q U E S T I O N S THE LIBRARY GENERAL W H A T I S T H E L I B R A R Y? The Library is the new, shorter, simpler name for the Business Development (Biz Dev) Library. It s your
More informationAdministrivia. Course Objectives. Overview. Lecture Notes Week markem/cs333/ 2. Staff. 3. Prerequisites. 4. Grading. 1. Theory and application
Administrivia 1. markem/cs333/ 2. Staff 3. Prerequisites 4. Grading Course Objectives 1. Theory and application 2. Benefits 3. Labs TAs Overview 1. What is a computer system? CPU PC ALU System bus Memory
More informationPortal for ArcGIS: An Introduction
Portal for ArcGIS: An Introduction Derek Law Esri Product Management Esri UC 2014 Technical Workshop Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration
More informationNV-DVR09NET NV-DVR016NET
NV-DVR09NET NV-DVR016NET !,.,. :,.!,,.,!,,, CMOS/MOSFET. : 89/336/EEC, 93/68/EEC, 72/23/EEC,.,,. Novus Security Sp z o.o... 4 1. NV-DVR09NET NV-DVR016NET. 2.,. 3.,... 4... ( ) /. 5..... 6.,,.,. 7.,.. 8.,,.
More informationFrom BASIS DD to Barista Application in Five Easy Steps
Y The steps are: From BASIS DD to Barista Application in Five Easy Steps By Jim Douglas our current BASIS Data Dictionary is perfect raw material for your first Barista-brewed application. Barista facilitates
More informationSenior astrophysics Lab 2: Evolution of a 1 M star
Senior astrophysics Lab 2: Evolution of a 1 M star Name: Checkpoints due: Friday 13 April 2018 1 Introduction This is the rst of two computer labs using existing software to investigate the internal structure
More informationFundamentals of Computational Science
Fundamentals of Computational Science Dr. Hyrum D. Carroll August 23, 2016 Introductions Each student: Name Undergraduate school & major Masters & major Previous research (if any) Why Computational Science
More informationTox Issues with virtualenv GNU Guix guix-tox. Guix-tox. A functional version of tox. Cyril Roelandt January 30, /35
A functional version of tox cyril@redhat.com January 30, 2016 1/35 OpenStack developer at Red Hat since 2013 developer 2/35 1 2 Only Python packages can be installed Reproducibility One package manager
More informationK D A A M P L I F I E R S F I R M W A R E U S E R G U I D E
K D A A M P L I F I E R S F I R M W A R E U S E R G U I D E T A B L E O F C O N T E N T S S E C T I O N 1 : P R E PA R I N G Y O U R F I L E S Via Network Router 3 S E C T I O N 2 : A C C E S S I N G T
More informationFrom BASIS DD to Barista Application in Five Easy Steps
Y The steps are: From BASIS DD to Barista Application in Five Easy Steps By Jim Douglas our current BASIS Data Dictionary is perfect raw material for your first Barista-brewed application. Barista facilitates
More informationExploiting Virtual Observatory and Information Technology: Techniques for Astronomy
Exploiting Virtual Observatory and Information Technology: Techniques for Astronomy Lecture #6 Goal: VO Workflows Science Usage Nicholas Walton AstroGrid Project Scientist Institute of Astronomy, The University
More informationSoftware BioScout-Calibrator June 2013
SARAD GmbH BioScout -Calibrator 1 Manual Software BioScout-Calibrator June 2013 SARAD GmbH Tel.: ++49 (0)351 / 6580712 Wiesbadener Straße 10 FAX: ++49 (0)351 / 6580718 D-01159 Dresden email: support@sarad.de
More informationSOMIM: An open-source program code for the numerical Search for Optimal Measurements by an Iterative Method
SOMIM: An open-source program code for the numerical Search for Optimal Measurements by an Iterative Method Kean Loon Lee, 1,2 Jiangwei Shang, 1 Wee Kang Chua, 4 Shiang Yong Looi, 5 and Berthold-Georg
More informationWeatherHub2 Quick Start Guide
WeatherHub2 Quick Start Guide Table of Contents 1 Introduction... 1 2 Packing List... 1 3 Connections... 1 4 IP Addressing... 2 5 Browser Access... 3 6 System Info... 3 7 Weather Station Settings... 4
More informationLeveraging Web GIS: An Introduction to the ArcGIS portal
Leveraging Web GIS: An Introduction to the ArcGIS portal Derek Law Product Management DLaw@esri.com Agenda Web GIS pattern Product overview Installation and deployment Configuration options Security options
More informationOverlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment
Overlay Transport Virtualization (OTV) Unicast-Mode Transport Infrastructure Deployment July 24, 2012 ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS")
More informationEUROPEAN MIDDLEWARE INITIATIVE
EUROPEAN MIDDLEWARE INITIATIVE MYPROXY YAIM ADMINISTRATOR GUIDE Document version: 1.0.2-1 EMI Component Version: 1.x 1/10 This work is co-funded by the European Commission as part of the EMI project under
More informationGeodatabase: Best Practices. Robert LeClair, Senior Instructor
Geodatabase: Best Practices Robert LeClair, Senior Instructor Agenda Geodatabase Creation Data Ownership Data Model Data Configuration Geodatabase Behaviors Data Validation Extending Performance Geodatabase
More informationSocket Programming. Daniel Zappala. CS 360 Internet Programming Brigham Young University
Socket Programming Daniel Zappala CS 360 Internet Programming Brigham Young University Sockets, Addresses, Ports Clients and Servers 3/33 clients request a service from a server using a protocol need an
More informationExtending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing
Extending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing MISP Project @MISPProject TLP:WHITE MISP Training - @SWITCH - 20161206 Why we want to go more modular...
More informationAdministering your Enterprise Geodatabase using Python. Jill Penney
Administering your Enterprise Geodatabase using Python Jill Penney Assumptions Basic knowledge of python Basic knowledge enterprise geodatabases and workflows You want code Please turn off or silence cell
More informationGPS Mapping with Esri s Collector App. What We ll Cover
GPS Mapping with Esri s Collector App Part 1: Overview What We ll Cover Part 1: Overview and requirements Part 2: Preparing the data in ArcGIS for Desktop Part 3: Build a web map in ArcGIS Online Part
More informationPortal for ArcGIS: An Introduction. Catherine Hynes and Derek Law
Portal for ArcGIS: An Introduction Catherine Hynes and Derek Law Agenda Web GIS pattern Product overview Installation and deployment Configuration options Security options and groups Portal for ArcGIS
More informationInfrastructure Automation with Salt
Infrastructure Automation with Salt Sean McGrath 10th November 2016 About Research IT Where I work as a systems administrator http://www.tchpc.tcd.ie/ Ireland s premier High Performance Computing Centre
More informationDeep-dive into PyMISP MISP - Malware Information Sharing Platform & Threat Sharing
Deep-dive into PyMISP MISP - Malware Information Sharing Platform & Threat Sharing Team CIRCL http://www.misp-project.org/ Twitter: @MISPProject MISP Training @ Helsinki 20180423 Context MISP is complex
More informationAccount Setup. STEP 1: Create Enhanced View Account
SpyMeSatGov Access Guide - Android DigitalGlobe Imagery Enhanced View How to setup, search and download imagery from DigitalGlobe utilizing NGA s Enhanced View license Account Setup SpyMeSatGov uses a
More informationBloomsburg University Weather Viewer Quick Start Guide. Software Version 1.2 Date 4/7/2014
Bloomsburg University Weather Viewer Quick Start Guide Software Version 1.2 Date 4/7/2014 Program Background / Objectives: The Bloomsburg Weather Viewer is a weather visualization program that is designed
More informationCHEOPS Feasibility Checker Guidelines
CHEOPS Feasibility Checker Guidelines Open a terminal and run the following commands (USERNAME as provided by the SOC - UNIGE): ssh X USERNAME@isdc-nx00.isdc.unige.ch ssh X USERNAME@tichpsmps00 /cheops_sw/mps_test/bin/mps_client
More informationGIS Functions and Integration. Tyler Pauley Associate Consultant
GIS Functions and Integration Tyler Pauley Associate Consultant Contents GIS in AgileAssets products Displaying data within AMS Symbolizing the map display Display on Bing Maps Demo- Displaying a map in
More informationSeCQC: An open-source program code for the numerical. Search for the classical Capacity of Quantum Channels
SeCQC: An open-source program code for the numerical Search for the classical C apacity of Quantum C hannels Jiangwei Shang, 1 Kean Loon Lee, 1,2 and Berthold-Georg Englert 1,3 1 Centre for Quantum Technologies
More informationOverview. Everywhere. Over everything.
Cadenza Desktop Cadenza Web Cadenza Mobile Cadenza Overview. Everywhere. Over everything. The ultimate GIS and reporting suite. Provide, analyze and report data efficiently. For desktop, web and mobile.
More informationOne platform for desktop, web and mobile
One platform for desktop, web and mobile Search and filter Get access to all data thematically filter data in context factually and spatially as well as display it dynamically. Export a selection or send
More informationReaxys Pipeline Pilot Components Installation and User Guide
1 1 Reaxys Pipeline Pilot components for Pipeline Pilot 9.5 Reaxys Pipeline Pilot Components Installation and User Guide Version 1.0 2 Introduction The Reaxys and Reaxys Medicinal Chemistry Application
More informationSuperCELL Data Programmer and ACTiSys IR Programmer User s Guide
SuperCELL Data Programmer and ACTiSys IR Programmer User s Guide This page is intentionally left blank. SuperCELL Data Programmer and ACTiSys IR Programmer User s Guide The ACTiSys IR Programmer and SuperCELL
More informationCollaborative WRF-based research and education enabled by software containers
Collaborative WRF-based research and education enabled by software containers J. Hacker, J. Exby, K. Fossell National Center for Atmospheric Research Contributions from Tim See (U. North Dakota) 1 Why
More informationTryton Technical Training
Tryton Technical Training N. Évrard B 2CK September 18, 2015 N. Évrard (B 2 CK) Tryton Technical Training September 18, 2015 1 / 56 Overview and Installation Outline 1 Overview and Installation Tryton
More informationLightcloud Application
Controlling Your Lightcloud System Lightcloud Application Lightcloud Application Navigating the Application Devices Device Settings Organize Control Energy Scenes Schedules Demand Response Power Up State
More informationConfiguring LDAP Authentication in iway Service Manager
Configuring LDAP Authentication in iway Service Manager LDAP authentication in iway Service Manager (ism) allows ism to authenticate against LDAP and associate an LDAP ism role to the user. ism includes
More informationTECDIS and TELchart ECS Weather Overlay Guide
1 of 24 TECDIS and TELchart ECS provides a very advanced weather overlay feature, using top quality commercial maritime weather forecast data available as a subscription service from Jeppesen Marine. The
More informationECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University
ECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University Prof. Sunil P Khatri (Lab exercise created and tested by Ramu Endluri, He Zhou and Sunil P
More informationArcGIS Pro Q&A Session. NWGIS Conference, October 11, 2017 With John Sharrard, Esri GIS Solutions Engineer
ArcGIS Pro Q&A Session NWGIS Conference, October 11, 2017 With John Sharrard, Esri GIS Solutions Engineer jsharrard@esri.com ArcGIS Desktop The applications ArcGIS Pro ArcMap ArcCatalog ArcScene ArcGlobe
More informationArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D
ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D ArcGIS Earth is ArcGIS Earth is a lightweight globe desktop application that helps you explore any part of the world and investigate
More informationGeographical Databases: PostGIS. Introduction. Creating a new database. References
Geographical Databases: PostGIS Introduction PostGIS is an extension of PostgresSQL for storing and analyzing spatial data. It defines data types and operations to process (mostly) vector data. It has
More informationSteelSmart System Cold Formed Steel Design Software Download & Installation Instructions
Step 1 - Login or Create an Account at the ASI Portal: Login: https://portal.appliedscienceint.com/account/login Create Account: https://portal.appliedscienceint.com/account/register 2 0 1 7 A p p l i
More informationEvaluating Physical, Chemical, and Biological Impacts from the Savannah Harbor Expansion Project Cooperative Agreement Number W912HZ
Evaluating Physical, Chemical, and Biological Impacts from the Savannah Harbor Expansion Project Cooperative Agreement Number W912HZ-13-2-0013 Annual Report FY 2018 Submitted by Sergio Bernardes and Marguerite
More informationMapOSMatic: city maps for the masses
MapOSMatic: city maps for the masses Thomas Petazzoni Libre Software Meeting July 9th, 2010 Outline 1 The story 2 MapOSMatic 3 Behind the web page 4 Pain points 5 Future work 6 Conclusion Thomas Petazzoni
More informationConverting workflows from ArcSDE Command line in ArcGIS 10.3.x
Best Practices for Converting workflows from ArcSDE Command line in ArcGIS 10.3.x Melissa Jarman & George Thompson Esri Support Services Summary of Session History Going forward New tools Why migrate?
More informationThe File Geodatabase API. Craig Gillgrass Lance Shipman
The File Geodatabase API Craig Gillgrass Lance Shipman Schedule Cell phones and pagers Please complete the session survey we take your feedback very seriously! Overview File Geodatabase API - Introduction
More informationGeodatabase Essentials Part One - Intro to the Geodatabase. Jonathan Murphy Colin Zwicker
Geodatabase Essentials Part One - Intro to the Geodatabase Jonathan Murphy Colin Zwicker Session Path The Geodatabase - What is it? - Why use it? - What types are there? Inside the Geodatabase Advanced
More informationGeodatabase Programming with Python John Yaist
Geodatabase Programming with Python John Yaist DevSummit DC February 26, 2016 Washington, DC Target Audience: Assumptions Basic knowledge of Python Basic knowledge of Enterprise Geodatabase and workflows
More informationISU GIS CENTER S ARCSDE USER'S GUIDE AND DATA CATALOG
ISU GIS CENTER S ARCSDE USER'S GUIDE AND DATA CATALOG 2 TABLE OF CONTENTS 1) INTRODUCTION TO ARCSDE............. 3 2) CONNECTING TO ARCSDE.............. 5 3) ARCSDE LAYERS...................... 9 4) LAYER
More informationFoundations of Computation
The Australian National University Semester 2, 2018 Research School of Computer Science Tutorial 1 Dirk Pattinson Foundations of Computation The tutorial contains a number of exercises designed for the
More informationBusiness DIY:Building Enterprise Infrastructure on Linux Part 1. Session L975. David Boyes Sine Nomine Associates
Business DIY:Building Enterprise Infrastructure on Linux Part 1 Session L975 David Boyes Sine Nomine Associates Handouts Handouts for this session are not on the CD but are available for download from:
More informationArcGIS Enterprise: What s New. Philip Heede Shannon Kalisky Melanie Summers Shreyas Shinde
ArcGIS Enterprise: What s New Philip Heede Shannon Kalisky Melanie Summers Shreyas Shinde ArcGIS Enterprise is the new name for ArcGIS for Server ArcGIS Enterprise Software Components ArcGIS Server Portal
More informationON SITE SYSTEMS Chemical Safety Assistant
ON SITE SYSTEMS Chemical Safety Assistant CS ASSISTANT WEB USERS MANUAL On Site Systems 23 N. Gore Ave. Suite 200 St. Louis, MO 63119 Phone 314-963-9934 Fax 314-963-9281 Table of Contents INTRODUCTION
More informationUsing the EartH2Observe data portal to analyse drought indicators. Lesson 4: Using Python Notebook to access and process data
Using the EartH2Observe data portal to analyse drought indicators Lesson 4: Using Python Notebook to access and process data Preface In this fourth lesson you will again work with the Water Cycle Integrator
More informationGeodatabase An Introduction
2013 Esri International User Conference July 8 12, 2013 San Diego, California Technical Workshop Geodatabase An Introduction David Crawford and Jonathan Murphy Session Path The Geodatabase What is it?
More informationTroubleshooting Replication and Geodata Services. Liz Parrish & Ben Lin
Troubleshooting Replication and Geodata Services Liz Parrish & Ben Lin AGENDA: Troubleshooting Replication and Geodata Services Overview Demo Troubleshooting Q & A Overview of Replication Liz Parrish What
More informationYYT-C3002 Application Programming in Engineering GIS I. Anas Altartouri Otaniemi
YYT-C3002 Application Programming in Engineering GIS I Otaniemi Overview: GIS lectures & exercise We will deal with GIS application development in two lectures. Because of the versatility of GIS data models
More informationGeodatabase Programming with Python
DevSummit DC February 11, 2015 Washington, DC Geodatabase Programming with Python Craig Gillgrass Assumptions Basic knowledge of python Basic knowledge enterprise geodatabases and workflows Please turn
More informationFlight Utilities Metar Reader version 3.1 by Umberto Degli Esposti
Flight Utilities http://www.flightutilities.com Metar Reader version 3.1 by Umberto Degli Esposti 1 Description The program allows inserting a Metar, to load it from a disk or from internet and to show
More informationCLX000 Technical Manual (v5.7x)
CLX000 Technical Manual (v5.7x) CSS Electronics (Updated 2018-04-24) Figure 1: CL1000, CL2000 & CL3000 Updated: 2018-04-24 Contents 1 About This Document 1 2 Introduction 2 3 Technical Specification 2
More informationUSER S MANUAL 1D Seismic Site Response Analysis Example University of California: San Diego August 30, 2017
USER S MANUAL 1D Seismic Site Response Analysis Example http://www.soilquake.net/ucsdsoilmodels/ University of California: San Diego August 30, 2017 Table of Contents USER'S MANUAL TABLE OF CONTENTS Page
More informationLab Manual for ICEN 553/453 Cyber-Physical Systems Fall 2018
Lab Manual for ICEN 553/453 Cyber-Physical Systems Fall 2018 Prof. Dola Saha Assistant Professor Department of Electrical & Computer Engineering University at Albany, SUNY Chapter 1 Setup Headless Raspberry
More informationTroubleshooting Replication and Geodata Service Issues
Troubleshooting Replication and Geodata Service Issues Ken Galliher & Ben Lin Esri UC 2014 Demo Theater Tech Session Overview What is Geodatabase Replication Replication types Geodata service replication
More informationECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University
ECEN 449: Microprocessor System Design Department of Electrical and Computer Engineering Texas A&M University Prof. Sunil P. Khatri Lab exercise created and tested by: Abbas Fairouz, Ramu Endluri, He Zhou,
More informationThe conceptual view. by Gerrit Muller University of Southeast Norway-NISE
by Gerrit Muller University of Southeast Norway-NISE e-mail: gaudisite@gmail.com www.gaudisite.nl Abstract The purpose of the conceptual view is described. A number of methods or models is given to use
More informationAppendix 4 Weather. Weather Providers
Appendix 4 Weather Using weather data in your automation solution can have many benefits. Without weather data, your home automation happens regardless of environmental conditions. Some things you can
More informationEnabling Web GIS. Dal Hunter Jeff Shaner
Enabling Web GIS Dal Hunter Jeff Shaner Enabling Web GIS In Your Infrastructure Agenda Quick Overview Web GIS Deployment Server GIS Deployment Security and Identity Management Web GIS Operations Web GIS
More informationUser-Materials in ANSYS
User-Materials in ANSYS Holzapfel-Model l lfor Soft Tissues Prof. Dr.-Ing A. Fritsch Possibilities of user programming ANSYS User Programmable Features (UPF) are capabilities you can use to write your
More information/home/thierry/columbia/msongsdb/tutorials/tutorial4/tutorial4.py January 25,
/home/thierry/columbia/msongsdb/tutorials/tutorial4/tutorial4.py January 25, 2011 1 26 """ 27 Thierry Bertin - Mahieux ( 2010) Columbia University 28 tb2332@ columbia. edu 29 30 This code demo the use
More informationLeveraging ArcGIS Online Elevation and Hydrology Services. Steve Kopp, Jian Lange
Leveraging ArcGIS Online Elevation and Hydrology Services Steve Kopp, Jian Lange Topics An overview of ArcGIS Online Elevation Analysis Using Elevation Analysis Services in ArcGIS for Desktop Using Elevation
More informationScripting Languages Fast development, extensible programs
Scripting Languages Fast development, extensible programs Devert Alexandre School of Software Engineering of USTC November 30, 2012 Slide 1/60 Table of Contents 1 Introduction 2 Dynamic languages A Python
More informationGIS Software. Evolution of GIS Software
GIS Software The geoprocessing engines of GIS Major functions Collect, store, mange, query, analyze and present Key terms Program collections of instructions to manipulate data Package integrated collection
More informationDiscrete-event simulations
Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;
More informationIntroduction to ArcGIS Server Development
Introduction to ArcGIS Server Development Kevin Deege,, Rob Burke, Kelly Hutchins, and Sathya Prasad ESRI Developer Summit 2008 1 Schedule Introduction to ArcGIS Server Rob and Kevin Questions Break 2:15
More informationExtending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing
Extending MISP with Python modules MISP - Malware Information Sharing Platform & Threat Sharing Alexandre Dulaunoy Andras Iklody TLP:WHITE June 16, 2016 Why we want to go more modular... Ways to extend
More informationInnovation. The Push and Pull at ESRI. September Kevin Daugherty Cadastral/Land Records Industry Solutions Manager
Innovation The Push and Pull at ESRI September 2004 Kevin Daugherty Cadastral/Land Records Industry Solutions Manager The Push and The Pull The Push is the information technology that drives research and
More informationMotors Automation Energy Transmission & Distribution Coatings. Servo Drive SCA06 V1.5X. Addendum to the Programming Manual SCA06 V1.
Motors Automation Energy Transmission & Distribution Coatings Servo Drive SCA06 V1.5X SCA06 V1.4X Series: SCA06 Language: English Document Number: 10003604017 / 01 Software Version: V1.5X Publication Date:
More informationUSER S MANUAL. 1D Seismic Site Response Analysis Example. University of California: San Diego.
USER S MANUAL 1D Seismic Site Response Analysis Example http://www.soilquake.net/ucsdsoilmodels/ University of California: San Diego August 2, 2017 Table of Contents USER'S MANUAL TABLE OF CONTENTS Page
More informationAPBS electrostatics in VMD - Software. APBS! >!Examples! >!Visualization! >! Contents
Software Search this site Home Announcements An update on mailing lists APBS 1.2.0 released APBS 1.2.1 released APBS 1.3 released New APBS 1.3 Windows Installer PDB2PQR 1.7.1 released PDB2PQR 1.8 released
More informationT R A I N I N G M A N U A L 1. 9 G H Z C D M A P C S 80 0 M H Z C D M A /A M P S ( T R I - M O D E ) PM325
T R A I N I N G M A N U A L 1. 9 G H Z C D M A P C S 80 0 M H Z C D M A /A M P S ( T R I - M O D E ) PM325 Slide. Click. Send the pic O P E R AT I N G I N S T RU C T I O N S H e a d s e t Ja c k S e l
More informationARGUS.net IS THREE SOLUTIONS IN ONE
OVERVIEW H i g h l y c o n f i g u r a b l e s o f t w a r e a c c o m m o d a t e s a w i d e r a n g e o f c o l l e c t i o n s T h r e e s o l u t i o n s c o v e r P o r t a l s, C o l l e c t i o
More informationSDS developer guide. Develop distributed and parallel applications in Java. Nathanaël Cottin. version
SDS developer guide Develop distributed and parallel applications in Java Nathanaël Cottin sds@ncottin.net http://sds.ncottin.net version 0.0.3 Copyright 2007 - Nathanaël Cottin Permission is granted to
More informationArboretum Explorer: Using GIS to map the Arnold Arboretum
Arboretum Explorer: Using GIS to map the Arnold Arboretum Donna Tremonte, Arnold Arboretum of Harvard University 2015 Esri User Conference (UC), July 22, 2015 http://arboretum.harvard.edu/explorer Mission
More informationE23: Hotel Management System Wen Yunlu Hu Xing Chen Ke Tang Haoyuan Module: EEE 101
E23: Hotel Management System Author: 1302509 Zhao Ruimin 1301478 Wen Yunlu 1302575 Hu Xing 1301911 Chen Ke 1302599 Tang Haoyuan Module: EEE 101 Lecturer: Date: Dr.Lin December/22/2014 Contents Contents
More informationArup Nanda Starwood Hotels
Arup Nanda Starwood Hotels Why Analyze The Database is Slow! Storage, CPU, memory, runqueues all affect the performance Know what specifically is causing them to be slow To build a profile of the application
More informationLesser Sunda - Banda Seascape Atlas
Lesser Sunda - Banda Seascape Atlas Report prepared for the development of online interactive map for Lesser Sunda Banda Seascape by WorldFish December 2014 http://sbsatlas.reefbase.org Page 1 of 8 Table
More informationISSP User Guide CY3207ISSP. Revision C
CY3207ISSP ISSP User Guide Revision C Cypress Semiconductor 198 Champion Court San Jose, CA 95134-1709 Phone (USA): 800.858.1810 Phone (Intnl): 408.943.2600 http://www.cypress.com Copyrights Copyrights
More informationECEN 651: Microprogrammed Control of Digital Systems Department of Electrical and Computer Engineering Texas A&M University
ECEN 651: Microprogrammed Control of Digital Systems Department of Electrical and Computer Engineering Texas A&M University Prof. Mi Lu TA: Ehsan Rohani Laboratory Exercise #4 MIPS Assembly and Simulation
More informationAMS 132: Discussion Section 2
Prof. David Draper Department of Applied Mathematics and Statistics University of California, Santa Cruz AMS 132: Discussion Section 2 All computer operations in this course will be described for the Windows
More informationM E R C E R W I N WA L K T H R O U G H
H E A L T H W E A L T H C A R E E R WA L K T H R O U G H C L I E N T S O L U T I O N S T E A M T A B L E O F C O N T E N T 1. Login to the Tool 2 2. Published reports... 7 3. Select Results Criteria...
More informationBuilding Inflation Tables and CER Libraries
Building Inflation Tables and CER Libraries January 2007 Presented by James K. Johnson Tecolote Research, Inc. Copyright Tecolote Research, Inc. September 2006 Abstract Building Inflation Tables and CER
More informationQuick Start Guide New Mountain Visit our Website to Register Your Copy (weatherview32.com)
Quick Start Guide New Mountain Visit our Website to Register Your Copy (weatherview32.com) Page 1 For the best results follow all of the instructions on the following pages to quickly access real-time
More information