Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Jakub Safarik"'
Publikováno v:
IEEE Access, Vol 10, Pp 133412-133426 (2022)
Recent trends show a growing interest in VoIP services and indicate that guaranteeing security in VoIP services and preventing hacker communities from attacking telecommunication solutions is a challenging task. Spam over Internet Telephony (SPIT) is
Externí odkaz:
https://doaj.org/article/d1a2df42f17c4d5da9906fbfce60b82e
Autor:
Jakub Safarik, Vaclav Snasel
Publikováno v:
Applied Sciences, Vol 13, Iss 2, p 734 (2023)
Parallel implementations of algorithms are usually compared with single-core CPU performance. The advantage of multicore vector processors decreases the performance gap between GPU and CPU computation, as shown in many recent pieces of research. With
Externí odkaz:
https://doaj.org/article/baff654ac51d4a72bf807eadf50060d3
Publikováno v:
Advances in Electrical and Electronic Engineering, Vol 16, Iss 1, Pp 118-124 (2018)
This paper describes different approaches for the face authentication from the features and classification abilities point of view. Authors compare two types of features - Histogram of Oriented Gradients (HOG) and Local Binary Patterns (LBP) includin
Externí odkaz:
https://doaj.org/article/7a10416407474790a025cc7d22dd6eed
Publikováno v:
Communications, Vol 15, Iss 2A, Pp 191-196 (2013)
The paper aims at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, we prepared a set of honeypots monitoring various aspects of VoIP infrastructure including SIP endpoint and SSH terminal emu
Externí odkaz:
https://doaj.org/article/0644e4cbbb334a9188f67b4b1d9a3036
Publikováno v:
Communications, Vol 15, Iss 2A, Pp 180-184 (2013)
This article deals with embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article con
Externí odkaz:
https://doaj.org/article/d54716c27072454cbbcf0ad788fdbcbf
Publikováno v:
Advances in Electrical and Electronic Engineering, Vol 11, Iss 6, Pp 481-486 (2013)
This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typi
Externí odkaz:
https://doaj.org/article/31ba83047d224061b7ad0bed0a29685b
Publikováno v:
Advances in Electrical and Electronic Engineering, Vol 11, Iss 5, Pp 380-386 (2013)
This article discusses a methodology for rating the quality of mobile calls. Majority telecommunications service from the perspective of the whole world is using mobile telephony networks. One of the problems affecting this service and its quality ar
Externí odkaz:
https://doaj.org/article/0cafed60ca674623bd963d827232e7f9
Publikováno v:
Advances in Electrical and Electronic Engineering, Vol 10, Iss 4, Pp 282-285 (2012)
This article deals with both theoretical and practical application of Extensible Messaging and Presence Protocol instead of different solution described detailed in the article. It uses periodically HTTP method POST to gain information about a state,
Externí odkaz:
https://doaj.org/article/99eedb778e5742afaef9630e1898cfaa
Autor:
Filip Rezac, Filip Kolenovsky, Martin Mikulec, Miroslav Voznak, Jan Rozhon, Jiri Vychodil, Karel Tomala, Jakub Safarik
Publikováno v:
Advances in Electrical and Electronic Engineering, Vol 10, Iss 4, Pp 286-290 (2012)
The paper deals with development of a web application allowing to deliver pre-recorded voice messages by using SIP generator. The developed application is a part of complex system, which has been evolved in Dpt. of Telecommunications, Technical Unive
Externí odkaz:
https://doaj.org/article/ea9e761d059a47158e81d3e37a22fdf8
Publikováno v:
Advances in Electrical and Electronic Engineering, Vol 16, Iss 1, Pp 118-124 (2018)
This paper describes different approaches for the face authentication from the features and classification abilities point of view. Authors compare two types of features - Histogram of Oriented Gradients (HOG) and Local Binary Patterns (LBP) includin