12,467 research outputs found
Recommended from our members
Ethics and Design in the Brazilian Context
Often driven by practical and immediate requirements, more and more people are incorporating technology into a variety of aspects of their lives, often without reflecting on the consequences of using them. On the other hand, studies on interactive system development that lead to behavioral change have been gaining ground on the agenda of large HCI conferences. This movement brings to the forefront the fundamental issues of ethics in design and technology use. A designer’s intentions, when directing certain actions or behaviors, are not always explicit or desired by the stakeholders affected by the use of the technology. Systems that induce an undesired purchase, or even those that use conditioning strategies to cause a behavioral change are examples of such intentions. The challenge proposed is therefore about the relationship between design and personal freedom in a way that these technology users do not become victims, either passively or submissively, of the effects of its use. This advance allows for the redefinition of the relationship between man and technology, and the application of new forms of designing and developing interactive systems that take into account the ethical aspects of this relationship
Predictive biometrics: A review and analysis of predicting personal characteristics from biometric data
Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to study the utilisation of more general information regarding a system user, which is not necessarily unique. There are increasing indications that this type of data will have great value in providing complementary information for user authentication. However, the authors have also seen a growing interest in broadening the predictive capabilities of biometric data, encompassing both easily definable characteristics such as subject age and, most recently, `higher level' characteristics such as emotional or mental states. This study will present a selective review of the predictive capabilities, in the widest sense, of biometric data processing, providing an analysis of the key issues still adequately to be addressed if this concept of predictive biometrics is to be fully exploited in the future
Improving BitTorrent's Peer Selection For Multimedia Content On-Demand Delivery
The great efficiency achieved by the BitTorrent protocol for the distribution
of large amounts of data inspired its adoption to provide multimedia content
on-demand delivery over the Internet. As it is not designed for this purpose,
some adjustments have been proposed in order to meet the related QoS
requirements like low startup delay and smooth playback continuity.
Accordingly, this paper introduces a BitTorrent-like proposal named as
Quota-Based Peer Selection (QBPS). This proposal is mainly based on the
adaptation of the original peer-selection policy of the BitTorrent protocol.
Its validation is achieved by means of simulations and competitive analysis.
The final results show that QBPS outperforms other recent proposals of the
literature. For instance, it achieves a throughput optimization of up to 48.0%
in low-provision capacity scenarios where users are very interactive.Comment: International Journal of Computer Networks & Communications(IJCNC)
Vol.7, No.6, November 201
Monthly and Diurnal Variability of Rain Rate and Rain Attenuation during the Monsoon Period in Malaysia
Rain is the major source of attenuation for microwave propagation above 10 GHz. In tropical and equatorial regions where the rain intensity is higher, designing a terrestrial and earth-to-satellite microwave links is very critical and challenging at these frequencies. This paper presents the preliminary results of rain effects in a 23 GHz terrestrial point-to-point communication link 1.3km long. The experimental test bed had been set up at Skudai, Johor Bahru, Malaysia. In this area, a monsoon equatorial climate prevails and the rainfall rate can reach values well above 100mm/h with significant monthly and diurnal variability. Hence, it is necessary to implement a mitigation technique for maintaining an adequate radio link performance for the action of very heavy rain. Since we now know that the ULPC (Up Link Power Control) cannot guarantee the desired performance, a solution based on frequency band diversity is proposed in this paper. Here, a secondary radio link operating in a frequency not affected by rain (C band for instance) is placed parallel with the main link. Under no rain or light rain conditions, the secondary link carries without priority radio signals. When there is an outage of the main link due to rain, the secondary link assumes the priority traffic. The outcome of the research shows a solution for higher operating frequencies during rainy events
Evaluating Third-Party Bad Neighborhood Blacklists for Spam Detection
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, malicious hosts tend to be concentrate in certain portions of the IP address space, forming the so-called Bad Neighborhoods. This phenomenon has been previously exploited to filter Spam by means of Bad Neighborhood blacklists. In this paper, we evaluate how much a network administrator can rely upon different Bad Neighborhood blacklists generated by third-party sources to fight Spam. One could expect that Bad Neighborhood blacklists generated from different sources contain, to a varying degree, disjoint sets of entries. Therefore, we investigate (i) how specific a blacklist is to its source, and (ii) whether different blacklists can be interchangeably used to protect a target from Spam. We analyze five Bad Neighborhood blacklists generated from real-world measurements and study their effectiveness in protecting three production mail servers from Spam. Our findings lead to several operational considerations on how a network administrator could best benefit from Bad Neighborhood-based Spam filtering
- …