12,467 research outputs found

    Predictive biometrics: A review and analysis of predicting personal characteristics from biometric data

    Get PDF
    Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to study the utilisation of more general information regarding a system user, which is not necessarily unique. There are increasing indications that this type of data will have great value in providing complementary information for user authentication. However, the authors have also seen a growing interest in broadening the predictive capabilities of biometric data, encompassing both easily definable characteristics such as subject age and, most recently, `higher level' characteristics such as emotional or mental states. This study will present a selective review of the predictive capabilities, in the widest sense, of biometric data processing, providing an analysis of the key issues still adequately to be addressed if this concept of predictive biometrics is to be fully exploited in the future

    Improving BitTorrent's Peer Selection For Multimedia Content On-Demand Delivery

    Get PDF
    The great efficiency achieved by the BitTorrent protocol for the distribution of large amounts of data inspired its adoption to provide multimedia content on-demand delivery over the Internet. As it is not designed for this purpose, some adjustments have been proposed in order to meet the related QoS requirements like low startup delay and smooth playback continuity. Accordingly, this paper introduces a BitTorrent-like proposal named as Quota-Based Peer Selection (QBPS). This proposal is mainly based on the adaptation of the original peer-selection policy of the BitTorrent protocol. Its validation is achieved by means of simulations and competitive analysis. The final results show that QBPS outperforms other recent proposals of the literature. For instance, it achieves a throughput optimization of up to 48.0% in low-provision capacity scenarios where users are very interactive.Comment: International Journal of Computer Networks & Communications(IJCNC) Vol.7, No.6, November 201

    Monthly and Diurnal Variability of Rain Rate and Rain Attenuation during the Monsoon Period in Malaysia

    Get PDF
    Rain is the major source of attenuation for microwave propagation above 10 GHz. In tropical and equatorial regions where the rain intensity is higher, designing a terrestrial and earth-to-satellite microwave links is very critical and challenging at these frequencies. This paper presents the preliminary results of rain effects in a 23 GHz terrestrial point-to-point communication link 1.3km long. The experimental test bed had been set up at Skudai, Johor Bahru, Malaysia. In this area, a monsoon equatorial climate prevails and the rainfall rate can reach values well above 100mm/h with significant monthly and diurnal variability. Hence, it is necessary to implement a mitigation technique for maintaining an adequate radio link performance for the action of very heavy rain. Since we now know that the ULPC (Up Link Power Control) cannot guarantee the desired performance, a solution based on frequency band diversity is proposed in this paper. Here, a secondary radio link operating in a frequency not affected by rain (C band for instance) is placed parallel with the main link. Under no rain or light rain conditions, the secondary link carries without priority radio signals. When there is an outage of the main link due to rain, the secondary link assumes the priority traffic. The outcome of the research shows a solution for higher operating frequencies during rainy events

    Evaluating Third-Party Bad Neighborhood Blacklists for Spam Detection

    Get PDF
    The distribution of malicious hosts over the IP address space is far from being uniform. In fact, malicious hosts tend to be concentrate in certain portions of the IP address space, forming the so-called Bad Neighborhoods. This phenomenon has been previously exploited to filter Spam by means of Bad Neighborhood blacklists. In this paper, we evaluate how much a network administrator can rely upon different Bad Neighborhood blacklists generated by third-party sources to fight Spam. One could expect that Bad Neighborhood blacklists generated from different sources contain, to a varying degree, disjoint sets of entries. Therefore, we investigate (i) how specific a blacklist is to its source, and (ii) whether different blacklists can be interchangeably used to protect a target from Spam. We analyze five Bad Neighborhood blacklists generated from real-world measurements and study their effectiveness in protecting three production mail servers from Spam. Our findings lead to several operational considerations on how a network administrator could best benefit from Bad Neighborhood-based Spam filtering

    IFAC bilten

    Get PDF
    corecore