University of Surrey

Displaying 1-32 of 32 results

  • White Papers // Jan 2012

    A Scalable Real-Time Monitoring System for Supporting Traffic Engineering

    Quality of service based value-added services in IP networks necessitate the use of traffic engineering. The latter relies typically on monitoring data for both offline, proactive and dynamic, reactive solutions. A monitoring system should be scalable in terms of network size, speed and number of customers subscribed to value-added services....

    Provided By University of Surrey

  • White Papers // Dec 2011

    An Adaptive Peer Selection Scheme With Dynamic Network Condition Awareness

    Locality-based peer selection paradigms have been proposed recently based on cooperation between Peer-To-Peer (P2P) service providers, Internet Service Providers (ISPs) and end users in order to achieve efficient resource utilization by P2P traffic. Based on this cooperation between different stakeholders, the authors introduce a more advanced paradigm with adaptive peer...

    Provided By University of Surrey

  • White Papers // Dec 2011

    An Empirical Study on the Interactions Between ALTO-Assisted P2P Overlays and ISP Networks

    The recently proposed Application Layer Traffic Optimization (ALTO) framework has opened up a new dimension for Internet traffic management that is complementary to the traditional Application-Agnostic Traffic Engineering (AATE) solutions currently employed by ISPs. In this paper, the authors investigate how ALTO-assisted Peer-To-Peer (P2P) traffic management functions interact with the...

    Provided By University of Surrey

  • White Papers // Dec 2011

    A Dynamic Peer-to-Peer Traffic Limiting Policy for ISP Networks

    As a scalable paradigm for content distribution at Internet-wide scale, Peer-To-Peer (P2P) technologies have enabled a variety of networked services, such as distributed file-sharing and live video streaming. Most existing P2P systems employ non-intelligent peer selection algorithms for content swarming which greedily consume Internet bandwidth resources. As a result, Internet...

    Provided By University of Surrey

  • White Papers // Dec 2011

    A Generalized Intrusion Detection & Prevention Mechanism for Securing MANETs

    Most of the research in securing Mobile Ad hoc NETworks (MANETs) has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole and rushing attacks. In this paper, the authors broaden their previously develop algorithm AIDP and propose a generalized...

    Provided By University of Surrey

  • White Papers // Dec 2011

    Adaptive Intrusion Detection & Prevention of Denial of Service Attacks in MANETs

    Mobile Ad-hoc NETworks (MANETs) are well known to be vulnerable to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In this paper, the authors focus on preventing Denial-of-Service (DoS) attacks. As an example, they consider intruders that can...

    Provided By University of Surrey

  • White Papers // Dec 2011

    Protection of MANETs From a Range of Attacks Using an Intrusion Detection & Prevention System

    Mobile Ad hoc NETworks (MANETs) are well-known to be vulnerable to various attacks due to their lack of centralized control, and their dynamic topology and energy-constrained operation. Much research in securing MANETs has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black...

    Provided By University of Surrey

  • White Papers // Oct 2011

    Heterogeneous Information Fusion: A Novel Fusion Paradigm for Biometric Systems

    One of the most promising ways to improve biometric person recognition is indisputably via information fusion that is, to combine different sources of information. This paper proposes a novel fusion paradigm that combines heterogeneous sources of information such as user-specific, cohort and quality information. Two formulations of this problem are...

    Provided By University of Surrey

  • White Papers // Oct 2011

    Wavelet and Optimal Requantization Methodology for Lossy Fingerprint Compression

    Re-quantization is a key technology for reducing the bit rate of compressed data. This reduction of the bit rate; and in certain cases may result in signal quality degradation. Therefore, the proposed techniques used 9/7 wavelet transform before optimal re-quantization and finally, the output stream of coding symbols is entropy...

    Provided By University of Surrey

  • White Papers // May 2011

    Identification Of Monetary Policy In SVAR Models: A Data-oriented Perspective

    This paper applies graphical modeling theory to recover identifying restrictions for the analysis of monetary policy shocks in a VAR of the US economy. Results are in line with the view that only high-frequency data should be assumed to be in the information set of the monetary authority when the...

    Provided By University of Surrey

  • White Papers // Apr 2011

    A Unified Framework for Biometric Expert Fusion Incorporating Quality Measures

    This paper proposes a unified framework for quality-based fusion of multimodal biometrics. Quality-dependent fusion algorithms aim to dynamically combine several classifier (biometric expert) outputs as a function of automatically derived (biometric) sample quality. Quality measures used for this purpose quantify the degree of conformance of biometric samples to some predefined...

    Provided By University of Surrey

  • White Papers // Feb 2011

    Average Energy Efficiency Contours for Single Carrier AWGN MAC

    Energy efficiency has become increasingly important in wireless communications, with significant environmental and financial benefits. This paper studies the achievable capacity region of a single carrier uplink channel consisting of two transmitters and a single receiver, and uses average energy efficiency contours to find the optimal rate pair based on...

    Provided By University of Surrey

  • White Papers // Oct 2010

    R&D Subsidies, Spillovers And Privatization In Mixed Markets

    The authors examine the use of subsidies to R&D in a mixed and a private duopoly market. They show that the socially optimal R&D subsidy is increasing in the degree of spillovers but it is lower in the private duopoly. The optimal R&D subsidy leads to an increase in total...

    Provided By University of Surrey

  • White Papers // Aug 2010

    An Evaluation of Video-to-Video Face Verification

    Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedded with a camera, it is now possible to realize facial video recognition, rather than resorting to just still images. In fact, facial video...

    Provided By University of Surrey

  • White Papers // Jul 2010

    Monetary Policy In An Uncertain World: Probability Models And The Design Of Robust Monetary Rules

    The past forty years or so has seen a remarkable transformation in macro-models used by central banks, policymakers and forecasting bodies. This paper describes this transformation from reduced-form behavioral equations estimated separately, through to contemporary micro-founded Dynamic Stochastic General Equilibrium (DSGE) models estimated by systems methods. In particular by treating...

    Provided By University of Surrey

  • White Papers // Jun 2010

    Migration, Skill Composition And Growth

    The UK, with its relatively liberal immigration policies following recent enlargements, has been one of the main recipients of migrants from new EU member states. This paper poses the questions: what is the effect of immigration on a receiving economy such as the UK? Is the effect beneficial or adverse...

    Provided By University of Surrey

  • White Papers // May 2010

    A Context Awareness Architecture for Energy Efficient Cognitive Radio

    Energy efficiency is a critical issue for future wireless communication. The European FP7 C2POWER project is to research, develop and demonstrate energy saving technologies for multi-standard wireless mobile devices, exploiting the combination of Cognitive Radio and cooperative strategies. The basic objective is to establish an energy optimization framework founded upon...

    Provided By University of Surrey

  • White Papers // Apr 2010

    Handling High Dimensionality in Biometric Classification With Multiple Quality Measures Using Locality Preserving Projection

    The use of quality measures in biometrics is rapidly becoming the standard strategy for improving performance of biometric systems, especially in the presence of variable environmental conditions of signal capture. It is often necessary to integrate multiple quality measures into the classification process in order to capture the relevant aspects...

    Provided By University of Surrey

  • White Papers // Apr 2010

    Group-Specific Score Normalization for Biometric Systems

    The problem of biometric menagerie, first pointed out by Doddington et al. (1998), is one that plagues all biometric systems. They observe that only a handful of clients (enrolled users in the gallery) actually contribute disproportionately to recognition errors. While prior literature attempting to reduce this effect focuses on either...

    Provided By University of Surrey

  • White Papers // Apr 2010

    Link Weight Optimization for Enhancing IP Resilience Using Multi-Plane Routing

    With the increasing importance of the Internet for delivering personal and business applications, the slow re-convergence after network failure of existing routing protocols becomes a significant problem. This is especially true for real time multimedia services where service disruption cannot be generally tolerated. In order to ensure fast network failure...

    Provided By University of Surrey

  • White Papers // Apr 2010

    Delay-Based Quality of Service Through Intra-Domain Differentiated Routing With Optimised Link Weight Setting

    The wide range of applications that are supported on the Internet requires it to deliver a diverse set of classes of service. For example, network providers need to support both delay-sensitive multimedia services and less time-sensitive applications such as web browsing and peer-to-peer transfers. Differentiated routing is one approach to...

    Provided By University of Surrey

  • White Papers // Feb 2010

    Addressing Missing Values in Kernel-Based Multimodal Biometric Fusion Using Neutral Point Substitution

    In multimodal biometric information fusion, it is common to encounter missing modalities in which matching cannot be performed. As a result, at the match score level, this implies that scores will be missing. The authors address the multimodal fusion problem involving missing modalities (scores) using support vector machines with the...

    Provided By University of Surrey

  • White Papers // Jan 2010

    Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions

    The performance of biometric systems can be significantly affected by changes in signal quality. In this paper, two types of changes are considered: change in acquisition environment and in sensing devices. The authors investigated three solutions: model-level adaptation, score-level adaptation (normalization), and the combination of the two, called "Compound" adaptation....

    Provided By University of Surrey

  • White Papers // Jan 2010

    On the Interactions Between Non-Cooperative P2P Overlay and Traffic Engineering Behaviors

    Emerging Peer-To-Peer (P2P) technologies have enabled various types of content to be efficiently distributed over the Internet. In order to achieve optimized user quality of experience, most P2P systems adopt selfish peer selection schemes in the application layer. On the network side, Traffic Engineering (TE) is deployed by ISPs in...

    Provided By University of Surrey

  • White Papers // Jan 2010

    Performance of VoIP Call Set-Up Over Satellite-UMTS Using Session Initiation Protocol

    Session Initiation Protocol (SIP) is an application layer signalling protocol used in the IP-based Universal Mobile Telecommunication Systems (UMTS) network for establishing multimedia sessions. With a satellite component identified to play an integral role in UMTS, there is a need also to support SIP-based session establishment over Satellite-UMTS (S-UMTS) to...

    Provided By University of Surrey

  • White Papers // Nov 2009

    SENSEI Traffic Modelling

    SENSEI project is an Integrated Project in the EU's Seventh Framework Programme, in the ICT (Information and Communication Technologies) programme. The aim of the research done in SENSEI project is Integrating the Physical with the Digital World of the Network of the Future. In this paper the authors present SENSEI...

    Provided By University of Surrey

  • White Papers // Nov 2009

    Towards Job-Specific Service Level Agreements in the Cloud

    To attract more users to commercially available computing, services have to specify clearly the charges, duties, liabilities and penalties in Service Level Agreements (SLAs). This paper builds on the existing work in SLAs by making easy measurements for a specific application run within a commercial Cloud. An outcome of this...

    Provided By University of Surrey

  • White Papers // Nov 2009

    A Multimodal Biometric Test Bed for Quality-Dependent, Cost-Sensitive and Client-Specific Score-Level Fusion Algorithms

    This paper presents a test bed, called the Bio-secure DS2 score-and-quality database, for evaluating, comparing and benchmarking score-level fusion algorithms for multimodal biometric authentication. It is designed to benchmark quality-dependent, client-specific, cost-sensitive fusion algorithms. A quality-dependent fusion algorithm is one which attempts to devise a fusion strategy that is dependent...

    Provided By University of Surrey

  • White Papers // Oct 2009

    Community Cloud Computing

    Cloud Computing is rising fast, with its datacentres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. The response is an alternative model for...

    Provided By University of Surrey

  • White Papers // Aug 2009

    Fast Network Failure Recovery Using Multiple BGP Routing Planes

    The authors present an efficient multi-plane based fast network failure recovery scheme which can be realized using the recently proposed multi-path enabled BGP platforms. They mainly focus on the recovery scheme that takes into account BGP routing disruption avoidance at network boundaries, which can be caused by intra-AS failures due...

    Provided By University of Surrey

  • White Papers // Jun 2009

    User-Specific Score Normalization and Fusion for Biometric Person Recognition

    Every person is unique. This uniqueness is not only prevalent in his/her biometric traits, but also in the way he/she interacts with a biometric device. A recent trend in tailoring a biometric system to each user (client) is by normalizing the match score for each claimed identity. This technique is...

    Provided By University of Surrey

  • White Papers // Jun 2009

    On Error-Correcting Fingerprinting Codes for Use With Watermarking

    Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal copy appears, it can be traced back to the guilty user. By using collusion-secure codes, the fingerprinting system is made secure against cut-and-paste attacks....

    Provided By University of Surrey

  • White Papers // Jul 2010

    Monetary Policy In An Uncertain World: Probability Models And The Design Of Robust Monetary Rules

    The past forty years or so has seen a remarkable transformation in macro-models used by central banks, policymakers and forecasting bodies. This paper describes this transformation from reduced-form behavioral equations estimated separately, through to contemporary micro-founded Dynamic Stochastic General Equilibrium (DSGE) models estimated by systems methods. In particular by treating...

    Provided By University of Surrey

  • White Papers // Oct 2009

    Community Cloud Computing

    Cloud Computing is rising fast, with its datacentres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. The response is an alternative model for...

    Provided By University of Surrey

  • White Papers // Oct 2010

    R&D Subsidies, Spillovers And Privatization In Mixed Markets

    The authors examine the use of subsidies to R&D in a mixed and a private duopoly market. They show that the socially optimal R&D subsidy is increasing in the degree of spillovers but it is lower in the private duopoly. The optimal R&D subsidy leads to an increase in total...

    Provided By University of Surrey

  • White Papers // Jun 2010

    Migration, Skill Composition And Growth

    The UK, with its relatively liberal immigration policies following recent enlargements, has been one of the main recipients of migrants from new EU member states. This paper poses the questions: what is the effect of immigration on a receiving economy such as the UK? Is the effect beneficial or adverse...

    Provided By University of Surrey

  • White Papers // Nov 2009

    SENSEI Traffic Modelling

    SENSEI project is an Integrated Project in the EU's Seventh Framework Programme, in the ICT (Information and Communication Technologies) programme. The aim of the research done in SENSEI project is Integrating the Physical with the Digital World of the Network of the Future. In this paper the authors present SENSEI...

    Provided By University of Surrey

  • White Papers // Jan 2010

    Performance of VoIP Call Set-Up Over Satellite-UMTS Using Session Initiation Protocol

    Session Initiation Protocol (SIP) is an application layer signalling protocol used in the IP-based Universal Mobile Telecommunication Systems (UMTS) network for establishing multimedia sessions. With a satellite component identified to play an integral role in UMTS, there is a need also to support SIP-based session establishment over Satellite-UMTS (S-UMTS) to...

    Provided By University of Surrey

  • White Papers // Nov 2009

    Towards Job-Specific Service Level Agreements in the Cloud

    To attract more users to commercially available computing, services have to specify clearly the charges, duties, liabilities and penalties in Service Level Agreements (SLAs). This paper builds on the existing work in SLAs by making easy measurements for a specific application run within a commercial Cloud. An outcome of this...

    Provided By University of Surrey

  • White Papers // May 2011

    Identification Of Monetary Policy In SVAR Models: A Data-oriented Perspective

    This paper applies graphical modeling theory to recover identifying restrictions for the analysis of monetary policy shocks in a VAR of the US economy. Results are in line with the view that only high-frequency data should be assumed to be in the information set of the monetary authority when the...

    Provided By University of Surrey

  • White Papers // Dec 2011

    A Generalized Intrusion Detection & Prevention Mechanism for Securing MANETs

    Most of the research in securing Mobile Ad hoc NETworks (MANETs) has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole and rushing attacks. In this paper, the authors broaden their previously develop algorithm AIDP and propose a generalized...

    Provided By University of Surrey

  • White Papers // Aug 2009

    Fast Network Failure Recovery Using Multiple BGP Routing Planes

    The authors present an efficient multi-plane based fast network failure recovery scheme which can be realized using the recently proposed multi-path enabled BGP platforms. They mainly focus on the recovery scheme that takes into account BGP routing disruption avoidance at network boundaries, which can be caused by intra-AS failures due...

    Provided By University of Surrey

  • White Papers // Dec 2011

    Adaptive Intrusion Detection & Prevention of Denial of Service Attacks in MANETs

    Mobile Ad-hoc NETworks (MANETs) are well known to be vulnerable to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In this paper, the authors focus on preventing Denial-of-Service (DoS) attacks. As an example, they consider intruders that can...

    Provided By University of Surrey

  • White Papers // Dec 2011

    An Adaptive Peer Selection Scheme With Dynamic Network Condition Awareness

    Locality-based peer selection paradigms have been proposed recently based on cooperation between Peer-To-Peer (P2P) service providers, Internet Service Providers (ISPs) and end users in order to achieve efficient resource utilization by P2P traffic. Based on this cooperation between different stakeholders, the authors introduce a more advanced paradigm with adaptive peer...

    Provided By University of Surrey

  • White Papers // Dec 2011

    An Empirical Study on the Interactions Between ALTO-Assisted P2P Overlays and ISP Networks

    The recently proposed Application Layer Traffic Optimization (ALTO) framework has opened up a new dimension for Internet traffic management that is complementary to the traditional Application-Agnostic Traffic Engineering (AATE) solutions currently employed by ISPs. In this paper, the authors investigate how ALTO-assisted Peer-To-Peer (P2P) traffic management functions interact with the...

    Provided By University of Surrey

  • White Papers // Apr 2010

    Link Weight Optimization for Enhancing IP Resilience Using Multi-Plane Routing

    With the increasing importance of the Internet for delivering personal and business applications, the slow re-convergence after network failure of existing routing protocols becomes a significant problem. This is especially true for real time multimedia services where service disruption cannot be generally tolerated. In order to ensure fast network failure...

    Provided By University of Surrey

  • White Papers // Jan 2010

    On the Interactions Between Non-Cooperative P2P Overlay and Traffic Engineering Behaviors

    Emerging Peer-To-Peer (P2P) technologies have enabled various types of content to be efficiently distributed over the Internet. In order to achieve optimized user quality of experience, most P2P systems adopt selfish peer selection schemes in the application layer. On the network side, Traffic Engineering (TE) is deployed by ISPs in...

    Provided By University of Surrey

  • White Papers // Feb 2011

    Average Energy Efficiency Contours for Single Carrier AWGN MAC

    Energy efficiency has become increasingly important in wireless communications, with significant environmental and financial benefits. This paper studies the achievable capacity region of a single carrier uplink channel consisting of two transmitters and a single receiver, and uses average energy efficiency contours to find the optimal rate pair based on...

    Provided By University of Surrey

  • White Papers // Apr 2010

    Delay-Based Quality of Service Through Intra-Domain Differentiated Routing With Optimised Link Weight Setting

    The wide range of applications that are supported on the Internet requires it to deliver a diverse set of classes of service. For example, network providers need to support both delay-sensitive multimedia services and less time-sensitive applications such as web browsing and peer-to-peer transfers. Differentiated routing is one approach to...

    Provided By University of Surrey

  • White Papers // Dec 2011

    A Dynamic Peer-to-Peer Traffic Limiting Policy for ISP Networks

    As a scalable paradigm for content distribution at Internet-wide scale, Peer-To-Peer (P2P) technologies have enabled a variety of networked services, such as distributed file-sharing and live video streaming. Most existing P2P systems employ non-intelligent peer selection algorithms for content swarming which greedily consume Internet bandwidth resources. As a result, Internet...

    Provided By University of Surrey

  • White Papers // Dec 2011

    Protection of MANETs From a Range of Attacks Using an Intrusion Detection & Prevention System

    Mobile Ad hoc NETworks (MANETs) are well-known to be vulnerable to various attacks due to their lack of centralized control, and their dynamic topology and energy-constrained operation. Much research in securing MANETs has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black...

    Provided By University of Surrey

  • White Papers // Jun 2009

    On Error-Correcting Fingerprinting Codes for Use With Watermarking

    Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal copy appears, it can be traced back to the guilty user. By using collusion-secure codes, the fingerprinting system is made secure against cut-and-paste attacks....

    Provided By University of Surrey

  • White Papers // Aug 2010

    An Evaluation of Video-to-Video Face Verification

    Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedded with a camera, it is now possible to realize facial video recognition, rather than resorting to just still images. In fact, facial video...

    Provided By University of Surrey

  • White Papers // Feb 2010

    Addressing Missing Values in Kernel-Based Multimodal Biometric Fusion Using Neutral Point Substitution

    In multimodal biometric information fusion, it is common to encounter missing modalities in which matching cannot be performed. As a result, at the match score level, this implies that scores will be missing. The authors address the multimodal fusion problem involving missing modalities (scores) using support vector machines with the...

    Provided By University of Surrey

  • White Papers // Nov 2009

    A Multimodal Biometric Test Bed for Quality-Dependent, Cost-Sensitive and Client-Specific Score-Level Fusion Algorithms

    This paper presents a test bed, called the Bio-secure DS2 score-and-quality database, for evaluating, comparing and benchmarking score-level fusion algorithms for multimodal biometric authentication. It is designed to benchmark quality-dependent, client-specific, cost-sensitive fusion algorithms. A quality-dependent fusion algorithm is one which attempts to devise a fusion strategy that is dependent...

    Provided By University of Surrey

  • White Papers // Oct 2011

    Heterogeneous Information Fusion: A Novel Fusion Paradigm for Biometric Systems

    One of the most promising ways to improve biometric person recognition is indisputably via information fusion that is, to combine different sources of information. This paper proposes a novel fusion paradigm that combines heterogeneous sources of information such as user-specific, cohort and quality information. Two formulations of this problem are...

    Provided By University of Surrey

  • White Papers // Jun 2009

    User-Specific Score Normalization and Fusion for Biometric Person Recognition

    Every person is unique. This uniqueness is not only prevalent in his/her biometric traits, but also in the way he/she interacts with a biometric device. A recent trend in tailoring a biometric system to each user (client) is by normalizing the match score for each claimed identity. This technique is...

    Provided By University of Surrey

  • White Papers // Apr 2010

    Group-Specific Score Normalization for Biometric Systems

    The problem of biometric menagerie, first pointed out by Doddington et al. (1998), is one that plagues all biometric systems. They observe that only a handful of clients (enrolled users in the gallery) actually contribute disproportionately to recognition errors. While prior literature attempting to reduce this effect focuses on either...

    Provided By University of Surrey

  • White Papers // Jan 2012

    A Scalable Real-Time Monitoring System for Supporting Traffic Engineering

    Quality of service based value-added services in IP networks necessitate the use of traffic engineering. The latter relies typically on monitoring data for both offline, proactive and dynamic, reactive solutions. A monitoring system should be scalable in terms of network size, speed and number of customers subscribed to value-added services....

    Provided By University of Surrey

  • White Papers // Apr 2010

    Handling High Dimensionality in Biometric Classification With Multiple Quality Measures Using Locality Preserving Projection

    The use of quality measures in biometrics is rapidly becoming the standard strategy for improving performance of biometric systems, especially in the presence of variable environmental conditions of signal capture. It is often necessary to integrate multiple quality measures into the classification process in order to capture the relevant aspects...

    Provided By University of Surrey

  • White Papers // Jan 2010

    Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions

    The performance of biometric systems can be significantly affected by changes in signal quality. In this paper, two types of changes are considered: change in acquisition environment and in sensing devices. The authors investigated three solutions: model-level adaptation, score-level adaptation (normalization), and the combination of the two, called "Compound" adaptation....

    Provided By University of Surrey

  • White Papers // Apr 2011

    A Unified Framework for Biometric Expert Fusion Incorporating Quality Measures

    This paper proposes a unified framework for quality-based fusion of multimodal biometrics. Quality-dependent fusion algorithms aim to dynamically combine several classifier (biometric expert) outputs as a function of automatically derived (biometric) sample quality. Quality measures used for this purpose quantify the degree of conformance of biometric samples to some predefined...

    Provided By University of Surrey

  • White Papers // May 2010

    A Context Awareness Architecture for Energy Efficient Cognitive Radio

    Energy efficiency is a critical issue for future wireless communication. The European FP7 C2POWER project is to research, develop and demonstrate energy saving technologies for multi-standard wireless mobile devices, exploiting the combination of Cognitive Radio and cooperative strategies. The basic objective is to establish an energy optimization framework founded upon...

    Provided By University of Surrey

  • White Papers // Oct 2011

    Wavelet and Optimal Requantization Methodology for Lossy Fingerprint Compression

    Re-quantization is a key technology for reducing the bit rate of compressed data. This reduction of the bit rate; and in certain cases may result in signal quality degradation. Therefore, the proposed techniques used 9/7 wavelet transform before optimal re-quantization and finally, the output stream of coding symbols is entropy...

    Provided By University of Surrey